Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "flag" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Coalition kills Islamic State 'chemical weapons engineer' - Threat Matrix - 0 views

  • US Central Command, or CENTCOM, reported yesterday that it killed Abu Malik, an Islamic State "chemical weapons engineer," in an airstrike near Mosul, Iraq. Abu Malik was associated with al Qaeda in Iraq and then the Islamic State for a decade before he was killed. "Malik was an ISIL (Islamic State) chemical weapons engineer who worked at Saddam Hussein's Muthana chemical weapon production facility before affiliating with al Qaeda in Iraq in 2005," according to the CENTCOM press release. "He later joined ISIL and his past training and experience provided the terrorist group with expertise to pursue a chemical weapons capability." "His death is expected to temporarily degrade and disrupt the terrorist network and diminish ISIL's ability to potentially produce and use chemical weapons against innocent people," CENTCOM concluded. It is unclear if Abu Malik was associated with the al Qaeda in Iraq cell that the Iraqi Ministry of Defense broke up in 2013 (al Qaeda in Iraq was eventually rebranded as the Islamic State). That cell was seeking to manufacture chemical weapons, including sarin nerve gas, and plotting to conduct attacks within Iraq, Europe, and North America, according to the Iraqi government.
  •  
    Well, CENTCOM just kicked some major holes in the White House 2013 claims that the Syrian Opposition lacked the expertise to manufacture Sarin. 
Paul Merrell

Guess who credits the Mossad with producing the 'laptop documents?' | Middle East Eye - 0 views

  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
  • Although it has never been mentioned in news media, former International Atomic Energy Agency (IAEA) Director General, Mohamed El Baradei recalled in his memoirs that he was doubtful of the authenticity of the documents. “No one knew if any of this was real,” he wrote in reference to the laptop documents. Another former senior IAEA official told me, “It just really didn’t add up.  It made more sense that this information originated in another country.”  And as I have detailed in articles and in my book, key documents in the collection bear clear indications of fabrication. Support for that virtually unknown part of the Iran nuclear story has come from a surprising source: a popular Israeli account, celebrating the successes of the Mossad’s covert operations. “Mossad: The Greatest Missions of the Israeli Secret Service,” first published in Hebrew in 2010, and then published in English in 2012, was Israel’s best-selling book for months in 2010. But not only does it acknowledge that it was indeed the MEK that delivered the documents, it also suggests that at least some of the documents came from the Mossad.  
  • The co-authors of the book are far from critics of Israel’s policy toward Iran; One of the co-authors, Michael Bar-Zohar, is a well-connected former member of the Israeli Knesset and former paratrooper, who had previously written an authorised biography of Shimon Peres, as well as the biography of Isser Harel, the Mossad chief who presided over the kidnapping of Adolph Eichmann in Argentina. Much of what Bar-Zohar chronicled in the book had already been reported earlier by Israeli journalists - especially Ronen Bergman of the daily Yedioth Ahronoth.  In fact, Bergman accused Bar-Zohar of plagiarising his articles for much of the book, while changing only a few words.  But one thing that Bar-Zohar and co-author Nisham Mishal did not get from other Israeli journalists, was the role of the Mossad in regard to the laptop documents. 
  • ...5 more annotations...
  • Although they do not flatly state that the Mossad was the source of the documents, they certainly lead the reader to that conclusion. They begin by establishing the fact that the MEK was fronting for the Mossad in its revelation in August 2002 of Iran’s first enrichment facility at Natanz. The CIA, they write, “appeared to believe that the Mossad and the British MI6 were feeding MEK intelligence they had obtained, using the Iranian opposition as a hopefully credible source”.  And they explicitly confirm CIA’s suspicions. “According to Israeli sources,” they write, “It was, in fact, a watchful Mossad officer who had discovered the mammoth centrifuge installation at Natanz.”  Other sources, including Seymour Hersh and Connie Bruck have reported that the MEK got the intelligence on Natanz from the Israelis, but theirs is the first explicit acknowledgement attributed to an Israeli source that the MEK had revealed Natanz on the basis of Mossad intelligence.  What the Israeli co-authors do not say is that the Mossad was simply guessing at the purpose of Natanz, which the MEK mistakenly called a “fuel fabrication” facility, rather than a centrifuge enrichment facility.
  • Bar-Zohar and Mishal are little concerned with whether the Mossad’s laptop caper involved fraud or not. They obviously view the Israeli intelligence agency’s use of an Iranian exile group to get out documents that had been central to the international sanctions regime against Iran as a great triumph. But whatever their reasons, their book adds another layer to the growing body of evidence showing that the Bush administration and its allies hoodwinked the rest of the world with those documents.
  • The authors further suggest that the Mossad was behind information later released by the MEK on Mohsen Fakhrizadeh, the Iranian physics professor said to be shown in the laptop documents as the man in charge of that purported Iranian nuclear weapons research program. The MEK disclosed such personal details as Fakhrizadeh’s passport number and his home telephone number. But the Mossad chroniclers write: “This abundance of detail and means of transmission leads one to believe that, again, “a certain secret service” ever suspected by the West of pursuing its own agenda, painstakingly collected these facts and figures about the Iranian scientists and passed them to the Iranian resistance.” I asked Bar-Zohar’s research assistant, Nilly Ovnat, whether he had Israeli sources for those statements relating to the MEK and the laptop documents. She responded by          e-mail: “Professor Bar Zohar had other sources for most of the material concerning MEK and Natanz [and the] laptop, yet they could not be mentioned and cannot be discussed.”
  • Turning to the laptop documents, they make it clear that western intelligence had indeed obtained the documents from the MEK and suggest that the MEK got them from somewhere else. “The dissidents wouldn’t say how they had gotten hold of the laptop,” they write. They again frame the question of the origins of those documents in terms of CIA suspicions. “[T]he skeptical Americans suspected that the documents had been only recently scanned into the computer,” they write. “They accused the Mossad of having slipped in some information obtained from our own sources - and passing it to the MEK leaders for delivery to the West." Bar-Zohar and Mishal steer clear of any suggestion that the Mossad fabricated any documents, but their account leaves little doubt that they are convinced that the Mossad should be credited for the appearance of the documents. Their approach of referring to US suspicions, rather than stating it directly, appears to be a way of avoiding problems with Israeli military censors, who often clamp down on local reporting on sensitive issues while allowing references to foreign reports.
  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
Paul Merrell

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
Paul Merrell

U.K. file on Entebbe contains claim that Israel behind hijacking Israel News | Haaretz - 0 views

  • Newly released British documents contain a claim by an unnamed contact that the Shin Bet security service collaborated with the Popular Front for the Liberation of Palestine to hijack the June 1976 flight from Israel that was diverted to Entebbe, Uganda, the BBC reported Friday. Israel's rescue of the dozens of hostages taken in the hijacking of the Air France plane, popularly known as the Entebbe raid, is considered one of the most daring and successful operations in Israeli history. Elite Israel Defense Forces troops stormed the airport where the hostages, many of them Israeli, were held and overpowered the hijackers and Ugandan soldiers.
  • "The operation was designed to torpedo the PLO's standing in France and to prevent what they see as a growing rapprochement between the PLO and the Americans," the BBC report said British diplomat D.H. Colvin wrote in the document, citing his source. "My contact said the PFLP had attracted all sorts of wild elements, some of whom had been planted by the Israelis," Colvin reportedly wrote. "According to his information, the hijack was the work of the PFLP, with help from the Israeli Secret Service, the Shin Beit."
Paul Merrell

Virtual Economy's Phantom Job Gains Are Based on Statistical Fraud. And More Fraud Is in the Works | Global Research - 0 views

