Just International

China hacking vs. Pentagon whacking: An arms race in cyber-space?

By Nile Bowie

June 04, 2013

Fresh allegations of hacking and cyber-theft between China and the United States as well as resources channeled into cyber-warfare and digital troops by both superpowers show uncertain diplomatic terrain ahead.

As the Obama administration imposes gouging cuts on fundamental social spending, the White House is allocating $13 billion for the US Cyber Command, tasked with waging ‘offensive cyber strikes’ to defend the homeland. In ‘Pentagonese’ that translates to building malicious computer viruses designed to subvert disable, and destroy targets and their computer-controlled infrastructure.

Gen. Keith Alexander, who leads both the Cyber Command and the NSA, even claimed that 13 of the 40 existing cyber battalions are tasked specifically with waging pre-emptive attacks against other countries.

In keeping with the logic of American exceptionalism, which supposes that the US maintain unrivalled supremacy in every tactical or military field, the Pentagon is now working in earnest to extend its dominance to cyberspace.

It’s no secret that China has made the modernization of its armed forces a top priority. As Beijing develops new types of hardware, including aircraft carriers, strategic missile submarines and advanced aircraft, white papers issued by the People’s Liberation Army (PLA) highlight the desire to digitalize the nation’s military by utilizing modern information technology.

Washington is no stranger to scare tactics, and as establishment figures routinely warn of America’s power grids and financial systems being overtaken by e-terrorists, the US is positioning itself to enact that same scenario onto others under the guise of national defense.

While the US gives itself the space to pre-emptively cyber-strike others with impunity, the Pentagon says that any computer-based attacks and hacking from foreign countries can be considered acts of war, which could merit a ’use of force’ retaliation.

The US Cyber Command is part of a worldwide offensive cyber warfare system that includes all branches of the US military, in addition to our friends in NATO – its chief, Anders Fogh Rasmussen, even went as far as saying that he wants to “extend the definition of attacks which trigger activation of the alliance to include cyber attacks.” While the US devises ways to warmonger through programming code, President Obama provocatively phoned Chinese President Xi Jinping immediately after his inauguration in March to demand that Beijing stop hacking, a charge China vehemently denies. Obama’s national security adviser, Thomas Donilon, also called out China by name during a speech, lamenting how “the international community cannot tolerate such activity from any country.” (Except the United States, obviously.)

Crying foul over China

The Obama administration accuses Chinese hackers of waging cyber-attacks on a number of US entities, including billion-dollar corporations and governmental departments, and Beijing has recently been charged with stealing blueprints for combat aircraft as such the F/A-18 fighter jet and the F-35 Joint Strike Fighter, in addition to specs on naval vessels and missile defense systems.

The Chinese Defense Ministry dismissed the accusations as ridiculous, saying that the US underestimates the intelligence of the Chinese people and their capacity to develop tactically competitive military technology.

US security experts also previously claimed that a 12-story office building on the outskirts of Shanghai was the headquarters of an elusive squadron of the PLA operating under the name Unit 61398, tasked with attacking international computer networks and engaging in espionage.

Beijing claims that findings lack technical proof, because the report relied solely on suspicious IP addresses that originate in China, which the Defense Ministry suggests can be easily usurped by hackers outside of China. In truth, there is a glaring absence of any cyber-smoking gun that definitively corroborates US claims. However, it remains highly plausible that Beijing would have an interest in obtaining the intimate tech-specs of Washington’s military hardware to reverse engineer it and build more reliable defensive mechanisms for itself. After all, China is being encircled by a pivoting military power that has waged aggressive wars outside of international law – any Beijing-backed espionage seen through this perspective becomes understandable. Ironically enough, the Chinese embassy in Washington claims it is a victim of computer hacking that originates in the United States.

Let’s ask the Iranians

Its common knowledge that Israel and the United States engineered the Stuxnet virus that sabotaged Iran’s nuclear facility in Natanz, it was even claimed by people close to the matter that it was President Obama’s personal directive. Stuxnet remains the most sophisticated malware discovered thus far, the virus targets industrial systems such as nuclear power plants and electrical grids from a Microsoft Windows-based PC. The virus exploits security gaps referred to as zero-day vulnerabilities to attack specific targets; the Pentagon reportedly pays top dollar to get its hands on such programming vulnerabilities, which are the essential ingredient in any cyber-weapon.

An aerial view of the Pentagon building in Washington (Reuters / Jason Reed JIR / CN)

Upon delivery of the Stuxnet payload via USB, the malicious malware manipulated the operating speed of centrifuges spinning nuclear fuel to create distortions that deliberately damaged the machines, while disabling emergency controls. Stuxnet took out nearly 1,000 of the 5,000 centrifuges spinning uranium at the facility, while numerous Iranian nuclear scientists have been assassinated.

Even after acts of overt hostility and open sabotage, Iran’s response has been completely muted. If the shoe was on the other foot, could the United States ever exercise the same restraint? By the Pentagon’s definition, it would have the legal right to retaliate with force if ever found itself on the receiving end of a Stuxnet-type virus.

When asked about the Stuxnet worm in a press conference, former White House WMD Coordinator Gary Samore boasted, “I’m glad to hear they are having troubles with their centrifuge machines, and the US and its allies are doing everything we can to make it more complicated.” Never in any of the detailed exposés published in the New York Times and elsewhere on the Stuxnet episode, is there any moral or legal questioning of Washington and Tel Aviv’s blatantly illegal tactics; mainstream reports on the subject read more like White House press statements than anything that resembles journalism.

Who’s hacking who?

