Especially after World War II, the prize committee, which is appointed by the Norwegian Parliament, has widened the scope of the prize to include environmental, humanitarian and other efforts, he said.
For example, in 2007 the prize went to climate activist Al Gore and the U.N.’s panel on climate change, and in 2009 the committee cited Obama for “extraordinary efforts” to boost international diplomacy.
“Do you see Obama as a promoter of abolishing the military as a tool of international affairs?” Heffermehl asked rhetorically.
Nobel said the peace prize should be awarded by a Norwegian committee, and the other Nobel Prizes by committees in Sweden. The two Scandinavian nations were in a union at the time.
“Fighting climate change is definitely closely related to fraternity between nations. It even concerns the survival of some states,” he told AP.
Still, the County Administrative Board decided to sent a letter to the Stockholm-based Nobel Foundation, which manages the prize assets, requesting a formal response to the allegations.
“We have no basis to suggest that they haven’t managed it properly. But we want to investigate it,” Wiman said.
Big Brother Internet.
Do you remember the Safe-Cyber instructions they taught you in the mandatory Computer Ed class (operated by the National Institute of Standards and Technology)? First you fire up your Secured Computing Device (SCD) and its hardware token authenticator.
Then you enter the six-digit algorithmically generated password displayed (a new one flashes every 60 seconds) and are asked to supply your biometric identifier. You place your thumb on the built-in fingerprint pad, click, and wait for the Internet connection to begin. But it doesn’t.
Instead, the screen goes black for a second before the dreaded words appear: “Malware has been detected on this SCD. As mandated by federal law, it has been placed in quarantine.” Then the machine shuts down.
This is not just conjecture, but an imminent scenario. Policies, such as the White House proposed “National Strategy for Trusted Identities in Cyberspace,” which will transform the character, culture and freedom of the Internet, are already in place. The 20 cybersecurity-related bills introduced in the Senate in 2011, and the dozen introduced in the House of Representatives, have wound their way through committees and, according to Senator Harry Reid, are scheduled to be voted on in the first quarter of 2012. Almost all of them, with the blessing of the White House, would make the Department of Homeland Security the overseer of private-sector networks.
Considering the apocalyptic rhetoric coming from Washington and the ranks of cybersecurity experts – echoed by media reports that portray every picayune data breach as Armageddon – it would appear that the vulnerability of the Internet has been underplayed for many years.
In the Internet’s start-up decades, both industry and government were committed to establishing an atmosphere of trust that would draw the public into conducting more and more digital business. Though data breaches, theft of trade secrets, identity theft and bank robbery have been a fact of Internet life since its beginnings, there were few laws requiring disclosure. Banks and credit card firms ate their losses as a cost of doing business, and the giant corporations kept mum rather than roil the public. Recently, the pendulum has swung in the other direction and a raucous alarm has been sounded regarding the great danger posed by the Internet.
- A d v e r t i s e m e n t
The Nation is at a crossroads. The globally-interconnected digital information and communications infrastructure known as “cyberspace” underpins almost every facet of modern society and provides critical support for the U.S. economy, civil infrastructure, public safety, and national security. This technology has transformed the global economy and connected people in ways never imagined. Yet, cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. The digital infrastructure’s architecture was driven more by considerations of interoperability and efficiency than of security. Consequently, a growing array of state and non-state actors are compromising, stealing, changing, or destroying information and could cause critical disruptions to U.S. systems. (White House Cyberspace Policy Review, 2011)
While there may be other factors behind the current wave of cybersecurity alarmism, we have identified three major forces: The Government, the Cybersecurity-Industrial complex, and the so-called “Hacktivists.”
The Hacktivists LulzSec and Anonymous, the most-publicized of the hacktivists, along with a growing community of ad hoc cyberactors, have had a multi-faceted impact on the cybersecurity environment that goes far beyond the number of hackers at work or the amount of actual damage their exploits have inflicted.
They have skillfully publicized their outsized, headline-ready cyberintrusions. Their attacks, which are something other than the garden variety cybercrime, have compromised the web assets of Sony, the CIA, Fox News, the Church of Scientology, Bank of America and many more. Beyond the financial damage and security breaches, they’ve created a public relations nightmare forcing these major institutions to go public with what they would otherwise go to great lengths to conceal.
