Wednesday, December 31, 2008

Electtronic Intifada, March 2008: Revealed: The US Plan to start a Palestinian civil war

Revealed: the US plan to start a Palestinian civil war
Report, The Electronic Intifada, 4 March 2008

Muhammad Dahlan speaks during a Fatah rally in the West Bank town of Ramallah, 15 January 2006. (Mushir Abdelrahman/MaanImages)

United States officials including President George W. Bush and Secretary of State Condoleezza Rice participated in a conspiracy to arm and train Contra-style Palestinian militias nominally loyal to the Fatah party to overthrow the democratically-elected Hamas government in the Occupied Palestinian Territories, an investigative article in the April 2008 issue of Vanity Fair has revealed. [1]

The allegations of such a conspiracy, long reported by The Electronic Intifada, are corroborated in Vanity Fair with confidential US government documents, interviews with former US officials, Israeli officials and with Muhammad Dahlan, the Gaza strongman personally chosen by Bush.

The article, by David Rose, recounts gruesome torture documented on videotape of Hamas members by the US-armed and funded militias under Dahlan's control. Hamas had repeatedly alleged such torture as part of its justification for its move to overthrow the Dahlan militias and take full control of the interior of the Gaza Strip in June 2007.

Vanity Fair reported that it has "obtained confidential documents, since corroborated by sources in the US and Palestine, which lay bare a covert initiative, approved by Bush and implemented by Secretary of State Condoleezza Rice and Deputy National Security Adviser Elliott Abrams to provoke a Palestinian civil war." The magazine adds that the plan "was for forces led by Dahlan, and armed with new weapons supplied at America's behest, to give Fatah the muscle it needed to remove the democratically-elected Hamas-led government from power."

Abrams was one of the key Reagan administration figures involved in the Iran-Contra scandal in the 1980s, whereby the US illegally armed militias in Nicaragua to overthrow the ruling Sandinista government. Abrams was convicted and later pardoned for lying to Congress.

While it has been known that the US engaged in covert activity to subvert Palestinian democracy and provoke Palestinians to shed each other's blood, the extent of the personal involvement of top US officials in attempting to dictate the course of events in Palestine -- while publicly preaching democracy -- has only now been brought to light.

Muhammad Dahlan's 13 July 2003 letter to then Israeli defense minister Shaul Mofaz.

Bush met and personally anointed Dahlan as "our guy" in 2003. In July 2007, The Electronic Intifada reported on a leaked letter written by Dahlan and sent to the Israeli defense minister in which he confirmed his role in a conspiracy to overthrow then Palestinian Authority President Yasser Arafat for whose replacement Bush had publicly called. Dahlan wrote: "Be certain that Yasser Arafat's final days are numbered, but allow us to finish him off our way, not yours. And be sure as well that ... the promises I made in front of President Bush, I will give my life to keep."

The US planning to overthrow the government elected by Palestinians under occupation began immediately after the Hamas movement won a clear victory in the January 2006 election for the Palestinian Legislative Council. Hamas, however, proved "surprising resilient."

At a meeting at Abbas' Ramallah headquarters in October 2006, Rice personally ordered Abbas to dissolve the government headed by Hamas' Ismail Haniyeh "within two weeks" and replace it with an unelected "emergency government."

When Abbas failed to act promptly on Rice's order, the US stepped up its efforts to arm Dahlan in preparation for the attempted coup. Hamas foiled the coup plot by moving preemptively against Dahlan's gangs, many of whom refused to fight despite being furnished with tens of millions of dollars in weapons and training. The US-conceived "emergency government" headed by a former World Bank official, Salam Fayyad, was eventually appointed by Abbas, but its authority is limited to parts of the Israeli-occupied West Bank.

While the United States and Israel were the driving forces behind the civil war and coup plot, others had a hand including several Arab states and their intelligence services. "The scheme," Rose writes, "bore some resemblance to the Iran-contra scandal" in that "some of the money for the [Nicaraguan] contras, like that for Fatah, was furnished by Arab allies as a result of US lobbying."

[1] "The Gaza Bombshell," Vanity Fair, April 2008, (

Related Links:
Politics of fear, Osamah Khalil (8 October 2007)
Overcoming the conspiracy against Palestine, Ali Abunimah (18 July 2007)
Subverting democracy, Joseph Massad (4 July 2007)
A setback for the Bush doctrine in Gaza, Ali Abunimah, (14 June 2007)
Palestinian Pinochet Making His Move?, Tony Karon, (21 May 2007)
The American proxy war in Gaza, Ali Abunimah (3 February 2007)
Who is Mohammad Dahlan?, Arjan El Fassed (20 December 2006)
Pinochet in Palestine, Joseph Massad (11 November 2006)

Tuesday, December 30, 2008

In Pictures: Massacre of Gazan Children

Israel massacres a captive population and there's no high official in the US or any Western Country who demurs.
It's a testament to Jewish power.

