Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "capabilities" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
6More

US may sell Saudis bombs once only offered to Israel -- report | The Times of Israel - 0 views

  • Amid American efforts to allay Sunni Arab concerns over the nuclear deal with Iran, officials are reportedly considering selling Saudi Arabia bunker buster bombs, which are currently only offered to Israel American officials said privately this week that the Obama administration is considering selling GBU-28 bunker buster bombs to the Gulf monarchy, the Washington Times reported this week.
  • Talks for the sale are taking place in secret, since according to a 2008 congressional mandate, the US must ensure Israel’s military superiority in the Middle East. But the American administration is also anxious to reassure its Sunni allies in the region that it is not abandoning them. In addition to the sale of bunker buster bombs to Saudi Arabia, the US is also considering selling F-35 fighter jets to the United Arab Emirates, according to a recent report.
  • Analysts say the weapons sales could erode Israel’s military edge in the region. The GBU-28, which can penetrate underground fortifications, was supplied in secret to Israel in 2009, reversing a long-standing American refusal to sell the weapons to Jerusalem. The 5,000-pound laser-guided bombs could be used in a strike against Iran’s nuclear facilities, though analysts say the weapon would be too small to take out Iran’s Fordo nuclear site. The Pentagon has been testing a 30,000 pound bunker-buster which could reportedly penetrate Fordo, but the Obama administration has refused to sell the weapon to Israel.
  • ...3 more annotations...
  • A  New York Times report recently detailed a defense pact with the Gulf Cooperation Council that is being considered, which would commit the US to defend Arab allies from attack. The pact would also commit to joint training missions for American and Arab military forces; designating Saudi Arabia and the United Arab Emirates as “major non-NATO allies,” a step that would loosen restrictions on weapons sales and offer “a number of military advantages that are available only to NATO allies”; and approving the sale of its advanced F-35 stealth fighter to the UAE three years after it is delivered to Israel.
  • Russia recently agreed to sell Iran the S-300 air defense missile system capable of shooting down fighters currently used by Gulf states.
  • Diplomats warn that with existing US military commitments to Israel, Japan, Egypt and Turkey, determining who gets what weapons and when, while maintaining a favorable military balance, will be fraught. Experts also point out that Arab states face an asymmetric threat, and militarily would probably be better served by strengthening troop numbers and developing more mechanized units rather than gaining more high-tech weaponry which already outguns Iran.
1More

CIA couldn't fully use NSA spy program as most analysts didn't know about it | Ars Tech... - 0 views

  • A newly-released document from the Central Intelligence Agency’s (CIA) own internal watchdog found that the government’s controversial warrantless surveillance and bulk data collection program was so secretive that the agency was unable to make “full use” of its capabilities even several years after the September 11 attacks. Initially, only top-level CIA officials were cleared on its use, rather than rank-and-file "CIA analysts and targeting officers.” The document, a June 2009 report from the CIA Inspector General (IG) was released as part of a trove of 747 pages entitled the “Report on the President’s Surveillance Program” and was published on Friday by The New York Times as the result of victory in a Freedom of Information Act lawsuit filed against the Department of Justice.
16More

