Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "ranking" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

"Crisis At The Border" Is Yet Another Example Of "Blowback." - 0 views

  • If you’re reading this, you probably follow the news. So you’ve probably heard of the latest iteration of the “crisis at the border”: tens of thousands of children, many of them unaccompanied by an adult, crossing the desert from Mexico into the United States, where they surrender to the Border Patrol in hope of being allowed to remain here permanently. Immigration and Customs Enforcement’s detention and hearing system has been overwhelmed by the surge of children and, in some cases, their parents. The Obama Administration has asked Congress to approve new funding to speed up processing and deportations of these illegal immigrants. Even if you’ve followed this story closely, you probably haven’t heard the depressing backstory — the reason so many Central Americans are sending their children on a dangerous thousand-mile journey up the spine of Mexico, where they ride atop freight trains, endure shakedowns by corrupt police and face rapists, bandits and other predators. (For a sense of what it’s like, check out the excellent 2009 film “Sin Nombre.”) NPR and other mainstream news outlets are parroting the White House, which blames unscrupulous “coyotes” (human smugglers) for “lying to parents, telling them that if they put their kids in the hands of traffickers and get to the United States that they will be able to stay.” True: the coyotes are saying that in order to gin up business. Also true: U.S. law has changed, and many of these kids have a strong legal case for asylum. Unfortunately, U.S. officials are ignoring the law.
  • The sad truth is that this “crisis at the border” is yet another example of “blowback.” Blowback is an unintended negative consequence of U.S. political, military and/or economic intervention overseas — when something we did in the past comes back to bite us in the ass. 9/11 is the classic example; arming and funding radical Islamists in the Middle East and South Asia who were less grateful for our help than angry at the U.S.’ simultaneous backing for oppressive governments (The House of Saud, Saddam, Assad, etc.) in the region. More recent cases include U.S. support for Islamist insurgents in Libya and Syria, which destabilized both countries and led to the murders of U.S. consular officials in Benghazi, and the rise of ISIS, the guerilla army that imperils the U.S.-backed Maliki regime in Baghdad, respectively. Confusing the issue for casual American news consumers is that the current border crisis doesn’t involve the usual Mexicans traveling north in search of work. Instead, we’re talking about people from Central American nations devastated by a century of American colonialism and imperialism, much of that intervention surprisingly recent. Central American refugees are merely transiting through Mexico.
  • “The unaccompanied children crossing the border into the United States are leaving behind mainly three Central American countries, Honduras, El Salvador and Guatemala. The first two are among the world’s most violent and all three have deep poverty, according to a Pew Research report based on Department of Homeland Security (DHS) information,” reports NBC News. “El Salvador ranked second in terms of homicides in Latin America in 2011, and it is still high on the list. Honduras, Guatemala and El Salvador are among the poorest nations in Latin America. Thirty percent of Hondurans, 17 percent of Salvadorans and 26 percent of Guatemalans live on less than $2 a day.” The fact that Honduras is the biggest source of the exodus jumped out at me. That’s because, in 2009, the United States government — under President Obama — tacitly supported a military coup that overthrew the democratically elected president of Honduras. “Washington has a very close relationship with the Honduran military, which goes back decades,” The Guardian noted at the time. “During the 1980s, the US used bases in Honduras to train and arm the Contras, Nicaraguan paramilitaries who became known for their atrocities in their war against the Sandinista government in neighbouring Nicaragua.”
  • ...2 more annotations...
  • Honduras wasn’t paradise under President Manuel Zelaya. Since the coup, however, the country has entered a downward death spiral of drug-related bloodshed and political revenge killings that crashed the economy, brought an end to law, order and civil society, and now has some analysts calling it a “failed state” along the lines of Somalia and Afghanistan during the 1990s. “Zelaya’s overthrow created a vacuum in security in which military and police were now focused more on political protest, and also led to a freeze in international aid that markedly worsened socio-economic conditions,” Mark Ungar, professor of political science at Brooklyn College and the City University of New York, told The International Business Times. “The 2009 coup, asserts [Tulane] professor Aaron Schneider, gave the Honduran military more political and economic leverage, at the same time as the state and political elites lost their legitimacy, resources and the capacity to govern large parts of the country.” El Salvador and Guatemala, also narcostates devastated by decades of U.S. support for oppressive, corrupt right-wing dictatorships, are suffering similar conditions.
  • Talk about brass! The United States does it everything it can to screw up Central America — and then acts surprised when desperate people show up at its front gate trying to escape the (U.S.-caused) carnage. Letting the kids stay — along with their families — is less than the least we could do.
1More

Israel Intelligence Eavesdropped on Phone Calls By John Kerry - SPIEGEL ONLINE - 0 views

  • SPIEGEL has learned from reliable sources that Israeli intelligence eavesdropped on US Secretary of State John Kerry during Middle East peace negotiations. In addition to the Israelis, at least one other intelligence service also listened in as Kerry mediated last year between Israel, the Palestinians and the Arab states, several intelligence service sources told SPIEGEL. Revelations of the eavesdropping could further damage already tense relations between the US government and Israel. During the peak stage of peace talks last year, Kerry spoke regularly with high-ranking negotiating partners in the Middle East. At the time, some of these calls were not made on encrypted equipment, but instead on normal telephones, with the conversations transmitted by satellite. Intelligence agencies intercepted some of those calls. The government in Jerusalem then used the information obtained in international negotiations aiming to reach a diplomatic solution in the Middle East.
3More

Letter from Retired Military Leaders to President Obama on CIA and the Release of the T... - 0 views

  • On your second day in office, you led the country forward by issuing executive orders banning torture and other forms of abusive interrogation. Many of us were in the Oval Office that day, proud to stand behind you as you signaled an end to the misguided policies of the post-9/11 period. As retired generals and admirals, we have worked since that day to build a stronger, more durable consensus against torture in our country so that, at a future moment when our nation is tested, the American people will reject calls to resort to such abuses. We welcomed your public support for declassification of the Senate Select Intelligence Committee’s study on the CIA’s rendition, detention, and interrogation program. We believe that the American people must understand fully what the program entailed, how it came to be, and what was gained—and lost— because of it. We write to you today because we believe your strong record against torture is being undermined by members of your own administration. In part because there has been so little transparency about the torture program, some former government officials continue to claim that so-called “enhanced” interrogation techniques were necessary to disrupt terrorist plots and save lives. Now one of the key proponents of this false narrative that “torture works,” the former CIA director George Tenet, is reportedly coordinating with the current leadership of the CIA to discredit the Senate intelligence committee’s report. CIA Director John Brennan recently told the Wall Street Journal that he plans to "take issue” with parts of the report that he “believe[s] are inaccurate or misleading."
  • It is understandable that current and former employees of the CIA feel protective of the agency’s reputation and embarrassed by what the Senate study contains. The U.S. military’s examination of torture in its ranks after the Abu Ghraib scandal was painful; it was also necessary to the health of the institution. The stakes are too high to allow the intelligence community to circle the wagons and launch a concerted campaign to undermine the report’s credibility. Ultimately, an American public that understands the high costs of torture is the best guarantee against a future president rescinding your executive order and treating torture as a viable policy option. There is no substitute for leadership from the top on an issue like this. You have set the direction for your administration that torture is unacceptable. But for that leadership to have a lasting impact on the direction of our country, beyond your administration, you must act to ensure that Americans learn the right lessons from our past. We urge you to make clear in no uncertain terms that you expect CIA Director John Brennan to support an expansive declassification of the report and an honest reckoning with its findings.
  •  
    Signed by a whole bunch of retired generals and admirals. 
5More

U.S. halts missile transfer requested by Israel - Diplomacy and Defense Israel News | H... - 0 views

