Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "secret-evidence" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
6More

Poland asks European court to hide CIA secret torture prison case from public - RT News - 0 views

  • Poland has asked the European Court of Human Rights to bar media and public presence during an upcoming hearing on Poland’s complicity with the CIA’s “extraordinary rendition” program that delivered terror suspects to secret prisons around the world. The public hearing in Strasbourg, France, scheduled for Dec. 3, will be the first arguments testing allegations that the Polish government allowed the CIA to operate a jail for supposed Al-Qaeda fighters in Poland. The request for a private hearing “will be examined by the court shortly,” a court spokesperson told Reuters. Poland cited national security concerns as to why it wants the hearing to remain confidential.
  • "We should have the right to review this case in public," said Adam Bodnar, vice president of the Warsaw-based Helsinki Foundation for Human Rights. "I do not see a reason for confidentiality of proceedings." Bodnar added that most of the evidence about the alleged CIA jail is already public, and keeping it secret is pointless now. His organization was instrumental in uncovering evidence of Poland’s cooperation with the agency.
  • The European Court of Human Rights (ECHR) case was brought by lawyers for Abu Zubaydah and Abd al-Rahim al-Nashiri, both now detainees waiting for charges at Guantanamo Bay.
  • ...2 more annotations...
  • The men allege they were kidnapped and held by the CIA at an intelligence training facility near Stare Kiejkuty, in northeast Poland. There, suspects “were subjected to enforced disappearance and tortured between 2002 and 2005,” Amnesty International said. Nashiri claims that while at the Polish site, he was subjected to torture, or “enhanced interrogation techniques,” and other harsh treatments, “such as ‘mock execution’ with a gun and threats of sexual assault against his family members,” Amnesty reported. Zubaydah was waterboarded 83 times in one month while in secret CIA detention.
  • Hosting such a secret prison violates the European Convention on Human Rights and the UN Convention Against Torture, both of which all European Union member states are bound to follow.
  •  
    I'll be surprised if the gag order is granted. The European Court of Human Rights has already handled a prior case involving CIA extraordinary rendition of a German citizen, holding the former Yugoslavian Republic of Macedonia liable for collaboration. That case was handled publicly and its public decision stands as a milestone indictment of the CIA's methods of waging War on Terror. http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-115621  
18More

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
6More

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
8More

The White House Has Been Covering Up the Presidency's Role in Torture for Years - The I... - 0 views

  • On May 10, 2013, John Brennan presented CIA’s response to the Senate Intelligence Committee Torture Report to the President. Official White House Photo by Pete Souza. The fight between the CIA and the Senate Intelligence Committee over the Committee’s Torture Report – which Dan Froomkin covered here – has now zeroed in on the White House. Did the White House order the CIA to withdraw 920 documents from a server made available to Committee staffers, as Senator Dianne Feinstein says the agency claimed in 2010? Were those documents – perhaps thousands of them – pulled in deference to a White House claim of executive privilege, as Senator Mark Udall and then CIA General Counsel Stephen Preston suggested last fall? And is the White House continuing to withhold 9,000 pages of documents without invoking privilege, as McClatchy reported yesterday? We can be sure about one thing: The Obama White House has covered up the Bush presidency’s role in the torture program for years. Specifically, from 2009 to 2012, the administration went to extraordinary lengths to keep a single short phrase, describing President Bush’s authorization of the torture program, secret.
  • As Steven Aftergood, director of the Federation of American Scientists Project on Government Secrecy, noted  in 2009 – shortly after Hayden revealed that torture started as a covert operation – this means there should be a paper trail implicating President Bush in the torture program. “[T]here should be a Presidential ‘finding’ authorizing the program,” he said, “and [] such a finding should have been provided to Congressional overseers.” The National Security Act dictates that every covert operation must be supported by a written declaration finding that the action is necessary and important to the national security. The Congressional Intelligence committees – or at least the Chair and Ranking Member – should receive notice of the finding. But there is evidence that those Congressional overseers were never told that the finding the president signed on September 17, 2001 authorized torture. For example, a letter from then ranking member of the House Intelligence Committee, Jane Harman, to the CIA’s General Counsel following her first briefing on torture asked: “Have enhanced techniques been authorized and approved by the President?” The CIA’s response at the time was simply that “policy as well as legal matters have been addressed within the Executive Branch.”
  • Nevertheless, the finding does exist. The CIA even disclosed its existence in response to the ACLU FOIA, describing it as “a 14-page memorandum dated 17 September 2001 from President Bush to the Director of the CIA pertaining to the CIA’s authorization to detain terrorists.” In an order in the ACLU suit, Judge Alvin K. Hellerstein confirmed that the declaration was “intertwined with” the administration’s effort to keep the language in the Tenet document hidden. When the administration succeeded in keeping that short phrase secret, all effort to release the declaration also ended.
  • ...4 more annotations...
  • The White House’s fight to keep the short phrase describing Bush’s authorization of the torture program hidden speaks to its apparent ambivalence over the torture program. Even after President Obama released the DOJ memos authorizing torture – along with a damning CIA Inspector General Report and a wide range of documents revealing bureaucratic discussions within the CIA about torture – the White House still fought the release of the phrase that would have made it clear that the CIA conducted this torture at the order of the president. And it did so with a classified declaration from Jones that would have remained secret had Judge Hellerstein not insisted it be made public. As Aftergood noted, such White House intervention in a FOIA suit is rare. “The number of times that a national security advisor has filed a declaration in a FOIA lawsuit is vanishingly small,” he said. “It almost never happens.” But as ACLU Deputy Legal Director Jameel Jaffer noted of the finding, “It was the original authority for the CIA’s secret prisons and for the agency’s rendition and torture program, and apparently it was the authority for the targeted killing program as well.  It was the urtext.  It’s remarkable that after all this time it’s still secret.”
  • Enduring confusion about this particular finding surely exists because of its flexible nature. As Bob Woodward described in Bush at War, CIA Director Tenet asked President Bush to sign “a broad intelligence order permitting the CIA to conduct covert operations without having to come back for formal approval for each specific operation.” As Jane Mayer described in The Dark Side, such an order not only gave the CIA flexibility, it also protected the President. “To give the President deniability, and to keep him from getting his hands dirty, the finding called for the President to delegate blanket authority to Tenet to decide on a case-by-case basis whom to kill, whom to kidnap, whom to detain and interrogate, and how.” When George Tenet signed written guidelines for the CIA’s torture program in 2003, however, he appeared to have deliberately deprived the President of that deniability by including the source of CIA’s authorization – presumably naming the President – in a document interrogators would see. You can’t blame the CIA Director, after all; Tenet signed the Guidelines just as CIA’s Inspector General and DOJ started to review the legality of the torture tactics used against detainees like Abd al-Rahim al-Nashiri, who was threatened with a drill and a gun in violation of DOJ’s ban on mock executions.
  • President Obama’s willingness to go to such lengths to hide this short phrase may explain the White House’s curious treatment of potentially privileged documents with the Senate now – describing President Bush’s authorization of the torture program and its seemingly contradictory stance supporting publishing the Torture Report while thwarting its completion by withholding privileged documents. After all, the documents in question, like the reference to the presidential finding, may deprive the President of plausible deniability. Furthermore, those documents may undermine one of the conclusions of the Torture Report. According to Senator Ron Wyden, the Senate Torture Report found that “the CIA repeatedly provided inaccurate information about its interrogation program to the White House.” Perhaps the documents reportedly withheld by the White House undermine this conclusion, and instead show that the CIA operated with the full consent and knowledge of at least some people within the White House. Finally, the White House’s sensitivity about documents involved in the torture program may stem from the structure of the finding. As John Rizzo made clear, the finding authorizes not just torturing, but killing, senior al Qaeda figures. Bob Woodward even reported that that CIA would carry out that killing using Predator drones, a program CIA still conducts. And in fact, when the Second Circuit ultimately ruled to let the White House to keep the authorization phrase secret, it did so because the phrase also relates to “a highly classified, active intelligence activity” and “pertains to intelligence activities unrelated to the discontinued [torture] program.” Given what we know about the September 17, 2001 finding, that may well refer to President Obama’s still active drone program.
  • In any case, the White House’s seemingly contradictory statements about the Torture Report might best be understood by its past treatment of CIA documents. By releasing the DOJ memos and other materials, the White House provided what seemed to be unprecedented transparency about what the CIA had done. But all the while it was secretly hiding language describing what the White House has done.
  •  
    See also U.N. Convention Against Torture, which the U.S. is a party to. http://www.un.org/documents/ga/res/39/a39r046.htm
21More

The American Deep State, Deep Events, and Off-the-Books Financing | Global Research - 0 views

