“Should war break out in the Middle East again,… or should any Arab nation fire missiles against Israel, as the Iraqis did, a nuclear escalation, once unthinkable except as a last resort, would now be a strong probability.” Seymour Hersh(1)
“Arabs may have the oil, but we have the matches.” Ariel Sharon(2)
With between 200 and 500 thermonuclear weapons and a sophisticated delivery system, Israel has quietly supplanted Britain as the World’s 5th Largest nuclear power, and may currently rival France and China in the size and sophistication of its nuclear arsenal. Although dwarfed by the nuclear arsenals of the U.S. and Russia, each possessing over 10,000 nuclear weapons, Israel nonetheless is a major nuclear power, and should be publicaly recognized as such.
Since the Gulf War in 1991, while much attention has been lavished on the threat posed by Iraqi weapons of mass destruction, the major culprit in the region, Israel, has been largely ignored. Possessing chemical and biological weapons, an extremely sophisticated nuclear arsenal, and an aggressive strategy for their actual use, Israel provides the major regional impetus for the development of weapons of mass destruction and represents an acute threat to peace and stability in the Middle East. The Israeli nuclear program represents a serious impediment to nuclear disarmament and nonproliferation and, with India and Pakistan, is a potential nuclear flashpoint. (prospects of meaningful non-proliferation are a delusion so long as the nuclear weapons states insist on maintaining their arsenals,) Citizens concerned about sanctions against Iraq, peace with justice in the Middle East, and nuclear disarmament have an obligation to speak out forcefully against the Israeli nuclear program.
Birth of the Israeli Bomb
The Israeli nuclear program began in the late 1940s under the direction of Ernst David Bergmann, “the father of the Israeli bomb,” who in 1952 established the Israeli Atomic Energy Commission. It was France, however, which provided the bulk of early nuclear assistance to Israel culminating in construction of Dimona, a heavy water moderated, natural uranium reactor and plutonium reprocessing factory situated near Bersheeba in the Negev Desert. Israel had been an active participant in the French Nuclear weapons program from its inception, providing critical technical expertise, and the Israeli nuclear program can be seen as an extension of this earlier collaboration. Dimona went on line in 1964 and plutonium reprocessing began shortly thereafter. Despite various Israeli claims that Dimona was “a manganese plant, or a textile factory,” the extreme security measures employed told a far different story. In 1967, Israel shot down one of their own Mirage fighters that approached too close to Dimona and in 1973 shot down a Lybian civilian airliner which strayed off course, killing 104.(3)
There is substantial credible speculation that Israel may have exploded at least one, and perhaps several, nuclear devices in the mid 1960s in the Negev near the Israeli-Egyptian border, and that it participated actively in French nuclear tests in Algeria.(4) By the time of the “Yom Kippur War” in 1973, Israel possessed an arsenal of perhaps several dozen deliverable atomic bombs and went on full nuclear alert.(5)
Possessing advanced nuclear technology and “world class” nuclear scientists, Israel was confronted early with a major problem- how to obtain the necessary uranium. Israel’s own uranium source was the phosphate deposits in the Negev, totally inadequate to meet the need of a rapidly expanding program. The short term answer was to mount commando raids in France and Britain to successfully hijack uranium shipments and, in1968, to collaborate with West Germany in diverting 200 tons of yellowcake (uranium oxide).(6) These clandestine acquisitions of uranium for Dimona were subsequently covered up by the various countries involved. There was also an allegation that a U.S. corporation called Nuclear Materials and Equipment Corporation (NUMEC) diverted hundreds of pounds of enriched uranium to Israel from the mid-50s to the mid-60s.
Despite an FBI and CIA investigation, and Congressional hearings, no one was ever prosecuted, although most other investigators believed the diversion had occurred(7)(8). In the late 1960s, Israel solved the uranium problem by developing close ties with South Africa in a quid pro quo arrangement whereby Israel supplied the technology and expertise for the “Apartheid Bomb,” while South Africa provided the uranium.
South Africa and the United States
In 1977, the Soviet Union warned the U.S. that satellite photos indicated South Africa was planning a nuclear test in the Kalahari Desert but the Apartheid regime backed down under pressure. On September 22, 1979, a U.S. satellite detected an atmospheric test of a small thermonuclear bomb in the Indian Ocean off South Africa but, because of Israel’s apparent involvement, the report was quickly “whitewashed” by a carefully selected scientific panel kept in the dark about important details. Later it was learned through Israeli sources that there were actually three carefully guarded tests of miniaturized Israeli nuclear artillery shells. The Israeli/South African collaboration did not end with the bomb testing, but continued until the fall of Apartheid, especially with the developing and testing of medium range missiles and advanced artillery. In addition to uranium and test facilities, South Africa provided Israel with large amounts of investment capital, while Israel provided a major trade outlet to enable the Apartheid state avoid international economic sanctions.(9)
Although the French and South Africans were primarily responsible for the Israeli nuclear program, the U.S. shares and deserves a large part of the blame. Mark Gaffney wrote (the Israeli nuclear program) “was possible only because (emphasis in original) of calculated deception on the part of Israel, and willing complicity on the part of the U.S..”(10)
From the very beginning, the U.S. was heavily involved in the Israeli nuclear program, providing nuclear related technology such as a small research reactor in 1955 under the “Atoms for Peace Program.” Israeli scientists were largely trained at U.S. universities and were generally welcomed at the nuclear weapons labs. In the early 1960s, the controls for the Dimona reactor were obtained clandestinely from a company called Tracer Lab, the main supplier of U.S. military reactor control panels, purchased through a Belgian subsidiary, apparently with the acquiescence of the National Security Agency (NSA) and the CIA.(11) In 1971, the Nixon administration approved the sale of hundreds of krytons(a type of high speed switch necessary to the development of sophisticated nuclear bombs) to Israel.(12) And, in 1979, Carter provided ultra high resolution photos from a KH-11 spy satellite, used 2 years later to bomb the Iraqi Osirak Reactor.(13) Throughout the Nixon and Carter administrations, and accelerating dramatically under Reagan, U.S. advanced technology transfers to Israel have continued unabated to the present.
The Vanunu Revelations
Following the 1973 war, Israel intensified its nuclear program while continuing its policy of deliberate “nuclear opaqueness.” Until the mid-1980s, most intelligence estimates of the Israeli nuclear arsenal were on the order of two dozen but the explosive revelations of Mordechai Vanunu, a nuclear technician working in the Dimona plutonium reprocessing plant, changed everything overnight. A leftist supporter of Palestine, Vanunu believed that it was his duty to humanity to expose Israel’s nuclear program to the world. He smuggled dozens of photos and valuable scientific data out of Israel and in 1986 his story was published in the London Sunday Times. Rigorous scientific scrutiny of the Vanunu revelations led to the disclosure that Israel possessed as many as 200 highly sophisticated, miniaturized thermonuclear bombs. His information indicated that the Dimona reactor’s capacity had been expanded several fold and that Israel was producing enough plutonium to make ten to twelve bombs per year. A senior U.S. intelligence analyst said of the Vanunu data,”The scope of this is much more extensive than we thought. This is an enormous operation.”(14)
Just prior to publication of his information Vanunu was lured to Rome by a Mossad “Mata Hari,” was beaten, drugged and kidnapped to Israel and, following a campaign of disinformation and vilification in the Israeli press, convicted of “treason” by a secret security court and sentenced to 18 years in prison. He served over 11 years in solitary confinement in a 6 by 9 foot cell. After a year of modified release into the general population(he was not permitted contact with Arabs), Vanunu recently has been returned to solitary and faces more than 3 years further imprisonment. Predictably, The Vanunu revelations were largely ignored by the world press, especially in the United States, and Israel continues to enjoy a relatively free ride regarding its nuclear status. (15)
Israel’s Arsenal of Mass Destruction
Today, estimates of the Israeli nuclear arsenal range from a minimum of 200 to a maximum of about 500. Whatever the number, there is little doubt that Israeli nukes are among the world’s most sophisticated, largely designed for “war fighting” in the Middle East. A staple of the Israeli nuclear arsenal are “neutron bombs,” miniaturized thermonuclear bombs designed to maximize deadly gamma radiation while minimizing blast effects and long term radiation- in essence designed to kill people while leaving property intact.(16) Weapons include ballistic missiles and bombers capable of reaching Moscow, cruise missiles, land mines (In the 1980s Israel planted nuclear land mines along the Golan Heights(17)), and artillery shells with a range of 45 miles(18).
In June, 2000 an Israeli submarine launched a cruise missile which hit a target 950 miles away, making Israel only the third nation after the U.S. and Russia with that capability. Israel will deploy 3 of these virtually impregnable submarines, each carrying 4 cruise missiles.(19)
The bombs themselves range in size from “city busters” larger than the Hiroshima Bomb to tactical mini nukes. The Israeli arsenal of weapons of mass destruction clearly dwarfs the actual or potential arsenals of all other Middle Eastern states combined, and is vastly greater than any conceivable need for “deterrence.”
