US Military Intervention in Africa: The East African Response Force, A Creation of the Pentagon

US Military Intervention in Africa: The East African Response Force, A Creation of the Pentagon

By Abayomi Azikiwe
Pan-African News Wire and Global Research: February 11, 2014

Growing instability in East and Central Africa will be the focus of Washington’s intervention

Over the last two months developments in Central and East Africa has dominated the news coverage of the continent. The split within the ruling Sudan People’s Liberation Movement/Army (SPLA), a close ally of Washington, and the deployment of French and African troops in the Central African Republic, has brought the escalation of Pentagon troops in these states.

Recently the Department of Defense announced the formation of an East African Response Force. This new unit is part of the United States Africa Command (AFRICOM) which has been strengthened and enhanced under the administration of President Barack Obama.

A recent drone attack in southern Somalia is representative of the growing aggression of Washington in Africa. The government of Djibouti, a former French colony where the U.S. has a military base with over 4,000 soldiers at Camp Lemonnier, released a statement saying that such strikes are “vital” in the so-called war on terrorism.

The drone strike was launched from the Pentagon military installations in Djibouti. Prior to the creation of the East African Response Force Washington operated in the region under the framework of the Combined Joint Task Force Horn of Africa (CJTF-HOA).

U.S. Brigadier-General Wayne Grigsby, who is the commander of CJTF-HOA, says that his forces are in East Africa only to assist governments in their military campaigns to defeat the so-called terrorist threat posed by Al-Shabaab, a Somalia-based guerrilla organization which has fought the Washington-backed regime in Mogadishu for the last six years.

“Our mission here is to enable our East African partners to actually neutralize violent extremists throughout eastern Africa,” Grigsby said. Yet if this was the case then why would it be necessary to have such a formidable military force in the Horn of Africa region that conducts periodic bombings and commando raids in Somalia. (Shabelle Media Network, Feb. 7)

However, Brigadier-General Grigsby does say that “It also enables strategic access and freedom of movement. The purpose is to protect the United States and its interests abroad.”

Consequently, even the military leaders themselves must acknowledge that the underlying reasons for the build-up in Africa are clearly related to the economic and class interests of Washington and Wall Street. East and Central Africa is a vast repository of oil, natural gas and strategic minerals.

(read the full report at Global Research)

Source: http://www.globalresearch.ca/us-military-intervention-in-africa-the-east-african-response-force-a-creation-of-the-pentagon/5368284

….
Alternative Free Press -fair use-

‘Destroy them immediately’: Top US commander ordered purge of bin Laden photos

RT: February 11, 2014

Eleven days after the 2011 US elite forces raid that resulted in the killing of Al-Qaeda leader Osama bin Laden, the head of US special operations ordered the destruction of all photos of the corpse or for them to be given to the CIA, new evidence shows.

The disclosure was revealed Monday in an email obtained and released by non-profit legal group Judicial Watch via a Freedom of Information Act (FOIA) request. The heavily-redacted email was sent by Admiral William McRaven, head of US Special Operations Command, to subordinate officers on May 13, 2011, instructing them that any remaining photos of bin Laden’s body must be destroyed or handed over to the CIA. Bin Laden was killed on May 2, 2011 at his compound in Abbottabad, Pakistan, by the special operations team commonly known as Seal Team Six during Operation Neptune Spear.

In the email, addressed to “Gentlemen,” McRaven wrote, “One particular item that I want to emphasize is photos; particularly UBLs remains. At this point – all photos should have been turned over to the CIA; if you still have them destroy them immediately or get them to the [redacted].”

The order to purge the photos came 11 days after the conservative government transparency organization Judicial Watch filed a FOIA request with the Defense Department seeking “all photographs and/or video recordings of Usama (Osama) Bin Laden taken during and/or after the U.S. military operation in Pakistan on or about May 1, 2011.”

Judicial Watch finally accessed the McRaven email as a result of a June 7, 2013 FOIA request and a subsequent lawsuit against the Defense Department that sought the materials.

(read the full report at RT)

Source: http://rt.com/usa/bin-laden-photos-destroyed-467/

….
Alternative Free Press -fair use-

Terrorism with a “Human Face”: Syria Al Qaeda “Freedom Fighters” are “Not Killing Civilians”

By Prof Michel Chossudovsky
Global Research: February 10, 2014

The attacks by opposition forces largely integrated by Al Qaeda terrorists can no longer be denied.

