Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "capabilities" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Land Destroyer: CNN: Libyan "Rebels" Are Now ISIS - 0 views

  • The United States has attempted to claim that the only way to stop the so-called "Islamic State" in Syria and Iraq is to first remove the government in Syria. Complicating this plan are developments in Libya, benefactor of NATO's last successful regime change campaign. In 2011, NATO armed, funded, and backed with a sweeping air campaign militants in Libya centered around the eastern Libyan cities of Tobruk, Derna, and Benghazi. By October 2011, NATO successfully destroyed the Libyan government, effectively handing the nation over to these militants. 
  • What ensued was a campaign of barbarism, genocide, and sectarian extremism as brutal in reality as what NATO claimed in fiction was perpetrated by the Libyan government ahead of its intervention. The so-called "rebels" NATO had backed were revealed to be terrorists led by Al Qaeda factions including the Libyan Islamic Fighting Group (LIFG) and Al-Qaeda in the Islamic Maghreb (AQIM). The so-called "pro-democracy protesters" Libyan leader Muammar Qaddafi was poised to attack in what NATO claimed was pending "genocide" were in fact heavily armed terrorists that have festered for decades in eastern Libya. Almost immediately after NATO successfully destroyed Libya's government, its terrorist proxies were mobilized to take part in NATO's next campaign against Syria. Libyan terrorists were sent first to NATO-member Turkey were they were staged, armed, trained, and equipped, before crossing the Turkish-Syrian border to take part in the fighting. 
  • CNN in an article titled, "ISIS comes to Libya," claims: The black flag of ISIS flies over government buildings. Police cars carry the group's insignia. The local football stadium is used for public executions. A town in Syria or Iraq? No. A city on the coast of the Mediterranean, in Libya.  Fighters loyal to the Islamic State in Iraq and Syria are now in complete control of the city of Derna, population of about 100,000, not far from the Egyptian border and just about 200 miles from the southern shores of the European Union.  The fighters are taking advantage of political chaos to rapidly expand their presence westwards along the coast, Libyan sources tell CNN. Only the black flag of Al Qaeda/ISIS has already long been flying over Libya - even at the height of NATO's intervention there in 2011.  ISIS didn't "come to" Libya, it was always there in the form of Al Qaeda's local franchises LIFG and AQIM - long-term, bitter enemies of the now deposed and assassinated Libyan leader Muammar Qaddafi.
  • ...7 more annotations...
  • CNN's latest article is merely the veneer finally peeling away from the alleged "revolution" it had attempted to convince readers had taken place in 2011.
  • Even amid CNN's own spin, it admits ISIS' presence in Libya is not a new phenomenon but rather the above mentioned sectarian extremists who left Libya to fight in Syria simply returning and reasserting themselves in the eastern Cyrenaica region. CNN also admits that these terrorists have existed in Libya for decades and were kept in check primarily by Libyan leader Muammar Qaddafi. With Qaddafi eliminated and all semblance of national unity destroyed by NATO's intervention in 2011, Al Qaeda has been able to not only prosper in Libya but use the decimated nation as a spingboard for invading and destroying other nations. Worst of all, Al Qaeda's rise in Libya was not merely the unintended consequence of a poorly conceived plan by NATO for military intervention, but a premeditated regional campaign to first build up then use Al Qaeda as a mercenary force to overthrow and destroy a series of nations, beginning with Libya, moving across North Africa and into nations like Egypt, Syria, Lebanon, Iraq, and eventually Iran. From there, NATO's mercenary force would be on the borders of Russia and China ready to augment already Western-backed extremists in the Caucasus and Xinjiang regions. In 2011, geopolitical analyst Dr. Webster Tarpley in his article, "The CIA’s Libya Rebels: The Same Terrorists who Killed US, NATO Troops in Iraq," noted that the US strategy was to:
  • ...use Al Qaeda to overthrow independent governments, and then either Balkanize and partition the countries in question, or else use them as kamikaze puppets against larger enemies like Russia, China, or Iran. Dr. Tarpley would also note in 2011 that: One of the fatal contradictions in the current State Department and CIA policy is that it aims at a cordial alliance with Al Qaeda killers in northeast Libya, at the very moment when the United States and NATO are mercilessly bombing the civilian northwest Pakistan in the name of a total war against Al Qaeda, and US and NATO forces are being killed by Al Qaeda guerrillas in that same Afghanistan-Pakistan theater of war. The force of this glaring contradiction causes the entire edifice of US war propaganda to collapse. The US has long since lost any basis in morality for military force.  In fact, terrorist fighters from northeast Libya may be killing US and NATO troops in Afghanistan right now, even as the US and NATO protect their home base from the Qaddafi government. Indeed, the very terrorists NATO handed the entire nation of Libya over to, are now allegedly prime targets in Syria and Iraq. The "pro-democracy rebels" of 2011 are now revealed to be "ISIS terrorists" with long-standing ties to Al Qaeda.
  • Not even mentioning the fact that Al Qaeda's very inception was to serve as a joint US-Saudi mercenary force to fight a proxy war in Afghanistan against the Soviet Union, the terrorist organization has since played a central role in the Balkans to justify NATO intervention there, and as a divisive force in Iraq during the US occupation to blunt what began as a formidable joint Sunni-Shia'a resistance movement. In 2007, it was revealed by Pulitzer Prize-winning veteran journalist Seymour Hersh that the United States, Israel, and Saudi Arabia were conspiring to use Al Qaeda once again, this time to undermine, destabilize, and destroy the governments of Syria and Iran in what would be a regional sectarian bloodbath. Hersh would report (emphasis added): To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda. 
  • Hersh would note that Iran was perceived to be the greater threat and therefore, despite a constant barrage of propaganda claiming otherwise, Al Qaeda and its various affiliates were "lesser enemies." Even in 2007, Hersh's report would predict almost verbatim the cataclysmic regional sectarian bloodbath that would take place, with the West's extremists waging war not only on Shia'a populations but also on other religious minorities including Christians. His report would note: Robert Baer, a former longtime C.I.A. agent in Lebanon, has been a severe critic of Hezbollah and has warned of its links to Iranian-sponsored terrorism. But now, he told me, “we’ve got Sunni Arabs preparing for cataclysmic conflict, and we will need somebody to protect the Christians in Lebanon. It used to be the French and the United States who would do it, and now it’s going to be Nasrallah and the Shiites.  And this is precisely what is happening, word for word, page by page - everything warned about in Hersh's report has come to pass. In 2011, geopolitical analyst Dr. Webster Tarpley and others would also reiterate the insidious regional campaign Western policymakers were carrying out with Al Qaeda terrorists disguised as "rebels," "activists," and "moderate fighters" for the purpose of arming, funding, and even militarily intervening on their behalf in attempts to effect regime change and tilt the balance in the Middle East and North Africa region against Iran, Russia, and China. CNN's attempt to explain why ISIS is "suddenly" in Libya is one of many attempts to explain the regional rise of this organization in every way possible besides in terms of the truth - that ISIS is the result of multinational state sponsored terrorism including the US, UK, EU, Turkey, Jordan, Saudi Arabia, Qatar, and Israel as its chief backers.
  • Inexplicably, amid allegedly fighting ISIS in Iraq and Syria, the United States now claims it must first overthrow the Syrian government, despite it being the only viable, secular force in the region capable of keeping ISIS and its affiliates in check. CNN, in an article titled, "Sources: Obama seeks new Syria strategy review to deal with ISIS, al-Assad," would report: President Barack Obama has asked his national security team for another review of the U.S. policy toward Syria after realizing that ISIS may not be defeated without a political transition in Syria and the removal of President Bashar al-Assad, senior U.S. officials and diplomats tell CNN. Neither CNN, nor the politicians it cited in its article were able to articulate just why removing Syrian President Bashar al-Assad from power would somehow diminish the fighting capacity of ISIS. With CNN's recent article on ISIS' gains in Libya despite US-led NATO regime change there, after decades of Libyan leader Qaddafi keeping extremists in check, it would appear that NATO is once again attempting not to stop Al Qaeda/ISIS, but rather hand them yet another country to use as a base of operations. The goal is not to stop ISIS or even effect regime change in Syria alone - but rather hand Syria over as a failed, divided state to terrorists to use as a springboard against Iran, then Russia and China.
  • Clearly, ISIS' appearance in Libya negates entirely the already incomprehensible strategy the US has proposed of needing to first depose the Syrian government, then fight ISIS. The Syrian government, like that of Libyan leader Muammar Qaddafi, is the only effective force currently fighting ISIS and Al Qaeda's many other franchises operating in the region. Deposing the government in Damascus would compound the fight against sectarian terrorists - and the West is fully aware of that. Therefore, attempts to topple the secular government in Damascus is in every way the intentional aiding and abetting of ISIS and the sharing in complicity of all the horrific daily atrocities ISIS and its affiliates are carrying out. The morally bankrupt, insidious, dangerous, and very genocidal plans hatched in 2007 and executed in earnest in 2011 illustrate that ISIS alone is not the greatest threat to global peace and stability, but also those that constitute its multinational state sponsors. The very West purportedly defending civilization is the chief protagonist destroying it worldwide.  
Paul Merrell

