Tag Archives: tom dispatch

The Crucial Question for the American West: How Long Will the Water Hold Out?

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

Several miles from Phantom Ranch, Grand Canyon, Arizona, April 2013—Down here, at the bottom of the continent’s most spectacular canyon, the Colorado River growls past our sandy beach in a wet monotone. Our group of 24 is one week into a 225-mile, 18-day voyage on inflatable rafts from Lees Ferry to Diamond Creek. We settle in for the night. Above us, the canyon walls part like a pair of maloccluded jaws, and moonlight streams between them, bright enough to read by.

One remarkable feature of the modern Colorado, the great whitewater rollercoaster that carved the Grand Canyon, is that it is a tidal river. Before heading for our sleeping bags, we need to retie our six boats to allow for the ebb.

These days, the tides of the Colorado are not lunar but Phoenician. Yes, I’m talking about Phoenix, Arizona. On this April night, when the air conditioners in America’s least sustainable city merely hum, Glen Canyon Dam, immediately upstream from the canyon, will run about 6,500 cubic feet of water through its turbines every second.

Continue Reading »

Originally from – 

The Crucial Question for the American West: How Long Will the Water Hold Out?

Posted in alo, FF, GE, ONA, Uncategorized, Venta | Tagged , , , , , , | Comments Off on The Crucial Question for the American West: How Long Will the Water Hold Out?

Lessons from Edward Snowden and Robert Seldon Lady

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

He came and he went: that was the joke that circulated in 1979 when 70-year-old former Vice President Nelson Rockefeller had a heart attack and died in his Manhattan townhouse in the presence of his evening-gown-clad 25-year-old assistant. In a sense, the same might be said of retired CIA operative Robert Seldon Lady.

Recently, Lady proved a one-day wonder. After years in absentia— poof!—he reappeared out of nowhere on the border between Panama and Costa Rica, and made the news when Panamanian officials took him into custody on an Interpol warrant. The CIA’s station chief in Milan back in 2003, he had achieved brief notoriety for overseeing a la dolce vita version of extraordinary rendition as part of Washington’s Global War on Terror. His colleagues kidnapped Hassan Mustafa Osama Nasr, a radical Muslim cleric and terror suspect, off the streets of Milan, and rendered him via US airbases in Italy and Germany to the torture chambers of Hosni Mubarak’s Egypt. Lady evidently rode shotgun on that transfer.

Continue Reading »

Credit:  

Lessons from Edward Snowden and Robert Seldon Lady

Posted in FF, GE, ONA, Uncategorized, Venta | Tagged , , , , , , | Comments Off on Lessons from Edward Snowden and Robert Seldon Lady

“You’re a Sacrifice”: An Open Letter to Edward Snowden

Mother Jones

This story first appeared on the TomDispatch website.

Dear Edward Snowden,

Billions of us, from prime ministers to hackers, are watching a live espionage movie in which you are the protagonist and perhaps the sacrifice. Your way forward is clear to no one, least of all, I’m sure, you.

I fear for you; I think of you with a heavy heart. I imagine hiding you like Anne Frank. I imagine Hollywood movie magic in which a young lookalike would swap places with you and let you flee to safety—if there is any safety in this world of extreme rendition and extrajudicial execution by the government that you and I were born under and that you, until recently, served. I fear you may pay, if not with your death, with your life—with a life that can have no conventional outcome anytime soon, if ever. “Truth is coming, and it cannot be stopped,” you told us, and they are trying to stop you instead.

I am moved by your choice of our future over yours, the world over yourself. You know what few do nowadays: that the self is not the same as self-interest. You are someone who is smart enough, idealistic enough, bold enough to know that living with yourself in a system of utter corruption would destroy that self as an ideal, as something worth being. Doing what you’ve done, on the other hand, would give you a self you could live with, even if it gave you nowhere to live or no life. Which is to say, you have become a hero.

Pity the country that requires a hero, Bertolt Brecht once remarked, but pity the heroes too. They are the other homeless, the people who don’t fit in. They are the ones who see the hardest work and do it, and pay the price we charge those who do what we can’t or won’t. If the old stories were about heroes who saved us from others, modern heroes—Nelson Mandela, Cesar Chavez, Rachel Carson, Ella Baker, Martin Luther King, Aung San Suu Kyi—endeavored to save us from ourselves, from our own governments and systems of power.

The rest of us so often sacrifice that self and those ideals to fit in, to be part of a cannibal system, a system that eats souls and defiles truths and serves only power. Or we negotiate quietly to maintain an uneasy distance from it and then go about our own business. Though in my world quite a few of us strike our small blows against empire, you, young man, you were situated where you could run a dagger through the dragon’s eye, and that dragon is writhing in agony now; in that agony it has lost its magic: an arrangement whereby it remains invisible while making the rest of us ever more naked to its glaring eye.

Private Eyes and Public Rights
Privacy is a kind of power as well as a right, one that public librarians fought to protect against the Bush administration and the PATRIOT Act and that online companies violate in every way that’s profitable and expedient. Our lack of privacy, their monstrous privacy—even their invasion of our privacy must, by law, remain classified—is what you made visible. The agony of a monster with nowhere to stand—you are accused of spying on the spies, of invading the privacy of their invasion of privacy—is a truly curious thing. And it is changing the world. Europe and South America are in an uproar, and attempts to contain you and your damage are putting out fire with gasoline.

