Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Intercept" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Top US and Saudi Officials responsible for Chemical Weapons in Syria | nsnbc international - 0 views

  • On 21 August 2013, the Syrian Arab Army launched a major military campaign in Damascus. The campaign, called “Operation Shield of the Capital”, was the largest military operation of the Syrian Arab Army in the Damascus region since the beginning of the war in 2011.
  • Although U.S. Intelligence reports repeatedly stressed that the opposition was incapable of launching a major, well coordinated attack, the Syrian Army in Damascus was confronted with an organized fighting force of 25.000 men under arms. The Saudi Arabia backed Jihadist front had amassed 25.000 fighters, organized in 13 battalions or kitab, to to launch a major assault against the capital Damascus. Most of the battalions belonged to Jabhat al-Nusrah and Liwa-al-Islam. The other battalions that took part in the campaign, were the Abou Zhar al-Ghaffari, al-Ansar, al-Mohajereen, Daraa al-Sham, Harun al-Rashid, Issa bin Mariam, Sultan Mohammad al-Fatih, Syouf al-Haqq, the Glory of the Caliphate, the Jobar Martyrs. During the night of 20 to 21 August and during the early morning hours of 21 August, the Syrian Arab Army broke through the insurgent lines in the area near the Jobar entrance. The breakthrough resulted in a collapse of the jihadists defensive positions and to a crushing and decisive strategic defeat of the Jabhat al-Nusrah led brigades.
  • Loosing Jobar effectively cut off the insurgents connection to the Jordanian border town of Al-Mafraq, the most important logistical base for the insurgents as well as for Saudi Arabia and the United States in Jordan. Al-Mafraq was already used as a major staging ground for the two failed attempts to conquer the city of Homs in June and July 2012. In 2012 al-Mafraq became the staging ground for some 40.000 fighters; more than 20.000 of them fought under the Libyan Islamic Fighting Group, which was under the command of Abdelhakim Belhadj and his second in command, Mahdi al-Harati. The CIA maintains a station, US Special Forces (JSOC) train insurgents, and several other US institutions are present in al-Mafraq. The point is of particular importance with regards to the visit of the U.S. Chairman of the Joint Chiefs of Staff to Jordan, which will be detailed below. Al-Mafraq has been the major transit point for Saudi and U.S. arms shipments since 2012, and the delivery of advanced Saudi and U.S. weapons to the insurgents since early August 2013.
  • ...6 more annotations...
  • The collapse of the insurgent front prompted the front commanders, most of which work in liaison to U.S. Special Forces, to deploy an elite force that should prevent the Syrian Army, at all costs, from gaining access to the Jobar Entrance, and from gaining control over the Jobar area. The majority of the insurgent crack forces came from Liwa-al-Islam with some additional troops from Jabhat al-Nusrah. The commanding officer of the elite forces was a Saudi national who is known by the name Abu Ayesha, whom eyewitnesses from Ghouta later identified as Abu Abdul-Moneim. Abdul-Moneim had established a cache of weapons, some of which had a tube-like structure, and others which looked like big gas bottles. The cache was located in a tunnel in the Eastern Ghouta district of Damascus. Reports about this tunnel and the weapons cache emerged in international media, after the son of Abdul-Moneim and 12 other fighters lost their lives there, because they mishandled improvised chemical weapons and caused a leak in one of them. Besides Abu Abdul-Moneim, the supreme leader of the Liwa-al-Islam and commander of their chemical weapons specialists, Zahran Alloush took personal charge of the elite troops and chemical weapons specialists who were operating under his direct command. Liwa-al-Islam has, along with other al-Qaeda brigades, the capability to manufacture and launch primitive, but none the less very deadly chemical weapons. The chemical weapons which Zahran Alloush had delivered to Damascus were most likely from al-Qaeda’s (ISIL) chemical weapons stockpiles in Iraq.
  • In early September 2013, Iran’s Foreign Minister Mohammad Javad Zarif stated, that Iran had sent a memo to the White House via the Swiss Embassy in Tehran. Tehran had reportedly informed the USA that handmade articles for chemical weapons, including Sarin gas, were being transferred to Syria. The White House failed to respond. Having to hold the Jobar Entrance and the Jobar district of Damascus “at any cost to maintain any hopes of launching a successful, major military assault on Damascus”, the insurgent commanders decided to launch a chemical weapons attack to halt the advance of the Syrian Arab Army. The political and military opposition and core members of the international alliance behind them had already decided that chemical weapons should be used in August – September. The large scale use of chemical weapons should justify renewed calls for a military intervention. Intelligence about this decision transpired in June.  nsnbc international issued several reports in late June and early July, warning that the insurgents would use large scale chemical weapons attacks in August or September.
  • The decision to launch the chemical weapon on 21 August was most likely based on two considerations. That the use of chemical weapons was already planned. That the Jobar Entrance should be defended at all costs. The final decision, made by Zahran Alloush may in fact have been predetermined together with his U.S. – Saudi liaison officers. Launching a chemical weapons attack would allow the USA, UK and France, to call for military strikes against Syria and to turn the tide. Also, Russian and Syrian intelligence sources described the weapons which were used in the attack as rockets which were altered so as to carry chemicals, launched by Liwa-al-Islam. The projectiles were most likely fired from a flatbed.
  • There is a growing and substantial amount of evidence that indicates direct U.S. and Saudi involvement in the chemical weapons attack. To begin with one merely has to answer the fundamental question “Who Benefits”, and the answer is definitely not “the Syrian government”. In fact, the  Federal German Intelligence Service (BND) claims that it has intercepted phone calls between Syrian officers and the Syrian High Command. The BND is convinced that none of the Syrian forces have used a chemical weapon. Leaving alone any moral considerations, the domestic and international repercussions were foreseeable and there would not have been any strategic benefit for the Syrian Army or the government.
  • Also, the involvement of Saudi Arabia ultimately points towards Washington and the White House. The involvement of Liwa-al-Islam in the chemical weapons attack establishes a strong chain of circumstantial evidence to the Saudi Intelligence Chief Prince Bandar bin Sultan. The supreme leader of Liwa-al-Islam and commander of the groups’ chemical weapons specialists, Zahran Alloush, has been working for the then Saudi Intelligence Chief Prince Turki al-Faisal in both Afghanistan and Yemen in the 1980s. Since the 1990s, Alloush was involved in the Salafist – Wahabbist terrorist networks in Syria which led to his arrest by Syrian intelligence. He was released in early of 2011, when the Assad administration granted a general amnesty. Immediately after his March 2011 release from prison, Zahran Alloush began receiving substantial funds and weapons from Saudi intelligence, which enabled him to establish Liwa-al-Islam as a de facto Saudi Arabia sponsored mercenary brigade under the auspices of the Saudi Interior Ministry.
  • Saudi funding enabled Alloush to establish the Liwa-al-Islam as a major fighting force in Syria. The group gained fame due to risky, high-profile attacks. On 8 July 2012, the group carried out a bomb attack against the headquarters of Syria’s National Security Council in Rawda Square, Damascus. The group succeeded in assassinating several high profile members of Syria’s security establishment, including the Deputy Minister of Defense and brother-in-law of President Bashar al-Assad, Assaf Shawkat, Defense Minister Dawoud Rajiha, Hassan Turkmani, a former Defense Minister and military adviser to then Vice-President Farouk al-Sharaa.
  •  
    One I had missed before. Whodunnit on the Ghouta, Syria sarin gas attack, right down to the unit commander, a Saudi intelligence asset working with a U.S. Special Forces unit, both controlled by the U.S.-led command and control center in Jordan.   
Paul Merrell

