Aletho News

ΑΛΗΘΩΣ

Why Did Edward Snowden Go to Hong Kong?

By Dave Lindorff | This Can’t Be Happening | June 11, 2013

A lot of people in the US media are asking why America’s most famous whistleblower, 29-year old Edward Snowden, hied himself off to the city state of Hong Kong, a wholly owned subsidiary of the People’s Republic of China, to seek at least temporary refuge.

Hong Kong has an extradition treaty with the US, they say. And as for China, which controls the international affairs of its Hong Kong Special Administrative Region, while granting it local autonomy to govern its domestic affairs, its leaders “may not want to irritate the US” at a time when the Chinese economy is stumbling.

These people don’t have much understanding of either Hong Kong or of China.

As someone who has spent almost seven years in China and Hong Kong, let me offer my thoughts about why Snowden, obviously a very savvy guy despite his lack of a college education, went where he did.

First of all, forget about Hong Kong’s extradition treaty. When it comes to deciding whether someone will be extradited, particularly for a political crime, as opposed to a simple murder or bank heist, the decision will be made in Beijing, not in a Hong Kong courtroom. Second, Hong Kong has a long history of providing a haven to dissidents — even to dissidents wanted by the Chinese government. Consider, for example, the Chinese labor movement activist Han Dongfang, who was the subject of a massive dragnet after the Tiananmen protests, but who successfully fled to Hong Kong before the handover of the place from Britain to China, and is continuing to monitor Chinese labor strife and protest from his home on Hong Kong’s Lamma Island. Hong Kong also has a public that is very supportive of democratic values — certainly more so than the majority of American citizens. Hong Kong people may not be paying too much attention to Snowden’s situation right now, but if the US were to actively seek to extradite him, I am confident that the place would erupt in support for him, including the local media.

As for China, while the issue that has Snowden on the run — exposing an Orwellian spying program targeting the American people and run by the super-secret National Security Agency — is certainly not one that the Chinese like to discuss in terms of their own locked-down society, you can bet that the folks in the Propaganda Bureau in Beijing, and in the inner circle of the government, are rubbing their hands with glee both at the incredible embarrassment their harboring of Snowden causes the hypocritical US, and at the trove of intelligence information he has, which they may be able ultimately to lure him into disclosing if they treat him well.

Then too, there is the matter of the Confucian concept of gift-giving and mutual obligations. It was, I am sure, no accident that Snowden chose the weekend that President Obama was hosting a summit in California with China’s new president Xi Jinping to disclose his identity as the NSA whistleblower who exposed the national spying program to the Guardian and the Washington Post. In doing that, he gave President Xi an incredible gift — the chance to hold the upper hand in his negotiations with a hugely embarrassed and compromised Obama over issues like Chinese computer hacking of US corporate and government secrets, and theft of intellectual property. For of course it is clear that the NSA is at least as active in hacking Chinese computers and spying on Chinese communications.

Such a gift as that is not easily ignored or forgotten in Chinese culture. President Xi owes Snowden a lot, and I believe he will honor that debt by seeing that Snowden is protected from any threat that might be posed to him by a vindictive or frightened US government.

But Snowden isn’t relying solely on Chinese cultural values to protect himself.

He was also careful to send a powerful message of warning to the US officials in the videoed public interview he gave outing himself. As he told interviewer Glenn Greenwald, “I had access to the full rosters of everyone working at the NSA, the entire intelligence community, and undercover assets all over the world. The locations of every station, we have what their missions are and so forth. If I had just wanted to harm the US? You could shut down the surveillance system in an afternoon.”

That one line at the end had to make the folks in Langley and at NSA headquarters sit up straight or to head to the bar for a stiff one! And indeed he could. And I will guarantee you, Snowden being as smart as he is, that he has already taken that information and dispersed it to a number of trusted people, perhaps including Greenwald, with instructions that they should put it all out on the Web if anything happens to him, such as his being kidnapped or disappeared or terminated. It’s a wonderful insurance policy and one that would not have escaped him. Nor would he have bothered to discover that he had all that information available to him if he hadn’t thought that he might need it.