Tuesday, December 23, 2008

NYT: Bush Insider Who Planned To Tell All Killed In Plane Crash

Bush Insider Who Planned To Tell All Killed In Plane Crash: Non-Profit Demands Full Federal Investigation
New York Times, Business section
Published: December 20, 2008

WASHINGTON, Dec. 20 /PRNewswire-USNewswire/ -- Michael Connell, the Bush IT expert who has been directly implicated in the rigging of George Bush's 2000 and 2004 elections, was killed last night when his single engine plane crashed three miles short of the Akron airport. Velvet Revolution ("VR"), a non-profit that has been investigating Mr. Connell's activities for the past two years, can now reveal that a person close to Mr. Connell has recently been discussing with a VR investigator how he can tell all about his work for George Bush. Mr. Connell told a close associate that he was afraid that George Bush and Dick Cheney would "throw [him] under the bus."

A tipster close to the McCain campaign disclosed to VR in July that Mr. Connell's life was in jeopardy and that Karl Rove had threatened him and his wife, Heather. VR's attorney, Cliff Arnebeck, notified the United States Attorney General , Ohio law enforcement and the federal court about these threats and insisted that Mr. Connell be placed in protective custody. VR also told a close associate of Mr. Connell's not to fly his plane because of another tip that the plane could be sabotaged. Mr. Connell, a very experienced pilot, has had to abandon at least two flights in the past two months because of suspicious problems with his plane. On December 18, 2008, Mr. Connell flew to a small airport outside of Washington DC to meet some people. It was on his return flight the next day that he crashed.

On October 31, Mr. Connell appeared before a federal judge in Ohio after being subpoenaed in a federal lawsuit investigating the rigging of the 2004 election under the direction of Karl Rove. The judge ordered Mr. Connell to testify under oath at a deposition on November 3rd, the day before the presidential election. Velvet Revolution received confidential information that the White House was extremely concerned about Mr. Connell talking about his illegal work for the White House and two Bush/Cheney 04 attorneys were dispatched to represent him.

An associate of Mr. Connell's told VR that Mr. Connell was involved with the destruction of the White House emails and the setting up of the off-grid White House email system.

Mr. Connell handled all of John McCain's computer work in the recent presidential campaign. VR has received direct evidence that the McCain campaign kept abreast of the legal developments against Mr. Connell by reading the VR dedicated website,

VR demands that the Ohio Attorney General and the United States Justice Department conduct a complete investigation into the activities of Mr. Connell and determine whether there was any foul play in his death. VR demands that federal law enforcement officials place the following people under protective custody pending this investigation. Heather Connell who

is the owner of GovTech Solutions, Randy Cole, the former President of GovTech Solutions, and Jeff Averbeck, the CEO of SmartTech in Chattanooga, Tennessee. Both GovTech and SmartTech have been implicated in the rigging of the 2000 and 2004 elections and the White House email scandal. Our prior request to have Mr. Connell protected went unheeded and now he is dead.

SOURCE Velvet Revolution

Tuesday, December 9, 2008

New York Times: Situation in Somalis Getting Worse: Bush-Cheney play decisive role

Situation in Somalia Seems About to Get Worse -- December 7, 2008, By JEFFREY GETTLEMAN

Ronald Bleier writes:

You won't have to read too deeply between the lines to see Cheney's hand in the current and future chaos that is the fate of the suffering 9 million people of Somalia. Here's a quote which bespeaks the success of the Cheney agenda:

“Somalia has now reached a very dangerous phase,” [Rasid Ali, a Somalia analyst the International Crisis Group] said. “The whole region is in for more chaos, I’m afraid.”

When the Islamists ruled Somalia for about 6 months in 2006 there was relative peace.

But today’s Islamists are a harder, more brutal group than the ones who were ousted by an Ethiopian invasion, backed by the United States, in late 2006. The old guard included many moderates, but those who tried to work with the transitional government mostly failed, leaving them weak and marginalized, and removing a mitigating influence on the die-hard insurgents."

Gettleman emphasizes that the current situation is the responsibility of the U.S.

