ThereAreNoSunglasses

American Resistance To Empire

The Obama Dictatorship Orders Schools and Churches To Interrogate the Little Extremists You Are Raising

Is Your Child a Terrorist? U.S. Government Questionnaire Rates Families at Risk for Extremism

the intercept

Featured photo - Is Your Child a Terrorist? U.S. Government Questionnaire Rates Families at Risk for Extremism

Are you, your family or your community at risk of turning to violent extremism? That’s the premise behind a rating system devised by the National Counterterrorism Center, according to a document marked For Official Use Only and obtained by The Intercept.

The document–and the rating system–is part of a wider strategy for Countering Violent Extremism, which calls for local community and religious leaders to work together with law enforcement and other government agencies. The White House has made this approach a centerpiece of its response to terrorist attacks around the world and in the wake of the Paris attacks, announced plans to host an international summit on Countering Violent Extremism on February 18th. 

The rating system, part of a 36-page document dated May 2014 and titled “Countering Violent Extremism: A Guide for Practitioners and Analysts,” suggests that police, social workers and educators rate individuals on a scale of one to five in categories such as: “Expressions of Hopelessness, Futility,” “Talk of Harming Self or Others,” and “Connection to Group Identity (Race, Nationality, Religion, Ethnicity).” The ranking system is supposed to alert government officials to individuals at risk of turning to radical violence, and to families or communities at risk of incubating extremist ideologies.

Families are judged on factors such as “Aware[ness] of Each Other’s Activities,” as well as levels of “Parent-Child Bonding,” and communities are rated by access to health care and social services, in addition to “presence of ideologues or recruiters” as potential risk factors.

A low score in any of these categories would indicate a high risk of “susceptibility to engage in violent extremism,” according to the document. It encourages users of the guide to plot the scores on a graph to determine what “interventions” could halt the process of radicalization before it happens.

“The idea that the federal government would encourage local police, teachers, medical and social service employees to rate the communities, individuals and families they serve for their potential to become terrorists is abhorrent on its face,” said Mike German, a former FBI agent who is now with the Brennan Center for Justice at New York University School of Law. German called the criteria used for the ratings “subjective and specious.”


Arun Kundnani, a professor at New York University, said that enlisting communities in the way the administration suggests in the guide, “leads a range of non-policing professionals to cast particular suspicion on Muslim populations and profile them for behaviors that have no real connection to criminality.”

Kundnani also questioned the science behind the rating system. “There’s no evidence to support the idea that terrorism can be substantively correlated with such factors to do with family, identity, and emotional well-being,” he said.

The guide itself notes that the effects of Countering Violent Extremism programs are “not easy to quantify.”

The U.S. government isn’t alone in its attempts to spot youth allegedly at risk of becoming terrorists. The government of France recently issued a widely mocked graphic demonstrating ostensible warning signs of radicalization, which suggested that abrupt diet or lifestyle changes are correlated with proclivities for violent extremism. (White House counterterrorism adviser Lisa Monaco last April warned parents and community members to look out for “subtle” signs, like “sudden personality changes in their children at home—becoming confrontational.”)

The British government has put forward a plan to begin monitoring signs of radicalization at the pre-school level, and in the wake of the Charlie Hebdo attacks, children in France as young as eight years old have been detained and questioned by police for allegedly espousing radical views.

Experts have suggested that intervention by law enforcement or other branches of the government in individuals’ lives, particularly young people, based solely based on the views they express, can potentially criminalize constitutionally protected behavior.

In some cases, as The Intercept has reported, community outreach from law enforcement has also crossed the line into intelligence gathering.

Most of the document is a review of the literature on a  variety of approaches to dealing with the threat of radicalization. Examples given include a community policing program in Lewiston, Maine (population 36,000), and Saudi Arabia’s rehabilitation program for former jihadists, including Guantanamo detainees.

Though the White House has insisted that Countering Violent Extremism is not directed at any specific group, the NCTC guide only cites examples drawn from Muslim communities.

It is obvious that, in practice, [this] would mostly only be applied to Muslim communities,” said Kundnani, the NYU professor.