Congress claims that poor internet security has surpassed terrorism to become the single greatest threat to the homeland, and ironically, US tax dollars are flowing to skilled hackers affiliated with criminal groups who supply government agencies with vulnerabilities in existing software programs. Because these vulnerabilities are the main components of cyber-weapons, security holes in widely used software remain unrepaired. Reuters has even suggested that Washington is “encouraging hacking and failing to disclose to software companies and customers the vulnerabilities exploited by the purchased hacks.” 

Despite the posturing and scare tactics, US Director of National Intelligence James Clapper testified before the Senate Intelligence Committee that there was only a “remote chance” of a serious cyber-attack on the US. Clapper also spoke about how cyber-theft directly threatened “America’s economic competitiveness and innovation edge,” suggesting that the US Cyber Command serves a dual economic purpose.

Washington’s Cyber Command takes a two-prong approach: it’s tasked with churning out malicious cyber-weapons like Stuxnet while stringently guarding the intellectual property and data of major US corporations. Claims of China being involved in hacking and cyber-theft should not be dismissed off the bat, but if Beijing is indeed stealing military secrets from the US, it is likely motivated by genuine defensive concerns and its own IT sovereignty. Just as Washington partners itself with questionable figures and organizations to execute its foreign policy objectives, the Pentagon’s warm embrace of hackers is bound to create some form of e-blowback in due time. This much is clear – Cyber-Imperialism is the highest stage of Capitalism – somebody pass Lenin the memo.

The statements, views and opinions expressed in this column are solely those of the author and do not necessarily represent those of RT.

Nile Bowie is a political analyst and photographer currently residing in Kuala Lumpur, Malaysia.

 

 

Saudi Prince Fahd al-Saud splashes out on Disney stay

3 June, 2013

@ BBC News

A Saudi prince is reported to have spent some 15m euros ($19.5m) during a private visit to the Disneyland resort near Paris.

Prince Fahd al-Saud is said to have booked entire areas of the park over the 22-24 May period, to celebrate getting his degree.

Euro Disney, which runs the theme park, confirmed that a prince had spent three days there with a number of guests.

The company says it regularly organises private events for firms or people.

The festivities included tailor-made events involving “rare Disney characters”, a source told the AFP news agency.

Special security was put in place for the prince, one of the park’s top customers, AFP said.

The theme park attracted 16 million visitors last year, but Euro Disney says it has not made any profits since it was set up in 1992.

Last year, it lost 120.9m euros in the first half of its financial year compared with a net loss of 99.5m euros in the same period a year earlier.

How Bradley Manning Changed the War on Terror

By Eli Lake, The Daily Beast

03 June 13

@ Readersuppprtednwes.org

The U.S. Army private’s court-martial finally gets under way today, nearly three years after his leak to WikiLeaks unmasked the war on terror’s secret diplomacy. Eli Lake reports.

On Monday, the military court-martial begins for Bradley Manning, the military-intelligence analyst who is accused of sending 700,000 U.S. documents and at least one video to a drop box in cyberspace belonging to the anti-secrecy organization WikiLeaks. His trial, three years after his arrest, will provide a fresh account of how a young U.S. Army private laid bare the secret diplomacy underpinning the global war on terror and whether the disclosures caused grave harm to America’s ability to fight that war.

Protester in support of Army Pfc. Bradley Manning outside Fort Meade, Maryland, June 1, 2013. Manning, who is to face a court-martial beginning June 3, is accused of sending hundreds of thousands of classified records to WikiLeaks while working as an intelligence analyst in Baghdad. (Patrick Semansky/AP)

For Manning’s supporters, he is a whistleblower and a hero who endured cruel and unusual punishment from the military even before his trial. For the U.S. military, Manning is akin to a spy. He faces 22 charges, including aiding the enemy and violating the Espionage Act, crimes for which he could receive life in prison.

But many Americans are hearing about him for the first time.

The leak of the documents, many of them classified, which Manning has admitted, was not the gravest intelligence breach in U.S. history, but it was the most expansive. The disclosures included detailed diplomatic cables providing the minutes of meetings with heads of state; spot intelligence reports from the front lines of the wars in Afghanistan and Iraq; and a video claiming to show a deliberate airstrike on a Reuters photojournalist in Iraq.

Manning was able to do all of this in a secure classified facility at a U.S. Army base in Iraq. In some cases he did so by disguising the files on a CD containing the music of the cross-dressing pop singer Lady Gaga.

Alexa O’Brien, an independent journalist who has posted detailed transcripts of the Manning court-martial at Fort Meade, Maryland, said the temporary sensitive compartmentalized information facility where Manning worked was leaky. “The facility where Manning worked did not meet the Defense Department’s own information-assurance standards,” she said. “Manning’s supervisor testified at the pretrial that soldiers would play pirated versions of movies they purchased from Iraqi nationals on their classified work stations at the facility.”

Manning’s defense lawyers would later tell a pretrial hearing that he suffered from gender-identity disorder, creating an alter-ego, Breanna Manning.

Some commentators have credited Manning’s leak with providing a spark for the revolutions that toppled the governments of Egypt and Tunisia and triggered uprisings in Bahrain, Libya, and Yemen, collectively known as the Arab Spring. Files leaked by Manning disclosed a secret relationship between the U.S. government and President Ali Abdullah Saleh of Yemen, to allow drone strikes inside the country where the United States was not in a declared war. Another cable detailed the private investments and holdings of the Tunisian ruling family.

Still other files revealed secret talks between Arab governments and Israel; the lavish spending habits of Muammar Gaddafi’s family; and suspicions from the U.S. ambassador to Georgia that Russia’s intelligence services directed a secret war in the country for much of the last decade.