A collapse of the government and the human disaster that would almost surely follow would be strike three for American efforts in Somalia.... In 2005 and 2006, the C.I.A. paid some of Somalia’s most reviled warlords to fight the Islamists. That backfired. In the winter of 2006, the United States took a third approach, encouraging Ethiopia to invade and backing them with American airstrikes and intelligence. “The Bush administration made a major miscalculation,” said Dan Connell, who teaches African politics at Simmons College in Boston.

Yes, miscalculation is the word that is allowed. As the article points out the current situation is leading to rise of the most vicious and fundamentalist forces in the country to come to the top. Earlier in the article Gettlemen mentions a 13 year girl who was stoned to death by these characters. Does the rise of such ruthless fundamentalism remind us of Afghanistan? Where else? The US in the last 8 years? Is it miscalculation or calculation?

December 7, 2008
News Analysis
Situation in Somalia Seems About to Get Worse

NAIROBI, Kenya — Somalia’s transitional government looks as if it is about to flatline. The Ethiopians who have been keeping it alive for two years say they are leaving the country, essentially pulling the plug.

For the past 17 years, Somalia has been ripped apart by anarchy, violence, famine and greed. It seems as though things there can never get worse. But then they do.

The pirates off Somalia’s coast are getting bolder, wilier and somehow richer, despite an armada of Western naval ships hot on their trail. Shipments of emergency food aid are barely keeping much of Somalia’s population of nine million from starving. The most fanatical wing of Somalia’s Islamist insurgency is gobbling up territory and imposing its own harsh brand of Islamic law, like whipping dancers and stoning a 13-year-old girl to death.

And now, with the government on the brink and the Islamists seeming ready to seize control for the second time, the operative question inside and outside Somalia seems to be: Now what?

“It will be bloody,” predicted Rashid Abdi, a Somalia analyst at the International Crisis Group, a research institute that tracks conflicts worldwide. “The Ethiopians have decided to let the transitional government sink. The chaos will spread from the south to the north. Warlordism will be back.”

Mr. Rashid sees Somalia deteriorating into an Afghanistan-like cauldron of militant Islamism, drawing in hard-core fighters from the Comoros, Zanzibar, Kenya and other neighboring Islamic areas, a process that seems to have already started. Those men will eventually go home, spreading the killer ethos.

“Somalia has now reached a very dangerous phase,” he said. “The whole region is in for more chaos, I’m afraid.”

Most informed predictions go something like this: if the several thousand Ethiopian troops withdraw by January, as they recently said they would, the 3,000 or so African Union peacekeepers in Somalia could soon follow, leaving Somalia wide open to the Islamist insurgents who have been massing on the outskirts of Mogadishu, the capital.

The transitional government, which in reality controls only a few city blocks of the entire country, will collapse, just as the 13 previous transitional governments did. The only reason it has not happened yet is the Ethiopians.

The government has been a mess for the past few weeks — many would argue for the past few years — with the president and the prime minister bitterly and publicly blaming each other for the country’s crisis. More than 100 of the 275 members of Parliament are in Kenya, refusing to go home, saying they will be killed.

Western diplomats, United Nations officials and the Ethiopians seem to be turning against the transitional president, Abdullahi Yusuf Ahmed, a cantankerous former warlord in his 70s who has thwarted just about every peace proposal.

“Yusuf has gone from being seen as the solution to being seen as the problem,” said a senior Western diplomat in Kenya, speaking on condition of anonymity in accord with diplomatic protocol.

But Mr. Yusuf’s clan still backs him, and Western diplomats said he might soon flee to his clan stronghold in northeast Somalia.

Most analysts predict that the war-weary people of Mogadishu would initially welcome the Islamists, out of either relief or fear. In 2006, Islamist troops teamed up with clan elders and businessmen to drive out the warlords who had been preying upon Somalia’s people since the central government first collapsed in 1991. The six months the Islamists ruled Mogadishu turned out to be one of the most peaceful periods in modern Somali history.

But today’s Islamists are a harder, more brutal group than the ones who were ousted by an Ethiopian invasion, backed by the United States, in late 2006. The old guard included many moderates, but those who tried to work with the transitional government mostly failed, leaving them weak and marginalized, and removing a mitigating influence on the die-hard insurgents.

On top of that, the unpopular and bloody Ethiopian military operations over the past two years have radicalized many Somalis and sent hundreds of unemployed young men — most of whom have never gone to school, never been part of a functioning society and never had much of a chance to do anything but shoulder a gun — into the arms of militant Islamic groups.

The most militant group is the Shabab, a multiclan insurgent force that the United States classifies as a terrorist organization. Just a few weeks ago, the Shabab kidnapped a man it accused of being a spy and slowly sawed off his head with a dull knife, videotaping the whole episode.