Israel also possesses a comprehensive arsenal of chemical and biological weapons. According to the Sunday Times, Israel has produced both chemical and biological weapons with a sophisticated delivery system, quoting a senior Israeli intelligence official,
“There is hardly a single known or unknown form of chemical or biological weapon . . . which is not manufactured at the Nes Tziyona Biological Institute.”)(20)
The same report described F-16 fighter jets specially designed for chemical and biological payloads, with crews trained to load the weapons on a moments notice. In 1998, the Sunday Times reported that Israel, using research obtained from South Africa, was developing an “ethno bomb; “In developing their “ethno-bomb”, Israeli scientists are trying to exploit medical advances by identifying distinctive a gene carried by some Arabs, then create a genetically modified bacterium or virus… The scientists are trying to engineer deadly micro-organisms that attack only those bearing the distinctive genes.” Dedi Zucker, a leftist Member of Knesset, the Israeli parliament, denounced the research saying, “Morally, based on our history, and our tradition and our experience, such a weapon is monstrous and should be denied.”(21)
Israeli Nuclear Strategy
In popular imagination, the Israeli bomb is a “weapon of last resort,” to be used only at the last minute to avoid annihilation, and many well intentioned but misled supporters of Israel still believe that to be the case. Whatever truth this formulation may have had in the minds of the early Israeli nuclear strategists, today the Israeli nuclear arsenal is inextricably linked to and integrated with overall Israeli military and political strategy. As Seymour Hersh says in classic understatement ; “The Samson Option is no longer the only nuclear option available to Israel.”(22) Israel has made countless veiled nuclear threats against the Arab nations and against the Soviet Union(and by extension Russia since the end of the Cold War) One chilling example comes from Ariel Sharon, the current Israeli Prime Minister,
“Arabs may have the oil, but we have the matches.”(23)
(In 1983 Sharon proposed to India that it join with Israel to attack Pakistani nuclear facilities; in the late 70s he proposed sending Israeli paratroopers to Tehran to prop up the Shah; and in 1982 he called for expanding Israel’s security influence to stretch from “Mauritania to Afghanistan.”)
In another example, Israeli nuclear expert Oded Brosh said in 1992,
“…we need not be ashamed that the nuclear option is a major instrumentality of our defense as a deterrent against those who attack us.”(24)
According to Israel Shahak,
“The wish for peace, so often assumed as the Israeli aim, is not in my view a principle of Israeli policy, while the wish to extend Israeli domination and influence is.”
“Israel is preparing for a war, nuclear if need be, for the sake of averting domestic change not to its liking, if it occurs in some or any Middle Eastern states…. Israel clearly prepares itself to seek overtly a hegemony over the entire Middle East…, without hesitating to use for the purpose all means available, including nuclear ones.”(25)
Israel uses its nuclear arsenal not just in the context of deterrence” or of direct war fighting, but in other more subtle but no less important ways. For example, the possession of weapons of mass destruction can be a powerful lever to maintain the status quo, or to influence events to Israel’s perceived advantage, such as to protect the so called moderate Arab states from internal insurrection, or to intervene in inter-Arab warfare.(26)
In Israeli strategic jargon this concept is called “nonconventional compellence” and is exemplified by a quote from Shimon Peres; “acquiring a superior weapons system(read nuclear) would mean the possibility of using it for compellent purposes- that is forcing the other side to accept Israeli political demands, which presumably include a demand that the traditional status quo be accepted and a peace treaty signed.”(27)
From a slightly different perspective, Robert Tuckerr asked in a Commentary magazine article in defense of Israeli nukes, “What would prevent Israel… from pursuing a hawkish policy employing a nuclear deterrent to freeze the status quo?”(28) Possessing an overwhelming nuclear superiority allows Israel to act with impunity even in the face world wide opposition. A case in point might be the invasion of Lebanon and destruction of Beirut in 1982, led by Ariel Sharon, which resulted in 20,000 deaths, most civilian. Despite the annihilation of a neighboring Arab state, not to mention the utter destruction of the Syrian Air Force, Israel was able to carry out the war for months at least partially due to its nuclear threat.
Another major use of the Israeli bomb is to compel the U.S. to act in Israel’s favor, even when it runs counter to its own strategic interests. As early as 1956 Francis Perrin, head of the French A-bomb project wrote “We thought the Israeli Bomb was aimed at the Americans, not to launch it at the Americans, but to say, ‘If you don’t want to help us in a critical situation we will require you to help us; otherwise we will use our nuclear bombs.’”(29) During the 1973 war, Israel used nuclear blackmail to force Kissinger and Nixon to airlift massive amounts of military hardware to Israel.
The Israeli Ambassador, Simha Dinitz, is quoted as saying, at the time,
“If a massive airlift to Israel does not start immediately, then I will know that the U.S. is reneging on its promises and…we will have to draw very serious conclusions…”(30)
Just one example of this strategy was spelled out in 1987 by Amos Rubin, economic adviser to Prime Minister Yitzhak Shamir, who said
“If left to its own Israel will have no choice but to fall back on a riskier defense which will endanger itself and the world at large… To enable Israel to abstain from dependence on nuclear arms calls for $2 to 3 billion per year in U.S. aid.”(31)
Since then Israel’s nuclear arsenal has expanded exponentially, both quantitatively and qualitatively, while the U.S. money spigots remain wide open.
Regional and International Implications
Largely unknown to the world, the Middle East nearly exploded in all out war on February 22, 2001. According to the London Sunday Times and DEBKAfile, Israel went on high missile alert after receiving news from the U.S. of movement by 6 Iraqi armored divisions stationed along the Syrian border, and of launch preparations of surface to surface missiles. DEBKAfile, an Israeli based “counter-terrorism” information service, claims that the Iraqi missiles were deliberately taken to the highest alert level in order to test the U.S. and Israeli response. Despite an immediate attack by 42 U.S. and British war planes, the Iraqis suffered little apparent damage.(32) The Israelis have warned Iraq that they are prepared to use neutron bombs in a preemptive attack against Iraqi missiles.
The Israeli nuclear arsenal has profound implications for the future of peace in the Middle East, and indeed, for the entire planet. It is clear from Israel Shahak that Israel has no interest in peace except that which is dictated on its own terms, and has absolutely no intention of negotiating in good faith to curtail its nuclear program or discuss seriously a nuclear-free Middle East,”Israel’s insistence on the independent use of its nuclear weapons can be seen as the foundation on which Israeli grand strategy rests.”(34) According to Seymour Hersh, “the size and sophistication of Israel’s nuclear arsenal allows men such as Ariel Sharon to dream of redrawing the map of the Middle East aided by the implicit threat of nuclear force.”(35) General Amnon Shahak-Lipkin, former Israeli Chief of Staff is quoted “It is never possible to talk to Iraq about no matter what; It is never possible to talk to Iran about no matter what. Certainly about nuclearization. With Syria we cannot really talk either.”(36) Ze’ev Shiff, an Israeli military expert writing in Haaretz said, “Whoever believes that Israel will ever sign the UN Convention prohibiting the proliferation of nuclear weapons… is day dreaming,”(37) and Munya Mardoch, Director of the Israeli Institute for the Development of Weaponry, said in 1994, “The moral and political meaning of nuclear weapons is that states which renounce their use are acquiescing to the status of Vassal states. All those states which feel satisfied with possessing conventional weapons alone are fated to become vassal states.”(38)
As Israeli society becomes more and more polarized, the influence of the radical right becomes stronger. According to Shahak, “The prospect of Gush Emunim, or some secular right-wing Israeli fanatics, or some some of the delerious Israeli Army generals, seizing control of Israeli nuclear weapons…cannot be precluded. … while israeli jewish society undergoes a steady polarization, the Israeli security system increasingly relies on the recruitment of cohorts from the ranks of the extreme right.”(39) The Arab states, long aware of Israel’s nuclear program, bitterly resent its coercive intent, and perceive its existence as the paramount threat to peace in the region, requiring their own weapons of mass destruction. During a future Middle Eastern war (a distinct possibility given the ascension of Ariel Sharon, an unindicted war criminal with a bloody record stretching from the massacre of Palestinian civilians at Quibya in 1953, to the massacre of Palestinian civilians at Sabra and Shatila in 1982 and beyond) the possible Israeli use of nuclear weapons should not be discounted. According to Shahak, “In Israeli terminology, the launching of missiles on to Israeli territory is regarded as ‘nonconventional’ regardless of whether they are equipped with explosives or poison gas.”(40) (Which requires a “nonconventional” response, a perhaps unique exception being the Iraqi SCUD attacks during the Gulf War.)
Meanwhile, the existence of an arsenal of mass destruction in such an unstable region in turn has serious implications for future arms control and disarmament negotiations, and even the threat of nuclear war. Seymour Hersh warns,
“Should war break out in the Middle East again,… or should any Arab nation fire missiles against Israel, as the Iraqis did, a nuclear escalation, once unthinkable except as a last resort, would now be a strong probability.”(41) and Ezar Weissman, Israel’s current President said “The nuclear issue is gaining momentum(and the) next war will not be conventional.”(42)
Russia and before it the Soviet Union has long been a major (if not the major) target of Israeli nukes. It is widely reported that the principal purpose of Jonathan Pollard’s spying for Israel was to furnish satellite images of Soviet targets and other super sensitive data relating to U.S. nuclear targeting strategy. (43) (Since launching its own satellite in 1988, Israel no longer needs U.S. spy secrets.) Israeli nukes aimed at the Russian heartland seriously complicate disarmament and arms control negotiations and, at the very least, the unilateral possession of nuclear weapons by Israel is enormously destabilizing, and dramatically lowers the threshold for their actual use, if not for all out nuclear war. In the words of Mark Gaffney, “… if the familar pattern (Israel refining its weapons of mass destruction with U.S. complicity) is not reversed soon- for whatever reason- the deepening Middle East conflict could trigger a world conflagration.” (44)
Many Middle East Peace activists have been reluctant to discuss, let alone challenge, the Israeli monopoly on nuclear weapons in the region, often leading to incomplete and uninformed analyses and flawed action strategies.
