| Soldier worship blinds Britain to the grim reality of war!

Soldier worship blinds Britain to the grim reality of war ~

    •  
    •  
    • A Royal Marine’s murder of a wounded Afghan in his custody lays bare the truth of military campaigns.
    • With the official Remembrance Day ceremony closing in, and soldier worship about to hit its tedious annual peak, the public have been given an unexpected glimpse of war’s unsanitised face. A Royal Marine has been convicted of murdering a wounded Afghan in his custody. Two marines were acquitted.

      While the public has for 12 years been told otherwise, the Afghan occupation is not simply a case of good guys and bad guys. Nevertheless, tired references to “bad apples” will now flow. The Ministry of Defence will repeatedly and frantically highlight the supposed “good work” the troops have been doing in the smoking ruins of Afghanistan. A stock statement will be released by the MoD about military values and high standards of behaviour. Allegations of law-breaking, they will tell us, are investigated thoroughly and can result in disciplinary action up to and including court martial, discharge and prison. And all of this will obscure rather than address the issue.

      From the outset this episode has been written through with the brand of self-delusion that has come to typify the “good war”. The original arrest of seven marines in 2012, following the discovery of footage on a laptop, sparked an indignant Facebook campaign to “Support the 7 Royal Marine Commandos arrested for murder in Afghanistan“. To date, it has attracted 63,000 “likes”. If nothing else, this highlights how a section of society can leap to the defence of servicemen long before the facts are known.

      It is my view that Royal Marine commandos are the best light role infantry in the world – bar none. Bootnecks, as they are colloquially known, are capable, professional and robust soldiers. But I can say all this without once gushing about “heroes” and without ever once needing to shy away from an uncomfortable truth simply because it happens to concern soldiers.

      We should not feel compelled to point out that those brave men and women are fighting in Afghanistan to secure our safety every time the military is mentioned. First, because it is not true that they are; and second, because such blustering at the merest glimpse of camouflage clothing is an obvious and embarrassing capitulation to dogma.

      The question at the core of this is not how we can most tastefully play down criminal acts carried out by the services. The question we ought to be brave enough to ask is: why is there such surprise when atrocities occur? There is a belief in moralistic sections of the political left and the more dumbly macho sections of the political right that soldiers, as a rule, relish killing people. Both sides are wrong – a trained killer does not equate to mindless robot.

      To understand why an occupying soldier turns to vigilantism and murder, we can do worse than look at their daily experience, which can never be divorced from the over-arching political context. Killings like this most often occur when soldiers have lost a comrade or comrades. They lose comrades because they are in a war. Killings like these can reasonably expected to be carried out by all sides in any conflict.

      What radicalises soldiers then is not too far from what radicalises lone wolf killers, terror cells and drone strike orphans: the impact of policy on an individual and the people you care about. Marine A, now convicted, was a 39-year-old senior non-commissioned officer. He had done six tours of Afghanistan as an infantryman. He is likely to have experienced countless engagements and lost various friends in a failing war. This does not excuse his actions, but why should he and his fellow marines’ callous attitude to death, shown in the transcripts of the helmet camera recording of the event, be a surprise?

      When a political decision is taken that puts men who are primed for violence into a war, bad things will happen. This is another reason to make sure that war is the very last resort and not, as in the case of the post-9/11 wars, something that is engaged in lightly, in a spirit of hubris or in the pursuit of narrow interests.

      At its core, this is a problem at the political level, which can only be resolved or avoided at the political level. It does not diminish the responsibility of the killers to say the issue is more complex than bad apples letting the side down. The culture of irrational and uncritical soldier worship serves only to blind us to the realities of war and occupation – and this contrived, blinding effect, I have long suspected, is rather the point of lionising the military.

    • Royal Marine Commandos in Helmand province, Afghanistan
      ‘We should not feel compelled to point out that brave men and women are fighting in Afghanistan to secure our safety every time the military is mentioned.’ Photograph: Getty Images
    • _________________________________________________________________________
    • WAR_path_Peace2

 

| Will the US State Dept Condemn UK’s Attempt to Use ‘Terrorism’ Laws to Suppress Journalism?

Will the US State Dept Condemn UK’s Attempt to Use ‘Terrorism’ Laws to Suppress Journalism? ~ Trevor Timm, Freedom of the Press Foundation.

In a shocking court filing this week, the UK government accused journalist Glenn Greenwald’s partner David Miranda of “terrorism” for allegedly transporting leaked (and heavily encrypted) NSA documents from documentarian Laura Poitras in Germany to Greenwald in Brazil, on a journalistic mission paid for by the Guardian newspaper.

In a statement that should send chills down the spine of every reporter, the government made the unbelievable claim that merely publishing information that has nothing to do with violence still “falls within the definition of terrorism.”

“Additionally the disclosure, or threat of disclosure, is designed to influence a government and is made for the purpose of promoting a political or ideological cause. This therefore falls within the definition of terrorism…”

Think about the sheer breadth of that statement. Not only are several Guardian reporters and editors also guilty of engaging in “terrorism” under the UK government’s logic, but so are New York Times or Pro Publica journalists who have received the same news-worthy documents for publication. If publishing or threatening to publish information for the purpose “promoting a political or ideological cause” is “terrorism,” than the UK government can lock up every major newspaper editorial board that dares write any opinion that strays from the official government line.

