• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • How America’s National Security Apparatus — in Partnership With Big Corporations — Cracked Down on Dissent A new report is an eye-opening look into how the U.S. counter-terror apparatus was used to track the Occupy movement.

    Counter-terror police officers collaborated with corporate entities to combat protests. Undercover police officers monitored and tracked the Occupy movement. A right-wing corporate-backed group hired a police officer to help protect a conference. These are some of the details revealed in a new report published by the Center for Media and Democracy’s Beau Hodai, along with DBA Press. The revelations are based on government documents the group obtained.

    The report, titled “Dissent or Terror: How the Nation’s Counter Terrorism Apparatus, In Partnership With Corporate America, Turned on Occupy Wall Street,” is an eye-opening look into how the U.S. counter-terror apparatus was used to track the Occupy movement in 2011 and 2012 and also help protect the business entities targeted by the movement. The report specifically looks at the activities of “fusion centers,” or law enforcement entities created after 9/11 that transform local police forces into counter-terror units in partnership with federal agencies like the Department of Homeland Security. The fusion centers devoted a lot of time–to the point of “obsession,” the report notes–to monitoring the Occupy movement, particularly for any “threats” to public safety or health and to whether there were “extremists” involved in the movement.

    The documents obtained for the report from government agencies reveal “a grim mosaic of ‘counter-terrorism’ agency operations and attitudes toward activists and other socially/politically-engaged citizens over the course of 2011 and 2012,” writes Hodai. He adds that these heavily-funded agencies indisputably view Occupy activists as “terrorist” threats. Additionally, Hodai writes that “this view of activists, and attendant activist monitoring/suppression, has been carried out on behalf of, and in cooperation with, some of the nation’s largest financial and corporate interests.”

    Much of the report hones in on the Occupy Phoenix branch of the movement and Arizona counter-terrorism agents monitoring, tracking and cracking down on the protests.

    For instance, when JP Morgan Chase CEO Jamie Dimon was planning on coming to Phoenix in October 2011, a “counter-terrorism” detective employed by the Phoenix Police Department’s Homeland Security Bureau exchanged information on potential protests with a JP Morgan Chase security manager. The detective, Jennifer O’Neill, received information on Dimon’s travel plans, and then shared information about Occupy Phoenix. O’Neill said that she and another officer had tracked the online activities of Occupy protesters to find out if they were planning to protest Dimon. No plans for protest were discovered by O’Neill, who also works with the Arizona Counter Terrorism Information Center, otherwise known as the Arizona fusion center.

    Another similar example of how corporate entities were helped by counter-terrorism units of police forces also occurred in October 2011. Then, businesses–including banks–received alerts authored by the Arizona fusion center about planned protest activities. Similar alerts to banks were given in the run-up to the November 5 day of action labeled “Bank Transfer Day,” which encouraged people to move their money from corporate banks to more local financial institutions. The Federal Bureau of Investigation also engaged in similar activity, according to the report. “The bureau had been in the business of alerting banks (and related entities) tothe planned protest activity of OWS groups as early as August of 2011.”

    The extent of law enforcement-corporate cooperation has also been taken a step further by the practice of corporations or right-wing corporate backed groups hiring officers for pay to police protests.

    In late November-early December 2011, the largest Occupy Phoenix action took place outside of a conference held by the American Legislative Exchange Council (ALEC), a corporate-funded group that brings together right-wing lobbyist groups and conservative politicians to push model legislation in state legislatures. The protest was marred by police violence, with officers deploying pepper spray and pepper ball projectiles on activists and arresting 5. While the police portrayed the action as the work of violent anarchists, Hodai writes that this narrative of events had little grounding in reality.

    Hodai reveals that the “tactical response unit” of officers working at the action was under the direction of Phoenix Police Department Sgt. Eric Harkins. What makes this noteworthy is that Harkins was “actually off-duty, earning $35 per hour as a private security guard employed by ALEC.” ALEC also “hired 49 active duty and 9 retired PPD officers to act as private security during the conference.” ALEC also employed off-duty police officers from Charlotte Mecklenburg Police Department during another ALEC summit in May 2012.

    The Center for Media and Democracy report also provides details on how police officers tracked and went undercover to monitor the Occupy movement. The report focuses on an undercover police officer who went by the name of “Saul DeLara,” who presented himself as a homeless Mexican activist. “DeLara” went to Occupy meetings and then reported back on their contents to the police.

    The revelations are confirmation that, as the Center for Media and Democracy noted in a press release,”the nation’s post-September 11, 2001 counter terrorism apparatus has been applied to politically engaged citizens exercising their Constitutionally-protected First Amendment rights.”

    May 21, 2013
    AlterNet / By Alex Kane

    Find this story at 21 May 2013

     

    SPYING ON AMERICANS: Obama’s Backdoor “Cybersecurity” Wiretap Bill Threatens Political and Private Rights; Spying on Social Media

    Under the guise of “cybersecurity,” the new all-purpose bogeyman to increase the secret state’s already-formidable reach, the Obama administration and their congressional allies are crafting legislation that will open new backdoors for even more intrusive government surveillance: portals into our lives that will never be shut.

    As Antifascist Calling has frequently warned, with the endless “War on Terror” as a backdrop the federal government, most notably the 16 agencies that comprise the so-called “Intelligence Community” (IC), have been constructing vast centralized databases that scoop-up and store all things digital–from financial and medical records to the totality of our electronic communications online–and do so without benefit of a warrant or probable cause.

    The shredding of constitutional protections afforded by the Fourth Amendment, granted to the Executive Branch by congressional passage of the Authorization for Use of Military Force (AUMF) after the 9/11 attacks, followed shortly thereafter by the oxymoronic USA Patriot Act set the stage for today’s depredations.

    Under provisions of multiple bills under consideration by the House and Senate, federal officials will be given broad authority over private networks that will almost certainly hand security officials wide latitude over what is euphemistically called “information-sharing” amongst corporate and government securocrats.

    As The Washington Post reported in February, the National Security Agency “has pushed repeatedly over the past year to expand its role in protecting private-sector computer networks from cyberattacks” but has allegedly “been rebuffed by the White House, largely because of privacy concerns.”

    “The most contentious issue,” Post reporter Ellen Nakashima wrote, “was a legislative proposal last year that would have required hundreds of companies that provide such critical services as electricity generation to allow their Internet traffic to be continuously scanned using computer threat data provided by the spy agency. The companies would have been expected to turn over evidence of potential cyberattacks to the government.”

    Both the White House and Justice Department have argued, according to the Post, that the “proposal would permit unprecedented government monitoring of routine civilian Internet activity.”

    National Security Agency chief General Keith Alexander, the dual-hatted commander of NSA and U.S. Cyber Command (USCYBERCOM), the Pentagon satrapy that wages offensive cyberwar, was warned to “restrain his public comments after speeches in which he argued that more expansive legal authority was necessary to defend the nation against cyberattacks.”

    While we can take White House “objections” with a proverbial grain of salt, they do reveal however that NSA, the largest and most well-funded of the secret state’s intel shops will use their formidable surveillance assets to increase their power while undermining civilian control over the military in cahoots with shadowy security corporations who do their bidding. (Readers are well-advised to peruse The Surveillance Catalog posted by The Wall Street Journal as part of their excellent What They Know series for insight into the burgeoning Surveillance-Industrial Complex).

    As investigative journalist James Bamford pointed out recently in Wired Magazine, “the exponential growth in the amount of intelligence data being produced every day by the eavesdropping sensors of the NSA and other intelligence agencies” is “truly staggering.”

    In a follow-up piece for Wired, Bamford informed us that when questioned by Congress, Alexander stonewalled a congressional subcommittee when asked whether NSA “has the capability of monitoring the communications of Americans, he never denies it–he simply says, time and again, that NSA can’t do it ‘in the United States.’ In other words it can monitor those communications from satellites in space, undersea cables, or from one of its partner countries, such as Canada or Britain, all of which it has done in the past.”

    Call it Echelon on steroids, the massive, secret surveillance program first exposed by journalists Duncan Campbell and Nicky Hager.

    And with the eavesdropping agency angling for increased authority to monitor the electronic communications of Americans, the latest front in the secret state’s ongoing war against privacy is “cybersecurity” and “infrastructure protection.”

    ‘Information Sharing’ or Blanket Surveillance?

    Among the four bills currently competing for attention, the most egregious threat to civil liberties is the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA, H.R. 3523).

    Introduced by Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD), the bill amends the National Security Act of 1947, adding language concerning so-called “cyber threat intelligence and information sharing.”

    “Cyber threat intelligence” is described as “information in the possession of an element of the intelligence community directly pertaining to a vulnerability of, or threat to, a system or network of a government or private entity, including information pertaining to the protection of a system or network from: (1) efforts to degrade, disrupt, or destroy such system or network; or (2) theft or misappropriation of private or government information, intellectual property, or personally identifiable information.”

    In keeping with other “openness” mandates of our Transparency Administration™ the Rogers bill will require the Director of National Intelligence (DNI) to establish procedures that permit IC elements to “share cyber threat intelligence with private-sector entities, and (2) encourage the sharing of such intelligence.”

    These measures however, will not protect the public at large from attacks by groups of organized cyber criminals since such intelligence is only “shared with certified entities or a person with an appropriate security clearance,” gatekeepers empowered by the state who ensure that access to information is “consistent with the need to protect U.S. national security, and used in a manner that protects such intelligence from unauthorized disclosure.”

    In other words, should “cleared” cyber spooks be directed by their corporate or government masters to install state-approved malware on private networks as we discovered last year as a result of the HBGary hack by Anonymous, it would be a crime punishable by years in a federal gulag if official lawbreaking were disclosed.

    The bill authorizes “a cybersecurity provider (a non-governmental entity that provides goods or services intended to be used for cybersecurity purposes),” i.e., an outsourced contractor from any one of thousands of spooky “cybersecurity” firms, to use “cybersecurity systems to identify and obtain cyber threat information in order to protect the rights and property of the protected entity; and share cyber threat information with any other entity designated by the protected entity, including the federal government.”

    Furthermore, the legislation aims to regulate “the use and protection of shared information, including prohibiting the use of such information to gain a competitive advantage and, if shared with the federal government, exempts such information from public disclosure.”

    And should the public object to the government or private entities trolling through their personal data in the interest of “keeping us safe” well, there’s an app for that too! The bill “prohibits a civil or criminal cause of action against a protected entity, a self-protected entity (an entity that provides goods or services for cybersecurity purposes to itself), or a cybersecurity provider acting in good faith under the above circumstances.”

    One no longer need wait until constitutional violations are uncovered, the Rogers bill comes with a get-out-of-jail-free card already in place for state-approved scofflaws.

    Additionally, the bill also “preempts any state statute that restricts or otherwise regulates an activity authorized by the Act.” In other words, in states like California where residents have “an inalienable right to privacy” under Article 1, Section 1 of the State Constitution, the Rogers bill would be abolish that right and effectively “legalize” unaccountable snooping by the federal government or other “self-protected,” i.e., private entities deputized to do so by the secret state.

    Social Media Spying

    How would this play out in the real world? As Government Computer News reported, hyped-up threats of an impending “cyber-armageddon” have spawned a host of new actors constellating America’s Surveillance-Industrial Complex: the social media analyst.

    “Companies and government agencies alike are using tools to sweep the Internet–blogs, websites, and social media such as Facebook and Twitter feeds–to find out what people are saying about, well, just about anything.”

    Indeed, as researchers Jerry Brito and Tate Watkins pointed out last year in Loving the Cyber Bomb?, “An industrial complex reminiscent of the Cold War’s may be emerging in cybersecurity today.”

