Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "defence" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

A young prince may cost Syria and Yemen dear - Voices - The Independent - 0 views

  • A succession of crucially important military and diplomatic events are convulsing the political landscape of the Middle East. The most significant development is the understanding between the US and five other world powers with Iran on limiting Iran’s nuclear programme in return for an easing of sanctions. But the muting of hostility between the US and Iran, a destabilising feature of Middle East politics since the overthrow of the Shah in 1979, may not do much to stem the momentum towards ever greater violence in Syria, Yemen and Iraq.
  • What is striking about developments in the past few weeks is that it is Saudi Arabia that is seeking radical change in the region and is prepared to use military force to secure it. In Yemen, it has launched a devastating air war and, in Syria, it is collaborating with Turkey to support extreme jihadi movements led by Jabhat al-Nusra, the al-Qaeda affiliate that last week captured its first provincial capital.The Saudis are abandoning their tradition of pursuing extremely cautious policies, using their vast wealth to buy influence, working through proxies and keeping close to the US. In Yemen, it is the Saudi air force that is bombarding the Houthis, along with Yemeni army units still loyal to former president Ali Abdullah Saleh who was once seen as the Saudis’ and Americans’ man in Sanaa, the Yemeni capital. As with many other air campaigns, the Saudis and their Gulf Co-operation Council allies are finding that air strikes without a reliable military partner on the ground do not get you very far. But if Saudi ground forces are deployed in Yemen they will be entering a country that has been just as much of a quagmire as Afghanistan and Iraq.
  • The Saudis are portraying their intervention as provoked by Iranian-backed Shia Zaidis trying to take over the country. Much of this is propaganda. The Houthis, who come from the Zaidi tribes in Yemen’s northern mountains, have an effective military and political movement called Ansar Allah, modelled on Hezbollah in Lebanon. They have fought off six government offensives against them since 2004, all launched by former President Saleh, then allied to the Saudis. Saleh, himself a Zaidi but drawing his support from the Zaidi tribes around the capital, Sanaa, was a casualty of the Arab Spring in Yemen but still has the support of many army units.
  • ...4 more annotations...
  • Why has Saudi Arabia plunged into this morass, pretending that Iran is pulling the strings of the Shia minority though its role is marginal? The Zaidis, estimated to be a third of the 25 million Yemeni population, are very different Shia from those in Iran and Iraq. In the past, there has been little Sunni-Shia sectarianism in Yemen, but the Saudi determination to frame the conflict in sectarian terms may be self-fulfilling.Part of the explanation may lie with the domestic politics of Saudi Arabia. Madawi al-Rasheed, a Saudi visiting professor at LSE’s Middle East Centre, says in the online magazine al-Monitor that Saudi King Salman’s defence minister and head of the royal court, his son Mohammed bin Salman, aged about 30, wants to establish Saudi Arabia as absolutely dominant in the Arabian Peninsula. She adds caustically that he needs to earn a military title, “perhaps ‘Destroyer of Shiite Rejectionists and their Persian Backers in Yemen’, to remain relevant among more experienced and aspiring siblings and disgruntled royal cousins”. A successful military operation in Yemen would give him the credentials he needs.
  • A popular war would help unite Saudi liberals and Islamists behind a national banner while dissidents could be pilloried as traitors. Victory in Yemen would compensate for the frustration of Saudi policy in Iraq and Syria where the Saudis have been outmanoeuvred by Iran. In addition, it would be a defiant gesture towards a US administration that they see as too accommodating towards Iran.
  • Yemen is not the only country in which Saudi Arabia is taking a more vigorous role. Last week, President Bashar al-Assad of Syria suffered several defeats, the most important being the fall of the provincial capital Idlib, in northern Syria, to Jabhat al-Nusra which fought alongside two other hardline al-Qaeda-type movements, Ahrar al-Sham and Jund al-Aqsa. Al-Nusra’s leader, Abu Mohammed al-Golani, immediately announced the instruction of Sharia law in the city. Sent to Syria in 2011 by Isis leader Abu Bakr al-Baghdadi to create al-Nusra, he split from Baghdadi when he tried to reabsorb al-Nusra in 2013. Ideologically, the two groups differ little and the US has launched air strikes against  al-Nusra, though Turkey still treats it as if it represented moderates.The Syrian government last week accused Turkey of helping thousands of jihadi fighters to reach Idlib and of jamming Syrian army telecommunications, which helped to undermine the defences of the city. The prominent Saudi role in the fall of Idlib was publicised by Jamal Khashoggi, a Saudi journalist and adviser to the government, in an interview in The New York Times. He said that Saudi Arabia and Turkey had backed Jabhat al-Nusra and the other jihadis in capturing Idlib, adding that “co-ordination between Turkish and Saudi intelligence has never been as good as now”. Surprisingly, this open admission that Saudi Arabia is backing jihadi groups condemned as terrorists by the US attracted little attention. Meanwhile, Isis fighters have for the first time entered Damascus in strength, taking over part the Yarmouk Palestinian camp, only ten miles from the heart of the Syrian capital.
  • Saudi Arabia is not the first monarchy to imagine that it can earn patriotic credentials and stabilise its rule by waging a short and victorious foreign war. In 1914, the monarchs of Germany, Russia and Austro-Hungary had much the same idea and found out too late that they had sawed through the branch on which they were all sitting. Likewise, Saudi rulers may find to their cost that they have been far more successful than Iran ever was in destroying the political status quo in the Middle East.
Joseph Skues