No matter one’s opinion on the NSA, the entire public should be disturbed by this attack on journalism. In fact, this is exactly the type of attack on press freedom the US State Department regularly condemns in authoritarian countries, and we call on them to do the same in this case.

For example, in January 2012, in response to Ethiopia jailing award-winning journalist Eskinder Nega, the State Department expressed “concern that the application of anti-terrorism laws can sometimes undermine freedom of expression and independent media.” Again in June State Department released a statement saying, “The Ethiopian government has used the Anti-Terrorism Proclamation to jail journalists and opposition party members for peacefully exercising their freedoms of expression and association.”

The 2012 State Department human rights report on Turkey criticizes the country for imprisoning “scores of journalists…most charged under antiterror laws or for connections to an illegal organization.”

In April 2013, the State Department cited Burundi for imprisoning radio journalist Hassan Ruvakuki and three of his colleagues for “acts of terrorism.”

Just last month, in response to respected Moroccan journalist Ali Anouzla being arrested under an anti-terror law for linking to a Youtube video, the State Department said, “We are concerned with the government of Morocco’s decision to charge Mr. Anouzla. We support freedom of expression and of the press, as we say all the time, universal rights that are an indispensable part of any society.”

As the Committee to Protect Journalists noted in their excellent report on the misuse of terror laws, “The number of journalists jailed worldwide hit 232 in 2012, 132 of whom were held on anti-terror or other national security charges. Both are records in the 22 years CPJ has documented imprisonments.”

Warping “terrorism” laws to suppress journalism is the hallmark of authoritarian regimes and deserves to be condemned by all. The Miranda case is a classic example of, as the State Department has put it, “misus[ing] terrorism laws to prosecute and imprison journalists.”

We call on the State Department to apply the same principle they’ve applied to these authoritarian regimes and condemn the UK for misusing its “terrorism” laws to suppress journalism and free expression.

Editor’s Note: Both Glenn Greenwald and Laura Poitras are founding board members of Freedom of the Press Foundation

________________________________________________________________________

 

| How the US came close to NUCLEAR DISASTER in 1961!

REPORT: US CAME CLOSE NUCLEAR DISASTER IN 1961

LONDON (AP) — A U.S. hydrogen bomb nearly detonated on the nation’s east coast, with a single switch averting a blast which would have been 260 times more powerful than the device that flattened Hiroshima, a newly published book says.

In a recently declassified document, reported in a new book by Eric Schlosser, the supervisor of the nuclear weapons safety department at Sandia national laboratories said that one simple, vulnerable switch prevented nuclear catastrophe.

The Guardian newspaper published the document (http://bit.ly/1fi4Y2S ) on Saturday.

Two hydrogen bombs were accidentally dropped over Goldsboro, North Carolina on Jan. 24, 1961 after a B-52 bomber broke up in flight. One of the bombs apparently acted as if it was being armed and fired — its parachute opened and trigger mechanisms engaged.

Parker F. Jones at the Sandia National Laboratories analyzed the accident in a document headed “How I learned to mistrust the H-Bomb.”

“The MK39 Mod 2 bomb did not possess adequate safety for the airborne-alert role in the B-52,” he wrote. When the B-52 disintegrates in the air it is likely to release the bombs in “a near normal fashion,” he wrote, calling the safety mechanisms to prevent accidental arming “not complex enough.”

The document said the bomb had four safety mechanisms, one of which is not effective in the air. When the aircraft broke up, two others were rendered ineffective.

“One simple, dynamo-technology, low voltage switch stood between the United States and a major catastrophe!” Jones wrote, adding that it could have been “bad news — in spades” if the switch had shorted.

Schlosser discovered the document, written in 1969, through the Freedom of Information Act.

It is featured in his new book on nuclear arms, “Command and Control,” which reports that through FOI he discovered that at least 700 “significant” accidents and incidents involving 1,250 nuclear weapons were recorded between 1950 and 1968.

_________________________________________________________________________

Nuke Holocaust 2

NukeA nukes (1)

| US sources claim China and Russia got access to Snowden’s computers!

US sources claim China and Russia got access to Snowden’s computers ~ RT.

United States officials believe that classified intelligence taken out of the country by NSA leaker Edward Snowden has been compromised by agencies in Russia and China.

Snowden, a 30-year-old former employee of intelligence contractor Booz Allen Hamilton, fled the US for Hong Kong last month and then supplied journalists with classified information pertaining to vast surveillance operations conducted by the American government’s National Security Agency.

Both Russian and US officials have made claims that Snowden is now in Moscow, likely arranging for possible asylum in another country. In the meantime, though, US sources speaking with the Washington Free Beacon say that China and Russia have gained access to “highly classified US intelligence and military information contained on electronic media” held by Snowden.

The exact compromise of the secret data held on Snowden’s laptop computers remains unknown but is the subject of an ongoing damage assessment within NSA and other intelligence agencies,” Bill Gertz of the Free Beacon wrote on Wednesday.

According to Gertz, those officials fear that Snowden may have accessed recently created nuclear war plans that could pose as future embarrassment for the US in the wake of disclosures already attributed to Snowden.

