Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "capabilities" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
6More

Exposed: Google's "Smart Home" Surveillance Plans, or, How To Not Be Colonized | TBYP - 0 views

  • Two weeks ago, the New York Times’ truth-humor strip on “The Home of the Future” came on the heels of Google’s purchase of ‘smart thermostat’ manufacturer Nest for $3.2 Billion.  With power utility commissions such as California already stating their intention to “expand third-party access” to in-home data, the perfect storm is brewing for Google’s mission of making you their product – even in your own home. For context, this is the same Google whose executive chairman, Eric Schmidt, told MSNBC: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
  • So where does a ‘smart thermostat’ fit in the current corporatist drive for total in-home surveillance? For the last couple of years, utilities around the globe have all been touting their new metering systems with buzzwords such as ‘smart’, ‘advanced’, ‘upgraded’, or ‘modernized’.  All rhetoric aside, these devices are intended to integrate with all appliances in your home to form an inescapable wireless data-mining dragnet, dubbed as the “home area network”, with your HVAC and likely other in-home systems overseen by spy-giant Google, if they get their way. As we’ve seen, even former CIA director David Patraeus was publicly frothing over having the ability to spy through ‘smart’ appliances, intended to wirelessly report back to the meter continuously, while receiving energy-use dictates from the meter. According to a US Congressional Research Report:
  • “With smart meters, police will have access to data that might be used to track residents’ daily lives and routines while in their homes, including their eating, sleeping, and showering habits, what appliances they use and when, and whether they prefer the television to the treadmill, among a host of other details.” Smart grid planners and working groups have even laid these aims out in their internal roadmaps, citing goals such as “new tools for mining data and intel” and “data mining and analytics to become core competency” (see slide 17).
  • ...3 more annotations...
  • Despite pilot programs indicating no energy savings and mounting opposition now from several hundred activist groups, federal governments such as the US are continuing with their push to incentivize utilities to push forward ‘smart’ grid deployment. Apparently, having a piece of the $11 Billion taxpayer-funded ‘smart’ grid pie, pushed through by the Obama Administration immediately following the 2008 election, is sufficient motivation for utility executives to steamroll forward despite the growing resistance. As an example, PECO, a major utility in Pennsylvania, is slated to receive $200 Million in stimulus funding if they can deploy 600,000 ‘smart’ meters by April 2014. Significantly, anyone can choose to protect their in-home rights by saying no to the deployment of a ‘smart’ meter on their home.  There are no legal requirements in any country or region for an energy customer to accept a ‘smart’ meter.
  • So what can be done to protect rights?  While people cannot vote to prevent corporations from making products such as data-mining thermostats appliances, they do have a voice as utilities try their best to deploy the home-colonizing meters.  Public resistance to ‘smart’ meter deployments has predictably been considerable, as people are learning about not only surveillance capabilities, but also skyrocketing electricity costs, time-of-use billing, risk of fires, home hackability, electrical quality degradation and functional impairments from pulsed microwave radiation — amazingly, all being linked to the new utility metering system.
  • However, utilities are using tactics of intimidation, propaganda, and tacit acceptance – which means that unless you said a clear “no”, they assume a “yes.” In some cases even with a homeowner’s refusal, utilities are forcibly deploying anyway, apparently assuming the liability for doing so, risking litigation. So Google has played their hand with the $3.2 Billion purchase of Nest, desiring to capture the worldwide ‘smart’ home data-mining market, and praying to the all-spying-eye that people will stay tethered to their ‘smart’ wireless toys as their rights roll swiftly towards a cliff.  But will awareness eventually reach a game-changing crescendo?  It seems as though the potential exists. If we want to experience a future other than being ruled by technocrats, now is the time to speak up – even if facing the situation isn’t convenient.  People simply need to know the facts. As stated by former Apple executive Jeffrey Armstrong in our film Take Back Your Power, the question of whether homes will remain free of invasive ‘smart’ metering and appliance technology is “a test case for a technological democracy, if I have ever seen one.” 
6More

U.S. rejects claim that Turkey planned Syria atrocity Anadolu Agency - 0 views

  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency.
  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency. Seymour Hersh, a freelance journalist, published an article in the London Review of Books (LRB) in which he claimed that Ankara had supplied the al Nusra Front with chemical weapons that they used to carry out the August 2013 attack. The Washington Post and the New Yorker declined the story prior to its publication in the LRB. “The Assad regime, and only the Assad regime, could have been responsible for the chemical weapons attack that took place on August 21,” said Shawn Turner and Caitlyn Hayden in a statement initially issued to fact checkers working on the report and later sent to AA. “The suggestion that there was an effort to suppress or alter intelligence is simply false.” State Department Spokesperson, Jen Psaki, in her daily press briefing said there is no doubt that the chemical attack was carried out by the Syrian regime.
  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency.
  • ...2 more annotations...
  • Psaki said, "In light of our reports and intelligence we had recieved, we believe beyond any doubt that the attack on 21 August had been carried out by the Syrian regime and we are still behind the same view shared by the international community." Hersh cited unidentified American officials and a classified intelligence analysis on the opposition's chemical weapons capabilities to back up his claim. “No such paper was ever requested or produced by Intelligence Community analysts,” said Turner and Hayden.     Hersh wrote that U.S. President Barack Obama had established September 2, 2013 as a fixed deadline for the U.S. military to undertake action in Syria following the chemical attack. Turner and Hayden rejected the claim as “completely fabricated”.  The journalist also wrote that the Obama administration had channeled weapons from Libya to the Syrian opposition through southern Turkey, a claim described by Turner and Hayden as “false”.
  • Turkey also reacted to the claim when Turkey's Deputy Prime Minister Bulent Arinc was asked a question about Hersh's claim that Turkey had provided Sarin gas to the people who had conducted chemical attack in Ghouta region. He said "A note sent by the Turkish Foreign Ministry in this regard says that it is absolutely not true. The White House official has also qualified these claims as definitely false and speculative in response to a question regarding the matter." Arinc said, "The claims based on anonymous sources have been conclusively rejected by the White House officials and it has been reconfirmed that the Assad regime is solely responsible for the chemical attack." Noting that they are well aware of previous articles written by Hersh, Arinc said, "Everyone knows very well that the individual's views and claims heard from some unnamed persons are certainly not any verified information and knowledge. In fact, the U.S. officials have quite fairly explained the matter and strictly rejected the claim."
  •  
    Seymour M. Hersh is among the most highly regarded journalists in the world. Mainstream media used to compete for the rights to publish his articles. But apparently he's been digging a little to deeply in the belly of the beast lately. See his latest article that the White House is denying. http://www.lrb.co.uk/2014/04/06/seymour-m-hersh/the-red-line-and-the-rat-line
3More

Dempsey: Israel, U.S. now agree on Iran - Diplomacy and Defense Israel News | Haaretz - 0 views

  • Israel and the United States have reached a closer understanding on the Iranian issue: the two nations agree about the potential threat to the region and what to do about it, U.S. Chief of Staff Martin Dempsey said on his plane ride home Tuesday, according to USA Today. Tensions that arose between Washington and Jerusalem after Israeli Defense Minister Moshe Ya'alon accused the U.S. of global feebleness have abated after the minister apologized. On Sunday afternoon Dempsey met with the Israeli chief of staff, Benny Gantz. Both generals made a point of remarking on the two nations' working relationship, and on Tuesday Dempsey drove home the point that the sides have grown closer regarding the Iranian nuclear program as well.
  • Despite past differences, he now believes Jerusalem is "satisfied that we have the capability to use a military option if the Iranians choose to stray off the diplomatic path," said Dempsey, according to USA Today. Moreover, Jerusalem is now more confident that if needed, the Americans will resort to military action, the top soldier said.
  •  
    Threats of war violate the U.N. Charter, a treaty binding on the U.S. So much for our government's new-found "respect" for international law in the Ukraine/Crimea. 
1More