  • Washington can’t stop lying.  Don’t be convinced by last Thursday’s job report that it is your fault if you don’t have a job. Those 288,000 jobs and 6.1% unemployment rate are more fiction than reality.  In his analysis of the June Labor Data from the Bureau of Labor Statistics, John Williams (www.ShadowStats.com) wrote that the 288,000 June jobs and 6.1% unemployment rate  are “far removed from common experience and underlying reality.” Payrolls were overstated by “massive, hidden shifts in seasonal adjustments,” and the Birth-Death model added the usual phantom jobs.  Williams reports that “the seasonal factors are changed each and every month as part of the concurrent seasonal-adjustment process, which is tantamount to a fraud,” as the changes in the seasonal factors can inflate the jobs number.  While the headline numbers always are on a new basis, the prior reporting is not revised so as to be consistent.
  • The monthly unemployment rates are not comparable, so one doesn’t know whether the official U.3 rate (the headline rate that the financial press reports) went up or down. Moreover, the rate does not count discouraged workers who, unable to find a job, cease looking. To be counted among the U.3 unemployed, the person must have actively looked for work during the four weeks prior to the survey. The U.3 rate automatically declines as people who have been unable to find jobs cease trying to find one and thereby cease to be counted as unemployed. There is a second official measure of unemployment that includes people who have been discouraged for less than one year. That rate, known as U.6, is seldom reported and is double the 6.1% rate. Since 1994 there has been no official measure than includes discouraged people who have not looked for a job for more than a year. Including all discouraged workers produces an unemployment rate that currently stands at 23.1%, almost four times the rate that the financial press reports.
  • What you can take away from this is the opposite of what the presstitute media would have you believe.  The measured rate of unemployment can decline simply because large numbers of the unemployed become discouraged workers, cease looking for work, and cease to be counted in the U.3 and U.6 measures of the unemployment rate.   The decline in the employment-population ratio from 63% prior to the 2008 downturn to 59% today reflects the growth in discouraged workers.  Indeed, the ratio has not recovered its previous level during the alleged recovery, an indication that the recovery is an illusion created by the understated measure of inflation that is used to deflate nominal GDP growth.
  • ...8 more annotations...
  • Insurance (most likely the paperwork of Obamacare) contributed 8,500 jobs. As so few can purchase homes, “real estate rental and leasing” contributed 8,500 jobs. Professional and business services contributed 67,000 jobs, but 57% of these jobs were in employment services, temporary help services, and services to buildings and dwellings.   That old standby, education and health services, accounted for 33,700 jobs consisting mainly of ambulatory health care services jobs and social assistance jobs of which three-quarters are in child day care services.   The other old standby, waitresses and bartenders, gave us 32,800 jobs, and amusements, gambling, and recreation gave us 3,500 jobs.
  • In other words, the economy did not gain 288,000 new jobs last month.   But let’s assume the economy did gain 288,000 jobs and exam where the claimed jobs are reported to be. Of the alleged 288,000 new jobs, 16,000, or 5.5 percent are in manufacturing, which is not very promising for engineers and blue collar workers.  Growth in goods producing jobs has almost disappeared from the US economy.  As explained below, to alter this problem the government is going to change definitions in order to artificially inflate manufacturing jobs. In June private services account for 82 percent of the supposed new jobs.  The jobs are found mainly in non-tradable domestic services that pay little and cannot be exported to help to close the large US trade deficit. Wholesale and retail trade account for 55,300 jobs.  Do you believe sales are this strong  when retailers are closing stores and when shopping malls are closing?
  • Another indication that there has been no recovery is that Sentier Research’s index of real median household income continued to decline for two years after the alleged recovery began in June 2009.   There has been a slight upturn in real median household income since June 2011, but income remains far below the pre-recession level.   The Birth-Death model adds an average of 62,000 jobs to the reported payroll jobs numbers each month. This arbitrary boost to the payroll jobs numbers is in addition to the Bureau of Labor Statistics’ underlying assumption that unreported jobs lost to business failures are matched by unreported new jobs from new business startups, an assumption that does not well fit an economy that fell into recession and is unable to recover.   John Williams concludes that in current BLS reporting, “the aggregate average overstatement of employment change easily exceeds 200,000 jobs per month.”
  • Local government, principally education, gave us 22,000 jobs.   So, where are the jobs for university graduates?  They are practically non-existent. Think of all the MBAs, but June had only 2,300 jobs for management of companies and enterprises. Think of the struggle to get into law and medical schools.  There’s no job payoff. June had jobs for 1,200 in legal services, which includes receptionists and para-legals.  Where are all the law school graduates finding jobs? Offices of physicians (mainly people who fill out the mandated paperwork and comply with all the regulations, which have multiplied under ObamaCare) hired 4,000 people.  Outpatient care centers hired 700 people.  Nursing care facilities hired 2,400 people.  So where are the jobs for the medical school graduates? Aside from all the exaggerations in the jobs numbers of which ShadowStats.com has informed us, just taking the jobs as reported, what kind of economy do these jobs indicate:  a superpower whose pretensions are to exercise hegemony over the world or an economy in which opportunities are disappearing and incomes are falling?
  • Do you think that this jobs picture would be the same if the government in Washington cared about you instead of the mega-rich? Some interesting numbers can be calculated from table A.9 in the BLS press release.  John Williams advises that the BLS is inconsistent in the methods it uses to tabulate the data in table A.9 and that the data is also afflicted by seasonal adjustment problems.  However, as the unemployment rate and payroll jobs are reported regardless of their problems, we can also report the BLS finding that in June 523,000 full-time jobs disappeared and 800,000 part time jobs appeared. Here, perhaps, we have yet another downside of the misnamed Obama “Affordable Care Act.”  Employers are terminating full-time employment and replacing the jobs with part-time employment in order to come in under the 50-person full time employment that makes employers responsible for fringe benefits such as health care. Americans are already experiencing difficulties making ends meet, despite the alleged “recovery.”  If yet another half million Americans have been forced onto part-time pay with consequent loss of health care and other benefits, consumer demand is further compressed, with the consequence, unless hidden by statistical trickery, of a 2nd quarter negative GDP and thus officially the reappearance of recession.
  • What will the government do if a recession cannot be hidden?  If years of unprecedented money printing and Keynesian fiscal deficits have not brought recovery, what will bring recovery?  How far down will US living standards fall for the 99% in order that the 1% can become ever more mega-rich while Washington wastes our diminishing substance exercising hegemony over the world? Just as Washington lied to you about Saddam Hussein’s weapons of mass destruction, Assad’s use of chemical weapons, Russian invasion of Ukraine, Waco, and any number of false flag or nonexistent attacks such as Tonkin Gulf, Washington lies to you about jobs and economic recovery.  Don’t believe the spin that you are unemployed because you are shiftless and prefer government handouts to work.  The government does not want you to know that you are unemployed because the corporations offshored American jobs to foreigners and because economic policy only serves the oversized banks and the one percent. Just as the jobs and inflation numbers are rigged and the financial markets are rigged, the corrupt Obama regime is now planning to rig US manufacturing and trade statistics in order to bury all evidence of offshoring’s adverse impact on our economy.
  • The federal governments Economic Classification Policy Committee has come up with a proposal to redefine fact as fantasy in order to hide offshoring’s contribution to the US trade deficit, artificially inflate the number of US manufacturing jobs, and redefine foreign-made manufactured products as US manufactured products.  For example, Apple iPhones made in China and sold in Europe would be reported as a US export of manufactured goods. Read Ben Beachy’s important report on this blatant statistical fraud in CounterPunch’s July 4th weekend edition: http://www.counterpunch.org/2014/07/04/we-didnt-offshore-manufacturing/ China will not agree that the Apple brand name means that the phones are not Chinese production. If the Obama regime succeeds with this fraud, the iPhones would be counted twice, once by China and once by the US, and the double-counting would exaggerate world GDP. For years I have exposed the absurd claim that offshoring is merely the operation of free trade, and I have exposed the incompetent studies by such as Michael Porter at Harvard and Matthew Slaughter at Dartmouth that claimed to prove that the US was benefitting from offshoring its manufacturing.  My book published in 2012 in Germany and in 2013 in the US, The Failure of Laissez Faire Capitalism and Economic Dissolution of the West, proves that offshoring has dismantled the ladders of upward mobility that made the US an opportunity society and is responsible for the decline in US economic growth. The lost jobs and decline in the middle class has contributed to the rise in income inequality, the destruction of tax base for cities and states, and loss of population in America’s once great manufacturing centers.
  • For the most part economists have turned a blind eye. Economists serve the globalists.  It pays them well. The corruption in present-day America is total. Psychologists and anthropologists serve war and torture. Economists serve globalism and US financial hegemony. Physicists and chemists serve the war industries. Physicists and computer geeks serve NSA. The media serves the government and the corporations. The political parties serve the six powerful private interest groups that rule the country. No one serves truth and liberty. I predict that within ten years truth and liberty will be forbidden words uttered only by “domestic extremists” who are a threat that must be exterminated without due process of law. America has left us.  We now have the tyranny of the Orwellian state that rules, not by the ballot box and Constitution, but by force and propaganda.
Paul Merrell