Previously, Snowden supplied The Guardian newspaper with documentation showing how the NSA routinely collects the phone records pertaining to millions of Americans every day. On Thursday this week, The Guardian’s Glenn Greenwald and Spencer Ackerman published their latest installment in the NSA leaks, exposing further surveillance under the administration of President Barack Obama that put Internet records directly into the hands of government officials.

Snowden has said that he’s personally reviewed the trove of documents supplied to The Guardian and other outlets, carefully evaluated every single one “to ensure that each was legitimately in the public interest.” Glenn Greenwald said that Snowden brought “thousands” of files with him to Hong Kong, “dozens” of which he believes are newsworthy.

What exactly Snowden knows remains a mystery, however, and he reportedly has four laptops in his possession right now that contain classified intelligence.

Earlier this month, the Washington Post cited an anonymous former intelligence official who claimed that Russian authorities were almost certain to seize any computer files Snowden brought into the country.

In a separate article earlier this month, the Post quoted another former senior US intelligence official who predicted that any intelligence compromised by Russia would have seen a similar fate en route from Hong Kong.

I guarantee the Chinese intelligence service got their hands on that right away. If they imaged the hard drives and then returned them to him, well, then the Russians have that stuff now,” the source said.

The Chinese already have everything Snowden had,” a separate source added to the Beacon’s Gertz this week.

___________________________________________________________________

black keyboard1

| Snowden Has Shared Encoded Copies Of NSA Files In Case Anything Happens To Him!

Snowden Has Shared Encoded Copies Of NSA Files In Case Anything Happens To Him

By: , FDL.

In the event that anything should happen to Edward Snowden the files he acquired from the NSA will live on. According to Glenn Greenwald, Snowden has given encoded copies of the NSA documents to numerous people and if tragedy should befall him the information will be released.

As the U.S. government presses Moscow to extradite former National Security Agency contractor Edward Snowden, America’s most wanted leaker has a plan B. The former NSA systems administrator has already given encoded files containing an archive of the secrets he lifted from his old employer to several people. If anything happens to Snowden, the files will be unlocked.

Smart move. This may not take assassination off the table but it does provide some deterrence.

Glenn Greenwald, the Guardian journalist who Snowden first contacted in February, told The Daily Beast on Tuesday that Snowden “has taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published.” Greenwald added that the people in possession of these files “cannot access them yet because they are highly encrypted and they do not have the passwords.” But, Greenwald said, “if anything happens at all to Edward Snowden, he told me he has arranged for them to get access to the full archives.”…

A former U.S. counterintelligence officer following the Snowden saga closely said his contacts inside the U.S. intelligence community “think Snowden has been planning this for years and has stashed files all over the Internet.” This source added, “At this point there is very little anyone can do about this.”

While there is very little the NSA and others can do about preventing publication of the information Snowden obtained, they can try to make it obsolete by launching new programs or making changes to old ones. Of course, they still do not seem to know the extent of the files Snowden copied and starting over from scratch can not be too appealing when the costs for creating and maintaining the programs run in the billions.

What if Snowden is not killed but merely captured? Do the files get released then? Will the files help ensure a fair trial? The American government seems intent on getting their hands on him, but to what end?

_______________________________________________________________________

NSA1

Assault Weapon 1

| Undercover cop: ‘How I spied on Stephen Lawrence campaign!’

| Undercover cop: ‘How I spied on Stephen Lawrence campaign!’ (7:39) ~ YouTube.

In extracts from a joint Guardian and Channel 4 Dispatches investigation, police whistleblower Peter Francis reveals disturbing details about his undercover deployment. His full story is detailed in the book Undercover: The True Story of Britain’s Secret Police, by Rob Evans and Paul Lewis.

Paul Lewis, Rob Evans, Guy Grandjean, Alex Purcell and Mustafa Khalili

Source: The Guardian / Channel 4 Dispatches
Length: 7min 39sec, Monday 24 June 2013

URLhttp://youtu.be/vBhX_vWE1kQ

___________________________________________________________________

UK police stateA

police-state-brutalityA

| PRISM UK: MoD serves news outlets with D notice over surveillance leaks!

MoD serves news outlets with D notice over surveillance leaks ~

  • The Guardian.

    BBC and other media groups issued with D notice to limit publication of information that could ‘jeopardise national security.’

    Defence officials censor BBC coverage of surveillance tactics

    It is not clear what impact the censorship warning has had on media coverage of Snowden’s revelations relating to British intelligence. Photograph: Handout/Reuters

    Defence officials issued a confidential D notice to the BBC and other media groups in an attempt to censor coverage of surveillance tactics employed by intelligence agencies in the UK and US.

    Editors were asked not to publish information that may “jeopardise both national security and possibly UK personnel” in the warning issued on 7 June, a day after the Guardian first revealed details of the National Security Agency’s (NSA) secret Prism programme.

    The D notice, which was marked “private and confidential: not for publication, broadcast or use on social media”, was made public on the Westminster gossip blog, Guido Fawkes. Although only advisory for editors, the self-censorship system is intended to prevent the media from making “inadvertent public disclosure of information that would compromise UK military and intelligence operations and methods”.

    The warning was issued by defence officials in the UK as the BBC, ITN, Sky News and other newspapers and broadcasters around the world covered the surveillance revelations disclosed by the NSA whistleblower Edward Snowden. The leaks, reported extensively in the Guardian and also the Washington Post, have made headlines on both sides of the Atlantic for more than a week.