Somalia is nearly 100 percent Muslim, but most Somalis are moderate Muslims. Many analysts expect that the militant Islamic wave will soon crest because Somalis will inevitably chafe under strict Islamist law, especially when the Islamists try to take away their beloved khat, the ubiquitous, mildly stimulating leaf that Somalis chew like bubble gum.

Then, many analysts say, the Islamist groups could slug it out among themselves, with Ethiopia and other neighboring countries backing rival factions, and with clan warlords jumping in. Osman Mohamed Abdi, vice chairman of the Somali Youth Development Network, a nonprofit group in Mogadishu, called this possibility the “worst man-made catastrophe.”

Two possibilities could avert this bloodbath, but both are long shots.

Ethiopia could delay its pullout until a larger peacekeeping force arrived. But with both Darfur and now Congo needing peacekeepers, there are few volunteers for lawless Somalia.

Or the transitional government could share power with the Islamists. There is a piece of paper called the Djibouti Agreement, recently signed in neighboring Djibouti, that paves the way for moderate Islamists to join the transitional government.

But the problem with the Djibouti Agreement, Mr. Rashid of the International Crisis Group said, is that “the interlocutors have no power on the ground.”

A collapse of the government and the human disaster that would almost surely follow would be strike three for American efforts in Somalia.

The United States failed disastrously in its peacekeeping mission in the early 1990s. (Remember “Black Hawk Down”?) In 2005 and 2006, the C.I.A. paid some of Somalia’s most reviled warlords to fight the Islamists. That backfired. In the winter of 2006, the United States took a third approach, encouraging Ethiopia to invade and backing them with American airstrikes and intelligence.

“The Bush administration made a major miscalculation,” said Dan Connell, who teaches African politics at Simmons College in Boston.

He compared the situation to America’s involvement in Lebanon in the 1980s, “when a regional ally, Israel, pulled us into a failed state in a quixotic effort to transform a hostile neighbor into a pliant ally.”

That only radicalized the population, he said, adding that in Somalia, “Again, we will be in its sights.”

Copyright 2008 The New York Times Company
Privacy Policy Search Corrections RSS First Look Help Contact Us Work for Us Site Map

Wednesday, December 3, 2008

Michel Chossudovsky: India's 9/11. Who was Behind the Mumbai Attacks? Washington is Fostering Political Divisions between India and Pakistan

Note: For the sake of brevity, I left out the first few contextual paragraphs. The rest is too good and too important to skip. --RB

Michel Chossodovsky
India's 9/11. Who was Behind the Mumbai Attacks? Washington is Fostering Political Divisions between India and Pakistan

"Clash of Civilizations"

In Europe and North America, the Mumbai attacks by Islamic fundamentalists are perceived as part of the "Clash of Civilizations". "Militant Islam is involved in a war against civilization".

The dramatic loss of lives resulting from the attacks has indelibly contributed to reinforcing anti-Muslim sentiment throughout the Western World.

The outlines of the terrorist attacks in Mumbai, India, are becoming clear. The terrorists targeted India, the U.S. and Britain, and the Jewish people. (Market Watch, November 28, 2008)

According to the media, the enemy is Al Qaeda, the illusory "outside enemy " which has its operational bases in the tribal areas and North West Frontier Province of Pakistan. Washington's self-proclaimed holy mandate under the "Global War on Terrorism" is to take out bin Laden and extirpate Islamic fundamentalism.

America's right to intervene militarily inside Pakistan in violation of Pakistan's sovereignty is therefore upheld. Bombing villages in the tribal areas of North West Pakistan is part of a "humanitarian endeavor", in response to the loss of life resulting from the Mumbai attacks:

"Before these awful raids, news from South Asia had been encouraging. The central problem remains pacifying Afghanistan, where U.S. and other NATO forces struggle to stamp out Taliban and al-Qaeda elements." (Washington Post, November 28, 2008)

"Washington, however, wants the Pakistani army's cooperation in fighting terrorism. In recent weeks, U.S. officers in Afghanistan reported better results, crediting the Pakistanis with taking the offensive against the Taliban on Pakistani territory."

Media Disinformation

US network TV has extensively covered the dramatic events in Mumbai. The attacks have served to trigger an atmosphere of fear and intimidation across America.

The Mumbai attacks are said to be intimately related to 9/11. Official US statements and media reports have described the Mumbai attacks as part of a broader process, including the possibility of an Al Qaeda sponsored terrorist attack on US soil.

Vice President Elect Joe Biden during the election campaign had warned America with foresight that "the people who... attacked us on 9/11, -- they've regrouped in the mountains between Afghanistan and Pakistan and are plotting new attacks". (emphasis added)

These are the same people who were behind the terror attacks in Mumbai.

