Archive

Archive for the ‘New Middle East’ Category

وثيقة وكالة استخبارات الجيش الأمريكي في 2012: الولايات المتحدة و حلفائها سيتغاضون عن صعود الدولة الإسلامية من أجل عزل النظام السوري

25/11/2015 Leave a comment

Syrian-war

يوم الاثنين، 18 مايو 2015، نشرت مجموعة المراقبة التابعة لليمين الأمريكي المحافظ المعروفة بإسم “المراقبة القضائية” مجموعة من الوثائق السرية التي تم الحصول عليها من وزارة الدفاع الأمريكية ووزارة الخارجية من خلال دعوى قضائية فيدرالية.

وبينما ركزت وسائل الاعلام الأمريكية على الوثائق التي تكشف تعامل مع البيت الأبيض مع الهجوم على القنصلية الأمريكية في بنغازي عام 2011، يأتي الكشف الأكبر و الأكثر الأهمية في واحدة من وثائق وكالة استخبارات الدفاع المصدرة في عام 2012، و هو أن تأسيس “دولة إسلامية” في شرق سوريا هو شيئ مطلوب و محبذ لتنفيذ سياسات الغرب في المنطقة.

المذهل هو أن الوثيقة تقول نصاً: “الغرب ودول الخليج وتركيا يدعمون المعارضة السورية … هناك إمكانية إنشاء إمارة سلفية معلنة أو غير معلنة، في شرق سوريا (الحسكة ودير الزور)، وهذا هو بالضبط ما تريده القوى الداعمة للمعارضة، من أجل عزل النظام السوري … “.

Pg

 الوثيقة المصنفة سابقاً بتصنيف “سري// ليس للأجانب” وبتاريخ 12 أغسطس 2012، عممت على نطاق واسع بين مختلف الوكالات الأمنية الأمريكية، بما في ذلك القيادة المركزية ووكالة الإستخبارات المركزية ومكتب التحقيقات الفيدرالي، ووزارة الخارجية ووكالات أخرى.

وتظهر الوثيقة أنه في وقت مبكر من عام 2012، توقعت المخابرات الامريكية صعود الدولة الإسلامية في العراق والشام (داعش)، ولكن بدلا من ترسيم واضح للمجموعة كعدو، يصور التقرير التنظيم الإرهابي باعتباره حليف إستراتيجي محتمل للولايات المتحدة.

في حين أن عددا من المحللين والصحفيين وثقوا منذ فترة طويلة دور وكالات الاستخبارات الغربية في تشكيل وتدريب المعارضة المسلحة في سوريا، تأتي هذه الوثيقة كأعلى تأكيد إستخباراتي داخلي الولايات للنظرية القائلة بأن الحكومات الغربية كانت ترى في الأساس أن داعش من الممكن أن تكون أداة تساعدهم على تغيير النظام في سوريا.

ملخص ما جاء في نص الوثيقة هو:

  • أن تنظيم القاعدة يقود المعارضة في سوريا
  • الغرب متحالف مع المعارضة
  • إنشاء الدولة الإسلامية الوليدة أصبح واقعا مع بداية الحرب الأهلية السورية (ليس هناك ذكر لانسحاب القوات الامريكية من العراق كعامل محفز للصعود الدولة الإسلامية)
  • إنشاء “إمارة سلفية” في شرق سوريا هو “بالضبط” ما تريده القوى الخارجية الداعمة للمعارضة (التي تعرف بأنها “الغرب ودول الخليج وتركيا”) من أجل إضعاف حكومة الأسد
  • “إقتراح إنشاء مناطق ملاذات آمنة” في المناطق التي غزاها المتمردين الإسلاميين على غرار النموذج الليبي 
  • العراق متعاطف مع المد الشيعي
  • الدولة الإسلامية” السنية” يمكن أن تكون مدمرة إلى “لوحدة العراق” ويمكن أن تؤدي إلى “تجديد دخول العناصر الإرهابية من جميع أنحاء العالم العربي  إلى ساحة النزاع في العراق.

الإطلاع على الوثيقة كاملة

الإطلاع على نسخة إنجليزية من المقال

 

 

2012 US Defense Intelligence Agency document: West will tolerate rise of Islamic State “in order to isolate the Syrian regime”

25/11/2015 Leave a comment

Syrian-war

by

On Monday, May 18, the conservative government watchdog group Judicial Watch published a selection of formerly classified documents obtained from the U.S. Department of Defense and State Department through a federal lawsuit.

