Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "IT" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

US-Saudi Blitz into Yemen: Naked Aggression, Absolute Desperation | Global Research - Centre for Research on Globalization - 0 views

  • The “proxy war” model the US has been employing throughout the Middle East, Eastern Europe, and even in parts of Asia appears to have failed yet again, this time in the Persian Gulf state of Yemen. Overcoming the US-Saudi backed regime in Yemen, and a coalition of sectarian extremists including Al Qaeda and its rebrand, the “Islamic State,” pro-Iranian Yemeni Houthi militias have turned the tide against American “soft power” and has necessitated a more direct military intervention. While US military forces themselves are not involved allegedly, Saudi warplanes and a possible ground force are. Though Saudi Arabia claims “10 countries” have joined its coalition to intervene in Yemen, like the US invasion and occupation of Iraq hid behind a “coalition,” it is overwhelmingly a Saudi operation with “coalition partners” added in a vain attempt to generate diplomatic legitimacy. The New York Times, even in the title of its report, “Saudi Arabia Begins Air Assault in Yemen,” seems not to notice these “10” other countries. it reports:
  • Saudi Arabia announced on Wednesday night that it had launched a military campaign in Yemen, the beginning of what a Saudi official said was an offensive to restore a Yemeni government that had collapsed after rebel forces took control of large swaths of the country.  The air campaign began as the internal conflict in Yemen showed signs of degenerating into a proxy war between regional powers. The Saudi announcement came during a rare news conference in Washington by Adel al-Jubeir, the kingdom’s ambassador to the United States.
  • Indeed, the conflict in Yemen is a proxy war. Not between Iran and Saudi Arabia per say, but between Iran and the United States, with the United States electing Saudi Arabia as its unfortunate stand-in. Iran’s interest in Yemen serves as a direct result of the US-engineered “Arab Spring” and attempts to overturn the political order of North Africa and the Middle East to create a unified sectarian front against Iran for the purpose of a direct conflict with Tehran. The war raging in Syria is one part of this greater geopolitical conspiracy, aimed at overturning one of Iran’s most important regional allies, cutting the bridge between it and another important ally, Hezbollah in Lebanon. And while Iran’s interest in Yemen is currently portrayed as yet another example of Iranian aggression, indicative of its inability to live in peace with its neighbors, US policymakers themselves have long ago already noted that Iran’s influence throughout the region, including backing armed groups, serves a solely defensive purpose, acknowledging the West and its regional allies’ attempts to encircle, subvert, and overturn Iran’s current political order.
  • ...4 more annotations...
  • What may result is a conflict that spills over Yemen’s borders and into Saudi Arabia proper. Whatever dark secrets the Western media’s decades of self-censorship regarding the true sociopolitical nature of Saudi Arabia will become apparent when the people of the Arabian peninsula must choose to risk their lives fighting for a Western client regime, or take a piece of the peninsula for themselves. Additionally, a transfer of resources and fighters arrayed under the flag of the so-called “Islamic State” and Al Qaeda from Syria to the Arabian Peninsula will further indicate that the US and its regional allies have been behind the chaos and atrocities carried out in the Levant for the past 4 years. Such revelations will only further undermine the moral imperative of the West and its regional allies, which in turn will further sabotage their efforts to rally support for an increasingly desperate battle they themselves conspired to start.
  • The aerial assault on Yemen is meant to impress upon onlookers Saudi military might. A ground contingent might also attempt to quickly sweep in and panic Houthi fighters into folding. Barring a quick victory built on psychologically overwhelming Houthi fighters, Saudi Arabia risks enveloping itself in a conflict that could easily escape out from under the military machine the US has built for it. it is too early to tell how the military operation will play out and how far the Saudis and their US sponsors will go to reassert themselves over Yemen. However, that the Houthis have outmatched combined US-Saudi proxy forces right on Riyadh’s doorstep indicates an operational capacity that may not only survive the current Saudi assault, but be strengthened by it. Reports that Houthi fighters have employed captured Yemeni warplanes further bolsters this notion – revealing tactical, operational, and strategic sophistication that may well know how to weather whatever the Saudis have to throw at it, and come back stronger.
  • The unelected hereditary regime ruling over Saudi Arabia, a nation notorious for egregious human rights abuses, and a land utterly devoid of even a semblance of what is referred to as “human rights,” is now posing as arbiter of which government in neighboring Yemen is “legitimate” and which is not, to the extent of which it is prepared to use military force to restore the former over the latter. The United States providing support for the Saudi regime is designed to lend legitimacy to what would otherwise be a difficult narrative to sell. However, the United States itself has suffered from an increasing deficit in its own legitimacy and moral authority. Most ironic of all, US and Saudi-backed sectarian extremists, including Al Qaeda in Yemen, had served as proxy forces meant to keep Houthi militias in check by proxy so the need for a direct military intervention such as the one now unfolding would not be necessary. This means that Saudi Arabia and the US are intervening in Yemen only after the terrorists they were supporting were overwhelmed and the regime they were propping up collapsed. In reality, Saudi Arabia’s and the United States’ rhetoric aside, a brutal regional regime meddled in Yemen and lost, and now the aspiring global hemegon sponsoring it from abroad has ordered it to intervene directly and clean up its mess.
  • the Yemeni people are not being allowed to determine their own affairs. Everything up to and including military invasion has been reserved specifically to ensure that the people of Yemen do not determine things for themselves, clearly, because it does not suit US interests. Such naked hypocrisy will be duly noted by the global public and across diplomatic circles. The West’s inability to maintain a cohesive narrative is a growing sign of weakness. Shareholders in the global enterprise the West is engaged in may see such weakness as a cause to divest – or at the very least – a cause to diversify toward other enterprises. Such enterprises may include Russia and China’s mulipolar world. The vanishing of Western global hegemony will be done in destructive conflict waged in desperation and spite. Today, that desperation and spite befalls Yemen.
  •  
    Usually I agree with Tony Cartalucci, but I think it's too early to pick winners and losers in Yemen. At least a couple of other nations allied with the Saudis are flying aerial missions and there's a commitment of troops and air support by Egypt, although it isn't clear that these would enter Yemen, but may just deploy to "protect" the waters approaching the Suez Canal from the Yemenis. The Saudis have a surfeit of U.S. weaponry but their military is inexperienced. The House of Saud has preferred proxy wars conducted by Salafist mercenaries over direct military intervention. How effective its military will be is a very big unknown at this point. But I like Cartalucci's point that if the House of Saud has to send in its ISIL mercenaries, it will go a long way toward unmasking the U.S. excuse for invading Syria and resuming boots on the ground in Iraq.
Gary Edwards

Arnold Ahlert: The Real American Divide - The Patriot Post - 0 views

  • Nancy Pelosi and Hillary Clinton provided great examples of the Ruling Class' arrogant mindset. Pelosi believes, as she stated last week, that white, non-college-educated men who vote Republican have “voted against their own economic interests because of guns, because of gays, and because of God — the three G’s, God being the woman’s right to choose.” Clinton was worse. Regarding abortion on demand, she insisted last year that “deep-seated cultural codes, religious beliefs and structural biases have to be changed.” In other words, one embraces the progressive elitist viewpoint, or one is a religiously inspired bigot with a passé worldview that must be demolished. Thus it is no surprise these elitists conflate anything that dissents from their globalist agenda as a “world of wall-builders,” who have “already done great damage,” states The Economist. That damage includes the Brexit, the rise of nationalist (read: right-wing) parties, and “more electoral victories for closed-world types who pose the greatest threat since Communism.” In other words, elitists disdain national sovereignty and democratically determined destiny, logical responses to skyrocketing levels of elitist-enabled terrorism and uncontrolled immigration, and deeply felt concerns by non-elitists about a global economy that has devastated millions left behind in its wake.
  • The Ruling Class “solutions” for Country Class problems? “Let goods and investment flow freely, but strengthen the social safety-net to offer support and new opportunities for those whose jobs are destroyed,” The Economist states. “To manage immigration flows better, invest in public infrastructure, ensure that immigrants work and allow for rules that limit surges of people.” Codevilla explains what this really means, noting that “our Ruling Class' first priority in any and all matters, its solution to any and all problems, is to increase the power of the government — meaning those who run it, meaning themselves.” To achieve that end, new laws are longer than ever, “because length is needed to specify how people will be treated unequally.” Thus, these laws become “primarily grants of discretion,” because “all anybody has to know about them is whom they empower.” Codevilla adds, “This defines ‘crony capitalism.’”
  • If that sounds familiar, maybe it’s because WikiLeak emails reveal the DNC granted itself the sole discretion to empower Hillary Clinton’s presidential nomination, right from the beginning. Thus, when Hillary spoke of “bringing people together” during her speech at the convention, it was really about doing so on her and her fellow insiders' terms. And when she promised to get money out of politics, it can be assumed the billions of dollars that have flowed into the Clinton Foundation — dollars that conspicuously align themselves with a number of dubious initiatives — will remain exempt, even as another sham investigation of Clinton behavior conducted by an equally corrupted IRS lends an imprimatur of genuine concern to the spectacle. “If Americans, or at least a majority of them, have not completely lost their own self-regard as a free people, then the November election should turn out to be a referendum on the ‘ruling class,’ and a massive repudiation of Hillary Clinton’s sense of entitlement to be the first woman elected President of the United States,” writes American Thinker’s Salim Mansur. Perhaps. But traditional thinking dies hard. And a corrupt mainstream media — epitomized by CNN anchor Wolf Blitzer and Chief Political Analyst Gloria Borger drinking wine and celebrating with Democrat delegates at the convention’s conclusion — isn’t about to jeopardize their own Ruling Class status to provide the Country Class with any potentially unifying political insight. Which brings us to Donald Trump. In exclusive communication with The Patriot Post, Codevilla maintained there were no circumstances under which he could support Hillary or any other Democrat, but his view of Trump “is more unfavorable than ever.” He does, however, grant that Trump “is the lesser of two evils.” He sees both candidates as “identical in their disregard for the U.S. Constitution and in the establishment of a post-republican regime — an empire of the will, by of and for favored sectors of the ruling class.”
  • ...3 more annotations...
  • No doubt Codevilla’s take resonates with millions of Americans appalled by a broken, Ruling Class-dominated political system that produced both candidates. Yet realistically, we are faced with a binary choice, made by either commission or omission. And while Codevilla believes “there is no vehicle for opposition” as yet to a Ruling Class “represented by the establishment of both parties,” our own Mark Alexander warns that “the outcome of the November election will not only determine our president for at least the next four years, but also the composition of the Supreme Court for at least the next quarter-century.” That quarter century could be one in which a constitutionally contemptuous Supreme Court majority appointed by Hillary Clinton makes representative government obsolete, and eliminates any chance, short of armed revolution, for the Country Class to take America back from the Ruling Class. A nation where, as Ayn Rand put it, “The government is free to do anything it pleases, while the citizens may act only by permission.” A Trump presidency may be nothing more than a distasteful, bite-the-bullet
  • impediment to Ruling Class hegemony. But it is better than no impediment at all.
  • “While most Americans pray to the God who created us in His own image, our Ruling Class prays to themselves as saviors of the planet and as shapers of mankind in their own image.” —from The Ruling Class: How They Corrupted America and What We Can Do About It by Angelo Codevilla, 2010. While many still frame the 2016 election in terms of Democrats vs. Republicans, those divisions are losing their meaning. This election could be the first one in which Americans will eIther choose to continue abiding a globalist Ruling Class and their government-dominant, one-world agenda, or decide that national sovereignty, the ConstItution and American exceptionalism and individualism are worth preserving. To be clear, nationalism does not equal protectionism, nativism or Islamophobia, nor is It solely embraced by know-nothing rubes unworthy of serious consideration — despIte the ongoing efforts of the Ruling Class to paint It that way. Codevilla calls people who oppose the Ruling Class the Country Class, and he describes It as a diverse, often inharmonious group that “shares above all the desire to be rid of rulers It regards as inept and haughty.”
  •  
    ""While most Americans pray to the God who created us in His own image, our Ruling Class prays to themselves as saviors of the planet and as shapers of mankind in their own image." -from The Ruling Class: How They Corrupted America and What We Can Do About It by Angelo Codevilla, 2010. While many still frame the 2016 election in terms of Democrats vs. Republicans, those divisions are losing their meaning. This election could be the first one in which Americans will eIther choose to continue abiding a globalist Ruling Class and their government-dominant, one-world agenda, or decide that national sovereignty, the ConstItution and American exceptionalism and individualism are worth preserving. To be clear, nationalism does not equal protectionism, nativism or Islamophobia, nor is It solely embraced by know-nothing rubes unworthy of serious consideration - despIte the ongoing efforts of the Ruling Class to paint It that way. Codevilla calls people who oppose the Ruling Class the Country Class, and he describes It as a diverse, often inharmonious group that "shares above all the desire to be rid of rulers It regards as inept and haughty." Ruling Class haughtiness, argues Codevilla, derives from "an educational system that exposed them to the same ideas and gave them remarkably uniform guidance," and engenders "a social canon of judgments about good and evil, complete wIth secular sacred history, sins … and saints," all conveyed in an "in" language that serves as their "badge of identIty." Irrespective of their professions, the Ruling Class is also unIted by the realIty that "their road up included government channels and government money. … Hence, whether formally in government, out of It, or halfway in, America's Ruling Class speaks the language and has the tastes, habIts, and tools of bureaucrats." Just as crItically, this "fraternIty" can only be joined by one who Codevilla says "shares the manners, the tastes, and the i
Gary Edwards

