Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "claimed-authority" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

'This Week' Transcript: Ambassador Samantha Power - ABC News - 0 views

  • STEPHANOPOULOS: And we are joined now by the U.S. Ambassador to the United Nations Samantha Power. Thanks for coming back to This Week. And you know, the president said he's prepared to strike Syria. Those strikes could be imminent. Will the United States try to get UN Security Council authorization first? Or do you accept now that's just not going to be possible? SAMANTHA POWER, U.S. AMBASSADOR TO THE UNITED NATIONS: Well, let me say that Secretary Kerry just convened a meeting of the Security Council on Friday which showcased just how much support there is on the Security Council and in the broader international community for the anti-ISIL effort. STEPHANOPOULOS: But the Russia veto.
  • POWER: Russia has vetoed in the past, but on very different issues. I think Russia has made clear for a long time its opposition to ISIL. The Iraqis have appealed to the international community to come to their defense not only in Iraq, but also to go after safe havens in foreign countries. And what they mean by that of course is Syria. And they're quite explicit about that. So they have made an appeal to the international community for collective defense. And we think we have a legal basis we need if the president decides... STEPHANOPOULOS: Without a UN authorization. POWER: Consistent with the UN charter, we -- it will depend on the facts and circumstances of any particular strike in Syria, but we have a legal basis we need.
  •  
    Context: U.S. Ambassador to the U.N., Samantha Power, holds the U.N. Security Council's rotating chair this month. Powers'  claims a right for the U.S. to wage war against ISIL in Syria on grounds of the collective security exception to the U.N. Charter's prohibition; that is, that the U.S. has a collective security agreement with the nation of Iraq, that makes it lawful for the U.S. to strike ISIL. True enough as a matter of international law, ignoring the fact that Obama has yet to obtain permission from the U.S. Congress, which the U.S. Constitution requires him to do. But ISIL is not the nation of Syria; hence to attack ISIL in Syria, an additional exception is necessary for both Iraq and the U.S. The only other recognized exception that might seem to do deals with the situation when a nation in which a private organization inflicting harm on another nation  is "unwilling or unable" to protect the second nation (Iraq) from the depradations of the private organization. And that is where Powers' legal analysis dissembles because the U.S. has been actively attempting to overthrow the Syrian government via proxy terrorist organizations including ISIL. So the U.S. lacks clean hands in claiming any lawful right to invade Syria on the theory that the Syrian government is unwilling or unable to put down the ISIL organization. The Syrian government is certainly willing and has been attempting to do so. But its inability to do so thus far is entirely due to the U.S., its Gulf Coast state allies, and its ally Turkey continuing to supply ISIL and other terrorist groups in Syria with weapons, training, and supplies, aimed at overthrowing the Syrian government. The doctrine of unclean hands has limited applicability in international law governing human rights. See Lisa LaPlante, The Law of Remedies and the Clean Hands Doctrine: Exclusionary Reparation Policies in Peru's Political Transition, 23 Am Univ Int Law Rev 50 (2007), https://digitalcommons.wcl.american.edu/cg
Paul Merrell

Milosevic prosecutor claims top ICC official bowing to Israeli, US pressure | The Electronic Intifada - 0 views

  • The chief prosecutor of the International Criminal Court (ICC) is appealing a ruling ordering her to reconsider her decision not to investigate Israel’s lethal attack on an aid flotilla to Gaza five years ago. But Geoffrey Nice, lead counsel for victims and families of those killed in the Israeli attack on the Mavi Marmara, told The Electronic Intifada that the arguments Chief Prosecutor Fatou Bensouda has put forward are “complete hogwash.” Nice, who worked for the International Criminal Tribunal for the Former Yugoslavia from 1998 to 2006, led the prosecution of former Serbian President Slobodan Milošević. Nice and his law firm Stoke and White also represent the government of Comoros, the Indian Ocean archipelago state where the Mavi Marmara is registered. Instead of doing her job and properly investigating the case, Nice said, Bensouda’s appeal is “a last ditch attempt to do what would be expected of her by the US and supporters of Israel.”
  • A professor of law at London’s Gresham College who has previously represented victims before the ICC, Nice said he doubted that Bensouda even had a right to go to the appeal judges at this stage. He said his first legal response would be to ask them to throw her appeal out on procedural grounds. Serious errors Earlier this month, a panel of ICC judges found in a scathing 2-1 ruling that Bensouda had made serious errors of fact and law in her decision not to pursue the case. They said that the chief prosecutor had underestimated the seriousness and international significance of the crimes and ordered her to review her decision not to proceed with an investigation into the attack. In the early hours of 31 May 2010, Israeli commandos boarded and seized the flotilla boats in international waters in the eastern Mediterranean. Israeli forces carried out a particularly violent armed attack on the largest vessel, Mavi Marmara, killing nine persons. A tenth victim died of his injuries in June 2014. The victims were all Turkish citizens. One of them, 18-year-old Furkan Doğan, was also a US citizen.
  • The initial request for the ICC to investigate the killings was submitted in 2013 by Comoros. Bensouda decided not to proceed with a full investigation in November 2014. Ignoring evidence In a notice of appeal filed Monday, Chief Prosecutor Bensouda says that the judges overstepped their mandate and trampled on her prosecutorial discretion by ordering her to review the case. She also claims that the ruling gives her no clear explanation of how to review her decision. But Nice said that her claims are “absolute rubbish” and the judges’ ruling is very clear about what matters and evidence should be looked at again. The judges’ 16 July ruling lists a long litany of errors by the prosecutor.
  • ...2 more annotations...
  • These include that Bensouda “wilfully ignored” evidence submitted by Comoros that Israeli forces “fired live ammunition from the boats and the helicopters before the [Israeli forces] forces boarded the Mavi Marmara.” This information was supplemented by the UN Human Rights Council fact-finding mission and autopsy reports, which, according to the evidence submitted by Comoros, “indicate that persons were shot from above.” Intent to kill “For the purpose of her decision” whether or not to investigate, the judges conclude, “the prosecutor should have accepted that live fire may have been used prior to the boarding of the Mavi Marmara, and drawn the appropriate inferences.” “This fact is extremely serious and particularly relevant to the matter under consideration,” the ruling continues, “as it may reasonably suggest that there was, on the part of the [Israeli] forces who carried out the identified crimes, a prior intention to attack and possibly kill passengers on board the Mavi Marmara.” The judges also fault Bensouda for failing to properly consider the impact of the crimes beyond the immediate victims.
  • srael’s violent actions against the Mavi Marmara would, the judges write, “have sent a clear and strong message to the people in Gaza (and beyond) that the blockade of Gaza was in full force and that even the delivery of humanitarian aid would be controlled and supervised by the Israeli authorities.” Rule of law Nice says the stakes are high – not just for this case but for other Palestine-related matters that might come before the ICC. In January, the court began a preliminary probe, at the request of the Palestinian Authority, that will include Israel’s attack on Gaza last summer that killed more than 2,200 Palestinians. Will such cases be handled according to the “rule of law,” Nice asks, or will victims witness “officials of the highest rank seeming yet again to bend the knee to the interests of Israel and the US?”
Paul Merrell

M of A - Sony Hack - NYT Editors Find New Iraq WMD - 0 views

  • A Japanese company with some offices in California was hacked. Several terrabytes of data were copied off its internal networks and some of it was put on file sharing sites. One of the items copied was a film produced in Canada that depicts as comedy the terror act of killing of a current head of state. The U.S. State Department applauded that movie scene. But there were tons of other data like social security numbers, payroll data, and internal emails stolen all of which that might have been the real target of the hackers. The tools to hack the company are well known and in the public domain. The company, Sony, had lousy internal network security and had been hacked before. The hackers probably had some inside knowledge. They used servers in Bolivia, China and South Korea to infiltrate. There is zero public evidence in the known that the hack was state sponsored.
  • But the U.S. is claiming that the event is a "national security matter". Who's national security? Japan's? Canada's? Why? A private Japanese entertainment(!) company left the doors open and had some equipment vandalized and some of its private property stolen. Why, again, is that of U.S. "national interest"? Why would the U.S. even consider some "proportional response"? The White House is anonymously accusing the state of North Korea of having done the hack. It provides no evidence to support that claim and the government of North Korea denied any involvement. The FBI and Sony say they have no evidence for such a claim. Still the New York Times editors eat it all up:
  • North Korean hackers, seeking revenge for the movie, stole millions of documents, including emails, health records and financial information that they dished out to the world. How do the editors know that these were "North Korean hackers"? The same way the knew about Iraq's weapons of mass destruction? Make believe and anonymous claims by U.S. government officials? Yeah - those folks never lie. Right?
  •  
    What bothers me most here is that there are no voices calling for Obama to refrain from a "proportional response" until there is a Congressional authorization for use of military force. Cyberwarfare is warfare, after all.
Paul Merrell

New Saudi King Tied to Al Qaeda, Bin Laden and Islamic Terrorism Washington's Blog - 0 views

