Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Obama-facts" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

It's Time to Rewrite the Internet to Give Us Better Privacy, and Security - The Daily B... - 0 views

  • Almost 15 years ago, as I was just finishing a book about the relationship between the Net (we called it “cyberspace” then) and civil liberties, a few ideas seemed so obvious as to be banal: First, life would move to the Net. Second, the Net would change as it did so. Gone would be simple privacy, the relatively anonymous default infrastructure for unmonitored communication; in its place would be a perpetually monitored, perfectly traceable system supporting both commerce and the government. That, at least, was the future that then seemed most likely, as business raced to make commerce possible and government scrambled to protect us (or our kids) from pornographers, and then pirates, and now terrorists. But another future was also possible, and this was my third, and only important point: Recognizing these obvious trends, we just might get smart about how code (my shorthand for the technology of the Internet) regulates us, and just possibly might begin thinking smartly about how we could embed in that code the protections that the Constitution guarantees us. Because—and here was the punchline, the single slogan that all 724 people who read that book remember—code is law. And if code is law, then we need to be as smart about how code regulates us as we are about how the law does so.
  • There is, after all, something hopeful about a future that was smart about encoding our civil liberties. It could, in theory at least, be better. Better at protecting us from future Nixons, better at securing privacy, and better at identifying those keen to commit crime.
  • But what astonishes me is that today, more than a decade into the 21st century, the world has remained mostly oblivious to these obvious points about the relationship between law and code. That’s the bit in the Edward Snowden interview that is, to me, the most shocking. As he explained to Glenn Greenwald: The NSA specially targets the communications of everyone. It ingests them by default. It collects them in its system, and it filters them and it analyzes them and it measures them and it stores them for periods of time simply because that’s the easiest and the most efficient and most valuable way to achieve these ends ... Not all analysts have the ability to target everything. But I sitting at my desk certainly had the authority to wiretap anyone—from you [the reporter, Glenn Greenwald], to your accountant, to a federal judge, to even the president if I had a personal email. We don’t know yet whether Snowden is telling the truth. Lots of people have denied specifics, and though his interview is compelling, just now, we literally don’t know. But what we do know are the questions that ought to be asked in response to his claims. And specifically, this: Is it really the case that the government has entrusted our privacy to the good judgment of private analysts? Are there really no code-based controls for assuring that specific surveillance is specifically justified? And what is the technology for assuring that rogues paid by our government can’t use data collected by our government for purposes that none within our government would openly and publicly defend?
  • ...1 more annotation...
  • Because the fact is that there is technology that could be deployed that would give many the confidence that none of us now have. “Trust us” does not compute. But trust and verify, with high-quality encryption, could. And there are companies, such as Palantir, developing technologies that could give us, and more importantly, reviewing courts, a very high level of confidence that data collected or surveilled was not collected or used in an improper way. Think of it as a massive audit log, recording how and who used what data for what purpose. We could code the Net in a string of obvious ways to give us even better privacy, while also enabling better security. But we don’t, or haven’t, obviously. Maybe because of stupidity. How many congressmen could even describe how encryption works? Maybe because of cupidity. Who within our system can resist large and lucrative contracts to private companies, especially when bundled with generous campaign funding packages? Or maybe because the “permanent war” that Obama told us we were not in has actually convinced all within government that old ideas are dead and we just need to “get over it”—ideas like privacy, and due process, and fundamental proportionality. These ideas may be dead, for now. And they will stay dead, in the future. At least until we finally learn how liberty can live in the digital age. And here’s the hint: not through law alone, but through law that demands code that even the Electronic Frontier Foundation could trust.
  •  
    As the most prominent among law professors concerned with online civil liberties and now specializing in government corruption, if Lawrence Lessig says there are technical solutions for protecting us from online government snooping, I'm all years. He directs attention to technology being developed by Palantir, http://www.palantir.com/
10More

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
6More

Hacked Emails Prove Coordination Between Clinton Campaign and Super PACs - 0 views

  • The fact that political candidates are closely coordinating with friendly Super PACs — making a mockery of a central tenet of the Supreme Court’s 2010 Citizens United decision — is one of the biggest open secrets in Washington. Super PACs are only allowed to accept unlimited contributions on the condition that the money is spent independently of specific campaigns. The Federal Election Commission hasn’t reacted for a variety of reasons, including a lack of hard evidence, vague rules, and a partisan divide among the commissioners so bitter they can’t even agree to investigate obvious crimes. But newly disclosed hacked campaign documents published by WikiLeaks and a hacker who calls himself Guccifer 2.0 reveal in stark terms how Hillary Clinton’s staffers made Super PACs an integral part of her presidential campaign.
  • The emails show consistent, repeated efforts by the Clinton campaign to collaborate with Super PACs on strategy, research, attacks on political adversaries and fundraising. The cache also reveal meetings between the campaign and Priorities USA Action, and that campaign officials have helped with the group’s fundraising. The files were apparently hacked from a variety of Clinton staffers and have been posted online in recent weeks by Wikileaks and Guccifer 2.0. Obama administration intelligence officials have alleged, without providing evidence, that the email hacks were conducted on behalf of the Russian government in an attempt to disrupt the U.S. elections.
  • Super PACs, known technically as “Independent Expenditure-Only Political Committees,” are a direct result of the Citizens United court decision. Justice Anthony Kennedy, the author of the decision, proclaimed that deregulating outside money would have no corrupting effect upon candidates because there would be strict firewalls between candidates and outside groups
  • ...3 more annotations...
  • Correct the Record has long argued it could work directly with the Clinton campaign. When the group launched, it said it would only produce and distribute communications online, and that its work would therefore be exempt from FEC coordination rules. The Super PAC was recently the subject of a complaint filed with the Federal Elections Commission by the Campaign Legal Center, which called on regulators to investigate whether Clinton’s campaign has illegally coordinated with the group. The Campaign Legal Center, a nonpartisan watchdog organization, has also alleged that officials working for Donald Trump have similarly blurred the line between the campaign and one of its largest Super PACs, Make America Number 1, by employing common vendors. The Campaign Legal Center argued that Correct the Record has likely made “coordinated expenditures” that could be considered in-kind contributions to the Clinton campaign — such as its spending on “opposition research, message development, surrogate training, reporter pitches, media booking, video production, ‘rapid response’ press outreach, and other ‘earned media.’” “These documents affirm what we’ve been saying all along about Correct the Record,” said Brendan Fischer, an associate counsel at the Campaign Legal Center. “They are basically operating as an arm of the Clinton campaign.”
  • While Correct the Record has argued it is exempt from FEC rules, Clinton herself has said she does not work with Priorities USA Action. That Super PAC has spent millions of dollars on independent expenditures, including six-figure media advertising buys, to boost Clinton’s candidacy. The group has raised over $133 million through individual donations as large as $6 million. As other media outlets have reported, Marc Elias, the Clinton campaign attorney, provided a memo with guidance on how the campaign could solicit funds for Priorities USA Action. The memo notes that campaign staffers would have to use certain language when trying to raise money for the Super PAC:
  • Elias’s law firm, Perkins Coie LLP, has provided legal services to the Clinton campaign, Correct the Record and Priorities USA Action, making it a central node in the campaign infrastructure.
5More