To beat ISIS, kick out US-led coalition | nsnbc international - 0 views

  • It’s been a bad time for foes of ISIS. Islamic State scored a neat hat-trick by invading strategic Ramadi in Iraq’s mainly Sunni Anbar province, occupying Syria’s historic gem Palmyra, and taking over Al-Tanf, the last remaining border crossing with Iraq. The multinational, American-led ‘Coalition’ launched last August to thwart Islamic State’s (IS, formerly ISIS) march across Syria and Iraq…did nothing.
  • The Iraqis have shot back. Key MP Hakim al-Zamili blames Ramadi’s collapse on the US’s failure to provide “good equipment, weapons and aerial support” to troops. Deputy Prime Minister Saleh Mutlaq, himself a Sunni from Anbar Province, concluded that the Americans were coming up short in all areas. “The Coalition airstrikes are not enough to eliminate IS.” Furthermore, the US policy of recruiting Sunni tribes for the fight, he added, was “too late” – it is “important but not enough.” If ever there was an understatement, this is it. Washington’s long-stated objective of rallying together a vetted Sunni fighting force – or its equivalent in the form of a National Guard – has always served as a placeholder to avoid facing realities.
  • One thing we have learned from IS gains in small and large Sunni towns alike, is that the extremist group prides itself on sleeper cells and alliances inside of these areas. Sunni tribes and families, both, are divided on their support of IS. And the militants ensure that everyone else falls in line through a brutal campaign of inflicting fear and pain indiscriminately. So the likelihood of a significant, anti-IS, well-trained and equipped Sunni fighting force emerging anytime soon is just about nil. So too is the idea of a US-led Coalition air force that can cripple Islamic State. Washington has run fewer sorties over Syria and Iraq in the nine months since inception of its air campaign, than Israel ran in its entire three-week Gaza blitz in 2008-09. Where were the American bombers when Ramadi and Palmyra were being taken? And why does the US Air Force only seem to engage in earnest when their Kurdish allies are being threatened – as in Kobani (Ain al-Arab), Syria, and Erbil in Iraq?
  • ...12 more annotations...
  • If actions speak louder than words, then Washington’s moves in the Mideast have been deafening. Forget talk of a ‘unified Iraq’ with a ‘strong central government’. And definitely forget loudly-proclaimed objectives of ‘training moderate forces’ to ‘fight off IS’ across the Jordanian and Turkish borders in Syria. That’s just talk. An objective look at US interests in the region paint an entirely different picture. The Americans seek to maintain absolute hegemony in the Mideast, even as they exit costly military occupations of Iraq and Afghanistan. Their primary interests are 1) access to low cost oil and gas, 2) propping up Israel, and more recently, 3) undermining Russian (and Chinese) influence in the region. Clinging on to hegemony would be a whole lot easier without the presence of a powerful, independent Islamic Republic of Iran, which continues to throw a wrench in many of Washington’s regional projects. So hegemony is somewhat dependent on weakening Iran – and its supportive alliances.
  • But why ignore Sunni groups who are unreservedly opposed to IS? Aren’t they America’s natural constituents inside Iraq? The Takfiri extremist groups serve a purpose for Washington. IS has had the ability – where competing Sunni factions, with their ever-growing lists of demands from Baghdad, have not – to transform the US’ ‘buffer’ project into a physical reality. And Washington has not needed to expend blood, treasure or manpower to get the job done.
  • You only have to look at recent US actions in Iraq to see this unspoken plan in action. Washington’s most intensive airstrikes to date were when Kurdish Erbil and its environs came under threat by ISIS.Washington’s most intensive airstrikes to date were when Kurdish Erbil and its environs came under threat by ISIS. Congress has breached all international norms by ushering through legislation to directly arm Sunni and Kurdish militias and bypass the central government in Baghdad. And despite endless promises and commitments, the Americans have failed at every hurdle to train and equip the Iraqi Army and security forces to do anything useful. A weak, divided Iraq can never become a regional powerhouse allied with Iran and the Resistance Axis. Likewise a weak, divided Syria. But without US control over these central governments, the only way to achieve this is 1) through the creation of sectarian and ethnic strife that could carve out pro-US buffers inside the ‘Resistance states’ and/or 2) through the creation of a hostile ‘Sunni buffer’ to break this line from Iran to Palestine.
  • General Walid Sukariyya, a Sunni, pro-resistance member of Lebanon’s parliament, agrees. “ISIS will be better for the US and Israel than having a strong Iran, Iraq and Syria…If they succeed at this, the Sunni state in Iraq will split the resistance from Palestine.” While Washington has long sought to create a buffer in Iraq on the Syrian border, it has literally spent years trying – and failing – to find, then mold, representative Sunni Iraqi leaders who will comfortably toe a pro-American line. An example of this is the Anbar delegation US General John Allen handpicked last December for a DC tour, which excluded representatives of the two most prominent Sunni tribes fighting IS in Iraq – the Albu Alwan and Albu Nimr. A spokesman for the tribes, speaking to Al-Jarida newspaper, objected at the time: “We are fighting ISIL and getting slaughtered, while suffering from a shortage of weapons. In the meantime, others are going to Washington to get funds and will later be assigned as our leaders.”
  • With the removal of Saddam Hussein in Iraq, the US inadvertently extended Iran’s arc of influence in a direct geographic line to Palestine, leaving the Israeli colonial project vulnerable. Former President George W. Bush immediately took on the task of destroying this Resistance Axis by attempting to neuter Iranian allies Hezbollah, Syria and Hamas – and failed. The Arab Spring presented a fresh opportunity to regroup: the US and its Turkish and Persian Gulf allies swung into action to create conditions for regime-change in Syria. The goal? To break this geographic line from Iran – through Iraq, Syria and Lebanon – to Palestine. When regime-change failed, the goalpost moved to the next best plan: dividing Syria into several competing chunks, which would weaken the central state and create a pro-US ‘buffer’ along the border with Israel. Weakening the central government in Iraq by dividing the state along Kurdish, Sunni and Shiite lines has also been a priority for the Americans.