Single-Payer Health Insurance - 0 views

  • Yes, it is. And here's why.
  • Justice
  • common defence
  • ...38 more annotations...
  • Welfare,
  • Tranquility,
  • Posterity
  • Blessings of Liberty
  • general Welfare
  • common Defence
  • "health, happiness, or prosperity; well-being" of "We the People".
  • 45,000 deaths annually
  • necessary to prevent system failure
  • are capitalized to emphasize their importance
  • defense" was not capitalized.
  • which would take the profit motive that insurance corporations have to deny coverage & claims out of the system
  • defines our political system, which is a different thing entirely
  • they have never believed in democracy as noted at The Conservative Mind
  • With only 4 decades of testing America simply cannot afford to join this dangerous experiment
  • In comments they show their obvious ignorance
  • Welfare
  • 40 percent higher death risk than privately insured counterparts
  • up from a 25 percent excess death rate found in 1993. ...
  • David Frum, a "conservative", refused to acknowledge the Harvard University
  • Don't like a result? Ignore it.
  • not implementing single-payer health insurance
  • mass murder.
  • makes our economy less competitive
  • discourages U.S. innovation,
  • twice as much per capita
  • obscene
  • bankrupts
  • leads to the deaths of 100,000 persons/year
  • because the U.S. system isn't as good as that of France.
  • A "public option"
  • doesn't go far enoug
  • The only workable approach is a single-payer health insurance system ... a "Medicare for All" system.
  • scrap a privatized health insurance system that does not work
  • It's pragmatic. See Health Care Dynamics.
  • The California Nurses Association understands
  • t's a useless industry
  • US Healthcare History: Our Very Own Killing Fields
Gary Edwards

How Can the US Get Back its AAA Rating? | NewsyStocks.com - 0 views

  • First among the recommendations of S&P 500, it expects the US government to get the federal debt down to around 60 percent or 65 percent of GDP, which has been historically around 40 percent.
  • . Its concerns were divided into two categories. First, the Americans are growing old and the cons
  • Currently, t
  • ...9 more annotations...
  • S&P had made it clear that budget cuts alone are not sufficient but taxes must be increased.
  • S&P wants the US to generate enough savings from its debt deal to stabilize the national debt so that it will no longer
  • w faster than t
  • The government requires at least $4 trillion to $5 trillion in savings over the next 10 years to achieve the debt target.
  • tinue to gro
  • ncreases in entitlement costs cannot be sustained alone by the current tax collections for programs like Social S
  • ecurity.
  • budget cuts alone are not enough to reduce deficits. So taxes have to be increased to add revenue to the Treasury.
  • A cap on spending would act as sort of a stopgap preventing lawmakers from letting party politics put a blockade in the way on necessary steps towards the economic recovery of the US.
  •  
    S&P wants the US to generate enough savings from its debt deal to stabilize the national debt so that it will no longer continue to grow faster than the economy. Its concerns were divided into two categories. First, the Americans are growing old and the consequent increases in entitlement costs cannot be sustained alone by the current tax collections for programs like Social Security. So, the government needs to create a framework to address the costs of an aging American population. This could require an increase in the age limit at which Social Security and Medicare Benefits could be accessed and to exclude those people who have savings or jobs from both of these programs.   The other crucial area of concerns highlighted by S&P is that budget cuts alone are not enough to reduce deficits. So taxes have to be increased to add revenue to the Treasury. While increasing revenue and cutting spending will help in reducing the deficit and help in balancing the budget. A cap on spending would act as sort of a stopgap preventing lawmakers from letting party politics put a blockade in the way on necessary steps towards the economic recovery of the US.   Analysts believe that the US needs to compromise on its defence budget also, which still supports large deployments of armed forces and material overseas. The US has commitments to NATO in Afghanistan and Iraq, and the federal government believes that it needs to support strategic initiatives in place like Japan. The government has to take strong steps in its policy towards these obligations to put the country's economy back on track.   The US owes maximum of its debt to China. So the Congress needs to put pressure on the Chinese government to alter the value of its currency to make the trade between the two countries fair. Furthermore, cheap goods exported by China have caused a loss of manufacturing jobs in the US, so the latter should place tariffs on more Chinese goods as a way to raise money and prevent dumping of pro
Paul Merrell

Secret US cybersecurity report: encryption vital to protect private data | US news | The Guardian - 0 views

  • A secret US cybersecurity report warned that government and private computers were being left vulnerable to online attacks from Russia, China and criminal gangs because encryption technologies were not being implemented fast enough. The advice, in a newly uncovered five-year forecast written in 2009, contrasts with the pledge made by David Cameron this week to crack down on encryption use by technology companies.
  • In the wake of the Paris terror attacks, the prime minister said there should be no “safe spaces for terrorists to communicate” or that British authorites could not access. Cameron, who landed in the US on Thursday night, is expected to urge Barack Obama to apply more pressure to tech giants, such as Apple, Google and Facebook, which have been expanding encrypted messaging for their millions of users since the revelations of mass NSA surveillance by the whistleblower Edward Snowden.
  • Cameron said the companies “need to work with us. They need also to demonstrate, which they do, that they have a social responsibility to fight the battle against terrorism. We shouldn’t allow safe spaces for terrorists to communicate. That’s a huge challenge but that’s certainly the right principle”. But the document from the US National Intelligence Council, which reports directly to the US director of national intelligence, made clear that encryption was the “best defence” for computer users to protect private data. Part of the cache given to the Guardian by Snowden was published in 2009 and gives a five-year forecast on the “global cyber threat to the US information infrastructure”. It covers communications, commercial and financial networks, and government and critical infrastructure systems. It was shared with GCHQ and made available to the agency’s staff through its intranet.
  • ...6 more annotations...
  • An unclassified table accompanying the report states that encryption is the “[b]est defense to protect data”, especially if made particularly strong through “multi-factor authentication” – similar to two-step verification used by Google and others for email – or biometrics. These measures remain all but impossible to crack, even for GCHQ and the NSA. The report warned: “Almost all current and potential adversaries – nations, criminal groups, terrorists, and individual hackers – now have the capability to exploit, and in some cases attack, unclassified access-controlled US and allied information systems.” It further noted that the “scale of detected compromises indicates organisations should assume that any controlled but unclassified networks of intelligence, operational or commercial value directly accessible from the internet are already potentially compromised by foreign adversaries”.
  • The report had some cause for optimism, especially in the light of Google and other US tech giants having in the months prior greatly increased their use of encryption efforts. “We assess with high confidence that security best practices applied to target networks would prevent the vast majority of intrusions,” it concluded. Official UK government security advice still recommends encryption among a range of other tools for effective network and information defence. However, end-to-end encryption – which means only the two people communicating with each other, and not the company carrying the message, can decode it – is problematic for intelligence agencies as it makes even warranted collection much more difficult.
  • The previous week, a day after the attack on the Charlie Hebdo office in Paris, the MI5 chief, Andrew Parker, called for new powers and warned that new technologies were making it harder to track extremists. In November, the head of GCHQ, Robert Hannigan, said US social media giants had become the “networks of choice” for terrorists. Chris Soghoian, principal senior policy analyst at the American Civil Liberties Union, said attempts by the British government to force US companies to weaken encryption faced many hurdles.
  • The Guardian, New York Times and ProPublica have previously reported the intelligence agencies’ broad efforts to undermine encryption and exploit rather than reveal vulnerabilities. This prompted Obama’s NSA review panel to warn that the agency’s conflicting missions caused problems, and so recommend that its cyber-security responsibilities be removed to prevent future issues.
  • The memo requested a renewal of the legal warrant allowing GCHQ to “modify” commercial software in violation of licensing agreements. The document cites examples of software the agency had hacked, including commonly used software to run web forums, and website administration tools. Such software are widely used by companies and individuals around the world. The document also said the agency had developed “capability against Cisco routers”, which would “allow us to re-route selected traffic across international links towards GCHQ’s passive collection systems”. GCHQ had also been working to “exploit” the anti-virus software Kaspersky, the document said. The report contained no information on the nature of the vulnerabilities found by the agency.
  • Michael Beckerman, president and CEO of the Internet Association, a lobby group that represents Facebook, Google, Reddit, Twitter, Yahoo and other tech companies, said: “Just as governments have a duty to protect to the public from threats, internet services have a duty to our users to ensure the security and privacy of their data. That’s why internet services have been increasing encryption security.”
Paul Merrell

