Aletho News

ΑΛΗΘΩΣ

Whistle blower reveals secret U.S. program to recruit, train, and provide visas to ‘terrorists’

By Barrie Zwicker | Truth and Shadows | June 19, 2015

springmann-coverIF YOU DON’T WANT TO KNOW how sausages are made, don’t start reading Visas for Al Qaeda: CIA Handouts That Rocked the World by Michael Springmann. The sausages in this case: the string of too-easily-swallowed accounts of bloody events in the “global war on terror,” served up daily with relish by the mainstream media. In reality these sausages are filled with tainted meat that’s making everyone sick.

Springmann is a brave whistle blower living in Washington, D.C. He’s written an accessible book, safe to digest, highlighting details of the corruption of the American Empire (and its accomplices, including Canada) as he experienced them from the inside during his years with the U.S. State Department.

While he served as a visa officer in the U.S. consulate in Jeddah, Saudi Arabia, for instance, he was obliged under threat of dismissal to issue visas to persons hired clandestinely by the CIA to become trained-in-the-USA terrorists. Most of these psychopathic thugs were clearly and legally unqualified to be issued visas. There is every reason to believe the “Visas for Terrorists” program remains fully operative today. It takes a lot of expendable terrorists to run a global terrorism op.

Springmann places his experiences both within the context of the historical roots of the U.S. Empire and within its current ongoing global destabilization project.

“This tale,” the author states near the beginning, “is a sordid sketch of backstabbing, disloyalty, double crosses, faithlessness, falsity, perfidy, sellouts, treachery, and betrayal.”

And that only covers the bureaucratic aspect. Even more sobering is his sketch of human rights violations: torture, assassinations, massacres including bombings of markets, invasions and occupations of countries, destabilization of nations and regions.

Then there’s the financial side: widespread criminality, resource theft, bribery, diversion of funds, illicit drug dealing and more.

Not to mention the flouting of international laws. This dimension includes gross infringements on national sovereignty, the casual violation of treaties and ho-hum everyday general lawlessness, risking even the threat of nuclear annihilation.

All this before taking into account the moral dimension, in which trashing the Ten Commandments is just an opening trifle.

“My story shows how things really work,” Springmann writes, correctly. In the book’s 250 pages he names names, dates, times and places – presumably opening himself up to lawsuits, should there be anything here that the individuals named deem libelous. They might think twice, however, since Springmann is a lawyer by profession and knows his way around the Empire’s capital – as well as some of its outlying ramparts such as Stuttgart, New Delhi and especially Jeddah.

Stinging in itself, Springmann’s book also can be read as an authenticating companion to Michel Chossudovsky’s Towards a World War III Scenario (2012) and The Globalization of War: America’s “Long War” Against Humanity (2015). Along the way, both authors deal, to one extent or another, with the ideological, hubristic and increasingly bellicose role of the Harper government as handmaiden to the American Empire, including military involvements in Libya, Serbia and the Ukraine. Springmann necessarily refers very little to Canada, but to read his account of the cowardly and unnecessary rain of death inflicted on Libya, for instance, is to be obliged as a Canadian to think of Harper’s enthusiasm and pride in having this country share in the slaughter and destabilization carried out under the Orwellian “responsibility to protect” notion.

Springmann quotes Maximilian C. Forte who notes that before the attack Libya enjoyed the highest Human Development Index (a UN measurement of well-being) in all Africa. “After Western military forces destroyed the country the Index only records the steep collapse of all indicators of well-being. More Libyans were killed with intervention than without. It was about control, about militarizing Africa,” Forte argues.

What Springmann brings uniquely to the table is his firsthand knowledge of precisely how the USA recruits terrorists (no quotation marks needed), sends them to the USA for training and then deploys them to carry out murders, torture, bombings and more. The bloody mayhem carried out by these thousands of paid mercenaries – ostensibly beheading-habituated “jihadists” fighting against democracy, decency and the USA and its “allies – is planned, organized and funded by none other than the same USA and its allies. It’s a global false flag operation – the largest by far in history.

As Springmann on page 65 writes of the “Visas for Terrorists Program:”

This was not an ad hoc operation, conceived and carried out in response to a specific foreign policy issue. Rather, it was another of too many CIA efforts to destroy governments, countries, and politicians disfavored by the American “establishment” in its “bipartisan” approach to matters abroad. Whether it was opposing the imaginary evils of communism, the fictitious malevolence of Islam, or the invented wickedness of Iran, America and its intelligence services, brave defenders of “The City Upon A Hill,” sought out and created fear and loathing of peoples and countries essentially engaged in efforts to better their lives and improve their political world. Along the way, Agency-sponsored murders, war crimes, and human rights violations proved to be good business. Jobs for the Clandestine Service (people who recruit and run spies), sales of weapons and aircraft, as well as the myriad items needed to control banks, countries and peoples all provided income for and benefits to American companies.

That the American Empire has been able to carry out such a massive illegal program for so long is the saddest of commentaries on how deep the rot is, how effective the secrecy, how complicit the media.

As to the span of dangerous widespread deception, Springmann notes that Rahul Bedi wrote in Jane’s Defence Weekly on September 14, 2001 that beginning in 1980 “thousands [of mujahideen] were … brought to America and made competent in terrorism by Green Berets and SEALS at US government East Coast facilities, trained in guerilla warfare and armed with sophisticated weapons.”

The point is made repeatedly that Al Qaeda and now ISIS/ISIL/the Islamic State are essentially “Made in USA” entities, brought into being and organized for the Empire’s purposes. Among the elements that make possible such a vast fraud are deception, compartmentalization and secrecy. Springmann quotes attorney Pat Frascogna, “a man with FOIA expertise,” about secrecy and its purpose:

Thus whether it be learning the dirty and unethical business practices of a company or the secrets of our government, the same deployment of denials and feigning ignorance about what is really going on are the all-too-common methods used to keep the truth from the light of day.

Langley recruited the Arab-Afghans so clandestinely that the terrorists didn’t know they had been recruited. They thought that they had found a battlefield on their own, or through the Internet or through Twitter or through television…

Frascogna’s observation intersects with Springmann’s on-the-job experiences as a visa officer in Jeddah starting in 1987. Springmann was repeatedly overruled when he turned down disqualified applicants for U.S. visas. He writes:

As I later learned to my dismay, the visa applicants were recruits for the war in Afghanistan against the Soviet Union’s armed forces. Further, as time went by, the fighters, trained in the United States, went on to other battlefields: Yugoslavia, Iraq, Libya, and Syria. They worked with the American intelligence services and the State Department to destabilize governments the United States opposed. While it’s no secret, most knowledgeable people still refuse to talk about this agenda.

As Springmann learned, “the average percentage of intelligence officers to real diplomats at a given Foreign Service post is about one in three. My experience in Jeddah, Stuttgart, and New Delhi might place it higher—at least 50 percent, if not more.” According to the Anti-CIA Club of Diplomats: Spooks in U.S. Foreign Service [sic], a twelve-page, 1983 Canadian publication (see namebase.org), the percentage is 60 percent.

