Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "capabilities" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

SodaStream to close illegal settlement factory in response growing boycott campaign | B... - 0 views

  • Palestinian boycott, divestment and sanctions (BDS) activists have welcomed the news that SodaStream has announced it is to close its factory in the illegal Israeli settlement of Mishor Adumim following a high profile boycott campaign against the company. “SodaStream’s announcement today shows that the boycott, divestment and sanctions (BDS) movement is increasingly capable of holding corporate criminals to account for their participation in Israeli apartheid and colonialism,” said Rafeef Ziadah, a spokesperson for the Palestinian Boycott, Divestment and Sanctions National Committee (BNC), the broad coalition of Palestinian civil society organisations that leads and supports the BDS movement. “BDS campaign pressure has forced retailers across Europe and North America to drop SodaStream, and the company’s share price has tumbled in recent months as our movement has caused increasing reputational damage to the SodaStream brand,” she added. The news of this major success against a company famed for its role in illegal Israeli settlements broke amidst intensifying demonstrations against Israel’s policies of colonisation in Jerusalem. Grassroots boycott activism saw SodaStream dropped by major retailers across North America and Europe including Macy’s in the US and John Lewis in the UK.
  • SodaStream’s participation in Israel’s forced displacement of Palestinians gained international notoriety when A-list celebrity Scarlett Johansson signed up to be a brand ambassador for the company. Following an international campaign urging Oxfam end its relationship with Johansson for endorsing SodaStream, the actor decided to quit Oxfam. SodaStream has also come under fire for its treatment of Palestinian workers in its West Bank factory, as Ziadah explains: “Any suggestion that SodaStream is employing Palestinians in an illegal Israeli settlement on stolen Palestinian land out of the kindness of its heart is ludicrous.” “Palestinian workers are paid far less than their Israeli counterparts and SodaStream recently fired 60 Palestinians following a dispute over food for the breaking of the Ramadan fast. Workers have previously said they are treated ‘like slaves’”. “Palestinians are forced to work inside settlements in sub-standard conditions because of Israel’s deliberate destruction of the Palestinian economy. There’s an urgent need for the creation of decent and dignified jobs within the Palestinian economy.”
  • SodaStream was forced to close its flagship store in Brighton in the UK as a result of regular pickets of the store. Soros Fund Management, the family office of the billionaire investor George Soros, sold its stake in SodaStream following BDS pressure. SodaStream’s share price fell dramatically in recent months as sales dried up, particularly in North America. After reaching a high of $64 per share in October 2013, the stock fell to around $20 per share this month. SodaStream has estimated its third quarter revenue will be $125 million, down almost 14 percent from the same period last year. But Ziadah warned that SodaStream will still remain actively complicit in the displacement of Palestinians in the Naqab and will remain a focus of boycott campaigning. “Even if this announced closure goes ahead, SodaStream will remain implicated in the displacement of Palestinians. Its new Lehavim factory is close to Rahat, a planned township in the Naqab (Negev) desert, where Palestinian Bedouins are being forcefully transferred against their will. Sodastream, as a beneficiary of this plan, is complicit with this violation of human rights,” she said.
  • ...1 more annotation...
  • SodaStream have said all workers will be offered jobs at its new plant, although Israel’s apartheid wall and severe restrictions on movement will make the commute to the new plant difficult for its Palestinian workers. All of the main Palestinian trade unions have called for boycott and are members of the Palestinian BDS National Committee, the civil society coalition that leads the BDS movement and helped to initiate the campaign against SodaStream.
  •  
    The Palestine BDS Movement drew economic blood According to the NYT, SodaStream's revenues fell so far that its books needed red ink and the Israeli government chipped in $20 million to move SodaStream out of the Occupied Territories. 
3More

http://www.ronpaulinstitute.org/archives/peace-and-prosperity/2015/january/23/foreign-t... - 0 views

  • US-backed president of Ukraine, Petro Poroshenko, was among the elites gathering in Davos, Switzerland this week to attend the 2015 World Economic Forum. During his speech he made the remarkable claim that 9,000 Russian troops were currently fighting in Ukraine on behalf of the independence-seeking areas of the country. These 9,000 troops have brought with them tanks, heavy artillery, and armored vehicles, he claimed. "Is this not aggression?" he asked the gathered elites.The US was quick to amplify Poroshenko's claims
  • NATO agreed with the US government assessment, adding that the movement of heavy equipment from Russia into Ukraine had increased in pace recently.There appears to be a problem, however. The 9,000 troops and heavy weapons and equipment that purportedly accompanies them have been seen by no one. There are no satellite photos of what would certainly be a plainly visible incursion. We know from incredibly detailed satellite photos of Boko Haram's recent massacre in Nigeria that producing evidence of such large scale movement is entirely within the realm of US and NATO technological capabilities. Still there remains a lack of evidence. Moreover, the Organization for Security and Cooperation in Europe, which is on the ground monitoring the border crossings between Ukraine and Russia, reported just this week that, "At the two BCPs (border crossing points) the OM (observer mission) did not observe military movement, apart from vehicles of the Russian Federation border guard service." If there has been an increase of Russian heavy weapons into Ukraine, why are the satellites in the skies and the eyes on the ground blind to them?
  • US military on the ground in Ukraine is a significant escalation, far beyond the previous deployment of additional US and NATO troops in neighboring Poland and the Baltics.Additionally, the US announced it was transferring heavy military equipment to the Ukrainian armed forces, including the Kozak mine-resistant personnel carrier and some 35 other armored trucks.The US government has reportedly set aside several million dollars to help train the Ukrainian national guard. Considering the fact that the national guard was only re-formed after last year's US-backed coup and is made up in large part of neo-Nazis from the extremist Right Sector, one would hope some of the money is spent dissuading members from such an odious ideology.So there may well be Russian troops and equipment on the ground in Ukraine -- though so far no proof exists and the Russians deny it. But we know very well that there are US troops and heavy military equipment on the ground in Ukraine because the US openly admits it! So Russia has no business claiming interest in unrest on its doorstep, but the US has every right to become militarily involved in a conflict which has nothing to do with us nearly 5,000 miles away? Interventionist illogic.
3More

Tell Congress: My Phone Calls are My Business. Reform the NSA. | EFF Action Center - 0 views