You yourself said it so well on July 12th:

“A little over one month ago, I had family, a home in paradise, and I lived in great comfort. I also had the capability without any warrant to search for, seize, and read your communications. Anyone’s communications at any time. That is the power to change people’s fates. It is also a serious violation of the law. The 4th and 5th Amendments to the Constitution of my country, Article 12 of the Universal Declaration of Human Rights, and numerous statutes and treaties forbid such systems of massive, pervasive surveillance. While the US Constitution marks these programs as illegal, my government argues that secret court rulings, which the world is not permitted to see, somehow legitimize an illegal affair. These rulings simply corrupt the most basic notion of justice—that it must be seen to be done.”

They say you, like Bradley Manning, gave secrets to their enemies. It’s clear who those enemies are: you, me, us. It was clear on September 12, 2001, that the Bush administration feared the American people more than al-Qaeda. Not much has changed on that front since, and this almost infinitely broad information harvest criminalizes all of us. This metadata—the patterns and connections of communications rather than their content—is particularly useful, as my friend Chris Carlsson pointed out, at mapping the clusters of communications behind popular movements, uprisings, political organizing: in other words, those moments when civil society rises to shape history, to make a better future in the open world of the streets and squares.

The goal of gathering all this metadata, Chris speculates, “is to be able to identify where the ‘hubs’ are, who the people are who sit at key points in networks, helping pass news and messages along, but especially, who the people are who spread ideas and information from one network of people to the next, who help connect small networks into larger ones, and thus facilitate the unpredictable and rapid spread of dissent when it appears.”

Metadata can map the circulatory system of civil society, toward what ends you can certainly imagine. When governments fear their people you can be sure they are not serving their people. This has always been the minefield of patriotism: loyalty to our government often means hostility to our country and vice-versa. Edward Snowden, loyalist to country, you have made this clear as day.

Those who demonize you show, as David Bromwich pointed out in a fine essay in the London Review of Books, their submission to the power you exposed. Who stood where, he writes,

“was an infallible marker of the anti-authoritarian instinct against the authoritarian. What was distressing and impossible to predict was the evidence of the way the last few years have worn deep channels of authoritarian acceptance in the mind of the liberal establishment. Every public figure who is psychologically identified with the ways of power in America has condemned Snowden as a traitor, or deplored his actions as merely those of a criminal, someone about whom the judgment ‘he must be prosecuted’ obviates any further judgment and any need for thought.”

You said, “I know the media likes to personalize political debates, and I know the government will demonize me.” Who you are is fascinating, but what you’ve exposed is what matters. It is upending the world. It is damaging Washington’s relations with many Latin American and some European countries, with Russia and China as well as with its own people—those, at least, who bother to read or listen to the news and care about what they find there. “Edward Snowden Single-Handedly Forces Tech Companies To Come Forward With Government Data Request Stats,” said a headline in Forbes. Your act is rearranging our world. How much no one yet knows.

What You Love
What’s striking about your words on video, Edward Snowden, the ones I hear as your young, pale, thoughtful face speaks with clarity and incisiveness in response to Glenn Greenwald’s questions, is that you’re not talking much about what you hate, though it’s clear that you hate the secret network you were part of. You hate it because it poisons what you love. You told us, “I understand that I will be made to suffer for my actions… but I will be satisfied if the federation of secret law, unequal pardon, and irresistible executive powers that rule the world that I love are revealed even for an instant.” You love our world, our country—not its government, clearly, but its old ideals and living idealists, its possibilities, its dreamers, and its dreams (not the stale, stuffed American dream of individual affluence, but the other dreams of a better world for all of us, a world of principle).

You told us where we now live and that you refuse to live there anymore:

“I don’t want to live in a world where everything that I say, everything I do, everyone I talk to, every expression of creativity or love or friendship is recorded. And that’s not something I’m willing to support, it’s not something I’m willing to build, and it’s not something I’m willing to live under. America is a fundamentally good country. We have good people with good values who want to do the right thing. But the structures of power that exist are working to their own ends to extend their capability at the expense of the freedom of all publics.”

Which is to say you acted from love, from all the things the new surveillance state imperils: privacy, democracy, accountability, decency, honor. The rest of us, what would we do for love?

Continue Reading »

Link:  

“You’re a Sacrifice”: An Open Letter to Edward Snowden

Posted in alo, FF, GE, ONA, Uncategorized, Venta | Tagged , , , , , , , | Comments Off on “You’re a Sacrifice”: An Open Letter to Edward Snowden

Could the US Stop Another Edward Snowden?

