Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Experts" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

Inside the CIA's Syrian Rebels Vetting Machine - 0 views

  • Nothing has come in for more mockery during the Obama administration’s halting steps into the Syrian civil war than its employment of “moderate” to describe the kind of rebels it is willing to back.
  • Behind the jokes, however, is the deadly serious responsibility of the CIA and Defense Department to vet Syrians before they receive covert American training, aid and arms. But according to U.S. counterterrorism veterans, a system that worked pretty well during four decades of the Cold War has been no match for the linguistic, cultural, tribal and political complexities of the Middle East, especially now in Syria. “We’re completely out of our league,” one former CIA vetting expert declared on condition of anonymity, reflecting the consensus of intelligence professionals with firsthand knowledge of the Syrian situation. “To be really honest, very few people know how to vet well. It’s a very specialized skill. It’s extremely difficult to do well” in the best of circumstances, the former operative said. And in Syria it has proved impossible.
6More

Abbott to say No to Xi and the New Asia Infrastructure Investment Bank - Twice | nsnbc ... - 0 views

  • Australian Prime Minister Tony Abbott is expected to say no to Chinese President Xi about joining the new Chinese-led Asia Infrastructure Development Bank (AIIB) when he will meet Xi at the ASEAN summit in Beijing this week. Abbott’s no to joining the bank would come against the advise of Australian treasurer Joe Hockey and after intense U.S. pressure for Australia to reject the proposed participation.
  • The decision to reject Australia’s participation in the 21 nation regional bank was made during a session of the Australian government’s National Security Committee and was explained as a “decision made on strategic grounds”. The decision has been criticized by several of Australia’s leading experts on economy. The Asian Development Bank  (ADB) estimated in 2011 that Asia would require some US$750 per year through 2020 to meet the needs for regional infrastructure development. In 2012 the ADB merely lent US$7.5 billion reported Australia’s Treasury.
  • A growing number of regional governments including Thailand, Malaysia, Indonesia, Laos, Myanmar and many other are gravitating towards China as China increasingly opens up its economy and banking system for foreign businesses and investment.
  • ...3 more annotations...
  • Australian Treasurer Joe Hockey repeatedly stressed that Australia’s national interests would be better served by joining the new AIIB while Abbott attempted to position the AIIB as a “unilateral institution”. While it is correct that China is the main investor into the bank, it is a 21 nation project and Abbott’s explanation is given little credence by objective economists who are aware of the inherent problems with U.S. dominance and the dominance of rogue corporate cartels who hold e.g the World Bank, the IMF and the US government in a state of capture.
  • The development gains perspective, considering that the former Chief Economist of the Bank for International Settlements (BIS) William White in 2013, and other top-economists are predicting that a collapse of the U.S. dollar and the Bretton Woods institutions has become unavoidable, that it may happened overnight, and that it is likely to happen sometime by the end of 2014 or the first half of 2015. A recent analysis of the development described U.S. pressure against nations’ joining the new Asia Infrastructure Development Bank as the choice between gold and gunfire, noting that the U.S. applies relative soft pressure against Australia, while it won’t hesitate to provoke civil wars in for example Thailand to prolong the (f)ailing new American Century, just a little bit longer.
  • Gold or Gunfire: Hedging Against the Collapse of the Dollar
7More

Tomgram: Peter Van Buren, Iraq and the Battle of the Potomac | TomDispatch - 0 views