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDispatch - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
Paul Merrell

Exit South Stream, enter Turk Stream - RT Op-Edge - 0 views

  • So the EU “defeated” Putin by forcing him to cancel the South Stream pipeline. Thus ruled Western corporate media. Nonsense. Facts on the ground spell otherwise. This “Pipelineistan” gambit will continue to send massive geopolitical shockwaves all across Eurasia for quite some time. In a nutshell, a few years ago Russia devised Nord Stream – fully operational – and South Stream – still a project – to bypass unreliable Ukraine as a gas transit nation. Now Russia devised a new deal with Turkey to bypass the “non-constructive” (Putin’s words) approach of the European Commission (EC). Background is essential to understand the current game. Five years ago I was following in detail Pipelineistan’s ultimate opera – the war between rival pipelines South Stream and Nabucco. Nabucco eventually became road kill. South Stream may eventually resurrect, but only if the EC comes to its senses (don’t bet on it.)
  • The 3,600 kilometer long South Stream should be in place by 2016, branching out to Austria and the Balkans/Italy. Gazprom owns 50 percent of it - along with Italy’s ENI (20 percent), French EDF (15 percent) and German Wintershall, a subsidiary of BASF (15 percent). As it stands these European energy majors are not exactly beaming – to say the least. For months Gazprom and the EC were haggling about a solution. But in the end Brussels predictably succumbed to its own. Russia still gets to build a pipeline under the Black Sea – but now redirected to Turkey and, crucially, pumping the same amount of gas South Stream would. Not to mention Russia gets to build a new LNG (liquefied natural gas) central hub in the Mediterranean. Thus Gazprom has not spent $5 billion in vain (finance, engineering costs). The redirection makes total business sense. Turkey is Gazprom’s second biggest customer after Germany. And much bigger than Bulgaria, Hungary, and Austria combined. Russia also advances a unified gas distribution network capable of delivering natural gas from anywhere in Russia to any hub alongside Russia’s borders.
  • And as if it was needed, Russia gets yet another graphic proof that its real growth market in the future is Asia, especially China – not a fearful, stagnated, austerity-devastated, politically paralyzed EU. The evolving Russia-China strategic partnership implies Russia as complementary to China, excelling in major infrastructure projects from building dams to laying out pipelines. This is business with a sharp geopolitical reach – not ideology-drenched politics.
  • ...5 more annotations...
  • Turkey also made a killing. It’s not only the deal with Gazprom; Moscow will build no less than Turkey’s entire nuclear industry, apart from increased soft power interaction (more trade and tourism). Most of all, Turkey is now increasingly on the verge of becoming a full member of the Shanghai Cooperation Organization (SCO); Moscow is actively lobbying for it. This means Turkey acceding to a privileged position as a major hub simultaneously in the Eurasian Economic Belt and of course the Chinese New Silk Road(s). The EU blocks Turkey? Turkey looks east. That’s Eurasian integration on the move. Washington has tried very hard to create a New Berlin Wall from the Baltics to the Black Sea to “isolate” Russia. Now comes yet another Putin judo/chess/go counterpunch – which the opponent never saw coming. And exactly across the Black Sea. A key Turkish strategic imperative is to configure itself as the indispensable energy crossroads from East to West – transiting everything from Iraqi oil to Caspian Sea gas. Oil from Azerbaijan already transits Turkey via the Bill Clinton/Zbig Brzezinski-propelled BTC (Baku-Tblisi-Ceyhan) pipeline. Turkey would also be the crossroads if a Trans-Caspian pipeline is ever built (slim chances as it stands), pumping natural gas from Turkmenistan to Azerbaijan, then transported to Turkey and finally Europe.
  • So what Putin’s judo/chess/go counterpunch accomplished with a single move is to have stupid EU sanctions once again hurt the EU. The German economy is already hurting badly because of lost Russia business. The EC brilliant “strategy” revolves around the EU’s so-called Third Energy Package, which requires that pipelines and the natural gas flowing inside them must be owned by separate companies. The target of this package has always been Gazprom – which owns pipelines in many Central and Eastern European nations. And the target within the target has always been South Stream.
  • Now it’s up to Bulgaria and Hungary – which, by the way, have always fought the EC “strategy” – to explain the fiasco to their own populations, and to keep pressing Brussels; after all they are bound to lose a fortune, not to mention get no gas, with South Stream out of the picture. So here’s the bottom line; Russia sells even more gas – to Turkey; and the EU, pressured by the US, is reduced to dancing like a bunch of headless chickens in dark Brussels corridors wondering what hit them. The Atlanticists are back to default mode – cooking up yet more sanctions while Russia is set to keep buying more and more gold.
  • This is not the endgame – far from it. In the near future, many variables will intersect. Ankara’s game may change – but that’s far from a given. President Erdogan – the Sultan of Constantinople – has certainly identified a rival Caliph, Ibrahim of ISIS/ISIL/Daesh fame, trying to steal his mojo. Thus the Sultan may flirt with mollifying his neo-Ottoman dreams and steer Turkey back to its previously ditched “zero problems with our neighbors” foreign policy doctrine. The House of Saud is like a camel in the Arctic. The House of Saud’s lethal game in Syria always boiled down to regime change so a Saudi-sponsored oil pipeline from Syria to Turkey might be built – dethroning the proposed, $10 billion Iran-Iraq-Syria “Islamic” pipeline. Now the Saudis see Russia about to supply all of Turkey’s energy needs – and then some. And “Assad must go” still won’t go.
  • US neo-cons are also sharpening their spears. As soon as early 2015 there may be a Ukrainian Freedom Act approved by the US Congress. Translation: Ukraine as a “major US non-NATO ally” which means, in practice, a NATO annexation. Next step; more turbo-charged neo-con provocation of Russia. A possible scenario is vassal/puppies such as Romania or Bulgaria – pressed by Washington – deciding to allow full access for NATO vessels into the Black Sea. Who cares this would violate the current Black Sea agreements that affect both Russia and Turkey? And then there’s a Rumsfeldian “known unknown”; how the weak Balkans will feel subordinated to the whims of Ankara. As much as Brussels keeps Greece, Bulgaria and Serbia in a strait jacket, in energy terms they will start depending on Turkey’s goodwill. For the moment, let’s appreciate the magnitude of the geopolitical shockwaves. There will be more, when we least expect them.
Paul Merrell

SodaStream to close illegal settlement factory in response growing boycott campaign | BDSmovement.net - 0 views