The Manning leak also ushered in a new era within the Obama administration to crack down on leakers and what they deemed the “insider threat,” a term that historically referred to spies who sold or shared secrets with foreign governments. On November 28, 2010, as WikiLeaks was doling out the diplomatic cables Manning leaked to selected partner news organizations, including The New York Times and The Guardian, Jacob Lew, then Obama’s director of the Office of Management and Budget, issued a memorandum (PDF) to all government agencies that generate classified information to reform systems for protecting those secrets.

“Any failure by agencies to safeguard classified information pursuant to relevant  … is unacceptable and will not be tolerated,” it said.

After the order, major defense contractors began marketing software with names like “sureview” and “checkmate,” promising to actively monitor classified computer networks to spot the next Bradley Manning. Inside the government, spokespeople for government agencies were instructed not to acknowledge any of the information from the government documents now sprouting up throughout the Internet on WikiLeaks mirror sites.

“WikiLeaks was an enormous wakeup call for the government,” said Lucy Dalglish, the dean of the University of Maryland’s college of journalism. In the past, she said, reporters from the mainstream media who obtained classified information would negotiate the details they would publish with senior government officials. Manning, she said, “uploads it to an anonymous site and it goes around the world almost instantly. They see that and say, ‘Oh my God, we are screwed.'”

One concern for many in the U.S. government was that WikiLeaks did not at first redact the names of individuals who provided sensitive information to U.S. diplomats and military officers. (The partner organizations that selectively posted information did make such redactions.)

Beginning in late November 2010, the State Department was forced to start making arrangements to move some sensitive sources in hostile countries and war zones as a result of the WikiLeaks, said P.J. Crowley, who served at the time as the State Department spokesman.

 

“In all cases where we highlighted, not a high-level official well-known globally, but an activist or someone who would be placed in harm’s way if published, the mainstream media was willing not to publish those names,” said Crowley. “While some individuals inside WikiLeaks shared that concern, Julian Assange did not at first and only acknowledged this danger relatively late in the process. Eventually he lost control of the archive and lots and lots of names were put out there.”

Crowley would later resign his post after publicly criticizing the treatment of Manning after his arrest, when the private was placed on suicide watch at a maximum-security militar detention center at Quantico, Virginia, between July 29, 2010, and April 2011. In this period Manning spent months confined to a cell for 24 hours a day in only his underwear. Every five minutes guards had to ask if he was OK. He was allowed only one book at a time and was given no pillows or sheets for when he slept.

While President Obama would say he believed Manning’s treatment was in accordance with U.S. military code, the judge in Manning’s case criticized the decision to keep him under suicide watch during this period, and advocates for the young private saw the conditions he was kept under as proof that he was being punished even before being convicted.

Earlier this year, Manning pleaded guilty to 10 lesser offenses in relation to WikiLeaks of mishandling information he was required to protect. But the government has continued to press its topline charges, while Manning has denied that he did his leaking to aid an enemy of the United States or in any way violated the Espionage Act. In an audio statement that surfaced in March from one of his pretrial hearings, during which he admitted to the leaks, Manning said he was moved to disclose the information to spark a wider debate about foreign policy. He observed that a 2007 video he leaked captured from a helicopter before an airstrike in Iraq showed that his fellow soldiers “dehumanized the individuals they were engaging in and seemed to not value human life by referring to them as ‘dead bastards’ and congratulating themselves on their ability to kill in large numbers.”

“With Manning’s offer of a plea bargain, which carries up to 20 years in jail, this satisfies the imperative to reinforce to those in uniform that they have a solemn responsibility to protect the national interest,” said Crowley on Sunday. The former spokesman said he believed Manning harmed the national interest with his leak. But he also said the prosecution ran the risk of taking the case too far by seeking to imprison Manning for the rest of his life for the crime of aiding the enemy. “My apprehension is that as the prosecution begins to present its case tomorrow, it risks making Bradley Manning into a martyr,” he said.

The Banality of ‘Don’t Be Evil’

By JULIAN ASSANGE

1 June, 2013

@ The New York Times

“THE New Digital Age” is a startlingly clear and provocative blueprint for technocratic imperialism, from two of its leading witch doctors, Eric Schmidt and Jared Cohen, who construct a new idiom for United States global power in the 21st century. This idiom reflects the ever closer union between the State Department and Silicon Valley, as personified by Mr. Schmidt, the executive chairman of Google, and Mr. Cohen, a former adviser to Condoleezza Rice and Hillary Clinton who is now director of Google Ideas.

The authors met in occupied Baghdad in 2009, when the book was conceived. Strolling among the ruins, the two became excited that consumer technology was transforming a society flattened by United States military occupation. They decided the tech industry could be a powerful agent of American foreign policy.

The book proselytizes the role of technology in reshaping the world’s people and nations into likenesses of the world’s dominant superpower, whether they want to be reshaped or not. The prose is terse, the argument confident and the wisdom — banal. But this isn’t a book designed to be read. It is a major declaration designed to foster alliances.

“The New Digital Age” is, beyond anything else, an attempt by Google to position itself as America’s geopolitical visionary — the one company that can answer the question “Where should America go?” It is not surprising that a respectable cast of the world’s most famous warmongers has been trotted out to give its stamp of approval to this enticement to Western soft power. The acknowledgments give pride of place to Henry Kissinger, who along with Tony Blair and the former C.I.A. director Michael Hayden provided advance praise for the book.

In the book the authors happily take up the white geek’s burden. A liberal sprinkling of convenient, hypothetical dark-skinned worthies appear: Congolese fisherwomen, graphic designers in Botswana, anticorruption activists in San Salvador and illiterate Masai cattle herders in the Serengeti are all obediently summoned to demonstrate the progressive properties of Google phones jacked into the informational supply chain of the Western empire.

