Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "capabilities" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

Why the threat of ISIL is exaggerated - Al Jazeera English - 0 views

  • One year since the Islamic State of Iraq and the Levant (ISIL) took over Mosul and large swaths of territory in both Syria and Iraq, and despite the nine month-old US-led Operation Inherent Resolve to defeat it, ISIL is still standing, and expanding. The group's recent territorial gains in Syria and Iraq are alarming. Political and military analysts interviewed by Al Jazeera, provide a more sober assessment of ISIL's capacity in both Syria and Iraq behind the sensationalism of the group's propaganda machine and Western punditry's fears of a wholesale ISIL takeover of Iraq and Syria.
  • The factors that will eradicate ISIL lie in its own ideology which is based on an idealistic and puritan approach to exercise political power. At the end, there are several factors that are crucial to understanding the mechanism that helped ISIL rise and expand and how it will retreat and fall. While ISIL has developed its own military capabilities, its existence, however, hinges on and is subject to the changing political and regional conditions. This dependency makes its existence temporary and not a permanent one.
3More

Justice Dept. to Require Warrants for Some Cellphone Tracking - The New York Times - 0 views

  • The Justice Department will regularly require federal agents to seek warrants before using secretive equipment that can locate and track cellphones, the agency announced Thursday, the first regulations on an increasingly controversial technology.The new policy, which also limits what information may be collected and how long it can be stored, puts a measure of judicial oversight on a technology that was designed to hunt terrorists overseas but has become a popular tool among federal agents and local police officers for fighting crime.Civil libertarians have expressed grave privacy concerns about the technology’s proliferation, but the new Justice Department policies do not apply to local police forces.
  • The device, commonly called a cell-site simulator or StingRay, tricks cellphones into connecting with it by acting like a cell tower, allowing the authorities to determine the location of a tracked phone. In doing so, however, the equipment also connects with all other phones in the area, allowing investigators to collect information on people not suspected of any crime.The device is also capable of capturing calls, text messages, emails and other data. Until Thursday’s regulations, the rules for the use of that information and the duration it could be kept had not been detailed and varied across the department’s offices and agencies.
  •  
    A policy is not a law. DoJ is trying to spread some tanglefoot for civil liberties organizations that are prepping litigation over unfettered abuse of Stingray devices by federal, state, and local officials. Warrantless use of Stingrays has been severely undermined by recent Supreme Court rulings, notably U.S. v. Jones and Riley v. California.
2More

Pentagon's Cyber Mission Force Takes Shape - 0 views

  • The Department of Defense plans to complete the establishment of a new Cyber Mission Force made up of 133 teams of more than 6000 “cyber operators” by 2018, and it’s already nearly halfway there. From FY2014-2018, DoD intends to spend $1.878 billion dollars to pay for the Cyber Missions Force consisting of approximately 6100 individuals in the four military services, DoD said in response to a question for the record that was published in a congressional hearing volume last month. “This effort began in October 2013 and today we have 3100 personnel assigned to 58 of the 133 teams,” or nearly 50% of the intended capacity, DoD wrote in response to a question from Rep. Rick Larsen (D-WA) of the House Armed Services Committee. The response was included in the published record of a February 26, 2015 Committee hearing (page 67). The DoD Cyber Mission Force was described in an April 2015 DoD Cyber Strategy and in April 2015 testimony by Assistant Secretary of Defense Eric Rosenbach: “The Department of Defense has three primary missions in cyberspace: (1) defend DoD information networks to assure DoD missions, (2) defend the United States against cyberattacks of significant consequence, and (3) provide full-spectrum cyber options to support contingency plans and military operations,” Mr. Rosenbach said.
  • “To carry out these missions, we are building the Cyber Mission Force and equipping it with the appropriate tools and infrastructure to operate in cyberspace. Once fully manned, trained, and equipped in Fiscal Year 2018, these 133 teams will execute USCYBERCOM’s three primary missions with nearly 6,200 military and civilian personnel,” Mr. Rosenbach said at an April 14 hearing of the Senate Armed Services Committee. The new Cyber Mission Force will naturally have both defensive and offensive characteristics. “Congressman, we are building these cyber teams… in order to, one, protect ourselves from cyber attacks,” said Adm. Cecil D. Haney, commander of U.S. Strategic Command. “We are being probed on a daily basis by a variety of different actors.” “The protection side is one thing,” said Rep. Larsen at the February hearing of the House Armed Services Committee. “What about the other side?” “The other aspect of it, we are distributing these forces out to the various combatant commands so that they can be integrated into our overall joint military force capability,” Adm. Haney replied.
6More

Exclusive: This Is the ISIS Intel the U.S. Military Dumbed Down - The Daily Beast - 0 views

  • The intelligence pros said killing certain ISIS leaders might not diminish the group and that airstrikes might not be working. The bosses didn’t like those answers—not at all.Senior intelligence officials at the U.S. military’s Central Command demanded significant alterations to analysts’ reports that questioned whether airstrikes against the so-called Islamic State widely known as ISIS were damaging the group’s finances and its ability to launch attacks. But reports that showed the group being weakened by the U.S.-led air campaign received comparatively little scrutiny, The Daily Beast has learned. Senior CENTCOM intelligence officials who reviewed the critical reports sent them back to the analysts and ordered them to write new versions that included more footnotes and details to support their assessments, according to two officials familiar with a complaint levied by more than 50 analysts about intelligence manipulation by CENTCOM higher-ups.
  • In some cases, analysts were also urged to state that killing particular ISIS leaders and key officials would diminish the group and lead to its collapse. Many analysts, however, didn’t believe that simply taking out top ISIS leaders would have an enduring effect on overall operations. “There was the reality on the ground but it was not as rosy as [the leadership] wanted it to be,” a defense official familiar with the complaint told The Daily Beast. “The challenge was assessing whether the glass was half empty, not half full.”Some analysts have also complained that they felt “bullied” into reaching conclusions favored by their bosses, two separate sources familiar with analysts’ complaints said. The written and verbal pressure created a climate at CENTCOM in which analysts felt they had to self-censor some of their reports.
  • Some of the analysts have also accused their bosses of changing the reports in order to appeal to what they perceived as the Obama administration’s official line that the anti-ISIS campaign was making progress and would eventually end with the group’s destruction.Lawmakers and even presidential candidates seized on the allegations of politicizing intelligence as the White House tried to distance itself from the very strategy it has been pursuing.
  • ...3 more annotations...
  • Army General Lloyd Austin came under withering bipartisan criticism on Wednesday when he testified before the Senate Armed Services Committee that after spending at least $43 million over a 10-month period, the U.S. had trained only nine fighters to confront ISIS in Syria. Senators were dumbfounded that the nearly year-long effort had produced such paltry results, calling it “a joke” and “an abject failure.”
  • Meanwhile, Pentagon investigators are examining the back-and-forth between the intelligence bosses at CENTCOM and the analysts, which created a paper trail. Favorable reports had fewer comments written on them, and requests that were more critical showed heavy questioning, the two officials said. The altering of intelligence led to reports that overstated the damage that U.S. strikes had on specific ISIS targets. For instance, strikes on oil refineries and equipment were said to have done more damage to the group’s financing of operations through illicit oil sales than the analysts believed. Also, strikes on military equipment were said to have set back the group’s ability to wage combat operations, when the analysts believed that wasn’t always the case.The altered reports made ISIS seem financially weakened and less capable of launching attacks, the analysts allege.
  • The CENTCOM supervisors “did not like the reports on the impact [of the airstrikes] because they didn’t believe it,” one military adviser familiar with CENTCOM operations told The Daily Beast. The Defense Department inspector general has been conducting interviews at CENTCOM headquarters in Tampa, Florida, in order to determine who in the command’s intelligence directorate may have distorted or manipulated the intelligence reports, some of which eventually made their way into materials briefed to President Obama. Investigators have pulled CENTCOM personnel one by one into private interviews to get to the bottom of the allegations and determine who was ultimately responsible for changing intelligence reports, according to individuals with knowledge of the investigation. The inspector general has confirmed that the investigation is focused on the CENTCOM intelligence directorate, or J2. Multiple sources told The Daily Beast that the head of intelligence, Army Major General Steven Grove, is named in the complaint, as are several other senior officials at CENTCOM. The tone of the complaint is said to be harsh and highly critical of senior officials’ leadership and actions.
3More