  • Palestinian boycott, divestment and sanctions (BDS) activists have welcomed the news that SodaStream has announced it is to close its factory in the illegal Israeli settlement of Mishor Adumim following a high profile boycott campaign against the company. “SodaStream’s announcement today shows that the boycott, divestment and sanctions (BDS) movement is increasingly capable of holding corporate criminals to account for their participation in Israeli apartheid and colonialism,” said Rafeef Ziadah, a spokesperson for the Palestinian Boycott, Divestment and Sanctions National Committee (BNC), the broad coalition of Palestinian civil society organisations that leads and supports the BDS movement. “BDS campaign pressure has forced retailers across Europe and North America to drop SodaStream, and the company’s share price has tumbled in recent months as our movement has caused increasing reputational damage to the SodaStream brand,” she added. The news of this major success against a company famed for its role in illegal Israeli settlements broke amidst intensifying demonstrations against Israel’s policies of colonisation in Jerusalem. Grassroots boycott activism saw SodaStream dropped by major retailers across North America and Europe including Macy’s in the US and John Lewis in the UK.
  • SodaStream’s participation in Israel’s forced displacement of Palestinians gained international notoriety when A-list celebrity Scarlett Johansson signed up to be a brand ambassador for the company. Following an international campaign urging Oxfam end its relationship with Johansson for endorsing SodaStream, the actor decided to quit Oxfam. SodaStream has also come under fire for its treatment of Palestinian workers in its West Bank factory, as Ziadah explains: “Any suggestion that SodaStream is employing Palestinians in an illegal Israeli settlement on stolen Palestinian land out of the kindness of its heart is ludicrous.” “Palestinian workers are paid far less than their Israeli counterparts and SodaStream recently fired 60 Palestinians following a dispute over food for the breaking of the Ramadan fast. Workers have previously said they are treated ‘like slaves’”. “Palestinians are forced to work inside settlements in sub-standard conditions because of Israel’s deliberate destruction of the Palestinian economy. There’s an urgent need for the creation of decent and dignified jobs within the Palestinian economy.”
  • SodaStream was forced to close its flagship store in Brighton in the UK as a result of regular pickets of the store. Soros Fund Management, the family office of the billionaire investor George Soros, sold its stake in SodaStream following BDS pressure. SodaStream’s share price fell dramatically in recent months as sales dried up, particularly in North America. After reaching a high of $64 per share in October 2013, the stock fell to around $20 per share this month. SodaStream has estimated its third quarter revenue will be $125 million, down almost 14 percent from the same period last year. But Ziadah warned that SodaStream will still remain actively complicit in the displacement of Palestinians in the Naqab and will remain a focus of boycott campaigning. “Even if this announced closure goes ahead, SodaStream will remain implicated in the displacement of Palestinians. Its new Lehavim factory is close to Rahat, a planned township in the Naqab (Negev) desert, where Palestinian Bedouins are being forcefully transferred against their will. Sodastream, as a beneficiary of this plan, is complicit with this violation of human rights,” she said.
  • ...1 more annotation...
  • SodaStream have said all workers will be offered jobs at its new plant, although Israel’s apartheid wall and severe restrictions on movement will make the commute to the new plant difficult for its Palestinian workers. All of the main Palestinian trade unions have called for boycott and are members of the Palestinian BDS National Committee, the civil society coalition that leads the BDS movement and helped to initiate the campaign against SodaStream.
  •  
    The Palestine BDS Movement drew economic blood According to the NYT, SodaStream's revenues fell so far that its books needed red ink and the Israeli government chipped in $20 million to move SodaStream out of the Occupied Territories. 
Paul Merrell

http://www.ronpaulinstitute.org/archives/peace-and-prosperity/2015/january/23/foreign-troops-in-ukraine-you-bet/ - 0 views

  • US-backed president of Ukraine, Petro Poroshenko, was among the elites gathering in Davos, Switzerland this week to attend the 2015 World Economic Forum. During his speech he made the remarkable claim that 9,000 Russian troops were currently fighting in Ukraine on behalf of the independence-seeking areas of the country. These 9,000 troops have brought with them tanks, heavy artillery, and armored vehicles, he claimed. "Is this not aggression?" he asked the gathered elites.The US was quick to amplify Poroshenko's claims
  • NATO agreed with the US government assessment, adding that the movement of heavy equipment from Russia into Ukraine had increased in pace recently.There appears to be a problem, however. The 9,000 troops and heavy weapons and equipment that purportedly accompanies them have been seen by no one. There are no satellite photos of what would certainly be a plainly visible incursion. We know from incredibly detailed satellite photos of Boko Haram's recent massacre in Nigeria that producing evidence of such large scale movement is entirely within the realm of US and NATO technological capabilities. Still there remains a lack of evidence. Moreover, the Organization for Security and Cooperation in Europe, which is on the ground monitoring the border crossings between Ukraine and Russia, reported just this week that, "At the two BCPs (border crossing points) the OM (observer mission) did not observe military movement, apart from vehicles of the Russian Federation border guard service." If there has been an increase of Russian heavy weapons into Ukraine, why are the satellites in the skies and the eyes on the ground blind to them?
  • US military on the ground in Ukraine is a significant escalation, far beyond the previous deployment of additional US and NATO troops in neighboring Poland and the Baltics.Additionally, the US announced it was transferring heavy military equipment to the Ukrainian armed forces, including the Kozak mine-resistant personnel carrier and some 35 other armored trucks.The US government has reportedly set aside several million dollars to help train the Ukrainian national guard. Considering the fact that the national guard was only re-formed after last year's US-backed coup and is made up in large part of neo-Nazis from the extremist Right Sector, one would hope some of the money is spent dissuading members from such an odious ideology.So there may well be Russian troops and equipment on the ground in Ukraine -- though so far no proof exists and the Russians deny it. But we know very well that there are US troops and heavy military equipment on the ground in Ukraine because the US openly admits it! So Russia has no business claiming interest in unrest on its doorstep, but the US has every right to become militarily involved in a conflict which has nothing to do with us nearly 5,000 miles away? Interventionist illogic.
Paul Merrell

Tell Congress: My Phone Calls are My Business. Reform the NSA. | EFF Action Center - 0 views

  • The USA PATRIOT Act granted the government powerful new spying capabilities that have grown out of control—but the provision that the FBI and NSA have been using to collect the phone records of millions of innocent people expires on June 1. Tell Congress: it’s time to rethink out-of-control spying. A vote to reauthorize Section 215 is a vote against the Constitution.
  • On June 5, 2013, the Guardian published a secret court order showing that the NSA has interpreted Section 215 to mean that, with the help of the FBI, it can collect the private calling records of millions of innocent people. The government could even try to use Section 215 for bulk collection of financial records. The NSA’s defenders argue that invading our privacy is the only way to keep us safe. But the White House itself, along with the President’s Review Board has said that the government can accomplish its goals without bulk telephone records collection. And the Privacy and Civil Liberties Oversight Board said, “We have not identified a single instance involving a threat to the United States in which [bulk collection under Section 215 of the PATRIOT Act] made a concrete difference in the outcome of a counterterrorism investigation.” Since June of 2013, we’ve continued to learn more about how out of control the NSA is. But what has not happened since June is legislative reform of the NSA. There have been myriad bipartisan proposals in Congress—some authentic and some not—but lawmakers didn’t pass anything. We need comprehensive reform that addresses all the ways the NSA has overstepped its authority and provides the NSA with appropriate and constitutional tools to keep America safe. In the meantime, tell Congress to take a stand. A vote against reauthorization of Section 215 is a vote for the Constitution.
  •  
    EFF has launched an email campagin to press members of Congress not to renew sectiion 215 of the Patriot Act when it expires on June 1, 2015.   Sectjon 215 authorizes FBI officials to "make an application for an order requiring the production of *any tangible things* (including books, records, papers, documents, and other items) for an investigation to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities, provided that such investigation of a United States person is not conducted solely upon the basis of activities protected by the first amendment to the Constitution." http://www.law.cornell.edu/uscode/text/50/1861 The section has been abused to obtain bulk collecdtion of all telephone records for the NSA's storage and processing.But the section goes farther and lists as specific examples of records that can be obtained under section 215's authority, "library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records."  Think of the NSA's voracious appetite for new "haystacks" it can store  and search in its gigantic new data center in Utah. Then ask yourself, "do I want the NSA to obtain all of my personal data, store it, and search it at will?" If your anser is "no," you might consider visiting this page to send your Congress critters an email urging them to vote against renewal of section 215 and to vote for other NSA reforms listed in the EFF sample email text. Please do not procrastinate. Do it now, before you forget. Every voice counts. 
Paul Merrell

Canada Casts Global Surveillance Dragnet Over File Downloads - The Intercept - 0 views