  • It is alleged that some of the bail money that released Sturgis and the other Watergate burglars was drug money from the CIA asset turned drug trafficker, Manuel Artime, and delivered by Artime’s money-launderer, Ramón Milián Rodríguez. After the Iran-Contra scandal went public, Milián Rodríguez was investigated by a congressional committee – not for Watergate, but because, in support of the Contras, he had managed two Costa Rican seafood companies, Frigorificos and Ocean Hunter, that laundered drug money.6
  • In the 1950s Wall Street was a dominating complex. It included not just banks and other financial institutions but also the oil majors whose cartel arrangements were successfully defended against the U.S. Government by the Wall Street law firm Sullivan and Cromwell, home to the Dulles brothers. The inclusion of Wall Street conforms with Franklin Roosevelt’s observation in 1933 to his friend Col. E.M. House that “The real truth … is, as you and I know, that a financial element in the larger centers has owned the Government ever since the days of Andrew Jackson.”18 FDR’s insight is well illustrated by the efficiency with which a group of Wall Street bankers (including Nelson Rockefeller’s grandfather Nelson Aldrich) were able in a highly secret meeting in 1910 to establish the Federal Reserve System – a system which in effect reserved oversight of the nation’s currency supply and of all America’s banks in the not impartial hands of its largest.19 The political clout of the quasi-governmental Federal Reserve Board was clearly demonstrated in 2008, when Fed leadership secured instant support from two successive administrations for public money to rescue the reckless management of Wall Street banks: banks Too Big To Fail, and of course far Too Big To Jail, but not Too Big To Bail.20
  • since its outset, the CIA has always had access to large amounts of off-the books or offshore funds to support its activities. Indeed, the power of the purse has usually worked in an opposite sense, since those in control of deep state offshore funds supporting CIA activities have for decades also funded members of Congress and of the executive – not vice versa. The last six decades provide a coherent and continuous picture of historical direction being provided by this deep state power of the purse, trumping and sometimes reversing the conventional state. Let us resume some of the CIA’s sources of offshore and off-the-books funding for its activities. The CIA’s first covert operation was the use of “over $10 million in captured Axis funds to influence the [Italian] election [of 1948].”25 (The fundraising had begun at the wealthy Brook Club in New York; but Allen Dulles, then still a Wall Street lawyer, persuaded Washington, which at first had preferred a private funding campaign, to authorize the operation through the National Security Council and the CIA.)26 Dulles, together with George Kennan and James Forrestal, then found a way to provide a legal source for off-the-books CIA funding, under the cover of the Marshall Plan. The three men “helped devise a secret codicil [to the Marshall Plan] that gave the CIA the capability to conduct political warfare. It let the agency skim millions of dollars from the plan.”27
  • ...18 more annotations...
  • The international lawyers of Wall Street did not hide from each other their shared belief that they understood better than Washington the requirements for running the world. As John Foster Dulles wrote in the 1930s to a British colleague, The word “cartel” has here assumed the stigma of a bogeyman which the politicians are constantly attacking. The fact of the matter is that most of these politicians are highly insular and nationalistic and because the political organization of the world has under such influence been so backward, business people who have had to cope realistically with international problems have had to find ways for getting through and around stupid political barriers.21
  • In the 1960s and especially the 1970s America began to import more and more oil from the Middle East. But the negative effect on the U.S. balance of payments was offset by increasing arms and aviation sales to Iran and Saudi Arabia. Contracts with companies like Northrop and especially Lockheed (the builder of the CIA’s U-2) included kickbacks to arms brokers, like Kodama Yoshio in Japan and Adnan Khashoggi in Saudi Arabia, who were also important CIA agents. Lockheed alone later admitted to the Church Committee that it had provided $106 million in commissions to Khashoggi between 1970 and 1975, more than ten times what it had paid to the next most important connection, Kodama.31 These funds were then used by Khashoggi and Kodama to purchase pro-Western influence. But Khashoggi, advised by a team of ex-CIA Americans like Miles Copeland and Edward Moss, distributed cash, and sometimes provided women, not just in Saudi Arabia but around the world – including cash to congressmen and President Nixon in the United States.32 Khashoggi in effect served as a “cutout,” or representative, in a number of operations forbidden to the CIA and the companies he worked with. Lockheed, for one, was conspicuously absent from the list of military contractors who contributed illicitly to Nixon’s 1972 election campaign. But there was no law prohibiting, and nothing else to prevent their official representative, Khashoggi, from cycling $200 million through the bank of Nixon’s friend Bebe Rebozo.33
  • The most dramatic use of off-the-books drug profits to finance foreign armies was seen in the 1960s CIA-led campaign in Laos. There the CIA supplied airstrips and planes to support a 30,000-man drug-financed Hmong army. At one point Laotian CIA station chief Theodore Shackley even called in CIA aircraft in support of a ground battle to seize a huge opium caravan on behalf of the larger Royal Laotian Army.30
  • At the time of the Marshall Plan slush fund in Europe, the CIA also took steps which resulted in drug money to support anti-communist armies in the Far East. In my book American War Machine I tell how the CIA, using former OSS operative Paul Helliwell, created two proprietary firms as infrastructure for a KMT army in Burma, an army which quickly became involved in managing and developing the opium traffic there. The two firms were SEA Supply Inc. in Bangkok and CAT Inc. (later Air America) in Taiwan. Significantly, the CIA split ownership of CAT Inc.’s plane with KMT bankers in Taiwan – this allowed the CIA to deny responsibility for the flights when CAT planes, having delivered arms from Sea Supply to the opium-growing army, then returned to Taiwan with opium for the KMT. Even after the CIA officially severed its connection to the KMT Army in 1953, its proprietary firm Sea Supply Inc. supplied arms for a CIA-led paramilitary force, PARU, that also was financed, at least in part, by the drug traffic.28 Profits from Thailand filtered back, in part through the same Paul Helliwell, as donations to members from both parties in Congress. Thai dictator Phao Sriyanon, a drug trafficker who was then alleged to be the richest man in the world, hired lawyer Paul Helliwell…as a lobbyist in addition to [former OSS chief William] Donovan [who in 1953-55 was US Ambassador to Thailand]. Donovan and Helliwell divided the Congress between them, with Donovan assuming responsibility for the Republicans and Helliwell taking the Democrats.29
  • The power exerted by Khashoggi was not limited to his access to funds and women. By the 1970s, Khashoggi and his aide Edward Moss owned the elite Safari Club in Kenya.34 The exclusive club became the first venue for another and more important Safari Club: an alliance between Saudi and other intelligence agencies that wished to compensate for the CIA’s retrenchment in the wake of President Carter’s election and Senator Church’s post-Watergate reforms.35
  • As former Saudi intelligence chief Prince Turki bin Faisal once told Georgetown University alumni, In 1976, after the Watergate matters took place here, your intelligence community was literally tied up by Congress. It could not do anything. It could not send spies, it could not write reports, and it could not pay money. In order to compensate for that, a group of countries got together in the hope of fighting Communism and established what was called the Safari Club. The Safari Club included France, Egypt, Saudi Arabia, Morocco, and Iran.36 Prince Turki’s candid remarks– “your intelligence community was literally tied up by Congress. …. In order to compensate for that, a group of countries got together … and established what was called the Safari Club.” – made it clear that the Safari Club, operating at the level of the deep state, was expressly created to overcome restraints established by political decisions of the public state in Washington (decisions not only of Congress but also of President Carter).
  • Specifically Khashoggi’s activities involving corruption by sex and money, after they too were somewhat curtailed by Senator Church’s post-Watergate reforms, appear to have been taken up quickly by the Bank of Credit and Commerce International (BCCI), a Muslim-owned bank where Khashoggi’s friend and business partner Kamal Adham, the Saudi intelligence chief and a principal Safari Club member, was a part-owner.37 In the 1980s BCCI, and its allied shipping empire owned by the Pakistani Gokal brothers, supplied financing and infrastructure for the CIA’s (and Saudi Arabia’s) biggest covert operation of the decade, support for the Afghan mujahedin. To quote from a British book excerpted in the Senate BCCI Report: “BCCI’s role in assisting the U.S. to fund the Mujaheddin guerrillas fighting the Soviet occupation is drawing increasing attention. The bank’s role began to surface in the mid-1980′s when stories appeared in the New York Times showing how American security operatives used Oman as a staging post for Arab funds. This was confirmed in the Wall Street Journal of 23 October 1991 which quotes a member of the late General Zia’s cabinet as saying ‘It was Arab money that was pouring through BCCI.’ The Bank which carried the money on from Oman to Pakistan and into Afghanistan was National Bank of Oman, where BCCI owned 29%.”38
  • In 1981 Vice-president Bush and Saudi Prince Bandar, working together, won congressional approval for massive new arms sales of AWACS (airborne warning and control system) aircraft to Saudi Arabia. In the $5.5 billion package, only ten percent covered the cost of the planes. Most of the rest was an initial installment on what was ultimately a $200 billion program for military infrastructure through Saudi Arabia.41 It also supplied a slush fund for secret ops, one administered for over a decade in Washington by Prince Bandar, after he became the Saudi Ambassador (and a close friend of the Bush family, nicknamed “Bandar Bush”). In the words of researcher Scott Armstrong, the fund was “the ultimate government-off-the-books.” Not long after the AWACS sale was approved, Prince Bandar thanked the Reagan administration for the vote by honoring a request by William Casey that he deposit $10 million in a Vatican bank to be used in a campaign against the Italian Communist Party. Implicit in the AWACS deal was a pledge by the Saudis to fund anticommunist guerrilla groups in Afghanistan, Angola, and elsewhere that were supported by the Reagan Administration.42 The Vatican contribution, “for the CIA’s long-time clients, the Christian Democratic Party,” of course continued a CIA tradition dating back to 1948.
  • The activities of the Safari Club were exposed after Iranians in 1979 seized the records of the US Embassy in Tehran. But BCCI support for covert CIA operations, including Iran-Contra, continued until BCCI’s criminality was exposed at the end of the decade. Meanwhile, with the election of Ronald Reagan in 1980, Washington resumed off-budget funding for CIA covert operations under cover of arms contracts to Saudi Arabia. But this was no longer achieved through kickbacks to CIA assets like Khashoggi, after Congress in 1977 made it illegal for American corporations to make payments to foreign officials. Instead arrangements were made for payments to be returned, through either informal agreements or secret codicils in the contracts, by the Saudi Arabian government itself. Two successive arms deals, the AWACS deal of 1981 and the al-Yamamah deal of 1985, considerably escalated the amount of available slush funds.
  • It is reported in two books that the BCCI money flow through the Bank of Oman was handled in part by the international financier Bruce Rappaport, who for a decade, like Khashoggi, kept a former CIA officer on his staff.39 Rappaport’s partner in his Inter Maritime Bank, which interlocked with BCCI, was E.P. Barry, who earlier had been a partner in the Florida money-laundering banks of Paul Helliwell.40
  • After a second proposed major U.S. arms sale met enhanced opposition in Congress in 1985 from the Israeli lobby, Saudi Arabia negotiated instead a multi-billion pound long-term contract with the United Kingdom – the so-called al-Yamamah deal. Once again overpayments for the purchased weapons were siphoned off into a huge slush fund for political payoffs, including “hundreds of millions of pounds to the ex-Saudi ambassador to the US, Prince Bandar bin Sultan.”43 According to Robert Lacey, the payments to Prince Bandar were said to total one billion pounds over more than a decade.44 The money went through a Saudi Embassy account in the Riggs Bank, Washington; according to Trento, the Embassy’s use of the Riggs Bank dated back to the mid-1970s, when, in his words, “the Saudi royal family had taken over intelligence financing for the United States.”45 More accurately, the financing was not for the United States, but for the American deep state.
  • This leads me to the most original and important thing I have to say. I believe that these secret funds from BCCI and Saudi arms deals – first Khashoggi’s from Lockheed and then Prince Bandar’s from the AWACS and al-Yamamah deals – are the common denominator in all of the major structural deep events (SDEs) that have afflicted America since the supranational Safari Club was created in l976. I am referring specifically to 1) the covert US intervention in Afghanistan (which started about 1978 as a Safari Club intervention, more than a year before the Russian invasion), 2) the 1980 October Surprise, which together with an increase in Saudi oil prices helped assure Reagan’s election and thus give us the Reagan Revolution, 3) Iran-Contra in 1984-86, 4) and – last but by no means least – 9/11. That is why I believe it is important to analyze these events at the level of the supranational deep state. Let me just cite a few details.
  • 1) the 1980 October Surprise. According to Robert Parry, Alexandre de Marenches, the principal founder of the Safari Club, arranged for William Casey (a fellow Knight of Malta) to meet with Iranian and Israeli representatives in Paris in July and October 1980, where Casey promised delivery to Iran of needed U.S. armaments, in exchange for a delay in the return of the U.S. hostages in Iran until Reagan was in power. Parry suspects a role of BCCI in both the funding of payoffs for the secret deal and the subsequent flow of Israeli armaments to Iran.46 In addition, John Cooley considers de Marenches to be “the Safari Club player who probably did most to draw the US into the Afghan adventure.”47 2) the Iran-Contra scandal (including the funding of the Contras, the illegal Iran arms sales, and support for the Afghan mujahideen There were two stages to Iran-Contra. For twelve months in 1984-85, after meeting with Casey, King Fahd of Saudi Arabia, in the spirit of the AWACS deal, supported the Nicaraguan Contras via Prince Bandar through a BCCI bank account in Miami. But in April 1985, after the second proposed arms sale fell through, McFarlane, fearing AIPAC opposition, terminated this direct Saudi role. Then Khashoggi, with the help of Miles Copeland, devised a new scheme in which Iranian arms sales involving Israel would fund the contras. The first stage of Iran-Contra was handled by Prince Bandar through a BCCI account in Miami; the second channel was handled by Khashoggi through a different BCCI account in Montecarlo. The Kerry-Brown Senate Report on BCCI also transmitted allegations from a Palestinian-American businessman, Sam Bamieh, that Khashoggi’s funds from BCCI for arms sales to Iran came ultimately from King Fahd of Saudi Arabia, who “was hoping to gain favor with Ayatollah Ruhollah Khomeini.”48
  • 3) 9/11 When the two previously noted alleged hijackers or designated culprits, al-Mihdhar and al-Hazmi, arrived in San Diego, a Saudi named Omar al-Bayoumi both housed them and opened bank accounts for them. Soon afterwards Bayoumi’s wife began receiving monthly payments from a Riggs bank account held by Prince Bandar’s wife, Princess Haifa bint Faisal.49 In addition, Princess Haifa sent regular monthly payments of between $2,000 and $3,500 to the wife of Osama Basnan, believed by various investigators to be a spy for the Saudi government. In all, “between 1998 and 2002, up to US $73,000 in cashier cheques was funneled by Bandar’s wife Haifa … – to two Californian families known to have bankrolled al-Midhar and al-Hazmi.”50 Although these sums in themselves are not large, they may have been part of a more general pattern. Author Paul Sperry claims there was possible Saudi government contact with at least four other of the alleged hijackers in Virginia and Florida. For example, “9/11 ringleader Mohamed Atta and other hijackers visited s home owned by Esam Ghazzawi, a Saudi adviser to the nephew of King Fahd.”51
  • But it is wrong to think of Bandar’s accounts in the Riggs Bank as uniquely Saudi. Recall that Prince Bandar’s payments were said to have included “a suitcase containing more than $10 million” that went to a Vatican priest for the CIA’s long-time clients, the Christian Democratic Party.52 In 2004, the Wall Street Journal reported that the Riggs Bank, which was by then under investigation by the Justice Department for money laundering, “has had a longstanding relationship with the Central Intelligence Agency, according to people familiar with Riggs operations and U.S. government officials.”53 Meanwhile President Obiang of Equatorial Guinea “siphoned millions from his country’s treasury with the help of Riggs Bank in Washington, D.C.”54 For this a Riggs account executive, Simon Kareri, was indicted. But Obiang enjoyed State Department approval for a contract with the private U.S. military firm M.P.R.I., with an eye to defending offshore oil platforms owned by ExxonMobil, Marathon, and Hess.55 Behind the CIA relationship with the Riggs Bank was the role played by the bank’s overseas clients in protecting U.S. investments, and particularly (in the case of Saudi Arabia and Equatorial Guinea), the nation’s biggest oil companies.
  • The issue of Saudi Embassy funding of at least two (and possibly more) of the alleged 9/11 hijackers (or designated culprits) is so sensitive that, in the 800-page Joint Congressional Inquiry Report on 9/11, the entire 28-page section dealing with Saudi financing was very heavily redacted.56 A similar censorship occurred with the 9/11 Commission Report: According to Philip Shenon, several staff members felt strongly that they had demonstrated a close Saudi government connection to the hijackers, but a senior staff member purged almost all of the most serious allegations against the Saudi government, and moved the explosive supporting evidence to the report’s footnotes.57 It is probable that this cover-up was not designed for the protection of the Saudi government itself, so much as of the supranational deep state connection described in this essay, a milieu where American, Saudi, and Israeli elements all interact covertly. One sign of this is that Prince Bandar himself, sensitive to the anti-Saudi sentiment that 9/11 caused, has been among those calling for the U.S. government to make the redacted 28 pages public.58
  • This limited exposure of the nefarious use of funds generated from Saudi arms contracts has not created a desire in Washington to limit these contracts. On the contrary, in 2010, the second year of the Obama administration, The Defense Department … notified Congress that it wants to sell $60 billion worth of advanced aircraft and weapons to Saudi Arabia. The proposed sale, which includes helicopters, fighter jets, radar equipment and satellite-guided bombs, would be the largest arms deal to another country in U.S. history if the sale goes through and all purchases are made.59 The sale did go through; only a few congressmen objected.60 The deep state, it would appear, is alive and well, and impervious to exposures of it. It is clear that for some decades the bottom-upwards processes of democracy have been increasingly supplanted by the top-downwards processes of the deep state.
  • But the deeper strain in history, I would like to believe, is in the opposite direction: the ultimate diminution of violent top-down forces by the bottom-up forces of an increasingly integrated civil society.61 In the last months we have had Wikileaks, then Edward Snowden, and now the fight between the CIA and its long-time champion in Congress, Dianne Feinstein. It may be time to see a systemic correction, much as we did after Daniel Ellsberg’s release of the Pentagon Papers, which was followed by Watergate and the Church Committee reforms. I believe that to achieve this correction there must be a better understanding of deep events and of the deep state. Ultimately, however, whether we see a correction or not will depend, at least in part, on how much people care.
12More