The Russians are Coming, Sending Troops to Syria, Says the New York Times. It's a Lie |... - 0 views

  • he New York Times is an over-the-top lying machine, systematically suppressing hard truths. Its latest misinformation piece falsely headlined “Russian Soldiers Join Syria Fight,” claiming Moscow “said Monday that its ‘volunteer’ ground forces would join the fight and NATO warned the Kremlin after at least one Russian warplane trespassed into Turkey’s airspace.” More on the so-called air space violation below. The Times accused Moscow of “saber-rattling,” challenging Obama’s Syria agenda, ignoring its lawlessness, saying “(a) Russian ground force could fundamentally alter the conflict.” Putin categorically ruled out using ground troops in Syria. Russian upper house Federation Council foreign affairs committee chairman Konstantin Kosachev said “(w)e would not risk getting stuck in a long conflict and threaten the lives of our troops. The operation is aerial only. Certainly, in coordination with the ground operation of the Syrian army.” Putin called for an international anti-terrorist coalition to fight its scourge, cooperatively with Syrian armed forces, boots on the ground directly engaging ISIS and other takfiri terrorists. Accusing Moscow of using ground troops in Syria repeats the Big Lie about nonexistent “Russian aggression” in Ukraine.
  • On Monday, lower house State Duma defense committee head Admiral Vladimir Komoyedov said it’s “likely that groups of Russian volunteers will appear in the ranks of the Syrian army as combat participants” – not active duty military personnel and not sent by Moscow. He stressed the Kremlin has no plans to use ground forces in Syria. His comments came after Russian Chechnya republic head Ramzan Kadyrov expressed willingness to send Chechen forces to conduct “special operations” if Putin OKs it. Russia’s Black Sea Fleet may block Syria’s coastline, Komoyedov added, saying: Regarding the large-scale use of the Black Sea Fleet in this operation, I don’t think it will happen, but in terms of a coastal blockade, I think that it’s quite (possible). The delivery of artillery strikes hasn’t been excluded. The ships are ready for this, but there is no point in it for now. The terrorists are in deep, where the artillery cannot reach. The Times accused Russia of using troops disguised as volunteers – the same “little green men” Big Lie claim about Ukraine – “stealth tactics…using (Russian) soldiers to seize Crimea…and aid pro-Moscow rebels in eastern Ukraine,” said The Times – polar opposite clear, hard truths. It cited unnamed US military officials, claiming hundreds of “Russian military personnel” are in Syria, preparing for many more to come.
  • The only “Russian military personnel” are ones Moscow publicly explained – advisors and others involved in training Syrian forces to use weapons supplied. The Times repeated the Big Lie about Russia mainly targeting US-supported anti-Assad forces, not ISIS. Sergey Lavrov called the so-called Free Syrian Army a “phantom…(W)here is it,” he asked? (N)othing is known about it. We will be ready to establish contact with it if it’s really a capable military group of patriotic opposition consisting of Syrians. We do not hide this fact. But this structure is already a phantom. I have asked John Kerry to provide us with information about the whereabouts of this Free Syrian Army and who commands it. So far no one has told us where and how this Free Syrian Army operates or where and how other units of the so-called moderate opposition operate. The vast majority of anti-Assad elements are imported terrorists, ISIS and others. Washington maintains the fiction of a moderate opposition. Its bombing campaign strikes Syrian targets, supporting these groups, not fighting them.
3More

US withdraws Patriots despite Turkey's appeal to keep them - 0 views

  • A day after Ankara urged NATO to keep up Patriot defense systems in Turkey following Russian incursions into Turkish airspace over the weekend, the US began withdrawing its Patriot batteries from the country, on Friday, in line with its earlier announcement of pulling out on technical grounds -- for updating its systems -- and its assessment of the downgrading threat level from Syria. Dozens of US trucks transported pieces of batteries and other systems to the port of İskenderun for shipment to the US on Friday. While the US made the decision to withdraw its Patriot systems for mere technical reasons and due to the decreasing threats from Syria, imminent threats in northern Syria precipitated by Russian air strikes against rebel-held areas and the Russian violation of Turkish airspace twice over the weekend expose a troubling reality for Turkey. Having lacked a genuine air defense system, Turkey solely relies on NATO's cover against any missile threat in its vicinity and several times over the course of the past two decades, Ankara has appealed to the alliance to deploy Patriots on its soil, first against Saddam Hussein's Iraq and then Bashar al-Assad's Syria.
  • Turkish Foreign Ministry spokesman Tanju Bilgiç said NATO-member Turkey is continuing talks with the alliance and its bilateral partners on enhancing its defense capabilities, including Patriot missile systems, but has not made a request for NATO to send military forces to Turkey.
  •  
    Looks like no-fly zones and "safe zones" in Syria are no longer in U.S. foreign policy plans.
4More

'More than 90%' of Russian airstrikes in Syria have not targeted Isis, US says | World ... - 0 views

  • A large majority of Russia’s military strikes in Syria have not been aimed at the Islamic State group or jihadists tied to al-Qaida, and have instead targeted the moderate Syrian opposition, the US State Department said on Wednesday. “Greater than 90% of the strikes that we’ve seen them take to date have not been against Isil or al-Qaida-affiliated terrorists,” said spokesman John Kirby.
  • “They’ve been largely against opposition groups that want a better future for Syria and don’t want to see the Assad regime stay in power.” It was the first time that American authorities have offered any specific figures about the impact of Russian airstrikes in the war-torn country.
  • Washington, which supports the moderate Syrian opposition, has consistently said that the Russian action will only add more fuel to the fire and will benefit the regime of Syrian president Bashar al-Assad. “So whether they’re hit by a cruise missile from the sea or a bomb from a Russian military aircraft, the result is the same, that Assad continues to get support from Russia,” added Kirby. “Assad continues to be able to have at his, you know, at his hands the capability of striking his own people, including those who are opposed to his regime. “And that’s not a good future for Syria. It’s also, as we’ve said before, we believe a mistake for Russia, because not only are they going to be exacerbating sectarian tensions there in Syria, but they’re potentially exacerbating sectarian tensions in Russia itself. “They’re putting themselves at greater risk.”
  •  
    Sorry, Mr. Kirby. Anyone within Syria  bearing arms against the elected Syrian government is a legitimate Russian target under international law. Get used to it.
5More

Russia to expand Syria Air Strikes: Mission Creep or Strategy? | nsnbc international - 0 views