    However, it is not clear what impact the warning has had on media coverage of Snowden’s revelations relating to British intelligence. William Hague, the foreign secretary, who is reponsible for GCHQ, was not asked when he appeared on Monday’s BBC Radio 4 Today programme about reports that the spy agency was involved in monitoring communications made by foreign delegates at the G20 summit in London 2009. Instead the subject was discussed in an item aired towards the end of the programme at 8.45am.

    A BBC spokeswoman declined to comment on the D notice, but pointed out that the broadcaster did cover the G20 surveillance story on its radio news bulletins. She said the BBC believed it had “afforded the story” what the broadcaster described as “the appropriate level of coverage” among other significant news items, “including the ongoing G8 summit, the sentencing of Stuart Hall, the Co-op Bank bailout and the Ian Brady hearing”.

    According to the Guido Fawkes website, the warning said: “There have been a number of articles recently in connection with some of the ways in which the UK intelligence services obtain information from foreign sources.

    “Although none of these recent articles has contravened any of the guidelines contained within the defence advisory notice system, the intelligence services are concerned that further developments of this same theme may begin to jeopardise both national security and possibly UK personnel.”

    __________________________________________________________________

HypocrisyPainful

Mushroom 3 Paranoia1

| GCHQ intercepted foreign politicians’ communications at G20 summits!

GCHQ intercepted foreign politicians’ communications at G20 summits ~

  •  and The Guardian.

    Exclusive: phones were monitored and fake internet cafes set up to gather information from allies in London in 2009!

  • GCHQ composite
    Documents uncovered by the NSA whistleblower, Edward Snowden, reveal surveillance of G20 delegates’ emails and BlackBerrys. Photograph: Guardian

    Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

    The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.

    The disclosure raises new questions about the boundaries of surveillance byGCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.

    There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls “ground-breaking intelligence capabilities” to intercept the communications of visiting delegations.

    This included:

    • Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates’ use of computers;

    • Penetrating the security on delegates’ BlackBerrys to monitor their email messages and phone calls;

    • Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit;

    • Targeting the Turkish finance minister and possibly 15 others in his party;

    • Receiving reports from an NSA attempt to eavesdrop on the Russian leader, Dmitry Medvedev, as his phone calls passed through satellite links to Moscow.

    The documents suggest that the operation was sanctioned in principle at a senior level in the government of the then prime minister, Gordon Brown, and that intelligence, including briefings for visiting delegates, was passed to British ministers.

    A briefing paper dated 20 January 2009 records advice given by GCHQ officials to their director, Sir Iain Lobban, who was planning to meet the then foreign secretary, David Miliband. The officials summarised Brown’s aims for the meeting of G20 heads of state due to begin on 2 April, which was attempting to deal with the economic aftermath of the 2008 banking crisis. The briefing paper added: “The GCHQ intent is to ensure that intelligence relevant to HMG’s desired outcomes for its presidency of the G20 reaches customers at the right time and in a form which allows them to make full use of it.” Two documents explicitly refer to the intelligence product being passed to “ministers”.

    GCHQ ragout 1One of the GCHQ documents. Photograph: GuardianAccording to the material seen by the Guardian, GCHQ generated this product by attacking both the computers and the telephones of delegates.

    One document refers to a tactic which was “used a lot in recent UK conference, eg G20”. The tactic, which is identified by an internal codeword which the Guardian is not revealing, is defined in an internal glossary as “active collection against an email account that acquires mail messages without removing them from the remote server”. A PowerPoint slide explains that this means “reading people’s email before/as they do”.

    The same document also refers to GCHQ, MI6 and others setting up internet cafes which “were able to extract key logging info, providing creds for delegates, meaning we have sustained intelligence options against them even after conference has finished”. This appears to be a reference to acquiring delegates’ online login details.

    Another document summarises a sustained campaign to penetrate South African computers, recording that they gained access to the network of their foreign ministry, “investigated phone lines used by High Commission in London” and “retrieved documents including briefings for South African delegates to G20 and G8 meetings”. (South Africa is a member of the G20 group and has observer status at G8 meetings.)

    GCHQ Ragout 2Another excerpt from the GCHQ documents. Photograph: GuardianA detailed report records the efforts of the NSA’s intercept specialists at Menwith Hill in North Yorkshire to target and decode encrypted phone calls from London to Moscow which were made by the Russian president, Dmitry Medvedev, and other Russian delegates.

    Other documents record apparently successful efforts to penetrate the security of BlackBerry smartphones: “New converged events capabilities against BlackBerry provided advance copies of G20 briefings to ministers … Diplomatic targets from all nations have an MO of using smartphones. Exploited this use at the G20 meetings last year.”

    The operation appears to have run for at least six months. One document records that in March 2009 – the month before the heads of state meeting – GCHQ was working on an official requirement to “deliver a live dynamically updating graph of telephony call records for target G20 delegates … and continuing until G20 (2 April).”

