Aletho News

ΑΛΗΘΩΣ

US evokes ghost of Hitler as PR campaign against Assad goes crazy

By Robert Bridge | RT | September 03, 2013 

The shock and awe that has greeted President Obama’s decision to get congressional consent to wage war in Syria underscores the problem with US foreign policy, not to mention our mainstream media machine.

Americans somehow think it is standard operating procedure for the Commander-in-Chief to bypass a quaint little place called Congress (Population 535) along the road to war. Perhaps this way of thinking is due to the general atmosphere of fear and loathing now gripping the crotch of the Heartland like a TSA officer. Or maybe it’s just that we’ve been conditioned to believe the president has the right to enjoy dictatorial powers. Whatever the case, the situation demands some consideration.

Up until Friday, it looked all but certain that Barack Obama, America’s Nobel-nominated president, would order yet another military strike on a foreign country without congressional approval (Libya was the first). The Democratic leader’s designs for a “limited” strike on Syria, however, were quickly dashed when British Prime Minister David Cameron suffered a historic defeat, as the House of Commons denied him permission to jump on the military bandwagon heading for Syria.

This was the first time since 1782 that the British parliament refused a government request to enter a war. Could it be that British intelligence knew something the Americans did not, like perhaps the truth? After all, Cameron himself admitted that the UK intelligence was not 100 percent certain that the Assad government was responsible for the chemical attack.

Whatever the case, with Washington’s foremost ally suddenly missing in action, Obama had nothing but respect for the US Constitution, which clearly states, Article 1, Section 8, “Congress shall have power…to declare war.”

Thanks to the broadside delivered to Washington by the bumpy car of the British parliament, the American people got a fleeting, jolting reminder of their candidate on the early campaign trail, those bygone days of yesteryear when hope hung like dew on the American prairie and the sweet aroma of change dispelled the noxious vapors of George W. Bush’s fighter jets.

I’ve long believed that our power is rooted not just in our military might, but in our example as a government of the people, by the people, and for the people. And that’s why I’ve made a second decision: I will seek authorization for the use of force from the American people’s representatives in Congress,” Obama said Saturday from the Rose Garden.

After the initial shock of those incredible words was fully digested, and the dogs of war were yanked snarling and slobbering back in the house, the PR campaign against the Syrian regime went haywire. The US mainstream media was clearly knocked off its stride, set as it was for an imminent war.

Consider this opening paragraph in Monday’s issue of The Wall Street Journal.

President Obama’s Syrian melodrama went from bad to worse on Saturday with his surprise decision to seek Congressional approval for what he promises will be merely a limited cruise-missile bombing. Mr. Obama will now have someone else to blame if Congress blocks his mission, but in the bargain he has put at risk his credibility and America’s standing in the world with more than 40 months left in office.”

America’s leading business paper somehow believes that seeking congressional approval for war will “risk his credibility and America’s standing in the world.” Indeed, considering America’s basement rankings in the world, seeking such approval as mandated by international law could only have the opposite effect.

And what is one to make of Obama’s (money-back?) guarantee of a “narrow and limited” cruise missile attack on Syria; a Lawrence-esque back-before-dinner jaunt that won’t leave the same kind of trillion-dollar aftertaste that the eight-year Iraq War did? After all, it will only take the firing of a single Syrian missile at a US naval vessel for Obama’s weekend fling to transmogrify into World War III.

The editorial then entered hand-wringing, hysteria mode, trembling at the thought that a single square-mile of real estate in a corner of the empire has not been stamped with the imprint of a US Army boot.

A defeat in Congress would signal to Bashar Assad and the world’s other thugs that the US has retired as the enforcer of any kind of world order… Unlike the British in 1956, the US can’t retreat from east of Suez without grave consequences. The US replaced the British, but there is no one to replace America.”

With some 900 US military bases now straddling a disproportionate amount of the globe, it will take a lot more Congress voting to take a pass on a military scuffle in a Syrian civil war for the US war machine to suddenly go wobbly. Yes, the Obama administration will have to swallow a big slab of humble pie if Congress doesn’t vote in favor of war, but the long-term consequences in the event of such a decision on American power should not be exaggerated.

But exaggerating the consequences is exactly what America does best. Just one day after Obama had his faith miraculously restored in the battered US Constitution, Secretary of State John Kerry announced that a little birdie informed him that sarin nerve gas was used in the Damascus attack. This revelation allowed Kerry to pull out the most-effective ploy in the PR bag of tricks: the noxious Nazi analogy.

“Bashar al-Assad now joins the list of Adolf Hitler and Saddam Hussein who have used these weapons in time of war,” Kerry told NBC’s Face the Nation. Kerry called the attack an “affront against the decency and sensibilities of the world.”

“In the last 24 hours, we have learned through samples that were provided to the United States that have now been tested from first responders in east Damascus, and hair samples and blood samples have tested positive for signatures of sarin,” he continued.

So now, when US Congressmen return from their summer break on September 9, you can guarantee their email boxes will be littered with messages from special interest groups imploring them to support military action against the “world’s next Hitler.”

“This is squarely now in the hands of Congress,” Kerry told CNN, saying he had confidence “they will do what is right because they understand the stakes.”