NATO Finds Arab Backdoor to Arm Kiev | nsnbc international - 0 views

  • The announcement this week that the Kiev regime struck a major deal with the United Arab Emirates for military weapons raises strong suspicions that the US-led NATO alliance has found a new backdoor into Ukraine. We say «new» because it is believed that the US and its NATO allies, Poland and Lithuania, are already covertly supplying weapons to the Kiev regime. 
  • Kiev President Petro Poroshenko hailed the new strategic partnership with the Persian Gulf kingdom while attending the International Defence Exhibition (IDEX) in the UAE capital, Abu Dhabi. Poroshenko, who was royally received by UAE Crown Prince Mohammed bin Zayed al Nayhan, declared himself a «president of peace» but that Ukraine, or rather the rump state that his regime commands, needed strong Defence because of its «Russian enemy». A giveaway to the real significance of the surprise development is that Poroshenko and his Arab hosts also reportedly held discreet meetings with Pentagon officials and US weapons manufacturing executives during the weapons exhibition. That indicates that Washington is coordinating the expected arms transfers.
  • Although the Kiev-UAE partnership lacked any public detail, one can safely assume that the Arab supply of weapons to Ukraine is simply a conduit for American and NATO military support to the Western-backed junta, which seized power in Ukraine last year in an illegal coup. Its war of aggression on the separatist eastern Ukraine has inflicted at least 6,000 deaths, mainly among the ethnic Russian civilian population. Earlier this month it soon became clear that Washington and its NATO allies would pay a heavy political price for an audacious move to openly increase their military involvement in the Ukraine conflict. When Washington announced that it intended to go ahead with Congressional provisions to send «lethal aid» to Kiev there was much international consternation over such a reckless move. Moscow warned Washington that any further military support to the reactionary, anti-Russian Kiev regime on its western border would constitute a «disastrous escalation». US President Barack Obama then appeared to back off from the proposal to supply lethal munitions. America’s normally servile European allies also baulked at the Washington arms move. Germany, France and even Britain indicated disproval by stating that they would not be following suite by sending arms to Ukraine. Germany’s Chancellor Angela Merkel was perhaps the most forthright in her reservations. While on an official visit to Washington she reiterated her «no weapons» position to US media while being received in the White House by Obama.
  • ...1 more annotation...
  • No doubt a disgruntled European public reeling from economic austerity, unemployment and seething contempt for unaccountable EU leaders had a concentrating effect on the various political capitals to not throw more fuel on an already raging Ukrainian fire. The idea of going along with incendiary American militarism in Ukraine and further antagonising Russia would provoke a political storm across Europe. Hence the usually trusty European «yes men» had to defy Washington’s recklessness. That incipient divergence between the US and EU appeared to unnerve Washington, with the latter fearing that its anti-Russian axis and sanctions tactics might be unravelling. President Obama and his Secretary of State John Kerry were at pains to emphasise American-European «unity» over Ukraine and alleged «Russian aggression» – in spite of the fact that European leaders were, publicly at least, repudiating Washington’s weapons policy. So, rather than risking an open split in the NATO ranks, Washington and its allies seem to have found an ingenious way around that problem – by getting the UAE to be the front end for weapons supplied to the Kiev regime.
Paul Merrell

UN officials accused of bowing to Israeli pressure over children's rights list | World news | The Guardian - 0 views