“At Jeddah,” Springmann writes, “to the best of my knowledge, out of some twenty US citizens assigned to the consulate, only three people, including myself, worked for the Department of State. The rest were CIA or NSA officials or their spouses.” Elsewhere Springmann suggests that essentially the CIA runs the State Department, and that this is true of many other U.S. government departments and agencies as well. It seems that it’s almost impossible to over-estimate the reach of the CIA’s tentacles or the overweening treason of its nonstop black ops and unconstitutional operations domestically.

Springmann toward the end of the book refers to the beginnings of the CIA. It’s interesting for this reviewer to think that he was 13 years of age in 1947 when U.S. president Harry Truman agreed with the National Security Council (NSC) to secretly create the CIA and NSA. I remember that in my teenage years a few of my peers said there “was something” called “the CIA.” This was around the time a few people also said there “was something” called “the Mafia.” The consensus was that both ideas were very far-fetched.

In 1948 Truman approved yet another NSC initiative, providing for “propaganda, economic warfare; preventive direct action, including sabotage, antisabotage,

demolition and evacuation measures; subversion against hostile states, including assistance to underground resistance movements, guerillas, and refugee liberation groups, and support of indigenous anti-Communist elements in threatened countries of the free world.” That’s a tabula rasa if there ever was one: a license for lawlessness.

The CIA’s twisted hits have just kept coming. It’s worth noting that Truman didn’t singlehandedly initiate this monstrosity. The dark recesses of the Deep State, as Peter Dale Scott calls it, are where the demonic entity was spawned. Ever since, Frankenstein’s monster has been a harmless schoolboy by comparison.

To read of the rape of Libya with active Canadian military complicity makes for difficult reading. The lies are piled as high as the bodies, and these two categories are insuperably paired.

Equally sordid, especially in light of Stephen Harper’s enthusiasm for expanding the war on Russia (the economic sanctions and the diplomatic exclusion of Russia from the G8 are forms of warfare, not to mention decades of covert* military incursion by the West onto the territory of the former USSR and now the Russian Federation, as described in Visas for Al Qaeda) is to read some of the history of the Ukraine. “The West’s” meddling in the Ukraine has a long illicit pedigree. As Springmann writes:

It seems that the CIA had problems [in the immediate post World War II period] distinguishing between underground groups and above-ground armies. Langley used Marshall Plan money to support a guerrilla force in the Ukraine, called “Nightingale.” Originally established in 1941 by Nazi Germany’s occupation forces, and working on their behalf, “Nightingale” and its terrorist arm (made up of ultranationalist Ukrainians as well as Nazi collaborators) murdered thousands of Jews, Soviet Union supporters, and Poles.

Even relatively recently, since the so-called Orange revolution in the Ukraine made events there eminently newsworthy, I can’t remember seeing in the mainstream media a single substantial article dealing with the historical relationships between the Ukraine and Russia going back to World War II, nor such an article laying out the history of the involvement –overt or covert – of “the West” in the Ukraine.

Instead, we see the surreal ahistorical likes of the top headline in The New York Times International Weekly for June 13-14, “Russia is Sowing Disunity,” by Peter Baker and Steven Erlanger. They report breathlessly in the lead paragraph: “Moscow is leveraging its economic power, financing European political parties and movements, and spreading alternative accounts of the Ukraine conflict, according the American and European officials.

True to the narrative of “the West” as a pitiful giant facing a powerful and expansionist Russia, the writers posit that the “consensus against Russian aggression” is “fragile.

The drift of this NYT yarn, typical of Western propaganda across the board, is that there remains in effect a behemoth “Soviet empire” surreptitiously shipping “Moscow gold” to dupes in “green movements” and so on. Even a former American national intelligence officer on Russia, Fiona Hill, now at the Brookings Institution, told the writers: “The question is how much hard evidence does anyone have?

Maybe this NYT propaganda, like its clones across the mainstream media, is not ahistorical after all. The story comes across rather as an historical relic of the Cold War – found in a time capsule in a fallout shelter – that the NYT editors decided to publish as a prank. A sausage.

* Military action by “the West” has not always been covert. Springmann notes that American and Japanese soldiers were dispatched to Russia in 1917 to squelch the fledgling Russian revolution. The soldiers were part of what was called the Allied Expeditionary Force. Winston Churchill for his part said: “We must strangle the Bolshevik baby in its crib.” Springmann might have noted that Canadian soldiers were part of the AEF.

June 20, 2015 Posted by | Book Review, Deception, False Flag Terrorism | , , , , , , , , | 1 Comment

Snowden Does a Product Endorsement

Does Ed Snowden Really Trust Apple?

By BILL BLUNDEN | CounterPunch | June 17, 2015

In the wake of Congress passing the USA Freedom Act Ed Snowden composed an editorial piece that appeared in the New York Times. There are aspects of this article that may surprise those who’ve followed events since Snowden first went public two years back.

For example, Ed referred to the bill as a “historic victory” though there are skeptics in the peanut gallery like your author who would call it theater. That is, an attempt to codify otherwise expired measures which have been of little use according to their stated purpose. The USA Freedom Act provides the opportunity for elected officials in Washington to do a victory lap and boast that they’ve implemented restructuring while former American spies, with a knowing wink, understand that what’s actually been instituted is “hardly major change.”

Moving onward through his laudatory communiqué, Ed warns that hi tech companies “are being pressured by governments around the world to work against their customers rather than for them.” He opted not to say who was being leaned on.

But wait, he did mention a name. It’s just that, in this specific case, it was in the context of a product placement for one of the world’s largest technical companies. Here’s the excerpt:

“Basic technical safeguards such as encryption — once considered esoteric and unnecessary — are now enabled by default in the products of pioneering companies like Apple, ensuring that even if your phone is stolen, your private life remains private”

Let’s consider for a moment the underlying assumptions inherent to this narrative. The messaging scheme at work is one which allows business leaders to channel public outrage by depicting corporations as unwilling partners who’ve every intention of protecting the privacy of their users instead of knowingly cavort with spies.

CEO’s like Tim Cook have gone so far as to publicly scold their industry for monetizing user data. Specifically, in a speech delivered at an event hosted by the Electronic Privacy Information Center Cook stated:

“They’re [tech companies] gobbling up everything they can learn about you and trying to monetize it. We think that’s wrong. And it’s not the kind of company that Apple wants to be.”

Hold it right there.

Keep in mind that Apple is a colossal multinational company. It has no qualms about collecting information on users, using slave labor to save a buck, stockpiling profits overseas to avoid paying taxes, giving companies like Google unencumbered access to its user base, participating in a wage-fixing cartel, or cooperating with the NSA when executives (who chatted up spymasters on a first-name basis) thought that they could get away with it.

Can a profit-driven monolith like Apple be trusted to do the right thing when it’s just as easy to secretly continue doing otherwise? If we’ve learned anything from the Snowden revelations it’s that intelligence services exist primarily to pursue the interests of private capital. Why not have their cake and eat it too? Assuage the public with encryption marketing pitches and then bury their collusion even deeper. Issues like “trust” in the corridors of the C-suites are usually viewed as a mere public relations issue.

Apple wouldn’t lie to us again, right?

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs.

June 17, 2015 Posted by | Civil Liberties, Deception, Full Spectrum Dominance | , | Leave a comment

CIA chief pays secret visit to Israel over Iran N-talks: Report

Press TV – June 9, 2015

Director of the US spy agency CIA John Brennan has reportedly made a secret visit to Israel to brief the regime’s officials over the ongoing nuclear negotiations between Iran and the P5+1 states.