Meanwhile, the calm voice of reason against a senseless war in Syria has been thrown under the bus.

Ron Paul was branded a “conspiracy theorist” by Salon for suggesting that the Syrian chemical attack was a false flag operation designed to get America into another Middle East war.

Paul pointed to the false intelligence that led to the Iraq War to back up his statement.

“[Syrian President Bashar] Assad, I don’t think is an idiot. I don’t think he would do this on purpose,” Paul told Fox News host Neil Cavuto on the allegation that Assad used chemical weapons on civilians.

Just look at how many lies were told us about Saddam Hussein prior to that (Iraq War) build up. More propaganda. It happens all the time,” Paul said. “I think it’s a false flag.”Full article

September 3, 2013 Posted by | Deception, Mainstream Media, Warmongering, Timeless or most popular | , , , , , , , , | Leave a comment

Open-sea US Navy testing will kill hundreds of dolphins and whales

RT | August 31, 2013

The US Navy admits its underwater training and experiments will result in the deaths of hundreds of dolphins and whales over the next five years – but insists that its testing program is essential.

Computer models showed that the Navy will likely kill 186 whales and dolphins off the East Coast and 155 near the coast of Hawaii and Southern California – its main operation areas – between 2014 and 2019.

Results also showed that marine mammals on both coasts would likely suffer more than 13 thousand serious injuries and nearly 4 million minor ones.

Most of these will be the result of underwater explosions, though some injuries will be the result of physical contact with ships, or sonar testing. Larger species are particularly vulnerable to Navy activities.

The Navy is obliged to annually commission these studies – which take existing data about the impact of military activities on marine wildlife, and project it into the future – due to federal environmental regulations. If it injured animals without having done the impact study, it would risk seeing its off-shore activities suspended altogether, as it would be a violation of federal environmental law.

Rear Adm. Kevin Slates, the energy and environmental readiness division director for the Navy, defended the planned operations, regardless of the figures.

“Without this realistic testing and training, our sailors can’t develop or maintain the critical skills they need or ensure the new technologies can be operated effectively,” he told the media earlier this week.

The influential non-profit National Resources Defense Council (NRDC) has said that the studies show that the Navy’s open-sea program is “simply not sustainable”.

Michael Jasny, senior policy analyst at NRDC, says that the real impact is greater still than what the Navy has projected.

The Navy studies show that there will be almost 28 million “minor instances” of behavior change that will occur as a result of the testing. But Jasny believes that these temporary disturbances – such as a dolphin that is not able to use a feeding ground, or a whale that is scared and starts panicking – can also prove to be fatal.

“These smaller disruptions short of death are themselves accumulating into something like death for species and death for populations,” Jasny said.

August 31, 2013 Posted by | Militarism, Timeless or most popular | , , , , , | Leave a comment

Putin: US should present Syria evidence to Security Council

RT | August 31, 2013

Russian President Vladimir Putin has declared ‘utter nonsense’ the idea that the Syrian government has used chemical weapons on its own people and called on the US to present its supposed evidence to the UN Security Council.

Putin has further called the Western tactic a ‘provocation.’

Washington has been basing its proposed strategy of an attack on Syria on the premise that President Bashar Assad’s government forces have used chemical agents, while Russia finds the accusations unacceptable and the idea of performing a military strike on the country even more so. Especially as it would constitute a violation of international law, if carried out without the approval of the UN Security Council.

Further to this, Putin told Obama that he should consider what the potential fallout from a military strike would be and to take into consideration the suffering of innocent civilians.

The Russian president has expressed certainty that the strategy for a military intervention in Syria is a contingency measure from outside and a direct response to the Syrian government’s recent combat successes, coupled with the rebels’ retreat from long-held positions.

“Syrian government forces are advancing, while the so-called rebels are in a tight situation, as they are not nearly as equipped as the government,” Putin told ITAR-TASS. He then laid it out in plain language:

“What those who sponsor the so-called rebels need to achieve is simple – they need to help them in their fight… and if this happens, it would be a tragic development,” Putin said.

Russia believes that any attack would, firstly, increase the already existing tensions in the country, and derail any effort at ending the war.

“Any unilateral use of force without the authorisation of the U.N. Security Council, no matter how ‘limited’ it is, will be a clear violation of international law, will undermine prospects for a political and diplomatic resolution of the conflict in Syria and will lead to a new round of confrontation and new casualties,” said the Russian Foreign Ministry’s spokesman, Aleksandr Lukashevich, adding that the threats [have been] issued by Washington “in the absence of any proof” of chemical weapons use.

On Friday, Washington said a plan for a limited military response was in the works to punish Assad for a “brutal and flagrant” chemical attack that allegedly killed more than 1,400 people in the capital Damascus 10 days ago.

The Syrian government has been denying all allegations, calling the accusation preposterous and pointing its own accusations against rebel forces, especially Al-Qaeda-linked extremists who have wreaked havoc on the country in the two years since the start of the civil war.

August 31, 2013 Posted by | Deception, False Flag Terrorism, Militarism | , , , , | Leave a comment

DOJ wants Bush, senior cabinet members exempt from Iraq War trial

RT | August 22, 2013

The United States Department of Justice has requested that former President George W. Bush and the highest figures in his administration receive full exemption from being tried for the Iraq War, which the DoJ says was in line with international law.