Secret Docs Reveal Dubious Details of Targeted Killings in Afghanistan - SPIEGEL ONLINE - 0 views

  • Combat operations in Afghanistan may be coming to an end, but a look at secret NATO documents reveals that the US and the UK were far less scrupulous in choosing targets for killing than previously believed. Drug dealers were also on the lists.
  • The child and his father are two of the many victims of the dirty secret operations that NATO conducted for years in Afghanistan. Their fate is described in secret documents to which SPIEGEL was given access. Some of the documents concerning the International Security Assistance Force (ISAF) and the NSA and GCHQ intelligence services are from the archive of whistleblower Edward Snowden. Included is the first known complete list of the Western alliance's "targeted killings" in Afghanistan. The documents show that the deadly missions were not just viewed as a last resort to prevent attacks, but were in fact part of everyday life in the guerilla war in Afghanistan. The list, which included up to 750 people at times, proves for the first time that NATO didn't just target the Taliban leadership, but also eliminated mid- and lower-level members of the group on a large scale. Some Afghans were only on the list because, as drug dealers, they were allegedly supporting the insurgents.
  • Different rules apply in war than in fighting crime in times of peace. But for years the West tied its campaign in Afghanistan to the promise that it was fighting for different values there. A democracy that kills its enemies on the basis of nothing but suspicion squanders its claim to moral superiority, making itself complicit instead. This lesson from Afghanistan also applies to the conflicts in Syria, Iraq, Pakistan and Yemen. The material SPIEGEL was able to review is from 2009 to 2011, and falls within the term of US President Barack Obama, who was inaugurated in January 2009. For Obama, Afghanistan was the "good" war and therefore legitimate -- in contrast to the Iraq war. The president wanted to end the engagement in Iraq as quickly as possible, but in Afghanistan his aim was to win.
  • ...9 more annotations...
  • After Obama assumed office, the US government opted for a new strategy. In June 2009, then Defense Secretary Robert Gates installed Stanley McChrystal, a four-star general who had served in Iraq, as commander of US forces in Afghanistan. McChrystal promoted the aggressive pursuit of the Taliban. Obama sent 33,000 additional troops to Afghanistan, but their deployment was tied to a demand that military officials provide a binding date for the withdrawal of US forces. At the same time, the president distanced himself from the grand objectives the West had proclaimed when it first marched into Kabul. The United States would not try to make Afghanistan "a perfect place," said Obama. Its new main objective was to fight the insurgency.
  • This marked the beginning of one of the bloodiest phases of the war. Some 2,412 civilians died in Afghanistan in 2009. Two-thirds of them were killed by insurgents and 25 percent by NATO troops and Afghan security forces. The number of operations against the Taliban rose sharply, to between 10 and 15 a night. The operations were based on the lists maintained by the CIA and NATO -- Obama's lists. The White House dubbed the strategy "escalate and exit." McChrystal's successor, General David Petraeus, documented the strategy in "Field Manual 3-24" on fighting insurgencies, which remains a standard work today. Petraeus outlined three stages in fighting guerilla organizations like the Taliban. The first was a cleansing phase, in which the enemy leadership is weakened. After that, local forces were to regain control of the captured areas. The third phase was focused on reconstruction. Behind closed doors, Petraeus and his staff explained exactly what was meant by "cleansing." German politicians recall something that Michael T. Flynn, the head of ISAF intelligence in Afghanistan, once said during a briefing: "The only good Talib is a dead Talib."
  • Under Petraeus, a merciless campaign began to hunt down the so-called shadow governors and local supporters aligned with the Islamists. For the Americans, the fact that the operations often ended in killings was seen as a success. In August 2010, Petraeus proudly told diplomats in Kabul that he had noticed a shifting trend. The figures he presented as evidence made some of the ambassadors feel uneasy. At least 365 insurgent commanders, Petraeus explained, had been neutralized in the last three months, for an average of about four killings a day. The existence of documents relating to the so-called Joint Prioritized Effects List (JPEL) has only been described in vague terms until now. The missions by US special units are mentioned but not discussed in detail in the US Army Afghanistan war logs published by WikiLeaks in 2010, together with the New York Times, the Guardian and SPIEGEL. The documents that have now become accessible provide, for the first time, a systematic view of the targeted killings. They outline the criteria used to determine who was placed on the list and why.
  • According to the NSA document, in October 2008 the NATO defense ministers made the momentous decision that drug networks would now be "legitimate targets" for ISAF troops. "Narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) list for the first time," the report reads. In the opinion of American commanders like Bantz John Craddock, there was no need to prove that drug money was being funneled to the Taliban to declare farmers, couriers and dealers as legitimate targets of NATO strikes.
  • The document also reveals how vague the basis for deadly operations apparently was. In the voice recognition procedure, it was sufficient if a suspect identified himself by name once during the monitored conversation. Within the next 24 hours, this voice recognition was treated as "positive target identification" and, therefore, as legitimate grounds for an airstrike. This greatly increased the risk of civilian casualties. Probably one of the most controversial decisions by NATO in Afghanistan is the expansion of these operations to include drug dealers. According to an NSA document, the United Nations estimated that the Taliban was earning $300 million a year through the drug trade. The insurgents, the document continues, "could not be defeated without disrupting the drug trade."
  • When an operation could potentially result in civilian casualties, ISAF headquarters in Kabul had to be involved. "The rule of thumb was that when there was estimated collateral damage of up to 10 civilians, the ISAF commander in Kabul was to decide whether the risk was justifiable," says an ISAF officer who worked with the lists for years. If more potential civilian casualties were anticipated, the decision was left up to the relevant NATO headquarters office. Bodyguards, drivers and male attendants were viewed as enemy combatants, whether or not they actually were. Only women, children and the elderly were treated as civilians. Even officers who were involved in the program admit that these guidelines were cynical. If a Taliban fighter was repeatedly involved in deadly attacks, a "weighing of interests" was performed. The military officials would then calculate how many human lives could be saved by the "kill," and how many civilians would potentially be killed in an airstrike.
  • In early 2009, Craddock, NATO's Supreme Allied Commander for Europe at the time, issued an order to expand the targeted killings of Taliban officials to drug producers. This led to heated discussions within NATO. German NATO General Egon Ramms declared the order "illegal" and a violation of international law. The power struggle within NATO finally led to a modification of Craddock's directive: Targets related to the drug production at least had to be investigated as individual cases. The top-secret dossier could be highly damaging to the German government. For years, German authorities have turned over the mobile phone numbers of German extremists in Afghanistan to the United States. At the same time, the German officials claimed that homing in on mobile phone signals was far too imprecise for targeted killings. This is apparently an untenable argument. According to the 2010 document, both Eurofighters and drones had "the ability to geolocate a known GSM handset." In other words, active mobile phones could serve as tracking devices for the special units.
  • The classified documents could now have legal repercussions. The human rights organization Reprieve is weighing legal action against the British government. Reprieve believes it is especially relevant that the lists include Pakistanis who were located in Pakistan. "The British government has repeatedly stated that it is not pursuing targets in Pakistan and not doing air strikes on Pakistani territory," says Reprieve attorney Jennifer Gibson. The documents, she notes, also show that the "war on terror" was virtually conflated with the "war on drugs." "This is both new and extremely legally troubling," says Gibson.
  • A 2009 CIA study that addresses targeted killings of senior enemy officials worldwide reaches a bitter conclusion. Because of the Taliban's centralized but flexible leadership, as well as its egalitarian tribal structures, the targeted killings were only moderately successful in Afghanistan. "Morover, the Taliban has a high overall ability to replace lost leaders," the study finds.
6More