Brennan traveled to Israel on June 4 and met with high-ranking Israeli officials, including Prime Minister Benjamin Netanyahu and one of his advisers Yossi Cohen, to discuss the developments in the talks between Iran and the six world powers, Haaretz quoted two senior Israeli officials as saying on Tuesday.

The officials, who asked not to be named, said the CIA chief also held meetings with the head of Israel’s spy agency Mossad Tamir Pardo and the regime’s military intelligence chief Major General Herzl Halevi.

It is unclear whether Brennan conveyed a message from US President Barack Obama to Netanyahu about a possible comprehensive agreement over Tehran’s nuclear program.

The CIA has not yet commented on the report of Brennan’s trip.

Diplomatic efforts aimed at reaching a final agreement over Iran’s nuclear program have drawn angry reactions from Israel. The Tel Aviv regime has been lobbying intensely to thwart such a deal.

Brennan’s visit to Israel came at a sensitive juncture, less than a month ahead of the June 30 deadline set by Tehran and its negotiating sides to finalize a deal, which seeks to end the Western dispute over Tehran’s nuclear case.

A few days before his visit to Israel, Brennan told the US-based CBS network that Washington and Tel Aviv are closely cooperating on the issue of Iran’s nuclear negotiations.

“The CIA, NSA (the US National Security Agency) and other intelligence community entities are working very close with their Israeli … counterparts” regarding the talks, Brennan said.

Iran and the P5+1 states– Russia, China, France, Britain, the US and Germany — have been working on the text of the final deal since they reached mutual understanding on key parameters of such an accord in the Swiss city of Lausanne on April 2.

June 9, 2015 Posted by | Wars for Israel | , , , , , , | Leave a comment

Macedonian Crisis: Uneasy Conscience Betrays Itself

By Dmitry MININ | Strategic Culture Foundation | 30.05.2015

Russian Foreign Chief Sergey Lavrov has made remarks on the situation in Macedonia stressing the involvement of outside actors. According to him, there was a connection between the events in Macedonia “unfolding against the background of the Macedonian government’s refusal to join sanctions against Russia and an active support from Skopje for the plans to build the Turkish Stream pipeline, to which many in Brussels and across the Atlantic are opposed.”

An extremely nervous reaction followed betraying uneasy conscience. The West says another conflict is incited in the region and Russia is the one to blame. According to it, Moscow wants to partition Macedonia. This plan meets its great power ambitions. The statement by Russian Foreign Minister Sergey Lavrov that there was talk of dividing up Macedonia and giving parts to Bulgaria and Albania was “highly irresponsible,” Bulgarian Foreign Minister Daniel Mitov said adding that his country was not involved. Zoran Zaev, the political leader of the Social Democratic Union of Macedonia (SDSM) flatly refused the idea of partition or federalization. But nobody is going to take his opinion into account. Besides, Sergey Lavrov said the same thing. Lavrov’s statement did not contain direct accusations against the United States. For all that, US ambassador to Macedonia, Jess Baily, said the Russian Minister’s remarks were absurd and put the blame for the growing tensions on Moscow.

In reality, it’s all different. Foreign Minister Sergey Lavrov made his remarks during Government Hour at the Federation Council of the Federal Assembly, Moscow, May 20, 2015. The recording shows him saying the Macedonian events were influenced from outside. According to him, the outside interference pursues the goal of toppling Macedonian Prime Minister Nikola Gruevski to punish him for refusing to join the anti-Russian sanctions and the stated intent of Macedonia to become part of the Turkish Stream project with the pipeline going through the territory of the country. The Albanian factor has an important role to play here. There is enough evidence to make many Western media outlets agree that these are the real reasons for deterioration of the situation in the Balkans.

Sergey Lavrov believes that the ideas to “federalize” Macedonia or turn it into a sort of “flexible federation” or “confederation” are fraught with danger. “The idea even has been expressed why not divide up (what is) an artificially-established state – to give part to Bulgaria, and some to Albania”, Lavrov said, going on to say that the Albanian prime minister spoke of “Greater Albania.” The Russian Foreign Minister made his remarks against the background of European policy. For instance, the European Union has already insisted on giving Albanians the rights that Russian minorities in other states are deprived of. According to Lavrov, “…in our discussions with the EU, we raised the issue of rights of Russians and Russian-speaking people in Estonia and Latvia, we asked, “Why did you support the Ohrid Agreement and provide Albanians in Macedonia with a substantial scope of rights but you can’t do the same for Russians in Estonia and Latvia?” There was no answer. However, the conflict in Macedonia was settled at the time. The Russian Minister said that “without reference to Macedonia, the Prime Minister in Tirana is generally declaring slogans of Greater Albania.” Is it not enough to admit the existence of plans to divide Macedonia?

Obviously their implementation would also entail the partition of neighboring Serbia and Montenegro. There was no response from Brussels and Washington on the statement of Albanian Prime Minister Edi Rama about Greater Albania, no matter it was explosive enough being done at the time of acute crisis in a neighboring country. The European Union and the United States have no objections. The West openly displays its permissive parenting attitude towards Albanian politicians who are forgiven anything they say or do. How can this approach be explained? Is it part of the West’s traditional policy aimed at dividing Slav people?

The Albanian Mafia, especially those who come from Kosovo, have been in control of European drug trafficking for several years. Where has money gone? With the FIFA scandal in full swing, wouldn’t it be expedient to check the activities of Western structures responsible for Balkans policy? I’m sure that a lot of interesting facts would surface.

Families of the terrorists arrested in the Macedonian town of Kumanovo organized protests in front of the government of Kosovo in Pristina asking for their relatives to be released from arrest in Macedonia. They complained about “harsh treatment of prisoners.” It proves the fact that the militants were not Macedonians. They came from Kosovo. Macedonia handed over to Pristina the bodies of nine ethnic-Albanian gunmen killed in clashes with police earlier this month. The procession carrying nine metal coffins was honored in silence by hundreds of Kosovars holding national flags. Many high standing officials attended the funeral, including the members of parliament. No reaction followed from the West. The same way the statement of Edi Rama was not condemned by either the government of Bulgaria, nor the Macedonian opposition led by Zaev. But it’s not Lavrov who actually calls for the partition of Macedonia, but the Albanian Prime Minister. The Russian Minister plainly spoke against the idea to divide the country. How can the West prove it its opposition to such plans?

A lot of sinister things take place behind the scenes in the Macedonian scenario. The West, Bulgaria and the Macedonian opposition join in chorus to affirm that the incumbent Macedonian Prime Minister Nikola Gruevski was behind the actions of Albanian terrorists invading the territory of Macedonia near Kumanovo. According to them, it was done to take the people’s attention away from internal problems. The Kosovo news agency KOHA is normally cited as the information source, no matter it failed to come up with anything like solid evidence to support the version that sounds rather strange. Nobody cares much about evidence in the conditions of ongoing hybrid war. For all that, experts pay attention to the fact that the terrorist group routed in Kumanovo was formed in the municipality of Vitino (Kosovo) near the US military base Bondstill. There is no way that 80 armed men coul pass by the facility unnoticed with all the detection means used by the US military to provide surveillance in the area.