While initial mainstream media reporting is focused on the White House’s handling of the Benghazi consulate attack, a much “bigger picture” admission and confirmation is contained in one of theDefense Intelligence Agency documents circulated in 2012: that an ‘Islamic State’ is desired in Eastern Syria to effect the West’s policies in the region.

Pg

Astoundingly, the newly declassified report states that for “THE WEST, GULF COUNTRIES, AND TURKEY [WHO] SUPPORT THE [SYRIAN] OPPOSITION… THERE IS THE POSSIBILITY OF ESTABLISHING A DECLARED OR UNDECLARED SALAFIST PRINCIPALITY IN EASTERN SYRIA (HASAKA AND DER ZOR), AND THIS IS EXACTLY WHAT THE SUPPORTING POWERS TO THE OPPOSITION WANT, IN ORDER TO ISOLATE THE SYRIAN REGIME…”.

The DIA report, formerly classified “SECRET//NOFORN” and dated August 12, 2012, was circulated widely among various government agencies, including CENTCOM, the CIA, FBI, DHS, NGA, State Dept., and many others.

The document shows that as early as 2012, U.S. intelligence predicted the rise of the Islamic State in Iraq and the Levant (ISIL or ISIS), but instead of clearly delineating the group as an enemy, the report envisions the terror group as a U.S. strategic asset.

While a number of analysts and journalists have documented long ago the role of western intelligence agencies in the formation and training of the armed opposition in Syria, this is the highest level internal U.S. intelligence confirmation of the theory that western governments fundamentally saw ISIS as their own tool for regime change in Syria. The document states that scenario as a matter-of-fact.

The newly released DIA report makes the following summary points concerning “ISI” (in 2012 “Islamic State in Iraq,”) and the soon to emerge ISIS:

  • Al-Qaeda drives the opposition in Syria
  • The West identifies with the opposition
  • The establishment of a nascent Islamic State became a reality only with the rise of the Syrian insurgency (there is no mention of U.S. troop withdrawal from Iraq as a catalyst for Islamic State’s rise, which is the contention of innumerable politicians and pundits; see section 4.D. below)
  • The establishment of a “Salafist Principality” in Eastern Syria is “exactly” what the external powers  supporting the opposition want (identified as “the West, Gulf Countries, and Turkey”) in order to weaken the Assad government
  • “Safe havens” are suggested in areas conquered by Islamic insurgents along the lines of the Libyan model (which translates to so-called no-fly zones as a first act of ‘humanitarian war’; see 7.B.)
  • Iraq is identified with “Shia expansion” (8.C)
  • A Sunni “Islamic State” could be devastating to “unifying Iraq” and could lead to “the renewing facilitation of terrorist elements from all over the Arab world entering into Iraqi Arena.”

View the full Document in PDF

View Arabic Version of Article


 

The following is excerpted from the seven page DIA declassified report (bold-facing is my own):

R 050839Z AUG 12

THE GENERAL SITUATION:

A. INTERNALLY, EVENTS ARE TAKING A CLEAR SECTARIAN DIRECTION.

B. THE SALAFIST [sic], THE MUSLIM BROTHERHOOD, AND AQI ARE THE MAJOR FORCES DRIVING THE INSURGENCY IN SYRIA.

C. THE WEST, GULF COUNTRIES, AND TURKEY SUPPORT THE OPPOSITION; WHILE RUSSIA, CHINA AND IRAN SUPPORT THE REGIME.

3. (C) Al QAEDA – IRAQ (AQI):… B. AQI SUPPORTED THE SYRIAN OPPOSITION FROM THE BEGINNING, BOTH IDEOLOGICALLY AND THROUGH THE MEDIA

4.D. THERE WAS A REGRESSION OF AQI IN THE WESTERN PROVINCES OF IRAQ DURING THE YEARS OF 2009 AND 2010; HOWEVER, AFTER THE RISE OF THE INSURGENCY IN SYRIA, THE RELIGIOUS AND TRIBAL POWERS IN THE REGIONS BEGAN TO SYMPATHIZE WITH THE SECTARIAN UPRISING. THIS (SYMPATHY) APPEARED IN FRIDAY PRAYER SERMONS, WHICH CALLED FOR VOLUNTEERS TO SUPPORT THE SUNNI’S [sic] IN SYRIA.