As a result, attention has been focused on the inadequacies of Internet security. If organizations as large, powerful and security-conscious as these are vulnerable, who then is safe? Not only have the targets been breached and embarrassed, consumer trust in the Internet has also been shaken.
These high profile, anarchic Internet exploits – compounded by the role of social media in evading and undermining government control of the political and media arena (Arab Spring, Occupy Wall Street, etc.) – have intensified government efforts to clamp down on the Internet … while providing the media with scary cyber-stories to further that agenda.
The Government The US government agenda to control the Internet is at least a decade old. Just three months after the Bush White House created the Department of Homeland Security, it issued “The National Strategy to Secure Cyberspace.” The document begins:
My Fellow Americans:
The way business is transacted, government operates, and national defense is conducted have changed. These activities now rely on an interdependent network of information technology infrastructures called cyberspace. The National Strategy to Secure Cyberspace provides a framework for protecting this infrastructure that is essential to our economy, security, and way of life.
In the past few years, threats in cyberspace have risen dramatically. The policy of the United States is to protect against the debilitating disruption of the operation of information systems for critical infrastructures and, thereby, help to protect the people, economy, and national security of the United States.
Nearly a decade later, the basic message from the White House sounds much the same, if louder and more urgent. But there is a big difference. President Obama, and the rest of the Beltway insiders, have now formally defined cyberspace as a “strategic national asset.”
On the face of it, this appears to be a reasonable approach for a world that has become, in a relatively short time, totally dependent on digital resources. Unfortunately, it is an approach that provides a straight path to the militarization of the Internet and the loss of liberty that will follow. It is an approach that will elevate the most common forms of cybercrime (bank robbery, credit card theft) to the high-alert status of a cyberwar attack.
This government mindset will lead to the same abrogation of individual rights in cyberspace as the National Defense Appropriations Act of 2012 has codified in “Battlefield America.”
Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations – both at home and abroad – are dependent on this critical infrastructure. As military strength ultimately depends on economic vitality, sustained intellectual property losses erode both U.S. military effectiveness and national competitiveness in the global economy. Cyber hygiene must be practiced by everyone at all times; it is just as important for individuals to be focused on protecting themselves as it is to keep security software and operating systems up to date. (Department of Defense Strategy for Operating in Cyberspace, July 2011)
Many Internet experts and cybersecurity professionals have deemed 2011 “The Year of the Hack,” in recognition of the unending stream of headlines related to data breaches and thefts. We believe that – aside from any real uptick in cybercrime or cyberwarfare skirmishes – this perception is the result of the government’s determination to soften up the public to meekly accept an upcoming barrage of Internet regulation. It is a digital-age version of the tried and true fear mongering that is always employed to further empower the president and further enrich the military/industrial and Homeland Security complex. The government says it’s not fear mongering, just education.
The national dialogue on cybersecurity must begin today. The government, working with industry, should explain this challenge and discuss what the Nation can do to solve problems in a way that the American people can appreciate the need for action. People cannot value security without first understanding how much is at risk. Therefore, the Federal government should initiate a national public awareness and education campaign informed by previous successful campaigns. (White House Cyberspace Policy Review, 2011)
The Prominence of the Non-military Aspects of Warfare. Non-military means of warfare, such as cyber, economic, resource, psychological, and information-based forms of conflict will become more prevalent in conflicts over the next two decades. In the future, states and non-state adversaries will engage in “media warfare” to dominate the 24-hour news cycle and manipulate public opinion to advance their own agenda and gain popular support for their cause. (“Global Trends 2025,” National Intelligence Council, 2008)
The Money Card A key point being used to “educate” the public is the putative astronomical monetary loss caused by cybercrime in all its forms. There is, of course, no way to ascertain the validity of these numbers or even to figure out just what kind of losses are included in the estimates, which are generally arrived at by the large cybersecurity corporations. Some loss-figures appear to include the fall in a company’s stock price that usually follows revelation of a major hack (but doesn’t adjust that figure when the stock price climbs back up), as well as adding in an arbitrary sum attributable to time lost in recovery.
The largest global estimate of money lost to cybercrime currently floating around – as totted up by McAfee, the world’s largest cybersecurity company and endorsed by the White House – is $1 trillion a year. Symantec Corp., another cybersecurity giant, calculates the annual toll of global cybercrime to be about $388 billion. For dramatic impact, Symantec notes that figure is greater than the black market in marijuana, cocaine and heroin combined. Either of those (wildly divergent) sums is impressive, but do they mean anything? Or are they just part of a government “education campaign modeled on previous successful campaigns,” such as selling the public on the certainty of WMDs in Hussein’s Iraq?