  • The White House has instructed the Pentagon and the U.S. military to put on hold a transfer of Hellfire missiles that Israel had requested during its recent operation in the Gaza Strip, the Wall Street Journal reports. According to the report, during Israel's Operation Protective Edge, White House officials were dismayed to discover how little influence they wield over the topic of Israeli arms shipments, against the backdrop of the U.S. government's unhappiness with the widespread damage inflicted upon Palestinian civilians. During the Gaza war, the report said, White House officials came to realize that large amounts of weaponry are being passed to Israel via direct channels to the Pentagon, with little oversight by the political arena.
  • In light of that, and against the backdrop of American displeasure over IDF tactics used in the Gaza fighting and the high number of civilian casualties caused by Israel's massive use of artillery fire rather than more precise weapons, officials in the White House and the State Department are now demanding to review every Israeli request for American arms individually, rather than let them move relatively unchecked through a direct military-to-military channel, a fact that slows down the process. According to a senior U.S. official, the decision to tighten oversight and require approval of higher-ranking officials over shipments, was intended to make clear to Israel that there is no "blank check" from Washington in regards to the U.S.-made weapons the IDF makes use of in its Gaza operations.
  • The United States is Israel's strongest friend, a senior official in the Obama administration told the Wall Street Journal, but "[t]he notion that they are playing the United States, or that they're manipulating us publicly, completely miscalculates their place in the world." Senior U.S. officials did not mince words when discussing what they called the "reckless and untrustworthy" conduct of Netanyahu and his advisors during the Gaza operation, the Wall Street Journal reported, and American officials quoted in the report described a recent telephone conversation between Prime Minister Benjamin Netanyahu and U.S. President Barack Obama as "particularly combative." Israeli officials, on the other hand, told the paper that in light of the backing he received from congress, Netanyahu remains unworried by talk of a crisis in relations with the White House, and is mindful of the fact Obama's tenure will be over in two and a half years.
  • ...1 more annotation...
  • The officials said Netanyahu, having pushed the U.S. government aside, now seeks to receive security-related assurances in exchange for the signing of a long-term cease-fire agreement in the Gaza Strip. "The allegations are unfounded," Israel's ambassador to the U.S. Ron Dermer was quoted as saying by the WSJ, in response to the Wall Street Journal's description of a "fraying of relations" between the two nations' leaders. "Israel deeply appreciates the support we have received during the recent conflict in Gaza from both the Obama administration and the Congress for Israel's right to defend itself and for increased funding of Iron Dome."
  •  
    Original in-depth report by Wall St. Journal is here, http://online.wsj.com/articles/u-s-sway-over-israel-on-gaza-at-a-low-1407979365 (no paywall). Kudos to Obama-Kerry on this one. Now if we could just get the kind of sanctions on Israel that we have on Iran ...
12More

Congress Is Irrelevant on Mass Surveillance. Here's What Matters Instead. - The Intercept - 0 views

  • The “USA Freedom Act”—the proponents of which were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill. The “debate” among the Senators that preceded the vote was darkly funny and deeply boring, in equal measure. The black humor was due to the way one GOP senator after the next—led by ranking intelligence committee member Saxby Chambliss of Georgia (pictured above)—stood up and literally screeched about 9/11 and ISIS over and over and over, and then sat down as though they had made a point.
  • So the pro-NSA Republican senators were actually arguing that if the NSA were no longer allowed to bulk-collect the communication records of Americans inside the U.S., then ISIS would kill you and your kids. But because they were speaking in an empty chamber and only to their warped and insulated D.C. circles and sycophantic aides, there was nobody there to cackle contemptuously or tell them how self-evidently moronic it all was. So they kept their Serious Faces on like they were doing The Nation’s Serious Business, even though what was coming out of their mouths sounded like the demented ramblings of a paranoid End is Nigh cult. The boredom of this spectacle was simply due to the fact that this has been seen so many times before—in fact, every time in the post-9/11 era that the U.S. Congress pretends publicly to debate some kind of foreign policy or civil liberties bill. Just enough members stand up to scream “9/11″ and “terrorism” over and over until the bill vesting new powers is passed or the bill protecting civil liberties is defeated.
  • Eight years ago, when this tawdry ritual was still a bit surprising to me, I live-blogged the 2006 debate over passage of the Military Commissions Act, which, with bipartisan support, literally abolished habeas corpus rights established by the Magna Carta by sanctioning detention without charges or trial. (My favorite episode there was when GOP Sen. Arlen Specter warned that “what the bill seeks to do is set back basic rights by some nine hundred years,” and then voted in favor of its enactment.) In my state of naive disbelief, as one senator after the next thundered about the “message we are sending” to “the terrorists,” I wrote: “The quality of the ‘debate’ on the Senate floor is so shockingly (though appropriately) low and devoid of substance that it is hard to watch.” So watching last night’s Senate debate was like watching a repeat of some hideously shallow TV show. The only new aspect was that the aging Al Qaeda villain has been rather ruthlessly replaced by the show’s producers with the younger, sleeker ISIS model. Showing no gratitude at all for the years of value it provided these senators, they ignored the veteran terror group almost completely in favor of its new replacement. And they proceeded to save a domestic surveillance program clearly unpopular among those they pretend to represent.
  • ...8 more annotations...
  • Ever since the Snowden reporting began and public opinion (in both the U.S. and globally) began radically changing, the White House’s strategy has been obvious. It’s vintage Obama: Enact something that is called “reform”—so that he can give a pretty speech telling the world that he heard and responded to their concerns—but that in actuality changes almost nothing, thus strengthening the very system he can pretend he “changed.” That’s the same tactic as Silicon Valley, which also supported this bill: Be able to point to something called “reform” so they can trick hundreds of millions of current and future users around the world into believing that their communications are now safe if they use Facebook, Google, Skype and the rest. In pretty much every interview I’ve done over the last year, I’ve been asked why there haven’t been significant changes from all the disclosures. I vehemently disagree with the premise of the question, which equates “U.S. legislative changes” with “meaningful changes.” But it has been clear from the start that U.S. legislation is not going to impose meaningful limitations on the NSA’s powers of mass surveillance, at least not fundamentally. Those limitations are going to come from—are now coming from —very different places:
  • All of that illustrates what is, to me, the most important point from all of this: the last place one should look to impose limits on the powers of the U.S. government is . . . the U.S. government. Governments don’t walk around trying to figure out how to limit their own power, and that’s particularly true of empires. The entire system in D.C. is designed at its core to prevent real reform. This Congress is not going to enact anything resembling fundamental limits on the NSA’s powers of mass surveillance. Even if it somehow did, this White House would never sign it. Even if all that miraculously happened, the fact that the U.S. intelligence community and National Security State operates with no limits and no oversight means they’d easily co-opt the entire reform process. That’s what happened after the eavesdropping scandals of the mid-1970s led to the establishment of congressional intelligence committees and a special FISA “oversight” court—the committees were instantly captured by putting in charge supreme servants of the intelligence community like Senators Dianne Feinstein and Chambliss, and Congressmen Mike Rogers and “Dutch” Ruppersberger, while the court quickly became a rubber stamp with subservient judges who operate in total secrecy.
  • There is a real question about whether the defeat of this bill is good, bad, or irrelevant. To begin with, it sought to change only one small sliver of NSA mass surveillance (domestic bulk collection of phone records under section 215 of the Patriot Act) while leaving completely unchanged the primary means of NSA mass surveillance, which takes place under section 702 of the FISA Amendments Act, based on the lovely and quintessentially American theory that all that matters are the privacy rights of Americans (and not the 95 percent of the planet called “non-Americans”). There were some mildly positive provisions in the USA Freedom Act: the placement of “public advocates” at the FISA court to contest the claims of the government; the prohibition on the NSA holding Americans’ phone records, requiring instead that they obtain FISA court approval before seeking specific records from the telecoms (which already hold those records for at least 18 months); and reducing the agency’s “contact chaining” analysis from three hops to two. One could reasonably argue (as the ACLU and EFF did) that, though woefully inadequate, the bill was a net-positive as a first step toward real reform, but one could also reasonably argue, as Marcy Wheeler has with characteristic insight, that the bill is so larded with ambiguities and fundamental inadequacies that it would forestall better options and advocates for real reform should thus root for its defeat.
  • 1) Individuals refusing to use internet services that compromise their privacy.
  • 2) Other countries taking action against U.S. hegemony over the internet.
  • 4) Greater individual demand for, and use of, encryption.
  • 3) U.S. court proceedings.
  • The “USA Freedom Act”—which its proponents were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill.
  •  
    Glenn Greenwald on why the death of the USA Freedom Act is actually a Very Good Thing. I couldn't agree more.
19More