PressTV-'US jets in Turkey to deter Russia attacks' - 0 views

  • US fighter jets have been deployed in Turkey to protect slower American warplanes from potential Russian or Syrian attacks, a Pentagon official says.Six F-15C warplanes are tasked with providing cover for bomber, attack and cargo aircraft from threats posed by Syrian and Russian fighters, an unnamed US defense official told USA Today on Tuesday.The US Air Force B-1 bombers, A-10 and AC-130 attack planes, which are reportedly used in US-led strikes on Daesh (ISIL) positions in Syria, all fly at slow speeds and are vulnerable to attacks from enemy pilots, the official added.He added that cargo planes that are airdropping ammunition for US-backed militants will also be protected.
  • Meanwhile, the Pentagon announced Tuesday that the fighter jets, sent to Turkey’s Incirlik Airbase last week, will be protecting the Turkish airspace."At the request of the government of Turkey, the US Air Force F-15Cs that arrived last week will conduct combat air patrols to assist in defense of the Turkish airspace," Laura Seal, a Pentagon spokesman, said in a statement Tuesday."We will be conducting these patrols at the request of the government of Turkey. Turkey faces increased instability along its border with Syria and Iraq and irresponsible behavior from actors in the region. This includes the incursions Russia made into Turkey's — and thereby NATO's — airspace in October," the statement noted.According to NATO officials, Russian Sukhoi SU-30 and SU-24 jets, based in Syria, entered the Turkish airspace early in October. Ankara scrambled two F-16s to intercept the planes.
Paul Merrell

NSA Director Finally Admits Encryption Is Needed to Protect Public's Privacy - 0 views

  • NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy The new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. By Carey Wedler | AntiMedia | January 22, 2016 Share this article! https://mail.google.com/mail/?view=cm&fs=1&to&su=NSA%20Director%20Finally%20Admits%20Encryption%20Is%20Needed%20to%20Protect%20Public%E2%80%99s%20Privacy&body=http%3A%2F%2Fwww.mintpress
  • At the same hearing, Comey and Attorney General Loretta Lynch declined to comment on whether they had proof the Paris attackers used encryption. Even so, Comey recently lobbied for tech companies to do away with end-to-end encryption. However, his crusade has fallen on unsympathetic ears, both from the private companies he seeks to control — and from the NSA. Prior to Rogers’ statements in support of encryption Thursday, former NSA chief Michael Hayden said, “I disagree with Jim Comey. I actually think end-to-end encryption is good for America.” Still another former NSA chair has criticized calls for backdoor access to information. In October, Mike McConnell told a panel at an encryption summit that the United States is “better served by stronger encryption, rather than baking in weaker encryption.” Former Department of Homeland Security chief, Michael Chertoff, has also spoken out against government being able to bypass encryption.
  • Rogers cited the recent Office of Personnel Management hack of over 20 million users as a reason to increase encryption rather than scale it back. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack that compromised the personal data about 20 million people who obtained background checks. Rogers’ comments, while forward-thinking, signify an about face in his stance on encryption. In February 2015, he said he “shares [FBI] Director [James] Comey’s concern” about cell phone companies’ decision to add encryption features to their products. Comey has been one loudest critics of encryption. However, Rogers’ comments on Thursday now directly conflict with Comey’s stated position. The FBI director has publicly chastised encryption, as well as the companies that provide it. In 2014, he claimed Apple’s then-new encryption feature could lead the world to “a very dark place.” At a Department of Justice hearing in November, Comey testified that “Increasingly, the shadow that is ‘going dark’ is falling across more and more of our work.” Though he claimed, “We support encryption,” he insisted “we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, to resolve it. So, I think the conversation’s in a healthier place.”
  • ...2 more annotations...
  • Regardless of these individual defenses of encryption, the Intercept explained why these statements may be irrelevant: “Left unsaid is the fact that the FBI and NSA have the ability to circumvent encryption and get to the content too — by hacking. Hacking allows law enforcement to plant malicious code on someone’s computer in order to gain access to the photos, messages, and text before they were ever encrypted in the first place, and after they’ve been decrypted. The NSA has an entire team of advanced hackers, possibly as many as 600, camped out at Fort Meade.”
  • Rogers statements, of course, are not a full-fledged endorsement of privacy, nor can the NSA be expected to make it a priority. Even so, his new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. “So spending time arguing about ‘hey, encryption is bad and we ought to do away with it’ … that’s a waste of time to me,” Rogers said Thursday. “So what we’ve got to ask ourselves is, with that foundation, what’s the best way for us to deal with it? And how do we meet those very legitimate concerns from multiple perspectives?”
Paul Merrell

From Paris to Boston, Terrorists Were Already Known to Authorities - 0 views

  • WHENEVER A TERRORIST ATTACK OCCURS, it never takes long for politicians to begin calling for more surveillance powers. The horrendous attacks in Paris last week, which left more than 120 people dead, are no exception to this rule. In recent days, officials in the United Kingdom and the United States have been among those arguing that more surveillance of Internet communications is necessary to prevent further atrocities. The case for expanded surveillance of communications, however, is complicated by an analysis of recent terrorist attacks. The Intercept has reviewed 10 high-profile jihadi attacks carried out in Western countries between 2013 and 2015 (see below), and in each case some or all of the perpetrators were already known to the authorities before they executed their plot. In other words, most of the terrorists involved were not ghost operatives who sprang from nowhere to commit their crimes; they were already viewed as a potential threat, yet were not subjected to sufficient scrutiny by authorities under existing counterterrorism powers. Some of those involved in last week’s Paris massacre, for instance, were already known to authorities; at least three of the men appear to have been flagged at different times as having been radicalized, but warning signs were ignored.
  • In the aftermath of a terrorist atrocity, government officials often seem to talk about surveillance as if it were some sort of panacea, a silver bullet. But what they always fail to explain is how, even with mass surveillance systems already in place in countries like France, the United States, and the United Kingdom, attacks still happen. In reality, it is only possible to watch some of the people some of the time, not all of the people all of the time. Even if you had every single person in the world under constant electronic surveillance, you would still need a human being to analyze the data and assess any threats in a timely fashion. And human resources are limited and fallible.
Paul Merrell

US Air Force Seeks $3 Billion Drone Program Expansion - 0 views

  • Despite a mounting civilian death toll and increased opposition from civil liberties activists, the US Air Force has announced that it plans to double its number of drone squadrons.In October, the Intercept released a report outlining the more secretive aspects of the US drone program. Compiled by a source within the intelligence community, the report offers an in-depth look at who, precisely, the US is targeting – and how accurate those missions really are.
  • "During one five-month period of the operation, according to the documents, nearly 90 percent of the people killed in airstrikes were not the intended targets," the report reads. This, of course, wasn’t the first indication of the drone program’s death toll. Analysis conducted by human rights group Reprieve in 2014 found that in targeting only 41 men, 1,147 people were killed by US airstrikes. But not only is the American drone war not winding down, it’s actually about to double in scope. According to Gen. Herbert Carlisle, head of US Air Combat Command at Langley Air Force Base, the US Air Force is about to double its number of drone squadrons, adding roughly 3,000 personnel to pilot and maintain new UAVs which would be stationed across the globe. The plan calls for an expansion over the next five years, and while it still has to be approved by Congressional lawmakers, the proposal would cost taxpayers $3 billion.
  • Carlisle says the plan is necessary because the Air Force is currently too busy running attack missions and is unable to meet the rising demand for surveillance missions. "Right now, 100% of the time, when a MQ-1 or MQ-9 crew goes in, all they do is combat," he said, according to the LA Times. "So we really have to build the capacity." The proposal includes adding 75 Reapers to the Air Force’s fleet of 175 Reapers and 150 Predators, and could even entail the construction of a new drone operations center in Suffolk, England, pending approval from the British government.
Paul Merrell