The authors offer an expertly banalized version of tomorrow’s world: the gadgetry of decades hence is predicted to be much like what we have right now — only cooler. “Progress” is driven by the inexorable spread of American consumer technology over the surface of the earth. Already, every day, another million or so Google-run mobile devices are activated. Google will interpose itself, and hence the United States government, between the communications of every human being not in China (naughty China). Commodities just become more marvelous; young, urban professionals sleep, work and shop with greater ease and comfort; democracy is insidiously subverted by technologies of surveillance, and control is enthusiastically rebranded as “participation”; and our present world order of systematized domination, intimidation and oppression continues, unmentioned, unafflicted or only faintly perturbed.

The authors are sour about the Egyptian triumph of 2011. They dismiss the Egyptian youth witheringly, claiming that “the mix of activism and arrogance in young people is universal.” Digitally inspired mobs mean revolutions will be “easier to start” but “harder to finish.” Because of the absence of strong leaders, the result, or so Mr. Kissinger tells the authors, will be coalition governments that descend into autocracies. They say there will be “no more springs” (but China is on the ropes).

The authors fantasize about the future of “well resourced” revolutionary groups. A new “crop of consultants” will “use data to build and fine-tune a political figure.”

“His” speeches (the future isn’t all that different) and writing will be fed “through complex feature-extraction and trend-analysis software suites” while “mapping his brain function,” and other “sophisticated diagnostics” will be used to “assess the weak parts of his political repertoire.”

The book mirrors State Department institutional taboos and obsessions. It avoids meaningful criticism of Israel and Saudi Arabia. It pretends, quite extraordinarily, that the Latin American sovereignty movement, which has liberated so many from United States-backed plutocracies and dictatorships over the last 30 years, never happened. Referring instead to the region’s “aging leaders,” the book can’t see Latin America for Cuba. And, of course, the book frets theatrically over Washington’s favorite boogeymen: North Korea and Iran.

Google, which started out as an expression of independent Californian graduate student culture — a decent, humane and playful culture — has, as it encountered the big, bad world, thrown its lot in with traditional Washington power elements, from the State Department to the National Security Agency.

Despite accounting for an infinitesimal fraction of violent deaths globally, terrorism is a favorite brand in United States policy circles. This is a fetish that must also be catered to, and so “The Future of Terrorism” gets a whole chapter. The future of terrorism, we learn, is cyberterrorism. A session of indulgent scaremongering follows, including a breathless disaster-movie scenario, wherein cyberterrorists take control of American air-traffic control systems and send planes crashing into buildings, shutting down power grids and launching nuclear weapons. The authors then tar activists who engage in digital sit-ins with the same brush.

I have a very different perspective. The advance of information technology epitomized by Google heralds the death of privacy for most people and shifts the world toward authoritarianism. This is the principal thesis in my book, “Cypherpunks.” But while Mr. Schmidt and Mr. Cohen tell us that the death of privacy will aid governments in “repressive autocracies” in “targeting their citizens,” they also say governments in “open” democracies will see it as “a gift” enabling them to “better respond to citizen and customer concerns.” In reality, the erosion of individual privacy in the West and the attendant centralization of power make abuses inevitable, moving the “good” societies closer to the “bad” ones.

The section on “repressive autocracies” describes, disapprovingly, various repressive surveillance measures: legislation to insert back doors into software to enable spying on citizens, monitoring of social networks and the collection of intelligence on entire populations. All of these are already in widespread use in the United States. In fact, some of those measures — like the push to require every social-network profile to be linked to a real name — were spearheaded by Google itself.

THE writing is on the wall, but the authors cannot see it. They borrow from William Dobson the idea that the media, in an autocracy, “allows for an opposition press as long as regime opponents understand where the unspoken limits are.” But these trends are beginning to emerge in the United States. No one doubts the chilling effects of the investigations into The Associated Press and Fox’s James Rosen. But there has been little analysis of Google’s role in complying with the Rosen subpoena. I have personal experience of these trends.

The Department of Justice admitted in March that it was in its third year of a continuing criminal investigation of WikiLeaks. Court testimony states that its targets include “the founders, owners, or managers of WikiLeaks.” One alleged source, Bradley Manning, faces a 12-week trial beginning tomorrow, with 24 prosecution witnesses expected to testify in secret.

This book is a balefully seminal work in which neither author has the language to see, much less to express, the titanic centralizing evil they are constructing. “What Lockheed Martin was to the 20th century,” they tell us, “technology and cybersecurity companies will be to the 21st.” Without even understanding how, they have updated and seamlessly implemented George Orwell’s prophecy. If you want a vision of the future, imagine Washington-backed Google Glasses strapped onto vacant human faces — forever. Zealots of the cult of consumer technology will find little to inspire them here, not that they ever seem to need it. But this is essential reading for anyone caught up in the struggle for the future, in view of one simple imperative: Know your enemy.

Julian Assange is the editor in chief of WikiLeaks and author of “Cypherpunks: Freedom and the Future of the Internet.”

NATO data: Assad winning the war for Syrians’ hearts and minds

31 May 2013

@ WorldTribune.com

LONDON — After two years of civil war, support for the regime of Syrian President Bashar Assad was said to have sharply increased.

NATO has been studying data that told of a sharp rise in support for Assad. The data, compiled by Western-sponsored activists and organizations, showed that a majority of Syrians were alarmed by the Al Qaida takeover of the Sunni revolt and preferred to return to Assad, Middle East Newsline reported.

“The people are sick of the war and hate the jihadists more than Assad,” a Western source familiar with the data said. “Assad is winning the war mostly because the people are cooperating with him against the rebels.”