  • The USA PATRIOT Act granted the government powerful new spying capabilities that have grown out of control—but the provision that the FBI and NSA have been using to collect the phone records of millions of innocent people expires on June 1. Tell Congress: it’s time to rethink out-of-control spying. A vote to reauthorize Section 215 is a vote against the Constitution.
  • On June 5, 2013, the Guardian published a secret court order showing that the NSA has interpreted Section 215 to mean that, with the help of the FBI, it can collect the private calling records of millions of innocent people. The government could even try to use Section 215 for bulk collection of financial records. The NSA’s defenders argue that invading our privacy is the only way to keep us safe. But the White House itself, along with the President’s Review Board has said that the government can accomplish its goals without bulk telephone records collection. And the Privacy and Civil Liberties Oversight Board said, “We have not identified a single instance involving a threat to the United States in which [bulk collection under Section 215 of the PATRIOT Act] made a concrete difference in the outcome of a counterterrorism investigation.” Since June of 2013, we’ve continued to learn more about how out of control the NSA is. But what has not happened since June is legislative reform of the NSA. There have been myriad bipartisan proposals in Congress—some authentic and some not—but lawmakers didn’t pass anything. We need comprehensive reform that addresses all the ways the NSA has overstepped its authority and provides the NSA with appropriate and constitutional tools to keep America safe. In the meantime, tell Congress to take a stand. A vote against reauthorization of Section 215 is a vote for the Constitution.
  •  
    EFF has launched an email campagin to press members of Congress not to renew sectiion 215 of the Patriot Act when it expires on June 1, 2015.   Sectjon 215 authorizes FBI officials to "make an application for an order requiring the production of *any tangible things* (including books, records, papers, documents, and other items) for an investigation to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities, provided that such investigation of a United States person is not conducted solely upon the basis of activities protected by the first amendment to the Constitution." http://www.law.cornell.edu/uscode/text/50/1861 The section has been abused to obtain bulk collecdtion of all telephone records for the NSA's storage and processing.But the section goes farther and lists as specific examples of records that can be obtained under section 215's authority, "library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records."  Think of the NSA's voracious appetite for new "haystacks" it can store  and search in its gigantic new data center in Utah. Then ask yourself, "do I want the NSA to obtain all of my personal data, store it, and search it at will?" If your anser is "no," you might consider visiting this page to send your Congress critters an email urging them to vote against renewal of section 215 and to vote for other NSA reforms listed in the EFF sample email text. Please do not procrastinate. Do it now, before you forget. Every voice counts. 
6More

Canada Casts Global Surveillance Dragnet Over File Downloads - The Intercept - 0 views

  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
  • The latest disclosure sheds light on Canada’s broad existing surveillance capabilities at a time when the country’s government is pushing for a further expansion of security powers following attacks in Ottawa and Quebec last year. Ron Deibert, director of University of Toronto-based Internet security think tank Citizen Lab, said LEVITATION illustrates the “giant X-ray machine over all our digital lives.” “Every single thing that you do – in this case uploading/downloading files to these sites – that act is being archived, collected and analyzed,” Deibert said, after reviewing documents about the online spying operation for CBC News. David Christopher, a spokesman for Vancouver-based open Internet advocacy group OpenMedia.ca, said the surveillance showed “robust action” was needed to rein in the Canadian agency’s operations.
  • In a top-secret PowerPoint presentation, dated from mid-2012, an analyst from the agency jokes about how, while hunting for extremists, the LEVITATION system gets clogged with information on innocuous downloads of the musical TV series Glee. CSE finds some 350 “interesting” downloads each month, the presentation notes, a number that amounts to less than 0.0001 per cent of the total collected data. The agency stores details about downloads and uploads to and from 102 different popular file-sharing websites, according to the 2012 document, which describes the collected records as “free file upload,” or FFU, “events.” Only three of the websites are named: RapidShare, SendSpace, and the now defunct MegaUpload.
  • ...3 more annotations...
  • “The specific uses that they talk about in this [counter-terrorism] context may not be the problem, but it’s what else they can do,” said Tamir Israel, a lawyer with the University of Ottawa’s Canadian Internet Policy and Public Interest Clinic. Picking which downloads to monitor is essentially “completely at the discretion of CSE,” Israel added. The file-sharing surveillance also raises questions about the number of Canadians whose downloading habits could have been swept up as part of LEVITATION’s dragnet. By law, CSE isn’t allowed to target Canadians. In the LEVITATION presentation, however, two Canadian IP addresses that trace back to a web server in Montreal appear on a list of suspicious downloads found across the world. The same list includes downloads that CSE monitored in closely allied countries, including the United Kingdom, United States, Spain, Brazil, Germany and Portugal. It is unclear from the document whether LEVITATION has ever prevented any terrorist attacks. The agency cites only two successes of the program in the 2012 presentation: the discovery of a hostage video through a previously unknown target, and an uploaded document that contained the hostage strategy of a terrorist organization. The hostage in the discovered video was ultimately killed, according to public reports.
  • LEVITATION does not rely on cooperation from any of the file-sharing companies. A separate secret CSE operation codenamed ATOMIC BANJO obtains the data directly from internet cables that it has tapped into, and the agency then sifts out the unique IP address of each computer that downloaded files from the targeted websites. The IP addresses are valuable pieces of information to CSE’s analysts, helping to identify people whose downloads have been flagged as suspicious. The analysts use the IP addresses as a kind of search term, entering them into other surveillance databases that they have access to, such as the vast repositories of intercepted Internet data shared with the Canadian agency by the NSA and its British counterpart Government Communications Headquarters. If successful, the searches will return a list of results showing other websites visited by the people downloading the files – in some cases revealing associations with Facebook or Google accounts. In turn, these accounts may reveal the names and the locations of individual downloaders, opening the door for further surveillance of their activities.
  • Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents. The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files. The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system. According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
3More

Details Of Assassination Plot On Occupy Movement Leaders Withheld From Public At FBI's ... - 0 views

  • The FBI was right to withhold records about an alleged murder plot targeting the leaders of Occupy Houston, to protect its informants, a federal judge ruled. Plaintiff Ryan Noah Shapiro is a doctoral student at the Massachusetts Institute of Technology. His research includes “the policing of dissent … especially in the name of national security” and “examining FBI and other intelligence agency efforts to preserve domestic surveillance capabilities while simultaneously subverting the Freedom of Information Act,” according to his MIT profile. Shapiro sent the FBI three Freedom of Information Act requests in early 2013, asking for records about “a potential plan to gather intelligence against the leaders of [Occupy Wall Street-related protests in Houston] and obtain photographs, then formulate a plan to kill the leadership [of the protests] via suppressed sniper rifles.” Shapiro told Courthouse News he learned of the alleged plot from FBI documents obtained by investigative reporter Jason Leopold.
  • The FBI had refused to give Shapiro any documents until he filed an April 2013 federal complaint in Washington, D.C., after which the agency gave him 17 pages. U.S. District Judge Rosemary Collyer found last year that the FBI had properly withheld some records, but took issue with its use of Exemption 7 under the FOIA, which protects from disclosure “records or information compiled for law enforcement purposes.” Collyer dismissed the lawsuit this week after reviewing the documents in her chambers. Shapiro challenged the FBI’s withholding of the names of its murder plot sources, claiming there is no privacy expectation for people who could be called to testify as trial witnesses. But Collyer found Monday that the FBI correctly invoked FOIA exemption 7(c), which shields law enforcement records from disclosure if they could constitute an invasion of personal privacy. The judge also agreed with the FBI that exemption 7(d) applied to the case. It allows records to be withheld if they “could reasonably be expected to disclose the identity of a confidential source.”
  • Citing a declaration from FBI agent David Hardy that said the confidential sources are “individuals who are members of organized violent groups,” Collyer said the likelihood of retaliation justified keeping the sources’ identities under wraps. Shapiro vowed to keep fighting for the records. “I’m of course disappointed in, and disagree with, the judge’s ruling. I’m now conferring with my attorney to determine next steps,” Shapiro said in an email. He said he is concerned that the FBI collected dossiers on Occupy protestors while publicly denying it. “The FBI even flatly asserted in a separate FOIA lawsuit of mine that, ‘(T)he FBI determined that it had never opened an investigation on the Occupy movement,'” Shapiro wrote. “Yet, in the course of my FOIA lawsuit against the FBI for records about the sniper plot against Occupy Houston, the FBI contradicted its own position.” Shapiro said that with recently released FBI documents about Occupy Chicago, “We are coming ever closer to finally forcing the FBI to concede it actually possesses a large volume of documents about this FBI-coordinated nationwide investigation of political protesters as supposed terroristic threats to national security.”
1More