  • Senior UN officials in Jerusalem have been accused of caving in to Israeli pressure to abandon moves to include the state’s armed forces on a UN list of serious violators of children’s rights. UN officials backed away from recommending that the Israel Defence Forces (IDF) be included on the list following telephone calls from senior Israeli officials. The Israelis allegedly warned of serious consequences if a meeting of UN agencies and NGOs based in Jerusalem to ratify the recommendation went ahead. Within hours, the meeting was cancelled. “Top officials have buckled under political pressure,” said a UN source. “As a result, a clear message has been given that Israel will not be listed.”
  • Organisations pressing for the IDF’s inclusion on the list since the war in Gaza last summer – which left more than 500 children dead and more than 3,300 injured – include Save the Children and War Child as well as at least a dozen Palestinian human rights organisations, the Israeli rights organisation B’Tselem and UN bodies such as the children’s agency Unicef. “These organisations are in uproar over what has happened,” said the UN source
  • The IDF’s inclusion on the UN’s list of grave violators of children’s rights would place it alongside non-state armed forces such as Islamic State, Boko Haram and the Taliban. There are no other state armies on the list. It would propel Israel further towards pariah status within international bodies and could lead to UN sanctions.
  • ...5 more annotations...
  • Although Jerusalem-based officials cancelled the meeting – and subsequently decided not to recommend the IDF’s inclusion on the list – the UN complained to Israel over the intimidation of its staff. Susana Malcorra – a high-ranking official in the New York office of the UN secretary general, Ban Ki-moon – raised the issue in a private letter to Israel’s ambassador to the UN, Ron Prosor. The UN in New York said it could not comment on leaked documents. The telephone calls were made to June Kunugi, Unicef’s special representative to Palestine and Israel, on 12 February, the night before a meeting to decide whether to recommend the IDF’s inclusion on the list. One call was from a senior figure in Cogat, the Israeli government body that coordinates between the IDF, the Palestinian Authority and the international community; the other was made by an official in Israel’s foreign ministry.
  • ccording to UN and NGO sources, Kunugi was advised to cancel the meeting or face serious consequences. However, Israeli sources described the telephone conversations as friendly and courteous attempts to persuade Kunugi to delay the working group’s decision on its recommendation regarding the IDF until Israel had been allowed to present its case on the issue. At 8.54am the next morning, an email was sent on behalf of James Rawley, a senior official with UNSCO (the office of the UN special coordinator for the Middle East peace process) who had called the meeting, to participants. It said: “Please be informed that today’s meeting scheduled at 13:00hrs has been postponed. Sincere apologies for the inconvenience this may have caused.” A joint statement to the Guardian from Kunugi and Rawley said the “strictly confidential process” of determining inclusion on the list was still ongoing and was the “prerogative of the UN secretary general, and it rests with him alone”. The UN in Jerusalem was unable to comment on the process, it added, but the submission from Jerusalem to New York was “based on verified facts, not influenced by any member state or other entity”.
  • Unicef has called a fresh meeting to update UN and NGO officials in Jerusalem on Thursday. The decision on which state and non-state armed forces are to be included on the list will be taken by UN chiefs in New York next month. However, according to the UN source, “a political decision has already been taken not to include Israel”.
  • A separate source told the Guardian: “The UN caved to Israel’s political pressure and took a highly contentious step to shelter Israel from accountability.” The list of violators of children’s rights is contained in the annex of the annual report of the secretary general on children and armed conflict. A “monitoring and reporting mechanism”, established by a UN security council resolution, supplies information on grave violations of children’s rights, such as killing and maiming, recruitment of minors into armed forces, attacks on schools, rape, abduction, and denial of humanitarian access to children. The secretary general is required to list armed forces or armed groups responsible for such actions. Following last summer’s seven-week war in Gaza, a number of UN agencies and NGOs met to consider whether to recommend the IDF’s inclusion on the list. According to insiders, participants “agreed there is a strong and credible case to recommend listing”.
  • A 13-page internal Unicef paper seen by the Guardian examined the case for the IDF to be listed on the basis of its actions in last summer’s war in Gaza, including the killing and injuring of children, and “targeted and indiscriminate” attacks on schools and hospitals. Several of the working group’s participants wrote to the UN secretary general to urge the inclusion of the IDF on the list. A letter sent in December by Defence for Children International (Palestine) said: “There is ample evidence to demonstrate that Israel’s armed forces have committed acts that amount to the grave violations against children during armed conflict, as defined by UN security council resolutions, including killing or maiming children and attacks against schools and hospitals.” The Israeli ministry of foreign affairs and Cogat declined to answer specific questions about the phone calls to Kunugi, but said in a joint statement: “Israel has a good working relationship with Unicef and the United Nations in general. Israel has no desire to get into a slanging match with anti-Israel elements nor to submit to their intimidations.”
  •  
    More information, including that Palestine Civil Society has requested that U.N. Secretary General Ban Ki Moon to discharge two U.N. officials involved becuase of this issue and because of signifificant delays that work to Israel's advantage in reconstruction of Gaza following Israel's assault last summer. http://electronicintifada.net/blogs/ali-abunimah/un-providing-israel-cover-killing-gazas-children
Paul Merrell

