Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "House-investigation" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created by Dumping the A-10 - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

CNN.com - Transcripts - 0 views

  • Joining us now from Los Angeles, Tim Clemente, a former FBI counterterrorism agent. Good morning, Tim. TIM CLEMENTE, FORMER FBI COUNTERTERRORISM AGENT: Good morning, Carol. Thanks for having me.
  • COSTELLO: Let's turn our attention to the phone call between Katherine Russell and her husband, Tamerlan Tsarnaev. You said something very interesting on Erin Burnett show last night. You said that if Katherine Russell does not divulge the contents of this phone call that the FBI had other methods of finding out what was said. What did you mean by that? CLEMENTE: Well, on the national security side of the house, in the federal government, you know, we have assets. There are lots of assets at our disposal throughout the intelligence community and also not just domestically but overseas. Those assets allow us to gain information intelligence on things that we can't use ordinarily in a criminal investigation, but are used for major terrorism investigations or counter intelligence investigations. COSTELLO: You're not talking about voicemail, right? What are you talking about exactly? CLEMENTE: I'm talking about all digital communications are -- there's a way to look at digital communications in the past. I can't go into detail of how that's done or what's done. But I can tell you that no digital communication is secure. So these communications will be found out. The conversation will be known. It is just a question of whether or not Katherine Russell decides to own up to what was said prior to that information being known or after the fact. It will be unfortunate for her if she doesn't own up to it completely and fully because the facts of this case, the fact of her involvement in communication with her husband will be known.
Paul Merrell

This Confirms It was a Coup: Brazil Crisis Deepens as Evidence Mounts of Plot to Oust Dilma Rousseff | Democracy Now! - 0 views

  • A key figure in Brazil’s interim government has resigned after explosive new transcripts revealed how he plotted to oust President Dilma Rousseff in order to end a corruption investigation that was targeting him. The transcripts, published by Brazil’s largest newspaper, Folha de São Paulo, document a conversation in March, just weeks before Brazil’s lower house voted in favor of impeaching President Rousseff. Romero Jucá, who was then a senator but became a planning minister after Rousseff’s ouster, was speaking with a former oil executive, Sérgio Machado. Both men had been targets of the so-called Car Wash investigation over money laundering and corruption at the state-controlled oil firm Petrobras. In the conversation, the men agree that ousting President Rousseff would be the only way to end the corruption probe. In the transcript, Jucá said, "We have to change the government so the bleeding is stopped." Machado then reportedly said, "The easiest solution is to put Michel in"—a reference to Vice President Michel Temer, who took power once Rousseff was suspended. We speak to Maria Luisa Mendonça, director of Brazil’s Network for Social Justice and Human Rights.
Paul Merrell

What's in the Missing 28 Pages From the 9/11 Inquiry? - NBC News - 0 views

  • If members of Congress force the government to release 28 secret pages of a 14-year-old inquiry into 9/11, the missing pages may yield new tidbits about a possible role by some Saudis in aiding the hijackers — but there are thousands of other still-classified documents that would reveal far more about the terror attacks, officials tell NBC News. A renewed push is on to declassify a secret chapter of the 838-page joint inquiry report issued in December 2002 by the House and Senate intelligence committees, in part because of a lawsuit seeking to hold Saudi Arabia accountable for the attacks. That lawsuit, and explosive allegations contained in those pages, may come up during President Obama's visit to Saudi Arabia, where he arrived Wednesday morning. But many current and former officials with knowledge of the pages tell NBC News that their release would only flesh out the details of events already well known to authorities — and to members of the general public who read the exhaustive 9/11 Commission and follow-up reports.
  • The 9/11 Commission spent 17 months completing the investigation begun by the congressional inquiry. It confirmed some of the inquiry's findings about generalized assistance that various Saudis provided the 9/11 hijackers when they came to the U.S. But it also knocked down numerous other allegations, including assertions about assistance by some Saudi government officials. "The pages provide no further answers about the 9/11 attacks that are not already included in the 9/11 Commission report," says Philip Zelikow, the executive director of the 9/11 Commission, who describes the 28 pages as "unvetted investigative material." "I'm afraid they will only make the red herring glow redder," he said of the push for release of the pages, which has garnered some bipartisan support in Congress. Lost in the hubbub, according to Zelikow and others, is that there are some far more fundamental questions about the attacks that remain unanswered — or at least unknown to the public. One of the most significant: What information has 9/11 mastermind Khalid Sheikh Mohamed (KSM) been hiding all these years about the global al-Qaeda network that he oversaw around the world, including in the U.S., before and after the 2001 attacks?
  • And despite the furor over several Saudi operatives who assisted some of the hijackers, the most suspicious people were two Yemenis — radical cleric Anwar al-Awlaki and student Mohdar Abdullah, Zelikow said.
  • ...1 more annotation...
  • Another is why the Iranian government "facilitated the transit of al Qaeda members through Iran on their journey to the United States," Zelikow said. Similar questions have been raised about Pakistan. Zelikow and others said the 28 pages won't answer these broader questions about 9/11. There are mountains of other investigative documents that could, but they're locked away. "There are missing puzzle pieces to the overall issue of 9/11 as to the culpability and who was behind it," one U.S. intelligence official confirmed to NBC News. "It's fair to say there are additional insights that can be gleaned from these other sources."
  •  
    Zelikow was a main figure in the 9-11 cover-up. As chief of staff for the 9-11 Commission, his suppression of evidence and fencing Commission members out of any direct involvement in the development and drafting of the report are thoroughly documented, along with the conflict of interest that should have barred him from ever receiving the job. http://goo.gl/Vgqz5O Zelikow is also a rabid Zionist, which explains why the Commission Report never addressed the mountain of evidence that Israel played a key role in the commission of the 9/11 attacks. See e.g., Wikispooks, https://wikispooks.com/wiki/9-11/Israel_did_it
Paul Merrell

Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters - The Intercept - 0 views

  • Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution. The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous. One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
  • Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
  • In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.” “News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.” Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name. The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
  • ...2 more annotations...
  • The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges. In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens. The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)
  • It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”
  •  
    "... the Obama administration urged foreign allies to file criminal charges against Assange over the group's publication of the Afghanistan war logs." Sweden promptly launches an alleged rape investigation and Assange is forced by the UK courts to take refuge in the London embassy of Ecuador. Because of urging by the Obama administration aimed at chilling the the First Amendment rights of journalists. That should be grounds for impeachment.  
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
Paul Merrell

Banks fined over $5 billion for rigging global currency markets | Toronto Star - 0 views

  • A group of global banks will pay more than $5 billion U.S. in penalties and plead guilty to rigging the world’s currency market, the first time in more than two decades that major players in the financial industry have admitted to criminal wrongdoing. JPMorgan Chase, Citigroup, Barclays and The Royal Bank of Scotland conspired with one another to fix rates on U.S. dollars and euros traded in the huge global market for currencies, according to a resolution announced Wednesday between the banks and the U.S. Department of Justice. A group of currency traders, who called themselves “The Cartel,” allegedly shared customer orders through chat rooms and used that information to profit at the expense of their clients. The resolution is complex and involves multiple regulators in the U.S. and overseas.
  • The four banks will pay a combined $2.5 billion in criminal penalties to the DOJ for criminal manipulation of currency rates between December 2007 and January 2013, according to the agreement. The Federal Reserve is slapping them with an additional $1.6 billion in fines, as the banks’ chief regulator. Finally, British bank Barclays is paying an additional $1.3 billion to British and U.S. regulators for its role in the scheme. Another bank, Switzerland’s UBS, has agreed to plead guilty to manipulating key interest rates and will pay a separate criminal penalty of $203 million.
  • It is rare to see a bank plead guilty to wrongdoing. Even in the aftermath of the financial crisis, most financial companies reached “non-prosecution agreements” or “deferred prosecution agreements” with regulators, agreeing to pay billions in fines but not admitting any guilt. If any guilt were found, it was usually one of the bank’s subsidiaries or divisions — not the bank holding company.
  • ...2 more annotations...
  • Big banks overall have already been fined billions of dollars for their role in the housing bubble and subsequent financial crisis. But even so, the latest penalties are big. Including a separate agreement with the Federal Reserve announced Wednesday and another announced last year, the group of banks will pay nearly $9 billion in fines for manipulating the $5.3 trillion global currency market. Unlike the stock and bond markets, currencies trade nearly 24 hours a day, seven days a week. The market pauses two times a day, a moment known as “the fix.” Traders in the cartel allegedly shared client orders with rivals ahead of the “fix”, pumping up currency rates to make profits. Global companies, who do business in multiple currencies, rely on their banks to give them the closest thing to an official exchange rate each day. The banks are supposed to be looking out for them instead of conspiring to get even bigger profits by using customers’ orders against them. Travelers who regularly exchange currencies also need to get a fair price for their euros or dollars.
  • The number of traders who participated in the criminal activity was small. JPMorgan, in a statement, said the one trader involved has been fired. Citi said it fired nine employees involved. The agreement between the banks and the DOJ is subject to court approval. If approved, all five banks have agreed to three years of corporate probation overseen by a court. The banks will also help prosecutors with their investigations into individual criminal activity related to the currency market rigging. In 2012, HSBC avoided a legal battle that could further savage its reputation and undermine confidence in the global banking system by agreeing to pay $1.9 billion to settle a U.S. money-laundering probe. Another British bank, Standard Chartered, signed an agreement with New York regulators to settle a money-laundering investigation involving Iran with a $340 million payment. In 2014, the Bank of America reached a record $17 billion settlement to resolve an investigation into its role in the sale of mortgage-backed securities before the 2008 financial crisis
Paul Merrell

FBI Director: Sony's 'Sloppy' North Korean Hackers Revealed Their IP Addresses | WIRED - 0 views