Limbaugh on Obama's 'Chip on His Shoulder,' the Phenomenon of the 'Not-Romney' and the GOP's Fear of Conservatives - Interviews - On the Record - Fox News - 0 views

  •  
    Awesome!  Once again Rush takes us to school. excerpt: VAN SUSTEREN: I guess I mean a motive to -- an intentional motive to hurt the country, versus his (Obama) ideology is one that the way you achieve ideals is different values. LIMBAUGH: This is the question. We are living under a number of assumptions about Obama that have been presented to us by elites of both parties. One of the illusions is Obama's brilliant, that he's smarter than anybody else in the room, messianic. We have never had a politician like this in our midst, we were told in 2007, 2008. Nobody like Obama has ever trod our soil. He was going to unify us. The world was going to love us again. it's going to lower the sea levels. I mean, ridiculous stuff. So the question is, is he just dumb? Does he really believe this economic stuff? Does he really believe that taking capital, money out of the private sector and transferring it to government and unions is the way you grow the private sector? Is that the way (INAUDIBLE) Does he really believe that? Is he that ill educated? Is he the product of nothing other than the American education system and whoever influenced him at home when he was young? Or is he an ideologue? Is he a Marxist socialist who has an agenda that's oriented toward cutting the country down to size? I mean, that's the question. For me, the answer to the question is irrelevant. I think that whatever he's doing, why he's doing it, it's obvious he is doing it. He is taking steps, these 10 policies that are injurious to the country, injurious to individuals, targeting as the enemy the people who work in this country, targeting as the enemy that people that pay taxes. This business of this Occupy Wall Street crowd, which is his -- it was created I think on the basis that Romney was going to be the Republican nominee. Romney's Wall Street, so you get Obama's band out there, Occupy Wall Street, protesting. it was set up to oppose Romney -- Wall Street blamed for all these ills in the e
Paul Merrell

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional commIttee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial instItutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms wIth Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency wIth which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of Its largest.19 The polItical clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. it let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. it could not do anything. it could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘it was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 it also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter MarItime Bank, which interlocked wIth BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 it is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. it is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. it may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
Paul Merrell

Will Aleppo become the capital of a new Caliphate? | Middle East Eye - 0 views

  • The “mother of all battles” is what a looming showdown in Aleppo is being called, as revitalised Islamist rebel forces fresh from victories in nearby Idlib are preparing to mount an all-out offensive in the next few weeks to seize the remaining part of the city under government control. The stakes couldn’t be any higher - no less than the fate of the Syrian nation hangs in the balance - and the final lines of division might be drawn here.The plan, drawn up by the insurgency’s three most powerful regional backers - Turkey, Saudi and Qatar - is to overrun the entire northwest of Syria and create a rebel controlled “safe zone,” and through direct military intervention prevent the Syrian regime’s aircraft and missiles from targeting it, thereby essentially setting up a de facto mini state.To that end, there has been unprecedented cooperation and coordination between those powers who have put aside their rivalries and differences after King Salman of Saudi assumed the throne. This effort has seen them pour enormous financial, logistical and military resources into setting up what is called the “Fatih Army” or the Army of Conquest, and controlling the flow of its battles directly through an operations room in Turkey as well as intelligence officers on the ground. This was given the go ahead by the US, which under pressure from those allies again seems to have flipped its priority in Syria from battling the Islamic State (IS) to regime change.
  • The “mother of all battles” is what a looming showdown in Aleppo is being called, as revitalised Islamist rebel forces fresh from victories in nearby Idlib are preparing to mount an all-out offensive in the next few weeks to seize the remaining part of the city under government control. The stakes couldn’t be any higher - no less than the fate of the Syrian nation hangs in the balance - and the final lines of division might be drawn here.The plan, drawn up by the insurgency’s three most powerful regional backers - Turkey, Saudi and Qatar - is to overrun the entire northwest of Syria and create a rebel controlled “safe zone,” and through direct military intervention prevent the Syrian regime’s aircraft and missiles from targeting it, thereby essentially setting up a de facto mini state.To that end, there has been unprecedented cooperation and coordination between those powers who have put aside their rivalries and differences after King Salman of Saudi assumed the throne. This effort has seen them pour enormous financial, logistical and military resources into setting up what is called the “Fatih Army” or the Army of Conquest, and controlling the flow of its battles directly through an operations room in Turkey as well as intelligence officers on the ground. This was given the go ahead by the US, which under pressure from those allies again seems to have flipped its priority in Syria from battling the Islamic State (IS) to regime change.
  • It is worth mentioning that after almost a year of US-led coalItion bombing, IS has continued to expand and grow, and now controls half of Syria and a third of Iraq. US policy here, as many had foreseen, is a confused and muddled disaster.If the name of the Fatih Army sounds ominous, then Its composItion is even more disturbing, being made up primarily of al-Qaeda’s affiliate Jabhat al-Nusra, as well as other hardline Salafi jihadist groups like Ahrar el-Sham. This army has already “conquered” most of Idlib province, and is looking to go for Aleppo next.
  • ...6 more annotations...
  • This once tolerant, secular, multicultural and multi-confessional nation with a diverse society and rich heritage will soon become home to two of the world’s most noxious, extremist and violently fanatical statelets. In their wake, all of Syria’s non-Sunni Muslim inhabitants are being ethnically cleansed and displaced. Predictably, this is what happened in Idlib after it fell to the Fatih Army, which saw all of its Christians abandon their homes and flee to government-controlled areas, to little media attention. This will undoubtedly happen in Aleppo too, which has a very large Christian population comprised of various denominations, including ethnic Armenians.Leaders of the Christian community here have sounded the alarm, and warned that after surviving for countless centuries in one of the first lands inhabited by ancient Christians, their presence here might be coming to a final end. Again, the absence of any media concern about this impending calamity is very telling.The backers of the insurgency have now dropped any pretence of “moderate” rebel groups fighting the Syrian regime, and have almost completely ditched and sidelined the umbrella opposition in exile which they for so long touted as the “legitimate representatives” of the Syrian people. In their stead, we now have an al-Qaeda army preparing to “liberate” north Syria.
  • Gone are all those grand slogans along with the “moderate” rebel groups we have heard so much about in the news, who after all these years proved to be little more than incompetent and corrupt profiteers. Those groups disintegrated, many of their former fighters joining the extremist jihadist groups who also seized their sophisticated US supplied weapons.This rebel farce of course was well known to us Syrians, but was never a newsworthy item. We’ve always known that the only effective insurgents on the ground were the Islamists and the jihadists, and that the others were there for show, for the camera crews and media consumption. Maintaining this image no longer seems to be a concern however. After failing to convince Nusra to “rebrand” and ditch its ties with al-Qaeda, The Fatih Army was formed as a more palatable and purely cosmetic media-friendly cover name.
  • Partitioning SyriaThis is what the nations who claim to back the Syrian people’s aspirations for freedom and a democratic inclusive state have deemed fit to unleash upon us. After failing to topple the Syrian regime for four years and realising there would never be any political compromise that would fit their goals, they have now decided to partition Syria and facilitate its partial takeover by jihadists.it doesn’t seem that previous lessons have been learned, with Afghanistan being the prime precedent. You simply cannot deal with and hope to control the jihadi proxies that you are using to fulfil your military ambitions. Quite simply those groups don’t play by the rules, and will turn on you the first chance they get and follow their own ideologically motivated agendas. The repercussions of doing so have always been, and will continue to be, extremely dangerous and profound.
  • Needless to say, the majority of Syrians refuse the partitioning of their nation and its takeover by extremists under any pretexts. But that this pretext should be “freeing them from tyranny and oppression” is yet another sad little irony in the black comedy that is Syria’s conflict.This is felt especially acutely in Aleppo, whose helpless people have endured years of a deadly stalemated war that has killed many of them and destroyed all they held precious. it now seems they must again dread the day they will be “conquered” and “liberated” as it would likely mean the loss of what little they still have left of their city, and what little hope they still hold for the future.
  • In all likelihood, Aleppo becoming the capital of yet another caliphate would see the majority of its inhabitants abandoning it in droves, and the complete loss of its religious minorities, hence its unique character and identity.The people here are bracing themselves for the worst, for a momentous battle ahead. The outcome of this battle is by no means a foregone conclusion though, as Syria’s ambassador to the UN has warned in no uncertain terms that Aleppo is a red line, which once crossed would see the escalation of the conflict to other nations. Whether these words are empty and mere rhetoric remains to be seen and depends largely on what the regime’s prime backer, Iran, decides to do.
  • This month is a very sensitive time for Iran, as it prepares to sign a historic nuclear agreement while regional tensions are soaring. While the ball is now squarely in its park with regards to Syria, it may choose to delay its move until the picture becomes clearer.Speculation is rife that along with the nuclear deal, regional issues are being hammered out too. Could it be that Iran would accept the partitioning of Syria as long as it gets to keep a majority Shia and Alawi “protectorate” along the coast? Or is it sticking to its guns and thwarting the planned “mother of all battles” in Aleppo by demanding it be stopped, or threatening a serious escalation if it isn’t? How will the flow of war and proxy showdown in Yemen affect Syria?The coming weeks will tell, and they will be some of the most difficult the people of Syria and Aleppo have seen yet. 
  •  
    The Aleppo region is well to the north of Tartus, where the Russians have there only  naval base in the Mediterranean, but Russia has a vested interest in Syria surviving intact. Look for a Russian move soon to blunt the planned attack on Aleppo. You can bet that the Russian, Iranian, and Syrian governments are working together on a strategy.  
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. it was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. it was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINitE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. it stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. it was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. it occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. it was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Paul Merrell

