Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "capabilities" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

Afghanistan Exit Is Seen as Peril to C.I.A. Drone Mission - NYTimes.com - 0 views

  • The risk that President Obama may be forced to pull all American troops out of Afghanistan by the end of the year has set off concerns inside the American intelligence agencies that they could lose their air bases used for drone strikes against Al Qaeda in Pakistan and for responding to a nuclear crisis in the region. Until now, the debate here and in Kabul about the size and duration of an American-led allied force in Afghanistan after 2014 had focused on that country’s long-term security. But these new concerns also reflect how troop levels in Afghanistan directly affect long-term American security interests in neighboring Pakistan, according to administration, military and intelligence officials.
  • The concern has become serious enough that the Obama administration has organized a team of intelligence, military and policy specialists to devise alternatives to mitigate the damage if a final security deal cannot be struck with the Afghan president, Hamid Karzai, who has declined to enact an agreement that American officials thought was completed last year. If Mr. Obama ultimately withdrew all American troops from Afghanistan, the C.I.A.’s drone bases in the country would have to be closed, according to administration officials, because it could no longer be protected. Their concern is that the nearest alternative bases are too far away for drones to reach the mountainous territory in Pakistan where the remnants of Al Qaeda’s central command are hiding. Those bases would also be too distant to monitor and respond as quickly as American forces can today if there were a crisis in the region, such as missing nuclear material or weapons in Pakistan and India.
  • Their base inside Pakistan was closed after a shooting involving a C.I.A. security contractor, Raymond Davis, and the raid into Pakistani territory that killed Osama bin Laden, both in 2011. Crucial to the surveillance of Bin Laden’s house in Abbottabad was the use of an RQ-170 drone. Pakistani officials talked openly in the weeks after that raid about their fear that the unmanned aircraft was also being used to monitor their nuclear arsenal, now believed to be the fastest growing in the world. The raid, and those drones, came out of American facilities just over the Afghan border.
  • ...2 more annotations...
  • The C.I.A.’s drone bases in Afghanistan, including one in the eastern part of the country, allow operators to respond quickly to fresh intelligence. The proximity to Pakistan’s tribal areas also allows the Predator drones and their larger, faster cousin, the Reaper, to fly longer missions without having to return to base.
  • The Reapers, the newest, largest and most capable of the unmanned armed vehicles, have a range of up to 1,100 miles. That puts Pakistan’s tribal areas within range of some bases the American military has flown from, especially in Kyrgyzstan, where for more than a decade the Pentagon has conducted air operations, include cargo and troop flights, out of a base at Manas. But the United States said last fall that it would pull out of that base in July. Other allied countries are within the Reaper’s range — in the Persian Gulf, for example. But the distances would be too great to carry out drone operations effectively, officials said, and it is very unlikely that any of those nations would approve launching the diplomatically sensitive strikes missions from their soil.“There’s no easy alternative to Afghanistan,” one former senior American counterterrorism official said.
15More

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
4More

Congress cuts U.S. military and development aid for Afghanistan - The Washington Post - 0 views

  • With no perceptible opposition from the Obama administration, Congress has quietly downscaled Washington’s ambitions for the final year of the Afghan war, substantially curtailing development aid and military assistance plans ahead of the U.S. troop pullout. As congressional appropriators put the final touches on a huge spending bill in recent weeks, they slashed Afghanistan development aid by half and barred U.S. defense officials from embarking on major new infrastructure projects. After making a bid last year for $2.6 billion worth of “critical” capabilities such as mobile strike vehicles for Afghan security forces, the Pentagon agreed it could do with just 40 percent of what it had sought.
  • The Obama administration had long hoped to bring the Afghan war to a dignified conclusion this year and viewed the president’s State of the Union speech Tuesday as an opportunity to describe the end of America’s longest war as a foreign policy success. But Washington’s appetite to remain engaged in Afghanistan appears to be eroding precipitously, in large part because of how poisonous its relationship with the country’s president has become.
  • The prevailing sentiment in Washington toward President Hamid Karzai, who has thus far refused to sign a security agreement that would keep U.S. troops and funding in Afghanistan beyond 2014, was even codified in the Afghan portion of the spending bill, which was drawn up without significant public debate. “The bill prohibits the obligation or expenditure by the United States government, of funds appropriated in this or any other act, for the direct personal benefit of the President of Afghanistan,” appropriators wrote, an unprecedented move that President Obama signed into law last week.U.S. officials said the cuts and restrictions might appear starker than they actually are because agency heads will retain significant flexibility to use unspent funds from previous years or draw from other sources. But many see the reductions as the unmistakable end of an era of wartime largesse.
  •  
    Attention: major history rewrite in progress. "... the final year of the Afghan war ...  The Obama administration had long hoped to bring the Afghan war to a dignified conclusion this year." Blither.
5More

Tech giants reach White House deal on NSA surveillance of customer data | World news | ... - 0 views