  • The Obama administration has been tightlipped about its controversial naming of the North Korean government as the definitive source of the hack that eviscerated Sony Pictures Entertainment late last year. But FBI director James Comey is standing by the bureau’s conclusion, and has offered up a few tiny breadcrumbs of the evidence that led to it. Those crumbs include the claim that Sony hackers sometimes failed to use the proxy servers that masked the origin of their attack, revealing IP addresses that the FBI says were used exclusively by North Korea. Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has “very high confidence” in the FBI’s attribution of the attack to North Korea. And he named several of the sources of his evidence, including a “behavioral analysis unit” of FBI experts trained to psychologically analyze foes based on their writings and actions. He also said that the FBI compared the Sony attack with their own “red team” simulations to determine how the attack could have occurred. And perhaps most importantly, Comey now says that the hackers in the attack failed on multiple occasions to use the proxy servers that bounce their Internet connection through an obfuscating computer somewhere else in the world, revealing IP addresses that tied them to North Koreans.
  • “In nearly every case, [the Sony hackers known as the Guardians of Peace] used proxy servers to disguise where they were coming from in sending these emails and posting these statements. But several times they got sloppy,” Comey said. “Several times, either because they forgot or because of a technical problem, they connected directly and we could see that the IPs they were using…were exclusively used by the North Koreans.” “They shut it off very quickly once they saw the mistake,” he added. “But not before we saw where it was coming from.” Comey’s brief and cryptic remarks—with no opportunity for followup questions from reporters—respond to skepticism and calls for more evidence from cybersecurity experts unsatisfied with the FBI’s vague statements tying the hack to North Korean government. In a previous public announcement the FBI had said only that it found “similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” as well as IP addresses that matched prior attacks it knows to have originated in North Korea. At that time, the FBI also said it had further evidence matching the tools used in the attack to a North Korean hacking attack that hit South Korean banks and media outlets.
  • Following those elliptical statements, the cybersecurity community demanded more information be released to prove North Korea’s involvement. Some have even signed a petition on the White House website calling for more transparency in the investigation. Well-known security blogger and author Bruce Schneier has compared the FBI’s “trust us” mentality to the claims of the Bush administration about Saddam Hussein’s nonexistent weapons of mass destruction in the run-up to the Iraq War. Without more information, security experts themselves have remained deeply divided in their conclusions about who hacked Sony.
  • ...1 more annotation...
  • That pseudo-explanation will likely do little to quell the security community’s doubts. Even if the hackers appeared to fail to use proxies on some occasions, it could still be very difficult to be sure those “real” IP addresses weren’t proxies themselves designed to serve as further misdirection. And a nagging loose thread remains that the Guardians of Peace hackers in their initial statements to Sony tried to extort money from the company before making any political demands. Sony’s Kim Jong-un assassination comedy “The Interview,” the suppression of which is believed by many to be the North Korean government’s motive in the hack, wasn’t even mentioned by the hackers until long after the intrusion was underway. Comey didn’t address that plot hole in the North Korean explanation in his speech.
Paul Merrell

Former FBI Agent Mark Rossini Says The CIA Kept Him From Helping To Stop 9/11 - Business Insider - 0 views

  • An FBI special agent who lost his job in 2008 told Newsweek columnist Jeff Stein his story about how the 9/11 hijackers slipped through the cracks at the FBI and CIA more than a decade ago. Mark Rossini said the CIA prevented him from going to FBI headquarters with the information that two known terrorists, who later went on to carry out the 9/11 attacks on the World Trade Center, had entered the US. Government reports on 9/11 blame a vague "intelligence failure" for the terrorist attack that killed about 3,000 people in 2001 and provide little clarity on why the CIA didn't communicate crucial information about the hijackers to the FBI. This information, in theory, could have helped the US to prevent the attacks.
  • Rossini said that after 9/11, when congressional investigators started asking him questions about his work with the CIA's Osama bin Laden unit, he and another FBI agent stayed quiet at the direction of CIA officers. "It was just understood in the office that they were not to be trusted, that [the congressional investigators] were trying to pin this on someone, that they were trying to put someone in jail," Rossini told Newsweek. "They said [the investigators] weren’t authorized to know what was going on operationally. … When we were interviewed, the CIA had a person in the room, monitoring us." He eventually told the FBI in 2004 about what happened. He said he regrets obeying CIA orders and not going to FBI headquarters with the information that Khalid al-Mihdhar, who would go on to hijack one of the planes used in the 9/11 attack, was in the country. The CIA had been tracking al-Mihdhar for some time already. It wasn't until the agency lost track of him and another future hijacker, Nawaf al-Hazmi, in the summer of 2001 that the CIA went to the FBI with the information that the terrorists were in the US.
  • Rossini pointed out that al-Mihdhar was "a known terrorist that [the CIA] follows around the globe. He’s a subject of several cables, he comes to America ... and they allow him to leave America and go back to Yemen for the birth of his baby. And he comes back." If it was the CIA's plan to recruit al-Mihdhar and al-Hazmi, as former White House counterterrorism adviser Richard A. Clarke has suggested, it obviously did not work. A few months after the CIA lost track of the two terrorists, the 9/11 attacks were carried out. The US still doesn't have an official explanation as to why CIA officers forbade Rossini from going to FBI headquarters with the information about al-Mihdhar and al-Hazmi. Several top government officials have gone on the record with doubts about the CIA's version of events leading up to 9/11.
Paul Merrell

Netanyahu to be probed over public cash abuses | Middle East Eye - 0 views

  • A damning report by the State Comptroller said that Netanyahu spent up to $230,000 on cleaning fees in 2011 alone
  • Israeli Prime Minister Benjamin Netanyahu is to be probed over allegations of fiscal misconduct at his private and official residence. Israeli Attorney General Yehuda Weinstein on Thursday ordered a preliminary investigation, which will determine whether or not a criminal investigation will eventually be launched to deal with the misdemeanours. However, the attorney general has stressed that at this stage the investigations are not focusing in on the prime minister personally and noted that the probe will not begin before the election on 17 March where Netanyahu is vying for re-election.  
  • The announcement follows a scathing report by the State Comptroller, which queried huge sums spent on cleaning, makeup and clothing between 2009 and 2013. The long-awaited report by Yosef Shapira, who reviews how the Israeli government operates, unearthed that at their highest point in 2011, cleaning expenses for one of Netanyahu’s homes cost the Israeli taxpayer almost $285,000. Netanyahu and the First Lady only spend the occasional weekend there, but monthly cleaning costs for the house averaged more than $2,100 over the four-year period, the report found. The document also queried a large amount of electrical work carried out at the private residence by a personal friend of the Netanyahu's. “In light of the large cleaning costs, the [Prime Minister’s Office] should examine...their prudence and act to avoid unnecessary expenditures," Shapiro wrote in the report.
  • ...1 more annotation...
  • Netanyahu, his wife Sara, and their allegedly lavish lifestyles have taken centre stage in the elections so far with the opposition Zionist Union camp largely taking aim at the couple and their various misdemeanours. Claims that Sara pocket profits from a bottle recycling scheme, nicknamed bottlegate, and old allegations that she abuses her staff have all been making the rounds in the press. However, Netanyahu’s upcoming speech to US Congress has attracted growing furore.
Paul Merrell