Nato chief tells allies: spend more on defence to deter Russia - Telegraph - 0 views

  • Britain and its Nato allies must respond to Russia’s “illegal aggression” against Ukraine by spending more on defence, the alliance’s secretary general has said. Writing in The Telegraph, Anders Fogh Rasmussen appeals for Nato members to modernise their armed forces as Russia tries to “carve up” Europe. “Every ally needs to invest the necessary resources in the right capabilities,” writes Mr Rasmussen. “That means modern equipment, intensive training for our forces, and closer cooperation among Nato allies and with our partners. I know how challenging this is in today’s economic climate, but the security climate makes it vital.” Mr Rasmussen adds: “In the long run, a lack of security would be more costly than investing now and we owe it to our forces, and to broader society.” The burden of defending Nato’s 28 members falls increasingly on just one: the United States. Last year, America accounted for 72 per cent of Nato defence spending, up from 59 per cent in 1995.
6More

Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com - 0 views

  • Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday.But Mr. Obama carved a broad exception for “a clear national security or law enforcement need,” the officials said, a loophole that is likely to allow the N.S.A. to continue to exploit security flaws both to crack encryption on the Internet and to design cyberweapons.
  • elements of the decision became evident on Friday, when the White House denied that it had any prior knowledge of the Heartbleed bug, a newly known hole in Internet security that sent Americans scrambling last week to change their online passwords. The White House statement said that when such flaws are discovered, there is now a “bias” in the government to share that knowledge with computer and software manufacturers so a remedy can be created and distributed to industry and consumers.Caitlin Hayden, the spokeswoman for the National Security Council, said the review of the recommendations was now complete, and it had resulted in a “reinvigorated” process to weigh the value of disclosure when a security flaw is discovered, against the value of keeping the discovery secret for later use by the intelligence community.“This process is biased toward responsibly disclosing such vulnerabilities,” she said.
  • The N.S.A. made use of four “zero day” vulnerabilities in its attack on Iran’s nuclear enrichment sites. That operation, code-named “Olympic Games,” managed to damage roughly 1,000 Iranian centrifuges, and by some accounts helped drive the country to the negotiating table.Not surprisingly, officials at the N.S.A. and at its military partner, the United States Cyber Command, warned that giving up the capability to exploit undisclosed vulnerabilities would amount to “unilateral disarmament” — a phrase taken from the battles over whether and how far to cut America’s nuclear arsenal.“We don’t eliminate nuclear weapons until the Russians do,” one senior intelligence official said recently. “You are not going to see the Chinese give up on ‘zero days’ just because we do.” Even a senior White House official who was sympathetic to broad reforms after the N.S.A. disclosures said last month, “I can’t imagine the president — any president — entirely giving up a technology that might enable him some day to take a covert action that could avoid a shooting war.”
  • ...2 more annotations...
  • One recommendation urged the N.S.A. to get out of the business of weakening commercial encryption systems or trying to build in “back doors” that would make it far easier for the agency to crack the communications of America’s adversaries. Tempting as it was to create easy ways to break codes — the reason the N.S.A. was established by Harry S. Truman 62 years ago — the committee concluded that the practice would undercut trust in American software and hardware products. In recent months, Silicon Valley companies have urged the United States to abandon such practices, while Germany and Brazil, among other nations, have said they were considering shunning American-made equipment and software. Their motives were hardly pure: Foreign companies see the N.S.A. disclosures as a way to bar American competitors.Continue reading the main story Continue reading the main story AdvertisementAnother recommendation urged the government to make only the most limited, temporary use of what hackers call “zero days,” the coding flaws in software like Microsoft Windows that can give an attacker access to a computer — and to any business, government agency or network connected to it. The flaws get their name from the fact that, when identified, the computer user has “zero days” to fix them before hackers can exploit the accidental vulnerability.
  • But documents released by Edward J. Snowden, the former N.S.A. contractor, make it clear that two years before Heartbleed became known, the N.S.A. was looking at ways to accomplish exactly what the flaw did by accident. A program code-named Bullrun, apparently named for the site of two Civil War battles just outside Washington, was part of a decade-long effort to crack or circumvent encryption on the web. The documents do not make clear how well it succeeded, but it may well have been more effective than exploiting Heartbleed would be at enabling access to secret data.The government has become one of the biggest developers and purchasers of information identifying “zero days,” officials acknowledge. Those flaws are big business — Microsoft pays up to $150,000 to those who find them and bring them to the company to fix — and other countries are gathering them so avidly that something of a modern-day arms race has broken out. Chief among the nations seeking them are China and Russia, though Iran and North Korea are in the market as well.
  •  
    Note that this is only an elastic policy, not law. Also notice that NYT is now reporting as *fact* that the NSA did the cyber attack on the Iranian enrichment centrifuges. By any legal measure, if true that was an act of war, a war of aggression.  So why wasn't the American public informed that we were at war with Iran? 
2More

NATO considers deployment over Ukraine - 0 views

  • Senior NATO officials will discuss Wednesday the possibility of deploying Canadian military forces into eastern Europe to help deal with the crisis in Ukraine.The so-called "re-assurance package" to be presented to NATO members was drawn up amid concerns from Poland, Latvia and other eastern European NATO members about Russia's larger intentions in the region. The package hasn't yet been presented, but NATO secretary general Anders Fogh Rasmussen has said it will focus on three areas: reinforced defence plans; enhanced training exercises; and "appropriate deployments" of NATO forces into the region.Foreign Affairs Minister John Baird, who will tour eastern Europe this week, has said the government is waiting for the recommendations before determining whether to involve the military in the region.Canada has taken a hard line with Russia over its actions in Ukraine. Prime Minister Stephen Harper this week described Moscow as "clearly aggressive, militaristic and imperialistic" and "a significant threat to peace and stability in the world."
  • Canada has also voiced its strong support for eastern European NATO members, who joined the alliance after the fall of the Soviet Union to escape Russia's influence. Harper spoke to Latvian Prime Minister Laimdota Straujuma on Tuesday, with the conversation largely focused on the situation in Ukraine.It's unclear to what degree Canada and other governments are willing to contribute militarily to help bolster eastern Europe in the face of Russian aggression. Canada has previously helped train forces and bolster capabilities in surrounding countries during crises in Mali and Syria, and has provided non-lethal equipment to militaries in Central America. Similar high-level efforts in Poland, Lithuania, Latvia and Estonia would probably be inexpensive and involve little risk.
5More

FBI Abruptly Walks Out On Senate Briefing After Being Asked How 'Insider Threat' Progra... - 0 views