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

It’s hard even to know how to take it in. I mean, what’s really happening? An employee of a private contractor working for the National Security Agency makes off with unknown numbers of files about America’s developing global security state on a thumb drive and four laptop computers, and jumps the nearest plane to Hong Kong. His goal: to expose a vast surveillance structure built in the shadows in the post-9/11 years and significantly aimed at Americans. He leaks some of the documents to a columnist at the British Guardian and to the Washington Post. The response is unprecedented: an “international manhunt” (or more politely but less accurately, “a diplomatic full court press“) conducted not by Interpol or the United Nations but by the planet’s sole superpower, the very government whose practices the leaker was so intent on exposing.

And that’s just for starters. Let’s add another factor. The leaker, a young man with great techno-savvy, lets the world know that he’s picked and chosen among the NSA files in his possession. He’s releasing only those he thinks the American public needs in order to start a full-scale debate about the unprecedented secret world of surveillance that their taxpayer dollars have created. In other words, this is no “document dump.” He wants to spark change without doing harm.

But here’s the kicker: he couldn’t be more aware of previous whistleblower cases, the punitive reaction of his government to them, and the fate that might be his. As a result, we now know, he has encrypted the full set of files in his possession and left them in one or more safe places for unknown individuals—that is, we don’t know who they are—to access, should he be taken by the US

In other words, from the time Edward Snowden’s first leaked documents came out, it was obvious that he was in control of how much of the NSA’s secret world would be seen. It would be hard then not to conclude that capturing him, imprisoning him, trying him, and throwing away the key is likely to increase, not decrease, the flow of those documents. Knowing that, the Obama administration and the representatives of our secret world went after him anyway—after one man on a global scale and in a way that may not have a precedent. No thought of future embarrassment stopped them, nor, it seems, did they hesitate because of possible resentments engendered by their heavy-handed pressure on numerous foreign governments.

The result has been a global spectacle, as well as a worldwide debate about the spying practices of the US (and its allies). In these weeks, Washington has proven determined, vengeful, implacable. It has strong-armed, threatened, and elbowed powers large and small. It has essentially pledged that the leaker, former Booz Allen employee Edward Snowden, will never be safe on this planet in his lifetime. And yet, to mention the obvious, the greatest power on Earth has, as yet, failed to get its man and is losing the public opinion battle globally.

An Asylum-less World
Highlighted in all this has been a curious fact of our twenty-first-century world. In the Cold War years, asylum was always potentially available. If you opposed one of the two superpowers or its allies, the other was usually ready to open its arms to you, as the US famously did for what were once called “Soviet dissidents” in great numbers. The Soviets did the same for Americans, Brits, and others, often secret communists, sometimes actual spies, who opposed the leading capitalist power and its global order.

Today, if you are a twenty-first-century “dissident” and need asylum/protection from the only superpower left, there is essentially none to be had. Even after three Latin American countries, enraged at Washington’s actions, extended offers of protection to Snowden, these should be treated as a new category of limited asylum. After all, the greatest power on the planet has, since 9/11, shown itself perfectly willing to do almost anything in pursuit of its definition of “security” or the security of its security system. Torture, abuse, the setting up of secret prisons or “black sites,” the kidnapping of terrorist suspects (including perfectly innocent people) off the streets of global cities and in the backlands of the planet, as well as their “rendition” to the torture chambers of complicit allied regimes, and the secret surveillance of anyone anywhere would only start a far longer list.

Nothing about the “international manhunt” for Snowden indicates that the Obama administration would be unwilling to send in the CIA or special operations types to “render” him from Venezuela, Bolivia, or Nicaragua, no matter the cost to hemispheric relations. Snowden himself brought up this possibility in his first interview with Guardian columnist Glenn Greenwald. “I could,” he said bluntly, “be rendered by the CIA.” This assumes that he can even make it to a land of exile from somewhere in the bowels of the international terminal of Moscow’s Sheremetyevo airport without being intercepted by Washington.

It’s true that there remain some modest limits on the actions even of a rogue superpower. It’s hard to imagine Washington dropping its kidnappers into Russia or China to take Snowden, which is perhaps why it has put such pressure on both countries to turn him in or hustle him along. With smaller, weaker lands, however, non-nuclear allies or enemies or frenemies, don’t doubt the possibility for a second.

If Edward Snowden is proving one thing, it’s this: in 2013, Planet Earth isn’t big enough to protect the American version of dissidents.Instead, it looks ever more like a giant prison with a single implacable policeman, judge, jury, and jailer.

Deterrence Theory the Second Time Around
In the Cold War years, the two nuclear-armed superpowers practiced what was called “deterrence theory,” or more aptly MAD, short for “mutually assured destruction.” Think of it as the particularly grim underside of what might have been but wasn’t called MAA (mutually assured asylum). The knowledge that no nuclear first strike by one superpower could succeed in preventing the other from striking back with overwhelming force, destroying them both (and possibly the planet) seemed, however barely, to hold their enmity and weaponry at bay. It forced them to fight their wars, often by proxy, on the global frontiers of empire.

Now, with but one superpower left, another kind of deterrence theory has come into play. Crucial to our era is the ongoing creation of the first global surveillance state. In the Obama years, the sole superpower has put special effort into deterring anyone in its labyrinthine bureaucracy who shows a desire to let us know what “our” government is doing in our name.