Far from being broadly based estimates of losses across the population, the cyber-crime estimates that we have appear to be largely the answers of a handful of people extrapolated to the whole population. A single individual who claims $50,000 losses, in an N = 1000 person survey, is all it takes to generate a $10 billion loss over the population. One unverified claim of $7,500 in phishing losses translates into $1.5 billion.
Our assessment of the quality of cyber-crime surveys is harsh: they are so compromised and biased that no faith whatever can be placed in their findings.
There has long been a shortage of hard data about information security failures, as many of the available statistics are not only poor but are collected by parties such as security vendors or law enforcement agencies that have a vested interest in under- or over-reporting. (“Sex, Lies and Cyber-crime Surveys,” Microsoft Research)
The Cybersecurity-Industrial Complex The fear, uncertainty, and doubt (FUD) surrounding cyberspace has helped turn cybersecurity into an enormously profitable business, worth between $60 and $100 billion a year, depending on who’s providing the statistics. The sector is expected to grow 10 percent annually for at least the next five years. You don’t have to attribute any ethical lapses in the cybersecurity industry to recognize that it, like the government, has a great interest in “educating” the public in cybersecurity awareness.
Security experts say that it is virtually impossible for any company or government agency to build a security network that hackers will be unable to penetrate. (Reuters, 27 May 2011)
“I am convinced that every company in every conceivable industry with significant size and valuable intellectual property and trade secrets has been compromised (or will be shortly), with the great majority of the victims rarely discovering the intrusion or its impact …. In fact, I divide the entire set of Fortune Global 2,000 firms into two categories: those that know they’ve been compromised and those that don’t yet know.” – Dmitri Alperovitch, Vice President of Threat Research for McAfee
The military-industrial complex of the Cold War era has morphed into the cybersecurity-military/industrial-Homeland Security complex of the Cyber War era … to which there is no end in sight. With the cybersecurity industry creating the technology required to stem the very cyberattacks they are in charge of discovering and monitoring, we face an endless cyberarms race that will undoubtedly be fed on exaggerations of the virtual menace and our vulnerability to it.
On the heels of the fear and hysteria will come the firm push for strict control and regulation of the Internet. It will be championed by government and industry as the necessary response to cyberwar, cyberterrorism, and cybercrime which, since cyberspace is considered a “strategic national asset,” are essentially all the same.
The Stop Online Piracy Act (SOPA) for instance, which is scheduled for a vote in 2012, will take a page from the National Defense Appropriation Act of 2012. In order to protect the rights of copyright holders to profit from their intellectual property, SOPA would permit the dissolution of due process and open the door wide to censorship and the denial of the right to free speech. The bill, supporters suggest, is not just about recovering the billions lost to bootlegged movies and music, rather, it’s about protecting the military strength that ultimately depends on economic vitality.
We agree with The Electronic Frontier Foundation, which has called SOPA the most extreme, anti-Internet, anti-privacy, anti-free speech copyright proposal in US legislative history. It is, however, only one of many legislative proposals likely to be steamrollered through Congress in the coming year.
Computer security expert Eugene Kaspersky, co-founder of Kaspersky Labs, envisions the “passportization” of the Internet. In his opinion, to access critical online services, such as banking or electronic voting, “it should be made mandatory to log-on only with the use of a unique personal identifier [for example, a token – a sort of cyber-passport] and establish a secure authoring connection.”
Microsoft has proposed what it calls a “public health model” for the Internet. Cybercitizens would be required to have a “clean bill of health,” make their computers open to inspection, and, if contaminated by a virus or other malware, be prepared for quarantine.
President Obama’s National Strategy for Trusted Identities in Cyberspace is pushing for development and public adoption of Internet user authentication systems that will function as a driver’s license for the cyberhighway.
Government control of the flow of information will strike a blow against Internet anonymity and the free speech it has made possible. Driver’s license, bill of health, passport, whatever you call it – it’s all about the ability to track and control the individual. Today, traffic in copyrighted digital material is the criminal behavior supposedly under attack; tomorrow, it will be the ability to speak out against corrupt government.
Hello, Big Brother.