    Brito and Watkins averred that “the military-industrial complex was born out of exaggerated Soviet threats, a defense industry closely allied with the military and Department of Defense, and politicians striving to bring pork and jobs home to constituents. A similar cyber-industrial complex may be emerging today, and its players call for government involvement that may be superfluous and definitely allows for rent seeking and pork barreling.”

    Enter social media analysis and the private firms out to make a buck–at our expense.

    “Not surprisingly,” GCN’s Patrick Marshall wrote, “intelligence agencies have already been looking at social media as a source of information. The Homeland Security Department has been analyzing traffic on social networks for at least the past three years.”

    While DHS claims it does not routinely monitor Facebook or Twitter, and only responds when it receives a “tip,” such assertions are demonstrably false.

    Ginger McCall, the director of the Electronic Electronic Privacy Information Center’s Open Government Program told GCN that the department is “explicitly monitoring for criticism of the government, for reports that reflect adversely on the agency, for public reaction to policy proposals.”

    But DHS isn’t the only agency monitoring social media sites such as Facebook and Google+.

    As Antifascist Calling reported back in 2009, according to New Scientist the National Security Agency “is funding research into the mass harvesting of the information that people post about themselves on social networks.”

    Not to be outdone, the CIA’s venture capital investment arm, In-Q-Tel, has poured millions of dollars into Visible Technologies, a Bellevue, Washington-based firm specializing in “integrated marketing, social servicing, digital experience management, and consumer intelligence.”

    According to In-Q-Tel “Visible Technologies has developed TruCast®, which takes an innovative and holistic approach to social media management. TruCast has been architected as an enterprise-level solution that provides the ability to track, analyze, and respond to social media from a single, Web-based platform.”

    Along similar lines, the CIA has heavily invested in Recorded Future, a firm which “extracts time and event information from the web. The company offers users new ways to analyze the past, present, and the predicted future.”

    The firm’s defense and intelligence analytics division promises to “help analysts understand trends in big data, and foresee what may happen in the future. Groundbreaking algorithms extract temporal and predictive signals from unstructured text. Recorded Future organizes this information, delineates results over interactive timelines, visualizes past trends, and maps future events–all while providing traceability back to sources. From OSINT to classified data, Recorded Future offers innovative, massively scalable solutions.”

    As Government Computer News pointed out, in January the FBI “put out a request for vendors to provide information about available technologies for monitoring and analyzing social media.” Accordingly, the Bureau is seeking the ability to:

    • Detect specific, credible threats or monitor adversarial situations.

    • Geospatially locate bad actors or groups and analyze their movements, vulnerabilities, limitations, and possible adverse actions.

    • Predict likely developments in the situation or future actions taken by bad actors (by conducting trend, pattern, association, and timeline analysis).

    • Detect instances of deception in intent or action by bad actors for the explicit purpose of misleading law enforcement.

    • Develop domain assessments for the area of interest (more so for routine scenarios and special events).

    So much for privacy in our Orwellian New World Order!

    Backdoor Official Secrets Act

    Social media “harvesting” by private firms hot-wired into the state’s Surveillance-Industrial Complex will be protected from challenges under provisions of CISPA.

    As the Electronic Frontier Foundation (EFF) pointed out, “a company that protects itself or other companies against ‘cybersecurity threats’ can ‘use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property’ of the company under threat. But because ‘us[ing] cybersecurity systems’ is incredibly vague, it could be interpreted to mean monitoring email, filtering content, or even blocking access to sites. A company acting on a ‘cybersecurity threat’ would be able to bypass all existing laws, including laws prohibiting telcos from routinely monitoring communications, so long as it acted in ‘good faith’.”

    And as EFF’s Rainey Reitman and Lee Tien aver, the “broad language” concerning what constitutes a cybersecurity “threat,” is an invitation for the secret state and their private “partners” to include “theft or misappropriation of private or government information, intellectual property, or personally identifiable information.”

    “Yes,” Reitman and Tien wrote, “intellectual property. It’s a little piece of SOPA wrapped up in a bill that’s supposedly designed to facilitate detection of and defense against cybersecurity threats. The language is so vague that an ISP could use it to monitor communications of subscribers for potential infringement of intellectual property. An ISP could even interpret this bill as allowing them to block accounts believed to be infringing, block access to websites like The Pirate Bay believed to carry infringing content, or take other measures provided they claimed it was motivated by cybersecurity concerns.”

    More troubling, “the government and Internet companies could use this language to block sites like WikiLeaks and NewYorkTimes.com, both of which have published classified information.”

    Should CISPA pass muster it could serve as the basis for establishing an American “Official Secrets Act.” In the United Kingdom, the Act has been used against whistleblowers to prohibit disclosure of government crimes. But it does more than that. The state can also issue restrictive “D-Notices” that “advise” editors not to publish material on subjects deemed sensitive to the “national security.”

    EFF warns that “online publishers like WikiLeaks are currently afforded protection under the First Amendment; receiving and publishing classified documents from a whistleblower is a common journalistic practice. While there’s uncertainty about whether the Espionage Act could be brought to bear against WikiLeaks, it is difficult to imagine a situation where the Espionage Act would apply to WikiLeaks without equally applying to the New York Times, the Washington Post, and in fact everyone who reads about the cablegate releases.”

    And with the Obama regime’s crusade to prosecute and punish whistleblowers, as the recent indictment of former CIA officer John Kiriakou for alleged violations of the Espionage Act and the Intelligence Identities Protection Act for disclosing information on the CIA’s torture programs, we have yet another sterling example of administration “transparency”! While Kiriakou faces 30 years in prison, the former head of the CIA’s Directorate of Operations, Jose A. Rodriguez Jr., who was responsible for the destruction of 92 torture videotapes held by the Agency, was not charged by the government and was given a free pass by the Justice Department.

    As the World Socialist Web Site points out: “More fundamentally, the prosecution of Kiriakou is part of a policy of state secrecy and repression that pervades the US government under Obama, who came into office promising ‘the most transparent administration in history.’”

    Critic Bill Van Auken observed that Kiriakou’s prosecution “marks the sixth government whistleblower to be charged by the Obama administration under the Espionage Act, twice as many such prosecutions as have been brought by all preceding administrations combined. Prominent among them is Private Bradley Manning, who is alleged to have leaked documents exposing US war crimes to WikiLeaks. He has been held under conditions tantamount to torture and faces a possible death penalty.”

    “In all of these cases,” the World Socialist Web Site noted, “the World War I-era Espionage Act is being used to punish not spying on behalf of a foreign government, but exposing the US government’s own crimes to the American people. The utter lawlessness of US foreign policy goes hand in hand with the collapse of democracy at home.”

    The current crop of “cybersecurity” bills are sure to hasten that collapse.

    Under Rogers’ legislation, “the government would have new, powerful tools to go after WikiLeaks,” or anyone else who challenges the lies of the U.S. government by publishing classified information that contradicts the dominant narrative.

    By Tom Burghardt
    Global Research, April 10, 2012

    Find this story at 10 April 2013

    Copyright © 2005-2013 GlobalResearch.ca

    US: Silencing news sources?

    After the seizure of AP’s phone records, we ask if the US is still the land of the free for journalists and sources.

    On May 10th, the Associated Press news agency received an email from the US Department of Justice saying that records of more than 20 phone lines assigned to its reporters had been secretly seized as part of an investigation into a government leak.
    The government claimed it was a matter of national security, while the AP called it an unprecedented intrusion into its newsgathering operations. But should the journalistic community be so surprised? With the Obama White House’s track record on whistleblowers and WikiLeaks, the move to spy on AP seems consistent with an administration more committed to secrecy than ever before.
    Is the United States still the land of the free for journalists and their sources? In this week’s News Divide we speak to Laura Malone, legal counsel for the Associated Press; Jeremy Scahill, author of Dirty Wars; The World is a Battlefield; the investigative reporter Dana Priest of the Washington Post; and Ben Wizner from the American Civil Liberties Union.
    This week’s Newsbytes: After two years in hiding, a prominent Bahraini blogger reappears in the UK; Globovision, a leading opposition outlet in Venezuela, is sold to businessmen allegedly friendly with the government; and Islamabad is missing one of the most prominent Western journalists based there – the New York Times’ Declan Walsh was ordered to leave the country before the election.
    One of the lesser-known consequences of the US-led ‘war on terror’ has been a wave of anti-terrorism legislation in other countries. One of them is Ethiopia. It is not a country known for its freedom of the press and, with ongoing internal conflicts with separatist groups, and the powers that be keeping a wary eye on the nearby Arab Spring, the government in Addis Ababa has been cracking down on the media.
    It is doing so with an anti-terror law passed in 2009, which has led to the sentencing of 11 journalists, sent dozens of reporters into exile and has forced countless others to practice self-censorship. The Listening Post’s Nic Muirhead reports on the law that blurs the line between journalism and terrorism.
    Unless you have been in orbit or beyond, you have probably already seen our Video of the Week – it’s astronaut Chris Hadfield and his version of David Bowie’s Space Oddity, recorded while on board the International Space Station. It has been watched online and on TV millions of times over, but it is so good that we wanted to run it anyway.

    Listening Post Last Modified: 18 May 2013 08:09

    Find this story at 18 May 2013

    Is the Government Spying on Reporters; More Often Than We Think?

    There’s evidence that the Justice Department’s seizure of Associated Press phone records is far from unprecedented.

    The Justice Department’s seizure of call logs [1] related to phone lines used by dozens of Associated Press reporters has provoked a flurry of bipartisan criticism, most of which has cast the decision as a disturbing departure from the norm. AP head Gary Pruitt condemned the decision, part of an investigation into leaks of classified information, as a “massive and unprecedented intrusion.” Yet there’s plenty of circumstantial evidence suggesting the seizure may not be unprecedented—just rarely disclosed.

    The Justice Department is supposed to follow special rules [2] when it seeks the phone records of reporters, in recognition that such snooping conflicts with First Amendment values. As Pruitt complained in an angry letter to Attorney General Eric Holder, those logs provided the government a “road map” of the stories his reporters were investigating, and there is evidence that such seizures deter [3] anonymous sources from speaking to the press—whether they’re discussing classified programs or merely facts that embarrass the government.

    Federal regulations require that the attorney general personally approve such a move, ensure the request is narrow and necessary, and notify the news organization about the request—in advance whenever possible. In this case, however, the Justice Department seems to have used an indiscriminate vacuum-cleaner [4] approach—seeking information (from phone companies) about a wide range of phone numbers used by AP reporters—and it only notified AP after the fact.

    It wouldn’t be surprising if there were more cases like this we’ve never heard about. Here’s why: The Justice Department’s rules only say the media must be informed about “subpoenas” for “telephone toll records.” The FBI’s operations guidelines [5] interprets those rules quite literally, making clear the requirement “concerns only grand jury subpoenas.” That is, these rules don’t apply to National Security Letters [6], which are secret demands for information used by the FBI that don’t require judicial approval. The narrow FBI interpretation also doesn’t cover administrative subpoenas, which are issued by federal agencies without prior judicial review. Last year, the FBI issued NSLs for the communications and financial records of more than 6,000 Americans—and the number has been far higher in previous years. The procedures that do apply to those tools have been redacted from publicly available versions of the FBI guidelines. Thus, it’s no shocker the AP seizure would seem like an “unprecedented intrusion” if the government doesn’t think it has to tell us about the precedents. And there’s no telling if the Justice Department rules (and the FBI’s interpretation) allow the feds to seize without warning other types of electronic communications records that could reveal a journalist’s e-mail, chat, or Web browsing activity.

