Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "flag" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

Debunked: The Official Conspiracy Theory of 9/11 | Global Research - 0 views

  • James Corbett of corbettreport.com presents this 5 minute parody of the official conspiracy theory of 9/11.
  •  
    Well done satirical video, 4:55 min. in length.
6More

U.S. to China: We Hacked Your Internet Gear We Told You Not to Hack | Wired Enterprise ... - 0 views

  • The headline news is that the NSA has surreptitiously “burrowed its way into nearly all the security architecture” sold by the world’s largest computer networking companies, including everyone from U.S. mainstays Cisco and Juniper to Chinese giant Huawei. But beneath this bombshell of a story from Der Spiegel, you’ll find a rather healthy bit of irony. After all, the United States government has spent years complaining that Chinese intelligence operations could find ways of poking holes in Huawei networking gear, urging both American businesses and foreign allies to sidestep the company’s hardware. The complaints grew so loud that, at one point, Huawei indicated it may abandon the U.S. networking market all together. And, yet, Der Speigel now tells us that U.S. intelligence operations have been poking holes in Huawei networking gear — not to mention hardware sold by countless other vendors in both the States and abroad. “We read the media reports, and we’ve noted the references to Huawei and our peers,” says William Plummer, a Huawei vice president and the company’s point person in Washington, D.C. “As we have said, over and over again — and as now seems to be validated — threats to networks and data integrity can come from any and many sources.”
  • Plummer and Huawei have long complained that when the U.S. House Intelligence Committee released a report in October 2012 condemning the use of Huawei gear in telephone and data networks, it failed to provide any evidence that the Chinese government had compromised the company’s hardware. Adam Segal, a senior fellow for China Studies at the Center for Foreign Relations, makes the same point. And now we have evidence — Der Spiegel cites leaked NSA documents — that the U.S. government has compromised gear on a massive scale. “Do I see the irony? Certainly the Chinese will,” Segal says, noting that the Chinese government and the Chinese press have complained of U.S hypocrisy ever since former government contractor Edward Snowden first started to reveal NSA surveillance practices last summer. “The Chinese government has been hammering home what they call the U.S.’s ulterior motives for criticizing China, and there’s been a steady drumbeat of stories in the Chinese press about backdoors in the products of U.S. companies. They’ve been going after Cisco in particular.”
  • To be sure, the exploits discussed by Der Spiegel are a little different from the sort of attacks Congress envisioned during its long campaign against Huawei and ZTE, another Chinese manufacturer. As Segal and others note, Congress mostly complained that the Chinese government could collaborate with people inside the two companies to plant backdoors in their gear, with lawmakers pointing out that Huawei’s CEO was once an officer in China’s People’s Liberation Army, or PLA, the military arm of the country’s Communist party. Der Spiegel, by contrast, says the NSA is exploiting hardware without help from anyone inside the Ciscos and the Huaweis, focusing instead on compromising network gear with clever hacks or intercepting the hardware as it’s shipped to customers. “For the most part, the article discusses typical malware exploits used by hackers everywhere,” says JR Rivers, an engineer who has built networking hardware for Cisco as well as Google and now runs the networking startup Cumulus Networks. “It’s just pointing out that the NSA is engaged in the practice and has resources that are not available to most people.” But in the end, the two types of attack have the same result: Networking gear controlled by government spies. And over the last six months, Snowden’s revelations have indicated that the NSA is not only hacking into networks but also collaborating with large American companies in its hunt for data.
  • ...2 more annotations...
  • Jim Lewis, a director and senior fellow with the Center for Strategic and International Studies, adds that the Chinese view state-sponsored espionage a little differently than the U.S. does. Both countries believe in espionage for national security purposes, but the Chinese argue that such spying might include the theft of commercial secrets. “The Chinese will tell you that stealing technology and business secrets is a way of building their economy, and that this is important for national security,” says Lewis, who has helped oversee meetings between the U.S. and the Chinese, including officers in the PLA. “I’ve been in the room when they’ve said that. The last time was when a PLA colonel said: ‘In the U.S., military espionage is heroic and economic espionage is a crime. In China, the line is not that clear.’” But here in the United States, we now know, the NSA may blur other lines in the name of national security. Segal says that although he, as an American, believes the U.S. government is on stronger ethical ground than the Chinese, other nations are beginning to question its motives. “The U.S has to convince other countries that our type of intelligence gathering is different,” he says. “I don’t think that the Brazils and the Indias and the Indonesias and the South Africas are convinced. That’s a big problem for us.”
  • The thing to realize, as the revelations of NSA snooping continue to pour out, is that everyone deserves scrutiny — the U.S government and its allies, as well as the Chinese and others you may be more likely to view with skepticism. “All big countries,” Lewis says, “are going to try and do this.”
  •  
    Of course, we now know that the U.S. conducts electronic surveillance for a multitude of purposes, including economic. Check this group's notes tagged "NSA-targets" and/or "NSA-goals".
2More

Did The Saudi Government Fund The 9/11 Attacks? - 0 views

  • The Saudis deny any role in 9/11, but the CIA in one memo reportedly found "incontrovertible evidence" that Saudi government officials — not just wealthy Saudi hardliners, but high-level diplomats and intelligence officers employed by the kingdom — helped the hijackers both financially and logistically.
  • Senator Bob Graham On Bush-Saudi-9/11 Coverup An Op-Ed in the NY Post is raising new suspicions about Saudi Arabia's role in 9/11 and the Bush Administration's role in covering it up. We discuss the cover up with former Senator and Chairman of the Select Intelligence Committee Bob Graham.
3More

Canada: The Ottawa Shootings and the Derogation of Constitutional Rights. Did Zebaf-Bib... - 0 views

  • The tragic shooting of Cpl. Nathan Cirillo on October 22, 2014 at the War Memorial in Ottawa, Ontario, Canada followed by a shoot-out at the House of Commons, and the death of the shooter, Michael Zebaf-Bibeau, serves as a catalyst to advance several hidden government agendas. The Canadian government wants to spread unreasonable fear of radical, violent Muslim terrorists so that it can better control all Canadians, especially those who choose to exercise their constitutionally enshrined rights. The government is also advancing a social control mechanism so that it can deny and negate domestic constitutional rights, in particular Section 35 of the Constitution Act, 1982 which recognizes and affirms aboriginal and treaty rights
  • It is very unlikely that Michael Zebaf-Bibeau acted alone. Prof. John McMurtry, author of The Cancer Stage of Capitalism From Crisis to Cure explains in “Canada: Decoding Harper’s Terror Game. Beneath the Masks and Diversions” describes Zebaf-Bibeau as a “ clinically insane, drug-addicted petty criminal living in a homeless shelter in Ottawa who had warned a judge in front of the police back in 2011:”‘If you can’t keep me in, I’m going to do something”. Furthermore, McMurtry wonders, “Who could have been a better tool for the events to come?” The notion that Zebaf-Bibeau was being exploited or set up by a handler/manager/police-informer is further reinforced by observations of investigative reporter Amy MacPherson who credibly claims in “Government Envisages Anti-Constitutional Surveillance Law During Ottawa Shooting” that U.S authorities had advance information. She wonders “… how American intelligence knew the name of a ‘possible terrorist’ as the mayhem was still unfolding. How did Americans know when Canadians didn’t, and how was this information so widespread that American media and Google had access to distribute, but domestic reporters on the scene did not?”
  • The theory that U.S agencies were somehow implicated in the tragedy is further reinforced by the fact that Operation Determined Dragon, a joint Canada/U.S counter-terrorism drill, was executed from 20 to 29 October 2014, so the murder of Cpl. Nathan Cirillo coincided with the time that Determined Dragon was being executed. Yet the Canadian government frames this tragedy as rooted in Islamic terrorism rather than the more credible alternative: that a homeless drug addict could have been used as a tool to further an already finalized agenda to participate in an illegal war in Iraq, and to restrict the rights and freedoms of all Canadians. Not surprisingly, the passing of the anti-constitutional surveillance law – Bill C-13, had also been expedited.
3More