  • While we've been disappointed that Senator Chuck Grassley appears to have a bit of a double standard with his staunch support for whistleblowers when it comes to Ed Snowden, it is true that he has fought for real whistleblower protections for quite some time. Lately, he's been quite concerned that the White House's "Insider Threat Program" (ITP) is really just a cover to crack down on whistleblowers. As we've noted, despite early promises from the Obama administration to support and protect whistleblowers, the administration has led the largest crackdown against whistleblowers, and the ITP suggests that the attack on whistleblowers is a calculated response. The program documentation argues that any leak can be seen as "aiding the enemy" and encourages government employees to snitch on each other if they appear too concerned about government wrong-doing. Despite all his high minded talk of supporting whistleblowers, President Obama has used the Espionage Act against whistleblowers twice as many times as all other Presidents combined. Also, he has never -- not once -- praised someone for blowing the whistle in the federal government.
  • Given all of that, Senator Grassley expressed some concern about this Insider Threat Program and how it distinguished whistleblowers from actual threats. He asked the FBI for copies of its training manual on the program, which it refused to give him. Instead, it said it could better answer any questions at a hearing. However, as Grassley explains, when questioned about this just 10 minutes into the hearing, the FBI abruptly got up and left: Meanwhile, the FBI fiercely resists any efforts at Congressional oversight, especially on whistleblower matters. For example, four months ago I sent a letter to the FBI requesting its training materials on the Insider Threat Program. This program was announced by the Obama Administration in October 2011. It was intended to train federal employees to watch out for insider threats among their colleagues. Public news reports indicated that this program might not do enough to distinguish between true insider threats and legitimate whistleblowers. I relayed these concerns in my letter. I also asked for copies of the training materials. I said I wanted to examine whether they adequately distinguished between insider threats and whistleblowers.
  • In response, an FBI legislative affairs official told my staff that a briefing might be the best way to answer my questions. It was scheduled for last week. Staff for both Chairman Leahy and I attended, and the FBI brought the head of their Insider Threat Program. Yet the FBI didn’t bring the Insider Threat training materials as we had requested. However, the head of the Insider Threat Program told the staff that there was no need to worry about whistleblower communications. He said whistleblowers had to register in order to be protected, and the Insider Threat Program would know to just avoid those people. Now I have never heard of whistleblowers being required to “register” in order to be protected. The idea of such a requirement should be pretty alarming to all Americans. Sometimes confidentiality is the best protection a whistleblower has. Unfortunately, neither my staff nor Chairman Leahy’s staff was able to learn more, because only about ten minutes into the briefing, the FBI abruptly walked out. FBI officials simply refused to discuss any whistleblower implications in its Insider Threat Program and left the room. These are clearly not the actions of an agency that is genuinely open to whistleblowers or whistleblower protection.
  • ...2 more annotations...
  • And yes, it's equally troubling that the FBI insists that as long as someone "registers" as a whistleblower, the FBI will suddenly, magically agree to stop investigating them as a "threat." We already know that's almost certainly bullshit. The stories of Thomas Drake and John Kiriakou are both clear examples of whistleblowers, who then had the DOJ search through basically everything they'd ever done to try to concoct some sort of Espionage Act case against them. In both cases, the eventual charges were totally ridiculous and unrelated to the whistleblowing they had done, but clearly the only reason they had been investigated was because of their status as whistleblowers. Drake was charged with having a classified document, which was just a meeting agenda and was both improperly classified and then declassified soon after. Kiriakou was charged with revealing the name of a CIA operative to a reporter, where the person in question was already widely known to journalists as working for the CIA. Meanwhile, while Grassley still hasn't come out in support of Snowden as a whistleblower, he does seem reasonably concerned that James Clapper's plans to stop the next Snowden will have severe consequences for whistleblowers:
  • Director of National Intelligence James Clapper seems to have talked about such procedures when he appeared before the Senate Armed Services Committee on February 11, 2014. In his testimony, he said: We are going to proliferate deployment of auditing and monitoring capabilities to enhance our insider threat detection. We’re going to need to change our security clearance process to a system of continuous evaluation. . . . What we need is . . . a system of continuous evaluation, where . . . we have a way of monitoring their behavior, both their electronic behavior on the job as well as off the job, to see if there is a potential clearance issue. . . . Director Clapper’s testimony gives me major pause. It sounds as though this type of monitoring would likely capture the activity of whistleblowers communicating with Congress. As Marcy Wheeler notes in her post (linked above, which called my attention to all this), by declaring war on whistleblowers, the administration is almost guaranteeing that many fewer will use "official channels" to blow the whistle. That just makes them targets with the likelihood of getting no results. Instead, all this does is incentivize people to go the Chelsea Manning/Ed Snowden route of going directly to journalists to make sure the stories get out.
9More

If GCHQ wants to improve national security it must fix our technology | Technology | th... - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
5More

Tomgram: Engelhardt, The Bermuda Triangle of National Security | TomDispatch - 0 views

  • As with a magician, sometimes you have to look where he isn’t pointing to catch sight of reality.  With that in mind, I’d like to nominate British journalist Patrick Cockburn for a prize.  In the midst of the recent headlines, in the most important article no one noticed, he pointed out something genuinely unnerving about our world.
  • Yes, we’re all aware that the U.S. invasion of Iraq didn’t exactly work out as planned and that Afghanistan has been a nearly 13-year disaster, even though the U.S. faced the most ragtag of minority insurgencies in both places.  What, however, about the monumental struggle that used to be called the Global War on Terror?  After all, we got Osama bin Laden.  It took a while, but SEAL Team 6 shot him down in his hideout in Pakistan.  And for years, thanks to the CIA’s drone assassination campaigns in the Pakistani tribal borderlands, Yemen, and Somalia (as well as a full scale hunter-killer operation in Iraq while we were still occupying that country), we’ve been told that endless key al-Qaeda “lieutenants” have been sent to their deaths and that al-Qaeda in Afghanistan has been reduced to 50-100 members. Yet Cockburn concludes: “Twelve years after the ‘war on terror’ was launched it has visibly failed and al-Qaeda-type jihadis, once confined to a few camps in Afghanistan, today rule whole provinces in the heart of the Middle East.”  Look across that region today and from Pakistan to Libya, you see the rise, not the fall, of jihadis of every type.  In Syria and parts of Iraq, groups that have associated themselves with al-Qaeda now have a controlling military presence in territories the size of, as Cockburn points out, Great Britain.  He calls al-Qaeda’s recent rise as the jihadi brand name of choice and the failure of the U.S. campaign against it “perhaps the most extraordinary development of the 21st century.”  And that, unlike the claims we've been hearing at the top of the news for weeks now, might not be an exaggeration.
  • Looked at another way, despite what had just happened to the Pentagon and those towers in New York, on September 12, 2001, the globe’s “sole superpower” had remarkably few enemies.  Small numbers of jihadis scattered mostly in the backlands of the planet and centered in an impoverished, decimated country -- Afghanistan -- with the most retro regime on Earth.  There were, in addition, three rickety “rogue states” (North Korea, Iraq, and Iran) singled out for enemy status but incapable of harming the U.S., and that was that. The world, as Dick Cheney & Co. took for granted, looked ready to be dominated by the only (angry) hyperpower left after centuries of imperial rivalry.  The U.S. military, its technological capability unrivaled by any state or possible grouping of states, was to be let loose to bring the Greater Middle East to heel in a decisive way.  Between that regular military and para-militarizing intelligence agencies, the planet was to be scoured of enemies, the “swamp drained” in up to 60 countries.  The result would be a Pax Americana in the Middle East, and perhaps even globally, into the distant future.  It was to be legendary.  And no method -- not torture, abuse, kidnapping, the creation of “black sites,” detention without charges, assassination, the creation of secret law, or surveillance on a previously unimaginable scale -- was to be left out of the toolkit used to birth this new all-American planet.  The “gloves” were to be taken off in a big way.
  • ...1 more annotation...
  • Thirteen years later, those plans, those dreams are down the drain.  The Greater Middle East is in chaos.  The U.S. seems incapable of intervening in a meaningful way just about anywhere on Earth despite the fact that its military remains unchallenged on a global level.  It’s little short of mind-blowing.  And it couldn’t have been more unexpected for those in power in Washington and perhaps for Americans generally.  This is perhaps why, despite changing American attitudes on interventions and future involvement abroad, it’s been so hard to take in, so little focused upon here -- even in the bogus, politicized discussions of American “strength” and “weakness” which circle around the latest Russian events, as they had previously around the crises in Iran and Syria. Somehow, with what in any age would have seemed like a classic winning hand, Washington never put a card on that “table” (on which all “options” were always being kept open) that wasn’t trumped.  Events in Ukraine and the Crimea seem to be part of this. The Chinese had an evocative phrase for times of dynastic collapse: “chaos under heaven.”  Moments when it seems as if the planet itself is shifting on its axis don’t come often, but they may indeed feel like chaos under heaven -- an increasingly apt phrase for a world in which no country seems to exert much control, tensions are rising in hard to identify ways, and the very climate, the very habitability of the planet is increasingly at risk.
  •  
    Incrediby perceptive essay by Tom Engelhardt on the state of the national security state.
21More