    Is it paranoid to fear the Justice Department and the FBI are sidestepping the rules? Consider a case first reported in 2008 [7], and discussed at length in a damning (but heavily redacted) 2010 report [8] from the Justice Department’s Office of the Inspector General. In this instance, the FBI obtained nearly two years of phone records for lines belonging to Washington Post and New York Times bureaus and reporters—even though the FBI had initially requested records covering only seven months. In what the OIG called a “serious abuse of the FBI’s authority to obtain information,” agents seized these records under false pretenses, “without any legal process or Attorney General approval.” And these records remained in the FBI’s database for over three years before the OIG or the press found out [7].

    It gets worse. The OIG report noted that the FBI had made “community of interest” requests to phone carriers; these requests sweep in not only the target’s call records, but those of people the target has spoken with—which can include reporters. Such requests can provide investigators an incredibly revealing portrait of entire social networks. Yet the OIG found that agents used boilerplate requests for information from the carriers; some claimed they submitted the requests without actually knowing exactly what “community of interest” meant, and even when they did it didn’t necessarily occur to them that they were likely to obtain reporter records through such requests. In other words, FBI agents often made these requests without fully understanding what they were requesting.

    By Julian Sanchez | Fri May. 17, 2013 1:01 PM PDT

    Find this story at 17 May 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    AP records seizure just latest step in sweeping U.S. leak probe

    WASHINGTON (Reuters) – The Justice Department’s controversial decision to seize phone records of Associated Press journalists was just one element in a sweeping U.S. government investigation into media leaks about a Yemen-based plot to bomb a U.S. airliner, government officials said on Wednesday.

    The search for who leaked the information is being led by the U.S. Attorney’s Office in Washington and has involved extensive FBI interviews of personnel at the Justice Department, U.S. intelligence agencies, the White House’s National Security staff and the FBI itself.

    The interviews have been lengthy and thorough, said people who have been questioned in the investigation, but requested anonymity. Two of those interviewed said leak inquiries were always aggressive and that being questioned is a wearing and unpleasant experience.

    The investigation, which a law enforcement official has said was prompted by a May 7, 2012, AP story about the operation to foil the Yemen plot, appears to be ongoing. Some potential witnesses have been advised they are likely to be interviewed in the next two or three weeks.

    Officials in the office of Ronald Machen, the U.S. attorney for the District of Columbia, could not immediately be reached for comment.

    Attorney General Eric Holder, who recused himself from involvement in the case, largely sidestepped questions from angry lawmakers on Wednesday about his department’s secret seizure of AP records, which the news agency revealed on Monday.

    The seizure, denounced by critics as a gross intrusion into freedom of the press, has created an uproar in Washington and led to questions about how the Obama administration is balancing the need for national security with privacy rights.

    There are signs the administration’s efforts to find the alleged leaker were unproductive – at least before the Justice Department seized two months of records of phone calls by the AP and its journalists.

    “Seeking toll records associated with media organizations is undertaken only after all other reasonable alternative investigative steps have been taken,” Holder’s deputy, James Cole, said in a letter on Tuesday to AP President Gary Pruitt, who has protested the government’s action.

    In that letter, Cole revealed the Justice Department had conducted more than 550 interviews and reviewed tens of thousands of documents before subpoenaing phone company records of AP calls.

    Reuters was one of nearly 50 news organizations that signed a letter to Holder on Tuesday complaining about the AP phone record seizures.

    ‘BREATHTAKING SCOPE’

    Floyd Abrams, a prominent First Amendment and media attorney, said, “The breathtaking scope of these subpoenas served on the telephone companies might suggest that after all this time, they have no idea who they’re looking for.”

    Another possibility is “they are touching all bases” because they suspect someone but are not sure, said Abrams, a partner at Cahill Gordon and Reindel LLP in New York. He said it was difficult for an outsider to know.

    “I don’t think that there is any doubt that this is a serious investigation that they have spent a lot of time on and that they feel deeply about,” Abrams said. Justice’s targeting of a large number of phone lines and the AP journalists who use them “taken together, certainly makes it look like the largest, most intrusive action by the government vis-a-vis the press that I can remember.”

    Holder has called the leak “very, very serious” and said it “put the American people at risk.” He did not provide details.

    The AP has reported that it delayed reporting the story of how the United States had foiled a plot by a suicide bomber affiliated with Yemen-based Al Qaeda in the Arabian Peninsula, or AQAP, at the request of government officials, who said it would jeopardize national security. Once U.S. officials said those concerns were allayed, the AP said, it disclosed the plot.

    A law enforcement official said on Wednesday that because officials were so concerned and shocked by the leak, they opened an investigation into how the AP found out about the spy operation even before the news agency ran its initial story. The AP had contacted the government and asked for comment several days before the story was published.

    The AP’s first story reported the CIA had “thwarted an ambitious plot” by AQAP to attack an airline with a newly designed underwear bomb and said the FBI had acquired the bomb. The AP reported it did not know what had happened to the alleged bomber.

    A few hours after the story was published, John Brennan, then chief White House counterterrorism adviser and now director of the CIA, held a conference call with former counterterrorism officials who frequently appear as TV commentators. Brennan said the plot was never a threat to the U.S. public or air safety because Washington had “inside control” over it.

    (Editing by Warren Strobel and Peter Cooney)
    Wed, May 15 2013

    By Mark Hosenball and Tabassum Zakaria

    Find this story at 15 May 2013

    © Thomson Reuters 2011. All rights reserved.

    Exclusive: Did White House “spin” tip a covert op?

    WASHINGTON (Reuters) – White House efforts to soft-pedal the danger from a new “underwear bomb” plot emanating from Yemen may have inadvertently broken the news they needed most to contain.

    At about 5:45 p.m. EDT on Monday, May 7, just before the evening newscasts, John Brennan, President Barack Obama’s top White House adviser on counter-terrorism, held a small, private teleconference to brief former counter-terrorism advisers who have become frequent commentators on TV news shows.

    According to five people familiar with the call, Brennan stressed that the plot was never a threat to the U.S. public or air safety because Washington had “inside control” over it.

    Brennan’s comment appears unintentionally to have helped lead to disclosure of the secret at the heart of a joint U.S.-British-Saudi undercover counter-terrorism operation.

    A few minutes after Brennan’s teleconference, on ABC’s World News Tonight, Richard Clarke, former chief of counter-terrorism in the Clinton White House and a participant on the Brennan call, said the underwear bomb plot “never came close because they had insider information, insider control.”

    A few hours later, Clarke, who is a regular consultant to the network, concluded on ABC’s Nightline that there was a Western spy or double-agent in on the plot: “The U.S. government is saying it never came close because they had insider information, insider control, which implies that they had somebody on the inside who wasn’t going to let it happen.”

    DOUBLE AGENT

    The next day’s headlines were filled with news of a U.S. spy planted inside Yemen-based Al Qaeda in the Arabian Peninsula (AQAP), who had acquired the latest, non-metallic model of the underwear bomb and handed it over to U.S. authorities.

    At stake was an operation that could not have been more sensitive — the successful penetration by Western spies of AQAP, al Qaeda’s most creative and lethal affiliate. As a result of leaks, the undercover operation had to be shut down.

    The initial story of the foiling of an underwear-bomb plot was broken by the Associated Press.

    According to National Security Council spokesman Tommy Vietor, due to its sensitivity, the AP initially agreed to a White House request to delay publication of the story for several days.

    But according to three government officials, a final deal on timing of publication fell apart over the AP’s insistence that no U.S. official would respond to the story for one clear hour after its release.

    When the administration rejected that demand as “untenable,” two officials said, the AP said it was going public with the story. At that point, Brennan was immediately called out of a meeting to take charge of damage control.

    Relevant agencies were instructed to prepare public statements and urged to notify Congressional oversight panels. Brennan then started the teleconference with potential TV commentators.

    White House officials and others on the call insist that Brennan disclosed no classified information during that conference call and chose his words carefully to avoid doing so.

    The AP denies any quid pro quo was requested by them or rejected by the White House. “At no point did AP offer or propose a deal with regard to this story,” said AP spokesman Paul Colford.

    As for his appearance on ABC, Richard Clarke acknowledges he made a logical “leap” when he said that “inside control” meant “there was human inside control rather than anything else I could imagine.” But he adds that over the course of a week, ABC “took extraordinary measures … to make sure” that nothing it was planning to broadcast would damage ongoing counter-terrorism operations.

    PREMATURE SHUTDOWN

    As a result of the news leaks, however, U.S. and allied officials told Reuters that they were forced to end an operation which they hoped could have continued for weeks or longer.

    Several days after the first leaks, counter-terrorism sources confirmed to Reuters that a central role in the operation had been played by MI-5 and MI-6, Britain’s ultra-secretive domestic and foreign intelligence services, whose relationship with their American counterparts has been periodically strained by concern about leaks.

    These sources acknowledged that British authorities were deeply distressed that anything at all had leaked out about the operation.

    The White House places the blame squarely on AP, calling the claim that Brennan contributed to a leak “ridiculous.”

    “It is well known that we use a range of intelligence capabilities to penetrate and monitor terrorist groups,” according to an official statement from the White House national security staff.

    (Reporting By Mark Hosenball; Editing by Warren Strobel and Jim Loney)

    Fri, May 18 2012

    By Mark Hosenball

    Find this story at 18 May 2013

    © Thomson Reuters 2011

    Here’s the story the AP suspects led to sweeping Justice Dept. subpoena

    The Department of Justice secretly obtained Associated Press phone records from 20 different phone lines over two months, according to the news agency. The subpoenaed phones records included personal and office lines for several national security reporters and editors as well as “the main number for AP reporters in the House of Representatives press gallery.”

    Presumably, now that the story has broken, public pressure will compel some sort of explanation from the Department of Justice or the Obama administration. In the meantime, the AP’s own story on the incident strongly suggests a theory for what happened: that the DoJ was looking for the source on the AP’s May 2012 story about a successful CIA operation to thwart a Yemen-based terror plot, a sort of underwear bomber part two.

    Here’s what the AP says in its story about the subpoena:

    The government would not say why it sought the records. U.S. officials have previously said in public testimony that the U.S. attorney in Washington is conducting a criminal investigation into who may have leaked information contained in a May 7, 2012, AP story about a foiled terror plot. The story disclosed details of a CIA operation in Yemen that stopped an al-Qaida plot in the spring of 2012 to detonate a bomb on an airplane bound for the United States.

    In testimony in February, CIA Director John Brennan noted that the FBI had questioned him about whether he was AP’s source, which he denied. He called the release of the information to the media about the terror plot an “unauthorized and dangerous disclosure of classified information.”

    And here’s a snip from the original May 2012 AP story that the agency believes may have started it all. Note that the story seems to cite both the FBI and CIA, as well as revealing that the bomb may not have been detectable by then-current airport security scanners:

    US officials say the plot involved an “upgrade” of the underwear bomb that failed to detonate aboard a jetliner over Detroit on Christmas Day in 2009.

    This new bomb was also built to be used in a passenger’s underwear but contained a more refined detonation system.

    The FBI is examining the latest bomb to see whether it could have passed through airport security and brought down an airplane, officials said. They said the device did not contain metal, meaning it probably could have passed through an airport metal detector. But it was not clear whether new body scanners used in many airports would have detected it.

    The would-be suicide bomber, based in Yemen, had not yet picked a target or bought his plane tickets when the CIA stepped in and seized the bomb, officials said. It is not immediately clear what happened to the alleged bomber.

    By Max Fisher, Updated: May 13, 2013

    Find this story at 13 May 2013

    © The Washington Post Company

    FBI Conducts Threat Assessment on Antiwar.Com Journalists for Linking to Publicly Available Document

    Antiwar.com has a troubling story detailing how what appears to be either an FBI counterintelligence investigation of suspected Israeli spies or an attempt to track down everyone who had posted terrorist watch lists online led to the FBI to investigate the site and Justin Raimondo and Eric Garris.