Apart from Bush, the names listed in the paper the DoJ filed on Tuesday are former Vice President Richard Cheney, former Secretary of Defense Donald Rumsfeld, retired four-star General Colin Powell, former Secretary of State, Condoleezza Rice and former Deputy Secretary of Defense and President of the World Bank, Paul Wolfowitz.

Sundus Saleh, an Iraqi single mother of three who became a refugee, filed a complaint in March in the San Francisco federal court, claiming that the war in her country can be judged as a ‘crime of aggression’, according to the same legal standards that the Nuremberg Tribunal used for convicting Nazi war criminals of World War II.

Saleh is the lead plaintiff in this class action lawsuit.

The reason for the decision is connected with the ‘Westfall Act’ certification. The 1988 law gives the Attorney General the power to personally decide whether the United States is actually a defendant in the case. This in turn allows the granting of absolute immunity to politicians for actions carried out while in the government’s employ.

Inder Comar of Comar Law has agreed to take the case. The San-Francisco-based firm normally specializes in support to private companies, particularly those in the tech industry. Comar met with Saleh at her home in Jordan to discuss the case.

Chief counsel Comar wrote on the War Is a Crime website explaining that, “The DoJ claims that in planning and waging the Iraq War, ex-President Bush and key members of his Administration were acting within the legitimate scope of their employment and are thus immune from suit.”

The lawsuit filed by Saleh says that Cheney, Rumsfeld and Wolfowitz orchestrated the Iraq War in 1998 as part of their involvement with the ‘Project for the New American Century’, a Washington DC-based non-profit organization that pushed for the overthrow of Iraq’s former leader, Saddam Hussein.

Salleh then alleges that the tragedy of September 11, 2001, was pitched to other members of the Bush cabinet as the perfect excuse to scare the American public into supporting the war in Iraq. The lawsuit also claims that the United States failed to obtain United Nations approval for the invasion, making it an illegal and aggressive act of war.

According to Corey Hill, who is a member and outreach coordinator for Global Exchange, an international human rights organization, Comar Law is invoking something called the Alien Tort Statute, which is a 1789 law that permits a foreign national to sue the US federal court for injuries “committed in violation of the law of nations or a treaty of the United States.” Hill explained this in his article for YES! Magazine, for which he also writes.

All the defendants in the case have been summoned to appear in accordance with the usual legal proceedings. The trial is expected to start in early 2014.

There are, however, several problems that could arise with the allegations. As Paul Stephen, who teaches law at the University of Virginia and is former international law consultant for the Department of State told YES! Magazine, that it would be difficult to sue a government employee for acting “under the scope of employment” in this case, because of the modified nature of the Westfall Act, giving officials more scope for action.

The second problem may arise from the fact that their actions did not take place on US soil, making it difficult to validate the accusation.

And lastly, “courts aren’t open to ruling on matters of a political nature”, Hill said in reference to a doctrine in US Constitutional Law that separates clear-cut court cases with those better left to the legislative and executive branches of the government. This doctrine then means that the invasion of Iraq is a political case – not a legal one.

“If the expectation is that a federal court will declare that the invasion, although duly authorized by Congress, violated international law and thus violates U.S. law, I would respond that we walked up and down that hill with respect to Vietnam… No federal court ever has recognized such a claim,” Hill explained.

But Comar is optimistic in so far that in order for the Westfall Act to work in this case, the US government would have to prove that the act of preparing the invasion through a non-profit organization took place within office. But since that was not the case, the law cannot be invoked here. He further explained to Hill that separating a political matter from a purely legal one will also not be easy for the US government, as it may often be a very blurry line.  Comar expanded on this position to the ‘War Is a Crime’ website.

“The good news is that while we were disappointed with the certification, we were prepared for it,” he said. “We do not see how a Westfall Act certification is appropriate given that Ms. Saleh alleges that the conduct at issue began prior to these defendants even entering into office. I think the Nuremberg prosecutors, particularly American Chief Prosecutor Robert Jackson, would be surprised to learn that planning a war of aggression at a private non-profit, misleading a fearful public, and foregoing proper legal authorization somehow constitute lawful employment duties for the American president and his or her cabinet.”

August 22, 2013 Posted by | Militarism, Timeless or most popular, War Crimes | , , , , | Leave a comment

NSA has ability to read 75% of all US internet traffic – report

RT | August 21, 2013

Newly unveiled National Security Agency programs detail how the US government has the ability to monitor approximately 75 per cent of American internet traffic, and further discloses how telecommunications companies are compelled to provide such data.

The programs – known as Blarney, Fairview, Oakstar, Lithium, and Stormbrew – are able to monitor the writing of emails, not just a message’s metadata, according to The Wall Street Journal. The programs also affect digital phone calls placed inside the US.

Among other capabilities, the systems can “reach roughly 75 per cent of all US internet traffic, including a wide array of communications by foreigners and Americans.”

The NSA commands internet service providers (ISPs) to send “various stream internet traffic it believes most likely to contain foreign intelligence,” then copies that data and searches through it.