  • What Could Possibly Go Right? Four Months into Iraq War 3.0, the Cracks Are Showing -- on the Battlefield and at the Pentagon By Peter Van Buren Karl von Clausewitz, the famed Prussian military thinker, is best known for his aphorism “War is the continuation of state policy by other means.” But what happens to a war in the absence of coherent state policy? Actually, we now know. Washington’s Iraq War 3.0, Operation Inherent Resolve, is what happens. In its early stages, I asked sarcastically, “What could possibly go wrong?” As the mission enters its fourth month, the answer to that question is already grimly clear: just about everything. It may be time to ask, in all seriousness: What could possibly go right?
  • The U.S. Department of State lists 60 participants in the coalition of nations behind the U.S. efforts against the Islamic State. Many of those countries (Somalia, Iceland, Croatia, and Taiwan, among them) have never been heard from again outside the halls of Foggy Bottom. There is no evidence that America’s Arab “allies” like Saudi Arabia, Qatar, and the United Arab Emirates, whose funding had long-helped extreme Syrian rebel groups, including IS, and whose early participation in a handful of air strikes was trumpeted as a triumph, are still flying. Absent the few nations that often make an appearance at America's geopolitical parties (Canada, the Brits, the Aussies, and increasingly these days, the French), this international mess has quickly morphed into Washington's mess. Worse yet, nations like Turkey that might actually have taken on an important role in defeating the Islamic State seem to be largely sitting this one out. Despite the way it’s being reported in the U.S., the new war in the Middle East looks, to most of the world, like another case of American unilateralism, which plays right into the radical Islamic narrative.
  • While American strategy may be lacking on the battlefield, it’s alive and well at the Pentagon. A report in the Daily Beast, quoting a generous spurt of leaks, has recently made it all too clear that the Pentagon brass “are getting fed up with the short leash the White House put them on.” Senior leaders criticize the war’s decision-making process, overseen by National Security Adviser Susan Rice, as “manic and obsessed.” Secretary of Defense Chuck Hagel wrote a quickly leaked memo to Rice warning that the president’s Syria strategy was already unraveling thanks to its fogginess about the nature of its opposition to Assad and because it has no “endgame.” Meanwhile, the military's “intellectual” supporters are already beginning to talk -- shades of Vietnam -- about “Obama's quagmire.”
  • ...4 more annotations...
  • The U.S. military came out of the Vietnam War vowing one thing: when Washington went looking for someone to blame, it would never again be left holding the bag.
  • Taken as a whole, the military's near-mutinous posture is eerily reminiscent of MacArthur's refusal to submit to President Harry Truman's political will during the Korean War. But don’t hold your breath for a Trumanesque dismissal of Dempsey any time soon. In the meantime, the Pentagon’s sights seem set on a fall guy, likely Susan Rice, who is particularly close to the president. The Pentagon has laid down its cards and they are clear enough: the White House is mismanaging the war. And its message is even clearer: given the refusal to consider sending in those ground-touching boots, Operation Inherent Resolve will fail. And when that happens, don't blame us; we warned you.
  • Joint Chiefs Chairman General Martin Dempsey has twice made public statements revealing his dissatisfaction with White House policy. In September, he said it would take 12,000 to 15,000 ground troops to effectively go after the Islamic State. Last month, he suggested that American ground troops might, in the future, be necessary to fight IS. Those statements contrast sharply with Obama's insistence that there will never be U.S. combat troops in this war. In another direct challenge, this time to the plan to create those Sunni National Guard units, Dempsey laid down his own conditions: no training and advising the tribes will begin until the Iraqi government agrees to arm the units themselves -- an unlikely outcome. Meanwhile, despite the White House's priority on training a new Syrian moderate force of 5,000 fighters, senior military leaders have yet to even select an officer to head up the vetting process that’s supposed to weed out less than moderate insurgents.
  • In or out, boots or not, whatever its own mistakes and follies, those who run the Pentagon and the U.S. military are already campaigning strategically to win at least one battle: when Iraq 3.0 collapses, as it most surely will, they will not be the ones hung out to dry. Of the very short list of what could go right, the smart money is on the Pentagon emerging victorious -- but only in Washington, not the Middle East.
5More

Investigation finds 50,000 'ghost' soldiers in Iraqi army, prime minister says - The Wa... - 0 views

  • The Iraqi army has been paying salaries to at least 50,000 soldiers who don’t exist, Iraqi Prime Minister Haider al-Abadi said Sunday, an indication of the level of corruption that permeates an institution that the United States has spent billions equipping and arming. A preliminary investigation into “ghost soldiers” — whose salaries are being drawn but who are not in military service — revealed the tens of thousands of false names on Defense Ministry rolls, Abadi told parliament Sunday. Follow-up investigations are expected to uncover “more and more,” he added.
  • Abadi, who took power in September, is under pressure to stamp out the graft that flourished in the armed forces under his predecessor, Nouri al-Maliki. Widespread corruption has been blamed for contributing to the collapse of four of the army’s 14 divisions in June in the face of an offensive by Islamic State extremists.
  • The United States is encouraging Abadi to create a leaner, more efficient military as the Pentagon requests $1.2 billion to train and equip the Iraqi army next year. The United States spent more than $20 billion on the force from the 2003 invasion until U.S. troops withdrew at the end of 2011. With entry-level soldiers in Iraq drawing salaries of about $600 a month, the practice of “ghost soldiers” is likely to be costing Iraq at least $380 million a year — though officials say that’s probably only a fraction of the true expense.
  • ...2 more annotations...
  • “It could be more than triple this number,” said Hamid ­al-Mutlaq, a member of the parliamentary defense and security committee, pointing out that more thorough on-the-ground investigations are planned. “The people who are responsible for this should be punished. Iraq’s safe has been emptied.” The corrupt practice is often perpetrated by officers who pretend to have more soldiers on their books in order to pocket their salaries, experts say.
  • The United States is focusing its efforts on three divisions in order to begin effective counteroffensive operations against the Islamic State, which controls around a third of the country’s territory. The Pentagon also has requested $24 million to train and equip tribal fighters and $354 million for Kurdish forces as part of its strategy to turn the tide against the Islamic State.
3More

Controversies - Insurance Industry Adjusts to Earthquake Risk Caused by Fracking - AllG... - 0 views