Cartoon shows Israeli PM flying plane into World Trade Center - UPI.com - 0 views

  • A political cartoon published Thursday by Hebrew daily Haaretz incited international controversy with its depiction of Prime Minister Benjamin Netanyahu piloting a plane labeled "Israel" toward a tower flying the American flag, intended to evoke the September 11, 2001 terrorist attacks on the World Trade Center. Amos Biderman, the artist who authored the comic, told The Times of Israel the image was intended to imply Netanyahu is leading the country to "a disaster in Israel-US relations on the scale of 9/11," pointing to the Prime Minister's "arrogance" and his handling of settlement construction in Jerusalem as poor diplomacy. The cartoon was composed and published in response to an article in The Atlantic Tuesday that quoted an anonymous source inside the White House as calling Netanyahu a "chicken[expletive]" criticizing the Prime Minister as "cowardly" for his handling of relations with Palestine.White House Press Secretary Josh Earnest said those comments do not reflect the administration's views on Israel and Netanyahu defended himself during a public appearance the following day, saying he is concerned with Israeli interests.
  • Diplomatic relations between the U.S. and Israel have been deteriorating in recent years as Israel has struggled and at times failed to navigate its troubled relationship with Palestine without alienating the international community.The announcement of plans to construct a settlement of 1000 homes for Israelis in a section of Jerusalem considered territory claimed by Palestinians against the Obama administration's objections further strained relations already fraught with tension. Despite its timeliness, however, Biderman's lampoon was not well received on social media, with commenters calling the comic "tasteless" and "revolting" and "filth."
  •  
    The note of irony here comes from the considerable amount of evidence pointing to Israeli Mossad involvement in the 9-11 attacks. 
15More

Operation AURORAGOLD: How the NSA Hacks Cellphone Networks Worldwide - 0 views

  • In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages. For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.
  • According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance. The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers. Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
  • Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
  • ...11 more annotations...
  • “Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. “Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”
  • The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”
  • The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
  • By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices. The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.
  • The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.” Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.” The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.” The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.
  • One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries. The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone. The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.
  • Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3. The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption. In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)
  • The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.
  • The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries. The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback. According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.
  • Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.” “NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.
  • Documents published with this article: AURORAGOLD – Project Overview AURORAGOLD Working Group IR.21 – A Technology Warning Mechanism AURORAGOLD – Target Technology Trends Center support to WPMO NSA First-Ever Collect of High-Interest 4G Cellular Signal AURORAGOLD Working Aid WOLFRAMITE Encryption Attack OPULENT PUP Encryption Attack NSA/GCHQ/CSEC Network Tradecraft Advancement Team
  •  
    Notice that they've cracked even 4G.
2More

BBC News - Afghanistan conflict: Taliban declares 'defeat' of Nato - 0 views

  • Taliban fighters in Afghanistan have declared the "defeat" of the US and its allies, a day after the coalition officially ended its combat mission. A Taliban statement said the US-led force had "rolled up its flag" without having achieved "anything substantial".
  •  
    Food for thought ...
8More

Why the Sony hack is unlikely to be the work of North Korea. | Marc's Security Ramblings - 0 views

  • Everyone seems to be eager to pin the blame for the Sony hack on North Korea. However, I think it’s unlikely. Here’s why:1. The broken English looks deliberately bad and doesn’t exhibit any of the classic comprehension mistakes you actually expect to see in “Konglish”. i.e it reads to me like an English speaker pretending to be bad at writing English. 2. The fact that the code was written on a PC with Korean locale & language actually makes it less likely to be North Korea. Not least because they don’t speak traditional “Korean” in North Korea, they speak their own dialect and traditional Korean is forbidden. This is one of the key things that has made communication with North Korean refugees difficult. I would find the presence of Chinese far more plausible.
  • 3. It’s clear from the hard-coded paths and passwords in the malware that whoever wrote it had extensive knowledge of Sony’s internal architecture and access to key passwords. While it’s plausible that an attacker could have built up this knowledge over time and then used it to make the malware, Occam’s razor suggests the simpler explanation of an insider. It also fits with the pure revenge tact that this started out as. 4. Whoever did this is in it for revenge. The info and access they had could have easily been used to cash out, yet, instead, they are making every effort to burn Sony down. Just think what they could have done with passwords to all of Sony’s financial accounts? With the competitive intelligence in their business documents? From simple theft, to the sale of intellectual property, or even extortion – the attackers had many ways to become rich. Yet, instead, they chose to dump the data, rendering it useless. Likewise, I find it hard to believe that a “Nation State” which lives by propaganda would be so willing to just throw away such an unprecedented level of access to the beating heart of Hollywood itself.
  • 5. The attackers only latched onto “The Interview” after the media did – the film was never mentioned by GOP right at the start of their campaign. It was only after a few people started speculating in the media that this and the communication from DPRK “might be linked” that suddenly it became linked. I think the attackers both saw this as an opportunity for “lulz” and as a way to misdirect everyone into thinking it was a nation state. After all, if everyone believes it’s a nation state, then the criminal investigation will likely die.
  • ...4 more annotations...
  • 6. Whoever is doing this is VERY net and social media savvy. That, and the sophistication of the operation, do not match with the profile of DPRK up until now. Grugq did an excellent analysis of this aspect his findings are here – http://0paste.com/6875#md 7. Finally, blaming North Korea is the easy way out for a number of folks, including the security vendors and Sony management who are under the microscope for this. Let’s face it – most of today’s so-called “cutting edge” security defenses are either so specific, or so brittle, that they really don’t offer much meaningful protection against a sophisticated attacker or group of attackers.
  • 8. It probably also suits a number of political agendas to have something that justifies sabre-rattling at North Korea, which is why I’m not that surprised to see politicians starting to point their fingers at the DPRK also. 9. It’s clear from the leaked data that Sony has a culture which doesn’t take security very seriously. From plaintext password files, to using “password” as the password in business critical certificates, through to just the shear volume of aging unclassified yet highly sensitive data left out in the open. This isn’t a simple slip-up or a “weak link in the chain” – this is a serious organization-wide failure to implement anything like a reasonable security architecture.
  • The reality is, as things stand, Sony has little choice but to burn everything down and start again. Every password, every key, every certificate is tainted now and that’s a terrifying place for an organization to find itself. This hack should be used as the definitive lesson in why security matters and just how bad things can get if you don’t take it seriously. 10. Who do I think is behind this? My money is on a disgruntled (possibly ex) employee of Sony.
  • EDIT: This appears (at least in part) to be substantiated by a conversation the Verge had with one of the alleged hackers – http://www.theverge.com/2014/11/25/7281097/sony-pictures-hackers-say-they-want-equality-worked-with-staff-to-break-in Finally for an EXCELLENT blow by blow analysis of the breach and the events that followed, read the following post by my friends from Risk Based Security – https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack EDIT: Also make sure you read my good friend Krypt3ia’s post on the hack – http://krypt3ia.wordpress.com/2014/12/18/sony-hack-winners-and-losers/
  •  
    Seems that the FBI overlooked a few clues before it told Obama to go ahead and declare war against North Korea. 
6More