The Obama administration’s efforts to stop whistleblowers are becoming legendary. It has launched an unprecedented program to specially train millions of employees and contractors to profile coworkers for “indicators of insider threat behavior.” They are being encouraged to inform on any “high-risk persons” they suspect might be planning to go public. Administration officials have also put much punitive energy into making examples out of whistleblowers who have tried to reveal anything of the inner workings of the national security complex.

In this way, the Obama administration has more than doubled the total whistleblower prosecutions of all previous administrations combined under the draconian World War I-era Espionage Act. It has also gone after Army Private Bradley Manning for releasing secret military and State Department files to WikiLeaks, not only attempting to put him away for life for “aiding the enemy,” but subjecting him to particularly vindictive and abusive treatment while in military prison. In addition, it has threatened journalists who have written on or published leaked material and gone on expeditions into the telephone and email records of major media organizations.

All of this adds up to a new version of deterrence thinking in which a potential whistleblower should know that he or she will experience a lifetime of suffering for leaking anything; in which those, even in the highest reaches of government, who consider speaking to journalists on classified subjects should know that their calls could be monitored and their whispers criminalized; and in which the media should know that reporting on such subjects is not a healthy activity.

This sort of deterrence already seemed increasingly extreme in nature; the response to Snowden’s revelations took it to a new level. Though the US government pursued WikiLeaks founder Julian Assange abroad (while reportedly preparing to indict him at home), the other whistleblower cases might all be considered national security ones. The manhunt against Snowden is something new. Through it, Washington is now punitively expanding twenty-first century deterrence theory to the world.

The message is this: nowhere will you be safe from us if you breach US secrecy. Snowden’s will surely be a case study in how far the new global security state is willing to go. And the answer is already in: far indeed. We just don’t yet know exactly how far.

How to Down a Plane to (Not) Catch a Whistleblower
In this light, no incident has been more revealing than the downing of the plane of Bolivian President Evo Morales, the democratically elected head of a sovereign Latin American nation, and not an official enemy of the United States. Angry Bolivian authorities termed it a “kidnapping” or “imperialist hijack.” It was, at the least, an act for which it’s hard to imagine a precedent.

Evidently officials in Washington believed that the plane bringing the Bolivian president back from Moscow was also carrying Snowden. As a result, the US seems to have put enough pressure on four European countries (France, Spain, Portugal, and Italy) to force that plane to land for refueling in a fifth country (Austria). There—again, US pressure seems to have been the crucial factor—it was searched under disputed circumstances and Snowden not found.

Continue Reading »

Continued:

Could the US Stop Another Edward Snowden?

Posted in alo, FF, GE, ONA, oven, PUR, Uncategorized, Venta | Tagged , , , , , , , | Comments Off on Could the US Stop Another Edward Snowden?

The US Surveillance State Dates Back to the 19th Century

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

The American surveillance state is now an omnipresent reality, but its deep history is little known and its future little grasped. Edward Snowden’s leaked documents reveal that, in a post-9/11 state of war, the National Security Agency (NSA) was able to create a surveillance system that could secretly monitor the private communications of almost every American in the name of fighting foreign terrorists. The technology used is state of the art; the impulse, it turns out, is nothing new. For well over a century, what might be called “surveillance blowback” from America’s wars has ensured the creation of an ever more massive and omnipresent internal security and surveillance apparatus. Its future (though not ours) looks bright indeed.

In 1898, Washington occupied the Philippines and in the years that followed pacified its rebellious people, in part by fashioning the world’s first full-scale “surveillance state” in a colonial land. The illiberal lessons learned there then migrated homeward, providing the basis for constructing America’s earliest internal security and surveillance apparatus during World War I. A half-century later, as protests mounted during the Vietnam War, the FBI, building on the foundations of that old security structure, launched large-scale illegal counterintelligence operations to harass antiwar activists, while President Richard Nixon’s White House created its own surveillance apparatus to target its domestic enemies.

In the aftermath of those wars, however, reformers pushed back against secret surveillance. Republican privacy advocates abolished much of President Woodrow Wilson’s security apparatus during the 1920s, and Democratic liberals in Congress created the FISA courts in the 1970s in an attempt to prevent any recurrence of President Nixon’s illegal domestic wiretapping.

Today, as Washington withdraws troops from the Greater Middle East, a sophisticated intelligence apparatus built for the pacification of Afghanistan and Iraq has come home to help create a twenty-first century surveillance state of unprecedented scope. But the past pattern that once checked the rise of a US surveillance state seems to be breaking down. Despite talk about ending the war on terror one day, President Obama has left the historic pattern of partisan reforms far behind. In what has become a permanent state of “wartime” at home, the Obama administration is building upon the surveillance systems created in the Bush years to maintain US global dominion in peace or war through a strategic, ever-widening edge in information control. The White House shows no sign—nor does Congress—of cutting back on construction of a powerful, global Panopticon that can surveil domestic dissidents, track terrorists, manipulate allied nations, monitor rival powers, counter hostile cyber strikes, launch preemptive cyberattacks, and protect domestic communications.