  • The Obama administration has reached a deal with a number of technology giants, allowing the companies to disclose more information on customer data they are compelled to share with the government.Announced on Monday, the transparency arrangement ends months of legal wrangling between the companies and US intelligence agencies before a secret surveillance court, to compel the disclosures.The disclosures are to be nonspecific, listed by the thousand and subject in some cases to a six-month delay – speaking to the large quantities of data that the government still plans on collecting from its technology partners. In order to be more specific about the amount of data turned over, the companies must be less specific about the type of data it is.The deal also explicitly points to a delay of up to two years on revealing information on data collected under surveillance programs the National Security Agency may yet develop.
  • But the deal also purports to shed far more light than ever on a question the intelligence agencies have been extremely reluctant to address – the number of people affected by NSA surveillance.The Justice Department said the transparency deal also applies to phone companies that turn over, on a daily basis, the records of every phone call made in the US. The phone companies have not exhibited the same agitation for transparency in the wake of the Edward Snowden revelations as have tech firms.
  • The new arrangement addresses a major grievance held by Google, Yahoo, Microsoft, Facebook and LinkedIn, which all joined a coalition called Reform Government Surveillance in order to pressure the administration into reassuring their customers about the propriety and legality of giving vast amounts of data to the NSA, FBI and other government agencies. It does not curtail the amount of data demanded, which is another demand of the coalition. 
  • ...2 more annotations...
  • Additionally, once the NSA or other government agency develops a surveillance effort on “a platform, product or service (whether developed or acquired) for which the company has not previously received such an order”, the firms must wait two years before disclosure of its existence. Such “new capability orders” would subsequently be subject to the same biannual reporting requirements after the two-year period expires.
  • The five firms that were party to the Fisa court transparency suit agreed to drop their case, according to a document released by the court on Monday. Civil libertarians were optimistic about the deal. 
5More

National Defense Authorization Act of 2014 Authorizes Cyber Warfare Against American Ci... - 0 views

  • In the midst of the holiday season Congress decided to pass the National Defense Authorization Act of 2014 or NDAA.  The bill was later signed into law by President Obama with little if any fanfare.
  •  The NDAA contains a number of highly questionable sections that run contrary to the principles articulated in the United States Constitution.  Specifically, language contained in the bill appears to authorize cyber warfare operations against the American people.
  • All of this is even more concerning when one considers that the NDAA also has a lot of new cyber warfare initiatives.  Section 931 through Section 942 contains a bunch of crazy stuff dealing with the world of cyber warfare..Section 932 authorizes the creation of a position known as The Principal Cyber Advisor which will be responsible for supervising offensive and defensive cyber warfare activities.  Obviously this position would not be created unless the federal government is intending upon involving itself in both offensive and defensive cyber warfare well into the future.  Section 933 instructs the Secretary of Defense to conduct a broad mission analysis of the government’s cyber warfare capabilities.  The required analysis will focus primarily on how they will manage, increase and enhance their personnel assigned to cyber warfare operations.  It even disallows the reduction of cyber warfare personnel assigned to the Air National Guard.
  • ...2 more annotations...
  • Section 936 requests the Secretary of Defense to strengthen outreach and threat awareness programs for small businesses.  This is allegedly to assist businesses that are awarded contracts by the Department of Defense to understand cyber threats, develop plans to protect intellectual property and networks of such businesses.  Realistically, this section appears to give the Department of Defense the authority to mandate all sorts of cyber security requirements on small businesses that they do transactions with.  The language of the section makes it sound as if they will be doing these small businesses a favor when the opposite appears to be the case.Section 940 authorizes the President to establish a process and policy to control the proliferation of cyber weapons through law enforcement activities, financial means, diplomatic engagement and pretty much any other means that the President considers appropriate.  This would also include potential private industry participation in the initiative.  The objective of the process is to suppress the trade of so-called cyber tools that could be used for criminal, terrorist or military activities.  The term cyber weapon is not explicitly defined in the section so this could be considered almost anything be it software or hardware that they declare could potentially be used for a nefarious purpose.  Even something like bit torrent and torrent related applications could be considered cyber weapons since copyrighted material is consistently transferred back and forth using these tools.  As a result, the use of these tools could potentially fall under the classification of criminal activity.  Once again we have the President being given expansive powers from Congress with its extremely broad use of language in the bill. 
  • Section 941 directs the president to establish an interagency policy to deter adversaries in cyberspace.  The word adversaries is yet again not specifically defined in the section so this could also mean almost anything.  With many American citizens not trusting the United States government this could mean a policy to deter or stifle anyone from political opponents to protesters who voice their disgust on the Internet.Overall, between the records collection initiative and the immense cyber warfare planning that is outlined in the NDAA it is becoming painfully clear that the United States government is turning the Internet into a battlefield.
5More