  • Russian Air Force jets have flown over 60 sorties since the onset of the Russian campaign against ISIL in Syria on Wednesday. The campaign has dislodged ISIL and al-Qaeda associated terrorist brigades. Kyrgyz President Almazbek Atambayev expressed his support for Russia. French President Francois Hollande accused Russia of having become a conflicting party due to its support of Syrian President Al-Assad. The Russian initiative is consistent with countering long-term NATO plans aimed at destabilizing the Russian Federation’s underbelly. 
  • On Wednesday, September 30, 2015, Russia began launching air strikes against ISIL targets in Syria. As of Saturday, the Russian Defense Ministry reported that there had been flown over 60 sorties, bombing 50 facilities of the Islamic State. Col Gen Andrey Kartapolov of the General Staff told reporters on Saturday that: “The aircraft have been taking off from the Hmeimim air base, targeting the whole Syria. … In the past three days we have managed to disrupt the terrorists’ infrastructure and to substantially degrade their combat capabilities. … Intelligence reports say that militants are leaving the areas under their control. … There is panic and desertion among their ranks. … Nearly 600 mercenaries have abandoned their positions and are making attempts to get out to Europe.” The President of fellow CSTO member Kyrgyzstan, Almazbek Atambayev, told the press on Sunday, that members of the Collective Security Treaty Organization (CSTO) should primarily think about protecting their own borders. President Almazbek Atambayev did, however, express his support for Moscow’s air strikes, stressing that the so-called Islamic State, a.k.a. ISIL, ISIS or Daesh had declared its ambition to control large territories. He added that:
  • Russian Foreign Minister Sergey Lavrov, for his part, would note that when someone behaves, moves and acts like a terrorist it is probably a terrorist. A diplomatic way of telling the press that Moscow does not see a great difference between ISIL and e.g. the Al-Qaeda associated Jabhat Al-Nusrah. Iraq, Iran, Syria and Russia have established a joint intelligence center in the Iraqi capital Baghdad. Moscow has previously hinted that Russia was prepared to look positively at a request for help from the Iraqi government. Alexander Mezyaev is the Head of the Chair of the Academy on International Law and Governance in Kazan, Tatarstan, Russia explained the Russian and international legal background for Russia’s military operations in an article entitled “Russian Operation in Syria: International Law”.
  • ...2 more annotations...
  • Hollande would later accuse Moscow of having become a party to the conflict in Syria due to what he described as Moscow’s support to Syrian President Bashar Al-Assad. The remark fell within the context of allegations that Russian jets had targeted positions of other than ISIL fighters.
  • In a January 2013 interview with nsnbc, retired Pakistani Major Agha H. Amin noted that one of NATO’s long-term objectives with the destabilization of Syria was to spread a string of low intensity conflicts from the Mediterranean along Russia’s and other CSTO members soft and resource-rich underbelly to Pakistan. It is within this context that the statement of the President of Kyrgyzstan, Almazbek Atambayev, and his country’s support for the Russian air strikes can be understood. Expanding Russian air strikes to also include e.g. Jabhat al-Nusrah and other mercenary brigades operating in Syria and Iraq would not be mission creep but rather part of a long-term strategy to counter well-documented, predominantly US and UK forged plans to destabilize and eventually to “Balkanize” the Russian Federation by drawing Russia and other CSTO member States into protracted low-intensity conflicts.
18More

The Engineered Destruction and Political Fragmentation of Iraq. Towards the Creation of... - 0 views