These are also the same people who are planning to attack America.

Immediately following the Mumbai attacks, New York Mayor Michael Bloomberg put New York City's subway system "on high alert" based on "an unsubstantiated report of potential terrorism here in New York. This report led the New York Police Department to take precautionary steps to protect our transit system, and we will always do whatever is necessary to keep our city safe," Bloomberg said in a statement" (McClatchy-Tribune Business News, November 28, 2008, emphasis added).

It just so happens that one day before the Mumbai attacks, "the FBI and the Department of Homeland Security (DHS) had warned that there is a 'possible but uncorroborated' Al -Qaeda threat against the New York transportation system." (Ibid)

"As the attacks in Mumbai were carried out, U.S. authorities issued a warning that Al-Qaeda might have recently discussed making attacks on the New York subway system. A vague warning, to be sure. 'We have no specific details to confirm that this plot has developed beyond aspirational planning, but we are issuing this warning out of concern that such an attack could possibly be conducted during the forthcoming holiday season,' the FBI and Department of Homeland Security said." (Chicago Tribune, November 29, 2008)

Pakistan's Military Intelligence is America's Trojan Horse

The media reports point, in chorus, to the involvement of Pakistan's Military Intelligence, the Inter Services Intelligence (ISI), without mentioning that the ISI invariably operates in close liaison with the CIA.

The US media indelibly serves the interests of the US intelligence apparatus. What is implied by these distorted media is that:

1. The terrorists are linked to Al Qaeda. The Mumbai attacks are a "State sponsored" operation involving Pakistan's ISI

2. The Mumbai gunmen have ties to terrorist groups in Pakistan's tribal areas and North West Frontier Province.

3. The continued bombing of the tribal areas by the US Air Force in violation of Pakistan's' sovereignty is consequently justified as part of the "Global War on Terrorism".

The ISI is America's Trojan Horse, a de facto proxy of the CIA. Pakistani Intelligence has, since the early 1980s, worked in close liaison with its US and British intelligence counterparts.

Were the ISI to have been involved in a major covert operation directed against India, the CIA would have prior knowledge regarding the precise nature and timing of the operation. The ISI does not act without the consent of its US intelligence counterpart.

Moreover, US intelligence is known to have supported Al Qaeda from the outset of the Soviet Afghan war and throughout the post-Cold War era. (For further details see Michel Chossudovsky, Al Qaeda and the War on Terrorism, Global Research, January 20, 2008)

CIA sponsored guerilla training camps were established in Pakistan to train the Mujahideen. Historically, US intelligence has supported Al Qaeda, using Pakistan's ISI as a go-between.

"With CIA backing and the funneling of massive amounts of U.S. military aid, the Pakistani ISI had developed into a "parallel structure wielding enormous power over all aspects of government". (Dipankar Banerjee, "Possible Connection of ISI With Drug Industry", India Abroad, 2 December 1994).

In the wake of 9/11, Pakistan's ISI played a key role in the October 2001 invasion of Afghanistan, in close liaison with the US and NATO military high command. Ironically, in October 2001, both US and Indian press reports quoting FBI and intelligence sources, suggested that the ISI was providing support to the alleged 9/11 terrorists.(See Michel Chossudovsky, Cover-up or Complicity of the Bush Administration, The Role of Pakistan's Military Intelligence (ISI) in the September 11 Attacks, Global Research, November 2, 2001)

Pakistan's Chief Spy Appointed by the CIA

Historically, the CIA has played an unofficial role in the appointment of the director of Pakistan's Inter Services Intelligence (ISI).

In September, Washington pressured Islamabad, using the "war on terrorism" as a pretext to fire the ISI chief Lieutenant General Nadeem Taj.

"Washington is understood to be exerting intense pressure on Pakistan to remove ISI boss Nadeem Taj and two of his deputies because of the key agency's alleged "double-dealing" with the militants.( Daily Times, September 30, 2008

President Asif Ali Zardari had meetings in New York in late September with CIA Director Michael Hayden. (The Australian, September 29, 2008), Barely a few days later, a new US approved ISI chief Lieutenant General Ahmed Shuja Pasha was appointed by the Chief of the Army, General Kayani, on behalf of Washington.

Lt. General Ahmed Shuja Pasha

In this regard, the pressures exerted by the Bush administration contributed to blocking a parliamentary initiative led by the PPP government to put the country's intelligence services (ISI) under civilian authority, namely under the jurisdiction of the Ministry of Interior.