Democratic Pundits Downplay Serious Ethical Issues Raised by the Clinton Foundation - 0 views

  • The Associated Press story this week revealing that as secretary of state, Hillary Clinton frequently met with donors to the Clinton Foundation, set off a firestorm in the media. Many Democrats and sympathetic pundits are criticizing the article — and have made the sweeping claim that, contrary to many deeply reported investigations, there is no evidence that well-heeled backers of the foundation received favorable treatment from the State Department. While there are some legitimate criticisms of the AP story — its focus, for instance, on a Nobel Peace Prize winner meeting with Clinton distracts from the thesis of the piece — it is nonetheless a substantive investigation based on calendars that the State Department has fought to withhold from the public. The AP took the agency to court to obtain a partial release of the meeting logs. Other commentators took issue with a tweet promoting the AP piece, which they said might confuse readers because the AP story reflected private sector meetings, not overall meetings. But in challenging the overall credibility of the AP story, Clinton surrogates and allies are going well beyond a reasoned critique in an effort to downplay the serious ethical issues raised by Clinton Foundation activities.
  • The assertions above obscure the problems unearthed through years of investigative reporting on the foundation. Journalist David Sirota, who has reported extensively on the Clinton Foundation, rounded up a sample of the stories that provide a window into Clinton Foundation issues: The Washington Post found that two months after Secretary Clinton encouraged the Russian government to approve a $3.7 billion deal with Boeing, the aerospace company announced a $900,000 donation to the Clinton Foundation. The Wall Street Journal found that Clinton made an “unusual intervention” to announce a legal settlement with UBS, after which the Swiss bank increased its donations to, and involvement with, the Clinton Foundation. The New York Times reported that a Russian company assumed control of major uranium reserves in a deal that required State Department approval, as the chairman of the company involved in the transaction donated $2.35 million to the Clinton Foundation.
  • The Intercept has also reported on the Clinton Foundation and the conduct of the State Department under Clinton. Leaked government documents obtained by The Intercept revealed that the Moroccan government lobbied Clinton aggressively to influence her and other officials on the Moroccan military occupation of Western Sahara, which holds some of the world’s largest reserves of phosphate, a lucrative export for the kingdom. As part of its strategy for influence, the Moroccan government and companies controlled by the kingdom donated to the Bill Clinton presidential library, the Clinton Foundation, and hired individuals associated with the Clinton political network. Despite a statement by the Obama administration that suggested it would reverse the previous Bush administration support for the Moroccan government and would back a U.N.-negotiated settlement for the conflict in Western Sahara, Clinton announced there would be “no change” in policy — and has gone on to praise the Moroccan government’s human rights record. As recently as Monday, we learned that after being denied an official meeting with the State Department, Peabody Energy, the worlds largest coal company, used a consultant who donated heavily to the Clinton Foundation to back channel and attempt to set up a meeting with Clinton via her aide Huma Abedin. The consultant, Joyce Aboussie, wrote that “It should go without saying that the Peabody folks” reached out to her because of her “relationship with the Clinton’s [sic].” Peabody and Aboussie have declined to comment, and it is unclear if the meeting took place.
  • ...2 more annotations...
  • There may be many other potential influence-peddling stories, but the State Department has not released all of the emails from Clinton’s private server and other meeting log documents, while redacting identifying information that could shed light on other stories. For example, Mother Jones and The Intercept have reported that Clinton used the State Department to promote fracking development across the globe, and in particular her agency acted to benefit particular companies such as a Chevron project in Bulgaria and ExxonMobil’s efforts in Poland. Both ExxonMobil and Chevron are major donors to the Clinton Foundation. The release of more meeting log documents and emails would certainly reveal a better picture of potential influence.
  • Earlier this year, in similar fashion to the questions raised about the Clinton Foundation, Democrats in Arizona raised influence peddling concerns regarding the reported $1 million donation from the Saudi Arabian government to the McCain Institute for International Leadership, a nonprofit group closely affiliated with Sen. John McCain, R-Ariz. As chairman of the Armed Services Committee, McCain oversees a range of issues concerning Saudi Arabia, including arms sales. But none of the pundits rushing to the defense of the Clinton Foundation defended McCain. In fact, the more Clinton’s allies have worked to defend big money donations to the Clinton Foundation, the more closely they resemble the right-wing principles they once denounced. In one telling argument in defense of the Clinton Foundation, Media Matters, another group run by David Brock, argued this week that there was “no evidence of ethics breaches” because there was no explicit quid pro quo cited by the AP. The Media Matters piece mocked press figures for focusing on the “optics” of corruption surrounding the foundation. Such a standard is quite a reversal for the group. In a piece published by Media Matters only two years ago, the organization criticized conservatives for focusing only on quid pro quo corruption — the legal standard used to decide the Citizens United and McCutcheon Supreme Court decisions — calling such a narrow focus a “new perspective of campaign finance” that dismisses “concerns about institutional corruption in politics.” The piece notes that ethics laws concerning the role of money in politics follow a standard, set forth since the Watergate scandal, in which even the appearance, or in other words, the “optics” of corruption, is cause for concern.
2More

Polls: Americans Want to Stay Engaged Internationally « LobeLog - 0 views

  • A new study from the University of Maryland’s Program for Public Consultation calls into question the widespread assumption that the American public wants to disengage from world affairs. Rather, the PPC study reveals that large majorities support cooperative forms of international engagement—including full participation in NATO and giving foreign aid—but want the United States to play a less dominant role and for other countries to take up more of the slack. Large majorities support the U.S. having a robust military capacity, but want it adjusted in line with a more limited U.S. role, with allies carrying more of the defense burden. The findings were released today by Voice Of the People. Asked directly about America’s role, less then one in ten want the U.S. to withdraw from efforts to solve international problems or to play no leadership role. On the other hand, less than one in ten want the U.S. to be the preeminent world leader. Instead, eight in ten say that the U.S. should participate in cooperative efforts together with other nations and should play a shared leadership role. Only one in five Americans thinks that under the Obama administration the U.S. has been too engaged in world affairs, while one in three (and a slight majority of Republicans) think it has not been engaged enough. The most common view, held by 46 percent, is that the level of engagement has been about right.
  • But while there is not a desire for the U.S. to disengage, there is dissatisfaction with the way it engages. Two thirds complain that the U.S. plays the role of ‘world policeman’ more than it should (64 percent) and 55 percent say that the U.S. does more than its fair share in solving world problems. “The fact that the American people do not want the U.S. to be so dominant doesn’t mean the public has turned isolationist,” said PPC Director Steven Kull. “Americans want the U.S. to engage in a cooperative way, with the U.S. being less of a world policeman and other countries sharing more of the burden.”
4More