It’s an interesting fact that Mirsad Ndrecaj, the leader of the group captured alive by Macedonian security services, goes by the name of “Commander NATO.”

Misha Jurkovic of Institute for European Studies, Belgrade, says there have been “orange revolutions” style coup attempts staged in 30 countries during the recent 15 years.

It all started with protests organized by the Serbian youth resistance movement Otpor. Its leaders, Slobodan Đinović and Srđa Popović, became professional international revolutionaries. Paid by the US, they move from one country to another organizing protest actions. Srđa Popović was seen in Skopje before the events in question. It should be noted that US Ambassador to Macedonia Jess Baily was Deputy Chief of Mission in Ankara at the time in which the US-supported the Taksim Square protests in an attempt to topple Recep Erdogan. Who else can do a better job opposing the plans to build the Turkish Stream across the Balkans? It’s not a coincidence that Baily came out in support of protesters as soon as they hit the streets of Skopje. He is dry behind the ears in making “popular” protest movements look right in the eyes of the public.

The Macedonian opposition has a powerful sponsor lending a helping hand. Suffice it to remember the 6-months-old wire-tap scandal sparked by revelations that came to light thanks to the efforts undertaken by patriots. An almost surreal scandal involving 700 thousands of secretly recorded conversations caught top government officials discussing everything from rigging votes to covering up killings. Opposition Social Democrat leader Zoran Zaev said the tapes were made illegally by the government as part of mass surveillance operation targeting 20,000 allies and opponents alike. They were leaked to him by a whistleblower. With so many recorded conversations everyone is free to make guesses and conclusions to his heart’s content. The government is accused of illegal spying against opposition. But total control over the government is a real tall order. One can hardly imagine anybody in Macedonia being equal to the task. Willy-nilly one gets the impression that the powerful US National Security Agency with the spying capabilities provided by PRISM program (a clandestine surveillance program under which the United States National Security Agency (NSA) collects internet communications of foreign nationals) has a hand in it. Perhaps, the Agency decided that the time is right to forget the damage inflicted by Edward Snowden, an American computer professional who leaked classified information from the National Security Agency, and put to good use the information gathering capabilities acquired by NSA at huge expense. There is solid ground to believe that that the National Security Agency acted together with the Bundesnachrichtendienst or BND (German Federal Intelligence Service directly subordinated to the Chancellor’s Office) to make amends for US spying on German politicians.

Nikola Gruevski knows exactly what Macedonian national intelligence can do. According to him, there is no room for doubt that the recordings were given to the opposition by “a foreign intelligence agency.” Zoran Zaev, the opposition leader, often says that the Prime Minister is not a patriot because he has discussed with his accomplices the possibility ceding to Western pressure and renaming the Republic of Macedonia the “Upper Republic of Macedonia” or the “Northern Republic of Macedonia.” Athens is adamant in its insistence on the name change. Citing historical and territorial concerns resulting from the ambiguity between the Republic of Macedonia, the adjacent Greek region of Macedonia and the ancient Greek kingdom of Macedonia which falls mostly within Greek Macedonia, Greece opposes the use of the name “Macedonia” by the Republic of Macedonia without a geographical qualifier, supporting a compound name such as “Northern Macedonia” for use by all and for all purposes. Until now Greece has been hindering the process of Macedonia’s membership in international organizations. The recorded text that became public domain testifies to the fact that Gruevski has been informed about ideas initiated from outside, but he never supported them and expressed doubts it would be acceptable to the people of the country. It proves that all accusations against him hold no water.

According to recent news from Skopje, Nikola Gruevski said he would join the Turkish Stream and let it pass across the country’s territory only on the condition the plan is approved by European Commission. As soon as he said that, the criticism against him began to die down. EU Commissioner for Regional Policy Johannes Hahn is expected to visit the country on June 1. Together with US Ambassador Jess Baily (his participation gives an idea of who in reality controls the situation) they will try to act as intermediaries in an effort to make peace between the government and the opposition. The whole country was brought to the verge of civil war and dozens of people were sacrificed to serve mercantile interests.

May 30, 2015 Posted by | Deception | , , , , , | Leave a comment

The NSA’s Technotyranny: One Nation Under Surveillance

By John W. Whitehead | The Rutherford Institute | May 26, 2015

“The ultimate goal of the NSA is total population control.”—William Binney, NSA whistleblower

We now have a fourth branch of government.

As I document in my new book Battlefield America: The War on the American People, this fourth branch came into being without any electoral mandate or constitutional referendum, and yet it possesses superpowers, above and beyond those of any other government agency save the military. It is all-knowing, all-seeing and all-powerful. It operates beyond the reach of the president, Congress and the courts, and it marches in lockstep with the corporate elite who really call the shots in Washington, DC.

You might know this branch of government as Surveillance, but I prefer “technotyranny,” a term coined by investigative journalist James Bamford to refer to an age of technological tyranny made possible by government secrets, government lies, government spies and their corporate ties.

Beware of what you say, what you read, what you write, where you go, and with whom you communicate, because it will all be recorded, stored and used against you eventually, at a time and place of the government’s choosing. Privacy, as we have known it, is dead.

The police state is about to pass off the baton to the surveillance state.

Having already transformed local police into extensions of the military, the Department of Homeland Security, the Justice Department and the FBI are preparing to turn the nation’s soldier cops into techno-warriors, complete with iris scanners, body scanners, thermal imaging Doppler radar devices, facial recognition programs, license plate readers, cell phone Stingray devices and so much more.

This is about to be the new face of policing in America.

The National Security Agency (NSA) has been a perfect red herring, distracting us from the government’s broader, technology-driven campaign to render us helpless in the face of its prying eyes. In fact, long before the NSA became the agency we loved to hate, the Justice Department, the FBI, and the Drug Enforcement Administration were carrying out their own secret mass surveillance on an unsuspecting populace.

Just about every branch of the government—from the Postal Service to the Treasury Department and every agency in between—now has its own surveillance sector, authorized to spy on the American people. Then there are the fusion and counterterrorism centers that gather all of the data from the smaller government spies—the police, public health officials, transportation, etc.—and make it accessible for all those in power. And of course that doesn’t even begin to touch on the complicity of the corporate sector, which buys and sells us from cradle to grave, until we have no more data left to mine.

The raging debate over the fate of the NSA’s blatantly unconstitutional, illegal and ongoing domestic surveillance programs is just so much noise, what Shakespeare referred to as “sound and fury, signifying nothing.”

It means nothing: the legislation, the revelations, the task forces, and the filibusters.

The government is not giving up, nor is it giving in. It has stopped listening to us. It has long since ceased to take orders from “we the people.”

If you haven’t figured it out yet, none of it—the military drills, the surveillance, the militarized police, the strip searches, the random pat downs, the stop-and-frisks, even the police-worn body cameras—is about fighting terrorism. It’s about controlling the populace.

Despite the fact that its data snooping has been shown to be ineffective at detecting, let alone stopping, any actual terror attacks, the NSA continues to operate largely in secret, carrying out warrantless mass surveillance on hundreds of millions of Americans’ phone calls, emails, text messages and the like, beyond the scrutiny of most of Congress and the taxpayers who are forced to fund its multi-billion dollar secret black ops budget.