Writing for TomDispatch four years ago during Obama’s first months in office, I suggested that the War on Terror has “proven remarkably effective in building a technological template that could be just a few tweaks away from creating a domestic surveillance state—with omnipresent cameras, deep data-mining, nano-second biometric identification, and drone aircraft patrolling ‘the homeland.'”

That prediction has become our present reality—and with stunning speed. Americans now live under the Argus-eyed gaze of a digital surveillance state, while increasing numbers of surveillance drones fill American skies. In addition, the NSA’s net now reaches far beyond our borders, sweeping up the personal messages of many millions of people worldwide and penetrating the confidential official communications of at least 30 allied nations. The past has indeed proven prologue. The future is now.

The Coming of the Information Revolution
The origins of this emerging global surveillance state date back over a century to “America’s first information revolution” for the management of textual, statistical, and analytical data—a set of innovations whose synergy created the technological capacity for mass surveillance.

Here’s a little litany of “progress” to ponder while on the road to today’s every-email-all-the-time version of surveillance.

Within just a few years, the union of Thomas A. Edison’s quadruplex telegraph with Philo Remington’s commercial typewriter, both inventions of 1874, allowed for the accurate transmission of textual data at the unequalled speed of 40 words per minute across America and around the world.

In the mid-1870s as well, librarian Melvil Dewey developed the “Dewey decimal system” to catalog the Amherst College Library, thereby inventing the “smart number” for the reliable encoding and rapid retrieval of limitless information.

The year after engineer Herman Hollerith patented the punch card (1889), the US Census Bureau adopted his Electrical Tabulating machine to count 62,622,250 Americans within weeks—a triumph that later led to the founding of International Business Machines, better known by its acronym IBM.

By 1900, all American cities were wired via the Gamewell Corporation’s innovative telegraphic communications, with over 900 municipal police and fire systems sending 41 million messages in a single year.

A Colonial Laboratory for the Surveillance State
On the eve of empire in 1898, however, the US government was still what scholar Stephen Skowronek has termed a “patchwork” state with a near-zero capacity for domestic security. That, of course, left ample room for the surveillance version of modernization, and it came with surprising speed after Washington conquered and colonized the Philippines.

Facing a decade of determined Filipino resistance, the US Army applied all those American information innovations—rapid telegraphy, photographic files, alpha-numeric coding, and Gamewell police communications—to the creation of a formidable, three-tier colonial security apparatus including the Manila Police, the Philippines Constabulary, and above all the Army’s Division of Military Information.

In early 1901, Captain Ralph Van Deman, later dubbed “the father of US Military Intelligence,” assumed command of this still embryonic division, the Army’s first field intelligence unit in its 100-year history. With a voracious appetite for raw data, Van Deman’s division compiled phenomenally detailed information on thousands of Filipino leaders, including their physical appearance, personal finances, landed property, political loyalties, and kinship networks.

Starting in 1901, the first US governor-general (and future president) William Howard Taft drafted draconian sedition legislation for the islands and established a 5,000-man strong Philippines Constabulary. In the process, he created a colonial surveillance state that ruled, in part, thanks to the agile control of information, releasing damning data about enemies while suppressing scandals about allies.

When the Associated Press’s Manila bureau chief reported critically on these policies, Taft’s allies dug up dirt on this would-be critic and dished it out to the New York press. On the other hand, the Division of Military Information compiled a scandalous report about the rising Filipino politician Manuel Quezon, alleging a premarital abortion by his future first lady. Quezon, however, served the Constabulary as a spy, so this document remained buried in US files, assuring his unchecked ascent to become the first president of the Philippines in 1935.

American Blueprint
During the US conquest of the Philippines, Mark Twain wrote an imagined history of twentieth-century America. In it, he predicted that a “lust for conquest” had already destroyed “the Great American Republic,” because “trampling upon the helpless abroad had taught her, by a natural process, to endure with apathy the like at home.” Indeed, just a decade after Twain wrote those prophetic words, colonial police methods came home to serve as a template for the creation of an American internal security apparatus in wartime.

After the US entered World War I in 1917 without an intelligence service of any sort, Colonel Van Deman brought his Philippine experience to bear, creating the US Army’s Military Intelligence Division (MID) and so laying the institutional foundations for a future internal security state.

In collaboration with the FBI, he also expanded the MID’s reach through a civilian auxiliary organization, the American Protective League, whose 350,000 citizen-operatives amassed more than a million pages of surveillance reports on German-Americans in just 14 months, arguably the world’s most intensive feat of domestic surveillance ever.

After the Armistice in 1918, Military Intelligence joined the FBI in two years of violent repression of the American left marked by the notorious Luster raids in New York City, J. Edgar Hoover’s “Palmer Raids” in cities across the northeast and the suppression of union strikes from New York City to Seattle.

When President Wilson left office in 1921, incoming Republican privacy advocates condemned his internal security regime as intrusive and abusive, forcing the Army and the FBI to cut their ties to patriotic vigilantes. In 1924, Attorney General Harlan Fiske Stone, worrying that “a secret police may become a menace to free government,” announced “the Bureau of Investigation is not concerned with political or other opinions of individuals.” Epitomizing the nation’s retreat from surveillance, Secretary of War Henry Stimson closed the Military Intelligence cipher section in 1929, saying famously, “Gentlemen do not read each other’s mail.”