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional committee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial institutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms with Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency with which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of its largest.19 The political clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [Italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘It was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 It also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the Italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter Maritime Bank, which interlocked with BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 It is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. It is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. It may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
3More

» Moving Closer To War Alex Jones' Infowars: There's a war on for your mind! - 0 views

  • The Obama regime, wallowing in hubris and arrogance, has recklessly escalated the Ukrainian crisis into a crisis with Russia. Whether intentionally or stupidly, Washington’s propagandistic lies are driving the crisis to war. Unwilling to listen to any more of Washington’s senseless threats, Moscow no longer accepts telephone calls from Obama and US top officials. The crisis in Ukraine originated with Washington’s overthrow of the elected democratic government and its replacement with Washington’s hand-chosen stooges. The stooges proceeded to act in word and deed against the populations in the former Russian territories that Soviet Communist Party leaders had attached to Ukraine. The consequence of this foolish policy is agitation on the part of the Russian speaking populations to return to Russia. Crimea has already rejoined Russia, and eastern Ukraine and other parts of southern Ukraine are likely to follow. Instead of realizing its mistake, the Obama regime has encouraged the stooges Washington installed in Kiev to use violence against those in the Russian-speaking areas who are agitating for referendums so that they can vote their return to Russia. The Obama regime has encouraged violence despite President Putin’s clear statement that the Russian military will not occupy Ukraine unless violence is used against the protesters. We can safely conclude that Washington either does not listen when spoken to or Washington desires violence.
  • As Washington and NATO are not positioned at this time to move significant military forces into Ukraine with which to confront the Russian military, why is the Obama regime trying to provoke action by the Russian military? A possible answer is that Washington’s plan to evict Russia from its Black Sea naval base having gone awry, Washington’s fallback plan is to sacrifice Ukraine to a Russian invasion so that Washington can demonize Russia and force a large increase in NATO military spending and deployments. In other words, the fallback prize is a new cold war and trillions of dollars more in profits for Washington’s military/security complex. The handful of troops and aircraft that Washington has sent to “reassure” the incompetent regimes in those perennial trouble spots for the West–Poland and the Baltics–and the several missile ships sent to the Black Sea amount to nothing but symbolic provocations. Economic sanctions applied to individual Russian officials signal nothing but Washington’s impotence. Real sanctions would harm Washington’s NATO puppet states far more than the sanctions would hurt Russia. It is clear that Washington has no intention of working anything out with the Russian government. Washington’s demands make this conclusion unavoidable. Washington is demanding that the Russian government pull the rug out from under the protesting populations in eastern and southern Ukraine and force the Russian populations in Ukraine to submit to Washington’s stooges in Kiev. Washington also demands that Russia renege on the reunification with Crimea and hand Crimea over to Washington so that the original plan of evicting Russia from its Black Sea naval base can go forward.
  • In other words, Washington’s demand is that Russia put Humpty Dumpty back together again and hand him over to Washington. This demand is so unrealistic that it surpasses the meaning of arrogance. The White House Fool is telling Putin: “I screwed up my takeover of your backyard. I want you to fix the situation for me and to ensure the success of the strategic threat I intended to bring to your backyard.” The presstitute Western media and Washington’s European puppet states are supporting this unrealistic demand. Consequently, Russian leaders have lost all confidence in the word and intentions of the West, and this is how wars start. European politicians are putting their countries at great peril and for what gain? Are Europe’s politicians blackmailed, threatened, paid off with bags of money, or are they so accustomed to following Washington’s lead that they are unable to do anything else? How do Germany, UK, and France benefit from being forced into a confrontation with Russia by Washington? Washington’s arrogance is unprecedented and is capable of driving the world to destruction. Where is Europe’s sense of self-preservation? Why hasn’t Europe issued arrest warrants for every member of the Obama regime? Without the cover provided by Europe and the presstitute media, Washington would not be able to drive the world to war. Paul Craig Roberts was Assistant Secretary of the Treasury for Economic Policy and associate editor of the Wall Street Journal. He was columnist for Business Week, Scripps Howard News Service, and Creators Syndicate. He has had many university appointments. His internet columns have attracted a worldwide following. His latest book, The Failure of Laissez Faire Capitalism and Economic Dissolution of the West is now available.
8More