Bulk Collection Under Section 215 Has Ended… What's Next? | Just Security - 0 views

  • The first (and thus far only) roll-back of post-9/11 surveillance authorities was implemented over the weekend: The National Security Agency shuttered its program for collecting and holding the metadata of Americans’ phone calls under Section 215 of the Patriot Act. While bulk collection under Section 215 has ended, the government can obtain access to this information under the procedures specified in the USA Freedom Act. Indeed, some experts have argued that the Agency likely has access to more metadata because its earlier dragnet didn’t cover cell phones or Internet calling. In addition, the metadata of calls made by an individual in the United States to someone overseas and vice versa can still be collected in bulk — this takes place abroad under Executive Order 12333. No doubt the NSA wishes that this was the end of the surveillance reform story and the Paris attacks initially gave them an opening. John Brennan, the Director of the CIA, implied that the attacks were somehow related to “hand wringing” about spying and Sen. Tom Cotton (R-Ark.) introduced a bill to delay the shut down of the 215 program. Opponents of encryption were quick to say: “I told you so.”
  • But the facts that have emerged thus far tell a different story. It appears that much of the planning took place IRL (that’s “in real life” for those of you who don’t have teenagers). The attackers, several of whom were on law enforcement’s radar, communicated openly over the Internet. If France ever has a 9/11 Commission-type inquiry, it could well conclude that the Paris attacks were a failure of the intelligence agencies rather than a failure of intelligence authorities. Despite the passage of the USA Freedom Act, US surveillance authorities have remained largely intact. Section 702 of the FISA Amendments Act — which is the basis of programs like PRISM and the NSA’s Upstream collection of information from Internet cables — sunsets in the summer of 2017. While it’s difficult to predict the political environment that far out, meaningful reform of Section 702 faces significant obstacles. Unlike the Section 215 program, which was clearly aimed at Americans, Section 702 is supposedly targeted at foreigners and only picks up information about Americans “incidentally.” The NSA has refused to provide an estimate of how many Americans’ information it collects under Section 702, despite repeated requests from lawmakers and most recently a large cohort of advocates. The Section 215 program was held illegal by two federal courts (here and here), but civil attempts to challenge Section 702 have run into standing barriers. Finally, while two review panels concluded that the Section 215 program provided little counterterrorism benefit (here and here), they found that the Section 702 program had been useful.
  • There is, nonetheless, some pressure to narrow the reach of Section 702. The recent decision by the European Court of Justice in the safe harbor case suggests that data flows between Europe and the US may be restricted unless the PRISM program is modified to protect the information of Europeans (see here, here, and here for discussion of the decision and reform options). Pressure from Internet companies whose business is suffering — estimates run to the tune of $35 to 180 billion — as a result of disclosures about NSA spying may also nudge lawmakers towards reform. One of the courts currently considering criminal cases which rely on evidence derived from Section 702 surveillance may hold the program unconstitutional either on the basis of the Fourth Amendment or Article III for the reasons set out in this Brennan Center report. A federal district court in Colorado recently rejected such a challenge, although as explained in Steve’s post, the decision did not seriously explore the issues. Further litigation in the European courts too could have an impact on the debate.
  • ...2 more annotations...
  • The US intelligence community’s broadest surveillance authorities are enshrined in Executive Order 12333, which primarily covers the interception of electronic communications overseas. The Order authorizes the collection, retention, and dissemination of “foreign intelligence” information, which includes information “relating to the capabilities, intentions or activities of foreign powers, organizations or persons.” In other words, so long as they are operating outside the US, intelligence agencies are authorized to collect information about any foreign person — and, of course, any Americans with whom they communicate. The NSA has conceded that EO 12333 is the basis of most of its surveillance. While public information about these programs is limited, a few highlights give a sense of the breadth of EO 12333 operations: The NSA gathers information about every cell phone call made to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan, and possibly other countries. A joint US-UK program tapped into the cables connecting internal Yahoo and Google networks to gather e-mail address books and contact lists from their customers. Another US-UK collaboration collected images from video chats among Yahoo users and possibly other webcam services. The NSA collects both the content and metadata of hundreds of millions of text messages from around the world. By tapping into the cables that connect global networks, the NSA has created a database of the location of hundreds of millions of mobile phones outside the US.
  • Given its scope, EO 12333 is clearly critical to those seeking serious surveillance reform. The path to reform is, however, less clear. There is no sunset provision that requires action by Congress and creates an opportunity for exposing privacy risks. Even in the unlikely event that Congress was inclined to intervene, it would have to address questions about the extent of its constitutional authority to regulate overseas surveillance. To the best of my knowledge, there is no litigation challenging EO 12333 and the government doesn’t give notice to criminal defendants when it uses evidence derived from surveillance under the order, so the likelihood of a court ruling is slim. The Privacy and Civil Liberties Oversight Board is currently reviewing two programs under EO 12333, but it is anticipated that much of its report will be classified (although it has promised a less detailed unclassified version as well). While the short-term outlook for additional surveillance reform is challenging, from a longer-term perspective, the distinctions that our law makes between Americans and non-Americans and between domestic and foreign collection cannot stand indefinitely. If the Fourth Amendment is to meaningfully protect Americans’ privacy, the courts and Congress must come to grips with this reality.
Paul Merrell