    The story is troubling for several reasons:
    The report on Antiwar.com reveals the FBI’s Electronic Communications Unit (the same one involved in using exigent letters to get community of interest phone numbers) was already monitoring Antiwar.com when the FBI did a threat analysis of them in 2004.
    Based on the fact that they had posted two watch lists, that a number of people under investigation read the site, and other redacted reasons, the FBI recommended a preliminary investigation into whether (basically) they were spying.
    The report cited electronic communications collected under FISA. While that may be no more than 4 FISA references in another case out of the Newark Office (which appears to be a prior investigation tied to the Israelis), that’s not clear that that’s the only FISA-collected information here.
    Whether or not the FBI already had used FISA on Antiwar.com, the low bar for PATRIOT powers (connection to a counterterrorist or counterintelligence investigation; the Israeli investigation would qualify) means the government could have used PATRIOT powers to investigate them.

    So here’s my analysis.

    Someone emailed Antiwar.com this set of FOIAed FBI documents. The documents appear to show that the FBI did some research on Antiwar.com in 2004 and recommended a Preliminary Investigation of them to see if they were spies. Their research appears to include 4 pieces of electronic communication collected under FISA, though it appears those were collected in another case.

    The Contents of the FBI File

    What follows assumes that the documents are authentic (Antiwar.com did not FOIA this themselves and they just received it out of the blue). It’s possible they’re an elaborate forgery, but they certainly appear to be valid FBI documents.

    Roughly speaking, here’s what’s included in the document packet as a whole.
    1-2: The faxed copy of a 302 (interview report) dated September 16, 2002 related to the Israelis
    3-4: A transfer document
    5-26: A document, dated October 4, 2002, documented the return and translation of evidence taken from the Israelis as well as xeroxes of the evidence
    27-29: An interview report dated October 2, 2002, first requested September 10, 2002
    30-32: An October 29, 2002 report on photos confiscated from an Israeli when he was detained on October 30, 2001
    33-34: An April 23, 2003 report on an earlier arrest of four Israelis on August 14, 2001
    35: Mostly blank cover sheet
    36-37: An FBI handwriting analysis of documents taken from the Israelis
    38-51: A report, dated July 10, 2003, summarizing and closing the case on the Israelis
    52-58: A report, dated July 10, 2003, summarizing the results of the case on the Israelis
    59-61: Paperwork from February and April 2004 reopening and transferring the investigation of the Israelis
    62-71: A 10-page report, dated April 30, 2004, on Raimondo, Garris, and Antiwar.com
    72-84: Web printouts of antiwar.com related information
    85-89: Paperwork related to the closure of the investigation into the 5 Israelis and the destruction of evidence collected from them
    90-94: FOIA notations

    Only the two bolded sections pertain to Antiwar.com. The rest (plus–it appears from the title of the Scribd file, http://www.scribd.com/doc/62394765/1138796-001-303A-NK-105536-Section-6-944900, which appears to come from the Newark case number–at least five other sections) describes the FBI’s investigation of the five Israelis alleged to have filmed the destruction of the World Trade Center (read pages 38-51 for the most complete description of the FBI investigation). The short version of the conclusion in that investigation is that the Israelis did have ties to the Israeli government, but did not appear to have foreknowledge of the attack.

    The Antiwar.com Threat Assessment appears to have been forwarded to the counterterrorism people working on the Israeli case; it’s likely the FOIA asked for everything relating to the Israeli investigation.

    The Genesis of the Antiwar.com Threat Assessment

    Which brings us to the report on Antiwar.com itself.

    It appears that, in March 2004, the FBI may have done a search of everyone who had a 9/11 “watch list” available online.

    An electronic communication from the Counterterrorism, NTCS/TWWU to all field offices, dated 03/24/2004, advised that the post-9/11 “watch list,” “Project Lookout,” was posted on the Internet and may contain the names of individuals of active investigative interest. Different versions of these lists may be found on the Internet. This assessment was conducted on the findings discovered on www.antiwar.com.

    The file doesn’t actually say whether that’s why the FBI started investigating Antiwar.com. Rather, it says,

    While conducting research on the Internet, an untitled spreadsheet , dated 10/03/2001, was discovered on the website antiwar.com.

    Given the recently reopened investigation into the Israelis at that time, the FBI may have found it in research on them and used the watch list directive to conduct further investigation. Or it may have just been the watch list directive.

    The FBI’s Research into Antiwar.com

    As Raimondo notes, he posted links to that document–sourced clearly to Cryptome–in this post on the Israelis.

    Ostensibly to figure out how and why he was posting a terrorist watch list, the FBI:
    Did searches on its Universal Index on both Garris and Raimondo (there was significant material on one of them)
    Did a scan of the Electronic Case File, apparently finding:
    One completely redacted file
    A counterintelligence report forwarded from the Counterintelligence office to the Office
    Several documents (from a different FBI office) that appear to be based on posts of Raimondo (these have serial numbers reading “315M/N-SL-188252), though the second is a Letterhead Memo
    A document citing Antiwar.com as a source of information on US military aid to Israel
    A report on a peaceful protest in the UK including a reference to an article handed out at the protest citing antiwar.com
    A report on a Neo-Nazi conference at which a member recommended reading Antiwar.com for information on the Middle East conflict
    The contents of a seized hard drive showing its owner visited Antiwar.com between July 2002 and June 2003.
    Recorded six more completely redacted entries
    Looked up details on DMV, Dun and Bradstreet, Lexis Nexis, business, and phone searches
    Looked up several other database searches the description of which are redacted
    Cited four FISA-derived references from a case file in Newark, but with no description of contents
    Referred to a bunch of other articles on Antiwar.com, both access via Lexis Nexis and via web searches.

    The FBI’s Verdict: Further Investigation

    All of which the FBI used to come to the following conclusion:

    The rights of individuals to post information and to express personal views on the Internet should be honored and protected; however, some material that is circulated on the Internet can compromise current active FBI investigations. The discovery of two detailed Excel spreadsheets posted on www.antiwar.com may not be significant by itself since distribution of the information on such lists are wide spread. Many agencies outside of law enforcement have been utilizing this information to screen their employees. Still it is unclear whether www.antiwar.com may only be posting research material compiled from multiple sources or if there is material posted that is singular in nature and not suitable for public released. There are several unanswered questions regarding antiwar.com. It describes itself as a non-profit group that survives on generous donations from its readers. Who are these contributors and what are the funds used for? [two lines redacted] on www.antiwar.com. If this is so, then what is his true name? Two facts have been established by this assessment. Many individuals worldwide do view this website including individuals who are currently under investigation and [one line redacted].

    With the recommendations (for DC’s corrupt ECAU office):

    It is recommended that ECAU further monitor the postings on the website www.antiwar.com.

    And in San Francisco:

    It is recommended that a [Preliminary Investigation] be opened to determine if [redacted] are engaging in, or have engaged in, activities which constitute a threat to National Security on behalf of a foreign power.

    Now, it’s bad enough the FBI doesn’t consider Antiwar.com a journalistic site at all. It’s also pretty appalling that they used pretty unnecessary questions to justify further investigation.

    And remember, the bar for the FBI to use First Amendment “protected” reasons to investigate someone have been lowered since 2004.

    Apparently, for the FBI, advocating for peace and making a publicly available PDF available constitutes sufficient threat to conduct a counterintelligence investigation.

    Posted on August 22, 2011 by emptywheel

    Find this story at 22 August 2011

    AntiWar.com Editors Sue Over FBI Surveillance

    WASHINGTON — Two editors of AntiWar.com sued the FBI on Tuesday, alleging that the bureau has failed to comply with a Freedom of Information Act (FOIA) request for documents about the government’s investigation of the website.

    FBI documents posted online show that the bureau recommended opening an investigation into the website in 2004 after it posted terrorist watch-lists online.

    The Huffington Post | By Ryan J. Reilly Posted: 05/21/2013 5:13 pm EDT | Updated: 05/21/2013 6:04 pm EDT

    Find this story at 21 May 2013

    Copyright © 2013 TheHuffingtonPost.com, Inc

    Transcript: Obama Addresses Counterterrorism, Drones

    President Obama waves after addressing his administration’s drone and counterterrorism policies, as well as the military prison at Guantanamo Bay, in a speech at the National Defense University in Washington, D.C., on Thursday.

    President Obama’s remarks at the National Defense University on Thursday, as released by the White House:

    Good afternoon, everybody. Please be seated.

    It is a great honor to return to the National Defense University. Here, at Fort McNair, Americans have served in uniform since 1791 — standing guard in the earliest days of the Republic, and contemplating the future of warfare here in the 21st century.

    For over two centuries, the United States has been bound together by founding documents that defined who we are as Americans, and served as our compass through every type of change. Matters of war and peace are no different. Americans are deeply ambivalent about war, but having fought for our independence, we know a price must be paid for freedom. From the Civil War to our struggle against fascism, on through the long twilight struggle of the Cold War, battlefields have changed and technology has evolved. But our commitment to constitutional principles has weathered every war, and every war has come to an end.

    With the collapse of the Berlin Wall, a new dawn of democracy took hold abroad, and a decade of peace and prosperity arrived here at home. And for a moment, it seemed the 21st century would be a tranquil time. And then, on September 11, 2001, we were shaken out of complacency. Thousands were taken from us, as clouds of fire and metal and ash descended upon a sun-filled morning. This was a different kind of war. No armies came to our shores, and our military was not the principal target. Instead, a group of terrorists came to kill as many civilians as they could.

    And so our nation went to war. We have now been at war for well over a decade. I won’t review the full history. What is clear is that we quickly drove al Qaeda out of Afghanistan, but then shifted our focus and began a new war in Iraq. And this carried significant consequences for our fight against al Qaeda, our standing in the world, and — to this day — our interests in a vital region.

    Meanwhile, we strengthened our defenses — hardening targets, tightening transportation security, giving law enforcement new tools to prevent terror. Most of these changes were sound. Some caused inconvenience. But some, like expanded surveillance, raised difficult questions about the balance that we strike between our interests in security and our values of privacy. And in some cases, I believe we compromised our basic values — by using torture to interrogate our enemies, and detaining individuals in a way that ran counter to the rule of law.

    So after I took office, we stepped up the war against al Qaeda but we also sought to change its course. We relentlessly targeted al Qaeda’s leadership. We ended the war in Iraq, and brought nearly 150,000 troops home. We pursued a new strategy in Afghanistan, and increased our training of Afghan forces. We unequivocally banned torture, affirmed our commitment to civilian courts, worked to align our policies with the rule of law, and expanded our consultations with Congress.

    Today, Osama bin Laden is dead, and so are most of his top lieutenants. There have been no large-scale attacks on the United States, and our homeland is more secure. Fewer of our troops are in harm’s way, and over the next 19 months they will continue to come home. Our alliances are strong, and so is our standing in the world. In sum, we are safer because of our efforts.

    Now, make no mistake, our nation is still threatened by terrorists. From Benghazi to Boston, we have been tragically reminded of that truth. But we have to recognize that the threat has shifted and evolved from the one that came to our shores on 9/11. With a decade of experience now to draw from, this is the moment to ask ourselves hard questions — about the nature of today’s threats and how we should confront them.

    And these questions matter to every American.

    For over the last decade, our nation has spent well over a trillion dollars on war, helping to explode our deficits and constraining our ability to nation-build here at home. Our servicemembers and their families have sacrificed far more on our behalf. Nearly 7,000 Americans have made the ultimate sacrifice. Many more have left a part of themselves on the battlefield, or brought the shadows of battle back home. From our use of drones to the detention of terrorist suspects, the decisions that we are making now will define the type of nation — and world — that we leave to our children.