  • We’ve long noted that Saudi Arabia is a huge supporter of terrorism. But the new Saudi king is particularly bad. Investors Business Daily notes: King Salman has a history of funding al-Qaida, and his son has been accused of knowing in advance about the 9/11 attacks. *** Salman once ran a Saudi charity tied to al-Qaida and has been named a defendant in two lawsuits accusing the Saudi royal family of helping the 9/11 terrorists, one of which the U.S. Supreme Court recently let move forward after years of being blocked by the State Department and the well-funded Saudi lobby. Plaintiffs have provided an enormous amount of material to source their accusations against Salman. Here’s why his ascension to the throne is not good news, especially as the terrorism threat grows: • Salman once headed the Saudi High Commission for Relief to Bosnia and Herzegovina, which served as a key charitable front for al-Qaida in the Balkans. • According to a United Nations-sponsored investigation, Salman in the 1990s transferred more than $120 million from commission accounts under his control — as well as his own personal accounts — to the Third World Relief Agency, another al-Qaida front and the main pipeline for illegal weapons shipments to al-Qaida fighters in the Balkans.
  • • A U.N. audit found that the money was transferred following meetings with Salman, transfers that had no legitimate “humanitarian” purpose. • Former CIA officer Robert Baer has reported that an international raid of Saudi High Commission offices found evidence of terrorist plots against America. • Baer also revealed that Salman “personally approved” distribution of funds from the International Islamic Relief Organization, which also has provided material support to al-Qaida. • A recent Gulf Institute report says Salman and former Saudi intelligence chief Prince Turki al-Faisal knowingly aided and abetted al-Qaida in the run-up to 9/11. • Salman works closely with Saudi clerics Saleh al-Moghamsy, a radical anti-Semite, and Safar Hawali, a one-time mentor of Osama bin Laden, according to the Washington Free Beacon. • In “Why America Slept,” author Gerald Posner claimed that Salman’s son Ahmed bin Salman also had ties to al-Qaida and even advance knowledge of the Sept. 11, 2001 attacks.
  • David Andrew Weinberg provides a superb round-up of Salman’s ties to terrorism and extremism: As former CIA official Bruce Riedel astutely pointed out, Salman was the regime’s lead fundraiser for mujahideen, or Islamic holy warriors, in Afghanistan in the 1980s, as well as for Bosnian Muslims during the Balkan struggles of the 1990s. In essence, he served as Saudi Arabia’s financial point man for bolstering fundamentalist proxies in war zones abroad. As longtime governor of Riyadh, Salman was often charged with maintaining order and consensus among members of his family. Salman’s half brother King Khalid (who ruled from 1975 to 1982) therefore looked to him early on in the Afghan conflict to use these family contacts for international objectives, appointing Salman to run the fundraising committee that gathered support from the royal family and other Saudis to support the mujahideen against the Soviets. Riedel writes that in this capacity, Salman “work[ed] very closely with the kingdom’s Wahhabi clerical establishment.” Another CIA officer who was stationed in Pakistan in the late 1980s estimates that private Saudi donations during that period reached between $20 million and $25 million every month. And as Rachel Bronson details in her book, Thicker Than Oil: America’s Uneasy Partnership With Saudi Arabia, Salman also helped recruit fighters for Abdul Rasul Sayyaf, an Afghan Salafist fighter who served as a mentor to both Osama bin Laden and 9/11 mastermind Khalid Sheikh Mohammed.
  • ...7 more annotations...
  • Reprising this role in Bosnia, Salman was appointed by his full brother and close political ally King Fahd to direct the Saudi High Commission for Relief of Bosnia and Herzegovina (SHC) upon its founding in 1992. Through the SHC, Salman gathered donations from the royal family for Balkan relief, supervising the commission until its until its recent closure in 2011. By 2001, the organization had collected around $600 million — nominally for relief and religious purposes, but money that allegedly also went to facilitating arms shipments, despite a U.N. arms embargo on Bosnia and other Yugoslav successor states from 1991 to 1996. And what kind of supervision did Salman exercise over this international commission? In 2001, NATO forces raided the SHC’s Sarajevo offices, discovering a treasure trove of terrorist materials: before-and-after photographs of al Qaeda attacks, instructions on how to fake U.S. State Department badges, and maps marked to highlight government buildings across Washington. The Sarajevo raid was not the first piece of evidence that the SHC’s work went far beyond humanitarian aid. Between 1992 and 1995, European officials tracked roughly $120 million in donations from Salman’s personal bank accounts and from the SHC to a Vienna-based Bosnian aid organization named the Third World Relief Agency (TWRA). Although the organization claimed to be focused on providing humanitarian relief, Western intelligence agencies estimated that the TWRA actually spent a majority of its funds arming fighters aligned with the Bosnian government.
  • A defector from al Qaeda called to testify before the United Nations, and who gave a deposition for lawyers representing the families of 9/11 victims, alleged that both Salman’s SHC and the TWRA provided essential support to al Qaeda in Bosnia, including to his 107-man combat unit. In a deposition related to the 9/11 case, he stated that the SHC “participated extensively in supporting al Qaida operations in Bosnia” and that the TWRA “financed, and otherwise supported” the terrorist group’s fighters. The SHC’s connection to terrorist groups has long been scrutinized by U.S. intelligence officials as well. The U.S. government’s Joint Task Force Guantanamo once included the Saudi High Commission on its list of suspected “terrorist and terrorist support entities.” The Defense Intelligence Agency also once accused the Saudi High Commission of shipping both aid and weapons to Mohamed Farrah Aidid, the al Qaeda-linked Somali warlord depicted as a villain in the movie Black Hawk Down. Somalia was subject to a United Nations arms embargo starting in January 1992. *** The board of trustees for the Prince Salman Youth Center, which Salman himself chairs, today includes Saleh Abdullah Kamel, a Saudi billionaire whose name showed up on a purported list of al Qaeda’s earliest supporters known as the “golden chain.” (The Wall Street Journal reported that Kamel “denies supporting terror.”) But as the United States sought to shut down Saudi charities with ties to terrorism in the aftermath of the 9/11 attacks, Kamel and Salman both condemned the effort as an anti-Islamic witch hunt.
  • In 1995, US aid worker William Jefferson is killed in Bosnia. One of the likely suspects, Ahmed Zuhair Handala, is linked to the SHC. He also is let go, despite evidence linking him to massacres of civilians in Bosnia. [Schindler, 2007, pp. 263-264] In 1997, a Croatian apartment building is bombed, and Handala and two other SHC employees are suspected of the bombing. They escape, but Handala will be captured after 9/11 and sent to Guantanamo prison. [Schindler, 2007, pp. 266] In 1997, SHC employee Saber Lahmar is arrested for plotting to blow up the US embassy in Saravejo. He is convicted, but pardoned and released by the Bosnian government two years later. He will be arrested again in 2002 for involvement in an al-Qaeda plot in Bosnia and sent to Guantanamo prison (see January 18, 2002). By 1996, NSA wiretaps reveal that Prince Salman is funding Islamic militants using charity fronts (Between 1994 and July 1996).
  • History Commons adds important details: By 1994, if not earlier, the NSA is collecting electronic intercepts of conversations between Saudi Arabian royal family members. Journalist Seymour Hersh will later write, “according to an official with knowledge of their contents, the intercepts show that the Saudi government, working through Prince Salman [bin Abdul Aziz], contributed millions to charities that, in turn, relayed the money to fundamentalists. ‘We knew that Salman was supporting all of the causes,’ the official told me.” By July 1996 or soon after, US intelligence “had more than enough raw intelligence to conclude… bin Laden [was] receiving money from prominent Saudis.” [Hersh, 2004, pp. 324, 329-330] One such alleged charity front linked to Salman is the Saudi High Commission in Bosnia (see 1996 and After). Prince Salman has long been the governor of Riyadh province. At the time, he is considered to be about fourth in line to be king of Saudi Arabia. His son Prince Ahmed bin Salman will later be accused of having connections with al-Qaeda leader Abu Zubaida (see Early April 2002). [PBS, 10/4/2004] It appears this surveillance of Saudi royals will come to an end in early 2001 (see (February-March 2001)).
  • Author Roland Jacquard will later claim that in 1996, al-Qaeda revives its militant network in Bosnia in the wake of the Bosnian war and uses the Saudi High Commission (SHC) as its main charity front to do so. [Jacquard, 2002, pp. 69] This charity was founded in 1993 by Saudi Prince Salman bin Abdul-Aziz and is so closely linked to and funded by the Saudi government that a US judge will later render it immune to a 9/11-related lawsuit after concluding that it is an organ of the Saudi government. [New York Law Journal, 9/28/2005] In 1994, British aid worker Paul Goodall is killed in Bosnia execution-style by multiple shots to the back of the head. A SHC employee, Abdul Hadi al-Gahtani, is arrested for the murder and admits the gun used was his, but the Bosnian government lets him go without a trial. Al-Gahtani will later be killed fighting with al-Qaeda and the Taliban in Afghanistan. [Schindler, 2007, pp. 143-144; Schindler is a professor at the U.S. Army War College] In 1995, the Bosnian Ministry of Finance raids SHC’s offices and discovers documents that show SHC is “clearly a front for radical and terrorism-related activities.” [Burr and Collins, 2006, pp. 145]
  • In November 2002, Prince Salman patronized a fundraising gala for three Saudi charities under investigation by Washington: the International Islamic Relief Organization, al-Haramain Foundation, and the World Assembly of Muslim Youth. Since 9/11, all three organizations have had branches shuttered or sanctioned over allegations of financially supporting terrorism. That same month, Salman cited his experience on the boards of charitable societies, asserting that “it is not the responsibility of the kingdom” if others exploit Saudi donations for terrorism. *** The new king has also embraced Saudi cleric Saleh al-Maghamsi, an Islamic supremacist who declared in 2012 that Osama bin Laden had more “sanctity and honor in the eyes of Allah,” simply for being a Muslim, than “Jews, Christians, Zoroastrians, apostates, and atheists,” whom he described by nature as “infidels.” That didn’t put an end to Salman’s ties to Maghamsi, however. The new Saudi king recently served as head of the supervisory board for a Medina research center directed by Maghamsi. A year after Maghamsi’s offensive comments, Salman sponsored and attended a large cultural festival organized by the preacher. Maghamsi also advises two of Salman’s sons ….
  • A 1996 CIA report mentions, “We continue to have evidence that even high ranking members of the collecting or monitoring agencies in Saudi Arabia, Kuwait, and Pakistan – such as the Saudi High Commission – are involved in illicit activities, including support for terrorists” (see January 1996). Jacquard claims that most of the leadership of the SHC supports bin Laden. The SHC, while participating in some legitimate charitable functions, uses its cover to ship illicit goods, drugs, and weapons in and out of Bosnia. In May 1997, a French military report concludes: ”(T)he Saudi High Commission, under cover of humanitarian aid, is helping to foster the lasting Islamization of Bosnia by acting on the youth of the country. The successful conclusion of this plan would provide Islamic fundamentalism with a perfectly positioned platform in Europe and would provide cover for members of the bin Laden organization.” [Jacquard, 2002, pp. 69-71] However, the US will take no action until shortly after 9/11, when it will lead a raid on the SHC’s Bosnia offices. Incriminating documents will be found, including information on how to counterfeit US State Department ID badges, and handwritten notes about meetings with bin Laden. Evidence of a planned attack using crop duster planes is found as well. [Schindler, 2007, pp. 129, 284]
  •  
    So the U.S. invades Afghanistan and Iraq instead of Saudi Arabia? 
Paul Merrell