  • The Capture of Mosul:  US-NATO Covert Support to the Islamic State of Iraq and Syria (ISIS) Something unusual occurred in Mosul which cannot be explained in strictly military terms. On June 10, the insurgent forces of the Islamic State of Iraq and the Levant (ISIS) captured Mosul, Iraq’s second largest city, with a population of close to 1.5 million people.  While these developments were “unexpected” according to the Obama administration, they were known to the Pentagon and US intelligence, which were not only providing weapons, logistics and financial support to the ISIS rebels, they were also coordinating, behind the scenes, the ISIS attack on the city of Mosul. While ISIS is a well equipped and disciplined rebel army when compared to other Al Qaeda affiliated formations, the capture of Mosul, did not hinge upon ISIS’s military capabilities. Quite the opposite: Iraqi forces which outnumbered the rebels by far, equipped with advanced weapons systems could have easily repelled the ISIS rebels. There were 30,000 government forces in Mosul as opposed to 1000 ISIS rebels, according to reports. The Iraqi army chose not to intervene. The media reports explained without evidence that the decision of the Iraqi armed forces not to intervene was spontaneous characterized by mass defections.
  • Iraqi officials told the Guardian that two divisions of Iraqi soldiers – roughly 30,000 men – simply turned and ran in the face of the assault by an insurgent force of just 800 fighters. Isis extremists roamed freely on Wednesday through the streets of Mosul, openly surprised at the ease with which they took Iraq’s second largest city after three days of sporadic fighting. (Guardian, June 12, 2014, emphasis added) The reports point to the fact that Iraqi military commanders were sympathetic with the Sunni led ISIS insurgency: Speaking from the Kurdish city of Erbil, the defectors accused their officers of cowardice and betrayal, saying generals in Mosul “handed over” the city over to Sunni insurgents, with whom they shared sectarian and historical ties. (Daily Telegraph,  13 June 2014) What is important to understand, is that both sides, namely the regular Iraqi forces and the ISIS rebel army are supported by US-NATO. There were US military advisers and special forces including operatives from private military companies on location in Mosul working with Iraq’s regular armed forces. In turn, there are Western special forces or mercenaries within ISIS (acting on contract to the CIA or the Pentagon) who are in liaison with US-NATO (e.g. through satellite phones).
  • Under these circumstances, with US intelligence amply involved, there would have been routine communication, coordination, logistics and exchange of intelligence between a US-NATO military and intelligence command center, US-NATO military advisers forces or private military contractors on the ground assigned to the Iraqi Army and Western special forces attached to the ISIS brigades. These Western special forces operating covertly within the ISIS could have been dispatched by a private security company on contract to US-NATO.
  • ...14 more annotations...
  • In this regard, the capture of Mosul appears to have been a carefully engineered operation, planned well in advance. With the exception of a few skirmishes, no fighting took place. Entire divisions of the Iraqi National Army –trained by the US military with advanced weapons systems at their disposal– could have easily repelled the ISIS rebels. Reports suggest that they were ordered by their commanders not to intervene. According to witnesses, “Not a single shot was fired”. The forces that had been in Mosul have fled — some of which abandoned their uniforms as well as their posts as the ISIS forces swarmed into the city. Fighters with the Islamic State of Iraq and Syria (ISIS), an al-Qaeda offshoot, overran the entire western bank of the city overnight after Iraqi soldiers and police apparently fled their posts, in some instances discarding their uniforms as they sought to escape the advance of the militants. http://hotair.com/archives/2014/06/10/mosul-falls-to-al-qaeda-as-us-trained-security-forces-flee/
  • A contingent of one thousand ISIS rebels take over a city of more than one million? Without prior knowledge that the US controlled Iraqi Army (30,000 strong) would not intervene, the Mosul operation would have fallen flat, the rebels would have been decimated. Who was behind the decision to let the ISIS terrorists take control of Mosul? Had the senior Iraqi commanders been instructed by their Western military advisers to hand over the city to the ISIS terrorists? Were they co-opted?
  • The formation of the caliphate may be the first step towards a broader conflict in the Middle East, bearing in mind that Iran is supportive of the Al Maliki government and the US ploy may indeed be to encourage the intervention of Iran. The proposed redivision of Iraq is broadly modeled on that of the Federation of Yugoslavia which was split up into seven “independent states” (Serbia, Croatia, Bosnia-Herzegovina, Macedonia (FYRM), Slovenia, Montenegro, Kosovo). According to Mahdi Darius Nazemroaya, the re division of Iraq into three separate states is part of a broader process of redrawing the Map of the Middle East.
  • US forces could have intervened. They had been instructed to let it happen. It was part of a carefully planned agenda to facilitate the advance of the ISIS rebel forces and the installation of the ISIS caliphate. The whole operation appears to have been carefully staged.
  • In Mosul, government buildings, police stations, schools, hospitals, etc are formally now under the control of the Islamic State of Iraq and Syria (ISIS). In turn, ISIS has taken control of military hardware including helicopters and tanks which were abandoned by the Iraqi armed forces. What is unfolding is the installation of a US sponsored Islamist ISIS caliphate alongside the rapid demise of the Baghdad government. Meanwhile, the Northern Kurdistan region has de facto declared its independence from Baghdad. Kurdish peshmerga rebel forces (which are supported by Israel) have taken control of the cities of Arbil and Kirkuk. (See map above) Concluding Remarks There were no Al Qaeda rebels in Iraq prior to the 2003 invasion. Moreover, Al Qaeda was non-existent in Syria until the outset of the US-NATO-Israeli supported insurgency in March 2011. The ISIS is not an independent entity. It is a creation of US intelligence. It is a US intelligence asset, an instrument of non-conventional warfare.
  • Was the handing over of Mosul to ISIS part of a US intelligence agenda? Were the Iraqi military commanders manipulated or paid off into allowing the city to fall into the hands of the ISIS rebels without “a single shot being fired”. Shiite General Mehdi Sabih al-Gharawi who was in charge of the Mosul Army divisions “had left the city”. Al Gharawi had worked hand in glove with the US military. He took over the command of Mosul in September 2011, from US Col Scott McKean. Had he been co-opted, instructed by his US counterparts to abandon his command?
  • The ultimate objective of this ongoing US-NATO engineered conflict opposing Maliki government forces to the ISIS insurgency is to destroy and destabilize Iraq as a Nation State. It is part of an intelligence operation, an engineered process of  transforming countries into territories. The break up of Iraq along sectarian lines is a longstanding policy of the US and its allies. The ISIS is a caliphate project of creating a Sunni Islamist state. It is not a project of the Sunni population of Iraq which historically has been committed to a secular system of government. The caliphate project is a US design. The advances of ISIS forces is intended to garnish broad support within the Sunni population directed against the Al Maliki government The division of Iraq along sectarian-ethnic lines has been on the drawing board of the Pentagon for more than 10 years.
  • The above map was prepared by Lieutenant-Colonel Ralph Peters. It was published in the Armed Forces Journal in June 2006, Peters is a retired colonel of the U.S. National War Academy. (Map Copyright Lieutenant-Colonel Ralph Peters 2006). Although the map does not officially reflect Pentagon doctrine, it has been used in a training program at NATO’s Defense College for senior military officers”. (See Plans for Redrawing the Middle East: The Project for a “New Middle East” By Mahdi Darius Nazemroaya, Global Research, November 2006)
  • The Western media in chorus have described the unfolding conflict in Iraq as a “civil war” opposing the Islamic State of Iraq and al-Sham against the Armed forces of the Al-Maliki government. (Also referred to as Islamic State of Iraq and the Levant (ISIL) or Islamic State of Iraq and Syria (ISIS)) The conflict is casually described as “sectarian warfare” between Radical Sunni and Shia without addressing “who is behind the various factions”.  What is at stake is a carefully staged US military-intelligence agenda. Known and documented, Al Qaeda affiliated entities have been used by US-NATO in numerous conflicts as “intelligence assets” since the heyday of the Soviet-Afghan war. In Syria, the Al Nusrah and ISIS rebels are the foot-soldiers of the Western military alliance, which oversees and controls the recruitment and training of paramilitary forces.
  • The Al Qaeda affiliated Islamic State of Iraq (ISI) re-emerged in April 2013 with a different name and acronym, commonly referred to as the Islamic State of Iraq and Syria (ISIS). The formation of a terrorist entity encompassing both Iraq and Syria was part of a US intelligence agenda. It responded to geopolitical objectives. It also coincided with the advances of Syrian government forces against the US sponsored insurgency in Syria and the failures of both the Free Syrian Army (FSA) and its various “opposition” terror brigades. The decision was taken by Washington to channel its support (covertly) in favor of a terrorist entity which operates in both Syria and Iraq and which has logistical bases in both countries. The Islamic State of Iraq and al-Sham’s Sunni caliphate project coincides with a longstanding US agenda to carve up both Iraq and Syria into three separate territories: A Sunni Islamist Caliphate, an Arab Shia Republic, and a Republic of Kurdistan.
  • Whereas the (US proxy) government in Baghdad purchases advanced weapons systems from the US including F16 fighter jets from Lockheed Martin, the Islamic State of Iraq and al-Sham –which is fighting Iraqi government forces– is supported covertly by Western intelligence. The objective is to engineer a civil war in Iraq, in which both sides are controlled indirectly by US-NATO. The scenario is to arm and equip them, on both sides, finance them with advanced weapons systems and then “let them fight”.
  • The Islamic caliphate is supported covertly by the CIA in liaison with Saudi Arabia, Qatar and Turkish intelligence. Israel is also involved in channeling support to both Al Qaeda rebels in Syria (out of the Golan Heights) as well to the Kurdish separatist movement in Syria and Iraq.
  • First published by GR on June 14, 2014.  President Barack Obama has initiated a series of US bombing raids in Iraq allegedly directed towards the rebel army of the Islamic State (IS). The Islamic State terrorists are portrayed as an enemy of America and the Western world. Amply documented, the Islamic State is a creation of Western intelligence, supported by the CIA and Israel’s Mossad and financed by Saudi Arabia and Qatar. We are dealing with a diabolical military agenda whereby the United States is targeting a rebel army which is directly funded by the US and its allies. The incursion into Iraq of the Islamic State rebels in late June was part of a carefully planned intelligence operation. The rebels of the Islamic state, formerly known as the ISIS, were covertly supported by US-NATO-Israel  to wage a terrorist insurgency against the Syrian government of Bashar Al Assad.  The atrocities committed in Iraq are similar to those committed in Syria. The sponsors of IS including Barack Obama have blood on their hands.
  • The killings of innocent civilians by the Islamic state terrorists create a pretext and the justification for US military intervention on humanitarian grounds. Lest we forget, the rebels who committed these atrocities and who are a target of US military action are supported by the United States. The bombing raids ordered by Obama are not intended to eliminate the terrorists. Quite the opposite, the US is targeting the civilian population as well as the Iraqi resistance movement. The endgame is to destabilize Iraq as a nation state and trigger its partition into three separate entities.
  •  
    The destabilization and fragmentation of Israel's neighboring nations has indeed been on the Zionist/Neocon drawing board for a very long time. http://goo.gl/Z1gdoA In the Mideast, it's important to remember that there are no significant Islamist forces that are not under the control of the U.S. or its allies Saudi Arabia and Qatar. The Iraqi Army's withdrawal of the two divisions from the defense of Mosul is indeed curious. In that regard, Col. Peters' map of a future Mideast is almost certainly more than a coincidence. 
12More