  • In another sign that fracking is increasingly being acknowledged as a cause of earthquakes, the insurance industry has announced that it is now linking the controversial drilling procedure with seismic activity in establishing its rates. Before insurance companies set their rates for an upcoming year, they turn to the U.S. Geological Survey (USGS) for information on quake activity. Specifically, insurers look at the USGS’s National Seismic Hazard Map, which “predicts where future earthquakes will occur, how often they will occur and how strongly they will shake the ground,” according to the Dallas Morning News. But this map will now take into account earthquakes that occur within the vicinity of fracking wells, the USGS has decided. That means insurance rates may go up in some areas considered more at risk of seismic events because of fracking operations. Between the years 2010 and 2013, central and eastern United States had an average of five times as many quakes per year as between 1970 and 2000. Human activity, including fracking, has been cited by scientists as the cause, according to Dallas Morning News.
  • Last year, USGS connected a 5.7-magnitude quake in Oklahoma to that state’s robust fracking industry. “The observation that a human-induced earthquake can trigger a cascade of earthquakes, including a larger one, has important implications for reducing the seismic risk from wastewater injection,” USGS seismologist and coauthor of the study Elizabeth Cochran said at the time. More than 120 quakes have hit the Dallas area in the past six years, and scientists have cited the work performed at nearby fracking sites as the reason, according to Homeland Security News Wire. Even the Texas Oil & Gas Association agreed that some research into the nexus of fracking and quakes is called for. “The oil and natural gas industry agrees that recent seismic activity warrants robust investigation to determine the precise location, impact and cause or causes of seismic events,” Todd Staples, the association’s president, said in a statement. A study published in the Bulletin of the Seismological Society of America says fracking near Ohio’s Poland Township triggered a previously undiscovered fault. The result was more than 70 earthquakes ranging in magnitude of 2.1 to 3.0, the latter of which was described as “rare” by the experts.
  •  
    Yet another factor to contribute to the piercing of the shale oil bubble in the U.S. economy.The shale oil and gas industry in the U.S. is collapsing because its production costs can not result in profits when the price of oil is so low. Banksters have ended the flow of new well development funding. Shale oil development companies are going bankrupt by the dozens  and tens of thousands of shale oil workers have been laid off.  
19More

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
6More

Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise - The Intercept - 0 views

  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
  • By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content: Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect. The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists: INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting: A = Indian Diplomatic & Indian Navy B = Central Asian diplomatic C = Chinese Human Rights Defenders D = Tibetan Pro-Democracy Personalities E = Uighur Activists F = European Special Rep to Afghanistan and Indian photo-journalism G = Tibetan Government in Exile
  • In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.” In instances where hacking may compromise data from the U.S. and U.K. governments, or their allies, notification was given to the “relevant parties.” In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge. “Analysts are potentially missing out on valuable open source information relating to cyber defence because of an inability to easily keep up to date with specific blogs and Twitter sources,” according to one document. GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media. The Twitter accounts designated for collection in the 2012 document:
  • ...3 more annotations...
  • Documents published with this article: LOVELY HORSE – GCHQ Wiki Overview INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers – SIDtoday  HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress NATO Civilian Intelligence Council – Cyber Panel – US Talking Points
  • These accounts represent a cross section of the hacker community and security scene. In addition to monitoring multiple accounts affiliated with Anonymous, GCHQ monitored the tweets of Kevin Mitnick, who was sent to prison in 1999 for various computer and fraud related offenses. The U.S. Government once characterized Mitnick as one of the world’s most villainous hackers, but he has since turned security consultant and exploit broker. Among others, GCHQ monitored the tweets of reverse-engineer and Google employee, Thomas Dullien. Fellow Googler Tavis Ormandy, from Google’s vulnerability research team Project Zero, is featured on the list, along with other well known offensive security researchers, including Metasploit’s HD Moore and James Lee (aka Egypt) together with Dino Dai Zovi and Alexander Sotirov, who at the time both worked for New York-based offensive security company, Trail of Bits (Dai Zovi has since taken up a position at payment company, Square). The list also includes notable anti-forensics and operational security expert “The Grugq.” GCHQ monitored the tweets of former NSA agents Dave Aitel and Charlie Miller, and former Air Force intelligence officer Richard Bejtlich as well as French exploit vendor, VUPEN (who sold a one year subscription for its binary analysis and exploits service to the NSA in 2012).
  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
3More

'Realists' Warn Against Ukraine Escalation | Consortiumnews - 0 views

  • The neocons’ war-and-more-war bandwagon is loaded up again and rolling downhill as “everyone who matters” in Washington is talking up sending sophisticated weapons to Kiev to escalate Ukraine’s civil war, but some “realists,” an endangered species in U.S. foreign policy, dissent, notes Robert Parry.
  • In Foreign Policy, Wald notes that despite the emerging consensus to ship arms to Ukraine, “few experts think this bankrupt and divided country is a vital strategic interest and no one is talking about sending U.S. troops to fight on Kiev’s behalf. So the question is: does sending Ukraine a bunch of advanced weaponry make sense? The answer is no.”
  •  
    While I have a lot of respect for Mearsheimer and Wald, they have completely missed why the U.S. is involved in the Ukraine. The U.S. has done its level best to create an arc of instability from Russia south to the Mediterranean and Suez Canal in order to protect the petrodollar from merger of the European and Asian markets. It's about pipelines and railroads both existing and to be built in the future. It's about getting in the way of China's rising economy. It's about combating de-dollarization. It makes sense to Western banksters, in a "prolong the decline of the American Empire as long as possible" way.  
6More