What is now occurring is a re-branding of the various terrorist formations covertly support by Western intelligence.

The latest slur of media disinformation consists in providing a “human face” to Al Qaeda.

While the media acknowledges that the Al Nusrah front is integrated by Al Qaeda affiliated rebels, the Islamist rebels affiliated with the New Islamic Front –which has received Washington’s ascent– are now portrayed as “freedom fighters” involved strictly in para-military operations.

(read the full report at Global Research)

Source: http://www.globalresearch.ca/terrorism-with-a-human-face-syria-al-qaeda-freedom-fighters-are-not-killing-civilians/5368124

….
Alternative Free Press -fair use-

Maryland Legislators Move To Kill NSA Headquarters

Maryland Legislators Move To Kill NSA Headquarters

By Michael Lotfi
BenSwann.com

ANNAPOLIS, Md., February 10, 2014– It’s lights out for the National Security Agency (NSA). State lawmakers in Maryland have filed emergency status legislation that seeks to cut the NSA’s Ft. Meade headquarters off from all material support stemming from the state.

“Maryland has almost become a political subdivision of the NSA,” Tenth Amendment Center Executive Director Michael Boldin said in a statement. “The agency relies heavily on state and local help. This bill bans all of it.”

House Bill 1074 (HB1074) would ban the NSA facility from all public state utilities, ban the use of NSA collected evidence in court, ban universities from partnering with the NSA and ban all political subdivisions from assisting the NSA from within the state.

Any state entity, employee or contractor refusing to comply with the law would be immediately fired and banned from all future contracts within the state.

The bill has eight Republican sponsors and has been referred to the House Judiciary Committee.

Multiple states join Maryland in their attempt to enforce anti-commandeering legislative measures against the NSA. Tennessee, Arizona, California and Washington have all filed legislation. Utah is expected to file legislation within the coming weeks.

(read the full report at BenSwann.com)

Source: http://benswann.com/breaking-maryland-legislators-move-to-kill-nsa-headquarters/

….
AlternativeFreePress.com -fair use-

Fukushima radiation levels underestimated by five times – TEPCO

RT: Published February 08, 2014, Edited February 10, 2014

TEPCO has revised the readings on the radioactivity levels at the Fukushima No. 1 nuclear plant well to 5 million becquerels of strontium per liter – both a record, and nearly five times higher than the original reading of 900,000 becquerels per liter.

Strontium-90 is a radioactive isotope of strontium produced by nuclear fission with a half-life of 28.8 years. The legal standard for strontium emissions is 30 becquerels per liter. Exposure to strontium-90 can cause bone cancer, cancer of nearby tissues, and leukemia.

Tokyo Electric Power Co. originally said that the said 900,000 becquerels of beta-ray sources per liter, including strontium – were measured in the water sampled on July 5 last year.

However, the company noted on Friday that the previous radioactivity levels had been wrong, meaning that it was also likely reading taken from the other wells at the disaster-struck plant prior to September were also likely to have been inaccurate, the Asahi Shimbum newspaper reported.

The Japanese company has already apologized for the failures, which they said were a result of the malfunctioning of measuring equipment.

TEPCO did not mention the radioactivity levels of other samples of both groundwater and seawater taken from between June and November last year – which totaled some 140.

However, the erroneous readings only pertain to the radiation levels measured in water – readings taken to measure the radiation levels in air or soil are likely to have been accurate.

In the basement of the station, the drainage system and special tanks have accumulated more than 360,000 tons of radioactive water. The leakage of radioactive water has been an ongoing problem in the wake of the accident at the Fukushima-1 nuclear power plant.

TEPCO also said on Thursday that 600 liters of contaminated water – which had 2,800 becquerels of beta-ray sources per liter in it, leaked from piping leading to a tank at the Fukushima nuclear plant.

A record high level of beta rays released from radioactive strontium-90 was detected at the crippled Fukushima nuclear power plant beneath the No. 2 reactor’s well facing the ocean, according to the facility’s operator who released news of the measurements mid-January.