Turkey Cooks the Books in Syria | The American Conservative - 0 views

  • If you had been a reader of The American Conservative magazine back in December 2011, you might have learned from an article written by me that “Unmarked NATO warplanes are arriving at Turkish military bases close to Iskenderum on the Syrian border, delivering weapons [to the Free Syrian Army] derived from Colonel Muammar Gaddafi’s arsenals…” Well, it seems that the rest of the media is beginning to catch up with the old news, supplemented with significant details by Sy Hersh in the latest issue of the London Review of Books in an article entitled “The Red Line and the Rat Line.” The reality is that numerous former intelligence officials, like myself, have long known most of the story surrounding the on-again off-again intervention by the United States and others in Syria, but what was needed was a Sy Hersh, with his unmatched range of contacts deep in both the Pentagon as well as at CIA and State Department, to stitch it all together with corroboration from multiple sources. In a sense it was a secret that wasn’t really very well hidden but which the mainstream media wouldn’t touch with a barge pole because it revealed that the Obama Administration, just like the Bushies who preceded it, has been actively though clandestinely conspiring to overthrow yet another government in the Middle East. One might well conclude that the White House is like the Bourbon Kings of France in that it never forgets anything but never learns anything either.
  • The few media outlets that are willing to pick up the Syria story even now are gingerly treating it as something new, jumping in based on their own editorial biases, sometimes emphasizing the CIA and MI6 role in cooperating with the Turks to undermine Bashar al-Assad. But Hersh’s tale is only surprising if one had not been reading between the lines over the past three years, where the clandestine role of the British and American governments was evident and frequently reported on over the internet and, most particularly, in the local media in the Middle East. Far from being either rogue or deliberately deceptive, operations by the U.S. and UK intelligence services, the so-called “ratlines” feeding weapons into Syria, were fully vetted and approved by both the White House and Number 10 Downing Street. The more recent exposure of the Benghazi CIA base’s possible involvement in obtaining Libyan arms as part of the process of equipping the Syrian insurgents almost blew the lid off of the arrangement but somehow the media attention was diverted by a partisan attack on the Obama Administration over who said what and when to explain the security breakdown and the real story sank out of sight.
  • So this is what happened, roughly speaking: the United States had been seeking the ouster of President Bashar al-Assad of Syria since at least 2003, joining with Saudi Arabia, which had been funding efforts to destabilize his regime even earlier. Why? Because from the Saudi viewpoint Syria was an ally of Iran and was also a heretical state led by a secular government dominated by Alawite Muslims, viewed as being uncomfortably close to Shi’ites in their apostasy. From the U.S. viewpoint, the ties to Iran and reports of Syrian interference in Lebanon were a sufficient casus belli coupled with a geostrategic assessment shared with the Saudis that Syria served as the essential land bridge connecting Hezbollah in Lebanon to Iran. The subsequent Congressional Syria Accountability Acts of 2004 and 2010, like similar legislation directed against Iran, have resulted in little accountability and have instead stifled diplomacy. They punished Syria with sanctions for supporting Hezbollah in Lebanon and for its links to Tehran, making any possible improvement in relations problematical. The 2010 Act even calls for steps to bring about regime change in Damascus. The United States also engaged in a program eerily reminiscent of its recent moves to destabilize the government in Ukraine, i.e., sending in ambassadors and charges who deliberately provoked the Syrian government by meeting with opposition leaders and openly making demands for greater democracy. The last U.S. Ambassador to Syria Robert Ford spoke openly in support of the protesters while serving in Damascus in 2010. On one occasion he was pelted with tomatoes and was eventually removed over safety concerns.
  • ...4 more annotations...
  • Lost in translation is the fact that Washington’s growing support for radical insurgency in Syria would also inevitably destabilize all its neighbors, most notably including Iraq, which has indeed been the case, making a shambles of U.S. claims that it was seeking to introduce stable democracies into the region. Some also saw irony in the fact that a few years before Washington decided al-Assad was an enemy it had been sending victims of the CIA’s rendition program to Syria, suggesting that at least some short-term and long-term strategies were on a collision course from the start, if indeed the advocates of the two policies were actually communicating with each other at all. Prime Minister Recep Tayyip Erdogan of Turkey, whose country shared a long border with Syria and who had legitimate security concerns relating to Kurdish separatists operating out of the border region, became the proxy in the secret war for Washington and its principal European allies, the British and French. When the U.S.-Saudi supported insurgency began to heat up and turn violent, Turkey became the key front line state in pushing for aggressive action against Damascus. Erdogan miscalculated, thinking that al-Assad was on his last legs, needing only a push to force him out, and Ankara saw itself as ultimately benefiting from a weak Syria with a Turkish-controlled buffer zone along the border to keep the Kurds in check.
  • Hersh reports how President Barack Obama had to back down from attacking Syria when the Anglo-American intelligence community informed him flatly and unambiguously that Damascus was not responsible for the poison gas attack that took place in Damascus on August 21, 2013 that was being exploited as a casus belli. The information supporting that assertion was known to many like myself who move around the fringes of the intelligence community, but the real revelation from Hersh is the depth of Turkish involvement in the incident in order to have the atrocity be exploitable as a pretext for American armed intervention, which, at that point, Erdogan strongly desired. As the use of weapons of mass destruction against civilians was one of the red lines that Obama had foolishly promoted regarding Syria Erdogan was eager to deliver just that to force the U.S.’s hand. Relying on unidentified senior U.S. intelligence sources, Hersh demonstrates how Turkey’s own preferred militant group Jabhat al-Nusra, which is generally regarded as an al-Qaeda affiliate, apparently used Turkish-provided chemicals and instructions to stage the attack.
  • Is it all true? Unless one has access to the same raw information as Sy Hersh it is difficult to say with any certainty, but I believe I know who some of the sources are and they both have good access to intelligence and are reliable. Plus, the whole narrative has an undeniable plausibility, particularly if one also considers other evidence of Erdogan’s willingness to take large risks coupled with a more general Turkish underhandedness relating to Syria. On March 23rd, one week before local elections in Turkey that Erdogan feared would go badly for him, a Turkish air force F-16 shot down a Syrian Mig-23, claiming that it had strayed half a mile into Turkish airspace. The pilot who bailed out, claimed that he was attacking insurgent targets at least four miles inside the border when he was shot down, an assertion borne out by physical evidence as the plane’s remains landed inside Syria. Was Erdogan demonstrating how tough he could be just before elections? Possibly.
  • Critics of Hersh claim that the Turks would be incapable of carrying out such a grand subterfuge, but I would argue that putting together some technicians, chemicals, and a couple of trucks to carry the load are well within the capability of MIT, an organization that I have worked with and whose abilities I respect. And one must regard with dismay the “tangled webs we weave,” with due credit to Bobby Burns, for what has subsequently evolved in Syria. Allies like Turkey that are willing to cook the books to bring about military action are exploiting the uncertainty of a White House that continues to search for foreign policy successes while simultaneously being unable to define any genuine American interests. Syria is far from an innocent in the ensuing mayhem, but it has become the fall guy for a whole series of failed policies. Turkey meanwhile has exploited the confusion to clamp down on dissent and to institutionalize Erdogan’s authoritarian inclinations. Ten years of American-licensed meddling combined with obliviousness to possible consequences has led to in excess of 100,000 dead Syrians and the introduction of large terrorist infrastructures into the Arab heartland, yet another foreign policy disaster in the making with no clear way out.
  •  
    Former CIA officer Philip Giraldi adds valuable context to revelations of Turkey's involvement in the false flag Sarin gas attack in Syria and in Turkey's follow-up plan to stage a false flag attack on a Turkish tomb in Syria as a pretext for Turkish invasion of Syria. 
1More

U.S. deployed amphibious transport dock ship to Persian Gulf in response to Iraq crisis... - 0 views

  • (UPI) --U.S. Secretary of Defense Chuck Hagel has deployed an additional warship to the Persian Gulf in response to the lightning offensive launched by the Islamic State in Iraq and Syria (ISIS) in Iraq.The USS Mesa Verde, an amphibious transport dock ship, joins USS George H.W. Bush, USS Philippine Sea, USS Truxtun, USS Arleigh Burke and USS Okane in the Persian Gulf.Pentagon Press Secretary Rear Adm. John Kirby announced Mesa Verde's repositioning on Monday."Its presence in the Gulf adds to that of other U.S. naval ships already there -- including the aircraft carrier USS George H.W. Bush -- and provides the commander in chief additional options to protect American citizens and interests in Iraq, should he choose to use them."The USS Mesa Verde is "capable of conducting a variety of quick-reaction and crisis response operations," Kirby noted. The amphibious transport dock ship is transporting an unspecified number of MV-22 Osprey tilt-rotor aircraft.
3More