A public affairs officer for the National Counterterrorism Center declined to answer questions about the rating system, the methodology behind it, or why the document was marked For Official Use Only.

See the full document here (or download it as a PDF.)

 Photo:  Robert Nickelsberg/Getty Images

Obama Moves NATO’s Threshold Right Up To Putin’s Front Door

[With this latest news about new US air bases in Eastern Europe, who can still have any doubts that this is why the Pentagon and State Dept have intentionally engineered the Ukrainian civil war in the first place, in order to reignite the “COLD WAR” and to give them back their Russian “BAD GUYS”?  By embroiling Russia in a hot war, they have reintroduced the idea of a “RUSSIAN THREAT” and renewed hope that the US MILITARY will be our SAVIORS, as they kill their way towards “WORLD PEACE.”  Through careful maneuvering, the CIA’s psywarriors have managed to so inflame Ukraine’s social tensions, as to ignite outright civil war.  Their next trick will be causing open hostilities between Ukraine and Russia.]

NATO jet
A Portuguese Air Force fighter F-16 patrols over Baltics air space, from the Zokniai air base near Siauliai November 20, 2014. Ints Kalnins/Reuters

‘Biggest NATO Reinforcement Since Cold War’ Sets Frontlines Against Russia

Newsweek-logo

NATO has ranked Russia as its greatest threat, according to defence experts, as the alliance announced its plans to staff six new European bases in what its secretary general Jens Stoltenberg is calling “the biggest reinforcement of our collective defence since the end of the Cold War”.

The plan will see NATO’s rapid reaction units grow to 30,000 soldiers from 13,000, and six stations will be set up in the alliance’s easternmost member states – Estonia, Latvia, Lithuania, Poland, Romania and Bulgaria, all of whom either border Russia or share the Black Sea with annexed Crimea.

According to general Charles Wald, former-deputy commander of U.S. European Command, the move marks the “continuum of a wake-up call that is the threat of Russia in Ukraine”.

“It is a much bigger deal than it appears on paper,” Wald says. “The question for Europe is: is Putin creeping further and further west? Is this a precursor to Russia moving into Moldova? Nagorno Karabakh has been bubbling up and the Georgia issue is still unresolved.”

“NATO has essentially set these bases in its frontline states,” Wald says, referring to the countries’ proximity to Russian territory.

“What they will do is they will have the infrastructure to guide NATO’s forces to where they will have to go, supply them with equipment, intelligence apparatus and whatever they will need for supply chains, in the case of an attack on NATO territory.”

According to Ward, Poland and the Baltic states are the NATO member states “most nervous” of potential pro-Russian violence breaking out on their territories, as it has in Ukraine. The rapid response strategy is intended to prevent a spillover of pro-Russian violence into NATO and possibly deter violence from spreading in Ukraine.

“It is a little different with Ukraine because they are not part of NATO, but they are part of Europe and they are under attack,” Ward explains.

“The Ukrainians are never going to beat the Russians but they can at least fight them off their territory. Our belief is that we need to help the Ukrainians make it a bad trade off for Russia to continue expanding west,” Wald adds.

Yesterday NATO members Poland and Lithuania also agreed to form a joint military battalion with Ukraine, in a bid to further strengthen the military partnership between the West and Kiev.

According to Michael Clarke director general of the Royal United Services Institute which studies global defence and security, the move symbolises the return of Russia as NATO’s biggest security threat.

“The spearhead force is all part of NATO’s infrastructure plan,” Clarke says. “We are not adding any new units or putting any new spending into this, but rather we are reallocating existing units to be ready in eastern Europe from other parts of the world such as Belize,”

“They are there as skeleton staff at this point, but the point is that if they were activated it would enable reinforcements to arrive and act much more quickly as part of the NATO reinforcement plan,” Clarke says.

“NATO ranks Russia as its highest threat,” Clarke adds, but explains that for obvious reasons the governments of some NATO members are more immediately concerned by Russia’s actions than others.