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
5More

Insight - Syria's Nusra Front may leave Qaeda to form new entity | Reuters - 0 views

  • Leaders of Syria's Nusra Front are considering cutting their links with al Qaeda to form a new entity backed by some Gulf states trying to topple President Bashar al-Assad, sources said. Sources within and close to Nusra said that Qatar, which enjoys good relations with the group, is encouraging the group to go ahead with the move, which would give Nusra a boost in funding.
  • While it awaits the final word from its decision-making Shoura council, Nusra is not wasting time. It has turned on small non-jihadi groups, seizing their territory and forcing them to disarm so as to consolidate Nusra's power in northern Syria and pave the way for the new group.Intelligence officials from Gulf states including Qatar have met the leader of Nusra, Abu Mohamad al-Golani, several times in the past few months to encourage him to abandon al Qaeda and to discuss what support they could provide, the sources said.They promised funding once it happens. "A new entity will see the light soon, which will include Nusra and Jaysh al Muhajereen wel Ansar and other small brigades," said Muzamjer al-Sham, a prominent jihadi figure who is close to Nusra and other Islamist groups in Syria."The name of Nusra will be abandoned. It will disengage from al Qaeda. But not all the Nusra emirs agree and that is why the announcement has been delayed," said Sham.
  • A source close to the foreign ministry confirmed that Qatar wanted Nusra to become a purely Syrian force not linked to al Qaeda."They are promising Nusra more support, i.e. money, supplies etc, once they let go of the Qaeda ties," the official said.The Qatari-led bid to rebrand Nusra and to provide it with new support could further complicate the war in Syria as the United States prepares to arm and train non-jihadist rebels to fight Islamic State.The Nusra Front is listed as a terrorist group by the United States and has been sanctioned by the United Nations Security Council. But for Qatar at least, rebranding Nusra would remove legal obstacles to supporting it.
  • ...1 more annotation...
  • Nusra wants to use northern Syria as base for the new group. It launched offensives against Western-backed groups who have been vetted by the U.S. to receive military support.In the northern province of Idlib it seized territory from the Syria Revolutionaries' Front led by Jamal Maarouf, forcing him to flee. Last week it went after another mainstream group, Harakat Hazzm in Aleppo province, forcing it to dissolve itself.The U.S. State Department said the end of Harakat Hazzm would have an impact on the moderate opposition's capabilities in the north.But if Nusra is dissolved and it abandons al Qaeda, the ideology of the new entity is not expected to change. Golani fought with al Qaeda in Iraq. Some other leaders fought in Afghanistan and are close al Qaeda chief Ayman Zawahri. "Nusra had to pledge loyalty to Sheikh Zawahri to avoid being forced to be loyal to Baghdadi but that was not a good idea, it is time that this is abandoned," said a Nusra source in Aleppo. "It did not help Nusra and now it is on the terrorist list," he said.
  •  
    Definitely a rebranding effort by Qatar to work around the U.N. Security Council Resolution. But sparks have flown before when Qatar became too influential in Syria via Al Nusrah, resulting in the Saudis launching ISIL and drastically thinning the ranks in Al Nurah. Qatar isn't sufficiently Salafist for the Saudi princes' tastes.  
9More

Eurasian emporium or nuclear war?: Pepe Escobar | Asia Times - 0 views

  • A high-level European diplomatic source has confirmed to Asia Times that German chancellor Angela Merkel’s government has vigorously approached Beijing in an effort to disrupt its multi-front strategic partnership with Russia. Beijing won’t necessarily listen to this political gesture from Berlin, as China is tuning the strings on its pan-Eurasian New Silk Road project, which implies close trade/commerce/business ties with both Germany and Russia. The German gambit reveals yet more pressure by hawkish sectors of the U.S. government who are intent on targeting and encircling Russia. For all the talk about Merkel’s outrage over the U.S. National Security Agency’s tapping shenanigans, the chancellor walks Washington’s walk.  Real “outrage” means nothing unless she unilaterally ends sanctions on Russia. In the absence of such a response by Merkel, we’re in the realm of good guy-bad guy negotiating tactics.
  • The bottom line is that Washington cannot possibly tolerate a close Germany-Russia trade/political relationship, as it directly threatens its hegemony in the Empire of Chaos. Thus, the whole Ukraine tragedy has absolutely nothing to do with human rights or the sanctity of borders. NATO ripped Kosovo away from Yugoslavia-Serbia without even bothering to hold a vote, such as the one that took place in Crimea.
  • In parallel, another fascinating gambit is developing. Some sectors of U.S. Think Tankland – with their cozy CIA ties – are now hedging their bets about Cold War 2.0, out of fear that they have misjudged what really happens on the geopolitical chessboard. I’ve just returned from Moscow, and there’s a feeling the Federal Security Bureau and Russian military intelligence are increasingly fed up with the endless stream of Washington/NATO provocations – from the Baltics to Central Asia, from Poland to Romania, from Azerbaijan to Turkey. This is an extensive but still only partial summary of what’s seen all across Russia as an existential threat: Washington/NATO’s intent to block Russia’s Eurasian trade and development; destroy its defense perimeter; and entice it into a shooting war. A shooting war is not exactly a brilliant idea. Russia’s S-500 anti-missile missiles and anti-aircraft missiles can intercept any existing ICBM, cruise missile or aircraft. S-500s travel at 15,480 miles an hour; reach an altitude of 115 miles; travel horizontally 2,174 miles; and can intercept up to ten incoming missiles. They simply cannot be stopped by any American anti-missile system.
  • ...5 more annotations...
  • Some on the U.S. side say  the  S-500 system is being rolled out in a crash program, as an American intel source told Asia Times. There’s been no Russian confirmation. Officially, Moscow says the system is slated to be rolled out in 2017. End result, now or later: it will seal Russian airspace. It’s easy to draw the necessary conclusions. That makes the Obama administration’s “policy” of promoting war hysteria, coupled with unleashing a sanction, ruble and oil war against Russia, the work of a bunch of sub-zoology specimens. Some adults in the EU have already seen the writing on the (nuclear) wall. NATO’s conventional defenses are a joke. Any military buildup – as it’s happening now – is also a joke, as it could be demolished by the 5,000 tactical nuclear weapons Moscow would be able to use.
  • Of course it takes time to turn the current Cold War 2.0 mindset around, but there are indications the Masters of the Universe are listening – as this essay shows. Call it the first (public) break in the ice. Let’s assume Russia decided to mobilize five million troops, and switch to military production. The “West” would back down to an entente cordiale in a flash. And let’s assume Moscow decided to confiscate what remains of dodgy oligarch wealth. Vladimir Putin’s approval rate – which is not exactly shabby as it stands – would soar to at least 98%. Putin has been quite restrained so far. And still his childishly hysterical demonization persists. It’s a non-stop escalation scenario. Color revolutions. The Maidan coup. Sanctions; “evil” Hitler/Putin; Ukraine to enter NATO; NATO bases all over. And yet reality – as in the Crimean counter coup, and the battlefield victories by the armies of the People’s Republics of Donetsk and Lugansk – has derailed the most elaborate U.S. State Department/NATO plans. On top of it Merkel and France’s Francois Hollande were forced into an entente cordiale with Russia – on Minsk 2 – because they knew that would be the only way to stop Washington from further weaponizing Kiev.
  • Putin is essentially committed to a very complex preservation/flowering process of Russia’s history and culture, with overtones of pan-Slavism and Eurasianism. Comparing him to Hitler does not even qualify as a kindergarten prank. Yet don’t expect Washington neo-cons to understand Russian history or culture. Most of them would not even survive a Q&A on their beloved heroes Leo Strauss and Carl Schmitt. Moreover, their anti-intellectualism and exceptionalist arrogance creates only a privileged space for undiluted bullying. A U.S. academic, one of my sources, sent a letter to Nancy Pelosi copied to a notorious neo-con, the husband of Victoria, the Queen of Nulandistan. Here’s the neo-con’s response, via his Brookings Institution email: “Why don’t you go (expletive deleted)  yourself?” Yet another graphic case of husband and wife deserving each other.
  • At least there seem to be sound IQs in the Beltway driven to combat the neo-con cell inside the State Department, the neo-con infested editorial pages of the Wall Street Journal and the Washington Post, an array of think tanks, and of course NATO, whose current military leader, Gen. Breedlove/Breedhate, is working hard on his post-mod impersonation of Dr. Strangelove. Russian “aggression” is a myth. Moscow’s strategy, so far, has been pure self-defense. Moscow in a flash will strongly advance a strategic cooperation with the West if the West understands Russia’s security interests. If those are violated – as in provoking the bear – the bear will respond. A minimum understanding of history reveals that the bear knows one or two things about enduring suffering. It simply won’t collapse – or melt away.
  • Meanwhile, another myth has also been debunked: That sanctions would badly hurt Russia’s exports and trade surpluses. Of course there was hurt, but bearable. Russia enjoys a wealth of raw materials and massive internal production capability – enough to meet the bulk of internal demand. So we’re back to the EU, Russia and China, and everyone in between, all joining the greatest trade emporium in history across the whole of Eurasia. That’s what Putin proposed in Germany a few years ago, and that’s what the Chinese are already doing. And what do the neo-cons propose? A nuclear war on European soil.
  •  
    Merkel is in a poor position to break up Russia-China relations, having blown up the South Stream Pipeline project and playing the U.S. lapdog role on sanctions against Russia, which drove Russia into China's arms. China has been happily switching from Gulf Coast oil supply lines to Russian, given that the U.S. is busily blowing up the Middle East. Moreover, neither Merkel nor the Saudis bring anything to the China de-dollarization play while Russia does.   Follow the link from "This" to see what has Pepe Escobar so freaked out. The U.S. War Party is going nuts with their Cold War 2.0. 
5More