M of A - U.S. Again Gunning For "Regime Change" In Iraq - 0 views

  • Three days ago we said: The U.S. has conditioned any involvement on the Iraqi government side on a change in its structure towards some "unity government" that would include representatives of the rebellious Sunni strains. Prime Minister Maliki, who received good results in the recent elections, will see no reason to go for that. As expected Maliki declined to follow orders out of Washington DC and he is right to do so. Isn't Iraq supposed to be a sovereign state? No says Washington. It is us who are choosing a new Iraqi prime minister: Over the past two days the American ambassador, Robert S. Beecroft, along with Brett McGurk, the senior State Department official on Iraq and Iran, have met with Usama Nujaifi, the leader of the largest Sunni contingent, United For Reform, and with Ahmad Chalabi, one of the several potential Shiite candidates for prime minister, according to people close to each of those factions, as well as other political figures. “Brett and the ambassador met with Mr. Nujaifi yesterday and they were open about this, they do not want Maliki to stay,” Nabil al-Khashab, the senior political adviser to Mr. Nujaifi, said Thursday.
  • This move lets arouse suspicions that the recent insurgency against the Iraqi state, with ISIS takfiris in the front line, did not just by chance started after Maliki's party, the State of Law Coalition, won in the parliamentary elections a few weeks ago. It had been decided that he had to go. When the elections confirmed him, other methods had to be introduced. Thus the insurgency started and is now used as a pretext for "regime change". The U.S. media and policies again fall for the "big bad man" cliche portraying Nouri al-Maliki (Arabic for Ngo Dinh Diem) as the only person that stands in the way of Iraq as a "liberal democracy". That is of course nonsense. Maliki is not the problem in Iraq: The most significant factor behind Iraq’s problems has been the inability of Iraq’s Sunni Arabs and its Sunni neighbors to come to terms with a government in which the Shias, by virtue of their considerable majority in Iraq’s population, hold the leading role. This inability was displayed early on, when Iraq’s Sunnis refused to take part in Iraq’s first parliamentary elections, and resorted to insurgency almost immediately after the US invasion and fall of Saddam Hussein. All along, the goal of Iraqi Sunnis has been to prove that the Shias are not capable of governing Iraq. Indeed, Iraq’s Sunni deputy prime minister, Osama al Najafi, recently verbalized this view. The Sunnis see political leadership and governance to be their birthright and resent the Shia interlopers.
  • The U.S., with strong support from its GCC allies who finance the insurgency, now seems to again lean towards the Sunni minority side in Iraq and wants to subvert the ruling of a Shia majority and its candidate. Maliki doesn't follow Washington orders, is somewhat friendly with Iran and even wins elections. Such man can not be let standing. So the program is again "regime change" in Iraq, now with the help of Jihadists proxies, even after the recent catastrophic "successes" in similar endeavors in Libya, Egypt and Ukraine and the failure in Syria. Phil Greaves seems thereby right when he characterizes the insurgency and ISIS as a expression of Washington's imperialism: The ISIS-led insurgency currently gripping the western and northern regions of Iraq is but a continuation of the imperialist-sponsored insurgency in neighboring Syria. The state actors responsible for arming and funding said insurgency hold the same principal objectives in Iraq as those pursued in Syria for the last three years, namely: the destruction of state sovereignty; weakening the allies of an independent Iran; the permanent division of Iraq and Syria along sectarian lines establishing antagonistic “mini-states” incapable of forming a unified front against US/Israeli imperial domination. The best thing Maliki could now do is to shut down the U.S. embassy and request support from Russia, China and Iran. South Iraq is producing lots of oil and neither money nor the number of potential recruits for a big long fight are his problem. His problem is the insurgency and the states, including the United States, behind it. The fight would be long and Iraq would still likely be parted but the likely outcome would at least guarantee that the will of the majority constituency can not be ignored by outside actors.
7More

Land Destroyer: America's Covert Re-Invasion of Iraq - 0 views

  • mage: ISIS clearly did not materialize spontaneously within Iraq, it hasclearly redeployed from its NATO-sponsored destruction of Syria to northern Iraq, perhaps in an attempt to justify a NATO incursion and thecreation of a buffer zone straddling Syrian, Iraqi, and even possibly Iranian territory with the goal of targeting Iran directly with ISIS.   June 13, 2014 (Tony Cartalucci - LD) - Heavily armed, well funded, and organized as a professional, standing army, the forces of the Islamic State of Iraq and Syria (ISIS) swept southward into Iraq from Turkey and northeastern Syria, taking the cities of Mosul and Tikrit, and now threaten the Iraqi capital city of Baghdad itself. The United States was sure to prop up two unfounded narratives - the first being that US intelligence agencies, despite assets in Iraq and above it in the form of surveillance drones, failed to give warning of the invasion, and that ISIS is some sort of self-sustaining terror organization carving out a "state" by "robbing banks" and collecting "donations" on Twitter. The Wall Street Journal in its report, "Iraqi Drama Catches U.S. Off Guard," stated: The quickly unfolding drama prompted a White House meeting Wednesday of top policy makers and military leaders who were caught off guard by the swift collapse of Iraqi security forces, officials acknowledged.
  • mage: ISIS has convoys of brand new matching Toyota's the samevehicles seen among admittedly NATO-armed terrorists operatingeverywhere from Libya to Syria, and now Iraq. It is a synthetic, state-sponsored regional mercenary expeditionary force.
  • The question remains, if a Lebanese newspaper knew ISIS was on the move eastward, why didn't the CIA? The obvious answer is the CIA did know, and is simply feigning ignorance at the expense of their reputation to bait its enemies into suspecting the agency of  incompetency rather than complicity in the horrific terroristic swath ISIS is now carving through northern Iraq. Described extensively in the full New Eastern Outlook Journal (NEO) report, "NATO’s Terror Hordes in Iraq a Pretext for Syria Invasion," the United States, Turkey, Saudi Arabia, and Qatar, have funded and armed terrorists operating in Syria for the past 3 years to the tune of hundreds of millions of dollars - coincidentally the same amount that ISIS would require to gain primacy among militant groups fighting in Syria and to mobilize forces capable of crossing into Iraq and overwhelming Baghdad's national defenses.
  • ...4 more annotations...
  • a 3-year ongoing CIA program (here, here, and here) all along the Turkish-Syrian border to "monitor" and "arm" "moderate" militants fighting the Syrian government, the US claims it was caught "by surprise." If drones and CIA operatives operating in ISIS territory weren't enough to detect the impending invasion, perhaps the CIA should have just picked up a newspaper.Indeed, the Lebanon Daily Start in March 2014 reported that ISIS openly withdrew its forces from Latakia and Idlib provinces in western Syria, and redeployed them in Syria's east - along the Syrian-Iraqi border. The article titled, "Al-Qaeda splinter group in Syria leaves two provinces: activists," stated explicitly that: On Friday, ISIS – which alienated many rebels by seizing territory and killing rival commanders – finished withdrawing from the Idlib and Latakia provinces and moved its forces toward the eastern Raqqa province and the eastern outskirts of the northern city of Aleppo, activists said.
  • The NEO report includes links to the US Army’s West Point Countering Terrorism Center reports, “Bombers, Bank Accounts and Bleedout: al-Qa’ida’s Road In and Out of Iraq,” and “Al-Qa’ida’s Foreign Fighters in Iraq,” which detail extensively the terror network used to flood Iraq with foreign terrorists, weapons, and cash to fuel an artificial "sectarian war" during the US occupation, and then turned over to flood Syria with terrorists in the West's bid to overthrow the government in Damascus. What's ISIS Doing in Iraq? The NEO report would also post Seymour Hersh's 2007 article, "The Redirection," documenting over the course of 9 pages US, Saudi, and Israeli intentions to create and deploy sectarian extremists region-wide to confront Iran, Syria, and Hezbollah in Lebanon. Hersh would note that these "sectarian extremists" were either tied to Al Qaeda, or Al Qaeda itself. The ISIS army moving toward Baghdad is the final manifestation of this conspiracy, a standing army operating with impunity, threatening to topple the Syrian government, purge pro-Iranian forces in Iraq, and even threatening Iran itself by building a bridge from Al Qaeda's NATO safe havens in Turkey, across northern Iraq, and up to Iran's borders directly. Labeled "terrorists" by the West, grants the West plausible deniability in its creation, deployment, and across the broad spectrum of atrocities it is now carrying out.  
  • It is a defacto re-invasion of Iraq by Western interests - but this time without Western forces directly participating - rather a proxy force the West is desperately attempting to disavow any knowledge of or any connection to. However, no other explanation can account for the size and prowess of ISIS beyond state sponsorship. And since ISIS is the clear benefactor of state sponsorship, the question is, which states are sponsoring it? With Iraq, Syria, and Iran along with Lebanese-based Hezbollah locked in armed struggle with ISIS and other Al Qaeda franchises across the region, the only blocs left are NATO and the GCC (Saudi Arabia and Qatar in particular).
  • With the West declaring ISIS fully villainous in an attempt to intervene more directly in northern Iraq and eastern Syria, creating a long desired "buffer zone" within which to harbor, arm, and fund an even larger terrorist expeditionary force, Syria, Iraq, Iran, and others are offered an opportunity to preempt Western involvement and to crush the ISIS - cornering and eliminating NATO-GCC's expeditionary force while scoring geopolitical points of vanquishing Washington's latest "villain." Joint Iraq-Iranian operations in the north and south of ISIS's locations, and just along Turkey's borders could envelop and trap ISIS to then be whittled down and destroyed - just as Syria has been doing to NATO's proxy terrorist forces within its own borders.Whatever the regional outcome may be, the fact is the West has re-invaded Iraq, with a force as brutal, if not worse than the "shock and awe" doctrine of 2003. Iraq faces another difficult occupation if it cannot summon a response from within, and among its allies abroad, to counter and crush this threat with utmost expediency.
11More