“At this point in time the strategy is to show that NATO is a collective alliance, which shares risks, but if anything kicks off the facilities will be more than capable of dealing with the threat,” adding that Poland and the Baltic countries are among those most worried about a Russian advance.

“It is in the UK’s interest to reinvigorate NATO. Russia is a more fundamental danger, as opposed the Middle East.”

“If you press UK policy makers they will also probably admit that Russia poses the most serious security threat globally, but because it is below the level of open conflict in Ukraine, they are more reluctant to say that,” Clarke says.

According to Clarke’s colleague at RUSI, former Royal Navy officer Michael Codner, security has taken a back seat to the UK government’s agenda as the upcoming election has brought other issues such as the economy, healthcare and the threat of homegrown terrorism.

“It should be a top level issue, but it has been swept under the rug” Codner says.

Charles Wald echoes Clarke and Codner’s words but believes that the UK’s influence in NATO operations is crucial.

“Poland and the Baltic states are the most nervous about Russia, but the UK is the major player in Europe if anything goes down in NATO,” he says.

“They are being cautious with involvement, because they have their own economic issues but with regard to the moral initiative to act, if the US does something the UK will be right behind it.”

The announcement of the new spearhead force has not been received warmly by Russia, with Alexander Lukashevich a spokesperson for the Russian Ministry of Defence holding a special press briefing where he warned NATO’s latest move would “inform Russia’s subsequent military planning”.

“This plan is in and of itself very disturbing, because it is about raising NATO capabilities on our borders.”

“The so called plan to reinforce the eastern flank of NATO is nothing other than an increase in the battle readiness of the alliance,” Lukashevich added.

In a speech today Jens Stoltenberg played down speculation NATO’s eastern reinforcement signified concern that Russia will mount a western advance, but highlighted the move did come as a result of the “sharply escalated’ violence in eastern Ukraine, caused by “Russian-backed separatists”.

The plan will see NATO’s rapid reaction units grow to 30,000 soldiers from 13,000, and six stations will be set up in the alliance’s easternmost member states – Estonia, Latvia, Lithuania, Poland, Romania and Bulgaria, all of whom either border Russia or share the Black Sea with annexed Crimea.

According to general Charles Wald, former-deputy commander of U.S. European Command, the move marks the “continuum of a wake-up call that is the threat of Russia in Ukraine”.

The Perversely Bestial, Inhuman Nature of CIA Guantanamo Torturers

130423112902-exp-hunger-stirke-amanpour-00015930-horizontal-gallery

Gitmo inmate: My treatment shames American flag

cnn

Samir Naji is a Yemeni accused of serving in Osama bin Laden’s security detail and has been imprisoned for nearly 13 years without charge in Guantanamo Bay. He was cleared for release in 2009, but remains in detention. The following first-person testimony, recorded during his most recent meeting with lawyers from the international human rights organization Reprieve, has just been released by prison censors. The opinions expressed in this commentary are solely his.


Also see
: Closing Guantanamo: Who’s left and what’s in the way

Guantanamo Bay, Cuba (CNN)I’ve heard that the Senate report on CIA torture is 6,000 pages long. My story, though, takes place elsewhere: in Guantanamo, away from the CIA program that the report covers. The 6,000 pages of the Senate report are just the start of what Americans have to accept happened in their name.

It starts and ends in the silence of a tiny, freezing cold cell, alone. That’s when you hold yourself in a ball, and fight to ignore the confusion of what has just happened to you, and the fear of what might be coming next. Or the fear that comes when you realize that no one is coming to help; that the life, family and friends you knew are all far, far away.

The cell door opens. The next session, seemingly the 100th in a row. I think my first period of interrogation lasted three full months. Two teams of interrogators running shifts, day and night.

Each session begins with shouting, to wake me up. Then they hit me on the face and the back. I am so desperate for sleep, my head is swimming. There are photographs of faces stuck all around the walls of this room. They demand that I identify the individuals, but I can barely focus to see if I might know them. The shouting and the insults get louder, and then they nod to a man in the corner. He injects me twice in the arm with some unknown substance. It’s the last thing I know.