Placing the issue of Israeli weapons of mass destruction directly and honestly on the table and action agenda would have several salutary effects. First, it would expose a primary destabilizing dynamic driving the Middle East arms race and compelling the region’s states to each seek their own “deterrent.” Second, it would expose the grotesque double standard which sees the U.S. and Europe on the one hand condemning Iraq, Iran and Syria for developing weapons of mass destruction, while simultaneously protecting and enabling the principal culprit. Third, exposing Israel’s nuclear strategy would focus international public attention, resulting in increased pressure to dismantle its weapons of mass destruction and negotiate a just peace in good faith. Finally, a nuclear free Israel would make a Nuclear Free Middle East and a comprehensive regional peace agreement much more likely. Unless and until the world community confronts Israel over its covert nuclear program it is unlikely that there will be any meaningful resolution of the Israeli/Arab conflict, a fact that Israel may be counting on as the Sharon era dawns.
1. Seymour Hersh, The Samson Option: Israel’s Nuclear Arsenal and American Foreign Policy, New York,1991, Random House, p. 319 (A brilliant and prophetic work with much original research)2
2. Mark Gaffney, Dimona, The Third Temple:The Story Behind the Vanunu Revelation, Brattleboro, VT, 1989, Amana Books, p. 165 (Excellent progressive analysis of the Israeli nuclear program)
3. U.S. Army Lt. Col. Warner D. Farr, The Third Temple Holy of Holies; Israel’s Nuclear Weapons, USAF Counterproliferation Center, Air War College Sept 1999 <www.fas.org/nuke/guide/israel/nuke/farr,htm (Perhaps the best single condensed history of the Israeli nuclear program)
4. Hersch, op.cit., p. 131
5. Gaffney, op.cit., p. 63
6. Gaffney, op. cit. pp 68 – 69
7. Hersh, op.cit., pp. 242-257
8. Gaffney, op.cit., 1989, pps. 65-66 (An alternative discussion of the NUMEC affair)
9. Barbara Rogers & Zdenek Cervenka, The Nuclear Axis: The Secret Collaboration Between West Germany and South Africa, New York, 1978, Times Books, p. 325-328 (the definitive history of the Apartheid Bomb)
10. Gaffney, op. cit., 1989, p. 34
11. Peter Hounam, Woman From Mossad: The Torment of Mordechai Vanunu, London, 1999, Vision Paperbacks, pp. 155-168 (The most complete and up to date account of the Vanunu story, it includes fascenating speculation that Israel may have a second hidden Dimona type reactor)
12. Hersh, op. cit., 1989, p. 213
13. ibid, p.198-200
14. ibid, pp. 3-17
15. Hounman, op. cit. 1999, pp 189-203
16. Hersh, 1989. pp.199-200
17. ibid, p. 312
18. John Pike and Federation of American Scientists, Israel Special Weapons Guide Website, 2001, Web Address http://www.fas.org/nuke/guide/israel/index.html (An invaluable internet resource)
19. Usi Mahnaimi and Peter Conradi, Fears of New Arms Race as Israel Tests Cruise Missiles, June 18, 2000, London Sunday Times
20. Usi Mahnaimi, Israeli Jets Equipped for Chemical Warfare October 4, 1998, London Sunday Times
21. Usi Mahnaimi and Marie Colvin, Israel Planning “Ethnic” bomb as Saddam Caves In, November 15, 1998, London Sunday Times
22. Hersh, op.cit., 1991, p. 319
23. Gaffney, op.cit., 1989, p. 163
24. Israel Shahak, Open Secrets: Israeli Nuclear and Foreign Policies, London, 1997,Pluto Press, p. 40 (An absolute “must read” for any Middle East or anti-nuclear activist)
25 ibid, p.2
26. ibid, p.43
27. Gaffney, op.cit., 1989, p 131
28. “Israel & the US: From Dependence to Nuclear Weapons?” Robert W. Tucker, Novenber 1975 pp41-42
29. London Sunday Times, October 12, 1986
30. Gaffney, op. cit. 1989. p. 147
31. ibid, p. 153
32. DEBKAfile, February 23, 2001 WWW.debka.com
33. Uzi Mahnaimi and Tom Walker, London Sunday Times, February 25, 2001
34. Shahak, op. cit., p150
35. Hersh, op.cit., p. 319
36. Shahak, op. cit., p34
37. ibid, p. 149
38. ibid, p. 153
39. ibid, pp. 37-38
40. ibid, pp 39-40
41. Hersh, op. cit., p. 19
42. Aronson, Geoffrey, “Hidden Agenda: US-Israeli Relations and the Nuclear Question,” Middle East Journal, (Autumn 1992), 619-630.
43 . Hersh, op. cit., pp. 285-305
44. Gaffney, op. cit., p194
IF YOU DON’T WANT TO KNOW how sausages are made, don’t start reading Visas for Al Qaeda: CIA Handouts That Rocked the World by Michael Springmann. The sausages in this case: the string of too-easily-swallowed accounts of bloody events in the “global war on terror,” served up daily with relish by the mainstream media. In reality these sausages are filled with tainted meat that’s making everyone sick.
Springmann is a brave whistle blower living in Washington, D.C. He’s written an accessible book, safe to digest, highlighting details of the corruption of the American Empire (and its accomplices, including Canada) as he experienced them from the inside during his years with the U.S. State Department.
While he served as a visa officer in the U.S. consulate in Jeddah, Saudi Arabia, for instance, he was obliged under threat of dismissal to issue visas to persons hired clandestinely by the CIA to become trained-in-the-USA terrorists. Most of these psychopathic thugs were clearly and legally unqualified to be issued visas. There is every reason to believe the “Visas for Terrorists” program remains fully operative today. It takes a lot of expendable terrorists to run a global terrorism op.
Springmann places his experiences both within the context of the historical roots of the U.S. Empire and within its current ongoing global destabilization project.
“This tale,” the author states near the beginning, “is a sordid sketch of backstabbing, disloyalty, double crosses, faithlessness, falsity, perfidy, sellouts, treachery, and betrayal.”
And that only covers the bureaucratic aspect. Even more sobering is his sketch of human rights violations: torture, assassinations, massacres including bombings of markets, invasions and occupations of countries, destabilization of nations and regions.
Then there’s the financial side: widespread criminality, resource theft, bribery, diversion of funds, illicit drug dealing and more.
Not to mention the flouting of international laws. This dimension includes gross infringements on national sovereignty, the casual violation of treaties and ho-hum everyday general lawlessness, risking even the threat of nuclear annihilation.
All this before taking into account the moral dimension, in which trashing the Ten Commandments is just an opening trifle.
“My story shows how things really work,” Springmann writes, correctly. In the book’s 250 pages he names names, dates, times and places – presumably opening himself up to lawsuits, should there be anything here that the individuals named deem libelous. They might think twice, however, since Springmann is a lawyer by profession and knows his way around the Empire’s capital – as well as some of its outlying ramparts such as Stuttgart, New Delhi and especially Jeddah.
Stinging in itself, Springmann’s book also can be read as an authenticating companion to Michel Chossudovsky’s Towards a World War III Scenario (2012) and The Globalization of War: America’s “Long War” Against Humanity (2015). Along the way, both authors deal, to one extent or another, with the ideological, hubristic and increasingly bellicose role of the Harper government as handmaiden to the American Empire, including military involvements in Libya, Serbia and the Ukraine. Springmann necessarily refers very little to Canada, but to read his account of the cowardly and unnecessary rain of death inflicted on Libya, for instance, is to be obliged as a Canadian to think of Harper’s enthusiasm and pride in having this country share in the slaughter and destabilization carried out under the Orwellian “responsibility to protect” notion.
Springmann quotes Maximilian C. Forte who notes that before the attack Libya enjoyed the highest Human Development Index (a UN measurement of well-being) in all Africa. “After Western military forces destroyed the country the Index only records the steep collapse of all indicators of well-being. More Libyans were killed with intervention than without. It was about control, about militarizing Africa,” Forte argues.
What Springmann brings uniquely to the table is his firsthand knowledge of precisely how the USA recruits terrorists (no quotation marks needed), sends them to the USA for training and then deploys them to carry out murders, torture, bombings and more. The bloody mayhem carried out by these thousands of paid mercenaries – ostensibly beheading-habituated “jihadists” fighting against democracy, decency and the USA and its “allies – is planned, organized and funded by none other than the same USA and its allies. It’s a global false flag operation – the largest by far in history.
As Springmann on page 65 writes of the “Visas for Terrorists Program:”
This was not an ad hoc operation, conceived and carried out in response to a specific foreign policy issue. Rather, it was another of too many CIA efforts to destroy governments, countries, and politicians disfavored by the American “establishment” in its “bipartisan” approach to matters abroad. Whether it was opposing the imaginary evils of communism, the fictitious malevolence of Islam, or the invented wickedness of Iran, America and its intelligence services, brave defenders of “The City Upon A Hill,” sought out and created fear and loathing of peoples and countries essentially engaged in efforts to better their lives and improve their political world. Along the way, Agency-sponsored murders, war crimes, and human rights violations proved to be good business. Jobs for the Clandestine Service (people who recruit and run spies), sales of weapons and aircraft, as well as the myriad items needed to control banks, countries and peoples all provided income for and benefits to American companies.
That the American Empire has been able to carry out such a massive illegal program for so long is the saddest of commentaries on how deep the rot is, how effective the secrecy, how complicit the media.
As to the span of dangerous widespread deception, Springmann notes that Rahul Bedi wrote in Jane’s Defence Weekly on September 14, 2001 that beginning in 1980 “thousands [of mujahideen] were … brought to America and made competent in terrorism by Green Berets and SEALS at US government East Coast facilities, trained in guerilla warfare and armed with sophisticated weapons.”