The data, relayed to NATO over the last month, asserted that 70 percent of Syrians support the Assad regime. Another 20 percent were deemed neutral and the remaining 10 percent expressed support for the rebels.

The sources said no formal polling was taken in Syria, racked by two years of civil war in which 90,000 people were reported killed. They said the data came from a range of activists and independent organizations that were working in Syria, particularly in relief efforts.

The data was relayed to NATO as the Western alliance has been divided over whether to intervene in Syria. Britain and France were said to have been preparing to send weapons to the rebels while the United States was focusing on protecting Syria’s southern neighbor Jordan.

A report to NATO said Syrians have undergone a change of heart over the last six months. The change was seen most in the majority Sunni community, which was long thought to have supported the revolt.

“The Sunnis have no love for Assad, but the great majority of the community is withdrawing from the revolt,” the source said. “What is left is the foreign fighters who are sponsored by Qatar and Saudi Arabia. They are seen by the Sunnis as far worse than Assad.”

Thanking Bradley Manning

By Kathy Kelly, Voices for Creative Nonviolence

31 May, 2013

@Redersupportednews.org

A few evenings ago, as the sky began to darken here in Kabul, Afghanistan, a small group of the Afghan Peace Volunteers, (APVs), gathered for an informal presentation about WikiLeaks, its chief editor Julian Assange, and its most prominent contributor, Bradley Manning. Basir Bita, a regular visitor to the APV household, began the evening’s discussion noting that June 1st will mark the beginning of Bradley Manning’s fourth year in prison. Two days later his trial will begin, a trial which could sadly result in his imprisonment for a life sentence. June 1st also begins an international week of support and solidarity, aimed at thanking Bradley Manning. #ThankManning!

Basir believes that the vast majority of Afghans are among myriads world-wide who have Manning to thank for information they will need in struggles for freedom, security, and peace. He wishes that more people would find the courage to stand up to military and government forces, especially their own, and act as “whistle-blowers.”

I often hear Afghan individuals and groups express longing for a far more democratic process than is allowed them in a country dominated by warlords, the U.S./NATO militaries, and their commanders. In the U.S., a lack of crucial information increasingly threatens democratic processes. How can people make informed choices if their leaders deliberately withhold crucial information from them? Manning’s disclosures have brought desperately needed light to the U.S. and to countries around the world, including struggling countries like Afghanistan.

Hakim, who mentors the Afghan Peace Volunteers, recalled that Bradley Manning passed on documents that record 91,730 “Significant Actions,” or “SIGACTS” undertaken here by the U.S. /ISAF forces, of which 75,000 were released by WikiLeaks. These SIGACTS include attacks by drones, sometimes invisible drones, and night raids.

Our group turned to discussing the history of WikiLeaks, how it formed and how it now functions. Those most familiar with computers and internet explained the process of disclosing information by anonymously following a computerized route to a “dropbox.”

In fact, the Afghan Peace Volunteers themselves have been communicating with Julian Assange.

Last winter, Nobel peace laureate Mairead Maguire had stayed with them shortly before she traveled to London for a visit to Julian Assange. Through Mairead, they had sent Assange a letter of solidarity.

The APVs heard that Manning has been more isolated than Assange; they all shook their heads when Basir reminded them that Bradley Manning was initially in solitary confinement for eleven months.

Ghulamai thought through the ironic process of how governments designate some documents ‘secret,’ and how he would presume that the person who shares those secrets was a ‘criminal.’ But Ali said that governments chiefly hide ‘secrets’ from the public to maintain power. Hakim asked Abdulhai to imagine himself as the head of a government or of a large family. “If you are working for the good of the family or the state, would you need to do things secretly?” he asked.

“No,” Abdulhai replied. “If I have power, and I am truly working for the best interests of my people, I will not need to do things in secret.”

There was a keen conversation about who Bradley Manning was and what he did. Bradley Manning’s own words, which journalists had to actually smuggle out of his pre-trial hearing, described how Bradley’s mind had largely been made up by watching the secret video that he would come to release under the title “Collateral Murder:”

They dehumanized the individuals they were engaging and seemed to not value human life by referring to them as quote “dead bastards” unquote and congratulating each other on the ability to kill in large numbers. At one point in the video there’s an individual on the ground attempting to crawl to safety. The individual is seriously wounded. Instead of calling for medical attention to the location, one of the aerial weapons team crew members verbally asks for the wounded person to pick up a weapon so that he can have a reason to engage. For me, this seems similar to a child torturing ants with a magnifying glass.

While saddened by the aerial weapons team crew’s lack of concern about human life, I was disturbed by the response of the discovery of injured children at the scene. In the video, you can see that the bongo truck driving up to assist the wounded individual. In response the aerial weapons team crew— as soon as the individuals are a threat, they repeatedly request for authorization to fire on the bongo truck and once granted they engage the vehicle at least six times. Together, the APVs watched the deeply disturbing “Collateral Damage” video itself. They were avid to learn what they could do to support and thank Bradley Manning. Yet they’re aware of the risks faced by people who organize public demonstrations in Afghanistan.

It’s far easier to stand up for Bradley where I live, back in the U.S. I hope many more of us will devote the time and energy we owe this young man for risking everything, as he did, to enlighten us and the world.

The Afghan Peace Volunteers are eager for ways to link with others worldwide to express thanks and concern for a remarkably brave and conscience-driven 25-year old man whose courage and whose light is so acutely needed in this darkening time. I’ve seen the fierce light of these young people and, knowing them, I’m certain that others will be seeing it too in the years ahead. Are we readying signals with which to answer them, are we preparing ways to show people like them, and like Julian Assange, and like Bradley Manning, that they are not alone?