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
2More

In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle - NYTimes.com - 0 views

  • In the fall of 2008, a 30-year-old computer expert named Zarrar Shah roamed from outposts in the northern mountains of Pakistan to safe houses near the Arabian Sea, plotting mayhem in Mumbai, India’s commercial gem.Mr. Shah, the technology chief of Lashkar-e-Taiba, the Pakistani terror group, and fellow conspirators used Google Earth to show militants the routes to their targets in the city. He set up an Internet phone system to disguise his location by routing his calls through New Jersey. Shortly before an assault that would kill 166 people, including six Americans, Mr. Shah searched online for a Jewish hostel and two luxury hotels, all sites of the eventual carnage.
  • But he did not know that by September, the British were spying on many of his online activities, tracking his Internet searches and messages, according to former American and Indian officials and classified documents disclosed by Edward J. Snowden, the former National Security Agency contractor. They were not the only spies watching. Mr. Shah drew similar scrutiny from an Indian intelligence agency, according to a former official briefed on the operation. The United States was unaware of the two agencies’ efforts, American officials say, but had picked up signs of a plot through other electronic and human sources, and warned Indian security officials several times in the months before the attack.
3More

CIA's Hidden Hand in 'Democracy' Groups | Consortiumnews - 0 views

  • Documents from the Reagan presidential library reveal that two major institutions promoting “democracy” and “freedom” — Freedom House and National Endowment for Democracy — worked hand-in-glove, behind-the-scenes, with a CIA propaganda expert in the 1980s, reports Robert Parry.
  • But the Russian law would impede NED’s efforts to destabilize the Russian government through funding of political activists, journalists and civic organizations, so it was denounced as an infringement of human rights and helped justify Freedom House’s rating of Russia as “not free.”The Russian government’s concerns were not entirely paranoid. On Sept. 26, 2013, Gershman, in effect, charted the course for the crisis in Ukraine and the greater neocon goal of regime change in Russia. In a Washington Post op-ed, Gershman called Ukraine “the biggest prize” and explained how pulling it into the Western camp could contribute to the ultimate defeat of Russian President Vladimir Putin.“Ukraine’s choice to join Europe will accelerate the demise of the ideology of Russian imperialism that Putin represents,” Gershman wrote. “Russians, too, face a choice, and Putin may find himself on the losing end not just in the near abroad but within Russia itself.”With NED’s budget now exceeding $100 million a year — and with many NGOs headquartered in Washington — Gershman has attained the status of a major paymaster for the neocon movement with his words carrying extra clout because he can fund or de-fund many a project.
  • Thus, three decades after CIA Director William Casey and his propaganda specialist Walter Raymond Jr. struggled to arrange funding for Freedom House and other organizations that would promote an interventionist agenda, their brainchild – the National Endowment for Democracy – was still around picking up those tabs.
4More

China says wants closer military ties with Iran | Reuters - 0 views

  • China wants to have closer military ties with Iran, the Chinese defense minister told the visiting head of the Iranian navy on Thursday, state media reported, reaffirming diplomatic links despite controversy over Iran's nuclear plans.
  • Naval cooperation between Iran and China is aimed at reinforcing Iran's military capability in the Gulf, analysts say, as well as displaying China's plan to exert greater influence and presence beyond East Asia.“The (port) call reflects China’s military-to-military relationship with Iran," said Christian Le Mière, a naval expert at the International Institute for Strategic Studies think-tank."It is the most explicit sign of Beijing’s acknowledgment of this relationship, which has remained relatively covert until now."
  • China's People's Liberation Army Daily separately reported that Sayyari had been given tours of a Chinese submarine and warships, where he "listened to an introduction on equipment ability and weapons systems".Sayyari said he hoped Iran and China could cooperate on anti-piracy operations, the newspaper said.China is Iran's top oil buyer and has been the most aggressive in raising its crude purchases after an easing of the Western sanctions aimed at ending Tehran's disputed nuclear program.
  • ...1 more annotation...
  • China, a participant at the nuclear talks with Iran, has consistently urged a negotiated solution and decried efforts to place sanctions which have not been endorsed by the United Nations on Iran.
6More

Islamic State militants allegedly used chlorine gas against Iraqi security forces - The... - 0 views