7. (C) THE FUTURE ASSUMPTIONS OF THE CRISIS:

A. THE REGIME WILL SURVIVE AND HAVE CONTROL OVER SYRIAN TERRITORY.

B. DEVELOPMENT OF THE CURRENT EVENTS INTO PROXY WAR: …OPPOSITION FORCES ARE TRYING TO CONTROL THE EASTERN AREAS (HASAKA AND DER ZOR), ADJACENT TO THE WESTERN IRAQI PROVINCES (MOSUL AND ANBAR), IN ADDITION TO NEIGHBORING TURKISH BORDERS. WESTERN COUNTRIES, THE GULF STATES AND TURKEY ARE SUPPORTING THESE EFFORTS. THIS HYPOTHESIS IS MOST LIKELY IN ACCORDANCE WITH THE DATA FROM RECENT EVENTS, WHICH WILL HELP PREPARE SAFE HAVENS UNDER INTERNATIONAL SHELTERING, SIMILAR TO WHAT TRANSPIRED IN LIBYA WHEN BENGHAZI WAS CHOSEN AS THE COMMAND CENTER OF THE TEMPORARY GOVERNMENT.

8.C. IF THE SITUATION UNRAVELS THERE IS THE POSSIBILITY OF ESTABLISHING A DECLARED OR UNDECLARED SALAFIST PRINCIPALITY IN EASTERN SYRIA (HASAKA AND DER ZOR), AND THIS IS EXACTLY WHAT THE SUPPORTING POWERS TO THE OPPOSITION WANT, IN ORDER TO ISOLATE THE SYRIAN REGIME, WHICH IS CONSIDERED THE STRATEGIC DEPTH OF THE SHIA EXPANSION (IRAQ AND IRAN)

8.D.1. …ISI COULD ALSO DECLARE AN ISLAMIC STATE THROUGH ITS UNION WITH OTHER TERRORIST ORGANIZATIONS IN IRAQ AND SYRIA, WHICH WILL CREATE GRAVE DANGER IN REGARDS TO UNIFYING IRAQ AND THE PROTECTION OF ITS TERRITORY.

via LEVANT REPORT

 

The War on Roger Waters rages over comparing Israel to Nazis

16/12/2013 1 comment

Roger Waters beside the Israeli Apartheid Wall

Roger Waters beside the Israeli Apartheid Wall

Remarks by the musician Roger Waters, formerly of Pink Floyd, comparing the modern Israeli state to Nazi Germany have put him at the center of a furious dispute.

Waters, 70, a well-known supporter of the Palestinian cause, has frequently defended himself against accusations that he is antisemitic, claiming he has a right to urge fellow artists to boycott Israel. But last week the veteran rock star’s argued that Israeli treatment of the Palestinians can be compared to the atrocities of Nazi Germany. “The parallels with what went on in the 1930s in Germany are so crushingly obvious,” he said in an online interview with Counter Punch.

Already, Zionist and International media have started their War on Waters. In a New York Observer article titled “The Anti-Semitic Stench of Pink Floyd”, Rabbi Shmuley Boteach said: “Mr Waters, the Nazis were a genocidal regime that murdered six million Jews. That you would have the audacity to compare Jews to monsters who murdered them shows you have no decency, you have no heart, you have no soul.

Waters defended his comments, telling the Observer: “I do not know Rabbi Boteach, and am not prepared to get into a slanging match with him.”

He added: “I have nothing against Jews or Israelis, and I am not antisemitic. I deplore the policies of the Israeli government in the occupied territories and Gaza. They are immoral, inhuman and illegal. I will continue my non-violent protests as long as the government of Israel continues with these policies.”

The Jerusalem Post on the other hand ran an article titled: Roger Waters – Comfortably Dumb, in which it wrote, “The former Pink Floyd star put the proverbial foot in his mouth when he reached out to his fellow rockers describing Israel as an “apartheid” country that practices ethnic cleansing of the Palestinians.”

Read the complete interview with Roger Waters: Roger Waters: Comparisons between Israel and Nazis ‘crushingly obvious’

Roger Waters: Comparisons between Israel and Nazis ‘crushingly obvious’

12/12/2013 1 comment

On Music, the Political Role of Artists and His Activism for Justice Around the World, Including in Palestine.

Roger Waters beside the Israeli Apartheid Wall

Roger Waters beside the Israeli Apartheid Wall

by FRANK BARAT

Frank Barat: When did you make the decision to make the Wall tour (that ended in Paris in September 2013) so political ? And why did you dedicate the final concert to Jean-Charles De Menezes ?