After retiring at the rank of major general that same year, Van Deman and his wife continued from their home in San Diego to coordinate an informal intelligence exchange system, compiling files on 250,000 suspected “subversives.” They also took reports from classified government files and slipped them to citizen anti-communist groups for blacklisting. In the 1950 elections, for instance, Representative Richard Nixon reportedly used Van Deman’s files to circulate “pink sheets” at rallies denouncing California Congresswoman Helen Gahagan Douglas, his opponent in a campaign for a Senate seat, launching a victorious Nixon on the path to the presidency.

From retirement, Van Deman, in league with FBI Director J. Edgar Hoover, also proved crucial at a 1940 closed-door conference that awarded the FBI control over domestic counterintelligence. The Army’s Military Intelligence, and its successors, the CIA and NSA, were restricted to foreign espionage, a division of tasks that would hold, at least in principle, until the post-9/11 years. So armed, during World War II the FBI used warrantless wiretaps, “black bag” break-ins, and surreptitious mail opening to track suspects, while mobilizing more than 300,000 informers to secure defense plants against wartime threats that ultimately proved “negligible.”

Continue Reading »

View original article: 

The US Surveillance State Dates Back to the 19th Century

Posted in alo, ALPHA, Citizen, FF, GE, ONA, oven, Pines, Uncategorized, Venta | Tagged , , , , , , , , | Comments Off on The US Surveillance State Dates Back to the 19th Century

Why Violent Right-wing Extremism Doesn’t Scare Americans

Mother Jones

This story first appeared on the TomDispatch website.

The evangelical Christians of Greenville County, South Carolina, are afraid.

There has been talk of informants and undercover agents luring young, conservative evangelicals across the South into sham terrorist plots. The feds and the area’s police want to eliminate a particularly extreme strain of evangelical Christianity opposed to abortion, homosexuality, and secularism, whose adherents sometimes use violent imagery and speech. They fear such extreme talk could convince lone wolves or small groups of Christian extremists to target abortion clinics, gay bars, or shopping malls for attack. As a result, law enforcement has flooded these communities with informants meant to provide an early warning system for any signs of such “radicalization.”

Converts, so important to the evangelical movement, are now looked upon with suspicion—the more fervent, the more suspicious. In local barbecue joints, diners, and watering holes, the proprietors are careful not to let FOX News linger onscreen too long, fearing political discussions that could be misconstrued. After all, you can never be too sure who’s listening.

Come Sunday, the ministers who once railed against abortion, gay marriage, and Hollywood as sure signs that the US is descending into godlessness will mute their messages. They will peer out at their congregations and fear that some faces aren’t interested in the Gospel, or maybe are a little too interested in every word. The once vibrant political clubs at Bob Jones University have become lifeless as students whisper about informants and fear a few misplaced words could leave them in a government database or worse.

Naturally, none of this is actually happening to evangelical Christians in South Carolina, across the South, or anywhere else. It would never be tolerated. Yet the equivalents of everything cited above did happen in and around the New York metropolitan area—just not to white, conservative, Christian Americans. But replace them with American Muslims in the New York area and you have a perfect fit, as documented by the recent report Mapping Muslims. And New York is hardly alone.

Since 9/11, American law enforcement has taken a disproportionate interest in American Muslims across the country, seeing a whole community as a national security threat, particularly in California and New York City. But here’s the thing: the facts that have been piling up ever since that date don’t support such suspicion. Not at all.

The numbers couldn’t be clearer: right-wing extremists have committed far more acts of political violence since 1990 than American Muslims. That law enforcement across the country hasn’t felt similarly compelled to infiltrate and watch over conservative Christian communities in the hopes of disrupting violent right-wing extremism confirms what American Muslims know in their bones: to be different is to be suspect.

Conducting Suspicionless Surveillance
In the aftermath of 9/11, law enforcement has infiltrated Muslim American communities and spied on them in ways that would have outraged Americans, had such tactics been used against Christian communities after the Oklahoma City bombing in 1995, or after any of the other hate crimes or anti-abortion-based acts of violence committed since then by right-wing extremists.

Documents obtained through Freedom of Information Act requests by the American Civil Liberties Union make clear that FBI agents in California used community outreach programs to gather intelligence at mosques and other local events, recording the opinions and associations of people not suspected of any crime. In 2008, the FBI loosened its internal guidelines further, allowing agents to collect demographic information on ethnically concentrated communities and map them for intelligence and investigative purposes.

There is no question that the most extreme example of such blanket, suspicion-less surveillance has been conducted by the New York City Police Department (NYPD). As revealed by the Associated Press, the NYPD’s Intelligence Division carried out a secret surveillance program on the city’s varied Muslim communities based on the erroneous belief that their religion makes them more susceptible to violent radicalization.

The program, which continues today, looks something like this, according to Mapping Muslims: “rakers,” or undercover officers, are sent into neighborhoods to identify “hot spots”—mosques, schools, restaurants, cafes, halal meat shops, hookah bars—and told to chat up people to “gauge sentiment,” while setting up “listening posts.” “Crawlers,” or informants, are then recruited and sent to infiltrate mosques and religious events. They are ordered to record what imams and congregants say and take note of who attended services and meetings.