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
3More

White House Considers Punishment for Netanyahu's Upcoming US Speech - International Mid... - 0 views

  • As a reaction to the highly unanticipated speech of Israeli Prime Minister Benjamin Netanyahu to Congress, next month, the White House is reportedly planning a series of procedures in reaction to the unwelcome visit.
  • A source in the White House reported to the Associated Press that one of the possible procedures being considered is a boycott of the pro-Israel lobby, AIPAC, which is holding its annual meeting while Netanyahu is in Washington. The procedures, PNN reports, could also involve a presidential interview with a prominent journalist known for coverage of the rift between Obama and Netanyahu, and multiple Sunday show television appearances by senior national security officials to talk about the US stance on Iran's nuclear program. The White House is also considering stiff strategies, including dispatching Cabinet members out of the country and sending a lower-ranking official to represent the administration at the annual policy conference of the American Israel Public Affairs Committee.
  • Netanyahu's plan for a March 3 address to a joint meeting of Congress has further strained already tense ties between the US and Israel. Congressional Republicans orchestrated Netanyahu's visit without consulting the White House or State Department, a move the Obama administration blasted as a break in diplomatic protocol. Some Democratic lawmakers say they will boycott the speech.
6More

In Report to UN Committee Against Torture, US Government Touts Division That Doesn't Re... - 0 views

  • The United States government submitted its “periodic report” to the United Nations Committee Against Torture. There are multiple glaring aspects of the government’s report on how it believes it is complying fully with the Convention Against Torture (CAT), however, one part of the report where the government claims to have done what it was supposed to do to investigate torture stands out. In particular, the government highlights a Justice Department division as a challenge to impunity for torture, which appears to have prosecuted zero public cases of torture against US officials. To those unfamiliar, countries which are signatories to the CAT are expected to submit reports every four years to the committee. The committee reviews the report and then issues its own “concluding observations” with concerns and recommendations to the “State party.”
  • One of the committee’s “observations” in its 2006 report involved “reliable reports of acts of torture or cruel, inhuman and degrading treatment or punishment committed by certain members of the State party’s military or civilians personnel in Afghanistan and Iraq.” It was also “concerned that the investigation and prosecution of many of these cases, including some resulting in the death of detainees,” had “led to lenient sentences, including of an administrative nature or less than one year’s imprisonment.” The committee requested that the US government explain the following in its report: (a) Steps taken to ensure that all forms of torture and ill-treatment of detainees by its military or civilian personnel, in any territory under its de facto and de jure jurisdiction, as well as in any other place under its effective control, is promptly, impartially and thoroughly investigated, and that all those responsible, including senior military and civilian officials authorizing, acquiescing or consenting in any way to such acts committed by their subordinates are prosecuted and appropriately punished, in accordance with the seriousness of the crime (para. 26). Are all suspects in prima facie cases of torture and ill-treatment as a rule suspended or reassigned during the process of investigation?
  • The government answered [PDF], “US law provides jurisdiction in a number of ways that could be relied on for criminal prosecution of torture and ill-treatment of detainees” and some examples. One could read this as, theoretically, if the US government wanted to prosecute US officials involved in torture, this is what is available in US law to do just that.
  • ...3 more annotations...
  • Later, the government adds: …In March 2010, the [Justice Department] announced the merger of two Criminal Division components that were responsible for investigating and prosecuting various types of human rights violations. The creation of the new component, the Human Rights and Special Prosecutions Section (HRSP), underscores the commitment of United States authorities to end impunity for torturers and other human rights violators. HRSP and other DOJ components have prosecuted U.S. military and civilian personnel who have perpetrated human rights violations outside the United States… Although the government acknowledges the merger was “intended to enhance the government’s effectiveness in pursuing violators and denying them safe haven in the United States,” the detail is being provided within the context of what the US government is doing to prosecute US military and civilian personnel, who are implicated in acts of torture.
  • The Human Rights and Special Prosecutions section does not prosecute US officials involved in torture or human rights abuses.
  • What it has not prosecuted recently—Or, more importantly, what it has not publicly pursued is accountability for officials involved in torture in war zones like Afghanistan or Iraq. It has not sought to hold former Bush administration officials accountable for their role in torture in war zones or in secret detention facilities, where CIA interrogators operated either. The UN Committee Against Torture should not be misled. The HRSP has nothing to do with challenging the impunity US military and civilian personnel currently enjoy when it comes to torture. And, more than likely, it may never hold any current or former high-ranking officials accountable.
3More

Moscow behind possible peaceful Solution for Syria War | nsnbc international - 0 views

  • Recent talks with the Syrian government and opposition resulted in the first adoption of a joint agreement between the government and the opposition, prompting UN Special Envoy for Syria, Staffan de Mistura to stress that the international community should pay more attention to Moscow’s efforts.  Speaking to the British The Independent, de Mistura said that it is time for the world to listen more closely to Russia with regard to Moscow’s effort to broker a peaceful resolution to the four-year-long conflict that has cost more than 210,000 lives and caused an unprecedented rise in Islamist terrorism.
  • De Mistura stressed the long-standing ties between Damascus and Moscow and added that Russia cannot manage to bring about a peaceful resolution without the help of others. Last week Moscow hosted talks between representatives of the Syrian government and the opposition, including the first direct talks. The head of the Syrian government’s delegation and Syrian UN Envoy Dr. Bashar al-Jaafari described the outcome of the talks as positive and confirmed the adoption of a joint document entitled “An Assessment of the Situation in Syria”. The talks were facilitated by Vitaly Naumkin who is the Director of the Institute of Oriental Studies at the Russian Academy of Sciences.  Naumkin stressed that it was the first time that the two sides managed to unanimously adopt a document of political character, reports the Russian Tass news agency. The document reportedly contains provisions on resolving the Syrian crisis based on the principles of the June 30, 2012 Geneva Communique and the UN Security Council’s resolution on the fight against terrorism. It envisions the lifting of all restrictive economic measures against Syria and the international community’s assistance in repatriating refugees.
  • It also stipulates that the inter-Syrian dialog must be conducted without foreign interference, stressing that this would be the only way to resolve the crisis peacefully. Both the Syrian government, Syrian political parties and civil society organizations have repeatedly stressed that everybody who renounces violence and vouches for the territorial integrity of Syria is welcome to participate in Syria’s political discourse, constitutionally, and on equal terms with others. Last week the head of the foreign-based opposition, Qadri Jamil, said that the opposition would apply to the UN to arrange a Geneva III conference to continue the work toward a peaceful settlement. Both the “opposition” as well as the government and Syrian self-defense forces have increasingly been pressed by the advance of ISIS. Meanwhile, the United States is preparing its “train and equip” program in Turkey which will work towards launching more so-called “moderate rebels” into Syria. In 2014 some 5,000 of these “moderate rebels” would join the ranks of the Islamic State.
4More

Now Congress Is Fast-Tracking the TPP Fast Track | The Nation - 0 views

  • After months of back-room negotiations, key congressional negotiators are finally ready to unveil legislation that would fast-track approval for the Trans-Pacific Partnership. The bill would prohibit Congress from amending the trade deal, and would require a simple-majority vote for passage, but would in exchange set a variety of negotiating parameters. If the architects of the legislation—Senators Ron Wyden and Orrin Hatch and Representative Paul Ryan—are at all worried that members of Congress will feel fast-track leaves them out of the process, they are doing a pretty terrible job of addressing those concerns. A Senate Finance Committee hearing Thursday morning featured top US trade officials—but occurred before the legislation was even unveiled, and was called with almost no notice. This drew some unusual and strong rebukes from Democrats on the Finance Committee over an unfair process.
  • Hatch and Wyden, the chairman and ranking member of Senate Finance respectively, called hearing on Wednesday night that was ostensibly about “Congress and US Tariff Policy.” It featured several top US officials that deal with trade: US Trade Representative Michael Froman, Agriculture Secretary Tom Vilsack, and Treasury Secretary Jack Lew. Hatch announced at the top of the hearing that fast-track legislation could come as early as the afternoon, and both he and Wyden began their opening statements by talking about the looming bill. Members of the committee thus suddenly found themselves in a fast-track hearing without knowing it—and before they saw the legislation. Many of them didn’t like it. Senator Chuck Schumer, likely to be the next Democratic majority leader, opposes fast-track and objecting in the hearing to “rushing” the legislation. Senator Sherrod Brown said “We got twelve hours notice on a bill we haven’t seen…you can’t fast-track fast track.”
  • Senators appeared unsure if they would even get to see the legislation before a vote. Senator Debbie Stabenow asked if the committee would have to vote “on an agreement that we have not yet even seen and that hasn’t been reached,” according to the Huffington Post.
  • ...1 more annotation...
  • As the hearing was going on, six Democratic members of the committee took the unusual step of issuing a joint statement objecting to the hearing they were sitting in on: “With millions of jobs on the line, American workers and manufacturers deserve more than a hastily scheduled hearing without an underlying bill. Congress should undergo a thorough and deliberative committee process for debating trade agreements that account for 40 percent of our world’s GDP. And we should be debating a bill that has seen the light of day and contains strong provisions to protect American workers against illegal trade practices like currency manipulation.” Schumer, Brown and Stabenow, along with Senators Robert Menendez, Ben Cardin and Bob Casey attached their names to the statement.
5More