DARPA seeks the Holy Grail of search engines - 0 views

  • The scientists at DARPA say the current methods of searching the Internet for all manner of information just won't cut it in the future. Today the agency announced a program that would aim to totally revamp Internet search and "revolutionize the discovery, organization and presentation of search results." Specifically, the goal of DARPA's Memex program is to develop software that will enable domain-specific indexing of public web content and domain-specific search capabilities. According to the agency the technologies developed in the program will also provide the mechanisms for content discovery, information extraction, information retrieval, user collaboration, and other areas needed to address distributed aggregation, analysis, and presentation of web content.
  • Memex also aims to produce search results that are more immediately useful to specific domains and tasks, and to improve the ability of military, government and commercial enterprises to find and organize mission-critical publically available information on the Internet. "The current one-size-fits-all approach to indexing and search of web content limits use to the business case of web-scale commercial providers," the agency stated. 
  • The Memex program will address the need to move beyond a largely manual process of searching for exact text in a centralized index, including overcoming shortcomings such as: Limited scope and richness of indexed content, which may not include relevant components of the deep web such as temporary pages, pages behind forms, etc.; an impoverished index, which may not include shared content across pages, normalized content, automatic annotations, content aggregation, analysis, etc. Basic search interfaces, where every session is independent, there is no collaboration or history beyond the search term, and nearly exact text input is required; standard practice for interacting with the majority of web content, which remains one-at-a-time manual queries that return federated lists of results. Memex would ultimately apply to any public domain content; initially, DARPA  said it intends to develop Memex to address a key Defense Department mission: fighting human trafficking. Human trafficking is a factor in many types of military, law enforcement and intelligence investigations and has a significant web presence to attract customers. The use of forums, chats, advertisements, job postings, hidden services, etc., continues to enable a growing industry of modern slavery. An index curated for the counter-trafficking domain, along with configurable interfaces for search and analysis, would enable new opportunities to uncover and defeat trafficking enterprises.
  • ...1 more annotation...
  • DARPA said the Memex program gets its name and inspiration from a hypothetical device described in "As We May Think," a 1945 article for The Atlantic Monthly written by Vannevar Bush, director of the U.S. Office of Scientific Research and Development (OSRD) during World War II. Envisioned as an analog computer to supplement human memory, the memex (a combination of "memory" and "index") would store and automatically cross-reference all of the user's books, records and other information. This cross-referencing, which Bush called associative indexing, would enable users to quickly and flexibly search huge amounts of information and more efficiently gain insights from it. The memex presaged and encouraged scientists and engineers to create hypertext, the Internet, personal computers, online encyclopedias and other major IT advances of the last seven decades, DARPA stated.
  •  
    DoD announces that they want to go beyond Google. Lots more detail in the proposal description linked from the article. Interesting tidbits: [i] the dark web is a specific target; [ii] they want the ability to crawl web pages blocked by robots.txt; [iii] they want to be able to search page source code and comments. 
4More

US Weapons fo Al Qaeda: Saudi Arabia to Supply Syria Terrorists with Anti-Aircraft Miss... - 0 views

  • Frustrated by the deadlock of the second round of Geneva 2 talks, Saudi Arabia has reportedly offered to supply the rebels with anti-aircraft missiles. Meanwhile Russia has accused the US of once again hijacking peace talks and pushing for regime change. According to a report by the Wall Street Journal, Russian-made antitank guided missiles and Chinese man-portable air-defense systems are up for grabs, already waiting in warehouses in Jordan and Turkey. An Arab diplomat and several opposition figures with knowledge of the Saudi efforts have told WSJ that these supplies are likely to tip the battlefield scales, as the rebels will become capable of taking on the government’s air power and destroying heavy armored vehicles. “New stuff is arriving imminently,” a Western diplomat with knowledge of the planned weapons deliveries told the American publication.
  • According to the WSJ report, rebel commanders struck a deal on the new armaments shipment during a meeting with US and Saudi intelligence agents in Jordan on January 30.
  • The Wall Street Journal also reports that their rebel sources claimed the US government is paying their salaries to fight the Assad forces. The Southern Front brigades allegedly received $3 million in cash in salaries during the two meetings in Jordan, one held on January 30 and the other late last year.
  •  
    It appears that Obama is definitely ratcheting up the level of paramilitary power aimed at unseating the elected Syrian Assad government.
11More

LAPD scopes out Israeli drones, 'Big Data' solutions | Nation | Jewish Journal - 0 views