Sanctions and Airliners - 0 views

  • As there is no act too dastardly for Washington to undertake, Putin and Russia could become victims of a devious machination.
Paul Merrell

Hong Kong's People Have Spoken - End the Protests | nsnbc international - 0 views

  • Despite an ongoing media circus in the West portraying a “popular uprising” in Hong Kong, China – in reality the Chinese people and particularly the citizens of Hong Kong have grown tired of the unrest.
  • After popular demand, the Public Opinion Programme (HKU POP) of the University of Hong Kong conducted a poll asking whether or not the “Occupy Central” movement should come to an end. An overwhelming 80% said yes with HKU POP stating specifically, “almost 80% called for an end to the occupation.” Bloomberg in their article, “Most Hong Kong People Want Pro-Democracy Protests to End Now,” would also admit: About 68 percent of 513 respondents said the government should clear the protesters immediately, according to a survey conducted by the University of Hong Kong Nov. 17-18.
  • Surely, with “Occupy Central” claiming to be a “pro-democracy” movement, it will heed the will of the people and voluntarily withdraw from Hong Kong’s streets indefinitely. However, despite the wording of Bloomberg’s headline, those blocking up Hong Kong’s streets are not “pro-democracy.” The backlash against “Occupy Central” is not the Hong Kong public turning on “pro-democracy” protesters but rather the Hong Kong public understanding “Occupy Central” has nothing at all to do with democracy in the first place. The degree to which the “Occupy Central” has been exposed as a foreign-backed political destabilization is so complete that there is little likelihood that such a destabilization will be possible in Hong Kong, or anywhere else inside of China well into the foreseeable future. Leaders including Benny Tai and Joshua Wong have all been linked to US State Department funded organizations, projects, and campaigns. “Occupy Central” leaders including Martin Lee and Anson Chan literally were in Washington D.C. earlier this year lobbying for US support in front of the very organizations funding the political activity of virtually every prominent “Occupy Central” leader. Even HKU POP has been implicated in “dirty money” used to qualify an ad hoc referendum carried out by “Occupy Central” ahead of the recent protests.
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDispatch - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

Canada Casts Global Surveillance Dragnet Over File Downloads - The Intercept - 0 views

  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
  • The latest disclosure sheds light on Canada’s broad existing surveillance capabilities at a time when the country’s government is pushing for a further expansion of security powers following attacks in Ottawa and Quebec last year. Ron Deibert, director of University of Toronto-based Internet security think tank Citizen Lab, said LEVITATION illustrates the “giant X-ray machine over all our digital lives.” “Every single thing that you do – in this case uploading/downloading files to these sites – that act is being archived, collected and analyzed,” Deibert said, after reviewing documents about the online spying operation for CBC News. David Christopher, a spokesman for Vancouver-based open Internet advocacy group OpenMedia.ca, said the surveillance showed “robust action” was needed to rein in the Canadian agency’s operations.
  • In a top-secret PowerPoint presentation, dated from mid-2012, an analyst from the agency jokes about how, while hunting for extremists, the LEVITATION system gets clogged with information on innocuous downloads of the musical TV series Glee. CSE finds some 350 “interesting” downloads each month, the presentation notes, a number that amounts to less than 0.0001 per cent of the total collected data. The agency stores details about downloads and uploads to and from 102 different popular file-sharing websites, according to the 2012 document, which describes the collected records as “free file upload,” or FFU, “events.” Only three of the websites are named: RapidShare, SendSpace, and the now defunct MegaUpload.
  • ...3 more annotations...
  • “The specific uses that they talk about in this [counter-terrorism] context may not be the problem, but it’s what else they can do,” said Tamir Israel, a lawyer with the University of Ottawa’s Canadian Internet Policy and Public Interest Clinic. Picking which downloads to monitor is essentially “completely at the discretion of CSE,” Israel added. The file-sharing surveillance also raises questions about the number of Canadians whose downloading habits could have been swept up as part of LEVITATION’s dragnet. By law, CSE isn’t allowed to target Canadians. In the LEVITATION presentation, however, two Canadian IP addresses that trace back to a web server in Montreal appear on a list of suspicious downloads found across the world. The same list includes downloads that CSE monitored in closely allied countries, including the United Kingdom, United States, Spain, Brazil, Germany and Portugal. It is unclear from the document whether LEVITATION has ever prevented any terrorist attacks. The agency cites only two successes of the program in the 2012 presentation: the discovery of a hostage video through a previously unknown target, and an uploaded document that contained the hostage strategy of a terrorist organization. The hostage in the discovered video was ultimately killed, according to public reports.
  • LEVITATION does not rely on cooperation from any of the file-sharing companies. A separate secret CSE operation codenamed ATOMIC BANJO obtains the data directly from internet cables that it has tapped into, and the agency then sifts out the unique IP address of each computer that downloaded files from the targeted websites. The IP addresses are valuable pieces of information to CSE’s analysts, helping to identify people whose downloads have been flagged as suspicious. The analysts use the IP addresses as a kind of search term, entering them into other surveillance databases that they have access to, such as the vast repositories of intercepted Internet data shared with the Canadian agency by the NSA and its British counterpart Government Communications Headquarters. If successful, the searches will return a list of results showing other websites visited by the people downloading the files – in some cases revealing associations with Facebook or Google accounts. In turn, these accounts may reveal the names and the locations of individual downloaders, opening the door for further surveillance of their activities.
  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
Paul Merrell

Britain Used Spy Team to Shape Latin American Public Opinion on Falklands - The Intercept - 0 views