MH17: Malaysia's Barring from Investigation Reeks of Cover-up | nsnbc international - 0 views

  • It was a Malaysian jet, carrying Malaysian passengers, flown by Malaysian pilots, yet after Malaysia Airlines flight MH17 was shot down over Ukraine in July 2014, Malaysia has been systematically blocked from participating in the investigation, leaving an overwhelmingly pro-NATO bloc in charge of the evidence, investigation and outcome as well as the manner in which the investigation will be carried out. Despite the integral role Malaysia has played during several pivotal moments in the aftermath of the disaster, it appears that the closer to the truth the investigation should be getting, the further Malaysia itself is being pushed from both the evidence and any influence it has on the likely conclusions of the investigation. With the downed aircraft in question being Malaysian, Malaysia as a partner in the investigation would seem a given. Its exclusion from the investigation appears to be an indication that the investigation’s objectivity has been compromised and that the conclusions it draws will likely be politically motivated.
  • With the Dutch leading the investigation, the logic being that the flight originated from the Netherlands and the majority of the passengers were Dutch, it has formed a Joint Investigation Team (JIT). At the onset of its creation it seemed obvious that Malaysia would too be included, considering it lost the second largest number of citizens to the disaster and the plane itself was registered in Malaysia. Instead, JIT would end up comprised of Belgium, Ukraine, and Australia, specifically excluding Malaysia. Malaysia was both surprised and has protested its exclusion from JIT, and has repeatedly expressed a desire to be included directly in the investigation.
  • The Malaysian Insider cited Malaysian scholar Dr. Chandra Muzaffar who believes the decision to exclude his country from the investigation is politically motivated, aiming at excluding members that may urge caution and objectivity instead of draw conclusions first and bend the investigation’s results around those conclusions. In particular, Dr. Muzaffar believes that the investigations is intentionally being skewed to target Russia. Ukraine’s involvement in the investigation is particularly troublesome. Had MH17 crashed in Ukraine under different circumstances, Ukraine’s role would be welcome. However, it was apparently shot down specifically in a conflict in which Kiev itself is a participant. With both sides of the conflict possessing anti-aircraft weapons and with Kiev itself confirmed to possess weapons capable of reaching the altitude MH17 was flying at when it was allegedly hit, Kiev becomes a possible suspect in the investigation. Kiev’s inclusion in JIT represents a monumental conflict of interest.
  • ...3 more annotations...
  • And to compound this already glaring conflict of interest, it was revealed recently that an alleged “secret deal” was struck by JIT in which any member could bar the release of evidence. With all members of JIT being pro-NATO and decidedly arrayed against Moscow, such a “deal” could prevent crucial evidence from being revealed that would effect an otherwise distorted conclusion drawn by the investigators aimed specifically at advancing their greater political agenda in Eastern Europe. Had Malaysia been a member of JIT, the ability of other members to withhold evidence would have been greatly diminished and it is likely such a bizarre deal would not have been conceivable, real or imaged, in the first place.
  • With the ongoing conflict in Ukraine perceived as a proxy war between NATO and Moscow, JIT’s membership including the NATO-backed Kiev regime itself (a possible suspect), two NATO members (Belgium and the Netherlands) and Australia who has passed sanctions against Russia over the conflict, is a textbook case of conflict of interest.
  • To casual observers, the current investigation led by NATO members and Kiev, a possible suspect, would be no different than the Donetsk People’s Republic and Russia leading it. Few would consider a DPR or Russian led investigation impartial, and few should see a NATO-led investigation as impartial. Had Malaysia been included in the process, an argument could have been made that an actual investigation was taking place rather than a complex propaganda campaign. Malaysia’s exclusion is a troubling sign for the victims of the MH17 disaster, meaning the true culprits will never be known. The overt politically motivated nature of the investigation will on one hand  help fuel NATO’s propaganda war, but on the other hand, fuel the doubts of millions worldwide over the true events that took place in the skies of eastern Ukraine that day. Like so many other events in human history that took place amid a high stake political struggle, the downing of MH17 will be shrouded in mystery, mystery draped over the truth by the irresponsible leadership of NATO, and those in Washington, London and Brussels egging on the conflict in Ukraine to this very day.
9More

Political Editors: Dick Morris Corrects the Record on Hillary Clinton - The Patriot Post - 0 views

  • Then Bill discusses Hillary’s legal career at the Rose Law firm. He doesn’t mention that she made partner when he was elected governor and was only hired when he got elected as attorney general. "He makes as if it was a public service job — it wasn’t. Her main job was to get state business, and she got tens-of-millions of dollars of state business, then hid her participation and the fees by taking an extra share of non-state business to compensate for the fees on state business that she brought in. Her other job was to call the state banking commissioner any time one of her banks got into trouble to get them off.
  • "Bill speaks at length how Hillary was a mother, juggling career and family, taking Chelsea to soccer games and stuff — that’s non-sense. Hillary was a mother but Chelsea in the Arkansas governor’s mansion had a staff of nannies and agents to drive her around and people to be with her, and Hillary didn’t have to bother with any of that. All of that was paid for by the state. "He says she became the warrior in chief over the family finances and that was true, and the result is she learned how to steal. "She accepted a $100,000 bribe from the poultry industry in return for Bill going easy on regulating them, despite new standards. Jim Blair, the poultry lobbyist, gave her $1,000 to invest in the Futures Market and lined up seven to eight other investors and their winnings were all deposited into Hillary’s account. She made $100,000 in a year and she was out. That essentially was a bribe.
  • ”[She did] a phony real-estate deal for Jim McDougal and the Madison Bank to deceive the federal regulators by pretending someone else was buying the property. She was called before a grand jury in 1995 about that but, conveniently, the billing records were lost, couldn’t be found and there wasn’t proof that she worked on it.
  • ...5 more annotations...
  • “Bill talks about her work on the health care task force but doesn’t say the reason it didn’t pass was the task force was discredited because the meetings were all held in secret. A federal judge forced them open and fined the task force several hundred thousand dollars because of their secrecy. "He says that after the health care bill failed in 1994, Hillary went to work on adopting each piece of it piecemeal — mainly health insurance for children. "That is completely the opposite of the truth. The fact is when that bill failed, I called Hillary and I suggested that she support a proposal by Republican Bob Dole that we cover children, and she said, ‘We can’t just cover one part of this. You have to change everything or change nothing.’ Then in 1997 when I repeated that advice to Bill Clinton, we worked together to pass the Children’s Health Insurance Program. I found a lot of the money for that in the tobacco settlement that my friend Dick Scruggs was negotiating.
  • "Then Bill extols her record in the U.S. Senate. In fact, she did practically nothing. There were seven or eight bills that she introduced that passed; almost all of were symbolic — renaming a courthouse, congratulating a high school team on winning the championship. There was only one vaguely substantive bill, and that had a lot of co-sponsors of whom Hillary was just one.
  • "Then he goes to her record in the State Department and manages to tell that story without mentioning the word Benghazi, without mentioning her secret emails, without mentioning he was getting tens of millions — $220 million in speaking fees in return for favorable actions by the State Department.
  • "Also totally lacking in the speech was anything about the war on terror — terror is a word you don’t hear at the Democratic Convention. "Bill says that Hillary passed tough sanctions on Iran for their nuclear program. The opposite is true. "Every time a tough sanction bill was introduced by Senators Menendez or Kirk, Hillary would send Deputy Secretary Wendy Sherman to Capital Hill to testify against it and urge it not to pass, and it was over Hillary’s objections that those sanctions were put into place.
  • ”[Liberal columnist] Maureen Dowd called the speech by Bill Clinton “air brushed.” “It was a hell of a lot more than that — it was fiction. (Also see Morris’s comments after Clinton’s DNC acceptance speech. "It’s strategy and message will be interdicted by reality at every turn. … She basically has no message. … Her entire campaign is, ‘I’m a woman and I am running against Donald Trump. … She bean her speech by saying let’s compromise and work together. Is there any woman in the world less likely to compromise?”)
  •  
    "Dick Morris is a nationally recognized political campaign adviser, analyst and author. He was the senior political adviser to Bill Clinton before and after his occupation of the White House. He was campaign manager of Clinton's 1996 re-election, and the architect of his successful "triangulation" rhetorical ruse. Clinton's communications director George Stephanopoulos said of Morris, "No single person had more power over [Bill Clinton]." This week, in a message entitled "What Bill Left Out, Morris corrected the record regarding Clinton's glowing remarks about Hillary Clinton, her personal attributes and professional achievements. Morris's insights into the Clintons are priceless. What follows is a transcript of Morris's comments: "Bill Clinton talked at length about Hillary's idealistic work in college and law school, but he omits that she was defending the Black Panthers who killed security guards; they were on trial in New Haven. She monitored the trial while she was in law school to find evidence that could be grounds for reversal in the event they were convicted. "That summer she went to work for the True-Haft (SP) law firm in CA, headed by True Haft who is the head of the CA Communist Party and that's when she got involved with Saul Alinsky, who became something of a mentor for the rest of her life. "Then Bill says that she went off to Massachusetts and he went to Arkansas, and eventually Hillary followed her heart to join him in Arkansas. He omits that she went to work for the Watergate Committee and was fired from that job for taking home evidence and hiding documents that they needed in the impeachment inquiry. Then she took the DC Bar exam and flunked it, she went to Arkansas because that is the only bar exam she could pass. "He talked about how in the 1970's she took all kinds of pro-bono cases to defend women and children. In her memoirs, she cites one which was a custody case and that's it. In fact, in 1975 she represen
5More