Did Israeli army deliberately kill its own captured soldier and destroy Gaza ceasefire? | The Electronic Intifada - 0 views

  • On Saturday evening, the Israeli army stated that Hadar Goldin, the soldier it claimed Hamas had captured on Friday morning, is dead: on Twitter A special IDF committee has concluded that Lt. Hadar Goldin was killed in combat in Gaza on Friday. May his memory be a blessing.— IDF (@IDFSpokesperson) August 2, 2014 it was on the pretext of searching for the missing soldier that Israel slaughtered at least 110 of people in the southern Gaza town of Rafah since Friday morning, destroying what was supposed to be a 72-hour humanitarian ceasefire. But the toll is rising as more bodies are found. “Such was the savagery of Israel’s bombardment in Rafah, such was the quantity of dead bodies, that there was simply no other option but to use vegetable refrigerators as makeshift morgues,” journalist Mohammed Omer, who hails from Rafah, reports.
  • One wonders whether US President Barack Obama will now retract his hasty statement – no doubt based on misinformation from Israel – blaming Hamas for capturing the soldier and demanding that he be “unconditionally” released. Now that Israel has, like Hamas, concluded that Goldin is dead, the question remains whether someone in the Israeli army gave the order to shell Rafah to kill him and prevent Hamas taking a live prisoner.
  • Friday turned into yet another day of horror for Palestinians in Gaza, as Israel committed massacres and atrocities claiming the lives of at least 100 people. it wasn’t supposed to be that way. Friday was meant to be the first day of a three-day “humanitarian ceasefire” announced on Thursday evening by the United Nations and the United States.
  • ...9 more annotations...
  • Israel has long had a murky procedure called the Hannibal Directive that some interpret as an order to do whatever it takes to prevent a soldier’s capture, even if it means killing him in the process.
  • Here’s Israel’s version, as reported in Ynet: According to an announcement by the IDF [Israeli army], at 9:30 am Friday, terrorists opened fire at IDF forces in southern Gaza. Initial information from the scene indicated that there is a chance that an IDF soldiers [sic] was kidnapped [sic] during the incident. Israel claims that the soldiers were working to destroy a resistance tunnel and that such “defensive” activities were permitted by the ceasefire agreement. What Israel does not dispute is that its occupation forces were carrying out operations in the Gaza Strip.
  • But an interesting observation comes from this tweet: on Twitter Just returned from Southern gaza - got to border with Israel multiple artillery barrages whilst there an hour after supposed ceasefire— Rageh Omaar (@ragehomaar) August 1, 2014 If Omaar is right, this would mean that Israel was already heavily shelling in the Rafah area by around 9am, since the ceasefire was supposed to begin at 8am. And if the artillery barrages followed the killing and alleged capture of Israeli soldiers by Qassam it would also mean that the incident could have occurred before 9:30am.
  • Around 10am many more reports started to come in of mass casualties from “indiscriminate shelling” on George Street, east of Rafah. If the shelling indeed began between 9 and 10am, it would mean that Israel launched a massive and indiscriminate barrage at just about the time it says its soldier was captured. This makes no sense if Israeli forces wanted to ensure the captured soldier’s safety. After all, he could be killed along with his captors.
  • Qassam did not comment for the whole of Friday on Israel’s assertion that one of its soldiers was captured. Early on Saturday it issued a new military communiqué condemning the “ongoing horrifying massacre of civilians in Rafah” and reaffirming its earlier version and timeline of events. But it has these important additions: We lost contact with the group of fighters that were stationed at that location and we believe that all members of the unit were martyred and the soldier the enemy says went missing was killed in the Zionist shelling, assuming that the fighters did capture him during the confrontation. We in Qassam have no knowledge up to this moment about the missing soldier, nor his whereabouts nor the circumstances of his disappearance. it is reasonable to assume that Qassam has no motive to be deceptive about this; a captured Israeli soldier is a valuable asset. If they had him they would either boast about it or keep quiet and perhaps seek to trade information about him for concessions from Israel.
  • If the Israeli soldier was killed, it is possible that it was unintentional “friendly fire.” But again, forces that were intent on protecting and rescuing a missing soldier would be foolhardy to launch massive air raids or barrages of artillery fire in the area where he was captured. This leaves open the question of whether Israeli forces intended to kill the missing soldier. The Hannibal Directive The “Hannibal Directive” captured the Israeli imagination in the mid-1980s, when ongoing incursions and occupation in Lebanon, following the 1982 invasion, confronted the Israeli army with opportunities to experience capture. Popular understanding of this directive is phrased as “a dead soldier is better than a kidnapped [sic] one” – which was taken to mean that it would be better to kill a captured prisoner of war than have him remain alive.
  • There was much discussion on Twitter about this being the reason for the shelling of Rafah on Friday morning, including in reports from Ynet’s military reporter Attila Somfalvi, that the words “Hannibal! Hannibal!” were shouted over military communication systems.
  • Journalist Haim Har-Zahav reminisced that it took 50 minutes before the directive was put into practice on the Lebanon border, in 2006 and almost an hour in 1991, but that his own brigade took only a few minutes. Sports commentator Ouriel Daskal stated outright: “what I deduce from what’s happening in Rafah is that there’s an implementation of the Hannibal Directive. Let’s hope not.” Moreover, blogger Richard Silverstein reported a few days ago that another soldier was killed in Gaza under the directive. Israeli investigative journalist Ronen Bergman confirmed in a radio interview, with respect to an earlier incident, that in Gaza the procedure “was tested in practice and apparently the soldiers acted in accordance with that directive.”
  • But these indications, combined with the fact that Israel bombed Rafah so viciously make it a reasonable hypothesis that someone giving orders on Friday morning wanted the soldier dead rather than captured. If that is the case, then it is Israel that destroyed the humanitarian ceasefire, in the process murdering dozens more innocent people and pushing the death toll from the ongoing massacre in Gaza to more than 1,600 people.
  •  
    Ali Abunimah pieces together rather compelling evidence that the Israel Defense Force's utter devastation of Rafah, Gaza by artillery fire was an attack intended to kill one of its own soldiers they believed had been captured, and broke a cease-fire agreement to do so then lied about it, pursuant to the IDF's unwritten Hannibal Directive, that it is better to kill one of their own than to allow him to be kept captive. A serious war crime slaughtering over 100 civilians even without that.    
Paul Merrell

The Latest Rules on How Long NSA Can Keep Americans' Encrypted Data Look Too Familiar | Just Security - 0 views

  • Does the National Security Agency (NSA) have the authority to collect and keep all encrypted Internet traffic for as long as is necessary to decrypt that traffic? That was a question first raised in June 2013, after the minimization procedures governing telephone and Internet records collected under Section 702 of the Foreign Intelligence Surveillance Act were disclosed by Edward Snowden. The issue quickly receded into the background, however, as the world struggled to keep up with the deluge of surveillance disclosures. The Intelligence Authorization Act of 2015, which passed Congress this last December, should bring the question back to the fore. it established retention guidelines for communications collected under Executive Order 12333 and included an exception that allows NSA to keep ‘incidentally’ collected encrypted communications for an indefinite period of time. This creates a massive loophole in the guidelines. NSA’s retention of encrypted communications deserves further consideration today, now that these retention guidelines have been written into law. it has become increasingly clear over the last year that surveillance reform will be driven by technological change—specifically by the growing use of encryption technologies. Therefore, any legislation touching on encryption should receive close scrutiny.
  • Section 309 of the intel authorization bill describes “procedures for the retention of incidentally acquired communications.” It establishes retention guidelines for surveillance programs that are “reasonably anticipated to result in the acquisItion of [telephone or electronic communications] to or from a UnIted States person.” Communications to or from a UnIted States person are ‘incidentally’ collected because the U.S. person is not the actual target of the collection. Section 309 states that these incidentally collected communications must be deleted after five years unless they meet a number of exceptions. One of these exceptions is that “the communication is enciphered or reasonably believed to have a secret meaning.” This exception appears to be directly lifted from NSA’s minimization procedures for data collected under Section 702 of FISA, which were declassified in 2013. 
  • While Section 309 specifically applies to collection taking place under E.O. 12333, not FISA, several of the exceptions described in Section 309 closely match exceptions in the FISA minimization procedures. That includes the exception for “enciphered” communications. Those minimization procedures almost certainly served as a model for these retention guidelines and will likely shape how this new language is interpreted by the Executive Branch. Section 309 also asks the heads of each relevant member of the intelligence community to develop procedures to ensure compliance with new retention requirements. I expect those procedures to look a lot like the FISA minimization guidelines.
  • ...6 more annotations...
  • This language is broad, circular, and technically incoherent, so it takes some effort to parse appropriately. When the minimization procedures were disclosed in 2013, this language was interpreted by outside commentators to mean that NSA may keep all encrypted data that has been incidentally collected under Section 702 for at least as long as is necessary to decrypt that data. Is this the correct interpretation? I think so. it is important to realize that the language above isn’t just broad. it seems purposefully broad. The part regarding relevance seems to mirror the rationale NSA has used to justify its bulk phone records collection program. Under that program, all phone records were relevant because some of those records could be valuable to terrorism investigations and (allegedly) it isn’t possible to collect only those valuable records. This is the “to find a needle a haystack, you first have to have the haystack” argument. The same argument could be applied to encrypted data and might be at play here.
  • This exception doesn’t just apply to encrypted data that might be relevant to a current foreign intelligence investigation. It also applies to cases in which the encrypted data is likely to become relevant to a future intelligence requirement. This is some remarkably generous language. It seems one could justify keeping any type of encrypted data under this exception. Upon close reading, It is difficult to avoid the conclusion that these procedures were wrItten carefully to allow NSA to collect and keep a broad category of encrypted data under the rationale that this data might contain the communications of NSA targets and that It might be decrypted in the future. If NSA isn’t doing this today, then whoever wrote these minimization procedures wanted to at least ensure that NSA has the authorIty to do this tomorrow.
  • There are a few additional observations that are worth making regarding these nominally new retention guidelines and Section 702 collection. First, the concept of incidental collection as it has typically been used makes very little sense when applied to encrypted data. The way that NSA’s Section 702 upstream “about” collection is understood to work is that technology installed on the network does some sort of pattern match on Internet traffic; say that an NSA target uses example@gmail.com to communicate. NSA would then search content of emails for references to example@gmail.com. This could notionally result in a lot of incidental collection of U.S. persons’ communications whenever the email that references example@gmail.com is somehow mixed together with emails that have nothing to do with the target. This type of incidental collection isn’t possible when the data is encrypted because it won’t be possible to search and find example@gmail.com in the body of an email. Instead, example@gmail.com will have been turned into some alternative, indecipherable string of bits on the network. Incidental collection shouldn’t occur because the pattern match can’t occur in the first place. This demonstrates that, when communications are encrypted, it will be much harder for NSA to search Internet traffic for a unique ID associated with a specific target.
  • This lends further credence to the conclusion above: rather than doing targeted collection against specific individuals, NSA is collecting, or plans to collect, a broad class of data that is encrypted. For example, NSA might collect all PGP encrypted emails or all Tor traffic. In those cases, NSA could search Internet traffic for patterns associated with specific types of communications, rather than specific individuals’ communications. This would technically meet the definition of incidental collection because such activity would result in the collection of communications of U.S. persons who aren’t the actual targets of surveillance. Collection of all Tor traffic would entail a lot of this “incidental” collection because the communications of NSA targets would be mixed with the communications of a large number of non-target U.S. persons. However, this “incidental” collection is inconsistent with how the term is typically used, which is to refer to over-collection resulting from targeted surveillance programs. If NSA were collecting all Tor traffic, that activity wouldn’t actually be targeted, and so any resulting over-collection wouldn’t actually be incidental. Moreover, greater use of encryption by the general public would result in an ever-growing amount of this type of incidental collection.
  • This type of collection would also be inconsistent with representations of Section 702 upstream collection that have been made to the public and to Congress. Intelligence officials have repeatedly suggested that search terms used as part of this program have a high degree of specificity. They have also argued that the program is an example of targeted rather than bulk collection. ODNI General Counsel Robert Litt, in a March 2014 meeting before the Privacy and Civil Liberties Oversight Board, stated that “there is either a misconception or a mischaracterization commonly repeated that Section 702 is a form of bulk collection. it is not bulk collection. it is targeted collection based on selectors such as telephone numbers or email addresses where there’s reason to believe that the selector is relevant to a foreign intelligence purpose.” The collection of Internet traffic based on patterns associated with types of communications would be bulk collection; more akin to NSA’s collection of phone records en mass than it is to targeted collection focused on specific individuals. Moreover, this type of collection would certainly fall within the definition of bulk collection provided just last week by the National Academy of Sciences: “collection in which a significant portion of the retained data pertains to identifiers that are not targets at the time of collection.”
  • The Section 702 minimization procedures, which will serve as a template for any new retention guidelines established for E.O. 12333 collection, create a large loophole for encrypted communications. With everything from email to Internet browsing to real-time communications moving to encrypted formats, an ever-growing amount of Internet traffic will fall within this loophole.
  •  
    Tucked into a budget authorization act in December without press notice. Section 309 (the Act is linked from the article) appears to be very broad authority for the NSA to intercept any form of telephone or other electronic information in bulk. There are far more exceptions from the five-year retention limitation than the encrypted information exception. When reading this, keep in mind that the U.S. intelligence community plays semantic games to obfuscate what it does. One of its word plays is that communications are not "collected" until an analyst looks at or listens to partiuclar data, even though the data will be searched to find information countless times before it becomes "collected." That searching was the major basis for a decision by the U.S. District Court in Washington, D.C. that bulk collection of telephone communications was unconstitutional: Under the Fourth Amendment, a "search" or "seizure" requiring a judicial warrant occurs no later than when the information is intercepted. That case is on appeal, has been briefed and argued, and a decision could come any time now. Similar cases are pending in two other courts of appeals. Also, an important definition from the new Intelligence Authorization Act: "(a) DEFINitIONS.-In this section: (1) COVERED COMMUNICATION.-The term ''covered communication'' means any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage."       
Gary Edwards