How NSA Can Secretly Aid Criminal Cases | Consortiumnews - 0 views

  • Though the NSA says its mass surveillance of Americans targets only “terrorists,” the spying may turn up evidence of other illegal acts that can get passed on to law enforcement which hides the secret source through a ruse called “parallel construction,” writes ex-CIA analyst Ray McGovern. By Ray McGovern Rarely do you get a chance to ask a just-retired FBI director whether he had “any legal qualms” about what, in football, is called “illegal procedure,” but at the Justice Department is called “parallel construction.” Government wordsmiths have given us this pleasant euphemism to describe the use of the National Security Agency’s illegal eavesdropping on Americans as an investigative tool to pass on tips to law enforcement agencies which then hide the source of the original suspicion and “construct” a case using “parallel” evidence to prosecute the likes of you and me.
  • For those interested in “quaint” things like the protections that used to be afforded us by the Fourth and Fifth Amendments to the Constitution, information about this “parallel construction” has been in the public domain, including the “mainstream media,” for at least a year or so. So, I welcomed the chance to expose this artful practice to still more people with cameras rolling at a large conference on “Ethos & Profession of Intelligence” at Georgetown University on Wednesday, during the Q & A after former FBI Director Robert Mueller spoke. Mueller ducked my question regarding whether he had any “legal qualms” about this “parallel construction” arrangement. He launched into a discursive reply in which he described the various ”authorities” enjoyed by the FBI (and the CIA), which left the clear impression not only that he was without qualms but that he considered the practice of concealing the provenance of illegally acquired tip-off information somehow within those professed “authorities.”
  • Bottom line? Beware, those of you who think you have “nothing to hide” when the NSA scoops up your personal information. You may think that the targets of these searches are just potential “terrorists.” But the FBI, Internal Revenue Service, Drug Enforcement Administration and countless other law enforcement bodies are dipping their cursors into the huge pool of mass surveillance.
  • ...8 more annotations...
  • Former FBI Division Counsel in Minneapolis Coleen Rowley – who, with Jesselyn Radack, Tom Drake and me, visited Snowden in Russia last October – told me of two legal doctrines established many decades ago: the “exclusionary rule” and the rule regarding the “fruit of the poisonous tree.” These were designed to force over-zealous law enforcement officers to adhere to the Constitution by having judges throw out cases derived from improperly obtained evidence. To evade this rule, law enforcement officials who have been on the receiving end of NSA’s wiretap data must conceal what tipped off an investigation.
  • Last week a journalist asked me why I thought Congress’ initial outrage – seemingly genuine in some quarters – over bulk collection of citizens’ metadata had pretty much dissipated in just a few months. What started out as a strong bill upholding Fourth Amendment principles ended up much weakened with only a few significant restraints remaining against NSA’s flaunting of the Constitution? Let me be politically incorrect and mention the possibility of blackmail or at least the fear among some politicians that the NSA has collected information on their personal activities that could be transformed into a devastating scandal if leaked at the right moment. Do not blanch before the likelihood that the NSA has the book on each and every member of Congress, including extramarital affairs and political deal-making. We know that NSA has collected such information on foreign diplomats, including at the United Nations in New York, to influence votes on the Iraq War and other issues important to U.S. “national security.”
  • We also know how the late FBI Director J. Edgar Hoover used much more rudimentary technology a half century ago to develop dossiers on the personal indiscretions of political and ideological opponents. It makes sense that people with access to the NSA’s modern surveillance tools would be sorely tempted to put these new toys to use in support of their own priorities.
  • We cannot escape some pretty dismal conclusions here. Not only have the Executive and Legislative branches been corrupted by establishing, funding, hiding and promoting unconstitutional surveillance programs for over 12 years, but the Judicial branch has been corrupted, too. The discovery process in criminal cases is now stacked in favor of the government through its devious means for hiding unconstitutional surveillance and using it in ways beyond the narrow declared purpose of thwarting terrorism. Moreover, federal courts at the district, appeals and Supreme Court levels have allowed the government to evade legal accountability by insisting that plaintiffs must be able to prove what often is not provable, that they were surveilled through highly secretive NSA means. And, if the plaintiffs make too much progress, the government can always get a lawsuit thrown out by invoking “state secrets.” The Separation of Powers designed by the Constitution’s Framers to prevent excessive accumulation of power by one of the branches has stopped functioning amid the modern concept of “permanent war” and the unwillingness of all but a few hearty souls to challenge the invocation of “national security.” Plus, the corporate-owned U.S. media, with very few exceptions, is fully complicit.
  • The concept of a “United Stasi of America,” coined by Pentagon Papers whistleblower Daniel Ellsberg a year ago, has been given real meaning by the unconstitutional behavior and dereliction of duty on the part of both the George W. Bush and Obama administrations. Just days after the first published disclosure from Snowden, Ellsberg underscored that the NSA, FBI and CIA now have surveillance capabilities that East Germany’s Stasi secret police could scarcely have imagined.
  • Last June, Mathew Schofield of McClatchy conducted an interesting interview of Wolfgang Schmidt, a former lieutenant colonel in the Stasi, in Berlin. With the Snowden revelations beginning to tumble out into the media, Schofield described Schmidt as he pondered the sheer magnitude of domestic spying in the United States.
  • “So much information, on so many people,” says Schmidt who, at that point, volunteers a stern warning for Schofield and the rest of us: “It is the height of naiveté to think that, once collected, this information won’t be used. This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.”
  • Take note, those of you who may still feel fearless, those of you with “nothing to hide.”
2More

"Russia Could Ditch Dollar In 2-3 Years"; Deputy PM Warns Nuclear Subs "Could Reach Any... - 0 views