    So America is at a crossroads. We must define the nature and scope of this struggle, or else it will define us. We have to be mindful of James Madison’s warning that “No nation could preserve its freedom in the midst of continual warfare.” Neither I, nor any President, can promise the total defeat of terror. We will never erase the evil that lies in the hearts of some human beings, nor stamp out every danger to our open society. But what we can do — what we must do — is dismantle networks that pose a direct danger to us, and make it less likely for new groups to gain a foothold, all the while maintaining the freedoms and ideals that we defend. And to define that strategy, we have to make decisions based not on fear, but on hard-earned wisdom. That begins with understanding the current threat that we face.

    Today, the core of al Qaeda in Afghanistan and Pakistan is on the path to defeat. Their remaining operatives spend more time thinking about their own safety than plotting against us. They did not direct the attacks in Benghazi or Boston. They’ve not carried out a successful attack on our homeland since 9/11.

    Instead, what we’ve seen is the emergence of various al Qaeda affiliates. From Yemen to Iraq, from Somalia to North Africa, the threat today is more diffuse, with Al Qaeda’s affiliates in the Arabian Peninsula — AQAP — the most active in plotting against our homeland. And while none of AQAP’s efforts approach the scale of 9/11, they have continued to plot acts of terror, like the attempt to blow up an airplane on Christmas Day in 2009.

    Unrest in the Arab world has also allowed extremists to gain a foothold in countries like Libya and Syria. But here, too, there are differences from 9/11. In some cases, we continue to confront state-sponsored networks like Hezbollah that engage in acts of terror to achieve political goals. Other of these groups are simply collections of local militias or extremists interested in seizing territory. And while we are vigilant for signs that these groups may pose a transnational threat, most are focused on operating in the countries and regions where they are based. And that means we’ll face more localized threats like what we saw in Benghazi, or the BP oil facility in Algeria, in which local operatives — perhaps in loose affiliation with regional networks — launch periodic attacks against Western diplomats, companies, and other soft targets, or resort to kidnapping and other criminal enterprises to fund their operations.

    And finally, we face a real threat from radicalized individuals here in the United States. Whether it’s a shooter at a Sikh Temple in Wisconsin, a plane flying into a building in Texas, or the extremists who killed 168 people at the Federal Building in Oklahoma City, America has confronted many forms of violent extremism in our history. Deranged or alienated individuals — often U.S. citizens or legal residents — can do enormous damage, particularly when inspired by larger notions of violent jihad. And that pull towards extremism appears to have led to the shooting at Fort Hood and the bombing of the Boston Marathon.

    So that’s the current threat — lethal yet less capable al Qaeda affiliates; threats to diplomatic facilities and businesses abroad; homegrown extremists. This is the future of terrorism. We have to take these threats seriously, and do all that we can to confront them. But as we shape our response, we have to recognize that the scale of this threat closely resembles the types of attacks we faced before 9/11.

    In the 1980s, we lost Americans to terrorism at our Embassy in Beirut; at our Marine Barracks in Lebanon; on a cruise ship at sea; at a disco in Berlin; and on a Pan Am flight — Flight 103 — over Lockerbie. In the 1990s, we lost Americans to terrorism at the World Trade Center; at our military facilities in Saudi Arabia; and at our Embassy in Kenya. These attacks were all brutal; they were all deadly; and we learned that left unchecked, these threats can grow. But if dealt with smartly and proportionally, these threats need not rise to the level that we saw on the eve of 9/11.

    Moreover, we have to recognize that these threats don’t arise in a vacuum. Most, though not all, of the terrorism we faced is fueled by a common ideology — a belief by some extremists that Islam is in conflict with the United States and the West, and that violence against Western targets, including civilians, is justified in pursuit of a larger cause. Of course, this ideology is based on a lie, for the United States is not at war with Islam. And this ideology is rejected by the vast majority of Muslims, who are the most frequent victims of terrorist attacks.

    Nevertheless, this ideology persists, and in an age when ideas and images can travel the globe in an instant, our response to terrorism can’t depend on military or law enforcement alone. We need all elements of national power to win a battle of wills, a battle of ideas. So what I want to discuss here today is the components of such a comprehensive counterterrorism strategy.

    First, we must finish the work of defeating al Qaeda and its associated forces.

    In Afghanistan, we will complete our transition to Afghan responsibility for that country’s security. Our troops will come home. Our combat mission will come to an end. And we will work with the Afghan government to train security forces, and sustain a counterterrorism force, which ensures that al Qaeda can never again establish a safe haven to launch attacks against us or our allies.

    Beyond Afghanistan, we must define our effort not as a boundless “global war on terror,” but rather as a series of persistent, targeted efforts to dismantle specific networks of violent extremists that threaten America. In many cases, this will involve partnerships with other countries. Already, thousands of Pakistani soldiers have lost their lives fighting extremists. In Yemen, we are supporting security forces that have reclaimed territory from AQAP. In Somalia, we helped a coalition of African nations push al-Shabaab out of its strongholds. In Mali, we’re providing military aid to French-led intervention to push back al Qaeda in the Maghreb, and help the people of Mali reclaim their future.

    Much of our best counterterrorism cooperation results in the gathering and sharing of intelligence, the arrest and prosecution of terrorists. And that’s how a Somali terrorist apprehended off the coast of Yemen is now in a prison in New York. That’s how we worked with European allies to disrupt plots from Denmark to Germany to the United Kingdom. That’s how intelligence collected with Saudi Arabia helped us stop a cargo plane from being blown up over the Atlantic. These partnerships work.

    But despite our strong preference for the detention and prosecution of terrorists, sometimes this approach is foreclosed. Al Qaeda and its affiliates try to gain foothold in some of the most distant and unforgiving places on Earth. They take refuge in remote tribal regions. They hide in caves and walled compounds. They train in empty deserts and rugged mountains.

    In some of these places — such as parts of Somalia and Yemen — the state only has the most tenuous reach into the territory. In other cases, the state lacks the capacity or will to take action. And it’s also not possible for America to simply deploy a team of Special Forces to capture every terrorist. Even when such an approach may be possible, there are places where it would pose profound risks to our troops and local civilians — where a terrorist compound cannot be breached without triggering a firefight with surrounding tribal communities, for example, that pose no threat to us; times when putting U.S. boots on the ground may trigger a major international crisis.

    To put it another way, our operation in Pakistan against Osama bin Laden cannot be the norm. The risks in that case were immense. The likelihood of capture, although that was our preference, was remote given the certainty that our folks would confront resistance. The fact that we did not find ourselves confronted with civilian casualties, or embroiled in an extended firefight, was a testament to the meticulous planning and professionalism of our Special Forces, but it also depended on some luck. And it was supported by massive infrastructure in Afghanistan.

    And even then, the cost to our relationship with Pakistan — and the backlash among the Pakistani public over encroachment on their territory — was so severe that we are just now beginning to rebuild this important partnership.

    So it is in this context that the United States has taken lethal, targeted action against al Qaeda and its associated forces, including with remotely piloted aircraft commonly referred to as drones.

    As was true in previous armed conflicts, this new technology raises profound questions — about who is targeted, and why; about civilian casualties, and the risk of creating new enemies; about the legality of such strikes under U.S. and international law; about accountability and morality. So let me address these questions.

    To begin with, our actions are effective. Don’t take my word for it. In the intelligence gathered at bin Laden’s compound, we found that he wrote, “We could lose the reserves to enemy’s air strikes. We cannot fight air strikes with explosives.” Other communications from al Qaeda operatives confirm this as well. Dozens of highly skilled al Qaeda commanders, trainers, bomb makers and operatives have been taken off the battlefield. Plots have been disrupted that would have targeted international aviation, U.S. transit systems, European cities and our troops in Afghanistan. Simply put, these strikes have saved lives.

    Moreover, America’s actions are legal. We were attacked on 9/11. Within a week, Congress overwhelmingly authorized the use of force. Under domestic law, and international law, the United States is at war with al Qaeda, the Taliban, and their associated forces. We are at war with an organization that right now would kill as many Americans as they could if we did not stop them first. So this is a just war — a war waged proportionally, in last resort, and in self-defense.

    And yet, as our fight enters a new phase, America’s legitimate claim of self-defense cannot be the end of the discussion. To say a military tactic is legal, or even effective, is not to say it is wise or moral in every instance. For the same human progress that gives us the technology to strike half a world away also demands the discipline to constrain that power — or risk abusing it. And that’s why, over the last four years, my administration has worked vigorously to establish a framework that governs our use of force against terrorists –- insisting upon clear guidelines, oversight and accountability that is now codified in Presidential Policy Guidance that I signed yesterday.

    In the Afghan war theater, we must — and will — continue to support our troops until the transition is complete at the end of 2014. And that means we will continue to take strikes against high value al Qaeda targets, but also against forces that are massing to support attacks on coalition forces. But by the end of 2014, we will no longer have the same need for force protection, and the progress we’ve made against core al Qaeda will reduce the need for unmanned strikes.

    Beyond the Afghan theater, we only target al Qaeda and its associated forces. And even then, the use of drones is heavily constrained. America does not take strikes when we have the ability to capture individual terrorists; our preference is always to detain, interrogate, and prosecute. America cannot take strikes wherever we choose; our actions are bound by consultations with partners, and respect for state sovereignty.

    America does not take strikes to punish individuals; we act against terrorists who pose a continuing and imminent threat to the American people, and when there are no other governments capable of effectively addressing the threat. And before any strike is taken, there must be near-certainty that no civilians will be killed or injured — the highest standard we can set.

    Now, this last point is critical, because much of the criticism about drone strikes — both here at home and abroad — understandably centers on reports of civilian casualties. There’s a wide gap between U.S. assessments of such casualties and nongovernmental reports. Nevertheless, it is a hard fact that U.S. strikes have resulted in civilian casualties, a risk that exists in every war. And for the families of those civilians, no words or legal construct can justify their loss. For me, and those in my chain of command, those deaths will haunt us as long as we live, just as we are haunted by the civilian casualties that have occurred throughout conventional fighting in Afghanistan and Iraq.

    But as Commander-in-Chief, I must weigh these heartbreaking tragedies against the alternatives. To do nothing in the face of terrorist networks would invite far more civilian casualties — not just in our cities at home and our facilities abroad, but also in the very places like Sana’a and Kabul and Mogadishu where terrorists seek a foothold. Remember that the terrorists we are after target civilians, and the death toll from their acts of terrorism against Muslims dwarfs any estimate of civilian casualties from drone strikes. So doing nothing is not an option.

    Where foreign governments cannot or will not effectively stop terrorism in their territory, the primary alternative to targeted lethal action would be the use of conventional military options. As I’ve already said, even small special operations carry enormous risks. Conventional airpower or missiles are far less precise than drones, and are likely to cause more civilian casualties and more local outrage. And invasions of these territories lead us to be viewed as occupying armies, unleash a torrent of unintended consequences, are difficult to contain, result in large numbers of civilian casualties and ultimately empower those who thrive on violent conflict.

    So it is false to assert that putting boots on the ground is less likely to result in civilian deaths or less likely to create enemies in the Muslim world. The results would be more U.S. deaths, more Black Hawks down, more confrontations with local populations, and an inevitable mission creep in support of such raids that could easily escalate into new wars.

    Yes, the conflict with al Qaeda, like all armed conflict, invites tragedy. But by narrowly targeting our action against those who want to kill us and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.

    Our efforts must be measured against the history of putting American troops in distant lands among hostile populations. In Vietnam, hundreds of thousands of civilians died in a war where the boundaries of battle were blurred. In Iraq and Afghanistan, despite the extraordinary courage and discipline of our troops, thousands of civilians have been killed. So neither conventional military action nor waiting for attacks to occur offers moral safe harbor, and neither does a sole reliance on law enforcement in territories that have no functioning police or security services — and indeed, have no functioning law.

    Now, this is not to say that the risks are not real. Any U.S. military action in foreign lands risks creating more enemies and impacts public opinion overseas. Moreover, our laws constrain the power of the President even during wartime, and I have taken an oath to defend the Constitution of the United States. The very precision of drone strikes and the necessary secrecy often involved in such actions can end up shielding our government from the public scrutiny that a troop deployment invites. It can also lead a President and his team to view drone strikes as a cure-all for terrorism.

    And for this reason, I’ve insisted on strong oversight of all lethal action. After I took office, my administration began briefing all strikes outside of Iraq and Afghanistan to the appropriate committees of Congress. Let me repeat that: Not only did Congress authorize the use of force, it is briefed on every strike that America takes. Every strike. That includes the one instance when we targeted an American citizen — Anwar Awlaki, the chief of external operations for AQAP.

    This week, I authorized the declassification of this action, and the deaths of three other Americans in drone strikes, to facilitate transparency and debate on this issue and to dismiss some of the more outlandish claims that have been made. For the record, I do not believe it would be constitutional for the government to target and kill any U.S. citizen — with a drone, or with a shotgun — without due process, nor should any President deploy armed drones over U.S. soil.

    But when a U.S. citizen goes abroad to wage war against America and is actively plotting to kill U.S. citizens, and when neither the United States, nor our partners are in a position to capture him before he carries out a plot, his citizenship should no more serve as a shield than a sniper shooting down on an innocent crowd should be protected from a SWAT team.

    That’s who Anwar Awlaki was — he was continuously trying to kill people. He helped oversee the 2010 plot to detonate explosive devices on two U.S.-bound cargo planes. He was involved in planning to blow up an airliner in 2009. When Farouk Abdulmutallab — the Christmas Day bomber — went to Yemen in 2009, Awlaki hosted him, approved his suicide operation, helped him tape a martyrdom video to be shown after the attack, and his last instructions were to blow up the airplane when it was over American soil. I would have detained and prosecuted Awlaki if we captured him before he carried out a plot, but we couldn’t. And as President, I would have been derelict in my duty had I not authorized the strike that took him out.

    Of course, the targeting of any American raises constitutional issues that are not present in other strikes — which is why my administration submitted information about Awlaki to the Department of Justice months before Awlaki was killed, and briefed the Congress before this strike as well. But the high threshold that we’ve set for taking lethal action applies to all potential terrorist targets, regardless of whether or not they are American citizens. This threshold respects the inherent dignity of every human life. Alongside the decision to put our men and women in uniform in harm’s way, the decision to use force against individuals or groups — even against a sworn enemy of the United States — is the hardest thing I do as President. But these decisions must be made, given my responsibility to protect the American people.

    Going forward, I’ve asked my administration to review proposals to extend oversight of lethal actions outside of warzones that go beyond our reporting to Congress. Each option has virtues in theory, but poses difficulties in practice. For example, the establishment of a special court to evaluate and authorize lethal action has the benefit of bringing a third branch of government into the process, but raises serious constitutional issues about presidential and judicial authority. Another idea that’s been suggested — the establishment of an independent oversight board in the executive branch — avoids those problems, but may introduce a layer of bureaucracy into national security decision-making, without inspiring additional public confidence in the process. But despite these challenges, I look forward to actively engaging Congress to explore these and other options for increased oversight.

    I believe, however, that the use of force must be seen as part of a larger discussion we need to have about a comprehensive counterterrorism strategy — because for all the focus on the use of force, force alone cannot make us safe. We cannot use force everywhere that a radical ideology takes root; and in the absence of a strategy that reduces the wellspring of extremism, a perpetual war — through drones or Special Forces or troop deployments — will prove self-defeating, and alter our country in troubling ways.

    So the next element of our strategy involves addressing the underlying grievances and conflicts that feed extremism — from North Africa to South Asia. As we’ve learned this past decade, this is a vast and complex undertaking. We must be humble in our expectation that we can quickly resolve deep-rooted problems like poverty and sectarian hatred. Moreover, no two countries are alike, and some will undergo chaotic change before things get better. But our security and our values demand that we make the effort.

    This means patiently supporting transitions to democracy in places like Egypt and Tunisia and Libya — because the peaceful realization of individual aspirations will serve as a rebuke to violent extremists. We must strengthen the opposition in Syria, while isolating extremist elements — because the end of a tyrant must not give way to the tyranny of terrorism. We are actively working to promote peace between Israelis and Palestinians — because it is right and because such a peace could help reshape attitudes in the region. And we must help countries modernize economies, upgrade education, and encourage entrepreneurship — because American leadership has always been elevated by our ability to connect with people’s hopes, and not simply their fears.

    And success on all these fronts requires sustained engagement, but it will also require resources. I know that foreign aid is one of the least popular expenditures that there is. That’s true for Democrats and Republicans — I’ve seen the polling — even though it amounts to less than one percent of the federal budget. In fact, a lot of folks think it’s 25 percent, if you ask people on the streets. Less than one percent — still wildly unpopular. But foreign assistance cannot be viewed as charity. It is fundamental to our national security. And it’s fundamental to any sensible long-term strategy to battle extremism.

    Moreover, foreign assistance is a tiny fraction of what we spend fighting wars that our assistance might ultimately prevent. For what we spent in a month in Iraq at the height of the war, we could be training security forces in Libya, maintaining peace agreements between Israel and its neighbors, feeding the hungry in Yemen, building schools in Pakistan, and creating reservoirs of goodwill that marginalize extremists. That has to be part of our strategy.

    Moreover, America cannot carry out this work if we don’t have diplomats serving in some very dangerous places. Over the past decade, we have strengthened security at our embassies, and I am implementing every recommendation of the Accountability Review Board, which found unacceptable failures in Benghazi. I’ve called on Congress to fully fund these efforts to bolster security and harden facilities, improve intelligence, and facilitate a quicker response time from our military if a crisis emerges.

    But even after we take these steps, some irreducible risks to our diplomats will remain. This is the price of being the world’s most powerful nation, particularly as a wave of change washes over the Arab World. And in balancing the trade4offs between security and active diplomacy, I firmly believe that any retreat from challenging regions will only increase the dangers that we face in the long run. And that’s why we should be grateful to those diplomats who are willing to serve.

    Targeted action against terrorists, effective partnerships, diplomatic engagement and assistance — through such a comprehensive strategy we can significantly reduce the chances of large-scale attacks on the homeland and mitigate threats to Americans overseas. But as we guard against dangers from abroad, we cannot neglect the daunting challenge of terrorism from within our borders.

    As I said earlier, this threat is not new. But technology and the Internet increase its frequency and in some cases its lethality. Today, a person can consume hateful propaganda, commit themselves to a violent agenda, and learn how to kill without leaving their home. To address this threat, two years ago my administration did a comprehensive review and engaged with law enforcement.

    And the best way to prevent violent extremism inspired by violent jihadists is to work with the Muslim American community — which has consistently rejected terrorism — to identify signs of radicalization and partner with law enforcement when an individual is drifting towards violence. And these partnerships can only work when we recognize that Muslims are a fundamental part of the American family. In fact, the success of American Muslims and our determination to guard against any encroachments on their civil liberties is the ultimate rebuke to those who say that we’re at war with Islam.

    Thwarting homegrown plots presents particular challenges in part because of our proud commitment to civil liberties for all who call America home. That’s why, in the years to come, we will have to keep working hard to strike the appropriate balance between our need for security and preserving those freedoms that make us who we are. That means reviewing the authorities of law enforcement, so we can intercept new types of communication, but also build in privacy protections to prevent abuse.

    That means that — even after Boston — we do not deport someone or throw somebody in prison in the absence of evidence. That means putting careful constraints on the tools the government uses to protect sensitive information, such as the state secrets doctrine. And that means finally having a strong Privacy and Civil Liberties Board to review those issues where our counterterrorism efforts and our values may come into tension.

    The Justice Department’s investigation of national security leaks offers a recent example of the challenges involved in striking the right balance between our security and our open society. As Commander-in-Chief, I believe we must keep information secret that protects our operations and our people in the field. To do so, we must enforce consequences for those who break the law and breach their commitment to protect classified information. But a free press is also essential for our democracy. That’s who we are. And I’m troubled by the possibility that leak investigations may chill the investigative journalism that holds government accountable.

    Journalists should not be at legal risk for doing their jobs. Our focus must be on those who break the law. And that’s why I’ve called on Congress to pass a media shield law to guard against government overreach. And I’ve raised these issues with the Attorney General, who shares my concerns. So he has agreed to review existing Department of Justice guidelines governing investigations that involve reporters, and he’ll convene a group of media organizations to hear their concerns as part of that review. And I’ve directed the Attorney General to report back to me by July 12th.

    Now, all these issues remind us that the choices we make about war can impact — in sometimes unintended ways — the openness and freedom on which our way of life depends. And that is why I intend to engage Congress about the existing Authorization to Use Military Force, or AUMF, to determine how we can continue to fight terrorism without keeping America on a perpetual wartime footing.

    The AUMF is now nearly 12 years old. The Afghan war is coming to an end. Core al Qaeda is a shell of its former self. Groups like AQAP must be dealt with, but in the years to come, not every collection of thugs that labels themselves al Qaeda will pose a credible threat to the United States. Unless we discipline our thinking, our definitions, our actions, we may be drawn into more wars we don’t need to fight, or continue to grant Presidents unbound powers more suited for traditional armed conflicts between nation states.

    So I look forward to engaging Congress and the American people in efforts to refine, and ultimately repeal, the AUMF’s mandate. And I will not sign laws designed to expand this mandate further. Our systematic effort to dismantle terrorist organizations must continue. But this war, like all wars, must end. That’s what history advises. That’s what our democracy demands.

    And that brings me to my final topic: the detention of terrorist suspects. I’m going to repeat one more time: As a matter of policy, the preference of the United States is to capture terrorist suspects. When we do detain a suspect, we interrogate them. And if the suspect can be prosecuted, we decide whether to try him in a civilian court or a military commission.

    During the past decade, the vast majority of those detained by our military were captured on the battlefield. In Iraq, we turned over thousands of prisoners as we ended the war. In Afghanistan, we have transitioned detention facilities to the Afghans, as part of the process of restoring Afghan sovereignty. So we bring law of war detention to an end, and we are committed to prosecuting terrorists wherever we can.

    The glaring exception to this time-tested approach is the detention center at Guantanamo Bay. The original premise for opening GTMO — that detainees would not be able to challenge their detention — was found unconstitutional five years ago. In the meantime, GTMO has become a symbol around the world for an America that flouts the rule of law. Our allies won’t cooperate with us if they think a terrorist will end up at GTMO.

    During a time of budget cuts, we spend $150 million each year to imprison 166 people — almost $1 million per prisoner. And the Department of Defense estimates that we must spend another $200 million to keep GTMO open at a time when we’re cutting investments in education and research here at home, and when the Pentagon is struggling with sequester and budget cuts.

    As President, I have tried to close GTMO. I transferred 67 detainees to other countries before Congress imposed restrictions to effectively prevent us from either transferring detainees to other countries or imprisoning them here in the United States.

    These restrictions make no sense. After all, under President Bush, some 530 detainees were transferred from GTMO with Congress’s support. When I ran for President the first time, John McCain supported closing GTMO — this was a bipartisan issue. No person has ever escaped one of our super-max or military prisons here in the United States — ever. Our courts have convicted hundreds of people for terrorism or terrorism-related offenses, including some folks who are more dangerous than most GTMO detainees. They’re in our prisons.

    And given my administration’s relentless pursuit of al Qaeda’s leadership, there is no justification beyond politics for Congress to prevent us from closing a facility that should have never have been opened. (Applause.)

    AUDIENCE MEMBER: Excuse me, President Obama —

    THE PRESIDENT: So — let me finish, ma’am. So today, once again —

    AUDIENCE MEMBER: There are 102 people on a hunger strike. These are desperate people.

    THE PRESIDENT: I’m about to address it, ma’am, but you’ve got to let me speak. I’m about to address it.

    AUDIENCE MEMBER: You’re our Commander-In-Chief —

    THE PRESIDENT: Let me address it.

    AUDIENCE MEMBER: — you an close Guantanamo Bay.

    THE PRESIDENT: Why don’t you let me address it, ma’am.

    AUDIENCE MEMBER: There’s still prisoners —

    THE PRESIDENT: Why don’t you sit down and I will tell you exactly what I’m going to do.

    AUDIENCE MEMBER: That includes 57 Yemenis.

    THE PRESIDENT: Thank you, ma’am. Thank you. (Applause.) Ma’am, thank you. You should let me finish my sentence.

    Today, I once again call on Congress to lift the restrictions on detainee transfers from GTMO. (Applause.)

    I have asked the Department of Defense to designate a site in the United States where we can hold military commissions. I’m appointing a new senior envoy at the State Department and Defense Department whose sole responsibility will be to achieve the transfer of detainees to third countries.

    I am lifting the moratorium on detainee transfers to Yemen so we can review them on a case-by-case basis. To the greatest extent possible, we will transfer detainees who have been cleared to go to other countries.

    AUDIENCE MEMBER: — prisoners already. Release them today.

    THE PRESIDENT: Where appropriate, we will bring terrorists to justice in our courts and our military justice system. And we will insist that judicial review be available for every detainee.

    AUDIENCE MEMBER: It needs to be —

    THE PRESIDENT: Now, ma’am, let me finish. Let me finish, ma’am. Part of free speech is you being able to speak, but also, you listening and me being able to speak. (Applause.)

    Now, even after we take these steps one issue will remain — just how to deal with those GTMO detainees who we know have participated in dangerous plots or attacks but who cannot be prosecuted, for example, because the evidence against them has been compromised or is inadmissible in a court of law. But once we commit to a process of closing GTMO, I am confident that this legacy problem can be resolved, consistent with our commitment to the rule of law.

    I know the politics are hard. But history will cast a harsh judgment on this aspect of our fight against terrorism and those of us who fail to end it. Imagine a future — 10 years from now or 20 years from now — when the United States of America is still holding people who have been charged with no crime on a piece of land that is not part of our country. Look at the current situation, where we are force-feeding detainees who are being held on a hunger strike. I’m willing to cut the young lady who interrupted me some slack because it’s worth being passionate about. Is this who we are? Is that something our Founders foresaw? Is that the America we want to leave our children? Our sense of justice is stronger than that.

    We have prosecuted scores of terrorists in our courts. That includes Umar Farouk Abdulmutallab, who tried to blow up an airplane over Detroit; and Faisal Shahzad, who put a car bomb in Times Square. It’s in a court of law that we will try Dzhokhar Tsarnaev, who is accused of bombing the Boston Marathon. Richard Reid, the shoe bomber, is, as we speak, serving a life sentence in a maximum security prison here in the United States. In sentencing Reid, Judge William Young told him, “The way we treat you…is the measure of our own liberties.”

    AUDIENCE MEMBER: How about Abdulmutallab — locking up a 16-year-old — is that the way we treat a 16-year old? (Inaudible) — can you take the drones out of the hands of the CIA? Can you stop the signature strikes killing people on the basis of suspicious activities?

    THE PRESIDENT: We’re addressing that, ma’am.

    AUDIENCE MEMBER: — thousands of Muslims that got killed — will you compensate the innocent families — that will make us safer here at home. I love my country. I love (inaudible) —

    THE PRESIDENT: I think that — and I’m going off script, as you might expect here. (Laughter and applause.) The voice of that woman is worth paying attention to. (Applause.) Obviously, I do not agree with much of what she said, and obviously she wasn’t listening to me in much of what I said. But these are tough issues, and the suggestion that we can gloss over them is wrong.

    When that judge sentenced Mr. Reid, the shoe bomber, he went on to point to the American flag that flew in the courtroom. “That flag,” he said, “will fly there long after this is all forgotten. That flag still stands for freedom.”

    So, America, we’ve faced down dangers far greater than al Qaeda. By staying true to the values of our founding, and by using our constitutional compass, we have overcome slavery and Civil War and fascism and communism. In just these last few years as President, I’ve watched the American people bounce back from painful recession, mass shootings, natural disasters like the recent tornados that devastated Oklahoma. These events were heartbreaking; they shook our communities to the core. But because of the resilience of the American people, these events could not come close to breaking us.

    I think of Lauren Manning, the 9/11 survivor who had severe burns over 80 percent of her body, who said, “That’s my reality. I put a Band-Aid on it, literally, and I move on.”

    I think of the New Yorkers who filled Times Square the day after an attempted car bomb as if nothing had happened.

    I think of the proud Pakistani parents who, after their daughter was invited to the White House, wrote to us, “We have raised an American Muslim daughter to dream big and never give up because it does pay off.”

    I think of all the wounded warriors rebuilding their lives, and helping other vets to find jobs.

    I think of the runner planning to do the 2014 Boston Marathon, who said, “Next year, you’re going to have more people than ever. Determination is not something to be messed with.”

    That’s who the American people are — determined, and not to be messed with. And now we need a strategy and a politics that reflects this resilient spirit.

    Our victory against terrorism won’t be measured in a surrender ceremony at a battleship, or a statue being pulled to the ground. Victory will be measured in parents taking their kids to school; immigrants coming to our shores; fans taking in a ballgame; a veteran starting a business; a bustling city street; a citizen shouting her concerns at a President.

    The quiet determination; that strength of character and bond of fellowship; that refutation of fear — that is both our sword and our shield. And long after the current messengers of hate have faded from the world’s memory, alongside the brutal despots, and deranged madmen, and ruthless demagogues who litter history — the flag of the United States will still wave from small-town cemeteries to national monuments, to distant outposts abroad. And that flag will still stand for freedom.

    Thank you very, everybody. God bless you. May God bless the United States of America. (Applause.)

    May 23, 2013 3:29 PM

    Find this story at 23 May 2013

    Obama reframes counterterrorism policy with new rules on drones

    In a major address Thursday President Barack Obama sought to reframe the nation’s counterterrorism strategy, saying, “Our systematic effort to dismantle terrorist organizations must continue. But this war, like all wars, must end. That’s what history advises. That’s what our democracy demands.”

    Speaking at the National Defense University in Washington Obama said, “America is at a crossroads. We must define our effort not as a boundless ‘global war on terror’ – but rather as a series of persistent, targeted efforts to dismantle specific networks of violent extremists that threaten America.”

    In an attempt to define a new post-Sept. 11 era, Obama outlined new guidelines for the use of drones to kill terrorists overseas and pledged a

    President Barack Obama discusses civilian casualties resulting from U.S. drone strikes while speaking Thursday at the National Defense University

    renewed effort to close the military detention center in Guantanamo Bay. In the speech, Obama argued that, “In the years to come, not every collection of thugs that labels themselves al Qaida will pose a credible threat to the United States.” He warned that “unless we discipline our thinking and our actions, we may be drawn into more wars we don’t need to fight.”

    With efforts under way in Congress to redefine the 2001 authorization to use military force (AUMF) against al Qaida, Obama said he would work with Congress “in efforts to refine, and ultimately repeal, the AUMF’s mandate. And I will not sign laws designed to expand this mandate further.”

    Toward the end of Obama’s address as he discussed the Guantanamo detainees, he was repeatedly interrupted by heckling from Medea Benjamin, founder of the antiwar group Code Pink, whose members have frequently been arrested for disrupting hearings on Capitol Hill – but Obama patiently said that Benjamin’s concerns are “something to be passionate about.”

    “We must define the nature and scope of this struggle, or else it will define us, mindful of James Madison’s warning that ‘No nation could preserve its freedom in the midst of continual warfare.’ Neither I, nor any president, can promise the total defeat of terror,” he declared.

    As part of his redefinition of counterterrorism, the president announced several initiatives:
    Setting narrower parameters for the use of remotely piloted aircraft, or drones, to kill terrorists overseas and to limit collateral casualties;
    Renewing efforts to persuade Congress to agree to close the Guantanamo detention site in Cuba where 110 terrorist suspects are being held;
    Appointing a new envoy at the State Department and an official at the Defense Department who will attempt to negotiate transfers of Guantanamo detainees to other countries.
    Lifting the moratorium he imposed in 2010 on transferring some detainees at Guantanamo to Yemen. Obama imposed that moratorium after it was revealed that Detroit “underwear bomber” Umar Farouq Abdulmuttalab was trained in Yemen.

    Obama argued that when compared to the Sept. 11, 2001 attackers, “the threat today is more diffuse, with Al Qaida’s affiliates in the

    President Barack Obama talks about national security, Thursday, May 23, 2013, at the National Defense University at Fort McNair in Washington.

    Arabian Peninsula – AQAP – the most active in plotting against our homeland. While none of AQAP’s efforts approach the scale of 9/11 they have continued to plot acts of terror, like the attempt to blow up an airplane on Christmas Day in 2009.”

    So he said, “As we shape our response, we have to recognize that the scale of this threat closely resembles the types of attacks we faced before 9/11.”

    He said that the current threat is often from “deranged or alienated individuals – often U.S. citizens or legal residents – (who) can do enormous damage, particularly when inspired by larger notions of violent jihad. That pull towards extremism appears to have led to the shooting at Fort Hood, and the bombing of the Boston Marathon.”

    In discussing his drone strategy he indicated his remorse over the innocent people who had been killed: “it is a hard fact that U.S. strikes have resulted in civilian casualties, a risk that exists in all wars. For the families of those civilians, no words or legal construct can justify their loss. For me, and those in my chain of command, these deaths will haunt us as long as we live, just as we are haunted by the civilian casualties that have occurred through conventional fighting in Afghanistan and Iraq.”

    There remains considerable doubt about Obama’s ability to persuade a majority in Congress to change the current law on releasing detainees held there.

    Demonstrators stand near a mock drone at the gates of Fort McNair where President Barack Obama will speak at the National Defense University in Washington May 23, 2013.

    The defense spending bill which Obama signed into law last year prohibits any transfers to the United States of any detainee at Guantanamo who was held there on or before Jan. 20, 2009, the day Obama became president.

    And the law sets a very high legal bar for Defense Secretary Chuck Hagel to transfer a detainee to his country of origin or to any other foreign country.

    Hagel would need to certify to Congress that the detainee will not be transferred to a country that is a designated state sponsor of terrorism. The country must have agreed to take steps to ensure that the detainee cannot take action to threaten the United States, U.S. citizens, or its allies in the future.

    The law allows Hagel to use waivers in some cases to transfer detainees.

    In a mostly skeptical and sometimes dismissive reaction to Obama’s speech, key Republican senators said at a press conference that he still had not offered a coherent plan for what to do with the different types of detainees held at Guantanamo, some of whom they said need to be held indefinitely, while others might be eligible for release.