Swimming with the Sharks: Goldman Sachs, School Districts, and Capital Appreciation Bonds | nsnbc international - 0 views

  • In 2008, after collecting millions of dollars in fees to help California sell its bonds, Goldman urged its bigger clients to place investment bets against those bonds, in order to profit from a financial crisis that was sparked in the first place by irresponsible Wall Street speculation. Alarmed California officials warned that these short sales would jeopardize the state’s bond rating and drive up interest rates. But that result also served Goldman, which had sold credit default swaps on the bonds, since the price of the swaps rose along with the risk of default.
  • In 2009, the lenders’ lobbying group than proposed and promoted AB1388, a California bill eliminating the debt ceiling requirement on long-term debt for school districts. After it passed, bankers traveled all over the state pushing something called “capital appreciation bonds” (CABs) as a tool to vault over legal debt limits. (Think Greece again.) Also called payday loans for school districts, CABs have now been issued by more than 400 California districts, some with repayment obligations of up to 20 times the principal advanced (or 2000%).
  • The controversial bonds came under increased scrutiny in August 2012, following a report that San Diego County’s Poway Unified would have to pay $982 million for a $105 million CAB it issued. Goldman Sachs made $1.6 million on a single capital appreciation deal with the San Diego Unified School District.
  • ...10 more annotations...
  • . . . AB1388, signed by then-Gov. Arnold Schwarzenegger in 2009, [gave] banks the green light to lure California school boards into issuing bonds to raise quick money to build schools. Unlike conventional bonds that have to be paid off on a regular basis, the bonds approved in AB1388 relaxed regulatory safeguards and allowed them to be paid back 25 to 40 years in the future. The problem is that from the time the bonds are issued until payment is due, interest accrues and compounds at exorbitant rates, requiring a balloon payment in the millions of dollars. . . . Wall Street exploited the school boards’ lack of business acumen and proposed the bonds as blank checks written against taxpayers’ pocketbooks. One school administrator described a Wall Street meeting to discuss the system as like “swimming with the big sharks.” Wall Street has preyed on these school boards because of the millions of dollars in commissions. Banks, financial advisers and credit rating firms have billed California public entities almost $400 million since 2007. [State Treasurer] Lockyer described this as “part of the ‘new’ Wall Street,” which “has done this kind of thing on the private investor side for years, then the housing market and now its public entities.”
  • The Federal Reserve could have made virtually-interest-free loans available to local governments, as it did for banks. But the Fed (whose twelve branches are 100% owned by private banks) declined. As noted by Cate Long on Reuters:
  • The Fed has said that it will not buy muni bonds or lend directly to states or municipal issuers. But be sure if yields rise high enough Merrill Lynch, Goldman Sachs and JP Morgan will be standing ready to “save” these issuers. There is no “lender of last resort” for muniland.
  • Among the hundreds of California school districts signing up for CABs were fifteen in Orange County. The Anaheim-based Savanna School District took on the costliest of these bonds, issuing $239,721 in CABs in 2009 for which it will have to repay $3.6 million by the final maturity date in 2034. That works out to $15 for every $1 borrowed. Santa Ana Unified issued $34.8 million in CABs in 2011. it will have to repay $305.5 million by the maturity date in 2047, or $9.76 for every dollar borrowed. Placentia-Yorba Linda Unified issued $22.1 million in capital appreciation bonds in 2011. it will have to repay $281 million by the maturity date in 2049, or $12.73 for every dollar borrowed.
  • In 2013, California finally passed a law limiting debt service on CABs to four times principal, and limiting their maturity to a maximum of 25 years. But the bill is not retroactive. In several decades, the 400 cities that have been drawn into these shark-infested waters could be facing municipal bankruptcy – for capital “improvements” that will by then be obsolete and need to be replaced.
  • Then-State Treasurer Bill Lockyer called the bonds “debt for the next generation.” But some economists argue that it is a transfer of wealth, not between generations, but between classes – from the poor to the rich. Capital investments were once funded with property taxes, particularly those paid by wealthy homeowners and corporations. But California’s property tax receipts were slashed by Proposition 13 and the housing crisis, forcing school costs to be borne by middle-class households and the students themselves.
  • According to Demos, per-student funding has been slashed since 2008 in every state but one – the indomitable North Dakota. What is so different about that state? Some commentators credit the oil boom, but other states with oil have not fared so well. And the boom did not actually hit in North Dakota until 2010. The budget of every state but North Dakota had already slipped into the red by the spring of 2009.
  • One thing that does single the state out is that North Dakota alone has its own depository bank.
  • The state-owned Bank of North Dakota (BND) was making 1% loans to school districts even in December 2014, when global oil prices had dropped by half. That month, the BND granted a $10 million construction loan to McKenzie County Public School No. 1, at an interest rate of 1% payable over 20 years. Over the life of the loan, that works out to $.20 in simple interest or $.22 in compound interest for every $1 borrowed. Compare that to the $15 owed for every dollar borrowed by Anaheim’s Savanna School District or the $10 owed for every dollar borrowed by Santa Ana Unified.
  • How can the BND afford to make these very low interest loans and still turn a profit? The answer is that its costs are very low. it has no exorbitantly-paid executives; pays no bonuses, fees, or commissions; pays no dividends to private shareholders; and has low borrowing costs. it does not need to advertise for depositors (it has a captive deposit base in the state itself) or for borrowers (it is a wholesale bank that partners with local banks, which find the borrowers). The BND also has no losses from derivative trades gone wrong. it engages in old-fashioned conservative banking and does not speculate in derivatives. Unlike the vampire squids of Wall Street, it is not motivated to maximize its bottom line in a predatory way. its mandate is simply to serve the public interest.
  •  
    " Remember when Goldman Sachs - dubbed by Matt Taibbi the Vampire Squid - sold derivatives to Greece so the government could conceal its debt, then bet against that debt, driving it up? it seems that the ubiquitous investment bank has also put the squeeze on California and its school districts. Not that Goldman was alone in this; but the unscrupulous practices of the bank once called the undisputed king of the municipal bond business epitomize the culture of greed that has ensnared students and future generations in unrepayable debt."
Paul Merrell

CNN apologizes for commentator who called WikiLeaks founder a 'pedophile' | McClatchy DC - 0 views