It would be a relatively easy matter for the high-tech spooks at the NSA to retrace Snowden’s electronic trail to see if he really did download all that super-secret information and really could blow up the entire US spy machine. If they find out that he really has that information, he’s basically untouchable.

The real question is not what they are going to do to Snowden. It’s what we Americans are going to do now that we know how truly insane and totalitarian our government has become.

Will we go back to watching our sports teams and our reality TV programming, and forget about the fact that we no longer have any privacy in our lives, that our elected leaders and our judges are operating on the assumption that if they get out of line the fascist machine at the NSA that works in service of the corporate elite will blackmail or destroy them with its access to all their communications. Or will we rise up and demand an end to this high-tech tyranny in the name of a fraudulent “War” on Terror?

Snowden exiled himself and gave up a great job in Hawaii in the hope that we would rise up when we learned that our democracy has been hijacked.

Let’s hope he’s right.

June 11, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance, Timeless or most popular | , , , , , | 2 Comments

No Canadian NSA connection, but very own data snooping program

RT | June 11, 2013

Canada does not use the US NSA’s top secret surveillance PRISM program, officials revealed. Instead, it has a spying platform of its own that it claims manages to distinguish between domestic and international telephone and internet data collected.

The Communication Security Establishment (CSE) spokesman separated the National Security Agency and the Canadian surveillance program.

“The Communications Security Establishment does not have access to data in PRISM”, Ryan Foreman told Reuters, confirming that the “CSE uses metadata to isolate and identify foreign communications,” as CSEC is prohibited by law from directing its activities at Canadians.

Officials admitted that CSEC “incidentally” intercepts Canadian communications, but removes such data after it is obtained, according to the Globe and Mail.

Secret spying programs have come under scrutiny this week as whistleblower and former technical assistant for the CIA Edward Snowden leaked information about the NSA’s PRISM project, describing it as a massive data mining surveillance program which gave the agency backdoor access to emails, videos, chats, photos and search queries from nine worldwide tech giants, including Google and Facebook.

A secret electronic spying program was approved in 2011 by Canada’s Defense Minister Peter MacKay. It searches through international and domestic telephone records and internet data for suspicious activity, Canada’s newspaper Globe and Mail revealed.

Despite the reports, the government’s metadata surveillance program remains a mystery with little information available publicly. The records obtained from the Access to Information requests by the Globe had many pages blacked out, citing national security.

The program was first passed in a secret decree signed in 2005 by Bill Graham, the defense minister at the time then put on hold in 2008 for more than a year due to privacy concerns. On November 21, 2011, it was once again renewed, along with other top-secret espionage programs. And currently it is headed by the Communications Security Establishment Canada (CSEC), part of the Department of National Defense.

It is still not known how the data is being collected. Mining metadata can reveal who knows who and help the authorities to map out social networks and even terrorist cells.

“Metadata is information associated with a telecommunication … And not a communication,” according to a PowerPoint briefing sent to MacKay in 2011.

The Canadian surveillance program has been authorized by ministerial decrees, bypassing the parliament, and is under the sole oversight of the Office of the CSE Commissioner.

Opposition MPs have questioned MacKay about the surveillance reports, to which he replied that Canada’s surveillance initiative “is specifically prohibited from looking at the information of Canadians” and that “this program is very much directed at activities outside the country, foreign threats, in fact. There is rigorous oversight, there is legislation in place that specifically dictates what can and cannot be examined.”

Canada’s privacy commissioner admitted a lack of clarity on the subject.

“When it comes to the metadata program, we know very little specific information at this point – but we want to find out more”, Scott Hutchinson, of the Office of the Privacy Commissioner of Canada, told the Globe and Mail.

The Canadian program was criticized 2008 by a retired Supreme Court judge Charles Gonthier, who questioned whether CSEC could be passing any data collected to other partner agencies such as Royal Canadian Mounted Police (RCMP) and Canadian Security Intelligence Service (CSIS).