Land Destroyer: BREAKING: Germany's DW Reports ISIS Supply Lines Originate in NATO's Tu... - 0 views

  • Germany's international broadcaster Deutsche Welle (DW) published a video report of immense implications - possibly the first national broadcaster in the West to admit that the so-called "Islamic State" (ISIS) is supplied not by "black market oil" or "hostage ransoms" but billions of dollars worth of supplies carried into Syria across NATO member Turkey's borders via hundreds of trucks a day. The report titled, "'IS' supply channels through Turkey," confirms what has been reported by geopolitical analysts since at least as early as 2011 - that NATO member Turkey has allowed a torrent in supplies, fighters, and weapons to cross its borders unopposed to resupply ISIS positions inside of Syria.
  • Local residents and merchants interviewed by Germany's DW admitted that commerce with Syria benefiting them had ended since the conflict began and that the supplies trucks carry as they stream across the border originates from "western Turkey." The DW report does not elaborate on what "western Turkey" means, but it most likely refers to Ankara, various ports used by NATO, and of course NATO's Incirlik Air Base. While DW's report claims no one knows who is arranging the shipments, it does reveal that the very torrent of trucks its film crew documented was officially denied by the Turkish government in Ankara. It is a certainty that Turkey is not only aware of this, but directly complicit, as is NATO who has feigned a desire to defeat ISIS but has failed to expose and uproot ISIS' multinational sponsorship and more importantly, has refused to cut its supply lines - an elementary prerequisite of any military strategy. 
  • SIS supply lines leading from NATO territory should be of no surprise. As reported since as early as 2007, the US and its regional accomplices conspired to use Al Qaeda and other armed extremists in a bid to reorder North Africa and the Middle East. It would be Pulitzer Prize-winning journalist Seymour Hersh in his article, "The Redirection: Is the Administration’s new policy benefiting our enemies in the war on terrorism?" that explicitly stated (emphasis added): To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda. 
  • ...2 more annotations...
  • Of course, these "extremist groups" who "espouse a militant vision of Islam" and are "sympathetic to Al Qaeda," describe the "Islamic State" verbatim. ISIS constitutes NATO's mercenary expeditionary force, ravaging its enemies by proxy from Libya in North Africa to Lebanon and Syria in the Levant, to Iraq and even to the borders of Iran. Its seemingly inexhaustible supply of weapons, cash, and fighters can only be explained by multinational state sponsorship and safe havens provided by NATO ISIS' enemies - primarily Syria, Hezbollah, Iran, and Iraq - cannot strike. DW's report specifically notes how ISIS terrorists regularly flee certain demise in Syria by seeking safe haven in Turkey.  One of NATO's primary goals since as early as 2012, was to use various pretexts to expand such safe havens, or "buffer zones," into Syrian territory itself, protected by NATO military forces from which "rebels" could operate. Had they succeeded, DW camera crews would probably be filming convoys staging in cities like Idlib and Allepo instead of along Turkey's border with Syria. 
  • With the documented conspiracy of the US and its allies to create a sectarian mercenary force aligned to Al Qaeda, the so-called "moderate rebels" the US has openly backed in Syria now fully revealed as sectarian extremists, and now with DW documenting a torrent of supplies originating in Turkey, it is clear that the ISIS menace NATO poses as the solution to, was in fact NATO all along. What is  revealed is a foreign policy so staggeringly insidious, few are able to believe it, even with international broadcasters like DW showing ISIS' supply lines leading from NATO territory itself.  
  •  
    There is a second NATO supply line running from Saudi Arabia, across Iraq into Jordan, and from there to ISIL-Al-Nusrah in southern Syria. Also, Israel is flying combat missions for ISIL and running a resupply/medical services base for them on the Golan Heights. 
7More

The Vineyard of the Saker: The significance of the Russian decision to move the humanit... - 0 views