Syria Right to Hit NATO Warplanes - 0 views

  • Translated from Arabic language Alrai Media (thanks to the reliable Fort Russ Russian news site), the senior Syrian officer at the operations room is quoted as saying: “Soon Syria will announce that any country using the airspace without coordinating with Damascus will be viewed as hostile and [we] will shoot the jet down without warning. Those willing to fight terrorism and coordinate with the military leadership will be granted safe corridors.” This may seem like a dangerous escalation. American fighter jets have been bombing Syrian territory since September 2014, having carried out thousands of air strikes allegedly against the Islamic State (IS) terror group (also known by its Arabic name Daesh). Since the Paris terror attacks last month, France has stepped up its air strikes in Syria too. In the past week, Britain and Germany parliaments have voted for their air forces to join the other NATO members in aerial operations. The US-led bombing coalition in Syria also includes Turkey, Saudi Arabia and Qatar. Russia is the only country whose military aircraft are legally deployed in Syria because Moscow has the full consent of the Syrian government. All the others do not have consent from Damascus. So we have at least seven foreign powers deploying their warplanes to bomb Syrian territory – all in violation of international law.
  • It is irrelevant whether the US-led alliance claims to be fighting terrorists, or whether they claim it is in “self-defence” as France, Britain and Germany are. The Germany justice minister Heiko Maas, speaking after the Bundestag voted for military action this week, claimed that the United Nations Security Council resolution passed last month in the wake of the Paris attacks makes the German intervention legal. That UNSC resolution does not specifically sanction military action. In any case, the ultimate legal criterion is the position of the Syrian state authorities. Western governments and their media have done everything to discredit, demonise and delegitimise the Syrian government. That’s part of the US-led criminal enterprise for regime change in Syria. But the fact remains, Syria is a sovereign state fully entitled the legal rights of all other UN members. If the Syrian government of President Bashar al-Assad – which is the internationally recognised governing authority of Syria and retains its seat at the UN – does not consent to foreign military intervention, then that intervention is illegal, as Moscow and Damascus have repeatedly pointed out. Syria, with the S-300 missile system supplied by its Russian ally, now has the technical means to defend its borders and airspace from all intruders. It also has the legal right to defend the inviolability of its territory. After all, US President Barack Obama invoked this right with regard to Turkey after the shoot-down of the Russian Su-24. Obama said Turkey had “every right to protect its skies” (even though the evidence shows that the Russian fighter jet did not breach Turkish territory). In other words: what’s good for Turkey is good for Syria, as for any other nation.
  • Now, some might say it is a reckless move for Syria to train its skies with the powerful S-300. If a US, French, British or German warplane is shot down then that may ignite a full-on war with the American NATO military alliance. Russia would inevitably be dragged into the fight, which could slide into a world war between nuclear powers. But hold on a minute. That logic amounts to the US and its allies using such fear as a weapon to disarm others and to prevent sovereign states from exercising their rights. Such a dynamic is a blank cheque for powers to bully and oppress others. As Russian President Vladimir Putin has said time and again, the issue is one abiding by international law. Without respect for international law then the world resorts to the law of the jungle and barbarism, as Putin said in his recent state of the nation speech. What we have seen in recent years since the US-led wars in Afghanistan and Iraq in 2001-2003 is the wholesale erosion of sovereignty. This has involved the overt deployment of military force and the covert use of “asymmetric war”, says American political analyst Randy Martin (who writes at crookedbough.com).
  • ...2 more annotations...
  • “The use of proxy military force by the US and its NATO allies has been seen in regime-change operations in Libya, Syria and Ukraine, combined with media propaganda campaigns and economic sanctions,” says Martin. “A key strategy here by the Washington-led powers is to erode sovereign rights of designated enemy states.” The deployment of so-called Islamist terror groups to destabilise Syria as with neo-Nazi paramilitaries in Ukraine is all part of the West’s asymmetric warfare. For whatever reason, the US bombing coalition is claiming that it is combating the IS jihadists in Syria. However, the evidence shows that Western “combat” efforts in Syria are very late in coming and not very effective, indicating a lack of commitment to genuinely defeat the terror network.
  • There is also reason to believe that the NATO rush to bomb IS oil smuggling routes in Syria is really motivated by a need to cover up the tracks of Western collusion with the terror groups. The American CIA and British MI6, along with Turk military intelligence, have been implicated in running the terror “rat lines”. Russian intelligence is lifting the lid on this sordid racket. Western air strikes without the approval of the Syrian government are not only illegal, they lack credibility in their stated aim. But either way, the imperative here is that Syria re-establishes its sovereignty and the principles of international law. If Syria is lost, then Western state sponsored banditry and terrorism will only escalate. Russia is already being targeted by the West’s asymmetric warfare, as is Iran and China. Therefore, a line has to be drawn. And with Russia’s military support, Syria has the power to do just that. From now on, NATO warplanes violating Syrian territory should be put on notice. Keep out or get shot down.
  •  
    I'm not seeing that Syria has much else in the way of choices. It's either re-establish its sovereignty rights or completely lose control of its airspace.My guess is that this winds up with some kind of deal that enables NATO to keep flying missions in Syria but requires more cooperation and coordination with Syria and Russia. Which will have the neocons and neolibs in Washington, D.C. screaming for a lynch mob.
  •  
    On the reasons that Syria has to take this hard "line in the sand" to protect its sovereignty, see Tony Cartalucci at http://journal-neo.org/2015/12/07/americas-creeping-war-in-syria/ and the analysis by The Saker at http://thesaker.is/week-nine-of-the-russian-intervention-in-syria-the-empire-strikes-back/ Add in the facts that Turkey has already invaded Syria to establish a firebase in order to protect its Syrian oil smuggling racket (and ISIL supply lines) and that Turkey has massed an entire heavy armored division on the Syrian border poised for full-scale invasion. See http://southfront.org/turkey-invaded-syria-captured-tal-ziyab/ and http://southfront.org/turkey-is-ready-to-invide-syria-concentrated-1000-units-of-military-equipment-at-the-border/ So far it's an incremental invasion, perhaps probing to see how Syria and Russia will react. The answer: a line in the sand on any more NATO flights over Syria.
Paul Merrell

Revealed: Inside the Senate report on CIA interrogations | Al Jazeera America - 0 views

  • A still-classified report on the CIA's interrogation program established in the wake of 9/11 sparked a furious row last week between the agency and Senate Intelligence Committee chairwoman Dianne Feinstein. Al Jazeera has learned from sources familiar with its contents that the committee's report alleges that at least one high-value detainee was subjected to torture techniques that went beyond those authorized by George W. Bush's Justice Department. Two Senate staffers and a U.S. official, who spoke on the condition of anonymity because the information they disclosed remains classified, told Al Jazeera that the committee's analysis of 6 million pages of classified records also found that some of the harsh measures authorized by the Department of Justice had been applied to at least one detainee before such legal authorization was received. They said the report suggests that the CIA knowingly misled the White House, Congress and the Justice Department about the intelligence value of detainee Zain Abidin Mohammed Husain Abu Zubaydah when using his case to argue in favor of harsher interrogation techniques.
  • Even before accessing the documents, committee staffers received crucial information in a briefing from former FBI agent Ali Soufan in early 2008, according to Al Jazeera’s sources. Soufan — who now runs a private security and intelligence consultancy — told the staffers that he had kept meticulous notes about the methods used by a psychologist under CIA contract to interrogate Abu Zubaydah at a CIA black site in Thailand after his capture in Pakistan in March of 2002. Soufan's account, the staffers say, shows that torture techniques were used on Abu Zubaydah even before some had been sanctioned as permissible by the Bush administration.
  • Two Senate staffers told Al Jazeera that the Panetta documents question the Bush administration claims about the efficacy of Abu Zubaydah’s torture, and the staffers noted that some of the techniques to which he was subjected early in his captivity had not yet been authorized.
  • ...5 more annotations...
  • Soufan described his briefing of Intelligence Committee researchers in his memoir, “The Black Banners.” “In early 2008, in a conference room that is referred to as a sensitive compartmented information facility (SCIF), I gave a classified briefing on Abu Zubaydah to staffers of the Senate Select Committee on Intelligence,” Soufan wrote. “The staffers present were shocked. What I told them contradicted everything they had been told by Bush administration and CIA officials. When the discussion turned to whether I could prove everything I was saying, I told them, ‘Remember, an FBI agent always keep his notes.’ ”  The committee tried to gain access to Soufan’s notes — then in possession of the CIA and FBI — after it launched a review of the agency’s detention and interrogation program in 2009. But Senate investigators were told, according to Al Jazeera’s sources, that Soufan’s notes were missing and could not be found in either the FBI’s or CIA’s computer system, where other classified records about the interrogation program were stored. More than a year later, the notes ended up with the Senate Intelligence Committee, although it's not clear whether they were turned over to committee investigators by the CIA or FBI or if they were in the cache of documents taken by investigators from the secure facility in Northern Virginia in 2010, which Senate staffers refer to as the Panetta review.
  • A few weeks before the 2009 announcement of the Senate Intelligence Committee’s investigation, Abu Zubaydah’s attorney Brent Mickum was invited to meet with committee staffers in a secure conference room in the Senate Hart Office Building in Washington. Mickum recalled in an interview with Al Jazeera that committee staffers were interested in Abu Zubaydah’s recollections. “The committee was talking about torture and whether it was effective,” Mickum said. “I was able to relate to them what Abu Zubaydah told me. We talked about where he was tortured. I told them where we thought he was. I told them that the government confirmed he was never a member of Al-Qaeda. The drawings were then passed around the room.” Mickum and his co-counsel, Amy Jacobsen, presented to the committee staffers a set of ink drawings on yellow legal paper marked top secret by the CIA. Abu Zubaydah, they said, made the sketches to depict his torture and the torture of two other high-value detainees. One of the highly detailed drawings, according to knowledgeable intelligence officials, depict Abu Zubaydah being waterboarded. 
  • Senate staffers told Al Jazeera that Abu Zubaydah’s drawings were used in the report’s narrative but that the CIA objected to including copies of the images as exhibits.
  • When Panetta briefed CIA employees on March 16, 2009, about the Senate Intelligence Committee’s review, he said Feinstein and her Republican counterpart, Kit Bond of Missouri, had “assured” him “that their goal is to draw lessons for future policy decisions, not to punish those who followed guidance from the Department of Justice.” But now that some of the report’s conclusions suggest that some of the techniques used on Abu Zubaydah and other captives either went beyond what was authorized by the Justice Department or were applied before they had been authorized, the congressional staffers and U.S. officials who spoke to Al Jazeera said CIA officials are seeking further assurances against any criminal investigation. Thus far, no such assurances have been given, according to Al Jazeera’s sources, nor is there any indication that the Senate Intelligence Committee’s report would prompt a criminal investigation.
  • Chris Anders, senior legislative counsel for the American Civil Liberties Union, told Al Jazeera he's not surprised by the CIA's response, because many of those involved in the creation of the interrogation program still work at the agency and may fear being placed in legal jeopardy.  “Whatever is in the report is big enough and significant enough that the CIA has fought tooth and nail to keep it buried,” Anders said. “If what comes out in this report is as bad as some senators have said, it’s going to require a broader and deeper discussion about what took place, and it will be up to the president and Congress to lead the country through it, figure out what it means and how we need to respond to clean it up.”
Paul Merrell