These crawlers are encouraged to initiate “create and capture” conversations with their targets, bringing up terrorism or some other controversial topic, recording the response, and then sharing it with the NYPD. The intelligence unit also went mobile, checking out and infiltrating American-Muslim student groups from Connecticut to New Jersey and even as far away as Pennsylvania.

When news of the NYPD’s spying program broke, it shattered trust within the city’s Muslim communities, giving rise to general suspicion and fraying community ties of all sorts. This naturally raises the question: How many terrorism plots were identified and disrupted thanks to this widespread and suspicionless surveillance program? The answer: none.

Worse, the chief of the NYPD Intelligence Division admitted in sworn testimony last summer that the Muslim surveillance program did not even generate a single criminal lead. The incredibly invasive, rights-eroding program was a complete bust, a total waste of the resources of the New York City Police Department.

And that’s without even considering what is surely its most harmful aspect: the likelihood that, at least in the short term, it has caused irreparable damage to the Muslim community’s trust in the police. Surveillance, concludes the Mapping Muslims report, “has stifled constitutionally protected activity and destroyed trust between American Muslim communities and the agencies charged with protecting them.”

When people fear the police, tips dry up, potentially making the community less safe. This is important, especially given that the Muslim-American community has helped prevent, depending on whose figures you use, from 21%40% of all terrorism plots associated with Muslims since 9/11. That’s grounds for cooperation, not alienation: a lesson that would have been learned by a police department with strong ties to and trust in the community.

Numbers May Not Lie, But They Sure Can Be Ignored
The idea that American law enforcement’s mass surveillance of Muslim communities is a necessary, if unfortunate, counterterrorism tool rests with the empirically false notion that American Muslims are more prone to political violence than other Americans.

This is simply not true.

According to the National Consortium for the Study of Terrorism and Responses to Terrorism (START), right-wing terrorists perpetrated 145 “ideologically motivated homicide incidents” between 1990 and 2010. In that same period, notes START, “al Qaeda affiliates, al Qaeda-inspired extremists, and secular Arab Nationalists committed 27 homicide incidents in the United States involving 16 perpetrators or groups of perpetrators.”

Last November, West Point’s Combating Terrorism Center published a report on America’s violent far-right extremists. Its numbers were even more startling than START’s. “The consolidated dataset,” writes report author Arie Perliger, “includes information on 4,420 violent incidents that occurred between 1990 and 2012 within US borders, and which caused 670 fatalities and injured 3,053 people.” Perliger also found that the number of far-right attacks had jumped 400% in the first 11 years of the 21st century.

Continue Reading »

Link:

Why Violent Right-wing Extremism Doesn’t Scare Americans

Posted in alo, FF, GE, ONA, PUR, Uncategorized, Venta | Tagged , , , , , , , | Comments Off on Why Violent Right-wing Extremism Doesn’t Scare Americans

5 Things Running Through the Minds of Whistleblowers Like Edward Snowden

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

As a State Department whistleblower, I think a lot about Edward Snowden. I can’t help myself. My friendships with other whistleblowers like Tom Drake, Jesslyn Radack, Daniel Ellsberg, and John Kiriakou lead me to believe that, however different we may be as individuals, our acts have given us much in common. I suspect that includes Snowden, though I’ve never had the slightest contact with him. Still, as he took his long flight from Hong Kong into the unknown, I couldn’t help feeling that he was thinking some of my thoughts, or I his. Here are five things that I imagine were on his mind (they would have been on mine) as that plane took off.

I Am Afraid
Whistleblowers act on conscience because they encounter something so horrifying, unconstitutional, wasteful, fraudulent, or mismanaged that they are overcome by the need to speak out. There is always a calculus of pain and gain (for others, if not oneself), but first thoughts are about what you’ve uncovered, the information you feel compelled to bring into the light, rather than your own circumstances.

In my case, I was ignorant of what would happen once I blew the whistle. I didn’t expect the Department of State to attack me. National Security Agency (NSA) whistleblower Tom Drake was similarly unprepared. He initially believed that, when the FBI first came to interview him, they were on his side, eager to learn more about the criminal acts he had uncovered at the NSA. Snowden was different in this. He had the example of Bradley Manning and others to learn from. He clearly never doubted that the full weight of the US government would fall on him.

He knew what to fear. He knew the Obama administration was determined to make any whistleblower pay, likely via yet another prosecution under the Espionage Act (with the potential for the death penalty). He also knew what his government had done since 9/11 without compunction: it had tortured and abused people to crush them; it had forced those it considered enemies into years of indefinite imprisonment, creating isolation cells for suspected terrorists and even a pre-trial whistleblower. It had murdered Americans without due process, and then, of course, there were the extraordinary renditions in which US agents kidnapped perceived enemies and delivered them into the archipelago of post-9/11 horrors.