News Roundup and Notes: August 18, 2014 | Just Security - 0 views

  • Over the weekend, the U.S. military carried out further airstrikes in Iraq, targeting Islamic State militants near the Mosul Dam, involving “a mix of fighter, bomber, attack and remotely piloted aircraft.” The nine strikes on Saturday and 14 strikes on Sunday were carried out under authority “to support humanitarian efforts in Iraq,” to protect U.S. personnel and facilities, and to support Iraqi and Kurdish defense forces [U.S. Central Command]. President Obama notified Congress of the latest American involvement yesterday, stating that “[t]he failure of the Mosul Dam could threaten the lives of large numbers of civilians, endanger U.S. personnel and facilities, including the U.S. Embassy in Baghdad.” Obama said the operations will be “limited in their scope and duration.” The significantly expanded air campaign, including the first reported use of U.S. bombers, has strengthened the Kurdish forces’ ground offensive to reclaim the strategic dam from Islamic State control [Wall Street Journal’s Matt Bradley et al.; Washington Post’s Liz Sly et al.]. Iraqi state television reported early today that Iraqi and Kurdish forces are now in control of the dam [Reuters], although there are reports of continued heavy fighting around the Mosul Dam [Al Jazeera]. Joe Parkinson [Wall Street Journal] covers how the U.S. has gained a “controversial new ally” in the Kurdistan Workers’ Party (PKK), as a number of PKK fighters joined the U.S.-backed Kurdish battle in northern Iraq over the weekend.
  • Israel-Palestine With the five-day truce between Israel and Hamas set to expire tonight, Israeli and Palestinian negotiators are continuing discussions in Cairo, although significant gaps remain between the two sides. While Israel is pushing for tougher security measures, Palestine is demanding an end to the Gaza blockade without preconditions [Associated Press; Reuters’ Nidal Al-Mughrabi and Jeffrey Heller]. Israeli troops have demolished the homes of two Palestinians suspected to have been behind the abduction and killing of the three Israeli teenagers in the West Bank in June [Haaretz’s Gili Cohen]. An IDF spokesperson said that the demolition “conveys a clear message to terrorists and their accomplices that there is a personal price to pay when engaging in terror and carrying out attacks against Israelis” [Al Jazeera]. Haaretz’s editorial board notes how the Israeli offensive in Gaza has generated “a very public crisis in relations between Israel and the United States” and warns that “Netanyahu must ease the tension with Washington and act to repair the rift with Obama.” The Wall Street Journal (Joshua Mitnick) explores how Israeli Prime Minister Benjamin Netanyahu’s “containment strategy” in the ongoing conflict is “a contrast from the tough talk against terrorism that fueled his political ascent.”
  • ulian Borger [The Guardian] notes how the potential International Criminal Court investigation into alleged war crimes in Gaza by both Israeli and Hamas forces has become a “fraught political battlefield.” Marwan Bishara [Al Jazeera] explains how and why the UN has been “sidelined” in the Middle East conflict. Meanwhile, the British government is facing a legal challenge over its decision to not suspend existing licenses for the sale of military hardware to Israel following the launch of Operation Protective Edge in Gaza last month [The Guardian’s Jamie Doward].
  • ...3 more annotations...
  • Texas Governor Rick Perry [Politico Magazine] writes that “[c]learly more strikes will be necessary, with nothing less than a sustained air campaign to degrade and destroy Islamic State forces.” The Hill (Alexander Bolton) notes that Democrats in both chambers have called for a vote in Congress over military strikes in Iraq, while Senate Majority Leader Harry Reid “almost certainly wants to avoid [a vote] as he seeks to keep the upper chamber majority in his party’s hands.” The United Kingdom has also expanded its military involvement in Iraq, with Defence Secretary Michael Fallon confirming that British warplanes are no longer confined to the initial humanitarian mission to assist Iraq’s Yazidi minority [The Guardian’s Nicholas Watt]. The UN Security Council has placed six individuals affiliated with extremist organizations in Iraq and Syria, including the Islamic State, on its sanctions list [UN News Centre]. Army Col. Joel Rayburn, writing in the Washington Post, considers the legacy of Nouri al-Maliki. While Maliki has agreed to step down as prime minister, Rayburn argues that “the damage he has wrought will define his country for decades to come.” Mike Hanna [Al Jazeera America] explains why Maliki’s ouster “is no magic bullet for Iraq,” noting that a “change of prime minister doesn’t in itself alter Iraq’s political or security equation.” And Ali Khedery [New York Times] writes how the latest change in government “really is Iraq’s last chance.”
  • Journalist James Risen, who faces prison over his refusal to reveal the source of a CIA operation story, has called President Obama “the greatest enemy of press freedom in a generation” [New York Times’ Maureen Dowd]. The International Atomic Energy Agency said that Iran has promised to co-operate with an investigation to be carried out by the nuclear watchdog, following a “useful” meeting in Tehran [Reuters’ Fredrik Dahl and Mehrdad Balali]. Sky News reports that WikiLeaks founder Julian Assange is planning to “soon” leave the Ecuadorian embassy in London, after spending more than two years inside the building. Assange said he is planning to meet with the British government to resolve his “lack of legal protection.”
  • If you want to receive your news directly to your inbox, sign up here for the Just Security Early Edition. For the latest information from Just Security, follow us on Twitter (@just_security) and join the conversation on Facebook. To submit news articles and notes for inclusion in our daily post, please email us at news@justsecurity.org. Don’t forget to visit The Pipeline for a preview of upcoming events and blog posts on U.S. national security.
  •  
    Until about a month ago, I thought that Barack Obama would leave only two lasting accomplishments for future history books: [i] first African-American President; and [ii] ending the U.S. war in Iraq. Make it item 1 only now. It's no longer U.S. military "mission creep" in Iraq; it's full bore reinvasion topped off with a U.S. enguineered coup of the Iraqi government.   Just Security is a very high quality politico-legal site for issues involving U.S. and U.S.-sponsored violence and surveillance issues. It's based at the Center for Human Rights and Global Justice at New York University School of Law. Their emailed weekday newsletter is great for the topics I try to follow.  
Paul Merrell

The Mistral Affair: Breach of Contract or Hostile Act? | nsnbc international - 0 views

  • On November 18th 2014 Sputnik news reported that the French government has denied access to the Russian training crew for the Mistral ship Vladivostok docked at St. Nazaire. The French Ministry of Defence denied knowledge of the action but their denial is in line with the French President’s continual habit of saying one thing and meaning another. The alarming question now has to be asked whether this is just a commercial breach of contract or a hostile act, because the French government has not just “failed” to deliver the first of the two Mistral ships contracted and paid for as the press reports state, it has refused to deliver them and will not unless certain conditions are met, political conditions, which have strategic importance for Russia and conditions that can never be met unless Russia surrenders its strategic position and its Defence of the Ukrainians of the Donbass.
Paul Merrell

Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise - The Intercept - 0 views

  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
  • By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content: Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect. The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists: INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting: A = Indian Diplomatic & Indian Navy B = Central Asian diplomatic C = Chinese Human Rights Defenders D = Tibetan Pro-Democracy Personalities E = Uighur Activists F = European Special Rep to Afghanistan and Indian photo-journalism G = Tibetan Government in Exile
  • In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.” In instances where hacking may compromise data from the U.S. and U.K. governments, or their allies, notification was given to the “relevant parties.” In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge. “Analysts are potentially missing out on valuable open source information relating to cyber defence because of an inability to easily keep up to date with specific blogs and Twitter sources,” according to one document. GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media. The Twitter accounts designated for collection in the 2012 document:
  • ...3 more annotations...
  • Documents published with this article: LOVELY HORSE – GCHQ Wiki Overview INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers – SIDtoday  HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress NATO Civilian Intelligence Council – Cyber Panel – US Talking Points
  • These accounts represent a cross section of the hacker community and security scene. In addition to monitoring multiple accounts affiliated with Anonymous, GCHQ monitored the tweets of Kevin Mitnick, who was sent to prison in 1999 for various computer and fraud related offenses. The U.S. Government once characterized Mitnick as one of the world’s most villainous hackers, but he has since turned security consultant and exploit broker. Among others, GCHQ monitored the tweets of reverse-engineer and Google employee, Thomas Dullien. Fellow Googler Tavis Ormandy, from Google’s vulnerability research team Project Zero, is featured on the list, along with other well known offensive security researchers, including Metasploit’s HD Moore and James Lee (aka Egypt) together with Dino Dai Zovi and Alexander Sotirov, who at the time both worked for New York-based offensive security company, Trail of Bits (Dai Zovi has since taken up a position at payment company, Square). The list also includes notable anti-forensics and operational security expert “The Grugq.” GCHQ monitored the tweets of former NSA agents Dave Aitel and Charlie Miller, and former Air Force intelligence officer Richard Bejtlich as well as French exploit vendor, VUPEN (who sold a one year subscription for its binary analysis and exploits service to the NSA in 2012).
  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
Paul Merrell