The freezing cold cell. The cell door opens. This time the guards enter, making awful honking noises, like wild animals.

I tried to refuse to eat the little food they bring me, in protest at all this. The interrogator laughs at me, but then turns angry; he swears loudly, and pours an army meal pack over my head. They tell the man in the corner to start feeding me intravenously. He inserts the tube in two different places on my arm and makes it bleed.

Closing Guantanamo: Who’s left and what’s in the way

The freezing cold cell. The cell door opens. This time the guards push me on the floor and take turns trampling over my back.

I tell the interrogators that I can’t face not eating any more. They throw food on the floor of the room and tell me to eat like a pig. They won’t let me go to the restroom. They watch as it gets more painful, and laugh as they get the translator to describe how they will rape me if I pee in my pants.

The freezing cold cell. The cell door opens. They make me stand and salute the American flag.

I’m in a sort of cinema room, where I have to watch videos of other prisoners being abused. Then they tell me that I have to dance for them, and run in circles whilst they pull on my chains. Every time I try and refuse, they touch me in my most private areas.

The freezing cold cell. The cell door opens. It has rained, and there are muddy puddles everywhere. I’m shackled, so I can’t really walk; they deliberately drag me through the muddy puddles.

Now it’s the pornography room. Awful pictures everywhere. There is one with a man and a donkey. I’m stripped naked and have my beard shaved, in a gratuitous insult to my religion. I’m shown pornographic pictures of women. I’m told to make the noises of different animals, and when I refuse, they just hit me. It ends with them pouring cold water all over me.

Hours later in my cell, I am discovered, nearly frozen. The doctor tells them to bring me urgently to the clinic, where I am given a blanket and treatment. Over the next hours, they observe me as I warm up. They are just waiting for the moment that they can sign off on my return to interrogation.

Four years ago, six U.S. government security agencies sat together and reviewed my case. Their conclusion? That I was innocent of any crime and should be released. The dirty and sadistic methods I endured — which were then taken directly to Abu Ghraib — achieved nothing, except to shame that American flag hanging in the prison corridor, which I was made to salute.

One hundred and thirty-six prisoners are still being held at Guantanamo, whilst the politicians squabble over how to black out the Senate report. America cannot keep hiding from its past, and its present, like this. Our stories, and our continued detention, cannot be made to disappear.

READ: CIA misled public on torture, Senate report says

Obama Waging Lawyer’s War To Brand Putin As “WAR CRIMINAL” Without Implicating Himself

[From the selection of news headlines given below, it is apparent that Obama’s war against Putin has taken a new, even riskier path.  Instead of continuing to simply threaten, bribe and browbeat the EU allies into closing ranks behind his scheme to isolate Putin, he intends to attempt to charge Putin with “WAR CRIMES” in the UN Security Council, branding him a “ROGUE,” Russia an “AGGRESSOR STATE” and the Novo-Russians (Eastern Ukrainian) as “TERRORISTS,” terms which Obama himself has already been branded with hundreds of times on the battlefield of the free Internet. 

Thanks to Obama a battle for a “Free Europe” will be settled upon the “Ukrainian battlefield,” by “Good Guys,” who are really “Bad Guys” of the worst sort, expecting us to believe and support them, as they turn Europe into a new tinderbox, for no good reason.  When it all boils down, there is no reason for the division and animosity between Ukraine and Russia, except for the pain left over from mistakes that are now past and the universal Ukrainians unwillingness to pay the real cost of keeping their homes warm in the wintertime.]

Ukrainian MPs call on UN, NATO & PACE to recognize Russia as ‘aggressor state’

Russia Is Turning Into a Rogue State

US Official:’ A Free Europe Rises or Falls With Ukraine’

Pro-Russian rebels officially labelled terrorists by Ukraine government

Verkhovna Rada of Ukraine Secretariat

The Verkhovna Rada of Ukraine adopted the Resolution “On the Statement of the Verkhovna Rada of Ukraine to the United Nations, European Parliament, Parliamentary Assembly of the Council of Europe, NATO Parliamentary Assembly, GUAM Parliamentary Assembly and international parliaments on

recognizing the Russian Federation the aggressor state”

( Information Department of the Verkhovna Rada of Ukraine Secretariat )

The people’s deputies adopted the Statement of the Verkhovna Rada of Ukraine to the United Nations, European Parliament, Parliamentary Assembly of the Council of Europe, NATO Parliamentary Assembly, GUAM Parliamentary Assembly and international parliaments on recognizing the Russian Federation the aggressor state.