Roger Waters: The first show was October 14th 2010. We started working on content of show with Sean Evans in 2009. I had already decided to make it much broader politically than it had been in 1979/80. It could not be just about this whinny little guy who didn’t like his teachers. It had to be more universal. That’s why ‘fallen loved ones’ came into it (the shows are showing pictures of people that died during wars) trying to universalise the sense of grief and loss that we all feel towards family members killed in conflict. Whatever the wars or the circumstances, they (in the non western world), feel has much lost as we do. Wars become an important symbol because of that separation between ‘us and them,’ which is fundamental to all conflicts. Regarding Jean-Charles, we used to do Brick II with three solos at the end and I decided that three solos was too much, it was boring me. So sitting in a hotel room, one night, I was thinking about what I could do instead of that. Somebody had recently sent me a photograph of Jean-Charles De Menezes to go on the wall. So he was in my mind and I thought that I should sing his story. I wrote that song, taught it to the band, and that’s what we did.

FB: A lot of artist would say that mixing arts and politics is wrong. That their goal is only to entertain. What would you say to those people?

RW: Well it’s funny you should say that because I just finished yesterday the text of a new piece which will be a new album of mine. It’s about a grandfather in Northern Ireland going on a quest with his grandchild to find the answer to the question: “Why are they killing the children?”, because the child is really worried about it. Right at the very end of it, I decided to add something more. In the song, the child tells his grandpa: “Is that it?” and the grandpa replies “No, we cannot leave on that note, give me another note”. A new song starts and the grandpa makes a speech. He says: “We live on a tiny dot in a middle of a lot of fucking nothing. Now, if you’re not interested in any of this, if you’re one of those “Roger I love Pink Floyd but I hate your fucking politics”, if you believe artists should be mute, emasculated, nodding dogs dangling aimlessly over the dashboard of life, you might be well advised to fuck off to the bar now, because, time keeps slipping away.” That’s my answer to your question. Read more…

XKeyscore: NSA tool collects ‘nearly everything you do on the internet’

01/08/2013 Leave a comment

Untitled-1 (9)

Just when you thought the scale of the NSA’s surveillance programs couldn’t get more superlative, new details about a special software suite show that analysts can access “nearly everything a typical user does on the internet.” If it uses HTTP, the NSA can get it.

The software’s known as X-Keyscore, and it’s gnarly. Not only does it let NSA agents and contractors like Edward Snowden (who leaked the documents detailing its existence) search the internet for a specific user, it also lets them learn the IP addresses of everybody who visited a particular website. Once users of interest are identified, X-Keyscore enables the agency to pull granular information on anything from email histories to social networking activity, even down to the user’s buddy lists and specific chats.

Legally, X-Keyscore can’t be used on Americans without a warrant, but as The Guardian’s Glenn Greewald points out, there are no technical specifications that would prevent them from doing so. Greenwald explains:

• XKeyscore gives ‘widest-reaching’ collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst’s ability to query the databases at any time.

KS1The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSA parlance) associated with the individual being targeted.

Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

One document notes that this is because “strong selection [search by email address] itself gives us only a very limited capability” because “a large amount of time spent on the web is performing actions that are anonymous.”

The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.

A slide entitled “plug-ins” in a December 2012 document describes the various fields of information that can be searched. It includes “every email address seen in a session by both username and domain”, “every phone number seen in a session (eg address book entries or signature block)” and user activity – “the webmail and chat activity to include username, buddylist, machine specific cookies etc”.

Email monitoring

In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual’s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.

To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.

KS2KS3edit2The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, “communications that transit the United States and communications that terminate in the United States”.

One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

KS4

Chats, browsing history and other internet activity

Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.

An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.

KS55editAn analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.

KS6Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.

KS7As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.

KS8The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.

KS9The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.

William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20tn transactions about US citizens with other US citizens”, an estimate, he said, that “only was involving phone calls and emails”. A 2010 Washington Post article reported that “every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.”

The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”

To solve this problem, the NSA has created a multi-tiered system that allows analysts to store “interesting” content in other databases, such as one named Pinwale which can store material for up to five years.

It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.

KS10In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.

KS11Legal v technical restrictions

While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA’s foreign targets.

The ACLU’s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans’ communications without individualized warrants.

“The government doesn’t need to ‘target’ Americans in order to collect huge volumes of their communications,” said Jaffer. “The government inevitably sweeps up the communications of many Americans” when targeting foreign nationals for surveillance.

An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.

KS12In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.

Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.

Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. “It’s very rare to be questioned on our searches,” Snowden told the Guardian in June, “and even when we are, it’s usually along the lines of: ‘let’s bulk up the justification’.”