  • It appears that the Russians got tired of waiting.  I suggest that you all carefully parse the Statement of the Russian Ministry of Foreign Affairs I posted earlier today.  This is an interesting document because besides an explanation of the Russian decision to move it, it is also, potentially, a legal defense or an unprecedented Russian decision: to overtly violate the Ukrainian sovereignty.  Let me explain. First, the case of Crimea was also a "special case".  The Russian were legally present there and, in the Russian rationale, all the "Polite Armed Men in Green" did was to protect the local population to make it possible for the latter to freely express its will.  Only after that will was expressed did Russia agree to formally re-incorporate Crimea into Russia.  So from the legal Russian point of view, none of the Russian actions in Crimea included any form of  violation of Ukrainian sovereignty.  I know, most western analyst will not agree, but that is the official Russian stance.  And official stances are important because they form the basis for a legal argument.
  • Second, the aid which Russia has been sending to Novorussia has been exclusively covert.  Covert operations, no matter their magnitude, do not form the basis for a legal position.  The official position of Moscow has been that not only was there absolutely no military aid to Novorussia, but even when Ukie artillery shells landed inside Russia did the Kremlin authorize any retaliation, again in (official) deference to the Ukrainian national sovereignty. This time, however, there is no doubt at all that the Russians did deliberately and officially chose to ignore Kiev and move in.  Now, in fact, in reality, this is clearly the logically, politically and morally right thing to do.  But in legal terms, this clearly a violation of Ukrainian sovereignty.  From a legal point of view, the Ukies had the right to keep the Russian convoy at the border for another 10'000 years if they wanted and Russia had no legal right to simply move in.  What apparently happened this morning is that the Ukie officials did not even bother showing up, so the Kremlin just said "forget it!" and ordered the trucks in.
  • The US and their main agent in Kiev, Nalivaichenko, immediately and correctly understood the threat: not only did this convoy bring much needed humanitarian aid to Lugansk, it also provided a fantastic political and legal "cover" for future Russian actions inside Novorussia.  And by "actions" I don't necessarily mean military actions, although that is now clearly and officially possible.  I also mean legal actions such as recognizing Novorussia.  From their point of view, Obama, Poroshenko, Nalivaichenko are absolutely correct to be enraged, because I bet you that the timing, context and manner in which Russia moved into Novorussia will not result in further sanctions or political consequences.   Russia has now officially declared the Ukie national sovereignty as "over" and the EU will probably not do anything meaningful about it. That, by itself, is a nightmare for Uncle Sam. Furthermore, I expect the Russian to act with a great deal of restraint.  It would be stupid for them to say "okay, now that we violated the territorial integrity of the Ukraine and ignored its sovereignty we might as well bomb the junta forces and move our troops in".  I am quite confident that they will not do that.  Yet.  For the Russian side, the best thing to do now is to wait.  First, the convoy will really help.  Second, it will become a headache for the Ukies (bombing this convey would not look very good).  Third, this convoy will buy enough time for the situation to become far clearer.  What am I referring to here?
  • ...3 more annotations...
  • Not only did the Russians move in, but they did that without the ICRC whose personnel refused to go because of the lack of security guarantees from Kiev. The Russian response to that lack of security guarantees was a) to order this unarmed convoy in and b) to clearly state in the official statement: We are warning against any attempts to thwart this purely humanitarian mission which took a long time to prepare in conditions of complete transparency and cooperation with the Ukrainian side and the ICRC. Those who are ready to continue sacrificing human lives to their own ambitions and geopolitical designs and who are rudely trampling on the norms and principles of international humanitarian law will assume complete responsibility for the possible consequences of provocations against the humanitarian relief convoy. Again, from a logical, political or moral point of view, this is rather self-obvious, but from a legal point of view this is a threat to use force ("complete responsibility for the possible consequences") inside the putatively sovereign territory of the Ukraine.
  • The Ukie plan has been to present some major "victory" for the Sunday the 24, when they plan a victory parade in Kiev to celebrate independence day (yup, the US-controlled and Nazi-administered "Banderastan" will celebrate its "independence"... this is both sad and hilarious).  Instead, what they have a long streak of *very* nasty defeats during the past 5-6 days or so.  By all accounts, the Ukies are getting butchered and, for the first time, even pushed back (if only on a tactical level).  That convoy in Luganks will add a stinging symbolical "f**k you!" to the junta in Kiev.  It will also exacerbate the tensions between the ruling clique in power, the Right Sector and Dmitri Iarosh and the growing protest movement in western Ukraine. Bottom line: this is a risky move no doubt, probably brought about by the realization that with water running out in Luganks Putin had to act.  Still it is also an absolutely brilliant move which will create a massive headache for the US and its Nazi puppets in Kiev.
  • PS: I heard yesterday evening that Holland has officially announced that it will not release the full info of the flight data and voice recorders of MH17.  Thus Holland has now become an official accomplice to the cover-up of this US false-flag operation and to the murder of the passengers of MH17. This is absolutely outrageous and disgusting I and sure hope that the Malaysian government will not allow this.  As for Kiev, it is also sitting on the recording of the communications between the Kiev ATC and MH17.  Finally, the USA has it all through its own signals intelligence capabilities.  So they all know and they are all covering up.  Under the circumstances, can anybody still seriously doubt "who done it"?
  •  
    Yes, indeed. Do read the Statement of the Russian Ministry of Foreign Affairs (Sergey Lavrov's shop) linked from this article. What Ukraine and the U.S. have been doing to delay humanitarian relief to Lugansk is beyond despicable. And though not dwelled on here, Kerry's State Dept. lodged an outraged demand that the Russian humanitarian aid convoy return to Russia post haste without unloading any of the supplies in Ukraine. Or else. Or else what? The U.S. also exercised its veto power on the U.N. Security Council to block a draft resolution instructing a temporary cease fire for delivery of the relief supplies.  Dumbout. Now Russia has officially violated Ukraine sovereignty under circumstances that are beyond reproach. The U.S. has no moral high ground to cry foul; the Russians have all of it.  I truly enjoy watching Mr. Lavrov play chess brilliantly while John Kerry steadfastly clings to his belief that the game is checkers. Kerry just can't accept that he's hopelessly outclassed by Lavrov.  And that blunt Russian promise to retaliate militarily if Kiev attacks the convoy? That's an announcement that future Russian humanitarian aid convoys into Ukraine will not be delayed or Russia will simply ignore the Kiev government and ride on through the border. Giving credit where it's due, Lavrov undoubtedly coordinated this action with Vladimir Putin. 
6More

Bombs Away Over Syria! Washington Has Gone Stark Raving Mad | David Stockman's Contra C... - 0 views

  • Exactly one year ago Obama proposed to take Bashar Al Assad to the woodshed because he had allegedly unleashed a vicious chemical attack on his own citizens. That was all pretext, of course, because even the CIA refused to sign-off on the flimsy case for Assad’s culpability at the time—-a reluctance corroborated since then by the considerable evidence that hundreds of Syrian civilians were murdered during a false flag operation staged by the rebels with help from Turkey. The aim of the rebels, of course, was to activate American tomahawk missiles and bombers in behalf of “regime change”, which was also the stated goal of the Obama Administration. Now the White House is threatening to bomb Syria again, but this time its “regime change” objective has been expanded to include both sides! In 12 short months what had been the allegedly heroic Sunni opposition to the “brutal rule” of the Assad/Alawite minority has transmuted into the “greatest terrorist threat ever”, according to the Secretary of Defense.
  • Adding to this blinding farce is the warning of Syria’s Foreign Affairs minister that Obama should please to request permission before he rains destruction from the sky on the Opposition—-that is, the opposition to the very same Damascus regime which the White House has vowed to eradicate. Needless to say,  the Washington apparatus is having nothing to do with aiding the enemy of its new enemy:
  • In fact, there is apparently an option emerging from the bowels of the war machine that calls for an odd/even day plan to bomb both sides, thereby making clear that Washington is an equal opportunity spanker. Apparently, whether you use a 12th century sword or 20th century attack helicopter as a means of rule, you will be bombed by the “indispensable nation”, as Obama put it, adding that “no other nation can do what we do”. Well, that involves some “doing”. According to AP, it appears that Syrian airstrikes are imminent, but could be carried out under the odd/even day plan: “In an effort to avoid unintentionally strengthening the Syrian government, the White House could seek to balance strikes against the Islamic State with attacks on Assad regime targets.” Is any more evidence needed that Washington has gone stark raving mad than even the possibility that such an absurd option could  be under consideration? Has not the imperial city on the Potomac become so inured to its pretensions of global hegemony and to instant resort to deployment of its war machine that any semblance of rationality and coherence has been dissolved?
  • ...2 more annotations...
  • So let the region rearrange itself without Washington’s unwelcome meddling and mayhem. If Turkey and an independent Kurdistan can make mutually acceptable political and economic arrangements, which are already well-advanced, so be it. If the Shiite south in Iraq and the  Alawite/Shiite southwest in Syria break-off from their present Europe-bequeathed boundaries and form independent regimes, how does that jeopardize the safety and security of the citizens of Lincoln NE and Spokane WA? And, yes, if the Islamic State temporarily manages to coalesce within the Sunni lands of the Euphrates Valley and the upper Tigress why is that really a national security threat which requires launching an unwinnable war, a new round of hostility to America in the Islamic world and the blowback of legions of jihadi with a score to settle?
  • Why would you believe that a viable state can be built in today’s world on the tactics of Genghis Kahn? The Islamic State, such as it is, is not rich, does not have enough oil to make a difference, will soon be bogged down in the insuperable problems of governance by the sword and will flounder on the impoverished economics of the dusty villages and desert expanse which comprise its natural territory. And it will eventually mobilize its neighbors—-Turkey, Hezbollah, the rump regime of Assad’s Alawite Syria, Kurdistan, the Shiite alliance of Iran and lower Iraq, and even Saudi Arabia and the oil sheikdoms—to contain its external ambitions. So Washington should call off the bombers and get out of harm’s way. The American Imperium has failed and the prospect of bombing both sides of an irrelevant non-country’s ancient tribal wars ought, at last, to make that much clear.
  •  
    David Stockman sees some hilarity in Obama's decision to bomb Syria. 
6More

