Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "secret-evidence" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Middle Class Political Economist: Gigantic Journalistic Investigation Begins Ripping Mask off Bank Secrecy - 0 views

  • Via the Tax Justice Network, I've just learned of a massive, multi-national joint investigation into secrecy jurisdictions by three very heavy hitters, the Guardian, BBC Panorama, and the U.S.-based International Consortium of Investigative Journalists (ICIJ). Though they are starting out with the United Kingdom and the seriously understudied situation in the British Virgin Islands, ICIJ has announced that this is just the start of a multi-year investigative project and that there are "many more countries to come in the next 12 months." Further, according to ICIJ, the investigation involves literally "dozens of jurisdictions and in collaboration with dozens of media partners and freelance journalists around the world" (emphasis in original).
  • As I write this, the first and second articles (Nov. 25 and 26) in the Guardian's series rank number two and number one in the "most viewed" articles in the last 24 hours. One of the most amazing articles discusses the use of "nominee" directors, people who pretend to be a company or foundation's directors in order to hide the true ownership from authorities. Incredibly, these nominee directors frequently do not know the companies they are supposedly responsible for; they just know that they are getting paid for the use of their names. Be sure to check out the BBC undercover film linked from this Guardian article.
  • But let's not forget: tax havens cost the middle class worldwide hundreds of billions of dollars in tax revenue that they have to make up. The evidence is mounting that they are a central piece of the world financial system. Fundamental reform is necessary and a massive journalistic effort like this one will help produce the outrage to make it possible. I'm looking forward to more fruits of this investigation.
Paul Merrell

EXCLUSIVE: Justice Department memo reveals legal case for drone strikes on Americans - Open Channel - 0 views

  • A confidential Justice Department memo concludes that the U.S. government can order the killing of American citizens if they are believed to be “senior operational leaders” of al-Qaida or “an associated force” -- even if there is no intelligence indicating they are engaged in an active plot to attack the U.S.The 16-page memo, a copy of which was obtained by NBC News, provides new details about the legal reasoning behind one of the Obama administration’s most secretive and controversial polices: its dramatically increased use of drone strikes against al-Qaida suspects, including those aimed at American citizens, such as the  September 2011 strike in Yemen that killed alleged al-Qaida operatives Anwar al-Awlaki and Samir Khan. Both were U.S. citizens who had never been indicted by the U.S. government nor charged with any crimes.  
  • The secrecy surrounding such strikes is fast emerging as a central issue in this week’s hearing of White House counterterrorism adviser John Brennan, a key architect of the drone campaign, to be CIA director.  Brennan was the first administration official to publicly acknowledge drone strikes in a speech last year, calling them “consistent with the inherent right of self-defense.” In a separate talk at the Northwestern University Law School in March, Attorney General Eric Holder specifically endorsed the constitutionality of targeted killings of Americans, saying they could be justified if government officials determine the target poses  “an imminent threat of violent attack.” But the confidential Justice Department “white paper” introduces a more expansive definition of self-defense or imminent attack than described  by Brennan or Holder in their public speeches.  It refers, for example, to what it calls a “broader concept of imminence” than actual intelligence about any ongoing plot against the U.S. homeland.  
  • “The condition that an operational  leader present an ‘imminent’ threat of violent attack against the United States does not require the United States to have clear evidence that a specific attack on U.S. persons and interests will take place in the immediate future,” the memo states.Read the entire 'white paper' on drone strikes on Americans
  • ...2 more annotations...
  • Although not an official legal memo, the white paper was represented by administration  officials as a policy document that closely mirrors the arguments of classified memos on targeted killings by the Justice Department’s  Office of Legal Counsel, which provides authoritative legal advice to the president and all executive branch agencies. The administration has refused to turn over to Congress or release those memos publicly -- or even publicly confirm their existence. A source with access to the white paper, which is not classified, provided a copy to NBC News. 
  • Pressure for turning over the Justice Department memos on targeted killings of Americans appears to be building on Capitol Hill amid signs that Brennan will be grilled on the subject at his confirmation hearing before the Senate Intelligence Committee on Thursday.  Advertise | AdChoices On Monday, a bipartisan group of 11 senators -- led by Democrat Ron Wyden of Oregon — wrote  a letter to President Barack Obama asking him to release all Justice Department memos on the subject. While accepting that “there will clearly be circumstances in which the president has the authority to use lethal force” against Americans who take up arms against the country,  it said, “It is vitally important ... for Congress and the American public to have a full understanding of how  the executive branch interprets the limits and boundaries of this authority.”
  •  
    Finally, the lid begins to come off the secret legal memoranda claiming to justify assassinations of U.S. citizens by the Obama regime.
Gary Edwards

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
Paul Merrell

NSA can eavesdrop on Americans' phone calls, documents show | Politics and Law - CNET News - 0 views

  • The National Security Agency has been secretly granted legal authority to operate a massive domestic eavesdropping system that vacuums up Americans' phone calls and Internet communications, newly leaked documents show. A pair of classified government documents (No. 1 and No. 2) signed by Attorney General Eric Holder and posted by the Guardian on Thursday show that NSA analysts are able to listen to Americans' intercepted phone calls without asking a judge for a warrant first. That appears to be at odds with what President Obama said earlier this week in defense of the NSA's surveillance efforts. "I can say unequivocally is that if you are a U.S. person, the NSA cannot listen to your telephone calls and the NSA cannot target your e-mails," Obama said. The new documents indicate, however, that NSA, CIA, and FBI analysts are granted broad access to data vacuumed up by the world's most powerful intelligence agency -- but are supposed to follow certain "targeting" and "minimization" procedures to limit the number of Americans who become individual targets of warrantless surveillance.
  • Analysts are expected to exercise "reasonable judgment" in determining which data to use, according to the documents, and "inadvertently acquired communications of or concerning a United States person may be retained no longer than five years." The documents also refer to "content repositories" that contain records of devices' "previous Internet activity," and say the NSA keeps records of Americans' "electronic communications accounts/addresses/identifiers" in an apparent effort to avoid targeting them in future eavesdropping efforts. The Holder procedures were blessed in advance by the secret Foreign Intelligence Surveillance Court, the Guardian reported, meaning that the judges would have issued a general order that authorizes the NSA to engage in warrantless surveillance as long as it's primarily aimed at foreign targets, subject to some limited judicial oversight. Today's disclosure jibes with what Edward Snowden, the former NSA contractor who leaked top-secret documents, alleged in an online chat earlier this week. Snowden said, referring to the contents of e-mail and phone calls, that "Americans' communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant."
  • On Sunday, Director of National Intelligence James Clapper released a carefully-worded statement in response to a CNET article and other reports questioning when intelligence analysts can listen to domestic phone calls. Clapper said: "The statement that a single analyst can eavesdrop on domestic communications without proper legal authorization is incorrect and was not briefed to Congress." Clapper's statement was viewed as a denial, but it wasn't. Today's disclosures reveal why: Because the Justice Department granted intelligence analysts "proper legal authorization" in advance through the Holder regulations. "The DNI has a history of playing games with wording, using terms with carefully obscured meanings to leave an impression different from the truth," Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation who has litigated domestic surveillance cases, told CNET earlier this week.
  • ...3 more annotations...
  • Jameel Jaffer, the American Civil Liberties Union's deputy legal director, said in a statement today that: After Congress enacted the FISA Amendments Act in 2008, we worried that the NSA would use the new authority to conduct warrantless surveillance of Americans' telephone calls and emails. These documents confirm many of our worst fears. The "targeting" procedures indicate that the NSA is engaged in broad surveillance of Americans' international communications. The "minimization" procedures that supposedly protect Americans' constitutional rights turn out to be far weaker than we imagined they could be. For example, the NSA claims the authority to collect and disseminate attorney-client communications -- and even, in some circumstances, to turn them over to Justice Department prosecutors. The government also claims the authority to retain Americans' purely domestic communications in certain situations.
  • The documents suggest there are some significant loopholes in domestic surveillance: if an NSA analyst reviews an intercepted communication and finds "evidence of a crime that has been, is being, or is about to be committed," it can be forwarded to the FBI or other federal law enforcement agencies. Another loophole is "a serious harm to life or property" -- which could sweep in intellectual property -- and "enciphered" data. Communications that contain "enciphered" data, which would likely include PGP but also could mean encrypted Web connections using SSL, may be kept indefinitely. Earlier reports have indicated that the NSA has the ability to record nearly all domestic and international phone calls -- in case an analyst needed to access the recordings in the future. A Wired magazine article last year disclosed that the NSA has established "listening posts" that allow the agency to collect and sift through billions of phone calls through a massive new data center in Utah, "whether they originate within the country or overseas." That includes not just metadata, but also the contents of the communications.
  • Section 702 of the FAA says surveillance may be authorized by the attorney general and director of national intelligence without prior approval by the secret Foreign Intelligence Surveillance Court, as long as minimization requirements and general procedures blessed by the court are followed.
Paul Merrell