Legislation such as the USA Patriot Act serves only to legitimize the actions of a secret agency run by a shadow government. Even the proposed and ultimately defeated USA Freedom Act, which purported to restrict the reach of the NSA’s phone surveillance program—at least on paper—by requiring the agency to secure a warrant before surveillance could be carried out on American citizens and prohibiting the agency from storing any data collected on Americans, amounted to little more than a paper tiger: threatening in appearance, but lacking any real bite.

The question of how to deal with the NSA—an agency that operates outside of the system of checks and balances established by the Constitution—is a divisive issue that polarizes even those who have opposed the NSA’s warrantless surveillance from the get-go, forcing all of us—cynics, idealists, politicians and realists alike—to grapple with a deeply unsatisfactory and dubious political “solution” to a problem that operates beyond the reach of voters and politicians: how do you trust a government that lies, cheats, steals, sidesteps the law, and then absolves itself of wrongdoing to actually obey the law?

Since its official start in 1952, when President Harry S. Truman issued a secret executive order establishing the NSA as the hub of the government’s foreign intelligence activities, the agency—nicknamed “No Such Agency”—has operated covertly, unaccountable to Congress all the while using taxpayer dollars to fund its secret operations. It was only when the agency ballooned to 90,000 employees in 1969, making it the largest intelligence agency in the world with a significant footprint outside Washington, DC, that it became more difficult to deny its existence.

In the aftermath of Watergate in 1975, the Senate held meetings under the Church Committee in order to determine exactly what sorts of illicit activities the American intelligence apparatus was engaged in under the direction of President Nixon, and how future violations of the law could be stopped. It was the first time the NSA was exposed to public scrutiny since its creation.

The investigation revealed a sophisticated operation whose surveillance programs paid little heed to such things as the Constitution. For instance, under Project SHAMROCK, the NSA spied on telegrams to and from the U.S., as well as the correspondence of American citizens. Moreover, as the Saturday Evening Post reports, “Under Project MINARET, the NSA monitored the communications of civil rights leaders and opponents of the Vietnam War, including targets such as Martin Luther King, Jr., Mohammed Ali, Jane Fonda, and two active U.S. Senators. The NSA had launched this program in 1967 to monitor suspected terrorists and drug traffickers, but successive presidents used it to track all manner of political dissidents.”

Senator Frank Church (D-Ida.), who served as the chairman of the Select Committee on Intelligence that investigated the NSA, understood only too well the dangers inherent in allowing the government to overstep its authority in the name of national security. Church recognized that such surveillance powers “at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide.”

Noting that the NSA could enable a dictator “to impose total tyranny” upon an utterly defenseless American public, Church declared that he did not “want to see this country ever go across the bridge” of constitutional protection, congressional oversight and popular demand for privacy. He avowed that “we,” implicating both Congress and its constituency in this duty, “must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.”

The result was the passage of the Foreign Intelligence Surveillance Act (FISA), and the creation of the FISA Court, which was supposed to oversee and correct how intelligence information is collected and collated. The law requires that the NSA get clearance from the FISA Court, a secret surveillance court, before it can carry out surveillance on American citizens. Fast forward to the present day, and the so-called solution to the problem of government entities engaging in unjustified and illegal surveillance—the FISA Court—has unwittingly become the enabler of such activities, rubberstamping almost every warrant request submitted to it.

The 9/11 attacks served as a watershed moment in our nation’s history, ushering in an era in which immoral and/or illegal government activities such as surveillance, torture, strip searches, SWAT team raids are sanctioned as part of the quest to keep us “safe.”

In the wake of the 9/11 attacks, George W. Bush secretly authorized the NSA to conduct warrantless surveillance on Americans’ phone calls and emails. That wireless wiretap program was reportedly ended in 2007 after the New York Times reported on it, to mass indignation.

Nothing changed under Barack Obama. In fact, the violations worsened, with the NSA authorized to secretly collect internet and telephone data on millions of Americans, as well as on foreign governments.

It was only after whistleblower Edward Snowden’s revelations in 2013 that the American people fully understood the extent to which they had been betrayed once again.

What this brief history of the NSA makes clear is that you cannot reform the NSA.

As long as the government is allowed to make a mockery of the law—be it the Constitution, the FISA Act or any other law intended to limit its reach and curtail its activities—and is permitted to operate behind closed doors, relying on secret courts, secret budgets and secret interpretations of the laws of the land, there will be no reform.

Presidents, politicians, and court rulings have come and gone over the course of the NSA’s 60-year history, but none of them have done much to put an end to the NSA’s “technotyranny.”

The beast has outgrown its chains. It will not be restrained.

The growing tension seen and felt throughout the country is a tension between those who wield power on behalf of the government—the president, Congress, the courts, the military, the militarized police, the technocrats, the faceless unelected bureaucrats who blindly obey and carry out government directives, no matter how immoral or unjust, and the corporations—and those among the populace who are finally waking up to the mounting injustices, seething corruption and endless tyrannies that are transforming our country into a technocrized police state.

At every turn, we have been handicapped in our quest for transparency, accountability and a representative democracy by an establishment culture of secrecy: secret agencies, secret experiments, secret military bases, secret surveillance, secret budgets, and secret court rulings, all of which exist beyond our reach, operate outside our knowledge, and do not answer to “we the people.”

What we have failed to truly comprehend is that the NSA is merely one small part of a shadowy permanent government comprised of unelected bureaucrats who march in lockstep with profit-driven corporations that actually runs Washington, DC, and works to keep us under surveillance and, thus, under control. For example, Google openly works with the NSA, Amazon has built a massive $600 million intelligence database for the CIA, and the telecommunications industry is making a fat profit by spying on us for the government.

In other words, Corporate America is making a hefty profit by aiding and abetting the government in its domestic surveillance efforts. Conveniently, as the Intercept recently revealed, many of the NSA’s loudest defenders have financial ties to NSA contractors.

Thus, if this secret regime not only exists but thrives, it is because we have allowed it through our ignorance, apathy and naïve trust in politicians who take their orders from Corporate America rather than the Constitution.

If this shadow government persists, it is because we have yet to get outraged enough to push back against its power grabs and put an end to its high-handed tactics.

And if this unelected bureaucracy succeeds in trampling underfoot our last vestiges of privacy and freedom, it will be because we let ourselves be fooled into believing that politics matters, that voting makes a difference, that politicians actually represent the citizenry, that the courts care about justice, and that everything that is being done is in our best interests.

Indeed, as political scientist Michael J. Glennon warns, you can vote all you want, but the people you elect aren’t actually the ones calling the shots. “The American people are deluded … that the institutions that provide the public face actually set American national security policy,” stated Glennon. “They believe that when they vote for a president or member of Congress or succeed in bringing a case before the courts, that policy is going to change. But … policy by and large in the national security realm is made by the concealed institutions.”

In other words, it doesn’t matter who occupies the White House: the secret government with its secret agencies, secret budgets and secret programs won’t change. It will simply continue to operate in secret until some whistleblower comes along to momentarily pull back the curtain and we dutifully—and fleetingly—play the part of the outraged public, demanding accountability and rattling our cages, all the while bringing about little real reform.