EEU considers launching a Currency Union: Putin | nsnbc international - 0 views

  • The Eurasian Economic Union (EEU) is considering the launch of a currency union within the 170 million inner market that was launched in January 2015. The Presidents of the EEU member States agreed to continue their work at coordinating the Union’s monetary policy.  After meetings with the Presidents of Belarus and Kazakhstan in Astana, Russian President Vladimir Putin told the press that the EEU member States are discussing the establishment of a currency union and continue coordinating monetary policy, reports the Belarus news agency BelTa. The news agency quotes Putin as saying:
  • Putin described talks with Belarus President Alexander Lukashenko and Kazakhstan’s President Nursultan Nazarbayev in Astana on March 20 as “very intensive and informative”. President Nursultan Nazarbayev is widely regarded as the intellectual mastermind of a post-Soviet Union political and economic integration. The three heads of State reportedly discussed a wide range of issues about Belarus, Kazakhstan and Russia. The aggregate GDP of the troika amounts, according to BelTa, to 85% of the GDP of the CIS with Russia ranking first, followed by Belarus and Kazakhstan on a shared second place. The establishment of the EEU in January and discussions about the establishment of a currency union come against the backdrop of a series of US, UK, EU, G7 sanctions against Russia over the situation in Ukraine, with Germany, France, Czech Republic, Slovakia and some other European nations being reluctant about obstructing European – Russian relations. Especially strong French and German lobbies would rather see a closer cooperation between the EU and the EEU than a predominantly US/UK dominated policy of tensions that aims at maintaining an US/UK hegemony in Europe and a global dollar-dominated economy.
  • “We think that the time has come to talk forming a currency union in the future. … It is easier to protect the common financial market when working shoulder by shoulder”.
  • ...1 more annotation...
  • Many US and British economists perceive an integration of EEU and EU markets as the single-most serious threat against the (f)ailing primacy of the US dollar and the hegemony of the “Atlantic Axis” in Europe.
  •  
    More de-dollarization moves on the way.  Armenia and Kyrgyzstan are expected to join the EEU soon. https://en.wikipedia.org/wiki/Eurasian_Economic_Union "CIS" stands for the Commonwealth of Independent States, which includes 9 memer states that are former Soviet Republics. Commonwealth of Independent States Eight of them form the Commonwealth of Independent States Free Trade Area. https://en.wikipedia.org/wiki/Commonwealth_of_Independent_States_Free_Trade_Area  
3More

Ten years on, Iraq Lies in Ruins as New Evidence confirms U.S. used Death Squads to Man... - 0 views

  • Last week, the UK Guardian newspaper published the results of a 15-month investigation by the Guardian and BBC Arabic. Euphemistically titled ‘James Steele: America’s mystery man in Iraq‘, the video report presents fairly damning evidence that, in the immediate aftermath of the US invasion of Iraq, the US Government and military began to assemble a 10,000 strong ‘Shia militia’ that, under US command, would be used to do three things: Kidnap, torture, murder and maim members of the Iraq resistance and those members of the Iraqi population that supported them. Plants bombs that targeted predominantly Sunni and Shia areas in an effort to divide the population and thereby any unified resistance to the US occupation. Create the impression of a ‘civil war’ in Iraq that could be used by the US and European governments and militaries to justify the continued occupation of Iraq for ‘peace-keeping’ purposes. While the 50 minute documentary is proof enough that Rumsfeld, Cheney, General Petraeus, and all the other NeoCon warhawks and CIA monsters consciously employed the services of former US Army Colonel James Steele in the organisation of death squads against the Iraqi grass-roots resistance (a tactic that he, Steele, had used against resistance movements in South America in the 1970s and 90′s), it panders to the official narrative that ‘sectarianism’ in Iraq was the root cause of the carnage that unfolded.
  • The so-called ‘Shia militia’ used by the American government (with the help and advice of British and Israeli counter-insurgency ‘experts’) were recruited directly by the CIA and people like James Steele to carry out extra-judicial murders of anyone they could loosely identify as ‘resistance’. In order to cloak this strategy, indiscriminate attacks on Iraqi civilians, Shia and Sunni alike, were carried out on a massive scale. Some of these individuals, in another setting, would be called ‘al-Qaeda’. Their usefulness in the employ of US warhawks in the Pentagon was doubly valuable because they both justified continued US occupation and provided ‘proof’ for the American War on Terror mythology, ex post facto, that the US was at war with the perpetrators of 9/11. Whereas before the invasion in 2003 there was absolutely nothing to link 9/11 to Saddam Hussein’s Iraq, the creation of death squads (real) labelled ‘al Qaeda in Iraq’ (fictitious) ‘made real’ the lie that America and all Western civilization was at war against hordes of irrational and violent Muslims, and became the template for instigating terrorism to suppress popular uprisings in Yemen, Mali and elsewhere. Once they have people violent, they can wear down and manage the national popular resistance, ensuring no opposition to the real strategic objectives (namely the control of Middle Eastern oil). The US forces of occupation, along with their British counterparts, had long experience in what actually happens when you militarily invade and occupy a sovereign nation: the people resist, and not just one ethnic or religious group, but more or less the whole population. There is nothing quite like a foreign occupation for uniting a country.
  • In Iraq, these US-controlled ‘Shia’ death squads have been operating in much the same way, and while the media is content to portray them as ordinary Shias motivated by religious bias, they are in fact hired thugs who value only the money they are paid by their US masters and the promise of positions of power in a future Iraqi government. Like the rank and file of the ‘Libyan rebels’ and the ‘Free Syrian Army’, these people form the dregs of Arab and Middle Eastern societies. Led by spellbinders who veil their barbaric actions with religious prose, secular leaders in the region, like Ghaddafi and Assad, and Nasser and Arafat before them, struggled in vain to keep them at bay. The reason for this is because the US, Britain, France and Israel have consistently supported – in the form of weapons, money, training and blatant lies – the extremists against the rational voices. Throughout the US occupation of Iraq, the main representative of Shias in Iraq, Muqtada al-Sadr, has repeatedly called for unity among Shia and Sunni Iraqis in the face of foreign occupation and deception in the form of efforts to divide the resistance. These efforts included the bombing of bridges in Baghdad and other Iraqi cities in an effort to prevent communication between Iraqis, the use of widespread terror tactics to force Sunni and Shia Iraqis to flee their homes, and the bombing of religious shrines, either Shia or Sunni, in an effort to create the reality of ‘sectarian strife’. Iraq today is in ruins. The country has been ripped apart socially, mainly by way of the literal ripping apart of tens of thousands of civilians, with many being first brutally and systematically tortured by US-sponsored death squads. Hundreds of thousands more have been summarily murdered, either by the bombs of US aircraft, the bullets of US soldiers, or those ubiquitous and very effective ‘car bombs‘ planted by US and British operatives and their hired thugs.
1More

Lawmakers ask agencies to reveal use of phone surveillance technology | TheHill - 0 views