BBC Protects U.K.'s Close Ally Saudi Arabia With Incredibly Dishonest and Biased Editing - 0 views

  • The BBC loves to boast about how “objective” and “neutral” it is. But a recent article, which it was forced to change, illustrates the lengths to which the British state-funded media outlet will go to protect one of the U.K. government’s closest allies, Saudi Arabia, which also happens to be one of the country’s largest arms purchasers (just this morning, the Saudi ambassador to the U.K. threatened in an op-ed that any further criticism of the Riyadh regime by Jeremy Corbyn could jeopardize the multi-layered U.K./Saudi alliance). Earlier this month, the BBC published an article describing the increase in weapons and money sent by Saudi Arabia and other Gulf regimes to anti-Assad fighters in Syria. All of that “reporting” was based on the claims of what the BBC called “a Saudi government official,” who — because he works for a government closely allied with the U.K. — was granted anonymity by the BBC and then had his claims mindlessly and uncritically presented as fact (it is the rare exception when the BBC reports adversarially on the Saudis). This anonymous “Saudi official” wasn’t whistleblowing or presenting information contrary to the interests of the regime; to the contrary, he was disseminating official information the regime wanted publicized. This was the key claim of the anonymous Saudi official (emphasis added):
  • The well-placed official, who asked not to be named, said supplies of modern, high-powered weaponry including guided anti-tank weapons would be increased to the Arab- and western-backed rebel groups fighting the forces of Syria’s President Bashar al-Assad and his Russian, Iranian and Lebanese allies. He said those groups being supplied did not include either Islamic State (IS) or al-Nusra Front, both of which are proscribed terrorist organizations. Instead, he said the weapons would go to three rebel alliances — Jaish al-Fatah (Army of Conquest), the Free Syrian Army (FSA) and the Southern Front.
  • So the Saudis, says the anonymous official, are only arming groups such as the “Army of Conquest,” but not the al Qaeda affiliate the Nusra Front. What’s the problem with this claim? It’s obvious, though the BBC would not be so impolite as to point it out: The Army of Conquest includes the Nusra Front as one of its most potent components. This is not even in remote dispute; the New York Times’ elementary explainer on the Army of Conquest from three weeks ago states:
  • ...4 more annotations...
  • The alliance consists of a number of mostly Islamist factions, including the Nusra Front, al Qaeda’s Syrian affiliate; Ahrar al-Sham, another large group; and more moderate rebel factions that have received covert arms support from the intelligence services of the United States and its allies. The Telegraph, in an early October article complaining that Russia was bombing “non-ISIL rebels,” similarly noted that the Army of Conquest (bombed by Russia) “includes a number of Islamist groups, most powerful among them Ahrar al-Sham and Jabhat al-Nusra. Jabhat al-Nusra is the local affiliate of al-Qaeda.” Even the Voice of America noted that “Russia’s main target has been the Army of Conquest, an alliance of insurgent groups that includes the al-Nusra Front, al-Qaida’s affiliate in Syria, and the hard-line Islamist group Ahrar al-Sham, as well as some less extreme Islamist groups.”
  • In other words, the claim from the anonymous Saudi official that the BBC uncritically regurgitated — that the Saudis are only arming the Army of Conquest but no groups that “include” the Nusra Front — is self-negating. A BBC reader, Ricardo Vaz, brought this contradiction to the BBC’s attention. As he told The Intercept: “The problem is that the Nusra Front is the most important faction inside the Army of Conquest. So either the Saudi official expected the BBC journalist not to know this, or he expects us to believe they can deliver weapons to factions fighting side by side with an al Qaeda affiliate and that those weapons will not make their way into Nusra’s hands. In any case, this is very close to an official admission that the Saudis (along with Qataris and Turkish) are supplying weapons to an al Qaeda affiliate. This of course is not a secret to anyone who’s paying attention.” In response to Vaz’s complaint, the BBC did not tell its readers about this vital admission. Instead, it simply edited that Saudi admission out of its article. In doing so, it made the already-misleading article so much worse, as the BBC went even further out of its way to protect the Saudis. This is what that passage now states on the current version of the article on the BBC’s site (emphasis added): He said those groups being supplied did not include either Islamic State (IS) or al-Nusra Front, both of which are proscribed terrorist organizations. Instead, he said the weapons would go to the Free Syrian Army and other small rebel groups.
  • So originally, the BBC stated that the “Saudi official” announced that the regime was arming the Army of Conquest. Once it was brought to the BBC’s attention that the Army of Conquest includes the al Qaeda affiliate Nusra Front — a direct contradiction of the Saudi official’s other claim that the Saudis are not arming Nusra — the BBC literally changed the Saudi official’s own statement, whitewashed it, to eliminate his admission that they were arming Army of Conquest. Instead, the BBC now states that the Saudis are arming “the Free Syrian Army and other small rebel groups.” The BBC simply deleted the key admission that the Saudis are arming al Qaeda.
  • But what this does highlight is just how ludicrous — how beyond parody — the 14-year-old war on terror has become, how little it has to do with its original ostensible justification. The regime with the greatest plausible proximity to the 9/11 attack — Saudi Arabia — is the closest U.S. ally in the region next to Israel. The country that had absolutely nothing to do with that attack, and which is at least as threatened as the U.S. by the religious ideology that spurred it — Iran — is the U.S.’s greatest war-on-terror adversary. Now we have a virtual admission from the Saudis that they are arming a group that centrally includes al Qaeda, while the U.S. itself has at least indirectly done the same (just as was true in Libya). And we’re actually at the point where western media outlets are vehemently denouncing Russia for bombing al Qaeda elements, which those outlets are  manipulatively referring to as “non-ISIS groups.” It’s not a stretch to say that the faction that provides the greatest material support to al Qaeda at this point is the U.S. and its closest allies. That is true even as al Qaeda continues to be paraded around as the prime need for the ongoing war. But whatever one’s views are on Syria, it’s telling indeed to watch the BBC desperately protect Saudi officials, not only by granting them anonymity to spout official propaganda, but worse, by using blatant editing games to whitewash the Saudis’ own damaging admissions, ones the BBC unwittingly published. There are many adjectives one can apply to the BBC’s behavior here: “Objective” and “neutral” are most assuredly not among them.
  •  
    Glenn Greenwald riffs on BBC's latest cover-up on behalf of the U.S. allies backing for al-Nusrah.
Paul Merrell