US watched ISIS rise in Syria and hoped to use it -- Kerry on leaked tape - 0 views

  • Last fall Secretary of State Kerry met privately with anti-Assad Syrian activists at the U.N.  The meeting was secretly taped, and you can listen to the tape here:
  • The New York Times got a hold of the tape back in September and wrote a story about it. So did CNN. More on their accounts later. The thrust of the conversation was the mutual frustration of Kerry and the Syrians that Bashar al-Assad was still in power and able to commit atrocities with the support of the Russians, who don’t adhere to international law the way we Americans do. I’d recommend listening to the whole tape; but the conversation went something like this: The Syrians complained we aren’t helping enough.  Kerry and his associates said we and the Saudis and Qatar and Turkey had provided huge amounts of aid to the rebels, who unfortunately were sort of aligned with extremists. “Nusra makes it hard,” Kerry said, referring to Jabhat al-Nusra, the Al Qaeda affiliate in Syria. “Nusra and Daesh [ISIS] both make it hard, because you have this extreme element out there and unfortunately some of the opposition has kind of chosen to work with them.” The rise of extremists had led to Russia’s intervention. Kerry said (at minute 26) that when Daesh, or ISIS, started to grow, the US watched and thought we could “manage” the ISIS situation, because it might push Assad to negotiate, but instead Putin came in. Kerry:
  • “The reason Russia came in is because ISIL was getting stronger, Daesh was threatening the possibility of going to Damascus and so forth. And that’s why Russia went in. Because they didn’t want a Daesh government and they supported Assad. “And we know that this was growing. We were watching. We saw that Daesh was growing in strength, and we thought Assad was threatened. We thought, however, we could probably manage, that Assad would then negotiate. Instead of negotiating, he got Putin to support him.” The Syrian activists present wanted more US aid, but Kerry and an aide said more military aid was problematic. “Right now we’re putting an extraordinary amount of arms in,” the secretary of state said. His aide said that arms are a double edged sword, because “when you pump more weapons into a place like Syria, it doesn’t end well for Syria. Because there’s always someone willing to put in arms from the other side.” Kerry spelled that out: “The problem is that, you know, you get, quote, enforcers in there and then everybody ups the ante, right? Russia puts in more, Iran puts in more; Hezbollah is there more and Nusra is more; and Saudi Arabia and Turkey put all their surrogate money in, and you all are destroyed.”
  • ...1 more annotation...
  • Kerry said the US wants a “political process” to supplant the fighting: elections, with millions of Syrian refugees in other countries allowed to vote– so that in his view Assad was sure to lose.  The Syrians present rejected this. One insisted that Assad had to be toppled by an invasion, because Syrians even outside the country would fear for their loved ones in the country. Kerry said a ground invasion by America would not be supported by Americans, due to thousands dead from our other wars.  Kerry said he was one of those within the Administration who wanted more action, but he lost the argument.  He was as frustrated as they were. “It’s hard because Congress will not authorize the use of force.” So the conversation was mostly about that frustration, but along the way Kerry said some rather revealing things. Combine this with the wikileaks revelation that the US State Department and Hillary Clinton knew our Arab allies Saudi Arabia and Qatar were giving ISIS “clandestine financial and logistic support” as it swept across Iraq and Syria in 2014, and you have the anti-interventionist view of America’s role in the Syrian war all nicely set out by John Kerry and someone in the State Department: We and our Arab allies supplied weapons. This caused the violence to escalate.  The good rebels “kind of” work with extremists, who get direct funding from our Arab allies. We thought the rise of ISIS would prove useful in pressuring Assad, but Putin intervened not because Russia wants to bomb civilians but because of the rise of ISIS. So our arming of the rebels and our clever hopes to manage the rise of ISIS while it put pressure on Assad led to more violence. This all sounds like a list of reasons for why the U.S. shouldn’t have intervened, along with the fact that we had no right to do so.
3More

The CIA's Absence of Conviction - Craig Murray - 0 views

  • I have watched incredulous as the CIA’s blatant lie has grown and grown as a media story – blatant because the CIA has made no attempt whatsoever to substantiate it. There is no Russian involvement in the leaks of emails showing Clinton’s corruption. Yes this rubbish has been the lead today in the Washington Post in the US and the Guardian here, and was the lead item on the BBC main news. I suspect it is leading the American broadcasts also. A little simple logic demolishes the CIA’s claims. The CIA claim they “know the individuals” involved. Yet under Obama the USA has been absolutely ruthless in its persecution of whistleblowers, and its pursuit of foreign hackers through extradition. We are supposed to believe that in the most vital instance imaginable, an attempt by a foreign power to destabilise a US election, even though the CIA knows who the individuals are, nobody is going to be arrested or extradited, or (if in Russia) made subject to yet more banking and other restrictions against Russian individuals? Plainly it stinks. The anonymous source claims of “We know who it was, it was the Russians” are beneath contempt. As Julian Assange has made crystal clear, the leaks did not come from the Russians. As I have explained countless times, they are not hacks, they are insider leaks – there is a major difference between the two. And it should be said again and again, that if Hillary Clinton had not connived with the DNC to fix the primary schedule to disadvantage Bernie, if she had not received advance notice of live debate questions to use against Bernie, if she had not accepted massive donations to the Clinton foundation and family members in return for foreign policy influence, if she had not failed to distance herself from some very weird and troubling people, then none of this would have happened. The continued ability of the mainstream media to claim the leaks lost Clinton the election because of “Russia”, while still never acknowledging the truths the leaks reveal, is Kafkaesque.
  • I had a call from a Guardian journalist this afternoon. The astonishing result was that for three hours, an article was accessible through the Guardian front page which actually included the truth among the CIA hype: The Kremlin has rejected the hacking accusations, while the WikiLeaks founder Julian Assange has previously said the DNC leaks were not linked to Russia. A second senior official cited by the Washington Post conceded that intelligence agencies did not have specific proof that the Kremlin was “directing” the hackers, who were said to be one step removed from the Russian government. Craig Murray, the former UK ambassador to Uzbekistan, who is a close associate of Assange, called the CIA claims “bullshit”, adding: “They are absolutely making it up.” “I know who leaked them,” Murray said. “I’ve met the person who leaked them, and they are certainly not Russian and it’s an insider. It’s a leak, not a hack; the two are different things. “If what the CIA are saying is true, and the CIA’s statement refers to people who are known to be linked to the Russian state, they would have arrested someone if it was someone inside the United States. “America has not been shy about arresting whistleblowers and it’s not been shy about extraditing hackers. They plainly have no knowledge whatsoever.” But only three hours. While the article was not taken down, the home page links to it vanished and it was replaced by a ludicrous one repeating the mad CIA allegations against Russia and now claiming – incredibly – that the CIA believe the FBI is deliberately blocking the information on Russian collusion. Presumably this totally nutty theory, that Putin is somehow now controlling the FBI, is meant to answer my obvious objection that, if the CIA know who it is, why haven’t they arrested somebody. That bit of course would be the job of the FBI, who those desperate to annul the election now wish us to believe are the KGB. It is terrible that the prime conduit for this paranoid nonsense is a once great newspaper, the Washington Post, which far from investigating executive power, now is a sounding board for totally evidence free anonymous source briefing of utter bullshit from the executive.
  • Now both Julian Assange and I have stated definitively the leak does not come from Russia. Do we credibly have access? Yes, very obviously. Very, very few people can be said to definitely have access to the source of the leak. The people saying it is not Russia are those who do have access. After access, you consider truthfulness. Do Julian Assange and I have a reputation for truthfulness? Well in 10 years not one of the tens of thousands of documents WikiLeaks has released has had its authenticity successfully challenged. As for me, I have a reputation for inconvenient truth telling. Contrast this to the “credible sources” Freedland relies on. What access do they have to the whistleblower? Zero. They have not the faintest idea who the whistleblower is. Otherwise they would have arrested them. What reputation do they have for truthfulness? It’s the Clinton gang and the US government, for goodness sake. In fact, the sources any serious journalist would view as “credible” give the opposite answer to the one Freedland wants. But in what passes for Freedland’s mind, “credible” is 100% synonymous with “establishment”. When he says “credible sources” he means “establishment sources”. That is the truth of the “fake news” meme. You are not to read anything unless it is officially approved by the elite and their disgusting, crawling whores of stenographers like Freedland.
4More