Thus, the lesson of the NSA and its vast network of domestic spy partners is simply this: once you allow the government to start breaking the law, no matter how seemingly justifiable the reason, you relinquish the contract between you and the government which establishes that the government works for and obeys you, the citizen—the employer—the master.

Once the government starts operating outside the law, answerable to no one but itself, there’s no way to rein it back in, short of revolution. And by revolution, I mean doing away with the entire structure, because the corruption and lawlessness have become that pervasive.

May 27, 2015 Posted by | "Hope and Change", Civil Liberties, Full Spectrum Dominance, Timeless or most popular | , , , | Leave a comment

Dragnet surveillance is about power and social control, not public safety

PRIVACYSOS | May 22, 2015

Attorney General Loretta Lynch says that USA Patriot Act dragnet spy powers must be extended or else the terrorists will get us.

Lynch said Friday the country would be “less safe” if Congress fails to renew surveillance programs included in the Patriot Act.

Lynch joined other top Obama administration officials, who are urging the Senate to pass the USA Freedom Act, which would reform the National Security Agency’s (NSA) bulk phone records collection program while renewing other key parts of the post-Sept. 11 law.

“Our biggest fear is that we will lose important eyes on people who have made it clear that their mission is to harm American people here and abroad,” Lynch told CBS News in her first interview since becoming attorney general.
If NSA’s phone metadata program expires completely, Lynch said the U.S. government would lose “important tools” to identify terror threats.

“I think that we run the risk of essentially being less safe,” Lynch added. “I think that we lose the ability to intercept these communications, which have proven very important in cases that we have built in the past. And I am very concerned that the American people will be unprotected if this law expires.”

Lynch didn’t marshal any evidence to support her claims about the connection between dragnet spying and public safety. That’s because there isn’t one. Even the Department of Justice has acknowledged as much, writing in an Inspector General report that FBI agents interviewed couldn’t identify “any major case developments” tied to Section 215 of the Patriot Act, the provision the FBI claims enables dragnet spying.

Surveillance boosters have never been able to point to a circumstance—even one example—that proves dragnet surveillance is vital in stopping terrorism. Some insiders in the security state have observed that the bigger the haystack, the more difficult it is to successfully use intelligence information to identify and track threatening people. More information is not better. Better information is better, they say.

Loretta Lynch says she fears that if the Patriot Act isn’t reauthorized, “we will lose important eyes on people who have made it clear that their mission is to harm American people here and abroad.” That’s total nonsense. Anyone who “makes it clear” that they want to kill Americans is someone a judge would authorize targeted surveillance against. The government should leave the rest of us out of it.

Just about every recent terrorist attack on US and European soil has been committed by someone known to law enforcement. That’s true for the Garland, Texas shooter and for Tamerlan Tsarnaev, who blew up the Boston Marathon in April 2013. The government doesn’t need to spy on you and me in order to track people it already suspects of being up to no good.

You might be wondering: If dragnet spying doesn’t stop terrorism, and most terrorists are known to law enforcement, why do the FBI and the new Attorney General insist on renewing the Patriot Act’s worst provisions? It’s an important question, with a depressing answer.

The reason Lynch’s claims about dragnet spying don’t add up is because they are based on a perversion of the true purpose served by society wide surveillance. While the Patriot Act doesn’t stop terrorism, it’s quite good at enabling social and political control, and finding people who are vulnerable and may be easily coerced into becoming FBI informants.

If surveillance boosters were honest about why they want these powers, you might hear them talking less about terrorism and more about power. Add your voice: take action now to tell congress to reject dragnet surveillance.

May 23, 2015 Posted by | "Hope and Change", Civil Liberties, Deception, Full Spectrum Dominance | , , | 1 Comment

The Senate’s Excuses for Reauthorizing Section 215–and Why They’re Wrong

By Mark Jaycox | EFF | May 19, 2015

Three provisions of the Patriot Act expire on June 1 and Senate Majority Leader Mitch McConnell is trying to delay taking action on the issue by calling for a two month or 5-year reauthorization of Section 215—the provision of the Patriot Act the NSA relies on to collect millions of Americans call records.

Before June 1 we expect to see plenty of fear-mongering from intelligence officials and national security hawks. Last year, the Wall Street Journal began the foray with an op-ed by Former NSA Director General Mike Hayden and former Attorney General Michael Mukasey—key architects of many of the NSA’s unlawful activities. This time, the mongering started with op-eds by John Yoo, Senator Marco Rubio, and Senator Tom Cotton.

Here are the top excuses officials will use to continue spying on Americans calling records and why they’re wrong:

Congress Needs Time to Debate

“I don’t know how we have the kind of fulsome debate that is going to be required on NSA without passing a temporary extension,” —Sen. John Cornyn

Congress has had two full years to publicly debate the NSA’s use of Section 215. Indeed, the debate has been vigorous and thoughtful. While Congress didn’t create a separate investigative committee, it was still able to hold over a dozen hearings where Section 215 was discussed. The hearings, which called upon officials like the Attorney General, Director of National Intelligence, and Director of the NSA, included hours of testimony on the programs, what they collect, and their effectiveness.

Congress has also debated Section 215 via Senator Patrick Leahy and Jim Sensenbrenner’s reform bill called the USA Freedom Act. Last year, the House passed a gutted bill of the USA Freedom Act, but debated the legislation for days. This year, the House debated a stronger version of the USA Freedom Act and passed it 338 to 88.

The Senate has also debated the legislation. Last year, after two days of debate, the Senate failed to advance a stronger version of the USA Freedom Act by two votes. Congress has had more than enough time to discuss these authorities and must act.

The Section 215 Program is Effective

“This has been a very important part of our effort to defend the homeland since 9/11.” —Sen. Majority Leader Mitch McConnell

There’s one problem: there’s no evidence to support that. Two independent commissions concluded the calling records program was not effective and has not been used to stop a terrorist attack. The first, called the President’s Review Group on Signals Intelligence, concluded “Our review suggests that the information contributed to terrorist investigations by the use of section 215 telephony meta-data was not essential to preventing attacks.”

Like the President’s Review Group, the Privacy and Civil Liberties Oversight Board also concluded:

Based on the information provided to the Board, including classified briefings and documentation, we have not identified a single instance involving a threat to the United States in which the program made a concrete difference in the outcome of a counterterrorism investigation. Moreover, we are aware of no instance in which the program directly contributed to the discovery of a previously unknown terrorist plot or the disruption of a terrorist attack.

The quotes speak for themselves.

Fixing Section 215 Puts the Nation at Risk

“[The USA Freedom Act] would be rolling [the nation] back to exactly where we were pre-9/11. —Sen. Richard Burr

The Attorney General, Director of National Intelligence, and House Intelligence Chair and Ranking Members do not think reforming the Section 215 program will harm national security. Attorneys General Eric Holder and Loretta Lynch and Director of National Intelligence James Clapper wrote letters (.pdf) to Congress noting that Section 215 reform would preserve both “vital national security authorities” and “essential Intelligence Community capabilities.”