NSA officials have claimed in recent weeks that the intelligence agency “touches” a mere 1.6 percent of internet traffic, although TechCrunch speculated that rhetoric refers to information that has been sent to the NSA and “culled to their liking.”

Perhaps the most disturbing news is that the NSA worked in conjunction with the FBI to monitor all email and text messages for the six month period surrounding the 2002 Olympic Games in Salt Lake City, Utah.

One NSA official, who wished to remain anonymous, told The Wall Street Journal that the NSA is “not wallowing willy-nilly” through Americans’ communications. “We want high-grade ore.”

The WSJ report is based on interviews with current and former government officials familiar with the NSA’s tactics. They claim the filtering was designed to identify communications that either begin or end outside the US, although the “broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected,” not foreign ones.

NSA spokeswoman Vanee Vines said that oversight is in place in the event that domestic communication is inadvertently recorded, including “minimization procedures that are approved by the US attorney general and designed to protect the privacy of United States persons.”

While lawmakers have asserted that NSA surveillance is necessary to protect national security, Blarney is known to have been in use since before the September 11, 2001 terrorist attacks. The program was operating near important fiber-optic landing points, including one in San Francisco, California and another in New Jersey, with the intention of intercepting foreign communications entering and exiting the US.

Such laws are permitted under Section 702 of the Foreign Intelligence Surveillance Act (FISA), which was expanded in 2008. Section 702 grants the NSA and the FBI the ability to monitor people who are “reasonably believed” to be located outside the US. Before FISA was expanded, it allowed the government to track targets if there was “probable cause” that they were an “agent of a foreign power.”

The PRISM surveillance program is also permitted under Section 702. One of the first Edward Snowden leaks to be published, an internal NSA document described PRISM’s method of collecting stored internet communications as “the number one source of raw intelligence used for NSA analytic reports.”

Multiple telecommunications companies have denied that PRISM requests administered by the government require bulk data turnovers – an indication that they are more precise than the internet filtration systems under Barney and other newly disclosed programs.

August 21, 2013 Posted by | Civil Liberties, Deception, Full Spectrum Dominance, Timeless or most popular | , , , , , , , , , | Leave a comment

Cellphone tracking cases highlight privacy concerns in digital age

Rt | August 20, 2013

In recent weeks, two cert petitions were filed seeking review of whether the Fourth Amendment covers police searches of cellphone records upon arrest.

From mobile phone and GPS tracking to license plate reading and domestic surveillance drones — not to mention recent revelations of widespread abuse of surveillance capabilities by the National Security Agency — these cases and many others highlight major questions that remain unanswered regarding how privacy rights of Americans can co-exist with the use of rapidly evolving technologies.

State and federal law enforcement agencies have wasted no time seizing on gaps and omissions in established legal precedent to justify vast, routine surveillance of the American public which tests Fourth Amendment rights.

On July 30, a petition was filed in Riley v. California challenging a previous ruling in a California appellate court that affirmed the petitioner’s convictions, which stemmed in part from a questionable search of his smartphone in 2009 following a traffic stop for expired license plates. And late last week, the US Department of Justice filed a petition in United States v. Wurie asking for review of a First Circuit Court of Appeals ruling that police needed a warrant to access a suspect’s phone records. Regarding Wurie, the government contends a cell phone is no different from any other item on a suspect at the time of arrest. The search pertaining to Wurie occurred in 2007.

On the surface, the two cases have much in common. But in Riley, the phone in question is a smartphone – a Samsung Instinct M800. In Wurie, the cellphone was a Verizon LG flip-phone incapable of maintaining the breadth of information – including internet searches, email, photos and other media – that a smartphone can store.

As of May, Pew Research Center found that 91 percent of Americans own cellphones, and 61 percent of those cellphones are smartphones.

GPS technology has received more scrutiny from courts than cellphones have in recent years. Last week, the Justice Department appeared before a federal court defending its right to shield legal memos that provide guidance to federal prosecutors and investigators for how to use GPS devices and other surveillance technologies from the public. In a sense, the memos were released upon a Freedom of Information Act request by the American Civil LIberties Union (ACLU), though their contents were heavily redacted.

The memos (read here and here) were legal interpretations of a January 2012 Supreme Court ruling in United States v. Jones in which the court ruled the use of GPS technology to track a car’s movements constitutes a “search” within the parameters of the Fourth Amendment. Upon release of the indecipherable legal memos, the ACLU filed a lawsuit seeking the full, uncensored guidelines.

“While we agree that executive branch lawyers should be able to freely discuss legal theories, once those opinions become official government policy the public has an absolute right to know what they are,” wrote Brian Hauss, legal fellow with the ACLU’s Speech, Privacy and Technology Project. “Otherwise, the government is operating under secret law that makes accountability to the people impossible.

The ruling in United States v. Jones left many unanswered questions regarding the use of other location-monitoring technologies pertaining to, for example, the tracking of cellphones or the use of license-plate readers – not to mention the use of surveillance drones in the US. In addition, the Jones ruling fell short of even determining whether a warrant is necessary to use GPS devices.

Building on the Jones decision, New Jersey recently became a state ahead of the curve in defining rules for law enforcement and privacy rights in the digital age. The New Jersey Supreme Court ruled in July that state police must have a search warrant before obtaining tracking information from cellphone providers.