In other words, Washington exerts more control over the ISI than the duly elected civilian government of Pakistan.

Lt. Gen. Ahmed Shuja Pasha (right) next to Gen. Ashfaq Kayani on the USS Abraham Lincoln talking with Michael Mullen, Chairman of the Joint Chiefs of Staff.

The U.S. Violates Pakistan's Territorial Sovereignty

The US is currently violating Pakistan territorial sovereignty through the routine bombing of villages in the tribal areas and the North West Frontier Province. These operations are carried out using the "war on terrorism" as a pretext. While the Pakistani government has "officially" accused the US of waging aerial bombardments on its territory, Pakistan's military (including the ISI) has "unofficially" endorsed the air strikes.

In this regard, the timely appointment of Lt. General Ahmed Shuja Pasha to the helm of the ISI was intended to ensure continuity in US "counter-terrorism" operations in Pakistan. Prior to his appointment as ISI chief, Lt. General Ahmed Shuja Pasha was responsible, in close consultation with the US and NATO, for carrying out targeted attacks allegedly against the Taliban and Al Qaeda by the Pakistani military in the Federally Administered Tribal Areas (FATA) and the North-West Frontier Province (NWFP).

Upon his appointment, Lt Gen Ahmed Shuja Pasha implemented a major reshuffle within the Inter-Services Intelligence (ISI), replacing several of the ISI regional commanders. ( Daily Times, September 30, 2008). In late October, he was in Washington, at CIA headquarters at Langley and at the Pentagon, to meet his US military and intelligence counterparts:

"Pakistan is publicly complaining about U.S. air strikes. But the country's new chief of intelligence, Lt. Gen. Ahmed Shuja Pasha, visited Washington last week for talks with America's top military and spy chiefs, and everyone seemed to come away smiling." (David Ignatieff, A Quiet Deal With Pakistan, Washington Post, November 4, 2008, emphasis added).

The Timing of the Mumbai Attacks

The US air strikes on the Tribal Areas resulting in countless civilians deaths have created a wave of anti-US sentiment throughout Pakistan. At the same token, this anti-American sentiment has also served, in the months preceding the Mumbai attacks, to promote a renewed atmosphere of cooperation between India and Pakistan.

While US-Pakistan relations are at an all time low, there were significant efforts, in recent months, by the Islamabad and Delhi governments to foster bilateral relations.

Barely a week prior to the attacks, Pakistan president Asif Ali Zardari "urged opening the Kashmir issue to public debate in India and Pakistan and letting the people decide the future of IHK."

He also called for "taking bilateral relations to a new level" as well as forging an economic union between the two countries.

Divide and Rule

What interests are served by these attacks?

Washington is intent on using the Mumbai attacks to:

1) Foster divisions between Pakistan and India and shunt the process of bilateral cooperation and trade between the two countries;

2) Promote internal social, ethnic and sectarian divisions in both India and Pakistan;

3) Justify US military actions inside Pakistan including the killing of civilians in violation of the country's territorial sovereignty;

4) Provide a justification for extending the US led "war on terrorism" into the Indian sub-continent and South East Asia.

In 2006, the Pentagon had warned that "another [major 9/11 type terrorist] attack could create both a justification and an opportunity that is lacking today to retaliate against some known targets" (Statement by Pentagon official, leaked to the Washington Post, 23 April 2006). In the current context, the Mumbai attacks are considered "a justification" to go after "known targets" in the tribal areas of North Western Pakistan.

India's Prime Minister Manmohan Singh has stated that "external forces" forces carried the attacks, hinting to the possible role of Pakistan. The media reports also point in that direction, hinting that the Pakistani government is behind the attacks:

US officials and lawmakers refrained from naming Pakistan, but their condemnation of "Islamist terrorism" left little doubt where their anxieties lay.


What has added potency to the latest charges against Islamabad is the Bush administration's own assessment - leaked to the US media - that Pakistan's intelligence agency ISI was linked to the bombing of the Indian Embassy in Kabul some weeks back that killed nearly 60 people including a much-admired Indian diplomat and a respected senior defense official. (Times of India, November 27, 2008)

The Attacks have Triggered Anti-Pakistani Sentiment in India

The attacks have served to foster anti-Pakistani sentiment within India as well as sectarian divisions between Hindus and Muslims.

Time Magazine has pointed in no uncertain terms to the insidious role of "the powerful Inter Services Intelligence organization — often accused of orchestrating terror attacks on India", without acknowledging that the new head of the ISI was appointed at Washington's behest. (Time online).