  • For the first nine days of February, eight of the Los Angeles Police Department’s top brass were 7,500 miles away from home, being shuttled around Israel in a minibus.
  • LAPD Deputy Chief Jose Perez, a good-natured 30-year veteran of the department who oversees its central bureau, tweeted updates at nearly every stop. On Feb. 2, he shared a group photo of the Los Angeles delegation visiting the corporate headquarters of Nice Systems, an Israeli security and cyber intelligence company that can intercept and instantly analyze video, audio and text-based communications. (A seemingly tongue-in-cheek inspirational poster on the wall behind them reads: “Every voice deserves to be heard.”)
  • The group visited private security firms and drone manufacturers, as well as the terror-prone Ashdod Port, a museum in Sderot full of old rockets shot from nearby Gaza (the same one United States President Barack Obama visited on his 2008 campaign trip to Israel), and a “safe city” underground control center in the large suburb of Rishon LeZion, which receives live streams from more than 1,000 cameras with license plate recognition installed throughout the city.
  • ...8 more annotations...
  • Frank was joined by seven of his fellow command staff at the Big Data Intelligence Conference hosted by i-HLS in the beach town of Herzliya, Israel, on Feb. 6. “On behalf of my chief of police, Chief Charlie Beck, and the 13,000-plus sworn and non-sworn members of the Los Angeles Police Department, a very heartfelt thanks to all of you for having me here,” Frank said in an opening statement for the conference, which brought together some of Israel’s — and the world’s — top cyber security and intelligence experts.
  • Frank said he was especially impressed by what he saw while visiting Israeli companies Nice Systems (as tweeted by Perez) and Verint, one of the companies whose services the National Security Administration (NSA) reportedly used in the infamous United States wiretapping scandal. Both companies already count the LAPD as a client. But, Frank said, “we’re looking at some of their additional solutions … They have a lot of new technologies that we are very much interested in.” Nice System’s  president of security, Yaron Tchwella, spoke at the conference about the company’s ability to help government agencies capture and store the billions of calls, emails, messages and social media posts that their populations generate each day, then analyze it in real time to detect potential threats.
  • Perez said he hoped the LAPD, too, would eventually be able to “use technology to incorporate all the systems that we have. That’s the wave of the future. We’re definitely looking at the ability to get that information out to the officers on the beat with a handheld. Something happens, and you’re looking at the handheld — almost like ‘The Bourne Supremacy’ — here’s a picture of the guy you’re looking for.”
  • Also in Khan’s crosshairs is Special Order 1, an LAPD policy that allows officers to document any otherwise lawful activity that they, or other members of the community, deem suspicious. (Including, for example, the photographing of certain government sites.) And new LAPD intel collection methods or surveillance drones, said Khan, would only be “adding more to their toolbox of being highly militarized in counterinsurgency forces” against protesters and movements such as Occupy. “Yet it is wrapped in this whole language of community policing.” Two separate L.A. Weekly investigations in 2012 found that the LAPD uses expensive StingRay devices, which can locate cellphones (and their users) by acting like cellphone towers, and license-plate recognition cameras that track millions of drivers. Although both devices technically require a warrant to be used in a police investigation, there is little way to know whether police are always complying with the rules.
  • Surveillance drones manufactured by Israel Aerospace Industries (IAI) and Sky Sapience were also hot items on the LAPD tour. Both Frank and Perez lit up when talking about the HoverMast, a new tethered drone from Sky Sapience that was just released to the IDF late last year. “There are several things on the wish list, but we did like Sky Sapience — that was incredible,” Perez said. “For me personally, just for my command, which is five stations, and all the special events that I have, crowd control and being able to see everything would be some technology that is needed immediately.” However, Frank added, the HoverMast “has its challenges: from a political standpoint, convincing our political leaders, and from a community standpoint, convincing the community that it’s not Big Brother watching over you.”
  • A spokeswoman for Sky Sapience said the HoverMast can intercept wireless communications, and its cameras are capable of facial recognition. A spokeswoman for IAI said that while showing LAPD officers their drones, the company “wanted to emphasize the fact that drones can be very helpful in giving intelligence in urban scenarios… you need it now, you need it quick, you need to see what’s inside a window, and what’s behind this building.”
  • Many of the companies attracting LAPD interest have one thing in common: They were formed by veterans of the IDF’s elite, top-secret 8200 Unit, better known as Israel’s version of the NSA.
  • Perez emphasized that as a local police agency, the LAPD has much tighter legal constraints than federal agencies to adhere to when adopting army-born surveillance and “big data” technologies.
6More

Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks an... - 0 views

  • Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution. The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous. One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
  • Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
  • In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.” “News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.” Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name. The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
  • ...2 more annotations...
  • The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges. In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens. The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)
  • It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”
  •  
    "... the Obama administration urged foreign allies to file criminal charges against Assange over the group's publication of the Afghanistan war logs." Sweden promptly launches an alleged rape investigation and Assange is forced by the UK courts to take refuge in the London embassy of Ecuador. Because of urging by the Obama administration aimed at chilling the the First Amendment rights of journalists. That should be grounds for impeachment.  
1More

Russia Seeks Access to Bases in Eight Countries for Its Ships and Bombers | CNS News - 0 views