  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
  • The latest disclosure sheds light on Canada’s broad existing surveillance capabilities at a time when the country’s government is pushing for a further expansion of security powers following attacks in Ottawa and Quebec last year. Ron Deibert, director of University of Toronto-based Internet security think tank Citizen Lab, said LEVITATION illustrates the “giant X-ray machine over all our digital lives.” “Every single thing that you do – in this case uploading/downloading files to these sites – that act is being archived, collected and analyzed,” Deibert said, after reviewing documents about the online spying operation for CBC News. David Christopher, a spokesman for Vancouver-based open Internet advocacy group OpenMedia.ca, said the surveillance showed “robust action” was needed to rein in the Canadian agency’s operations.
  • In a top-secret PowerPoint presentation, dated from mid-2012, an analyst from the agency jokes about how, while hunting for extremists, the LEVITATION system gets clogged with information on innocuous downloads of the musical TV series Glee. CSE finds some 350 “interesting” downloads each month, the presentation notes, a number that amounts to less than 0.0001 per cent of the total collected data. The agency stores details about downloads and uploads to and from 102 different popular file-sharing websites, according to the 2012 document, which describes the collected records as “free file upload,” or FFU, “events.” Only three of the websites are named: RapidShare, SendSpace, and the now defunct MegaUpload.
  • ...3 more annotations...
  • “The specific uses that they talk about in this [counter-terrorism] context may not be the problem, but it’s what else they can do,” said Tamir Israel, a lawyer with the University of Ottawa’s Canadian Internet Policy and Public Interest Clinic. Picking which downloads to monitor is essentially “completely at the discretion of CSE,” Israel added. The file-sharing surveillance also raises questions about the number of Canadians whose downloading habits could have been swept up as part of LEVITATION’s dragnet. By law, CSE isn’t allowed to target Canadians. In the LEVITATION presentation, however, two Canadian IP addresses that trace back to a web server in Montreal appear on a list of suspicious downloads found across the world. The same list includes downloads that CSE monitored in closely allied countries, including the United Kingdom, United States, Spain, Brazil, Germany and Portugal. It is unclear from the document whether LEVITATION has ever prevented any terrorist attacks. The agency cites only two successes of the program in the 2012 presentation: the discovery of a hostage video through a previously unknown target, and an uploaded document that contained the hostage strategy of a terrorist organization. The hostage in the discovered video was ultimately killed, according to public reports.
  • LEVITATION does not rely on cooperation from any of the file-sharing companies. A separate secret CSE operation codenamed ATOMIC BANJO obtains the data directly from internet cables that it has tapped into, and the agency then sifts out the unique IP address of each computer that downloaded files from the targeted websites. The IP addresses are valuable pieces of information to CSE’s analysts, helping to identify people whose downloads have been flagged as suspicious. The analysts use the IP addresses as a kind of search term, entering them into other surveillance databases that they have access to, such as the vast repositories of intercepted Internet data shared with the Canadian agency by the NSA and its British counterpart Government Communications Headquarters. If successful, the searches will return a list of results showing other websites visited by the people downloading the files – in some cases revealing associations with Facebook or Google accounts. In turn, these accounts may reveal the names and the locations of individual downloaders, opening the door for further surveillance of their activities.
  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
Paul Merrell

Details Of Assassination Plot On Occupy Movement Leaders Withheld From Public At FBI's Behest - 0 views

  • The FBI was right to withhold records about an alleged murder plot targeting the leaders of Occupy Houston, to protect its informants, a federal judge ruled. Plaintiff Ryan Noah Shapiro is a doctoral student at the Massachusetts Institute of Technology. His research includes “the policing of dissent … especially in the name of national security” and “examining FBI and other intelligence agency efforts to preserve domestic surveillance capabilities while simultaneously subverting the Freedom of Information Act,” according to his MIT profile. Shapiro sent the FBI three Freedom of Information Act requests in early 2013, asking for records about “a potential plan to gather intelligence against the leaders of [Occupy Wall Street-related protests in Houston] and obtain photographs, then formulate a plan to kill the leadership [of the protests] via suppressed sniper rifles.” Shapiro told Courthouse News he learned of the alleged plot from FBI documents obtained by investigative reporter Jason Leopold.
  • The FBI had refused to give Shapiro any documents until he filed an April 2013 federal complaint in Washington, D.C., after which the agency gave him 17 pages. U.S. District Judge Rosemary Collyer found last year that the FBI had properly withheld some records, but took issue with its use of Exemption 7 under the FOIA, which protects from disclosure “records or information compiled for law enforcement purposes.” Collyer dismissed the lawsuit this week after reviewing the documents in her chambers. Shapiro challenged the FBI’s withholding of the names of its murder plot sources, claiming there is no privacy expectation for people who could be called to testify as trial witnesses. But Collyer found Monday that the FBI correctly invoked FOIA exemption 7(c), which shields law enforcement records from disclosure if they could constitute an invasion of personal privacy. The judge also agreed with the FBI that exemption 7(d) applied to the case. It allows records to be withheld if they “could reasonably be expected to disclose the identity of a confidential source.”
  • Citing a declaration from FBI agent David Hardy that said the confidential sources are “individuals who are members of organized violent groups,” Collyer said the likelihood of retaliation justified keeping the sources’ identities under wraps. Shapiro vowed to keep fighting for the records. “I’m of course disappointed in, and disagree with, the judge’s ruling. I’m now conferring with my attorney to determine next steps,” Shapiro said in an email. He said he is concerned that the FBI collected dossiers on Occupy protestors while publicly denying it. “The FBI even flatly asserted in a separate FOIA lawsuit of mine that, ‘(T)he FBI determined that it had never opened an investigation on the Occupy movement,'” Shapiro wrote. “Yet, in the course of my FOIA lawsuit against the FBI for records about the sniper plot against Occupy Houston, the FBI contradicted its own position.” Shapiro said that with recently released FBI documents about Occupy Chicago, “We are coming ever closer to finally forcing the FBI to concede it actually possesses a large volume of documents about this FBI-coordinated nationwide investigation of political protesters as supposed terroristic threats to national security.”
Paul Merrell

Leaks Damaged U.S. Intelligence, Official Says - 0 views

  • Unauthorized disclosures of classified information by Edward Snowden have damaged U.S. intelligence capabilities, National Counterterrorism Center director Nicholas J. Rasmussen told Congress last week. “Due to the Snowden leaks and other disclosures, terrorists also have a great understanding of how we seek to conduct surveillance including our methods, our tactics and the scope and scale of our efforts. They’ve altered the ways in which they communicate and this has led to a decrease in collection,” Mr. Rasmussen said at a February 12 hearing of the Senate Select Committee on Intelligence. “We have specific examples which I believe we have shared with the committee and the committee staff in classified session — specific examples of terrorists who have adopted greater security measures such as using various new types of encryption, terrorists who have dropped or changed email addresses, and terrorists who have simply stopped communicating in ways they had before, in part because they understand how we collected,” he said. This is not terribly persuasive, particularly since Mr. Rasmussen did not specify which leaks resulted in which changes by which terrorists at what cost to U.S. security. Nor is a public statement by an intelligence official before the Senate Intelligence Committee entitled any longer to a presumption of accuracy since the Committee permits errors to stand uncorrected.
Paul Merrell

Britain and Canada Involved in Foiled US Venezuelan Coup Plot | Global Research - 0 views