What's in the Missing 28 Pages From the 9/11 Inquiry? - NBC News - 0 views

  • If members of Congress force the government to release 28 secret pages of a 14-year-old inquiry into 9/11, the missing pages may yield new tidbits about a possible role by some Saudis in aiding the hijackers — but there are thousands of other still-classified documents that would reveal far more about the terror attacks, officials tell NBC News. A renewed push is on to declassify a secret chapter of the 838-page joint inquiry report issued in December 2002 by the House and Senate intelligence committees, in part because of a lawsuit seeking to hold Saudi Arabia accountable for the attacks. That lawsuit, and explosive allegations contained in those pages, may come up during President Obama's visit to Saudi Arabia, where he arrived Wednesday morning. But many current and former officials with knowledge of the pages tell NBC News that their release would only flesh out the details of events already well known to authorities — and to members of the general public who read the exhaustive 9/11 Commission and follow-up reports.
  • The 9/11 Commission spent 17 months completing the investigation begun by the congressional inquiry. It confirmed some of the inquiry's findings about generalized assistance that various Saudis provided the 9/11 hijackers when they came to the U.S. But it also knocked down numerous other allegations, including assertions about assistance by some Saudi government officials. "The pages provide no further answers about the 9/11 attacks that are not already included in the 9/11 Commission report," says Philip Zelikow, the executive director of the 9/11 Commission, who describes the 28 pages as "unvetted investigative material." "I'm afraid they will only make the red herring glow redder," he said of the push for release of the pages, which has garnered some bipartisan support in Congress. Lost in the hubbub, according to Zelikow and others, is that there are some far more fundamental questions about the attacks that remain unanswered — or at least unknown to the public. One of the most significant: What information has 9/11 mastermind Khalid Sheikh Mohamed (KSM) been hiding all these years about the global al-Qaeda network that he oversaw around the world, including in the U.S., before and after the 2001 attacks?
  • And despite the furor over several Saudi operatives who assisted some of the hijackers, the most suspicious people were two Yemenis — radical cleric Anwar al-Awlaki and student Mohdar Abdullah, Zelikow said.
  • ...1 more annotation...
  • Another is why the Iranian government "facilitated the transit of al Qaeda members through Iran on their journey to the United States," Zelikow said. Similar questions have been raised about Pakistan. Zelikow and others said the 28 pages won't answer these broader questions about 9/11. There are mountains of other investigative documents that could, but they're locked away. "There are missing puzzle pieces to the overall issue of 9/11 as to the culpability and who was behind it," one U.S. intelligence official confirmed to NBC News. "It's fair to say there are additional insights that can be gleaned from these other sources."
  •  
    Zelikow was a main figure in the 9-11 cover-up. As chief of staff for the 9-11 Commission, his suppression of evidence and fencing Commission members out of any direct involvement in the development and drafting of the report are thoroughly documented, along with the conflict of interest that should have barred him from ever receiving the job. http://goo.gl/Vgqz5O Zelikow is also a rabid Zionist, which explains why the Commission Report never addressed the mountain of evidence that Israel played a key role in the commission of the 9/11 attacks. See e.g., Wikispooks, https://wikispooks.com/wiki/9-11/Israel_did_it
1More

Liberty's backlash -- why we should be grateful to Edward Snowden | Fox News - 1 views

  •  
    Liberty's backlash -- why we should be grateful to Edward Snowden By Judge Andrew P. Napolitano Published August 01, 2013 FoxNews.com Last week, Justin Amash, the two-term libertarian Republican congressman from Michigan, joined with John Conyers, the 25-term liberal Democratic congressman from the same state, to offer an amendment to legislation funding the National Security Agency (NSA). If enacted, the Amash-Conyers amendment would have forced the government's domestic spies when seeking search warrants to capture Americans' phone calls, texts and emails first to identify their targets and produce evidence of their terror-related activities before a judge may issue a warrant. The support they garnered had a surprising result that stunned the Washington establishment. It almost passed. The final vote, in which the Amash-Conyers amendment was defeated by 205 to 217, was delayed for a few hours by the House Republican leadership, which opposed the measure. The Republican leadership team, in conjunction with President Obama and House Minority Leader Nancy Pelosi, needed more time for arm-twisting so as to avoid a humiliating loss. But the House rank-and-file did succeed in sending a message to the big-government types in both parties: Nearly half of the House of Representatives has had enough of government spying and then lying about it, and understands that spying on every American simply cannot withstand minimal legal scrutiny or basic constitutional analysis. The president is deeply into this and no doubt wishes he wasn't. He now says he welcomed the debate in the House on whether his spies can have all they want from us or whether they are subject to constitutional requirements for their warrants. Surely he knows that the Supreme Court has ruled consistently since the time of the Civil War that the government is always subject to the Constitution, wherever it goes and whatever it does. As basic as that sounds, it is not a universally held belief am
3More

Door May Open for Challenge to Secret Wiretaps - NYTimes.com - 0 views

  • Five years after Congress authorized a sweeping warrantless surveillance program, the Justice Department is setting up a potential Supreme Court test of whether it is constitutional by notifying a criminal defendant — for the first time — that evidence against him derived from the eavesdropping, according to officials.
  • Prosecutors plan to inform the defendant about the monitoring in the next two weeks, a law enforcement official said. The move comes after an internal Justice Department debate in which Solicitor General Donald B. Verrilli Jr. argued that there was no legal basis for a previous practice of not disclosing links to such surveillance, several Obama administration officials familiar with the deliberations said. Meanwhile, the department’s National Security Division is combing active and closed case files to identify other defendants who faced evidence resulting from the 2008 wiretapping law. It permits eavesdropping without warrants on Americans’ cross-border phone calls and e-mails so long as the surveillance is “targeted” at foreigners abroad.
  • In February, the Supreme Court dismissed a case challenging its constitutionality because the plaintiffs, led by Amnesty International, could not prove they had been wiretapped. Mr. Verrilli had told the justices that someone else would have legal standing to trigger review of the program because prosecutors would notify people facing evidence derived from surveillance under the 2008 law. But it turned out that Mr. Verrilli’s assurances clashed with the practices of national security prosecutors, who had not been alerting such defendants that evidence in their cases had stemmed from wiretapping their conversations without a warrant.
8More

Senate CIA torture report could throw Gitmo hearings into chaos | Al Jazeera America - 0 views

  • The possible declassification and release of a Senate report into the CIA’s detention and interrogation program — begun in the wake of the 9/11 terrorist attacks — could have a huge impact on the controversial military tribunals happening at Guantánamo Bay, experts and lawyers believe. The proceedings have been moving at a snail’s pace at the U.S.-held military base on the island of Cuba, amid widespread condemnation that they are being held in a legal limbo and outside the U.S. criminal justice system. Details surrounding the CIA’s activities have been one of the most contentious issues concerning the commissions at Guantánamo, where the alleged mastermind of the 9/11 attacks, Khalid Sheikh Mohammed, and his co-defendants are on trial. Their alleged treatment while in CIA custody has been a key stumbling block in the hearings’ progress. The same goes for the man alleged to be behind the USS Cole bombing, Abd al-Rahim al-Nashiri, another former CIA captive. In both cases, there have been dozens of delays — mainly due to the fact that the attorneys have been battling military prosecutors over access to classified information about the CIA interrogation program that the attorneys want to use as evidence. Both cases have been dragging on for two years and are still in the pretrial evidentiary phase.
  • But now that the Senate Intelligence Committee appears set to vote on releasing its long-awaited 6,300-page, $50 million study — or at least some portion of it — the defense attorneys will finally get the opportunity to talk openly at the military commissions about torture. That could prove disastrous for military prosecutors. According to defense attorneys and human rights observers who have been monitoring the proceedings, it might also derail the government’s attempts to convince a jury that the detainees, if convicted, deserve to be executed. “The U.S. government has gone to great lengths to classify evidence of crimes — crimes committed by U.S. actors,” said Army Maj. Jason Wright, one of Mohammed’s military defense attorneys. “Were this information in this Senate report to be revealed … it would completely gut the classification architecture currently in place before the commissions.” The panel is expected to vote April 3, and it is widely believed the panel will approve release of its 400-page executive summary. If that happens, Wright said, he anticipates petitioning the military court to amend the protective order that treats all information about the CIA torture program as classified.
  • The report is likely to contain reams of information that has not yet come to light. Intelligence Committee Chairwoman Sen. Dianne Feinstein has said the report “includes details of each detainee in CIA custody, the conditions under which they were detained, how they were interrogated, the intelligence they actually provided and the accuracy — or inaccuracy — of CIA descriptions about the program to the White House, Department of Justice, Congress and others.” Wright said that in addition to seeking a change to the protective order, he would file discovery motions to gain access to the 6.2 million pages of documents the Senate had. Such a move would lead to further legal wrangling and delay the start of the trial, which the government hopes will get underway in September. “We have an absolute right to review that and have it produced in discovery,” Wright said.
  • ...4 more annotations...
  • Richard Kammen, al-Nashiri’s civilian defense attorney, meanwhile, has already filed a motion with the military court to obtain a complete, unredacted copy of the Senate Intelligence Committee’s report. The motion, submitted in September prior to the revelations that have surfaced about infighting between the CIA and Senate committee investigators, said the report “will be central to the accused’s defense on the merits, in impeaching the credibility of the evidence against him and in mitigation of the death sentence the government is seeking to impose.” If the entire report were declassified by the Intelligence Committee, it “would be huge because it would really eliminate the ‘need’ for military commissions, which are in my view mainly a vehicle to have what will look like trials but will keep whatever evidence of torture the judge ultimately allows secret from or sanitized to the public,” Kammen said.
  • But not everyone expects the report to be released in great detail. Air Force Capt. Michael Schwartz, the attorney for alleged 9/11 co-conspirator Walid bin Attash, doesn’t believe the Senate committee’s report will ever see the light of day. If it is released, he said it will be highly redacted, rendering it useless to the public and Attash’s defense team. “This whole military commissions system is designed to make sure this information is never known to the public,” Schwartz said. “No one in my office is naive enough to think this report will come out in any unredacted form. Certainly that report contains a lot of mitigating information that would be relevant to the defense of this case. But I don’t believe for a second that we will see anything in that report that actually sheds light on the crimes committed by the CIA against our clients between 2003 and 2006.” Air Force Col. Morris Davis, the former chief prosecutor at Guantánamo and a staunch critic of the military commissions, doesn’t believe the Senate committee’s report “is legally relevant” to the military commission trial of Mohammed and the other high-value detainees. But he does believe it will force the hearings more into the public.
  • “Where I do think it will have an impact is in the assessment of whether those legal relevance proceedings take place in open court or in secret closed sessions,” he said. “The report is likely to officially reinforce and amplify what the public already knows about this regrettable chapter in our history. It should further undercut the government’s claim that all this absolutely must stay hidden behind closed doors or else cataclysmic things will happen.” Army. Lt. Col. Todd Breasseale, a Pentagon spokesman who deals with detainee matters at Guantánamo, declined to discuss the Senate report or how its release may affect the commissions. "I can't imagine a world where competent counsel — be they from the government or defense — would announce in advance, any strategy they might pursue or make predictions on how any given issue might affect the progress of their case," Breasseale said.
  • Daphne Eviatar, a lawyer for Human Rights First who has closely observed and written about the military commission proceedings, said whether the Senate’s report is a game changer will ultimately depend on what is declassified. Perhaps details of the interrogations will be released, or they may be heavily redacted. “Either way, you can be sure the defense lawyers will try to reopen this issue, and the government will fight it, and the case will get bogged down once again in months of argument in pretrial hearings that are already taking forever,” she said.
  •  
    A ray of sunlight ahead in the Gitmo detainee prosecutions?
26More