Saudi edges Qatar to control Syrian rebel support

By Mariam Karouny

31 May, 2013

@ Reuters

BEIRUT (Reuters) – Saudi Arabia has prevailed over its small but ambitious Gulf neighbor Qatar to impose itself as the main outside force supporting the Syrian rebels, a move that may curb the influence of Qatari-backed Islamist militants.

Though governments in neither Riyadh nor Doha would provide official comment, several senior sources in the region told Reuters that the past week’s wrangling among Syria’s opposition factions in Istanbul was largely a struggle for control between the two Gulf monarchies, in which Saudi power finally won out.

“Saudi Arabia is now formally in charge of the Syria issue,” said a senior rebel military commander in one of northern Syria’s border provinces where Qatar has until now been the main supplier of arms to those fighting President Bashar al-Assad.

The outcome, many Syrian opposition leaders hope, could strengthen them in both negotiations and on the battlefield – while hampering some of the anti-Western Islamist hardliners in their ranks whom they say Qatar has been helping with weaponry.

Anger at a failure by one such Qatari-backed Islamist unit in a battle in April that gave Syrian government forces control of a key highway helped galvanize the Saudis, sources said, while Qatari and Islamist efforts to control the opposition political body backfired by angering Riyadh and Western powers.

The northern rebel commander said Saudi leaders would no longer let Qatar take the lead but would themselves take over the dominant role in channeling support into Syria.

“The Saudis met leaders of the Free Syrian Army, including officers from the Military Council in Jordan and Turkey, and have agreed that they will be supporting the rebels,” he said after attending one of those meetings himself.

Prince Salman bin Sultan, a senior Saudi security official, was now running relations with the Syrian rebels, backed by his elder brother, intelligence chief Prince Bandar bin Sultan.

Qatar also gave ground in the political field, accepting finally, late on Thursday, that the National Coalition should add a non-Islamist bloc backed by Saudi Arabia.

“In the end Qatar did not want a confrontation with Saudi Arabia and accepted the expansion,” said a source close to the liberals who were allowed to join a body which the United States and European Union want to become a transitional government.

The rebels, whose disunity has been a hindrance both in the field and in maneuvering for a possible international peace conference in the coming weeks, still face a huge task to topple Assad, who has long labeled his enemies Islamist “terrorists” and has his own powerful allies abroad, notably Iran and Russia.

Washington and EU powers have been reluctant to send arms, partly for fear of them reaching anti-Western rebels, including some aligned with al Qaeda. But Britain and France this week ended an EU arms embargo and tighter, Saudi supervision of supply channels could make it easier for London and Paris to start sending weapons if planned peace talks fail.

SAUDI CONTROL

Describing the shift in military supervision, several sources from the political and military leadership of the Syrian opposition and a Saudi source said that anyone, whether a state or among wealthy Arabs who have been making private donations to the rebel cause, would now need the Saudi princes’ approval over what is supplied to whom if they wish to send arms into Syria.

Qatari help was still expected. But a division between a Qatari sphere of influence on the northern border with Turkey and a Saudi sphere on the southern, Jordanian border was over.

“The goal is to be effective and avoid arms getting into the wrong hands like before,” said a senior Saudi source. “Saudi and Qatar share the same goal. We want to see an end to Bashar’s rule and stop the bloodshed of the innocent Syrian people.”

Qatar and Saudi Arabia are close allies in many respects: both armed by the United States, as Sunni Muslims they share an interest in thwarting Shi’ite, non-Arab Iran and its Arab allies – Shi’ites in Iraq and Lebanon and Assad’s Syrian Alawites. Both also want to preserve the absolute domestic power of the ruling dynasties and Western demand for their vast energy resources.

But their interests diverge, particularly over Qatar’s support for the Muslim Brotherhood and other Islamist groups viewed with suspicion by Western powers and in Riyadh. As in Syria, Qatar has delivered extensive financial and other support to Islamists who have risen to prominence in Egypt and Libya as a result of the Arab Spring pro-democracy protests of 2011.

Keen to punch above its weight in the world, independent of its dominant Saudi neighbor, Qatar hosts both a major U.S. air base and influential Islamists exiled from other Arab states; while preserving autocracy at home it has also aided liberals abroad, not least through its Al Jazeera satellite TV channel.

Saudi Arabia, whose king enjoys special status with the Sunni rebels as guardian of the holy city of Mecca, has long been suspicious of the Muslim Brotherhood. In the Cold War, it lent it support as a counterbalance to leftist Arab nationalism which threatened the traditional Gulf monarchies. But the U.S.-allied kingdom now sees political Islam as a graver threat.

Riyadh’s view of Syrian Islamist rebels is also influenced to some extent by its experience backing Arabs who flocked to fight the Soviets in Afghanistan in the 1980s; some returned home, like the Saudi millionaire Osama bin Laden, to wage a campaign of violence intended to topple the house of Saud.

“FINAL STRAWS”

Two events finally prompted Saudi Arabia and the United States to lose patience with Qatar’s Syrian role – one on the battlefield and another among the political opposition in exile.

In mid-April, Assad’s troops broke a six-month rebel blockade of the Wadi al-Deif military base on Syria’s key north-south highway, after a rebel brigade that was seen as close to Qatar broke ranks – exposing fellow fighters to a government counterattack that led to the deaths of 68 of their number.

A rebel commander, based near Damascus and familiar with the unit which buckled, said its failure had been due to its leaders having preferred using their local power to get rich rather than fighting Assad – a common accusation among the fractious rebels:

 

“Qatar’s bet … failed especially in the Wadi al-Deif battle. The regime managed to break through them after they became the new local warlords, caring for money and power not the cause,” the senior commander told Reuters. That battlefield collapse infuriated Qatar’s allies in the anti-Assad alliance.