    Another document records that when G20 finance ministers met in London in September, GCHQ again took advantage of the occasion to spy on delegates, identifying the Turkish finance minister, Mehmet Simsek, as a target and listing 15 other junior ministers and officials in his delegation as “possible targets”. As with the other G20 spying, there is no suggestion that Simsek and his party were involved in any kind of criminal offence. The document explicitly records a political objective – “to establish Turkey’s position on agreements from the April London summit” and their “willingness (or not) to co-operate with the rest of the G20 nations”.

    The September meeting of finance ministers was also the subject of a new technique to provide a live report on any telephone call made by delegates and to display all of the activity on a graphic which was projected on to the 15-sq-metre video wall of GCHQ’s operations centre as well as on to the screens of 45 specialist analysts who were monitoring the delegates.

    “For the first time, analysts had a live picture of who was talking to who that updated constantly and automatically,” according to an internal review.

    A second review implies that the analysts’ findings were being relayed rapidly to British representatives in the G20 meetings, a negotiating advantage of which their allies and opposite numbers may not have been aware: “In a live situation such as this, intelligence received may be used to influence events on the ground taking place just minutes or hours later. This means that it is not sufficient to mine call records afterwards – real-time tip-off is essential.”

    In the week after the September meeting, a group of analysts sent an internal message to the GCHQ section which had organised this live monitoring: “Thank you very much for getting the application ready for the G20 finance meeting last weekend … The call records activity pilot was very successful and was well received as a current indicator of delegate activity …

    “It proved useful to note which nation delegation was active during the moments before, during and after the summit. All in all, a very successful weekend with the delegation telephony plot.”

    _____________________________________________________________________

    Internet-cyber-crimeA

BB CYBERCRIME

Paranoia1

| NSA surveillance: The US is behaving like China!

NSA surveillance: The US is behaving like China ~ 

Both governments think they are doing what is best for the state and people. But, as I know, such abuse of power can ruin lives.

  • Hong Kong front pages 11 June 2013
    NSA whistleblower Edward Snowden and Barack Obama appear on the front pages of local papers in Hong Kong on 11 June 2013. Photograph: Bobby Yip/Reuters

    Even though we know governments do all kinds of things I was shocked by the information about the US surveillance operation, Prism. To me, it’s abusively using government powers to interfere in individuals’ privacy. This is an important moment for international society to reconsider and protect individual rights.

    I lived in the United States for 12 years. This abuse of state power goes totally against my understanding of what it means to be a civilised society, and it will be shocking for me if American citizens allow this to continue. The US has a great tradition of individualism and privacy and has long been a centre for free thinking and creativity as a result.

    In our experience in China, basically there is no privacy at all – that is why China is far behind the world in important respects: even though it has become so rich, it trails behind in terms of passion, imagination and creativity.

    Of course, we live under different kinds of legal conditions – in the west and in developed nations there are other laws that can balance or restrain the use of information if the government has it. That is not the case in China, and individuals are completely naked as a result. Intrusions can completely ruin a person’s life, and I don’t think that could happen in western nations.

    But still, if we talk about abusive interference in individuals’ rights, Prism does the same. It puts individuals in a very vulnerable position. Privacy is a basic human right, one of the very core values. There is no guarantee that China, the US or any other government will not use the information falsely or wrongly. I think especially that a nation like the US, which is technically advanced, should not take advantage of its power. It encourages other nations.

    Before the information age the Chinese government could decide you were a counter-revolutionary just because a neighbour reported something they had overheard. Thousands, even millions of lives were ruined through the misuse of such information.

    Today, through its technical abilities, the state can easily get into anybody’s bank account, private mail, conversations, and social media accounts. The internet and social media give us new possibilities of exploring ourselves.

    But we have never exposed ourselves in this way before, and it makes us vulnerable if anyone chooses to use it against us. Any information or communication could put young people under the surveillance of the state. Very often, when oppressive states arrest people, they have that information in their hands. It can be used as a way of controlling you, to tell you: we know exactly what you’re thinking or doing. It can drive people to madness.

    When human beings are scared and feel everything is exposed to the government, we will censor ourselves from free thinking. That’s dangerous for human development.

    In the Soviet Union before, in China today, and even in the US, officials always think what they do is necessary, and firmly believe they do what is best for the state and the people. But the lesson that people should learn from history is the need to limit state power.

    If a government is elected by the people, and is genuinely working for the people, they should not give in to these temptations.

    During my detention in China I was watched 24 hours a day. The light was always on. There were two guards on two-hour shifts standing next to me – even watching when I swallowed a pill; I had to open mouth so they could see my throat. You have to take a shower in front of them; they watch you while you brush your teeth, in the name of making sure you’re not hurting yourself. They had three surveillance cameras to make sure the guards would not communicate with me.

    But the guards whispered to me. They told stories about themselves. There is always humanity and privacy, even under the most restrictive conditions.

    To limit power is to protect society. It is not only about protecting individuals’ rights but making power healthier.

    Civilisation is built on that trust and everyone must fight to defend it, and to protect our vulnerable aspects – our inner feelings, our families. We must not hand over our rights to other people. No state power should be given that kind of trust. Not China. Not the US.

    ___________________________________________________________________

    BlackHole1

| Police State: Another Truth-Teller Steps Forward!

Another Truth-Teller Steps Forward ~  Ray McGovernCommon Dreams.

Edward Snowden, the person who disclosed top-secret documents on the U.S. government’s massive surveillance programs, is reportedly in Hong Kong and seeking asylum from countries that value openness and freedom, conditions seen as slipping away at home.