Media Blackout over Syria | Global Research - 0 views

  • On April 6, The London Review of Books published in its online journal Seymour Hersh’s “The Red Line and the Rat Line.” Hersh continues to expose details surrounding the staged August 21 chemical attack incident in Syria, which apparently pretty much everyone in Washington’s intelligence bureaucracy suspected was carried out by the rebels as soon as it happened. Seymour Hersh is a Pulitzer Prize winning journalist whose 40+ years career includes the exposing of the My Lai Massacre  and its cover-up, as well as the Abu Ghraib prison scandal. His December 19 report, “Whose Sarin?” -was his first report to expose the Syria chemical attack hoax based on close contact with US Intelligence officials. While “Whose Sarin” was originally prepared for the Washington Post, the newspaper rejected it and a media blackout followed in American press. Currently, Hersh’s newest investigative findings are going unacknowledged in mainstream US media.
  • Hersh’s report confirms the following: Obama’s push for attack on Syria was halted last minute when evidence that the Syrian government had nothing to do with the August 21 chemical attack became too overwhelming It had been well known to US government officials throughout the summer of 2013 that Turkish PM Erdogan was supporting al-Nusra Front in attempts to manufacture Sarin US military knew of Turkish and Saudi program for bulk Sarin production inside Syria from the spring of 2013 UN inspectors knew the rebels were using chemical weapons on the battlefield since the spring of 2013 As a result of the staged chemical incident, the White House ordered readiness for a “monster strike” on Syria, which included “two B-22 air wings and two thousand pound bombs” -and a target list which included military and civilian infrastructure targets (note: most of these are in densely populated civilian areas)
  • Full military strike was set for September 2 UK defense officials relayed to their American counterparts in the lead up to planned attack: “We’re being set up here.” CIA, MI6, Saudi Arabia, Qatar, and Turkey set up a “rat line” back in 2012 to run Libyan weapons into Syria via Turkey, including MANPADS; the Benghazi consulate was headquarters for the operation Obama OK’ed Turkish-Iranian gold export scam (that went from March 2012 to July 2013) which erupted in a Turkish scandal that nearly brought down the Erdogan government US Intelligence community had immediate doubts about Syrian regime responsibility for Aug. 21 attack, yet “reluctant to contradict the president” US government will not expose continued Turkey support of terrorism simply because “they’re a NATO ally”
  • ...2 more annotations...
  • In addition, last Thursday freelance Middle East journalist Sara Elizabeth Williams broke the story of a CIA/US Military run training camp for Syrian rebels in the Jordanian desert. VICE UK ran her story, “I Learned to Fight Like an American at the FSA Training Camp in Jordan,” yet it too failed to make it across the Atlantic into American reporting. International Syria experts thought her story hugely significant, but it got little attention. Top Syria expert in the US, Joshua Landis, announced on his Twitter account Thursday: “Sara Williams gets the scoop on the top secret FSA Training Camp in Jordan.” This courageous young freelancer revealed, with photos, the ins and outs of this secretive facility -yet the mainstream carefully shielded Americans from knowledge of the explosive report. In email conversation with her this weekend, Williams told me: “The access was tough to get, but I think it was worth the effort: to my mind, it’s important that people know what their government is doing in their name, with their tax dollars.” According to her investigative report:
  • Confirmed: “US-run training camp” for Syrian rebels in Northern Jordan Rebel recruits go “off the grid” while in secretive training camp Rebel fighter: “The Americans who taught us wore military uniforms I did not recognize. We called them by their first names and they spoke English to us.” Camp awash with “American food and American dollars”: recruits eat Kentucky Fried Chicken and live in temporary “pre-fabricated housing” units Recruits sent through intense 40 day program, which includes exercise, training in anti-tank missiles, and boot camp style atmosphere with orders given by US military instructors Upon graduation, US trained insurgents slip back across Syria’s southern border Experts say there are more camps like this one American trained rebel insurgent says: “America is benefiting from the destruction and the killing in order to weaken both sides.”
  •  
    It really says something about mainstream media when a story as explosive as Sy Hersh's new report on Obama's decision to postpone and then cancel military strikes on Syria is ignored by mainstream media. Hersh is one of the most respected of American war and intelligence journalists. 
Paul Merrell

New Book on CIA Master-Plotter Dulles, Sneak Peek: Part 1 - WhoWhatWhy - 0 views

  • No one can possibly understand the precarious state of American democracy today without scrutinizing the often secret path the country was taken on by those in power from the 1950s to the present.Among the elemental figures in forging that path was Allen Dulles.He was the most powerful, and, it appears — the most sinister — director of the Central Intelligence Agency. Given that outfit’s history, that’s some accomplishment.Dulles’s job, simply put, was to hijack the US government to benefit the wealthy.Studying how this worked is a worthwhile pursuit. That’s why we decided to excerpt a few parts of David Talbot’s new Dulles biography, The Devil’s Chessboard. Perhaps nothing is more troubling than Dulles’s behavior around the time that John F. Kennedy was assassinated.
  • Although Kennedy had fired him in 1961, Dulles basically kept, de facto, running the CIA anyway, as Talbot notes. And, even more ominously, after Kennedy was killed in Dallas on Friday November 22, Dulles moved into The Farm, a secret CIA facility in Virginia, where he remained for the weekend — during which time the “suspect,” Lee Harvey Oswald, was killed, and a vast machinery began to create the “lone gunman” myth that has dominated our history books to the present.And that same machinery began to bury evidence that Oswald himself had deep connections into US intelligence.Throughout all this, it is clear, Dulles was no rogue operative. He was serving the interests of America’s corporate and war-making elites. And he went all out.The “former” CIA director was so determined to control the JFK death story spin, as Talbot chronicles below, that he even tried to strong-arm former president Harry Truman when the plain-spoken Missourian broadly hinted that he suspected the Agency was involved in Kennedy’s murder.
  • First part of a compressed Excerpt of Chapter 20, “For the Good of the Country” from The Devil’s Chessboard. Allen Dulles, the CIA, and the Rise of the American Secret Government. HarperCollins Publishers, 2015.
Paul Merrell

Now the truth emerges: how the US fuelled the rise of Isis in Syria and Iraq | Seumas Milne | Comment is free | The Guardian - 0 views

  • The war on terror, that campaign without end launched 14 years ago by George Bush, is tying itself up in ever more grotesque contortions. On Monday the trial in London of a Swedish man, Bherlin Gildo, accused of terrorism in Syria, collapsed after it became clear British intelligence had been arming the same rebel groups the defendant was charged with supporting. The prosecution abandoned the case, apparently to avoid embarrassing the intelligence services. The defence argued that going ahead withthe trial would have been an “affront to justice” when there was plenty of evidence the British state was itself providing “extensive support” to the armed Syrian opposition. That didn’t only include the “non-lethal assistance” boasted of by the government (including body armour and military vehicles), but training, logistical support and the secret supply of “arms on a massive scale”. Reports were cited that MI6 had cooperated with the CIA on a “rat line” of arms transfers from Libyan stockpiles to the Syrian rebels in 2012 after the fall of the Gaddafi regime. Clearly, the absurdity of sending someone to prison for doing what ministers and their security officials were up to themselves became too much. But it’s only the latest of a string of such cases. Less fortunate was a London cab driver Anis Sardar, who was given a life sentence a fortnight earlier for taking part in 2007 in resistance to the occupation of Iraq by US and British forces. Armed opposition to illegal invasion and occupation clearly doesn’t constitute terrorism or murder on most definitions, including the Geneva convention.
  • But terrorism is now squarely in the eye of the beholder. And nowhere is that more so than in the Middle East, where today’s terrorists are tomorrow’s fighters against tyranny – and allies are enemies – often at the bewildering whim of a western policymaker’s conference call.
  • A revealing light on how we got here has now been shone by a recently declassified secret US intelligence report, written in August 2012, which uncannily predicts – and effectively welcomes – the prospect of a “Salafist principality” in eastern Syria and an al-Qaida-controlled Islamic state in Syria and Iraq. In stark contrast to western claims at the time, the Defense Intelligence Agency document identifies al-Qaida in Iraq (which became Isis) and fellow Salafists as the “major forces driving the insurgency in Syria” – and states that “western countries, the Gulf states and Turkey” were supporting the opposition’s efforts to take control of eastern Syria. Raising the “possibility of establishing a declared or undeclared Salafist principality”, the Pentagon report goes on, “this is exactly what the supporting powers to the opposition want, in order to isolate the Syrian regime, which is considered the strategic depth of the Shia expansion (Iraq and Iran)”.
  • ...3 more annotations...
  • Which is pretty well exactly what happened two years later. The report isn’t a policy document. It’s heavily redacted and there are ambiguities in the language. But the implications are clear enough. A year into the Syrian rebellion, the US and its allies weren’t only supporting and arming an opposition they knew to be dominated by extreme sectarian groups; they were prepared to countenance the creation of some sort of “Islamic state” – despite the “grave danger” to Iraq’s unity – as a Sunni buffer to weaken Syria. That doesn’t mean the US created Isis, of course, though some of its Gulf allies certainly played a role in it – as the US vice-president, Joe Biden, acknowledged last year. But there was no al-Qaida in Iraq until the US and Britain invaded. And the US has certainly exploited the existence of Isis against other forces in the region as part of a wider drive to maintain western control.
  • The calculus changed when Isis started beheading westerners and posting atrocities online, and the Gulf states are now backing other groups in the Syrian war, such as the Nusra Front. But this US and western habit of playing with jihadi groups, which then come back to bite them, goes back at least to the 1980s war against the Soviet Union in Afghanistan, which fostered the original al-Qaida under CIA tutelage. It was recalibrated during the occupation of Iraq, when US forces led by General Petraeus sponsored an El Salvador-style dirty war of sectarian death squads to weaken the Iraqi resistance. And it was reprised in 2011 in the Nato-orchestrated war in Libya, where Isis last week took control of Gaddafi’s home town of Sirte. In reality, US and western policy in the conflagration that is now the Middle East is in the classic mould of imperial divide-and-rule. American forces bomb one set of rebels while backing another in Syria, and mount what are effectively joint military operations with Iran against Isis in Iraq while supporting Saudi Arabia’s military campaign against Iranian-backed Houthi forces in Yemen. However confused US policy may often be, a weak, partitioned Iraq and Syria fit such an approach perfectly.
  • What’s clear is that Isis and its monstrosities won’t be defeated by the same powers that brought it to Iraq and Syria in the first place, or whose open and covert war-making has fostered it in the years since. Endless western military interventions in the Middle East have brought only destruction and division. It’s the people of the region who can cure this disease – not those who incubated the virus.
Paul Merrell

Secrets about suspected Israeli theft of U.S. weapons-grade nuclear material declassified - IRmep -- WASHINGTON, March 27, 2014 /PRNewswire-USNewswire/ -- - 0 views

  • On March 18, 2014 ISCAP, the highest declassification authority in the U.S., released 84 pages (PDF) of formerly secret information about investigations into the illegal diversion of weapons-grade nuclear material from a Pennsylvania plant into the clandestine Israeli nuclear weapons program.  Files now available to the public from IRmep's ISCAP process include: 4/2/1968 Letter from the Director of the CIA alerting the Attorney General (PDF) about a huge loss of material from Pennsylvania's Nuclear Materials and Equipment Corporation (NUMEC). "It is critical for us to establish whether or not the Israelis now have the capability for fabricating nuclear weapons which might be employed in the Near East." 03/09/1972 FBI memorandum (PDF) "On the basis of the foregoing it must be assumed for the purpose of U.S. national security that diversion of special nuclear materials to Israel by Dr. [Zalman] Shapiro and his [NUMEC] associates is a distinct possibility." 07/28/1977 Notes of a briefing from CIA's Associate Deputy Director for Operations Theodore Shackley to the Carter administration National Security Council  (PDF) "I also asked Shackley to get us a rundown on the political aspects—e.g. when were the President and Congressional officials briefed on the Israeli weapons program, on the NUMEC connection, and what were their reactions.  In December, Carter was briefed on the NUMEC problem as President-elect by Bush in Georgia...I do not think the President has plausible deniability.  The CIA case is persuasive..."
  • 08/02/1977 Memo to Carter from Zbigniew Brzezinski "So far as we know however, (and we have made serious effort to discover it) there is nothing to indicate active CIA participation in the alleged theft...There is a tremendous amount of interest in this issue in Congress...We face tough sledding in the next few weeks in trying to keep attention focused on ERDA's technical [overall U.S. nuclear material loss] arguments..on the FBI investigations, and away from the CIA's information." All released CIA evidence and former Tel Aviv Station Chief John Hadden suggest the severely undercapitalized NUMEC was "an Israeli [smuggling] operation from the beginning." Multiple health-related lawsuits have been filed targeting companies that later assumed NUMEC ownership. The U.S. Army Corps of Engineers currently estimates its toxic cleanup of NUMEC will cost $500 million.  No damage claims have yet been filed against the Israeli government. IRmep is a Washington-DC based nonprofit researching U.S. Middle East policy formulation.
Paul Merrell