  • Dizzy, vomiting and struggling to breathe, 11 Iraqi police officers were rushed to a government hospital 50 miles north of the capital last month. The diagnosis: poisoning by chlorine gas. The perpetrators, according to the officers: Islamic State extremists. The chlorine attack appears to be the first confirmed use of chemical weapons by the Islamic State on the battlefield. An Iraqi Defense Ministry official corroborated the events, and doctors said survivors’ symptoms were consistent with chlorine poisoning. Iraqi forces say two other crude chlorine attacks have occurred since the extremists seized vast tracts of Iraqi territory this summer, but details on those incidents remain sketchy. The reported assaults all raise concerns that the militants are attempting to hone their chemical weapons capabilities as they push to control more ground
  • Chlorine, a common component in industry, is sold legally, but its use as a weapon violates the Chemical Weapons Convention. It was widely employed in trench warfare during World War I, including infamously at Ypres in Belgium, where German forces dispersed more than 160 tons of chlorine into the breeze, killing thousands of French and Allied soldiers.
  • One physician on the team, Hassanain Mohammed, had treated similar cases­ before. In 2006 and 2007, al-Qaeda in Iraq, a group that later morphed into the Islamic State, carried out a string of chlorine bombings in the country.
  • ...3 more annotations...
  • An Iraqi Defense Ministry official confirmed this week that a bomb rigged with chlorine canisters was used in the Duluiyah attack. “They use it just to create terror,” said the official, who spoke on the condition of anonymity because he was not authorized to provide the information publicly. “But of course we are very concerned.” In a statement, the Defense Ministry confirmed that the Islamic State has used the gas in a “primitive and ineffective way” near water-treatment plants where it has gained access to chlorine, as well as in roadside bomb attacks. It did not specify the locations of the attacks, but there are several water plants near Duluiyah on territory controlled by the Islamic State.
  • Chlorine bombs are an easy-to-create but inexact weapon, experts say. All that is needed is a small explosive charge to rupture containers filled with the substance. “It’s difficult to deliver on target in combat situations,” said Jean Pascal Zanders, an independent researcher who specializes in chemical and biological weapons and disarmament. “Chlorine dissipates fast unless someone is able to concentrate it in a confined area.” Fighters in Duluiyah say it was not the only time chlorine has been used against them. Another attack this month caused minor injuries, and the fighters were treated locally, police officials said.
  • Soldiers who escaped an Islamic State rout of a besieged army base in Saqlawiyah, where hundreds of soldiers were killed last month, also said chlorine gas was used there — though reports of where and how the gas was delivered varied and could not be confirmed. While some officers said they believed artillery- or mortar-launched canisters fired by the attackers fell short of the base, others, who claimed to have remained in the installation for a longer period, said the canisters fell within its perimeter. Another claimed that the militants detonated chlorine-filled containers.
5More

Ebola? How Do You Know, WHO and CDC? | nsnbc international - 0 views

  • There is something perversely strange about the entire hoopla around the so-called Ebola outbreaks. An African man is admitted to a Dallas hospital with symptoms, treated, released and re-admitted, the “first” case of Ebola in the USA. What the guardians of truth in the mainstream media never ask is how reliable is the test that determines if someone has Ebola.
  • One courageous scientist who did question the Gallo HIV-AIDS hypothesis was Kary Mullis, who in 1996 wrote, “The HIV/AIDS hypothesis is one hell of a mistake.” Mullis won the Nobel Prize in chemistry in 1993. His devastating comments were ignored by the ever-vigilant mainstream media and medical profession. In 1983 Gallo arbitrarily transformed correlation into causality and said he had discovered the “virus” causing acquired immunodeficiency or AID, which was then named a “syndrome,” or AIDS. Gallo had just before that announcement won a patent for the only known test to determine of someone had AIDS. An habitual user of certain drugs like amyl nitrite or poppers, or even a pregnant woman would show HIV-positive with the Gallo test. Fears of a new global plague were stoked in the media by irresponsible scientists. Gallo sold his AIDS test to five pharmaceutical companies and sat back to reap the royalties. The Ebola Test
  • Can the PCR blood test tell how much Ebola virus is in a person’s body? The same Kary Mullis cited above regarding the HIV/AIDS hypothesis invented the PCR test in 1983, the basis on which his Nobel Prize was awarded. He told journalist John Lauritsen years back of his test and warned against its misuse. Lauritsen reported: With regard to the viral-load tests, which attempt to use PCR for counting viruses, Mullis has stated: “Quantitative PCR is an oxymoron.” PCR is intended to identify substances qualitatively, but by its very nature is unsuited for estimating numbers. Although there is a common misimpression that the viral-load tests actually count the number of viruses in the blood, these tests cannot detect free, infectious viruses at all; they can only detect proteins that are believed, in some cases wrongly, to be unique to HIV. The tests can detect genetic sequences of viruses, but not viruses themselves.
  • ...2 more annotations...
  • Now we are again reading similar terrorizing stories in the mass media, this time about Ebola–fears stoked by the pharma-industry-controlled WHO in Geneva under Director General Margaret Chan’s Scientific Advisory Group of Experts and their ties to Big Pharma giants, and the US Government Centers for Disease Control in Atlanta. What exactly is the Ebola test that is being used by doctors or health workers in Sierre Leone or Liberia to “prove” Ebola in a sick person? When the African man was re-hospitalized in Dallas, the head of the CDC, Tom Frieden, declared the patient was diagnosed with Ebola based on a test that is “highly accurate. It’s a PCR test of blood.” But that PCR test of blood is not highly accurate. Rather it is highly flawed. As Jon Rappoport points out, “Among the problems of the PCR test is that it is open to errors. Is the sample taken from the patient actually a virus or a piece of a virus? Or is just an irrelevant piece of debris? Another problem is inherent in the method of the PCR itself. The test is based on the amplification of a tiny, tiny speck of genetic material taken from a patient—blowing it up millions of times until it can be observed and analyzed. Researchers who employ the test claim that, as a result of the procedure, they can also infer the quantity of virus that is present in the patient. This is crucial, because unless a patient has millions and millions of Ebola virus in his body, there is absolutely no reason to think he is sick or will become sick.”
  • Nor can the Mullis PCR test count the number of Ebola viruses in a person’s blood. Yet the CDC claims, wrongly according to Mullis, that it can. Can it be that the entire Ebola fear campaign launched by Chan’s WHO and the CDC is based on fiction and a pharmaceutical industry ready to jab millions with their untested “Ebola vaccines”?
10More