Leaks Damaged U.S. Intelligence, Official Says - 0 views

  • Unauthorized disclosures of classified information by Edward Snowden have damaged U.S. intelligence capabilities, National Counterterrorism Center director Nicholas J. Rasmussen told Congress last week. “Due to the Snowden leaks and other disclosures, terrorists also have a great understanding of how we seek to conduct surveillance including our methods, our tactics and the scope and scale of our efforts. They’ve altered the ways in which they communicate and this has led to a decrease in collection,” Mr. Rasmussen said at a February 12 hearing of the Senate Select Committee on Intelligence. “We have specific examples which I believe we have shared with the committee and the committee staff in classified session — specific examples of terrorists who have adopted greater security measures such as using various new types of encryption, terrorists who have dropped or changed email addresses, and terrorists who have simply stopped communicating in ways they had before, in part because they understand how we collected,” he said. This is not terribly persuasive, particularly since Mr. Rasmussen did not specify which leaks resulted in which changes by which terrorists at what cost to U.S. security. Nor is a public statement by an intelligence official before the Senate Intelligence Committee entitled any longer to a presumption of accuracy since the Committee permits errors to stand uncorrected.
6More

Britain and Canada Involved in Foiled US Venezuelan Coup Plot | Global Research - 0 views

  • Britain and Canada were co-conspirators in the latest plot to topple Venezuela’s government. TeleSUR provided detailed coverage of Washington’s war on Venezuelan democracy. Its dirty hands manipulate violence and instability worldwide. US funded and supported key opposition fascist figures Antonio Ledezma, Maria Corina Machado and Leopoldo Lopez released a joint February 11 communique a day before the foiled coup. Titled “A Call on Venezuelans for a National Accord for the Transition,” it promoted regime change. Called for Venezuela to be handed back to monied interests. Called Bolivarian fairness “anti-democra(tic)…inefficient and… corrupt.” Run by “an unscrupulous elite (making) the State totalitarian.” Creating “a humanitarian crisis.” “(T)he Maduro government has entered a terminal phase.” Claimed it’s “the duty of every democrat to help resolve the current crisis, to defend freedom…to make the transition…(to restore) democratic order.”
  • Ledezma, Marhado and Lopez want Maduro’s government violently overthrown, democracy crushed. Washington, Britain and Canada hatched the latest plot to return Venezuela to its bad old days. TeleSUR reported new details. “Fresh evidence” showing their involvement, saying: “Many of the individuals being charged, included a military general – whom has confessed to participating in the plans – and a retired lieutenant colonel – have indicated you (fascist Justice Party president Julio Borges) as being a key participant in meetings, which resulted in the decision to carry out a series of bombing attacks as a part of the coup, targeting the Presidential Palace, the National Assembly,” key ministries, TeleSUR’s offices, and other Caracas sites. Venezuelan authorities identified US embassy personnel involved. So were a Royal Canadian Mounted Police official and UK diplomatic core member, according to National Assembly President Diosdado Cabello. They sought information on airport capabilities in case needed in an emergency.
  • Computers seized had detailed coup plans, including maps showing targets to be bombed. A video showed military officials announcing Maduro’s government no longer was recognized. It was scheduled to be aired after planned bombings were launched. Either by a Venezuelan or Miami TV station. Cabello showed a 10-year visa given to one of the plotters days ahead of the planned coup. He noted Obama’s recent statement about “American leadership at times entail(ing) twisting the arms of states which don’t do what we need them to do.” He said coup plotters planned to topple Venezuela’s government forcefully on the anniversary of US-manipulated 2014 street violence. Killing 43. Injuring hundreds. Causing billions of dollars in physical and economic damage. US planned, funded, implemented and directed economic, political, and street warfare continues to topple the hemisphere’s most vibrant democracy. On Saturday, Maduro addressed Venezuelans a second time on national television. Following up on his Thursday coup plot revelations.
  • ...3 more annotations...
  • Explaining more details of Washington’s scheme to oust him forcefully. “Almost all (opposition) leaders knew about this plan, this ambush, almost all of them, including the four-time losing candidate,” Maduro explained. Referring to Henrique Capriles Radonski. One of many Venezuelan fascists wanting power back the old-fashioned way. “I’m not saying all of them were actively involved,” Maduro said. “But it was a rumor circulating amongst them, that something was about to happen. Figures arrested confessed to the plot, Maduro explained. They provided more evidence of Washington’s scheme. It involved enlisting Venezuelan political and military officials. Bribing them with large cash payments. America’s Caracas embassy was coup plot headquarters. Maduro called on Obama to stop interfering in Venezuelan affairs, saying: “In your name, they are organizing coup plots against (Venezuela’s) democratically elected government…” Bolivian President Evo Morales expressed solidarity with Maduro saying “(w)e all have the obligation to enforce respect for democracy and elections, and if we have a clear conscious, not even the empire can defeat us.”
  • Maduro received numerous other messages of support. Nicaraguan President Daniel Ortega condemned the “criminal and futile attempts of the empire to undermine the Bolivarian Revolution.” From Mexico City, the Network of Intellectuals, Artists and Social Movements in Defense of Humanity expressed solidarity in an official statement. It condemned plans to topple Venezuela’s government. TeleSUR reported civil and political organizations worldwide expressing solidarity with Venezuela. Union of South American Nations (UNASUR) Secretary General Ernesto Samper denounced plans to oust Maduro. Venezuelan opposition spokesman Jesus Torrealba lied saying “(t)he government makes up these stories about coups to avoid talking about how the country is breaking down.”
  • State Department spokeswoman Jen Psaki lied calling accusations about Washington plotting Maduro’s ouster “ridiculous.” She absurdly added: “(T)he United States does not support political transitions by non-constitutional means.” “Political transitions must be democratic, constitutional, peaceful, and legal.” “We have seen many times that the Venezuelan Government tries to distract from its own actions by blaming the United States or other members of the international community for events inside Venezuela. These efforts reflect a lack of seriousness on the part of the Venezuelan Government to deal with the grave situation it faces.”
5More

Leaked cables show Netanyahu's Iran bomb claim contradicted by Mossad | World news | Th... - 0 views

  • Read the leaked document here
  • Binyamin Netanyahu’s dramatic declaration to world leaders in 2012 that Iran was about a year away from making a nuclear bomb was contradicted by his own secret service, according to a top-secret Mossad document. It is part of a cache of hundreds of dossiers, files and cables from the world’s major intelligence services – one of the biggest spy leaks in recent times
  • But in a secret report shared with South Africa a few weeks later, Israel’s intelligence agency concluded that Iran was “not performing the activity necessary to produce weapons”. The report highlights the gulf between the public claims and rhetoric of top Israeli politicians and the assessments of Israel’s military and intelligence establishment.
  • ...2 more annotations...
  • The disclosure comes as tensions between Israel and its staunchest ally, the US, have dramatically increased ahead of Netanyahu’s planned address to the US Congress on 3 March. The White House fears the Israeli leader’s anticipated inflammatory rhetoric could damage sensitive negotiations between Tehran and the world’s six big powers over Iran’s nuclear programme. The deadline to agree on a framework is in late March, with the final settlement to come on 30 June. Netanyahu has vowed to block an agreement he claims would give Iran access to a nuclear weapons capability.
  • The Mossad briefing about Iran’s nuclear programme in 2012 was in stark contrast to the alarmist tone set by Netanyahu, who has long presented the Iranian nuclear programme as an existential threat to Israel and a huge risk to world security. The Israeli prime minister told the UN: “By next spring, at most by next summer, at current enrichment rates, they will have finished the medium enrichment and move[d] on to the final stage. From there, it’s only a few months, possibly a few weeks before they get enough enriched uranium for the first bomb.”
4More