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
Paul Merrell

Cooperation between British spies and Gaddafi's Libya revealed in official papers | UK news | The Guardian - 0 views

  • Britain’s intelligence agencies engaged in a series of previously unknown joint operations with Colonel Muammar Gaddafi’s government and used the information extracted from rendition victims as evidence during partially secret court proceedings in London, according to an analysis of official documents recovered in Tripoli since the Libyan revolution. The exhaustive study of the papers from the Libyan government archives shows the links between MI5, MI6 and Gaddafi’s security agencies were far more extensive than previously thought and involved a number of joint operations in which Libyan dissidents were unlawfully detained and allegedly tortured. At one point, Libyan intelligence agents were invited to operate on British soil, where they worked alongside MI5 and allegedly intimidated a number of Gaddafi opponents who had been granted asylum in the UK.
  • the research suggests that the fruits of a series of joint clandestine operations also underpinned a significant number of court hearings in London between 2002 and 2007, during which the last Labour government unsuccessfully sought to deport Gaddafi’s opponents on the basis of information extracted from people who had been “rendered” to his jails. In addition, the documents show that four men were subjected to control orders in the UK – a form of curfew – on the basis of information extracted from victims of rendition who had been handed over to the Gaddafi regime.
  • Gaddafi’s agents recorded MI5 as warning in September 2006 that the two countries’ agencies should take steps to ensure that their joint operations would never be “discovered by lawyers or human rights organisations and the media”. In fact, papers that detail the joint UK-Libyan rendition operations were discovered by the New York-based NGO Human Rights Watch in September 2011, at the height of the Libyan revolution, in an abandoned government office building in Tripoli. Since then, hundreds more documents have been discovered in government files in Tripoli. A team of London-based lawyers has assembled them into an archive that is forming the basis of a claim for damages on behalf of 12 men who were allegedly kidnapped, tortured, subject to control orders or tricked into travelling to Libya where they were detained and mistreated.
  • ...2 more annotations...
  • The papers recovered from the dictatorship’s archives include secret correspondence from MI6, MI5 reports on Libyans living in the UK, a British intelligence assessment marked “UK/Libya Eyes Only – Secret” and official Libyan minutes of meetings between the two countries’ intelligence agencies.
  • An attempt by government lawyers to have that claim struck out was rejected by the high court in London on Thursday , with the judge, Mr Justice Irwin, ruling that the allegations “are of real potential public concern” and should be heard and dealt with by the courts.
Paul Merrell

The $9 Billion Witness: Meet JPMorgan Chase's Worst Nightmare | Rolling Stone - 0 views

  • Meet the woman JPMorgan Chase paid one of the largest fines in American history to keep from talking By Matt Taibbi | November 6, 2014
  • tried to stay quiet, she really did. But after eight years of keeping a heavy secret, the day came when Alayne Fleischmann couldn't take it anymore.  "It was like watching an old lady get mugged on the street," she says. "I thought, 'I can't sit by any longer.'"  Fleischmann is a tall, thin, quick-witted securities lawyer in her late thirties, with long blond hair, pale-blue eyes and an infectious sense of humor that has survived some very tough times. She's had to struggle to find work despite some striking skills and qualifications, a common symptom of a not-so-common condition called being a whistle-blower.
  • Fleischmann is the central witness in one of the biggest cases of white-collar crime in American history, possessing secrets that JPMorgan Chase CEO Jamie Dimon late last year paid $9 billion (not $13 billion as regularly reported – more on that later) to keep the public from hearing. Back in 2006, as a deal manager at the gigantic bank, Fleischmann first witnessed, then tried to stop, what she describes as "massive criminal securities fraud" in the bank's mortgage operations. Thanks to a confidentiality agreement, she's kept her mouth shut since then. "My closest family and friends don't know what I've been living with," she says. "Even my brother will only find out for the first time when he sees this interview." 
  • ...3 more annotations...
  • This past year she watched as Holder's Justice Department struck a series of historic settlement deals with Chase, Citigroup and Bank of America. The root bargain in these deals was cash for secrecy. The banks paid big fines, without trials or even judges – only secret negotiations that typically ended with the public shown nothing but vague, quasi-official papers called "statements of facts," which were conveniently devoid of anything like actual facts. 
  • Six years after the crisis that cratered the global economy, it's not exactly news that the country's biggest banks stole on a grand scale. That's why the more important part of Fleischmann's story is in the pains Chase and the Justice Department took to silence her. She was blocked at every turn: by asleep-on-the-job regulators like the Securities and Exchange Commission, by a court system that allowed Chase to use its billions to bury her evidence, and, finally, by officials like outgoing Attorney General Eric Holder, the chief architect of the crazily elaborate government policy of surrender, secrecy and cover-up. "Every time I had a chance to talk, something always got in the way," Fleischmann says.
  • And now, with Holder about to leave office and his Justice Department reportedly wrapping up its final settlements, the state is effectively putting the finishing touches on what will amount to a sweeping, industrywide effort to bury the facts of a whole generation of Wall Street corruption. "I could be sued into bankruptcy," she says. "I could lose my license to practice law. I could lose everything. But if we don't start speaking up, then this really is all we're going to get: the biggest financial cover-up in history." 
  •  
    Matt Taibbi is back at Rolling Stone, relaunching with a major blockbuster.
Paul Merrell

HSBC files show how Swiss bank helped clients dodge taxes and hide millions | Business | The Guardian - 0 views

  • HSBC’s Swiss banking arm helped wealthy customers dodge taxes and conceal millions of dollars of assets, doling out bundles of untraceable cash and advising clients on how to circumvent domestic tax authorities, according to a huge cache of leaked secret bank account files. The files – obtained through an international collaboration of news outlets, including the Guardian, the French daily Le Monde, BBC Panorama and the Washington-based International Consortium of Investigative Journalists – reveal that HSBC’s Swiss private bank: • Routinely allowed clients to withdraw bricks of cash, often in foreign currencies of little use in Switzerland. • Aggressively marketed schemes likely to enable wealthy clients to avoid European taxes. • Colluded with some clients to conceal undeclared “black” accounts from their domestic tax authorities. • Provided accounts to international criminals, corrupt businessmen and other high-risk individuals.
  • The revelations will amplify calls for crackdowns on offshore tax havens and stoke political arguments in the US, Britain and elsewhere in Europe where exchequers are seen to be fighting a losing battle against fleet-footed and wealthy individuals in the globalised world. Approached by the Guardian, HSBC, the world’s second largest bank, has now admitted wrongdoing by its Swiss subsidiary. “We acknowledge and are accountable for past compliance and control failures,” the bank said in a statement. The Swiss arm, the statement said, had not been fully integrated into HSBC after its purchase in 1999, allowing “significantly lower” standards of compliance and due diligence to persist. That response raises serious questions about oversight of the Swiss operation by the then senior executives of its parent company, HSBC Group, headquartered in London. It has now acknowledged that it was not until 2011 that action was taken to bring the Swiss bank into line. “HSBC was run in a more federated way than it is today and decisions were frequently taken at a country level,” the bank said.
  • Although tax authorities around the world have had confidential access to the leaked files since 2010, the true nature of the Swiss bank’s misconduct has never been made public until now. Hollywood stars, shopkeepers, royalty and clothing merchants feature in the files along with the heirs to some of Europe’s biggest fortunes.
  • ...2 more annotations...
  • The files show how HSBC in Switzerland keenly marketed tax avoidance strategies to its wealthy clients. The bank proactively contacted clients in 2005 to suggest ways to avoid a new tax levied on the Swiss savings accounts of EU citizens, a measure brought in through a treaty between Switzerland and the EU to tackle secret offshore accounts. The documents also show HSBC’s Swiss subsidiary providing banking services to relatives of dictators, people implicated in African corruption scandals, arms industry figures and others. Swiss banking rules have since 1998 required high levels of diligence on the accounts of politically connected figures, but the documents suggest that at the time HSBC happily provided banking services to such controversial individuals. The Guardian’s evidence of a pattern of misconduct at HSBC in Switzerland is supported by the outcome of recent court cases in the US and Europe.
  • HSBC is already facing criminal investigations and charges in France, Belgium, the US and Argentina as a result of the leak of the files, but no legal action has been taken against it in Britain. Former tax inspector Richard Brooks tells BBC Panorama in a programme to be aired on Monday night: “I think they were a tax avoidance and tax evasion service. I think that’s what they were offering. “There are very few reasons to have an offshore bank account, apart from just saving tax. There are some people who can use an ... account to avoid tax legally. For others it’s just a way to keep money secret.”
Paul Merrell