  • Faced with mounting international pressure over the Falkland Islands territorial dispute, the British government enlisted its spy service, including a highly secretive unit known for using “dirty tricks,” to covertly launch offensive cyberoperations to prevent Argentina from taking the islands. A shadowy unit of the British spy agency Government Communications Headquarters (GCHQ) had been preparing a bold, covert plan called “Operation QUITO” since at least 2009. Documents provided to The Intercept by National Security Agency whistleblower Edward Snowden, published in partnership with Argentine news site Todo Notícias, refer to the mission as a “long-running, large scale, pioneering effects operation.” At the heart of this operation was the Joint Threat Research and Intelligence Group, known by the acronym JTRIG, a secretive unit that has been involved in spreading misinformation.
  • The British government, which has continuously administered the Falkland Islands — also known as the Malvinas — since 1833, has rejected Argentine and international calls to open negotiations on territorial sovereignty. Worried that Argentina, emboldened by international opinion, may attempt to retake the islands diplomatically or militarily, JTRIG and other GCHQ divisions were tasked “to support FCO’s [Foreign and Commonwealth Office’s] goals relating to Argentina and the Falkland Islands.” A subsequent document suggests the main FCO goal was to “[prevent] Argentina from taking over the Falkland Islands” and that new offensive cyberoperations were underway in 2011 to further that end. Tensions between the two nations, which fought a war over the small archipelago in the South Atlantic Ocean in 1982, reached a boil in 2010 with the British discovery of large, offshore oil and gas reserves potentially worth billions of dollars.
  • While the full extent of JTRIG’s tactics used in the Falklands mission is unclear, the scope of JTRIG’s approved capabilities offers an idea of what may have been done. The group, first revealed last year by NBC News and The Intercept, has developed various techniques — including “false flag” operations, sexual “honey traps,” and implanting computer viruses — to collect intelligence, plant propaganda and diminish or discredit opponents. As reported in The Intercept last year, JTRIG “has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, ‘amplif[y]’ sanctioned messages on YouTube,” and plant false Facebook wall posts for “entire countries.” According to a study of the group by the U.K.’s Defence Science and Technology Laboratory (DSTL), “the language of JTRIG’s operations is characterized by terms such as ‘discredit,’ promote ‘distrust,’ ‘dissuade,’ ‘deceive,’ ‘disrupt,’ ‘delay,’ ‘deny,’ ‘denigrate/degrade,’ and ‘deter.’” The unit’s activities generally break down into two symbiotic categories: online Human Intelligence, or HUMINT, and “effects operations.” Online HUMINT is the collection of information on human targets through passive tracking or overt interaction with a target through an alias. These operations may sometimes be in support of, or in conjunction with, covert MI-6 agents on the ground.
  • ...2 more annotations...
  • Effects operations are used to disseminate deception and disruption online. A full catalog of JTRIG’s capabilities as of 2012 can be seen here. Operation QUITO, the group’s operation to support the Foreign Office’s “goals relating to Argentina and the Falkland Islands” is called a “pioneering effects operation.” That operation, still in the planning stages, had undergone “a significant amount of prep work” and was “almost complete” as of 2009.
  • GCHQ’s mission regarding the Falkland Islands also appears to extend beyond just Argentina and involve regional leaders and attitudes. A November 2011 workshop on “Mission Driven Access” gathered staff to “build on pioneering work already done” and tried to develop new ideas for real world scenarios. One such scenario: “GCHQ has consistently underperformed on Brazil, with growing concerns that [South] American attitudes on the Falklands are swinging behind Argentina. A forthcoming Ministerial visit to Chile provides an opportunity to counter the trend. The Foreign Office are looking for advice.”
Paul Merrell

Tsarnaev Guilty, but Who Made the Bombs? - WhoWhatWhy - 0 views

  • It took a jury just over 11 hours to find Boston Marathon bomber Dzhokhar Tsarnaev guilty of 30 counts in connection with the worst terrorist attack on American soil since 9/11. Federal prosecutors argued Tsarnaev, 21, deliberately “shredded the bodies” of his victims and waged violent jihad to “punish Americans.”Assistant US Attorney Aloke Chakravarty portrayed Tsarnaev as a heartless terrorist who, along with his  brother Tamerlan, carried out the April 2013 attacks that killed three and injured 264 others.But while evidence of Tsarnaev’s culpability—including an admission of guilt from his own defense team—virtually guaranteed a guilty verdict, that wasn’t enough to stop prosecutors from twisting important facts to suit their own agenda.Referencing “bomb-making” paraphernalia seized from Tamerlan Tsarnaev’s apartment, Chakravarty told the court that, “there is evidence, at least in part, that the bombs were built at 410 Norfolk Street.”
  • What the jury didn’t know is that in May 2014, prosecutors said they had no evidence the bombs were constructed at Norfolk Street, and in October 2014, a year-and-a-half after the bombings, the FBI said it still had no idea where the bombs were built, or who actually built them.
Paul Merrell

US-Saudi Blitz into Yemen: Naked Aggression, Absolute Desperation | Global Research - Centre for Research on Globalization - 0 views

  • The “proxy war” model the US has been employing throughout the Middle East, Eastern Europe, and even in parts of Asia appears to have failed yet again, this time in the Persian Gulf state of Yemen. Overcoming the US-Saudi backed regime in Yemen, and a coalition of sectarian extremists including Al Qaeda and its rebrand, the “Islamic State,” pro-Iranian Yemeni Houthi militias have turned the tide against American “soft power” and has necessitated a more direct military intervention. While US military forces themselves are not involved allegedly, Saudi warplanes and a possible ground force are. Though Saudi Arabia claims “10 countries” have joined its coalition to intervene in Yemen, like the US invasion and occupation of Iraq hid behind a “coalition,” it is overwhelmingly a Saudi operation with “coalition partners” added in a vain attempt to generate diplomatic legitimacy. The New York Times, even in the title of its report, “Saudi Arabia Begins Air Assault in Yemen,” seems not to notice these “10” other countries. It reports:
  • Saudi Arabia announced on Wednesday night that it had launched a military campaign in Yemen, the beginning of what a Saudi official said was an offensive to restore a Yemeni government that had collapsed after rebel forces took control of large swaths of the country.  The air campaign began as the internal conflict in Yemen showed signs of degenerating into a proxy war between regional powers. The Saudi announcement came during a rare news conference in Washington by Adel al-Jubeir, the kingdom’s ambassador to the United States.
  • Indeed, the conflict in Yemen is a proxy war. Not between Iran and Saudi Arabia per say, but between Iran and the United States, with the United States electing Saudi Arabia as its unfortunate stand-in. Iran’s interest in Yemen serves as a direct result of the US-engineered “Arab Spring” and attempts to overturn the political order of North Africa and the Middle East to create a unified sectarian front against Iran for the purpose of a direct conflict with Tehran. The war raging in Syria is one part of this greater geopolitical conspiracy, aimed at overturning one of Iran’s most important regional allies, cutting the bridge between it and another important ally, Hezbollah in Lebanon. And while Iran’s interest in Yemen is currently portrayed as yet another example of Iranian aggression, indicative of its inability to live in peace with its neighbors, US policymakers themselves have long ago already noted that Iran’s influence throughout the region, including backing armed groups, serves a solely defensive purpose, acknowledging the West and its regional allies’ attempts to encircle, subvert, and overturn Iran’s current political order.
  • ...4 more annotations...
  • What may result is a conflict that spills over Yemen’s borders and into Saudi Arabia proper. Whatever dark secrets the Western media’s decades of self-censorship regarding the true sociopolitical nature of Saudi Arabia will become apparent when the people of the Arabian peninsula must choose to risk their lives fighting for a Western client regime, or take a piece of the peninsula for themselves. Additionally, a transfer of resources and fighters arrayed under the flag of the so-called “Islamic State” and Al Qaeda from Syria to the Arabian Peninsula will further indicate that the US and its regional allies have been behind the chaos and atrocities carried out in the Levant for the past 4 years. Such revelations will only further undermine the moral imperative of the West and its regional allies, which in turn will further sabotage their efforts to rally support for an increasingly desperate battle they themselves conspired to start.
  • The aerial assault on Yemen is meant to impress upon onlookers Saudi military might. A ground contingent might also attempt to quickly sweep in and panic Houthi fighters into folding. Barring a quick victory built on psychologically overwhelming Houthi fighters, Saudi Arabia risks enveloping itself in a conflict that could easily escape out from under the military machine the US has built for it. It is too early to tell how the military operation will play out and how far the Saudis and their US sponsors will go to reassert themselves over Yemen. However, that the Houthis have outmatched combined US-Saudi proxy forces right on Riyadh’s doorstep indicates an operational capacity that may not only survive the current Saudi assault, but be strengthened by it. Reports that Houthi fighters have employed captured Yemeni warplanes further bolsters this notion – revealing tactical, operational, and strategic sophistication that may well know how to weather whatever the Saudis have to throw at it, and come back stronger.
  • The unelected hereditary regime ruling over Saudi Arabia, a nation notorious for egregious human rights abuses, and a land utterly devoid of even a semblance of what is referred to as “human rights,” is now posing as arbiter of which government in neighboring Yemen is “legitimate” and which is not, to the extent of which it is prepared to use military force to restore the former over the latter. The United States providing support for the Saudi regime is designed to lend legitimacy to what would otherwise be a difficult narrative to sell. However, the United States itself has suffered from an increasing deficit in its own legitimacy and moral authority. Most ironic of all, US and Saudi-backed sectarian extremists, including Al Qaeda in Yemen, had served as proxy forces meant to keep Houthi militias in check by proxy so the need for a direct military intervention such as the one now unfolding would not be necessary. This means that Saudi Arabia and the US are intervening in Yemen only after the terrorists they were supporting were overwhelmed and the regime they were propping up collapsed. In reality, Saudi Arabia’s and the United States’ rhetoric aside, a brutal regional regime meddled in Yemen and lost, and now the aspiring global hemegon sponsoring it from abroad has ordered it to intervene directly and clean up its mess.
  • the Yemeni people are not being allowed to determine their own affairs. Everything up to and including military invasion has been reserved specifically to ensure that the people of Yemen do not determine things for themselves, clearly, because it does not suit US interests. Such naked hypocrisy will be duly noted by the global public and across diplomatic circles. The West’s inability to maintain a cohesive narrative is a growing sign of weakness. Shareholders in the global enterprise the West is engaged in may see such weakness as a cause to divest – or at the very least – a cause to diversify toward other enterprises. Such enterprises may include Russia and China’s mulipolar world. The vanishing of Western global hegemony will be done in destructive conflict waged in desperation and spite. Today, that desperation and spite befalls Yemen.
  •  
    Usually I agree with Tony Cartalucci, but I think it's too early to pick winners and losers in Yemen. At least a couple of other nations allied with the Saudis are flying aerial missions and there's a commitment of troops and air support by Egypt, although it isn't clear that these would enter Yemen, but may just deploy to "protect" the waters approaching the Suez Canal from the Yemenis. The Saudis have a surfeit of U.S. weaponry but their military is inexperienced. The House of Saud has preferred proxy wars conducted by Salafist mercenaries over direct military intervention. How effective its military will be is a very big unknown at this point. But I like Cartalucci's point that if the House of Saud has to send in its ISIL mercenaries, it will go a long way toward unmasking the U.S. excuse for invading Syria and resuming boots on the ground in Iraq.
Paul Merrell