“Using a cellphone to determine the location of its owner can be far more revealing than acquiring toll billing, bank, or internet subscriber records,” Chief Justice Stuart Rabner wrote in the case’s opinion. “Details about the location of a cellphone can provide an intimate picture of one’s daily life and reveal not just where people go – which doctors, religious services and stores they visit – but also the people and groups they choose to affiliate with. That information cuts across a broad range of personal ties with family, friends, political groups, health care providers and others.”

In June, Montana became the first state to require police to obtain a warrant before tracking a suspect’s cellphone.

In March 2012, the ACLU reviewed records from over 200 local police departments, finding vast, aggressive use of cellphone tracking for emergency and nonemergency uses.

Another ACLU report, released in July of this year, queried around 600 local and state police departments (and other state and federal agencies) via public records requests to assess how these agencies use automatic license plate readers. The civil liberties organization found massive databases of innocent motorists’ location information gleaned through hundreds of millions of “plate reads” by the ubiquitous readers. Data is often stored for an indefinite period of time, revealing just how easy it is for law enforcement – as well as many private companies – to track any license plate with few legal restrictions in place to stop them.

For example, for every one million plates that were read in the state of Maryland in the first half of 2012, 2000 (0.2 percent) were hits, mostly regarding registration or emissions issues. Of those 2000 hits, less than 3 percent (47) were potentially connected to more serious crimes.

In addition, much of this network of readers throughout the nation is in place thanks to a large amount of federal funding – $50 million in the last five years.

Approval of licenses for domestic drones has begun, as RT has reported, even though solid rules for their eventual use in American skies have yet to materialize from either Congress or the Federal Aviation Administration. The FAA expects as many as 30,000 drones in American airspace by 2020.

For now, many local law enforcement agencies are leading the quest for drone-use approval, though requests for commercial drones are mounting. As of February 15, 2013, there were 327 active drone certifications despite there being no regulatory framework in place. However, the FAA did get around to certifying two types of unmanned aircraft for civilian use in the US in late July.

In the meantime, federal government agencies have used drones domestically both out in the open and in secret. The Federal Bureau of Investigation has admitted to already using surveillance drones despite no established law or guidelines for their use. The US Department of Homeland Security has used surveillance-capable drones along the border for years, even allowing other federal agencies to use its fleet to the tune of 250 times in 2012 alone, The New York Times reported.

August 20, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , , , , | Leave a comment

NSA to open new $60mln facility in N. Carolina university amid surveillance scrutiny

RT | August 16, 2013

While new disclosures this week have exposed inept oversight and gross privacy violations within the National Security Agency, news out of North Carolina has revealed that the NSA is spending $60.75 million on another brand new facility.

In the midst of an international debate focused on how the United States’ premier spy agency has conducted dragnet surveillance over much of the world, including at home, the NSA is expanding even further. The News & Observer reported on Thursday that North Carolina State University in Raleigh, NC is receiving a $60.75 million grant from the NSA to develop a top-secret data analysis lab.

The grant, the paper reported, is three times larger than any award ever received by the university in the school’s history.

Randy Woodson, the school’s chancellor, said Thursday that the deal had been in the works for three years. He said he hoped the data center would make North Carolina a more attractive destination for technology companies. Woodson predicted that the project would create 100 jobs over five years.

“We appreciate the confidence of the National Security Agency to select NC State for this groundbreaking endeavor,” Woodson said in a statement. “Not only will it enhance the academic experience for our students and faculty, it will also add to the economic prosperity of our community through new jobs, new industry and new partnerships.”

Many details on the project have been kept secret because of national security, according to officials. But North Carolina State already has contracts with the Department of Defense, helping the agency research technology which will help soldiers identify improvised explosive devices and expand their foreign language capabilities, among other functions.

The NSA has come under harsh scrutiny in recent months due to the disclosure of classified surveillance programs which the government has used to justify monitoring the communications of Americans, as well as the international community. Internal emails published by the News & Observer reveal that North Carolina State originally intended to announce their deal with the NSA just before the leaks were published but decided to delay in fear of potential blowback.

“A very important announcement about our new NSA-funded Laboratory for Analytic Sciences was supposed to be made public this morning, but with that bit out of The Guardian newspaper on NSA collecting phone records of Verizon customers – everyone thought it best to not make the announcement just yet,” Randy Avent, the associate vice chancellor for research at NCSU, wrote in a message to other administrators. “By the way – our Lab is just that – a research program studying the fundamental science behind analytics. It is not a storage facility for classified data and does not work with any data like that mentioned in the article.”

The delayed announcement comes after another disclosure which further harmed the NSA’s reputation. The Washington Post published top-secret documents Thursday night which provide a glimpse into just how often the NSA breaks the law and invades the privacy of Americans. Thousands of violations were recorded in each of the years since the NSA’s power was expanded in 2008.

August 17, 2013 Posted by | Corruption, Full Spectrum Dominance | , , , , , , , , , , | Leave a comment

Syria accepts essential terms of chemical weapons probe – UN

RT | August 15, 2013

The Syrian government has accepted the ‘essential modalities’ under which the UN was ready to investigate whether chemical weapons had been used in the country, the body has announced, signalling that experts will shortly be traveling to Syria.