  • At a time of escalated tensions with the West over Ukraine, Russia says it is negotiating with eight governments around the world for access to military facilities, to enable it to extend its long-range naval and strategic bomber capabilities. Defense Minister Sergei Shoigu said Wednesday the military was engaged in talks with Cuba, Venezuela, Nicaragua, Algeria, Cyprus, the Seychelles, Vietnam and Singapore. “We need bases for refueling near the equator, and in other places,” ITAR-Tass quoted him as saying. Russia is not looking to establish bases in those locations, but to reach agreement to use facilities there when required.
3More

Rand Paul slams James Clapper over NSA 'lying' - Jose DelReal - POLITICO.com - 0 views

  • “That Clapper is lying to Congress is probably more injurious to our intelligent capabilities than anything Snowden did,” Paul told CNN’s Wolf Blitzer. “Clapper has damaged the credibility of the entire intelligence apparatus and I’m not sure what to believe anymore when they come to Congress.”
  • Paul also said he believes Clapper would need to resign to restore confidence in the intelligence community.
  • “I don’t know how you can have someone in charge over intelligence who has known to lie in a public forum to Congress, to lie without repercussions,” he added. “If the intelligence community says we’re not spying on Americans and they are, and then they say we’re not collecting any data, it’s hard to have confidence in them.” When asked about the prospect of raising criminal charges against Clapper, Paul said that both Snowden and Clapper broke the law. “I think the law is the law; they both broke the law and that one shouldn’t get off scot-free,” Paul said.
2More

Report Suggests NSA Engaged In Financial Manipulation, Changing Money In Bank Accounts ... - 0 views

  • Matt Blaze has been pointing out that when you read the new White House intelligence task force report and its recommendations on how to reform the NSA and the wider intelligence community, that there may be hints to other excesses not yet revealed by the Snowden documents. Trevor Timm may have spotted a big one. In the recommendation concerning increasing security in online communications, the second sub-point sticks out like a sore thumb:
  • Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial system. While there have been plenty of reports about the US running hundreds of offensive cyberattacks on others, outside of things like Stuxnet, not many have been directly identified. And I'm unaware of any claims suggesting attempts to "manipulate the financial system" of any particular country and/or to "change the amounts held in financial accounts." It seems a bit odd to come out of the blue like that, and certainly suggests that this particular bullet point likely came as a result of a rather specific thing that came up during the task force's review. So, now we wait for the inevitable news of what sort of financial shenanigans the NSA was up to.
5More

NSA Spied on Chinese Government and Networking Firm Huawei - SPIEGEL ONLINE - 0 views

  • According to documents viewed by SPIEGEL, America'a NSA intelligence agency put considerable efforts into spying on Chinese politicians and firms. One major target was Huawei, a company that is fast becoming a major Internet player.
  • The American government conducted a major intelligence offensive against China, with targets including the Chinese government and networking company Huawei, according to documents from former NSA worker Edward Snowden that have been viewed by SPIEGEL. Among the American intelligence service's targets were former Chinese President Hu Jintao, the Chinese Trade Ministry, banks, as well as telecommunications companies. But the NSA made a special effort to target Huawei. With 150,000 employees and €28 billion ($38.6 billion) in annual revenues, the company is the world's second largest network equipment supplier. At the beginning of 2009, the NSA began an extensive operation, referred to internally as "Shotgiant," against the company, which is considered a major competitor to US-based Cisco. The company produces smartphones and tablets, but also mobile phone infrastructure, WLAN routers and fiber optic cable -- the kind of technology that is decisive in the NSA's battle for data supremacy. A special unit with the US intelligence agency succeeded in infiltrating Huwaei's network and copied a list of 1,400 customers as well as internal documents providing training to engineers on the use of Huwaei products, among other things.
  • According to a top secret NSA presentation, NSA workers not only succeeded in accessing the email archive, but also the secret source code of individual Huwaei products. Software source code is the holy grail of computer companies. Because Huawei directed all mail traffic from its employees through a central office in Shenzhen, where the NSA had infiltrated the network, the Americans were able to read a large share of the email sent by company workers beginning in January 2009, including messages from company CEO Ren Zhengfei and Chairwoman Sun Yafang. "We currently have good access and so much data that we don't know what to do with it," states one internal document. As justification for targeting the company, an NSA document claims that "many of our targets communicate over Huawei produced products, we want to make sure that we know how to exploit these products." The agency also states concern that "Huawei's widespread infrastructure will provide the PRC (People's Republic of China) with SIGINT capabilities." SIGINT is agency jargon for signals intelligence. The documents do not state whether the agency found information indicating that to be the case.
  • ...2 more annotations...
  • The operation was conducted with the involvement of the White House intelligence coordinator and the FBI. One document states that the threat posed by Huawei is "unique". The agency also stated in a document that "the intelligence community structures are not suited for handling issues that combine economic, counterintelligence, military influence and telecommunications infrastructure from one entity."
  • Editor's note: A longer version of this story will appear in German in the issue of SPIEGEL to be published on Monday.
3More

NSA surveillance program reaches 'into the past' to retrieve, replay phone calls - The ... - 0 views