The Mystery of a Ukrainian Army 'Defector' | Consortiumnews - 0 views

  • Exclusive: U.S. intelligence officials suggest that the person who fired the missile that downed Malaysia Airlines Flight 17 may have been “a defector” from the Ukrainian army, an apparent attempt to explain why some CIA analysts thought satellite images revealed men in Ukrainian army uniforms manning the missile battery, writes Robert Parry. By Robert Parry As the U.S. government seeks to build its case blaming eastern Ukrainian rebels and Russia for the shoot-down of Malaysia Airlines Flight 17, the evidence seems to be getting twisted to fit the preordained conclusion, including a curious explanation for why the troops suspected of firing the fateful missile may have been wearing Ukrainian army uniforms. On Tuesday, mainstream journalists, including for the Los Angeles Times and the Washington Post, were given a briefing about the U.S. intelligence information that supposedly points the finger of blame at the rebels and Russia. While much of this circumstantial case was derived from postings on “social media,” the briefings also addressed the key issue of who fired the Buk anti-aircraft missile that is believed to have downed the airliner killing all 298 people onboard.
  • After last Thursday’s shoot-down, I was told that U.S. intelligence analysts were examining satellite imagery that showed the crew manning the suspected missile battery wearing what looked like Ukrainian army uniforms, but my source said the analysts were still struggling with whether that essentially destroyed the U.S. government’s case blaming the rebels. The Los Angeles Times article on Tuesday’s briefing seemed to address the same information this way: “U.S. intelligence agencies have so far been unable to determine the nationalities or identities of the crew that launched the missile. U.S. officials said it was possible the SA-11 [anti-aircraft missile] was launched by a defector from the Ukrainian military who was trained to use similar missile systems.” That statement about a possible “defector” might explain why some analysts thought they saw soldiers in Ukrainian army uniforms tending to the missile battery in eastern Ukraine. But there is another obvious explanation that the U.S. intelligence community seems unwilling to accept: that the missile may have been launched by someone working for the Ukrainian military.
  • In other words, we may be seeing another case of the U.S. government “fixing the intelligence” around a desired policy outcome, as occurred in the run-up to war with Iraq. The Los Angeles Times also reported: “U.S. officials have not released evidence proving that Russia’s military played a direct role in the downing of the jet or in training separatists to use the SA-11 missile system. But they said Tuesday that the Russian military has been training Ukrainian separatists to operate antiaircraft batteries at a base in southwestern Russia.” Though that last charge also has lacked verifiable proof – and could refer to training on less powerful anti-aircraft weapons like so-called Manpads – the key question is whether the Russian government trained the rebels in handling a sophisticated anti-aircraft system, like the SA-11, and then was reckless enough to supply one or more of those missile batteries to the rebels — knowing that these rockets could reach above 30,000 feet where passenger airlines travel. The Russian government has denied doing anything that dangerous, if not crazy, and the eastern Ukrainian rebels also deny ever possessing such a missile battery. But the question that needs answering is: Are the Russians and the rebels lying?
  • ...2 more annotations...
  • That requires a serious and impartial investigation, but what the Obama administration and most of the mainstream U.S. news media have delivered so far is another example of “information warfare,” assembling a case to make an adversary look bad regardless of the actual evidence — and then marginalizing any dissents to the desired conclusion. That was exactly the “group think” that led the United States into the disastrous invasion of Iraq – and it appears that few if any lesson were learned.
  • [For more on this topic of prejudging who’s to blame for the Malaysia Airlines tragedy, see Consortiumnews.com’s “Kerry’s Latest Reckless Rush to Judgment.”]
  •  
    The Obama Administration's answer to the question of who shot down MH17 seems to be more and more questionable. 
8More

Asia Times Online :: A chessboard drenched in blood - 0 views

  • "The intelligence and facts were being fixed around the policy." Everyone remembers the Downing Street Memo, which unveiled the Bush/Blair "policy" in the run-up to the 2003 bombing/invasion/occupation of Iraq. The "policy" was to get rid of Saddam Hussein via a lightning war. The justification was "terrorism" and (non-existent) weapons of mass destruction (WMD), which had "disappeared", mounted in trucks, deep into Syria. Forget about intelligence and facts. The tragedy of MH17 - turned, incidentally, into a WMD - might be seen as a warped rerun of imperial policy in Iraq. No need for a memo this time. The "policy" of the Empire of Chaos is clear, and <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> multi-pronged; diversify the "pivot to Asia" by establishing a beachhead in Ukraine to sabotage trade between Europe and Russia; expand the North Atlantic Treaty Organization to Ukraine; break the Russia-China strategic partnership; prevent by all means the trade/economic integration of Eurasia, from the Russia-Germany partnership to the New Silk Roads converging from China to the Ruhr; keep Europe under US hegemony.
  • The key reason why Russian President Vladimir Putin did not "invade" Eastern Ukraine - as much as he's been enticed to by Washington/NATO - to stop a US military adviser-facilitated running slaughter of civilians is that he does not want to antagonize the European Union, Russia's top trading partner.
  • The MH17 tragedy may have been a horrendous mistake. But it may also have been a desperate gambit by the Kiev minions of the Empire of Chaos. By now, Russian intel may have already mastered the key facts. Washington's predictable modus operandi was to shoot from the hip, igniting and in theory winning the spin war, and doubling down by releasing the proverbial army of "top officials" brimming with social media evidence. Moscow will take time to build a meticulous case, and only then lay it out in detail.
  • ...4 more annotations...
  • Now compare a fearful Dr Zbig with Immanuel Wallerstein - who was a huge influence in my 2007 warped geopolitical travel book Globalistan. In this piece (in Spanish) Wallerstein argues that the Empire of Chaos simply can't accept its geopolitical decadence - and that's why it has become so dangerous. Restoring its hegemony in the world-system has become the supreme obsession; and that's where the whole "policy" that is an essential background to the MH17 tragedy reveals Ukraine as the definitive do or die battleground. In Europe, everything hinges on Germany. Especially after the National Security Agency scandal and its ramifications, the key debate raging in Berlin is how to position itself geopolitically bypassing the US. And the answer, as pressed by large swathes of German big business, lies in a strategic partnership with Russia
  • The damaged MH17 starboard jet engine suggests a shape charge from an air-to-air missile - and not a Buk; that's consistent with the Russian Ministry of Defense presentation graphically highlighting an Ukrainian SU-25 shadowing MH17. Increasingly, the Buk scenario - hysterically peddled by the Empire of Chaos - is being discarded. Not to mention, again, that not a single eyewitness saw the very graphic, thick missile trace that would have been clearly visible had a Buk been used.
  • As much as Bashar al-Assad in Syria had absolutely no motive to "gas his own people" - as the hysterical narrative went at the time - the Eastern Ukraine federalists have no motive to down a civilian airliner. And as much as Washington doesn't give a damn about the current civilian slaughter in Gaza, it doesn't give a damn about the MH17 civilian deaths; the one and only obsession is to force Europeans to sanction Russia to death. Translation: break up Europe-Russia commercial and geopolitical integration.
  • Moscow, in building its case on the MH17 tragedy, will bide its time to debunk Kiev's claims and maximize its own credibility. The game now moves to the black boxes and the cockpit voice recorder. Still Ukraine will remain the do or die battlefield - a chessboard drenched in blood.
  •  
    Pepe Escobar, with the big picture view of the downing of MH17. I especially appreciated this perspective: "Restoring [U.S.] hegemony in the world-system has become the supreme obsession; and that's where the whole "policy" that is an essential background to the MH17 tragedy reveals Ukraine as the definitive do or die battleground."
3More