Before the U.S. government and the mainstream media engage in the customary character assassination of truth-teller Edward Snowden – a fate endured by Pfc. Bradley Manning and others – let’s get on the record the motives he gave for releasing the trove of information on intrusive eavesdropping by the National Security Agency.

Edward Snowden, who revealed himself as the leaker of top-secret documents related to the National Security Agency’s electronic surveillance. (Photo/UK Guardian)

Why would someone like Snowden, a 29-year-old employee of national-security contractor Booz Allen Hamilton, jeopardize what he calls “a very comfortable life” in order to blow the whistle on the U.S. government’s abuse of power?

If what he did sounds weird, this is only because there are so precious few like him who will stand on principle and risk everything. Snowden explained that if the public does not know about these intrusive programs, there is no room for citizen input regarding how they square with our constitutional rights.

Snowden, who was living in Hawaii with a promising career and a salary said to be about $200,000 a year, told the London Guardian: “I’m willing to sacrifice all of that because I can’t in good conscience allow the U.S. government to destroy privacy, Internet freedom, and basic liberties for people around the world with this massive surveillance machine they’re now building.”

He added that he wanted to reveal the “federation of secret law, unequal pardon, and irresistible executive powers that rule the world I love. … What they’re doing poses an existential threat to democracy.”

Snowden enlisted in the Army in 2003 and began training to join the Special Forces. He told the Guardian: “I wanted to fight in the Iraq war because I felt like I had an obligation as a human being to help free people from oppression.” He quickly found, though, that, in his words, “Most of the people training us seemed pumped up about killing Arabs, not helping anyone.” Snowden broke both legs in a training accident and was discharged.

In several key respects, the experiences of Snowden resemble those of Bradley Manning. Both took the enlisted person’s oath to “support and defend the Constitution of the United States against all enemies, foreign and domestic.” As a condition of employment, both signed a promise not to disclose classified information; and both witnessed at close hand flagrant abuses that their consciences told them they needed to expose.

All this required them to go back on their secrecy promise, in order to achieve a greater good. What they were able to understand, and act on, is what ethicists call a “supervening value.” [See Daniel C. Maguire’s The Manning Trial’s Real Defendant” regarding the moral balancing act between democracy’s need for information and government insistence on secrecy.]

It didn’t require a law degree for Bradley Manning and Edward Snowden to understand how the Bush and Obama administrations were playing fast and loose with key provisions of the Constitution of the United States.

‘Safety’ Before Constitution

As for the current President, he seems to have been editing the oath he took to “preserve, protect, and defend the Constitution of the United States.” Few caught it when he preached on national security on May 23, but Greg Sargent noted in the Washington Post that Obama defined his commander-in-chief role as requiring him to tilt toward national security and away from civil liberties – clearly prioritizing the latter out of a warped zero-sum mindset.

Obama said “constitutional issues” must be “weighed” against “my responsibility to protect the American people.” Got that? He was even more explicit last Friday about how he sees these choices. “You can’t have 100 percent security and also then have 100 percent privacy and zero inconvenience,” Obama said. “We’re going to have to make some choices as a society. … There are trade-offs involved.”

Regarding his priorities, he said: “When I came into this office I made two commitments … Number one, to keep the American people safe; and Number two, to uphold the Constitution. And that includes what I consider to be a constitutional right to privacy and an observance of civil liberties.”

Thanks for tacking on that last sentence, Mr. President, but your defense of the incredibly wide and intrusive programs – alien to Fourth Amendment protections – strain credulity well beyond the breaking point. You lost me when you described the recently revealed eavesdropping programs that suck up data on billions of our communications daily as “very narrowly circumscribed” and “very focused.”

In July 2008, when Congress passed and President Bush signed a law making government eavesdropping easier and granting immunity to telecommunications companies, which had already violated, together with the Bush administration, our Fourth Amendment rights, this seemed to me a watershed. What possible incentive would the telecoms now have for abiding by the Constitution, I asked myself.

When I heard that then-Sen. Barack Obama had flip-flopped on this vote – as he was burnishing his national security “cred” for his White House run – I wrote him an open letter. He had said he would vote against the bill, before he decided to vote for this major revision of the Foreign Intelligence and Surveillance Act (FISA) of 1978.

I gave my open letter the title It’s a Deal Breaker for This Intelligence Officer.” Here’s the main part:

“July 3, 2008

“Dear Senator Obama,

“I speak from 30 years of experience in intelligence work. I don’t know who actually briefed you on the eavesdropping legislation, but the bill is unnecessary for intelligence collection and POISON for our civil liberties — not even to mention the unconscionable retroactive immunity provision.

“You have made a big mistake, Senator, in indicating you intend to vote for it. There is still time to change your mind. That’s what big people do. Your ‘explanation’ was unworthy of one who has sworn to protect and defend the Constitution of the United States (including the Fourth Amendment).”

 ‘Turnkey Tyranny’

The consequences of this law are what Snowden ended up warning us against in the video arranged by the Guardian, after he reviewed some of what he had seen from his vantage point. His window into the National Security Agency and its management no doubt provided unflattering insight into the behavior of its leaders and their nodding, dismissive acquaintance with any limitations in existing law.