UK Politicians To Hold 'Emergency Debate' After Spy Tribunal Says GCHQ Is Permitted To Put Them Under Surveillance | Techdirt - 0 views

  • Now we can see what moves legislators to take swift action against domestic surveillance. It all depends on who's being targeted. A long-held "gentleman's agreement" that GCHQ would not spy on members of Parliament (with an exigent circumstances exception, naturally) was found to be not legally-binding by the UK's surveillance oversight tribunal. Today, a panel, headed by Mr Justice Burton, made declarations that the Wilson Doctrine applies only to targeted, and not incidental, interception of Parliamentary communications, but that it has no legal effect, save that in practice the Security and Intelligence Agencies must comply with their own guidance. The Wilson doctrine, implemented by prime minister Harold Wilson in November 1966, lay down the policy of no tapping of the phones of MPs or members of the House of Lords, unless there is a major national emergency, and that any changes to the policy will be reported by the prime minister to Parliament.
  • Once the Parliament members discovered they too could be subjected to GCHQ's "blanket surveillance," they moved quickly. MPs are to hold an emergency debate on the Wilson doctrine, amid fears the convention designed to prevent politicians' communications being spied upon is "dead". [...] Shadow Commons leader Chris Bryant led a successful application in the Commons for an emergency debate in response to Wednesday's judgment. The debate has been allocated up to three hours on Monday, October 19. When it's just the general public and foreign citizens of dozens of nations, politicians generally agree there's a "debate" to be had over dragnet surveillance. The debate then takes place with minimal input from those affected and tends to include large amounts of terrorist fear-mongering and quibbling over how much exactly national security agencies should be allowed to get away with. (As much as possible, usually. Especially when the fear-mongering side has the floor.)
  • When it's those up top discovering they, too, might be subject to the same surveillance they've inflicted on the rest of the nation (and foreigners who have been granted no rights whatsoever), they step all over themselves in their haste to "debate" the side of the issue that states they should continue to be excepted from the laws that apply to everyone else.
Paul Merrell

GCHQ handed new smartphone-hacking legal powers - RT UK - 0 views

  • Spy agencies in Britain will be given the explicit right to hack into smartphones and computers as part of a new law being introduced by the Conservative government. Security services MI5, MI6 and GCHQ can already access electronic devices by exploiting software security vulnerabilities, but the legal foundation for the practice is under scrutiny.New powers laid out in the Investigatory Powers Bill, due to be introduced in Parliament next month, will give spies a solid legal basis for hacking into computer systems, according to the Times.The revelation has sparked criticism from human rights group Liberty, which accuses the government of giving spy agencies “unlimited potential” to act against citizens.The bill, which was announced in the Queens’ Speech following the general election, is likely to include the new Snooper’s Charter, according to privacy campaigners at the Open Rights Group.
  • British spies will be able to hack into a person’s “property” through backdoors in the software. Once inside, intelligence agents can install software that allows them operate microphones to eavesdrop on conversations and even control the camera to take photographs of targets.The government admitted in February that MI5, MI6 and GCHQ were hacking into computers, servers, routers and mobile phones using the Intelligence Services Act 1994, which does not give explicit authorization for such practices.Independent reviewer of terrorism legislation Dave Anderson QC recommended in June that new legislation be introduced to clarify give intrusive hacking a firm legal basis.Anderson said that hacking presents a “dizzying array of possibilities to the security and intelligence agencies.”While some methods are appropriate, “many are of the view that there are others which are so intrusive that they would require exceptional safeguards for their use to be legal … A debate is clearly needed,” he said.
  • The investigatory powers bill will give agents explicit powers to interfere with “property” once they have obtained a warrant from the home secretary.Digital evidence expert Peter Sommer said the powers circumvented encryption technology.“Increasingly, [intelligence agents] can’t read communications sent over the internet because of encryption, so their ability to get information from interception is rapidly diminishing. The best way around this is to get inside someone’s computer. This is an increasingly important avenue for them,” he told the Times.
Paul Merrell