  • In fact, the pedophile allegation has little to do with Assange’s plight that has kept him in the embassy in London, which involves incidents in Stockholm in the summer of 2010.
  • Rather, it is a bizarre tale involving a Houston-based dating website and its global and well-funded efforts to discredit Assange around the globe. The byzantine saga involves disconnected telephones and mystery websites. The website, toddandclare.com, launched and ramped up its efforts against Assange during the U.S. presidential campaign, as WikiLeaks released hacked emails related to the campaign of Democratic nominee Hillary Clinton.Whoever is behind the dating site has marshaled significant resources to target Assange, enough to gain entry into a United Nations body, operate in countries in Europe, North America and the Caribbean, conduct surveillance on Assange’s lawyer in London, obtain the fax number of Canada’s prime minister and seek to prod a police inquiry in the Bahamas.The dating site’s campaign sought to thwart WikiLeaks’ efforts and discredit Assange, who played a role in a presidential campaign season that deeply divided the U.S. electorate and illuminated Russia as a major cyber adversary of the U.S. government.One part of toddandclare’s two-pronged campaign put a megaphone to unproven charges that Assange made contact with a young Canadian girl in the Bahamas through the internet with the intention of molesting her. The second part sought to entangle him in a plan to receive $1 million from the Russian government.
  • WikiLeaks claims the dating site is “a highly suspicious and likely fabricated” company. In turn, the company has lashed out at Assange and “his despicable activities against American national security,” and warned journalists to “check with your libel lawyers first before printing anything that could impact or endanger innocent people’s lives.”For nearly two months after the October allegations, toddandclare.com went off line. But it recently reappeared, repeating charges about the 8-year-old Canadian girl. The website did not immediately respond Thursday to a new query from McClatchy, and no respondent in the past has given a name or allowed telephone contact.The online company paints itself as all-American. Online material says its founders, Todd and Clare Hammond, “are an average American couple from Michigan, who met in the eighth grade.” In 2011, the company says, the Christian couple started an email dating service, and “have married 3,000 couples to date.” Their online network began in 2015, and a statement it filed to a U.N. body says it has “100,000+ female singles” in six countries. The company’s operating address is a warehouse loading dock in Houston. its mail goes to a Houston drop box. its phone numbers no longer work. WikiLeaks says Texas officials tell it the entity is not registered there either under toddandclare.com or a parent company, T&C Network Solutions.A person who answered emails to the website in November declined to identify him or herself.
  • ...5 more annotations...
  • The people behind toddandclare.com persuaded a U.N. body known as the Global Compact to give it status as a participant in May, and it submitted an eight-page report to the U.N. group Oct. 4 carefully laying out its allegations against Assange. The firm was delisted by the U.N. body eight days later amid controversy over its claims. The report was later taken off the internet. An Australian lawyer, Melinda Taylor, said the report’s precise language raised additional suspicions at WikiLeaks, where she assists Assange in human rights litigation.“This is not a report that’s been drafted by a dating agency. it’s highly legalistic and very structured. it’s the language of someone who has drafted complex legal submissions,” she said.Under Todd Hammond’s name, the report alleged that Assange’s Swedish lawyer had reached out in June to offer Assange’s services on a campaign against rape in exchange for an undisclosed amount of bitcoin. it said the two sides held two videoconferences.Then came the bombshell: it said the company had ended ties with Assange following “pedophile crimes” he had committed in the Bahamas in late September. it charged that the victim was the 8-year-old daughter of a Canadian couple on a monthlong yachting vacation. The father went to police in Nassau on Sept. 28, the report claimed, charging that his family held video and chat logs showing Assange “internet grooming” the child and “propositioning the 8-year-old juvenile ‘to perform oral and anal sex acts.’ ”it said Assange made a connection to the child’s 22-year-old sister, who was a client of the online dating site, from his refuge in London, eventually gaining access to the young girl.
  • An assistant commissioner for the Royal Bahamas Police Force, Stephen Dean, said “there is no investigation” into any such incident and that the police have received no evidence that such an incident occurred.“We got a phone call of someone giving us some information. But we never had a face-to-face. It could have been a hoax,” Dean said. “We don’t know.”If someone were in possession of video or chat logs about a pedophile crime, he or she did not provide them to Bahamian police, Dean said, which he said would be odd: “If you have something so significant, I think you’d want to leave a report.”Assange’s Swedish lawyer, Per Samuelson, wrote to the U.N. body on Oct. 10 alleging that Hammond’s report against Assange was “entirely false” in all Its facets and that he had had no contact wIth the dating sIte or Hammond.Even as authorIties in the Bahamas dismissed the report, the dating sIte sent a fax Oct. 17 to Canadian Prime Minister Justin Trudeau saying the Canadian family had fled the Bahamas due to “anti-whIte, racist abuse by Bahamian police.”“Julian Assange ... has started a smear campaign to claim our dating company is behind an elaborate scam. It is fully to be expected. Pedophiles are devious and cunning,” the fax said.The company said It would “continue to protect the family’s identIty, until eIther the (Royal Bahamas Police Force) conduct a proper investigation, or hell freezes over. Whichever comes first.”
  • The fax was signed, “The Todd and Clare Team,” and left no way to contact the firm.While the founders of toddandclare.com say they’ve been in the matchmaking business since 2011, their internet presence dates only to September 2015 and really got going only early last year. Those who have done work for the company say they were kept at arm’s length.By summer, in the run-up to what many expected to be an “October surprise” from WikiLeaks to make an impact on the U.S. election, toddandclare.com began moving against Assange in multiple countries simultaneously. The DNC and a cyber-threat intelligence firm it had hired, CrowdStrike, were already fingering Russia as behind the hacks that would provide the fodder for WikiLeaks. They’d said in June that Russian hackers had access to DNC servers for about a year.A company representative, identifying herself as Hannah Hammond, emailed Assange’s Swedish and British legal agents offering $1 million for him to appear in a five-minute tongue-in-cheek television advertisement. In a subsequent exchange Sept. 19, the representative wrote that “the source of the $1,000,000 is the Russian government.”In a curious twist, she offered what she said were three facts about Assange’s London attorney that are “unknown to the public,” including details inside her home and an event in her son’s life, suggesting a capability to conduct surveillance.Taylor, the Assange lawyer, said the details appeared “to create the impression that the members of his team were under close surveillance and/or to bolster the bona fides of the claim that the offer was linked to a State. its inclusion does appear quite menacing.”
  • A lawyer identifying himself only as “James” responded the next day, slamming the offer as an “elaborate scam designed to entrap” Assange and embarrass him for ties to Russia.The dating site representative sought to pull the veil off “James.”“Julian: We know it’s you writing. The offer expires at midnight, October 31st 2016,” she wrote back on Sept. 21, according to copies of the emails posted by WikiLeaks on its website.By early October, toddandclare.com went on the offensive. it filed a civil complaint in a British court against Assange, seeking 295 pounds sterling – about $359 – in damages because it said it could no longer use his services due to the “child sex offenses in Nassau.”The suit, said Taylor, Assange’s lawyer, “seems to be designed to evade defamation law in the U.K. They’ve put highly noxious information knowing that it would be made public.”The global tussle between the online dating company and WikiLeaks went public in mid-October when the anti-secrecy group voiced public doubt on whether toddandclare.com actually existed, or served only as a vehicle to attack Assange.
  • The announcement opened the gates for a disparate crew of internet sleuths – some motivated by hatred of Clinton and others impelled by support for WikiLeaks – to probe into the history of toddandclare.com, suspicious that the dating site might be an undercover operation with links to the Clinton campaign.Posting their findings on the discussion websites like Reddit.com, they unearthed some curious coincidences. A perusal into the archives of the internet revealed that the Hammonds had once occupied a San Francisco building later rented to a company, Premise Data, whose co-founder has ties to Clinton and her top supporters.Moreover, a telephone number once registered to a Todd Hammond later was registered to a former Premise employee, Aaron Dunn, although with a different area code.Premise co-founder David Soloff said such findings could only be coincidences.“I want to reiterate that Premise has no connection with this case. And beyond confirming that Aaron Dunn worked at Premise until 2014, I don’t know the answer to any of your questions,” Soloff wrote in an email.
Gary Edwards

NONE DARE CALL IT CONSPIRACY  by Gary Allen - 1 views

  •  
    "NONE DARE CALL IT CONSPIRACY" - Web Version Copyright © 1971 by Gary Allen wITh Larry Abraham  ISBN: 0899666612 Sourced INTRODUCTION 1. DON'T CONFUSE ME WITH FACTS 2. SOCIALISM - ROYAL ROAD TO POWER FOR THE SUPER-RICH 3. THE MONEY MANIPULATORS 4. BANKROLLING THE BOLSHEVIK REVOLUTION 5. ESTABLISHING THE ESTABLISHMENT 6. THE ROCKEFELLERS AND THE REDS 7. PRESSURE FROM ABOVE AND PRESSURE FROM BELOW 8. YOU ARE THE ANSWER     FOURTEEN SIGNPOSTS TO SLAVERY     WHAT WILL YOU DO?     MEMBERS OF THE COUNCIL ON FOREIGN RELATIONS NOMINATED AND APPOINTED BY PRESIDENT NIXON TO GOVERNMENT POSTS     OPERATION COUNTERATTACK WHAT THOSE "IN THE KNOW" SAY I wish that every cITizen of every country in the free world and every slave behind the Iron Curtain might read this book. Ezra Taft Benson - Former Secretary of Agriculture NDCC is an admirable job of amassing information to prove that communism is socialism and socialism (a plot to enslave the world) is not a movement of the downtrodden but a scheme supported and directed by the wealthiest of people. If enough Americans read and act upon NDCC, they really can save the Republic from the conspirators - whose plans for the destruction of our country are galloping fast toward completion. Dan Smoot - Former Assistant to J. Edgar Hoover Now that NDCC is available, I no longer need to answer "no" to the question which is often put to me, namely: "Mr. Dodd, is there a book which I can read so I can know what you know?" No higher praise is possible for this book. Norman Dodd - Chief Investigator Reece CommITtee to Investigate Foundations This book concerns the way in which our nation and other nations are actually governed. As Benjamin Disaeli said, this is not the way in which most people think nations are governed. The whole subject of the Insiders who so largely control our polITical and economic lives is a fascinating mystery. For the reader who is intelligent but uninITiated in the lITerature of super
Gary Edwards

Of Bailouts, Bonuses, and Generational Responsibility from The Daily Bail - 0 views