Welcome to Post-Constitution America - Peter Van Buren - 0 views

  • On July 30, 1778, the Continental Congress created the first whistleblower protection law, stating “that it is the duty of all persons in the service of the United States to give the earliest information to Congress or other proper authority of any misconduct, frauds, or misdemeanors committed by any officers or persons in the service of these states.”
  • Two hundred thirty-five years later, on July 30, 2013, Bradley Manning was found guilty on 20 of the 22 charges for which he was prosecuted, specifically for “espionage” and for videos of war atrocities he released, but not for “aiding the enemy.”
  • Days after the verdict, with sentencing hearings in which Manning could receive 136 years of prison time ongoing, the pundits have had their say. The problem is that they missed the most chilling aspect of the Manning case: the way it ushered us, almost unnoticed, into post-Constitutional America.
  • ...22 more annotations...
  • As at Guantanamo, rules of evidence reaching back to early
  • During the months of the trial, the U.S. military refused to release official transcripts of the proceedings. Even a private courtroom sketch artist was barred from the room. Independent journalist and activist Alexa O’Brien then took it upon herself to attend the trial daily, defy the Army, and make an unofficial record of the proceedings by hand. Later in the trial, armed military police were stationed behind reporters listening to testimony. Above all, the feeling that Manning’s fate was predetermined could hardly be avoided. After all, President Obama, the former Constitutional law professor, essentially proclaimed him guilty back in 2011 and the Department of Defense didn’t hesitate to state more generally that “leaking is tantamount to aiding the enemies of the United States.”
  • And so to Bradley Manning. As the weaponry and technology of war came home, so did a new, increasingly Guantanamo-ized definition of justice. This is one thing the Manning case has made clear. As a start, Manning was treated no differently than America’s war-on-terror prisoners at Guantanamo and the black sites that the Bush administration set up around the world. Picked up on the “battlefield,” Manning was first kept incommunicado in a cage in Kuwait for two months with no access to a lawyer. Then, despite being an active duty member of the Army, he was handed over to the Marines, who also guard Guantanamo, to be held in a military prison in Quantico, Virginia. What followed were three years of cruel detainment, where, as might well have happened at Gitmo, Manning, kept in isolation, was deprived of clothing, communications, legal advice, and sleep. The sleep deprivation regime imposed on him certainly met any standard, other than Washington’s and possibly Pyongyang’s, for torture. In return for such abuse, even after a judge had formally ruled that he was subjected to excessively harsh treatment, Manning will only get a 112-day reduction in his eventual sentence. Eventually the Obama administration decided Manning was to be tried as a soldier before a military court. In the courtroom, itself inside a military facility that also houses NSA headquarters, there was a strikingly gulag-like atmosphere.  His trial was built around secret witnesses and secret evidence; severe restrictions were put on the press -- the Army denied press passes to 270 of the 350 media organizations that applied; and there was a clear appearance of injustice. Among other things, the judge ruled against nearly every defense motion.
  • “What constitutes due process in this case is a due process in war.”
  • Given all this, it is small comfort to know that Manning, nailed on the Espionage Act after multiple failures in other cases by the Obama administration, was not convicted of the extreme charge of “aiding the enemy.”
  • Obama administration lawyers went on to claim the legal right to execute U.S. citizens without trial or due process and have admitted to killing four Americans. Attorney General Eric Holder declared that “United States citizenship alone does not make such individuals immune from being targeted.”
  • As if competing for an Orwellian prize, an unnamed Obama administration official told the Washington Post,
  • English common law were turned upside down. In Manning’s case, he was convicted of espionage, even though the prosecution did not have to prove either his intent to help another government or that harm was caused; a civilian court had already paved the way for such a ruling in another whistleblower case. In addition, the government was allowed to label Manning a “traitor” and an “anarchist” in open court, though he was on trial for neither treason nor anarchy.
  • Similarly, full-spectrum spying is not considered to violate the Fourth Amendment and does not even require probable cause.
  • Justice can be twisted and tangled into an almost unrecognizable form and then used to send a young man to prison for decades.
  • Government officials concerned over possible wrongdoing in their departments or agencies who “go through proper channels” are fired or prosecuted.
  • Government whistleblowers are commanded to return to face justice, while law-breakers in the service of the government are allowed to flee justice. CIA officers who destroy evidence of torture go free, while a CIA agent who blew the whistle on torture is locked up.
  • Thanks to the PATRIOT Act, citizens, even librarians, can be served by the FBI with a National Security Letter (not requiring a court order) demanding records and other information, and gagging them from revealing to anyone that such information has been demanded or such a letter delivered.
  • Citizens may be held without trial, and denied their Constitutional rights as soon as they are designated “terrorists.” Lawyers and habeas corpus are available only when the government allows.
  • The war on whistleblowers is metastasizing into a war on the First Amendment.
  • People may now be convicted based on secret testimony by unnamed persons.
  • Military courts and jails can replace civilian ones.
  • An Obama administration Insider Threat Program requires federal employees (including the Peace Corps) to report on the suspicious behavior of coworkers.
  • Claiming its actions lawful while shielding the “legal” opinions cited, often even from Congress, the government can send its drones to assassinate its own citizens.
  • One by one, the tools and attitudes of the war on terror, of a world in which the “gloves” are eternally off, have come home.
  • The comic strip character Pogo’s classic warning -- “We have met the enemy and he is us” -- seems ever less like a metaphor.
  • According to the government, increasingly we are now indeed their enemy.
  •  
    Well written and researched article describing what it means to live in a post-Constitutional America.  Chilling facts with a cold but obvious conclusion.
8More

Guess who credits the Mossad with producing the 'laptop documents?' | Middle East Eye - 0 views

  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
  • Although it has never been mentioned in news media, former International Atomic Energy Agency (IAEA) Director General, Mohamed El Baradei recalled in his memoirs that he was doubtful of the authenticity of the documents. “No one knew if any of this was real,” he wrote in reference to the laptop documents. Another former senior IAEA official told me, “It just really didn’t add up.  It made more sense that this information originated in another country.”  And as I have detailed in articles and in my book, key documents in the collection bear clear indications of fabrication. Support for that virtually unknown part of the Iran nuclear story has come from a surprising source: a popular Israeli account, celebrating the successes of the Mossad’s covert operations. “Mossad: The Greatest Missions of the Israeli Secret Service,” first published in Hebrew in 2010, and then published in English in 2012, was Israel’s best-selling book for months in 2010. But not only does it acknowledge that it was indeed the MEK that delivered the documents, it also suggests that at least some of the documents came from the Mossad.  
  • The co-authors of the book are far from critics of Israel’s policy toward Iran; One of the co-authors, Michael Bar-Zohar, is a well-connected former member of the Israeli Knesset and former paratrooper, who had previously written an authorised biography of Shimon Peres, as well as the biography of Isser Harel, the Mossad chief who presided over the kidnapping of Adolph Eichmann in Argentina. Much of what Bar-Zohar chronicled in the book had already been reported earlier by Israeli journalists - especially Ronen Bergman of the daily Yedioth Ahronoth.  In fact, Bergman accused Bar-Zohar of plagiarising his articles for much of the book, while changing only a few words.  But one thing that Bar-Zohar and co-author Nisham Mishal did not get from other Israeli journalists, was the role of the Mossad in regard to the laptop documents. 
  • ...5 more annotations...
  • Although they do not flatly state that the Mossad was the source of the documents, they certainly lead the reader to that conclusion. They begin by establishing the fact that the MEK was fronting for the Mossad in its revelation in August 2002 of Iran’s first enrichment facility at Natanz. The CIA, they write, “appeared to believe that the Mossad and the British MI6 were feeding MEK intelligence they had obtained, using the Iranian opposition as a hopefully credible source”.  And they explicitly confirm CIA’s suspicions. “According to Israeli sources,” they write, “It was, in fact, a watchful Mossad officer who had discovered the mammoth centrifuge installation at Natanz.”  Other sources, including Seymour Hersh and Connie Bruck have reported that the MEK got the intelligence on Natanz from the Israelis, but theirs is the first explicit acknowledgement attributed to an Israeli source that the MEK had revealed Natanz on the basis of Mossad intelligence.  What the Israeli co-authors do not say is that the Mossad was simply guessing at the purpose of Natanz, which the MEK mistakenly called a “fuel fabrication” facility, rather than a centrifuge enrichment facility.
  • Bar-Zohar and Mishal are little concerned with whether the Mossad’s laptop caper involved fraud or not. They obviously view the Israeli intelligence agency’s use of an Iranian exile group to get out documents that had been central to the international sanctions regime against Iran as a great triumph. But whatever their reasons, their book adds another layer to the growing body of evidence showing that the Bush administration and its allies hoodwinked the rest of the world with those documents.
  • The authors further suggest that the Mossad was behind information later released by the MEK on Mohsen Fakhrizadeh, the Iranian physics professor said to be shown in the laptop documents as the man in charge of that purported Iranian nuclear weapons research program. The MEK disclosed such personal details as Fakhrizadeh’s passport number and his home telephone number. But the Mossad chroniclers write: “This abundance of detail and means of transmission leads one to believe that, again, “a certain secret service” ever suspected by the West of pursuing its own agenda, painstakingly collected these facts and figures about the Iranian scientists and passed them to the Iranian resistance.” I asked Bar-Zohar’s research assistant, Nilly Ovnat, whether he had Israeli sources for those statements relating to the MEK and the laptop documents. She responded by          e-mail: “Professor Bar Zohar had other sources for most of the material concerning MEK and Natanz [and the] laptop, yet they could not be mentioned and cannot be discussed.”
  • Turning to the laptop documents, they make it clear that western intelligence had indeed obtained the documents from the MEK and suggest that the MEK got them from somewhere else. “The dissidents wouldn’t say how they had gotten hold of the laptop,” they write. They again frame the question of the origins of those documents in terms of CIA suspicions. “[T]he skeptical Americans suspected that the documents had been only recently scanned into the computer,” they write. “They accused the Mossad of having slipped in some information obtained from our own sources - and passing it to the MEK leaders for delivery to the West." Bar-Zohar and Mishal steer clear of any suggestion that the Mossad fabricated any documents, but their account leaves little doubt that they are convinced that the Mossad should be credited for the appearance of the documents. Their approach of referring to US suspicions, rather than stating it directly, appears to be a way of avoiding problems with Israeli military censors, who often clamp down on local reporting on sensitive issues while allowing references to foreign reports.
  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
11More

WASHINGTON: CIA admits it broke into Senate computers; senators call for spy chief's ou... - 0 views