The point is made repeatedly that Al Qaeda and now ISIS/ISIL/the Islamic State are essentially “Made in USA” entities, brought into being and organized for the Empire’s purposes. Among the elements that make possible such a vast fraud are deception, compartmentalization and secrecy. Springmann quotes attorney Pat Frascogna, “a man with FOIA expertise,” about secrecy and its purpose:
Thus whether it be learning the dirty and unethical business practices of a company or the secrets of our government, the same deployment of denials and feigning ignorance about what is really going on are the all-too-common methods used to keep the truth from the light of day.
Langley recruited the Arab-Afghans so clandestinely that the terrorists didn’t know they had been recruited. They thought that they had found a battlefield on their own, or through the Internet or through Twitter or through television…
Frascogna’s observation intersects with Springmann’s on-the-job experiences as a visa officer in Jeddah starting in 1987. Springmann was repeatedly overruled when he turned down disqualified applicants for U.S. visas. He writes:
As I later learned to my dismay, the visa applicants were recruits for the war in Afghanistan against the Soviet Union’s armed forces. Further, as time went by, the fighters, trained in the United States, went on to other battlefields: Yugoslavia, Iraq, Libya, and Syria. They worked with the American intelligence services and the State Department to destabilize governments the United States opposed. While it’s no secret, most knowledgeable people still refuse to talk about this agenda.
As Springmann learned, “the average percentage of intelligence officers to real diplomats at a given Foreign Service post is about one in three. My experience in Jeddah, Stuttgart, and New Delhi might place it higher—at least 50 percent, if not more.” According to the Anti-CIA Club of Diplomats: Spooks in U.S. Foreign Service [sic], a twelve-page, 1983 Canadian publication (see namebase.org), the percentage is 60 percent.
“At Jeddah,” Springmann writes, “to the best of my knowledge, out of some twenty US citizens assigned to the consulate, only three people, including myself, worked for the Department of State. The rest were CIA or NSA officials or their spouses.” Elsewhere Springmann suggests that essentially the CIA runs the State Department, and that this is true of many other U.S. government departments and agencies as well. It seems that it’s almost impossible to over-estimate the reach of the CIA’s tentacles or the overweening treason of its nonstop black ops and unconstitutional operations domestically.
Springmann toward the end of the book refers to the beginnings of the CIA. It’s interesting for this reviewer to think that he was 13 years of age in 1947 when U.S. president Harry Truman agreed with the National Security Council (NSC) to secretly create the CIA and NSA. I remember that in my teenage years a few of my peers said there “was something” called “the CIA.” This was around the time a few people also said there “was something” called “the Mafia.” The consensus was that both ideas were very far-fetched.
In 1948 Truman approved yet another NSC initiative, providing for “propaganda, economic warfare; preventive direct action, including sabotage, antisabotage,
demolition and evacuation measures; subversion against hostile states, including assistance to underground resistance movements, guerillas, and refugee liberation groups, and support of indigenous anti-Communist elements in threatened countries of the free world.” That’s a tabula rasa if there ever was one: a license for lawlessness.
The CIA’s twisted hits have just kept coming. It’s worth noting that Truman didn’t singlehandedly initiate this monstrosity. The dark recesses of the Deep State, as Peter Dale Scott calls it, are where the demonic entity was spawned. Ever since, Frankenstein’s monster has been a harmless schoolboy by comparison.
To read of the rape of Libya with active Canadian military complicity makes for difficult reading. The lies are piled as high as the bodies, and these two categories are insuperably paired.
Equally sordid, especially in light of Stephen Harper’s enthusiasm for expanding the war on Russia (the economic sanctions and the diplomatic exclusion of Russia from the G8 are forms of warfare, not to mention decades of covert* military incursion by the West onto the territory of the former USSR and now the Russian Federation, as described in Visas for Al Qaeda) is to read some of the history of the Ukraine. “The West’s” meddling in the Ukraine has a long illicit pedigree. As Springmann writes:
It seems that the CIA had problems [in the immediate post World War II period] distinguishing between underground groups and above-ground armies. Langley used Marshall Plan money to support a guerrilla force in the Ukraine, called “Nightingale.” Originally established in 1941 by Nazi Germany’s occupation forces, and working on their behalf, “Nightingale” and its terrorist arm (made up of ultranationalist Ukrainians as well as Nazi collaborators) murdered thousands of Jews, Soviet Union supporters, and Poles.
Even relatively recently, since the so-called Orange revolution in the Ukraine made events there eminently newsworthy, I can’t remember seeing in the mainstream media a single substantial article dealing with the historical relationships between the Ukraine and Russia going back to World War II, nor such an article laying out the history of the involvement –overt or covert – of “the West” in the Ukraine.
Instead, we see the surreal ahistorical likes of the top headline in The New York Times International Weekly for June 13-14, “Russia is Sowing Disunity,” by Peter Baker and Steven Erlanger. They report breathlessly in the lead paragraph: “Moscow is leveraging its economic power, financing European political parties and movements, and spreading alternative accounts of the Ukraine conflict, according the American and European officials.
True to the narrative of “the West” as a pitiful giant facing a powerful and expansionist Russia, the writers posit that the “consensus against Russian aggression” is “fragile.
The drift of this NYT yarn, typical of Western propaganda across the board, is that there remains in effect a behemoth “Soviet empire” surreptitiously shipping “Moscow gold” to dupes in “green movements” and so on. Even a former American national intelligence officer on Russia, Fiona Hill, now at the Brookings Institution, told the writers: “The question is how much hard evidence does anyone have?
Maybe this NYT propaganda, like its clones across the mainstream media, is not ahistorical after all. The story comes across rather as an historical relic of the Cold War – found in a time capsule in a fallout shelter – that the NYT editors decided to publish as a prank. A sausage.
* Military action by “the West” has not always been covert. Springmann notes that American and Japanese soldiers were dispatched to Russia in 1917 to squelch the fledgling Russian revolution. The soldiers were part of what was called the Allied Expeditionary Force. Winston Churchill for his part said: “We must strangle the Bolshevik baby in its crib.” Springmann might have noted that Canadian soldiers were part of the AEF.
Does Ed Snowden Really Trust Apple?
In the wake of Congress passing the USA Freedom Act Ed Snowden composed an editorial piece that appeared in the New York Times. There are aspects of this article that may surprise those who’ve followed events since Snowden first went public two years back.
For example, Ed referred to the bill as a “historic victory” though there are skeptics in the peanut gallery like your author who would call it theater. That is, an attempt to codify otherwise expired measures which have been of little use according to their stated purpose. The USA Freedom Act provides the opportunity for elected officials in Washington to do a victory lap and boast that they’ve implemented restructuring while former American spies, with a knowing wink, understand that what’s actually been instituted is “hardly major change.”
Moving onward through his laudatory communiqué, Ed warns that hi tech companies “are being pressured by governments around the world to work against their customers rather than for them.” He opted not to say who was being leaned on.
But wait, he did mention a name. It’s just that, in this specific case, it was in the context of a product placement for one of the world’s largest technical companies. Here’s the excerpt:
“Basic technical safeguards such as encryption — once considered esoteric and unnecessary — are now enabled by default in the products of pioneering companies like Apple, ensuring that even if your phone is stolen, your private life remains private”
Let’s consider for a moment the underlying assumptions inherent to this narrative. The messaging scheme at work is one which allows business leaders to channel public outrage by depicting corporations as unwilling partners who’ve every intention of protecting the privacy of their users instead of knowingly cavort with spies.
CEO’s like Tim Cook have gone so far as to publicly scold their industry for monetizing user data. Specifically, in a speech delivered at an event hosted by the Electronic Privacy Information Center Cook stated:
“They’re [tech companies] gobbling up everything they can learn about you and trying to monetize it. We think that’s wrong. And it’s not the kind of company that Apple wants to be.”
Hold it right there.
Keep in mind that Apple is a colossal multinational company. It has no qualms about collecting information on users, using slave labor to save a buck, stockpiling profits overseas to avoid paying taxes, giving companies like Google unencumbered access to its user base, participating in a wage-fixing cartel, or cooperating with the NSA when executives (who chatted up spymasters on a first-name basis) thought that they could get away with it.
Can a profit-driven monolith like Apple be trusted to do the right thing when it’s just as easy to secretly continue doing otherwise? If we’ve learned anything from the Snowden revelations it’s that intelligence services exist primarily to pursue the interests of private capital. Why not have their cake and eat it too? Assuage the public with encryption marketing pitches and then bury their collusion even deeper. Issues like “trust” in the corridors of the C-suites are usually viewed as a mere public relations issue.
Apple wouldn’t lie to us again, right?
Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” and “Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs.
Director of the US spy agency CIA John Brennan has reportedly made a secret visit to Israel to brief the regime’s officials over the ongoing nuclear negotiations between Iran and the P5+1 states.
Brennan traveled to Israel on June 4 and met with high-ranking Israeli officials, including Prime Minister Benjamin Netanyahu and one of his advisers Yossi Cohen, to discuss the developments in the talks between Iran and the six world powers, Haaretz quoted two senior Israeli officials as saying on Tuesday.
The officials, who asked not to be named, said the CIA chief also held meetings with the head of Israel’s spy agency Mossad Tamir Pardo and the regime’s military intelligence chief Major General Herzl Halevi.
It is unclear whether Brennan conveyed a message from US President Barack Obama to Netanyahu about a possible comprehensive agreement over Tehran’s nuclear program.
The CIA has not yet commented on the report of Brennan’s trip.