  • Britain and Canada were co-conspirators in the latest plot to topple Venezuela’s government. TeleSUR provided detailed coverage of Washington’s war on Venezuelan democracy. Its dirty hands manipulate violence and instability worldwide. US funded and supported key opposition fascist figures Antonio Ledezma, Maria Corina Machado and Leopoldo Lopez released a joint February 11 communique a day before the foiled coup. Titled “A Call on Venezuelans for a National Accord for the Transition,” it promoted regime change. Called for Venezuela to be handed back to monied interests. Called Bolivarian fairness “anti-democra(tic)…inefficient and… corrupt.” Run by “an unscrupulous elite (making) the State totalitarian.” Creating “a humanitarian crisis.” “(T)he Maduro government has entered a terminal phase.” Claimed it’s “the duty of every democrat to help resolve the current crisis, to defend freedom…to make the transition…(to restore) democratic order.”
  • Ledezma, Marhado and Lopez want Maduro’s government violently overthrown, democracy crushed. Washington, Britain and Canada hatched the latest plot to return Venezuela to its bad old days. TeleSUR reported new details. “Fresh evidence” showing their involvement, saying: “Many of the individuals being charged, included a military general – whom has confessed to participating in the plans – and a retired lieutenant colonel – have indicated you (fascist Justice Party president Julio Borges) as being a key participant in meetings, which resulted in the decision to carry out a series of bombing attacks as a part of the coup, targeting the Presidential Palace, the National Assembly,” key ministries, TeleSUR’s offices, and other Caracas sites. Venezuelan authorities identified US embassy personnel involved. So were a Royal Canadian Mounted Police official and UK diplomatic core member, according to National Assembly President Diosdado Cabello. They sought information on airport capabilities in case needed in an emergency.
  • Computers seized had detailed coup plans, including maps showing targets to be bombed. A video showed military officials announcing Maduro’s government no longer was recognized. It was scheduled to be aired after planned bombings were launched. Either by a Venezuelan or Miami TV station. Cabello showed a 10-year visa given to one of the plotters days ahead of the planned coup. He noted Obama’s recent statement about “American leadership at times entail(ing) twisting the arms of states which don’t do what we need them to do.” He said coup plotters planned to topple Venezuela’s government forcefully on the anniversary of US-manipulated 2014 street violence. Killing 43. Injuring hundreds. Causing billions of dollars in physical and economic damage. US planned, funded, implemented and directed economic, political, and street warfare continues to topple the hemisphere’s most vibrant democracy. On Saturday, Maduro addressed Venezuelans a second time on national television. Following up on his Thursday coup plot revelations.
  • ...3 more annotations...
  • Explaining more details of Washington’s scheme to oust him forcefully. “Almost all (opposition) leaders knew about this plan, this ambush, almost all of them, including the four-time losing candidate,” Maduro explained. Referring to Henrique Capriles Radonski. One of many Venezuelan fascists wanting power back the old-fashioned way. “I’m not saying all of them were actively involved,” Maduro said. “But it was a rumor circulating amongst them, that something was about to happen. Figures arrested confessed to the plot, Maduro explained. They provided more evidence of Washington’s scheme. It involved enlisting Venezuelan political and military officials. Bribing them with large cash payments. America’s Caracas embassy was coup plot headquarters. Maduro called on Obama to stop interfering in Venezuelan affairs, saying: “In your name, they are organizing coup plots against (Venezuela’s) democratically elected government…” Bolivian President Evo Morales expressed solidarity with Maduro saying “(w)e all have the obligation to enforce respect for democracy and elections, and if we have a clear conscious, not even the empire can defeat us.”
  • Maduro received numerous other messages of support. Nicaraguan President Daniel Ortega condemned the “criminal and futile attempts of the empire to undermine the Bolivarian Revolution.” From Mexico City, the Network of Intellectuals, Artists and Social Movements in Defense of Humanity expressed solidarity in an official statement. It condemned plans to topple Venezuela’s government. TeleSUR reported civil and political organizations worldwide expressing solidarity with Venezuela. Union of South American Nations (UNASUR) Secretary General Ernesto Samper denounced plans to oust Maduro. Venezuelan opposition spokesman Jesus Torrealba lied saying “(t)he government makes up these stories about coups to avoid talking about how the country is breaking down.”
  • State Department spokeswoman Jen Psaki lied calling accusations about Washington plotting Maduro’s ouster “ridiculous.” She absurdly added: “(T)he United States does not support political transitions by non-constitutional means.” “Political transitions must be democratic, constitutional, peaceful, and legal.” “We have seen many times that the Venezuelan Government tries to distract from its own actions by blaming the United States or other members of the international community for events inside Venezuela. These efforts reflect a lack of seriousness on the part of the Venezuelan Government to deal with the grave situation it faces.”
Paul Merrell

Leaked cables show Netanyahu's Iran bomb claim contradicted by Mossad | World news | The Guardian - 0 views

  • Read the leaked document here
  • Binyamin Netanyahu’s dramatic declaration to world leaders in 2012 that Iran was about a year away from making a nuclear bomb was contradicted by his own secret service, according to a top-secret Mossad document. It is part of a cache of hundreds of dossiers, files and cables from the world’s major intelligence services – one of the biggest spy leaks in recent times
  • But in a secret report shared with South Africa a few weeks later, Israel’s intelligence agency concluded that Iran was “not performing the activity necessary to produce weapons”. The report highlights the gulf between the public claims and rhetoric of top Israeli politicians and the assessments of Israel’s military and intelligence establishment.
  • ...2 more annotations...
  • The disclosure comes as tensions between Israel and its staunchest ally, the US, have dramatically increased ahead of Netanyahu’s planned address to the US Congress on 3 March. The White House fears the Israeli leader’s anticipated inflammatory rhetoric could damage sensitive negotiations between Tehran and the world’s six big powers over Iran’s nuclear programme. The deadline to agree on a framework is in late March, with the final settlement to come on 30 June. Netanyahu has vowed to block an agreement he claims would give Iran access to a nuclear weapons capability.
  • The Mossad briefing about Iran’s nuclear programme in 2012 was in stark contrast to the alarmist tone set by Netanyahu, who has long presented the Iranian nuclear programme as an existential threat to Israel and a huge risk to world security. The Israeli prime minister told the UN: “By next spring, at most by next summer, at current enrichment rates, they will have finished the medium enrichment and move[d] on to the final stage. From there, it’s only a few months, possibly a few weeks before they get enough enriched uranium for the first bomb.”
Paul Merrell

China says wants closer military ties with Iran | Reuters - 0 views

  • China wants to have closer military ties with Iran, the Chinese defense minister told the visiting head of the Iranian navy on Thursday, state media reported, reaffirming diplomatic links despite controversy over Iran's nuclear plans.
  • Naval cooperation between Iran and China is aimed at reinforcing Iran's military capability in the Gulf, analysts say, as well as displaying China's plan to exert greater influence and presence beyond East Asia.“The (port) call reflects China’s military-to-military relationship with Iran," said Christian Le Mière, a naval expert at the International Institute for Strategic Studies think-tank."It is the most explicit sign of Beijing’s acknowledgment of this relationship, which has remained relatively covert until now."
  • China's People's Liberation Army Daily separately reported that Sayyari had been given tours of a Chinese submarine and warships, where he "listened to an introduction on equipment ability and weapons systems".Sayyari said he hoped Iran and China could cooperate on anti-piracy operations, the newspaper said.China is Iran's top oil buyer and has been the most aggressive in raising its crude purchases after an easing of the Western sanctions aimed at ending Tehran's disputed nuclear program.
  • ...1 more annotation...
  • China, a participant at the nuclear talks with Iran, has consistently urged a negotiated solution and decried efforts to place sanctions which have not been endorsed by the United Nations on Iran.
Paul Merrell

Islamic State militants allegedly used chlorine gas against Iraqi security forces - The Washington Post - 0 views

  • Dizzy, vomiting and struggling to breathe, 11 Iraqi police officers were rushed to a government hospital 50 miles north of the capital last month. The diagnosis: poisoning by chlorine gas. The perpetrators, according to the officers: Islamic State extremists. The chlorine attack appears to be the first confirmed use of chemical weapons by the Islamic State on the battlefield. An Iraqi Defense Ministry official corroborated the events, and doctors said survivors’ symptoms were consistent with chlorine poisoning. Iraqi forces say two other crude chlorine attacks have occurred since the extremists seized vast tracts of Iraqi territory this summer, but details on those incidents remain sketchy. The reported assaults all raise concerns that the militants are attempting to hone their chemical weapons capabilities as they push to control more ground
  • Chlorine, a common component in industry, is sold legally, but its use as a weapon violates the Chemical Weapons Convention. It was widely employed in trench warfare during World War I, including infamously at Ypres in Belgium, where German forces dispersed more than 160 tons of chlorine into the breeze, killing thousands of French and Allied soldiers.
  • One physician on the team, Hassanain Mohammed, had treated similar cases­ before. In 2006 and 2007, al-Qaeda in Iraq, a group that later morphed into the Islamic State, carried out a string of chlorine bombings in the country.
  • ...3 more annotations...
  • An Iraqi Defense Ministry official confirmed this week that a bomb rigged with chlorine canisters was used in the Duluiyah attack. “They use it just to create terror,” said the official, who spoke on the condition of anonymity because he was not authorized to provide the information publicly. “But of course we are very concerned.” In a statement, the Defense Ministry confirmed that the Islamic State has used the gas in a “primitive and ineffective way” near water-treatment plants where it has gained access to chlorine, as well as in roadside bomb attacks. It did not specify the locations of the attacks, but there are several water plants near Duluiyah on territory controlled by the Islamic State.
  • Chlorine bombs are an easy-to-create but inexact weapon, experts say. All that is needed is a small explosive charge to rupture containers filled with the substance. “It’s difficult to deliver on target in combat situations,” said Jean Pascal Zanders, an independent researcher who specializes in chemical and biological weapons and disarmament. “Chlorine dissipates fast unless someone is able to concentrate it in a confined area.” Fighters in Duluiyah say it was not the only time chlorine has been used against them. Another attack this month caused minor injuries, and the fighters were treated locally, police officials said.
  • Soldiers who escaped an Islamic State rout of a besieged army base in Saqlawiyah, where hundreds of soldiers were killed last month, also said chlorine gas was used there — though reports of where and how the gas was delivered varied and could not be confirmed. While some officers said they believed artillery- or mortar-launched canisters fired by the attackers fell short of the base, others, who claimed to have remained in the installation for a longer period, said the canisters fell within its perimeter. Another claimed that the militants detonated chlorine-filled containers.
Paul Merrell