Air Force Gen. Michael Hayden who saluted smartly when ordered by President Bush and Vice President Dick Cheney to discard what had been known as NSA’s “First Commandment – Thou shalt not eavesdrop on Americans without a warrant.” The rubric-justification was: “After 9/11, everything changed” – including any need to pay much attention to the law. Like the telecom corporations, Hayden was not only held harmless and forgiven but lauded for his patriotism

And if you think his successor, Army General Keith Alexander, feels constrained by his own oath of office, think again. It is a felony to lie to Congress. He did. In olden days it would have been an embarrassing, career-ending story. Not for Alexander. The “mainstream media” has lionized him rather than holding him accountable. And he now sports four stars and not only directs NSA but also is Commander of the U.S. Cyber Command.

It’s a long but instructive story: In December 2005, top New York Times executives belatedly decided to let the rest of us in on the fact that the George W. Bush administration had been eavesdropping on American citizens without the court warrants required by the Foreign Intelligence Surveillance Act (FISA) of 1978.

The Times had learned of this several months before the presidential election of 2004 but acquiesced to White House entreaties to suppress the damaging information. However, in late fall 2005, Times correspondent James Risen prepared to publish a book, State of War: The Secret History of the CIA and the Bush Administration,” revealing the warrantless eavesdropping anyway. Times publisher, Arthur Sulzberger, Jr., recognized that he could procrastinate no longer.

It would simply be too embarrassing to have Risen’s book on the street with Sulzberger and his associates pretending that this explosive eavesdropping story did not fit Adolph Ochs’s trademark criterion: All The News That’s Fit To Print. (The Times’ own ombudsman, Public Editor Byron Calame, later branded the newspaper’s explanation for the long delay in publishing this story “woefully inadequate.”)

When Sulzberger told his friends in the White House that he could no longer hold off on publishing in the newspaper, he was summoned to the Oval Office for a counseling session with President Bush on Dec. 5, 2005. Bush tried in vain to talk him out of putting the story in the Times. The truth would out; part of it, at least – in 11 days.

Gen. Alexander Out of the Loop

Unfortunately for National Security Agency Director Lt. Gen. Keith Alexander, the White House neglected to tell him that the cat would soon be out of the bag. So on Dec. 6, Alexander spoke from the old dishonest talking points in assuring visiting House Intelligence Committee member Rush Holt, D-New Jersey, that the NSA did not eavesdrop on Americans without a court order.

Still possessed of the quaint notion that generals and other senior officials are not supposed to lie brazenly to congressional oversight committees, Holt wrote a blistering letter to Gen. Alexander after the Times, on Dec. 16, front-paged a feature by Risen and Eric Lichtblau, “Bush Lets U.S. Spy on Callers Without Courts.”

But House Intelligence Committee chair Pete Hoekstra, R-Michigan, apparently found Holt’s scruples benighted; Hoekstra did nothing to hold Alexander accountable for misleading Holt, his most experienced committee member, who had served as an intelligence analyst at the State Department.

What followed struck me as bizarre. The day after the Dec. 16 Times feature article, the President of the United States publicly admitted to a demonstrably impeachable offense. Authorizing illegal electronic surveillance was a key provision of the second article of impeachment against President Richard Nixon. On July 27, 1974, this and two other articles of impeachment were approved by bipartisan votes in the House Judiciary Committee and likely would have passed the House if Nixon had not chosen to resign on Aug. 9, 1974.

Yet, far from expressing remorse or regret about his warrantless wiretaps, President Bush bragged about having authorized the surveillance “more than 30 times since the September the 11th attacks,” and said he would continue to do so. The President also said: “Leaders in Congress have been briefed more than a dozen times on this authorization and the activities conducted under it.”

On Dec. 19, 2005, then-Attorney General Alberto Gonzales and then-NSA Director Michael Hayden held a press conference to answer questions about the surveillance program. Gonzales was asked why the White House decided to flout FISA rather than attempt to amend it, choosing instead a “backdoor approach.” He answered:

“We have had discussions with Congress … as to whether or not FISA could be amended to allow us to adequately deal with this kind of threat, and we were advised that that would be difficult, if not impossible.” Impossible? Regarding that time, James Risen quipped: “In October 2001, you could have set up guillotines on the public streets of America.”

It was not difficult to infer that the surveillance program, soon to be given the respectable label of the “Terrorist Surveillance Program,” was of such scope and intrusiveness that, even amid highly stoked fear, it would have elicited public outrage.

Almost All the News Fit to Print

Like the giant telecoms, the New York Times never had to issue a mea culpa for hiding the crass violations of our Fourth Amendment rights until after the 2004 election and another year for good measure.

The issue arose again in a curious way on Sept. 13, 2010, at a large event at the New York Times hosted by then-Managing Editor Jill Abramson in honor of Daniel Ellsberg for his release of the Pentagon Papers, which the Times and others published in June 1971. (Dan invited me to come along; better late than never, we thought.)

Abramson alluded in a matter-of-fact way to a particularly egregious episode in which theTimes did not cover itself in glory. But one would not have gleaned the latter from Abramson’s casual mention of how the Times had published “the story about the NSA’s eavesdropping program.”