Diplomatic efforts aimed at reaching a final agreement over Iran’s nuclear program have drawn angry reactions from Israel. The Tel Aviv regime has been lobbying intensely to thwart such a deal.
Brennan’s visit to Israel came at a sensitive juncture, less than a month ahead of the June 30 deadline set by Tehran and its negotiating sides to finalize a deal, which seeks to end the Western dispute over Tehran’s nuclear case.
A few days before his visit to Israel, Brennan told the US-based CBS network that Washington and Tel Aviv are closely cooperating on the issue of Iran’s nuclear negotiations.
“The CIA, NSA (the US National Security Agency) and other intelligence community entities are working very close with their Israeli … counterparts” regarding the talks, Brennan said.
Iran and the P5+1 states– Russia, China, France, Britain, the US and Germany — have been working on the text of the final deal since they reached mutual understanding on key parameters of such an accord in the Swiss city of Lausanne on April 2.
Russian Foreign Chief Sergey Lavrov has made remarks on the situation in Macedonia stressing the involvement of outside actors. According to him, there was a connection between the events in Macedonia “unfolding against the background of the Macedonian government’s refusal to join sanctions against Russia and an active support from Skopje for the plans to build the Turkish Stream pipeline, to which many in Brussels and across the Atlantic are opposed.”
An extremely nervous reaction followed betraying uneasy conscience. The West says another conflict is incited in the region and Russia is the one to blame. According to it, Moscow wants to partition Macedonia. This plan meets its great power ambitions. The statement by Russian Foreign Minister Sergey Lavrov that there was talk of dividing up Macedonia and giving parts to Bulgaria and Albania was “highly irresponsible,” Bulgarian Foreign Minister Daniel Mitov said adding that his country was not involved. Zoran Zaev, the political leader of the Social Democratic Union of Macedonia (SDSM) flatly refused the idea of partition or federalization. But nobody is going to take his opinion into account. Besides, Sergey Lavrov said the same thing. Lavrov’s statement did not contain direct accusations against the United States. For all that, US ambassador to Macedonia, Jess Baily, said the Russian Minister’s remarks were absurd and put the blame for the growing tensions on Moscow.
In reality, it’s all different. Foreign Minister Sergey Lavrov made his remarks during Government Hour at the Federation Council of the Federal Assembly, Moscow, May 20, 2015. The recording shows him saying the Macedonian events were influenced from outside. According to him, the outside interference pursues the goal of toppling Macedonian Prime Minister Nikola Gruevski to punish him for refusing to join the anti-Russian sanctions and the stated intent of Macedonia to become part of the Turkish Stream project with the pipeline going through the territory of the country. The Albanian factor has an important role to play here. There is enough evidence to make many Western media outlets agree that these are the real reasons for deterioration of the situation in the Balkans.
Sergey Lavrov believes that the ideas to “federalize” Macedonia or turn it into a sort of “flexible federation” or “confederation” are fraught with danger. “The idea even has been expressed why not divide up (what is) an artificially-established state – to give part to Bulgaria, and some to Albania”, Lavrov said, going on to say that the Albanian prime minister spoke of “Greater Albania.” The Russian Foreign Minister made his remarks against the background of European policy. For instance, the European Union has already insisted on giving Albanians the rights that Russian minorities in other states are deprived of. According to Lavrov, “…in our discussions with the EU, we raised the issue of rights of Russians and Russian-speaking people in Estonia and Latvia, we asked, “Why did you support the Ohrid Agreement and provide Albanians in Macedonia with a substantial scope of rights but you can’t do the same for Russians in Estonia and Latvia?” There was no answer. However, the conflict in Macedonia was settled at the time. The Russian Minister said that “without reference to Macedonia, the Prime Minister in Tirana is generally declaring slogans of Greater Albania.” Is it not enough to admit the existence of plans to divide Macedonia?
Obviously their implementation would also entail the partition of neighboring Serbia and Montenegro. There was no response from Brussels and Washington on the statement of Albanian Prime Minister Edi Rama about Greater Albania, no matter it was explosive enough being done at the time of acute crisis in a neighboring country. The European Union and the United States have no objections. The West openly displays its permissive parenting attitude towards Albanian politicians who are forgiven anything they say or do. How can this approach be explained? Is it part of the West’s traditional policy aimed at dividing Slav people?
The Albanian Mafia, especially those who come from Kosovo, have been in control of European drug trafficking for several years. Where has money gone? With the FIFA scandal in full swing, wouldn’t it be expedient to check the activities of Western structures responsible for Balkans policy? I’m sure that a lot of interesting facts would surface.
Families of the terrorists arrested in the Macedonian town of Kumanovo organized protests in front of the government of Kosovo in Pristina asking for their relatives to be released from arrest in Macedonia. They complained about “harsh treatment of prisoners.” It proves the fact that the militants were not Macedonians. They came from Kosovo. Macedonia handed over to Pristina the bodies of nine ethnic-Albanian gunmen killed in clashes with police earlier this month. The procession carrying nine metal coffins was honored in silence by hundreds of Kosovars holding national flags. Many high standing officials attended the funeral, including the members of parliament. No reaction followed from the West. The same way the statement of Edi Rama was not condemned by either the government of Bulgaria, nor the Macedonian opposition led by Zaev. But it’s not Lavrov who actually calls for the partition of Macedonia, but the Albanian Prime Minister. The Russian Minister plainly spoke against the idea to divide the country. How can the West prove it its opposition to such plans?
A lot of sinister things take place behind the scenes in the Macedonian scenario. The West, Bulgaria and the Macedonian opposition join in chorus to affirm that the incumbent Macedonian Prime Minister Nikola Gruevski was behind the actions of Albanian terrorists invading the territory of Macedonia near Kumanovo. According to them, it was done to take the people’s attention away from internal problems. The Kosovo news agency KOHA is normally cited as the information source, no matter it failed to come up with anything like solid evidence to support the version that sounds rather strange. Nobody cares much about evidence in the conditions of ongoing hybrid war. For all that, experts pay attention to the fact that the terrorist group routed in Kumanovo was formed in the municipality of Vitino (Kosovo) near the US military base Bondstill. There is no way that 80 armed men coul pass by the facility unnoticed with all the detection means used by the US military to provide surveillance in the area.
Misha Jurkovic of Institute for European Studies, Belgrade, says there have been “orange revolutions” style coup attempts staged in 30 countries during the recent 15 years.
It all started with protests organized by the Serbian youth resistance movement Otpor. Its leaders, Slobodan Đinović and Srđa Popović, became professional international revolutionaries. Paid by the US, they move from one country to another organizing protest actions. Srđa Popović was seen in Skopje before the events in question. It should be noted that US Ambassador to Macedonia Jess Baily was Deputy Chief of Mission in Ankara at the time in which the US-supported the Taksim Square protests in an attempt to topple Recep Erdogan. Who else can do a better job opposing the plans to build the Turkish Stream across the Balkans? It’s not a coincidence that Baily came out in support of protesters as soon as they hit the streets of Skopje. He is dry behind the ears in making “popular” protest movements look right in the eyes of the public.
The Macedonian opposition has a powerful sponsor lending a helping hand. Suffice it to remember the 6-months-old wire-tap scandal sparked by revelations that came to light thanks to the efforts undertaken by patriots. An almost surreal scandal involving 700 thousands of secretly recorded conversations caught top government officials discussing everything from rigging votes to covering up killings. Opposition Social Democrat leader Zoran Zaev said the tapes were made illegally by the government as part of mass surveillance operation targeting 20,000 allies and opponents alike. They were leaked to him by a whistleblower. With so many recorded conversations everyone is free to make guesses and conclusions to his heart’s content. The government is accused of illegal spying against opposition. But total control over the government is a real tall order. One can hardly imagine anybody in Macedonia being equal to the task. Willy-nilly one gets the impression that the powerful US National Security Agency with the spying capabilities provided by PRISM program (a clandestine surveillance program under which the United States National Security Agency (NSA) collects internet communications of foreign nationals) has a hand in it. Perhaps, the Agency decided that the time is right to forget the damage inflicted by Edward Snowden, an American computer professional who leaked classified information from the National Security Agency, and put to good use the information gathering capabilities acquired by NSA at huge expense. There is solid ground to believe that that the National Security Agency acted together with the Bundesnachrichtendienst or BND (German Federal Intelligence Service directly subordinated to the Chancellor’s Office) to make amends for US spying on German politicians.
Nikola Gruevski knows exactly what Macedonian national intelligence can do. According to him, there is no room for doubt that the recordings were given to the opposition by “a foreign intelligence agency.” Zoran Zaev, the opposition leader, often says that the Prime Minister is not a patriot because he has discussed with his accomplices the possibility ceding to Western pressure and renaming the Republic of Macedonia the “Upper Republic of Macedonia” or the “Northern Republic of Macedonia.” Athens is adamant in its insistence on the name change. Citing historical and territorial concerns resulting from the ambiguity between the Republic of Macedonia, the adjacent Greek region of Macedonia and the ancient Greek kingdom of Macedonia which falls mostly within Greek Macedonia, Greece opposes the use of the name “Macedonia” by the Republic of Macedonia without a geographical qualifier, supporting a compound name such as “Northern Macedonia” for use by all and for all purposes. Until now Greece has been hindering the process of Macedonia’s membership in international organizations. The recorded text that became public domain testifies to the fact that Gruevski has been informed about ideas initiated from outside, but he never supported them and expressed doubts it would be acceptable to the people of the country. It proves that all accusations against him hold no water.