British Army faces radical shakeup | UK news | The Guardian - 0 views

  • After the huge mistakes in Iraq and Afghanistan, and confronted now by new threats amid extraordinary geopolitical shifts, senior British army officers under the incoming chief of the general staff, Sir Nick Carter, are planning potentially far-reaching reforms. An eyecatching centrepiece is the formation of the 77th Brigade, inspired by the Chindits, the guerrilla unit which operated behind enemy lines during the Burma campaign against the Japanese during the second world war.
  • The emphasis now is not so much on military force but "political warfare", including psychological operations (psyops), deception, and media operations (hence the numerous references in recent stories by defence journalists to "facebook warriors"). The new Chindit brigade, consisting of reservists and civilian specialists as well as regular troops, is designed to help the army win non-kinetic battles in an age of internet warfare and cyber attacks. The unit would "play a key part in enabling the UK to fight in the information age", said an army spokesman.
  • Disrupting communications and spreading and countering sophisticated propaganda will be the new Chindits' priorities but the environment they will operate in will be very different from that of the Burmese jungle. 1,500 or so new Chindits, who will based near Newbury in Berkshire, could provide just the kind of help Ukraine was asking for on Monday – jamming the communications of pro-Russian, and Russian, forces in the east of the country. Carter and his advisers, meanwhile, are planning to streamline the army's hierarchy, culling perhaps a third of its 500 colonels and 200 brigadiers and generals. No senior officers were sacked over Iraq or Afghanistan. The idea is to change the culture of the top brass, to encourage individuals who have demonstrated their ability – and confidence – to understand the new world, of geopolitics as well as of conflict.
Paul Merrell

Turkey to concentrate 1000 Units of Military Equipment at the Border - 1 views

  • According to the reports, about quater of the Turkey’s 1st Army is already located at the Syrian border. The Russian Air Force’s base in Latakia could be a target of the possible attack. On the other hand, relocation of troops is reported is authorized by the United States urging Turkey to deploy thousands of additional military personal along its border with Syria “to block the movement of ISIS terrorists”. “The game has changed. Enough is enough. The border needs to be sealed,” a senior US official said of Washington’s demand to Ankara. “This is an international threat, and it’s all coming out of Syria and it’s coming through Turkish territory.” US President Barack Obama recently ordered the deployment of dozens of Special Operations troops to Syria to “assist” militants operating on the ground. Earlier, Moscow deployed S-400 air defence systems at the Hmeymim air base where the Russian warplanes are located. Also, the cruiser Moskva armed with the Fort SAM system which is the naval version of the S-300, took up a position off the Latakia’s coast. In turn, Turkey sent to the border with Syria electronic warfare system KORAL (Radar Electronic Attack System) to counter the Russian air defences in the region.
Paul Merrell

Israel: No proof to try 'terrorists' for arson attack - Al Jazeera English - 0 views

  • srael's defence minister said on Tuesday there was not enough evidence to prosecute the suspects in a deadly arson attack on a Palestinian home in the occupied West Bank in July. Moshe Yaalon told army radio he considered the firebomb attack in the village of Duma - which killed a toddler and his parents and left another child severely burned - a "Jewish terrorist act".
  • He added, however, evidence was still lacking nearly five months after the July 31 firebombing, despite the recent arrests of suspects in the case.
  • "We know who is responsible for this terrorist act, but do not have enough proof yet to try them," Yaalon said. Israel has come under heavy pressure to try those responsible for the deadly firebombing, with rights groups questioning the slow pace of investigations and contrasting it to the swift reaction often following alleged Palestinian attacks. On December 3, Israeli authorities said they had arrested a number of Jewish suspects over the attack. They have not been publicly identified and there has been no indication they have been charged. "Indictments are a rarity when Israeli soldiers or settlers resort to violence against Palestinians and investigations can last for years before being closed, absolving perpetrators of any wrongdoing," Brad Parker, attorney and international advocacy officer at Defence for Children International - Palestine, told Al Jazeera after the arrests.
  • ...1 more annotation...
  • Eighteen-month-old Ali Saad Dawabsheh and his parents were killed in the attacks. The couple's four-year-old son was the sole survivor. A Star of David and the words "revenge" and "long live the Messiah" in Hebrew were spray-painted on a wall near the family's small house. The attack drew renewed attention to Jewish extremism and accusations that Israel had not done enough to prevent such violence.
  •  
    Of course had it been an arson attack on a Jewish family by Palestinians, the Palestinians would have been summarily executed and their families punished by bulldozing their homes.
Paul Merrell

Putin condemns Turkey after Russian warplane downed near Syria border | World news | The Guardian - 0 views