Hamas not complicit in teens' kidnap: Israeli police | News , Middle East | THE DAILY STAR - 0 views

  • he Israeli Police Foreign Press Spokesman, Micky Rosenfeld, appears to have falsified the Israeli government’s claim that Hamas was responsible for the killing of three Israeli settler teens in June, by saying responsibility lies with a lone cell that operated without the complicity of Hamas’ leadership. The kidnapping and subsequent killing of three Israeli settler teens last month is considered to be a flashpoint for the escalated violence in Gaza -- that as of day 19 of the conflict has left 926 Palestinians, mostly civilians, dead. At the time Israeli authorities placed the blame squarely on Hamas, with Israeli Prime Minister Benyamin Netanyahu saying "They were kidnapped and murdered in cold blood by animals in human form. Hamas is responsible and Hamas will pay." Friday however, there appeared to be break in the official line when BBC journalist Jon Donnison tweeted a series of statements he attributed to the Israeli Police Foreign Press Spokesman, Micky Rosenfeld.
  • “Israeli police MickeyRosenfeld tells me men who killed 3 Israeli teens def[initely] lone cell, Hamas affiliated but not operating under leadership1/2.” “Seems to contradict the line from Netanyahu government. 2/2” The journalist then goes on to tweet a further statement from Rosenfeld which, given that Israeli authorities used Hamas’ culpability as a pretext for its crackdown of the West Bank that saw hundreds of Palestinians arrested and several killed, could cast serious doubts on the Israeli government’s justifications. “Israeli police spokes Mickey Rosenfeld also said if kidnapping had been ordered by Hamas leadership, they'd have known about it in advance.”
  •  
    There went Israel's excuse for launching war against Hamas in Gaza.
4More

Asia Times Online :: Middle East News, Iraq, Iran current affairs - 0 views

  • And why did Islamic State, formerly ISIS, become winners? Because the "West" regimented, schooled, trained, logistically helped and weaponized most of IS's Takfiri goons with a mission at hand: to destroy Syria. The "West" lauded them as "Syrian rebels". Freedom fighters. Washington even promoted Jabhat al-Nusra (the official al-Qaeda franchise in Syria, and a "terrorist organization", according to the State Department) as "good" jihadis, as well as the preferred Saudi combo, the Islamic Front.
  • The House of Saud, directly and indirectly, and the proverbial wealthy Gulf Cooperation Council donors are the Mom and Dad of ISIS. All duly vetted/approved by the industrial-military-Orwellian-Panopticon complex. And yet "Assad must go" had other ideas for Syria. He didn't go. He and his army resisted and counter-attacked. So the original mission in Syria morphed across the (non-existent) desert border towards Iraq. ISIS kept expanding - via extortion, kidnapping, captured oil fields, tribal smuggling networks.
  • How convenient that IS strategy is totally divide and rule. Totally balkanization of Iraq. Totally mum on Israel's slow-motion ethnic cleansing of Gaza. Totally useful in wagging the (beheading) dog to make the world forget about Gaza. Moroever, IS/ISIS strategy, stripped to the bone, is Pentagon manual; clear, hold and build - then expand (to an area larger than Great Britain). It's even Pentagon manual redux - as in building "coalitions of the willing" (see the alliance with "remnants" - Rummy talk - of the Saddam regime propelling their northern Iraq summer offensive.) How convenient that the mighty Orwellian/Panopticon complex satellite maze could not identify a long convoy of gleaming white Toyotas crossing the desert towards their summer conquests. And how convenient that a Briton beheading an American - what a "special relationship" plot twist! - fully sanctions the Return of Iraq Bombing ("for months", in Obama's words); more strikes; more drones; perhaps more boots on the ground; perhaps, in the near future, a Syria extension. IS also took over Tikrit, the birthplace of Saddam, in their summer adventure. Now Baghdad's military are trying to take it back. IS welcomed them with minefields, booby-trapped buildings, an array of snipers and hardcore mortar fire. How convenient that Obama's "humanitarian" bombs are not involved in R2P ("responsibility to protect") Saddam's birthplace. What really matters is the US consulate in Erbil, scores of CIA operatives and vast Big Oil interests in Iraqi Kurdistan.
  •  
    Pepe Escbar catches a whiff of the same rat Tony Cartalucci caught, but sees it ending badly for the House of Saud. I've said it before, but I'll say it again: Escobar has earned very high credibility with me. 
6More

Provocations as Pretexts for Imperial War: From Pearl Harbor to 9/11 | Global Research - 0 views