TEPCO measured the amount of beta ray-emitting radioactivity at more than 2.7 million becquerels per liter, Fukushima’s operator said as reported in the Japanese media.

(read the full report at RT)

Source: http://rt.com/news/fukushima-radiation-levels-underestimated-143/

….
Alternative Free Press -fair use-

The NSA’s Secret Role in the U.S. Assassination Program

The NSA’s Secret Role in the U.S. Assassination Program

By Jeremy Scahill and Glenn Greenwald
The Intercept: February 10, 2014

The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people.

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. It is also supported by a former drone sensor operator with the U.S. Air Force, Brandon Bryant, who has become an outspoken critic of the lethal operations in which he was directly involved in Iraq, Afghanistan and Yemen.

In one tactic, the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone, enabling the CIA and U.S. military to conduct night raids and drone strikes to kill or capture the individual in possession of the device.

The former JSOC drone operator is adamant that the technology has been responsible for taking out terrorists and networks of people facilitating improvised explosive device attacks against U.S. forces in Afghanistan. But he also states that innocent people have “absolutely” been killed as a result of the NSA’s increasing reliance on the surveillance tactic.

One problem, he explains, is that targets are increasingly aware of the NSA’s reliance on geolocating, and have moved to thwart the tactic. Some have as many as 16 different SIM cards associated with their identity within the High Value Target system. Others, unaware that their mobile phone is being targeted, lend their phone, with the SIM card in it, to friends, children, spouses and family members.

Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. “They would do things like go to meetings, take all their SIM cards out, put them in a bag, mix them up, and everybody gets a different SIM card when they leave,” the former drone operator says. “That’s how they confuse us.”

As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. According to the former drone operator, the geolocation cells at the NSA that run the tracking program – known as Geo Cell –sometimes facilitate strikes without knowing whether the individual in possession of a tracked cell phone or SIM card is in fact the intended target of the strike.

“Once the bomb lands or a night raid happens, you know that phone is there,” he says. “But we don’t know who’s behind it, who’s holding it. It’s of course assumed that the phone belongs to a human being who is nefarious and considered an ‘unlawful enemy combatant.’ This is where it gets very shady.”

The former drone operator also says that he personally participated in drone strikes where the identity of the target was known, but other unknown people nearby were also killed.

“They might have been terrorists,” he says. “Or they could have been family members who have nothing to do with the target’s activities.”

What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata.

“People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy.”

The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision.

In his speech at the National Defense University last May, President Obama declared that “before any strike is taken, there must be near-certainty that no civilians will be killed or injured – the highest standard we can set.” He added that, “by narrowly targeting our action against those who want to kill us and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.”

But the increased reliance on phone tracking and other fallible surveillance tactics suggests that the opposite is true. The Bureau of Investigative Journalism, which uses a conservative methodology to track drone strikes, estimates that at least 273 civilians in Pakistan, Yemen and Somalia have been killed by unmanned aerial assaults under the Obama administration. A recent study conducted by a U.S. military adviser found that, during a single year in Afghanistan – where the majority of drone strikes have taken place – unmanned vehicles were 10 times more likely than conventional aircraft to cause civilian casualties.

The NSA declined to respond to questions for this article. Caitlin Hayden, a spokesperson for the National Security Council, also refused to discuss “the type of operational detail that, in our view, should not be published.”

In describing the administration’s policy on targeted killings, Hayden would not say whether strikes are ever ordered without the use of human intelligence. She emphasized that “our assessments are not based on a single piece of information. We gather and scrutinize information from a variety of sources and methods before we draw conclusions.”

Hayden felt free, however, to note the role that human intelligence plays after a deadly strike occurs. “After any use of targeted lethal force, when there are indications that civilian deaths may have occurred, intelligence analysts draw on a large body of information – including human intelligence, signals intelligence, media reports, and surveillance footage – to help us make informed determinations about whether civilians were in fact killed or injured.”

The government does not appear to apply the same standard of care in selecting whom to target for assassination. The former JSOC drone operator estimates that the overwhelming majority of high-value target operations he worked on in Afghanistan relied on signals intelligence, known as SIGINT, based on the NSA’s phone-tracking technology.