Gonthier’s biggest fear was that the data collection would lead to unlawful surveillance.

June 11, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , , , , | Comments Off on No Canadian NSA connection, but very own data snooping program

Ron Paul Blasts NSA Defenders On Piers Morgan: ‘You’re Justifying Dictatorship!’

Former Republican presidential candidate Ron Paul appeared on CNN tonight to tell Piers Morgan why he objects to the NSA surveillance program. Morgan directly asked Paul if he would have actually ended surveillance programs if he were president. Paul said he would still want intelligence gathering, but it would be done in a more transparent way, maintaining that the current surveillance program are unquestionably unconstitutional. He directly told NSA defenders that they are simply “justifying dictatorship.”

Paul dismissed the use of a FISA court as a significant enough of a check on the executive branch. He said this program is undeniably “destroying the Constitution,”, and posed a question to anyone who defends the widespread surveillance.

“What should the penalty be for the people who destroy the Constitution? They’re always worrying about how they’re going to destroy the American citizens who tell the truth, to let us know what’s going on, but we ask the question: what is the penalty for people who deliberately destroy the Constitution and rationalize and say, ‘Oh, we have to do it for security.’ Well, frankly, you end up losing–you lose your security and you lose your freedoms too.”
He told NSA defenders that the nation is on a “very dangerous course,” and when they try to say there’s nothing wrong with such massive intelligence gathering, “you’re justifying dictatorship!”

Courtesy of CNN: Video

June 11, 2013 Posted by | Civil Liberties, Full Spectrum Dominance, Timeless or most popular, Video | , , , , , | 4 Comments

The NSA Black Hole: 5 Basic Things We Still Don’t Know About the Agency’s Snooping

By Justin Elliott and Theodoric Meyer | ProPublica | June 10, 2013
The headquarters of the National Security Agency at Fort Meade, Maryland

Last week saw revelations that the FBI and the National Security Agency have been collecting Americans’ phone records en masse and that the agencies have access to data from nine tech companies.

But secrecy around the programs has meant even basic questions are still unanswered. Here’s what we still don’t know:

Has the NSA been collecting all Americans’ phone records, and for how long?

It’s not entirely clear.

The Guardian published a court order that directed a Verizon subsidiary to turn over phone metadata — the time and duration of calls, as well as phone numbers and location data — to the NSA “on an ongoing daily basis” for a three-month period. Citing unnamed sources, the Wall Street Journal reported the program also covers AT&T and Sprint and that it covers the majority of Americans. And Director of National Intelligence James Clapper himself acknowledged that the “collection” is “broad in scope.”

How long has the dragnet has existed? At least seven years, and maybe going back to 2001.

Senate Intelligence Committee chair Dianne Feinstein, D-Calif., and vice chair Saxby Chambliss, R-Ga., said last week that the NSA has been collecting the records going back to 2006. That’s the same year that USA Today revealed a similar-sounding mass collection of metadata, which the paper said had been taking place since 2001. The relationship between the program we got a glimpse of in the Verizon order and the one revealed by USA Today in 2006 is still not clear: USA Today described a program not authorized by warrants. The program detailed last week does have court approval.

What surveillance powers does the government believe it has under the Patriot Act?

That’s classified.

The Verizon court order relies on Section 215 of the Patriot Act. That provision allows the FBI to ask the Foreign Intelligence Surveillance Court for a secret order requiring companies, like Verizon, to produce records – “any tangible things” – as part of a “foreign intelligence” or terrorism investigation. As with any law, exactly what the wording means is a matter for courts to decide. But the Foreign Intelligence Surveillance Court’s interpretation of Section 215 is secret.

As Harvard Law Professor Noah Feldman recently wrote, the details of that interpretation matter a lot: “Read narrowly, this language might require that information requested be shown to be important or necessary to the investigation. Read widely, it would include essentially anything even slightly relevant — which is to say, everything.”

In the case of the Verizon order — signed by a judge who sits on the secret court and requiring the company to hand over “all call detail records” — it appears that the court is allowing a broad interpretation of the Patriot Act. But we still don’t know the specifics.