Edward Snowden: A 'Nation' Interview | The Nation - 0 views

  • Snowden: That’s the key—to maintain the garden of liberty, right? This is a generational thing that we must all do continuously. We only have the rights that we protect. It doesn’t matter what we say or think we have. It’s not enough to believe in something; it matters what we actually defend. So when we think in the context of the last decade’s infringements upon personal liberty and the last year’s revelations, it’s not about surveillance. It’s about liberty. When people say, “I have nothing to hide,” what they’re saying is, “My rights don’t matter.” Because you don’t need to justify your rights as a citizen—that inverts the model of responsibility. The government must justify its intrusion into your rights. If you stop defending your rights by saying, “I don’t need them in this context” or “I can’t understand this,” they are no longer rights. You have ceded the concept of your own rights. You’ve converted them into something you get as a revocable privilege from the government, something that can be abrogated at its convenience. And that has diminished the measure of liberty within a society.
  • From the very beginning, I said there are two tracks of reform: there’s the political and the technical. I don’t believe the political will be successful, for exactly the reasons you underlined. The issue is too abstract for average people, who have too many things going on in their lives. And we do not live in a revolutionary time. People are not prepared to contest power. We have a system of education that is really a sort of euphemism for indoctrination. It’s not designed to create critical thinkers. We have a media that goes along with the government by parroting phrases intended to provoke a certain emotional response—for example, “national security.” Everyone says “national security” to the point that we now must use the term “national security.” But it is not national security that they’re concerned with; it is state security. And that’s a key distinction. We don’t like to use the phrase “state security” in the United States because it reminds us of all the bad regimes. But it’s a key concept, because when these officials are out on TV, they’re not talking about what’s good for you. They’re not talking about what’s good for business. They’re not talking about what’s good for society. They’re talking about the protection and perpetuation of a national state system. I’m not an anarchist. I’m not saying, “Burn it to the ground.” But I’m saying we need to be aware of it, and we need to be able to distinguish when political developments are occurring that are contrary to the public interest. And that cannot happen if we do not question the premises on which they’re founded. And that’s why I don’t think political reform is likely to succeed. [Senators] Udall and Wyden, on the intelligence committee, have been sounding the alarm, but they are a minority.
  • The Nation: Every president—and this seems to be confirmed by history—will seek to maximize his or her power, and will see modern-day surveillance as part of that power. Who is going to restrain presidential power in this regard? Snowden: That’s why we have separate and co-equal branches. Maybe it will be Congress, maybe not. Might be the courts, might not. But the idea is that, over time, one of these will get the courage to do so. One of the saddest and most damaging legacies of the Bush administration is the increased assertion of the “state secrets” privilege, which kept organizations like the ACLU—which had cases of people who had actually been tortured and held in indefinite detention—from getting their day in court. The courts were afraid to challenge executive declarations of what would happen. Now, over the last year, we have seen—in almost every single court that has had this sort of national-security case—that they have become markedly more skeptical. People at civil-liberties organizations say it’s a sea change, and that it’s very clear judges have begun to question more critically assertions made by the executive. Even though it seems so obvious now, it is extraordinary in the context of the last decade, because courts had simply said they were not the best branch to adjudicate these claims—which is completely wrong, because they are the only nonpolitical branch. They are the branch that is specifically charged with deciding issues that cannot be impartially decided by politicians. The power of the presidency is important, but it is not determinative. Presidents should not be exempted from the same standards of reason and evidence and justification that any other citizen or civil movement should be held to.
  • ...14 more annotations...
  • The Nation: Explain the technical reform you mentioned. Snowden: We already see this happening. The issue I brought forward most clearly was that of mass surveillance, not of surveillance in general. It’s OK if we wiretap Osama bin Laden. I want to know what he’s planning—obviously not him nowadays, but that kind of thing. I don’t care if it’s a pope or a bin Laden. As long as investigators must go to a judge—an independent judge, a real judge, not a secret judge—and make a showing that there’s probable cause to issue a warrant, then they can do that. And that’s how it should be done. The problem is when they monitor all of us, en masse, all of the time, without any specific justification for intercepting in the first place, without any specific judicial showing that there’s a probable cause for that infringement of our rights.
  • Since the revelations, we have seen a massive sea change in the technological basis and makeup of the Internet. One story revealed that the NSA was unlawfully collecting data from the data centers of Google and Yahoo. They were intercepting the transactions of data centers of American companies, which should not be allowed in the first place because American companies are considered US persons, sort of, under our surveillance authorities. They say, “Well, we were doing it overseas,” but that falls under a different Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn’t even authorized by law. It’s just an old-ass piece of paper with Reagan’s signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers—sending hundreds of millions of people’s communications back and forth every day—were completely unprotected, electronically naked. GCHQ, the British spy agency, was listening in, and the NSA was getting the data and everything like that, because they could dodge the encryption that was typically used. Basically, the way it worked technically, you go from your phone to Facebook.com, let’s say—that link is encrypted. So if the NSA is trying to watch it here, they can’t understand it. But what these agencies discovered was, the Facebook site that your phone is connected to is just the front end of a larger corporate network—that’s not actually where the data comes from. When you ask for your Facebook page, you hit this part and it’s protected, but it has to go on this long bounce around the world to actually get what you’re asking for and go back. So what they did was just get out of the protected part and they went onto the back network. They went into the private network of these companies.
  • The Nation: The companies knew this? Snowden: Companies did not know it. They said, “Well, we gave the NSA the front door; we gave you the PRISM program. You could get anything you wanted from our companies anyway—all you had to do was ask us and we’re gonna give it to you.” So the companies couldn’t have imagined that the intelligence communities would break in the back door, too—but they did, because they didn’t have to deal with the same legal process as when they went through the front door. When this was published by Barton Gellman in The Washington Post and the companies were exposed, Gellman printed a great anecdote: he showed two Google engineers a slide that showed how the NSA was doing this, and the engineers “exploded in profanity.” Another example—one document I revealed was the classified inspector general’s report on a Bush surveillance operation, Stellar Wind, which basically showed that the authorities knew it was unlawful at the time. There was no statutory basis; it was happening basically on the president’s say-so and a secret authorization that no one was allowed to see. When the DOJ said, “We’re not gonna reauthorize this because it is not lawful,” Cheney—or one of Cheney’s advisers—went to Michael Hayden, director of the NSA, and said, “There is no lawful basis for this program. DOJ is not going to reauthorize it, and we don’t know what we’re going to do. Will you continue it anyway on the president’s say-so?” Hayden said yes, even though he knew it was unlawful and the DOJ was against it. Nobody has read this document because it’s like twenty-eight pages long, even though it’s incredibly important.
  • The big tech companies understood that the government had not only damaged American principles, it had hurt their businesses. They thought, “No one trusts our products anymore.” So they decided to fix these security flaws to secure their phones. The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone—if a hacker or something images your phone—they can’t read what’s on the phone itself, they can’t look at your pictures, they can’t see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example. It does not stop law enforcement from requesting copies of your texts from the providers via warrant. It does not stop them from accessing copies of your pictures or whatever that are uploaded to, for example, Apple’s cloud service, which are still legally accessible because those are not encrypted. It only protects what’s physically on the phone. This is purely a security feature that protects against the kind of abuse that can happen with all these things being out there undetected. In response, the attorney general and the FBI director jumped on a soap box and said, “You are putting our children at risk.”
  • The Nation: Is there a potential conflict between massive encryption and the lawful investigation of crimes? Snowden: This is the controversy that the attorney general and the FBI director were trying to create. They were suggesting, “We have to be able to have lawful access to these devices with a warrant, but that is technically not possible on a secure device. The only way that is possible is if you compromise the security of the device by leaving a back door.” We’ve known that these back doors are not secure. I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI. And even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it. Anyway, it’s not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
  • The Nation: Some years ago, The Nation did a special issue on patriotism. We asked about a hundred people how they define it. How do you define patriotism? And related to that, you’re probably the world’s most famous whistleblower, though you don’t like that term. What characterization of your role do you prefer? Snowden: What defines patriotism, for me, is the idea that one rises to act on behalf of one’s country. As I said before, that’s distinct from acting to benefit the government—a distinction that’s increasingly lost today. You’re not patriotic just because you back whoever’s in power today or their policies. You’re patriotic when you work to improve the lives of the people of your country, your community and your family. Sometimes that means making hard choices, choices that go against your personal interest. People sometimes say I broke an oath of secrecy—one of the early charges leveled against me. But it’s a fundamental misunderstanding, because there is no oath of secrecy for people who work in the intelligence community. You are asked to sign a civil agreement, called a Standard Form 312, which basically says if you disclose classified information, they can sue you; they can do this, that and the other. And you risk going to jail. But you are also asked to take an oath, and that’s the oath of service. The oath of service is not to secrecy, but to the Constitution—to protect it against all enemies, foreign and domestic. That’s the oath that I kept, that James Clapper and former NSA director Keith Alexander did not. You raise your hand and you take the oath in your class when you are on board. All government officials are made to do it who work for the intelligence agencies—at least, that’s where I took the oath.
  • The Nation: Creating a new system may be your transition, but it’s also a political act. Snowden: In case you haven’t noticed, I have a somewhat sneaky way of effecting political change. I don’t want to directly confront great powers, which we cannot defeat on their terms. They have more money, more clout, more airtime. We cannot be effective without a mass movement, and the American people today are too comfortable to adapt to a mass movement. But as inequality grows, the basic bonds of social fraternity are fraying—as we discussed in regard to Occupy Wall Street. As tensions increase, people will become more willing to engage in protest. But that moment is not now.
  • The Nation: You really think that if you could go home tomorrow with complete immunity, there wouldn’t be irresistible pressure on you to become a spokesperson, even an activist, on behalf of our rights and liberties? Indeed, wouldn’t that now be your duty? Snowden: But the idea for me now—because I’m not a politician, and I do not think I am as effective in this way as people who actually prepare for it—is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what “digital rights” should be. What values should we be protecting, and how do we assert them? What I can do—because I am a technologist, and because I actually understand how this stuff works under the hood—is to help create the new systems that reflect our values. Of course I want to see political reform in the United States. But we could pass the best surveillance reforms, the best privacy protections in the history of the world, in the United States, and it would have zero impact internationally. Zero impact in China and in every other country, because of their national laws—they won’t recognize our reforms; they’ll continue doing their own thing. But if someone creates a reformed technical system today—technical standards must be identical around the world for them to function together.
  • As for labeling someone a whistleblower, I think it does them—it does all of us—a disservice, because it “otherizes” us. Using the language of heroism, calling Daniel Ellsberg a hero, and calling the other people who made great sacrifices heroes—even though what they have done is heroic—is to distinguish them from the civic duty they performed, and excuses the rest of us from the same civic duty to speak out when we see something wrong, when we witness our government engaging in serious crimes, abusing power, engaging in massive historic violations of the Constitution of the United States. We have to speak out or we are party to that bad action.
  • The Nation: Considering your personal experience—the risks you took, and now your fate here in Moscow—do you think other young men or women will be inspired or discouraged from doing what you did? Snowden: Chelsea Manning got thirty-five years in prison, while I’m still free. I talk to people in the ACLU office in New York all the time. I’m able to participate in the debate and to campaign for reform. I’m just the first to come forward in the manner that I did and succeed. When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense. The charges they brought against me, for example, explicitly denied my ability to make a public-interest defense. There were no whistleblower protections that would’ve protected me—and that’s known to everybody in the intelligence community. There are no proper channels for making this information available when the system fails comprehensively.
  • The government would assert that individuals who are aware of serious wrongdoing in the intelligence community should bring their concerns to the people most responsible for that wrongdoing, and rely on those people to correct the problems that those people themselves authorized. Going all the way back to Daniel Ellsberg, it is clear that the government is not concerned with damage to national security, because in none of these cases was there damage. At the trial of Chelsea Manning, the government could point to no case of specific damage that had been caused by the massive revelation of classified information. The charges are a reaction to the government’s embarrassment more than genuine concern about these activities, or they would substantiate what harms were done. We’re now more than a year since my NSA revelations, and despite numerous hours of testimony before Congress, despite tons of off-the-record quotes from anonymous officials who have an ax to grind, not a single US official, not a single representative of the United States government, has ever pointed to a single case of individualized harm caused by these revelations. This, despite the fact that former NSA director Keith Alexander said this would cause grave and irrevocable harm to the nation. Some months after he made that statement, the new director of the NSA, Michael Rogers, said that, in fact, he doesn’t see the sky falling. It’s not so serious after all.
  • The Nation: You also remind us of [Manhattan Project physicist] Robert Oppenheimer—what he created and then worried about. Snowden: Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people. It is interesting that so many people who become disenchanted, who protest against their own organizations, are people who contributed something to them and then saw how it was misused. When I was working in Japan, I created a system for ensuring that intelligence data was globally recoverable in the event of a disaster. I was not aware of the scope of mass surveillance. I came across some legal questions when I was creating it. My superiors pushed back and were like, “Well, how are we going to deal with this data?” And I was like, “I didn’t even know it existed.” Later, when I found out that we were collecting more information on American communications than we were on Russian communications, for example, I was like, “Holy shit.” Being confronted with the realization that work you intended to benefit people is being used against them has a radicalizing effect.
  • The Nation: We have a sense, or certainly the hope, we’ll be seeing you in America soon—perhaps sometime after this Ukrainian crisis ends. Snowden: I would love to think that, but we’ve gone all the way up the chain at all the levels, and things like that. A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they’re really sore—the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment—they’re the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don’t like that at all. The Obama administration almost appears as though it is afraid of the intelligence community. They’re afraid of death by a thousand cuts—you know, leaks and things like that.
  • The Nation: You’ve given us a lot of time, and we are very grateful, as will be The Nation’s and other readers. But before we end, any more thoughts about your future? Snowden: If I had to guess what the future’s going to look like for me—assuming it’s not an orange jumpsuit in a hole—I think I’m going to alternate between tech and policy. I think we need that. I think that’s actually what’s missing from government, for the most part. We’ve got a lot of policy people, but we have no technologists, even though technology is such a big part of our lives. It’s just amazing, because even these big Silicon Valley companies, the masters of the universe or whatever, haven’t engaged with Washington until recently. They’re still playing catch-up. As for my personal politics, some people seem to think I’m some kind of archlibertarian, a hyper-conservative. But when it comes to social policies, I believe women have the right to make their own choices, and inequality is a really important issue. As a technologist, I see the trends, and I see that automation inevitably is going to mean fewer and fewer jobs. And if we do not find a way to provide a basic income for people who have no work, or no meaningful work, we’re going to have social unrest that could get people killed. When we have increasing production—year after year after year—some of that needs to be reinvested in society. It doesn’t need to be consistently concentrated in these venture-capital funds and things like that. I’m not a communist, a socialist or a radical. But these issues have to be 
addressed.
  •  
    Remarkable interview. Snowden finally gets asked some questions about politics. 
Paul Merrell