Washington Gets Explicit: Its 'War on Terror' is Permanent - 0 views

  • On Thursday, the Senate Armed Services Committee held a hearing on whether the statutory basis for this "war" - the 2001 Authorization to Use Military Force (AUMF) - should be revised (meaning: expanded). This is how Wired's Spencer Ackerman (soon to be the Guardian US's national security editor) described the most significant exchange: "Asked at a Senate hearing today how long the war on terrorism will last, Michael Sheehan, the assistant secretary of defense for special operations and low-intensity conflict, answered, 'At least 10 to 20 years.' . . . A spokeswoman, Army Col. Anne Edgecomb, clarified that Sheehan meant the conflict is likely to last 10 to 20 more years from today - atop the 12 years that the conflict has already lasted. Welcome to America's Thirty Years War." That the Obama administration is now repeatedly declaring that the "war on terror" will last at least another decade (or two) is vastly more significant than all three of this week's big media controversies (Benghazi, IRS, and AP/DOJ) combined. The military historian Andrew Bacevich has spent years warning that US policy planners have adopted an explicit doctrine of "endless war". Obama officials, despite repeatedly boasting that they have delivered permanently crippling blows to al-Qaida, are now, as clearly as the English language permits, openly declaring this to be so.
  • It is hard to resist the conclusion that this war has no purpose other than its own eternal perpetuation. This war is not a means to any end but rather is the end in itself. Not only is it the end itself, but it is also its own fuel: it is precisely this endless war - justified in the name of stopping the threat of terrorism - that is the single greatest cause of that threat.
  • I wrote that the "war on terror" cannot and will not end on its own for two reasons: (1) it is designed by its very terms to be permanent, incapable of ending, since the war itself ironically ensures that there will never come a time when people stop wanting to bring violence back to the US (the operational definition of "terrorism"), and (2) the nation's most powerful political and economic factions reap a bonanza of benefits from its continuation. Whatever else is true, it is now beyond doubt that ending this war is the last thing on the mind of the 2009 Nobel Peace Prize winner and those who work at the highest levels of his administration. Is there any way they can make that clearer beyond declaring that it will continue for "at least" another 10-20 years? The genius of America's endless war machine is that, learning from the unplesantness of the Vietnam war protests, it has rendered the costs of war largely invisible. That is accomplished by heaping all of the fighting burden on a tiny and mostly economically marginalized faction of the population, by using sterile, mechanized instruments to deliver the violence, and by suppressing any real discussion in establishment media circles of America's innocent victims and the worldwide anti-American rage that generates. Though rarely visible, the costs are nonetheless gargantuan. Just in financial terms, as Americans are told they must sacrifice Social Security and Medicare benefits and place their children in a crumbling educational system, the Pentagon remains the world's largest employer and continues to militarily outspend the rest of the world by a significant margin. The mythology of the Reagan presidency is that he induced the collapse of the Soviet Union by luring it into unsustainable military spending and wars: should there come a point when we think about applying that lesson to ourselves?
  • ...3 more annotations...
  • Then there are the threats to Americans' security. Having their government spend decades proudly touting itself as "A Nation at War" and bringing horrific violence to the world is certain to prompt more and more people to want to attack Americans, as the US government itself claims took place just recently in Boston (and as clearly took place multiple other times over the last several years). And then there's the most intangible yet most significant cost: each year of endless war that passes further normalizes the endless rights erosions justified in its name. The second term of the Bush administration and first five years of the Obama presidency have been devoted to codifying and institutionalizing the vast and unchecked powers that are typically vested in leaders in the name of war. Those powers of secrecy, indefinite detention, mass surveillance, and due-process-free assassination are not going anywhere. They are now permanent fixtures not only in the US political system but, worse, in American political culture. Each year that passes, millions of young Americans come of age having spent their entire lives, literally, with these powers and this climate fixed in place: to them, there is nothing radical or aberrational about any of it. The post-9/11 era is all they have been trained to know. That is how a state of permanent war not only devastates its foreign targets but also degrades the population of the nation that prosecutes it.
  • Just to convey a sense for how degraded is this Washington "debate": Obama officials at yesterday's Senate hearing repeatedly insisted that this "war" is already one without geographical limits and without any real conceptual constraints. The AUMF's war power, they said, "stretches from Boston to the [tribal areas of Pakistan]" and can be used "anywhere around the world, including inside Syria, where the rebel Nusra Front recently allied itself with al-Qaida's Iraq affiliate, or even what Sen. Lindsey Graham (R-SC) called 'boots on the ground in Congo'". The acting general counsel of the Pentagon said it even "authorized war against al-Qaida's associated forces in Mali, Libya and Syria". Newly elected independent Sen. Angus King of Maine said after listening to how the Obama administration interprets its war powers under the AUMF: This is the most astounding and most astoundingly disturbing hearing that I've been to since I've been here. You guys have essentially rewritten the Constitution today."
  • In response to that, the only real movement in Congress is to think about how to enact a new law to expand the authorization even further. But it's a worthless and illusory debate, affecting nothing other than the pretexts and symbols used to justify what will, in all cases, be a permanent and limitless war. The Washington AUMF debate is about nothing other than whether more fig leafs are needed to make it all pretty and legal. The Obama administration already claims the power to wage endless and boundless war, in virtually total secrecy, and without a single meaningful check or constraint. No institution with any power disputes this. To the contrary, the only ones which exert real influence - Congress, the courts, the establishment media, the plutocratic class - clearly favor its continuation and only think about how further to enable it. That will continue unless and until Americans begin to realize just what a mammoth price they're paying for this ongoing splurge of war spending and endless aggression.
Paul Merrell

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
Paul Merrell

Snowden obtained nearly 2 million classified files in NSA leak - Pentagon report - RT USA - 0 views

  • Edward Snowden downloaded 1.7 million intelligence files from US agencies, the most secrets ever to be stolen from the US government in a single instance in the nation’s history, according to lawmakers who have viewed a classified Pentagon report.
  • “This is straight from the government’s playbook,” Wizner said. “Remember, the government told the Supreme Court that publication of the Pentagon Papers would cause grave danger to national security. That was not true then, and this report is not true now. Overblown claims of national security rarely stand the test of time.” Sources came forward in August, two months after the press began reporting Snowden’s leaks, to admit that authorities were unsure exactly how many documents Snowden obtained. Two anonymous officials told NBC News at the time that the NSA was using poor compartmentalization techniques - meaning that Snowden, an IT systems administrator, was able to freely comb through agency networks containing a wide range of data. NSA Director Keith Alexander said in August that the government knew what Snowden had taken, while the NBC sources in fact said the NSA was “overwhelmed” with trying to find out the details. Alexander said in an October speech that the documents were “being put out in a way that does the maximum damage to NSA and our nation.” He also told the audience that Snowden had far fewer documents to reporters than this week’s Pentagon report described. “I wish there was a way to prevent it,” he told a Baltimore, Maryland crowd. “Snowden has shared somewhere between 50,000 and 200,000 documents with reporters. These will continue to come out.”
  •  
    The seizure of all devices containing data by UK officials from David Miranda, Glenn Greenwald's partner, under dubious authority of an anti-terrorism statute, tends to show that NSA and GCHA in fact do not know how many -- or which -- documents Snowden acquired. I am extremely dubious of this 1.7 million documents claim. IIRC, Greenwald said at some point that he had been given about 50K documents.  
Paul Merrell

CIA misled on interrogation program, Senate report says - The Washington Post - 0 views

  • A report by the Senate Intelligence Committee concludes that the CIA misled the government and the public about aspects of its brutal interrogation program for years — concealing details about the severity of its methods, overstating the significance of plots and prisoners, and taking credit for critical pieces of intelligence that detainees had in fact surrendered before they were subjected to harsh techniques. The report, built around detailed chronologies of dozens of CIA detainees, documents a long-standing pattern of unsubstantiated claims as agency officials sought permission to use — and later tried to defend — excruciating interrogation methods that yielded little, if any, significant intelligence, according to U.S. officials who have reviewed the document.
  • “The CIA described [its program] repeatedly both to the Department of Justice and eventually to Congress as getting unique, otherwise unobtainable intelligence that helped disrupt terrorist plots and save thousands of lives,” said one U.S. official briefed on the report. “Was that actually true? The answer is no.”
  • Several officials who have read the document said some of its most troubling sections deal not with detainee abuse but with discrepancies between the statements of senior CIA officials in Washington and the details revealed in the written communications of lower-level employees directly involved.Officials said millions of records make clear that the CIA’s ability to obtain the most valuable intelligence against al-Qaeda — including tips that led to the killing of Osama bin Laden in 2011 — had little, if anything, to do with “enhanced interrogation techniques.”The report is divided into three volumes — one that traces the chronology of interrogation operations, another that assesses intelligence officials’ claims and a third that contains case studies on virtually every prisoner held in CIA custody since the program began in 2001. Officials said the report was stripped of certain details, including the locations of CIA prisons and the names of agency employees who did not hold ­supervisor-level positions.One official said that almost all of the critical threat-related information from Abu Zubaida was obtained during the period when he was questioned by Soufan at a hospital in Pakistan, well before he was interrogated by the CIA and waterboarded 83 times.Information obtained by Soufan, however, was passed up through the ranks of the U.S. intelligence community, the Justice Department and Congress as though it were part of what CIA interrogators had obtained, according to the committee report.
  • ...5 more annotations...
  • The Senate Intelligence Committee is expected to vote Thursday to send an executive summary of the report to Obama for declassification. U.S. officials said it could be months before that section, which contains roughly 20 conclusions and spans about 400 pages, is released to the public. The report’s release also could resurrect a long-standing feud between the CIA and the FBI, where many officials were dismayed by the agency’s use of methods that Obama and others later labeled torture. CIA veterans have expressed concern that the report reflects FBI biases. One of its principal authors is a former FBI analyst,
  • “The CIA conflated what was gotten when, which led them to misrepresent the effectiveness of the program,” said a second U.S. official who has reviewed the report. The official described the persistence of such misstatements as among “the most damaging” of the committee’s conclusions.Detainees’ credentials also were exaggerated, officials said. Agency officials described Abu Zubaida as a senior al-Qaeda operative — and, therefore, someone who warranted coercive techniques — although experts later determined that he was essentially a facilitator who helped guide recruits to al-Qaeda training camps.The CIA also oversold the role of Abd al-Rahim al-Nashiri in the 2000 bombing of the USS Cole in Yemen, which killed 17 U.S. sailors. CIA officials claimed he was the “mastermind.” The committee described a similar sequence in the interrogation of Hassan Ghul, an al-Qaeda operative who provided a critical lead in the search for bin Laden: the fact that the al-Qaeda leader’s most trusted courier used the moniker “al-Kuwaiti.” But Ghul disclosed that detail while being interrogated by Kurdish authorities in northern Iraq who posed questions scripted by CIA analysts. The information from that period was subsequently conflated with lesser intelligence gathered from Ghul at a secret CIA prison in Romania, officials said. Ghul was later turned over to authorities in Pakistan, where he was subsequently released. He was killed by a CIA drone strike in 2012.
  • Sen. Dianne Feinstein (D-Calif.), chairman of the Senate Intelligence Committee, has previously indicated that harsh CIA interrogation measures were of little value in the bin Laden hunt. “The CIA detainee who provided the most significant information about the courier provided the information prior to being subjected to coercive interrogation techniques,” Feinstein said in a 2013 statement, responding in part to scenes in the movie “Zero Dark Thirty” that depict a detainee’s slip under duress as a breakthrough moment.
  • As with Abu Zubaida and even Nashiri, officials said, CIA interrogators continued the harsh treatment even after it appeared that Baluchi was cooperating. On Sept. 22, 2003, he was flown from Kabul to a CIA black site in Romania. In 2006, he was taken to the U.S. military prison at Guantanamo Bay, Cuba. His attorneys contend that he suffered head trauma while in CIA custody. Last year, the Senate Intelligence Committee asked Baluchi’s attorneys for information about his medical condition, but military prosecutors opposed the request. A U.S. official said the request was not based solely on the committee’s investigation of the CIA program.
  • Officials said a former CIA interrogator named Charlie Wise was forced to retire in 2003 after being suspected of abusing Abu Zubaida using a broomstick as a ballast while he was forced to kneel in a stress position. Wise was also implicated in the abuse at Salt Pit. He died of a heart attack shortly after retiring from the CIA, former U.S. intelligence officials said.
Paul Merrell