Trendpost: The demand for ever-more effective cybersecurity tools to counter the ever-more inventive depredations of cybercriminals and cyberwarriors will be with us far into the foreseeable future. Clearly, this situation will create many jobs, both for the formally educated and the creative hacker. In addition, The National Initiative for Cybersecurity Education – established to provide cyber-awareness training to students in Kindergarten through post-graduate programs – will need many specialized teachers.
Somewhat farther along on the timeline, there is a high likelihood that the manufacture of cyber-components will be repatriated to the US. The 2011 Department of Defense’s “Strategy for Operating in Cyberspace” notes: “The majority of information technology products used in the United States are manufactured and assembled overseas. The reliance of DoD on foreign manufacturing and development creates challenges in managing risk at points of design, manufacture, service, distribution, and disposal.”
A high probability exists that 2012 will bring revelations about contamination in the global IT hardware and software supply chain and proof that computer components are providing our “enemies” with entry to critical networks or transmitting sensitive information to them. This will turn the DoD’s security concern into a hot imperative.
Tony Blair wrote to Gaddafi ‘to suggest investment projects’
Tony Blair wrote to Col Muammar Gaddafi to suggest African projects in which the former Libyan leader could invest, according to reports.
The former prime minister told Gaddafi, in a letter dated February 17 2008, that he was “very interested to hear from you of the progress that is being made and the great opportunities there are for the future”.
He also thanked the dictator for his “hospitality during my visit to Libya and for taking the time to meet with me. I greatly appreciated and enjoyed our wide-ranging conversation.”
Mr Blair says he was “particularly interested in what you said about the funds that will be dedicated to projects in Africa, since you know I am doing a lot of work there and know of good, worthwhile projects for investments”.
The disclosure of the letter in the Daily Mail comes after documents which were found in Tripoli appeared to show that the former prime minister secretly met Gaddafi twice before the Lockerbie bomber was released.
Mr Blair also sent other letters on the same date in 2008 thanking the then-prime minister of Libya, Baghdadi al-Mahmoudi, and to a man believed to be deputy prime minister, Dr Abdulhafid al-Zulaytini, for “facilitating my meeting with the Leader”.
In both letters he presses the two politicians for further meetings, saying “do let me know when you are in London” and tells them the appropriate means by which to contact him, it was reported.
Mr Blair has maintained his counsel on the full extent of his meetings in Libya since leaving office in June 2007.
Earlier this week, The Daily Telegraph learned that Mr Blair used visits to Libya after he left office to lobby for business for the American investment bank JP Morgan.
A senior executive with the Libyan Investment Authority, the $70 billion fund used to invest the country’s oil money abroad, said Mr Blair was one of three prominent western businessmen who regularly dealt with Saif al-Islam Gaddafi, son of the former leader.
Saif al-Islam and his close aides oversaw the activities of the fund, and often directed its officials on where they should make its investments, he said.
The executive, speaking on condition of anonymity, said officials were told the “ideas” they were ordered to pursue came from Mr Blair as well as one other British businessman and a former American diplomat.
A spokesman for Tony Blair said: “Tony Blair has never sought or received funding from Gaddafi or the Libyan government for any of his projects in Africa and neither have his charities.
“This discussion was about how best Libya used its substantial Africa Development Fund to help internationally supported infrastructure projects in Africa for the benefit of African people.
“It was a perfectly proper and sensible discussion to have. In the event they never did support them.”
By : Latif Yahia
It was the best of times, it was the worst of times…..
I had better stop there or I’ll be charged with plagiarism, but, it is definitely an interesting time, especially for the Middle East. The spark that ignited that whole region of the world and gave hope to the idea of democracy or at least regime-leader change, has fully taken hold and now and there is no turning back.
As I watched the events unfold on television, I was struck by a mixture of elation at the fact that after forty or more years of rule, the people had had enough of their masters and were –for the most part- protesting peacefully for their removal and a sadness that this “liberation” was not the kind that Iraq had been able to achieve for itself.
Having said that Iraq had played it’s part in recent events, Iraq was held up to the rest of the Arab world as a ‘cautionary tale’ and example of ‘how Not to do it’ and when outside help was offered, the nations replied ‘No thanks, we’ll do this ourselves’ a lesson hard learned by Iraqis.
I send out my greatest respect to Tunisia and Egypt, who have made effective change without the loss of too many citizens and I send my deepest sympathies and respect to the families of those that did lose their lives in the protests.