The Time report suggests, without evidence, that the most likely architects of the attacks are several Pakistani sponsored Islamic groups including Lashkar-e-Taiba (Army of the Pure), "which is part of the 'al-Qaeda compact'", Jaish-e-Mohammed, a Kashmiri separatist organization belonging to Al Qaeda which claimed responsibility in the December 2001 terrorist attacks on the Union parliament in Delhi and The Students Islamic Movement of India, (SIMI). (Ibid)

Both Lashkar-e-Taiba and Jaish-e-Mohammed are known to be supported by the ISI.

Islamabad-Delhi Shuttle Diplomacy

Pakistani president Asif Ali Zardari indicated that his government would fully collaborate with the Indian authorities.

Pakistan's newly elected civilian government has been sidetracked by its own intelligence services, which remain under the jurisdiction of the military high command.

The Pakistan's People's Party government under the helm of Prime Minister Yousaf Raza Gilani has no control over the military and intelligence apparatus, which continues to maintain a close rapport with its US counterparts. The Pakistani civilian government, in many regards, is not in control of its foreign policy. The Pakistani Military and its powerful intelligence arm (ISI) call the shots.

In this context, president Asif Ali Zardari seems to be playing on both sides: collusion with the Military-Intelligence apparatus, dialogue with Washington and lip service to prime minister Gilani and the National Assembly.

On November 28, two days following the Mumbai attacks, Islamabad announced that the recently appointed ISI chief Lieutenant General Ahmed Shuja Pasha would be dispatched to Delhi for consultations with his Indian counterparts including National Security Advisor M K Narayanan and the heads of India's external intelligence agency, the Research and Analysis Wing (RAW) and the Intelligence Bureau, responsible for internal intelligence. RAW and Pakistan's ISI are known to have been waging a covert war against one another for more than thirty years.1

On the following day (November 29), Islamabad cancelled the visit of ISI chief Lt Gen Shuja Pasha to India, following Indian foreign minister Pranab Mukherjee's "very aggressive tone with Pakistani officials [in a] telephone [conversation] after the Mumbai attacks". (Press Trust of India, November 29, 2008 quoting Geo News Pakistan).

Tense Situation. Deterioration of India-Pakistan Relations

The Mumbai attacks have already created an extremely tense situation, which largely serves US geopolitical interests in the region.

Islamabad is contemplating the relocation of some 100,000 military personnel from the Pakistani-Afghan border to the Indian border, "if there is an escalation in tension with India, which has hinted at the involvement of Pakistani elements in the Mumbai carnage." (Pakistan news source quoted by PTI, op cit).

"These sources have said NATO and the US command have been told that Pakistan would not be able to concentrate on the war on terror and against militants around the Afghanistan border as defending its borders with India was far more important," (Ibid, Geo News quoting senior Pakistani journalist Hamid Mir).

US Interference in the Conduct of the Indian Police Investigation

Also of significance is Washington's outright interference in the conduct of the Indian police investigation. The Times of India points to an "unprecedented intelligence cooperation involving investigating agencies and spy outfits of India, United States, United Kingdom and Israel."

Both the FBI and Britain's Secret Service MI6 have liaison offices in Delhi. The FBI has dispatched police, counter-terrorism officials and forensic scientists to Mumbai "to investigate attacks that now include American victims..." Experts from the London's Metropolitan Police have also been dispatched to Mumbai:

"The U.S. government's "working assumption" that the Pakistani militant groups Lashkar-e-Taiba and Jaish-e-Mohammed are suspects in the attacks "has held up" as Indian authorities have begun their investigation, the official said. The two Kashmiri militant groups have ties to al Qaeda." (Wall Street Journal, November 28, 2008)

The role of the US-UK-Israeli counter terrorism and police officials, is essentially to manipulate the results of the Indian police investigation.

It is worth noting, however, that the Delhi government turned down Israel's request to send a special forces military unit to assist the Indian commandos in freeing Jewish hostages held inside Mumbai's Chabad Jewish Center (PTI, November 28, 2008).

Bali 2002 versus Mumbai 2008

The Mumbai terrorist attacks bear certain similarities to the 2002 Bali attacks. In both cases, Western tourists were targets. The tourist resort of Kuta on the island of Bali, Indonesia, was the object of two separate attacks, which targeted mainly Australian tourists. (Ibid)

The alleged terrorists in the Bali 2002 bombings were executed, following a lengthy trial period, barely a few weeks ago, on November 9, 2008. (Michel Chossudovsky, Miscarriage of Justice: Who was behind the October 2002 Bali bombings? Global Research, November 13, 2009). The political architects of the 2002 Bali attacks were never brought to trial.