Russia's Humanitarian 'Invasion' | Consortiumnews - 0 views

  • Before dawn broke in Washington on Saturday, “Ukrainian pro-Russian separatists” – more accurately described as federalists of southeast Ukraine who oppose last February’s coup in Kiev – unloaded desperately needed provisions from some 280 Russian trucks in Luhansk, Ukraine. The West accused those trucks of “invading” Ukraine on Friday, but it was a record short invasion; after delivering their loads of humanitarian supplies, many of the trucks promptly returned to Russia. I happen to know what a Russian invasion looks like, and this isn’t it. Forty-six years ago, I was ten miles from the border of Czechoslovakia when Russian tanks stormed in to crush the “Prague Spring” experiment in democracy. The attack was brutal.
  • I was not near the frontier between Russia and southeastern Ukraine on Friday as the convoy of some 280 Russian supply trucks started rolling across the border heading toward the federalist-held city of Luhansk, but that “invasion” struck me as more like an attempt to break a siege, a brutal method of warfare that indiscriminately targets all, including civilians, violating the principle of non-combatant immunity. Michael Walzer, in his War Against Civilians, notes that “more people died in the 900-day siege of Leningrad during WWII than in the infernos of Hamburg, Dresden, Tokyo, Hiroshima and Nagasaki taken together.” So the Russians have some strong feelings about sieges. There’s also a personal side for Russian President Vladimir Putin, who was born in Leningrad, now Saint Petersburg, eight years after the long siege by the German army ended. It is no doubt a potent part of his consciousness. One elder brother, Viktor, died of diphtheria during the siege of Leningrad.
  • Despite the fury expressed by U.S. and NATO officials about Russia’s unilateral delivery of the supplies after weeks of frustrating negotiations with Ukrainian authorities, there was clearly a humanitarian need. An International Committee of the Red Cross (ICRC) team that visited Luhansk on Aug. 21 to make arrangements for the delivery of aid found water and electricity supplies cut off because of damage to essential infrastructure. The Ukrainian army has been directing artillery fire into the city in an effort to dislodge the ethnic Russian federalists, many of whom had supported elected President Viktor Yanukovych who was ousted in the Feb. 22 coup. The Red Cross team reported that people in Luhansk do not leave their homes for fear of being caught in the middle of ongoing fighting, with intermittent shelling into residential areas placing civilians at risk. Laurent Corbaz, ICRC head of operations for Europe and Central Asia, reported “an urgent need for essentials like food and medical supplies.” The ICRC stated that it had “taken all necessary administrative and preparatory steps for the passage of the Russian convoy,” and that, “pending customs checks,” the organization was “therefore ready to deliver the aid to Luhansk … provided assurances of safe passage are respected.” The “safe passage” requirement, however, was the Catch-22. The Kiev regime and its Western supporters have resisted a ceasefire or a political settlement until the federalists – deemed “terrorists” by Kiev – lay down their arms and surrender.
  • ...8 more annotations...
  • Accusing the West of repeatedly blocking a “humanitarian armistice,” a Russian Foreign Ministry statement cited both Kiev’s obstructionist diplomacy and “much more intensive bombardment of Luhansk” on Aug. 21, the day after some progress had been made on the ground regarding customs clearance and border control procedures: “In other words, the Ukrainian authorities are bombing the destination [Luhansk] and are using this as a pretext to stop the delivery of humanitarian relief aid.”
  • Despite all the agreements and understandings that Moscow claims were reached earlier with Ukrainian authorities, Kiev insists it did not give permission for the Russian convoy to cross its border and that the Russians simply violated Ukrainian sovereignty – no matter the exigent circumstances they adduce. More alarming still, Russia’s “warning” could be construed as the Kremlin claiming the right to use military force within Ukraine itself, in order to protect such humanitarian supply efforts – and perhaps down the road, to protect the anti-coup federalists, as well. The risk of escalation, accordingly, will grow in direct proportion to the aggressiveness of not only the Ukrainian armed forces but also their militias of neo-fascists who have been dispatched by Kiev as frontline shock troops in eastern Ukraine.
  • Moscow’s move is a difficult one to parry, except for those – and there are many, both in Kiev and in Washington – who would like to see the situation escalate to a wider East-West armed confrontation. One can only hope that, by this stage, President Barack Obama, Secretary of State John Kerry and the European Union realize they have a tiger by the tail. The coup regime in Kiev knows which side its bread is buttered on, so to speak, and can be expected to heed the advice from the U.S. and the EU if it is expressed forcefully and clearly. Not so the fanatics of the extreme right party Svoboda and the armed “militia” comprised of the Right Sector. Moreover, there are influential neo-fascist officials in key Kiev ministries who dream of cleansing eastern Ukraine of as many ethnic Russians as possible. Thus, the potential for serious mischief and escalation has grown considerably. Even if Ukrainian President Petro Poroshenko wants to restrain his hardliners, he may be hard-pressed to do so. Thus, the U.S. government could be put in the unenviable position of being blamed for provocations – even military attacks on unarmed Russian truck drivers – over which it has little or no control.
  • The White House second-string P.R. team came off the bench on Friday, with the starters on vacation, and it was not a pretty scene. Even if one overlooks the grammatical mistakes, the statement they cobbled together left a lot to be desired. It began: “Today, in violation of its previous commitments and international law, Russian military vehicles painted to look like civilian trucks forced their way into Ukraine. … “The Ukrainian government and the international community have repeatedly made clear that this convoy would constitute a humanitarian mission only if expressly agreed to by the Ukrainian government and only if the aid was inspected, escorted and distributed by the International Committee of the Red Cross (ICRC). We can confirm that the ICRC is not escorting the vehicles and has no role in managing the mission. … “Russian military vehicles piloted by Russian drivers have unilaterally entered the territory controlled by the separatist forces.”
  • The White House protested that Kiev had not “expressly agreed” to allow the convoy in without being escorted by the ICRC. Again, the Catch 22 is obvious. Washington has been calling the shots, abetting Kiev’s dawdling as the supply trucks sat at the border for a week while Kiev prevented the kind of ceasefire that the ICRC insists upon before it will escort such a shipment. The other issue emphasized in the White House statement was inspection of the trucks: “While a small number of these vehicles were inspected by Ukrainian customs officials, most of the vehicles have not been inspected by anyone but Russia.” During a press conference at the UN on Friday, Russia’s UN Ambassador Vitaly Churkin took strong exception to that charge, claiming not only that 59 Ukrainian inspectors had been looking through the trucks on the Russian side of the border, but that media representatives had been able to choose for themselves which trucks to examine.
  • Regardless of this latest geopolitical back-and-forth, it’s clear that Moscow’s decision to send the trucks across the border marked a new stage of the civil war in Ukraine. As Putin prepares to meet with Ukrainian President Poroshenko next week in Minsk – and as NATO leaders prepare for their summit on Sept. 4 to 5 in Wales – the Kremlin has put down a marker: there are limits to the amount of suffering that Russia will let Kiev inflict on the anti-coup federalists and ethnic Russian civilians right across the border. The Russians’ attitude seems to be that if the relief convoys can be described as an invasion of sovereign territory, so be it. Nor are they alone in the court of public opinion.
  • Charter members of the Fawning Corporate Media are already busily at work, including the current FCM dean, the New York Times’ Michael R. Gordon, who was at it again with a story titled “Russia Moves Artillery Units Into Ukraine, NATO Says.”  Gordon’s “scoop” was all over the radio and TV news; it was picked up by NPR and other usual suspects who disseminate these indiscriminate alarums. Gordon, who never did find those Weapons of Mass Destruction that he assured us were in Iraq, now writes: “The Russian military has moved artillery units manned by Russian personnel inside Ukrainian territory in recent days and was using them to fire at Ukrainian forces, NATO officials said on Friday.” His main source seems to be NATO chief Anders Fogh Rasmussen, who famously declared in 2003, “Iraq has WMDs. It is not something we think; it is something we know.” Cables released by WikiLeaks have further shown the former Danish prime minister to be a tool of Washington.
  • However, Gordon provided no warning to Times’ readers about Rasmussen’s sorry track record for accuracy. Nor did the Times remind its readers about Gordon’s sorry history of getting sensitive national security stories wrong. Surely, the propaganda war will be stoked by what happened on Friday. Caveat emptor.
  •  
    Former Army officer and CIA analyst Ray McGovern informs that the Russian humanitarian aid convoy to Luhansk. It should be noted that "humanitarian intervention" has increasingly been used by the U.S. as grounds for full-fledged regime change military operations that invade other nation's sovereignty. Kosovo and Libya and prime examples, and the U.S. war by proxy against Syria has also been justified only by the humanitarian pretext of saving civilian lives, more than 100,000 of which have been extinguished by the war so far. So an actual humanitarian relief effort that invades the coup government of Ukraine's "sovereignty" seems like small potatoes in comparison. 
  •  
    Former Army officer and CIA analyst Ray McGovern informs that the Russian humanitarian aid convoy to Luhansk. It should be noted that "humanitarian intervention" has increasingly been used by the U.S. as grounds for full-fledged regime change military operations that invade other nation's sovereignty. Kosovo and Libya and prime examples, and the U.S. war by proxy against Syria has also been justified only by the humanitarian pretext of saving civilian lives, more than 100,000 of which have been extinguished by the war so far. So an actual humanitarian relief effort that invades the coup government of Ukraine's "sovereignty" seems like small potatoes in comparison. 
Paul Merrell