  • Lawmakers on the House Oversight Committee sent letters Monday to the heads of 24 federal agencies seeking answers about the use of a controversial surveillance technology.The devices, known by the brand name “StingRay,” simulate a cell phone tower and are able to collect information on mobile phones and their users. Lawmakers say they are trying to create a comprehensive record of how different federal agencies use the devices. The scrutiny comes after the Department of Justice and the Department of Homeland Security adopted new policies for how their employees may deploy the technology.ADVERTISEMENT“As it was with DOJ and DHS before those agencies issued department-wide policies governing use of the devices, the Committee is concerned that other federal agencies may be governed by a patchwork of policies,” the letters said. “Those policies may permit the use of cell-site simulators devices through a lower standard than a search warrant obtained after a showing probable cause."The letters, signed by Oversight Chairman Jason Chaffetz (R-Utah) and ranking member Elijah Cummings (D-Md.) as well as Rep. Will Hurd (R-Texas) and Rep. Robin Kelly (D-Ill.), were sent to 24 federal agencies in total, including many not traditionally viewed as having law enforcement functions, like the Social Security Administration and the National Science Foundation.Lawmakers have asked the agencies for documents and information related to their potential use of the devices.
12More

Do We Really Want a New World War With Russia? | New Eastern Outlook - 0 views

  • Washington continues making an international fool of herself by her inability to effectively counter the impression around the world that Russia, spending less than 10% of the Pentagon annually on defense, has managed to do more against ISIS in Syria in six weeks than the mighty US Air Force bombing campaign has done in almost a year and half. One aspect that bears attention is the demonstration by the Russian military of new technologies that belie the widely-held Western notion that Russia is little more than a backward oil and raw material commodity exporter. Recent reorganization of the Russian state military industrial complex as well as reorganization of the Soviet-era armed forces under Defense Minister Sergey Shoigu’s term are visible in the success so far of Russia’s ISIS and other terror strikes across Syria. Clearly Russian military capabilities have undergone a sea-change since the Soviet Cold War era. In war there are never winners. Yet Russia has been in an unwanted war with Washington de facto since the George W. Bush Administration announced its lunatic plan to place what they euphemistically term “Ballistic Missile Defense” missiles and advanced radar in Poland, Czech Republic, Romania and Turkey after 2007. Without going into detail, BMD technologies are the opposite of defensive. They instead make a pre-emptive war highly likely. Of course the radioactive ash heap in such an exchange would be first and foremost the EU countries foolish enough to invite US BMD to their soil.
  • What the Russian General Staff has managed, since the precision air campaign began September 30, has stunned western defense planners with Russian technological feats not expected. Two specific technologies are worth looking at more closely: The Russian Sukoi SU-34 fighter-bomber and what is called the Bumblebee hyperbaric mortar weapon.
  • The plane responsible for some of the most damaging strikes on ISIS and other terror enclaves in Syria is manufactured by the Russian state aircraft industry under the name Sukhoi SU-34. As the Russian news agency RIA Novosti described the aircraft, “The Su-34 is meant to deliver a sufficiently large ordnance load to a predetermined area, hit the target accurately and take evasive action against pursuing enemy planes.” The plane is also designed to deal with enemy fighters in aerial combat such as the US F-16. The SU-34 made a first test flight in 1990 as the collapse of the Soviet Union and the chaos of the Yeltsin years caused many delays. Finally in 2010 the plane was in full production. According to a report in US Defense Industry Daily, among the SU-34 features are: • 8 ton ordnance load which can accommodate precision-guided weapons, as well as R-73/AA-11 Archer and R-77/AA-12 ‘AMRAAMSKI’ missiles and an internal 30mm GSh-301 gun. • Maximum speed of Mach 1.8 at altitude.
  • ...8 more annotations...
  • • 3,000 km range, extensible to “over 4,000 km” with the help of additional drop tanks. The SU-34 can also refuel in mid-air. • It can fly in TERCOM (Terrain Contour Matching) mode for low-level flight, and has software to execute a number of difficult maneuvers. • Leninets B004 phased array multimode X-band radar, which interleaves terrain-following radar and other modes.
  • Clearly the aircraft is impressive as it has demonstrated against terrorist centers in Syria. Now, however, beginning this month it will add a “game-changer” in the form of a new component. Speaking at the Dubai Air Show on November 12, Igor Nasenkov, the First Deputy General Director of the Radio-Electronic Technologies Concern (KRET) announced that this month, that is in the next few days, SUKHOI SU-34 fighter-bombers will become electronic warfare aircraft as well. Nasenkov explained that the new Khibiny aircraft electronic countermeasures (ECM) systems, installed on the wingtips, will give the SU-34 jets electronic warfare capabilities to launch effective electronic countermeasures against radar systems, anti-aircraft missile systems and airborne early warning and control aircraft. KRET is a holding or group of some 95 Russian state electronic companies formed in 2009 under the giant Russian state military industry holding, Rostec.
  • Russia’s advances in what is euphemistically termed in military jargon, Electronic Counter Measures or ECM, is causing some sleepless nights for the US Pentagon top brass to be sure. In the battles in eastern pro-Russian Ukraine earlier this year, as well as in the Black Sea, and now in Syria, according to ranking US military sources, Russia deployed highly-effective ECM technologies like the Krasukha-4, to successfully jam hostile radar and aircraft. Lt. General Ben Hodges, Commander of US Army Europe (USAREUR) describes Russian ECM capabilities used in Ukraine as “eye-watering,” suggesting some US and NATO officers are more than slightly disturbed by what they see. Ronald Pontius, deputy to Army Cyber Command’s chief, Lt. Gen. Edward Cardon, told a conference in October that, “You can’t but come to the conclusion that we’re not making progress at the pace the threat demands.” In short, Pentagon planners have been caught flat-footed for all the trillions of wasted US taxpayer dollars in recent years thrown at the military industry.
  • During the critical days of the March 2014 Crimean citizens’ referendum vote to appeal for status within Russia, New York Times reporters then in Crimea reported the presence of Russian electronic jamming systems, known as R-330Zh Zhitel, manufactured by Protek in Voronezh, Russia. That state-of-the-art technology was believed to have been used to prevent the Ukrainian Army from invading Crimea before the referendum. Russian forces in Crimea, where Russia had a legal basing agreement with Kiev, reportedly were able to block all communication of Kiev military forces, preventing a Crimean bloodbath. Washington was stunned.
  • Thereafter, in April, 2014, one month after the accession of Crimea into the Russian Federation, President Obama ordered the USS Donald Cook into the Black Sea waters just off Crimea, the home port of Russia’s Black Sea Fleet, to “reassure” EU states of US resolve. Donald Cook was no ordinary guided missile destroyer. It had been refitted to be one of four ships as part of Washington’s Aegis Ballistic Missile Defense System aimed at Russia’s nuclear arsenal. USS Donald Cook boldly entered the Black Sea on April 8 heading to Russian territorial waters. On April 12, just four days later, the US ship inexplicably left the area of the Crimean waters of the Black Sea for a port in NATO-member Romania. From there it left the Black Sea entirely. A report on April 30, 2014 in Russian newspaper Rossiyskaya Gazeta Online titled, “What Frightened the American Destroyer,” stated that while the USS Donald Cook was near Crimean (Russian by that time) waters, a Russian Su-24 Frontal Aviation bomber conducted a flyby of the destroyer. The Rossiyskaya Gazeta went on to write that the Russian SU-24 “did not have bombs or missiles onboard. One canister with the Khibin electronic warfare complex was suspended under the fuselage.” As it got close to the US destroyer, the Khibins turned off the USS Donald Cook’s “radar, combat control circuits, and data transmission system – in short, they turned off the entire Aegis just like we turn off a television by pressing the button on the control panel. After this, the Su-24 simulated a missile launch at the blind and deaf ship. Later, it happened once again, and again – a total of 12 times.”
  • While the US Army denied the incident as Russian propaganda, the fact is that USS Donald Cook never approached Russian Black Sea waters again. Nor did NATO ships that replaced it in the Black Sea. A report in 2015 by the US Army’s Foreign Military Studies Office assessed that Russia, “does indeed possess a growing EW capability, and the political and military leadership understand the importance…Their growing ability to blind or disrupt digital communications might help level the playing field when fighting against a superior conventional foe.” Now new Russian Khibini Electronic Counter Measure systems are being installed on the wingtips of Russia’s SUKHOI SU-34 fighter-bombers going after ISIS in Syria.
  • A second highly-advanced new Russian military technology that’s raising more than eyebrows in US Defense Secretary ‘Ash’ Carter’s Pentagon is Russia’s new Bumblebee which Russia’s military classifies as a flamethrower. In reality it is a highly advanced thermobaric weapon which launches a warhead that uses a combination of an explosive charge and highly combustible fuel. When the rocket reaches the target, the fuel is dispersed in a cloud that is then detonated by the explosive charge. US Military experts recently asked by the US scientific and engineering magazine Popular Mechanics to evaluate the Bumblebee stated that, “the resulting explosion is devastating, radiating a shockwave and fireball up to six or seven meters in diameter.” The US experts noted that the Bumblebee is “especially useful against troops in bunkers, trenches, and even armored vehicles, as the dispersing gas can enter small spaces and allow the fireball to expand inside. Thermobarics are particularly devastating to buildings — a thermobaric round entering a structure can literally blow up the building from within with overpressure.”
  • We don’t go into yet another new highly secret Russian military technology recently subject of a Russian TV report beyond a brief mention, as little is known. It is indicative of what is being developed as Russia prepares for the unthinkable from Washington. The “Ocean Multipurpose System: Status-6” is a new Russian nuclear submarine weapons system designed to bypass NATO radars and any existing missile defense systems, while causing heavy damage to “important economic facilities” along the enemy’s coastal regions. Reportedly the Status-6 will cause what the Russian military terms, “assured unacceptable damage” to an adversary force. They state that its detonation “in the area of the enemy coast” (say, New York or Boston or Washington?) would result in “extensive zones of radioactive contamination” that would ensure that the region would not be used for “military, economic, business or other activity for a long time.” Status-6 reportedly is a massive torpedo, designated as a “self-propelled underwater vehicle.” It has a range of up to 10 thousand kilometers and can operate at a depth of up to 1,000 meters. At a November 10 meeting with the Russian military chiefs, Vladimir Putin stated that Russia would counter NATO’s US-led missile shield program through “new strike systems capable of penetrating any missile defenses.” Presumably he was referring to Status-6.
  •  
    Not to mentiont that Russia has deployed its S-400 surface to air defense system to Syria, which is 2 generations later than the currently deployed U.S. Patriot systems. The S-400 can knock down aircraft or missiles flying up to 90,000 feet and travels at over 17,000 mph, very near Earth escape velocity. It has a lateral range of nearly 300 miles.
5More