Senate narrowly rejects new FBI surveillance | TheHill - 0 views

  • The Senate narrowly rejected expanding the FBI's surveillance powers Wednesday in the wake of the worst mass shooting in U.S. history.  Senators voted 58-38 on a procedural hurdle, with 60 votes needed to move forward. Majority Leader Mitch McConnellMitch McConnellOvernight Finance: Wall Street awaits Brexit result | Clinton touts biz support | New threat to Puerto Rico bill? | Dodd, Frank hit back The Trail 2016: Berning embers McConnell quashes Senate effort on guns MORE, who initially voted "yes," switched his vote, which allows him to potentially bring the measure back up. 
  • The Senate GOP proposal—being offered as an amendment to the Commerce, Justice and Science appropriations bill—would allow the FBI to use "national security letters" to obtain people's internet browsing history and other information without a warrant during a terrorism or federal intelligence probe.  It would also permanently extend a Patriot Act provision — currently set to expire in 2019 — meant to monitor "lone wolf" extremists.  Senate Republicans said they would likely be able to get enough votes if McConnell schedules a redo.
  • Asked if he anticipates supporters will be able to get 60 votes, Sen. John CornynJohn CornynSenate to vote on two gun bills Senate Dems rip GOP on immigration ruling Post Orlando, hawks make a power play MORE (R-Texas) separately told reporters "that's certainly my expectation." McConnell urged support for the proposal earlier Wednesday, saying it would give the FBI to "connect the dots" in terrorist investigations.  "We can focus on defeating [the Islamic State in Iraq and Syria] or we can focus on partisan politics. Some of our colleagues many think this is all some game," he said. "I believe this is a serious moment that calls for serious solutions."  But Democrats—and some Republicans—raised concerns that the changes didn't go far enough to ensure Americans' privacy.  Sen. Ron WydenRon WydenPost Orlando, hawks make a power play Democrats seize spotlight with sit-in on guns Democrats stage sit-in on House floor to push for gun vote MORE (D-Ore.) blasted his colleagues for "hypocrisy" after a gunman killed 49 people and injured dozens more during the mass shooting in Orlando, Fla. "Due process ought to apply as it relates to guns, but due process wouldn't apply as it relates to the internet activity of millions of Americans," he said ahead of Wednesday's vote. "Supporters of this amendment...have suggested that Americans need to choose between protecting our security and protecting our constitutional right to privacy." 
  • ...1 more annotation...
  • The American Civil Liberties Union (ACLU) also came out in opposition the Senate GOP proposal on Tuesday, warning it would urge lawmakers to vote against it. 
  •  
    Too close for comfort and coming around the bernd again. 
Paul Merrell

House Panel Said to Accuse Lerner of Disclosing IRS Data - Businessweek - 0 views

  • The House Ways and Means Committee plans to send a letter to Attorney General Eric Holder saying former IRS executive Lois Lerner should be prosecuted for violating taxpayers’ rights, misleading investigators and disclosing taxpayers’ private information, a House aide said. The aide, who has knowledge of the letter, spoke on condition of anonymity before the panel’s scheduled vote tomorrow. Lerner, who retired from the U.S. Internal Revenue Service as director of exempt organizations, said at a congressional hearing last year that she has done nothing wrong and committed no crime. Her office gave extra scrutiny to small-government groups seeking tax-exempt status.
Gary Edwards

The Qatari Deal To Hold The Taliban - The Qataris Have Been Used Before By President Obama - With Horrific Consequences, As U.S. Stinger Missiles Sold To Taliban | The Last Refuge - 1 views