  • Vladimir Putin has called Turkey “accomplices of terrorists” and warned of “serious consequences” after a Turkish F-16 jet shot down a Russian warplane on Tuesday morning, the first time a Nato country and Moscow have exchanged direct fire over the crisis in Syria. The Russian president, speaking before a meeting with King Abdullah II of Jordan in Sochi, said the plane had been shot down over Syrian airspace and fell 4km inside Syria. Putin said it was “obvious” the plane posed no threat to Turkey.
  • “Our military is doing heroic work against terrorism … But the loss today is a stab in the back, carried out by the accomplices of terrorists. I can’t describe it in any other way,” he said. Putin suggested the Turks were shielding Islamic State terrorists from Russian attacks, saying: “Do they want to make Nato serve Isis?” Ankara and the Kremlin gave conflicting accounts of the incident, which appears to have occurred in an area near the Turkish-Syrian border straddling Iskenderun and Latakia. The Turkish military said it scrambled two F-16 fighter jets after a plane entered Turkish airspace in the province of Hatay at 9.20am on Tuesday, warning it to leave 10 times in five minutes before shooting it down. A government official said: “In line with the military rules of engagement, the Turkish authorities repeatedly warned an unidentified aircraft that they were 15km or less away from the border. The aircraft didn’t heed the warnings and proceeded to fly over Turkey. The Turkish air forces responded by downing the aircraft.
  • “This isn’t an action against any specific country: our F-16s took necessary steps to defend Turkey’s sovereign territory.” Russia’s defence ministry, in a series of tweets, confirmed that a Russian Su-24 had been shot down, but insisted the plane had never left Syrian airspace and claimed that fire from the ground was responsible. “At all times, the Su-24 was exclusively over the territory of Syria,” the defence ministry said. “The Su-24 was at 6,000 metres and preliminary information suggests it was brought down by fire from the ground. The circumstances are being investigated.” A rebel brigade in Syria said both pilots had been shot dead as they parachuted from the jet. The Turkish TV network CNN Türk reported that one of the pilots was found dead. A graphic video purporting to show a dead Russian pilot has been widely circulated.
  • ...3 more annotations...
  • The UK-based Syrian Observatory for Human Rights said Russian helicopters were combing the crash site area in Jabal al-Turkman in Syria’s northern Latakia province for the pilots, and have apparently blocked wireless communications.
  • Sinan Ülgen, a former Turkish diplomat who is now the chairman of the Edam thinktank in Istanbul, said Tuesday’s incident had been coming for some time. “There were two airspace violations [in the past few weeks], and after that a very high-level Russian military delegation came to Turkey to talk about it, including a top air force official. They apologised for one of the incidents, saying that in that case the Russian pilot didn’t speak the language. So we thought we had an understanding and solved the problem. “So it’s a surprise that it happened since that visit,” said Ülgen. “But it’s not a surprise in terms of Russian strategy. Since the intervention the Russians have been testing the Turkish response at its borders and its rules of engagement. “In this case, the pilot was warned a number of times. First at 13 miles out from the Turkish border, and then at five miles out, which is when Turkish jets scramble. It went past all those thresholds,” he said.
  • Putin said there would be “serious consequences” for Russia-Turkish relations. “We have always treated Turkey as a friendly state. I don’t know who was interested in what happened today, certainly not us. And instead of immediately getting in contact with us, as far as we know, the Turkish side immediately turned to their partners from Nato to discuss this incident, as if we shot down their plane and not they ours.” Turkey opposes Assad and has condemned the Russian intervention for targeting rebels not affiliated with the terror group Islamic State. The latest incident highlights the grave risks of clashes of arms between the various international forces that have intervened in Syria. A coalition led by the US is conducting an campaign against Isis in the country, and American and Russian officials have worked on ensuring there are no clashes between their forces as they pursue their separate campaigns. But the shooting down of the Russian plane is an escalation that leaves open the possibility of a clash between a Nato member and Russia, whose intervention shows an increasing assertiveness in international affairs.
Paul Merrell

The Maidan Massacre: US Army Orders: Sow Chaos | New Eastern Outlook - 0 views

  • In a dramatic development in the trial in Kiev of several Berkut police officers accused of shooting civilians in the Maidan demonstrations in February 2014, the defence has produced two Georgians who confirm that the murders were committed by foreign snipers, at least 50 of them, operating in teams. The two Georgians, Alexander Revazishvili and Koba Nergadze have agreed to testify by video from Tbilisi, if permitted, as they feared for their lives if brought to Kiev. The defence lawyer stated, “The eyewitnesses said they had seen with their own eyes a group of people who had received weapons and cartridges and who would deliver fire afterwards from the building of the Conservatoire. Nergadze also saw snipers at the roof of Hotel Ukraine. They know the individuals personally. Besides, they know the organizers and clients and are ready to give their names, as well as the names of the perpetrators.” “In all, about fifty mercenaries arrived in Kiev then and they were involved in the events on the Maidan afterwards and fired at the protesters on February 20,” Goroshinsky went on. “The mercenaries split into groups of ten men each and were dispatched to different spots where from they delivered fire.” “Each of them [the mercenaries] received $5,000 for the job done,” he said. “In other words, these people had been brought [to Kiev] with a well-specified task to create a conflict.” https://journal-neo.org/2017/12/15/the-maidan-massacre-us-army-orders-sow-chaos/
  •  
    "In the September 2015 issue of Oriental Review, Dr. Ivan Katchanovski, at the University of Ottawa, published a devastating paper on the Maidan killings setting out in extensive detail the conclusive evidence that it was a false flag operation and that members of the present Kiev regime, including Poroshenko himself were involved in the murders, not the government forces. His paper contains all you need to know and I highly recommend it. Here is a summary of his findings: "The paper analyzes a large amount of evidence from different publicly available sources concerning this massacre and killings of specific protestors…"This academic investigation concludes that the massacre was a false flag operation, which was rationally planned and carried out with a goal of the overthrow of the government and seizure of power. It found various evidence of the involvement of an alliance of the far right organizations, specifically the Right Sector and Svoboda, and oligarchic parties, such as Fatherland. Concealed shooters and spotters were located in at least 20 Maidan-controlled buildings or areas. The various evidence that the protesters were killed from these locations include some 70 testimonies, primarily by Maidan protesters, several videos of "snipers" targeting protesters from these buildings, comparisons of positions of the specific protesters at the time of their killing and their entry wounds, and bullet impact signs. The study uncovered various videos and photos of armed Maidan "snipers" and spotters in many of these buildings. https://journal-neo.org/2017/12/15/the-maidan-massacre-us-army-orders-sow-chaos/"
Paul Merrell

IPS - Climate Change Now Seen as Security Threat Worldwide | Inter Press Service - 0 views

  • WASHINGTON, Mar 22 2013 (IPS) - Defence establishments around the world increasingly see climate change as posing potentially serious threats to national and international security, according to a review of high-level statements by the world’s governments released here Thursday. The review, “The Global Security Defense Index on Climate Change: Preliminary Results,” found that nearly three out of four governments for which relevant information is available view the possible effects of climate change as a serious national security issue.
  • It found that the wealthy developed countries of North America, Europe and East Asia, including China, have made the most progress in integrating climate change into their national security strategies.
Paul Merrell