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
3More

Jeb Bush's Administration Steered Florida Pension Money to George W. Bush's Fundraisers - 0 views

  • Four years before the financial collapse, Goldman Sachs executive George Herbert Walker IV had much to be thankful for. "I've been fortunate to be a small part of teams leading U.S. restructurings, European privatizations, global pension management and now hedge fund and private equity investing,” he said in the annual report of a banking colossus that would soon be known as the “great vampire squid” of Wall Street. “The world,” said Walker, “just keeps getting more interesting." As the head of Goldman Sachs’ alternative investment unit, Walker’s ebullience was understandable. At the same time he was raising $100,000 for his cousin George W. Bush’s successful presidential re-election effort, the administration of another cousin, Florida Gov. Jeb Bush, returned the family favor, delivering $150 million of Florida pension money to an alternative investment fund run by Walker’s firm. Like other executives whose companies received Florida pension money, Walker is now renewing the cycle, reportedly attending in February a high-dollar fundraiser for Jeb Bush’s political committee.
  • Walker is not alone: He is one of 19 top fundraisers for George W. Bush -- known as “Pioneers” and “Rangers” -- whose financial firms received state business from Jeb Bush’s administration in Tallahassee. In all, an International Business Times’ review of government documents shows Jeb Bush oversaw Florida directing at least $1.7 billion of state workers’ retirement money to the financial firms of his elder brother’s major donors. As Jeb Bush oversaw the State Board of Administration (SBA) that runs Florida’s massive public pension system, the state shifted billions of dollars into higher-risk, higher-fee alternative investments, benefiting the same sector of the investment industry he would work in upon leaving office. Many of those state deals delivered returns that fell short of projections. Roughly 20 percent of that system’s 53 private investment deals during Bush’s governorship went to companies that employed his brother’s Pioneers. Those financial firms, in turn, delivered more than $5 million of campaign cash to George W. Bush, the Republican National Committee and Jeb Bush’s Republican Party of Florida. (Click here to see the full list of Bush Pioneers whose firms received Florida pension investments from Jeb Bush’s administration).
  • Ethics experts say the connection between Bush family donors and Florida pension deals raises questions about whether the investments were properly insulated from political influence. “If not an actual conflict of interest, these examples would provide fodder for apparent conflicts of interest,” said Common Cause Florida’s Peter Butzin. “Those folks who give … expect something in return. And if that something in return is not blatantly sending business their way or resulting in a particular vote, it most certainly is at least providing an opportunity for access, to get the foot in the door, so that they can make the case with that official.” Jeb Bush’s aides did not respond to questions from IBTimes, and Walker declined to comment for this story. Dennis MacKee, an SBA spokesperson, said the agency’s “elected Trustees do not now, nor did they during Governor Bush’s term, participate in the selection of individual investments.” MacKee’s statement conflicts with emails reviewed by IBTimes that show that, as governor, Jeb Bush was deeply involved in the state’s investment decisions, periodically brokering conversations between Florida officials and individual financial firms, including one whose top executive was a longtime Bush family donor.
6More