  • The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.
  • The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. The call buffer opens a door “into the past,” the summary says, enabling users to “retrieve audio of interest that was not tasked at the time of the original call.” Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage.At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.
  •  
    Let's also recall that former FBI counter-terrorism specialist Tim Clemente told CNN in the wake of the Boston bombing that all telephone calls in the U.S. are recorded and that "intelligence" people would be able to retrieve the call between Tamerlan Tsarnaev and his wife after the bombing. http://transcripts.cnn.com/TRANSCRIPTS/1305/01/ebo.01.html So is the mysterious nation whose calls are all being recorded the U.S.?
3More

Chairman Of Joint Chiefs: US Ready For "Military Response" In Ukraine | Zero Hedge - 0 views

  • With diplomacy having failed miserably to resolve the Russian annexation of Crimea, and soon East Ukraine (and with John Kerry in charge of it, was there ever any doubt), the US is moving to the heavy artillery. First, moments ago, the US DOE announced in a shocking announcement that it would proceed with the first draw down and sale of crude from the US strategic petroleum reserve, the first since June 2011, in what it said was a "test sale to check the operational capabilities of system infrastructure", but is really just a shot across the bow at Putin for whom high commodity prices are orders of magnitude more important than how the Russian stock market performs. And now, as Bloomberg just reported, the US has escalated even further, citing the Chairman of the Joint Chiefs of Staff, General Martin Dempsey, who "has claimed that in the case of an escalation of unrest in Crimea, the U.S. Army is ready to back up Ukraine and its allies in Europe with military actions."
  • So much for those peaceful hour long phone calls between Obama and Putin. From Bloomberg: According to the Web site of the Atlantic Council, Dempsey said that "he's been talking to his military counterparts in Russia, but he's also sending a clear message to Ukraine and members of NATO that the U.S. military will respond militarily if necessary."   "We're trying to tell [Russia] not to escalate this thing further into Eastern Ukraine, and allow the conditions to be set for some kind of resolution in Crimea. We do have treaty obligations with our NATO allies. And I have assured them that if that treaty obligation is triggered [in Europe], we would respond," Dempsey said.   According to the General, the incursion of Russian troops into the Crimea creates risks for all the countries of Europe and NATO allies.   "If Russia is allowed to do this, which is to say move into a sovereign country under the guise of protecting ethnic Russians in Ukraine, it exposes Eastern Europe to some significant risk, because there are ethnic enclaves all over Eastern Europe and the Balkans," Dempsey said. And with that, the USDJPY ramp takes the pair to overnight highs, and futures are set to go green. BTFWWIIID! More seriously, the real question is how Putin will react to this quantum escalation in verbal hostilities: wild guess here, but somehow we doubt he will pick up and leave.
  •  
    At stake, a few areas inside eastern Ukraine that have voted to join the Crimea and stick with Russia rather than NATO/IMF. 
4More

On Obama's cancellation of summit with Putin and extradition [ Glenn Greenwald | Commen... - 0 views

  • Former Bush-era CIA and NSA director Michael Hayden appeared on CNN this week and confirmed that our reporting on the NSA's X-Keyscore program was accurate, telling the nation that we should all be grateful for those capabilities.NYU journalism professor Jay Rosen has a superb essay on the behavior of the US media in NSA stories.Foreign Policy CEO and Editor David Rothkopf becomes the latest establishment figure to recognize, as he puts it in a quite good column: "I have myself been too slow to recognize that the benefits we have derived from Snowden's revelations substantially outweigh the costs associated with the breach."
  • Meanwhile, 150 press freedom and human rights groups from around the world issued a letter demanding that the US cease prosecuting Snowden on the ground that "Snowden's disclosures have triggered a much-needed public debate about mass surveillance online everywhere" and "thanks to him, we have learned the extent to which our online lives are systematically monitored by governments, without transparency, accountability or safeguards from abuse."
  • Finally, Princeton University international law professor Richard Falk has an Op-Ed today explaining that the granting of asylum to Snowden wasn't just within Russia's rights, but was legally compelled.
  • ...1 more annotation...
  • The US frequently refuses extradition requests where, unlike with Snowden, it involves serious crimes and there is an extradition treaty
4More

UK Cryptographers Call For Publication of Deliberately Weakened Protocols, Products | T... - 0 views