  • Wars in an imperialist democracy cannot simply be dictated by executive fiat, they require the consent of highly motivated masses who will make the human and material sacrifices. Imperialist leaders have to create a visible and highly charged emotional sense of injustice and righteousness to secure national cohesion and overcome the natural opposition to early death, destruction and disruption of civilian life and to the brutal regimentation that goes with submission to absolutist rule by the military. The need to invent a cause is especially the case with imperialist countries because their national territory is not under threat. There is no visible occupation army oppressing the mass of the people in their everyday life. The ‘enemy’ does not disrupt everyday normal life – as forced conscription would and does. Under normal peaceful time, who would be willing to sacrifice their constitutional rights and their participation in civil society to subject themselves to martial rule that precludes the exercise of all their civil freedoms?
  • The task of imperial rulers is to fabricate a world in which the enemy to be attacked (an emerging imperial power like Japan) is portrayed as an ‘invader’ or an ‘aggressor’ in the case of revolutionary movements (Korean and Indo-Chinese communists) engaged in a civil war against an imperial client ruler or a ‘terrorist conspiracy’ linked to an anti-imperialist, anti-colonial Islamic movements and secular states. Imperialist-democracies in the past did not need to consult or secure mass support for their expansionist wars; they relied on volunteer armies, mercenaries and colonial subjects led and directed by colonial officers. Only with the confluence of imperialism, electoral politics and total war did the need arise to secure not only consent, but also enthusiasm, to facilitate mass recruitment and obligatory conscription. Since all US imperial wars are fought ‘overseas’ – far from any immediate threats, attacks or invasions – -US imperial rulers have the special task of making the ‘causus bellicus’ immediate, ‘dramatic’ and self-righteously ‘defensive’. To this end US Presidents have created circumstances, fabricated incidents and acted in complicity with their enemies, to incite the bellicose temperament of the masses in favor of war.
  • The pretext for wars are acts of provocation which set in motion a series of counter-moves by the enemy, which are then used to justify an imperial mass military mobilization leading to and legitimizing war. State ‘provocations’ require uniform mass media complicity in the lead-up to open warfare: Namely the portrayal of the imperial country as a victim of its own over-trusting innocence and good intentions. All four major US imperial wars over the past 67 years resorted to a provocation, a pretext, and systematic, high intensity mass media propaganda to mobilize the masses for war. An army of academics, journalists, mass media pundits and experts ‘soften up’ the public in preparation for war through demonological writing and commentary: Each and every aspect of the forthcoming military target is described as totally evil – hence ‘totalitarian’ – in which even the most benign policy is linked to demonic ends of the regime. Since the ‘enemy to be’ lacks any saving graces and worst, since the ‘totalitarian state’ controls everything and everybody, no process of internal reform or change is possible. Hence the defeat of ‘total evil’ can only take place through ‘total war’. The targeted state and people must be destroyed in order to be redeemed. In a word, the imperial democracy must regiment and convert itself into a military juggernaut based on mass complicity with imperial war crimes. The war against ‘totalitarianism’ becomes the vehicle for total state control for an imperial war.
  • ...2 more annotations...
  • In the case of the US-Japanese war, the US-Korean war, the US-Indochinese war and the post-September 11 war against an independent secular nationalist regime (Iraq) and the Islamic Afghan republic, the Executive branch (with the uniform support of the mass media and congress) provoked a hostile response from its target and fabricated a pretext as a basis for mass mobilization for prolonged and bloody wars.
  • Wars in an imperialist democracy cannot simply be dictated by executive fiat, they require the consent of highly motivated masses who will make the human and material sacrifices. Imperialist leaders have to create a visible and highly charged emotional sense of injustice and righteousness to secure national cohesion and overcome the natural opposition to early death, destruction and disruption of civilian life and to the brutal regimentation that goes with submission to absolutist rule by the military. The need to invent a cause is especially the case with imperialist countries because their national territory is not under threat. There is no visible occupation army oppressing the mass of the people in their everyday life. The ‘enemy’ does not disrupt everyday normal life – as forced conscription would and does. Under normal peaceful time, who would be willing to sacrifice their constitutional rights and their participation in civil society to subject themselves to martial rule that precludes the exercise of all their civil freedoms?
  •  
    Lengthy look at provocations and pretexts used to start U.S. foreign wars. 
3More

Farsnews - 0 views

  • Russia's External Intelligence Service (SVR) warned Kremlin that the US is using the Islamic State of Iraq and the Levant (ISIL) terrorist group to create a new front against Russia in the Central Asia. "The SVR has warned Kremlin in a report that the US is seeking to lead the ISIL forces in the Caucasus and the Central Asia to create a new front against Russia in the Central Asia in future to implement their plots and policies in the Middle-East," an informed source, who is close to Kremlin officials and asked to remain unnamed due to the sensitivity of his information, told FNA on Tuesday. "Using Saudi Arabia's facilities, which has shown its capability in transferring terrorists to Syria and Iraq, for recruiting forces in the Central Asia, the US has coaxed the Wahhabi clerics affiliated to Riyadh into attracting fighters from different Central Asian states, including Russia, Kazakhstan, Uzbekistan, Tajikistan and Kyrgyzstan, to prepare them mentally for being sent to Syria and Iraq. Then, they are trained in Kyrgyzstan and transferred to Istanbul and then to Syria and Iraq," the source said.
  • The report warns Russia of the danger of a US-led front run by the ISIL fighters in the Central Asia, stressing that the threat will sooner or later jeopardize the country's security, he concluded. Analysts believe that given the situation in the Middle-East if the ISIL creates a radical Islamic state in the region, then that would become a catalyst for what can become a much more widespread war and chaos involving not only the regional powers but given the interests of other international powers in the region, including Russia, China, the United States, some pretty serious conflicts among these great powers. They say that any success of the ISIL cult would have “a very important indirect effect” on the US and on the rest of the countries in the Eurasian region.
  •  
    Well, duh!
5More

Turkish President's Stunning Outburst: The French Are Behind The Charlie Hebdo Massacre... - 0 views

  • It was less than 48 hours ago when Turkey’s prime minister, Ahmet Davutoglu, joined millions marching in Paris to pay tribute to the 17 people killed by ISIS-supporting extremists. Then, almost the moment he got back, things changed, and as the FT politely paraphrases what transpired, the "country’s president struck a much more confrontational tone." That's one way of putting it. Another is that the former PM and current president, Recep Tayyip Erdogan, of NATO-member Turkey did the unthinkable: accused the west, and French citizens in particular, of staging the Charlie Hebdo murder in order to blame Muslims, even as the mayor of Ankara said "Mossad is definitely behind such incidents . . . it is boosting enmity towards Islam."
  • "The duplicity of the west is obvious,” Recep Tayyip Erdogan said at a press conference on Monday evening. “As Muslims we have never sided with terror or massacres: racism, hate speech, Islamophobia are behind these massacres.” His punchline: "The culprits are clear: French citizens undertook this massacre and Muslims were blamed for it,” he added. The FT is confused: "Although political leaders in Turkey have repeatedly condemned the attacks on the Charlie Hebdo magazine, a Jewish supermarket and a policewoman, a parallel narrative has emerged in the country, with conspiracy theorists blaming the murders on foreign intelligence agencies rather than radical Islamists."
  • The FT is further confused that Turkey is not the only place which has dared to offer conspiratorial theories: Russia is too. In Russia, some pro-Kremlin commentators sought to link the killings to geopolitical machinations by the US.    Komsomolskaya Pravda, one of Russia’s leading tabloids, ran the headline: “Did the Americans stage the terror attack in Paris?” and posted a series of interviews on its website that presented various reasons why Washington might have organised the attack. 
  • ...2 more annotations...
  • Alexander Zhilin, head of the pro-Kremlin Moscow Centre for the Study of Applied Problems, claimed the terror attack was US retribution against President François Hollande for a January 6 radio interview in which Mr Hollande urged the EU to lift sanctions against Russia.  Washington used the attacks as “a quick fix for consolidating” US and EU geopolitical interests in Ukraine, Mr Zhilin claimed.
  • The FT is most stunned that in Russia the events in Charlie Hebdo are being equated to the 9/11 tragedy: “For the last 10 years, so-called Islamist terrorism has been under the control of one of the world’s leading intelligence agencies,” Alexei Martynov, director of the International Institute for New States, a think-tank, told pro-Kremlin internet outlet LifeNews. “I am sure that some American supervisors are responsible for the terror attacks in Paris, or in any case the Islamists who carried them out.” Whatever could have given the Russian this idea...
5More