Has the NSA’s massive collection of metadata thwarted any terrorist attacks?

It depends which senator you ask. And evidence that would help settle the matter is, yes, classified.

Sen. Mark Udall, D-Colo., told CNN on Sunday, “It’s unclear to me that we’ve developed any intelligence through the metadata program that’s led to the disruption of plots that we could [not] have developed through other data and other intelligence.”

He said he could not elaborate on his case “without further declassification.”

Sen. Feinstein told ABC that the collection of phone records described in the Verizon order had been “used” in the case of would-be New York subway bomber Najibullah Zazi. Later in the interview, Feinstein said she couldn’t disclose more because the information is classified. (It’s worth noting that there’s also evidence that old-fashioned police work helped solve the Zazi case — and that other reports suggest the Prism program, not the phone records, helped solve the case.)

How much information, and from whom, is the government sweeping up through Prism?

It’s not clear.

Intelligence director Clapper said in his declassified description that the government can’t get information using Prism unless there is an “appropriate, and documented, foreign intelligence purpose for the acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear proliferation) and the foreign target is reasonably believed to be outside the United States.”

One thing we don’t know is how the government determines who is a “foreign target.” The Washington Post reported that NSA analysts use “search terms” to try to achieve “51 percent confidence” in a target’s “foreignness.” How do they do that? Unclear.

We’ve also never seen a court order related to Prism — they are secret — so we don’t know how broad they are. The Post reported that the court orders can be sweeping, and apply for up to a year. Though Google has maintained it has not “received blanket orders of the kind being discussed in the media.”

So, how does Prism work?

In his statement Saturday, Clapper described Prism as a computer system that allows the government to collect “foreign intelligence information from electronic communication service providers under court supervision.”

That much seems clear. But the exact role of the tech companies is still murky.

Relying on a leaked PowerPoint presentation, the Washington Post originally described Prism as an FBI and NSA program to tap “directly into the central servers” of nine tech companies including Google and Facebook. Some of the companies denied giving the government “direct access” to their servers. In a later story, published Saturday, the newspaper cited unnamed intelligence sources saying that the description from the PowerPoint was technically inaccurate.

The Post quotes a classified NSA report saying that Prism allows “collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,” not the company servers themselves. So what does any of that mean? We don’t know.

For more on mass surveillance in America, read our timeline of loosening laws and practices.

June 11, 2013 Posted by | Civil Liberties | , , , , , , , | 2 Comments

NSA Document Leak Proves Conspiracy To Create Big Brother Style World Control System

By Lee Rogers | Blacklisted News | June 10, 2013

The Obama regime which was already in the midst of three high profile scandals now has a fourth one to deal with. Top secret documents were recently leaked to the Washington Post and the London Guardian detailing a vast government surveillance program code named PRISM. According to the leaked documents, the program allows the National Security Agency (NSA) back door access to data from the servers of several leading U.S. based Internet and software companies. The documents list companies such as Google, Facebook, Yahoo, Microsoft, AOL and Apple as some of the participants in the program. There have also been other reports indicating that the NSA is able to access real-time user data from as many as 50 separate American companies. Under the program, the NSA is able to collect information ranging from e-mails, chats, videos, photographs, VoIP calls and more. Most importantly is the fact that PRISM allows the NSA to obtain this data without having to make individual requests from the service providers or without having to obtain a court order. To say that this is a violation of the Fourth Amendment which forbids unreasonable searches and seizures would be a gross understatement. This is actually much more than that. This is a program designed specifically to serve as a Big Brother like control grid and to end privacy as we know it.

In some ways this is not really a new story. This is just confirmation of what many people involved in the alternative research community have known for years. Going as far back as the 1990s there were reports revealing how Microsoft provided the NSA with back door access to their Windows operating system. Google’s cozy relationship with the NSA has also been discussed off and on over the past decade. There have even been other whistleblowers that have come forward previously detailing a number of unconstitutional and unlawful abuses conducted by the agency. This includes revelations of how the NSA was spying on American service members stationed overseas. The only difference with this is that these newly leaked documents provide definitive details on just how wide reaching the NSA’s activities have become.