McCain and the POW Cover-Up | The American Conservative - 0 views

  • Eighteen months ago, TAC publisher Ron Unz discovered an astonishing account of the role the 2008 Republican presidential nominee, John McCain, had played in suppressing information about what happened to American soldiers missing in action in Vietnam. Below, we present in full Sydney Schanberg’s explosive story. * * * John McCain, who has risen to political prominence on his image as a Vietnam POW war hero, has, inexplicably, worked very hard to hide from the public stunning information about American prisoners in Vietnam who, unlike him, didn’t return home. Throughout his Senate career, McCain has quietly sponsored and pushed into federal law a set of prohibitions that keep the most revealing information about these men buried as classified documents. Thus the war hero who people would logically imagine as a determined crusader for the interests of POWs and their families became instead the strange champion of hiding the evidence and closing the books.
  • Almost as striking is the manner in which the mainstream press has shied from reporting the POW story and McCain’s role in it, even as the Republican Party has made McCain’s military service the focus of his presidential campaign. Reporters who had covered the Vietnam War turned their heads and walked in other directions. McCain doesn’t talk about the missing men, and the press never asks him about them. The sum of the secrets McCain has sought to hide is not small. There exists a telling mass of official documents, radio intercepts, witness depositions, satellite photos of rescue symbols that pilots were trained to use, electronic messages from the ground containing the individual code numbers given to airmen, a rescue mission by a special forces unit that was aborted twice by Washington—and even sworn testimony by two Defense secretaries that “men were left behind.” This imposing body of evidence suggests that a large number—the documents indicate probably hundreds—of the U.S. prisoners held by Vietnam were not returned when the peace treaty was signed in January 1973 and Hanoi released 591 men, among them Navy combat pilot John S. McCain.
  •  
    Perhaps no other moral principle is so deeply burned into the psyche of the American soldier than "leave no one behind." It is a permutation of the Golden Rule that allows of no cost-benefit analysis. Commonly, hundreds of lives have been lost to save only a few. That we left behind hundreds of members of the U.S. military as prisoners of war in Viet Nam is morally reprensible. That John McCain, himself a former POW,  played and still plays a key role in the cover-up conspiracy is well beyond morally reprehensible.   
Paul Merrell

Hacked Emails Prove Coordination Between Clinton Campaign and Super PACs - 0 views

  • The fact that political candidates are closely coordinating with friendly Super PACs — making a mockery of a central tenet of the Supreme Court’s 2010 Citizens United decision — is one of the biggest open secrets in Washington. Super PACs are only allowed to accept unlimited contributions on the condition that the money is spent independently of specific campaigns. The Federal Election Commission hasn’t reacted for a variety of reasons, including a lack of hard evidence, vague rules, and a partisan divide among the commissioners so bitter they can’t even agree to investigate obvious crimes. But newly disclosed hacked campaign documents published by WikiLeaks and a hacker who calls himself Guccifer 2.0 reveal in stark terms how Hillary Clinton’s staffers made Super PACs an integral part of her presidential campaign.
  • The emails show consistent, repeated efforts by the Clinton campaign to collaborate with Super PACs on strategy, research, attacks on political adversaries and fundraising. The cache also reveal meetings between the campaign and Priorities USA Action, and that campaign officials have helped with the group’s fundraising. The files were apparently hacked from a variety of Clinton staffers and have been posted online in recent weeks by Wikileaks and Guccifer 2.0. Obama administration intelligence officials have alleged, without providing evidence, that the email hacks were conducted on behalf of the Russian government in an attempt to disrupt the U.S. elections.
  • Super PACs, known technically as “Independent Expenditure-Only Political Committees,” are a direct result of the Citizens United court decision. Justice Anthony Kennedy, the author of the decision, proclaimed that deregulating outside money would have no corrupting effect upon candidates because there would be strict firewalls between candidates and outside groups
  • ...3 more annotations...
  • Correct the Record has long argued it could work directly with the Clinton campaign. When the group launched, it said it would only produce and distribute communications online, and that its work would therefore be exempt from FEC coordination rules. The Super PAC was recently the subject of a complaint filed with the Federal Elections Commission by the Campaign Legal Center, which called on regulators to investigate whether Clinton’s campaign has illegally coordinated with the group. The Campaign Legal Center, a nonpartisan watchdog organization, has also alleged that officials working for Donald Trump have similarly blurred the line between the campaign and one of its largest Super PACs, Make America Number 1, by employing common vendors. The Campaign Legal Center argued that Correct the Record has likely made “coordinated expenditures” that could be considered in-kind contributions to the Clinton campaign — such as its spending on “opposition research, message development, surrogate training, reporter pitches, media booking, video production, ‘rapid response’ press outreach, and other ‘earned media.’” “These documents affirm what we’ve been saying all along about Correct the Record,” said Brendan Fischer, an associate counsel at the Campaign Legal Center. “They are basically operating as an arm of the Clinton campaign.”
  • While Correct the Record has argued it is exempt from FEC rules, Clinton herself has said she does not work with Priorities USA Action. That Super PAC has spent millions of dollars on independent expenditures, including six-figure media advertising buys, to boost Clinton’s candidacy. The group has raised over $133 million through individual donations as large as $6 million. As other media outlets have reported, Marc Elias, the Clinton campaign attorney, provided a memo with guidance on how the campaign could solicit funds for Priorities USA Action. The memo notes that campaign staffers would have to use certain language when trying to raise money for the Super PAC:
  • Elias’s law firm, Perkins Coie LLP, has provided legal services to the Clinton campaign, Correct the Record and Priorities USA Action, making it a central node in the campaign infrastructure.
Paul Merrell

Former Terrorist Group To Enjoy Close Ties to Rumored Trump Cabinet « LobeLog - 0 views