How Much Is Donald Trump Worth? An Examination Of The Evidence | ThinkProgress - 0 views

  • How much money does Donald Trump actually have? Trump’s image as a savvy, deal-making, and, most importantly, fabulously wealthy businessman isn’t just about his personal brand. He’s made it a key selling point for his presidential campaign as he’s run to be the Republican Party’s nominee. “I’m really rich,” he assured voters as he launched his run for president. That message was intended to convey not only that he doesn’t “need anybody’s money” to fuel his campaign but also that he will help create wealth for everyone. “We’re going to make America wealthy again,” he’s promised his supporters. “I will give you everything.” He pledges to Make America Great Again, but also explained that “you have to be wealthy in order to be great, I’m sorry to say.” Yet the nominee has also refused to release his tax returns, which would tell the public exactly how much money he has. He’s maintained that he’s worth more than $10 billion. But he’s also become known for a slippery relationship with the truth, and there’s a pile of evidence to indicate that he may be worth a lot less than that. (Neither the Trump Organization nor the Trump campaign responded to a request for comment on this evidence or on whether he will be releasing his tax returns.)
  • It’s difficult to get a handle on the more than 500 businesses Trump owns, plus other potential investments and sources of wealth, without him disclosing them himself. Even then, much of the valuation rests on what import one gives to the Trump brand itself and how to adequately assess the worth of his various real estate holdings. Financial media outlets have estimated what they think the mogul is worth, but none have ever come close to backing Trump’s claim of $10 billion. When Bloomberg ran a tally this week of all of his major assets, including stock holdings and the value of properties like golf courses and luxury towers, it came up with $3 billion. Forbes, after interviews with 80 sources and a piece by piece look at Trump’s empire, concluded $4.5 billion. The Bloomberg analysis, however, relies at least in part on statements Trump himself made in financial disclosure forms, while Forbes has always had to rely on information given by the Trump Organization — and Forbes has admitted that Trump consistently pushes for a higher valuation. Fortune also caught him conflating revenue and income in his campaign filing reports and thereby significantly inflating how much income he says he has. In other places, Trump has submitted information on forms that would revise his wealth significantly downward. As Crain’s reported in March, Trump got a break in his latest property tax bill for Trump Tower in New York City that is only available to married couples who have an annual income of $500,000 or less.
  • The trend of publicly boasting about his money and then privately swearing that his assets are worth less goes pretty far back. In 1988, Trump a told Forbes that his personal residences were worth $50 million, but he said in sworn statements that they were in fact a net liability because the debt load was more than they were worth. In 1989, while Trump insisted that he was worth between $4 and $5 billion, Forbes obtained records he had submitted to a government body that his assets were only worth $1.5 billion. In 2005, a bank evaluated his net worth to be $788 million when underwriting a construction loan for some of his real estate projects — a time when Trump claimed his worth was more like $3.6 billion. lost the lawsuit.)
  •  
    Gary Johnson and Jill Stein are starting to look awfully good. "If God had wanted us to vote, he would have given us candidates." -- Jay Leno.
4More

Afghan government 'has lost territory to the insurgency' | FDD's Long War Journal - 0 views