Sooner or later, if you’re a whistleblower, you get scared. It’s only human. On that flight, I imagine that Edward Snowden, for all his youthful confidence and bravado, was afraid. Would the Russians turn him over to Washington as part of some secret deal, maybe the sort of spy-for-spy trade that would harken back to the Cold War era?

Even if he made it out of Moscow, he couldn’t have doubted that the full resources of the NSA and other parts of the US government would be turned on him. How many CIA case officers and Joint Special Operations Command types did the US have undercover in Ecuador? After all, the dirty tricks had already started. The partner of Guardian journalist Glenn Greenwald, who broke Snowden’s story, had his laptop stolen from their residence in Brazil. This happened only after Greenwald told him via Skype that he would send him an encrypted copy of Snowden’s documents.

In such moments, you try to push back the sense of paranoia that creeps into your mind when you realize that you are being monitored, followed, watched. It’s uncomfortable, scary. You have to wonder what your fate will be once the media grows bored with your story, or when whatever government has given you asylum changes its stance vis-a-vis the US When the knock comes at the door, who will protect you? So who can doubt that fear made the journey with him?

Continue Reading »

Read the article – 

5 Things Running Through the Minds of Whistleblowers Like Edward Snowden

Posted in FF, GE, ONA, Uncategorized, Venta | Tagged , , , , | Comments Off on 5 Things Running Through the Minds of Whistleblowers Like Edward Snowden

Rewilding the American West

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

My home sits at the gateway to a national park in Utah, a source of envy among tourists who gather along Capitol Reef’s “scenic drive.” But after 40 years of living in one desert or another, I know firsthand that America’s iconic desert landscapes, places like Monument Valley and Arches National Park, are the exceptions, not the rule. The rule is that we dig up, dump on, dam, bomb, drill, over-graze, and otherwise abuse our deserts, most of them public lands owned by you, the taxpaying citizen. Generally, our management of the nation’s public lands is a disgrace and deserts are exhibit A.

But let’s skip the grim survey of how humans are overloading the carrying capacity of our original earthly Eden that usually opens a report like this. The intent of such a recitation of folly is to compel the reader’s attention by underlining the dire importance of the topic at hand. But I assume you understand by now that you woke up this morning on an overheated planet of slums threatened by ecological collapse.

So instead, let’s get right to the point: what do we do about it? How do we begin to heal the wounds?

Continue Reading »

Original article: 

Rewilding the American West

Posted in alo, Citizen, FF, GE, ONA, Uncategorized, Venta | Tagged , , , , , , | Comments Off on Rewilding the American West

The US Military and the Unraveling of Africa

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

The Gulf of Guinea. He said it without a hint of irony or embarrassment. This was one of US Africa Command’s big success stories. The Gulf… of Guinea.

Never mind that most Americans couldn’t find it on a map and haven’t heard of the nations on its shores like Gabon, Benin, and Togo. Never mind that just five days before I talked with AFRICOM’s chief spokesman, the Economist had asked if the Gulf of Guinea was on the verge of becoming “another Somalia,” because piracy there had jumped 41% from 2011 to 2012 and was on track to be even worse in 2013.

The Gulf of Guinea was one of the primary areas in Africa where “stability,” the command spokesman assured me, had “improved significantly,” and the US military had played a major role in bringing it about. But what did that say about so many other areas of the continent that, since AFRICOM was set up, had been wracked by coups, insurgencies, violence, and volatility?

A careful examination of the security situation in Africa suggests that it is in the process of becoming Ground Zero for a veritable terror diaspora set in motion in the wake of 9/11 that has only accelerated in the Obama years. Recent history indicates that as US “stability” operations in Africa have increased, militancy has spread, insurgent groups have proliferated, allies have faltered or committed abuses, terrorism has increased, the number of failed states has risen, and the continent has become more unsettled.

Continue Reading »

Jump to original – 

The US Military and the Unraveling of Africa

Posted in FF, GE, LG, ONA, Uncategorized, Venta | Tagged , , , , , | Comments Off on The US Military and the Unraveling of Africa

A Graduation Day Speech for the Class of 1966

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

Here may be the most commonplace sentence anyone could write about graduation day in any year: when I think back to my own graduation in 1966, an eon, a lifetime, a world ago, I have no memory of who addressed us. None. I have a little packet of photos of the event: shots of my parents and me, my grandmother and me, my aunt and me, my former roommates and me, my friends and me. You can even see the chairs for the ceremony. But not the speaker. And yet it’s odds on that he—and in 1966, it was surely a “he”—made some effort to usher me into the American world, offering me, as a member of a new generation, words of wisdom and some advice. You know, the usual thing that no one pays much attention to or ever remembers.

Here, on the other hand, is my most vivid memory of that day. I reserved a room at a local motel for my parents the night before the graduation ceremony. As it happened, I had reserved the same room the previous night for my girlfriend and me (and conveniently not paid for it). When, on the morning of graduation, I picked my parents up and my father went to pay, the hotel clerk charged him for both nights, winked, and said something suggestive.

Continue Reading »

Link:

A Graduation Day Speech for the Class of 1966

Posted in FF, GE, ONA, Uncategorized, Venta | Tagged , , , , , , | Comments Off on A Graduation Day Speech for the Class of 1966