“The straw that broke the camel’s back was the failure to take over Wadi al-Deif camp,” the commander said.

In diplomatic struggles, Western nations were angered by the appointment by the opposition in mid-March of Ghassan Hitto as the exiles’ prime minister. He was seen by Western diplomats as Qatar’s Islamist candidate and Hitto’s rejection of talks with Assad’s government was seen as a block to negotiating a peace.

For one Western diplomat familiar with deliberations in the Friends of Syria alliance that backs the rebels, choosing Hitto was “the final straw” in galvanizing the Western powers behind the move to rein in Qatar by promoting Saudi leadership.

“They wanted to clip the wings of the Muslim Brotherhood,” the Syrian commander from the north said.

For Saudi Arabia and its Western allies, concerned that the fall of Assad might mean a hostile, Islamist state, Qatar’s flaw was an enthusiasm for winning the war – as it helped Libyan rebels do in 2011 – without ensuring how any peace might look.

A Syrian rebel military source who has been close to Saudi officials expressed it thus: “Qatar tried to carve out a role for itself. But it did so without wisdom: they had no clear plan or a view of what would happen later. They just want to win.”

GMO And The March Of Millions

By Countercurrents.org

29 May, 2013

@ Countercurrents.org

More than two million people, marched a few days ago against Monsanto, the agro-monster, in more than 400 cities in 52 countries.

There are confusion among many regarding GMO. The following information provided by Earth Open Source* helps understand the issue:

Genetically modified (GM) crops are promoted on the basis of a range of far-reaching claims from the GM crop industry and its supporters.

They say that GM crops:

• Are an extension of natural breeding and do not pose different risks from naturally bred crops

• Are safe to eat and can be more nutritious than naturally bred crops

• Are strictly regulated for safety

• Increase crop yields

• Reduce pesticide use

• Benefit farmers and make their lives easier

• Bring economic benefits

• Benefit the environment

• Can help solve problems caused by climate change

• Reduce energy use

• Will help feed the world.

However, a large and growing body of scientific and other authoritative evidence shows that these claims are not true. On the contrary, evidence presented in this report indicates that GM crops:

• Are laboratory-made, using technology that is totally different from natural breeding methods, and pose different risks from non-GM crops

• Can be toxic, allergenic or less nutritious than their natural counterparts

• Are not adequately regulated to ensure safety

• Do not increase yield potential

• Do not reduce pesticide use but increase it

• Create serious problems for farmers, including herbicide-tolerant “superweeds”, compromised soil quality, and increased disease susceptibility in crops

• Have mixed economic effects

• Harm soil quality, disrupt ecosystems, and reduce biodiversity

• Do not offer effective solutions to climate change

• Are as energy-hungry as any other chemically-farmed crops

• Cannot solve the problem of world hunger but distract from its real causes – poverty, lack of access to food and, increasingly, lack of access to land to grow it on.

Based on the evidence presented in this report, there is no need to take risks with GM crops when effective, readily available, and sustainable solutions to the problems that GM technology is claimed to address already exist.

Conventional plant breeding, in some cases helped by safe modern technologies like gene mapping and marker assisted selection, continues to outperform GM in producing high-yield, drought-tolerant, and pest- and disease-resistant crops that can meet our present and future food needs.

Books

• The Organic & Non-GMO Report Newsletter – The Best Resource to Keep Updated on GE Foods.

• Genetic Roulette by Jeffrey Smith

The Health Risks of GE Foods

Resources

• Watch the documentary Unnatural Selection and the entire GMO Trilogy Film Series free online.

• Hazards of GE Foods and Crops – Why We Need a Global Moratorium by Ronnie Cummins

• Download this PowerPoint by Frank Kutka on the effects of the biotech industry and the call for sustainable agriculture.

• The Truth about PLU Codes

• Doctors: Pesticides Used on GMOs Are “Real Chemical Weapons”

 

* Organic Consumers Association, “GMO Myths and Truths”, http://www.organicconsumers.org/gelink.cfm

Ethical battle hovers over use of drone technology

By Joseph Camilleri

29 May 2013

Will the ethics of war become collateral damage as America’s use of drone technology takes off? writes Joseph Camilleri.

In an important speech delivered last week president Barack Obama has defended the use of drones by invoking the just war doctrine.

This much awaited justification rests on two fallacies: that the United States is formally at war; and that it can be just to kill someone for a crime in the absence of a fair trial.

Why did the US president feel compelled to offer this lengthy but belated explanation of America’s drone policy? Put simply, because the use of drones is now increasingly contentious as it becomes the favoured response of the US military and intelligence establishment to the terrorist threat – from Afghanistan to Pakistan, Yemen, Somalia and beyond.

A number of terrorists have no doubt been killed, but so have many others, including civilians. One estimate puts the death toll since 2004 at between 1,963 and 3,293. Republican Senator Lindsey Graham estimates the number to be 4,700.

The great attraction of the drone is that the killing appears risk free. The need to deploy US troops on distant and dangerous terrain is greatly reduced while those who direct the drone are safely ensconced thousands of miles away at CIA headquarters in Langley, Virginia.

The CIA has been flying unarmed drones over Afghanistan since 2000. Drones were actually used during the air war against the Taliban in late 2001, but it was not until February 2002 that the CIA first used a drone for a pure CIA ‘kill operation’.

Since then covert unmanned target killing has become common place.