“The departure of the team is now imminent,” UN Secretary-General Ban Ki-moon said in a statement. “As agreed with the Government of Syria, the team will remain in the country to conduct its activities, including on-site visits, for a period of up to 14 days, extendable upon mutual consent.”

The Secretary-General has expressed his appreciation to the Syrian government for accepting “the modalities essential for cooperation to ensure the proper, safe and efficient conduct of the Mission.”

The statement also reminded that the use of chemical weapons “by any side under any circumstances” would constitute an “outrageous crime.”

Two weeks ago the United Nations said that an agreement had been reached with Syrian President Bashar al-Assad’s government as to the three locations that UN inspectors would be investigating, led by Swedish scientist, Ake Sellstrom.

One site to be visited by the UN team is Khan al-Assal in Aleppo, where the country’s government says rebels used chemical weapons in March. The two additional locations have yet to be confirmed.

Both Syria’s government and rebel forces have long been accusing each other of using chemical weapons, and both have denied it.

Russia welcomed the move, saying on its Twitter feed that “Damascus is ready to bring clarity into the situation”, and expressing hope that the move will “provide a springboard for a political solution of the ongoing crisis”.

Last month Russia submitted “a full set of documents” to the UN and its analysis of samples taken west of Aleppo. Russia’s findings indicated that it was rebels behind the Khan al-Assal incident, in which more than 30 people died.

The United States cast doubt on the Russian findings saying its own intelligence services believed Syrian government forces had used chemical weapons. However, Paulo Pinheiro, chairman of the UN commission’s inquiry into rights violations in Syria, said the evidence provided by the US did not meet standards as his commission was “very worried about the chain of custody of the substances.”

Back in March Damascus requested UN investigators to visit Khan al-Assal. The UN formed a mission then, but was reluctant to send it, demanding “unconditional and unfettered” access across the country, according to Ban’s spokesman Martin Nesirky.

Syria’s Foreign Ministry rejected the UN’s effort to broaden the probe claiming that it was “at odds with the Syrian request” and that its “possible hidden intentions” could violate Syrian sovereignty.

In total, the UN received some 13 reports of alleged use of chemical weapons in Syria and the UN inspectors will be investigating the “allegations” of chemical weapons use, rather than determining who was responsible for the attacks.

August 15, 2013 Posted by | War Crimes | , , , , , , , | Leave a comment

Will it work? German email companies adopt new encryption to foil NSA

RT | August 9, 2013

Communications sent between Germany’s two leading email providers will now be encrypted to provide better security against potential NSA surveillance. Experts say the move will do little to thwart well-equipped snoopers.

The “E-mail made in Germany” project has been set up in the wake of US surveillance revelations made by NSA whistleblower Edward Snowden. National Security Agency documents show that the agency intercepts 500 million phone calls, texts, and emails in Germany each month.

“Germans are deeply unsettled by the latest reports on the potential interception of communication data,” said Rene Obermann, head of Deutsche Telekom, the country’s largest email provider. “Now, they can bank on the fact that their personal data online is as secure as it possibly can be.”

Deutsche Telekom and United Internet, which operate about two-thirds of Germany’s primary email accounts, said that from now on they will use SSL (Secure Sockets Layer) – a modern, industry-standard form of encryption that scrambles signals as they are sent through cables, which is the point at which the NSA often intercepts communication. The companies will also employ exclusively German servers and internal cables when sending messages between each other.

Obermann told the media that no access to users’ email will now be possible without a warrant. However, experts claim the impact of the measure is likely to be mostly psychological and symbolic.

“This initiative helps to tackle the-day-to-day sniffing around on the communication lines but it still doesn’t prevent governments from getting information,” Stefan Frei, a research director at information security company NSS Labs, told Reuters.

As Snowden’s files revealed, the NSA specifically focuses on foreign servers – often with backing from the country that hosts them – when intercepting communication. The agency is also able to crack the SSL code, with and without help from the email operator. However, it is much harder to do so without an operator-issued “key.”

It is notable that Google and other leading companies implicated as willing participants in the PRISM surveillance program also offer SSL encoding with their email service.

“Of course the NSA could still break in if they wanted to, but the mass encryption of emails would make it harder and more expensive for them to do so,” said Sandro Gaycken, a professor of cyber security at Berlin’s Free University.

August 10, 2013 Posted by | Civil Liberties, Full Spectrum Dominance | , , , , , , , , | Leave a comment

IRS gets help from DEA and NSA to collect data

By Robert Bridge | RT | August 8, 2013

The Internal Revenue Service reportedly received incriminating information on US citizens from the Drug Enforcement Agency, with the assistance of the National Security Agency, before concealing the paper trail from defendants.

Details of a Drug Enforcement Administration (DEA) program that provides tips to the Internal Revenue Service (IRS) and then advises them to “recreate the investigative trail” were published in a manual used by IRS agents for two years, Reuters revealed.

The practice of concealing the source of information has attracted the scrutiny of legal experts and is now under review by the US Justice Department.

A brief entry in the Internal Revenue Manual instructed agents of the US tax agency to omit any reference to information provided by the DEA’s Special Operations Division, especially with regard to “affidavits, court proceedings or investigative files.”