Iran calls for a timetable for global nuclear disarmament - The Washington Post - 0 views

  • Iran accused the five nuclear powers Wednesday of failing to take concrete action to eliminate their stockpiles and called for negotiations on a convention to achieve nuclear disarmament by a target date. Iran’s deputy U.N. ambassador Gholam Hossein Dehghani told the U.N. Disarmament Commission that “a comprehensive, binding, irreversible, verifiable” treaty is the most effective and practical way to eliminate nuclear weapons. He accused the nuclear powers — the U.S., Russia, China, Britain and France — of promising nuclear disarmament but making no significant progress. Dehghani’s speech came days after the announcement of a framework agreement between Iran and the five nuclear powers and Germany aimed at keeping Tehran from being able to develop a nuclear weapon. It has to be finalized by June 30.
  • The commission, which includes all 193 member states, is supposed to make recommendations in the field of disarmament but has failed to make substantive proposals in the past decade. Its three-week meeting is taking place ahead of the five-year review of the Nuclear Nonproliferation Treaty (NPT), the world’s single most important pact on nuclear arms, which begins on April 27. The NPT is credited with preventing the spread of nuclear weapons to dozens of nations since entering into force in 1970. It has done that via a grand global bargain: Nations without nuclear weapons committed not to acquire them; those with them committed to move toward their elimination; and all endorsed everyone’s right to develop peaceful nuclear energy.
  • Dehghani said that as a non-nuclear weapon state and NPT member, Iran believes it’s time to end the incremental approach toward disarmament and to start negotiations with all nuclear and non-nuclear weapon states on a convention that would set a deadline for ridding the world of nuclear weapons. He noted that a proposal in 2013 by the Nonaligned Movement, which represents over 100 developing countries, to start negotiations on a comprehensive nuclear weapons convention in the Conference on Disarmament gained wide support. Russia said President Vladimir Putin has confirmed that Moscow is ready for a serious and substantive dialogue on nuclear disarmament. But Olga Kuznetsova, a counselor in Russia’s Foreign Ministry, warned in a speech Tuesday that the U.S. deployment of a global missile defense system could lead to the resumption of a nuclear arms race.
  • ...2 more annotations...
  • The only way to change the situation, she said, is for states that pursue anti-missile capabilities follow the “universal principle” of not trying to strengthen their security at the expense of the security of other states. Kuznetsova also warned that development of high-precision non-nuclear weapons threatened “strategic parity” between the two nuclear powers and could lead to “global destabilization of (the) international situation in general.” Chinese counselor Sun Lei urged countries to “abandon Cold War mentality” and said those with the largest nuclear arsenals should be the first to make “drastic and substantive” cuts in their nuclear weapons. Ukraine’s representative called for the urgent development of a binding agreement that would give assurances to countries without nuclear weapons that they will not be threatened by nuclear weapons. Pakistani Ambassador Maleeha Lodhi echoed that call.
  • The United States said the negotiation of a treaty that would cap available fissile material “is the next logical step on the multilateral nuclear disarmament agenda.” John Bravaco said the U.S. has not produced fissile material for nuclear weapons since 1989. North Korea’s deputy U.N. ambassador, An Myong Hun, declared that “our nuclear forces are the life and soul of our nation” and will not be given up as long as nuclear threats remain in the world.
3More

How Israel Hid Its Secret Nuclear Weapons Program - Avner Cohen and William Burr - POLI... - 0 views

  • For decades, the world has known that the massive Israeli facility near Dimona, in the Negev Desert, was the key to its secret nuclear project. Yet, for decades, the world—and Israel—knew that Israel had once misleadingly referred to it as a “textile factory.” Until now, though, we’ve never known how that myth began—and how quickly the United States saw through it. The answers, as it turns out, are part of a fascinating tale that played out in the closing weeks of the Eisenhower administration—a story that begins with the father of Secretary of State John Kerry and a familiar charge that the U.S. intelligence community failed to “connect the dots.
  • In its final months, even as the Kennedy-Nixon presidential race captivated the country, the Eisenhower administration faced a series of crises involving Cuba and Laos. Yet, as the fall of 1960 progressed, President Dwight D. Eisenhower encountered a significant and unexpected problem of a new kind—U.S. diplomats learned and U.S. intelligence soon confirmed that Israel was building, with French aid, a secret nuclear reactor in the Negev Desert. Soon concluding that the Israelis were likely seeking an eventual nuclear weapons capability, the administration saw a threat to strategic stability in the Middle East and a nuclear proliferation threat. Adding fuel to the fire was the perception that Israel was deceitful, or had not “come clean,” as CIA director Allen Dulles put it. Once the Americans started asking questions about Dimona, the site of Israel’s nuclear complex, the Israelis gave evasive and implausible cover stories. 
  • This article, recounting the Dimona discovery and its implications, is based on a special collection of declassified documents published on Wednesday by the National Security Archive, the Nuclear Proliferation International History Project, and the Center for Nonproliferation Studies of the Middlebury Institute of International Studies at Monterey, California.
11More