“Everything they turned into a kinetic strike or a night raid was almost 90 percent that,” he says. “You could tell, because you’d go back to the mission reports and it will say ‘this mission was triggered by SIGINT,’ which means it was triggered by a geolocation cell.”

In July, the Washington Post relied exclusively on former senior U.S. intelligence officials and anonymous sources to herald the NSA’s claims about its effectiveness at geolocating terror suspects.

Within the NSA, the paper reported, “A motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’”

But the Post article included virtually no skepticism about the NSA’s claims, and no discussion at all about how the unreliability of the agency’s targeting methods results in the killing of innocents.

In fact, as the former JSOC drone operator recounts, tracking people by metadata and then killing them by SIM card is inherently flawed. The NSA “will develop a pattern,” he says, “where they understand that this is what this person’s voice sounds like, this is who his friends are, this is who his commander is, this is who his subordinates are. And they put them into a matrix. But it’s not always correct. There’s a lot of human error in that.”

The JSOC operator’s account is supported by another insider who was directly involved in the drone program. Brandon Bryant spent six years as a “stick monkey” – a drone sensor operator who controls the “eyes” of the U.S. military’s unmanned aerial vehicles. By the time he left the Air Force in 2011, Bryant’s squadron, which included a small crew of veteran drone operators, had been credited with killing 1,626 “enemies” in action.

Bryant says he has come forward because he is tormented by the loss of civilian life he believes that he and his squadron may have caused. Today he is committed to informing the public about lethal flaws in the U.S. drone program.

Bryant describes the program as highly compartmentalized: Drone operators taking shots at targets on the ground have little idea where the intelligence is coming from.

“I don’t know who we worked with,” Bryant says. “We were never privy to that sort of information. If the NSA did work with us, like, I have no clue.”

During the course of his career, Bryant says, many targets of U.S. drone strikes evolved their tactics, particularly in the handling of cell phones. “They’ve gotten really smart now and they don’t make the same mistakes as they used to,” he says. “They’d get rid of the SIM card and they’d get a new phone, or they’d put the SIM card in the new phone.”

As the former JSOC drone operator describes – and as classified documents obtained from Snowden confirm – the NSA doesn’t just locate the cell phones of terror suspects by intercepting communications from cell phone towers and Internet service providers. The agency also equips drones and other aircraft with devices known as “virtual base-tower transceivers” – creating, in effect, a fake cell phone tower that can force a targeted person’s device to lock onto the NSA’s receiver without their knowledge.

That, in turn, allows the military to track the cell phone to within 30 feet of its actual location, feeding the real-time data to teams of drone operators who conduct missile strikes or facilitate night raids.

The NSA geolocation system used by JSOC is known by the code name GILGAMESH. Under the program, a specially constructed device is attached to the drone. As the drone circles, the device locates the SIM card or handset that the military believes is used by the target.

Relying on this method, says the former JSOC drone operator, means that the “wrong people” could be killed due to metadata errors, particularly in Yemen, Pakistan and Somalia. “We don’t have people on the ground – we don’t have the same forces, informants, or information coming in from those areas – as we do where we have a strong foothold, like we do in Afghanistan. I would say that it’s even more likely that mistakes are made in places such as Yemen or Somalia, and especially Pakistan.”

As of May 2013, according to the former drone operator, President Obama had cleared 16 people in Yemen and five in Somalia for targeting in strikes. Before a strike is green-lit, he says, there must be at least two sources of intelligence. The problem is that both of those sources often involve NSA-supplied data, rather than human intelligence (HUMINT).

As the former drone operator explains, the process of tracking and ultimately killing a targeted person is known within the military as F3: Find, Fix, Finish. “Since there’s almost zero HUMINT operations in Yemen – at least involving JSOC – every one of their strikes relies on signals and imagery for confirmation: signals being the cell phone lock, which is the ‘find’ and imagery being the ‘unblinking eye’ which is the ‘fix.’” The “finish” is the strike itself.

“JSOC acknowledges that it would be completely helpless without the NSA conducting mass surveillance on an industrial level,” the former drone operator says. “That is what creates those baseball cards you hear about,” featuring potential targets for drone strikes or raids.