  • When one transfers the learned behavior of selfishness to the world of economics, it is east to see how we got to the world of adjustable rate mortgages, thirty-to-one leverage, credit default swaps, and thirty year hedge fund workers acting as is million dollar paychecks was an otherwise normal entitlement.  If it felt good, it was therefore right – and by all means, don’t rock the boat.  And what we are witnessing today in Washington and Wall Street in response to our economic crisis is nothing but a conscious and willing decision to pass off to the next generation the cost of our mistakes.
  • the fundamental principles of capitalism – namely that bad actors need to fail.
  • First and most foremost, the Congress needs to institute a modernized version of Glass-Stegall and separate commercial banking from investment banking activities. What we have seen in the abolishment Glass-Stegall (please thank Mr. Rubin formerly of Goldman Sachs) is the creation of federally subsidize casinos masquerading as publicly traded financial institutions.  They kept profits from over-leveraged bets and were kind enough to pass their losses onto the taxpayers.  Second, Congress needs to repeal legislation (Gramm-Leach) that allowed financial institutions not only to leverage in ways previously not permitted, but which also granted banks and financial situations exemption from federal gambling laws. Third, and this is where moral outrage hits home to those on Wall Street, we cannot live in a country in which any company is allowed to manipulate the levers of government in such a way as to make itself obscenely rich at the expense of the public.
  • ...11 more annotations...
  • We saw as we proceeded through life that pursuing one’s self-interest was rewarded just as often than doing what was right, that morals were relative, and that there would be no consequences to bad behavior. It became de rigueur to assume that our parents (and their lawyers) would save us from our bad behavior.
  • no consequences to irresponsible behavior.
  • it is hard to avoid the reality that my generation, the baby boomers who are now approaching retirement, have caused the greatest collapse of the world economy since the 1930s, and in the process damaged this country in ways we are now only beginning to understand.
  • Goldman is only the largest corporate contributor to the Obama administration
  • Looking back more eighteen months after the first signs of distress in our economy appeared, it seems that leaders in Congress and Wall Street have erred in a manner never before witnessed in this nation.  In the process, they have conspired through their collective arrogance, greed, and ignorance to damage the economy of the country (if not the world), make many themselves rich beyond the imaginations of most Americans, and in the process commit the greatest financial rape of the American public in the history of the country.  And if that does resonate, then either you have not been paying attention for the past two years, or you have received your paycheck form Goldman Sachs.
  • Capitalism remains the best economic system on the planet, but when those who have profited handsomely seek to socialize losses caused by their errors, then those in power in Washington have a moral responsibility to demand an accounting.  Our anger comes from the fact that our leaders have failed in their public obligations at the expense of the interests on Wall Street, and in the process created the greatest social divide that this country has seen in the past 40 years.
  • our nation has one of the highest ratios of debt to GDP on the globe
  • Finally, the administration should demand (I know it won’t) that Goldman Sachs return the approximately $13 billion it received in backdoor payments through AIG when AIG received $180 billion in bailout money. That $13 billion belongs to the taxpayers of this country, and the decision to allow Goldman to receive that money perhaps stands as the greatest moral outrage of this entire sordid affair.  
  • he nation will not die; to the contrary, it would become stronger if we permit free markets to work, and allow the next-generation to live unburdened by our mistakes and arrogance.
  • The proposal in question was Ryan's "Roadmap for America's Future," a sweeping plan to stave off the nation's looming economic and fiscal collapse by changing the tax code, overhauling the health care system, and reforming the nation's major entitlement programs. its debt-reducing claims aren't based on mere fantasy -- the Congressional Budget Office has determined that the plan would boost economic growth while making Medicare and Social Security solvent. And it accomplishes these aims without raising taxes or affecting the benefits of current retirees.
  • There's no doubt where the Treasury will turn for finance. We are about to see the greatest stuffing of banks with government securities the world has ever seen. American banks will be forced to gorge on Treasury securities, and disgorge bank reserves. Where else can the government get the next trillion to spend on things like wars, unemployment benefits, and food stamps?There are a few obvious things to think about here. At the rate of $120 billion a month, it will only take about nine months to blow through over a trillion dollars in free bank reserves. Each Treasury auction will find it more difficult to sell all of the treasury securities, and it will take rising interest rates to coax out even more reserves from the banks. (When you need to borrow over $4 billion a day, even a trillion dollars doesn't last long.)
  •  
    Wow!  This is the best response to the financial collapse i have read to date.  Exceptional in clarity, but written with a tone of mixed sorrow and shame.  Mr. Gallow places the blame exactly where it should be placed.  it's a generational thing with one exception Mr. Gallow overlooks - the Obama margin of victory was very much due to the massive turnout and votes of post baby boomer generations.  We boomers may have created and caused the financial collapse and destruction of America, but they were dumb enough to put the decline of capitalism and ordered liberty on marxist steroids. excerpt:  .... this is the first time that I have been so angered by incompetence and greed in government and Wall Street to express publicly my own thoughts.  In simple terms, what has dawned on me is that my generation, the "Baby Boomers" between the ages of 45 and 65, has emerged not as not the most significant or talented generation in our history (as we thought we were), but rather as the most self-absorbed and reckless. Because ours will be the first generation in the history of this country to leave to its successors a nation in worse shape than that which it inherited; put differently, we will be the first generation in this nation to have taken from our parents and stolen from our children. .. it is hard to avoid the reality that my generation, the baby boomers who are now approaching retirement, have caused the greatest collapse of the world economy since the 1930s, and in the process damaged this country in ways we are now only beginning to understand. ... Looking back more eighteen months after the first signs of distress in our economy appeared, it seems that leaders in Congress and Wall Street have erred in a manner never before witnessed in this nation.  In the process, they have conspired through their collective arrogance, greed, and ignorance to damage the economy of the country (if not the world), make many themselves rich beyond the imaginations of mo
Paul Merrell

Did Members of the US-Led Coalition Carry Out an Air Strike to Help ISIS? Russia Implies They Did - 0 views

  • The argument over the air strike on the Syrian military base in Deir az-Zor has taken a strange and worrying turn.The US has categorically denied that any of its aircraft were involved. it has admitted that its aircraft were in the area, but says that they carried out an air strike 55 km away.The Russians say that is true. However, they also say that it is not the whole truth.The Russians say that in addition to the US aircraft, two pairs of aircraft - in other words four aircraft in total - from two other countries that are also members of the US led coalition were also flying at the time of the air strike over Deir az-Zor.The Russians have not actually said it was these aircraft that carried out the air strike. However, they have pointed out that the US has failed to admit to the presence of these aircraft. They are asking why?
  • It is the broadest of hints, and It is difficult to believe that the Russians do not think that It was these aircraft that carried out the air strike.This information - if It is true - begs a host of questions.Firstly, the Syrian milItary base that was hIt by the air strike was apparently the scene of a bItter battle between the Syrian milItary and the Islamic State.  It seems that shortly after the air strike - and most probably as a result of It - the Islamic State’s fighters were able to storm It.InevItably, that begs the question of whether the aircraft that carried out the air strike were providing air support to the fighters of the Islamic State.  On the face of It, It looks like they were. After all, if what happened was simply a mistake, It might have been expected that the US and Its allies would say as much.If so, It is an extremely serious and worrying development, suggesting that some members of the US-led anti-Islamic State coalItion are actually in league wIth the Islamic State.
  • Secondly, Deir az-Zor is the area of Syria from which the Islamic State exports most of its oil. Again, this inevitably begs the question of whether the Islamic State attack on the base - and the air strike seemingly carried out in support of it - was in some way connected to the illegal oil trade, and might have been intended to protect it.Thirdly, there is the obvious question of which countries’ aircraft were involved. The Russians are not identifying these countries - at least for the moment - though they obviously know or think they know which they are.  The one thing however that the Russians are saying is that the aircraft of more than one country was involved.The Russians are also drawing attention to the US’ failure to admit to the presence of the aircraft of these countries, which strongly suggests that the US is protecting them, whichever countries they are.Lastly, it is interesting that the Russians seem to be so well informed about this incident.  If the Russians do indeed know how many aircraft from the US-led coalition were flying at any one time over Der az-Zor, and can identify the countries they belong to, then the inescapable conclusion is that their surveillance and intelligence operation in Syria is very effective indeed.
  • ...2 more annotations...
  • This raises the interesting possibility that this sort of thing has not only happened before, but that it has been going on unreported for some time, and that the reason why the Russians made so much of this particular incident was so as to warn the US that with the Russian surveillance and intelligence operation in Syria now so good the US cannot get away with doing this sort of thing any longer. If Russian reporting of this incident is intended as a warning to the US, then that might explain why the Russians have held back information about the identity of the countries whose aircraft were involved in this incident.  With the warning made, the Russians may feel that there is no reason to inflame the situation further by making public accusations against particular countries, whose governments would have no option but to dispute them.As is now happening continuously with news coming out of Syria, Western governments and the Western media have pulled down a curtain of silence over this story.This is scarcely surprising since any hint that any Western ally is in league with the Islamic State - even in the most informal sense - would after the Paris attacks be politically explosive.
  • In the case of Britain - if it was its aircraft that were involved - an attack on a Syrian military base would be in open defiance of the will of the British parliament.The attempt to suppress information about this incident however in no way diminishes its importance.  The two coalitions supposedly fighting the Islamic State - the US-led coalition and the Russian-led coalition - have in the space of just two weeks twice fought each other - once when the SU24 was shot down, and now with the attack on the Syrian base.  On both occasions it was members of the US-led coalition that acted as the aggressors.That makes it doubly important that as many people as possible are informed about this incident.In the meantime it is a certainty that all sorts of angry conversations are going on about it at various levels between Moscow and Washington.
Paul Merrell

Mystery Sponsor Of Weapons And Money To Syrian Mercenary "Rebels" Revealed | Zero Hedge - 0 views

  • Previously, when looking at the real underlying national interests responsible for the deteriorating situation in Syria, which eventually may and/or will devolve into all out war with hundreds of thousands killed, we made it very clear that it was always and only about the gas, or gas pipelines to be exact, and specifically those involving the tiny but uber-wealthy state of Qatar. Needless to say, the official spin on events has no mention of this ulterior motive, and the popular, propaganda machine, especially from those powers supporting the Syrian "rebels" which include Israel, the US and the Arabian states tries to generate public and democratic support by portraying Assad as a brutal, chemical weapons-using dictator, in line with the tried and true script used once already in Iraq. On the other hand, there is Russia (and to a lesser extent China: for China's strategic interests in mid-east pipelines, read here), which has been portrayed as the main supporter of the "evil" Assad regime, and thus eager to preserve the status quo without a military intervention
  • However, one question that has so far remained unanswered, and a very sensitive one now that the US is on the verge of voting to arm the Syrian rebels, is who was arming said group of Al-Qaeda supported militants up until now. Now, finally, courtesy of the FT we have the (less than surprising) answer, which goes back to our original thesis, and proves that, as so often happens in the middle east, it is once again all about the natural resources. From the FT: The tiny gas-rich state of Qatar has spent as much as $3bn over the past two years supporting the rebellion in Syria, far exceeding any other government, but is now being nudged aside by Saudi Arabia as the prime source of arms to rebels.
  • Why would Qatar want to become involved in Syria where they have little invested?  A map reveals that the kingdom is a geographic prisoner in a small enclave on the Persian Gulf coast.   it relies upon the export of LNG, because it is restricted by Saudi Arabia from building pipelines to distant markets.  In 2009, the proposal of a pipeline to Europe through Saudi Arabia and Turkey to the Nabucco pipeline was considered, but Saudi Arabia that is angered by its smaller and much louder brother has blocked any overland expansion.   Already the largest LNG producer, Qatar will not increase the production of LNG.  The market is becoming glutted with eight new facilities in Australia coming online between 2014 and 2020.   A saturated North American gas market and a far more competitive Asian market leaves only Europe.  The discovery in 2009 of a new gas field near Israel, Lebanon, Cyprus, and Syria opened new possibilities to bypass the Saudi Barrier and to secure a new source of income.  Pipelines are in place already in Turkey to receive the gas.  Only Al-Assad is in the way.
  • ...6 more annotations...
  • Qatar has proposed a gas pipeline from the Gulf to Turkey in a sign the emirate is considering a further expansion of exports from the world's biggest gasfield after it finishes an ambitious programme to more than double its capacity to produce liquefied natural gas (LNG).   "We are eager to have a gas pipeline from Qatar to Turkey," Sheikh Hamad bin Khalifa Al Thani, the ruler of Qatar, said last week, following talks with the Turkish president Abdullah Gul and the prime minister Recep Tayyip Erdogan in the western Turkish resort town of Bodrum. "We discussed this matter in the framework of co-operation in the field of energy. In this regard, a working group will be set up that will come up with concrete results in the shortest possible time," he said, according to Turkey's Anatolia news agency.   Other reports in the Turkish press said the two states were exploring the possibility of Qatar supplying gas to the strategic Nabucco pipeline project, which would transport Central Asian and Middle Eastern gas to Europe, bypassing Russia. A Qatar-to-Turkey pipeline might hook up with Nabucco at its proposed starting point in eastern Turkey. Last month, Mr Erdogan and the prime ministers of four European countries signed a transit agreement for Nabucco, clearing the way for a final investment decision next year on the EU-backed project to reduce European dependence on Russian gas.
  • Specifically, the issue at hand is the green part of the proposed pipeline: as explained above, it simply can't happen as long as Russia is alligned with Assad.
  • So there you have it: Qatar doing everything it can to promote bloodshed, death and destruction by using not Syrian rebels, but mercenaries: professional citizens who are paid handsomely to fight and kill members of the elected regime (unpopular as it may be), for what? So that the unimaginably rich emirs of Qatar can get even richer. Although it is not as if Russia is blameless: all it wants is to preserve its own strategic leverage over Europe by being the biggest external provider of natgas to the continent through its own pipelines. Should Nabucco come into existence, Gazpromia would be very, very angry and make far less money! As for the Syrian "rebels", who else is helping them? Why the US and Israel of course. And with the Muslim Brotherhood "takeover" paradigm already tested out in Egypt, it is only a matter of time.
  • Perhaps it is Putin's turn to tell John Kerry he prefer if Qatar was not "supplying assistance to Syrian mercenaries"? What is worse, and what is already known is that implicitly the US - that ever-vigilant crusader against Al Qaeda - is effectively also supporting the terrorist organization: The relegation of Qatar to second place in providing weapons follows increasing concern in the West and among other Arab states that weapons it supplies could fall into the hands of an al-Qaeda-linked group, Jabhat al-Nusrah. Yet Qatar may have bitten off more than it can chew, even with the explicit military Israeli support, and implicit from the US. Because the closer Qatar gets to establishing its own puppet state in Syria, the closer Saudi Arabia is to getting marginalized:
  • What Saudi Arabia wants is not to leave the Syrian people alone, but to install its own puppet regime so it has full liberty to dictate LNG terms to Qatar, and subsequently to Europe.
  • Sadly, when it comes to the US (and of course Israel), it does have a very hidden agenda: one that involves lying to its people about what any future intervention is all about, and the fabrication of narrative about chemical weapons and a bloody regime hell bent on massacring every man, woman and child from the "brave resistance." What they all fail to mention is that all such "rebels" are merely paid for mercenaries of the Qatari emir, whose sole interest is to accrue even more wealth even if it means the deaths of thousands of Syrians in the process. A bigger read through of the events in Syria reveals an even more complicated web: one that has Qatar facing off against Syria, with both using Syria as a pawn in a great natural resource chess game, and with Israel and the US both on the side of the petrodollars, while Russia and to a lesser extent China, form the counterbalancing axis and refuse to permit a wholesale overthrow of the local government which would unlock even more geopolitical leverage for the gulf states. Up until today, we would have thought that when push comes to shove, Russia would relent. However, with the arrival of a whole lot of submarines in Cyprus, the games just got very serious. After all the vital interests of Gazprom - perhaps the most important "company" in the world - are suddenly at stake.
Gary Edwards