  • The Afghan government “has lost territory to the insurgency” and “district control continues to decline,” the Special Inspector General for Afghanistan Reconstruction (SIGAR) said in its most recent quarterly report to United States Congress. An estimated 15 percent of Afghanistan’s districts have slipped from the government’s control over that time period. The picture is more bleak than what the Obama administration and top military commanders have let on when looked at from a longer distance. According to SIGAR, the Afghan government controls or influences just 52 percent of the nation’s districts today compared to 72 percent in Nov. 2015. “SIGAR’s analysis of the most recent data provided by US Forces in Afghanistan (USFOR-A) suggests that the security situation in Afghanistan has not improved this quarter,” the watchdog group noted in its most recent assessment of the country. “The numbers of the Afghan security forces are decreasing, while both casualties and the number of districts under insurgent control or influence are increasing.”
  • “[T]he ANDSF [Afghan National Defense and Security Forces] has not yet been capable of securing all of Afghanistan and has lost territory to the insurgency,” since the last reporting period. The Afghan government has lost control of more than six percent of Afghanistan’s 407 districts since SIGAR issued its last report, on Oct. 30. According to SIGAR, the insurgency, which is overwhelmingly made up of the Taliban, now controls nine districts and influences another 32, while 133 districts are “contested.” USFOR-A defines contested districts as “having ‘negligible meaningful impact from insurgents,’ contending that neither the insurgency nor the Afghan government maintains significant control over these areas.” The names of the Taliban controlled and influenced districts, as well as those that are contested, were not disclosed by USFOR-A or SIGAR.
  • The US military justified the loss of territory by claiming the Afghan government’s “new Sustainable Security Strategy” calls for abandoning districts that are “not important.” “USFOR-A attributes the loss of government control or influence over territory to the ANDSF’s strategic approach to security prioritization, identifying the most important areas that the ANDSF must hold to prevent defeat, and focusing less on areas with less strategic importance,” SIGAR reported. “Under its new Sustainable Security Strategy, the ANDSF targets ‘disrupt’ districts for clearance operations when the opportunity arises, but will give first priority to protecting ‘hold’ and ‘fight’ districts under its control.” This strategy neglects the fact that the Taliban views rural districts or those “with less strategic importance” as critical to its insurgency. The Taliban uses theses districts to raise funds, recruit and train fighters, and launch attacks on population centers. Additionally, Taliban allies such as al Qaeda run training camps and operate bases in areas under Taliban control. This strategy was explained by Mullah Aminullah Yousuf, the Taliban’s shadow governor for Uruzgan, in April 2016. The Taliban has utilized its control of the rural districts to directly threaten major population centers. Last year, the Taliban was able to threaten five of Afghanistan’s 34 provincial capitals. The government lost control of Kunduz for more than a week last fall.
  • ...1 more annotation...
  • FDD’s Long War Journal has maintained that the US military’s assessment of the state of play in Afghanistan’s districts is flawed. Our study estimates the Taliban controls 42 Afghan districts and contests (or influences) another 55. [Note: USFOR-A’s definition of “influence” matches our definition of “contested.” The term “influenced/contested” will be used for clarity to describe these districts. LWJ does not assess districts that are defined by USFOR-A as “contested,” which means neither the Taliban or Afghan government hold sway.] The number of Taliban controlled and influenced/contested districts has risen from 70 in October 2015 to 97 this month. Districts under Taliban command are typically being administered by the group, or the group controls the district center. Additionally, districts where the district center frequently changes hands are considered Taliban-controlled. In influenced/contested districts, the Taliban dominates all of the areas of a district except the administrative center.
2More

Egypt's Court of Cassation Acquitted Hosni Mubarak on January 25 Charges - nsnbc intern... - 0 views

  • Egypt’s Court of Cassation, on Thursday, acquitted ousted ex-president Hosni Mubarak on all charges related to the death of protesters on January 25, 2011.
  • With its ruling, the Court of Cassation acquitted Hosni Mubarak on all charges related to the death of 239 people, and injuries suffered by another 1,588 across eleven of Egypt’s governorates during the so-called January 25, 2011 revolution. Mubarak had been sentenced to life in prison in 2012 for the killing of protesters before appealing the sentence. In November 2014 Mubarak, in a rare comment to the press, described the charges and especially the so-called “Arab Spring” in 2011 as “weird” and rejected that he was guilty of killing anyone. It is widely known that Egypt, under Mubarak, was plagued by corruption and that its human rights record was alarming. Egypt under the Mubarak regime was among others involved in the United States illegal extraordinary rendition program. That is, Egypt “officially” made “black sites” available for the USA and was involved in torturing rendered captives vicariously for the USA. The more surprising then, that the US administration of Barack Obama and the Secretary of State Hillary Clinton were involved in “stage managing” the so-called Arab Spring in 2011, that led to the overthrow of Mubarak and the January 25 “revolution” being coopted by the Muslim Brotherhood and Mohammed Morsi. It is worth recalling that current Egyptian President Abdel Fatah al-Sisi, in a 2013 interview with Larry Weissman “The people of Egypt are aware of the fact that the USA has stabbed Egypt in the back with the Muslim Brotherhood and Morsi. It is nothing that Egypt will easily forget, or forgive”.
4More

Netanyahu and Trump: A Shared Focus on Terrorism « LobeLog - 0 views

  • Scholars of terrorism credit a specific 1979 symposium in Jerusalem as a turning point in the U.S. and international usage of “terrorism” as we understand it today. The Jonathan Institute, founded following the death of Benjamin Netanyahu’s brother Yonatan during a raid to rescue hostages from a PLO hijacking, hosted a 1979 conference in Jerusalem— and a follow up in 1984 in Washington—on “International Terrorism.” Directed by Benjamin Netanyahu, the Jonathan Institute maintained close ties to the Israeli government. Current and former Israeli officials across the political spectrum—including Golda Meir, Menachem Begin, Yitzhak Rabin, Ezer Weizman, Moshe Dayan, and Shimon Peres—dominated its administrative committee. Lisa Stampnitsky, in her 2013 book Disciplining Terror, discusses how the Jonathan Institute helped internationalize Israel’s use of the term to describe terrorist violence as both irrational and illegitimate in both means and ends, and as primarily targeting democracies and “the West.” Previously, she notes, terrorism referred largely to rational political violence, either state or individual, and was dealt with as an issue of criminality and law. The shift helped Israel delegitimize the political aims of certain groups, such as the Palestinian resistance to its colonization and territorial occupation. One cannot be a “freedom fighter” if one’s political aims are demonized as illegitimate or irrational. Stampnitsky argues that the shift to using terrorism to describe violence outside the law also set the stage for retaliatory strikes (such as the 1986 U.S. air strikes in Libya in response to a bombing at a Berlin disco that killed an American soldier) and eventually for the doctrine of preemptive force that has characterized the post-9/11 “War on Terror.”
  • Israel’s role in the development of a specifically anti-Muslim discourse of terrorism is deeply intertwined with the foreign policies of American politicians. As Deepa Kumar and others have pointed out, American neocons and Israel’s Likud party jointly developed a shared language around Islamic terrorism. The 1979 Jonathan Institute conference was attended by prominent American officials and political figures, including future President George H.W. Bush and representatives of the American Enterprise Institute, the Center for Strategic and International Studies, and Commentary magazine who brought the ideas, and later a follow-up conference, back to the U.S. Intended to serve as an intervention into the international discourse on terrorism, the explicit aim of the Jerusalem conference was to awaken the Western world to the problem of terrorism as defined by the conference organizers. It contributed to entrenching in the minds of American conservatives what was popularized a few years later as the “clash of civilizations,” firmly situating Israel in the category of Western democracies threatened by Soviets and Palestinians. The follow-up conference in the United States in 1984 went further by emphasizing the relationship between Islam and terror. As Netanyahu himself wrote in the book that came out of the conference: “the battle against terrorism was part of a much larger struggle, one between the forces of civilization and the forces of barbarism.” Then, as now, Netanyahu presented Israel as the bulwark against terrorism, a specific kind of illegitimate political violence that threatens not just Israel but all democracies and the Western world.
  • Echoes of this framing of the debate on terrorism can be found in how Western politicians, including Netanyahu and Trump, discuss the issue. Terrorism, which has no single agreed-upon definition in U.S. or international law, now serves as a moniker applied to all violence that established states deem illegitimate. Most often these days, Western democracies use “terrorism” to describe violence committed by Muslims. As journalist Glenn Greenwald writes, “In other words, any violence by Muslims against the West is inherently ‘terrorism,’ even if targeted only at soldiers at war and/or designed to resist invasion and occupation.” The term functions not as a descriptive tool but an ideological one. It doesn’t merely identify a particular kind of violence. It justifies and even requires a particular kind of forceful response by the state. Israel today presents itself as the world’s expert on counterterrorism. It maintains a profitable security industry predicated on selling expertise and technology tested in its interactions with Palestinians. American tax dollars have been funneled into this industry through U.S. military aid, over 25% of which Israel was allowed to spend domestically (the new military aid deal signed by the Obama White House will phase out this allowance over the next 10 years, sending the rest of the $3.8 billion per year to U.S. defense contractors). The United States and Israel collaborate on counterterrorism initiatives, including joint military exercises and police exchange programs. Here tactics and skills are developed and exchanged for surveillance and violent repression of protests that primarily impact Muslims and people of color in the U.S. and Palestinians and Black Jews in Israel.
  • ...1 more annotation...
  • In this context, Trump’s framing of his anti-Muslim immigration policies as a national security priority to keep out terrorists is nothing new. What is new in this political moment is the extent to which the U.S. public is seeing straight through this discourse and rallying against discrimination and bigotry. Ahead of Trump and Netanyahu’s meeting this week, there’s an opportunity to pay attention to how these discourses have enabled Israel to justify decades of military occupation and human rights abuses with the discourse of national security and counterterrorism. As the Trump administration goes back to the drawing board to devise restrictive immigration policies that will hold up in court, Netanyahu and Israel’s example shouldn’t be far from mind.
1More