  • A group of cryptographers in the UK has published a letter that calls on authorities in that country and the United States to conduct an investigation to determine which security products, protocols and standards have been deliberately weakened by the countries’ intelligence services. The letter, signed by a number of researchers from the University of Bristol and other universities, said that the NSA and British GCHQ “have been acting against the interests of the public that they are meant to serve.” The appeal comes a couple of weeks after leaked documents from the NSA and its UK counterpart, Government Communications Headquarters, showed that the two agencies have been collaborating on projects that give them the ability to subvert encryption protocols and also have been working with unnamed security vendors to insert backdoors into hardware and software products. Security experts have been debating in recent weeks which products, standards and protocols may have been deliberately weakened, but so far no information has been forthcoming.
  • “By weakening cryptographic standards, in as yet undisclosed ways, and by inserting weaknesses into products which we all rely on to secure critical infrastructure, we believe that the agencies have been acting against the interests of the public that they are meant to serve. We find it shocking that agencies of both the US and UK governments now stand accused of undermining the systems which protect us. By weakening all our security so that they can listen in to the communications of our enemies, they also weaken our security against our potential enemies,” the letter says.
  • Published on Monday, the letter is signed by cryptographers from the University of Bristol, University of London, University of Birmingham, University of Luxembourg, University of Southampton, University of Surrey, University of Kent, Newcastle University and University College London. In it, the researchers call on the relevant authorities to publicly name the products and standards that have been weakened in order to inform users which systems they should avoid. “We call on the relevant parties to reveal what systems have been weakened so that they can be repaired, and to create a proper system of oversight with well-defined public rules that clearly forbid weakening the security of civilian systems and infrastructures. The statutory Intelligence and Security Committee of the House of Commons needs to investigate this issue as a matter of urgency. In the modern information age we all need to have complete trust in the basic infrastructure that we all use,” the letter says.
  • ...1 more annotation...
  • In the weeks since the documents detailing the NSA’s cryptographic capabilities emerged, further details about exactly which protocols the agency can attack successfully and which standards it may have influenced have been scarce. NIST, the U.S. agency that develops technical standards for cryptography, among other things, as denied accusations that the NSA was able to weaken some of the NIST standards. However, at the same time, NIST officials have issued a recommendation that people no longer use one of the encryption standards it previously published.
4More

OpEdNews - Article: Al-Qaeda's Air Force Still On Stand-By - 1 views

  • It was 12 years ago today. Historians will register that, according to the official narrative, 19 Arabs armed with box cutters and minimal flying skills pledged to a transnational Terror Inc turned jets into missiles to attack the US homeland, fooling the most elaborate defense system on Earth.  Fast forward to 2013. Here's a 15-second version of the President of the United States (POTUS) address on Syria, one day before the 12th anniversary of 9/11: "Our ideals and principles, as well as our national security, are at stake. The United States is 'the anchor of global security.' Although the United States military 'doesn't do pin pricks,' we still carry the burden to punish regimes that would flout long-held conventions banning the use of biological, chemical and nuclear weapons.  "That's why I have decided to pursue an unlimited, targeted military strike against Washington DC." For countless global citizens, this alternative version predictably sounds as far-fetched as the official version of what happened 12 years ago. The fog of war obscures in mysterious ways. But the fact remains that the current, "reluctant" (farcical) Emperor continues to stake his -- and his nation's -- "credibility" on a "limited," "kinetic" operation to reinforce his self-defined red line against chemical weapons. 
  • In theory, the Russian plan of having Damascus surrender its chemical weapons arsenal works because of its inbuilt Chinese wisdom; nobody loses face -- from Obama and the US Congress to the European Union, the UN and the even more farcical "Arab" League, which is essentially a Saudi Arabian colony.  Although Obama is on a media blitzkrieg stealing the credit for it, Asia Times Online has confirmed that the plan was elaborated by Damascus, Tehran and Moscow last week -- after a visit to Damascus by the head of the national security committee of the Iranian Majlis (parliament), Alaeddin Boroujerdi. US Secretary of State John Kerry's now famous "slip" provided the opening.  So, essentially, it's this "axis" -- Damascus, Tehran and Moscow -- that is helping Obama to crawl out of his self-inflicted abyss. Needless to say, that is absolutely unbearable for the plutocrats in charge of unleashing the new Syria (lethal) production. A brand new propaganda/manufactured hysteria campaign must be unfurled to justify war. And that's exactly what the Anglo-French-American axis is working on.  No wonder the French proposal for a new UN Security Council resolution falls under the UN's Chapter 7 -- which would explicitly allow the use of force against Damascus in case of non-compliance. As it is, this resolution will inevitably be vetoed by Russia and China. And that will be the new pretext for war. The (farcical) emperor may easily invoke plausible deniability, stress he made "every effort" to avoid a military conflict, and then convince skeptics in the US Congress this is the only way to go. 
  • At least there is a counter-power. Asia Times Online has confirmed that an outstanding meeting will take place later this week in Kyrgyzstan, during the annual summit of the Shanghai Cooperation Organization (SCO). Picture Chinese President Xi Jinping, Russian President Vladimir Putin and new Iranian President Hassan Rouhani together, in the same room, discussing their common position on Syria. Iran is an SCO observer -- and may soon be admitted as a full member. This is what the Anglo-French-American axis is up against.  And that brings us back to 12 years ago -- and the myth that aluminum jets are able to penetrate the thick steel perimeters of the Twin Towers and kerosene is capable of instantaneously melting steel perimeters and steel cores into fluffy steel dust. Check this out and draw the necessary conclusions.  As for that "evil," transnational Terror Inc, it didn't even have a name when Jihad International hopefuls were being recruited in the early 1980s by assorted Islamic charities, and then trained and funded by the CIA and Saudi Arabia. One day the database was finally named -- by the US -- as "al-Qaeda." Or, more appropriately, "al-CIAeda." They were elevated to Ultimate Evil status. They did 9/11. They reproduced like rabbits from Mali to Indonesia. Now the CIA works side-by-side with them -- as it did in Libya. And eagerly they await the US Air Force to clear their road to Damascus. Hey, it's just (war) business. Allahu Akbar. 
  •  
    Note to self: Never read Pepe Escobar articles when I have work that needs to be done. Escobar does it again, with his endearing literary style, masterfully weaving sarcasm with the "facts," the facts, and right-on-the-money political analysis. Here, he commemorates 9/11 by pointing to its parallels with Obama's "humanitarian" Pipelinestan war plans against Syria. Watch out for that link related to 9/11. It takes you to a masterful video some 45 minutes long that you can't stop watching once you begin. And there went another hour and 15 minutes of my workday.
6More