  • Three months, a naval fleet, 3,000 marines, one Billion dollars, and 450 cruise missiles later, it’s May 2011 and Obama had yet to ask for permission to engage in his offensive war from anyone but himself and the previously noted ‘club of the traveling pantsuits’. Despite the Office of Legal Council (the golfers own legal team) telling him approval is needed, he chose to violate the War Powers Act and more importantly the Constitution. It is critical to remember the political battle being waged at the time over whether President Obama had the authority to take “offensive military action”, without congressional approval,  when the threat was not against the United States. It’s critical because from that initial impetus you find the reason why arming the Libyan rebels had to be done by another method – because President Obama never consulted congress, nor sought permission.
  • Normally, in order to send arms to the rebels lawfully, President Obama would have to request approval from Congress. He did not want to do that.   Partly because he was arrogant, and partly because he did not want the politically charged fight that such a request would engage.  It would hamper his ability to take unilateral action in Libya.
  • So an alternate method of arming the rebels needed to be structured.    Enter the State Department, Hillary Clinton, and CIA David Petraeus. Weapons, specifically MANPADS or shoulder fired missiles, would be funneled to the Benghazi rebels by the State Dept, through the CIA under the auspices of ongoing NATO operations.   May, June, July, August, Sept, 2011 this covert process was taking place. It was this covert missile delivery process which later became an issue after Gaddafi was killed.    It was during the recovery of these missiles , and the redeployment/transfer to the now uprising “Syrian Rebels” when Ambassador Chris Stevens was killed on Sept. 11th 2012.
  • ...1 more annotation...
  • [O]n July 25, 2012, Taliban fighters in Kunar province successfully targeted a US Army CH-47 helicopter with a new generation Stinger missile. They thought they had a surefire kill. But instead of bursting into flames, the Chinook just disappeared into the darkness as the American pilot recovered control of the aircraft and brought it to the ground in a hard landing. The assault team jumped out the open doors and ran clear in case it exploded. Less than 30 seconds later, the Taliban gunner and his comrade erupted into flames as an American gunship overhead locked onto their position and opened fire. The next day, an explosive ordnance disposal team arrived to pick through the wreckage and found unexploded pieces of a missile casing that could only belong to a Stinger missile. Lodged in the right nacelle, they found one fragment that contained an entire serial number. The investigation took time. Arms were twisted, noses put out of joint. But when the results came back, they were stunning: The Stinger tracked back to a lot that had been signed out by the CIA recently, not during the anti-Soviet ­jihad. Reports of the Stinger reached the highest echelons of the US command in Afghanistan and became a source of intense speculation, but no action. Everyone knew the war was winding down. Revealing that the Taliban had US-made Stingers risked demoralizing coalition troops. Because there were no coalition casualties, government officials made no public announcement of the attack. My sources in the US Special Operations community believe the Stinger fired against the Chinook was part of the same lot the CIA turned over to the ­Qataris in early 2011, weapons Hillary Rodham Clinton’s State Department intended for anti-Khadafy forces in Libya. They believe the Qataris delivered between 50 and 60 of those same Stingers to the Taliban in early 2012, and an additional 200 SA-24 Igla-S surface-to-air missiles.  (link)
  •  
    The pieces of the puzzle are slowly coming together, and it isn't pretty. This article connects Qatar, Afghanistan and hero of Benghazi, to the fabulous five terrorist dream team Obama let out of the gitmo prison. Incredible story. excerpt: "How Our Stinger Missiles Wound Up In Afghanistan Being Used Against Our Own Troops: On February 15th 2011 a civil war erupted inside Libya.   Egyptian Islamists previously  freed from jail by the Muslim Brotherhood flooded into Eastern Libya and joined with their ideological counterparts.  al-Qaeda operatives hell bent on using the cover of the Arab Spring to finally rid themselves of their nemesis, Muammar Gaddafi. President Obama chose to ignore an outbreak of violence in Libya for 19 days.  Perhaps Obama was tentative from the criticism he and Hillary received over the mixed messaging in Egypt.  Regardless, eventually Obama was begged to engage himself by leaders from France, The United Kingdom, and Italy. The White House advisors (Emanuel, McDonough, Donolin, Jarrett, Axelrod, Plouffe) were more cautious this time.  Initially Obama ignored the EU requests and later chose to dispatch the Secretary of State, Hillary Clinton, to Europe to address their concerns. "Look, enough with the jokes shorty; you got us into this mess, now the turban heads are laughing at us"… "ah, bot of course, zeah av bullets, no? Vee ave to shoot" For the following 11 days American citizens, including State Dept. embassy officials, were trying to evacuate the country as vast swathes of the country erupted in bloodshed and violence, they became trapped in Tripoli.   A bloody national revolution was underway. The United Nations Security Council held urgent immediate emergency meetings to try to determine what to do.    However, the United States Ambassador to those meetings, Susan Rice, was not present.    She was attending a global warming summit in Africa. Without the U.S. present the United  Natio
Paul Merrell