As U.S. attacks Islamic State, Syria steps up assaults on moderate rebels - The Washington Post - 0 views

  • Syrian government forces have dramatically intensified air and ground assaults on areas held by moderate rebels, attempting to deliver crippling blows as world attention shifts to airstrikes by a U.S.-led coalition against Islamic State militants in Iraq and Syria.
  • Rebels in Aleppo say President Bashar al-Assad’s military has escalated attacks in northern areas of the city, trying to cut the supply lines of opposition fighters inside Aleppo. “During the last three days, we have been hit by over 120 barrel bombs,” said Ahmed Abu Talal, a rebel belonging to the Islamic Front group, referring to particularly deadly high-explosive bombs that are often dropped by helicopter. Syria’s military has virtually encircled the city with the help of Shiite militias from Lebanon and Iran, the Assad regime’s chief ally.
  • Rebels and analysts say Assad’s forces are increasing their attacks to exploit what the regime sees as a window of opportunity opened by a campaign that Washington and its allies launched last month against the Islamic State, a heavily armed al-Qaeda offshoot that is also known as ISIS or ISIL.
  • ...3 more annotations...
  • Abu Talal said pro-government forces are trying to take the village of Handarat, which is located just north of Aleppo and next to one of the last roads connecting the city’s rebels with reinforcements and food brought in from the Turkish border. The fall of that road would constitute a major blow to Assad’s opposition in a three-year-old civil war that has killed nearly 200,000 people.
  • The regime has stepped up aerial bombardment of the rebel-held suburbs of eastern Damascus, as well as in areas near the city of Idlib. Government helicopters have dropped some 45 barrel bombs in recent days in the countryside near Idlib to halt rebel movements near two military bases on a strategic road connecting Aleppo with Hama, to the south, said Abdullah Jabaan, a resident of Idlib and journalist for the Syria Live News Network, which supports the opposition.
  • Meanwhile, Assad’s military has largely avoided territory held by Islamic State militants, instead striking moderate rebel factions that could be slated to receive weapons and military training from the coalition, said Riad Kahwaji, chief executive of the Dubai-based Institute for Near East and Gulf Military Analysis. “If the regime manages to fully besiege Aleppo at this time, they would block and undermine the plans of the alliance to use the opposition, or at least present the opposition, as the ultimate ground force to deal with ISIS,” he said. A successful routing of those rebels could position the Assad regime as the only force in Syria capable of fighting the Islamic State, he said.
  •  
    I take this article more as an indication of what the current line of pro-war propaganda is in the U.S. than an indication of what is really happening in Syria. Bear in mind that there is no moderate opposition to the Syrian government and all sources for this article are opposition spokesmen and the "Syrian Observatory for Human Rights" in the UK, a one-man show that functions as a U.S. government propaganda mouthpiece.     
Paul Merrell

Air Force Right to Fire General Who Threatened Troops with Treason - 0 views

  • The Air Force’s decision to remove Major General James Post from his position as vice commander of Air Combat Command was the right move. As we said in our February 5 letter to the Air Force Secretary, Major General Post had to be held accountable. When he told service members it would be “treason” to communicate with Congress about the A-10’s capabilities it showed he was unfit for command. Members of the military have a constitutional right to communicate with Congress. To threaten them with an offense as serious as treason goes against the very oath that all military personnel and Major General Post, himself, had to take. We look forward to an investigation into the retaliation against those who brought Major General Post's remarks to light. Read POGO’s letter to the Air Force Secretary. Read the Air Force Inspector General’s investigation into Major General Post
  • The Air Force’s decision to remove Major General James Post
Paul Merrell

The Money Trail: How the US Fostered Yemen's Separatist Movement / Sputnik International - 0 views

  • As Saudi Arabia and its allies have begun the bombing campaign against Yemen, in the south, a separatist movement calling for a "State of South Arabia" is emerging. Fostered by the US, it will leave the Houthis with two hostile states at their borders and locked access to the sea, if it succeeds.
  • Welcome to phase two of US regime change operations. After Yemen's 2011 revolution failed and Houthi militias overthrew President Hadi, forces trained and sponsored by the US government are being activated as a separatist movement. The Southern People's Committees (SPC), founded around 2007 although USAID has been conducting political workshops as part of a $695,000 project and actively grooming leadership in Yemen since 2005. (Also in 2007, weekly protests began, organized by women's organizations, fostered by the workshops.) The SPC were similar to many color revolution movements such as Serbia's Otpor in that they did not have a central leadership, but rather an autonomous cell-based organization. In addition, they were very capable in the use of social media technologies, text messaging and the circumventing the government's internet censorship to organize protests.
  • Meanwhile, the Yemen Center for Human Rights Studies, which received $193,000 from the EU and US-funded Foundation for the Future in 2009, conducted a poll in January 2010, which found that 70 percent of southern Yemenis favored secession. Another USAID-funded project, the $43 million Responsive Governance Project (RGP), launched in May 2010, conducted "New Social Media training for Youth leaders to equip Yemeni youth groups in the use of media to enhance their participation in formulating public issues." The project focuses on establishing contacts with the Yemeni government and providing "leadership and civic education training to youth NGOs."
  • ...5 more annotations...
  • At the same time, USAID funded a $3.58 million project called Promoting Youth for Civic Engagement (PYCE) to train Aden youth " in PACA [political activity training], first aid, self-defense, photography, calligraphy and various other topics," including "media skills," according to an evaluation report of the PYCE Project, conducted in 2012. The project was constrained to Aden and did not conduct workshops in the northern capital, Sanaa, after reportedly receiving threats.
  • The project is presented as a youth "sports program," and although it does include basketball, handball and chess, these were not the primary goal, as the report shows. At the same time, first aid, self-defense, photography and calligraphy (making protest signs) sound a lot more like protest tactics than sports. The program, initially planned to last for two years, did not make any progress reports after March 2012, when President Hadi assumed power. After the 2011 revolution, the SPC became more of a military outfit and took part in a fight against al-Qaeda in Yemen, which coincided with the CIA's expanded drone campaign in the area. This is also where the organization fades from public view when it comes to USAID expense reports, as the organization appeared to lose interest in developing democracy in the country. In a June 4, 2012 a field commander of the People's Committees gave an interview to the Yemen Times, in which he described the group's fight against the Ansar al-Sharia Islamists together with the government.
  • However, the group reappeared in public view on September 23 2014, two days after Houthis took control of Sanaa, and issued a statement in which they call on security forces to "undertake its historical role in providing security and maintaining people's property because it is in order to preserve the revolution, which is the most important accomplishment achieved by the Yemeni people." At the same time, in southern Yemen, the People's Committee has been very active on Facebook and Twitter since around October 2014. The Facebook and Twitter pages publish slick anti-Houthi propaganda and call for separatism and a "State of South Arabia," within the bounds of former South Yemen, and using South Yemen's flag
  • Since mid-March, the SPC have been fighting against Houthis and see Saudi Arabia as an ally of convenience, although some of their social media accounts, Saudi Arabia's King Salman and other royal family figures are glorified. However, the splitting of Yemen benefits Saudi Arabia, as it secludes the Houthis to a smaller Northern Yemen, which would be surrounded by two hostile states, with Saudi Arabia to the north and the new South Arabia to the south, which would also control access to the sea at the Gulf of Aden. The current situation has considerable parallels with Ukraine, which has led the Russian Foreign Minister Sergei Lavrov to call the situation one of "obvious double standards, but we clearly did not want neither what is happening in Ukraine, nor what is happening in Yemen."
  • Indeed, while Russia has been repeatedly accused of helping Donbas independence supporters, the US has openly fostered the south Yemen separatist movement. At the same time, while Ukraine's President Yanukovych was called illegitimate by the US after fleeing the country, Yemen's Hadi has remained "legitimate" and has even called for a Saudi Arabian military operation against the people who ousted him. The ongoing conflict in Yemen is currently at the second phase of US regime change operations, rebel conflict. The first stage, the color revolution, has failed, and now the last stop, foreign intervention and ground invasion remains. Saudi Arabia and its Gulf allies have already begun the airstrikes, and the South Arabia movement has begun its separatist campaign.
  •  
    Looks like Obama's drone attacks in Yemen were not enough to do the job.
  •  
    Turns out that the U.S. has been covertly rocking Yemen heavily at least since the Clinton Administration, including naval bombardment, drone strikes, cruise missiles, et cet.: Ongoing detailed compilations of U.S. covert and military actions in Yemen. (Publication dates are for first entry in compilations.) Methodology: http://www.thebureauinvestigates.com/2011/08/10/pakistan-drone-strikes-the-methodology2/ Drones Team, Yemen: reported US covert actions 2001-2011, The Bureau of Investigative Journalism (29 March 2012), http://www.thebureauinvestigates.com/2012/03/29/yemen-reported-us-covert-actions-since-2001/ (includes data through 2014). Jack Serle, Yemen: Reported US covert actions 2015, The Bureau of Investigative Journalism (26 January 2015),http://www.thebureauinvestigates.com/2015/01/26/yemen-reported-us-covert-actions-2015/
Gary Edwards