I know that Tunisia and Egypt especially are open minded and progressive countries and will be strong enough to continue on their path to democracy, I can only hope that the other countries that are following in their footsteps –like Libya- will not succumb to extreme Islamists, something that is quite possible. Maybe that is why the drums are beating for Ghadaffi in a way that they didn’t for Ben Ali or Mubarak, add to that the fact that Libya holds nearly 5% of the world’s petrol and you have a recipe for America to go in there and secure it’s position. Unilateral sanctions only punish the people, not the regime. The regime have enough money outside the country to still be able to do and buy what they want, it is only the man on the street that feels the lack. It is estimated that Ghadaffi has 20 billion in London alone. While I am writing this, his money – 40 Billion in America and god knows how much in Switzerland- is being frozen.
Which leads me neatly on to my next point, an International court needs to be set up not just to hold Dictators, Tyrants and Despots to account, but those who supported the regime and I’ll explain this point clearly, a regime cannot function if it does not have suppliers, weapons, banking, business. A petrol filled country with a tyrannical leader cannot make money from it’s petrol if there is no-one who is willing to do business with them, they cannot keep control of their population if they cannot buy arms and their money is of no use if they cannot keep it somewhere safe outside their own country.
So often we are shown people like Saddam, held up high for us to despise and point at, but could or would he have survived so long if he didn’t have ‘friends’, let’s be clear here, business is the agenda of the day. Big business. It’s too easy to point the finger and say ‘Dictator, Despot, Tyrant’ but then under the table sell them billions of dollars worth of weapons so you can buy the oil cheap, the people who suffer are the citizens of that country.
But let’s also take a look at how these people get power, it could be argued that they took it by force, yes, but how did they get that “force”? somebody had to support and supply them.
I was a participant in a peace mission five years ago, and one of the other participants was a retired Colonel from the US Army, during this mission he tried to explain simply what the policy of the US was with regard to Non-US leaders, his explanation went something like this:
A country has a leader who is a bad guy, the US doesn’t like this Bad guy so we decide that he needs to go. He has an enemy who is not a really good guy, so we support the not good guy against the bad guy to get him out. But then after the not so good guy gets power he turns out to be a really bad guy.
Does that make sense?
My case in point is Noori Al Maliki, you only have to look at Iraq, the corruption (yet another Minister ran form Iraq yesterday with the best part of 100 million dollars), lack of any sign of progression since the installation of Democracy, the damning fact that 80 people have died in Iraq while protesting for change of the governing system, not the government. The fact also that none of this is getting any coverage in the Western media, why? Because, America doesn’t want to look like it has failed. But it has, America made so much noise about not letting Iran get it’s hands on Iraq but then handed the leadership over to people that it Knew were supported by Iran, Noor Al Maliki stood up a few days ago and said that nowhere in the world had democracy like Iraq, Iraq had the best democracy in the world, well if you call handing Ministries and positions of power over to people who haven’t been elected by the people Democratically, then I don’t know what the Yemenis, Bahrainis, Saudis or Libyans are demonstrating against, they already have democracy!
The leaders in the Middle East are in a state of panic, most of these leaders be they Presidents, Kings or dictators acquired their power with the help of Britain or America 40 or more years ago, the King of Saudi for instance has made an offer of 150 Billion dollars to buy Facebook! Why? Because he knows that through social networking the people are exacting change, they can mobilize and exchange ideas faster than the country’s intelligence service can track them. If he was a good leader why should he worry? If his people were happy why would they need to protest against him? As with most countries in the Middle East the power is held by the few, it is designed that way.
I wish all those who want change the best and send them my heartfelt support, I hope that those who succeed always keep in mind what it was to be downtrodden and instill in their children and the generations to come a sense of responsibility for their democracies. When we are complacent, tyranny has the opportunity to reign, when we say ‘ what can I do? I am only one’ we forget that that we are many and it is our voices that should be heard. When we say ‘ Uh, I‘m not going to vote, they’re all the same anyway’ then we let down not only ourselves and our country but the ones that had to fight and die for us to have these rights.
Never take your right to be heard for granted, you have heard the phrase ‘Use it or lose it’ and it is far easier to lose it than it was to get it in the first place.
Before the Invasion of Kuwait in 1990, even though we had had an eight year war with Iran, Iraq had everything. No-one had felt the effects of war so much, yes, we knew that it was happening and we saw the young soldiers return from the front but life had always continued as normal, everything you wanted and needed was there for you, including Night Clubs, Bars and Restaurants.