It is now painfully obvious that James Clapper the Director of National Intelligence when testifying before the Senate this past March blatantly lied when asked by Senator Ron Wyden if the NSA was involved in collecting data from the American people. Clapper flatly denied that the NSA was engaged in these types of domestic surveillance activities. What makes the situation such a joke is that the Obama regime is not focused on the fact that Clapper lied to the Senate which in of itself is unlawful. Instead they have been more focused on determining the source of the leak that exposed these broad abuses of power. This is probably not surprising considering that this is a regime that rewards corruption by promoting people involved in all sorts of questionable activity. The promotion of Susan Rice as Obama’s new National Security Advisor is a perfect example of this considering her involvement in spreading bogus Benghazi related talking points. On the other hand, the Obama regime has severely punished a variety of whistleblowers who have dared to expose any wrong doing.

At least the Obama regime won’t have to spend much time and energy trying to identify the whistleblower as this person who leaked these documents has already come forward publically. At his own request the Guardian revealed his identity as Edward Snowden a 29-year old Information Technology specialist who has been working at the NSA for different contractors including Booz Allen Hamilton and Dell. Snowden had previously worked at an NSA office in Hawaii but boarded a flight to Hong Kong a few weeks ago where he has stayed since turning over these documents to the media. He expects that he will never set foot on U.S. soil again and may possibly seek political asylum in a country like Iceland. The Guardian interviewed Snowden over several days and has recently posted an interview transcript that provides more detail on the abuses he became aware of and why he decided to come forward as a whistleblower. In the interview Snowden confirms that the NSA has the infrastructure that allows them to intercept almost any type of data that you can imagine from phone records, e-mails to credit cards. He also reveals how the U.S. government is engaged in hacking systems everywhere around the world and how the NSA has consistently lied to Congress about their activities. There is little doubt that Snowden is thus far one of the most important whistleblowers to come along in the 21st century and he will likely face retaliation considering the vast reach and capabilities of the U.S. intelligence community.

Many individuals within the Obama regime including Obama himself have claimed that this type of widespread data collection is needed to fight terrorism and is used for national security purposes. Even if we were to assume that the war on terror is real, this claim is ridiculous and absurd on its face. It would be one thing if they were collecting information based upon a specific criteria identified by legitimate human intelligence. Instead they are collecting indiscriminate amounts of information which makes it much more difficult to analyze and target anything that might indicate a potential threat. If the NSA’s goal is really to detect and target terrorism then all they are doing is making their job more difficult by vastly increasing the noise they have to filter through. Either the people running the NSA are incredibly stupid or the goal of this program is to establish the infrastructure necessary to centrally collect data from communications everywhere around the world.

Other evidence to support this notion is the fact that the NSA is building a huge new facility in Utah that is being designed to store an enormous amount of data. A Fox News report indicates that, when completed, the facility will be able to store billions of terabytes worth of information. It is hard to fathom how the NSA would need this much storage space unless it was being used to collect and store any and all communications.

The Obama regime has tried to justify all of this by saying that PRISM helped stop an alleged New York City subway bomb plot back in 2009. This has been proven to be factually incorrect as regular police work and help from the British were larger factors in stopping the plot. This is assuming you even believe the official story of this terror plot to begin with. The government and more specifically the FBI have manufactured so many fake terror plots that it is difficult to determine fact from fiction at this point. So with this said, there is really no proof that PRISM has even helped to stop any so-called terror plot. They are collecting information simply for the sake of collecting information with no probable cause or reasonable justification.

At this point it is an undeniable fact that the NSA has been illegally collecting information on the American people. For years what has been dismissed as conspiracy theory is now without question a conspiracy fact. It is laughable that Obama and his assorted cronies are even trying to defend this program as a useful tool to fight terrorists. It is more likely that this program is being used to help find people domestically who dislike the government and would potentially fight back against it. A striking similarity to what is depicted in George Orwell’s dystopic novel 1984 where political dissidents are identified as thought criminals. A tool the NSA uses called Boundless Informant which counts and categorizes the information they collect shows that more data is actually gathered from domestic sources in the U.S. than from Russia. So based on this one could argue that the NSA almost seems to view the American people as more of a threat to national security than the Russians.