President Obama signs authorizations for “hits” that remain valid for 60 days. If a target cannot be located within that period, it must be reviewed and renewed. According to the former drone operator, it can take 18 months or longer to move from intelligence gathering to getting approval to actually carrying out a strike in Yemen. “What that tells me,” he says, “is that commanders, once given the authorization needed to strike, are more likely to strike when they see an opportunity – even if there’s a high chance of civilians being killed, too – because in their mind they might never get the chance to strike that target again.”

While drones are not the only method used to kill targets, they have become so prolific that they are now a standard part of U.S. military culture. Remotely piloted Reaper and Predator vehicles are often given nicknames. Among those used in Afghanistan, says the former JSOC drone operator, were “Lightning” and “Sky Raider.”

The latter drone, he adds, was also referred to as “Sky Raper,” for a simple reason – “because it killed a lot of people.” When operators were assigned to “Sky Raper,” he adds, it meant that “somebody was going to die. It was always set to the most high-priority missions.”

In addition to the GILGAMESH system used by JSOC, the CIA uses a similar NSA platform known as SHENANIGANS. The operation – previously undisclosed – utilizes a pod on aircraft that vacuums up massive amounts of data from any wireless routers, computers, smart phones or other electronic devices that are within range.

One top-secret NSA document provided by Snowden is written by a SHENANIGANS operator who documents his March 2012 deployment to Oman, where the CIA has established a drone base. The operator describes how, from almost four miles in the air, he searched for communications devices believed to be used by Al Qaeda in the Arabian Peninsula in neighboring Yemen.The mission was code named VICTORYDANCE.

“The VICTORYDANCE mission was a great experience,” the operator writes. “It was truly a joint interagency effort between CIA and NSA. Flights and targets were coordinated with both CIAers and NSAers. The mission lasted 6 months, during which 43 flights were flown.”

VICTORYDANCE, he adds, “mapped the Wi-Fi fingerprint of nearly every major town in Yemen.”

The NSA has played an increasingly central role in drone killings over the past five years. In one top-secret NSA document from 2010, the head of the agency’s Strategic Planning and Policy Division of the Counterterrorism Mission Management Center recounts the history of the NSA’s involvement in Yemen. Shortly before President Obama took office, the document reveals, the agency began to “shift analytic resources to focus on Yemen.”

In 2008, the NSA had only three analysts dedicated to Al Qaeda in the Arabian Peninsula in Yemen. By the fall of 2009, it had 45 analysts, and the agency was producing “high quality” signal intelligence for the CIA and JSOC.

In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen.

The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala.

The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children. It is not clear whether the strike was based on metadata collection; the White House has never publicly explained the strike or the source of the faulty intelligence that led to the civilian fatalities.

Another top-secret NSA document confirms that the agency “played a key supporting role” in the drone strike in September 2011 that killed U.S. citizen Anwar al-Awlaki, as well as another American, Samir Khan. According to the 2013 Congressional Budget Justification, “The CIA tracked [Awlaki] for three weeks before a joint operation with the U.S. military killed” the two Americans in Yemen, along with two other people.

When Brandon Bryant left his Air Force squadron in April 2011, the unit was aiding JSOC in its hunt for the American-born cleric. The CIA took the lead in the hunt for Awlaki after JSOC tried and failed to kill him in the spring of 2011.

According to Bryant, the NSA’s expanded role in Yemen has only added to what he sees as the risk of fatal errors already evident in CIA operations. “They’re very non-discriminate with how they do things, as far as you can see their actions over in Pakistan and the devastation that they’ve had there,” Bryant says about the CIA. “It feels like they tried to bring those same tactics they used over in Pakistan down to Yemen. It’s a repeat of tactical thinking, instead of intelligent thinking.”

Those within the system understand that the government’s targeting tactics are fundamentally flawed. According to the former JSOC drone operator, instructors who oversee GILGAMESH training emphasize: “‘This isn’t a science. This is an art.’ It’s kind of a way of saying that it’s not perfect.”

Yet the tracking “pods” mounted on the bottom of drones have facilitated thousands of “capture or kill” operations in Afghanistan, Iraq, Yemen, Somalia and Pakistan since September 11. One top-secret NSA document provided by Snowden notes that by 2009, “for the first time in the history of the U.S. Air Force, more pilots were trained to fly drones … than conventional fighter aircraft,” leading to a “‘tipping point’ in U.S. military combat behavior in resorting to air strikes in areas of undeclared wars,” such as Yemen and Pakistan.