Latest FBI Claim of Disrupted Terror Plot Deserves Much Scrutiny and Skepticism - The I... - 0 views

  • The Justice Department on Wednesday issued a press release trumpeting its latest success in disrupting a domestic terrorism plot, announcing that “the Joint Terrorism Task Force has arrested a Cincinnati-area man for a plot to attack the U.S. Capitol and kill government officials.” The alleged would-be terrorist is 20-year-old Christopher Cornell (above), who is unemployed, lives at home, spends most of his time playing video games in his bedroom, still addresses his mother as “Mommy” and regards his cat as his best friend; he was described as “a typical student” and “quiet but not overly reserved” by the principal of the local high school he graduated in 2012.
  • The DOJ’s press release predictably generated an avalanche of scary media headlines hailing the FBI. CNN: “FBI says plot to attack U.S. Capitol was ready to go.” MSNBC: “US terror plot foiled by FBI arrest of Ohio man.” Wall St. Journal: “Ohio Man Charged With Plotting ISIS-Inspired Attack on U.S. Capitol.”
  • Just as predictably, political officials instantly exploited the news to justify their powers of domestic surveillance. House Speaker John Boehner claimed yesterday that “the National Security Agency’s snooping powers helped stop a plot to attack the Capitol and that his colleagues need to keep that in mind as they debate whether to renew the law that allows the government to collect bulk information from its citizens.” He warned: “We live in a dangerous country, and we get reminded every week of the dangers that are out there.”  The known facts from this latest case seem to fit well within a now-familiar FBI pattern whereby the agency does not disrupt planned domestic terror attacks but rather creates them, then publicly praises itself for stopping its own plots.
  • ...2 more annotations...
  • First, they target a Muslim: not due to any evidence of intent or capability to engage in terrorism, but rather for the “radical” political views he expresses. In most cases, the Muslim targeted by the FBI is a very young (late teens, early 20s), adrift, unemployed loner who has shown no signs of mastering basic life functions, let alone carrying out a serious terror attack, and has no known involvement with actual terrorist groups. They then find another Muslim who is highly motivated to help disrupt a “terror plot”: either because they’re being paid substantial sums of money by the FBI or because (as appears to be the case here) they are charged with some unrelated crime and are desperate to please the FBI in exchange for leniency (or both). The FBI then gives the informant a detailed attack plan, and sometimes even the money and other instruments to carry it out, and the informant then shares all of that with the target. Typically, the informant also induces, lures, cajoles, and persuades the target to agree to carry out the FBI-designed plot. In some instances where the target refuses to go along, they have their informant offer huge cash inducements to the impoverished target. Once they finally get the target to agree, the FBI swoops in at the last minute, arrests the target, issues a press release praising themselves for disrupting a dangerous attack (which it conceived of, funded, and recruited the operatives for), and the DOJ and federal judges send their target to prison for years or even decades (where they are kept in special GITMO-like units). Subservient U.S. courts uphold the charges by applying such a broad and permissive interpretation of “entrapment” that it could almost never be successfully invoked. As AP noted last night, “defense arguments have repeatedly failed with judges, and the stings have led to many convictions.”
  • There are countless similar cases where the FBI triumphantly disrupts its own plots, causing people to be imprisoned as terrorists who would not and could not have acted on their own. Trevor Aaronson has comprehensively covered what amounts to the FBI’s own domestic terror network, and has reported that “nearly half [of all DOJ terrorism] prosecutions involved the use of informants, many of them incentivized by money (operatives can be paid as much as $100,000 per assignment) or the need to work off criminal or immigration violation.” He documents “49 [terrorism] defendants [who] participated in plots led by an agent provocateur—an FBI operative instigating terrorist action.” In 2012, Petra Bartosiewicz in The Nation reviewed the post-9/11 body of terrorism cases and concluded: Nearly every major post-9/11 terrorism-related prosecution has involved a sting operation, at the center of which is a government informant. In these cases, the informants — who work for money or are seeking leniency on criminal charges of their own — have crossed the line from merely observing potential criminal behavior to encouraging and assisting people to participate in plots that are largely scripted by the FBI itself. Under the FBI’s guiding hand, the informants provide the weapons, suggest the targets and even initiate the inflammatory political rhetoric that later elevates the charges to the level of terrorism.
2More

Mubarak, Nazif to be investigated for allegedly serving as proxy for US torture | Cairo... - 0 views

  • CAIRO: Former President Hosni Mubarak and his former Prime Minister Ahmed Nazif will be investigated for serving as a proxy to torture U.S. prisoners, Youm7 reported Wednesday. Attorney General Hisham Barakat referred the case, filed by lawyer Samir Sabry, to the Supreme State Security prosecution. Sabry noted in his litigation that Egypt was cited in the December Senate CIA report as having tortured detainees in extraordinary rendition under the Mubarak regime. In his 2007 book The Guantanamo Files, British investigative journalist Andy Worthington wrote that a Libyan was rendered in 2003 to Egypt where he was tortured to make “a false confession that two al-Qaeda operatives had been receiving information from Saddam Hussein about the use of chemical and biological weapons, which was subsequently used to justify the invasion of Iraq in March 2003.”
  • In 2009, a former Pakistani Guantanamo detainee detailed his torture in Egypt after the CIA sent him to Cairo. Muhammad Saad Iqbal was arrested in Jakarta in 2002 over supporting an Islamic group, but he was transported days after being arrested to Egypt where he were beaten, shackled, received electroshocks and was sleep-deprived for six months, the New York Times reported in 2009. Iqbal, who was released in 2008, confessed under torture that he had met with Osama bin Laden. Mubarak, who is still jailed, was acquitted of graft, and charges of murdering January 25 Revolution protesters were dropped in November. His appeal over a three-year sentence for embezzling funds was accepted earlier in January. His two sons, Gamal and Alaa, walked free late January pending an embezzlement lawsuit, after serving the maximum remand period of two years.
« First ‹ Previous 181 - 200 of 238 Next › Last »
Showing 20 items per page