Saddam may have been considered a dictator and despot, but he made sure that the people of iraq were provided for, he kept crime at a minimum, the streets were clean and the system worked.
Since the ‘Liberation’ of Iraq by America in 2003, this has changed completely, those who were once our enemies and the sworn enemies of America according to Mr. Bush’s ‘Axis of Evil’ are now the masters of Iraq. Iran is now in control of Iraq, we have been invaded by Mullahs, only the ones in Iraq come wearing suits.
The effect is the same though, before 2003 two million people a year would visit Mecca, now in Iraq we have 18 million pilgrims to Iraq, whose only desire is to slap themselves and cry for Hussein (cousin of the Prophet Mohammed PBUH) in an effort to absolve themselves of the sins of their forefathers, the murder of Hussein and his family in Karbala.
Iraq was built on blood, throughout it’s history it has been won and lost, blood feeding it’s soil. Maybe it is for this reason that only someone with a strong fist can truly control it.
keywords: WikiLeaks, U.S. Intelligence, U.S. Army, National Ground Intelligence Center, NGIC, classified, SE- CRET, NOFORN, Red Cell.
restraint: Classified SECRET//NOFORN (US)
date: February 2, 2010
group: author: CIA Red Cell
author: CIA Red Cell
This CIA ”Red United States is an exporter of terrorism; ’Contrary to common belief, the American export of terrorism or terrorists is not a recent phenomenon, nor has it been associated only with Islamic radicals or people of Middle Eastern, African or South Asian ethnic origin. This dynamic belies the American belief that our free, open and integrated multicultural society lessens the allure of radicalism and terrorism for US citizens.’ The report looks at a number cases of US exported terrorism, including attacks by US based or financed Jewish, Muslim and Irish-nationalism terrorists. It concludes that foreign perceptions of the US as an ”Exporter of Terrorism” together with US double standards in international law, may lead to noncooperation in renditions (including the arrest of CIA officers) and the decision to not share terrorism related intelligence with the United States.
A Red Cell Special Memorandum 5 February 2010
What If Foreigners See the United States as an “Exporter of Terrorism”? (S//NF)
Much attention has been paid recently to the increasing occurrence of American-grown Islamic terrorists conducting attacks against US targets, primarily in the homeland. Less attention has been paid to homegrown terrorism, not exclusively Muslim terrorists, exported overseas to target non- US persons. This report examines the implications of what it would mean for the US to be seen increasingly as an incubator and “exporter of terrorism.” (S//NF)
Contrary to common belief, the American export of terrorism or terrorists is not a recent phenomenon, nor has it been associated only with Islamic radicals or people of Middle Eastern, African or South Asian ethnic origin. This dynamic belies the American belief that our free, open and integrated multicultural society lessens the allure of radicalism and terrorism for US citizens.
• Late last year five young Muslim American men traveled from northern Virginia to Pakistan allegedly to join the Pakistani Taliban and to engage in jihad. Their relatives contacted the FBI after they disappeared without telling anyone, and then Pakistani authorities arrested them as they allegedly attempted to gain access to al-Qa’ida training facilities.
• In November 2008, Pakistani-American David Headley conducted surveillance in support of the Lashkar-i-Tayyiba (LT) attack in Mumbai, India that killed more than 160 people. LT induced him to change his name from Daood Gilani to David Headley to facilitate his movement between the US, Pakistan, and India.
• Some American Jews have supported and even engaged in violent acts against perceived enemies of Israel. In 1994, Baruch Goldstein, an American Jewish doctor from New York, emigrated to Israel, joined the extremist group Kach, and killed 29 Palestinians during their prayers in the mosque at the Tomb of the Patriarchs in Hebron which helped to trigger a wave of bus bombings by HAMAS in early 1995.