The document continues: “Did you ever think you would see the day when the U.S. would be conducting combat operations in a country equipped with nuclear weapons without a boot on the ground or a pilot in the air?”

Even NSA operatives seem to recognize how profoundly the agency’s tracking technology deviates from standard operating methods of war.

One NSA document from 2005 poses this question: “What resembles ‘LITTLE BOY’ (one of the atomic bombs dropped on Japan during World War II) and as LITTLE BOY did, represents the dawn of a new era (at least in SIGINT and precision geolocation)?”

Its reply: “If you answered a pod mounted on an Unmanned Aerial Vehicle (UAV) that is currently flying in support of the Global War on Terrorism, you would be correct.”

Another document boasts that geolocation technology has “cued and compressed numerous ‘kill chains’ (i.e. all of the steps taken to find, track, target, and engage the enemy), resulting in untold numbers of enemy killed and captured in Afghanistan as well as the saving of U.S. and Coalition lives.”

The former JSOC drone operator, however, remains highly disturbed by the unreliability of such methods. Like other whistleblowers, including Edward Snowden and Chelsea Manning, he says that his efforts to alert his superiors to the problems were brushed off. “The system continues to work because, like most things in the military, the people who use it trust it unconditionally,” he says.

When he would raise objections about intelligence that was “rushed” or “inaccurate” or “outright wrong,” he adds, “the most common response I would get was ‘JSOC wouldn’t spend millions and millions of dollars, and man hours, to go after someone if they weren’t certain that they were the right person.’ There is a saying at the NSA: ‘SIGINT never lies.’ It may be true that SIGINT never lies, but it’s subject to human error.”

The government’s assassination program is actually constructed, he adds, to avoid self-correction. “They make rushed decisions and are often wrong in their assessments. They jump to conclusions and there is no going back to correct mistakes.” Because there is an ever-increasing demand for more targets to be added to the kill list, he says, the mentality is “just keep feeding the beast.”

For Bryant, the killing of Awlaki – followed two weeks later by the killing of his 16-year-old son, Abdulrahman al Awlaki, also an American citizen – motivated him to speak out. Last October, Bryant appeared before a panel of experts at the United Nations – including the UN’s special rapporteur on human rights and counterterrorism, Ben Emmerson, who is currently conducting an investigation into civilians killed by drone strikes.

Dressed in hiking boots and brown cargo pants, Bryant called for “independent investigations” into the Obama administration’s drone program. “At the end of our pledge of allegiance, we say ‘with liberty and justice for all,’” he told the panel. “I believe that should be applied to not only American citizens, but everyone that we interact with as well, to put them on an equal level and to treat them with respect.”

Unlike those who oversee the drone program, Bryant also took personal responsibility for his actions in the killing of Awlaki. “I was a drone operator for six years, active duty for six years in the U.S. Air Force, and I was party to the violations of constitutional rights of an American citizen who should have been tried under a jury,” he said. “And because I violated that constitutional right, I became an enemy of the American people.”

Bryant later told The Intercept, “I had to get out because we were told that the president wanted Awlaki dead. And I wanted him dead. I was told that he was a traitor to our country…. I didn’t really understand that our Constitution covers people, American citizens, who have betrayed our country. They still deserve a trial.”

The killing of Awlaki and his son still haunt Bryant. The younger Awlaki, Abdulrahman, had run away from home to try to find his dad, whom he had not seen in three years. But his father was killed before Abdulrahman could locate him. Abdulrahman was then killed in a separate strike two weeks later as he ate dinner with his teenage cousin and some friends. The White House has never explained the strike.

“I don’t think there’s any day that goes by when I don’t think about those two, to be honest,” Bryant says. “The kid doesn’t seem like someone who would be a suicide bomber or want to die or something like that. He honestly seems like a kid who missed his dad and went there to go see his dad.”

(read the full report at The Intercept)

Source: https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/

….
AlternativeFreePress.com -fair use-

Turkey police use tear gas to disperse protest against new internet controls

Turkish police have fired tear gas and water cannons to disperse crowds of protesters rallying against “draconian” internet laws approved by parliament.