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
2More

Secrets about suspected Israeli theft of U.S. weapons-grade nuclear material ... - 0 views

  • On March 18, 2014 ISCAP, the highest declassification authority in the U.S., released 84 pages (PDF) of formerly secret information about investigations into the illegal diversion of weapons-grade nuclear material from a Pennsylvania plant into the clandestine Israeli nuclear weapons program.  Files now available to the public from IRmep's ISCAP process include: 4/2/1968 Letter from the Director of the CIA alerting the Attorney General (PDF) about a huge loss of material from Pennsylvania's Nuclear Materials and Equipment Corporation (NUMEC). "It is critical for us to establish whether or not the Israelis now have the capability for fabricating nuclear weapons which might be employed in the Near East." 03/09/1972 FBI memorandum (PDF) "On the basis of the foregoing it must be assumed for the purpose of U.S. national security that diversion of special nuclear materials to Israel by Dr. [Zalman] Shapiro and his [NUMEC] associates is a distinct possibility." 07/28/1977 Notes of a briefing from CIA's Associate Deputy Director for Operations Theodore Shackley to the Carter administration National Security Council  (PDF) "I also asked Shackley to get us a rundown on the political aspects—e.g. when were the President and Congressional officials briefed on the Israeli weapons program, on the NUMEC connection, and what were their reactions.  In December, Carter was briefed on the NUMEC problem as President-elect by Bush in Georgia...I do not think the President has plausible deniability.  The CIA case is persuasive..."
  • 08/02/1977 Memo to Carter from Zbigniew Brzezinski "So far as we know however, (and we have made serious effort to discover it) there is nothing to indicate active CIA participation in the alleged theft...There is a tremendous amount of interest in this issue in Congress...We face tough sledding in the next few weeks in trying to keep attention focused on ERDA's technical [overall U.S. nuclear material loss] arguments..on the FBI investigations, and away from the CIA's information." All released CIA evidence and former Tel Aviv Station Chief John Hadden suggest the severely undercapitalized NUMEC was "an Israeli [smuggling] operation from the beginning." Multiple health-related lawsuits have been filed targeting companies that later assumed NUMEC ownership. The U.S. Army Corps of Engineers currently estimates its toxic cleanup of NUMEC will cost $500 million.  No damage claims have yet been filed against the Israeli government. IRmep is a Washington-DC based nonprofit researching U.S. Middle East policy formulation.
6More

James Clapper Confirms VADM Mike Rogers Needlessly Obfuscated in Confirmation Hearing |... - 0 views

  • On Friday, James Clapper finally provided Ron Wyden an unclassified response to a question he posed on January 29, admitting that the NSA conducts back door searches. (via Charlie Savage) As reflected in the August 2013 Semiannual Assessment of Compliance with Procedures and Guidelines Issued Pursuant to Section 702, which we declassified and released on August 21, 2013, there have been queries, using U.S. person identifiers, of communications lawfully acquired to obtain foreign intelligence by targeting non U.S. persons reasonably believed to be located outside the U.S. pursuant to Section 702 of FISA. It has taken just 9 months for Clapper to admit that, contrary to months of denials, the NSA (and FBI, which he doesn’t confirm but which the Report makes clear, as well as the CIA) can get the content of Americans’ communications without a warrant. But Clapper’s admission that this fact was declassified in August should disqualify Vice Admiral Mike Rogers from confirmation as CyberComm head (I believe he started serving as DIRNSA head, which doesn’t require confirmation, yesterday). Because it means Rogers refused to answer a question the response to which was already declassified.
  • Udall: If I might, in looking ahead, I want to turn to the 702 program and ask a policy question about the authorities under Section 702 that’s written into the FISA Amendments Act. The Committee asked your understanding of the legal rationale for NASA [sic] to search through data acquired under Section 702 using US person identifiers without probable cause. You replied the NASA–the NSA’s court approved procedures only permit searches of this lawfully acquired data using US person identifiers for valid foreign intelligence purposes and under the oversight of the Justice Department and the DNI. The statute’s written to anticipate the incidental collection of Americans’ communications in the course of collecting the communications of foreigners reasonably believed to be located overseas. But the focus of that collection is clearly intended to be foreigners’ communications, not Americans. But declassified court documents show that in 2011 the NSA sought and obtained the authority to go through communications collected under Section 702 and conduct warrantless searches for the communications of specific Americans. Now, my question is simple. Have any of those searches been conducted?
  • Rogers: I apologize Sir, I’m not in a position to answer that as the nominee. Udall: You–yes. Rogers: But if you would like me to come back to you in the future if confirmed to be able to specifically address that question I will be glad to do so, Sir. Udall: Let me follow up on that. You may recall that Director Clapper was asked this question in a hearing earlier this year and he didn’t believe that an open forum was the appropriate setting in which to discuss these issues. The problem that I have, Senator Wyden’s had, and others is that we’ve tried in various ways to get an unclassified answer — simple answer, yes or no — to the question. We want to have an answer because it relates — the answer does — to Americans’ privacy. Can you commit to answering the question before the Committee votes on your nomination?
  • ...3 more annotations...
  • Rogers: Sir, I believe that one of my challenges as the Director, if confirmed, is how do we engage the American people — and by extension their representatives — in a dialogue in which they have a level of comfort as to what we are doing and why. That is no insignificant challenge for those of us with an intelligence background, to be honest. But I believe that one of the takeaways from the situation over the last few months has been as an intelligence professional, as a senior intelligence leader, I have to be capable of communicating in a way that we are doing and why to the greatest extent possible. That perhaps the compromise is, if it comes to the how we do things, and the specifics, those are perhaps best addressed in classified sessions, but that one of my challenges is I have to be able to speak in broad terms in a way that most people can understand. And I look forward to that challenge. Udall: I’m going to continue asking that question and I look forward to working with you to rebuild the confidence. [my emphasis]
  • I assume that now that Clapper has given him the okay to discuss unclassified topics with Congress, Rogers will now provide a forthright answer, all the while claiming he was ignorant about the answer at the time (fine! then make me DIRNSA because I know more about it!). But Rogers’ response went far beyond such an answer. He refused — not just in the hearing but even after it — to commit to answering a question with a completely unclassified answer. And as I pointed out in this post, his written answers were even more obfuscatory. I don’t get a vote. But I think this should disqualify him as a nominee.
  • Update: Here’s the exchange in Rogers’ questions for the record on back door searches. What is your understanding of the legal rationale for NSA to search through data acquired under section 702 using U.S. Persons identifiers without probable cause? Information acquired by NSA under Section 702 of FI SA must be handled in strict accordance with minimization procedures adopted by the Attorney General and approved by the Foreign Intelligence Surveillance Court. As required by the statute and certifications approving Section 702 acquisitions, such activities must be limite d to targeting non-U.S. persons reasonably believed to be located outside the United States . NSA’s Court-approved procedures only permit searches of this lawfully acquired data using U.S. person identifiers for valid foreign intelligence purposes and under the oversight of the Department of Justice and Office of Director of National Intelligence.
3More

George Bush was "angry" when US intelligence said Iran hadn't got an active nuclear wea... - 0 views