• Some Irish-Americans have long provided financial and material support for violent efforts to compel the United Kingdom to relinquish control of Northern Ireland. In the 1880s, Irish-American members of Clan na Gael dynamited Britain’s Scotland Yard, Parliament, and the Tower of London, and detonated bombs at several stations in the London underground.In the twentieth century, Irish-Americans provided most of the financial support sent to the Irish Republican Army (IRA). The US-based Irish Northern Aid Committee (NORAID), founded in the late 1960s, provided the Provisional Irish Republican Army (PIRA) with money that was frequently used for arms purchases. Only after repeated high-level British requests and then London’s support for our bombing of Libya in the 1980s did the US Government crack down on Irish-American support for the IRA. (S//NF)
Primarily we have been concerned about Al-Qa’ida infiltrating operatives into the United States to conduct terrorist attacks, but AQ may be increasingly looking for Americans to operate overseas. Undoubtedly Al-Qa’ida and other terrorist groups recognize that Americans can be great assets in terrorist operations overseas because they carry US passports, don’t fit the typical Arab-Muslim profile, and can easily communicate with radical leaders through their unfettered access to the internet and other modes of communication.
• Terrorist groups such as Al-Qa’ida have surely noticed the ease with which Headley was able to travel multiple times on a US visa between the US, Pakistan, and India without arousing suspicion from officials.
• Al-Qa’ida and other extremist groups have also probably noticed that the US Government has been more concerned with preventing attacks on the US by homegrown terrorists or foreigners than with Americans going overseas to carry out attacks in other countries. Most foreign governments do not suspect that American citizens would plot or perpetrate attacks against their citizens within their borders. Foreign terrorists have recruited homegrown US extremists for attacks abroad and are likely to increase the use of this method because so far it has slipped below the radar of the governments of the US and other countries.
• The ubiquity of internet services around the world and the widespread use of English on popular websites such as Youtube, Facebook, Myspace, Twitter and various blogs enable radical clerics and terrorist recruiters to bypass America’s physical borders and influence US citizens. For example, a self-proclaimed recruiter for the Pakistani Taliban reportedly contacted the five men in northern Virginian via YouTube and then exchanged coded emails with the group. Terrorists apparently know that detection is especially difficult in cases where the potential US recruit is not affiliated with any known terrorist group. (S//NF)
Impact on Foreign Relations if US Seen as “Exporter of Terrorism” (S//NF)
If the US were seen as an exporter of terrorism, foreign partners may be less willing to cooperate with the United States on extrajudicial activities, including detention, transfer, and interrogation of suspects in third party countries. As a recent victim of high-profile terrorism originating from abroad, the US Government has had significant leverage to press foreign regimes to acquiesce to requests for extraditing terrorist suspects from their soil. However, if the US were seen as an “exporter of terrorism,” foreign governments could request a reciprocal arrangement that would impact US sovereignty.
• Foreign regimes could request information on US citizens they deem to be terrorists or terrorist supporters, or even request the rendition of US citizens. US failure to cooperate could result in those governments refusing to allow the US to extract terrorist suspects from their soil, straining alliances and bilateral relations.
• In extreme cases, US refusal to cooperate with foreign government requests for extradition might lead some governments to consider secretly extracting US citizens suspected of foreign terrorism from US soil. Foreign intelligence operations on US soil to neutralize or even assassinate individuals in the US deemed to be a threat are not without precedent. Before the US entered World War II, British intelligence carried out information operations against prominent US citizens deemed to be isolationists or sympathetic to the Nazis. Some historians who have examined relevant archives even suspect that British intelligence officers assassinated Nazi agents on US soil. (S//NF)
• If foreign regimes believe the US position on rendition is too one-sided, favoring the US, but not them, they could obstruct US efforts to detain terrorism suspects. For example, in 2005 Italy issued criminal arrest warrants for US agents involved in the abduction of an Egyptian cleric and his rendition to Egypt. The proliferation of such cases would not only challenge US bilateral relations with other countries but also damage global counterterrorism efforts.
• If foreign leaders see the US refusing to provide intelligence on American terrorism suspects or to allow witnesses to testify in their courts, they might respond by denying the same to the US. In 2005 9/11 suspect Abdelghani Mzoudi was acquitted by a German court because the US refused to allow Ramzi bin al-Shibh, a suspected ringleader of the 9/11 plot who was in US custody, to testify. More such instances could impede actions to lock up terrorists, whether in the US or abroad, or result in the release of suspects. (S//NF)This memo was prepared by the CIA Red Cell, which has been charged by the Director of Intelligence with taking a pronounced “out-of-the-box” approach that will provoke thought and offer an alternative viewpoint on the full range of analytic issues. Comments and queries are welcome and may be directed to the CIA Red Cell at (703) 482-6918 / 482-0169 or 44462/50127, secure. (C)
CL BY: 0711195
CL REASON: 1.4 (d)
DECL ON: 20350204
DRV FRM: FOR S-06
For those that do not read Arabic, this video shows the so-called Iraqi Police who are actually Militias abusing Iraqi people. This is why I put the title “The Iraqi police and Militias are hand in hand to destroy Iraqis”
The real problem now is that half of these so-called Iraqi police have fled Iraq and are seeking Asylum in European and Western countries, having seen this footage and taking it as typical behavior, would you be comfortable having one of these guys become a refugee in your country?