Asia Times Online :: The Caliph fit to join OPEC - 0 views

  • Islamic State leader Caliph Ibrahim - aka Abu Bakr al-Baghdadi - never ceases to amaze us - and most of all his powerful petrodollar-stuffed backers. The Caliph is for all practical purposes now an oil major worth of membership of the Organization of the Petroleum Exporting Countries (OPEC). His takfiri/mercenary goons - in theory - have for some time been extracting, refining, shipping and/or smuggling and clinching juicy deals involving vast quantities of oil, reaping profits of roughly US$2 million a day. The Caliph's oil prices are to die (be beheaded?) for; after all, he's implementing the same low-price strategy concocted by the people he wants to dethrone in Mecca, the House of Saud. The <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> caliphate's GDP across "Syraq" has only one way to go: up. And oh, the irony Top customers for The Caliph's cheap oil happen to be "Sultan" Recep Tayyip Erdogan's Earthly paradise, aka Turkey - a North Atlantic Treaty Organization ally - and that King "Playstation" Abdullah II ibn al-Hussein's domain impersonating a country, aka Jordan.
  • What Kerry did give was the Master's Voice seal of approval to the Saudi strategy of low oil prices, thinking short-term about US oil consumers at the pump, and medium-term on putting pressure on the revenues of both Iran and Russia. Yet he obviously played down the blow to the US shale gas industry. The Saudis, for their part, have other key considerations, not least how to recover their market share across Asia - where their biggest customers are located. They are losing market share because of discounted crude sold by both Iran and Iraq. Thus, both must be "punished", on top of the House of Saud's pathological aversion to all things Shi'ite. As for the big picture in Syria, Obama's capo for dealing with The Caliph, General John Allen, laid down the law to Saudi newspaper Asharq Al-Awasat. He said, "[T]here is not going to be a military solution here [in Syria]". And he also said, "The intent is not to create a field force to liberate Damascus."
  • Yo sheikh, talk to the hand Then there's that fateful Secretary of State John Kerry/House of Saud capo hand-kissing fest that took place in Riyadh last month. In this masterful piece, William Engdahl goes no-holds-barred on the supposed Saudi-US cheap oil/bomb Bashar al-Assad/undermine Russia deal. Yet there may not have been a direct deal; more like Washington and Riyadh working in tandem towards common objectives: regime change in Syria in the long term, and undermining both Iran and Russia in the short term. As for that crucial Pipelineistan gambit central to the Syrian riddle - a gas pipeline running from Qatar to regime-changed Syria, instead of Iran-Iraq-Syria - that's not exactly a Saudi, but a rival Qatari priority.
  • ...4 more annotations...
  • Meanwhile, the awesome, immensely sophisticated military apparatus/intel agency acronym fest deployed by "free" US/NATO somehow is simply unable to register/intercept this racket. Not surprising, when they somehow had not previously registered/intercepted The Caliph's goons taking over large swaths of "Syraq" this summer with their cross-desert version of rolling thunder - that gleaming white Toyota promo ad. As for the Empire of Chaos "solution" to intercept The Caliph's oil profits, the only decision so far has been to bomb oil pipelines that belong to the Syrian Arab Republic, that is, ultimately, the Syrian people. Never underestimate the capacity of US President Barack Obama's "Don't Do Stupid Stuff" foreign policy doctrine to soar towards unreachable stupidity heights.
  • Short translation: those old goons of the previously "winning against Assad" Free Syrian Army (FSA) are now six feet under. And the new FSA goons to be trained in - of all places - Saudi Arabia are not exactly being regarded as holy saviors. For all practical purposes, the medium-term scenario spells out more US bombing (of infrastructure belonging to the Syrian nation); no regime change in Damascus; and The Caliph steadily consolidating his wins. And finally, the Hollywood factor Imagine if shabby "historical" al-Qaeda had these ultra-slick PR skills. Bearded has-beens with old Kalashnikovs in Afghan caves is so passe. The Caliph not only smuggles tens of thousands of barrels of oil a day undetected, but he also deploys a British hostage turned foreign correspondent (and who may have converted to the Salafi version of Islam) reporting from a hollowed out Kobani about to be totally captured by a bunch of takfiris and mercenaries (they certainly are not mujahideen).
  • Meanwhile, on the ground, only now has Ankara allowed roughly 200 peshmergas from Iraqi Kurdistan - whose slippery leaders do business with Turkey - to cross the border to, in theory, help Kobani. No soldiers, weapons or supplies are allowed for the Kurdish PKK/PYD forces which have been actually defending Kobani all along. Sultan Erdogan's endless procrastination will be judged by any independent investigation as the key element in allowing the possible fall of Kobani. Turkish Prime Minister Ahmet Davutoglu once again has laid down the "conditions" for his country to help with the - so far spectacularly innocuous - US campaign against The Caliph; the possible liberators of Kobani must only be Iraqi peshmergas, and remaining FSA goons, not "terrorists" (as in PKK/PYD). In the end, Kobani - precisely on the border between southeast Anatolia and northern Syria - is highly strategic. The situation on the ground is dire. There may be a little over 1,000 residents left, barricaded in their houses. Protecting them, a little over 2,000 Syrian Kurd fighters, including the female Ishtar brigade. Only 200 peshmergas coming from Iraqi Kurdistan are not going to make a huge difference against a few thousand heavily weaponized caliph goons deploying as many as 20 tanks. It does not look good, even though, unlike in the Caliph-approved Brit hostage report, the fake "mujahideen" are not in total control.
  • The Caliph, anyway, is bound to remain on a roll. Absolutely none of the above would be remotely possible without US/Western overt/covert complicity, proving once and for all that The Caliph is the ultimate gift that keeps on giving in the eternal GWOT (Global War On Terra). How come the Dick Cheney regime never thought about that?
Paul Merrell

Family Affair Report Details Nepotism in Congress | CREW | Citizens for Responsibility and Ethics in Washington - 0 views

  • This report marks the first-ever complete study of how members of the House of Representatives use their positions to benefit themselves and their families. Citizens for Responsibility and Ethics in Washington (CREW) undertook a similar study in 2007, but it was not all-inclusive. Expanding on our earlier work, for this 2012 edition we reviewed every sitting member of the House.  Download the full report. CREW’s investigation uncovered 248 members meriting inclusion in this in-depth compilation, which covers the 2008 and 2010 election cycles.
  • CREW’s key findings: 82 members (40 Democrats and 42 Republicans) paid family members through their congressional offices, campaign committees and political action committees (PACs); 44 members (20 Democrats and 24 Republicans) have family members who lobby or are employed in government affairs; 90 members (42 Democrats and 48 Republicans) have paid a family business, employer, or associated nonprofit; 20 members (13 Democrats and 7 Republicans) used their campaign money to contribute to a family member’s political campaign; 14 members (6 Democrats and 8 Republicans) charged interest on personal loans they made to their own campaigns; 38 members (24 Democrats and 14 Republicans) earmarked to a family business, employer, or associated nonprofit. Partnership With Legistorm CREW is partnering with LegiStorm to make the data in this report more widely available in a searchable form. Much of CREW’s research on members’ family relationships and the ways members of Congress use their positions to benefit their families has been incorporated into LegiStorm’s database at www.legistorm.com. Download the full report
Paul Merrell

Deported by US to Turkey, Palestinian activist Dr. Sami Al-Arian speaks out | The Electronic Intifada - 0 views