Links between Turkey and ISIS are now 'undeniable' | Global Research - Centre for Resea... - 0 views

  • A US-led raid on the compound housing the Islamic State’s ‘chief financial officer’ produced evidence that Turkish officials directly dealt with ranking ISIS members, Martin Chulov ofthe Guardian reported recently. Islamic State official Abu Sayyaf was responsible for directing the terror army’s oil and gas operations in Syria. Islamic State (aka ISIS, ISIL, or Daesh) earns up to $US10 million per month selling oil on black markets. Documents and flash drives seized during the Sayyaf raid reportedly revealed links “so clear” and “undeniable” between Turkey and ISIS “that they could end up having profound policy implications for the relationship between us and Ankara,” a senior western official familiar with the captured intelligence told the Guardian. NATO member Turkey has long been accused by experts, Kurds, and even Joe Biden of enabling ISIS by turning a blind eye to the vast smuggling networks of weapons and fighters during the ongoing Syrian war.
  • The move by the ruling AKP party was apparently part of ongoing attempts to trigger the downfall of Syrian President Bashar al-Assad’s regime. Ankara officially ended its loose border policy last year, but not before its southern frontier became a transit point for cheap oil, weapons, foreign fighters, and pillaged antiquities.
  • In November, a former ISIS member told Newsweek that the group was essentially given free reign by Turkey’s army. “ISIS commanders told us to fear nothing at all because there was full cooperation with the Turks,” the fighter said. “ISIS saw the Turkish army as its ally especially when it came to attacking the Kurds in Syria.” But as the alleged arrangements progressed, Turkey allowed the group to establish a major presence within the country — and created a huge problem for itself. “The longer this has persisted, the more difficult it has become for the Turks to crack down [on ISIS] because there is the risk of a counter strike, of blowback,” Jonathan Schanzer, a former counterterrorism analyst for the US Treasury Department, explained to Business Insider in November. “You have a lot of people now that are invested in the business of extremism in Turkey,” Schanzer added. “If you start to challenge that, it raises significant questions of whether” the militants, their benefactors, and other war profiteers would tolerate the crackdown.
  • ...2 more annotations...
  • A Western diplomat, speaking to the Wall Street Journal in February, expressed a similar sentiment: “Turkey is trapped now — it created a monster and doesn’t know how to deal with it.” Ankara had begun to address the problem in earnest — arresting 500 suspected extremists over the past six months as they crossed the border and raiding the homes of others — when an ISIS-affiliated suicide bomber killed 32 activists in Turkey’s southeast on July 20. Turks subsequently took to the streets to protest the government policies they felt had enabled the attack.
  • Amidst protestors’ chants of “Murderous ISIL, collaborator AKP,” Erdogan finally agreed last Thursday to enter the US-led campaign against ISIS, sending fighter jets into Syria and granting the US strategic use of a key airbase in the southeast to launch airstrikes. At the same time, Turkey began bombing Kurdish PKK shelters and storage facilities in northern Iraq, the AP reported, indicating that the AKP still sees Kurdish advances as a major — if not the biggest — threat, despite the Kurds’ battlefield successes against ISIS in northern Syria. “This isn’t an overhaul of their thinking,” a Western official in Ankara told the Guardian. “It’s more a reaction to what they have been confronted with by the Americans and others. There is at least a recognition now that ISIS isn’t leverage against Assad. They have to be dealt with.”
10More

Mastermind of The Bamako Terror Attack Mokhtar Belmokhtar: A CIA Sponsored "Intelligenc... - 0 views