  • Donald Trump’s rumored picks for key foreign-policy positions have already set off alarm bells about the future administration’s embrace of war hawks and Islamophobes. Today, Washington Post columnist Josh Rogin pointed out that former New York City mayor Rudy Giuliani, who is currently reported to be under consideration for an appointment to secretary of state or attorney general, potentially violated the law when he made paid speaking appearances for the Mojahedin-e Khalq (MEK), when the State Department listed the Iranian dissident group as a foreign terrorist organization. Giuliani isn’t the only likely member of the future administration to have maintained close ties and advocated on behalf of the former terrorist group, which assassinated six Americans in Iran between 1973 and 1976. John Bolton (another rumored choice for secretary of state), Clare Lopez (who is reportedly short-listed for deputy national security adviser), and Newt Gingrich (who allegedly turned down an offer of secretary of state but has shown interest in serving as a policy adviser in the Trump administration) have all advocated for the former terrorist group and praised its cultish leader, Maryam Rajavi. Shortly after the overthrow of the Shah, the group experienced a falling out with Ayatollah Ruhollah Khomeini and fled into exile. Over the following years, the group’s leaders, Maryam and Massoud Rajavi, aligned with Saddam Hussein during the Iran-Iraq war (7,000 members fought alongside Saddam Hussein, against Iran) and shifted toward increasingly cultish behavior, mandating divorces and celibacy for their soldiers while cultivating a cult of personality around themselves.
  • Massoud Rajavi hasn’t been seen since overseeing the surrender of MEK forces to the U.S. following the 2003 invasion of Iraq. This summer, the former head of Saudi Arabia’s intelligence agency, Prince Turki bin Faisal Al Saud referred to Massoud Rajavi as “the late Massoud Rajavi,” suggesting that he may be deceased. Turki’s participation at an MEK event, meanwhile, was a tacit acknowledgement of Saudi Arabia’s support of the group. Indeed, forming opportunistic alliances has been a hallmark of the MEK. In 2012, U.S. officials told NBC News that Israel’s national intelligence agency, Mossad, was training and arming the MEK to assassinate Iranian nuclear scientists. The group seeks to portray itself as a government-in-exile and the secular, democratic alternative to Iran’s theocratic government. But the MEK’s lack of influence inside Iran and skepticism about their allegations regarding Iran’s nuclear program—for example, photographic evidence the MEK provided last year allegedly showing evidence of “Lavizan-3,” a secret uranium enrichment facility in the suburbs of Tehran, turned out to be a stock photo from an Iranian safe company – haven’t prevented the group from gaining footholds in Washington through campaign contributions and lucrative speaking gigs for politicians who praise Rajavi and call for regime change in Iran at MEK rallies. The MEK is known for paying generous sums to former officials who speak at their events. Lee Hamilton, a former chairman of the House Foreign Relations Committee who headed the Woodrow Wilson Center for 12 years, told InterPress Service that he was paid “a substantial amount” to appear on an MEK panel in 2011. Giuliani, Bolton, Lopez, and Gingrich have all sung the praises of Maryam Rajavi, called for the U.S. to work towards regime change in Tehran, and treated the MEK as a legitimate Iranian government in exile.
  • peaking at an MEK rally outside Paris last year, Giuliani, who had taken speaking fees from the group when it was on the foreign terrorist organization (FTO) list, told the audience: I will not support anyone for President of the United States who isn’t clear on that slogan behind me. What does it say? It says “Regime Change.” … I will not support a candidate who does not have the moral fiber and the courage to stand up to the Ayatollah and tell him “We are going to do everything we can to get you out and you are never going to become a nuclear power.” Bolton, who also advocated for the group when it was on the FTO list, told an MEK audience outside Paris last summer: There is only one answer here: To support legitimate opposition groups that favor overthrowing the military theocratic dictatorship in Tehran, and it should be the declared policy of the United States of America and all of its friends to do just that at the earliest opportunity. Gingrich, who also spoke for the group before it was delisted, told the 2016 gathering in Paris: There are no moderates in the dictatorship. The dictatorship cannot be trusted. The [nuclear] agreement made with it is insane.
  • ...1 more annotation...
  • He concluded by praising the commitment of Rajavi’s followers, saying: I want you to know that the message I will take home to America is that there are thousands and thousands of Iranians who are prepared, who are ready, who are committed to and who believe that we can truly bring democracy to Iran. Lopez, who serves as a vice president at the Center for Security Policy, a far-right think tank headed by anti-Muslim conspiracy theorist Frank Gaffney, and as executive director of the long-time MEK advocacy group, the Iran Policy Committee, from 2005 to 2006, wrote that Prince Turki’s surprising appearance marked a watershed moment for the MEK. She wrote: …[T]he implications of official Riyadh government support for the largest, most dedicated, and best-organized Iranian opposition movement will reverberate through the Middle East. Although not openly stated by bin Faisal, the new NCRI-Riyadh alliance may be expected to involve funding, intelligence sharing, and possible collaboration in operations aimed at the shared goal of overthrowing the current Tehran regime. If Lopez, Giuliani, Bolton, or Gingrich serve in the Trump administrations, the MEK will have the highest level access its ever enjoyed in the U.S. government, a remarkable journey for a fringe Islamic-Marxist group that, until 2012, was on the State Department’s terrorism list for its role in assassinating Americans.
Paul Merrell

Turkey Blasts the U.S. for Supporting Terrorists in Syria | News | teleSUR English - 0 views

  • There is now “confirmed evidence, with pictures, photos and videos” of the United State’s complicity in and support of terrorist groups in Syria, including the Islamic State group, according to Turkish President Recep Tayyip Erdogan. Erdogan went on to say during the Tuesday press conference that the U.S.-led coalition was supporting other groups such as the Kurdish People's Protection Units in northern Syria (YPG) and Democratic Union Party (PYD), both of which he considers terrorist organizations.
  • The accusations have been denounced by U.S. officials, with State Department spokesperson Mark Toner calling them “ludicrous” and with “no basis for truth.” Washington is “100 percent behind the defeat and destruction of Daesh, even beyond Syria and Iraq,” he said, according to RT. Despite Erdogan’s accusations, the U.S. has recognized Turkey’s efforts in northern Syria, calling its efforts “very efficient, very successful.”
  • Turkey has been working alongside Iran and Russia to defeat various militant opposition groups trying to topple Assad’s regime. Erdogan has asked Saudi Arabia and Qatar to join them in the fight, and has praised the two Gulf states for their “goodwill” shown to Syria, AP reported.
  • ...1 more annotation...
  • The Turkish president has nevertheless stressed that Ankara itself would not take part in the talks between foreign ministers in Kazakhstan next month if Syrian Kurdish groups – whom he called "terrorist organizations" – were also present. According to a security analyst and former Pentagon official speaking to RT, however, Erdogan's accusations are not that far-fetched, given the United States' history. "The evidence (mentioned by Erdogan) is quite ample, (the US) have been doing it for a number of years, including running secret CIA operations through Jordan, then through Turkey and into Syria," he said. Erdogan’s comments echo Iranian Defense Minister Hossein Dehghan, who recently also blamed the West for having “no real intention to fight neither in Syria nor in Iraq,” as quoted by RT. “We don’t see any readiness on their part to play a truly useful and meaningful role in fighting IS, because it’s them who have raised terrorists and they are interested in keeping them there,” he added.
Paul Merrell

Netanyahu scandals reflect corruption at the heart of Israeli society - Mondoweiss - 0 views

  •       Israeli prime minister Benjamin Netanyahu is in danger of being brought down, possibly soon, over what initially appears to be little more than an imprudent taste for Cuban cigars and pink champagne. In truth, however, the allegations ensnaring Netanyahu reveal far more than his personal flaws or an infatuation with the high life. They shine a rare light on the corrupt nexus between Israel’s business, political and media worlds, compounded by the perverse influence of overseas Jewish money. Of the two police investigations Netanyahu faces (there are more in the wings), the one known as Case 1000, concerning gifts from businessmen worth hundreds of thousands of dollars, is most likely to lead to his downfall. But it is the second investigation, Case 2000, and the still-murky relationship between the two cases, that more fully exposes the rot at the heart of Israel’s political system. This latter case hinges on a tape recording in which Netanyahu plots with an Israeli newspaper tycoon to rig media coverage in his favor. Leads from both cases suggest that Netanyahu may have been further meddling, together with his billionaire friends, in the shadowy world of international espionage.
  • Netanyahu’s appetite for a free lunch has been common knowledge in Israel since his first term as prime minister in the late 1990s. Then, he was twice investigated for fraud, though controversially charges were not brought in either case. Police discovered along the way that he and his wife, Sara, had horded many of the gifts he received during state visits. More than 100 were never recovered. The clarifications that were issued more than 15 years ago, as a result of those investigations, make it hard for Netanyahu to claim now that he did not understand the rules. According to justice ministry advice in 2001, government and state officials cannot keep gifts worth more than $100 without risking violating Israeli law. The gifts Netanyahu received from one of the Israeli businessmen involved in Case 1000, Hollywood film producer Arnon Milchan, amounted to as much as $180,000. Netanyahu has argued that these presents, ranging from cigars to jewelry, were expressions of a close friendship rather than bribes to him in his capacity as prime minister. The problem, however, is that Netanyahu appears to have reciprocated by using his position as head of the Israeli government to lobby John Kerry, the then U.S. secretary of state, to gain Milchan a 10-year U.S. residency visa. He may have done more.
  • Also being investigated are his family’s ties to a friend of Milchan’s, Australian billionaire James Packer, who made his fortune in the media and gambling industries. Packer has similarly lavished gifts on the Netanyahu family, especially Yair, Netanyahu’s eldest son. At the same time, Packer, now a neighbor of the Netanyahus in the coastal town of Caesarea, has been seeking permanent residency and the enormous benefits that would accrue with tax status in Israel. As a non-Jew, Packer should have no hope of being awarded residency. There are suspicions that Netanyahu may have been trying to pull strings on the Australian’s behalf. Many of these gifts were apparently not given freely. The Netanyahus asked for them. Indicating that Netanyahu knew there might be legal concerns, he used code words – “leaves” for cigars and “pinks” for champagne – to disguise his orders to Milchan. Police are reported to be confident, after questioning Netanyahu three times, that they have enough evidence to indict him. If they do, Netanyahu will be under heavy pressure to resign.
  • ...5 more annotations...
  • Yossi Cohen was appointed head of the Mossad a year ago, after a government vetting committee accepted that he had no personal ties to Netanyahu. But Cohen forgot to mention that he is extremely close to Netanyahu’s high-flying friends – connections that are now under investigation. Milchan set up a global security firm in 2008 called Blue Sky International, stuffed with Israeli security veterans. Packer soon became a partner. They developed close ties to Cohen, first while he was a senior official at the Mossad and later when he headed Israel’s national security council. Before Cohen was appointed head of Mossad in December 2015, the pair had hoped to recruit him to their cyber-security operations. Cohen received several gifts from Packer, in violation of Israeli government rules, including a stay at one of his luxury hotels. A source speaking to Haaretz said Blue Sky had “more than [a] direct line” to Netanyahu. They “would pull him out from anywhere, at any time, on any occasion.” According to Haaretz’s military analyst, Amir Oren, the new disclosures raise serious questions about whether Milchan and Packer twisted Netanyahu’s arm to parachute Cohen into the post over the favored candidate. In return, Packer may have been hoping that Cohen would authorise exceptional Israeli residency for him, classifying him as a security asset.
  • From Hollywood to Mossad Cases 1000 and 2000 share at least one figure in common. Milchan gave Netanyahu extravagant gifts over many years, but he is also reported to have acted as go-between, bringing arch-enemies Netanyahu and Mozes together. Milchan has his own financial stake in the media, in his case a holding in the Channel 10 TV station. In addition, Milchan introduced Netanyahu to sympathetic businessmen, including his friend Packer, to discuss taking the ailing Yedioth media group off Mozes’ hands. Only last October he arranged for media mogul Rupert Murdoch’s son, Lachlan, to fly to Israel for one night for a secret meeting with Netanyahu. Milchan is undoubtedly at the centre of the shadowy world of power and finance that corrupts public life in Israel. Not only is Milchan a highly influential Hollywood figure, having produced more than 100 films, but he has admitted that he is a former Mossad agent. He used his Hollywood connections to help make arms deals and secure parts for Israel’s nuclear weapons program. One can only wonder whether Milchan was not effectively set up in his Hollywood career as a cover for his Mossad activities. But Milchan, it seems, is still wielding influence in Israel’s twilight world of security.
  • eyond this, one one can only speculate about how Cohen’s indebtedness to Milchan, Packer and Netanyahu might have influenced his decisions as head of the Mossad. It was only a few years ago that the former Mossad chief, Meir Dagan, was reported to have wrestled furiously with Netanyahu to stop him launching a military strike on Iran. Prosecution drags feet It is unclear for the time being whether the revelations are drawing to a close or will lead deeper into Israel’s twin netherworlds of financial corruption and security. But what has emerged so far should be enough to finish off Netanyahu as prime minister. Whether it does so may depend on the extent of Israel’s compromised legal system. Attorney general Avichai Mendelblit was appointed by Netanyahu and is a political ally. He appears to have been dragging his feet as much as possible to slow down the police investigation, if not sabotage it. But the weight of evidence is looking like it may prove too overwhelming. As political analyst Yossi Verter observed: “There’s no way that a police commissioner … appointed [by Netanyahu] and a cautious attorney general, who in the past was part of his close circle and one of his loyalists, would be putting him through the seven circles of hell if they weren’t convinced that there’s a solid basis for indictment and conviction.” The next question for Netanyahu is whether he will step down if indicted. He should, if Olmert’s example is followed. But his officials are citing a 1993 high court ruling that allows a cabinet minister under indictment to remain in office. Certainly if Netanyahu chooses to stay on, his decision would be appealed to the court again. However, the judges may be reluctant to oust a sitting prime minister. The court of public opinion is likely to be decisive in that regard. A recent poll shows few Israelis believe Netanyahu is innocent of the allegations. Some 54 per cent think he broke the law, while only 28 believe him. Opinion, however, is split evenly on whether he should resign.
  • If past experience is any measure, Netanyahu will try to turn public opinion his way by increasing friction with the Palestinians and exploiting the international arena, especially his relations with the Trump administration. He may be expected to encourage Trump at the very least to posture more stridently against Iran. Nonetheless, most observers assume Netanyahu is doomed – it is simply a matter of when. The odds are on an indictment in late spring, followed by elections in the fall, say Israeli analysts. At this stage, none of his political rivals wants to be seen stabbing Netanyahu in the back. Most are keeping quiet. But behind the scenes, political leaders are hurrying to forge new alliances and extract political concessions while Netanyahu is wounded.
  • Who might succeed Netanyahu? Yair Lapid, of the centre-right Yesh Atid, is heading the polls, but that may in part reflect the disarray in Netanyahu’s Likud party. In a sign of where the deeper currents in Israeli society are leading, a Maariv poll last week showed that settler leader Naftali Bennett would win an election if he were to head the Likud. Netanyahu now needs the help of all the powerful friends he can muster. His biggest ally, U.S. casino magnate Sheldon Adelson, may not be among them. After the revelations that Netanyahu was conspiring against him with Mozes, Adelson has cut back on Israel Hayom’s circulation and is reported to be offering less favorable coverage of the Netanyahus. That could prove the final straw, sealing Netanyahu’s fate.
Paul Merrell