According to recent news from Skopje, Nikola Gruevski said he would join the Turkish Stream and let it pass across the country’s territory only on the condition the plan is approved by European Commission. As soon as he said that, the criticism against him began to die down. EU Commissioner for Regional Policy Johannes Hahn is expected to visit the country on June 1. Together with US Ambassador Jess Baily (his participation gives an idea of who in reality controls the situation) they will try to act as intermediaries in an effort to make peace between the government and the opposition. The whole country was brought to the verge of civil war and dozens of people were sacrificed to serve mercantile interests.
“The ultimate goal of the NSA is total population control.”—William Binney, NSA whistleblower
We now have a fourth branch of government.
As I document in my new book Battlefield America: The War on the American People, this fourth branch came into being without any electoral mandate or constitutional referendum, and yet it possesses superpowers, above and beyond those of any other government agency save the military. It is all-knowing, all-seeing and all-powerful. It operates beyond the reach of the president, Congress and the courts, and it marches in lockstep with the corporate elite who really call the shots in Washington, DC.
You might know this branch of government as Surveillance, but I prefer “technotyranny,” a term coined by investigative journalist James Bamford to refer to an age of technological tyranny made possible by government secrets, government lies, government spies and their corporate ties.
Beware of what you say, what you read, what you write, where you go, and with whom you communicate, because it will all be recorded, stored and used against you eventually, at a time and place of the government’s choosing. Privacy, as we have known it, is dead.
The police state is about to pass off the baton to the surveillance state.
Having already transformed local police into extensions of the military, the Department of Homeland Security, the Justice Department and the FBI are preparing to turn the nation’s soldier cops into techno-warriors, complete with iris scanners, body scanners, thermal imaging Doppler radar devices, facial recognition programs, license plate readers, cell phone Stingray devices and so much more.
This is about to be the new face of policing in America.
The National Security Agency (NSA) has been a perfect red herring, distracting us from the government’s broader, technology-driven campaign to render us helpless in the face of its prying eyes. In fact, long before the NSA became the agency we loved to hate, the Justice Department, the FBI, and the Drug Enforcement Administration were carrying out their own secret mass surveillance on an unsuspecting populace.
Just about every branch of the government—from the Postal Service to the Treasury Department and every agency in between—now has its own surveillance sector, authorized to spy on the American people. Then there are the fusion and counterterrorism centers that gather all of the data from the smaller government spies—the police, public health officials, transportation, etc.—and make it accessible for all those in power. And of course that doesn’t even begin to touch on the complicity of the corporate sector, which buys and sells us from cradle to grave, until we have no more data left to mine.
The raging debate over the fate of the NSA’s blatantly unconstitutional, illegal and ongoing domestic surveillance programs is just so much noise, what Shakespeare referred to as “sound and fury, signifying nothing.”
It means nothing: the legislation, the revelations, the task forces, and the filibusters.
The government is not giving up, nor is it giving in. It has stopped listening to us. It has long since ceased to take orders from “we the people.”
If you haven’t figured it out yet, none of it—the military drills, the surveillance, the militarized police, the strip searches, the random pat downs, the stop-and-frisks, even the police-worn body cameras—is about fighting terrorism. It’s about controlling the populace.
Despite the fact that its data snooping has been shown to be ineffective at detecting, let alone stopping, any actual terror attacks, the NSA continues to operate largely in secret, carrying out warrantless mass surveillance on hundreds of millions of Americans’ phone calls, emails, text messages and the like, beyond the scrutiny of most of Congress and the taxpayers who are forced to fund its multi-billion dollar secret black ops budget.
Legislation such as the USA Patriot Act serves only to legitimize the actions of a secret agency run by a shadow government. Even the proposed and ultimately defeated USA Freedom Act, which purported to restrict the reach of the NSA’s phone surveillance program—at least on paper—by requiring the agency to secure a warrant before surveillance could be carried out on American citizens and prohibiting the agency from storing any data collected on Americans, amounted to little more than a paper tiger: threatening in appearance, but lacking any real bite.
The question of how to deal with the NSA—an agency that operates outside of the system of checks and balances established by the Constitution—is a divisive issue that polarizes even those who have opposed the NSA’s warrantless surveillance from the get-go, forcing all of us—cynics, idealists, politicians and realists alike—to grapple with a deeply unsatisfactory and dubious political “solution” to a problem that operates beyond the reach of voters and politicians: how do you trust a government that lies, cheats, steals, sidesteps the law, and then absolves itself of wrongdoing to actually obey the law?
Since its official start in 1952, when President Harry S. Truman issued a secret executive order establishing the NSA as the hub of the government’s foreign intelligence activities, the agency—nicknamed “No Such Agency”—has operated covertly, unaccountable to Congress all the while using taxpayer dollars to fund its secret operations. It was only when the agency ballooned to 90,000 employees in 1969, making it the largest intelligence agency in the world with a significant footprint outside Washington, DC, that it became more difficult to deny its existence.
In the aftermath of Watergate in 1975, the Senate held meetings under the Church Committee in order to determine exactly what sorts of illicit activities the American intelligence apparatus was engaged in under the direction of President Nixon, and how future violations of the law could be stopped. It was the first time the NSA was exposed to public scrutiny since its creation.
The investigation revealed a sophisticated operation whose surveillance programs paid little heed to such things as the Constitution. For instance, under Project SHAMROCK, the NSA spied on telegrams to and from the U.S., as well as the correspondence of American citizens. Moreover, as the Saturday Evening Post reports, “Under Project MINARET, the NSA monitored the communications of civil rights leaders and opponents of the Vietnam War, including targets such as Martin Luther King, Jr., Mohammed Ali, Jane Fonda, and two active U.S. Senators. The NSA had launched this program in 1967 to monitor suspected terrorists and drug traffickers, but successive presidents used it to track all manner of political dissidents.”
Senator Frank Church (D-Ida.), who served as the chairman of the Select Committee on Intelligence that investigated the NSA, understood only too well the dangers inherent in allowing the government to overstep its authority in the name of national security. Church recognized that such surveillance powers “at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide.”
Noting that the NSA could enable a dictator “to impose total tyranny” upon an utterly defenseless American public, Church declared that he did not “want to see this country ever go across the bridge” of constitutional protection, congressional oversight and popular demand for privacy. He avowed that “we,” implicating both Congress and its constituency in this duty, “must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.”
The result was the passage of the Foreign Intelligence Surveillance Act (FISA), and the creation of the FISA Court, which was supposed to oversee and correct how intelligence information is collected and collated. The law requires that the NSA get clearance from the FISA Court, a secret surveillance court, before it can carry out surveillance on American citizens. Fast forward to the present day, and the so-called solution to the problem of government entities engaging in unjustified and illegal surveillance—the FISA Court—has unwittingly become the enabler of such activities, rubberstamping almost every warrant request submitted to it.
The 9/11 attacks served as a watershed moment in our nation’s history, ushering in an era in which immoral and/or illegal government activities such as surveillance, torture, strip searches, SWAT team raids are sanctioned as part of the quest to keep us “safe.”
In the wake of the 9/11 attacks, George W. Bush secretly authorized the NSA to conduct warrantless surveillance on Americans’ phone calls and emails. That wireless wiretap program was reportedly ended in 2007 after the New York Times reported on it, to mass indignation.
Nothing changed under Barack Obama. In fact, the violations worsened, with the NSA authorized to secretly collect internet and telephone data on millions of Americans, as well as on foreign governments.
It was only after whistleblower Edward Snowden’s revelations in 2013 that the American people fully understood the extent to which they had been betrayed once again.
What this brief history of the NSA makes clear is that you cannot reform the NSA.
As long as the government is allowed to make a mockery of the law—be it the Constitution, the FISA Act or any other law intended to limit its reach and curtail its activities—and is permitted to operate behind closed doors, relying on secret courts, secret budgets and secret interpretations of the laws of the land, there will be no reform.
Presidents, politicians, and court rulings have come and gone over the course of the NSA’s 60-year history, but none of them have done much to put an end to the NSA’s “technotyranny.”
The beast has outgrown its chains. It will not be restrained.
The growing tension seen and felt throughout the country is a tension between those who wield power on behalf of the government—the president, Congress, the courts, the military, the militarized police, the technocrats, the faceless unelected bureaucrats who blindly obey and carry out government directives, no matter how immoral or unjust, and the corporations—and those among the populace who are finally waking up to the mounting injustices, seething corruption and endless tyrannies that are transforming our country into a technocrized police state.
At every turn, we have been handicapped in our quest for transparency, accountability and a representative democracy by an establishment culture of secrecy: secret agencies, secret experiments, secret military bases, secret surveillance, secret budgets, and secret court rulings, all of which exist beyond our reach, operate outside our knowledge, and do not answer to “we the people.”
What we have failed to truly comprehend is that the NSA is merely one small part of a shadowy permanent government comprised of unelected bureaucrats who march in lockstep with profit-driven corporations that actually runs Washington, DC, and works to keep us under surveillance and, thus, under control. For example, Google openly works with the NSA, Amazon has built a massive $600 million intelligence database for the CIA, and the telecommunications industry is making a fat profit by spying on us for the government.
In other words, Corporate America is making a hefty profit by aiding and abetting the government in its domestic surveillance efforts. Conveniently, as the Intercept recently revealed, many of the NSA’s loudest defenders have financial ties to NSA contractors.
Thus, if this secret regime not only exists but thrives, it is because we have allowed it through our ignorance, apathy and naïve trust in politicians who take their orders from Corporate America rather than the Constitution.
If this shadow government persists, it is because we have yet to get outraged enough to push back against its power grabs and put an end to its high-handed tactics.