China says wants closer military ties with Iran | Reuters - 0 views

  • China wants to have closer military ties with Iran, the Chinese defense minister told the visiting head of the Iranian navy on Thursday, state media reported, reaffirming diplomatic links despite controversy over Iran's nuclear plans.
  • Naval cooperation between Iran and China is aimed at reinforcing Iran's military capability in the Gulf, analysts say, as well as displaying China's plan to exert greater influence and presence beyond East Asia.“The (port) call reflects China’s military-to-military relationship with Iran," said Christian Le Mière, a naval expert at the International Institute for Strategic Studies think-tank."It is the most explicit sign of Beijing’s acknowledgment of this relationship, which has remained relatively covert until now."
  • China's People's Liberation Army Daily separately reported that Sayyari had been given tours of a Chinese submarine and warships, where he "listened to an introduction on equipment ability and weapons systems".Sayyari said he hoped Iran and China could cooperate on anti-piracy operations, the newspaper said.China is Iran's top oil buyer and has been the most aggressive in raising its crude purchases after an easing of the Western sanctions aimed at ending Tehran's disputed nuclear program.
  • ...1 more annotation...
  • China, a participant at the nuclear talks with Iran, has consistently urged a negotiated solution and decried efforts to place sanctions which have not been endorsed by the United Nations on Iran.
6More

Islamic State militants allegedly used chlorine gas against Iraqi security forces - The... - 0 views

  • Dizzy, vomiting and struggling to breathe, 11 Iraqi police officers were rushed to a government hospital 50 miles north of the capital last month. The diagnosis: poisoning by chlorine gas. The perpetrators, according to the officers: Islamic State extremists. The chlorine attack appears to be the first confirmed use of chemical weapons by the Islamic State on the battlefield. An Iraqi Defense Ministry official corroborated the events, and doctors said survivors’ symptoms were consistent with chlorine poisoning. Iraqi forces say two other crude chlorine attacks have occurred since the extremists seized vast tracts of Iraqi territory this summer, but details on those incidents remain sketchy. The reported assaults all raise concerns that the militants are attempting to hone their chemical weapons capabilities as they push to control more ground
  • Chlorine, a common component in industry, is sold legally, but its use as a weapon violates the Chemical Weapons Convention. It was widely employed in trench warfare during World War I, including infamously at Ypres in Belgium, where German forces dispersed more than 160 tons of chlorine into the breeze, killing thousands of French and Allied soldiers.
  • One physician on the team, Hassanain Mohammed, had treated similar cases­ before. In 2006 and 2007, al-Qaeda in Iraq, a group that later morphed into the Islamic State, carried out a string of chlorine bombings in the country.
  • ...3 more annotations...
  • An Iraqi Defense Ministry official confirmed this week that a bomb rigged with chlorine canisters was used in the Duluiyah attack. “They use it just to create terror,” said the official, who spoke on the condition of anonymity because he was not authorized to provide the information publicly. “But of course we are very concerned.” In a statement, the Defense Ministry confirmed that the Islamic State has used the gas in a “primitive and ineffective way” near water-treatment plants where it has gained access to chlorine, as well as in roadside bomb attacks. It did not specify the locations of the attacks, but there are several water plants near Duluiyah on territory controlled by the Islamic State.
  • Chlorine bombs are an easy-to-create but inexact weapon, experts say. All that is needed is a small explosive charge to rupture containers filled with the substance. “It’s difficult to deliver on target in combat situations,” said Jean Pascal Zanders, an independent researcher who specializes in chemical and biological weapons and disarmament. “Chlorine dissipates fast unless someone is able to concentrate it in a confined area.” Fighters in Duluiyah say it was not the only time chlorine has been used against them. Another attack this month caused minor injuries, and the fighters were treated locally, police officials said.
  • Soldiers who escaped an Islamic State rout of a besieged army base in Saqlawiyah, where hundreds of soldiers were killed last month, also said chlorine gas was used there — though reports of where and how the gas was delivered varied and could not be confirmed. While some officers said they believed artillery- or mortar-launched canisters fired by the attackers fell short of the base, others, who claimed to have remained in the installation for a longer period, said the canisters fell within its perimeter. Another claimed that the militants detonated chlorine-filled containers.
7More

As U.S. attacks Islamic State, Syria steps up assaults on moderate rebels - The Washing... - 0 views

  • Syrian government forces have dramatically intensified air and ground assaults on areas held by moderate rebels, attempting to deliver crippling blows as world attention shifts to airstrikes by a U.S.-led coalition against Islamic State militants in Iraq and Syria.
  • Rebels in Aleppo say President Bashar al-Assad’s military has escalated attacks in northern areas of the city, trying to cut the supply lines of opposition fighters inside Aleppo. “During the last three days, we have been hit by over 120 barrel bombs,” said Ahmed Abu Talal, a rebel belonging to the Islamic Front group, referring to particularly deadly high-explosive bombs that are often dropped by helicopter. Syria’s military has virtually encircled the city with the help of Shiite militias from Lebanon and Iran, the Assad regime’s chief ally.
  • Rebels and analysts say Assad’s forces are increasing their attacks to exploit what the regime sees as a window of opportunity opened by a campaign that Washington and its allies launched last month against the Islamic State, a heavily armed al-Qaeda offshoot that is also known as ISIS or ISIL.
  • ...3 more annotations...
  • Abu Talal said pro-government forces are trying to take the village of Handarat, which is located just north of Aleppo and next to one of the last roads connecting the city’s rebels with reinforcements and food brought in from the Turkish border. The fall of that road would constitute a major blow to Assad’s opposition in a three-year-old civil war that has killed nearly 200,000 people.
  • The regime has stepped up aerial bombardment of the rebel-held suburbs of eastern Damascus, as well as in areas near the city of Idlib. Government helicopters have dropped some 45 barrel bombs in recent days in the countryside near Idlib to halt rebel movements near two military bases on a strategic road connecting Aleppo with Hama, to the south, said Abdullah Jabaan, a resident of Idlib and journalist for the Syria Live News Network, which supports the opposition.
  • Meanwhile, Assad’s military has largely avoided territory held by Islamic State militants, instead striking moderate rebel factions that could be slated to receive weapons and military training from the coalition, said Riad Kahwaji, chief executive of the Dubai-based Institute for Near East and Gulf Military Analysis. “If the regime manages to fully besiege Aleppo at this time, they would block and undermine the plans of the alliance to use the opposition, or at least present the opposition, as the ultimate ground force to deal with ISIS,” he said. A successful routing of those rebels could position the Assad regime as the only force in Syria capable of fighting the Islamic State, he said.
  •  
    I take this article more as an indication of what the current line of pro-war propaganda is in the U.S. than an indication of what is really happening in Syria. Bear in mind that there is no moderate opposition to the Syrian government and all sources for this article are opposition spokesmen and the "Syrian Observatory for Human Rights" in the UK, a one-man show that functions as a U.S. government propaganda mouthpiece.     
2More