A Distorted Lens Justifying An Illegitimate Ukrainian Government - 0 views

  • Support it or oppose it, a coup d’état took place in Kiev after an EU-brokered agreement was signed by the Ukrainian government and the mainstream opposition on Feb. 21. The agreement called for power sharing between both sides through the formation of a national unity government and for an end to the opposition-led street protests in Kiev. President Viktor Yanukovych ordered the Ukrainian police and security forces to withdraw from their positions, and even earlier, he had made multiple concessions to the opposition leadership. Instead of keeping its end of the bargain, the Ukrainian mainstream opposition executed a coup through the use of violence by organized ultra-nationalist gangs, which some analysts have compared to stay-behinds or secretive militias that were created by NATO during the Cold War. These armed ultra-nationalist groups took over administrative bodies in Ukraine and fought until they managed to oust the Ukrainian government and opened the path for opposition leaders to take power on Feb. 25. The Ukrainian mainstream opposition used the EU-brokered agreement, which the Brussels-based European Commission deliberately refused to enforce, as a means of justifying the formation of a coup-imposed government.
  • In the absence of almost half the Ukrainian Verkhovna Rada, or Ukrainian Parliament, the opposition parties began to arbitrarily pass unconstitutional laws. They also unconstitutionally selected Oleksandr/Aleksandr Valentynovych Turchynov as the acting president of Ukraine before President Viktor Yanukovych was even impeached. Intimidation and violence were additionally used to secure the cooperation of any disagreeing parliamentarians or state officials in Kiev. Saying that the ultra-nationalists and fascists are marginal elements, the mainstream media networks in North America and the European Union have simply dismissed the armed ultra-nationalist groups involved in the coup that are presently integrated into the putsch regime running Kiev. The militant ultra-nationalists, however, are very influential and amassing power under the illegal premiership of Arseniy Yatsenyuk.  Yatsenyuk, himself, is from Yulia Tymoshenko’s notoriously corrupt All-Ukrainian Union Fatherland Party (Batkivshchyna) and essentially a U.S. and EU appointee. There is even a pre-coup leaked telephone interception, likely either recorded by the intelligence services of Russia or Ukraine, in which U.S. Assistant Secretary of State Victory Nuland says that Yatsenyuk will be appointed as the prime minister of the Ukrainian government that the U.S. is putting together.
  • It is unlikely that Yatsenyuk and the loosely-knit alliance of the governing parties that ran Ukraine under the Yushchenko-Tymoshenko governments, foreign-based Ukrainians, and the forces behind the Orange Revolution that form the Orangist camp which he belongs to could have gotten back into power in Ukraine without pressure, the use of force and foreign backing. Yatsenyuk was even threatened and booed by the Ukrainians gathered at Independence Square when it was announced that he would be appointed as the prime minister of the post-coup government. A vast segment of the protesters made it clear that Tymoshenko, Yatsenyuk’s party leader, was no alternative to the ousted President Viktor Yanukovych in their eyes, either, when it was announced that she wanted to run for prime minister. The Orangists do not have the support of a majority of the population, nor did they form the parliamentary majority in the Verkhovna Rada. Their Orangist president, Viktor Yushchenko, only got 5 percent of the vote in January 2010, in a show of no-confidence, whereas Viktor Yanukovych won the first and second rounds of the presidential elections in 2010. According to Victoria Nuland, the U.S. has also poured $5 billion into “democracy promotion” inside Ukraine. This is U.S. State Department doublespeak for politicized funding that Washington has sent to Ukraine to organize the Orange Revolution and its Euromaidan sequel or what can frankly be described as regime change.
  • ...10 more annotations...
  • To rule Ukraine once more, the Orangists and their foreign backers have used and manipulated the ultra-nationalist elements of the population — some of which are openly anti-European Union — as their foot soldiers in an application of force against their democratically-elected opponents. Despite their views, the ultra-nationalists are actually more honest than the Orangist liberal figures like Arseniy Yatsenyuk. Unlike the misleading and utterly corrupt Orangist leaders, the ultra-nationalists do not hide their agendas and platforms.
  • The ultra-nationalists have inconsolably anti-Russian attitudes. Many of them also dislike a vast spectrum of other groups, including Jews, Armenians, Roma, Poles, Tatars, supporters of the Party of Regions and communists. In this context, it should come as no surprise that one of the first decisions that the post-coup regime in Kiev made was to remove the legal status of the Russian language as the regional language of half of Ukraine. Right Sector is, itself, a coalition of militant ultra-nationalists. These militants were instrumental in fighting government forces and taking over both government buildings in Kiev and regional governments in the western portion of Ukraine. Despite the protests of First Deputy Defense Minister Oleynik, Deputy Defense Minister Mozharovskiy and Defense Minister Babenk, Arseniy Yatsenyuk’s post-coup government has even given the ultra-nationalist opposition militias official status within the Ukrainian military and security forces. Yatsenyuk and the Orangists also dismissed all the officials that protested that the move would fracture the country and make the political divide in Ukraine irreversible.
  • Several members of Svoboda have been given key cabinet and government posts. One of the two junior deputy prime ministers, or assistant deputy prime ministers, is Oleksandr Sych. The ministry of agriculture and food has been given for management to Ihor Shvaika. The environment and natural resources ministry has been assigned to Andry/Andriy Mokhnyk. The defense minister is Ihor Tenyukh, a former admiral in the Ukrainian Navy who obstructed Russian naval movements in Sevastopol during the Russo-Georgian War over South Ossetia and who was later dismissed by the Ukrainian government for insubordination. Oleh Makhnitsky, another member of Svoboda, has been assigned as the new prosecutor-general of Ukraine by the coup government. Andry Parubiy, one of the founders of Svoboda, is now the post-coup secretary of the National Security and Defense Council of Ukraine (RNBO). He was the man controlling the so-called “Euromaidan security forces” that fought government forces in Kiev. His job as secretary is to represent the president and act on his behalf in coordinating and implementing the RNBO’s decisions. As a figure, Parubiy clearly illustrates how the mainstream opposition in Ukraine is integrated with the ultra-nationalists. Parubiy is an Orangist and was a leader in the Orange Revolution. He has changed parties several times. After founding Svoboda, he joined Viktor Yushchenko’s Our Ukraine before joining Yulia Tymoshenko’s Fatherland Party and being elected as one of the Fatherland Party’s deputies, or members of parliament.
  • While the mainstream media in North America and the EU look the other way about the ultra-nationalists in the coup government in Kiev, the facts speak for themselves. Both the EU and the U.S. governments have rubbed their elbows with the ultra-nationalists. Oleh Tyahnybok, the leader of Svoboda (formerly the Social Nationalist Party of Ukraine), was even part of the opposition triumvirate that all the U.S. and EU officials visiting Kiev met with while performing their political pilgrimages to Ukraine to encourage the protesters to continue with their demonstrations and riots demanding Euro-Atlantic integration. Svoboda has popularly been described as a neo-Nazi grouping. The World Jewish Congress has demanded that Svoboda be banned. The ultra-nationalist party was even condemned by the EU’s own European Parliament, which passed a motion on Dec. 13, 2012 categorically condemning Svoboda.
  • The ultra-nationalists are such an integral part of the mainstream opposition that the U.S.-supported Orangist president of Ukraine, Viktor Yushchenko, posthumously awarded the infamous Nazi collaborator Stepan Bandera the title and decoration of the “Hero of Ukraine” in 2010. Foreign audiences, however, would not know that if they relied on reportage from the likes of the U.S. state-run Radio Free Europe, which tried to protect Yushchenko because he wanted to reorient Ukraine toward the U.S. and EU. Parubiy also lobbied the European Parliament not to oppose Yushchenko’s decision. Other smaller ultra-nationalists parties were also given government posts, and several of the independent cabinet members are also aligned to these parties. Dmytro Yarosh from Right Sector (Pravyi Sektor) is the deputy secretary of the RNBO, and the Trizub Party was given the education ministry. Trizub had Sergey Kvit appointed to the post of education minister.
  • The role of the ultra-nationalists in executing the coup has been essentially ignored by the mainstream media in North America and the EU. The roots of the bloodshed in Kiev have been ignored, too. The shootings of protesters by snipers have simply been presented as the vile actions of the Ukrainian government, never taking into consideration the agitation of the armed ultra-nationalist gangs and the mainstream opposition leaders for a conflict. According to a leaked telephone conversation on Feb. 26 between Estonian Foreign Minister Urmas Paet and European Union Commissionaire Catherine Ashton, which was leaked by the Security Service of Ukraine (SBU) , the snipers who shot at protesters and police in Kiev were allegedly hired by Ukrainian opposition leaders. Estonian Foreign Minister Paet made the statements on the basis of details he was given by one of the head doctors of the medical team of the anti-government protests, Olga Bogomolets, an opponent of Viktor Yanukovych’s government who wanted it removed from power. Paet tells Ashton the following first: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” This is also corroborated by the fact that Yanukovych actually had ordered the Ukrainian riot police and security forces not to use lethal force.
  • The Estonian official then mentions that it was verified to him that the same snipers were killing people on both sides. He tells Ashton the following: “And second, what was quite disturbing, this same Olga [Bogomolets] told as well that all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides.” Another important point that Paet makes to Ashton is the following: “[Dr. Olga Bogomolets] then also showed me some photos she said that as a medical doctor she can say that it is the same handwriting, the same type of bullets, and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Past reports that the mainstream media were hostile to the ousted Ukrainian government also raise serious questions that corroborate what has been said about the snipers intentionally killing protesters to instigate regime change.
  • The Telegraph reported on Feb. 20 that “[a]t least three of the bodies displayed single bullet wounds to the heads,” and “were shot in the head, the neck or the heart. None were shot anywhere else like in the legs.” This means that the snipers were making kill shots by design, which seems like the last thing that the Ukrainian government would want to do when it was trying to appease the protesters and bring calm to Kiev. The Ukrainian journalist Alexey Yaroshevsky’s account of the sniper shootings is also worth noting, and it is backed up by footage taken by his Russian crew in Kiev.  Their footage shows armed opposition members running away from the scene of the shooting of anti-government protesters. What comes across as unusual is that the armed members of the opposition were constantly agitating to start firefights at every opportunity that they could get.
  • The commandant of the SSU, Major-General Oleksandr Yakimenko, has testified that his counter-intelligence forces were monitoring the CIA in Ukraine during the protests. According to the SSU, the CIA was active on the ground in Kiev and collaborating with a small circle of opposition figures. Yakimenko has also said that it was not the police or government forces that fired on the protesters, but snipers from the Philharmonic Building that was controlled by the opposition leader Andriy Parubiy, which he asserts was interacting with the CIA. Speaking to the Russian media, Yakimenko said that 20 men wearing “special combat clothes” and carrying “sniper rifle cases, as well as AKMs with scopes” ran out of the opposition-controlled Philharmonic Building and split into two groups of 10 people, with one taking position at the Ukraine Hotel. The anti-government protesters even saw this and asked Ukrainian police to pursue them, and even figures from Right Sector and Svoboda asked Yakimenko’s SSU to investigate and apprehend them, but Parubiy prevented it. Major-General Yakimenko has categorically stated that opposition leaders were behind the shootings. Following the release of the conversation between Paet and Ashton, the Estonian Foreign Ministry confirmed that the leak was authentic, whereas the European Commission kept silent. The mainstream media in North America and the EU either ignored it or said very little. The Telegraph even claimed that Dr. Bogomolets told it that she had not treated any government forces even though she contradicts this directly in an interview with CNN where says she treated military personnel.
  • CNN, on the other hand, quickly glossed over the story, giving it only enough attention to create the impression that the network is fairly covering the news. Opting not to give the story the airtime that it deserved, CNN instead posted it on its webpage. The conversation is immediately discredited, undermined and dismissed in the first sentence of the article, which is attributed to Foreign Minister Paet: “Don’t read too much into the conversation.” The article was deliberately structured by CNN to undermine the important information that would challenge the narrative that the U.S. mainstream media have been painting. The title, sub-titles and opening sentences of most texts act as microcosms or summaries of the articles, and in many cases, readers evaluate or decide to read the articles on the basis of what these texts communicate. Moreover, the first sentence of the article sets the tempo for readers and and influences their opinion, too. Although anyone who listens to the conversation between Paet and Ashton and considers the evidence that is being discussed would realize just how important the news was, the message being set forth by CNN was a dismissive one.
Paul Merrell