  • An internal CIA investigation confirmed allegations that agency personnel improperly intruded into a protected database used by Senate Intelligence Committee staff to compile a scathing report on the agency’s detention and interrogation program, prompting bipartisan outrage and at least two calls for spy chief John Brennan to resign.“This is very, very serious, and I will tell you, as a member of the committee, someone who has great respect for the CIA, I am extremely disappointed in the actions of the agents of the CIA who carried out this breach of the committee’s computers,” said Sen. Saxby Chambliss, R-Ga., the committee’s vice chairman.
  • The rare display of bipartisan fury followed a three-hour private briefing by Inspector General David Buckley. His investigation revealed that five CIA employees, two lawyers and three information technology specialists improperly accessed or “caused access” to a database that only committee staff were permitted to use.Buckley’s inquiry also determined that a CIA crimes report to the Justice Department alleging that the panel staff removed classified documents from a top-secret facility without authorization was based on “inaccurate information,” according to a summary of the findings prepared for the Senate and House intelligence committees and released by the CIA.In other conclusions, Buckley found that CIA security officers conducted keyword searches of the emails of staffers of the committee’s Democratic majority _ and reviewed some of them _ and that the three CIA information technology specialists showed “a lack of candor” in interviews with Buckley’s office.
  • The inspector general’s summary did not say who may have ordered the intrusion or when senior CIA officials learned of it.Following the briefing, some senators struggled to maintain their composure over what they saw as a violation of the constitutional separation of powers between an executive branch agency and its congressional overseers.“We’re the only people watching these organizations, and if we can’t rely on the information that we’re given as being accurate, then it makes a mockery of the entire oversight function,” said Sen. Angus King, an independent from Maine who caucuses with the Democrats.The findings confirmed charges by the committee chairwoman, Sen. Dianne Feinstein, D-Calif., that the CIA intruded into the database that by agreement was to be used by her staffers compiling the report on the harsh interrogation methods used by the agency on suspected terrorists held in secret overseas prisons under the George W. Bush administration.The findings also contradicted Brennan’s denials of Feinstein’s allegations, prompting two panel members, Sens. Mark Udall, D-Colo., and Martin Heinrich, D-N.M., to demand that the spy chief resign.
  • ...7 more annotations...
  • Another committee member, Sen. Ron Wyden, D-Ore., and some civil rights groups called for a fuller investigation. The demands clashed with a desire by President Barack Obama, other lawmakers and the CIA to move beyond the controversy over the “enhanced interrogation program” after Feinstein releases her committee’s report, which could come as soon as next weekMany members demanded that Brennan explain his earlier denial that the CIA had accessed the Senate committee database.“Director Brennan should make a very public explanation and correction of what he said,” said Sen. Carl Levin, D-Mich. He all but accused the Justice Department of a coverup by deciding not to pursue a criminal investigation into the CIA’s intrusion.
  • “I thought there might have been information that was produced after the department reached their conclusion,” he said. “What I understand, they have all of the information which the IG has.”He hinted that the scandal goes further than the individuals cited in Buckley’s report.“I think it’s very clear that CIA people knew exactly what they were doing and either knew or should’ve known,” said Levin, adding that he thought that Buckley’s findings should be referred to the Justice Department.A person with knowledge of the issue insisted that the CIA personnel who improperly accessed the database “acted in good faith,” believing that they were empowered to do so because they believed there had been a security violation.“There was no malicious intent. They acted in good faith believing they had the legal standing to do so,” said the knowledgeable person, who asked not to be further identified because they weren’t authorized to discuss the issue publicly. “But it did not conform with the legal agreement reached with the Senate committee.”
  • Feinstein called Brennan’s apology and his decision to submit Buckley’s findings to the accountability board “positive first steps.”“This IG report corrects the record and it is my understanding that a declassified report will be made available to the public shortly,” she said in a statement.“The investigation confirmed what I said on the Senate floor in March _ CIA personnel inappropriately searched Senate Intelligence Committee computers in violation of an agreement we had reached, and I believe in violation of the constitutional separation of powers,” she said.It was not clear why Feinstein didn’t repeat her charges from March that the agency also may have broken the law and had sought to “thwart” her investigation into the CIA’s use of waterboarding, which simulates drowning, sleep deprivation and other harsh interrogation methods _ tactics denounced by many experts as torture.
  • Buckley’s findings clashed with denials by Brennan that he issued only hours after Feinstein’s blistering Senate speech.“As far as the allegations of, you know, CIA hacking into, you know, Senate computers, nothing could be further from the truth. I mean, we wouldn’t do that. I mean, that’s _ that’s just beyond the _ you know, the scope of reason in terms of what we would do,” he said in an appearance at the Council on Foreign Relations.White House Press Secretary Josh Earnest issued a strong defense of Brennan, crediting him with playing an “instrumental role” in the administration’s fight against terrorism, in launching Buckley’s investigation and in looking for ways to prevent such occurrences in the future.Earnest was asked at a news briefing whether there was a credibility issue for Brennan, given his forceful denial in March.“Not at all,” he replied, adding that Brennan had suggested the inspector general’s investigation in the first place. And, he added, Brennan had taken the further step of appointing the accountability board to review the situation and the conduct of those accused of acting improperly to “ensure that they are properly held accountable for that conduct.”
  • The allegations and the separate CIA charge that the committee staff removed classified documents from the secret CIA facility in Northern Virginia without authorization were referred to the Justice Department for investigation.The department earlier this month announced that it had found insufficient evidence on which to proceed with criminal probes into either matter “at this time.” Thursday, Justice Department officials declined comment.
  • In her speech, Feinstein asserted that her staff found the material _ known as the Panetta review, after former CIA Director Leon Panetta, who ordered it _ in the protected database and that the CIA discovered the staff had it by monitoring its computers in violation of the user agreement.The inspector general’s summary, which was prepared for the Senate and the House intelligence committees, didn’t identify the CIA personnel who had accessed the Senate’s protected database.Furthermore, it said, the CIA crimes report to the Justice Department alleging that panel staffers had removed classified materials without permission was grounded on inaccurate information. The report is believed to have been sent by the CIA’s then acting general counsel, Robert Eatinger, who was a legal adviser to the interrogation program.“The factual basis for the referral was not supported, as the author of the referral had been provided inaccurate information on which the letter was based,” said the summary, noting that the Justice Department decided not to pursue the issue.
  • Christopher Anders, senior legislative counsel with the American Civil Liberties Union, criticized the CIA announcement, saying that “an apology isn’t enough.”“The Justice Department must refer the (CIA) inspector general’s report to a federal prosecutor for a full investigation into any crimes by CIA personnel or contractors,” said Anders.
  •  
    And no one but the lowest ranking staffer knew anything about it, not even the CIA lawyer who made the criminal referral to the Justice Dept., alleging that the Senate Intelligence Committee had accessed classified documents it wasn't authorized to access. So the Justice Dept. announces that there's insufficient evidence to warrant a criminal investigation. As though the CIA lawyer's allegations were not based on the unlawful surveillance of the Senate Intelligence Committee's network.  Can't we just get an official announcement that Attorney General Holder has decided that there shall be a cover-up? 
10More

The Impact of NSA Domestic Spying - Business Insider - 0 views

  • NSA has collected cell records from all major mobile networks.
  • Thanks to AT&T whistleblower Mark Klein and NSA whistleblowers William Binney and Thomas Drake, we know that the NSA has been perpetually amassing not only phone records but virtually all electronic records and communications.
  • As an AT&T engineer, Klein discovered that a special NSA network actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T," emphasizing that "much of the data sent through AT&T to the NSA was purely domestic."
  • ...6 more annotations...
  • Binney — one of the best mathematicians and code breakers in NSA history — worked for the Defense Department's foreign signals intelligence agency for 32 years before resigning in late 2001 because he "could not stay after the NSA began purposefully violating the Constitution."
  • He's detailed how, ever since 9/11, the NSA has run a top-secret surveillance program that amasses electronic data — phone calls, emails, banking and travel records, social media, entire government databases — and analyzes the information "to be able to monitor what people are doing" and who they are doing it with.
  • Thanks to AT&T whistleblower Mark Klein and NSA whistleblowers William Binney and Thomas Drake, we know that the NSA has been perpetually amassing not only phone records but virtually all electronic records and communications.
  • Binney would know — he built the original software (i.e. ThinThread) that identified, in real time, networks of connections between individuals based on their electronic communications.
  • "I can pull your entire life together from all those domains and map it out and show your entire life over time," Binney told documentarian Laura Poitras while she was investigating the NSA's $2 billion data storage facility in Bluffdale, Utah. "This is something the KGB, the Stasi or the Gestapo would have loved to have had."
  • Binney — one of the best mathematicians and code breakers in NSA history — worked for the Defense Department's foreign signals intelligence agency for 32 years before resigning in late 2001 because he "could not stay after the NSA began purposefully violating the Constitution." He's detailed how, ever since 9/11, the NSA has run a top-secret surveillance program that amasses electronic data — phone calls, GPS information, emails, social media, banking and travel records, entire government databases — and analyzes the information "to be able to monitor what people are doing" and who they are doing it with.
  •  
    Excellent coverage.  Follow the links, they are extraordinary. " Glenn Greenwald revealed that the National Security Agency (NSA) is using the so-called "business records" provision of the Patriot Act to secretly collect telephone records of millions of Americans. Although the revelation doesn't surprise privacy advocates, the fact that Greenwald obtained a top secret court order compelling Verizon to give the NSA information on all telephone calls in its systems is the first concrete piece of evidence exposing dragnet domestic surveillance. "
11More

Smoking gun emails reveal 'deal in blood' George Bush and Tony Blair made as they secre... - 0 views