Obama Promises Vs Reality - Devastating Facts - YouTube - 0 views

  •  
    YOUNG TURKS LEAN LIBERAL BUT LISTEN TO THIS
3More

NATO's Secret Kurdish War: Turkey Prepares Iraq-Style Attacks Inside Syria:  ... - 0 views

  • Recent reports detail a Turkish military buildup on the Turkish-Syrian border with various accounts mentioning the deployment of troops, tanks, armored personnel carriers and missile batteries two kilometers from Syrian territory, with 25 tanks from the Mardin 70th Mechanized Brigade engaged in exercises along the border. The Turkish rationale for the military escalation is that forces of the Democratic Union Party, an ethnic Kurdish group that Ankara accuses of being affiliated with the Kurdistan Workers Party, have assumed control of the Syrian cities of Efrin (Afrin), Kobane and Amude (Amuda) near southeastern Turkey.
  • The Turkish government has been waging a counterinsurgency war against the PKK for 28 years in Turkey, and over the past decade in northern Iraq, with the active support of the Pentagon and NATO. In fact, the campaign against Kurdish opposition groups is another, unacknowledged, American and NATO war, one to be added to a growing list that includes Yugoslavia, Afghanistan, Pakistan, Iraq, Somalia, Libya and now Syria.
  •  
     I wonder how many Americans realize that the U.S. is now actively waging war in over two-dozen nations globally?    
3More

How the U.S. Uses Surveillance and Scandal to Advance Its Global Control | Alternet - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.For well over a century, from the pacification of the Philippines in 1898 to trade negotiations with the European Union today, surveillance and its kissing cousins, scandal and scurrilous information, have been key weapons in Washington’s search for global dominion. Not surprisingly, in a post-9/11 bipartisan exercise of executive power, George W. Bush and Barack Obama have presided over building the NSA step by secret step into a digital panopticon designed to monitor the communications of every American and foreign leaders worldwide.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies.Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  •  
    Excellent, detailed, and heavily referenced with hyperlinks. A history of U.S. use of intelligence for blackmail purposes. The author makes the case that with the U.S. empire and economy waning, the U.S. has found an extremely inexpensive method to project power by blackmail.
11More

LAPD scopes out Israeli drones, 'Big Data' solutions | Nation | Jewish Journal - 0 views

  • For the first nine days of February, eight of the Los Angeles Police Department’s top brass were 7,500 miles away from home, being shuttled around Israel in a minibus.
  • LAPD Deputy Chief Jose Perez, a good-natured 30-year veteran of the department who oversees its central bureau, tweeted updates at nearly every stop. On Feb. 2, he shared a group photo of the Los Angeles delegation visiting the corporate headquarters of Nice Systems, an Israeli security and cyber intelligence company that can intercept and instantly analyze video, audio and text-based communications. (A seemingly tongue-in-cheek inspirational poster on the wall behind them reads: “Every voice deserves to be heard.”)
  • The group visited private security firms and drone manufacturers, as well as the terror-prone Ashdod Port, a museum in Sderot full of old rockets shot from nearby Gaza (the same one United States President Barack Obama visited on his 2008 campaign trip to Israel), and a “safe city” underground control center in the large suburb of Rishon LeZion, which receives live streams from more than 1,000 cameras with license plate recognition installed throughout the city.
  • ...8 more annotations...
  • Frank was joined by seven of his fellow command staff at the Big Data Intelligence Conference hosted by i-HLS in the beach town of Herzliya, Israel, on Feb. 6. “On behalf of my chief of police, Chief Charlie Beck, and the 13,000-plus sworn and non-sworn members of the Los Angeles Police Department, a very heartfelt thanks to all of you for having me here,” Frank said in an opening statement for the conference, which brought together some of Israel’s — and the world’s — top cyber security and intelligence experts.
  • Frank said he was especially impressed by what he saw while visiting Israeli companies Nice Systems (as tweeted by Perez) and Verint, one of the companies whose services the National Security Administration (NSA) reportedly used in the infamous United States wiretapping scandal. Both companies already count the LAPD as a client. But, Frank said, “we’re looking at some of their additional solutions … They have a lot of new technologies that we are very much interested in.” Nice System’s  president of security, Yaron Tchwella, spoke at the conference about the company’s ability to help government agencies capture and store the billions of calls, emails, messages and social media posts that their populations generate each day, then analyze it in real time to detect potential threats.
  • Perez said he hoped the LAPD, too, would eventually be able to “use technology to incorporate all the systems that we have. That’s the wave of the future. We’re definitely looking at the ability to get that information out to the officers on the beat with a handheld. Something happens, and you’re looking at the handheld — almost like ‘The Bourne Supremacy’ — here’s a picture of the guy you’re looking for.”
  • Also in Khan’s crosshairs is Special Order 1, an LAPD policy that allows officers to document any otherwise lawful activity that they, or other members of the community, deem suspicious. (Including, for example, the photographing of certain government sites.) And new LAPD intel collection methods or surveillance drones, said Khan, would only be “adding more to their toolbox of being highly militarized in counterinsurgency forces” against protesters and movements such as Occupy. “Yet it is wrapped in this whole language of community policing.” Two separate L.A. Weekly investigations in 2012 found that the LAPD uses expensive StingRay devices, which can locate cellphones (and their users) by acting like cellphone towers, and license-plate recognition cameras that track millions of drivers. Although both devices technically require a warrant to be used in a police investigation, there is little way to know whether police are always complying with the rules.
  • Surveillance drones manufactured by Israel Aerospace Industries (IAI) and Sky Sapience were also hot items on the LAPD tour. Both Frank and Perez lit up when talking about the HoverMast, a new tethered drone from Sky Sapience that was just released to the IDF late last year. “There are several things on the wish list, but we did like Sky Sapience — that was incredible,” Perez said. “For me personally, just for my command, which is five stations, and all the special events that I have, crowd control and being able to see everything would be some technology that is needed immediately.” However, Frank added, the HoverMast “has its challenges: from a political standpoint, convincing our political leaders, and from a community standpoint, convincing the community that it’s not Big Brother watching over you.”
  • A spokeswoman for Sky Sapience said the HoverMast can intercept wireless communications, and its cameras are capable of facial recognition. A spokeswoman for IAI said that while showing LAPD officers their drones, the company “wanted to emphasize the fact that drones can be very helpful in giving intelligence in urban scenarios… you need it now, you need it quick, you need to see what’s inside a window, and what’s behind this building.”
  • Many of the companies attracting LAPD interest have one thing in common: They were formed by veterans of the IDF’s elite, top-secret 8200 Unit, better known as Israel’s version of the NSA.
  • Perez emphasized that as a local police agency, the LAPD has much tighter legal constraints than federal agencies to adhere to when adopting army-born surveillance and “big data” technologies.
5More