Police approached the crowd along Istanbul’s Istiklal Avenue and fired water cannons from behind armored vehicles as protesters tried to march to the city’s main square.

“Everywhere is bribery, everywhere is corruption,” protesters chanted.

As riot police fired water cannons at protesters, some of them responded by throwing stones or setting off fireworks aimed at law enforcement officers.

The new bill was passed late Wednesday by the parliament dominated by the Erdogan’s AKP party.

If the president approves the legislation, it would give authorities the power to block web pages without a court order within just hours.

It would also require internet service providers (ISPs) to store data on their clients’ online activities for two years and provide it to the authorities on request.

However, Prime Minister Recep Tayyip Erdogan rejected any possibility that the regulations would allow authorities to have access to internet users’ personal information.

“Never. It is out of the question that people’s private data will be recorded,” he said in Istanbul on Saturday.

The opposition says the move is part of a government bid to stifle a corruption scandal and accuses the government of limiting Internet freedoms.

(read the full report at RT)

Source: http://rt.com/news/turkey-teargas-protest-internet-212/

….
AlternativeFreePress.com -fair use-

Snowden Docs: British Spies Used Sex and ‘Dirty Tricks’

Snowden Docs: British Spies Used Sex and ‘Dirty Tricks’

By Matthew Cole, Richard Esposito, Mark Schone and Glenn Greenwald, Special Contributor
NBC News

British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”

Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.

Both PowerPoint presentations describe “Effects” campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda campaigns use deception, mass messaging and “pushing stories” via Twitter, Flickr, Facebook and YouTube. JTRIG also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.

In connection with this report, NBC is publishing documents that Edward Snowden took from the NSA before fleeing the U.S., which can be viewed by clicking on the link below. The documents are being published with minimal redactions.

The spy unit’s cyber attack methods include the same “denial of service” or DDOS tactic used by computer hackers to shut down government and corporate websites.

Other documents taken from the NSA by Snowden and previously published by NBC News show that JTRIG, which is part of the NSA’s British counterpart, the cyber spy agency known as GCHQ, used a DDOS attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous.

Civil libertarians said that in using a DDOS attack against hackers the British government also infringed free speech by individuals not involved in any illegal hacking, and may have blocked other websites with no connection to Anonymous. While GCHQ defends the legality of its actions, critics question whether the agency is too aggressive and its mission too broad.

Eric King, a lawyer who teaches IT law at the London School of Economics and is head of research at Privacy International, a British civil liberties advocacy group, said it was “remarkable” that the British government thought it had the right to hack computers, since none of the U.K.’s intelligence agencies has a “clear lawful authority” to launch their own attacks.

“GCHQ has no clear authority to send a virus or conduct cyber attacks,” said King. “Hacking is one of the most invasive methods of surveillance.” King said British cyber spies had gone on offense with “no legal safeguards” and without any public debate, even though the British government has criticized other nations, like Russia, for allegedly engaging in cyber warfare.

But intelligence officials defended the British government’s actions as appropriate responses to illegal acts. One intelligence official also said that the newest set of Snowden documents published by NBC News that describe “Effects” campaigns show that British cyber spies were “slightly ahead” of U.S. spies in going on offense against adversaries, whether those adversaries are hackers or nation states. The documents also show that a one-time signals surveillance agency, GCHQ, is now conducting the kinds of active espionage operations that were once exclusively the realm of the better-known British spy agencies MI5 and MI6.

(read the full report at NBC News)

Source: http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-sex-dirty-tricks-n23091

….
AlternativeFreePress.com -fair use-

Russell Brand: Philip Seymour Hoffman is another victim of extremely stupid drug laws

In Hoffman’s domestic or sex life there is no undiscovered riddle – the man was a drug addict and, thanks to our drug laws, his death inevitable

By Russell Brand
February 6. 2014: The Guardian

Philip Seymour Hoffman’s death was not on the bill.

If it’d been the sacrifice of Miley Cyrus or Justin Bieber, that we are invited to anticipate daily, we could delight in the Faustian justice of the righteous dispatch of a fast-living, sequin-spattered denizen of eMpTyV. We are tacitly instructed to await their demise with necrophilic sanctimony. When the end comes, they screech on Fox and TMZ, it will be deserved. The Mail provokes indignation, luridly baiting us with the sidebar that scrolls from the headline down to hell.