The three scandals the Obama regime was dealing with prior to this new scandal are all grounds for impeachment and one could easily argue that this one is many times worse than the previous three. Obama should resign in disgrace but being that he’s a narcissist who seems unwilling to admit making any mistakes it is highly doubtful he will do this. Obama and the rest of the useful idiots in his regime who have tried to defend and justify this and other criminal programs need to be … removed from office and put on trial. The criminal activity from the Obama regime is so vastly transparent it has become a complete and total joke to anyone who is even remotely paying attention.

June 11, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Progressive Hypocrite | , , , , , , , , , | Comments Off on NSA Document Leak Proves Conspiracy To Create Big Brother Style World Control System

Israeli “Anti-Terror Bill” to Legalize Administrative Detention

dtnz

File – moheet.com
IMEMC & Agencies | June 11, 2013

The Israeli Government passed Sunday [June 9, 2013] the “Anti-Terror Bill”, authorizing harsher punishment against individuals suspected or convicted of aiding armed groups in the country, and anywhere in the world.

Several human rights groups in Israel and around the world voiced serious concerns regarding direct human rights violations, especially since this law strengthens and “legalizes” Administrative Detention orders confining hundreds, and even thousands, behind bars for extended periods without charges or trial.

The bill passed during a vote at the Israeli Ministerial Committee for Legislation, headed by Israeli Justice Minister, Tzipi Livni.

It not only targets those “convicted of terror attacks”, but also those who express support, emphasize and “incite terror activities” in addition to those believed to be engaged in preparations to carrying out violent acts.

Part of the penalties that this bill proposed include sentencing individuals for a life term without the possibility of parole, and allows the Police, the Security Services and all related agencies to confine “suspects” up to 30 days without granting them the right to any legal representation.

The passed bill also allows Israel to seize property of armed groups and individuals, in addition to preventing them from traveling abroad when there are no arrest warrants against them.

Israeli daily Haaretz has reported that the new legislation, would replace the “national state of emergency regulations” that Israel enforced after its establishment in the historic land of Palestine in 1948. Those regulations affect civil, security and economic issues.

The law particularly targets Palestinians and the indigenous Arab population in Israel, as those facing charges of “security or criminal violations”, whether in civil or military courts, would be facing very harsh sentences.

Head of the Meretz opposition party, Zahava Gal-On, said that Israel is denying human rights under the guise of combating terror.

She said that the emergency law applied in the country since the British occupation of Palestine, “cannot just be replaced with legislation that is anti-democratic”.

Also, the Association for Civil Rights in Israel (ACRI) slammed the bill, described it as anti-democratic, and warned that its provisions could turn legal organizations and law-abiding persons into terrorists just because they are suspected of aiding or practicing terror.

The Arabs48 news website reported that, under the new law, persons who even express support for groups labeled by Israel as “hostile” or “terrorist” could be imprisoned up to three years. It also considers financial support to these organizations as an “act of terror”.

Arabs48 added that the new bill increases the years of life-terms from 30 to 40 years.

It stated that the Israeli Prosecutors Office said that Price Tag attacks have not been labeled as acts of terror, as the Office believes that boosting intelligence activity and adequate training to police officers dealing with those attacks could put an end to those attacks.

The Israeli Government Legal Advisor stated that, legally, there is nothing stopping the government from describing and declaring Price Tag attacks as acts of terror.

In an Editorial Published on June 9, Haaretz said that the core of this bill has serious and extremely wide definitions for a terrorist organization, or terrorist acts, and added that once an organization, including a charity group, is labeled as a terrorist group, the moral base and all legal measures are destroyed.