  • A bombshell White House memo has revealed for the first time details of the ‘deal in blood’ forged by George Bush and Tony Blair over the Iraq War.The damning memo, from secretary of state Colin Powell to president George Bush, was written on March 28, 2002, a week before Bush’s famous summit with Blair at his Crawford ranch in Texas.The Powell document, headed ‘Secret... Memorandum for the President’, lifts the lid on how Blair and Bush secretly plotted the war behind closed doors at Crawford. In it, Powell tells Bush that Blair ‘will be with us’ on military action. Powell assures the president: ‘The UK will follow our lead’.The classified document also discloses that Blair agreed to act as a glorified spin doctor for the president by presenting ‘public affairs lines’ to convince a skeptical public that Saddam had Weapons of Mass Destruction - when none existed.In return, the president would flatter Blair’s ego and give the impression that Britain was not America’s poodle but an equal partner in the ‘special relationship’. 
  • The sensational leak shows that Blair had given an unqualified pledge to sign up to the conflict a year before the invasion started.It flies in the face of the UK Prime Minister’s public claims at the time that he was seeking a diplomatic solution to the crisis.He told voters: ‘We’re not proposing military action’ - in direct contrast to what the secret email now reveals. 
  • The disclosure is certain to lead for calls for Sir John Chilcot to reopen his inquiry into the Iraq War if, as is believed, he has not seen the Powell memo.A second explosive memo from the same cache also reveals how Bush used ‘spies’ in the Labour Party to help him to manipulate British public opinion in favor of the war.The documents, obtained by The Mail on Sunday, are part of a batch of secret emails held on the private server of Democratic presidential candidate Hillary Clinton which U.S. courts have forced her to reveal.Former UK Conservative shadow home secretary David Davis said: ‘The memos prove in explicit terms what many of us have believed all along: Tony Blair effectively agreed to act as a frontman for American foreign policy in advance of any decision by the House of Commons or the British Cabinet.
  • ...8 more annotations...
  • ‘He was happy to launder George Bush’s policy on Iraq and sub-contract British foreign policy to another country without having the remotest ability to have any real influence over it. And in return for what?'For George Bush pretending Blair was a player on the world stage to impress voters in the UK when the Americans didn’t even believe it themselves’.Davis was backed by a senior diplomat with close knowledge of Blair-Bush relations who said: ‘This memo shows beyond doubt for the first time Blair was committed to the Iraq War before he even set foot in Crawford.'And it shows how the Americans planned to make Blair look an equal partner in the special relationship to bolster his position in the UK.’Blair’s spokesman insisted last night that Powell’s memo was ‘consistent with what he was saying publicly at the time’.The former Prime Minister has always hotly denied the claim that the two men signed a deal ‘in blood’ at Crawford to embark on the war, which started on March 20, 2003. Powell says to Bush: ‘He will present to you the strategic, tactical and public affairs lines that he believes will strengthen global support for our common cause,’ adding that Blair has the presentational skills to ‘make a credible public case on current Iraqi threats to international peace’.Five months after the summit, Downing Street produced the notorious ‘45 minutes from doom’ dossier on Saddam Hussein’s supposed Weapons of Mass Destruction. After Saddam was toppled, the dossier’s claims were exposed as bogus.Nowhere in the memo is a diplomatic route suggested as the preferred option.
  • Instead, Powell says that Blair will also advise on how to ‘handle calls’ for the ‘blessing’ of the United Nations Security Council, and to ‘demonstrate that we have thought through “the day after” ’ – in other words, made adequate provision for a post-Saddam Iraq.Critics of the war say that the lack of post-conflict planning has contributed to the loss of more than 100,000 lives since the invasion – and a power vacuum which has contributed to the rise of Islamic State terrorism.Significantly, Powell warns Bush that Blair has hit ‘domestic turbulence’ for being ‘too pro-U.S. in foreign and security policy, too arrogant and “presidential” ’, which Powell points out is ‘not a compliment in the British context’.Powell also reveals that the splits in Blair’s Cabinet were deeper than was realized: he says that apart from Foreign Secretary Jack Straw and Defence Secretary Geoff Hoon, ‘Blair’s Cabinet shows signs of division, and the British public are unconvinced that military action is warranted now’.Powell says that although Blair will ‘stick with us on the big issues’, he wants to minimisze the ‘political price’ he would have to pay: ‘His voters will look for signs that Britain and America are truly equity partners in the special relationship.’The president certainly did his best to flatter Blair’s ego during the Crawford summit, where he was the first world leader to be invited into Bush’s sanctuary for two nights.
  • Mystery has long surrounded what was discussed at Crawford as advisers were kept out of a key meeting between the two men.Sir Christopher Meyer, who was present in Crawford as Britain’s ambassador to the U.S., told Chilcot that his exclusion meant he was ‘not entirely clear to this day... what degree of convergence was, if you like, signed in blood at the Crawford ranch’.But in public comments during his time at Crawford, Blair denied that Britain was on an unstoppable path to war.‘This is a matter for considering all the options’, he said. ‘We’re not proposing military action at this point in time’.
  • During his appearance before the Chilcot inquiry in January 2010, Blair denied that he had struck a secret deal with Bush at Crawford to overthrow Saddam. Blair said the two men had agreed on the need to confront the Iraqi dictator, but insisted they did not get into ‘specifics’.‘The one thing I was not doing was dissembling in that position,’ he told Chilcot.‘The position was not a covert position, it was an open position. This isn’t about a lie or a conspiracy or a deceit or a deception. It’s a decision. What I was saying... was “We are going to be with you in confronting and dealing with this threat.” ’Pressed on what he thought Bush took from their meeting, he said the president had realized Britain would support military action if the diplomatic route had been exhausted.In his memoirs, Blair again said it was ‘a myth’ he had signed a promise ‘in blood’ to go to war, insisting: ‘I made no such commitment’.Critics who claimed that Blair acted as the ‘poodle’ of the US will point to a reference in Mr Powell’s memo to the fact Mr Blair ‘readily committed to deploy 1,700 commandos’ to Afghanistan ‘even though his experts warn that British forces are overstretched’.The decision made the previous October in the wake of the September 11 attacks led to widespread concern that the UK was entering an open-ended commitment to a bloody conflict in Afghanistan – a concern many critics now say was well-founded.
  • Mr Powell’s memo goes on to say that a recent move by the U.S. to protect its steel industry with tariffs, which had damaged UK exports, was a ‘bitter blow’ for Blair, but he was prepared to ‘insulate our broader relationship from this and other trade disputes’.The memo was included in a batch of 30,000 emails which were received by Mrs Clinton on her private server when she was US Secretary of State between 2009 and 2013.Another document included in the email batch is a confidential briefing for Powell prepared by the U.S. Embassy in London, shortly before the Crawford summit.The memo, dated ‘April 02’, includes a detailed assessment of the effect on Blair’s domestic position if he backs US military action.The document says: ‘A sizeable number of his [Blair’s] MPs remain at present opposed to military action against Iraq... some would favor shifting from a policy of containment of Iraq if they had recent (and publicly usable) proof that Iraq is developing WMD/missiles... most seem to want some sort of UN endorsement for military action.‘Blair’s challenge now is to judge the timing and evolution of America’s Iraq policy and to bring his party and the British people on board.'There have been a few speculative pieces in the more feverish press about Labor [sic] unease re Iraq policy… which have gone on to identify the beginnings of a challenge to Blair’s leadership of the party.
  • 'Former Cabinet member Peter Mandelson, still an insider, called it all "froth". Nonetheless, this is the first time since the 1997 election that such a story is even being printed’.The paper draws on information given to it by Labour ‘spies’, whose identities have been hidden.It states: ‘[name redacted] told us the intention of those feeding the story is not to bring down Blair but to influence him on the Iraq issue’.‘Some MPs would endorse action if they had proof that Iraq has continued to develop WMD since UN inspectors left.‘More would follow if convinced that Iraq has succeeded in developing significant WMD capability and the missiles to deliver it.'Many more would follow if they see compelling evidence that Iraq intends and plans to use such weapons. A clear majority would support military action if Saddam is implicated in the 9/11 attacks or other egregious acts of terrorism’.‘Blair has proved an excellent judge of political timing, and he will need to be especially careful about when to launch a ramped-up campaign to build support for action against Iraq.'He will want neither to be too far in front or behind US policy... if he waits too long, then the keystone of any coalition we wish to build may not be firmly in place. No doubt these are the calculations that Blair hopes to firm up when he meets the President’.A spokesperson for Blair said: ‘This is consistent with what Blair was saying publicly at the time and with Blair’s evidence given to the Chilcot Inquiry’.
  • Stunning memo proves Blair signed up for Iraq even before Americans - comment by former shadow home secretary David DavisThis is one of the most astonishing documents I have ever read.It proves in explicit terms what many of us have believed all along: Tony Blair effectively agreed to act as a front man for American foreign policy in advance of any decision by the House of Commons or the British Cabinet.He was happy to launder George Bush’s policy on Iraq and sub-contract British foreign policy to another country without having the remotest ability to have any real influence over it.And in return for what? For George Bush pretending Blair was a player on the world stage to impress voters in the UK when the Americans didn’t even believe it themselves.Blair was content to cynically use Britain’s international reputation for honest dealing in diplomacy, built up over many years, as a shield against worldwide opprobrium for Bush’s ill-considered policy.Judging from this memorandum, Blair signed up for the Iraq War even before the Americans themselves did. It beggars belief.
  • Blair was telling MPs and voters back home that he was still pursuing a diplomatic solution while Colin Powell was telling President Bush: ‘Don’t worry, George, Tony is signed up for the war come what may – he’ll handle the PR for you, just make him look big in return.’It should never be forgotten that a minimum of 120,000 people died as a direct result of the Iraq War.What is truly shocking is the casualness of it all, such as the reference in the memo to ‘the day after’ – meaning the day after Saddam would be toppled.The offhand tone gives the game away: it is patently obvious nobody thought about ‘the day after’ when Bush and Blair met in Crawford.And they gave it no more thought right through to the moment ‘the day after’ came about a year later when Saddam’s statue fell to the ground.We saw the catastrophic so-called ‘de-Baathification’ of Iraq, with the country’s entire civil and military structure dismantled, leading to years of bloodshed and chaos. It has infected surrounding countries to this day and created the vacuum into which Islamic State has stepped.This may well be the Iraq ‘smoking gun’ we have all been looking for.
1More

Susan Lindauer | Veterans Today - 0 views

  •  
    Recently hear former CIA agent Susan Lindauer interviewed on Coast to Coast.  Stunning story.  This page has articles that read like a book about 911. intro: As a U.S. Intelligence Asset, Susan Lindauer covered anti-terrorism at the Iraqi Embassy in New York from 1996 up to the invasion. Independent sources have confirmed that she gave advance warning about the 9/11 attack. She also started talks for the Lockerbie Trial with Libyan diplomats. Shortly after requesting to testify before Congress about successful elements of Pre-War Intelligence, Lindauer became one of the first non-Arab Americans arrested on the Patriot Act as an "Iraqi Agent". She was accused of warning her second cousin, White House Chief of Staff Andrew Card and Secretary of State Colin Powell that War with Iraq would have catastrophic consequences. Gratis of the Patriot Act, her indictment was loaded with "secret charges" and "secret evidence." She was subjected to one year in prison on Carswell Air Force Base in Fort Worth, Texas without a trial or hearing, and threatened with indefinite detention and forcible drugging to shut her up. After five years of indictment without a conviction or guilty plea, the Justice Department dismissed all charges five days before President Obama's inauguration. Lindauer has written a book Extreme Prejudice: The Terrifying Story of the Patriot Act and the Cover Ups of 9/11 and Iraq about her experience.
1More

10 Reasons The U.S. Is No Longer The Land Of The Free « JONATHAN TURLEY - 1 views

  •  
    Constitutional legal scholar Jonathan Turley examines the unconstitutional changes the Federal government has instituted since 911.  Chilling stuff.  Here is the short list: .. Assassination of US Citizens .. Arbitrary Justice .. Warrantless Searches .. Secret evidence .. Secret courts .. War crimes (violations of the Nuremberg principles of International Law) .. Immunity from judicial review ..Continual (and warrantless) monitoring of citizens .. Extraordinary renditions Turley asks how can we continue to consider America the land of the free when the Federal government continues to compromise our freedoms on a scale only seen in despotic military tyrannies?  Like China, Cuba and Pakistan?   I've been following the post and comments of the Bay Area Patriot group, a local Tea Party offshoot.  It's incredible how so many members continue to be swept up in 911 mania, demanding more military actions in more places.  As if the ten years of war in Afghansitan and Iraq have left our country safe in our way of life and secure in our freedoms.  Just the opposite is happening, as Professor Turley so thoroughly details.  Yet, they cry for more war.  Then proudly claim their status as Tea Party Patriots taking action to restore America and USA Constitution.   What was Einstein's definition of insanity?  :) excerpt: The column addresses how the continued rollbacks on civil liberties in the United States conflicts with the view of the country as the land of the free.  If we are going to adopt Chinese legal principles, we should at least have the integrity to adopt one Chinese proverb: "The beginning of wisdom is to call things by their right names."  We seem as a country to be in denial as to the implications of these laws and policies.  Whether we are viewed as a free country with authoritarian inclinations or an authoritarian nation with free aspirations (or some other hybrid definition), we are clearly not what we once were.
1More

EXCLUSIVE: Syrians In Ghouta Claim Saudi-Supplied Rebels Behind Chemical Attack - 0 views

  •  
    "Ghouta, Syria - As the machinery for a U.S.-led military intervention in Syria gathers pace following last week's chemical weapons attack, the U.S. and its allies may be targeting the wrong culprit. ........ continued ............... Interviews with people in Damascus and Ghouta, a suburb of the Syrian capital, where the humanitarian agency Doctors Without Borders said at least 355 people had died last week from what it believed to be a neurotoxic agent, appear to indicate as much. The U.S., Britain, and France as well as the Arab League have accused the regime of Syrian President Bashar al-Assad for carrying out the chemical weapons attack, which mainly targeted civilians. U.S. warships are stationed in the Mediterranean Sea to launch military strikes against Syria in punishment for carrying out a massive chemical weapons attack. The U.S. and others are not interested in examining any contrary evidence, with U.S Secretary of State John Kerry saying Monday that Assad's guilt was "a judgment … already clear to the world." However, from numerous interviews with doctors, Ghouta residents, rebel fighters and their families, a different picture emerges. Many believe that certain rebels received chemical weapons via the Saudi intelligence chief, Prince Bandar bin Sultan, and were responsible for carrying out the dealing gas attack. "My son came to me two weeks ago asking what I thought the weapons were that he had been asked to carry," said Abu Abdel-Moneim, the father of a rebel fighting to unseat Assad, who lives in Ghouta. Abdel-Moneim said his son and 12 other rebels were killed inside of a tunnel used to store weapons provided by a Saudi militant, known as Abu Ayesha, who was leading a fighting battalion. The father described the weapons as having a "tube-like structure" while others were like a "huge gas bottle." Ghouta townspeople said the rebels were using mosques and private houses to sleep while storing their weapons in tunnels. A
« First ‹ Previous 41 - 60 of 209 Next › Last »
Showing 20 items per page