The Program is “Lawful”

“Contrary to irresponsible rumors, the [bulk surveillance] program is lawful, carefully monitored, and protects personal privacy. The program does not conduct mass surveillance of American citizens—or any surveillance at all.” —Sen. Cotton and Rep. Mike Pompeo

Apparently, one of the “irresponsible rumors” Sen. Tom Cotton and Rep. Mike Pompeo reference is a decision by the Second Circuit Court of Appeals. (The circuit courts are the federal courts directly below the Supreme Court). The Second Circuit held that the NSA’s telephone records program went far beyond what Congress authorized when it passed Section 215 of the Patriot Act in 2001. The court rejected the government’s secret reinterpretation of Section 215 that has served as the basis for the telephone records collection program. The Second Circuit’s opinion stands as a clear sign that the courts are ready to step in and rule that mass surveillance is illegal.

In addition, the program is “surveillance.” As we’ve repeatedly said: the collection of metadata matters. It reveals a host of information and context about a person’s habits, traits, and beliefs. The Circuit Court opinion explained that metadata is often a proxy for the content of the communication, and that phone records can “reveal a startling amount of detailed information” about callers. The court also recognized that aggregation of calling records matters because collection of large amounts of metadata plus the application of sophisticated data processing technologies gives the government access to even more revealing portraits of individuals and groups.

Congress Must Say No to a Short-Term Reauthorization

In the next few days, Congress will begin to debate whether or not they should vote for a short-term reauthorization of Section 215. The answer is clearly no. Join us now in telling your lawmaker to vote against any short-term reauthorization.

May 21, 2015 Posted by | Civil Liberties, Deception | , , , , , , , , | Leave a comment

NSA Spying Ruled Illegal, But Will Congress Save the Program Anyway?

By Ron Paul | May 10, 2015

This week the Sixth Circuit Court of Appeals ruled that the NSA’s metadata collection program was not authorized in US law. The PATRIOT Act, under which the program began, was too vague, the court found. But the truth is the Act was intended to be vague so that the government could interpret it in the broadest possible way.

But this is really more of a technicality, because illegality and unconstitutionality are really two very different things. Even if Congress had explicitly authorized the government to collect our phone records, that law would still be unconstitutional because the Constitution does not grant government the power to access our personal information without a valid search warrant.

Even though the court found the NSA program illegal, it did not demand that the government stop collecting our information in this manner. Instead, the court kicked the ball back in Congress’ court, as these provisions of the PATRIOT Act are set to expire at the end of the month and the Appeals Court decided to let Congress decide how to re-authorize this spying program.

Unfortunately, this is where there is not much to cheer. If past practice is any lesson, Congress will wait until the spying program is about to expire and then in a panic try to frighten Americans into accepting more intrusions on their privacy. Senate Majority Leader Mitch McConnell has already put forth a new bill as a stop-gap measure to allow time for a fuller debate on the issue. His stop-gap? A five year re-authorization with no changes to the current program!

The main reform bill being floated, the FREEDOM Act, is little better. Pretending to be a step in the right direction, the FREEDOM Act may actually be worse for our privacy and liberties than the PATRIOT Act!

One silver lining in the court decision is that it should exonerate Ed Snowden, who risked it all to expose what the courts have now found was illegal US government activity. That is the definition of a whistleblower. Shouldn’t he be welcomed back home as a hero instead of being threatened with treason charges? We shouldn’t hold our breath!

This week Snowden addressed a conference in Melbourne, Australia, informing citizens that the Australian government watches all its citizens “all the time.” Australia’s program allows the government to “collect everyone’s communications in advance of criminal suspicion,” he told the conference. That means the government is no longer in the business of prosecuting crimes, but instead is collecting information in case crimes someday occur.

How is it that the Australian government can collect and track “pre-crime” information on its citizens? Last month Australia passed a law requiring telecommunications companies to retain metadata information on their customers for two years.

Why do Australia’s oppressive laws matter to us? Because the NSA “reform” legislation before Congress, the FREEDOM Act, does exactly what the Australian law does: it mandates that US telecommunications companies retain their customers’ metadata information so that the NSA can access the information as it wishes.

Some argue that this metadata information is harmless and that civil libertarians are over-reacting. But, as Ed Snowden told the Melbourne conference, “under these mandatory metadata laws you can immediately see who journalists are contacting, from which you can derive who their sources are.”

This one example of what happens when the government forces corporations to assist it in spying on the people should be a red flag. How can an independent media exist in the US if the government knows exactly whom journalists contact for information? It would be the end of any future whistleblowers.

The only reform of the PATRIOT Act is a total repeal. Accept nothing less.

May 11, 2015 Posted by | Civil Liberties, Corruption | , , , , , | 2 Comments

Blackmailed and Controlled: Germany Acts as US ‘Spy Colony’ for Euro Intel

Sputnik – 05.05.2015

The intelligence sharing relationship between German and American spy agencies is one of dominance and blackmail rather than cooperation, with Germany’s BND acting as a “colony” used to help gather information for US authorities, German activist and publicist Christoph Horstel said.

There has been much speculation regarding the seemingly close relationship between German and US intelligence agencies in recent times, following German media reports alleging that Berlin’s foreign intelligence agency — the BND — spied on various European targets on behalf of America’s National Security Agency (NSA).

According to the reports, the NSA had been given access to the e-mails of various European politicians, EU institutions and European member state ministries.

This led many to suggest Germany was complicit with the US in operating an illegal global spy network. Chancellor Angela Merkel denied Germany was involved in illegal activity, telling journalists that it was essential for the BND to keep working with the NSA in order to ensure the safety of citizens.

‘A Big Show, A Big Farce’

However, Christoph Horstel believes that while Berlin does act on behalf of Washington’s intelligence agencies, he told Sputnik that the relationship is very one-sided.

“Well this is a big show, a big farce. All of the political insiders know what the real question is. The real question is that this is not cooperation; Germany is [a] colony.”

Horstel points out that the former US Office of Strategic Services (OSS) — which later become the CIA — established the German BND, and he believes it has been set up to look after Washington’s European interests.

“What we do have here, in fact, is a written understanding that the BND has to give — free of charge — any of the fruits of its work to the CIA. That is quite normal,” he said.

“The Americans are the masters of the game in Europe, so we [Germany] have to deliver to them. It’s a kind of service; a service of Germany to the US and we have to do that — that’s fact.”

German Officials ‘Blackmailed’ by US

Despite German Chancellor Angela Merkel fronting the media to deny accusations that she was in any way complicit in allowing American authorities to illegally spy on European firms, Horstel believes the chancellor would be well aware of what practices are going on.

“If she [Merkel] was not very deeply cooperating with the Americans, she would not be chancellor. We have a double system to ensure that we do exactly as Washington wants.

“What we have here is a very clear-cut system of blackmail against anyone in a high position — that’s number one,” he said, suggesting that US access to German security files allows American authorities to hold German politicians to ransom.

Meanwhile, Horstel also believes an inherent American influence on German politics and media means that governments in favor of US policy are also elected, and the media consistently follows American rhetoric on international issues, such as the crisis in Ukraine.

“Number two is that when it comes to elections, you will get into a powerful enough position to win unless the Americans are nodding their head. This also applies to the army ranks and the media ranks.

“This is why it’s important to note why the German media is so hostile to Russia. The Americans say it, and we [Germans] do it.”