June 11, 2013 Posted by | Civil Liberties, Ethnic Cleansing, Racism, Zionism, Full Spectrum Dominance, Timeless or most popular | , , , , , | Comments Off on Israeli “Anti-Terror Bill” to Legalize Administrative Detention

Venezuela arrests Colombian paramilitaries plotting instability

Xinhua | June 10, 2013

CARACAS — Venezuelan authorities have detained two groups of Colombian paramilitary members allegedly plotting against Venezuela’s government, Venezuela’s Minister of the Interior, Justice and Peace Miguel Rodriguez Torres said Monday.

“These two groups that were captured in our territory belong to two well-known Colombian paramilitary gangs. In fact, one of the groups belongs to ‘El Chepe Barrera’s’ gang, one of the most wanted criminals in Colombia,” Rodriguez said at a press conference in Caracas.

The first group, which included six people, was captured in Venezuela’s southwest Tachira state, along the border with Colombia, and their arms were confiscated.

The second three-member group of paramilitaries, who also carried arms, were captured in Guanare in western Portugesa state.

They were also carrying a black box, such as the ones used to record flight information and aeronautical data, and a box with aviation tools, “which are being analyzed by experts to determine what type of airplane we’re talking about,” said Rodriguez.

After questioning, it became clear both groups were linked and headed to Caracas, Rodriguez said.

“They planned to travel to the capital of the country to accomplish a mission that would be assigned them once they were in Caracas,” said Rodriguez.

Rodriguez said the detained revealed the existence of a third armed group, “with weapons for sharpshooters” and other long-range arms, which may already be in Caracas as part of a plot to destabilize the country.

“All of this may be part of a plan that is being orchestrated from Colombia against the life of our president (Nicolas Maduro) and against the stability of the Bolivarian government,” Rodriguez said.

Venezuelan opposition groups may be involved in the plots, said the minister, adding the country’s intelligence units are on alert to capture the third paramilitary group.

Following the announcement, Maduro congratulated the Bolivarian Intelligence Service (Sebin) via Twitter and blamed the opposition for the presence in Venezuela of the paramilitary groups.

“I congratulate Sebin for its work in defense of the peace; these violent groups are the armed wing that carries out the plan of the fascist right,” said Maduro, adding that neighboring Colombia is being used to conspire against Venezuela.

June 11, 2013 Posted by | False Flag Terrorism, War Crimes | , , , | Comments Off on Venezuela arrests Colombian paramilitaries plotting instability

US agents in massive sex, drug cover-up

Press TV – June 11, 2013

The US State Department may have hushed up allegations of misconduct by its employees worldwide that range from soliciting prostitutes to getting narcotics from a drug ring, a report says.

The CBS News uncovered on Monday a memo that showed the department’s security force, the Diplomatic Security Service (DSS), tried to cover up sex and drugs charges against agents and diplomats working for the State Department.

The DSS is responsible for protecting nearly 70,000 employees at the State Department and 275 US embassies around the world.

The memo by the State Department inspector general made direct reference to eight specific cases in which inquiries into alleged criminal activities by diplomatic security agents or contractors were “influenced, manipulated, or simply called off” by more senior officials.

The cases included an unnamed US ambassador who repeatedly solicited prostitutes, a security official “engaged in sexual assaults” on foreign nationals hired as embassy guards in Beirut, and the members of former Secretary of State Hillary Clinton’s security team who “engaged prostitutes while on official trips in foreign countries.”

The ambassador involved in the case was called to Washington D. C. to have a meeting with Undersecretary of State for Management Patrick Kennedy about the issue but was permitted to go back to his regular duties, the report said.

The document also revealed details of an alleged “underground drug ring” close to the US embassy in the Iraqi capital Baghdad, which provided the DSS staffers with drugs.

State Department spokeswoman Jen Psaki on Monday did not deny any of the allegations in the CBS report, but refused to go into details.

“We take allegations of misconduct seriously and we investigate thoroughly. All cases mentioned in the CBS report were thoroughly investigated or are under investigation,” she said.

June 11, 2013 Posted by | Corruption | , , , | Comments Off on US agents in massive sex, drug cover-up