The Money Trail: How the US Fostered Yemen's Separatist Movement / Sputnik International - 0 views

  • As Saudi Arabia and its allies have begun the bombing campaign against Yemen, in the south, a separatist movement calling for a "State of South Arabia" is emerging. Fostered by the US, it will leave the Houthis with two hostile states at their borders and locked access to the sea, if it succeeds.
  • Welcome to phase two of US regime change operations. After Yemen's 2011 revolution failed and Houthi militias overthrew President Hadi, forces trained and sponsored by the US government are being activated as a separatist movement. The Southern People's Committees (SPC), founded around 2007 although USAID has been conducting political workshops as part of a $695,000 project and actively grooming leadership in Yemen since 2005. (Also in 2007, weekly protests began, organized by women's organizations, fostered by the workshops.) The SPC were similar to many color revolution movements such as Serbia's Otpor in that they did not have a central leadership, but rather an autonomous cell-based organization. In addition, they were very capable in the use of social media technologies, text messaging and the circumventing the government's internet censorship to organize protests.
  • Meanwhile, the Yemen Center for Human Rights Studies, which received $193,000 from the EU and US-funded Foundation for the Future in 2009, conducted a poll in January 2010, which found that 70 percent of southern Yemenis favored secession. Another USAID-funded project, the $43 million Responsive Governance Project (RGP), launched in May 2010, conducted "New Social Media training for Youth leaders to equip Yemeni youth groups in the use of media to enhance their participation in formulating public issues." The project focuses on establishing contacts with the Yemeni government and providing "leadership and civic education training to youth NGOs."
  • ...5 more annotations...
  • At the same time, USAID funded a $3.58 million project called Promoting Youth for Civic Engagement (PYCE) to train Aden youth " in PACA [political activity training], first aid, self-defense, photography, calligraphy and various other topics," including "media skills," according to an evaluation report of the PYCE Project, conducted in 2012. The project was constrained to Aden and did not conduct workshops in the northern capital, Sanaa, after reportedly receiving threats.
  • The project is presented as a youth "sports program," and although it does include basketball, handball and chess, these were not the primary goal, as the report shows. At the same time, first aid, self-defense, photography and calligraphy (making protest signs) sound a lot more like protest tactics than sports. The program, initially planned to last for two years, did not make any progress reports after March 2012, when President Hadi assumed power. After the 2011 revolution, the SPC became more of a military outfit and took part in a fight against al-Qaeda in Yemen, which coincided with the CIA's expanded drone campaign in the area. This is also where the organization fades from public view when it comes to USAID expense reports, as the organization appeared to lose interest in developing democracy in the country. In a June 4, 2012 a field commander of the People's Committees gave an interview to the Yemen Times, in which he described the group's fight against the Ansar al-Sharia Islamists together with the government.
  • However, the group reappeared in public view on September 23 2014, two days after Houthis took control of Sanaa, and issued a statement in which they call on security forces to "undertake its historical role in providing security and maintaining people's property because it is in order to preserve the revolution, which is the most important accomplishment achieved by the Yemeni people." At the same time, in southern Yemen, the People's Committee has been very active on Facebook and Twitter since around October 2014. The Facebook and Twitter pages publish slick anti-Houthi propaganda and call for separatism and a "State of South Arabia," within the bounds of former South Yemen, and using South Yemen's flag
  • Since mid-March, the SPC have been fighting against Houthis and see Saudi Arabia as an ally of convenience, although some of their social media accounts, Saudi Arabia's King Salman and other royal family figures are glorified. However, the splitting of Yemen benefits Saudi Arabia, as it secludes the Houthis to a smaller Northern Yemen, which would be surrounded by two hostile states, with Saudi Arabia to the north and the new South Arabia to the south, which would also control access to the sea at the Gulf of Aden. The current situation has considerable parallels with Ukraine, which has led the Russian Foreign Minister Sergei Lavrov to call the situation one of "obvious double standards, but we clearly did not want neither what is happening in Ukraine, nor what is happening in Yemen."
  • Indeed, while Russia has been repeatedly accused of helping Donbas independence supporters, the US has openly fostered the south Yemen separatist movement. At the same time, while Ukraine's President Yanukovych was called illegitimate by the US after fleeing the country, Yemen's Hadi has remained "legitimate" and has even called for a Saudi Arabian military operation against the people who ousted him. The ongoing conflict in Yemen is currently at the second phase of US regime change operations, rebel conflict. The first stage, the color revolution, has failed, and now the last stop, foreign intervention and ground invasion remains. Saudi Arabia and its Gulf allies have already begun the airstrikes, and the South Arabia movement has begun its separatist campaign.
  •  
    Looks like Obama's drone attacks in Yemen were not enough to do the job.
  •  
    Turns out that the U.S. has been covertly rocking Yemen heavily at least since the Clinton Administration, including naval bombardment, drone strikes, cruise missiles, et cet.: Ongoing detailed compilations of U.S. covert and military actions in Yemen. (Publication dates are for first entry in compilations.) Methodology: http://www.thebureauinvestigates.com/2011/08/10/pakistan-drone-strikes-the-methodology2/ Drones Team, Yemen: reported US covert actions 2001-2011, The Bureau of Investigative Journalism (29 March 2012), http://www.thebureauinvestigates.com/2012/03/29/yemen-reported-us-covert-actions-since-2001/ (includes data through 2014). Jack Serle, Yemen: Reported US covert actions 2015, The Bureau of Investigative Journalism (26 January 2015),http://www.thebureauinvestigates.com/2015/01/26/yemen-reported-us-covert-actions-2015/
Paul Merrell