And if this unelected bureaucracy succeeds in trampling underfoot our last vestiges of privacy and freedom, it will be because we let ourselves be fooled into believing that politics matters, that voting makes a difference, that politicians actually represent the citizenry, that the courts care about justice, and that everything that is being done is in our best interests.
Indeed, as political scientist Michael J. Glennon warns, you can vote all you want, but the people you elect aren’t actually the ones calling the shots. “The American people are deluded … that the institutions that provide the public face actually set American national security policy,” stated Glennon. “They believe that when they vote for a president or member of Congress or succeed in bringing a case before the courts, that policy is going to change. But … policy by and large in the national security realm is made by the concealed institutions.”
In other words, it doesn’t matter who occupies the White House: the secret government with its secret agencies, secret budgets and secret programs won’t change. It will simply continue to operate in secret until some whistleblower comes along to momentarily pull back the curtain and we dutifully—and fleetingly—play the part of the outraged public, demanding accountability and rattling our cages, all the while bringing about little real reform.
Thus, the lesson of the NSA and its vast network of domestic spy partners is simply this: once you allow the government to start breaking the law, no matter how seemingly justifiable the reason, you relinquish the contract between you and the government which establishes that the government works for and obeys you, the citizen—the employer—the master.
Once the government starts operating outside the law, answerable to no one but itself, there’s no way to rein it back in, short of revolution. And by revolution, I mean doing away with the entire structure, because the corruption and lawlessness have become that pervasive.
Attorney General Loretta Lynch says that USA Patriot Act dragnet spy powers must be extended or else the terrorists will get us.
Lynch said Friday the country would be “less safe” if Congress fails to renew surveillance programs included in the Patriot Act.
Lynch joined other top Obama administration officials, who are urging the Senate to pass the USA Freedom Act, which would reform the National Security Agency’s (NSA) bulk phone records collection program while renewing other key parts of the post-Sept. 11 law.
“Our biggest fear is that we will lose important eyes on people who have made it clear that their mission is to harm American people here and abroad,” Lynch told CBS News in her first interview since becoming attorney general.
If NSA’s phone metadata program expires completely, Lynch said the U.S. government would lose “important tools” to identify terror threats.
“I think that we run the risk of essentially being less safe,” Lynch added. “I think that we lose the ability to intercept these communications, which have proven very important in cases that we have built in the past. And I am very concerned that the American people will be unprotected if this law expires.”
Lynch didn’t marshal any evidence to support her claims about the connection between dragnet spying and public safety. That’s because there isn’t one. Even the Department of Justice has acknowledged as much, writing in an Inspector General report that FBI agents interviewed couldn’t identify “any major case developments” tied to Section 215 of the Patriot Act, the provision the FBI claims enables dragnet spying.
Surveillance boosters have never been able to point to a circumstance—even one example—that proves dragnet surveillance is vital in stopping terrorism. Some insiders in the security state have observed that the bigger the haystack, the more difficult it is to successfully use intelligence information to identify and track threatening people. More information is not better. Better information is better, they say.
Loretta Lynch says she fears that if the Patriot Act isn’t reauthorized, “we will lose important eyes on people who have made it clear that their mission is to harm American people here and abroad.” That’s total nonsense. Anyone who “makes it clear” that they want to kill Americans is someone a judge would authorize targeted surveillance against. The government should leave the rest of us out of it.
Just about every recent terrorist attack on US and European soil has been committed by someone known to law enforcement. That’s true for the Garland, Texas shooter and for Tamerlan Tsarnaev, who blew up the Boston Marathon in April 2013. The government doesn’t need to spy on you and me in order to track people it already suspects of being up to no good.
You might be wondering: If dragnet spying doesn’t stop terrorism, and most terrorists are known to law enforcement, why do the FBI and the new Attorney General insist on renewing the Patriot Act’s worst provisions? It’s an important question, with a depressing answer.
The reason Lynch’s claims about dragnet spying don’t add up is because they are based on a perversion of the true purpose served by society wide surveillance. While the Patriot Act doesn’t stop terrorism, it’s quite good at enabling social and political control, and finding people who are vulnerable and may be easily coerced into becoming FBI informants.
If surveillance boosters were honest about why they want these powers, you might hear them talking less about terrorism and more about power. Add your voice: take action now to tell congress to reject dragnet surveillance.
Three provisions of the Patriot Act expire on June 1 and Senate Majority Leader Mitch McConnell is trying to delay taking action on the issue by calling for a two month or 5-year reauthorization of Section 215—the provision of the Patriot Act the NSA relies on to collect millions of Americans call records.
Before June 1 we expect to see plenty of fear-mongering from intelligence officials and national security hawks. Last year, the Wall Street Journal began the foray with an op-ed by Former NSA Director General Mike Hayden and former Attorney General Michael Mukasey—key architects of many of the NSA’s unlawful activities. This time, the mongering started with op-eds by John Yoo, Senator Marco Rubio, and Senator Tom Cotton.
Here are the top excuses officials will use to continue spying on Americans calling records and why they’re wrong:
Congress Needs Time to Debate
“I don’t know how we have the kind of fulsome debate that is going to be required on NSA without passing a temporary extension,” —Sen. John Cornyn
Congress has had two full years to publicly debate the NSA’s use of Section 215. Indeed, the debate has been vigorous and thoughtful. While Congress didn’t create a separate investigative committee, it was still able to hold over a dozen hearings where Section 215 was discussed. The hearings, which called upon officials like the Attorney General, Director of National Intelligence, and Director of the NSA, included hours of testimony on the programs, what they collect, and their effectiveness.
Congress has also debated Section 215 via Senator Patrick Leahy and Jim Sensenbrenner’s reform bill called the USA Freedom Act. Last year, the House passed a gutted bill of the USA Freedom Act, but debated the legislation for days. This year, the House debated a stronger version of the USA Freedom Act and passed it 338 to 88.
The Senate has also debated the legislation. Last year, after two days of debate, the Senate failed to advance a stronger version of the USA Freedom Act by two votes. Congress has had more than enough time to discuss these authorities and must act.
The Section 215 Program is Effective
“This has been a very important part of our effort to defend the homeland since 9/11.” —Sen. Majority Leader Mitch McConnell
There’s one problem: there’s no evidence to support that. Two independent commissions concluded the calling records program was not effective and has not been used to stop a terrorist attack. The first, called the President’s Review Group on Signals Intelligence, concluded “Our review suggests that the information contributed to terrorist investigations by the use of section 215 telephony meta-data was not essential to preventing attacks.”
Like the President’s Review Group, the Privacy and Civil Liberties Oversight Board also concluded:
Based on the information provided to the Board, including classified briefings and documentation, we have not identified a single instance involving a threat to the United States in which the program made a concrete difference in the outcome of a counterterrorism investigation. Moreover, we are aware of no instance in which the program directly contributed to the discovery of a previously unknown terrorist plot or the disruption of a terrorist attack.
The quotes speak for themselves.
Fixing Section 215 Puts the Nation at Risk
“[The USA Freedom Act] would be rolling [the nation] back to exactly where we were pre-9/11. —Sen. Richard Burr
The Attorney General, Director of National Intelligence, and House Intelligence Chair and Ranking Members do not think reforming the Section 215 program will harm national security. Attorneys General Eric Holder and Loretta Lynch and Director of National Intelligence James Clapper wrote letters (.pdf) to Congress noting that Section 215 reform would preserve both “vital national security authorities” and “essential Intelligence Community capabilities.”
The Program is “Lawful”
“Contrary to irresponsible rumors, the [bulk surveillance] program is lawful, carefully monitored, and protects personal privacy. The program does not conduct mass surveillance of American citizens—or any surveillance at all.” —Sen. Cotton and Rep. Mike Pompeo
Apparently, one of the “irresponsible rumors” Sen. Tom Cotton and Rep. Mike Pompeo reference is a decision by the Second Circuit Court of Appeals. (The circuit courts are the federal courts directly below the Supreme Court). The Second Circuit held that the NSA’s telephone records program went far beyond what Congress authorized when it passed Section 215 of the Patriot Act in 2001. The court rejected the government’s secret reinterpretation of Section 215 that has served as the basis for the telephone records collection program. The Second Circuit’s opinion stands as a clear sign that the courts are ready to step in and rule that mass surveillance is illegal.
In addition, the program is “surveillance.” As we’ve repeatedly said: the collection of metadata matters. It reveals a host of information and context about a person’s habits, traits, and beliefs. The Circuit Court opinion explained that metadata is often a proxy for the content of the communication, and that phone records can “reveal a startling amount of detailed information” about callers. The court also recognized that aggregation of calling records matters because collection of large amounts of metadata plus the application of sophisticated data processing technologies gives the government access to even more revealing portraits of individuals and groups.
Congress Must Say No to a Short-Term Reauthorization
In the next few days, Congress will begin to debate whether or not they should vote for a short-term reauthorization of Section 215. The answer is clearly no. Join us now in telling your lawmaker to vote against any short-term reauthorization.
This week the Sixth Circuit Court of Appeals ruled that the NSA’s metadata collection program was not authorized in US law. The PATRIOT Act, under which the program began, was too vague, the court found. But the truth is the Act was intended to be vague so that the government could interpret it in the broadest possible way.
But this is really more of a technicality, because illegality and unconstitutionality are really two very different things. Even if Congress had explicitly authorized the government to collect our phone records, that law would still be unconstitutional because the Constitution does not grant government the power to access our personal information without a valid search warrant.
Even though the court found the NSA program illegal, it did not demand that the government stop collecting our information in this manner. Instead, the court kicked the ball back in Congress’ court, as these provisions of the PATRIOT Act are set to expire at the end of the month and the Appeals Court decided to let Congress decide how to re-authorize this spying program.