'Israel will attack Iran if you sign the deal, French MP told Fabius' | The Times of Is... - 0 views

  • French member of parliament telephoned French Foreign Minister Laurent Fabius in Geneva at the weekend to warn him that Prime Minister Benjamin Netanyahu would attack Iran’s nuclear facilities if the P5+1 nations did not stiffen their terms on a deal with Iran, Israel’s Channel 2 News reported Sunday
  • “I know [Netanyahu],” the French MP, Meyer Habib, reportedly told Fabius, and predicted that the Israeli prime minister would resort to the use of force if the deal was approved in its form at the time. “If you don’t toughen your positions, Netanyahu will attack Iran,” the report quoted Habib as saying. “I know this. I know him. You have to toughen your positions in order to prevent war.” France’s Fabius is widely reported to have scuppered the finalizing of the emerging deal late Saturday, leading to the halting of the negotiations with Iran, and an agreement to reconvene on November 20. Explaining his concerns to reporters in Geneva, Fabius said Tehran was resisting demands that it suspend work on its plutonium-producing reactor at Arak and downgrade its stockpile of higher-enriched uranium. Habib, the deputy president of the Jewish umbrella organization in France, was elected to the National Assembly in Paris in June, to represent the district of southern Europe, which includes French nationals residing in Israel.
  • The TV report on Sunday said Jerusalem believed that Netanyahu’s angry public criticism of the emerging deal, and his phone conversations with world leaders — including Presidents Barack Obama, Vladimir Putin, and Francois Hollande, Chancellor Angela Merkel and Prime Minister David Cameron — had played a crucial role in stalling the deal, but that Israel was well aware that an agreement would be reached very soon. Netanyahu himself said Sunday that he was aware of the “strong desire” for a deal on the part of the P5+1 negotiators, and had asked the various leaders in his calls, “What’s the hurry?” The report, quoting sources in Jerusalem, said Netanyahu and ministers close to him were castigating the United States for its “radical eagerness” in seeking a deal, and saying that Washington appeared fearful of confrontation with Iran. “This is no way to run a negotiation,” the sources were quoted as saying. The Americans “are giving up all of their pressure points, and the Iranians recognize the Americans’ weakness.”
  • ...2 more annotations...
  • At Sunday’s cabinet meeting, Netanyahu expressed outrage that under the terms of the emerging deal, “not a single centrifuge would be dismantled, not one.” Israel believes the imminent deal will leave Iran with uranium enrichment capabilities, and thus enable it to become a nuclear breakout state at a time of its choosing. Secretary of State John Kerry hit back at Netanyahu on Sunday, declaring, “I’m not sure that the prime minister, who I have great respect for, knows exactly what the amount or the terms are going to be because we haven’t arrived at them all yet. That’s what we’re negotiating.”
  • After the talks broke up in Geneva after midnight Saturday, Kerry complained about critics who were “jumping to conclusions” about the terms of the accord on the basis of “rumors or other parcels of information that somebody pretends to know.” Netanyahu on Friday publicly pleaded with Kerry not to rush to sign what he called a “very, very bad deal.”
  •  
    Let's remember that Netanyahu made identical go-it-alone threats to attack Iran during the run-up to the U.S. 2012 presidential election to bring pressure on Obama to send U.S. military forces in to bomb Iranian nuclear facilities. All the while, the Israeli Defense Force top brass were telling the press that Israel doesn't have the military power to go it alone against Iran. I doubt that Netanyahu's message mattered much to the French. Netanyahu has a credibility problem on that issue. So Netanyahu tried to play the stick role while the House of Saud offered the carrot of weapons purchases from the French and the like. Some stick. 
« First ‹ Previous 181 - 200 of 383 Next › Last »
Showing 20 items per page