Obama Rejects GOP's Islamophobic Statements « LobeLog - 0 views

  • It didn’t take long for Republican presidential candidates to stake out strikingly anti-Muslim immigration positions following the terrorist attacks in Paris that left at least 129 people dead and over 300 injured. French flags were flown and moments of silence observed across the U.S. and around the world, but Sen. Ted Cruz (R-TX), Sen. Marco (R-FL), Ben Carson, and Donald Trump decided it was an opportunity to stoke anti-immigrant and anti-Muslim fears. The anti-immigrant and Islamophobic comments led President Obama, speaking from the G20 summit in Turkey, to denounce the statements as “shameful.” Cruz claimed that “there is no meaningful risk of Christians committing acts of terror” so the U.S. should focus on admitting displaced Christians, but it was “lunacy” to allow Muslim refugees into the country. Rubio outright rejected accepting any Syrian refugees into the U.S. because “there’s no way to background check” them. Ben Carson said that accepting Syrian refugees into the U.S. would require “a suspension of intellect.” Donald Trump, doubling down on his anti-immigrant campaign platform, warned that Syrian refugees could be “one of the great Trojan horses.” Louisiana Governor Bobby Jindal called for sealing the U.S. border, and Sen. David Vitter (R-LA) started a petition to stop Syrian refugees from entering Louisiana.
  • The comments from Republicans led Obama, speaking to the press at the close of the G-20 Summit today in Antalya, Turkey, to hit back against the growing sentiment on the right to only allow Christian refugees into the country. Obama pointed to the hypocrisy of politicians who “themselves come from families who benefited from protection when they were fleeing political prosecution,” a jab at Rubio and Cruz, both of whom are the children of Cuban immigrants to the U.S. “We don’t have religious tests to our compassion,” said Obama, adding that “while I had a lot of disagreements with President George W. Bush on policy, but I was very proud after 9/11 when he was adamant and clear about the fact that this is not a war on Islam.” Watch Obama’s comments here:
  •  
    Under international law, all nations are required to grant asylum to refugees, regardless of their religion or race. 
Paul Merrell

U.S. Spies Root for an ISIS-Russia War - The Daily Beast - 0 views

  • In the days following the crash of Russian Metrojet Flight 9268, which mounting evidence suggests was felled by an ISIS bomb, many U.S. intelligence and security officials weren’t panicking about the so-called Islamic State unleashing a new campaign of attacks on civilian airliners. Instead, they were wondering how the bombing might hurt Vladimir Putin, and potentially help the United States. Ever since Putin started dropping bombs on militants in Syria, officials have privately been arguing that the Russian leader committed a major strategic blunder, and that his intervention in Syria would weaken both his military and his reputation and likely ignite a backlash from Islamist militants, who have attacked inside Russia in the past.One U.S. intelligence official, speaking prior to the airliner crash, called the Russian campaign in Syria “Putin’s folly.”Now, six U.S. intelligence and military officials told The Daily Beast that they hoped an ISIS attack on Russian civilians would force Putin to finally take the gloves off and attack the group, which the U.S. has been trying to dislodge from Iraq and Syria for more than a year, without success.
  • “Now maybe they will start attacking [ISIS],” one senior defense official smugly wondered last week. “And stop helping them,” referring to ISIS gains in Aleppo that came, in part, because the group took advantage of Russian strikes on other rebels and militant outfits.Since the plane crashed, Russia has struck two ISIS-controlled areas in Syria: Raqqa and Palmyra.“I suppose now he’ll really let ISIS have it. This should be fun,” one senior intelligence official told The Daily Beast.
Paul Merrell

Syrian Air Strike Exterminates Commander Behind 2013 Chemical Weapons Attack in Ghouta - nsnbc international | nsnbc international - 0 views

  • Zahran Alloush, the commander of the Jaysh al-Islam alliance was killed in a Damascus suburb. August 21, 2013 the Saudi intelligence asset Alloush was commanding Liwa-al-Islam when he gave the order to launch the chemical weapons attack against the East Ghouta suburb of Damascus. Zahran Alloush has been on the payroll of Saudi intelligence since the 1980s.
  • The Central Command of the Syrian Arab Army confirmed that it successfully launched an air strike in the Damascus suburb of Otaya, targeting and killing several Jihadist commanders. Among them the leader of Jaysh al-Islam, Zahran Alloush. Jaysh al-Islam is an alliance of several Jihadist militia, including Liwa-al-Islam. Jaysh al-Islam is allied with the Syrian Al-Qaeda Franchise Jabhat Al-Nusrah. An in-depth investigation by nsnbc international, in 2013, concluded that Zahran Alloush was the commander who gave the direct order to launch the chemical weapons attack in East Ghouta on August 21, 2013.
  • The investigation also concluded that command responsibility for Alloush’s decision led directly to the U.S.’s Chairman of the Joint Chiefs of Staff, the White House, and to the Saudi government. Alloush would also be in control over choosing the “security guards” UN inspectors had to submit to while gathering evidence after the chemical weapons attack in East Ghouta. (see details and names in the report). Zahran Alloush, Liwa-al-Islam and Saudi intelligence also played central roles in the attempt to obstruct Syria’s decommissioning of chemical weapons by launching attacks against chemical weapons transports. The information about these transports was highly classified, leading the Syrian government to the conclusion that Saudi intelligence provided information to Liwa-al-Islam. Zahran Alloush was since the 1990s involved in the Salafist – Wahabbist terrorist networks in Syria which led to his arrest by Syrian intelligence. He was released in early of 2011, when the Assad administration granted a general amnesty. Immediately after his March 2011 release from prison, Zahran Alloush began receiving substantial funds and weapons from Saudi intelligence, which enabled him to establish Liwa-al-Islam as a de facto Saudi Arabia sponsored mercenary brigade under the auspices of the Saudi Interior Ministry.
  • ...1 more annotation...
  • The Saudi intelligence assets Alloush and Liwa-al-Islam also played crucial roles in the demise of the predominantly Qatari and Turkish backed Free Syrian Army (FSA) and other, predominantly Qatari-backed insurgencies. In June 2013 in the Jobar district of Damascus, for example, Alloush withdrew his Liwa-al-Islam troops during a major battle with the Syrian Arab Army without announcing the sudden withdrawal to the Qatar-sponsored First Brigade and the Liwa Jaish al-Muslimeen. Both brigades were literally wiped out by the Syrian Army. The air strike that exterminated Zahran Alloush also exterminated one of the primary field commanders who were responsible for the transition from the primacy of Muslim Brotherhood linked insurgencies to Al-Qaeda-linked insurgencies in the Syrian theater. That includes the primacy of Jabhat al-Nusrah, Jaysh al-Islam, Liwa-al-Islam, and ultimately also the self-proclaimed Islamic State, a.k.a. ISIL, ISIS or Daesh.
Paul Merrell

Elizabeth Warren Denounces Travesty of Government "Settlement" With Goldman Sachs - 0 views