The entry was published and posted online in 2005 and 2006, and removed in early 2007.  An IRS spokesman had no comment on the entry or on why it was removed from the manual, Reuters reported.

The IRS publication provides some further detail on the parallel construction concept.

“Special Operations Division has the ability to collect, collate, analyze, evaluate, and disseminate information and intelligence derived from worldwide multi-agency sources, including classified projects,” the IRS manual says. “SOD converts extremely sensitive information into usable leads and tips which are then passed to the field offices for real-time enforcement activity against major international drug trafficking organizations.”

According to the document, IRS agents are directed to use the intelligence as a starting point for unearthing new, “independent” evidence: “Usable information regarding these leads must be developed from such independent sources as investigative files, subscriber and toll requests, physical surveillance, wire intercepts, and confidential source information. Information obtained from SOD in response to a search or query request cannot be used directly in any investigation (i.e. cannot be used in affidavits, court proceedings or maintained in investigative files).”

In addition to the IRS, the Special Operations Division cooperates with a number of government agencies, including the Federal Bureau of Investigation, the National Security Agency and the Central Intelligence Agency.

The way the intelligence-gathering system worked is as follows: The Special Operations Division of the DEA channels secret data from overseas NSA intercepts, domestic wiretaps, informants and a large DEA database of telephone records to authorities nationwide to assist them with criminal investigations of US citizens, according to the Reuters report.

The DEA telephone database is different from the NSA database that was revealed by former NSA contractor Edward Snowden, who is now living in Russia under asylum.

The DEA, which works behind the scenes to investigate drug dealers, money launderers and other criminals, argues that the practice does not violate the law and has been in “near-daily use since the 1990s.” The agency said the reason it directs federal agents to recreate the investigation trail is to “protect sources and methods, not to withhold evidence.”

Judicial hurdles ahead

Legal experts, however, say that concealing potential evidence from defendants violates the US Constitution. According to documents and interviews obtained by Reuters, federal agents use a procedure called “parallel construction” to conceal the tracks of the investigative trail. For example, agents could say that an investigation was launched due to a traffic violation as opposed to an SOD tip.

House Intelligence Committee Chairman Mike Rogers expressed concern with the parallel construction program.

“If they’re recreating a trail, that’s wrong and we’re going to have to do something about it,” Rogers, a former FBI agent, said on the Mike Huckabee Show radio program. “We’re working with the DEA and intelligence organizations to try to find out exactly what that story is.”

Spokespeople for the DEA and the Department of Justice declined to comment.

Sen. Rand Paul, a member of the Homeland Security and Government Affairs Committee, said he was troubled that DEA agents have been “trying to cover up a program that investigates Americans.”

“If the Constitution still has any sway, a government that is constantly overreaching on security while completely neglecting liberty is in grave violation of our founding doctrine,” Paul added

The NSA database contains data about every telephone call made inside of the United States. This information, according to a NSA official, as quoted by Reuters, “is not used for domestic criminal law enforcement.”

The DEA database, or DICE for short, consists largely of phone log and internet data gathered legally by the DEA through “subpoenas, arrests and search warrants nationwide.” DICE has on file “about 1 billion records,” which are stored for about one year before being destroyed, DEA officials said.

August 8, 2013 Posted by | Civil Liberties, Deception, Timeless or most popular | , , , , , , , , , , , , | Leave a comment

TSA expands role beyond airports amid growing cases of misconduct

RT | August 7, 2013

Cases of misconduct among airport screeners employed by the Transportation Security Administration (TSA) increased by 26 per cent between 2010 and 2012, according to a new report. It comes as the agency expands its services beyond airport security gates.

The report, which was released last week by the US Government Accountability Office (GAO), found 9,622 cases of misconduct among TSA workers from 2010 through the 2012 fiscal year. It concluded that the agency had insufficient procedures for reviewing and recording the outcomes of misconduct cases.

At the same time, fresh attention has been cast on TSA’s expanding its roles into train terminals and even sporting events in the form of Visible Intermodal Prevention and Response squads, or VIPR teams, which have been assigned to counterterrorism security checks at transportation hubs in the US since 2005.

According to a profile published this week by The New York Times, TSA’s VIPR program now boasts a $100 million annual budget and is growing quickly. The scheme has grown since 2008, consisting of 37 teams in 2012.

Meanwhile, the agency’s records show that it has provided security for over 8,800 “unannounced checkpoints” and other search operations in conjunction with local law enforcement outside of airports. Such events have included the Indianapolis 500 race and both the Democratic and Republican national conventions.

VIPR teams usually comprise of federal air marshals, explosives experts, and baggage inspectors. The squads move through crowds at events and transportation hubs with bomb-sniffing dogs and perform random stops on individuals. Plainclothes members of VIPR teams monitor crowds for suspicious behavior.

“Our mandate is to provide security and counterterrorism operations for all high-risk transportation targets, not just airports and aviation,” TSA administrator John S. Pistole said. “The VIPR teams are a big part of that.”

However, members of Congress and officials at the Department of Homeland Security question whether the teams are properly trained while civil liberties groups wonder what the VIPR teams have to do with TSA’s original mandate to provide security at the nation’s airports.