In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.

Acknowledging what he called “a number of compliance problems”, Clapper attributed them to “human error” or “highly sophisticated technology issues” rather than “bad faith”.

However, Wyden said on the Senate floor on Tuesday: “These violations are more serious than those stated by the intelligence community, and are troubling.”

In a statement to the Guardian, the NSA said: “NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.

“XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.

“Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”

“Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

“These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”

via:
news

 

NSA’s XKeyscore program – read one of the presentations

Will Obama administration start Backing ElBaradei?

07/07/2013 Leave a comment

c-Baradei

July07, 2013, by FRANKLIN LAMB

According to well-connected Washington sources, one being a Congressional staffer whose job description includes following political events in Egypt, it did not take Mohamed Mustafa ElBaradei,  the Sharia legal scholar, Nobel Peace Prize Laureate, and for 12 years the Director General of the International Atomic Energy Agency (IAEA) (1997-2009), very long at all  to contact the Washington, DC law firm of Patton Boggs on 7/2/13. That is once it became evident that Egyptian President Mohamad Morsi might well be ousted by Egypt’s Supreme Council of the Armed Forces (SCAF).   The next day, ElBaradei’s representatives reportedly  also made contact with the Conference of Presidents of Major American Jewish Organizations which claims to represent the 52 largest US based largest Jewish groups.ElBaradei,  perhaps the current front-runner to replace his long-time nemesis, Mohammad Morsi, moved fast to organize some key allies in Cairo and Washington to pick-up  where his earlier failed Presidential campaign left off shortly before the 1/25/2011 Egyptian Presidential election. Patton Boggs, the K Street, NW Washington DC law firm, which last year had 550 lawyers and 120 lobbyists and is arguably the firm closest to the White House in terms of securing for its clients what they want from the approximately 5000 key decision makers in the US Capitol. The other nearly 11,800 federally registered lobbyists in Washington (there were only 300 as recently as when Lyndon Johnson was US President) lag far behind Patton Boggs in terms of political influence.

Patton Boggs new client wants the Pentagon and the White House to squeeze Egypt’s Supreme Council of the Armed Forces (SCAF) who deposed President Morsi and arrange for himself to be appointed the interim President of Egypt pending early elections.

ElBaradei wants the same thing from Israel and its US lobby, the former having developed close relations under Morsi similar to what Israel enjoyed under Mubarak. Read more…

Google’s Banality of ‘Don’t Be Evil’

03/06/2013 Leave a comment

Gevil

By JULIAN ASSANGE
Published: June 1, 2013 in The New York Times

“THE New Digital Age” is a startlingly clear and provocative blueprint for technocratic imperialism, from two of its leading witch doctors, Eric Schmidt and Jared Cohen, who construct a new idiom for United States global power in the 21st century. This idiom reflects the ever closer union between the State Department and Silicon Valley, as personified by Mr. Schmidt, the executive chairman of Google, and Mr. Cohen, a former adviser to Condoleezza Rice and Hillary Clinton who is now director of Google Ideas.

The authors met in occupied Baghdad in 2009, when the book was conceived. Strolling among the ruins, the two became excited that consumer technology was transforming a society flattened by United States military occupation. They decided the tech industry could be a powerful agent of American foreign policy.

The book proselytizes the role of technology in reshaping the world’s people and nations into likenesses of the world’s dominant superpower, whether they want to be reshaped or not. The prose is terse, the argument confident and the wisdom — banal. But this isn’t a book designed to be read. It is a major declaration designed to foster alliances.

“The New Digital Age” is, beyond anything else, an attempt by Google to position itself as America’s geopolitical visionary — the one company that can answer the question “Where should America go?” It is not surprising that a respectable cast of the world’s most famous warmongers has been trotted out to give its stamp of approval to this enticement to Western soft power. The acknowledgments give pride of place to Henry Kissinger, who along with Tony Blair and the former C.I.A. director Michael Hayden provided advance praise for the book. Read more…

U.S. Engaged in Torture After 9/11, Constitution Project Report Concludes

17/04/2013 Leave a comment

188324_425871010809473_910316927_n - Copy

WASHINGTON — A nonpartisan, independent review of interrogation and detention programs in the years after the Sept. 11, 2001, terrorist attacks concludes that “it is indisputable that the United States engaged in the practice of torture” and that the nation’s highest officials bore ultimate responsibility for it.