Air Force Right to Fire General Who Threatened Troops with Treason - 0 views

  • The Air Force’s decision to remove Major General James Post from his position as vice commander of Air Combat Command was the right move. As we said in our February 5 letter to the Air Force Secretary, Major General Post had to be held accountable. When he told service members it would be “treason” to communicate with Congress about the A-10’s capabilities it showed he was unfit for command. Members of the military have a constitutional right to communicate with Congress. To threaten them with an offense as serious as treason goes against the very oath that all military personnel and Major General Post, himself, had to take. We look forward to an investigation into the retaliation against those who brought Major General Post's remarks to light. Read POGO’s letter to the Air Force Secretary. Read the Air Force Inspector General’s investigation into Major General Post
  • The Air Force’s decision to remove Major General James Post
10More

The Money Trail: How the US Fostered Yemen's Separatist Movement / Sputnik International - 0 views

  • As Saudi Arabia and its allies have begun the bombing campaign against Yemen, in the south, a separatist movement calling for a "State of South Arabia" is emerging. Fostered by the US, it will leave the Houthis with two hostile states at their borders and locked access to the sea, if it succeeds.
  • Welcome to phase two of US regime change operations. After Yemen's 2011 revolution failed and Houthi militias overthrew President Hadi, forces trained and sponsored by the US government are being activated as a separatist movement. The Southern People's Committees (SPC), founded around 2007 although USAID has been conducting political workshops as part of a $695,000 project and actively grooming leadership in Yemen since 2005. (Also in 2007, weekly protests began, organized by women's organizations, fostered by the workshops.) The SPC were similar to many color revolution movements such as Serbia's Otpor in that they did not have a central leadership, but rather an autonomous cell-based organization. In addition, they were very capable in the use of social media technologies, text messaging and the circumventing the government's internet censorship to organize protests.
  • Meanwhile, the Yemen Center for Human Rights Studies, which received $193,000 from the EU and US-funded Foundation for the Future in 2009, conducted a poll in January 2010, which found that 70 percent of southern Yemenis favored secession. Another USAID-funded project, the $43 million Responsive Governance Project (RGP), launched in May 2010, conducted "New Social Media training for Youth leaders to equip Yemeni youth groups in the use of media to enhance their participation in formulating public issues." The project focuses on establishing contacts with the Yemeni government and providing "leadership and civic education training to youth NGOs."
  • ...5 more annotations...
  • At the same time, USAID funded a $3.58 million project called Promoting Youth for Civic Engagement (PYCE) to train Aden youth " in PACA [political activity training], first aid, self-defense, photography, calligraphy and various other topics," including "media skills," according to an evaluation report of the PYCE Project, conducted in 2012. The project was constrained to Aden and did not conduct workshops in the northern capital, Sanaa, after reportedly receiving threats.
  • The project is presented as a youth "sports program," and although it does include basketball, handball and chess, these were not the primary goal, as the report shows. At the same time, first aid, self-defense, photography and calligraphy (making protest signs) sound a lot more like protest tactics than sports. The program, initially planned to last for two years, did not make any progress reports after March 2012, when President Hadi assumed power. After the 2011 revolution, the SPC became more of a military outfit and took part in a fight against al-Qaeda in Yemen, which coincided with the CIA's expanded drone campaign in the area. This is also where the organization fades from public view when it comes to USAID expense reports, as the organization appeared to lose interest in developing democracy in the country. In a June 4, 2012 a field commander of the People's Committees gave an interview to the Yemen Times, in which he described the group's fight against the Ansar al-Sharia Islamists together with the government.
  • However, the group reappeared in public view on September 23 2014, two days after Houthis took control of Sanaa, and issued a statement in which they call on security forces to "undertake its historical role in providing security and maintaining people's property because it is in order to preserve the revolution, which is the most important accomplishment achieved by the Yemeni people." At the same time, in southern Yemen, the People's Committee has been very active on Facebook and Twitter since around October 2014. The Facebook and Twitter pages publish slick anti-Houthi propaganda and call for separatism and a "State of South Arabia," within the bounds of former South Yemen, and using South Yemen's flag
  • Since mid-March, the SPC have been fighting against Houthis and see Saudi Arabia as an ally of convenience, although some of their social media accounts, Saudi Arabia's King Salman and other royal family figures are glorified. However, the splitting of Yemen benefits Saudi Arabia, as it secludes the Houthis to a smaller Northern Yemen, which would be surrounded by two hostile states, with Saudi Arabia to the north and the new South Arabia to the south, which would also control access to the sea at the Gulf of Aden. The current situation has considerable parallels with Ukraine, which has led the Russian Foreign Minister Sergei Lavrov to call the situation one of "obvious double standards, but we clearly did not want neither what is happening in Ukraine, nor what is happening in Yemen."
  • Indeed, while Russia has been repeatedly accused of helping Donbas independence supporters, the US has openly fostered the south Yemen separatist movement. At the same time, while Ukraine's President Yanukovych was called illegitimate by the US after fleeing the country, Yemen's Hadi has remained "legitimate" and has even called for a Saudi Arabian military operation against the people who ousted him. The ongoing conflict in Yemen is currently at the second phase of US regime change operations, rebel conflict. The first stage, the color revolution, has failed, and now the last stop, foreign intervention and ground invasion remains. Saudi Arabia and its Gulf allies have already begun the airstrikes, and the South Arabia movement has begun its separatist campaign.
  •  
    Looks like Obama's drone attacks in Yemen were not enough to do the job.
  •  
    Turns out that the U.S. has been covertly rocking Yemen heavily at least since the Clinton Administration, including naval bombardment, drone strikes, cruise missiles, et cet.: Ongoing detailed compilations of U.S. covert and military actions in Yemen. (Publication dates are for first entry in compilations.) Methodology: http://www.thebureauinvestigates.com/2011/08/10/pakistan-drone-strikes-the-methodology2/ Drones Team, Yemen: reported US covert actions 2001-2011, The Bureau of Investigative Journalism (29 March 2012), http://www.thebureauinvestigates.com/2012/03/29/yemen-reported-us-covert-actions-since-2001/ (includes data through 2014). Jack Serle, Yemen: Reported US covert actions 2015, The Bureau of Investigative Journalism (26 January 2015),http://www.thebureauinvestigates.com/2015/01/26/yemen-reported-us-covert-actions-2015/
9More

Rumsfeldt's Missing Trillions, Stavridis and Unconventional War | nsnbc international - 0 views