Abramson: The issue [of government pressure] became salient once again after 9/11, when the Times and other publications were the recipients of requests from the Bush White House to occasionally withhold publication of stories that involved secrets and national security issues. Probably the most famous one involved our publication of the story about the NSA’s eavesdropping program.

Ellsberg: By the way, as the only non-Times person up here, I shouldn’t refrain from saying, I’ve been very publicly very critical of the Times’ decision to withhold the NSA wiretap story — not only, for a whole year, but very critically, past the election of 2004. I think it’s quite possible that the revelation that the president had, for three years, been blatantly violating the law …

Abramson (interrupting): Although in truth, it wasn’t known in real time at the election, the gravity of the legal issue was not.

Ellsberg: The legal issue, perhaps. …

Abramson: So —

Ellsberg: The — a whole year. I think that did make a difference.

Abramson: The thing is when the government says — you know, by publishing a story you’re harming the national security, you’re helping the terrorists. I mean there are still people today who argue that the NSA program was the crown jewel, the most valuable anti-terrorism program that the Bush administration had going, and that it was terribly wrong of the Times to —

Ellsberg: And the Times went ahead.

Abramson: — publish.

Ellsberg: In the end, that’s what I’m saying.

Abramson: In the end, we did go ahead. But I’m saying these are not cavalier decisions.

Anyone want to guess why Ed Snowden chose the Guardian of London (and also theWashington Post) over the “paper of record” for his disclosures?

The Need for Truth-Tellers

In September 2004 Daniel Ellsberg and I drafted an appeal to those who might have been thinking of what Bradley Manning and now Ed Snowden have had the courage to do. It is included below as a reminder that blowing the whistle on war crimes and on gross violations of the U.S. Constitution is a laudable form of patriotism. The last time I checked the professional help promised in 2004 was reaffirmed.

September 9, 2004

APPEAL TO: Current Government Officials

FROM: The Truth-Telling Coalition

It is time for unauthorized truth telling.

Citizens cannot make informed choices if they do not have the facts—for example, the facts that have been wrongly concealed about the ongoing war in Iraq: the real reasons behind it, the prospective costs in blood and treasure, and the setback it has dealt to efforts to stem terrorism. Administration deception and cover-up on these vital matters has so far been all too successful in misleading the public.

Many Americans are too young to remember Vietnam. Then, as now, senior government officials did not tell the American people the truth. Now, as then, insiders who know better have kept their silence, as the country was misled into the most serious foreign policy disaster since Vietnam.

Some of you have documentation of wrongly concealed facts and analyses that—if brought to light—would impact heavily on public debate regarding crucial matters of national security, both foreign and domestic. We urge you to provide that information now, both to Congress and, through the media, to the public. …

There is a growing network of support for whistleblowers. In particular, for anyone who wishes to know the legal implications of disclosures they may be contemplating, the ACLU stands ready to provide pro bono legal counsel, with lawyer-client privilege. The Project on Government Oversight (POGO) will offer advice on whistle blowing, dissemination and relations with the media.

Needless to say, any unauthorized disclosure that exposes your superiors to embarrassment entails personal risk. Should you be identified as the source, the price could be considerable, including loss of career and possibly even prosecution. Some of us know from experience how difficult it is to countenance such costs. But continued silence brings an even more terrible cost, as our leaders persist in a disastrous course and young Americans come home in coffins or with missing limbs. …

We know how misplaced loyalty to bosses, agencies, and careers can obscure the higher allegiance all government officials owe the Constitution, the sovereign public, and the young men and women put in harm’s way. We urge you to act on those higher loyalties. … Truth telling is a patriotic and effective way to serve the nation. The time for speaking out is now.

SIGNATORIES

Appeal from the Truth-Telling Coalition

Edward Costello, Former Special Agent (Counterintelligence), Federal Bureau of Investigation

Sibel Edmonds, Former Language Specialist, Federal Bureau of Investigation

Daniel Ellsberg, Former official, U.S. Departments of Defense and State

John D. Heinberg, Former Economist, Employment and Training Administration, U.S. Department of Labor

Larry C. Johnson, Former Deputy Director for Anti-Terrorism Assistance, Transportation Security, and Special Operations, Department of State, Office of the Coordinator for Counter Terrorism

Lt. Col Karen Kwiatowski, USAF (ret.), who served in the Pentagon’s Office of Near East Planning

John Brady Kiesling, Former Political Counselor, U.S. Embassy, Athens, Department of State

David MacMichael, Former Senior Estimates Officer, National Intelligence Council, Central Intelligence Agency

Ray McGovern, Former Analyst, Central Intelligence Agency

Philip G. Vargas, Ph.D., J.D., Dir. Privacy & Confidentiality Study, Commission on Federal Paperwork (Author/Director: “The Vargas Report on Government Secrecy” — CENSORED)

Ann Wright, Retired U.S. Army Reserve Colonel and U.S. Foreign Service Officer

An earlier version of this article first appeared at Consortiumnews.com

 Ray McGovern

Ray McGovern works with Tell the Word, the publishing arm of the ecumenical Church of the Saviour in Washington, DC. During his career as a CIA analyst, he prepared and briefed the President’s Daily Brief and chaired National Intelligence Estimates. He is a member of the Steering Group of Veteran Intelligence Professionals for Sanity (VIPS)

_______________________________________________________________________

YesWeSCAN

Paranoia1