  • The DIA brief makes clear that the escalation of conflict in Syria will create further sectarianism and radicalization, which will increase the likelihood of an ‘Islamic State’ on the Syrian-Iraqi border, one that would likely be manned by the Islamic State of Iraq (ISI). So what did Washington do when it received this information? It lied. Less than one month after the DIA report was published, US Secretary of State John Kerry told the Senate Foreign Relations Committee this about the Syrian opposition: “I just don’t agree that a majority are Al-Qaeda and the bad guys. That’s not true. There are about 70,000 to 100,000 oppositionists … Maybe 15 percent to 25 percent might be in one group or another who are what we would deem to be bad guys…There is a real moderate opposition that exists.” Using the fabricated storyline of ‘moderate rebels’ who need assistance to fight a ‘criminal Syrian regime’, the US government kept the Syrian conflict buzzing, knowing full well the outcome would mean the establishment of a Sunni extremist entity spanning the Syrian-Iraqi border…which could cripple, what the Americans call, “the strategic depth of the Shia expansion.”As US Council on Foreign Relations member and terrorism analyst Max Abrahms conceded on Twitter: “The August 5, 2012 DIA report confirms much of what Assad has been saying all along about his opponents both inside & outside Syria.”
  • Since last year, numerous Iraqi officials have complained about the US airdropping weapons to IS – whether deliberately or inadvertently remains disputed. Military sources, on the other hand, have made clear that the US-led Coalition ignores many of the Iraqi requests for air cover during ground operations. If the US isn’t willing to play ball in Iraq’s existential fight against IS, then why bother with the Americans at all? Iraqi Prime Minister Haider al-Abadi is viewed as a ‘weak’ head of state – a relatively pro-American official who will work diligently to keep a balance between US interests and those of Iraq’s powerful neighbor, Iran. But after the disastrous fall of Ramadi, and more bad news from inside Syria, Abadi has little choice but to mitigate these losses, and rapidly. The prime minister has now ordered the engagement of thousands of Hashd al-Shaabi (Shiite paramilitary groups, commonly known as the Popular Mobilization Forces) troops in the Anbar to wrest back control of Ramadi. And this – unusually – comes with the blessings of Anbar’s Sunni tribes who voted overwhelmingly to appeal to the Hashd for military assistance.
  • Joining the Hashd are a few thousand Sunni fighters, making this a politically palatable response. If the Ramadi operation goes well, this joint Sunni-Shiite effort (which also proved successful in Tikrit) could provide Iraq with a model to emulate far and wide. The recent losses in Syria and Iraq have galvanized IS’ opponents from Lebanon to Iran to Russia, with commitments pouring in for weapons, manpower and funds. If Ramadi is recovered, this grouping is unlikely to halt its march, and will make a push to the Syrian border through IS-heavy territory. There is good reason for this: the militants who took Ramadi came across the Syrian border – in full sight of US reconnaissance capabilities. A senior resistance state official told me earlier this year: “We will not allow the establishment of a big (extremist) demographic and geographic area between Syria and Iraq. We will work to push Syrian ISIS inside Syria and Iraqi ISIS inside Iraq.”
  • Right now, the key to pushing back Takfiri gains inside Syria’s eastern and northwestern theaters lies in the strengthening of the Iraqi military landscape. And an absolute priority will be in clearing the IS ‘buffer’ between the two states. Eighteen months ago, in an analysis about how to fight jihadist militants from the Levant to the Persian Gulf, I wrote that the solution for this battle will be found only within the region, specifically from within those states whose security is most compromised or under threat: Lebanon, Syria, Iraq and Iran. I argued that these four states would be forced to increase their military cooperation as the battles intensified, and that they would provide the only ‘boots on the ground’ in this fight. And they will. But air cover is a necessary component of successful offensive operations, even in situations of unconventional warfare. If the US and its flimsy Coalition are unable or unwilling to provide the required reconnaissance assistance and the desired aerial coverage, as guided by a central Iraqi military command, then Iraq should look elsewhere for help.
  • Iran and Russia come to mind – and we may yet get there. Iraq and Syria need to merge their military strategies more effectively – again, an area where the Iranians and Russians can provide valuable expertise. Both states have hit a dangerous wall in the past few weeks, and the motivation for immediate and decisive action is high today. Lebanese resistance group Hezbollah is coming into play increasingly as well – its Secretary-General Hassan Nasrallah has recently promised that Hezbollah will no longer limit itself geographically, and will go where necessary to thwart this Takfiri enemy. The non-state actors that make up the jihadist and Takfiri core cannot be beaten by conventional armies, which is why local militias accustomed to asymmetric warfare are best suited for these battles. Criticizing the US’s utterly nonexistent response to the Ramadi debacle yesterday, Iran’s elite Quds Force Commander Qassem Suleimani points out: “Today, there is nobody in confrontation with [IS] except the Islamic Republic of Iran, as well as nations who are next to Iran or supported by Iran.” The Iranians have become central figures in the fight against terror, and are right next door to it – as opposed to Washington, over 6,000 miles away.
  • If the US has any real commitment to the War on Terror, it should focus on non-combat priorities that are also essential to undermine extremism: 1) securing the Turkish and Jordanian borders to prevent any further infiltration of jihadists into Syria and Iraq, 2) sanctioning countries and individuals who fund and weaponize the Takfiris, most of whom are staunch US allies, now ironically part of the ‘Coalition’ to fight IS, and 3) sharing critical intelligence about jihadist movements with those countries engaged in the battle. It is time to cut these losses and bring some heavyweights into this battle against extremism. If the US-directed Coalition will not deliver airstrikes under the explicit command of sovereign states engaged at great risk in this fight, it may be time to clear Iraqi and Syrian airspace of coalition jets, and fill those skies with committed partners instead.
  • Related documentation: DIA Doc Syria and Iraq:_ Pg.-291-Pgs.-287-293-JW-v-DOD-and-State-14-812-DOD-Release-2015-04-10-final-version11.
  •  
    Woh! Things definitely coming to an inflexion point in Syria and Iraq. This is a reprint from RT.com, the Russian video and web page news service. The hint of direct and overt military action by Russia and Iran should not be ignored. The U.S. is sandbagging for ISIL and al Nusiryah. 
1More