271 people’s deputy voted in favor.

 

 

 

“ISIS” Fighters In Standard Issue “Desert Storm” Boots and Fatigues

ISIS DESERT STORM SOURCE

Remember When There Was A Commie Under Every Bed?–those days are back

As usual, Hollywood is actively assisting the latest fraud to be perpetuated upon the American people, a false revival of the anti-communist “malaria” from the Reagan era, which normally prevails in the brainwashed sheep.  Hollywood has been providing entertainment and audio/visual support to the various fascist administrations who have followed the path of world aggression since at least, WWII.
Their latest task is to vilify Putin and everything Russian, in support of the drive towards WWIII.

 

THE AMERICANS
The Americans Centers on Russian sleepers operating in the United States in the 1980s.

 

Allegiance Series Trailer – New TV Series 2015

A rookie CIA analyst doesn’t know that members of his family are part of a Russian sleeper cell.

NSA–“Your data is our data, your equipment is our equipment.”

The Digital Arms Race: NSA Preps America for Future Battle

der spiegel

By Jacob Appelbaum, Aaron Gibson, Claudio Guarnieri, Andy Müller-Maguhn, Laura Poitras, , Leif Ryge, and

Photo Gallery: 'Controlled Escalation' Photos
DPA

The NSA’s mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars — a struggle for control of the Internet that is already well underway.

Normally, internship applicants need to have polished resumes, with volunteer work on social projects considered a plus. But at Politerain, the job posting calls for candidates with significantly different skill sets. We are, the ad says, “looking for interns who want to break things.”

Politerain is not a project associated with a conventional company. It is run by a US government intelligence organization, the National Security Agency (NSA). More precisely, it’s operated by the NSA’s digital snipers with Tailored Access Operations (TAO), the department responsible for breaking into computers.Potential interns are also told that research into third party computers might include plans to “remotely degrade or destroy opponent computers, routers, servers and network enabled devices by attacking the hardware.” Using a program called Passionatepolka, for example, they may be asked to “remotely brick network cards.” With programs like Berserkr they would implant “persistent backdoors” and “parasitic drivers”. Using another piece of software called Barnfire, they would “erase the BIOS on a brand of servers that act as a backbone to many rival governments.”

An intern’s tasks might also include remotely destroying the functionality of hard drives. Ultimately, the goal of the internship program was “developing an attacker’s mindset.”

The internship listing is eight years old, but the attacker’s mindset has since become a kind of doctrine for the NSA’s data spies. And the intelligence service isn’t just trying to achieve mass surveillance of Internet communication, either. The digital spies of the Five Eyes alliance — comprised of the United States, Britain, Canada, Australia and New Zealand — want more.

The Birth of D Weapons

According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.

During the 20th century, scientists developed so-called ABC weapons — atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest.

Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, “World War III is a guerrilla information war with no division between military and civilian participation.” That’s precisely the reality that spies are preparing for today.

The US Army, Navy, Marines and Air Force have already established their own cyber forces, but it is the NSA, also officially a military agency, that is taking the lead. It’s no coincidence that the director of the NSA also serves as the head of the US Cyber Command. The country’s leading data spy, Admiral Michael Rogers, is also its chief cyber warrior and his close to 40,000 employees are responsible for both digital spying and destructive network attacks.

Surveillance only ‘Phase 0′

From a military perspective, surveillance of the Internet is merely “Phase 0″ in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once “stealthy implants” have been placed to infiltrate enemy systems, thus allowing “permanent accesses,” then Phase Three has been achieved — a phase headed by the word “dominate” in the documents. This enables them to “control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0).” Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is “real time controlled escalation”.