  • More than six months after the US government finally dropped all charges against Dr. Sami Al-Arian, the stateless Palestinian academic and activist was deported yesterday to Turkey. During his appearance on Democracy Now! today, Dr. Al-Arian expressed relief that his twelve-year-long persecution in the US, where he lived for forty years, had finally come to an end. “It feels like I’m free, finally really feeling freedom for the first time in twelve years,” Dr. Al-Arian said.
  • During the half-hour segment, Dr. Al-Arian revealed how he campaigned for George W. Bush, helping him win crucial votes from the Muslim community that would clinch his 2000 presidential election victory in the decisive state of Florida. Dr. Al-Arian was very active politically, and had visited the White House several times during both the Bush and Clinton administrations. Regarding his role in Bush’s election, Dr. Al-Arian said that he received a call “from someone who was very close to [Bush advisor] Karl Rove” asking how the campaign could win the endorsement of the Muslim American community. Dr. Al-Arian told this contact that Bush needed to declare his support for proposed legislation against secret evidence being used against Arab and Muslim Americans. During the second presidential candidate debate, Dr. Al-Arian told Democracy Now!, Bush did just that, securing the support of Muslim and Arab American leaders.
  • His administration had invited these leaders to the White House after Bush took office for a big announcement of good news regarding the legislation. “Unfortunately, it was on 9/11,” Dr. Al-Arian said, referring to the 11 September 2001 attacks in the US. “So that meeting never happened.” Instead, the country went in a very different direction. “At the time, we were protesting secret evidence,” Dr. Al-Arian added. “What happened after 9/11 is that they were arresting people with no evidence.”
  • ...4 more annotations...
  • Despite this plea deal, Dr. Al-Arian was subpoenaed for a separate prosecution and then hit with contempt charges in March 2008 and issued two more subpoenas in the following year. Now under house arrest, Dr. Al-Arian’s case languished in the courts for years until the government finally moved to dismiss in June of last year. Regarding the saga endured by Dr. Al-Arian, Qamar and Azhar write: Reading the case files is an exercise in bewildering consternation. How did a man who was never convicted by a jury of his peers end up serving five years in prison and four and a half years under house arrest? Several lawyers we consulted point to the unique nature of the case, perhaps unprecedented even in the annals of bizarre government judicial practices since 11 September 2001.
  • “In the hopes of escaping an indefinite legal battle that would keep him in jail, Al-Arian opted to plead guilty for one of the less serious charges, which accused him of sending money to a Palestinian charity before the US government made it illegal to do so,” Khadijah Qamar and Hamdan Azhar recounted for The Electronic Intifada last year. “The judge gave him a 57-month sentence, most of which he had already served, with the promise of deportation by April 2007,” Qamar and Azhar added.
  • After he was fired from the University of South Florida following two years of administrative leave and a lengthy smear campaign that began with “vicious” attacks on him by right-wing Fox News pundit Bill O’Reilly, Dr. Al-Arian found himself a target of the newly passed Patriot Act. In February 2003, as Democracy Now! host Amy Goodman explained today, “The Justice Department handed down a sweeping fifty count indictment against him and seven other men, charging them with conspiracy to commit murder, giving material support to terrorists, extortion, perjury and other offenses. He was held in solitary confinement leading up to the trial.” That trial ended in 2005 with the jury failing to return a single guilty verdict, acquitting Dr. Al-Arian of eight of the seventeen counts he was tried on. But the government’s efforts did not end there, as the prosecution threatened a retrial of the nine charges on which the jury had deadlocked. Dr. Al-Arian chose to spare himself a second trial.
  • The underhanded and unprecedented tactics used by government prosecutors against Al-Arian were wielded against other Palestinian activists. Humanitarians were sentenced to decades in prison in the Holy Land Five case as material support for terror convictions became the domestic front of the endless US wars and occupations abroad. The era of political repression is not over, as shown by the recent moves to criminalize Palestine solidarity work, including at US campuses, and the recent conviction of Palestinian American community leader Rasmea Odeh. “I’ve heard a lot from Obama, but it’s all rhetoric … after six years, I haven’t really seen much change,” Dr. Al-Arian said from Turkey today. But he expressed happiness towards protests and whistleblowing regarding “the excesses of the surveillance and police state.”
  •  
    A very sad chapter in American legal history. 
Paul Merrell

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
Paul Merrell

Tech firms and privacy groups press for curbs on NSA surveillance powers - The Washington Post - 0 views

  • The nation’s top technology firms and a coalition of privacy groups are urging Congress to place curbs on government surveillance in the face of a fast-approaching deadline for legislative action. A set of key Patriot Act surveillance authorities expire June 1, but the effective date is May 21 — the last day before Congress breaks for a Memorial Day recess. In a letter to be sent Wednesday to the Obama administration and senior lawmakers, the coalition vowed to oppose any legislation that, among other things, does not ban the “bulk collection” of Americans’ phone records and other data.
  • We know that there are some in Congress who think that they can get away with reauthorizing the expiring provisions of the Patriot Act without any reforms at all,” said Kevin Bankston, policy director of New America Foundation’s Open Technology Institute, a privacy group that organized the effort. “This letter draws a line in the sand that makes clear that the privacy community and the Internet industry do not intend to let that happen without a fight.” At issue is the bulk collection of Americans’ data by intelligence agencies such as the National Security Agency. The NSA’s daily gathering of millions of records logging phone call times, lengths and other “metadata” stirred controversy when it was revealed in June 2013 by former NSA contractor Edward Snowden. The records are placed in a database that can, with a judge’s permission, be searched for links to foreign terrorists.They do not include the content of conversations.
  • That program, placed under federal surveillance court oversight in 2006, was authorized by the court in secret under Section 215 of the Patriot Act — one of the expiring provisions. The public outcry that ensued after the program was disclosed forced President Obama in January 2014 to call for an end to the NSA’s storage of the data. He also appealed to Congress to find a way to preserve the agency’s access to the data for counterterrorism information.
  • ...3 more annotations...
  • Despite growing opposition in some quarters to ending the NSA’s program, a “clean” authorization — one that would enable its continuation without any changes — is unlikely, lawmakers from both parties say. Sen. Ron Wyden (D-Ore.), a leading opponent of the NSA’s program in its current format, said he would be “surprised if there are 60 votes” in the Senate for that. In the House, where there is bipartisan support for reining in surveillance, it’s a longer shot still. “It’s a toxic vote back in your district to reauthorize the Patriot Act, if you don’t get some reforms” with it, said Rep. Thomas Massie (R-Ky.). The House last fall passed the USA Freedom Act, which would have ended the NSA program, but the Senate failed to advance its own version.The House and Senate judiciary committees are working to come up with new bipartisan legislation to be introduced soon.
  • The tech firms and privacy groups’ demands are a baseline, they say. Besides ending bulk collection, they want companies to have the right to be more transparent in reporting on national security requests and greater declassification of opinions by the Foreign Intelligence Surveillance Court.
  • Some legal experts have pointed to a little-noticed clause in the Patriot Act that would appear to allow bulk collection to continue even if the authority is not renewed. Administration officials have conceded privately that a legal case probably could be made for that, but politically it would be a tough sell. On Tuesday, a White House spokesman indicated the administration would not seek to exploit that clause. “If Section 215 sunsets, we will not continue the bulk telephony metadata program,” National Security Council spokesman Edward Price said in a statement first reported by Reuters. Price added that allowing Section 215 to expire would result in the loss of a “critical national security tool” used in investigations that do not involve the bulk collection of data. “That is why we have underscored the imperative of Congressional action in the coming weeks, and we welcome the opportunity to work with lawmakers on such legislation,” he said.
  •  
    I omitted some stuff about opposition to sunsetting the provisions. They  seem to forget, as does Obama, that the proponents of the FISA Court's expansive reading of section 215 have not yet come up with a single instance where 215-derived data caught a single terrorist or prevented a single act of terrorism. Which means that if that data is of some use, it ain't in fighting terrorism, the purpose of the section.  Patriot Act § 215 is codified as 50 USCS § 1861, https://www.law.cornell.edu/uscode/text/50/1861 That section authorizes the FBI to obtain an iorder from the FISA Court "requiring the production of *any tangible things* (including books, records, papers, documents, and other items)."  Specific examples (a non-exclusive list) include: the production of library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person." The Court can order that the recipient of the order tell no one of its receipt of the order or its response to it.   In other words, this is about way more than your telephone metadata. Do you trust the NSA with your medical records? 
Paul Merrell