The Biggest Price-Fixing Scandal Ever - and the VESTS Solution - 0 views

  •  
    excerpt: Uber financial investigative journalist Matt Taibbi has discovered what we too realized when we began to scrutinize the financial industry. In his latest article, he writes, "Everything Is Rigged: The Biggest Price-Fixing Scandal Ever." The article's cut line is, "The Illuminati were amateurs. The second huge financial scandal of the year reveals the real international conspiracy: There's no price the big banks can't fix." Taibbi's incredulity is evident throughout the article, as well it should be. The interest-rate swap market is part of the larger derivatives market that totals over one billion TRILLION dollars............................... "Given the endless financial scandals that keep sweeping across the industry, it is fairly obvious that this regulatory system needs a good deal of improvement. In fact, I think that it may be no coincidence that so much is being revealed now. The idea is surely to create the conditions for another international regulatory effort that will end up further controlling what is left of free-market capital raising. it is a global game for globalists. The game is to regulate everything and then to position oneself above the regulations and above the governments that wield them. This gives you tremendous power over everyone else. One of the tools being used to whip up sentiment for a larger regulatory revisiting is scandal and more scandal. There have been revelations of so-called crooked practices in a number of areas lately, mostly in the area of industry pricing. it turns out that many standard prices are set via indications of interest rather than outright competition. We can see the same system at work in the gold market, where a small group of wise men set the price for physical gold every day. And now, as Taibbi and others have revealed, the dysfunctional system also affects interest rate swaps. This has incensed Taibbi, who opens his article as follows: Conspiracy theorists of the world, believers in the
Gary Edwards

Is The US Finally Ready For Revolution? - Democratic Underground - 1 views

  •  
    Written in June of 2012, before the national elections, this commentary remains the ringing truth.  Maybe more Americans are ready to listen this fourth of July? ........................... "Is America Ready For Revolution? I have always strongly believed that it's not possible to be a good Christian without standing up against social injustice and government corruption in all its forms. As I take a look around me today I find a lot of things wrong with our country. In fact, I have been a proponent for radical change for several years now, and I have written and published 2 books on this very topic. Where shall I begin? In God-blessed America, the land of the free where everyone is an economic slave, our founding fathers' sacred idea of a government "of the people, by the people, for the people" has become but a cruel joke. Former president George W. Bush has notoriously called our Constitution - our supreme law of the land - "that (expletive) piece of paper". The federal government is currently spending at least $60 billion per month on military excursions in Afghanistan, the Middle East, and northern and western Africa - including operating between 800 and 1,000 foreign military bases all over the world. Our country's over-used flying drone aircraft kills hundreds daily overseas, many of whom are only innocent bystanders. Meanwhile here on the home front, one in seven people are on food stamps, and at any given time one in four American children are going hungry today. Our country spends more money incarcerating people than it does on education. What's up with that? Our political system is openly rigged against the best interests of the American people. A massive market mechanism is securely entrenched in our political system where political influence is openly bought and sold. Tens of thousands of highly-paid middlemen called "lobbyists" facilitate the legal transfer of billions between moneyed special interests and our so-called "representatives" i
Paul Merrell

FBI, CIA Use Backdoor Searches To Warrentlessly Spy On Americans' Communications | Techdirt - 0 views

  • The other shoe just dropped when it comes to how the federal government illegally spies on Americans. Last summer, the details of the NSA's "backdoor searches" were revealed. This involved big collections of content and metadata (so, no, not "just metadata" as meaningless as that phrase is) that were collected under Section 702 of the FISA Amendments Act (FAA). This is part of the program that the infamous PRISM effort operates under, and which allows the NSA to collect all sorts of content, including communications to, from or about a "target" -- where a "target" can be incredibly loosely defined (i.e., it can include groups or machines or just about anything). The "backdoor searches" were a special loophole added in 2011 allowing the NSA to make use of "US person names and identifiers as query terms." In the past, it had been limited (as per the NSA's mandate) to only non-US persons.
  • This morning, James Clapper finally responded to a request from Senator Ron Wyden concerning the number of such backdoor searches using US identifiers that were done by various government agencies. And, surprisingly, it's redaction free. The big reveal is... that it's not just the NSA doing these searches, but the CIA and FBI as well. This is especially concerning with regards to the FBI. This means that the FBI, who does surveillance on Americans, is spying on Americans communications that were collected by the NSA and that they're doing so without anything resembling a warrant. Oh, and let's make this even worse: the FBI isn't even tracking how often it does this. it's just doing it willy nilly:
  • Got that? Basically, the FBI often asks the NSA for a big chunk of data that the NSA probably shouldn't have in the first place -- including tons of Americans' communications, and the FBI gets to dump it into the same database that it is free to query. And the FBI tracks none of this, other than to say that it believes that there are a "substantial" number of such queries. This would seem to be a pretty blatant attempt to end run around the 4th Amendment, giving the FBI broad access to searching through the communications of Americans with what appears to be almost no oversight. Yikes! Oh, and it's not just the NSA, but the CIA as well. Remember, the CIA is not supposed to be doing any surveillance on US persons (like the NSA), but that's not what's happening at all. At least the CIA tracks some (but not all) of its abuse of backdoor searches:
  • ...5 more annotations...
  • The FBI does not track how many queries it conducts using U.S. person identifiers. The FBI is responsible for identifying and countering threats to the homeland, such as terrorism pilots and espionage, inside the U.S. Unlike other IC agencies, because of its domestic mission, the FBI routinely deals with information about US persons and is expected to look for domestic connections to threats emanating from abroad, including threats involving Section 702 non-US. person targets. To fulfill its mission and avoid missing connections within the information lawfully in its possession, the FBI does not distinguish between U.S. and non- U.S. persons for purposes of querying Section 702 collection. it should be noted that the FBI does not receive all of Section 702 collection; rather, the FBI only requests and receives a small percentage of total Section 702 collection and only for those selectors in which the FBI has an investigative interest. Moreover, because the FBI stores Section 702 collection in the same database as its "traditional" FISA collection, a query of "traditional" FISA collection will also query Section 702 collection. In addition, the FBI routinely conducts queries across its databases in an effort to locate relevant information that is already in its possession when it opens new national security investigations and assessments. Therefore, the FBI believes the number of queries is substantial. However, only FBI personnel trained in the Section 702 minimization procedures are able to View any Section 702 collection that is responsive to any query.
  • In calendar year 2013, CIA conducted fewer than 1900 queries of Section 702-acquired communications using specific U.S. person identifiers as query terms or other more general query terms if they are intended to return information about a particular U.S. person. Of that total number approximately 40% were conducted as a result of requests for counterterrorism-related information from other U.S. intelligence agencies. Approximately 27% of the total number are duplicative or recurring queries conducted at different times using the same identifiers but that CIA nonetheless counts as separate queries. CIA also uses U.S. person identifiers to conduct metadata-only queries against metadata derived from the FISA Section 702 collection. However, the CIA does not track the number of metadata-only queries using U.S. person identifiers.
  • So, the CIA is doing these kinds of warrantless fishing expeditions into the communications of Americans as well, but at least the CIA tracks how often it's doing so. Of course, when it comes to metadata searches, the CIA doesn't bother. it's also a bit bizarre that the CIA is apparently carrying out a bunch of those searches for "other U.S. intelligence agencies," when the CIA should be especially limited in its ability to do these searches in the first place. Senator Wyden has responded to these revelations by pointing out how "flawed" the oversight system is that these have been allowed:
  • When the FBI says it conducts a substantial number of searches and it has no idea of what the number is, it shows how flawed this system is and the consequences of inadequate oversight. This huge gap in oversight is a problem now, and will only grow as global communications systems become more interconnected. The findings transmitted to me raise questions about whether the FBI is exercising any internal controls over the use of backdoor searches including who and how many government employees can access the personal data of individual Americans. I intend to follow this up until it is fixed.
  • Hopefully, now you are starting to recognize what a big deal it was last week when the House of Representatives recently voted to defund the ability to do these kinds of backdoor searches. Still, much more needs to be done. Oh, and in case you're wondering why Clapper finally 'fessed up to the FBI and CIA making use of these data to warrantlessly spy on Americans, it's worth noting that the Privacy and Civil Liberties Oversight Board (PCLOB) is expected to come out with its report on the Section 702 surveillance program on July 2nd (7/02, get it?). it seems likely that the report will discuss these backdoor searches on Americans and how other agencies besides the NSA has been involved in the practice.
  •  
    Note to self: Look for the new PCLOB report in the morning. 
Paul Merrell

FINAL - Part II: Evidence Continues to Emerge #MH17 Is a False Flag Operation | No Limit to Our Anger (c) V. M. Molotov - 0 views