Keith Alexander Refutes Claims NSA Doesn't Get Cell Data | emptywheel - 0 views

  • Eight days ago, the country’s four major newspapers reported a claim that the NSA collected 33% or less of US phone records (under the Section 215 program, they should have specified, but did not) because it couldn’t collect most cell phone metadata:
  • Since that time, I have pointed to a number of pieces of evidence that suggest these claims are only narrowly true: A WSJ article from June made it clear the cell gap, such as it existed, existed primarily for Verizon and T-Mobile, but their calls were collected via other means (the WaPo and NYT both noted this in their stories without considering how WSJ’s earlier claim it was still near-comprehensive contradicted the 33% claim) The NSA’s claimed Section 215 dragnet successes — Basaaly Moalin, Najibullah Zazi, Tsarnaev brothers — all involved cell users
  • Identifying Moalin via the dragnet likely would have been impossible if NSA didn’t have access to T-Mobile cell data The phone dragnet orders specifically included cell phone identifiers starting in 2008 Also since 2008, phone dragnet orders seem to explicitly allow contact-chaining on cell identifiers, and several of the tools they use with phone dragnet data specifically pertain to cell phones
  • ...2 more annotations...
  • Now you don’t have to take my word for it. Here’s what Keith Alexander had to say about the claim Friday: Responding to a question about recent reports that the NSA collects data on only 20% to 30% of calls involving U.S. numbers, Alexander acknowledged that the agency doesn’t have full coverage of those calls. He wouldn’t say what fraction of the calls NSA gets information on, but specifically denied that the agency is completely missing data on calls made with cell phones. “That part is not true,” he said. “We don’t get it all. We don’t get 100% of the data. It’s not where we want it to be, but it has been sufficient to go after the key targets that we’re going after.” [my emphasis] Admittedly, Alexander is not always entirely honest, so it’s possible he’s just trying to dissuade terrorists from using cellphones while the NSA isn’t tracking them. But he points to the same evidence I did — that NSA has gotten key targets who use cell phones.
  • There’s something else Alexander said that might better explain the slew of claims that it can’t collect cell phone data. The NSA director, who is expected to retire within weeks, indicated that some of the gaps in coverage are due to the fact that the NSA “paused any changes to the program” during the recent controversy and discussions about restructuring the effort. The NSA has paused changes to the program. This echoes WaPo and WSJ reports that crises (they cited both the 2009 and current crisis) delayed some work on integrating cell data, but suggests that NSA was already making changes when the Snowden leaks started.
7More