But Philip Seymour Hoffman? A middle-aged man, a credible and decorated actor, the industrious and unglamorous artisan of Broadway and serious cinema? The disease of addiction recognises none of these distinctions. Whilst routinely described as tragic, Hoffman’s death is insufficiently sad to be left un-supplemented in the mandatory posthumous scramble for salacious garnish; we will now be subjected to mourn-ography posing as analysis. I can assure you that there is no as yet undiscovered riddle in his domestic life or sex life, the man was a drug addict and his death inevitable.

A troubling component of this sad loss is the complete absence of hedonism. Like a lot of drug addicts, probably most, who “go over”, Hoffman was alone when he died. This is an inescapably bleak circumstance. When we reflect on Bieber’s Louis Vuitton embossed, Lamborghini cortege it is easy to equate addiction with indulgence and immorality. The great actor dying alone denies us this required narrative prang.

The reason I am so non-judgmental of Hoffman or Bieber and so condemnatory of the pop cultural tinsel that adorns the reporting around them is that I am a drug addict in recovery, so like any drug addict I know exactly how Hoffman felt when he “went back out”. In spite of his life seeming superficially great, in spite of all the praise and accolades, in spite of all the loving friends and family, there is a predominant voice in the mind of an addict that supersedes all reason and that voice wants you dead. This voice is the unrelenting echo of an unfulfillable void.

Addiction is a mental illness around which there is a great deal of confusion, which is hugely exacerbated by the laws that criminalise drug addicts.

If drugs are illegal people who use drugs are criminals. We have set our moral compass on this erroneous premise, and we have strayed so far off course that the landscape we now inhabit provides us with no solutions and greatly increases the problem.

This is an important moment in history; we know that prohibition does not work. We know that the people who devise drug laws are out of touch and have no idea how to reach a solution. Do they even have the inclination? The fact is their methods are so gallingly ineffective that it is difficult not to deduce that they are deliberately creating the worst imaginable circumstances to maximise the harm caused by substance misuse.

People are going to use drugs; no self-respecting drug addict is even remotely deterred by prohibition. What prohibition achieves is an unregulated, criminal-controlled, sprawling, global mob-economy, where drug users, their families and society at large are all exposed to the worst conceivable version of this regrettably unavoidable problem.

Countries like Portugal and Switzerland that have introduced progressive and tolerant drug laws have seen crime plummet and drug-related deaths significantly reduced. We know this. We know this system doesn’t work – and yet we prop it up with ignorance and indifference. Why? Wisdom is acting on knowledge. Now we are aware that our drug laws aren’t working and that alternatives are yielding positive results, why are we not acting? Tradition? Prejudice? Extreme stupidity? The answer is all three. Change is hard, apathy is easy, tradition is the narcotic of our rulers. The people who are most severely affected by drug prohibition are dispensable, politically irrelevant people. Poor people. Addiction affects all of us but the poorest pay the biggest price.

(read the full article at The Guardian)

Source: http://www.theguardian.com/commentisfree/2014/feb/06/russell-brand-philip-seymour-hoffman-drug-laws

….
AlternativeFreePress.com -fair use-

We’re Spying on You in Shower, Says Russian Official

We’re Spying on You in Shower, Says Russian Official

By Russell Goldman
February 6, 2014: ABC News

Just when you thought conditions at hotels in Sochi, Russia, couldn’t get any worse, the deputy prime minister let slip that visitors are being spied on while in the shower.

For days journalists attending the games have complained about incomplete construction, hotel rooms without door knobs, suspiciously colored water running from taps, and most notoriously two toilets in a single stall.

When confronted by reporters today, Dmitry Kozak, the deputy prime minister responsible for the Olympic preparations, accused the Western media of a bias against Russia, and said he had seen surveillance footage from inside hotel bathrooms that supported his claim.

(full article at ABC News)

Source: http://abcnews.go.com/blogs/headlines/2014/02/were-spying-on-you-in-shower-says-russian-official/

….
AlternativeFreePress.com -fair use-

v0.1