Rumsfeldt's Missing Trillions, Stavridis and Unconventional War | nsnbc international - 0 views

  • One of these survivors is April Gallop. April Gallop would testify under oath in a two-hour-long, video-taped interview with Barbara Honegger who has conducted an in-depth investigation into the events at the Pentagon on September 11. April Gallop would state that a violent explosion near her desk in Wedge Two on Corridor Five, more than 100 ft north from the official narratives’ alleged plane impact point stopped her watch at 9:30.
  • Gallop would state the she saw fires coming out of computers. Barbara Honegger reports that other eyewitnesses, including Tracy Webb experienced such computer fires at the E Ring of Corridor Four.
  • The alleged plane impact happened at least eight minutes after massive explosions inside the Pentagon.
  • ...5 more annotations...
  • Another clock from the Pentagon that is kept at the Smithsonian as well as photographic evidence prove that other clocks stopped due to explosions before the alleged plane impact. Barbara Honegger’s research would show that “something” struck the Pentagon from the outside too. That object, however, was not a jetliner and struck some 150 meters from the alleged jetliner impact site.
  • Donald Rumsfeldt’s war on waste would turn into the Global War on Terror and lead to the invasions of Afghanistan and Iraq. Information about the missing 2.3 trillion dollar was destroyed on September 11.
  • The document states that the United States, for the foreseeable future, would primarily be engaged in unconventional warfare. The document contains a structured approach to the subversion of targeted nation States, beginning with an assessment of a feasible and cooperative opposition, the creation of events to polarize society, the establishment of armed groups and their development into a fighting force that is capable of fighting a civil war or unconventional war under U.S. supervision to achieve U.S. foreign policy goals.
  • The TC 18-01 contains a de-facto blueprint for the United States’ and NATO’s involvement in Libya and Syria under the command of NATO SACEUR Stavridis. The TC 18-01 also represents a precise blueprint of the ongoing war in Iraq and the “crisis” in Ukraine.
  • Arguably, 2.3 trillion dollar are a seizable start-up budget for wars which have to be waged “off the books”.
  •  
    "September 10, 2001. U.S. Secretary of Defense Donald Rumsfeldt stated that 2.3 trillion dollar from the Pentagon's annual budget could not be accounted for. September 11, 2001, the Pentagon's accounting office and the Naval Command Center were targeted, allegedly by a plane. Survivors would report about explosions inside the Pentagon prior to the alleged plane impact. During a 2012 Forestall Lecture , Admiral James G. Stavridis noted that he was working as a newly selected 1-star accounting officer at the Pentagon and that he was lucky to have survived. By 2009 Stavridis would have been promoted to the rank of Admiral and NATO's Supreme Allied Commander Europe. Responsible for NATO's 2011 military operations in Libya, Stavridis would describe NATO's intervention in Libya as "a teachable moment and model for future interventions". "
Paul Merrell

US manoeuvre in South China Sea leaves little wiggle room with China | World news | The Guardian - 0 views

  • Barack Obama’s decision to send a US guided missile destroyer into disputed waters off the Spratly islands in the South China Sea on Tuesday has provoked predictable outpourings of rage and veiled threats from Beijing – but nothing, yet, in the way of a military response. The worry now is that the confrontation will catch fire, escalate and spread. Both China, which claims the Spratlys as its own, and the US, which does not recognise Beijing’s sovereignty, have boxed themselves into a rhetorical and tactical corner. With the Pentagon insisting it will repeat and extend such naval patrols at will, and with the People’s Liberation Army Navy determined to stop them, it is feared a head-on collision cannot be far away. China’s heated response to Tuesday’s manoeuvre by the USS Lassen off the Spratlys’ Mischief and Subi reefs, where Beijing is controversially building military airstrips and lighthouses on reclaimed land, left it little wiggle room. The American warship had been tracked and warned off, officials said, adding that what it termed an illegal incursion was a “threat to national sovereignty” and a deliberate provocation that could backfire.
  • Anticipating the US move earlier this month, foreign ministry spokeswoman Hua Chunying said: “China will never allow any country to violate China’s territorial waters and airspace in the South China Sea.” If ever a government has publicly laid down a red line, this is it. And Obama just crossed it. Having personally failed to find a compromise in White House talks with Xi Jinping, China’s president, last month, Obama has upped the ante. As is also the case with Xi, it is now all but impossible to envisage an American climbdown without enormous loss of face and prestige. By deploying a powerful warship, by declining to inform China in advance, and by insisting the US is upholding the universal principle of free navigation in international waters and will do so again whenever and wherever it wishes, Obama has deliberately challenged Beijing to do its worst.
  • China is in dispute over other South China Sea islands and reefs with several countries that are all more or less at one with the US on the issue, including the Philippines, Vietnam and Malaysia. Renewed trouble could flare up in any of these places. One possibility is the Scarborough Shoal, claimed by Manila, where clashes have continued on and off since 2012. Another obvious pressure point is the Senkaku islands (Diaoyu in Chinese) in the East China Sea, claimed by both Japan and China. In 2013 Beijing upped the ante, unilaterally declaring an air exclusion, or identification, zone in the area, which the US promptly breached with B52 bombers. This dispute forms part of the background to the military buildup ordered by Japan’s hawkish prime minister, Shinzo Abe, who set a record £27bn defence budget this year. (China’s military budget is roughly £90bn; that of the US is about £378bn).
  • ...3 more annotations...
  • Chinese retaliation, when it comes, and it surely must, may not centre specifically on the Spratlys. There are plenty of other potential troublespots and flashpoints where Beijing might seek to give the Americans pause. In prospect is a sort of geopolitical chain reaction. A spokesman, Lu Kang, hinted at this on Tuesday: “China hopes to use peaceful means to resolve all the disputes, but if China has to make a response then the timing, method and tempo of the response will be made in accordance with China’s wishes and needs.”
  • Reacting to the perceived China threat, Abe is extending Okinawa’s defences and getting involved in South China Sea patrols in support of Washington. Japan also strengthened defence and security ties with Britain – a development that now makes David Cameron’s courtship of Beijing seem all the more incongruous. Taiwan is another powder keg that could be ignited by widening US-China confrontation. While Beijing regards Taiwan as a renegade province and seeks its return, the present-day status quo is underwritten by US military might.
  • US-China naval and aerial rivalry could expand even further afield. China is busy building a blue water fleet (a maritime force capable of operating across the deep waters of open oceans) including aircraft carriers, with the aim of challenging US dominance in the eastern Pacific. Chinese naval ships recently showed up off the Aleutian islands during an Obama visit to Alaska, the mineral-rich Arctic being another possible theatre. Meanwhile, regional western allies such as Australia have serious cause for concern that escalating superpower friction could draw them in.
  •  
    The latest Obama idiocy.
Paul Merrell