  • In response to the tragic Paris events of November 13, Central Intelligence Agency director  John Brennan  warned that “ISIL is planning additional attacks… It is clear to me that ISIL has an external agenda, that they are determined to carry out these types of attacks.” (Quoted in Daily Telegraph, November 16, 2015) Five days later following the CIA Chief’s  premonition, the Bamako Radisson Hotel Blu in Mali’s capital was the object of a terrorist attack, resulting in  21 people dead. Following the attack and the taking of hostages by the terrorists, French and Malian special forces raided the hotel. US. Africa Command (AFRICOM) also confirmed that US special forces were involved.
  • The Bamako terror operation was allegedly coordinated by Mokhtar Belmokhtar (aka Khaled Abu al-Abbas), leader of an affiliate of Al Qaeda in the Islamic Maghreb (AQIM), the Islamist al-Mulathameen (Masked) Brigade, or “Those who Sign with Blood.” Belmokhtar’s group was created in 2012 in the wake of the war on Libya. His organization has also allegedly been involved in the drug trade, smuggling as well kidnapping operations of foreigners in North Africa.  While his whereabouts are said to be known, French intelligence has dubbed Belmokhtar “the uncatchable”. In June he was reported dead  as a result in a U.S. air strike in Libya. His death was subsequently denied. Based on shaky evidence, The New York Times report below (November 20) concludes that Belmokhtar’s group (together with AQIM) is unequivocally behind the Bamako attacks:
  • A member of Al Qaeda in Africa confirmed Saturday that the attack Friday on a hotel in Bamako, Mali, had been carried out by a jihadist group loyal to Mokhtar Belmokhtar, an Algerian operative for Al Qaeda. The Qaeda member, who spoke via an online chat, said that an audio message and a similar written statement in which the group claimed responsibility for the attack were authentic. The SITE Intelligence Group, which monitors jihadist groups, also confirmed the authenticity of the statement. The Qaeda member, who refused to be named for his protection, said that Mr. Belmokhtar’s men had collaborated with the Saharan Emirate of Al Qaeda in the Islamic Maghreb, … In the audio recording, the group, known as Al Mourabitoun, says it carried out the operation in conjunction with Al Qaeda’s branch in the Islamic Maghreb. The recording was released to the Al Jazeera network and simultaneously to Al Akhbar, … The recording states: “We, in the group of the Mourabitoun [Arabic Rebel Group], in cooperation with our brothers in Al Qaeda in Islamic Maghreb, the great desert area, claim responsibility for the hostage-taking operation in the Radisson hotel in Bamako.” (emphasis added)
  • ...7 more annotations...
  • In turn, the French Minister of Defense acknowledged –prior to the conduct of a police investigation– that the authors of the attack were “most likely” led by Mokhtar Belmokhtar’s group in association with Al Qaeda in the Islamic Maghreb (AQIM). What Defense Minister Jean-Yves Le Drain failed to mention was that both Belmokhtar and AQIM have longstanding links to the CIA, which in turn has a working relationship with France’s  General Directorate for External Security, Direction générale de la sécurité extérieure (DGSE).  Casually ignored by the Western media, the leaders of Al Qaeda in the Islamic Maghreb (AQIM) including Belmokhtar were trained and recruited by the CIA in Afghanistan. Acknowledged by the Washington based Council on Foreign Relations (CFR): Most of AQIM’s major leaders are believed to have trained in Afghanistan during the 1979-1989 war against the Soviets as part of a group of North African volunteers known as “Afghan Arabs” that returned to the region and radicalized Islamist movements in the years that followed. The group is divided into “katibas” or brigades, which are clustered into different and often independent cells. The group’s top leader, or emir, since 2004 has been  Abdelmalek Droukdel, also known as Abou Mossab Abdelwadoud, a trained engineer and explosives expert who has fought in Afghanistan and has roots with the GIA in Algeria. (Council on Foreign Relations, Al Qaeda in the Islamic Maghreb, cfr.org, undated)
  • Mokhtar Belmokhtar: Post Cold War CIA intelligence asset?  The Council on Foreign Relations erroneously describes “Mokhtar Belmokhtar as the one-eyed veteran of the anti-Soviet Afghan insurgency.” (CFR, op cit, emphasis added). Belmokhtar (born in 1972) did not fight in the Soviet-Afghan war (1979-1989). He was recruited in 1991 at the age of 19 in the immediate wake of the Cold War. CIA recruitment continued in the wake of the Cold War. It was in large part directed against the Russian Federation and the former Soviet Republics as well as the Middle East. The purpose of this later CIA recruitment was to establish a network of “intelligence assets” to be used in the CIA’s post-cold war insurgencies. Leaders of the Chechen Islamist insurgencies were also trained in CIA camps in Afghanistan and Pakistan, including the notorious leader of the Chechen insurrection Ibn al-Khattab (a citizen of Saudi Arabia).
  • Following his training and recruitment and a two year stint in Afghanistan (1991-1993), Mokhtar Belmokhtar was sent back to Algeria in 1993 at age 21 where he joined the  Salafist Group for Preaching and Combat (GSPC) (emblem left). The latter was initially part of the so-called Armed Islamic Group  (Groupe islamique armé (GIA)) in Algeria which sought to overthrow the secular Algerian Government with a view to installing a theocratic Islamic State. Supported covertly by the CIA, Belmokhtar fought in Southern Algeria in the civil war opposing Islamist forces and the secular government. He was also  instrumental in the integration and merging of “jihadist” forces. In January 2007,  the Armed islamic Group (GIA) which had been prominent in the 1990s, officially changed its name to the Al-Qaeda Organization in the Islamic Maghreb (AQIM). In turn, as of 2007, the newly formed AQIM established a close relationship with the Libya Islamic Fighting Group (LIFG), which was directly supported by NATO during the 2011 war on Libya, “providing weapons, training, special forces and even aircraft to support them in the overthrow of Libya’s government.” (Tony Cartalucci, The Geopolitical Reordering of Africa: US Covert Support to Al Qaeda in Northern Mali, France “Comes to the Rescue”, Global Research, January 2013). British SAS Special Forces had also been brought into Libya prior to the onset of the insurrection, acting as military advisers to the LIFG. In fact, what has unfolded since the war on Libya is the merging of LIFG and AQIM forces. In turn, many of the LIFG operatives have been dispatched to Syria to fight within the ranks of Al Nusrah and the ISIS.
  • It is worth noting that the 2007  restructuring  of jihadist forces in Algeria and the Maghreb coincided with  the appointment of Robert Stephen Ford as US ambassador to Algeria in August 2006. Ford had been reassigned by the State Department from Baghdad to Algiers. From 2004 to 2006, he worked closely with Ambassador John Negroponte at the US embassy in Baghdad in supporting the creation of  both Shia and Sunni death squads in Iraq. This project consisted in recruiting and training terrorists modelled on the so-called “Salvador Option” which had been applied by the CIA in Central America. Negroponte as we recall played a central role in supporting the Contras terrorists in Nicaragua as ambassador to Honduras from 1981-1985. For further details see Michel Chossudovsky, “The Salvador Option For Syria”: US-NATO Sponsored Death Squads Integrate “Opposition Forces”, Global Research,  May 28, 2012) The 2006 appointment of Robert Stephen Ford to head the US Embassy in Algeria was timely. It coincided with the consolidation of jihadist groups within Algeria and the Maghreb. It preceded the 2011 US-NATO sponsored insurrections in Libya and Syria. In 2010, Ford was approved by the US Congress as US Ambassador to Syria. He presented his credentials to president Bashar al Assad in January 2011, barely two months prior to the onslaught of the terrorist insurrection in the border city of Daraa in mid-March 2011. Ford played a central role in assisting the channelling of US and allied support to Syrian “opposition” groups including Al Nusrah and the ISIS.
  • Belmokhtar’s history and involvement in Afghanistan confirms that from the very outset he was an instrument of US intelligence. While, he operates with a certain degree of independence and autonomy in relation to his intelligence sponsors, he and his organization are bona fide CIA “intelligence assets”, which can be used by the CIA as part of a covert agenda. There are various definitions of  an “intelligence asset”. From the standpoint of US intelligence, “assets” linked up to terrorist organizations must not be aware that they are supported and monitored by Western intelligence. With regard to Al Qaeda, from the outset in 1979, the CIA chose to operate through various front organizations as well as indirectly through its Saudi, Qatari and Pakistani intelligence partners. CIA’s Milton Beardman who played a central role in the Soviet Afghan war confirms that members of Al Qaeda including Osama bin Laden were not aware of the role they were playing on behalf of Washington. In the words of bin Laden (quoted by Beardman): “neither I, nor my brothers saw evidence of American help”(Michel Chossudovsky, Who is Osama bin Laden, Global Research, September 12, 2001): Motivated by nationalism and religious fervor, the Islamic warriors were unaware that they were fighting the Soviet Army on behalf of Uncle Sam. While there were contacts at the upper levels of the intelligence hierarchy, Islamic rebel leaders in theatre had no contacts with Washington or the CIA.  (Ibid) Amply documented, Al Qaeda in the Islamic Maghreb (AQIM)and its affiliated groups including the Libya Islamic Fighting Group (LIFG) was serving the interests of the Western military alliance. Confirmed by the Washington Post, June 29, 2011 (See below), France was supplying weapons to the LIFG at the height of NATO’s bombing raids.
  • AQIM in turn was receiving weapons from the LIFG, which was supported by NATO. Moreover, LIFG mercenaries had integrated AQIM brigades. According to alleged Terror Mastermind Mokhtar Belmokhtar, who also coordinated the 2013 In Amenas Mali kidnapping operation: “We have been one of the main beneficiaries of the revolutions in the Arab world. As for our benefiting from the (Libyan) weapons, this is a natural thing in these kinds of circumstances.” http://www.hanford.gov/c.cfm/oci/ci_terrorist.cfm?dossier=174 Al Qaeda in the Islamic Maghreb (AQIM) is indelibly tied into a Western intelligence agenda. While it is described  as  ”one of the region’s wealthiest, best-armed militant groups”, financed covertly by Saudi Arabia and Qatar. France’s  Canard enchaîné revealed (June 2012) that Qatar (a staunch ally of the United States) has been funding various terrorist entities in Mali: The original report cites a French military intelligence report as indicating that Qatar has provided financial support to all three of the main armed groups in northern Mali: Iyad Ag Ghali’s Ansar Ed-Dine, al-Qa’ida in the Islamic Maghreb (AQIM) and the Movement for Unity and Jihad in West Africa (MUJWA). The amount of funding given to each of the groups is not mentioned but it mentions that repeated reports from the French DGSE to the Defense Ministry have mentioned Qatar’s support for ‘terrorism’ in northern Mali. (quoted by Jeune Afrique June 2012)
  • Qatar is a proxy state, a de facto Persian Gulf territory largely controlled by Washington. It hosts  a number of Western military and intelligence facilities. The Emir of Qatar does not finance terrorism without the consent of the CIA. And with regard to Mali, the CIA coordinates its activities in liaison with its French intelligence partners and counterparts, including la Direction du renseignement militaire (DRM) and the Direction générale de la sécurité extérieure (DGSE). The implications are obvious and should be carefully understood by Western public opinion. Inasmuch as Belmokhtar and AQIM are “intelligence assets”, both US and French intelligence are (indirectly) behind the Bamako attacks. Both US and French intelligence are complicit in the State sponsorship of terrorism.
2More