Analysis: PA 'balking' at war crimes probe - Middle East - Al Jazeera English - 0 views

  • After a document obtained by Al Jazeera revealed the Palestinian Authority (PA) has stalled the launch of a formal investigation into alleged Israeli war crimes in Gaza, Palestinian legal and human rights experts remain dubious that the PA ever truly intended to join the International Criminal Court (ICC). In a confidential letter obtained exclusively by Al Jazeera's Investigative Unit, the ICC's top prosecutor, Fatou Bensouda, said she "did not receive a positive confirmation" from PA Foreign Minister Riad al-Malki that the request submitted for an international investigation had the Palestinian government's approval. Palestinian officials have, on numerous occasions, threatened to head to the ICC to hold Israel accountable for possible war crimes and crimes against humanity. But their efforts so far, have proved fruitless. In July, a French lawyer filed a complaint with the court on behalf of the Palestinian minister of justice, accusing Israel of carrying out war crimes in the Gaza Strip. This came after a 2009 call for an ICC investigation into Israel's three-week military offensive in Gaza that was later dropped when the prosecutor said Palestine was not a court member. In August, Malki met with ICC officials to discuss the implications of ratifying the Rome Statute, the treaty that established the criminal court. "Everything that has happened...is clear evidence of war crimes committed by Israel, amounting to crimes against humanity," he told reporters in The Hague, referring to the recent 51-day Israeli military offensive on Gaza, which left more than 2,100 Palestinians dead. Six Israeli civilians were killed, along with 66 Israeli soldiers.
  • Two years ago, Palestine became recognised as a non-member observer state at the UN General Assembly. This made it eligible to join the ICC; however, to date, Palestinian officials have not signed the Rome Statute, even though almost 80 percent of Palestinians support going to the court. Senior Fatah official Mohammad Shtayyeh didn't say when the Palestinians would apply to the ICC, but said it would probably happen in another few months. "The indictment against Israel at the ICC and all the accompanying documents are ready," Shtayyeh told Al Jazeera. One of the remaining hurdles, Shtayyeh said, is getting one remaining Palestinian faction - Islamic Jihad - to sign an accession document before the Palestinians can present it. Hamas signed onto the proposal at the behest of the PA in August. "We're not in a situation of setting a deadline or making an ultimatum," he said. "We're following developments in the region and the world, and therefore, we'll wait for answers from the international community. But I believe that by November-December, the picture should be clearer."
  • In response to Al Jazeera's claims, the Palestinian Justice Minister Salim al-Saqqa said that Palestinian President Mahmoud Abbas was serious about going to the ICC and was "awaiting national dialogue" to pursue it. "This issue is our number-one priority," he said. "It is still on the table awaiting a few legal and technical procedures. We have not missed our opportunity to head to the court." So far, the Palestinians have struggled to use the court to pursue their claims, with some attributing this to the PA's use of an ICC investigation as a political bargaining chip. "The PA can go to the ICC in one day," said Shawan Jabarin, the director of Ramallah-based human rights group al-Haq. "Abbas, who has been turned this into a political issue, is balking." Many factors are working against setting off a war crimes investigation at the ICC, not least the international community's apparent opposition to the move. "It is the PA's trump card because the Israelis and the Americans have said it is a red line," said Diana Buttu, a lawyer and former adviser to the Palestine Liberation Organisation (PLO).
  • ...4 more annotations...
  • "When this red line is crossed, then the US said it won't give money to the PA. That's what we call blackmail. But at what point will Abu Mazen [Abbas] say this is a trump card but we will use it?"
  • During US-mediated peace talks between Israel and the Palestinians, Washington ensured that the PA would freeze all moves to turn to international organisations until April 2014. "The Palestinian Authority has been consistently pressured by the USA, Israel, Canada, the UK and other EU Member States not to take steps to grant the ICC jurisdiction," Amnesty International said. "Such pressure has included threats to withdraw financial assistance on which the Palestinian Authority depends."
  • But when Israel reneged on its pledge to free a total of 104 veteran Palestinian prisoners in four tranches, the PA responded by joining 15 international treaties and conventions. Israel said this spelled the end of their negotiations with the Palestinians, while the US said that the PA's moves negatively affected attempts to engage both parties in talks. "The PA's hesitancy can be attributed to several factors: The need to preserve it as a trump card, and also a fear of the US and some European countries' reaction," Jabarin said. "The problem is the method being used by Abbas; he has subjected the issue to political bargaining and to the whims of negotiations." Another reason the PA may be hesitant to set a war crimes investigation in motion is the ramifications it may have on some Palestinian factions. The ICC would likely look into Hamas and Islamic Jihad's rocket-firing o
  • In the past week, Israel said it would open a criminal investigation into several instances of what it is calling "military misconduct" in the Gaza war. Israel's swift call for a probe appears to be an attempt to pre-empt any independent investigations into allegations that its military committed war crimes in Gaza. "The PA gave the Israelis enough time to come up with a trick to prevent the court from opening any investigation," said Saad Djebbar, a London-based lawyer. Generally, the ICC launches probes in instances where the country involved is unable or unwilling to launch an investigation itself, Djebbar told Al Jazeera. "If the court tries to open an inquiry, the Israelis can claim they have jurisdiction [to do it themselves] because the ICC's jurisdiction is complementary," he explained. "The ICC is legally bound to allow an Israeli [probe] to continue."
  •  
    Which helps explain why, in a recent poll of Palestinians in both Gaza and the West Bank, the Hamas leader outpolled Abbas by something on the order of 70-30 on the question of who Palestinians would vote for as President if elections were held at that time. 
Paul Merrell

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
Paul Merrell

The Real Blame for Deaths in Libya    :   Information Clearing House: ICH - 0 views