One NSA presentation proclaims that “the next major conflict will start in cyberspace.” To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for “unconventional solutions” alone.

In recent years, malware has emerged that experts have attributed to the NSA and its Five Eyes alliance based on a number of indicators. They include programs like Stuxnet, used to attack the Iranian nuclear program. Or Regin, a powerful spyware trojan that created a furor in Germany after it infected the USB stick of a high-ranking staffer to Chancellor Angela Merkel. Agents also used Regin in attacks against the European Commission, the EU’s executive, and Belgian telecoms company Belgacom in 2011.Given that spies can routinely break through just about any security software, virtually all Internet users are at risk of a data attack.

The new documents shed some new light on other revelations as well. Although an attack called Quantuminsert has been widely reported by SPIEGEL and others, documentation shows that in reality it has a low success rate and it has likely been replaced by more reliable attacks such as Quantumdirk, which injects malicious content into chat services provided by websites such as Facebook and Yahoo. And computers infected with Straitbizarre can be turned into disposable and non-attributable “shooter” nodes. These nodes can then receive messages from the NSA’s Quantum network, which is used for “command and control for very large scale active exploitation and attack.” The secret agents were also able to breach mobile phones by exploiting a vulnerability in the Safari browser in order to obtain sensitive data and remotely implant malicious code.

In this guerilla war over data, little differentiation is made between soldiers and civilians, the Snowden documents show. Any Internet user could suffer damage to his or her data or computer. It also has the potential to create perils in the offline world as well. If, for example, a D weapon like Barnfire were to destroy or “brick” the control center of a hospital as a result of a programming error, people who don’t even own a mobile phone could be affected.

Intelligence agencies have adopted “plausible deniability” as their guiding principle for Internet operations. To ensure their ability to do so, they seek to make it impossible to trace the author of the attack.

It’s a stunning approach with which the digital spies deliberately undermine the very foundations of the rule of law around the globe. This approach threatens to transform the Internet into a lawless zone in which superpowers and their secret services operate according to their own whims with very few ways to hold them accountable for their actions.

Attribution is difficult and requires considerable forensic effort. But in the new documents there are at least a few pointers. Querty, for example, is a keylogger that was part of the Snowden archive. It’s a piece of software designed to surreptitiously intercept all keyboard keys pressed by the victim and record them for later inspection. It is an ordinary, indeed rather dated, keylogger. Similar software can already be found in numerous applications, so it doesn’t seem to pose any acute danger — but the sourcecode contained in it does reveal some interesting details. They suggest that this keylogger might be part of the large arsenal of modules that that belong to the Warriorpride program, a kind of universal Esperanto software used by all the Five Eyes partner agencies that at times was even able to break into iPhones, among other capabilities. The documents published by SPIEGEL include sample code from the keylogger to foster further research and enable the creation of appropriate defenses.‘Just a Bunch of Hackers’

The men and women working for the Remote Operations Center (ROC), which uses the codename S321, at the agency’s headquarters in Fort Meade, Maryland, work on one of the NSA’s most crucial teams, the unit responsible for covert operations. S321 employees are located on the third floor of one of the main buildings on the NSA’s campus. In one report from the Snowden archive, an NSA man reminisces about how, when they got started, the ROC people were “just a bunch of hackers.” Initially, people worked “in a more ad hoc manner,” the report states. Nowadays, however, procedures are “more systematic”. Even before NSA management massively expanded the ROC group during the summer of 2005, the department’s motto was, “Your data is our data, your equipment is our equipment.”

The agents sit in front of their monitors, working in shifts around the clock. Just how close the NSA has already gotten to its aim of “global network dominance” is illustrated particularly well by the work of department S31177, codenamed Transgression.The department’s task is to trace foreign cyber attacks, observe and analyze them and, in the best case scenario, to siphon off the insights of competing intelligence agencies. This form of “Cyber Counter Intelligence” counts among the most delicate forms of modern spying.

 

%d bloggers like this: