JSOC: America’s Secret Killing Squads

Dirty Wars: The World is a Battlefield

Directed by Richard Rowley (2013)

Film Review

In this highly troubling documentary (based on Cahill’s book by the same name), investigative journalist Jeremy Cahill describes how he first learned about the Joint Special Operations Campaign (JSOC). He describes in detail how all extrajudicial raids and killings increased substantially under Barack Obama (and Joe Biden, who directed his foreign policy), who used JSOC as their own private assassination squads.

Cahill first crossed paths with JSOC while investigating 2010 night raids killing Afghan civilians in rural areas under Taliban control. He was particularly concerned about a raid that occurred at Gardez, in which a police commander trained by the US and two pregnant women were killed. Surviving families referred to the bearded gunmen (with no apparent link to official US occupying forces) as the American Taliban. The Obama administration totally denied involvement in the Gardez massacre – until a cellphone video surfaced showing bearded English-speaking Americans searching and rearranging the bodies. At this point JSOC admitted responsibility and offered survivors a sacrificial goat as compensation.

During the period Cahill covered Afghanistan, JSOC undertook roughly 1700 night raids a month.

Cahill would go on to investigate similar JSOC night raids in Iraq, as well as illegal US drone strikes in Pakistan and Yemen. The latter occurred well before US ally Saudi Arabia declared war on Yemen in 2015. The prominent Yemeni reporter Abdulelah Haider Shaye was arrested and imprisoned for exposing the U.S. cruise missile attack on the Yemeni village of al-Majalah that killed 41 people, including 14 women and 21 children in December 2009. Then Yemeni President Ali Abdullah Saleh announced his intention to pardon Shaye. However he changed his mind after a personal phone call from Obama.

Scahill published a number of articles in the Nation and elsewhere about illegal CIA and special forces activities in Yemen, especially after the father of US citizen Anwar Alawki filed a 2010 lawsuit (with ACLU support) to stop Obama (who had placed him on the kill list) from assassinating him. Despite the suit and the publicity it generated (and a congressional bill seeking to ban extrajudicial assassinations of US citizens), Obama had no qualms about using JSOC to murder Alawki in with a drone strike September 2011 . Two years later, the president would also kill Alawki’s 16 year old son in a drone strike.

For me, the final section of the film was the most interesting. It begins by tracing Alawki’s history as an extremely popular imam in San Diego. Following 9-11, he and hundreds of other US Muslims faced growing harassment and persecution by the US government. In 2006, at the direction of the US government, Yemeni authorities imprisoned Alawki for 1 1/2 years.

Public library patrons can view the full film free at Beamafield.

https://beamafilm-com.eznewplymouth.kotui.org.nz/watch/dirty-wars

Whistleblower Leaks Secret Assassination and Kill List Documents

In the following video, Jeremy Cahill discusses his book The Assassination Complex: Inside the Government’s Secret Drone Warfare Program. For the most part, the book consists of leaked documents about the CIA’s “secret” drone assassination program. This is the first time any official documents have been made public.

Cahill’s latest book includes documents setting out the criteria for putting Americans and others on the terrorist “watch list.” Other documents describe the “kill chain,” the process by which prospects are moved from the “watch list” to the “kill list.” When Hillary Clinton was Secretary of State, she signed off on every targeted assassination carried out by the Obama White House.

According to Scahill, the watch list contains over one million entries, including 21,000 Americans. Among other data, the watch list includes bank records and confidential medical records.

Scahill begins his talk with fascinating commentary on the three main presidential candidates. Among other observations, he points out 1) that Bernie Sanders supports both the kill list and drone warfare 2)  that Trump didn’t bring fascism to the US – that he merely brought existing US fascism into public view and 3) that Bill and Hillary Clinton were using her private email server to operate a parallel government structure.

In Scahill’s words, Hillary is the “empire candidate.” She has already been endorsed by William Kristol, Max Booth and other neoconservatives. He maintains most of the Republican leadership is preparing to support her presidential campaign.

Scahill is also scathingly critical of Ben Rhodes and the other 20 to 30-year-old “frat” boys who manage Obama’s foreign policy, ie make the decision who to kill next and which countries to invade.

 

Shadow Government: Neither Secret Nor Invisible

national security and double governmentNational Security and Double Government

by Michael J Glennon (2014)

Available as free PDF: http://harvardnsj.org/wp-content/uploads/2014/01/Glennon-Final.pdf

National Security and Double Government is a lengthy article about the highly visible national security bureaucracy that presently runs the US government. The author, Michael J Glennon, is Professor of International Law at the Tufts University Fletcher School of Law and Diplomacy. Glennon disputes the claim by conspiracy theorists that a secret shadow government is attempting to overthrow constitutional democracy. In his view, the deep state is simply a vast, self-serving bureaucracy of technocrats – forty-six (as of 2011) federal departments and agencies engaged in intelligence gathering and analysis, military aggression, cyber operations and weapons development.

Glennon’s description of how the deep state operates, which strikes me as depressingly accurate, shatters any lingering illusions about reforming the US government. It can only be dismantled.

In essence, the real work of the US government is controlled by several hundred officials who run the national security bureaucracy. Removed from public view and the constitutional restrictions that restrain the President, Congress and the judiciary, they make most of the key decisions concerning foreign policy and national security. Although their budget is classified, Glennon estimates it engages millions of employees at an annual cost of $1 trillion.

The “Trumanite” Arm of Government

Glennon calls them the “Trumanite” arm of government because President Harry S Truman created the US national security apparatus. Under Truman, Congress enacted the National Security Act of 1947, which unified the military under a new Secretary of Defense, set up the CIA, created the modern Joint Chiefs of Staff, and established the National Security Council (“NSC”). Truman also set up the National Security Agency (NSA) to monitor  communications abroad. Truman’s vision was to create a civilian infrastructure strong enough to address the Soviet threat and rein in an errant military.

Both the Trumanite arm and the constitutional arm work really hard to maintain the fiction that the President is commander-in-chief. The reality is that the president only has the power to appoint 3,000-4,000 of the millions of federal employees nominally under his control. This means the Trumanite bureaucracy continues to operate pretty much under its own steam no matter which party is in office.

As Glennon describes it,

“President Obama could give an order wholly reversing U.S. national security policy, but he would not, because the likely adverse consequences would be prohibitive. Put differently, the question whether the President could institute a complete about-face supposes a top-down policy-making model. The illusion that presidents issue orders and that subordinates simply carry them out is nurtured in the public imagination by media reports of ‘Obama’s’ policies or decisions or initiatives, by the President’s own frequent references to “my” directives or personnel . . . But true top-down decisions that order fundamental policy shifts are rare.

The reality is that when the President issues an “order” to the Trumanites, the Trumanites themselves normally formulate the order. The Trumanites cannot be thought of as men who are merely doing their duty. They are the ones who determine their duty, as well as the duties of those beneath them. They are not merely following orders: they give the orders. They do that by ‘entangling’ the President… To avoid looking like a bystander or mere commentator, the President embraces these Trumanite policies, as does Congress, with the pretense that they are their own.’

Obama Forced to Agree to Drone Policy

As an example, Glennon quotes Vali Nasr’s* description of how the national security network strong armed Obama into expanding his drone policy:

When it came to drones there were four formidable unanimous voices in the Situation Room: the CIA, the Office of the Director of National Intelligence, the Pentagon, and the White House’s counterterrorism adviser, John Brennan.”

Defense Secretary Robert Gates, a holdover from the Bush administration, also strongly supported an increase in drone strikes. All five also suppressed any debate in national security meetings of the broader implications of this policy.

According to Nassr, it was the classic Henry Kissinger model: “You have three options, two of which are ridiculous, so you accept the one in the middle.”

Obama openly complained about the Trumanites only given him one option: “The military was “really cooking the thing in the direction that they wanted. They are not going to give me a choice.”

Obama Also Opposed Increasing Troop Levels in Afghanistan

Obama’s 2009 proposal to lower the military’s proposed troop levels in Afghanistan ran into the same unified opposition. According to Glennon, the Commander of U.S. and International Security Assistance Forces (“ISAF”) in Afghanistan (General Stanley McChrystal), the Commander of U.S. Central Command (General David Petraeus), the Chairman of the Joint Chiefs of Staff (Admiral Michael Mullen), and even Secretary of Defense Gates all threatened to resign over it.

As Glennon observes,

“No president has reserves deep enough to support a frontal assault on the National Security network. Under the best of circumstances, he can only attack its policies one by one, in flanking actions, and even then with no certainty of victory. Like other presidents in similar situations, Obama thus had little choice but to accede to the Pentagon’s longstanding requests for more troops” in Afghanistan.”

Clinton’s “Don’t Ask Don’t Tell” Fiasco

He reminds us of the uproar in the military and Congress when President Bill Clinton moved to end only one national security policy shortly after taking office—the ban on gays in the military. Forced to backtrack, Clinton ultimately enacted his “Don’t Ask, Don’t Tell” policy.

Glennon goes on to explore similar paralysis the President and Congress are experiencing in attempting to curtail spying by the NSA.

The final section of the article reviews possible options for reform and concludes the national security bureaucracy is too powerful (and has too much control over the media) to be reformed by constitutional means. Glennon believes that the only option for change is a bottom-up mobilization by the American people.

*Vali Nasr is dean of the Johns Hopkins School of Advanced International Studies. David E Sanger quotes him in Confront and Conceal: Obama’s Secret Wars and Secret Use of American Power.

Hundreds of Drone Operators Quit Air Force

predator drone“We didn’t even really know who we were firing at.”

The traumatic nature of their work is leading drone operators to quit the Air Force by the hundreds.

In the following video, former senior drone operator Brandon Bryant expresses deep regret for the six years he spent with the US drone program between 2005 and 2011. It especially bothered him that he was expected to fire on targets without being clear of their identities: “We didn’t even really know who we were firing at.”

Last November the human rights group Reprieve published a study indicating attempts to kill 41 alleged terrorists in Pakistan and Yemen resulted in more than 1100 civilian deaths.

photo credit: KAZVorpal via photopin cc

 

Also published in Veterans Today

 

Drone Nation

drones

Part 5 of Counter-intelligence: Shining a Light on Black Operations

The final episode of Counter-intelligence is dedicated to drone technology and Barack Obama’s virtual repeal of the Fifth Amendment. The Fifth Amendment of the Bill of Rights guarantees that “no person shall be deprived of life, liberty or property without due process of law.” Obama’s National Defense Authorization Act (NDAA) allows the government to detain individuals indefinitely without charge, trial or conviction. Obama has also granted himself the authority, via executive order, to arbitrarily execute civilians (including American citizens) without due process, evidence or accountability to Congress or the courts. Both overturn hundreds of years of common law preventing the rich and powerful from using government to attack their personal enemies.

Filmmaker Scott Noble reminds us that Obama deliberately leaked details of his weekly White House “kill list” meetings. Individuals are added to the kill lists, which are maintained by the CIA and a covert unit of the U.S. military called the Joint Special Operations Command (JSOC)*, following “determinations” that secret criteria are satisfied. Noble maintains the primary purpose of the leaks of the leak was to terrorize Americans into submission.

Death by Drone

Thus far, the only presidential assassinations we know of have been carried out by drones. “Drone Nation” highlights the cold impersonality of a technology that’s conveniently similar to video games teenager males are raised on. Thus it comes as no surprise that drone victims are dehumanized (they’re called “bug splats”) in the eyes of young drone operators who sit behind consoles thousands of miles away.

Nor that drone strikes typically target random groups of people, such as wedding parties. Drone technology has no capability of distinguishing between civilians and combatants. 98.5% of all the people killed by CIA drones are civilians – only 1.5% are so-called “high value targets.”

Insect-sized Drones

Even more frightening are the millions of dollars the Pentagon is shelling out for killer robot research, including hummingbird and insect sized drones that require no human operator.

By 2020 tens of thousands of drones will be flying in US skies.

The series ends with a moving tribute to all the whistleblowers who made the documentary Counter-intelligence possible.

*JSOC is covered in Part 1 of Counter-intelligence.

 

Counter-intelligence: Shining a Light on Black Operations
Scott Noble
Metanoia Films (2013)

 

photo credit: codepinkphoenix via photopin cc

 

Also posted at  Veterans Today

Farrakhan’s Views on Obama

Below is a fascinating excerpt from Part 8 of Louis Farrakhan’s lecture series The Time and What Must Be Done. Farrahkan is the present leader of the Nation of Islam (NOI), best known for its most famous member Malcolm X.

It’s been more than ten years since I heard Farrakhan speak. He has made remarkable progress from his overt antisemitism and talk of white people as blue-eyed devils. I still have a slight problem with the “666” symbolism of the year 2013, which he links with the “beasts” (America, England, Germany and France).

Otherwise his analysis is remarkably similar to that of white economist, journalist and former Reagan official Paul Craig Roberts. The NOI leader is highly critical of Obama’s murderous policies in Libya and Syria and his use of drones for targeted assassinations, as well as his apparent willingness to support an Israeli-inspired war with Iran. He also condemns the President’s destruction of American democracy. He describes the US as an oligarchy leading the American people into fascism.

The video is nearly two years old. Amazing how little US foreign policy has changed.

Reverend Billy vs Monsanto Robot Bee Drones

 robobee

from http://www.revbilly.com/

Below is a ritual Robobee exorcism Reverend Billy and the Church of Stop Shopping performed in the Harvard labs on May 25, 2014

The world is facing massive die-off of bee populations, thanks to heavy use of pesticides manufactured by Bayer and Monsanto.

The loss of bee populations severely threatens global food production (70-80% of plant and animal foodstuffs depend on bee pollination).

In response, the EU has banned pesticides found to be harmful to bees.

In contrast the US Department of Agriculture (USDA) has declined to enact a similar ban in the US, largely due to massive congressional lobbying by Monsanto.

Instead Harvard University is researching the creation of tiny drone bees – called Robobees – to replace the bees killed off by pesticides. Unbelievable, isn’t it – the lengths scientists and governments will go to to avoid doing the right thing.

Support the work of Reverend Billy and the Church of Stop Shopping at http://www.revbilly.com/

Spying on Americans: the Ugly History

hoover

The Origins of the US Police State

While the majority of Americans were stunned and outraged at Edward Snowden’s revelations that the government was secretly monitoring their phone calls and emails, the US government has been systematically spying on law abiding citizens for nearly 100 years. In July 2013, University of Wisconsin professor Alfred McCoy, one of America’s foremost experts on CIA narcotics trafficking, laid out an elegant history of government domestic spying in Tomgram: Obama’s Expanding Surveillance Universe. It should be required reading for every high school graduate. Below are some highlights:

1898 -1901 US Occupation of the Philippines

The US Army first developed the capacity to spy and keep records on civilians when they occupied the Philippines (following the Spanish American War) in 1898. n when they occupied the Philippines following the Spanish American War. The local population already had a large, well-organized resistance movement which had been battling Spain for independence. In 1901, as director of the army’s first field intelligence unit, Captain Ralph Van Deman, compiled detailed personal and financial records on thousands of Filipino leaders.

1917 – 1921 World War I and the Palmer Raids

After the US entered World War I in 1917, President Woodrow Wilson engaged Van Deman to create the US Army’s Military Intelligence Division to spy on US civilians. Van Deman, in turn, enlisted a patriotic vigilante group called the American Protective League to assist in collecting a million pages of surveillance reports on Americans of German ancestry (like my grandfather and great grandfather, who was forced to flee to South America).

After the war ended in 1918 they joined with the Bureau of Investigation (renamed the FBI in 1935) to engage in strike breaking in the Northeast and Pacific Northwest and round up and deport European labor activists.

In 1921, incoming president Warren Harding condemned Wilson’s oppressive secret police apparatus and forced the Army and FBI to cut their ties with vigilante groups. Although Van Deman was forced into retirement, he and his wife continued to compile files on 250,000 so-called subversives.

1940 – 1945 World War II

In 1940, Hoover made use of Van Deman’s files and a network of 300,000 informants to carry out illegal FBI wiretaps, break-ins, and mail intercepts against political dissidents – based on allegations, which were never substantiated, that they posed a threat against wartime defense plants were never substantiated.

1960-74 Vietnam War and COINTELPRO

From 1960-74, Hoover expanded this operation, which he renamed COINTELPRO. As well as spying on activists, this operation also subjected them to extensive personal harassment. According to the senateChurch Committee investigating  COINTELPRO, Hoover’s vicious tactics included “anonymous attempts to break up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might results in deaths.” As most activists over fifty can tell you, COINTELPRO never ended. I write about my personal encounter with the 1980s version of COINTELPRO in my 2010 memoir The Most Revolutionary Act: Memoir of an American Refugee.

In 1974, New York Times reporter Seymour Hersh revealed that the CIA, which is forbidden under federal law to operate on US territory, was also engaged in illegal surveillance of antiwar activists under a program known as Operation Chaos. Following his election in 1978, President Jimmy Carter pushed for enactment of the Foreign Intelligence Surveillance Act (FISA). This made government wiretaps illegal unless they were approved by a special FISA court.

2003 – 2008 US Occupation of Afghanistan and Iraq (under Bush)

By the time the US attacked Afghanistan and Iraq in 2003-2003, the intelligence security state had a vast array of new spying technologies (including electronic surveillance, biometric identification, and spy drones) at their disposal. In an attempt to bring the Iraqi resistance under control, General McChrystal ordered the collection of 3 million Iraqi fingerprints and iris scans.

Meanwhile Bush attempted to resurrect Hoover’s old vigilante networks via Operation Tips, which was blocked by major opposition from Congress, civil libertarians, and the media. A parallel initiative called Total Information Awareness, which would have compiled electronic files on millions of Americans, was also banned by Congress.

Despite these setbacks, Bush’s defiance of FISA by ordering the NSA to commence collecting email and phone records of American civilians (exposed by the New York Times in 2005) was retroactively ratified by Congress in 2007.

2009 – present US Occupation of Afghanistan, Iraq, Pakistan, Yemen, Pakistan, Syria, and Somalia

Obama substantially expanded NSA spying by collaborating with British intelligence to tap into trans-Atlantic cables carrying phone and email traffic and authorizing NSA spying on residents in NATO ally countries Germany, France, and Italy.

Between 2006-10 the US launched the planet’s first cyberwar. In 2010 Obama ordered cyberattacks (Stuxnet) against Iran’s nuclear facility.

Obama’s Vision for Future Surveillance

According to McCoy, since 2012 Obama has been cutting conventional armaments and investing billions in global information control and space warfare technology. New programs include a National Geospatial-Intelligence Agency with 6,000 employees coordinating surveillance data from predator drones, Reapers, U-2 spy planes, Global Hawks, X-37B space drones, Google Earth, Space Surveillance Telescopes, and orbiting satellite. Alongside their surveillance capabilities, new generation spy satellites will have the capability of enveloping the Earth in an electronic grid capable of pulverizing suspected terrorists or entire armies.

Hear Jeff Blankfort interview McCoy about his Tomdispatch article at Radio 4

photo credit: KAZVorpal via photopin cc

Reposted from Veterans Today