May 5, 2015 Posted by | Corruption, Deception, Full Spectrum Dominance, Timeless or most popular | , , , , , | Leave a comment

Austria Demands Info on German-US Spying on Officials, Companies

Sputnik – 05.05.2015

Austria filed a formal complaint over suspicions that German and American intelligence agencies have spied on its authorities and firms, the Austrian interior minister said on Tuesday.

“Austria demands clarification,” Interior Minister Johanna Mikl-Leitner told Reuters, following German media reports about such activities. She added that Austria’s security authorities were in contact with their German counterparts.

“Today we have filed a legal complaint with the prosecutor’s office,” she said, “against an unknown entity due to secret intelligence services to Austria’s disadvantage.”

German media reports said the BND, Germany’s intelligence agency, used its Bad Aibling listening post in Bavaria to spy on the French presidential palace, French foreign ministry and European Commission.

The snooping was done at the behest of US spy agency National Security Agency (NSA), which also asked the BND to monitor European firms to check if they were breaking trade embargos, according to reports.

Mikl-Leitner said that while there is not yet concrete evidence, “it’s not far-fetched to suspect that Austria was also spied on.”

She added that Austria will try to resolve the situation through its security, diplomatic and judicial bodies.

The NSA is believed to have passed a list of some 800,000 IP addresses, phone numbers and email addresses to the BND for monitoring, some of which belonged to European politicians and companies.

Citing an unnamed source from the German parliamentary committee on the US spying agency, German newspaper Bild said Berlin chose to remain silent and close its eyes to the information in order to avoid “endangering cooperation” with Washington and the NSA.

German Interior Minister Thomas de Maiziere has denied reports that he was aware of the spying since at least 2008.

During a press briefing Monday, German Chancellor Angela Merkel said Berlin is engaged in consultations with Washington on the NSA’s surveillance practices.

“I think what’s important here is that friends do not spy on each other. The answer is that it should not be so,” Merkel said.

She continued: “We are at the disposal of respective parliamentary bodies. The chancellor’s office is ready to provide all necessary information. This process is already under way. We are also consulting the United States.”

Secret documents leaked in 2013 by former NSA contractor Edward Snowden showed that the US spy agency monitored Merkel’s personal cell phone too.

Read more:

Airbus to Launch Criminal Complaint Against Germany in Spy Scandal

May 5, 2015 Posted by | Corruption, Deception, Economics | , , , , , | Leave a comment

USA FREEDOM Act: Just Another Word for Lost Liberty

By Ron Paul | May 3, 2015

Apologists for the National Security Agency (NSA) point to the arrest of David Coleman Headley as an example of how warrantless mass surveillance is necessary to catch terrorists. Headley played a major role in the 2008 Mumbai terrorist attack that killed 166 people.

While few would argue that bringing someone like Headley to justice is not a good thing, Headley’s case in no way justifies mass surveillance. For one thing, there is no “terrorist” exception in the Fourth Amendment. Saying a good end (capturing terrorists) justifies a bad means (mass surveillance) gives the government a blank check to violate our liberties.

Even if the Headley case somehow justified overturning the Fourth Amendment, it still would not justify mass surveillance and bulk data collection. This is because, according to an investigation by ProPublica, NSA surveillance played an insignificant role in catching Headley. One former counter-terrorism official said when he heard that NSA surveillance was responsible for Headley’s capture he “was trying to figure out how NSA played a role.”

The Headley case is not the only evidence that the PATRIOT Act and other post-9/11 sacrifices of our liberty have not increased our security. For example, the NSA’s claim that its surveillance programs thwarted 54 terrorist attacks has been widely discredited. Even the president’s Review Group on Intelligence and Communications Technologies found that mass surveillance and bulk data collection was “not essential to preventing attacks.”

According to the congressional Joint Inquiry into Intelligence Activities before and after the Terrorist Attacks of September 11, 2001 and the 9/11 Commission, the powers granted the NSA by the PATRIOT Act would not have prevented the 9/11 attacks. Many intelligence experts have pointed out that, by increasing the size of the haystack government agencies must look through, mass surveillance makes it harder to find the needle of legitimate threats.

Even though mass surveillance threatens our liberty, violates the Constitution, and does nothing to protect us from terrorism, many in Congress still cling to the fiction that the only way to ensure security is to give the government virtually unlimited spying powers. These supporters of the surveillance state are desperate to extend the provisions of the PATRIOT Act that are set to expire at the end of the month. They are particularly eager to preserve Section 215, which authorizes many of the most egregious violations of our liberties, including the NSA’s “metadata” program.

However, Edward Snowden’s revelations have galvanized opposition to the NSA’s ongoing violations of our liberties. This is why Congress will soon vote on the USA FREEDOM Act. This bill extends the expiring surveillance laws. It also contains some “reforms” that supposedly address all the legitimate concerns regarding mass surveillance.

However, a look at the USA FREEDOM Act’s details, as opposed to the press releases of its supporters, shows that the act leaves the government’s mass surveillance powers virtually untouched.

The USA FREEDOM Act has about as much to do with freedom as the PATRIOT Act had to do with patriotism. If Congress truly wanted to protect our liberties it would pass the Surveillance State Repeal Act, which repeals the PATRIOT Act. Congress should also reverse the interventionist foreign policy that increases the risk of terrorism by fostering resentment and hatred of Americans.

Fourteen years after the PATRIOT Act was rushed into law, it is clear that sacrificing liberty does little or nothing to preserve security. Instead of trying to fool the American people with phony reforms, Congress should repeal all laws that violate the Fourth Amendment, starting with the PATRIOT Act.

May 3, 2015 Posted by | Civil Liberties, Deception | , , , , | 1 Comment

Airbus goes to court over reports of NSA/BND espionage

RT | May 1, 2015

European aviation consortium Airbus said it would file criminal charges over industrial espionage, following reports that US and German foreign intelligence spied on the industry giant.

“We are aware that as a large company in the sector, we are a target and subject of espionage,” the company said in a statement to AFP on Thursday. “However, in this case we are alarmed because there is concrete suspicion of industrial espionage.”

The move follows reports in Bild newspaper and Der Spiegel news magazine based on intelligence documents, claiming US spy agency, the NSA, deliberately targeted Airbus and Eurocopter – also run by the French-based company. The reports additionally revealed Berlin was aware of the espionage and kept quiet since 2008.

Following the allegations, Airbus “asked the German government for information.”

“We will now file a criminal complaint against persons unknown on suspicion of industrial espionage,” the company said.

It is alleged the German Foreign Intelligence service (BND) collaborated with the NSA in providing information about Airbus’ industrial secrets. The German media reports also alleged BND used the Bad Aibling monitoring station in Bavaria not only to spy on industrial business, but also to eavesdrop on the French president, the French foreign ministry, and the European Commission.

A French foreign ministry spokesman was quoted by DW as saying: “We are in close contact on this issue with our German partners.”

The German public and the political elite were furious following the 2013 disclosures by former NSA contractor Edward Snowden, into the NSA hack of Chancellor Angela Merkel’s cell phone. Yet while promising to respond, Germany has done nothing over the years.

May 1, 2015 Posted by | Corruption, Deception, Economics | , , , , , , | Leave a comment

Follow

Get every new post delivered to your Inbox.

Join 1,014 other followers