“The problem with TSA stopping and searching people in public places outside the airport is that there are no real legal standards, or probable cause,” said Khaliah Barnes, administrative law counsel at the Electronic Privacy Information Center.

“It’s something that is easily abused because the reason that they are conducting the stops is shrouded in secrecy.”

Representative Bennie Thompson, a ranking member on the House Homeland Security Committee with oversight of TSA, supports the VIPR teams but remains concerned about warrantless searches and the process of detecting suspicious behavior.

“This is a gray area,” he said. “I haven’t seen any good science that says that is what a terrorist looks like. Profiling can easily be abused,” Thompson told The New York Times.

As for the rising number of offenses among TSA workers, the majority of those listed in the report include attendance and leave violations and excessive absences or tardiness. Only a small fraction represented instances of theft.

Specific violations of screening and security rules were outlined in 20 per cent of the cases profiled in the report. One of those offenses included sleeping while on duty.

Although the GAO report does not indicate high occurrences of issues such as theft, there have still been some high profile cases among the 56,000-strong staff which is spread out among 450 airports across the US.

For example, a TSA officer at Orlando International Airport pleaded guilty to embezzlement and theft after stealing 80 laptop computers and electronics from passenger luggage in 2011. The items were worth $80,000.

Another TSA employee was arrested after allegedly stealing some $50,000 worth of electronics at Fort Lauderdale-Hollywood International Airport the same year, although the GAO does not cite that incident.

It remains to be seen whether the occurrences of misconduct listed in the report will carry over into TSA’s growing role. For the most part, the presence of VIPR teams seems to mostly confuse and irritate the public.

A joint operation in 2012 involving VIPR, Houston police, and local transit officers led to complaints of stops and searches of bags. The deployment yielded a few arrests, mostly for passengers with existing warrants for prostitution and minor drug possession, according to The Times.

“It was an incredible waste of taxpayers’ money,” said Robert Fickman, a local defense lawyer who attended a subsequent meeting in the city packed with angry residents. “Did we need to have TSA in here for a couple of minor busts?”

August 7, 2013 Posted by | Civil Liberties, Corruption, Full Spectrum Dominance | , , , , , , , | Leave a comment

Greenwald claims up to 20,000 Snowden documents are in his possession

RT | August 7, 2013

The journalist involved in the publication of leaks provided by whistleblower Edward Snowden said in a testimony to the Brazilian government that he possesses up to 20,000 secret US government files.

Glenn Greenwald testified before a Brazilian Senate foreign relations committee on Tuesday. The Brazil-based American reporter – who was approached by Snowden while the whistleblower still worked as a contractor for the NSA – has published details of US electronic surveillance programs taking place domestically and abroad.

“I did not do an exact count, but he gave me 15,000, 20,000 documents. Very, very complete and very long,” Greenwald told Brazilian lawmakers.

“The stories we have published are a small portion. There will certainly be more revelations on the espionage activities of the US government and allied governments… on how they have penetrated the communications systems of Brazil and Latin America,” he said.

In addition to his reporting for Britain’s Guardian newspaper, Greenwald has also been a fixture on O Globo, where the journalist shared the alleged details of US electronic surveillance of Brazil and virtually all of Latin America.

During his testimony, Greenwald alleged that Brazilian companies have agreements in place with American telecoms to collect data for the National Security Agency (NSA), and stressed that their complicity should be investigated by that country’s government.

O Globo recently published claims that Washington had at least at one time maintained a spy center in the capital of Brasilia, as part of a network of 16 similar facilities worldwide designed to intercept foreign satellite transmissions.

Allegations of widespread US surveillance of Brazil prompted US Vice President Joe Biden last month to call Brazilian President Dilma Rousseff to provide an explanation. US Ambassador to Brazil Thomas Shannon had earlier denied the NSA was tapping into telecoms in the country.

The additional files in Greenwald’s possession are believed to have been handed over when Snowden took refuge at a hotel in Hong Kong before fleeing to Moscow.

“The pretext [given by Washington] for the spying is only one thing: terrorism and the need to protect the [American] people. But the reality is that there are many documents which have nothing to do with terrorism or national security, but have to do with competition with other countries, in the business, industrial and economic fields,” Greenwald said on Tuesday.

On Monday, foreign ministers of the South American trade bloc Mercosur raised the issue of alleged NSA surveillance throughout Latin America with UN Secretary-General Ban Ki-moon.

The ministers discussed with Ban a statement adopted by the bloc on July 12 following a summit in Montevideo, Uruguay. The statement called for UN members to propose ways to halt spying and potentially pursue sanctions against the United States.

But doing so would be impossible under the current framework, as only the Security Council can impose legally binding sanctions and the US holds veto privilege over any such resolution as a permanent member of the council.

One of the most recent leaks provided by Snowden – published last month – refers to a secret surveillance system named XKeyscore which is allegedly used by the NSA to monitor internet traffic.

In his Tuesday testimony, Greenwald described the system as not only able to collect metadata “but also the content of emails and what is being discussed in telephone conversations. It is a powerful program which frightens.”

August 7, 2013 Posted by | Corruption, Deception, Full Spectrum Dominance | , , , , , , , , , | Leave a comment