  • One of these survivors is April Gallop. April Gallop would testify under oath in a two-hour-long, video-taped interview with Barbara Honegger who has conducted an in-depth investigation into the events at the Pentagon on September 11. April Gallop would state that a violent explosion near her desk in Wedge Two on Corridor Five, more than 100 ft north from the official narratives’ alleged plane impact point stopped her watch at 9:30.
  • Gallop would state the she saw fires coming out of computers. Barbara Honegger reports that other eyewitnesses, including Tracy Webb experienced such computer fires at the E Ring of Corridor Four.
  • The alleged plane impact happened at least eight minutes after massive explosions inside the Pentagon.
  • ...5 more annotations...
  • Another clock from the Pentagon that is kept at the Smithsonian as well as photographic evidence prove that other clocks stopped due to explosions before the alleged plane impact. Barbara Honegger’s research would show that “something” struck the Pentagon from the outside too. That object, however, was not a jetliner and struck some 150 meters from the alleged jetliner impact site.
  • Donald Rumsfeldt’s war on waste would turn into the Global War on Terror and lead to the invasions of Afghanistan and Iraq. Information about the missing 2.3 trillion dollar was destroyed on September 11.
  • The document states that the United States, for the foreseeable future, would primarily be engaged in unconventional warfare. The document contains a structured approach to the subversion of targeted nation States, beginning with an assessment of a feasible and cooperative opposition, the creation of events to polarize society, the establishment of armed groups and their development into a fighting force that is capable of fighting a civil war or unconventional war under U.S. supervision to achieve U.S. foreign policy goals.
  • The TC 18-01 contains a de-facto blueprint for the United States’ and NATO’s involvement in Libya and Syria under the command of NATO SACEUR Stavridis. The TC 18-01 also represents a precise blueprint of the ongoing war in Iraq and the “crisis” in Ukraine.
  • Arguably, 2.3 trillion dollar are a seizable start-up budget for wars which have to be waged “off the books”.
  •  
    "September 10, 2001. U.S. Secretary of Defense Donald Rumsfeldt stated that 2.3 trillion dollar from the Pentagon's annual budget could not be accounted for. September 11, 2001, the Pentagon's accounting office and the Naval Command Center were targeted, allegedly by a plane. Survivors would report about explosions inside the Pentagon prior to the alleged plane impact. During a 2012 Forestall Lecture , Admiral James G. Stavridis noted that he was working as a newly selected 1-star accounting officer at the Pentagon and that he was lucky to have survived. By 2009 Stavridis would have been promoted to the rank of Admiral and NATO's Supreme Allied Commander Europe. Responsible for NATO's 2011 military operations in Libya, Stavridis would describe NATO's intervention in Libya as "a teachable moment and model for future interventions". "
7More

US manoeuvre in South China Sea leaves little wiggle room with China | World news | The... - 0 views

  • Barack Obama’s decision to send a US guided missile destroyer into disputed waters off the Spratly islands in the South China Sea on Tuesday has provoked predictable outpourings of rage and veiled threats from Beijing – but nothing, yet, in the way of a military response. The worry now is that the confrontation will catch fire, escalate and spread. Both China, which claims the Spratlys as its own, and the US, which does not recognise Beijing’s sovereignty, have boxed themselves into a rhetorical and tactical corner. With the Pentagon insisting it will repeat and extend such naval patrols at will, and with the People’s Liberation Army Navy determined to stop them, it is feared a head-on collision cannot be far away. China’s heated response to Tuesday’s manoeuvre by the USS Lassen off the Spratlys’ Mischief and Subi reefs, where Beijing is controversially building military airstrips and lighthouses on reclaimed land, left it little wiggle room. The American warship had been tracked and warned off, officials said, adding that what it termed an illegal incursion was a “threat to national sovereignty” and a deliberate provocation that could backfire.
  • Anticipating the US move earlier this month, foreign ministry spokeswoman Hua Chunying said: “China will never allow any country to violate China’s territorial waters and airspace in the South China Sea.” If ever a government has publicly laid down a red line, this is it. And Obama just crossed it. Having personally failed to find a compromise in White House talks with Xi Jinping, China’s president, last month, Obama has upped the ante. As is also the case with Xi, it is now all but impossible to envisage an American climbdown without enormous loss of face and prestige. By deploying a powerful warship, by declining to inform China in advance, and by insisting the US is upholding the universal principle of free navigation in international waters and will do so again whenever and wherever it wishes, Obama has deliberately challenged Beijing to do its worst.
  • China is in dispute over other South China Sea islands and reefs with several countries that are all more or less at one with the US on the issue, including the Philippines, Vietnam and Malaysia. Renewed trouble could flare up in any of these places. One possibility is the Scarborough Shoal, claimed by Manila, where clashes have continued on and off since 2012. Another obvious pressure point is the Senkaku islands (Diaoyu in Chinese) in the East China Sea, claimed by both Japan and China. In 2013 Beijing upped the ante, unilaterally declaring an air exclusion, or identification, zone in the area, which the US promptly breached with B52 bombers. This dispute forms part of the background to the military buildup ordered by Japan’s hawkish prime minister, Shinzo Abe, who set a record £27bn defence budget this year. (China’s military budget is roughly £90bn; that of the US is about £378bn).
  • ...3 more annotations...
  • Chinese retaliation, when it comes, and it surely must, may not centre specifically on the Spratlys. There are plenty of other potential troublespots and flashpoints where Beijing might seek to give the Americans pause. In prospect is a sort of geopolitical chain reaction. A spokesman, Lu Kang, hinted at this on Tuesday: “China hopes to use peaceful means to resolve all the disputes, but if China has to make a response then the timing, method and tempo of the response will be made in accordance with China’s wishes and needs.”
  • Reacting to the perceived China threat, Abe is extending Okinawa’s defences and getting involved in South China Sea patrols in support of Washington. Japan also strengthened defence and security ties with Britain – a development that now makes David Cameron’s courtship of Beijing seem all the more incongruous. Taiwan is another powder keg that could be ignited by widening US-China confrontation. While Beijing regards Taiwan as a renegade province and seeks its return, the present-day status quo is underwritten by US military might.
  • US-China naval and aerial rivalry could expand even further afield. China is busy building a blue water fleet (a maritime force capable of operating across the deep waters of open oceans) including aircraft carriers, with the aim of challenging US dominance in the eastern Pacific. Chinese naval ships recently showed up off the Aleutian islands during an Obama visit to Alaska, the mineral-rich Arctic being another possible theatre. Meanwhile, regional western allies such as Australia have serious cause for concern that escalating superpower friction could draw them in.
  •  
    The latest Obama idiocy.
10More

Top US and Saudi Officials responsible for Chemical Weapons in Syria | nsnbc international - 0 views