Top US and Saudi Officials responsible for Chemical Weapons in Syria | nsnbc international - 0 views

  • On 21 August 2013, the Syrian Arab Army launched a major military campaign in Damascus. The campaign, called “Operation Shield of the Capital”, was the largest military operation of the Syrian Arab Army in the Damascus region since the beginning of the war in 2011.
  • Although U.S. Intelligence reports repeatedly stressed that the opposition was incapable of launching a major, well coordinated attack, the Syrian Army in Damascus was confronted with an organized fighting force of 25.000 men under arms. The Saudi Arabia backed Jihadist front had amassed 25.000 fighters, organized in 13 battalions or kitab, to to launch a major assault against the capital Damascus. Most of the battalions belonged to Jabhat al-Nusrah and Liwa-al-Islam. The other battalions that took part in the campaign, were the Abou Zhar al-Ghaffari, al-Ansar, al-Mohajereen, Daraa al-Sham, Harun al-Rashid, Issa bin Mariam, Sultan Mohammad al-Fatih, Syouf al-Haqq, the Glory of the Caliphate, the Jobar Martyrs. During the night of 20 to 21 August and during the early morning hours of 21 August, the Syrian Arab Army broke through the insurgent lines in the area near the Jobar entrance. The breakthrough resulted in a collapse of the jihadists defensive positions and to a crushing and decisive strategic defeat of the Jabhat al-Nusrah led brigades.
  • Loosing Jobar effectively cut off the insurgents connection to the Jordanian border town of Al-Mafraq, the most important logistical base for the insurgents as well as for Saudi Arabia and the United States in Jordan. Al-Mafraq was already used as a major staging ground for the two failed attempts to conquer the city of Homs in June and July 2012. In 2012 al-Mafraq became the staging ground for some 40.000 fighters; more than 20.000 of them fought under the Libyan Islamic Fighting Group, which was under the command of Abdelhakim Belhadj and his second in command, Mahdi al-Harati. The CIA maintains a station, US Special Forces (JSOC) train insurgents, and several other US institutions are present in al-Mafraq. The point is of particular importance with regards to the visit of the U.S. Chairman of the Joint Chiefs of Staff to Jordan, which will be detailed below. Al-Mafraq has been the major transit point for Saudi and U.S. arms shipments since 2012, and the delivery of advanced Saudi and U.S. weapons to the insurgents since early August 2013.
  • ...6 more annotations...
  • The collapse of the insurgent front prompted the front commanders, most of which work in liaison to U.S. Special Forces, to deploy an elite force that should prevent the Syrian Army, at all costs, from gaining access to the Jobar Entrance, and from gaining control over the Jobar area. The majority of the insurgent crack forces came from Liwa-al-Islam with some additional troops from Jabhat al-Nusrah. The commanding officer of the elite forces was a Saudi national who is known by the name Abu Ayesha, whom eyewitnesses from Ghouta later identified as Abu Abdul-Moneim. Abdul-Moneim had established a cache of weapons, some of which had a tube-like structure, and others which looked like big gas bottles. The cache was located in a tunnel in the Eastern Ghouta district of Damascus. Reports about this tunnel and the weapons cache emerged in international media, after the son of Abdul-Moneim and 12 other fighters lost their lives there, because they mishandled improvised chemical weapons and caused a leak in one of them. Besides Abu Abdul-Moneim, the supreme leader of the Liwa-al-Islam and commander of their chemical weapons specialists, Zahran Alloush took personal charge of the elite troops and chemical weapons specialists who were operating under his direct command. Liwa-al-Islam has, along with other al-Qaeda brigades, the capability to manufacture and launch primitive, but none the less very deadly chemical weapons. The chemical weapons which Zahran Alloush had delivered to Damascus were most likely from al-Qaeda’s (ISIL) chemical weapons stockpiles in Iraq.
  • In early September 2013, Iran’s Foreign Minister Mohammad Javad Zarif stated, that Iran had sent a memo to the White House via the Swiss Embassy in Tehran. Tehran had reportedly informed the USA that handmade articles for chemical weapons, including Sarin gas, were being transferred to Syria. The White House failed to respond. Having to hold the Jobar Entrance and the Jobar district of Damascus “at any cost to maintain any hopes of launching a successful, major military assault on Damascus”, the insurgent commanders decided to launch a chemical weapons attack to halt the advance of the Syrian Arab Army. The political and military opposition and core members of the international alliance behind them had already decided that chemical weapons should be used in August – September. The large scale use of chemical weapons should justify renewed calls for a military intervention. Intelligence about this decision transpired in June.  nsnbc international issued several reports in late June and early July, warning that the insurgents would use large scale chemical weapons attacks in August or September.
  • The decision to launch the chemical weapon on 21 August was most likely based on two considerations. That the use of chemical weapons was already planned. That the Jobar Entrance should be defended at all costs. The final decision, made by Zahran Alloush may in fact have been predetermined together with his U.S. – Saudi liaison officers. Launching a chemical weapons attack would allow the USA, UK and France, to call for military strikes against Syria and to turn the tide. Also, Russian and Syrian intelligence sources described the weapons which were used in the attack as rockets which were altered so as to carry chemicals, launched by Liwa-al-Islam. The projectiles were most likely fired from a flatbed.
  • There is a growing and substantial amount of evidence that indicates direct U.S. and Saudi involvement in the chemical weapons attack. To begin with one merely has to answer the fundamental question “Who Benefits”, and the answer is definitely not “the Syrian government”. In fact, the  Federal German Intelligence Service (BND) claims that it has intercepted phone calls between Syrian officers and the Syrian High Command. The BND is convinced that none of the Syrian forces have used a chemical weapon. Leaving alone any moral considerations, the domestic and international repercussions were foreseeable and there would not have been any strategic benefit for the Syrian Army or the government.
  • Also, the involvement of Saudi Arabia ultimately points towards Washington and the White House. The involvement of Liwa-al-Islam in the chemical weapons attack establishes a strong chain of circumstantial evidence to the Saudi Intelligence Chief Prince Bandar bin Sultan. The supreme leader of Liwa-al-Islam and commander of the groups’ chemical weapons specialists, Zahran Alloush, has been working for the then Saudi Intelligence Chief Prince Turki al-Faisal in both Afghanistan and Yemen in the 1980s. Since the 1990s, Alloush was involved in the Salafist – Wahabbist terrorist networks in Syria which led to his arrest by Syrian intelligence. He was released in early of 2011, when the Assad administration granted a general amnesty. Immediately after his March 2011 release from prison, Zahran Alloush began receiving substantial funds and weapons from Saudi intelligence, which enabled him to establish Liwa-al-Islam as a de facto Saudi Arabia sponsored mercenary brigade under the auspices of the Saudi Interior Ministry.
  • Saudi funding enabled Alloush to establish the Liwa-al-Islam as a major fighting force in Syria. The group gained fame due to risky, high-profile attacks. On 8 July 2012, the group carried out a bomb attack against the headquarters of Syria’s National Security Council in Rawda Square, Damascus. The group succeeded in assassinating several high profile members of Syria’s security establishment, including the Deputy Minister of Defense and brother-in-law of President Bashar al-Assad, Assaf Shawkat, Defense Minister Dawoud Rajiha, Hassan Turkmani, a former Defense Minister and military adviser to then Vice-President Farouk al-Sharaa.
  •  
    One I had missed before. Whodunnit on the Ghouta, Syria sarin gas attack, right down to the unit commander, a Saudi intelligence asset working with a U.S. Special Forces unit, both controlled by the U.S.-led command and control center in Jordan.   
Paul Merrell

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
« First ‹ Previous 341 - 360 of 386 Next › Last »
Showing 20 items per page