Russia warns against NATO expansion - Al Arabiya News - 0 views

  • Kremlin spokesman Dmitry Peskov warned on Wednesday that the continuing expansion of the North Atlantic Treaty Organization (NATO) to the east would lead to retaliatory measures from Russia while U.S. played down Moscow’s fears. Peskov made his statement after NATO military alliance on Wednesday invited Montenegro to join its ranks. Peskov added to journalists that the sanctions that Russia had imposed on Turkey over a downed Russian plane were different from the ones the West had imposed on Russia over the Ukraine crisis, since Russia’s sanctions on Turkey were preventative and concerned the threat of terrorism. U.S. Secretary of State John Kerry said after NATO invited Montenegro to join that the Atlantic organization is a defensive alliance and its decision to enlarge into the Balkans is not directed at Russia or any other nation. “NATO is not a threat to anyone ... it is a defensive alliance, it is simply meant to provide security,” Kerry told a news conference. “It is not focused on Russia or anyone else.” Kerry also said NATO members stand ready to step up military efforts against ISIS.
  •  
    "U.S. Secretary of State John Kerry said after NATO invited Montenegro to join that the Atlantic organization is a defensive alliance and its decision to enlarge into the Balkans is not directed at Russia or any other nation." Horse puckey.
1More

Republicans raise alarm about women in combat - POLITICO - 0 views

  • Republican skeptics may not have enough power to overturn Defense Secretary Ash Carter’s order to open all combat positions to women. But some are delivering a more subtle warning: it could lead to registering all young women in America for the draft. The Pentagon’s move on Thursday did not include any requirement that women register with the Selective Service when they turn 18, as their male counterparts are required to do — and Carter demurred when a reporter asked about it.Story Continued Below But congressional Republicans already are raising that prospect, in what appears to be an effort to point out that the Pentagon hasn’t fully grappled with the implications of its historic decision to allow women into all front-line combat jobs. It is a delicate political gamble for lawmakers who don't want to appear sexist but also insist that some misgivings about the decision within the ranks deserve more attention. “If this goes through, it’s going to be mandated that women be drafted,” said Rep. Duncan Hunter of California, a Marine Corps veteran who served in Iraq and Afghanistan — and who maintains that women should still be barred from some combat roles. “If you’re going to have women in infantry units, if a draft ever occurred, America needs to realize that its daughters and sisters would be included." “The reason you draft people,” he added, “is because you have infantrymen dying.”
11More

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
6More

Drone Strikes Are Creating Hatred Toward America That Will Last for Generations - Defen... - 0 views

  • If we want to curb terrorism in the United States, we must stop drone attacks in the Middle East.
  • It’s a sick myth that Islamic extremists attack the United States or other nations because they “hate our freedom.” They attack us for our foreign policy. In 2006, the United States National Intelligence Estimate reported that the US invasion and occupation of Iraq made the problem of terrorism worse by creating a new generation of terrorists. And since then, top ranking military and counter-terrorism authorities such as General Stanley McChrystal, General Mike Flynn and George W. Bush’s counter-terrorism czar Richard Clarke say that drone strikes in particular are creating more terrorists than they’re killing. If we want to stop terrorist attacks, we should stop the barbaric blind bombings that are fueling radicalization.
  • “The resentment created by American use of unmanned strikes … is much greater than the average American appreciates,” Gen. McChrystal, who led the US counter-insurgency strategy in Afghanistan, said in 2013. “They are hated on a visceral level, even by people who’ve never seen one or seen the effects of one.” <a href="http://ad.doubleclick.net/N617/jump/defenseone.com/section_ideas;pos=defenseone-instream;sz=600x300;" title=""> <img alt="" src="http://ad.doubleclick.net/N617/ad/defenseone.com/section_ideas;pos=defenseone-instream;sz=600x300;tile=4;"/> </a> <a href="http://ad.doubleclick.net/N617/jump/defenseone.com/section_ideas;pos=contextual-large-rectangle-tablet;sz=700x350;" title=""> <img alt="" src="http://ad.doubleclick.net/N617/ad/defenseone.com/section_ideas;pos=contextual-large-rectangle-tablet;sz=700x350;tile=5;"/> </a> <a href="http://ad.doubleclick.net/N617/jump/defenseone.com/section_ideas;pos=contextual-large-rectangle-mobile;sz=300x150;" title=""> <img alt="" src="http://ad.doubleclick.net/N617/ad/defenseone.com/section_ideas;pos=contextual-large-rectangle-mobile;sz=300x150;tile=6;"/> </a> Gen. Flynn, who until recently was the head of the Defense Intelligence Agency and has become a harsh critic of President Obama’s strategy in the Middle East, has said, “When you drop a bomb from a drone … you are going to cause more damage than you are going to cause good.” Flynn, who has actually backs a more muscular military approach, doesn’t think it should include drones. Clarke has said that when we use unmanned drones to drop bombs which, no matter how hard we try otherwise, inevitably kill innocent people: [Y]ou cause enemies for the United States that will last for generations. All of these innocent people that you kill have brothers and sisters and tribe—tribal relations. Many of them were not opposed to the United States prior to some one of their friends or relatives being killed. And then, sometimes, they cross over, not only to being opposed to the United States, but by being willing to pick up arms and become a terrorist against the United States. So you may actually be creating terrorists, rather than eliminating them,
  • ...2 more annotations...
  • In fact, in the wake of the ISIL-linked terrorist attacks in Paris, four whistleblowers in the United States Air Force wrote an open letter to the Obama Administration calling for an end to drone strikes. The authors, all of whom had operational experience with drone strikes, wrote that such attacks “fueled the feelings of hatred that ignited terrorism and groups like Isis, while also serving as a fundamental recruitment tool.” They say that the killing of innocent civilians by American drones is one of most “devastating driving forces for terrorism and destabilization around the world.” It’s worth noting here that counter-terrorism experts with whom I’ve spoken have said that the sort of anti-Muslim rhetoric and policies proposed by several Republican presidential candidates also helps inflame and incite terrorism. So we should also stop that immediately, not just as a matter of upholding our national moral and legal values but because it’s strategically destructive. Yet Republican and Democratic politicians appear fairly united on continuing drone strikes and, if anything, disagree about how much to increase their intensity. Experienced, knowledgeable military advisors have said that drone strikes create more terrorists than they kill. So what possible reason do we have for continuing them?
  • We know that our reactionary, militarily aggressive impulses got us into this situation. Although arguably complex in origin, it’s unarguable that the failed US invasion and occupation of Iraq helped create ISIS. And now in the wake of the San Bernadino attack that has rightfully shaken our nation to its core, our reactionary, militarily aggressive impulses may once again make matters worse. Continuing let alone expanding American drone strikes in the Middle East will continue to create more terrorists than we kill. Unmanned drone strikes are inhumane. They are also stupid and self-defeating.
  •  
    Also just announced: The Air Force plans to double its number of drone units in the budget just passed. 
« First ‹ Previous 201 - 220 of 232 Next ›
Showing 20 items per page