  • On 21 August 2013, the Syrian Arab Army launched a major military campaign in Damascus. The campaign, called “Operation Shield of the Capital”, was the largest military operation of the Syrian Arab Army in the Damascus region since the beginning of the war in 2011.
  • Although U.S. Intelligence reports repeatedly stressed that the opposition was incapable of launching a major, well coordinated attack, the Syrian Army in Damascus was confronted with an organized fighting force of 25.000 men under arms. The Saudi Arabia backed Jihadist front had amassed 25.000 fighters, organized in 13 battalions or kitab, to to launch a major assault against the capital Damascus. Most of the battalions belonged to Jabhat al-Nusrah and Liwa-al-Islam. The other battalions that took part in the campaign, were the Abou Zhar al-Ghaffari, al-Ansar, al-Mohajereen, Daraa al-Sham, Harun al-Rashid, Issa bin Mariam, Sultan Mohammad al-Fatih, Syouf al-Haqq, the Glory of the Caliphate, the Jobar Martyrs. During the night of 20 to 21 August and during the early morning hours of 21 August, the Syrian Arab Army broke through the insurgent lines in the area near the Jobar entrance. The breakthrough resulted in a collapse of the jihadists defensive positions and to a crushing and decisive strategic defeat of the Jabhat al-Nusrah led brigades.
  • Loosing Jobar effectively cut off the insurgents connection to the Jordanian border town of Al-Mafraq, the most important logistical base for the insurgents as well as for Saudi Arabia and the United States in Jordan. Al-Mafraq was already used as a major staging ground for the two failed attempts to conquer the city of Homs in June and July 2012. In 2012 al-Mafraq became the staging ground for some 40.000 fighters; more than 20.000 of them fought under the Libyan Islamic Fighting Group, which was under the command of Abdelhakim Belhadj and his second in command, Mahdi al-Harati. The CIA maintains a station, US Special Forces (JSOC) train insurgents, and several other US institutions are present in al-Mafraq. The point is of particular importance with regards to the visit of the U.S. Chairman of the Joint Chiefs of Staff to Jordan, which will be detailed below. Al-Mafraq has been the major transit point for Saudi and U.S. arms shipments since 2012, and the delivery of advanced Saudi and U.S. weapons to the insurgents since early August 2013.
  • ...6 more annotations...
  • The collapse of the insurgent front prompted the front commanders, most of which work in liaison to U.S. Special Forces, to deploy an elite force that should prevent the Syrian Army, at all costs, from gaining access to the Jobar Entrance, and from gaining control over the Jobar area. The majority of the insurgent crack forces came from Liwa-al-Islam with some additional troops from Jabhat al-Nusrah. The commanding officer of the elite forces was a Saudi national who is known by the name Abu Ayesha, whom eyewitnesses from Ghouta later identified as Abu Abdul-Moneim. Abdul-Moneim had established a cache of weapons, some of which had a tube-like structure, and others which looked like big gas bottles. The cache was located in a tunnel in the Eastern Ghouta district of Damascus. Reports about this tunnel and the weapons cache emerged in international media, after the son of Abdul-Moneim and 12 other fighters lost their lives there, because they mishandled improvised chemical weapons and caused a leak in one of them. Besides Abu Abdul-Moneim, the supreme leader of the Liwa-al-Islam and commander of their chemical weapons specialists, Zahran Alloush took personal charge of the elite troops and chemical weapons specialists who were operating under his direct command. Liwa-al-Islam has, along with other al-Qaeda brigades, the capability to manufacture and launch primitive, but none the less very deadly chemical weapons. The chemical weapons which Zahran Alloush had delivered to Damascus were most likely from al-Qaeda’s (ISIL) chemical weapons stockpiles in Iraq.
  • In early September 2013, Iran’s Foreign Minister Mohammad Javad Zarif stated, that Iran had sent a memo to the White House via the Swiss Embassy in Tehran. Tehran had reportedly informed the USA that handmade articles for chemical weapons, including Sarin gas, were being transferred to Syria. The White House failed to respond. Having to hold the Jobar Entrance and the Jobar district of Damascus “at any cost to maintain any hopes of launching a successful, major military assault on Damascus”, the insurgent commanders decided to launch a chemical weapons attack to halt the advance of the Syrian Arab Army. The political and military opposition and core members of the international alliance behind them had already decided that chemical weapons should be used in August – September. The large scale use of chemical weapons should justify renewed calls for a military intervention. Intelligence about this decision transpired in June.  nsnbc international issued several reports in late June and early July, warning that the insurgents would use large scale chemical weapons attacks in August or September.
  • The decision to launch the chemical weapon on 21 August was most likely based on two considerations. That the use of chemical weapons was already planned. That the Jobar Entrance should be defended at all costs. The final decision, made by Zahran Alloush may in fact have been predetermined together with his U.S. – Saudi liaison officers. Launching a chemical weapons attack would allow the USA, UK and France, to call for military strikes against Syria and to turn the tide. Also, Russian and Syrian intelligence sources described the weapons which were used in the attack as rockets which were altered so as to carry chemicals, launched by Liwa-al-Islam. The projectiles were most likely fired from a flatbed.
  • There is a growing and substantial amount of evidence that indicates direct U.S. and Saudi involvement in the chemical weapons attack. To begin with one merely has to answer the fundamental question “Who Benefits”, and the answer is definitely not “the Syrian government”. In fact, the  Federal German Intelligence Service (BND) claims that it has intercepted phone calls between Syrian officers and the Syrian High Command. The BND is convinced that none of the Syrian forces have used a chemical weapon. Leaving alone any moral considerations, the domestic and international repercussions were foreseeable and there would not have been any strategic benefit for the Syrian Army or the government.
  • Also, the involvement of Saudi Arabia ultimately points towards Washington and the White House. The involvement of Liwa-al-Islam in the chemical weapons attack establishes a strong chain of circumstantial evidence to the Saudi Intelligence Chief Prince Bandar bin Sultan. The supreme leader of Liwa-al-Islam and commander of the groups’ chemical weapons specialists, Zahran Alloush, has been working for the then Saudi Intelligence Chief Prince Turki al-Faisal in both Afghanistan and Yemen in the 1980s. Since the 1990s, Alloush was involved in the Salafist – Wahabbist terrorist networks in Syria which led to his arrest by Syrian intelligence. He was released in early of 2011, when the Assad administration granted a general amnesty. Immediately after his March 2011 release from prison, Zahran Alloush began receiving substantial funds and weapons from Saudi intelligence, which enabled him to establish Liwa-al-Islam as a de facto Saudi Arabia sponsored mercenary brigade under the auspices of the Saudi Interior Ministry.
  • Saudi funding enabled Alloush to establish the Liwa-al-Islam as a major fighting force in Syria. The group gained fame due to risky, high-profile attacks. On 8 July 2012, the group carried out a bomb attack against the headquarters of Syria’s National Security Council in Rawda Square, Damascus. The group succeeded in assassinating several high profile members of Syria’s security establishment, including the Deputy Minister of Defense and brother-in-law of President Bashar al-Assad, Assaf Shawkat, Defense Minister Dawoud Rajiha, Hassan Turkmani, a former Defense Minister and military adviser to then Vice-President Farouk al-Sharaa.
  •  
    One I had missed before. Whodunnit on the Ghouta, Syria sarin gas attack, right down to the unit commander, a Saudi intelligence asset working with a U.S. Special Forces unit, both controlled by the U.S.-led command and control center in Jordan.   
8More

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
5More

You have now landed in Geneva, Syria - RT Op-Edge - 0 views

  • The alleged Syrian peace process now enters its Geneva charade stage. This could last months; get ready for lavish doses of posturing and bluster capable of stunning even Donald Trump.
  • And that brings us to Ankara’s nightmares. Russian Air Force smashed most of Ankara’s Turkmen proxies - heavily infiltrated by Turkish fascists - in northwest Syria. That was the key reason for Sultan Erdogan’s desperate move of shooting down the Su-24.It’s by now clear that the winners, as it stands, on the ground, are the “4+1”, and the losers are Saudi Arabia and Turkey. So no wonder the Saudis want at least some of their proxies at the negotiating table in Geneva, while Turkey tries to change the subject by barring the Syrian Kurds: these are accused of being terrorists, much more than ISIS/ISIL/Daesh.    
  • As if this was not messy enough, US ‘Think Tankland’ is now spinning there is an “understanding” between Washington and Ankara for what will be, for all practical purposes, a Turkish invasion of northern Syria, under the pretext of Ankara smashing ISIS/ISIL/Daesh in northern Aleppo.This is utter nonsense. Ankara’s game is three-pronged; prop up their heavily battered Turkmen proxies; keep very much alive the corridor to Aleppo – a corridor that crucially includes the Jihadi Highway between Turkey and Syria; and most of all prevent by all means necessary that YPG Kurds bridge the gap from Afrin to Kobani and unite all three Syrian Kurd cantons near the Turkish border.None of this has anything to do with fighting ISISL/ISIL/Daesh. And the nuttiest part is that Washington is actually assisting the Syrian Kurds with air support. Either the Pentagon supports the Syrian Kurds or Erdogan’s invasion of northern Syria; schizophrenia does not apply here.A desperate Erdogan may be foolish enough to confront the Russian Air Force during his purported “invasion”. Putin is on the record saying response to any provocation will be immediate, and lethal. To top it off, the Russians and Americans are actually coordinating airspace action in northern Syria.  
  • ...1 more annotation...
  • This is bound to be the next big thing, fully eclipsing the Geneva pantomime. The YPG and its allies are planning a major attack to finally seize the 100-kilometer stretch of the Syria-Turkey border still controlled by ISIS/ISIL/Daesh – thus reuniting their three cantons.Erdogan was blunt; if the YPG pushes west of the Euphrates, it’s war. Well, looks like war then. The YPG is getting ready to attack the crucial towns of Jarabulus and Manbij. Russia most certainly will aid the YPG to reconquer Jarabulus. And that will directly pit – once again - Turkey against Russia on the ground.Geneva? That’s for tourists; the capital of the Syrian horror show is now Jarabulus.
  •  
    Pepe Escobar says war between Turkey and Russia in Syria is in the offing. 
2More