Unfortunately, this is where there is not much to cheer. If past practice is any lesson, Congress will wait until the spying program is about to expire and then in a panic try to frighten Americans into accepting more intrusions on their privacy. Senate Majority Leader Mitch McConnell has already put forth a new bill as a stop-gap measure to allow time for a fuller debate on the issue. His stop-gap? A five year re-authorization with no changes to the current program!
The main reform bill being floated, the FREEDOM Act, is little better. Pretending to be a step in the right direction, the FREEDOM Act may actually be worse for our privacy and liberties than the PATRIOT Act!
One silver lining in the court decision is that it should exonerate Ed Snowden, who risked it all to expose what the courts have now found was illegal US government activity. That is the definition of a whistleblower. Shouldn’t he be welcomed back home as a hero instead of being threatened with treason charges? We shouldn’t hold our breath!
This week Snowden addressed a conference in Melbourne, Australia, informing citizens that the Australian government watches all its citizens “all the time.” Australia’s program allows the government to “collect everyone’s communications in advance of criminal suspicion,” he told the conference. That means the government is no longer in the business of prosecuting crimes, but instead is collecting information in case crimes someday occur.
How is it that the Australian government can collect and track “pre-crime” information on its citizens? Last month Australia passed a law requiring telecommunications companies to retain metadata information on their customers for two years.
Why do Australia’s oppressive laws matter to us? Because the NSA “reform” legislation before Congress, the FREEDOM Act, does exactly what the Australian law does: it mandates that US telecommunications companies retain their customers’ metadata information so that the NSA can access the information as it wishes.
Some argue that this metadata information is harmless and that civil libertarians are over-reacting. But, as Ed Snowden told the Melbourne conference, “under these mandatory metadata laws you can immediately see who journalists are contacting, from which you can derive who their sources are.”
This one example of what happens when the government forces corporations to assist it in spying on the people should be a red flag. How can an independent media exist in the US if the government knows exactly whom journalists contact for information? It would be the end of any future whistleblowers.
The only reform of the PATRIOT Act is a total repeal. Accept nothing less.
The intelligence sharing relationship between German and American spy agencies is one of dominance and blackmail rather than cooperation, with Germany’s BND acting as a “colony” used to help gather information for US authorities, German activist and publicist Christoph Horstel said.
There has been much speculation regarding the seemingly close relationship between German and US intelligence agencies in recent times, following German media reports alleging that Berlin’s foreign intelligence agency — the BND — spied on various European targets on behalf of America’s National Security Agency (NSA).
According to the reports, the NSA had been given access to the e-mails of various European politicians, EU institutions and European member state ministries.
This led many to suggest Germany was complicit with the US in operating an illegal global spy network. Chancellor Angela Merkel denied Germany was involved in illegal activity, telling journalists that it was essential for the BND to keep working with the NSA in order to ensure the safety of citizens.
‘A Big Show, A Big Farce’
However, Christoph Horstel believes that while Berlin does act on behalf of Washington’s intelligence agencies, he told Sputnik that the relationship is very one-sided.
“Well this is a big show, a big farce. All of the political insiders know what the real question is. The real question is that this is not cooperation; Germany is [a] colony.”
Horstel points out that the former US Office of Strategic Services (OSS) — which later become the CIA — established the German BND, and he believes it has been set up to look after Washington’s European interests.
“What we do have here, in fact, is a written understanding that the BND has to give — free of charge — any of the fruits of its work to the CIA. That is quite normal,” he said.
“The Americans are the masters of the game in Europe, so we [Germany] have to deliver to them. It’s a kind of service; a service of Germany to the US and we have to do that — that’s fact.”
German Officials ‘Blackmailed’ by US
Despite German Chancellor Angela Merkel fronting the media to deny accusations that she was in any way complicit in allowing American authorities to illegally spy on European firms, Horstel believes the chancellor would be well aware of what practices are going on.
“If she [Merkel] was not very deeply cooperating with the Americans, she would not be chancellor. We have a double system to ensure that we do exactly as Washington wants.
“What we have here is a very clear-cut system of blackmail against anyone in a high position — that’s number one,” he said, suggesting that US access to German security files allows American authorities to hold German politicians to ransom.
Meanwhile, Horstel also believes an inherent American influence on German politics and media means that governments in favor of US policy are also elected, and the media consistently follows American rhetoric on international issues, such as the crisis in Ukraine.
“Number two is that when it comes to elections, you will get into a powerful enough position to win unless the Americans are nodding their head. This also applies to the army ranks and the media ranks.
“This is why it’s important to note why the German media is so hostile to Russia. The Americans say it, and we [Germans] do it.”
Austria filed a formal complaint over suspicions that German and American intelligence agencies have spied on its authorities and firms, the Austrian interior minister said on Tuesday.
“Austria demands clarification,” Interior Minister Johanna Mikl-Leitner told Reuters, following German media reports about such activities. She added that Austria’s security authorities were in contact with their German counterparts.
“Today we have filed a legal complaint with the prosecutor’s office,” she said, “against an unknown entity due to secret intelligence services to Austria’s disadvantage.”
German media reports said the BND, Germany’s intelligence agency, used its Bad Aibling listening post in Bavaria to spy on the French presidential palace, French foreign ministry and European Commission.
The snooping was done at the behest of US spy agency National Security Agency (NSA), which also asked the BND to monitor European firms to check if they were breaking trade embargos, according to reports.
Mikl-Leitner said that while there is not yet concrete evidence, “it’s not far-fetched to suspect that Austria was also spied on.”
She added that Austria will try to resolve the situation through its security, diplomatic and judicial bodies.
The NSA is believed to have passed a list of some 800,000 IP addresses, phone numbers and email addresses to the BND for monitoring, some of which belonged to European politicians and companies.
Citing an unnamed source from the German parliamentary committee on the US spying agency, German newspaper Bild said Berlin chose to remain silent and close its eyes to the information in order to avoid “endangering cooperation” with Washington and the NSA.
German Interior Minister Thomas de Maiziere has denied reports that he was aware of the spying since at least 2008.
During a press briefing Monday, German Chancellor Angela Merkel said Berlin is engaged in consultations with Washington on the NSA’s surveillance practices.
“I think what’s important here is that friends do not spy on each other. The answer is that it should not be so,” Merkel said.
She continued: “We are at the disposal of respective parliamentary bodies. The chancellor’s office is ready to provide all necessary information. This process is already under way. We are also consulting the United States.”
Secret documents leaked in 2013 by former NSA contractor Edward Snowden showed that the US spy agency monitored Merkel’s personal cell phone too.
Apologists for the National Security Agency (NSA) point to the arrest of David Coleman Headley as an example of how warrantless mass surveillance is necessary to catch terrorists. Headley played a major role in the 2008 Mumbai terrorist attack that killed 166 people.
While few would argue that bringing someone like Headley to justice is not a good thing, Headley’s case in no way justifies mass surveillance. For one thing, there is no “terrorist” exception in the Fourth Amendment. Saying a good end (capturing terrorists) justifies a bad means (mass surveillance) gives the government a blank check to violate our liberties.
Even if the Headley case somehow justified overturning the Fourth Amendment, it still would not justify mass surveillance and bulk data collection. This is because, according to an investigation by ProPublica, NSA surveillance played an insignificant role in catching Headley. One former counter-terrorism official said when he heard that NSA surveillance was responsible for Headley’s capture he “was trying to figure out how NSA played a role.”
The Headley case is not the only evidence that the PATRIOT Act and other post-9/11 sacrifices of our liberty have not increased our security. For example, the NSA’s claim that its surveillance programs thwarted 54 terrorist attacks has been widely discredited. Even the president’s Review Group on Intelligence and Communications Technologies found that mass surveillance and bulk data collection was “not essential to preventing attacks.”
According to the congressional Joint Inquiry into Intelligence Activities before and after the Terrorist Attacks of September 11, 2001 and the 9/11 Commission, the powers granted the NSA by the PATRIOT Act would not have prevented the 9/11 attacks. Many intelligence experts have pointed out that, by increasing the size of the haystack government agencies must look through, mass surveillance makes it harder to find the needle of legitimate threats.
Even though mass surveillance threatens our liberty, violates the Constitution, and does nothing to protect us from terrorism, many in Congress still cling to the fiction that the only way to ensure security is to give the government virtually unlimited spying powers. These supporters of the surveillance state are desperate to extend the provisions of the PATRIOT Act that are set to expire at the end of the month. They are particularly eager to preserve Section 215, which authorizes many of the most egregious violations of our liberties, including the NSA’s “metadata” program.
However, Edward Snowden’s revelations have galvanized opposition to the NSA’s ongoing violations of our liberties. This is why Congress will soon vote on the USA FREEDOM Act. This bill extends the expiring surveillance laws. It also contains some “reforms” that supposedly address all the legitimate concerns regarding mass surveillance.
However, a look at the USA FREEDOM Act’s details, as opposed to the press releases of its supporters, shows that the act leaves the government’s mass surveillance powers virtually untouched.
The USA FREEDOM Act has about as much to do with freedom as the PATRIOT Act had to do with patriotism. If Congress truly wanted to protect our liberties it would pass the Surveillance State Repeal Act, which repeals the PATRIOT Act. Congress should also reverse the interventionist foreign policy that increases the risk of terrorism by fostering resentment and hatred of Americans.
Fourteen years after the PATRIOT Act was rushed into law, it is clear that sacrificing liberty does little or nothing to preserve security. Instead of trying to fool the American people with phony reforms, Congress should repeal all laws that violate the Fourth Amendment, starting with the PATRIOT Act.