Air Force: Cyber Warriors Need Plenty of Rest - 0 views

  • The document discusses the general conduct of Air Force cyber operations, including so-called “Real-Time Operations & Innovation” (RTOI) projects that enable the USAF “to generate tools and tactics in response to critical cyber needs at the fastest possible pace.” See Cyberspace Operations and Procedures, Air Force Instruction 10-1703, volume 3, 5 May 2015. With the growing normalization of defensive and (especially) offensive military operations in cyberspace, more and more U.S. military doctrine governing such activity is gradually being published on an unclassified basis. Some of the principal components of this emerging open literature include the following: Cyberspace Operations, Joint Publication 3-12, 5 February 2013 Cyberspace Operations, Air Force Policy Directive 10-17, 31 July 2012 Command and Control for Cyberspace Operations, Air Force Instruction 10-1701, 5 March 2014 Legal Reviews of Weapons and Cyber Capabilities, Air Force Instruction 51-402, 27 July 2011 Information Assurance (IA) and Support to Computer Network Defense (CND), Chairman of the Joint Chiefs of Staff Instruction 6510.01F, 9 February 2011 Department of Defense Strategy for Operating in Cyberspace, July 2011
6More

The Debt To GDP Ratio For The Entire World: 286 Percent Washington's Blog - 0 views

  • Did you know that there is more than $28,000 of debt for every man, woman and child on the entire planet?  And since close to 3 billion of those people survive on less than 2 dollars a day, your share of that debt is going to be much larger than that.  If we took everything that the global economy produced this year and everything that the global economy produced next year and used it to pay all of this debt, it still would not be enough.  According to a recent report put out by the McKinsey Global Institute entitled “Debt and (not much) deleveraging“, the total amount of debt on our planet has grown from 142 trillion dollars at the end of 2007 to 199 trillion dollars today.  This is the largest mountain of debt in the history of the world, and those numbers mean that we are in substantially worse condition than we were just prior to the last financial crisis.
  • When it comes to debt, a lot of fingers get pointed at the United States, and rightly so.  Just prior to the last recession, the U.S. national debt was sitting at about 9 trillion dollars.  Today, it has crossed the 18 trillion dollar mark.  But of course the U.S. is not the only one that is guilty.  In fact, the McKinsey Global Institute says that debt levels have grown in all major economies since 2007.  The following is an excerpt from the report… Seven years after the bursting of a global credit bubble resulted in the worst financial crisis since the Great Depression, debt continues to grow. In fact, rather than reducing indebtedness, or deleveraging, all major economies today have higher levels of borrowing relative to GDP than they did in 2007. Global debt in these years has grown by $57 trillion, raising the ratio of debt to GDP by 17 percentage points (Exhibit 1). That poses new risks to financial stability and may undermine global economic growth. What is surprising is that debt has actually grown the most in China.  If you can believe it, total Chinese debt has grown from 7 trillion dollars in 2007 to 28 trillion dollars today.  Needless to say, that is absolutely insane…
  • What all of this means is that our long-term global economic problems have gotten much, much worse.  This short-lived period of relative stability that we have been enjoying has been fueled by unprecedented amounts of debt and voracious money printing.  Anyone with half a brain should be able to see that this is a giant financial bubble, and in the end it is going to unwind very, very painfully.  The following comes from a Canadian news source… At the beginning of 2008, government accounted for a smaller portion of the debt pie than corporate, household or financial debt. It now exceeds each of those other categories. “The current situation is much worse than in 2000 or 2007, and with interest rates near or at zero, the central banks have already used up their ammunition. Plus, the total indebtedness, especially the indebtedness of governments, is much higher than ever before,” said Claus Vogt, a Berlin-based analyst and co-author of a 2011 book titled The Global Debt Trap.
  • ...3 more annotations...
  • “Every speculative bubble rests on some kind of a fairy tale, a story the bubble participants believe in and use as rationalization to buy extremely overvalued stocks or bonds or real estate,” Mr. Vogt argued. “And now it is the faith in the central-planning capabilities of global central bankers. When the loss of confidence in the Fed, the ECB etc. begins, the stampede out of stocks and bonds will start. I think we are very close to this pivotal moment in financial history.” But for the moment, the ridiculous stock market bubble continues.
  • Internet companies that didn’t even exist a decade ago are now supposedly worth billions upon billions of dollars even though some of them don’t make any money at all.  There is even a name for this phenomenon.  Internet companies that have gigantic valuations without gigantic revenue streams are being called “unicorns”… A dizzying mix of bold ideas and lavish investments has catapulted dozens of privately held start-ups to unicorn status, defined as having market valuations of at least $1 billion often without soaring revenues to match. Social-sharing site Pinterest has soared to $11 billion. Ride-hailing company Uber is now worth a staggering $50 billion. How long can the party last?
  • Sadly, the truth is that Wall Street is headed for a very painful awakening. What we are experiencing right now is the greatest financial bubble of all time. What comes after that is going to be the greatest financial crash of all time. 199,000,000,000,000 dollars of debt is about to come crashing down, and the pain of this disaster will be felt by every man, woman and child on the entire planet.
2More

NSA Surveillance: Snowden Docs Raise Questions About U.S. Phone Calls - 0 views

  • Third in a series. Part 1 here; Part 2 here. When it comes to the National Security Agency’s recently disclosed use of automated speech recognition technology to search, index and transcribe voice communications, people in the United States may well be asking: But are they transcribing my phone calls? The answer is maybe. A clear-cut answer is elusive because documents in the Snowden archive describe the capability to turn speech into text, but not the extent of its use — and the U.S. intelligence community refuses to answer even the most basic questions on the topic.
  • thanks to previous explorations of the Snowden archive and some documents released by the Obama administration, we know there are four major methods the NSA uses to get access to phone calls involving Americans — and only one of them technically precludes the use of speech recognition.
1More

Secret Document: How the NSA Spied on Iranians in New York - NBC News - 0 views

  • The NSA will probably spy on foreign leaders like Iranian President Hassan Rouhani during the UN General Assembly in New York this week, applying a "full court press" that includes intercepting cellphone calls and bugging hotel rooms, former intelligence analysts told NBC News. A top-secret report on a previous NSA operation against Iran's U.N. delegation illustrates just how extensive this electronic surveillance can be. The document, obtained by NBC News, shows the U.S. bugged the hotel rooms and phones of then-Iranian President Mahmoud Ahmadinejad and his entire 143-member delegation in 2007, listening to thousands of conversations and learning the "social networks" of Iran's leadership. The three-page document, called "Tips for a Successful Quick Reaction Capability," recounted what happened when the NSA was asked by the Bush administration for blanket surveillance of Ahmadinejad's September 2007 trip to the UNGA.
6More

Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global ... - 0 views

  • One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens  all without a court order or judicial warrant.
  • The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
  • GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
  • ...3 more annotations...
  • GCHQ vacuums up the website browsing histories using “probes” that tap into the international fiber-optic cables that transport Internet traffic across the world. A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events”  a term the agency uses to refer to metadata records  with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held  41 percent  was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it saidwould be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.” HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs.
  • The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
3More

NSA head: We need bulk collection | TheHill - 0 views

  • The head of the National Security Agency on Thursday told Senate lawmakers that preventing his agency from collecting Americans’ information in bulk would make it harder to do its job.Under questioning before the Senate Intelligence Committee, Adm. Michael Rogers agreed that ending bulk collection would “significantly reduce [his] operational capabilities.”ADVERTISEMENT“Right now, bulk collection gives us the ability ... to generate insights as to what’s going on,” Rogers told the committee.The NSA head also referenced a January report from the National Academy of Sciences that concluded there is “no software technique that will fully substitute for bulk collection” because of the ability to search through the storehouse of old information. “That independent, impartial, scientifically-founded body came back and said no, under the current structure there is no real replacement,” Rogers said.Rogers was questioned on Thursday by Sen. Ron Wyden (D-Ore.), a member of the Intelligence Committee who has become its most vocal privacy hawk.
  • In response to the NSA head’s comments, Wyden pointed to a 2013 White House review group, which found that one controversial NSA bulk collection program “was not essential to preventing attacks” and that the information obtained by the NSA “could readily have been obtained in a timely manner using” other means.The debate follows on a congressional clash earlier this year over the NSA’s bulk collection of records about the phone calls of millions of Americans. The records contained information about whom people called and when but not what they talked about.
  • After a brief lapsing of some portions of the Patriot Act, Congress eventually reined in the NSA by forcing it to go through the courts to search private phone companies’ records for a narrower set of records. Many privacy advocates treated the new law, called the USA Freedom Act, as a significant victory, through national security hawks worried that it would make it harder for the NSA to track terrorists.Under the new system — which has not gone into effect yet — the amount of time it takes to obtain those records “is probably going to be longer I suspect,” Rogers said.Though the phone records database has been the NSA’s most prominent bulk collection program, it is not the only one. The agency’s collection of vast amounts of Internet data has alarmed many privacy advocates and is the target of a current lawsuit from Wikipedia and the American Civil Liberties Union. 
3More

Glenn Greenwald: Spying not about terror - Jose DelReal - POLITICO.com - 0 views

  • Journalist Glenn Greenwald is once again rejecting claims that he and National Security Agency leaker Edward Snowden are endangering American efforts to fight terrorism — and he’s using recent reports that the NSA might have spied on German Chancellor Angela Merkel to prove his point.“What we revealed is that this spying system is devoted not to terrorists, but is directed to innocent people around the world,” Greenwald told CNN’s Christiane Amanpour in an interview that aired Monday. “None of this has anything to do with terrorism. Is Angela Merkel a terrorist?”
  • “This is clearly about political power and economic espionage. And the claim that this is all about terrorism is seen around the world as what it is, which is pure deceit,” he added.
  • Greenwald insisted that his reporting and Snowden’s leaks are exposing the unnecessary expansiveness of the NSA spying program. “Every terrorist who is capable of tying their own shoes has long known that the U.S. government and the U.K. government are trying to monitor their communications in every way that they can,” Greenwald said. “That isn’t new. We didn’t reveal anything to terrorists that they didn’t already know.” Amanpour’s full interview with Greenwald will air Monday evening on CNN.
7More