  • "Two to three years is enough, not only to launch [settlements in rubles], but also to complete these mechanisms," says Andrey Kostin, head of Russia’s second-biggest bank VTB, noting that the possibility of the US and EU widening sanctions to exclude Russia from the SWIFT global money transfer system would become “a point of no return” making any further dialog impossible. However, as Deputy Prime Minister Dmitri Rogozin explains in this interview, how Russia's military and industrial complex is responding to a growing threat from America. Russia is not responding with any talk about the nuclear button (at least not yet); but they are preparing for such an eventuality: "we are creating a nuclear submarine fleet... capable of reaching any country on any continent, if [USA] suddenly becomes the aggressor, and our top-most national interests come under threat," adding that Obama's coup has ushered in "the complete demise of the Ukrainian State."
  • As RT reports, ?two to three years would be enough time for Russia to switch to international settlements to the ruble, Andrey Kostin, head of Russia’s second-biggest bank VTB, said... The media has reported on the possibility of the US and EU widening sanctions to exclude Russia from the SWIFT global money transfer system.   Kostin said the move would become “a point of no return” and that any further dialogue would be impossible if SWIFT was cut off.
7More

Israel Won't Stop Spying on the U.S. - 0 views

  • Whatever happened to honor among thieves? When the National Security Agency was caught eavesdropping on German Chancellor Angela Merkel’s cell phone, it was considered a rude way to treat a friend. Now U.S. intelligence officials are saying—albeit very quietly, behind closed doors on Capitol Hill—that our Israeli “friends” have gone too far with their spying operations here. According to classified briefings on legislation that would lower visa restrictions on Israeli citizens, Jerusalem’s efforts to steal U.S. secrets under the cover of trade missions and joint defense technology contracts have “crossed red lines.”  Israel’s espionage activities in America are unrivaled and unseemly, counterspies have told members of the House Judiciary and Foreign Affairs committees, going far beyond activities by other close allies, such as Germany, France, the U.K. and Japan. A congressional staffer familiar with a briefing last January called the testimony “very sobering…alarming…even terrifying.” Another staffer called it “damaging.”  The Jewish state’s primary target: America’s industrial and technical secrets. 
  • “No other country close to the United States continues to cross the line on espionage like the Israelis do,” said a former congressional staffer who attended another classified briefing in late 2013, one of several in recent months given by officials from the Department of Homeland Security (DHS), the State Department, the FBI and the National Counterintelligence Directorate. 
  • “I don’t think anyone was surprised by these revelations,” the former aide said. “But when you step back and hear…that there are no other countries taking advantage of our security relationship the way the Israelis are for espionage purposes, it is quite shocking. I mean, it shouldn’t be lost on anyone that after all the hand-wringing over [Jonathan] Pollard, it’s still going on.” Israel and pro-Israel groups in America have long lobbied U.S. administrations to free Pollard, a former U.S. naval intelligence analyst serving a life sentence since 1987 for stealing tens of thousands of secrets for Israel. (U.S. counterintelligence officials suspect that Israel traded some of the Cold War-era information to Moscow in exchange for the emigration of Russian Jews.) After denying for over a decade that Pollard was its paid agent, Israel apologized and promised not to spy on U.S. soil again. Since then, more Israeli spies have been arrested and convicted by U.S. courts. 
  • ...4 more annotations...
  • I.C. Smith, a former top FBI counterintelligence specialist during the Pollard affair, tells Newsweek, “In the early 1980s, dealing with the Israelis was, for those assigned that area, extremely frustrating. The Israelis were supremely confident that they had the clout, especially on the Hill, to basically get [away] with just about anything. This was the time of the Criteria Country List—later changed to the National Security Threat List—and I found it incredible that Taiwan and Vietnam, for instance, were on [it], when neither country had conducted activities that remotely approached the Pollard case, and neither had a history of, or a comparable capability to conduct, such activities.” While all this was going on, Israel was lobbying hard to be put on the short list of countries (38 today) whose citizens don’t need visas to visit here.  Until recently, the major sticking point was the Jewish state’s discriminatory and sometimes harsh treatment of Arab-Americans and U.S. Palestinians seeking to enter Israel. It has also failed to meet other requirements for the program, such as promptly and regularly reporting lost and stolen passports, officials say—a problem all the more pressing since Iranians were found to have boarded the missing Malaysia Airlines flight with stolen passports. 
  • “But this is the first time congressional aides have indicated that intelligence and national security concerns also are considerations in weighing Israel’s admission into the visa waiver program,” Jonathan Broder, the foreign and defense editor for CQ Roll Call, a Capitol Hill news site, wrote last month. He quoted a senior House aide as saying, “The U.S. intelligence community is concerned that adding Israel to the visa waiver program would make it easier for Israeli spies to enter the country.” The Israelis “thought they could just snap their fingers” and get friends in Congress to legislate visa changes, a Hill aide said, instead of going through the required hoops with DHS.
  • Congressional aides snorted at the announcement. “The Israelis haven’t done s**t to get themselves into the visa waiver program,” the former congressional aide said, echoing the views of two other House staffers working on the issue. “I mean, if the Israelis got themselves into this visa waiver program and if we were able to address this [intelligence community] concern—great, they’re a close ally, there are strong economic and cultural links between the two countries, it would be wonderful if more Israelis could come over here without visas. I’m sure it would spur investment and tourist dollars in our economy and so on and so forth. But what I find really funny is they haven’t done s**t to get into the program. They think that their friends in Congress can get them in, and that’s not the case. Congress can lower one or two of the barriers, but they can’t just legislate the Israelis in.” The path to visa waivers runs through DHS and can take years to navigate.
  • Israel is not even close to meeting those standards, a congressional aide said. “You’ve got to have machine-readable passports in place—the e-passports with a data chip in them. The Israelis have only just started to issue them to diplomats and senior officials and so forth, and that probably won’t be rolled out to the rest of their population for another 10 years.” But U.S. counterspies will get the final word. And since Israel is as likely to stop spying here as it is to give up matzo for Passover, the visa barriers are likely to stay up. As Paul Pillar, the CIA’s former national intelligence officer for the Near East and South Asia, told Newsweek, old habits are hard to break: Zionists were dispatching spies to America before there even was an Israel, to gather money and materials for the cause and later the fledgling state. Key components for Israel’s nuclear bombs were clandestinely obtained here. “They’ve found creative and inventive ways,” Pillar said, to get what they want. “If we give them free rein to send people over here, how are we going to stop that?” the former congressional aide asked. “They’re incredibly aggressive. They’re aggressive in all aspects of their relationship with the United States. Why would their intelligence relationship with us be any different?”
2More

Counter-Intelligence | Metanoia Films - 0 views

  • "An extraordinary work by a gifted filmmaker, "Counter-Intelligence" shines sunlight into the darkest crevices of empire run amok. The film vividly exposes a monstrous and unconstitutional "deep state" in which multiple competing chains of command -- all but one illegal -- hijack government capabilities and taxpayer funds to commit crimes against humanity in our name. Anyone who cares about democracy, good government, and the future will want to watch all five segments of this remarkable film."
  •  
    An outstanding and lengthy documentary on the history of the U.S. "Deep State," our secret government.
1More

Exclusive: Emails reveal close Google relationship with NSA | Al Jazeera America - 0 views

  • Email exchanges between National Security Agency Director Gen. Keith Alexander and Google executives Sergey Brin and Eric Schmidt suggest a far cozier working relationship between some tech firms and the U.S. government than was implied by Silicon Valley brass after last year’s revelations about NSA spying. Disclosures by former NSA contractor Edward Snowden about the agency’s vast capability for spying on Americans’ electronic communications prompted a number of tech executives whose firms cooperated with the government to insist they had done so only when compelled by a court of law. But Al Jazeera has obtained two sets of email communications dating from a year before Snowden became a household name that suggest not all cooperation was under pressure.
« First ‹ Previous 221 - 240 of 386 Next › Last »
Showing 20 items per page