The defence of drone strikes offered by Obama boils down to three key propositions:

  • terrorism is a serious and ongoing threat, therefore the US remains ‘at war’;
  • when detention and prosecution of terrorists is not possible, target killing becomes legitimate;
  • assassination by drones is the lesser of two evils, reducing the likely number of military and civilian casualties;

This line of argument is deeply flawed. Countries and communities are subject to all kinds of threat, including serious loss of life and property – whether it is at the hands of deranged individuals or criminal groups of various kinds. The narcotics trade and human trafficking are just two examples.

But a country is not at war with such groups except in a symbolic or metaphorical sense. In these instances countries are not strictly speaking engaged in war. They are not taking military action against the military threat posed by another state – action which is clearly subject to the laws of armed conflict.

Obama’s predecessor, George W Bush, launched the ‘war on terror’ precisely because it offered the United States a way of dealing with suspected terrorists outside the confines of the rule of law.

As a consequence, enhanced interrogation techniques (generally classified as torture), ‘extraordinary rendition’ and indefinite detention at Guantanamo became integral to the ‘war on terror’.

Now in the fifth year of his presidency, Obama is still trying to distance himself from the Guantanamo fiasco, only to find himself ensnared in another can of worms – covert targeted assassinations also conducted in the name of the ‘war on terror’.

But is targeted killing ‘war’ and, if so, is it in accord with the laws of war?

What is clear is that targeted killing does not engage the enemy in battle, since drone attacks occur in times and places where there is no armed conflict.

How, then, can we be confident that those designated for death pose an imminent, dangerous and violent threat? Who is authorised to make these decisions? And, what if the designation proves to be mistaken – something which is known to have happened more than once? Who then bears responsibility? And what are the processes by which those responsible for those mistakes can be brought to account?

It is difficult to see how surreptitious and riskless killing can be in any way regarded as war in a conventional sense, and how it can be subjected to the most basic rules of armed conflict, including hors de combat immunity and the possibility of individual surrender.

But this is just the beginning of the dilemma.

Who are these suspected terrorists? They do not represent an enemy state. They have no fixed address, and often have no clear organisational links.

While some may be thought to have prominent leadership roles in Al Qaeda, the majority do not. Some may be members of state-sponsored networks, but most are likely to be members of autonomous shadowy cells and extremist groups.

How can such a disparate and elusive group be engaged in anything approaching what we normally regard as ‘war’?

All of which has another far-reaching implication. By virtue of their mobility and effective statelessness, these suspects can move rapidly from one country to another. What happens when a particular country is opposed to the use of American drones over its territory? Will the US accept that judgment? Or will it pursue its targeting regardless, in defiance of that state’s sovereignty?

The US president cannot but be aware of these pitfalls. This is why he has attempted to limit the hostile fallout by stipulating that: there must be near-certainty that no civilian casualties will result. He has also called for a review leading to additional oversight of drone attacks.

But key questions remain unanswered: Who is authorised to make these decisions? Will the decision process be transparent? Who is to bear responsibility in the event of mistaken decisions? In what sense, if any, will US actions be subject to the international rule of law?

Beyond this, the United States needs to consider the political and strategic fallout of drone attacks. The use of the drone has already created enormous ill will towards the United States in both Pakistan and Afghanistan.

This is hardly surprising when a drone supposedly targeting a terrorist ends up killing members of a wedding party.

And if the United States wishes to argue that targeted killings are a legitimate instrument against enemies of the American state, what is to prevent, Russia, China, Iran, Syria or any number of other countries from using precisely the same argument in years to come.

Does president Obama intend a drone arms race to become part of his legacy?

Professor Joseph A Camilleri OAM is Professor Emeritus at La Trobe University. View his full profile here.

A glimmer of hope

By DAWOOD AULEEAR

29 May 2013

@ Le Mauricien

The barbaric and horrendous knife attack on the British soldier last week should be added to the growing list of heinous crimes perpetrated by two antagonists. The killers justified their acts as a tit for tat for the crimes committed by the West in Muslim lands. “The only reason we killed this man is because Muslims are dying daily” recally a recent headline : “A British soldier has been jailed for stabbing a 10-year-old boy after getting drunk on vodka while serving in Afghanistan.”

There is little hue and cry in the West, contrary to the outbursts of violence in the Islamic world, about the West’s crimes because Media outlets in the West and particularly in the US simply keep mum. The victims of the West’s crimes are made faceless, their families nearly never appear on TV and according to SALON, Supreme Court Judges have collaborated with US Administration to bar victims access to American courts and thus deprive them of means to have their stories heard. The Patriotic Act and the threat on whistle blowers push victims into silence.

The confessions at a recent Senate Armed Services Committee hearing, of Gen. James Cartwright and Sen. Lindsey Graham speak volumes : Americans have the right to kill enemies even while they are “asleep”, that they don’t “have to wake them up before they shoot them” and “make it a fair fight”. Michael Moore’s mockery summarizes Western reaction : “I am outraged that we can’t kill people in other countries without them trying to kill us !”

Let us face the fact : All attempts at lives are unjustifiable and must appall us. Violence caused by the deranged is known to exist from the time of Adam’s sons. Agents of the Inquisition burned heretics to death to shorten their time in purgatory. It is our duty to stop the spiral of violence. The targeting of terrorists by the West is failing to bring about a surrender of the “Islamic” Jihadis. It is important to understand the Muslim mind. A Muslim is taught that cowardice is a worst form of disbelief and all forms of injustice have to be opposed, if needs be, by force. The pool of Muslims ready to die for a “just” cause is unfathomable.

There is a glimmer of hope now to see mayhem on the decline as both President Obama and Hollande have made sober declarations, worthy of statesmen, and proposed alternative and constructive ways of tackling this evil of violence. Let us hope they live up to their words and the Jihadis respond equally as men of honour.