  • In the National Intelligence Estimate, Iran: Nuclear Intentions and Capabilities, produced in November 2007, the 16 US intelligence services expressed the consensus view that Iran hadn’t got an active nuclear weapons programme at that time.  That is still their view today.   As he revealed in his memoir Decision Points, instead of being pleased that Iran was almost certainly not developing nuclear weapons, President Bush was “angry” that his intelligence services had expressed this view.  He was “angry” because it cut the ground from under his efforts to gain international support for what he termed “dealing with Iran”, which clearly went beyond ensuring that it did not possess nuclear weapons.  The NIE had a big impact, he concluded – and not a good one.   His full comments on the NIE in Decision Points are as follows:
  • In November 2007, the intelligence community produced a National Intelligence Estimate on Iran’s nuclear program. It confirmed that, as we suspected, Iran had operated a secret nuclear weapons program in defiance of its treaty obligations. It also reported that, in 2003, Iran had suspended its covert effort to design a warhead – considered by some to be the least challenging part of building a weapon.  Despite the fact that Iran was testing missiles that could be used as a delivery system and had announced its resumption of uranium enrichment, the NIE opened with an eye-popping declaration: “We judge with high confidence that in fall 2003, Tehran halted its nuclear weapons program.”   The NIE’s conclusion was so stunning that I felt certain it would immediately leak to the press. As much as I disliked the idea, I decided to declassify the key findings so that we could shape the news stories with the facts. The backlash was immediate. Ahmadinejad hailed the NIE as “a great victory.”  Momentum for new sanctions faded among the Europeans, Russians, and Chinese. As New York Times journalist David Sanger rightly put it, “The new intelligence estimate relieved the international pressure on Iran – the same pressure that the document itself claimed had successfully forced the country to suspend its weapons ambitions.”   In January 2008, I took a trip to the Middle East, where I tried to reassure leaders that we remained committed to dealing with Iran. Israel and our Arab allies found themselves in a rare moment of unity. Both were deeply concerned about Iran and furious with the United States about the NIE. In Saudi Arabia, I met with King Abdullah and members of the Sudairi Seven, the influential full brothers of the late King Fahd.   “Your Majesty, may I begin the meeting?” I said. “I’m confident that every one of you believes that I wrote the NIE as a way of avoiding taking action against Iran.”
  • No one said a word. The Saudis were too polite to confirm their suspicion aloud.   “You have to understand our system,” I said. “The NIE was produced independently by our intelligence community. I am as angry about it as you are.”   The NIE didn’t just undermine diplomacy.  It also tied my hands on the military side. There were many reasons I was concerned about undertaking a military strike on Iran, including its uncertain effectiveness and the serious problems it would create for Iraq’s fragile young democracy. But after the NIE, how could I possibly explain using the military to destroy the nuclear facilities of a country the intelligence community said had no active nuclear weapons program?   I don’t know why the NIE was written the way it was. I wondered if the intelligence community was trying so hard to avoid repeating its mistake on Iraq, that it had underestimated the threat from Iran.  I certainly hoped that intelligence analysts weren’t trying to influence policy. Whatever the explanation, the NIE had a big impact – and not a good one.
4More

U.S. Ramping Up Major Renewal in Nuclear Arms - NYTimes.com - 0 views

  • A sprawling new plant here in a former soybean field makes the mechanical guts of America’s atomic warheads. Bigger than the Pentagon, full of futuristic gear and thousands of workers, the plant, dedicated last month, modernizes the aging weapons that the United States can fire from missiles, bombers and submarines.It is part of a nationwide wave of atomic revitalization that includes plans for a new generation of weapon carriers. A recent federal study put the collective price tag, over the next three decades, at up to a trillion dollars.This expansion comes under a president who campaigned for “a nuclear-free world” and made disarmament a main goal of American defense policy. The original idea was that modest rebuilding of the nation’s crumbling nuclear complex would speed arms refurbishment, raising confidence in the arsenal’s reliability and paving the way for new treaties that would significantly cut the number of warheads.
  • Instead, because of political deals and geopolitical crises, the Obama administration is engaging in extensive atomic rebuilding while getting only modest arms reductions in return.
  • Supporters of arms control, as well as some of President Obama’s closest advisers, say their hopes for the president’s vision have turned to baffled disappointment as the modernization of nuclear capabilities has become an end unto itself.
  • ...1 more annotation...
  • “The most fundamental game changer is Putin’s invasion of Ukraine,” said Gary Samore, Mr. Obama’s top nuclear adviser in his first term and now a scholar at Harvard. “That has made any measure to reduce the stockpile unilaterally politically impossible.”That suits hawks just fine. They see the investments as putting the United States in a stronger position if a new arms race breaks out. In fact, the renovated plants that Mr. Obama has approved for a smaller force of more precise, reliable weapons could, under a different president, let the arsenal expand rapidly.
4More

British Spies Allowed to Access U.S. Data Without a Warrant - NationalJournal.com - 0 views

  • British authorities are capable of tapping into bulk communications data collected by other countries' intelligence services—including the National Security Agency—without a warrant, according to secret government documents released Tuesday. The agreement between the NSA and Britain's spy agency, known as Government Communications Headquarters or GCHQ, potentially puts the Internet and phone data of Americans in the hands of another country without legal oversight when obtaining a warrant is "not technically feasible."   The data, once obtained, can be kept for up to two years, according to internal policies disclosed by the British government. GCHQ was forced to reveal that it can request and receive vast quantities of raw, unanalyzed data collected from foreign governments it partners with during legal proceedings in a closed court hearing in a case brought by various international human-rights organizations, including Privacy International, Liberty U.K., and Amnesty International. The suit challenges certain aspects of GCHQ's surveillance practices.
  • It is well known that the NSA and GCHQ closely share intelligence data with one another, as part of a long-standing surveillance partnership. Some details of the agencies' spy pact were exposed by former NSA contractor Edward Snowden last year, including the existence of GCHQ's Tempora program, which taps into fiber-optic cables to scoop up online and telephone traffic across the Web for up to 30 days. But this is the first time the British government has disclosed that it does not require a warrant to access data collected and maintained by its American counterparts. The revelation appears to counter statements made by an oversight committee of the British Parliament in July of last year that "in each case where GCHQ sought information from the U.S., a warrant for interception, signed by a minister, was already in place."   It is unclear whether any restrictions on Britain's access to NSA surveillance data is imposed by the U.S. However, documents provided by Snowden to The Guardian last year reveal that the NSA shares raw intelligence data with Israel without removing information about U.S. citizens.
  • In a statement, the NSA said it works with a number of partner countries to further its "foreign intelligence mission." But it did not specify whether it was aware of or condoned Britain's apparent warrantless access of its data. "Whenever NSA shares intelligence information, we comply with all applicable rules, including rules designed to safeguard U.S. person information," the agency said. "NSA does not ask its foreign partners to undertake any intelligence activity that the U.S. government would be legally prohibited from undertaking itself." American privacy advocates quickly condemned any warrantless access of U.S. communications data by British authorities.   "The 'arrangement' disclosed today suggests that the two countries are circumventing even the very weak safeguards that have been put in place," Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said in a statement to National Journal. "It underscores both the inadequacy of existing oversight structures and the pressing need for [surveillance] reform."
  •  
    Note that this came out in a court case; it is not a Snowden leak. 
« First ‹ Previous 261 - 280 of 383 Next › Last »
Showing 20 items per page