    Obama’s 2008 opponent, Sen. John McCain, R- Ariz., said that “to somehow argue that al Qaida is ‘on the run’ comes from a degree of unreality that to me is really incredible.” He argued that al Qaida is “expanding all over the Middle East” and in North Africa. He said repealing the congressional authorization to use military force “contradicts the reality of the facts on the ground.”

    By Tom Curry, National Affairs Writer, NBC News

    This story was originally published on Thu May 23, 2013 2:00 PM EDT

    Find this story at 23 May 2013

    © 2013 NBCNews.com

     

     

    White House says drone strikes have killed four US citizens

    Eric Holder acknowledges previously classified details of drone program and says US deliberately targeted Anwar al-Awlaki, who died in Yemen in 2011

    Holder claimed Anwar al-Awlaki, who died in Yemen in 2011, had been involved in plots to blow up planes over US soil. Photograph: Yahya Arhab/EPA

    The White House has launched a new effort to draw a line under its controversial drone strike policy by admitting for the first time that four American citizens were among those killed by its covert attacks in Yemen and Pakistan since 2009.

    In a letter to congressional leaders sent on Wednesday, attorney general Eric Holder acknowledged previously classified details of the drone attacks and promised to brief them on a new US doctrine for sanctioning such targeted killings in future.

    Holder claimed one of the US citizens killed, Anwar al-Awlaki, was chief of external operations for al-Qaida in the Arabian Peninsula (Aqap) and had been involved in plots to blow up airplanes over US soil. However, Holder said three others killed by drones – Samir Khan, Abdul Rahman Anwar al-Awlaki and Jude Kenan – were not “specifically targeted”. The second of these victims, Anwar al-Awlaki’s son, is said by campaigners to have been 16 when he died in Yemen in 2011.

    The Bureau of Investigative Journalism estimates that between 240 and 347 people have been killed in total by confirmed US drone strikes in Yemen since 2002, with a further 2,541 to 3,533 killed by CIA drones in Pakistan.

    Amid mounting concern that the policy has harmed US interests overseas, President Obama is expected to give a major speech on his counter-terrorism strategy at the National Defense University in Washington on Thursday, marking the start of a concerted effort to better justify and explain the killings.

    “The president will soon be speaking publicly in greater detail about our counterterrorism operations and the legal and policy framework,” Holder told 22 senior members of Congress in Wednesday’s letter.

    “This week the president approved a document that institutionalises the administration’s exacting standards and processes for reviewing and approving operations to capture or use lethal force against terrorist targets outside the United States and areas of active hostilities.”

    The attorney general said this document would remain classified, but relevant congressional committees would be briefed on its contents. No further details were given of other killings in the five-page letter.

    Earlier, White House spokesman Jay Carney said Obama would also outline his renewed attempt to shut the Guantánamo Bay detention centre in the speech and seek to explain why previous efforts had failed.

    After a week in which Obama has been accused of failing to deal openly with crises such as the the targeting of Tea Party activists by the Internal Revenue Service, the White House hope it can defuse concern over drones and Guantánamo by being more transparent about its objectives.

    Dan Roberts in Washington
    guardian.co.uk, Thursday 23 May 2013 14.20 BST

    Find this story at 23 May 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    The Rendition Project Researching the globalisation of rendition and secret detention

    The Rendition Project website is the product of a collaborative research project between Dr Ruth Blakeley at the University of Kent and Dr Sam Raphael at Kingston University.

    Following the declaration of the ‘war on terror’ in September 2001, the US Government led the way in constructing a global system of detention outside the law, illegal prisoner transfers (rendition), and torture. Overall, this system has involved the detention and torture, in secret, of hundreds of detainees, in scores of detention sites around the world. Renditions between detention sites in a range of countries have been carried out using a variety of aircraft supplied by private contractors, and states allied to the US (including several European states) have been actively involved, or passively complicit, in the crimes committed.

    This website aims to bring together and analyse the huge amount of data that exists about the rendition and secret detention programme, and to provide users with a comprehensive picture of how the system operated, how it evolved over time, and what happened to those subjected to years of illegal detention and torture.

    Working closely with Reprieve, a legal action charity which has led the way in investigating secret prisons and representing victims of rendition and torture, it also aims to provide investigators with new tools in the continuing efforts to uncover where people were held, how they were treated, and who was responsible for the human rights abuses they suffered.

    Using the menu structure at top of each page, it is possible to:
    Explore the issues at stake: learn what rendition and secret detention are, and how they violate international human rights law;
    Read first-hand accounts of being subjected to CIA rendition;
    View key moments in the creation and evolution of the global system of rendition and secret detention;
    Search the Rendition Flights Database and interactive map (the world’s largest compilation of public flight data relating to the rendition programme, providing new insights into the movement of CIA-linked aircraft after 9/11);
    Navigate through the global rendition system, using our extensive and integrated profiles on detainees, aicraft and rendition flights, supported by a huge repository of primary documents which evidence each case;
    Access our large collection of documents, including government memos, court papers, flight data and past investigative reports.

    Our work has been funded by the UK’s Economic and Social Research Council (ESRC), and is accredited under the Global Uncertainties programme. We are also indebted to the team of research assistants who worked on the project throughout 2011-2012, as well as to those other organisations and individuals that have led the way in investigating rendition, representing detainees, and informing the public.

    Find this story at

    Find another map at

     

     

    UK provided more support for CIA rendition flights than thought – study

    The Rendition Project suggests aircraft associated with secret detention operations landed at British airports 1,622 times

    US warplanes at their base in the British territory of Diego Garcia in the Indian Ocean. Photograph: Usaf/AFP

    The UK’s support for the CIA’s global rendition programme after the September 11 terrorist attacks on the US was far more substantial than has previously been recognised, according to a new research project that draws on a vast number of publicly available data and documentation.

    Evidence gathered by The Rendition Project – an interactive website that maps thousands of rendition flights – highlight 1,622 flights in and out of the UK by aircraft now known to have been involved in the agency’s secret kidnap and detention programme.

    While many of those flights may not have been involved in rendition operations, the researchers behind the project have drawn on testimony from detainees, Red Cross reports, courtroom evidence, flight records and invoices to show that at least 144 were entering the UK while suspected of being engaged in rendition operations.

    While the CIA used UK airports for refuelling and overnight stopovers, there is no evidence that any landed in the UK with prisoners on board. This may suggest that the UK government denied permission for this. In some cases, it is unclear whether the airline companies would have been aware of the purpose of the flights.

    Some 51 different UK airports were used by 84 different aircraft that have been linked by researchers to the rendition programme. Only the US and Canada were visited more frequently. The most used UK airport was Luton, followed by Glasgow Prestwick and Stansted. There were also flights in and out of RAF Northolt and RAF Brize Norton.

    The CIA’s use of UK airports was first reported by the Guardian in September 2005. Jack Straw, the then foreign secretary, dismissed the evidence, telling MPs in December that year that “unless we all start to believe in conspiracy theories and that the officials are lying, that I am lying, that behind this there is some kind of secret state which is in league with some dark forces in the United States … there simply is no truth in the claims that the United Kingdom has been involved in rendition.”

    Straw told the same MPs that media reports of UK involvement in the mistreatment of detainees were “in the realms of the fantastic”. Documentation subsequently disclosed in the high court in London showed that Straw had consigned British citizens to Guantánamo Bay in Cuba after they were detained in Afghanistan in 2001.

     

    New light shed on US government’s extraordinary rendition programme

    22 May 2013

    Online project uncovers details of way in which CIA carried out kidnaps and secret detentions following September 11 attacks

    • The Rendition Project interactive
    • CIA rendition flights explained

    22 May 2013

    US rendition map: what it means, and how to use it

    22 May 2013

    US rendition: every suspected flight mapped

    21 May 2013

    Abdel Hakim Belhaj torture case may be heard in secret court

    UK funds poll in Pakistan on US drone attacks

    18 May 2013

    Foreign Office sponsored surveys investigating impact of CIA drone campaign in Pakistan, minister Alistair Burt tells MPs

    Ian Cobain and James Ball
    The Guardian, Wednesday 22 May 2013 12.02 BST

    Find this story at 22 May 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Why isn’t New Orleans Mother’s Day parade shooting a ‘national tragedy’?

    The media seems to forget about New Orleans and any place that the middle class can’t easily relate to

    On 3 September 2005 – less than a week after Hurricane Katrina devastated the Gulf Coast – I began to understand that America cared little about what was happening in New Orleans.

    I was an undergraduate at Davidson College in North Carolina at the time, worried out of my mind because my family in Mississippi was still without electricity and friends and family in New Orleans and the Mississippi Gulf Coast were still missing. The images of families stranded on rooftops were trickling in via news outlets, but it was obvious that the response from the government would be slow.

    But it really hit me on 3 September. I was driving around and noticed all the American flags at half-mast. Because Supreme court chief justice William Rehnquist died.

    At the time, the Gulf Coast death toll was rumored to be in the thousands with nobody knowing for sure. But flags stayed at full mast until a chief justice died. To me, this was a slap in the face to what was going on in New Orleans and a sign that the city just didn’t matter to the overall fabric of the country.

    Year after year, I watched the anniversary for Katrina pass while people gathered around flagpoles two weeks later to mourn the deaths from 9/11. Both were horrible tragedies, but only one seemed to stay in the nation’s consciousness.

    Years after Katrina, I lived in Evanston, Illinois and learned about the warm weather massacres in Chicago that happen every spring break or beginning of summer where dozens of high school kids get shot within matters of hours. And how nobody seemed to care. Living in New Orleans and near Chicago has left me jaded to what America prioritizes or chooses to ignore.

    So I shouldn’t be surprised that the Mother’s Day Parade shooting has largely been forgotten. On Sunday, shots were fired into a crowd during a parade in the New Orleans 7th ward. Police said they saw three suspects running from the scene.

    This is the largest mass shooting in the United States where the shooters were still at large after the crime was committed. Think about that for a minute. From Columbine to Virginia Tech to Fort Hill to Aurora, all the shooters were either killed or apprehended on site. But the person or people responsible for shooting 19 Americans are still free.

    So why am I allowed to go outside? Where’s the city quarantine or FBI and Homeland Security presence for this act of “terrorism”?

    Because this is an act of domestic terrorism right? Just because the alleged shooter was wearing a white tee and jeans does that suddenly make the shooting a gang-related affair? And we all know how irrelevant gang-related shootings are in America. The Mother’s Day shooting is so irrelevant that politicians haven’t even bothered to mention it to further their anti-gun agendas. If the shootings aren’t even important enough for politicians to spin, then it’s truly reached a black hole of irrelevance.

    Did I mention the shooter is still on the loose? I have? Just checking. Police have released photos and video of one of the suspects, but he is still at large.

    Now take a moment and imagine a Mother’s Day Parade in the suburbs of Denver, a neighborhood in Edina or a plaza in Austin where bullets rain down on civilians and even hit children. I can’t help but imagine the around-the-clock news coverage. And I can’t help but think it’s because most of America can identify with the fear of being bombarded with gunfire while just enjoying a parade in the middle of town. But America can’t identify with being at a parade in the “inner city” where “gang violence” erupts. The “oh my God, that could happen to me” factor isn’t present with a story about New Orleans or the Chicago southside.

    But no matter where the incident occurred, the victims are still there. Victims like 10-year-old Ka’Nard Allen whose father was stabbed to death in October. Whose five-year-old cousin was shot to death at Ka’Nard’s birthday party last May (Ka’Nard was also shot in the neck that day). He was also grazed with a bullet in his cheek at the Mother’s Day parade. No matter what part of the country Ka’Nard is from, his story should linger in your heart.

    David Dennis
    guardian.co.uk, Wednesday 15 May 2013 17.51 BST

    Find this story at 15 May 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    << oudere artikelen  nieuwere artikelen >>