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
8More

Report: Russia to send marines to Syria - Yahoo! News - 0 views

  • Two Russian navy ships are completing preparations to sail to Syria with a unit of marines on a mission to protect Russian citizens and the nation's base there, a news report said Monday. The deployment appears to reflect Moscow's growing concern about Syrian President Bashar Assad's future.
  • The Interfax news agency quoted an unidentified Russian navy official as saying that the two amphibious landing vessels, Nikolai Filchenkov and Caesar Kunikov, will be heading shortly to the Syrian port of Tartus, but didn't give a precise date.
  • Each ship is capable of carrying up to 300 marines and a dozen tanks, according to Russian media reports. That would make it the largest known Russian troop deployment to Syria, signaling that Moscow is becoming increasingly uneasy about Syria's slide toward civil war. Interfax also quoted a deputy Russian air force chief as saying that Russia will give the necessary protection to its citizens in Syria. "We must protect our citizens," Maj.-Gen. Vladimir Gradusov was quoted as saying. "We won't abandon the Russians and will evacuate them from the conflict zone, if necessary." Asked whether the air force would provide air support for the navy squadron, Gradusov said they will act on orders.
  • ...4 more annotations...
  • Asked if the Pentagon is concerned about the plan, officials in Washington said it depends on the mission. They had no comment on the stated goal of protecting Russian citizens and the Russian military position there, something the U.S. would do in a foreign country if in a similar situation. "I think we'd leave it to the Russian Ministry of Defense to speak to their naval movements and their national security decision-making process," said Capt. John Kirby, a Pentagon spokesman, adding that it's not the business of the U.S. Defense Department to "endorse or disapprove of an internal mission like that."
  • What would greatly concern the U.S., he said, is if the Russian naval ships were taking weapons or sending people to support the Assad regime in its crackdown. "The secretary of defense (Leon Panetta) remains concerned about any efforts by external countries or external organizations to supply lethal arms to the Syrian regime so that they can turn around and use those to kill their own people," Kirby said.
  • Ta rtus is Russia's only naval base outside the former Soviet Union, serving Russian navy ships on missions to the Mediterranean and hosting an unspecified number of military personnel.
  • Opposition groups say more than 14,000 people have been killed since the Syrian uprising began in March 2011 with mostly peaceful protests against Assad's autocratic regime. But a ferocious government crackdown led many to take up arms, and the conflict is now an armed insurgency.
  •  
    The U.S. propaganda effort is in full bloom in this article rife with "Red Menace" Cold War overtones: "'The secretary of defense (Leon Panetta) remains concerned about any efforts by external countries or external organizations to supply lethal arms to the Syrian regime so that they can turn around and use those to kill their own people,' Kirby said." Even as the U.S. has decided to now do openly rather than through its Saudi and Qatari proxies? More than 14,000 killed in Syria since the "uprising" began? The U.N. reported about a week ago that its tool stands at 93,000, up from its previous figure of 80,000. The U.N. numbers are undoubtedly understated. They only count the dead whose names are reported to avoid duplicate counting. The nameless are ignored. "[T]he Syrian uprising began in March 2011 with mostly peaceful protests ..." Syria has been on the Israeli/Neocon hit list for many years as part of Israel's empirical ambitions, which requires destabilizing and  balkanizing surrounding nations. But the Syrian ambitions came to the fore after U.S. deployments to Iraq, Afghanistan, and Libya wound down and Israel, Qatar, and Saudi Arabia decided they wished to exploit large natural gas deposits in Qatar and off the Israeli coast via a pipeline through Syria to connect with an existing pipeline supplying the E.U. with a terminus in Turkey, all at the expense of an existing Russian monopoly on natural gas sales in the E.U. To boot, Syria is the ally of Iran, which is also on the Israeli hit list.  "[T]he conflict is now an armed insurgency."  Vocabulary please? "An insurgency is an armed rebellion against a constituted authority (for example, an authority recognized as such by the United Nations) when those taking part in the rebellion are not recognized as belligerents." It's not a rebellion; it is a proxy war against Syria being waged mostly by foreign mercenaries and jihadists. An "insurgency" is a military rebellion by citizens of the nation being
2More

Countering the Islamic State, and More from CRS - 0 views

  • Some 60 nations and partner organizations have made commitments to help counter the Islamic State with military forces or resources, according to a new report from the Congressional Research Service. But coalition efforts suffer from a lack of coherence, CRS said. “Without a single authority responsible for prioritizing and adjudicating between different multinational civilian and military lines of effort, different actors often work at cross-purposes without intending to do so.” CRS tabulated the contributions of each of the coalition partners by country and capability. “Each nation is contributing to the coalition in a manner commensurate with its national interests and comparative advantage, although reporting on nonmilitary contributions tends to be sporadic,” the report said. “Some illustrative examples of the kinds of counter-IS assistance countries provided as the coalition was being formed in September 2014 include: Switzerland’s donation $9 million in aid to Iraq, Belgium’s contribution of 13 tons of aid to Iraq generally, Italy’s contribution of $2.5 million of weaponry (including machine guns, rocket-propelled grenades and a million rounds of ammunition), and Japan’s granting of $6 million in emergency aid to specifically help displaced people in Northern Iraq.” See Coalition Contributions to Countering the Islamic State, August 4, 2015.
  •  
    Meanwhile, back at the ranch ... The U.S. and its allies continue to provide ISIL with mercenaries, funding, weapons, supplies, and leadership. Nice racket for the war industry. 
3More

Saudi Prince Threatens 'Military Action Without American Support' Against Iran | MRCTV - 0 views

  • In the first public criticism of the P5+Iran deal by a member of the Saudi Arabian royal family, Prince Bandar bin Sultan told Lebanon’s Daily Star the deal would allow Iran to acquire a nuclear bomb and would “wreak havoc in the region." Covered in The Times of London, the prince also told Daily Star, "Saudi Arabia and the Gulf powers are prepared to take military action without American support after the Iran nuclear deal" Iran and Saudi Arabia are the two leading players in the Sunni/Shia divide and are competing for leadership of the Muslim world. The Sunni Islam Saudi Arabian monarchy fears that the Shia Islam Iranians will employ terrorists in an attempt topple the monarchy and the ruling House of Saud.  Prince Bandar was the Saudi ambassador to Washington for 20 years before returning home to run the country’s intelligence service from 2005-2014. While he is no longer a part of the inner ring of Saudi decision-making, the prince is still a very connected member of the ruling family. The prince would not be conducting interviews without the permission of highest authorities; most likely he was asked to to put himself out there by his uncle King Salman.
  • The Prince also said that regional powers have lost faith in America: “People in my region now are relying on God’s will, and consolidating their local capabilities and analysis with everybody else except our oldest and most powerful ally” The prince was less polite in an op-ed he wrote for the London-based Arabic news Web site Elaph. He compared the Iran nuclear deal made by Obama to the North Korean nuclear deal Bill Clinton made.  Bandar suggested that they were both bad deals but Clinton made a bad deal with the best of intentions thinking it was a good deal. Obama on the other hand knew he was making a lousy deal and made it anyway.  Quoted in a Washington Post article which translated part of the Elaph piece: Bandar says [about the North Korean pact], "it turned out that the strategic foreign policy analysis was wrong and there was a major intelligence failure." He added that if Clinton had known the full picture, "I am absolutely confident he would not have made that decision."
  • The Saudi royal then contrasts this with the present situation with Iran, "where the strategic foreign policy analysis, the national intelligence information, and America’s allies in the region's intelligence all predict not only the same outcome of the North Korean nuclear deal but worse – with the billions of dollars that Iran will have access to." Bandar says Obama is smart enough to understand this but that he is ideologically willing to accept collateral damage because he believes he is right. (..)The Saudi prince says the new Iran deal and other developments in the region have led him to conclude that a phrase first used by Henry Kissinger – “America’s enemies should fear America, but America’s friends should fear America more" – is correct.
3More

U.N. Moves to Lift Iran Sanctions After Nuclear Deal, Setting Up a Clash in Congress - ... - 0 views

  • The United Nations Security Council on Monday unanimously approved a resolution that creates the basis for international economic sanctions against Iran to be lifted, a move that incited a furious reaction in Israel and potentially sets up an angry showdown in Congress.The 15-to-0 vote for approval of the resolution — 104 pages long including annexes and lists — was written in Vienna by diplomats who negotiated a landmark pact last week that limits Iran’s nuclear capabilities in exchange for ending the sanctions.
  • The European Union also approved the Iran nuclear deal on Monday, putting in motion the lifting of its own sanctions, which include prohibitions on the purchase of Iranian oil. Europe will continue to prohibit the export of ballistic missile technology and sanctions related to human rights.
  • Diplomats have warned that if the United States Congress refuses to lift American penalties against Iran, the Iranians may renege on their commitments as well, which could result in a collapse of the entire deal.The resolution takes effect in 90 days, a time frame negotiated in Vienna to allow Congress, where members have expressed strong distrust of the agreement, to review it. President Obama, who has staked much of his foreign policy ambitions on the Iran pact, has vowed to veto a congressional rejection of the nuclear accord.The resolution will not completely lift all Council restrictions on Iran. It maintains an arms embargo, and sets up a panel to review the import of sensitive technology on a case-by-case basis.It also sets up a way to renew sanctions if Iran does not abide by its commitments. In the event of an unresolved dispute over Iran’s enrichment activities, the United Nations sanctions snap back automatically after 30 days. To avoid the sanctions renewal requires a vote of the Council — giving skeptics, namely the United States, an opportunity to veto it.
2More

ISIS Has Fired Chemical Mortar Shells, Evidence Indicates - The New York Times - 0 views

  • The Islamic State appears to have manufactured rudimentary chemical warfare shells and attacked Kurdish positions in Iraq and Syria with them as many as three times in recent weeks, according to field investigators, Kurdish officials and a Western ordnance disposal technician who examined the incidents and recovered one of the shells.The development, which the investigators said involved toxic industrial or agricultural chemicals repurposed as weapons, signaled a potential escalation of the group’s capabilities, though it was not entirely without precedent.Beginning more than a decade ago, Sunni militants in Iraq have occasionally used chlorine or old chemical warfare shells in makeshift bombs against American and Iraqi government forces. And Kurdish forces have claimed that militants affiliated with the Islamic State, also known as ISIS or ISIL, used a chlorine-based chemical in at least one suicide truck bomb in Iraq this year.
  •  
    Ten years ago. My, oh my. This is one of the same newspapers who faithfully parroted the Obama Administration line that the Syrian government had to have done the chemical attack in Ghouta because Al Nusrah didn't have the technical expertise. 
4More

France Targeted by NSA Spies and Parliament Passes Surveillance Law - 0 views

  • On Wednesday, France woke up to find that the National Security Agency had been snooping on the phones of its last three presidents. Top-secret documents provided by WikiLeaks to two media outlets, Mediapart and Libération, showed that the NSA had access to confidential conversations of France’s highest ranking officials, including the country’s current president, François Hollande; the prime minister in 2012, Jean-Marc Ayrault; and former presidents Nicolas Sarkozy and Jacques Chirac. Yet also today, the lower house of France’s legislature, the National Assembly, passed a sweeping surveillance law. The law provides a new framework for the country’s intelligence agencies to expand their surveillance activities. Opponents of the law were quick to mock the government for vigorously protesting being surveilled by one of the country’s closest allies while passing a law that gives its own intelligence services vast powers with what its opponents regard as little oversight. But for those who support the new law, the new revelations of NSA spying showed the urgent need to update the tools available to France’s spies.
  • The response from the French government today was firm but predictable. Senior intelligence officials will travel to the U.S. to meet their counterparts in Washington, while the U.S. ambassador in Paris was summoned to the Elysee Palace. A similar scenario played out in 2013, when Le Monde published Snowden documents that revealed some of the extent of American surveillance in France. Prime Minister Manuel Valls said today that he wants a “code of conduct” to guide the relationship between France and the U.S. on intelligence activities — but the government demanded the exact same thing almost two years ago. When The Intercept published NSA documents in March indicating the Five Eyes — the NSA’s core allies — were intercepting large swaths of internet traffic in France’s Pacific islands, an official protest from France was nowhere to be heard. Even when it appeared that France’s closest ally, Germany, was using its surveillance capabilities to spy, on behalf of the NSA, on France’s foreign affairs ministry and some of the country’s most strategic companies, French authorities remained silent.
  • Until the law was passed, France’s intelligence services operated almost without any laws to regulate them. Although the new law delivers a much-needed framework, its safeguards are regarded by many critics as insufficient. The powers of the oversight body in charge of the intelligence agencies have been slightly strengthened and it will be possible, if a citizen suspects she is being surveilled, to take her case before the Conseil d’Etat, France’s highest court. But other parts of the law have drawn controversy, including the way it defines the purposes the government can invoke to surveil French residents. The categories extend well beyond terrorism. Many opponents of the law think these guidelines are so broad that they could enable political surveillance. But the key point of disagreement is what the government calls “black boxes.” The law allows the use of government equipment inside Internet Service Providers and large web companies to analyze streams of metadata and find “terrorist” patterns and behaviors.
  • ...1 more annotation...
  • The country’s intelligence community got everything it wanted — almost. An amendment that would remove any oversight of surveillance of foreigners, targeting chief executives and foreign spies, had been demanded by France’s top spy, Bernard Bajolet, the director general of external security, during a hearing at the National Assembly a few weeks ago, but the government opposed it and managed to get rid of it before the final vote. Yet, the government added a last minute amendment that tears to pieces the meager whistleblower protection the bill was supposed to set up. The end result is that most of what France’s intelligence services have been doing in the dark is now authorized by law.
2More