  • However, in this political season, the Republicans want to gain some political advantage by stirring up doubts about President Barack Obama’s toughness on terrorism — and the Obama administration is looking for ways to blunt those rhetorical attacks by launching retaliatory strikes in Libya or elsewhere. Thus, it was small comfort to learn that Teflon-coated John Brennan, Obama’s counterterrorism adviser, had flown to Tripoli, hoping to unearth some interim Libyan government officials to consult with on the Benghazi attack. With the embassy’s help, he no doubt identified Libyan officials with some claim to purview over “terrorism.”
  • But Brennan is not about investigation. Retribution is his bag. It is likely that some Libyan interlocutor was brought forth who would give him carte blanche to retaliate against any and all those “suspected” of having had some role in the Benghazi murders. So, look for “surgical” drone strike or Abbottabad-style special forces attack — possibly before the Nov. 6 election — on whomever is labeled a “suspect.” Sound wild? It is. However, considering Brennan’s penchant for acting-first-thinking-later, plus the entrée and extraordinary influence he enjoys with President Obama, drone and/or special forces attacks are, in my opinion, more likely than not. (This is the same Brennan, after all, who compiles for Obama lists of nominees for assassination by drone.) If in Tuesday’s debate with ex-Massachusetts Gov. Mitt Romney, Obama is pressed, as expected on his supposed weakness in handling Benghazi, attacks on “terrorists,” real or “suspect,” become still more likely. Brennan and other White House functionaries might succeed in persuading the president that such attacks would be just what the doctor ordered for his wheezing poll numbers.
  • It was no surprise, then, that almost completely absent from the discussion at last Tuesday’s hearing was any attempt to figure out why a well-armed, well-organized group of terrorists wanted to inflict maximum damage on the U.S. consulate in Benghazi and kill the diplomats there. Were it not for Rep. Dennis Kucinich, D-Ohio, impressionable listeners would have been left with the idea that the attack had nothing to do with Washington’s hare-brained, bomb-heavy policies, from which al-Qaeda and similar terrorist groups are more beneficiary than victim, as in Libya. Not for the first time, Kucinich rose to the occasion at Tuesday’s hearing:
  • ...9 more annotations...
  • “You’d think that after ten years in Iraq and after eleven years in Afghanistan that the U.S. would have learned the consequences and the limits of interventionism. … Today we’re engaging in a discussion about the security failures of Benghazi. The security situation did not happen overnight because of a decision made by someone at the State Department. … “We owe it to the diplomatic corps, who serves our nation, to start at the beginning and that’s what I shall do. Security threats in Libya, including the unchecked extremist groups who are armed to the teeth, exist because our nation spurred on a civil war destroying the security and stability of Libya. … We bombed Libya. We destroyed their army. We obliterated their police stations … Al Qaeda expanded its presence. “Weapons are everywhere. Thousands of shoulder-to-air missiles are on the loose. Our military intervention led to greater instability in Libya. … It’s not surprising that the State Department was not able to adequately protect our diplomats from this predictable threat. It’s not surprising and it’s also not acceptable. … “We want to stop attacks on our embassies? Let’s stop trying to overthrow governments. This should not be a partisan issue. Let’s avoid the hype. Let’s look at the real situation here. Interventions do not make us safer. They do not protect our nation. They are themselves a threat to America.”
  • Congressman Kucinich went on to ask the witnesses if they knew how many shoulder-to-air missiles were on the loose in Libya. Nordstrom: “Ten to twenty thousand.”
  • In my view, counterterrorism guru Brennan shares the blame for this and other failures. But he has a strong allergy to acknowledging such responsibility. And he enjoys more Teflon protection from his perch closer to the president in the White House. The back-and-forth bickering over the tragedy in Benghazi has focused on so many trees that the forest never came into view. Not only did the hearing fall far short in establishing genuine accountability, it was bereft of vision. Without vision, the old proverb says, the people perish — and that includes American diplomats. The killings in Benghazi on Sept. 11, 2012, validate that wisdom. If the U.S. does not change the way it relates to the rest of the world, and especially to the Muslim world, more and more people will perish. If we persist on the aggressive path we are on, Americans will in no way be safer. As for our diplomats, in my view it is just a matter of time before our next embassy, consulate or residence is attacked.
  • We are told we should not speak ill of the dead. Dead consciences, though, should be fair game. In my view, the U.S. Secretary of State did herself no credit the morning after the killing of four of her employees, when she said: “I asked myself — how could this happen? How could this happen in a country we helped liberate, in a city we helped save from destruction? This question reflects just how complicated and, at times, how confounding the world can be. But we have to be clear-eyed, even in our grief.” But some things are confounding only to those suppressing their own responsibility for untold death and misery abroad. Secretary Clinton continues to preen about the U.S. role in the attack on Libya. And, of Gadhafi’s gory death, she exclaimed on camera with a joyous cackle, “We came; we saw; he died.” Can it come as a surprise to Clinton that this kind of attitude and behavior can set a tone, spawning still more violence?
  • At Tuesday’s hearing, Kucinich noted that in Libya “we intervened, absent constitutional authority.” Most of his colleagues reacted with the equivalent of a deep yawn, as though Kucinich had said something “quaint” and “obsolete.” Like most of their colleagues in the House, most Oversight Committee members continue to duck this key issue, which directly involves one of the most important powers/duties given the Congress in Article I of the Constitution. Such was their behavior last Tuesday, with most members preferring to indulge in hypocritical posturing aimed at scoring cheap political points. Palpable in that hearing room was one of the dangers our country’s Founders feared the most — that, for reasons of power, position and money, legislators might eventually be seduced into the kind of cowardice and expediency that would lead them to forfeit their power and their duty to prevent a president from making war at will. Many of those now doing their best to make political hay out of the Benghazi “scandal” are the same legislators who appealed strongly for the U.S. to bomb Libya and remove Gadhafi. This, despite it having been clear from the start that eastern Libya had become a new beachhead for al-Qaeda and other terrorists. From the start, it was highly uncertain who would fill the power vacuums in the east and in Tripoli.
  • As Congress failed to exercise its constitutional duties — to debate and vote on wars — Obama, along with his Defense Secretary Leon Panetta and Hillary Clinton, took a page out of the Bush/Cheney book and jumped into a new war. Just don’t call it war, said the White House. It’s merely a “kinetic humanitarian action.” You see, our friends in Europe covet that pure Libyan oil and Gadhafi had been a problem to the West for a long time. So, it was assumed that there would be enough anti-Gadhafi Libyans that a new “democratic” government could be created and talented diplomats, like Ambassador Christopher Stevens, could explain to “the locals” how missiles and bombs were in the long-term interest of Libyans.
  • On Libya, the Obama administration dissed Congress even more blatantly than Cheney and Bush did on Iraq, where there was at least the charade of a public debate, albeit perverted by false claims about Iraq’s WMDs and Saddam Hussein’s ties to al-Qaeda. And so Defense Secretary Panetta and Secretary of State Clinton stepped off cheerily to strike Libya with the same kind of post-war plan that Cheney, Bush, and then-Defense Secretary Donald Rumsfeld had for Iraq — none. Small wonder chaos reigns in Benghazi and other parts of the country. Can it be that privileged politicians like Clinton and Panetta and the many “one-percenters” in Congress and elsewhere really do not understand that, when the U.S. does what it did to Libya, there will be folks who don’t like it; that they will be armed; that there will be blowback; that U.S. diplomats, given an impossible task, will die?
  • Constitutionally, the craven Congress is a huge part of the problem. Only a few members of the House and Senate seem to care very much when presidents act like kings and send off troops drawn largely by a poverty draft to wars not authorized (or simply rubber-stamped) by Congress. Last Tuesday, Kucinich’s voice was alone crying in the wilderness, so to speak. (And, because of redistricting and his loss in a primary that pitted two incumbent Democrats against each other, he will not be a member of the new Congress in January.) This matters — and matters very much. At a hearing of the Senate Armed Services Committee on March 7, Sen. Jeff Sessions, R-Alabama, pursued this key issue with Panetta and Joint Chiefs Chairman Gen. Martin Dempsey. Chafing ex post facto at the unauthorized nature of the war in Libya, Sessions asked repeatedly what “legal basis” would the Obama administration rely on to do in Syria what it did in Libya. Watching that part of the testimony it seemed to me that Sessions, a conservative Southern lawyer, was not at all faking when he pronounced himself “almost breathless,” as Panetta stonewalled time after time. Panetta made it explicitly clear that the administration does not believe it needs to seek congressional approval for wars like Libya. At times he seemed to be quoting verses from the Book of Cheney.
  • Sessions: “I am really baffled … The only legal authority that’s required to deploy the U.S. military [in combat] is the Congress and the president and the law and the Constitution.” Panetta: “Let me just for the record be clear again, Senator, so there is no misunderstanding. When it comes to national defense, the president has the authority under the Constitution to act to defend this country, and we will, Sir.” (If you care about the Constitution and the rule of law, I strongly recommend that you view the entire 7-minute video clip.)
Gary Edwards

KeepTheWebOpen.com - 0 views

  •  
    Keep the Web Open and out of the hands of Agenda 21 UN socialists and the tyranny of ACTA. California Representative Darryl Issa has proposed  OPEN - the Online Protection & ENforcement of Ditital Trade Act.  Join the movement to keep the Web Open and sign on today. The background to this urgency is that Obama is trying to run an end around Congress, claiming that he has the authority to sign ACTA: From the Vanguard of Freedom: The Anti-Counterfeiting Trade Agreement. ACTA is supposed to strengthen intellectual property rights; that is, the rights of artists to protect their creations from being copied and counterfeited, essentially stolen and reproduced without consent. However, many including Congressman Darrel Issa (via his website on this subject) has called ACTA "an unconstitutional power grab started by President George W. Bush and completed by President Barack Obama - despite the White House's January 14 criticism of legislative solutions that harm the Internet and erode individual rights." Says Issa: "…The Constitution gives Congress the power to pass intellectual property legislation - like SOPA and PIPA - and gives the Senate the power to ratify treaties. But the Obama Administration maintains that ACTA is not even a treaty, justifying the exclusion of both American citizens and their elected representatives. It is a practice Vice President Joe Biden decried as a U.S. Senator…" Maira Sutton and Parker Higgins, writing for the Electronic Frontier Foundation, an "electronics" rights advocacy organization, say in an article they authored, that "…We Have Every Right to Be Furious About ACTA." Sutton and Higgins write: "…Negotiated in secret, ACTA bypassed checks and balances of existing international IP norm-setting bodies, without any meaningful input from national parliaments, policymakers, or their citizens. Worse still, the agreement creates a new global institution, an 'ACTA Committee' to ove
Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
Paul Merrell

NSA 'secret backdoor' paved way to U.S. phone, e-mail snooping | Politics and Law - CNET News - 0 views

  • The National Security Agency created a "secret backdoor" so its massive databases could be searched for the contents of U.S. citizens' confidential phone calls and e-mail messages without a warrant, according to the latest classified documents leaked by Edward Snowden. A report in the Guardian on Friday quoted Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence Committee, as saying the secret rule offers a loophole allowing "warrantless searches for the phone calls or emails of law-abiding Americans." That appears to confirm what Rep. Jerrold Nadler, a New York Democrat, said in June after receiving a classified briefing from administration officials a few days earlier on the extent of the NSA's domestic surveillance operations. If the NSA wants "to listen to the phone," an analyst's decision is sufficient, without any other legal authorization required, Nadler said he had been told during the briefing. "I was rather startled," said Nadler, an attorney who serves on the House Judiciary Committee.
  • FBI Director Robert Mueller responded by assuring Nadler, according to a transcript of the hearing, that to "listen to the phone," the government would need "a particularized order" from the Foreign Intelligence Surveillance Court -- a claim that is contradicted by today's Guardian report and other documents. Mueller has been succeeded by James Comey, who was confirmed last month by the Senate. In response to a CNET article at the time, Director of National Intelligence James Clapper released a statement saying: "The statement that a single analyst can eavesdrop on domestic communications without proper legal authorization is incorrect and was not briefed to Congress." Clapper never elaborated, however, on what "proper" authorization would be. Today's top-secret document leaked by Snowden reveals that "procedures approved on 3 October 2011 now allow for use of certain United States person names and identifiers as query terms when reviewing collected FAA 702 data."
  • FAA 702 is a reference to section 702 of a 2008 law that amended the Foreign Intelligence Surveillance Act. Those amendments created a warrantless surveillance process that could be employed by NSA analysts, but Congress never intended it to be used domestically against American citizens: A congressional report accompanying the law claimed it allows electronic surveillance only of "persons located outside the United States in order to acquire foreign intelligence information." In reality, though, the Obama Justice Department has devised secret interpretations of FAA 702 carving out loopholes in what were intended to be strict privacy safeguards. One loophole revealed in June shows that NSA, CIA, and FBI analysts are granted broad access to data vacuumed up by the world's most powerful intelligence agency -- but are supposed to follow certain "targeting" and "minimization" procedures to limit the number of Americans who become individual targets of warrantless surveillance.
  • ...2 more annotations...
  • Today's disclosures appear to be at odds with what President Obama has said over the last two months in defense of NSA surveillance. "What I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your e-mails," Obama has said. Earlier reports have indicated that the NSA has the ability to record nearly all domestic and international phone calls -- in case an analyst needed to access the recordings in the future. A Wired magazine article last year disclosed that the NSA has established "listening posts" that allow the agency to collect and sift through billions of phone calls through a massive new data center in Utah, "whether they originate within the country or overseas." That includes not just metadata, but also the contents of the communications.
  • AT&T and other telecommunications companies that allow the NSA to tap into their fiber links receive absolute immunity from civil liability or criminal prosecution, thanks to Section 702 of the FISA Amendments Act, which Congress renewed in 2012. It says that any civil lawsuit "against any person for providing assistance to an element of the intelligence community...shall be promptly dismissed." Section 702 of the law says surveillance may be authorized by the attorney general and director of national intelligence without prior approval by the secret Foreign Intelligence Surveillance Court -- in practice, this means analysts at the NSA and other agencies with intelligence functions -- as long as minimization requirements and general procedures blessed by the court are followed. It's unclear whether the court has approved the "secret backdoor" allowing Americans' e-mail and phone messages to be targeted for domestic surveillance.
Paul Merrell