Once they attain refugee status they return to Iraq to kill, kidnap and make money to send to the country that they have status in, when they have filled their account they go back to the country of status and await citizenship. These countries that they hide this blood money in never ask where it came from, they do their dirty job in Iraq save the money in the West until they become citizens and then return to Iraq with Western passports so that no one can touch them. All you have to do is take the former and present incarnations of the Iraqi governments as examples, they all sat in the UK , America, Canada, Ireland, Australia, Cyprus, Sweden, Norway, Finland, Germany, Italy, Belgium, Holland, and more, even Asia, taking social welfare and boom all of a sudden they are multimillionaires
No one asks the hard questions because this is the Hypocrisy of Western countries, if something happens with these people in the countries that they have status in they are marked as terrorists, when they go and do the same things in their homeland it is fine ‘no problem’
I have not found justice or real human rights in any country in my last 19 years in the West, any country that is known not to have human rights or a justice system if they are friends with the west suffer no consequences, Saudi Arabia would be a perfect example 17 of the 9/11 Hijackers were Saudi, but Saudi was not invaded, because Saudi is America’s friend, instead they invaded Iraq, a country that has never attacked America, nor did it have the capability to as the US was fully aware.
It’s ‘old news’ but I will say it again to keep it fresh in our minds, Iraq did not have Weapons of Mass Destruction. When the American administration realized or acknowledged this they immediately changed their reasons for invasion from ‘Imminent threat’ to ‘ Removal of Dictator’ because Saddam, as America then decided, could not remain in power, as he had in the past killed members of his own society. The reasons were unimportant. Saddam HAD to be removed.
Now he has been replaced by not one but 325 new murderers, plus the President and his Militia in what is now known as Kurdistan, each political party has it’s own Private Army or Militia. We have attained a new record in Iraq, we have two serving Presidents one who serves just for the North Massoud Barzani, and one in Baghdad who has been ‘elected’ for the second time Jalal Talabani. Barzani forced the Iraqi government and all the political leaders to re-elect Talabani because he was afraid that if Talabani did not have a job elsewhere, he may go back to ‘Kurdistan’ and continue the 1996 war when Barzani asked Saddam Hussein to bring the Republic Guard to fight with him against Talabani and his Army.
Since 2003, over 1 million Iraqis have been killed under the eyes of the Americans who came to ‘install’ Democracy in Iraq. There are over 5 million Iraqi refugees inside and outside Iraq.
My question is, who will pay the price ultimately, the Iraqi people or the Western countries?
For the moment the Western countries are not concerned with this problem as there is enough money coming out of Iraq that can be frozen or seized to compensate them enough in this world recession. In the last seven years 364 billion has gone missing from Iraq, this is what the government has admitted to.
To put into perspective how large an amount this is we shall do this exercise;
If I were to count to 1 million without interruption it would take me nearly one week.
If I were to count to 1 Billion without interruption it would take me 35 years.
now multiply that by 364, it equals 12,740, that’s how many years I would spend counting the money Iraq has lost.
To be continued.
Bin Laden did not invent Al-Qaeda, this name for the Jihadist party only came about after 9/11. Al-Qaeda as we now know it was funded, trained and armed by the CIA and serves two purposes,the first is to strike terror into any and all persons and countries that is beneficial to America for sales of weapons, contractors or services. Secondly it draws out those who have ill will against America and befriends them under the illusion of fighting for the same aim, the irony is that they then become pawns for a master they set out to harm, ignorant that their comrades are indeed the enemy. America has an enemy indeed but one of it’s own making and choosing.
This is the biggest scandal in the history of the CIA.
with this enemy America now has the means to perpetuate “Terrorism” around the world for the next 50 to 100 years, anything and everything will be blamed on Al-Qaeda or a similar faceless enemy, one that can never be found or fought in open battle, there is only really one other entity that the same can be said of, a Ghost.