  • Criticism of US government leniency on Wall Street legal transgressions is now being covered widely - even by trade publications such as the National Mortgage Professional Magazine. On January 18, the trade publication ran an article about Sen. Elizabeth Warren (D-Massachusetts) condemning the most recent US government settlement with a "too-big-to-fail" financial firm, in this case Goldman Sachs, for illegal abuse of the mortgage market: Sen. Warren used her Facebook page to denounce the agreement, noting that the settlement sum was “barely a fraction of the billions investors lost” while arguing that Goldman Sachs was not properly penalized for its actions. “That’s not justice – it’s a white flag of surrender,” she wrote. “It’s time to end this farce. These companies think they’re above the law – and too many government officials go along with them. A first step would be to pass the bipartisan Truth in Settlements Act to shine more light on these backroom deals. A second step would be to get government officials who have the backbone to fight back.” Warren’s comments were echoed by the nonprofit U.S. Public Interest Research Group (U.S. PIRG).
  • The publication, which is geared toward professionals in the mortgage industry, also tellingly noted, "In announcing the [$5.1 billion] settlement, Goldman Sachs made no admission of guilt or error, and no executive from the New York-based financial giant will face criminal or civil charges."  As we have noted in this space many times, the seemingly large financial penalties levied on Wall Street firms for illegal activity are not so large, in the context of those firms' budgets: The fines are generally less than the revenue that the firms generated by engaging in the often fraudulent practices in the first place. As The Huffington Post noted in a report on the recent settlement,  About $2.4 billion of the settlement is in the form of a government penalty. The bank has said that it securitized about $125 billion of home loans between 2005 and 2008, of which about $23 billion eventually soured. The penalty represents about 10 percent of investors’ losses. Goldman can deduct the rest of the settlement, about $2.7 billion, from its future tax bills, according to a person familiar with the accord. The bank said the settlement will reduce its fourth-quarter profit by about $1.5 billion. It reports earnings next week.
  • Goldman Sachs is being let off the hook for 90 percent of the investor losses for which it was primarily responsible. Furthermore, as is consistent with past settlements with Wall Street firms by the Department of Justice and other executive agencies, much of the fine is tax-deductible. As BuzzFlash has noted before, this rewards Wall Street financial companies by allowing them to factor in settlements with the government for illegal behavior as nothing more than the cost of doing business. Former Attorney General Eric Holder, who left office last year to resume a six-figure-salary partnership at the DC corporate law firm of Covington & Burling (which defends many of the firms that Holder was responsible for prosecuting as attorney general), infamously stated to a US Senate committee in March of 2013: I am concerned that the size of some of these institutions becomes so large that it does become difficult for us to prosecute them when we are hit with indications that if we do prosecute - if we do bring a criminal charge - it will have a negative impact on the national economy, perhaps even the world economy.  Apparently, under current Attorney General Loretta Lynch, that legal exemption for too-big-to-fail financial firms and their executives has not changed.
Paul Merrell

Wall Street's Savage Reckoning: Clouds Gather Over G-20 Summit - 0 views

  • Finance ministers and central bankers from the world’s biggest economies met in Shanghai, China over the weekend to discuss many of the problems for which they alone are responsible. Leading the list of issues, was the steady deceleration in global growth which, to great extent, is the result of experimental monetary policies central banks implemented following the recession in 2009. Surprisingly, the group admitted that their “easing strategies” had failed to produce the durable recovery that they sought, but at the same time,  they made virtually no effort to correct their mistake by making the changes necessary to shore up flagging global output.
Paul Merrell

From Paris to Boston, Terrorists Were Already Known to Authorities - 0 views

  • WHENEVER A TERRORIST ATTACK OCCURS, it never takes long for politicians to begin calling for more surveillance powers. The horrendous attacks in Paris last week, which left more than 120 people dead, are no exception to this rule. In recent days, officials in the United Kingdom and the United States have been among those arguing that more surveillance of Internet communications is necessary to prevent further atrocities. The case for expanded surveillance of communications, however, is complicated by an analysis of recent terrorist attacks. The Intercept has reviewed 10 high-profile jihadi attacks carried out in Western countries between 2013 and 2015 (see below), and in each case some or all of the perpetrators were already known to the authorities before they executed their plot. In other words, most of the terrorists involved were not ghost operatives who sprang from nowhere to commit their crimes; they were already viewed as a potential threat, yet were not subjected to sufficient scrutiny by authorities under existing counterterrorism powers. Some of those involved in last week’s Paris massacre, for instance, were already known to authorities; at least three of the men appear to have been flagged at different times as having been radicalized, but warning signs were ignored.
  • In the aftermath of a terrorist atrocity, government officials often seem to talk about surveillance as if it were some sort of panacea, a silver bullet. But what they always fail to explain is how, even with mass surveillance systems already in place in countries like France, the United States, and the United Kingdom, attacks still happen. In reality, it is only possible to watch some of the people some of the time, not all of the people all of the time. Even if you had every single person in the world under constant electronic surveillance, you would still need a human being to analyze the data and assess any threats in a timely fashion. And human resources are limited and fallible.
Paul Merrell

Mastermind of The Bamako Terror Attack Mokhtar Belmokhtar: A CIA Sponsored "Intelligence Asset"? | Global Research - Centre for Research on Globalization - 0 views