The NYPD's X-Ray Vans - The Atlantic - 0 views

  • In New York City, the police now maintain an unknown number of military-grade vans outfitted with X-ray radiation, enabling cops to look through the walls of buildings or the sides of trucks. The technology was used in Afghanistan before being loosed on U.S. streets. Each X-ray van costs an estimated $729,000 to $825,000.The NYPD will not reveal when, where, or how often they are used.
  • Here are some specific questions that New York City refuses to answer:How is the NYPD ensuring that innocent New Yorkers are not subject to harmful X-ray radiation? How long is the NYPD keeping the images that it takes and who can look at them? Is the NYPD obtaining judicial authorization prior to taking images, and if so, what type of authorization? Is the technology funded by taxpayer money, and has the use of the vans justified the price tag? Those specifics are taken from a New York Civil Liberties Union court filing. The legal organization is seeking to assist a lawsuit filed by Pro Publica journalist Michael Grabell, who has been fighting New York City for answers about X-ray vans for 3 years.“ProPublica filed the request as part of its investigation into the proliferation of security equipment, including airport body scanners, that expose people to ionizing radiation, which can mutate DNA and increase the risk of cancer,” he explained. (For fear of a terrorist “dirty bomb,” America’s security apparatus is exposing its population to radiation as a matter of course.)
  • A state court has already ruled that the NYPD has to turn over policies, procedures, and training manuals that shape uses of X-rays; reports on past deployments; information on the costs of the X-ray devices and the number of vans purchased; and information on the health and safety effects of the technology. But New York City is fighting on appeal to suppress that information and more, as if it is some kind of spy agency rather than a municipal police department operating on domestic soil, ostensibly at the pleasure of city residents.Its insistence on extreme secrecy is part of an alarming trend. The people of New York City are effectively being denied the ability to decide how they want to be policed.
  • ...3 more annotations...
  • For all we know, the NYPD might be bombarding apartment houses with radiation while people are inside or peering inside vehicles on the street as unwitting passersby are exposed to radiation. The city’s position—that New Yorkers have no right to know if that is happening or not—is so absurd that one can hardly believe they’re taking it. These are properly political questions. And it’s unlikely a target would ever notice. “Once equipped, the van—which looks like a standard delivery van—takes less than 15 seconds to scan a vehicle,” Fox News reported after looking at X-ray vans owned by the federal government. “It can be operated remotely from more than 1,500 feet and can be equipped with optional technology to identify radioactivity as well.”
  • And since the technology can see through clothing, it is easy to imagine a misbehaving NYPD officer abusing it if there are not sufficient safeguards in place. Trusting the NYPD to choose prudent, sufficient safeguards under cover of secrecy is folly. This is the same department that spent 6 years conducting surveillance on innocent Muslims Americans in a program so unfocused that it produced zero leads—and that has brutalized New York City protestors on numerous occasions. Time and again it’s shown that outside oversight is needed.Lest readers outside New York City presume that their walls still stand between them and their local law enforcement agency, that isn’t necessarily the case. Back in January, in an article that got remarkably little attention, USA Today reported the following:
  • At least 50 U.S. law enforcementagencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance. Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person's house without first obtaining a search warrant. The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.
  •  
    About the technology from the patent holder's web site: http://as-e.com/resource-center/technology/z-backscatter/ Example photos of the Z Backspatter Vans and examples of X-Ray photos taken with it. https://goo.gl/MO1TVi  Forty percent higher radiation than airport security scanners. with a range of over a thousand feet. 12-seconds to conduct a scan.  
« First ‹ Previous 81 - 100 of 234 Next › Last »
Showing 20 items per page