The sweeping, 577-page report says that while brutality has occurred in every American war, there never before had been “the kind of considered and detailed discussions that occurred after 9/11 directly involving a president and his top advisers on the wisdom, propriety and legality of inflicting pain and torment on some detainees in our custody.” The study, by an 11-member panel convened by the Constitution Project, a legal research and advocacy group, is to be released on Tuesday morning.

Debate over the coercive interrogation methods used by the administration of President George W. Bush has often broken down on largely partisan lines. The Constitution Project’s task force on detainee treatment, led by two former members of Congress with experience in the executive branch — a Republican, Asa Hutchinson, and a Democrat, James R. Jones — seeks to produce a stronger national consensus on the torture question.

While the task force did not have access to classified records, it is the most ambitious independent attempt to date to assess the detention and interrogation programs. A separate 6,000-page report on the Central Intelligence Agency’s record by the Senate Intelligence Committee, based exclusively on agency records, rather than interviews, remains classified.

“As long as the debate continues, so too does the possibility that the United States could again engage in torture,” the report says. Read more…

Arab & Western Mercenaries train at an Israeli Security Academy

30/12/2011 1 comment

A report published by the BBC on 26 May 2011, and other news networks, claims that in the post Arab Spring Middle East, Arab youth have been training at a dubious institution called the International Security Academy (ISA), run by ex-Israeli Secret Service Officer Mirza David, and located in Negev Desert (al-Naqab) near Gaza, on the Egyptian-Israeli border, close to where the last border clashes killed three Egyptian Officers in August 2011.

The video below, is from the Academy’s YouTube channel, and it shows a group of men wearing the traditional Arab Bedouin garments and are being trained on High skilled military operations in the Negev desert in an Israeli military base.

The graduates of the Academy are highly trained militants who are ready to work for the highest bidder, the call them selves Private Security Personnel, but the most common name for their line of work is Mercenaries or Guns for Hire, and are able to operate in Arab States.

When asked if he was in fact training mercenaries, Mirza David, the founder and owner of the Israeli International Security Academy, answered: “The term mercenary is a nonsense, it is finished”.

This slideshow requires JavaScript.

The Academy’s training course lasts for seven weeks, and aims to train participants on high risk combat in the Arab and Islamic world, especially in light of turmoil in the region. As well as training on combat arts, firearms and sniper rifles, the trainees also train on the arts of camouflage, and training to dress and talk like native Arabs for reasons of undercover operations.

According to the academy, a large number of Arab youth participated in the training sessions, including Iraqis, Egyptians, Lebanese, as well as other Arab and African nationalities.

The video interview shows one of those Arabs, a Lebanese trainee, only identifying himself as Julian, and who refused to reveal his real name or face, from behind an Arab Headdress, Julian says of his training at the ISA: “Only the best can train here with the best“.

Sources:
BBC
Salem News
People Daily
AllVioces.com

This Article is also Available in Arabic on AnarchitexT Arabic

Cooptation of April6 Youth & Opposition Leaders

05/12/2011 2 comments

by Michel Chossudovsky 

The cooptation of the leaders of major opposition parties and civil society organizations in anticipation of the collapse of an authoritarian puppet government is part of Washington’s design, applied in different regions of the World.

The process of cooptation is implemented and financed by US based foundations including the National Endowment for Democracy (NED) and  Freedom House (FH). Both FH and the NED have links to the US Congress. the Council on Foreign Relations (CFR), and the US business establishment. Both the NED and FH are known to have ties to the CIA.

The NED is actively involved in Tunisia, Egypt and Algeria. Freedom House supports several civil society organizations in Egypt.

“The NED was established by the Reagan administration after the CIA’s role in covertly funding efforts to overthrow foreign governments was brought to light, leading to the discrediting of the parties, movements, journals, books, newspapers and individuals that received CIA funding. … As a bipartisan endowment, with participation from the two major parties, as well as the AFL-CIO and US Chamber of Commerce, the NED took over the financing of foreign overthrow movements, but overtly and under the rubric of “democracy promotion.” (Stephen Gowans, January « 2011 “What’s left“)

While the US has supported the Mubarak government for the last thirty years, US foundations with ties to the US State department and the Pentagon have actively supported the political opposition including the civil society movement.  According to Freedom House: “Egyptian civil society is both vibrant and constrained. There are hundreds of non-governmental organizations devoted to expanding civil and political rights in the country, operating in a highly regulated environment.”

In a bitter irony, Washington supports the Mubarak dictatorship, including its atrocities, while also backing and financing its detractors, through the activities of FH, the NED, among others. Read more…