Syria ready to unleash missiles on Israel | The Sunday Times - 0 views

  • SYRIA has put its most advanced missiles on standby with orders to hit Tel Aviv if Israel launches another raid on its territory. Reconnaissance satellites have been monitoring preparations by the Syrian army to deploy surface-to-surface Tishreen missiles. An Israeli official told The New York Times that Israel, which has launched three recent attacks on Syria, was considering further strikes and warned President Bashar al-Assad that his government would face “crippling consequences” if he hit back at Israel.
  • All parties fear hostilities spreading beyond Syria’s borders. Faisal al-Miqdad, Syria’s deputy foreign minister, said last week that the Israeli airstrikes represented “a declaration of war”.
  • Some Israeli defence experts believe that if Israel strikes again, Assad will have little choice but to retaliate. “The Tishreen missiles are extremely accurate and can cause serious harm,” said Uzi Rubin, Israel’s leading missile expert. He said Syria had large stocks of Tishreens. Referring to Israel’s main international airport, he said: “Even if they don’t hit Ben-Gurion directly, they would halt all commercial flights out of the country.”
Paul Merrell

Breedlove: No-fly zone over Syria would constitute 'act of war' - News - Stripes - 0 views

  • NAPLES, Italy — Rather than a quick and relatively painless affair, any effort to dismantle Syria’s air defenses as part of enforcing a no-fly zone would be tantamount to a declaration of war, cautioned NATO’s new military chief, Gen. Philip Breedlove. “It is quite frankly an act of war and it is not a trivial matter,” said Breedlove, NATO’s new supreme allied commanderr and head of U.S. European Command, during a recent Thursday to Naples, Italy.
  • As the debate continues about whether the U.S. and its European allies should begin to arm rebel forces in Syria and possibly impose a no-fly zone over the country to help those forces in their fight against forces loyal to President Bashar al-Assad, Breedlove cautioned that such actions also carry risks. “It would absolutely be harder than Libya,” said Breedlove, referring to NATO’s 2011 air bombardment that resulted in the ouster of longtime dictator Moammar Gadhafi. “This is a much denser, much more capable defense system than we’d faced in Libya.” While some political leaders, such as Sen. John McCain, R-Ariz., have been vocal about the need for the U.S. to arm rebel forces and support a no-fly zone, the Obama administration has so far been cautious about military involvement or sending lethal aid to rebels amid concerns that some of those fighters have ties to al-Qaida-like groups.
  • There is a widespread perception that setting up a no-fly zone is simply a matter of sending in some planes, Breedlove said. “I know it sounds stark, but what I always tell people when they talk to me about a no-fly zone is … it’s basically to start a war with that country because you are going to have to go in and kinetically take out their air defense capability,” Breedlove said. Any no-fly zone plan would be further complicated if Russia goes ahead with plans to provide Syria with advanced anti-aircraft missiles, Breedlove said. On Thursday, Assad told a Lebanese television outlet that some of Syria’s weapons contracts with Russia had been implemented, but he did not specifically mention the sophisticated S-300 anti-aircraft system. Russian media later reported that Syria would not receive the first shipment for several months.
  • ...1 more annotation...
  • “These are some very capable systems that are being talked about,” Breedlove said. The S-300 is considered a top-of-the-line air defence system which can also be used to intercept ballistic missiles. Its automatic targeting system is reported to be capable of tracking 100 targets and engaging a dozen simultaneously at all altitudes and at ranges of up to 200 kilometers.
  •  
    Query, whether Breedlove had authorization from the White House to make his statement that establishing a no-fly zone over Syria would constitute "an act of war?"  In the public debate over the Obama Administration's commencement of the Libyan War without Congressional authorization, the White House was adamant that creating a no fly-zone over Libya did not constitute "an act of war" in the sense of the U.S. Constitution's allocation to Congress of the power to declare war, ostensibly because no U.S. casualties were expected. (A good sound bite but a legally preposterous proposition. ) If Breedlove's statement was authorized by the White House, it would be an additional sign that the Obama Administration is back-pedaling on war with Syria because of Russian intervention to preserve the Syrian government, resulting in a strategic military stalemate.
Paul Merrell

Iraq Smashes Al Qaeda 'Poison Gas Cell' - Yahoo! News UK - 0 views

  • Authorities in Iraq say they have uncovered an al Qaeda cell working to produce poison gas at two locations in Baghdad for future attacks both home and abroad. Mohamed al Askari, spokesman for Iraq's defence ministry, said five suspects had been detained over the construction of two facilities in the capital to produce sarin and mustard gas, using instructions from another al Qaeda group.
  • The members of the cell were prepared to launch attacks domestically, and also had a network to smuggle the toxins to neighbouring countries, and also to Europe and North America, said Mr Al Askari. He said the group had managed to acquire some raw materials and formulas, but they had not produced any active chemical weapons. It was unclear how far along they were in their efforts. The arrests follow a joint operation between Iraqi and foreign intelligence services.
Paul Merrell

Saudi Arabia wants missiles for Syrian rebels: report - FRANCE 24 - 0 views

  • Saudi Arabia plans to supply the Syrian opposition with anti-aircraft missiles to counter President Bashar al-Assad's air force, German news weekly Der Spiegel reported Sunday. The article, citing a classified report received by the German foreign intelligence service and the German government last week, said Riyadh was looking at sending European-made Mistral-class MANPADS, or man-portable air-defence systems. Der Spiegel noted the shoulder-launched surface-to-air missiles can target low-flying aircraft including helicopters and had given mujahideen fighters in Afghanistan a decisive edge against Soviet troops in the 1980s.
  • The European Union lifted an embargo on arming the Syrian opposition last month, paving the way for greater Western support for rebels in a civil war that has claimed 93,000 lives.
  •  
    This is troubling news. Saudi Arabia has been supplying weapons to the Jihadi Syrian "rebels", i.e., al-Nusra/al-Qaeda, who are the most potent fighting anti-Syrian government forces. The particular class of anti-aircraft missiles to be provided are equivalent to the currently-deployed American Stinger B. See http://en.wikipedia.org/wiki/Man-portable_air-defense_systems#Third_generation The missiles will not stay in Syria, of course. As soon as al-Qaeda is ready to use them elsewhere, they will be.  Look for Russia to respond by announcing the addition of shoulder-fired missiles to the anti-aircraft missiles already to aid in containing the squadron of U.S. F16s now stationed on the Jordan\Syria border. 
« First ‹ Previous 41 - 60 of 143 Next › Last »
Showing 20 items per page