CISA Security Bill: An F for Security But an A+ for Spying | WIRED - 0 views

  • When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.
  • On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.” The central concern of that letter was how the same data sharing meant to bolster cybersecurity for companies and the government opens massive surveillance loopholes. The bill, as worded, lets a private company share with the Department of Homeland Security any information construed as a cybersecurity threat “notwithstanding any other provision of law.” That means CISA trumps privacy laws like the Electronic Communication Privacy Act of 1986 and the Privacy Act of 1974, which restrict eavesdropping and sharing of users’ communications. And once the DHS obtains the information, it would automatically be shared with the NSA, the Department of Defense (including Cyber Command), and the Office of the Director of National Intelligence.
  • In a statement posted to his website yesterday, Senator Burr wrote that “Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes.” But in fact, the bill’s data sharing isn’t limited to cybersecurity “threat indicators”—warnings of incoming hacker attacks, which is the central data CISA is meant to disseminate among companies and three-letter agencies. OTI’s Greene says it also gives companies a mandate to share with the government any data related to imminent terrorist attacks, weapons of mass destruction, or even other information related to violent crimes like robbery and carjacking. 
  • ...2 more annotations...
  • The latest update to the bill tacks on yet another kind of information, anything related to impending “serious economic harm.” All of those vague terms, Greene argues, widen the pipe of data that companies can send the government, expanding CISA into a surveillance system for the intelligence community and domestic law enforcement. If information-sharing legislation does not include adequate privacy protections, then...It’s a surveillance bill by another name. Senator Ron Wyden
  • “CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”
  •  
    I read the legislation. It's as bad for privacy as described in the aritcle. And its drafting is incredibly sloppy.
5More

Information Warfare: Automated Propaganda and Social Media Bots | Global Research - 0 views

  • NATO has announced that it is launching an “information war” against Russia. The UK publicly announced a battalion of keyboard warriors to spread disinformation. It’s well-documented that the West has long used false propaganda to sway public opinion. Western military and intelligence services manipulate social media to counter criticism of Western policies. Such manipulation includes flooding social media with comments supporting the government and large corporations, using armies of sock puppets, i.e. fake social media identities. See this, this, this, this and this. In 2013, the American Congress repealed the formal ban against the deployment of propaganda against U.S. citizens living on American soil. So there’s even less to constrain propaganda than before.
  • Information warfare for propaganda purposes also includes: The Pentagon, Federal Reserve and other government entities using software to track discussion of political issues … to try to nip dissent in the bud before it goes viral “Controlling, infiltrating, manipulating and warping” online discourse Use of artificial intelligence programs to try to predict how people will react to propaganda
  • Some of the propaganda is spread by software programs. We pointed out 6 years ago that people were writing scripts to censor hard-hitting information from social media. One of America’s top cyber-propagandists – former high-level military information officer Joel Harding – wrote in December: I was in a discussion today about information being used in social media as a possible weapon.  The people I was talking with have a tool which scrapes social media sites, gauges their sentiment and gives the user the opportunity to automatically generate a persuasive response. Their tool is called a “Social Networking Influence Engine”. *** The implications seem to be profound for the information environment. *** The people who own this tool are in the civilian world and don’t even remotely touch the defense sector, so getting approval from the US Department of State might not even occur to them.
  • ...2 more annotations...
  • How Can This Real? Gizmodo reported in 2010: Software developer Nigel Leck got tired rehashing the same 140-character arguments against climate change deniers, so he programmed a bot that does the work for him. With citations! Leck’s bot, @AI_AGW, doesn’t just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source. As can be the case with these sorts of things, many of the deniers don’t know they’ve been targeted by a robot and engage AI_AGW in debate. The bot will continue to fire back canned responses that best fit the interlocutor’s line of debate—Leck says this goes on for days, in some cases—and the bot’s been outfitted with a number of responses on the topic of religion, where the arguments unsurprisingly often end up. Technology has come a long way in the past 5 years. So if a lone programmer could do this 5 years ago, imagine what he could do now. And the big players have a lot more resources at their disposal than a lone climate activist/software developer does.  For example, a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (and see this).  So if the lone programmer is doing it, it’s not unreasonable to assume that the big boys are widely doing it.
  • How Effective Are Automated Comments? Unfortunately, this is more effective than you might assume … Specifically, scientists have shown that name-calling and swearing breaks down people’s ability to think rationally … and intentionally sowing discord and posting junk comments to push down insightful comments  are common propaganda techniques. Indeed, an automated program need not even be that sophisticated … it can copy a couple of words from the main post or a comment, and then spew back one or more radioactive labels such as “terrorist”, “commie”, “Russia-lover”, “wimp”, “fascist”, “loser”, “traitor”, “conspiratard”, etc. Given that Harding and his compadres consider anyone who questions any U.S. policies as an enemy of the state  – as does the Obama administration (and see this) – many honest, patriotic writers and commenters may be targeted for automated propaganda comments.
4More