  • #15 – Dissecting the Fake Intercept Disseminated by SBU (Ukrainian Security Service) https://www.youtube.com/watch?v=V5E8kDo2n6g Note: Half of the Post Translated; The Remaining Half is Speculative Complete Original of the Post (in Russian) Can Be Found at Eugene-DF LiveJournal In the disseminated intercept, the place from which the missile was allegedly launched is clearly indicated: the checkpoint at the settlement of Chernukhino. Pay close attention at the Alleged Map of the MH17 Catastrophe.
  • And, so, we have the background. Let’s see how the picture unfolds: The launch is alleged to have been made from Chernukhino. The maximum distance of the launch is 16 kilometres. The aircraft fell between Snezhnoye and Torez. That’s 37 kilometres, which is 20 kilometres more than the maximum possible point at which the plain could have been hit. You know, even a plane with turned-off engines can’t glide like that. But the trouble is that the aircraft was not whole. According to the pattern of the spread of fuselage fragments and bodies, the plane was ruptured practically with the first shot. Here it must be mentioned that the high-explosive/fragmentation warhead of the rocket has a mass of approximately 50 kilograms (by the way, Ukrainians have an outdated modification, which is only 40 kilograms).
  • Overall, that’s not too little; however, it must be understood that it detonates not when it sticks into an airplane, but when it is still at a certain, and fairly significant distance. Moreover, the main strike factor is not the blast wave, but far more significantly – the stream of fragments. These fragments are previously prepared rods (and in the earlier versions – little cubes, if I recall correctly). And yes, for a jet fighter, that, in itself, is more than sufficient. However, here we are dealing with a huge airliner. Yes, one rocket will rip the casing, cause depressurization, and will kill a lot of passengers. But it will not break up the airliner into pieces. Given certain conditions, the pilots may even be able to land it. And, in fact, there have been precedents (to be provided in future posts). For example – the very same An-28, which is alleged to have been the first victim of a BUK system; even though it was done for, but the crew was able to successfully catapult out. Which, in some way, symbolizes. An An-28, by the way, is far smaller than a Boeing.
  • ...15 more annotations...
  • In other words, the rocket caught up to the plane no closer than 25 kilometres away from Chernukhino. Which is absolutely impossible for a BUK system. By the way, we can’t overlook the fact that, at maximum distances, BUK can be used only provided there is support from an external radar installation for location and guiding purposes. In other words, even if a rockets flies far, BUK’s mobile radar does not cover its entire distance.
  • And that is what is so strange here: SBU literally offers evidence that proves that that the Militia had no part in the shooting down of the Boeing! The fact that they blame themselves in the recording is quite understandable. Unlike the fascists, they have a conscience, which takes its toll until you are sure it was not you who did it. Ok. But somebody did, in fact, shoot down the plane? Of course it was shot down. And here we have another question: what if this recording is a falsification through and through? Then it had to have been prepared somehow? And then disseminated? That’s when smoke starts to clear, and mirrors – to break. That’s the problem with tricks.
  • #14 – An Industry Outlet Confirms Carlos (@spainbuca) as ATC at Borispol Airport in Kiev Original: EturboNews (ETN Global Travel Industry News) – July 17, 2014 ETN received information from an air traffic controller in Kiev on Malaysia Airlines flight MH17. This Kiev air traffic controller is a citizen of Spain and was working in the Ukraine. He was taken off duty as a civil air-traffic controller along with other foreigners immediately after a Malaysia Airlines passenger aircraft was shot down over the Eastern Ukraine killing 295 passengers and crew on board. The air traffic controller suggested in a private evaluation and basing it on military sources in Kiev, that the Ukrainian military was behind this shoot down. Radar records were immediately confiscated after it became clear a passenger jet was shot down. Military air traffic controllers in internal communication acknowledged the military was involved, and some military chatter said they did not know where the order to shoot down the plane originated from.
  • Obviously it happened after a series of errors, since the very same plane was escorted by two Ukrainian fighter jets until 3 minutes before it disappeared from radar. Radar screen shots also show an unexplained change of course of the Malaysian Boeing. The change of course took the aircraft directly over the Eastern Ukraine conflict region.
  • #7 – Eyewitness States Two Planes Following MH17, One Of the Craft Shot Down Boeing Video: Father of Eyewitness Tells of the Crash of Boeing MH17 Over Ukraine https://www.youtube.com/watch?v=rPcbFJSGk7E Transcript of the Video Narrator: Who shot it down? Today it was shot down, on [July] 17th. Narrator: Continuing. The village of Grabovo. How was it? What did you son tell you? Father of Eyewitness: Well, they were sitting there, on a hill. And, from behind the clouds … two airplanes were flying … one of the came out from behind the clouds.
  • #12 – Analysis from an Aerodynamics/Physics Standpoint – Ukrainian Army Responsible RESUME OF ANALYSIS: What all this means is that if a BUK rocket was launched from the territory controlled by the Militia, the Boeing would have fallen much further to the south-east – i.e. will into the Russian territory. Otherwise, there would have been not time to detect the aircraft, perform electronic capture and launch the rocket. If this was a BUK, and not a jet fighter, then it is most likely that the launch was made from the territory controlled by the Ukrainian army, and the rocket was sent “chasing after” the airplane.
  • #10 – Eyewitness Recounts a Fighter Jet and 3 Explosions When MH17 Was Shot Down Audio Recording Link: Cassad Net Transcript of the Eyewitness Phone CallI
  • I saw, personally, that there were 3 explosions. The first, the second and the third. So, after the first explosions I went up on the roof and saw that a plane was falling – it was already almost at the ground. There was an explosion, a black cloud, and two parachutists were descending – one was descending on his parachute on the wing. The second was flying down very fast – like a stone. And that is what I saw. However, at that very same moment, a jet fighter was departing in the direction of Debaltsevo. it was over Rassypnoye and was flying toward Debaltsevo. How I understood it.
  • #8 – Ukrainian Military Reports to Poroshenko That Rebels Have Not Captured any BUKs According to Vitaliy Yarema, in an interview to Ukrainskaya Pravda, military officials reported to President Poroshenko immediately after the shooting down of Malaysian Airlines Boeing 777, Flight MH17, that the rebels have not captured any BUK systems from the Ukrainian Armed Forces. This is further confirmed in a statement by the Ukrainian Ministry of Defence, published on June 30, 2014. Further Information: “Militias do not have Ukrainian Buk missile system – Ukraine general prosecutor“ KIEV, July 18. /itAR-TASS/. Militias in the self-proclaimed Donetsk and Luhansk people’s republics do not have Ukrainian air defense missile systems Buk and S-300 at their disposal, Ukrainian Prosecutor-General Vitaly Yarema told Ukrainian Pravda newspaper on Friday.
  • “After the passenger airliner was downed, the military reported to the president that terrorists do not have our air defense missile systems Buk and S-300,” the general prosecutor said. “These weapons were not seized,” he added. Ukrainian Interior Minister Anton Gerashchenko said on July 17 that the Malaysia Airlines Boeing 777 airliner had been downed by an air defense missile system Buk.
  • According to other rumors, the black box for this crashed Malaysian Airlines flight was taken by Donetsk separatists. A spokesperson for the rebel group said this black box would be sent to the Interstate Aviation Committee headquartered in Moscow. The First Deputy Prime Minister of the self-proclaimed People’s Republic of Donetsk, Andrew Purgin, stated that the flight recorders of the crashed aircraft will be transferred to Moscow for examination. Sources say the Rebel group leadership hopes this would confirm the Ukrainian military actually shot down this aircraft. This was reported by the news agency Interfax-Ukraine. ETN statement: The information in this article is independently confirmed and based on the statement of one airline controller and other tweets received.
  • Narrator: Military planes emerged? Father of Eyewitness: Well, he does not understand. Then, with one shot, they shot down the second. And that’s it. The second plane, he says – with one shot. There was one shot and that’s it. Narrator: And the one that was shot down was the civilian one? … Father of Eyewitness: And two … one fell down, he says, and the second too … I did not bring my phone here, so I can’t call him. [in the background] Ah, he saw a jet fighter … Of course … Narrator: The village of Grabovo, in the Shakhtersk district. One the approaches to Grabovo, it fell. Keep looking for remains. Everything is burning. Aluminum has melted. All the casing.
  • #4 – Possible Alternative Video of MH17, Right Wing on Fire (via Vaughan Fomularo) UPDATE: Dann Peroni (@roamer43) The video “#4 – Possible Alternative Video of MH17, Right Wing on Fire (via Vaughan Fomularo)” shows a clear blue sky, while in all other videos showing the crash site the sky is overcast! Video: Malaysian Airlines plane being shot down LIVE! (July 17 2014) https://www.youtube.com/watch?v=FKIlueJg4cA
  • #2 – Comparing the Form of the Wing in the Video with the Wings of Boeing @gbazov clearly the wings of the plane in the video are not the ones of a Malaysian Boeing 777 pic.twitter.com/oH9L4WjFqF — Crimea&East (@IndependentKrym) July 18, 2014
  • #1 – Video Purporting to be that of MH17 is Actually the Video of An-26 Shot Down Earlier #FLASH #IMPORTANT – THIS —> https://t.co/e0FiVFdAM2 IS NOT #MH17, it’s most likely the An-26 (sound, elevation, form of the wing). PLZ RT. — Gleb Bazov (@gbazov) July 18, 2014
Paul Merrell

Fellow soldiers call Bowe Bergdahl a deserter, not a hero - CNN.com - 0 views

  • The sense of pride expressed by officials of the Obama administration at the release of Army Sgt. Bowe Bergdahl is not shared by many of those who served with him: veterans and soldiers who call him a deserter whose "selfish act" ended up costing the lives of better men.
  •  
    I've been disgusted with American mainstream media and our political class for a very long time. Every now and then I get super-disgusted.  I'll begin with the Obama Administration. They tried to make political hay with something that should not have been made public other than notifying the released American prisoners' parents before the prisoner had been debriefed. Moreover, while I have no problems with swapping Taliban prisoners to get the American prisoner back even if it meant not giving Congress the full 30-day notice required by statute, the Administration certainly could have done a better job of it, notifying key committee members earlier that the deal might be pulled off. Waiting until the Taliban prisoners were up to the steps of the airplane bound for the exchange was not the way this should have happened. Next up, we have the members of Congress who have done their level best to turn the situation into a partisan issue. Obama may have deserved criticism given that he tried to make political hay with the release. But prisoner swaps during wartime have been a feature of most U.S. wars. it is an ancient custom of war and procedures for doing so are even enshrined in the Geneva Conventions governing warfare. So far, I have not heard any war veteran member of Congress scream about releasing terrorists. During my 2+ years in a Viet Nam combat role, the thought of being captured was horrifying. Pilots shot down over North Viet Nam were the lucky ones. No American soldier captured in South Viet Nam was ever released. The enemy was fighting a guerrilla war in the South. They had no means to confine and care for prisoners. So captured American troops were questioned for intelligence and then killed.  Truth be told, American combat troops were prone to killing enemy who surrendered. War is a very ugly situation and feelings run high. it is perhaps a testament to the Taliban that they kept Sgt. Berdahl alive. Certainly that fact clashes irreconcilably with
« First ‹ Previous 41 - 60 of 5135 Next › Last »
Showing 20 items per page