DiGenova: Rice Ordered 'Spreadsheets | The Daily Caller - 0 views

  • Former President Barack Obama’s national security adviser Susan Rice ordered U.S. spy agencies to produce “detailed spreadsheets” of legal phone calls involving Donald Trump and his aides when he was running for president, according to former U.S. Attorney Joseph diGenova. “What was produced by the intelligence community at the request of Ms. Rice were detailed spreadsheets of intercepted phone calls with unmasked Trump associates in perfectly legal conversations with individuals,” diGenova told The Daily Caller News Foundation Investigative Group Monday. “The overheard conversations involved no illegal activity by anybody of the Trump associates, or anyone they were speaking with,” diGenova said. “In short, the only apparent illegal activity was the unmasking of the people in the calls.”
  • Other official sources with direct knowledge and who requested anonymity confirmed to TheDCNF diGenova’s description of surveillance reports Rice ordered one year before the 2016 presidential election. Also on Monday, Fox News and Bloomberg News, citing multiple sources reported that Rice had requested the intelligence information that was produced in a highly organized operation. Fox said the unmasked names of Trump aides were given to officials at the National Security Council (NSC), the Department of Defense, James Clapper, President Obama’s Director of National Intelligence, and John Brennan, Obama’s CIA Director. Joining Rice in the alleged White House operations was her deputy Ben Rhodes, according to Fox. Critics of the atmosphere prevailing throughout the Obama administration’s last year in office point to former Obama Deputy Defense Secretary Evelyn Farkas who admitted in a March 2 television interview on MSNBC that she “was urging my former colleagues,” to “get as much information as you can, get as much intelligence as you can, before President Obama leaves the administration.”
  • Michael Doran, former NSC senior director, told TheDCNF Monday that “somebody blew a hole in the wall between national security secrets and partisan politics.” This “was a stream of information that was supposed to be hermetically sealed from politics and the Obama administration found a way to blow a hole in that wall,” he said.
  • ...1 more annotation...
  • Doran charged that potential serious crimes were undertaken because “this is a leaking of signal intelligence.” “That’s a felony,” he told TheDCNF. “And you can get 10 years for that. It is a tremendous abuse of the system. We’re not supposed to be monitoring American citizens. Bigger than the crime, is the breach of public trust.” Waurishuk said he was most dismayed that “this is now using national intelligence assets and capabilities to spy on the elected, yet-to-be-seated president.” “We’re looking at a potential constitutional crisis from the standpoint that we used an extremely strong capability that’s supposed to be used to safeguard and protect the country,” he said. “And we used it for political purposes by a sitting president. That takes on a new precedent.”
Paul Merrell

Syrian Intelligence Claims To Have Proof Of US Military Coordination With ISIS - 0 views

  • The Syrian intelligence possesses an audio recording of conversation between Daesh terrorists and US military prior to the Washington-led coalition’s airstrikes on the government troops near Deir ez-Zor on September 17, the speaker of the People’s Council of Syria said Monday. “The Syrian Army intercepted a conversation between the Americans and Daesh before the air raid on Deir ez-Zor”, Hadiya Khalaf Abbas said as quoted by the Al Mayadeen broadcaster. US warplanes hit Syrian government troops near the eastern city of Deir ez-Zor on September 17, leaving 62 military personnel killed and a hundred wounded. The Pentagon said initially that the airstrike was a mistake and targeted Daesh militants. The head of the Syrian parliament, added during her visit to Iran that after the coalition’s airstrikes on the government troops, the US military directed terrorists’ attack on the Syrian army.
  • The attack on government positions put to test a US-Russia brokered nationwide ceasefire that came into being in Syria earlier that week. Russia’s Foreign Minister Sergei Lavrov said last Friday it was necessary to separate Daesh terrorists from “moderate” opposition forces in order to salvage the truce. Britain, Australia and Denmark confirmed their air forces’ participation in the deadly airstrikes. The politician noted that the details would be made public later.
Paul Merrell

Russia Tells U.S. Military to Get Out of Syria - 0 views

  • Russia ramped up its calls for the U.S. military to depart from Syria on Thursday, contending it has no substantial reasons to be in the country and its presence there "must end."“Any reasons cited by the Americans to justify their further military presence... are just excuses and we think their presence must end," Alexander Lavrentiev, Russian President Vladimir Putin's envoy to Syria, told reporters. Lavrentiev was in Astana, Kazakhstan, on Thursday ahead of peace talks regarding the Syria conflict between Russia, Iran and Turkey, Reuters reports. Russia, a major ally of Syrian President Bashar al-Assad, has played a significant role in the Syria conflict. 
  • This is not the first time the Russian government has expressed such views in recent weeks. Russia seemingly feels the U.S. military has no purpose in Syria now that the the Islamic State militant group (ISIS) has largely lost its foothold in Syria and Iraq. The envoy's remarks also come after the U.S. and Russia have sparred over airspace in Syria. In mid-December, two U.S. warplanes in Syria were diverted from supporting ground operations against ISIS to intercept Russian fighter jets that allegedly crossed into U.S. coalition airspace. But the Pentagon has signified it has no plans to withdraw U.S. troops from Syria any time in the near future. "We are going to maintain our commitment on the ground as long as we need to, to support our partners and prevent the return of terrorist groups," Pentagon spokesperson Eric Pahon told Agence France-Presse earlier this month. "To ensure an enduring defeat of ISIS, the coalition must ensure it cannot regenerate, reclaim lost ground or plot external attacks," he added. There are currently nearly 2,000 U.S. troops in Syria, according to numbers from the Pentagon. Since the Syrian conflict began in 2011, it has claimed more than 400,000 lives, according to the U.N., and contributed to the worst refugee crisis since World War II. 
Paul Merrell