Silicon Valley spars with Obama over 'backdoor' surveillance | TheHill - 0 views

  • Silicon Valley and a bipartisan group of lawmakers are lining up against the Obama administration, criticizing what they see as a lack of support for total online privacy.The steady rise of sophisticated privacy techniques such as encryption and anonymity software has put the government in a difficult position — trying to support the right to privacy while figuring out how to prevent people from evading law enforcement.ADVERTISEMENT“The technologies are evolving in ways that potentially make this trickier,” President Obama said during a January news conference with British Prime Minister David Cameron.The conundrum has led to a heated debate in Washington: Should law enforcement have guaranteed access to data?
  • The Obama administration — from officials with FBI and the National Security Agency (NSA) to the president himself — has come out in favor of some form of guaranteed access while still endorsing strong encryption.“If we get into a situation in which the technologies do not allow us at all to track somebody that we're confident is a terrorist,” Obama said, “that's a problem.”What shape that access takes, however, is unclear.“The dialogue that we're engaged in is designed to make sure that all of us feel confident that if there is an actual threat out there, our law enforcement and our intelligence officers can identify that threat and track that threat at the same time that our governments are not going around phishing into whatever text you might be sending on your smartphone,” Obama said. “And I think that's something that can be achieved.”Privacy hawks on Capitol Hill aren’t buying it.
  • “I don’t think much of that,” Rep. Joe Barton (R-Texas), co-founder of the Congressional Bipartisan Privacy Caucus, told The Hill. “We have a huge homeland security apparatus with almost unlimited authority to — with some sort of a reasonable suspicion — check almost any type of communication, whether it’s voice, Internet, telephonic, electronic, you name it.”“Those were positions that did not receive rave reviews here in Silicon Valley,” said Rep. Zoe Lofgren (D-Calif.), whose district includes parts of tech-heavy San Jose.Many believe the administration’s stance is inherently at odds with robust digital protection.“In order to fully implement what he's suggesting, you would need one of two things,” Lofgren said.One would be installing so-called “backdoors” in encryption — an access point known only to law enforcement agencies. Security experts find this concept abhorrent, since cyber crooks or foreign intelligence agencies would likely exploit it.
  • ...1 more annotation...
  • The second would be to have a third-party company hold all user data, with some sort of agreement to disclose information to the government, Lofgren said.“I think actually the trend line is in a different direction, which is encryption that is not accessible to the companies that provide it, either,” she added.  Major tech companies like Apple have done exactly that, claiming that even they can’t unlock data on newer devices.
5More

Busted Stuff: America's Disastrous Iran Policy | The National Interest - 0 views

  • Stakes in the nuclear talks between Iran and the P5+1 couldn’t be higher for the countries involved—especially for the United States. After nearly a decade and a half of disastrously self-damaging wars, “counter-terrorism campaigns,” and military occupations in the Middle East, the dysfunction and incoherence of U.S. policy is now on full display, from Iraq to Libya, Syria, and now Yemen. To recover, Washington must accept on-the-ground realities: U.S. efforts to dominate the region have failed and the Islamic Republic of Iran is now a rising power with which America must come to terms.              But President Obama has yet to explain why the United States—for its own interests, not as a favor to Iran, or simply because Americans are war-weary—needs rapprochement with the Islamic Republic. Absent such advocacy, his administration may still reach a nuclear deal with Iran. But it will lose the political fight at home over a new Iran policy, squandering the chance for a broader strategic opening with Tehran and locking the United States into increasingly steep strategic decline in the Middle East and globally.   
  • Today, America cannot achieve any of its high-priority goals in the Middle East—e.g., combatting the Islamic State, forestalling another violent Taliban takeover in Afghanistan, and resolving conflicts in Syria and Yemen—without better ties with Iran. Under any political order, Iran is a pivotal country, given its demographic and territorial size, its geostrategic location, its identity as a civilizational state with a history as long as China’s, and its hydrocarbon resources. But, under the Islamic Republic—which, since the 1979 Iranian Revolution, has worked to forge an indigenously-designed political system combining participatory politics and elections with elements of Islamic governance, and to pursue foreign policy independence—Iran enjoys a powerful legitimacy that bolsters its regional impact.
  • For too many Americans, thirty-five years of demonizing caricature mask an essential fact:  the Islamic Republic of Iran, as the Middle East’s only successful participatory Islamist order, has been able to pursue an independent foreign policy that has steadily bolstered its influence in critical arenas across the Middle East. If America is to recover its strategic position, it must devise a fundamentally different relationship with this rising power. It must do so not only because of Iran’s unique importance, but also as a first step toward coming to terms with Middle Eastern Muslims’ manifest desire—reflected in polls and in electoral outcomes whenever they get to vote in a reasonably open way—to define their political futures in terms of participatory Islamism and foreign policy independence.      Ignoring these realities, the Obama administration treats a nuclear deal as, at most, a “nice to have” option. Obama rarely identifies potential U.S. gains from realigning relations with Iran; instead, he stresses how Washington is providing Tehran with an “opportunity” to “benefit from rejoining the international community.”  
  • ...1 more annotation...
  • Flynt Leverett and Hillary Mann Leverett are co-authors of Going to Tehran: Why America Must Accept the Islamic Republic of Iran; both served as Middle East experts in the U.S. government under Presidents George H.W. Bush, Bill Clinton, and George W. Bush. Flynt is professor of international affairs at Penn State.
  •  
    A must-read.
« First ‹ Previous 341 - 360 of 399 Next › Last »
Showing 20 items per page