It's WWIII between CIA and Senate | TheHill - 0 views

  • Senators on Wednesday expressed alarm at explosive allegations that the CIA might have spied on their computers to keep tabs on their controversial review of Bush-era “enhanced interrogation” techniques.ADVERTISEMENTLawmakers from both parties said that if the allegations against the CIA prove true, intelligence officials might have violated the law — and certainly violated the separation of powers enshrined in the Constitution.“I’m assuming that’s it’s not true, but if it is true, it should be World War III in terms of Congress standing up for itself against the CIA, ” Sen. Lindsey Graham (R-S.C.) told The Hill.Intelligence Committee Chairwoman Dianne Feinstein (D-Calif.) confirmed Wednesday that the CIA inspector general was investigating accusations that the covert agency had peered into the panel’s computers. But she didn’t comment on reports that the investigator has referred the matter to the Justice Department.Senate Armed Services Committee Chairman Carl Levin (D-Mich.), an ex officio member of the Intelligence panel, said the charge of spying is “extremely serious.”“There are laws against intruding and tampering, hacking into, accessing computers without permission. And that law applies to everybody,” he said.Brennan in a statement said he was "dismayed" by the “spurious allegations,” which he said were "wholly unsupported by the facts."
  • His statement was released Wednesday evening as McClatchy reported that the computer spying was allegedly discovered when the CIA confronted the Senate Intelligence panel about documents removed from the agency’s headquarters."I am very confident that the appropriate authorities reviewing this matter will determine where wrongdoing, if any, occurred in either the Executive Branch or Legislative Branch," Brennan said.“Until then, I would encourage others to refrain from outbursts that do a disservice to the important relationship that needs to be maintained between intelligence officials and congressional overseers."The allegations escalated a long-simmering feud between Democrats on the Intelligence panel and the CIA over the committee’s classified interrogation report, which provides an exhaustive look at the treatment of detainees in the years after Sept. 11.Sen. Mark Udall (Colo.) and two other Democrats on the Intelligence panel have criticized the CIA and its director, John Brennan, for blocking their efforts to declassify the 6,300-page investigation.“The CIA tried to intimidate the Intelligence Committee, plain and simple,” Udall said. “I’m going to keep fighting like hell to make sure the CIA never dodges congressional oversight again.”
  • Senators have said their review, which was completed in December 2012, is harshly critical of interrogation techniques such as waterboarding, concluding that they were ineffective and did not contribute to the capture of Osama bin Laden.Udall and other Democrats say the report needs to be released because it will "set the record straight" about the use of techniques that critics say amount to torture.While Democrats on the panel backed the report’s findings, most of the Intelligence Committee Republicans dissented.The CIA has objected to some of the report’s conclusions as well, though Udall says its internal review contradicts the agency’s public statements.Sen. Martin Heinrich (D-N.M.), who has joined Udall in pressing for the release of the report, said the allegations about CIA spying show the lengths that the agency will go to protect itself.“I think it’s been pretty clear that the CIA will do just about anything to make sure that this detention and interrogation report doesn’t come out,” Heinrich told The Hill.
  • ...3 more annotations...
  • Other Republicans on the Intelligence panel said the spying charges should be investigated, but they expressed concerns about the leak of the inspector general investigation.“I have no comment. You should talk to those folks that are giving away classified information and get their opinion,” Intelligence Committee Vice Chairman Saxby Chambliss (R-Ga.) said when asked about the alleged intrusions.Sen. Ron Wyden (D-Ore.) appeared to allude to the CIA snooping at an Intelligence Committee hearing last month when he asked Brennan whether the Computer Crimes and Abuse Act applied to the agency.Wyden said Wednesday that Brennan responded in a letter the law did apply.“The Act, however, expressly ‘does not prohibit any lawfully authorized investigative, protective, or intelligence activity … of an intelligence agency of the United States,’ ” Brennan wrote in the letter that Wyden released.McClatchy news service reported that the Intelligence Committee determined earlier this year the CIA had monitored computers it provided to the panel to review top-secret reports, cables and other documents.It’s still unclear whether the alleged monitoring would have violated the law.
  • Udall sent a letter to President Obama on Tuesday calling for declassification of the committee’s report, where he alleged the CIA’s “unprecedented action against the committee” was tied to agency's internal review of the interrogation policies.Udall first raised issues with the internal review of the interrogation techniques at the confirmation hearing of Caroline Krass's nomination as CIA general counsel, which took place in December.He said that the review, conducted under former CIA Director Leon Panetta, corroborated the findings of the Senate Intelligence report and contradicted the public statements from the agency.Udall has placed a procedural hold on Krass’s nomination and told reporters Wednesday that it would remain in place until the CIA meets his requests for more information about the internal review.White House press secretary Jay Carney declined to comment on the spying allegations Wednesday, referring questions to the CIA and Department of Justice.Carney said that "as a general matter," the White House was in touch with the Intelligence Committee."For some time, the White House has made clear to the chairmen of the Senate Select committee on intelligence that the summary and conclusions of the final RDI report should be declassified with any redactions necessary to protect national security," he said.
  • Heinrich said he hoped the CIA intrusions, if confirmed, would push the White House to get involved in the dispute between the agency and the committee over the report.“It would be easy for me to get very upset about these allegations, but I think we need to keep our eye on that ball, because that is a really important historical issue, and people need to understand who made what decisions and why,” he said.
  •  
    Jack Kennedy had the right idea: abolish the CIA.
1More

McCain's Eleven Point Plan For War - LewRockwell.com - 0 views

  • Sen. McCain to the rescue. He looks on in horror as the dramatic threats of the Obama administration against Russia on Ukraine are not only undeterring but in fact mocked by the Russians. He has developed an eleven point plan to hoist the administration back up onto a war footing with Russia. Never let a good crisis go to waste. McCain would start of course with money. Not his own but ours. His first point is to pass the one billion dollar loan guarantee to Ukraine currently stalled in the Senate. Just an appetizer, as he foresees much more US money “to strengthen the IMF’s ability to be a stronger partner to Ukraine.”
6More

BERLIN: German expose of America's "Secret War" attracts quick, strong U.S. rebuttal | ... - 0 views

  • BERLIN — To appreciate the scope and impact of a joint investigative series by the highly regarded German newspaper Sueddeutsche Zeitung and German public television station NDR on the depth of American trespasses in this country, you don’t even have to read a word of the reports, or watch the videos.All you really have to do is take a look at the U.S. Embassy rebuttal of the series. The multi-part, multi-media series was put on line beginning Friday morning, though some parts weren’t up until evening. And others are said to be coming during the coming weeks. The U.S. Embassy in Germany press office statement came out just after 3 p.m.
  • News report charges U.S. with conducting illegal operations from German soil
  • The newspaper reaction to that reaction: "The American Embassy also comments and rejects the reports as innuendo. They are stating the the United States "are not kidnapping and torturing on principal." This is a daring claim. Only seven months ago a commission made up of Democrats and Republicans called it "undeniable" that the United States tortured inmates following the terror attacks of 2001. Even President Barack Obama said in 2009 that the American practice of water boarding was torture." The website does note that almost 20 reporters started gathering this series more than a year ago.So it doesn't look as if the newspaper and television station will be backing away from their reporting just yet.In any case, the U.S. embassy makes a strong statement, and takes on some of Germany's most respected journalists.Why? One piece of the SZ English language version of the series begins:“Tapping Germany’s Chancellor Angela Merkel’s phone would seem like an outrageous breach of trust—except that there have been so many other, deadlier and lesser-known, breaches of trust wrought by the U.S. in Germany in recent years.
  • ...2 more annotations...
  • “Where to begin? There’s the worldwide secret drone war—a massive break with international law. Then there’s the large and growing shadow army of private spies. And, finally, the asylum seekers, whose knowledge is unwittingly used to drop bombs in their home countries.“The worst part? Germany doesn't even seem to mind.”The series goes on at great detail in each of these areas. At times, it advances with videos, including one showing it's reporter being stopped from shooting video near the U.S. Embassy in Berlin, or near a number of bases, and allegedly secret bases, of both the United States and the United Kingdom around Germany.The series reports that the $3 billion a year the United States spends in Germany pay for everything from bases for the 43,000 U.S. soldiers stationed here to the American drone campaign in Africa. According to the newspaper’s English language version, that drone program works like this:
  • “First they practice with their 57 drones getting ready for the real thing. When they receive intelligence on potential targets and suspected terrorists, they deliver that information to U.S. intelligence officers, also based in Germany. And these soldiers are responsible when innocent civilians in Africa die as a result. Moral issues aside, the fact remains: without these bases in Germany, the U.S.’s ‘war on terror’ would not be the well-oiled machine it is now. Germany acts as the headquarters for secret wars in Africa, the European hub for CIA operations and the training ground for drone attacks worldwide. And Germany’s location is indispensable.”There is much, much more, here. And the website notes that stories will be coming out during the next several weeks. 
  •  
    German journalists are doing their own digging on U.S. abuse of that nation as a major base for spying and waging war against Africa. In the last line of the quoted article, there is a link to a site that is translating the German reports. 
21More

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional committee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial institutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms with Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency with which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of its largest.19 The political clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [Italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘It was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 It also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the Italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter Maritime Bank, which interlocked with BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 It is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. It is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. It may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
« First ‹ Previous 361 - 380 of 427 Next › Last »
Showing 20 items per page