  • In response to the tragic Paris events of November 13, Central Intelligence Agency director  John Brennan  warned that “ISIL is planning additional attacks… It is clear to me that ISIL has an external agenda, that they are determined to carry out these types of attacks.” (Quoted in Daily Telegraph, November 16, 2015) Five days later following the CIA Chief’s  premonition, the Bamako Radisson Hotel Blu in Mali’s capital was the object of a terrorist attack, resulting in  21 people dead. Following the attack and the taking of hostages by the terrorists, French and Malian special forces raided the hotel. US. Africa Command (AFRICOM) also confirmed that US special forces were involved.
  • The Bamako terror operation was allegedly coordinated by Mokhtar Belmokhtar (aka Khaled Abu al-Abbas), leader of an affiliate of Al Qaeda in the Islamic Maghreb (AQIM), the Islamist al-Mulathameen (Masked) Brigade, or “Those who Sign with Blood.” Belmokhtar’s group was created in 2012 in the wake of the war on Libya. His organization has also allegedly been involved in the drug trade, smuggling as well kidnapping operations of foreigners in North Africa.  While his whereabouts are said to be known, French intelligence has dubbed Belmokhtar “the uncatchable”. In June he was reported dead  as a result in a U.S. air strike in Libya. His death was subsequently denied. Based on shaky evidence, The New York Times report below (November 20) concludes that Belmokhtar’s group (together with AQIM) is unequivocally behind the Bamako attacks:
  • A member of Al Qaeda in Africa confirmed Saturday that the attack Friday on a hotel in Bamako, Mali, had been carried out by a jihadist group loyal to Mokhtar Belmokhtar, an Algerian operative for Al Qaeda. The Qaeda member, who spoke via an online chat, said that an audio message and a similar written statement in which the group claimed responsibility for the attack were authentic. The SITE Intelligence Group, which monitors jihadist groups, also confirmed the authenticity of the statement. The Qaeda member, who refused to be named for his protection, said that Mr. Belmokhtar’s men had collaborated with the Saharan Emirate of Al Qaeda in the Islamic Maghreb, … In the audio recording, the group, known as Al Mourabitoun, says it carried out the operation in conjunction with Al Qaeda’s branch in the Islamic Maghreb. The recording was released to the Al Jazeera network and simultaneously to Al Akhbar, … The recording states: “We, in the group of the Mourabitoun [Arabic Rebel Group], in cooperation with our brothers in Al Qaeda in Islamic Maghreb, the great desert area, claim responsibility for the hostage-taking operation in the Radisson hotel in Bamako.” (emphasis added)
  • ...7 more annotations...
  • In turn, the French Minister of Defense acknowledged –prior to the conduct of a police investigation– that the authors of the attack were “most likely” led by Mokhtar Belmokhtar’s group in association with Al Qaeda in the Islamic Maghreb (AQIM). What Defense Minister Jean-Yves Le Drain failed to mention was that both Belmokhtar and AQIM have longstanding links to the CIA, which in turn has a working relationship with France’s  General Directorate for External Security, Direction générale de la sécurité extérieure (DGSE).  Casually ignored by the Western media, the leaders of Al Qaeda in the Islamic Maghreb (AQIM) including Belmokhtar were trained and recruited by the CIA in Afghanistan. Acknowledged by the Washington based Council on Foreign Relations (CFR): Most of AQIM’s major leaders are believed to have trained in Afghanistan during the 1979-1989 war against the Soviets as part of a group of North African volunteers known as “Afghan Arabs” that returned to the region and radicalized Islamist movements in the years that followed. The group is divided into “katibas” or brigades, which are clustered into different and often independent cells. The group’s top leader, or emir, since 2004 has been  Abdelmalek Droukdel, also known as Abou Mossab Abdelwadoud, a trained engineer and explosives expert who has fought in Afghanistan and has roots with the GIA in Algeria. (Council on Foreign Relations, Al Qaeda in the Islamic Maghreb, cfr.org, undated)
  • Mokhtar Belmokhtar: Post Cold War CIA intelligence asset?  The Council on Foreign Relations erroneously describes “Mokhtar Belmokhtar as the one-eyed veteran of the anti-Soviet Afghan insurgency.” (CFR, op cit, emphasis added). Belmokhtar (born in 1972) did not fight in the Soviet-Afghan war (1979-1989). He was recruited in 1991 at the age of 19 in the immediate wake of the Cold War. CIA recruitment continued in the wake of the Cold War. It was in large part directed against the Russian Federation and the former Soviet Republics as well as the Middle East. The purpose of this later CIA recruitment was to establish a network of “intelligence assets” to be used in the CIA’s post-cold war insurgencies. Leaders of the Chechen Islamist insurgencies were also trained in CIA camps in Afghanistan and Pakistan, including the notorious leader of the Chechen insurrection Ibn al-Khattab (a citizen of Saudi Arabia).
  • Following his training and recruitment and a two year stint in Afghanistan (1991-1993), Mokhtar Belmokhtar was sent back to Algeria in 1993 at age 21 where he joined the  Salafist Group for Preaching and Combat (GSPC) (emblem left). The latter was initially part of the so-called Armed Islamic Group  (Groupe islamique armé (GIA)) in Algeria which sought to overthrow the secular Algerian Government with a view to installing a theocratic Islamic State. Supported covertly by the CIA, Belmokhtar fought in Southern Algeria in the civil war opposing Islamist forces and the secular government. He was also  instrumental in the integration and merging of “jihadist” forces. In January 2007,  the Armed islamic Group (GIA) which had been prominent in the 1990s, officially changed its name to the Al-Qaeda Organization in the Islamic Maghreb (AQIM). In turn, as of 2007, the newly formed AQIM established a close relationship with the Libya Islamic Fighting Group (LIFG), which was directly supported by NATO during the 2011 war on Libya, “providing weapons, training, special forces and even aircraft to support them in the overthrow of Libya’s government.” (Tony Cartalucci, The Geopolitical Reordering of Africa: US Covert Support to Al Qaeda in Northern Mali, France “Comes to the Rescue”, Global Research, January 2013). British SAS Special Forces had also been brought into Libya prior to the onset of the insurrection, acting as military advisers to the LIFG. In fact, what has unfolded since the war on Libya is the merging of LIFG and AQIM forces. In turn, many of the LIFG operatives have been dispatched to Syria to fight within the ranks of Al Nusrah and the ISIS.
  • It is worth noting that the 2007  restructuring  of jihadist forces in Algeria and the Maghreb coincided with  the appointment of Robert Stephen Ford as US ambassador to Algeria in August 2006. Ford had been reassigned by the State Department from Baghdad to Algiers. From 2004 to 2006, he worked closely with Ambassador John Negroponte at the US embassy in Baghdad in supporting the creation of  both Shia and Sunni death squads in Iraq. This project consisted in recruiting and training terrorists modelled on the so-called “Salvador Option” which had been applied by the CIA in Central America. Negroponte as we recall played a central role in supporting the Contras terrorists in Nicaragua as ambassador to Honduras from 1981-1985. For further details see Michel Chossudovsky, “The Salvador Option For Syria”: US-NATO Sponsored Death Squads Integrate “Opposition Forces”, Global Research,  May 28, 2012) The 2006 appointment of Robert Stephen Ford to head the US Embassy in Algeria was timely. It coincided with the consolidation of jihadist groups within Algeria and the Maghreb. It preceded the 2011 US-NATO sponsored insurrections in Libya and Syria. In 2010, Ford was approved by the US Congress as US Ambassador to Syria. He presented his credentials to president Bashar al Assad in January 2011, barely two months prior to the onslaught of the terrorist insurrection in the border city of Daraa in mid-March 2011. Ford played a central role in assisting the channelling of US and allied support to Syrian “opposition” groups including Al Nusrah and the ISIS.
  • Belmokhtar’s history and involvement in Afghanistan confirms that from the very outset he was an instrument of US intelligence. While, he operates with a certain degree of independence and autonomy in relation to his intelligence sponsors, he and his organization are bona fide CIA “intelligence assets”, which can be used by the CIA as part of a covert agenda. There are various definitions of  an “intelligence asset”. From the standpoint of US intelligence, “assets” linked up to terrorist organizations must not be aware that they are supported and monitored by Western intelligence. With regard to Al Qaeda, from the outset in 1979, the CIA chose to operate through various front organizations as well as indirectly through its Saudi, Qatari and Pakistani intelligence partners. CIA’s Milton Beardman who played a central role in the Soviet Afghan war confirms that members of Al Qaeda including Osama bin Laden were not aware of the role they were playing on behalf of Washington. In the words of bin Laden (quoted by Beardman): “neither I, nor my brothers saw evidence of American help”(Michel Chossudovsky, Who is Osama bin Laden, Global Research, September 12, 2001): Motivated by nationalism and religious fervor, the Islamic warriors were unaware that they were fighting the Soviet Army on behalf of Uncle Sam. While there were contacts at the upper levels of the intelligence hierarchy, Islamic rebel leaders in theatre had no contacts with Washington or the CIA.  (Ibid) Amply documented, Al Qaeda in the Islamic Maghreb (AQIM)and its affiliated groups including the Libya Islamic Fighting Group (LIFG) was serving the interests of the Western military alliance. Confirmed by the Washington Post, June 29, 2011 (See below), France was supplying weapons to the LIFG at the height of NATO’s bombing raids.
  • AQIM in turn was receiving weapons from the LIFG, which was supported by NATO. Moreover, LIFG mercenaries had integrated AQIM brigades. According to alleged Terror Mastermind Mokhtar Belmokhtar, who also coordinated the 2013 In Amenas Mali kidnapping operation: “We have been one of the main beneficiaries of the revolutions in the Arab world. As for our benefiting from the (Libyan) weapons, this is a natural thing in these kinds of circumstances.” http://www.hanford.gov/c.cfm/oci/ci_terrorist.cfm?dossier=174 Al Qaeda in the Islamic Maghreb (AQIM) is indelibly tied into a Western intelligence agenda. While it is described  as  ”one of the region’s wealthiest, best-armed militant groups”, financed covertly by Saudi Arabia and Qatar. France’s  Canard enchaîné revealed (June 2012) that Qatar (a staunch ally of the United States) has been funding various terrorist entities in Mali: The original report cites a French military intelligence report as indicating that Qatar has provided financial support to all three of the main armed groups in northern Mali: Iyad Ag Ghali’s Ansar Ed-Dine, al-Qa’ida in the Islamic Maghreb (AQIM) and the Movement for Unity and Jihad in West Africa (MUJWA). The amount of funding given to each of the groups is not mentioned but it mentions that repeated reports from the French DGSE to the Defense Ministry have mentioned Qatar’s support for ‘terrorism’ in northern Mali. (quoted by Jeune Afrique June 2012)
  • Qatar is a proxy state, a de facto Persian Gulf territory largely controlled by Washington. It hosts  a number of Western military and intelligence facilities. The Emir of Qatar does not finance terrorism without the consent of the CIA. And with regard to Mali, the CIA coordinates its activities in liaison with its French intelligence partners and counterparts, including la Direction du renseignement militaire (DRM) and the Direction générale de la sécurité extérieure (DGSE). The implications are obvious and should be carefully understood by Western public opinion. Inasmuch as Belmokhtar and AQIM are “intelligence assets”, both US and French intelligence are (indirectly) behind the Bamako attacks. Both US and French intelligence are complicit in the State sponsorship of terrorism.
« First ‹ Previous 201 - 220 of 238 Next ›
Showing 20 items per page