The Still-Missing Evidence of Russia-gate - Consortiumnews - 0 views

  • A changing-places moment brought about by Russia-gate is that liberals who are usually more skeptical of U.S. intelligence agencies, especially their evidence-free claims, now question the patriotism of Americans who insist that the intelligence community supply proof to support the dangerous claims about Russian ‘hacking” of Democratic emails especially when some  veteran U.S. government experts say the data would be easily available if the Russians indeed were guilty. One of those experts is William Binney, a former high-level National Security Agency intelligence official who, after his 2001 retirement, blew the whistle on the extraordinary breadth of NSA surveillance programs. His outspoken criticism of the NSA during the George W. Bush administration made him the subject of FBI investigations that included a raid on his home in 2007. Even before Edward Snowden’s NSA whistleblowing, Binney publicly revealed that NSA had access to telecommunications companies’ domestic and international billing records, and that since 9/11 the agency has intercepted some 15 trillion to 20 trillion communications. Snowden has said: “I have tremendous respect for Binney, who did everything he could according to the rules.”
  • I spoke to Binney on Dec. 28 about Russia-gate and a host of topics having to do with spying and America’s expanding national security state.
  • Bernstein: Your expertise was in the Soviet Union and so you must know a lot about bugging.  Do you believe that Russia hacked and undermined our last election?  Can Trump thank Russia for the result? Binney:  We at Veteran Intelligence Professionals for Sanity (VIPS) published an article on this in July.  First of all, if any of the data went anywhere across the fiber optic world, the NSA would know.  Just inside the United States, the NSA has over a hundred tap points on the fiber lines, taking in everything.    Mark Klein exposed some of this at the AT&T facility in San Francisco. This is not for foreigners, by the way, this is for targeting US citizens.  If they wanted only foreigners, all they would have to do was look at the transatlantic cables where they surface on the coast of the United States.  But they are not there, they are distributed among the US population. Bernstein: So if, in fact, the Russians were tapping into DNC headquarters, the NSA would absolutely know about it. Binney: Yes, and they would also have trace routes on where they went specifically, in Russia or anywhere else.  If you remember, about three or four years ago, the Chinese hacked into somewhere in the United States and our government came out and confirmed that it was the Chinese who did it, and it came from a specific military facility in Shanghai.  The NSA had these trace route programs embedded by the hundreds across the US and all around the world.
  • ...3 more annotations...
  • The other data that came out from Guccifer 2.0, a download from the DNC, has been a charade.  It was a download and not a transfer across the Web.  The Web won’t manage such a high speed.  It could not have gotten across the Atlantic at that high speed.  You would have to have high capacity lines dedicated to that in order to do it. They have been playing games with us.  There is no factual evidence to back up any charge of hacking here. Bernstein: So was this a leak by somebody at Democratic headquarters? Binney: We don’t know that for sure, either.  All we know was that it was a local download.  We can likely attribute it to a USB device that was physically passed along.
  • Right now, our government is violating the first, fourth and fifth amendments in various ways.  Mueller did it, Comey did it, they were all involved in violating the Constitution.
  • Bernstein:  There seems to be a new McCarthyite operation around the Russia-gate investigation.  It appears that it is an attempt to justify the idea that Clinton lost because the Russians undermined the election. Binney: I have seen no evidence at all from anybody, including the intelligence community.  If you look at the Intelligence Community Assessment (ICA) report, they state on the first page that “We have high confidence that the Russians did this.”  But when you get toward the end of the report, they basically confess that “our judgment does not imply that we have evidence to back it up.” Bernstein:  It was initially put out that seventeen intelligence agencies found compelling evidence that the Russians hacked into our election.  You’re saying it was actually selected individuals from just three agencies.  Is there anything to the revelations that FBI agents talked about taking action to prevent Trump from becoming president? Binney: It certainly does seem that it is leaning that way, that is was all a frame-up.  It is a sad time in our history, to see the government working against itself internally. Bernstein:  I take it you are not a big supporter of Trump. Binney:  Well, I voted for him.  I couldn’t vote for a warmonger like Clinton.  She wanted to see our planes shooting down Russian planes in Syria.  She advocated for destabilizing Libya, for getting rid of Assad in Syria, she was a strong backer of the war in Iraq.
« First ‹ Previous 361 - 373 of 373
Showing 20 items per page