North Dakota Allows Cops To Arm Their Drones With Tasers And Tear Gas | ThinkProgress - 0 views

  • There’s a new sheriff on the high plains. Or rather, just above them. North Dakota’s police agencies can fly drones armed with Tasers, tear gas, bean-bag cannons, and other “less-lethal” weapons, thanks to fierce lobbying from the law enforcement industry on a bill that was initially meant to restrict police use of the flying robots rather than outfit them with weapons. While other local police departments have flirted with weaponizing their drones, North Dakota is the first state to explicitly allow the armaments. When State Rep. Rick Becker introduced H.B. 1328, the law both banned weaponized drones and established a procedure for law enforcement to seek a warrant before using drones in searches. Only the warrant requirement survived. After stiff lobbying and a multi-stage public relations effort by law enforcement and drone proponents, first reported by The Daily Beast, the version of the bill that ultimately passed authorized police to arm their unmanned aerial vehicles with sound cannons, pepper spray, and other weapons not designed to kill. The weaponization of law enforcement drones could facilitate police abuse of force. Military drone pilots can develop a “Playstation mentality” toward their deadly work, according to United Nations official. The physical remove of a drone pilot desensitizes him, the thinking goes, and makes it easier to be rash about deploying his armaments. Pilots themselves contest this desensitization claim, however, and there’s reason to think military drone operators experience post-traumatic stress disorder despite sitting far from the battlefield.
  • Police drones won’t have Hellfire missiles, of course. But the weapons North Dakota’s law enforcement drones are authorized to use under state law are still capable of causing serious injury and death. 39 people have been killed by police Tasers in 2015 thusfar, according to The Guardian. Rubber bullets can kill, and most non-lethal weapons can inflict grievous and lasting harm. Law enforcement operations are already monitoring civil rights activists affiliated with the Black Lives Matter movement, using a combination of undercover officers, social media snooping, and cell phone monitoring technology called Stingray. An FBI-provided aerial surveillance plane was also on hand during the unrest in Baltimore following the killing of Freddie Gray by police. Should drones equipped with remote-controlled Tasers and tear gas come into wider use, it seems likely they’d be incorporated into crowd control and demonstration monitoring efforts. In such uses, officers far from the scene of unrest could make bloodless decisions about how to deploy drone weaponry, potentially escalating tense situations.
3More

US Still Won't Confirm Israeli Nukes | Consortiumnews - 0 views

  • Among the more absurd aspects of U.S. foreign policy is the persistent refusal to confirm that Israel has a nuclear arsenal, even as U.S. officials threaten and even attack other countries for allegedly harboring the intent to build a single bomb, hypocrisy that Sam Husseini dissects.
  •  Philip Gordon, former special White House assistant on the Middle East and now at the Council on Foreign Relations, was recently asked on C-Span if it “isn’t time for the U.S. to stop officially pretending that it doesn’t know whether Israel has nuclear weapons?”Gordon replied that there’s not a lot of doubt about the “the existence of a nuclear weapons capability in Israel,” but that a U.S. acknowledgement of that fact would be irrelevant. For instance, he argued that “Iranian nuclear aspiration is driven significantly by their insecurity” resulting from U.S. actions in the region, not Israel’s nuclear weapons. (Transcript below)What’s perhaps most remarkable about Gordon’s response is that it shows U.S. officials being more willing to point to U.S. government actions as a destabilizing factor in the region than the actions of the Israeli government. Somehow, a cost-free action of simply acknowledging the empirical fact of Israel’s nuclear arsenal is not to be considered.
  •  
    Of course the U.S. will not officially admit that Israel has nuclear weapons, because if it did acknowledge the fact then we could have a public debate about how to disarm the Israelis. Nonetheless, the U.S. did recently release documents pursuant to the Freedom of Information Act demonstrating detailed U.S. awareness of the Israeli nukes for decades.
1More

Chris Christie: Fears Over NSA Spying Powers 'Ridiculous' | Watch the video - Yahoo News - 0 views

  • Chris Christie called for strengthening U.S. intelligence gathering capabilities and downplayed the privacy concerns expressed by some of his Republican colleagues during a national security address Monday. The Garden State Republican called for renewal of the Patriot Act as key provisions of the controversial legislation are set to expire at the end of the month. Republican senators and presidential candidates Rand Paul and Ted Cruz support replacing some provisions of the Patriot Act with alternative legislation that would reform the National Security Agency's bulk collection of phone records.
« First ‹ Previous 241 - 260 of 383 Next › Last »
Showing 20 items per page