U.S. Now Overtly at War Against Russia | Global Research - Centre for Research on Globa... - 0 views

  • NATO Secretary General Jens Stoltenberg announced on February 2nd that he approves of US ‘Defense’ Secretary Ash Carter’s proposal to quadruple US armaments and troops in Europe, against ‘Russian aggression’. Secretary Carter said earlier that same day, in his announcement of America’s arming for war against Russia: We are reinforcing our posture in Europe to support our NATO allies in the face of Russia’s aggression. In Pentagon parlance, this is called the European Reassurance Initiative and after requesting about $800 million for last year, this year we’re more than quadrupling it for a total of $3.4 billion in 2017. That will fund a lot of things: more rotational US forces in Europe, more training and exercising with our allies, more preposition and war-fighting gear and infrastructure improvements to support all this. And when combined with US forces already in and assigned to Europe – which are also substantial – all of this together by the end of 2017 will let us rapidly form a highly capable combined arms ground force that can respond across that theater, if necessary.
  • The US is preparing for an invasion of Russia. «By the end of 2017» the US will be prepared to invade Russia. Secretary Carter went on to say: Russia and China are our most stressing competitors. They have developed and are continuing to advance military system[s] that seek to threaten our advantages in specific areas. And in some case[s], they are developing weapons and ways of wars that seek to achieve their objectives rapidly, before they hope, we can respond. Because of this and because of their actions to date, from Ukraine to the South China Sea, DOD has elevated their importance in our defense planning and budgeting. Since he is a Secretary of ‘Defense’ instead of a Secretary of Offense, he immediately added: While we do not desire conflict of any kind with either of these nations – and let me be clear. That’s all there was to the assertion there; he didn’t finish the sentence, nor even the thought. But in this offhanded way, he did at least try to give the impression that the US is never an aggressor – for example: that, though the US is expanding NATO right up to Russia’s borders, Russia is being the ‘aggressor’ to move troops and weapons up to those borders – up to Russia’s own borders (to counter the US & NATO invasion-threat, of course; but, no: it’s to threaten NATO, if you believe the West).
5More

Presence of U.S. Nuclear Weapons in Okinawa - 0 views

  • Also posted today are recently released CIA documents containing bogus information about Iraq’s nuclear programs
  • Two CIA reports on Iraq and its weapons activities produced during the months after 9/11; the CIA had denied both in their entirety. Neither treated Iraq as a significant threat, but both made claims which would become part of the justification for the 2003 war: that Iraq 1) had acquired aluminum tubes for gas centrifuges and 2) had deployed mobile biological laboratories, claims which were later disproven.
  • Documents 5A-B: Iraq through CIA Eyes after 9/11 A: Central Intelligence Agency, “The Iraq Threat,” 15 December 2001, SPWR [Senior Publish When Ready] 12501-07, Top Secret, excised copy B: Central Intelligence Agency, Senior Executive Memorandum [SEM], “In Response to a query about the status of Iran’s nuclear program,” 11 January 2002, Top Secret, excised copy Source: MDR request to CIA These two high-level CIA assessments from late 2001 and early 2002 demonstrate the lack of solid intelligence regarding Iraq’s WMD programs during the run-up to the 2003 war in Iraq.[3] There was a marked gap between the empirical information which the CIA could report, and be certain about, and the threat assessments which analysts were tasked to produce. Worst-case outcomes are proposed, then quickly undermined by admitting the lack of any intelligence to support doomsday scenarios. “The worst case scenario is illicit acquisition of sufficient fissile material, uranium or plutonium, to allow Baghdad to produce a crude nuclear weapon within a year. CIA has not detected a dedicated Iraqi effort to obtain fissile material from another government or on the black market but Baghdad could be expected to entertain any offers it deems credible” [SEM].
  • ...2 more annotations...
  • The memoranda also indicate a significant disparity between what was probable, and what was feared. The analysts were most confident assessing that Saddam Hussein could be developing nuclear capabilities in just under ten years. Iraq might produce a “nuclear weapon, potentially late this decade,” the SEM notes. The SPWR, on the other hand, concludes: “Iraq is trying to jump-start a clandestine uranium enrichment program to produce the fissile material for a weapon, potentially by late this decade.” Those assessments were produced in the shadow of the failure of U.S. intelligence to detect Saddam Hussein’s clandestine nuclear program before the Gulf War. CIA analysts were hesitant to conclude that Iraq was not an immediate threat, yet they had little evidence indicating the existence of an Iraqi nuclear program that genuinely posed a hazard. “Saddam never abandoned his nuclear weapons program, but reporting on Iraqi efforts to revive it is limited. Iraq continues to employ effective denial and deception measures and there are no indicators that Baghdad has embarked on an extensive nuclear weapons effort as it did before the Gulf War” [SEM]. The released paragraphs addressing Iraq’s support of terrorism failed to mention al-Qaeda, surprising in light of claims from Bush Administration officials that Iraq was linked to terrorism and September 11. The Senior Executive Memorandum notes: “Baghdad has reduced its reliance on surrogates, preferring instead to use its own intelligence services for sensitive terrorist operations,” making a connection to non-Iraqi terrorist groups, including al-Qaeda, doubtful. Within Iraq, the 2001 memo notes how Saddam maintained a “multilayered and pervasive security apparatus.” The underground networks were critical to the anti-American insurgency that developed following the 2003 U.S. invasion, fragments of which have since evolved into the Islamic State. 
  • Despite their equivocal findings, these reports are evidence of the intelligence failure which contributed to the U.S. war. For example, CIA analysts linked the procurement of aluminum tubes to the potential development of centrifuges for uranium enrichment – an assertion later seized on by top officials as evidence that Iraq was trying to reconstitute its nuclear weapons program. Interestingly, intelligence analysts at the Department of Energy disagreed with this CIA contention, instead assessing that the aluminum tubes in question were much more likely intended for more benign purposes. However this disagreement did not appear to receive a full vetting during the lead-up to the 2003 war. Just as dubious were the CIA statements about mobile biological warfare laboratories, information that can be traced back to the notorious dissembler Curveball.
« First ‹ Previous 341 - 360 of 383 Next › Last »
Showing 20 items per page