U.S. military confirms rebels had sarin - 1 views

  • As part of the Obama administration’s repeated insistence – though without offering proof – that the recent sarin gas attack near Damascus was the work of the Assad regime, the administration has downplayed or denied the possibility that al-Qaida-linked Syrian rebels could produce deadly chemical weapons. However, in a classified document just obtained by WND, the U.S. military confirms that sarin was confiscated earlier this year from members of the Jabhat al-Nusra Front, the most influential of the rebel Islamists fighting in Syria. The document says sarin from al-Qaida in Iraq made its way into Turkey and that while some was seized, more could have been used in an attack last March on civilians and Syrian military soldiers in Aleppo.
  • The document, classified Secret/Noforn – “Not for foreign distribution” – came from the U.S. intelligence community’s National Ground Intelligence Center, or NGIC, and was made available to WND Tuesday. It revealed that AQI had produced a “bench-scale” form of sarin in Iraq and then transferred it to Turkey. A U.S. military source said there were a number of interrogations as well as some clan reports as part of what the document said were “50 general indicators to monitor progress and characterize the state of the ANF/AQI-associated Sarin chemical warfare agent developing effort.” “This (document) depicts our assessment of the status of effort at its peak – primarily research and procurement activities – when disrupted in late May 2013 with the arrest of several key individuals in Iraq and Turkey,” the document said. “Future reporting of indicators not previously observed would suggest that the effort continues to advance despite the arrests,” the NGIC document said.
  • This seizure followed a chemical weapons attack in March on the Khan al-Assal area of rural Aleppo, Syria. In that attack, some 26 people and Syrian government forces were killed by what was determined to be sarin gas, delivered by a rocket attack. The Syrian government called for an investigation by the United Nations. Damascus claimed al-Qaida fighters were behind the attack, also alleging that Turkey was involved. “The rocket came from a place controlled by the terrorists and which is located close to the Turkish territory,” according to a statement from Damascus. “One can assume that the weapon came from Turkey.” The report of the U.S. intelligence community’s NGIC reinforces a preliminary U.N. investigation of the attack in Aleppo which said the evidence pointed to Syrian rebels. It also appears to bolster allegations in a 100-page report on an investigation turned over to the U.N. by Russia. The report concluded the Syrian rebels – not the Syrian government – had used the nerve agent sarin in the March chemical weapons attack in Aleppo.
  • ...7 more annotations...
  • The May 2013 seizure occurred when Turkish security forces discovered a two-kilogram cylinder with sarin gas while searching homes of Syrian militants from the al-Qaida-linked Jabhat al-Nusra Front following their initial detention. The sarin gas was found in the homes of suspected Syrian Islamic radicals detained in the southern provinces of Adana and Mersia. Some 12 suspected members of the al-Nusra Front were arrested. At the time, they were described by Turkish special anti-terror forces as the “most aggressive and successful arm” of the Syrian rebels. In the seizure, Turkish anti-terror police also found a cache of weapons, documents and digital data. At the time of the arrest, the Russians called for a thorough investigation of the detained Syrian militants found in possession of sarin gas.
  • While the contents of the report have yet to be released, sources tell WND the documentation indicates that deadly sarin poison gas was manufactured in a Sunni-controlled region of Iraq and then transported to Turkey for use by the Syrian opposition, whose ranks have swelled with members of al-Qaida and affiliated groups. The documentation that the U.N. received from the Russians indicated specifically that the sarin gas was supplied to Sunni foreign fighters by a Saddam-era general working under the outlawed Iraqi Baath party leader, Izzat Ibrahim al-Douri. Al-Douri was a top aide to Saddam Hussein before he was deposed as Iraqi president. The sarin nerve gas used in the Allepo attack, sources say, had been prepared by former Iraqi Military Industries Brig. Gen. Adnan al-Dulaimi. It then was supplied to Baath-affiliated foreign fighters of the Sunni and Saudi Arabian-backed al-Nusra Front in Aleppo, with Turkey’s cooperation, through the Turkish town of Antakya in Hatay Province. The source who brought out the documentation now in the hands of the U.N. is said to have been an aide to al-Douri. Al-Dulaimi was a major player in Saddam’s chemical weapons production projects, the former aide said. Moreover, Al-Dulaimi has been working in the Sunni-controlled region of northwestern Iraq where the outlawed Baath party now is located and produces the sarin.
  • The NGIC depiction of the variety of sarin as “bench-scale” reinforces an analysis by terrorism expert Yossef Bodansky, who said the recent findings on the chemical weapons attack of Aug. 21 on the outskirts of Damascus, Syria, was “indeed a self-inflicted attack” by the Syrian opposition to provoke U.S. and military intervention in Syria.
  • The terrorism expert said that the jihadist movement has technologies which have been confirmed in captured jihadist labs in both Turkey and Iraq, as well as from the wealth of data recovered from al-Qaida in Afghanistan in 2001 and 2002. He added that the projectiles shown by the opposition, which were tested by U.N. inspectors, are not standard weapons of the Syrian army.
  • Now, a former analyst for the Central Intelligence Agency, Ray McGovern, similarly backs the claim that the Syrian rebels perpetrated the poison gas attack on Aug. 21 McGovern was one of a number of veteran intelligence professionals who recently signed a letter to Obama saying that Damascus wasn’t behind the Aug. 21 chemical attack. As WND recently reported, former U.S. intelligence analysts claim current intelligence analysts have told them Assad was not responsible for the Aug. 21 poison gas attack, saying there was a “growing body of evidence” that reveals the incident was a pre-planned provocation by the Syrian opposition.
  • “Initial meetings between senior opposition military commanders and Qatari, Turkish and U.S. intelligence officials took place at the converted Turkish military garrison in Antakya, Hatay Province, now used as the command center and headquarters of the Free Syrian Army and their foreign sponsors,” the analysts said.
  • The VIPS memo to Obama reinforces separate videos, which show foreign fighters associated with the Syrian opposition firing artillery canisters of poison gas. One video shows Nadee Baloosh, a member of an al-Qaida-affiliated group Rioyadh al-Abdeen, admitting to the use of chemical weapons. In the video clip, al-Abdeen, who is in the Latakia area of Syria, said his forces used “chemicals which produce lethal and deadly gases that I possess.”
« First ‹ Previous 101 - 120 of 208 Next › Last »
Showing 20 items per page