Fisa court oversight: a look inside a secret and empty process | Glenn Greenwald | Comment is free | guardian.co.uk - 0 views

  • Since we began began publishing stories about the NSA's massive domestic spying apparatus, various NSA defenders – beginning with President Obama - have sought to assure the public that this is all done under robust judicial oversight. "When it comes to telephone calls, nobody is listening to your telephone calls," he proclaimed on June 7 when responding to our story about the bulk collection of telephone records, adding that the program is "fully overseen" by "the Fisa court, a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them". Obama told Charlie Rose last night:"What I can say unequivocally is that if you are a US person, the NSA cannot listen to your telephone calls … by law and by rule, and unless they … go to a court, and obtain a warrant, and seek probable cause, the same way it's always been, the same way when we were growing up and we were watching movies, you want to go set up a wiretap, you got to go to a judge, show probable cause."The GOP chairman of the House Intelligence Committee, Mike Rogers, told CNN that the NSA "is not listening to Americans' phone calls. If it did, it is illegal. It is breaking the law." Talking points issued by the House GOP in defense of the NSA claimed that surveillance law only "allows the Government to acquire foreign intelligence information concerning non-U.S.-persons (foreign, non-Americans) located outside the United States."
  • The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.
  • The NSA's media defenders have similarly stressed that the NSA's eavesdropping and internet snooping requires warrants when it involves Americans. The Washington Post's Charles Lane told his readers: "the government needs a court-issued warrant, based on probable cause, to listen in on phone calls." The Post's David Ignatius told Post readers that NSA internet surveillance "is overseen by judges who sit on the Foreign Intelligence Surveillance Court" and is "lawful and controlled". Tom Friedman told New York Times readers that before NSA analysts can invade the content of calls and emails, they "have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress."This has become the most common theme for those defending NSA surveillance. But these claim are highly misleading, and in some cases outright false.
  • ...1 more annotation...
  • What is vital to recognize is that the NSA is collecting and storing staggering sums of communications every day. Back in 2010, the Washington Post reported that "every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." Documents published by the Guardian last week detail that, in March 2013, the NSA collected three billions of pieces of intelligence just from US communications networks alone.In sum, the NSA is vacuuming up enormous amounts of communications involving ordinary Americans and people around the world who are guilty of nothing. There are some legal constraints governing their power to examine the content of those communications, but there are no technical limits on the ability either of the agency or its analysts to do so. The fact that there is so little external oversight is what makes this sweeping, suspicion-less surveillance system so dangerous. It's also what makes the assurances from government officials and their media allies so dubious.
  •  
    Glenn Greenwald strikes again with hard proof from NSA documents, dissecting procedures used throughout the intelligence establishment from the NSA to the President to Congress, casting severe doubt on what we have been told by those defending the NSA surveillance program. I have highlighted only a few points from this lengthy article. As to Greenwald's discussion of the FISA Court's weaknesses, he omitted one that I believe is incredibly, the lack of an adversarial system with a lawyer opposing what the government asks the Court to authorize. True, search warrants are normally issued in the U.S. with only the government represented in the process. But there is a crucial difference: once someone is charged with a crime, the warrant must be disclosed to the defendant who can ask the court to suppress all evidence unlawfully obtained not only through the warrant but also the fruits of any unlawfully obtained evidence, meaning subsequently discovered evidence that would not have been found absent the unlawfully obtained evidence. The same result can happen if the warrant is found to be invalid for any of a variety of reasons, or the officers exceeded the scope of the search authorized.  So in the normal search warrant process, the participation of an adversary attorney is only delayed; it is not virtually eliminated as it is in the FISA Court. Thus far, only those ordered to disclose records to the NSA have been granted standing to oppose disclosure, not those who have been surveilled. The entire U.S. judicial system is built around the principle of an adversarial process. Judges are expected to be neutral arbiters between two or more sides to a dispute. We do not have an inquisitorial system, as is used for example in some European nations, where the judge is also the investigator. The FISA court is presently composed of 11 federal district court judges who also preside over normal cases in their individual districts. Steeped in the adversarial system and th
Gary Edwards

Congressional Power - 1 views

  •  
    Legal Brief on Congressional Power, Court Rulings, & the Constitution: The expressed powers of Congress are listed in the Constitution. Congress also has implied powers, which are based on the Constitution's right to make any laws that are "necessary and proper" to carry out those expressed powers. Congress has exercised its implied powers thousands of times over the years. Here are but a few major illustrations of that fact. 1780 1789 The Constitution gives expressed powers to Congress in Article 1, Section 8. 1800 1810 1819 In McCulloch v. Maryland, the Supreme Court holds that the powers to tax, borrow, and regulate commerce give Congress the implied power to establish a national bank. 1820 1824 Gibbons v. Ogden is the first commerce clause case to reach the Supreme Court. The broad definition of commerce the Court lays out in its ruling extends federal authority. 1830 1840 1850 1860 1862 The U.S. government issues its first legal tender notes, which are popularly called greenbacks. 1870 1870 In Hepburn v. Griswold the Supreme Court rules that the Constitution does not authorize the printing of paper money. 1870 The Court reverses its position on the printing of paper money and holds that issuing paper money is a proper use of the currency power in the Legal Tender cases. The decision in Juliard v. Greenman (1884) reaffirms this holding. 1880 1890 1890 The Sherman Antitrust Act, based on the commerce power, regulates monopolies and other practices that limit competition. 1900 1910 1920 1930 1935 The Wagner Act, based on the commerce power, recognizes labor's right to bargain collectively. 1935 The Social Security Act is passed. 1937 The Supreme Court upholds the Social Security Act of 1935 as a proper exercise of the powers to tax and provide for the general welfare in Steward Machine Co. v. Davis and Helvering v. Davis. 1940 1950 1956 The Interstate and National Highway Act, based on the commerce and war powers, provides for a national interstate highway system.
Paul Merrell

Obama to Call for End to N.S.A.'s Bulk Data Collection - NYTimes.com - 0 views

  • The Obama administration is preparing to unveil a legislative proposal for a far-reaching overhaul of the National Security Agency’s once-secret bulk phone records program in a way that — if approved by Congress — would end the aspect that has most alarmed privacy advocates since its existence was leaked last year, according to senior administration officials.Under the proposal, they said, the N.S.A. would end its systematic collection of data about Americans’ calling habits. The bulk records would stay in the hands of phone companies, which would not be required to retain the data for any longer than they normally would. And the N.S.A. could obtain specific records only with permission from a judge, using a new kind of court order. In a speech in January, President Obama said he wanted to get the N.S.A. out of the business of collecting call records in bulk while preserving the program’s abilities. He acknowledged, however, that there was no easy way to do so, and had instructed Justice Department and intelligence officials to come up with a plan by March 28 — Friday — when the current court order authorizing the program expires.
  • As part of the proposal, the administration has decided to ask the Foreign Intelligence Surveillance Court to renew the program as it exists for at least one more 90-day cycle, senior administration officials said. But under the plan the administration has developed and now advocates, the officials said, it would later undergo major changes. The new type of surveillance court orders envisioned by the administration would require phone companies to swiftly provide records in a technologically compatible data format, including making available, on a continuing basis, data about any new calls placed or received after the order is received, the officials said. They would also allow the government to swiftly seek related records for callers up to two phone calls, or “hops,” removed from the number that has come under suspicion, even if those callers are customers of other companies.
  • The N.S.A. now retains the phone data for five years. But the administration considered and rejected imposing a mandate on phone companies that they hold on to their customers’ calling records for a period longer than the 18 months that federal regulations already generally require — a burden that the companies had resisted shouldering and that was seen as a major obstacle to keeping the data in their hands. A senior administration official said that intelligence agencies had concluded that the operational impact of that change would be small because older data is less important.The N.S.A. uses the once-secret call records program — sometimes known as the 215 program, after Section 215 of the Patriot Act — to analyze links between callers in an effort to identify hidden terrorist associates, if they exist. It was part of the secret surveillance program that President George W. Bush unilaterally put in place after the terrorist attacks of Sept. 11, 2001, outside of any legal framework or court oversight.
  • ...4 more annotations...
  • Marc Rotenberg, the executive director of the Electronic Privacy Information Center, called the administration’s proposal a “sensible outcome, given that the 215 program likely exceeded current legal authority and has not proved to be effective.” While he said that he would like to see more overhauls to other surveillance authorities, he said the proposal was “significant” and addressed the major concerns with the N.S.A.’s bulk records program. Jameel Jaffer of the American Civil Liberties Union said, “We have many questions about the details, but we agree with the administration that the N.S.A.’s bulk collection of call records should end.” He added, “As we’ve argued since the program was disclosed, the government can track suspected terrorists without placing millions of people under permanent surveillance.”
  • In recent days, attention in Congress has shifted to legislation developed by leaders of the House Intelligence Committee. That bill, according to people familiar with a draft proposal, would have the court issue an overarching order authorizing the program, but allow the N.S.A. to issue subpoenas for specific phone records without prior judicial approval.
  • The Obama administration proposal, by contrast, would retain a judicial role in determining whether the standard of suspicion was met for a particular phone number before the N.S.A. could obtain associated records.The administration’s proposal would also include a provision clarifying whether Section 215 of the Patriot Act, due to expire next year unless Congress reauthorizes it, may in the future be legitimately interpreted as allowing bulk data collection of telephone data.The proposal would not, however, affect other forms of bulk collection under the same provision. The C.I.A., for example, has obtained orders for bulk collection of records about international money transfers handled by companies like Western Union.
  • The government has been unable to point to any thwarted terrorist attacks that would have been carried out if the program had not existed, but has argued that it is a useful tool.
  •  
    "The N.S.A. uses the once-secret call records program ... to analyze links between callers in an effort to identify hidden terrorist associates, if they exist." Correction: "The N.S.A. *claims* to use the ..." 
« First ‹ Previous 41 - 60 of 319 Next › Last »
Showing 20 items per page