A November 2002 report emanating from Indonesia’s top brass, pointed to the involvement of both the head of Indonesian intelligence General A. M. Hendropriyono as well as the CIA. The links of Jemaah Islamiyah (JI) to the Indonesian intelligence agency (BIN) were never raised in the official Indonesian government investigation --which was guided behind the scenes by Australian intelligence and the CIA. Moreover, shortly after the bombing, Australian Prime Minister John Howard "admitted that Australian authorities were warned about possible attacks in Bali but chose not to issue a warning." (Christchurch Press, November 22, 2002).

With regard to the Bali 2002 bombings, the statements of two former presidents of Indonesia were casually dismissed in the trial procedures, both of which pointed to complicity of the Indonesian military and police. In 2002, president Megawati Sukarnoputri, accused the US of involvement in the attacks. In 2005, in an October 2005 interview with Australia's SBS TV, former president Wahid Abdurrahman stated that the Indonesian military and police played a complicit role in the 2002 Bali bombing. (quoted in Miscarriage of Justice: Who was behind the October 2002 Bali bombings?, op cit)


1. In recent months, the head of India's external intelligence (RAW), Ashok Chaturvedi has become a political target. Prime Minister Manmohan Singh is intent upon firing him and replacing him with a more acceptable individual. It is unclear whether Chaturvedi will be involved in the intelligence and police investigation.

Saturday, November 22, 2008

Christopher Ketcham: An Israeli Trojan Horse: (Virtually all) US Telecommunications Monitored by the Mossad

Weekend Edition
September 27 / 28, 2008
How Israeli Backdoor Technology Penetrated the U.S. Government's Telecom System and Compromised National Security
An Israeli Trojan Horse



Since the late 1990s, federal agents have reported systemic communications security breaches at the Department of Justice, FBI, DEA, the State Department, and the White House. Several of the alleged breaches, these agents say, can be traced to two hi-tech communications companies, Verint Inc. (formerly Comverse Infosys), and Amdocs Ltd., that respectively provide major wiretap and phone billing/record-keeping software contracts for the U.S. government. Together, Verint and Amdocs form part of the backbone of the government’s domestic intelligence surveillance technology. Both companies are based in Israel – having arisen to prominence from that country’s cornering of the information technology market – and are heavily funded by the Israeli government, with connections to the Israeli military and Israeli intelligence (both companies have a long history of board memberships dominated by current and former Israeli military and intelligence officers). Verint is considered the world leader in “electronic interception” and hence an ideal private sector candidate for wiretap outsourcing. Amdocs is the world’s largest billing service for telecommunications, with some $2.8 billion in revenues in 2007, offices worldwide, and clients that include the top 25 phone companies in the United States that together handle 90 percent of all call traffic among U.S. residents. The companies’ operations, sources suggest, have been infiltrated by freelance spies exploiting encrypted trapdoors in Verint/Amdocs technology and gathering data on Americans for transfer to Israeli intelligence and other willing customers (particularly organized crime). “The fact of the vulnerability of our telecom backbone is indisputable,” says a high level U.S. intelligence officer who has monitored the fears among federal agents. “How it came to pass, why nothing has been done, who has done what – these are the incendiary questions.” If the allegations are true, the electronic communications gathered up by the NSA and other U.S. intelligence agencies might be falling into the hands of a foreign government. Reviewing the available evidence, Robert David Steele, a former CIA case officer and today one of the foremost international proponents for “public intelligence in the public interest,” tells me that “Israeli penetration of the entire US telecommunications system means that NSA's warrantless wiretapping actually means Israeli warrantless wiretapping.”

As early as 1999, the National Security Agency issued a warning that records of U.S. government telephone calls were ending up in foreign hands – Israel’s, in particular. In 2002, assistant U.S. Attorney General Robert F. Diegelman issued an eyes only memo on the matter to the chief information technology (IT) officers at the Department of Justice. IT officers oversee everything from the kind of cell phones agents carry to the wiretap equipment they use in the field; their defining purpose is secure communications. Diegelman’s memo was a reiteration, with overtones of reprimand, of a new IT policy instituted a year earlier, in July 2001, in an internal Justice order titled “2640.2D Information Technology Security.” Order 2640.2D stated that “Foreign Nationals shall not be authorized to access or assist in the development, operation, management or maintenance of Department IT systems.” This might not seem much to blink at in the post-9/11 intel and security overhaul. Yet 2640.2D was issued a full two months before the Sept. 11 attacks. What group or groups of foreign nationals had close access to IT systems at the Department of Justice? Israelis, according to officials in law enforcement. One former Justice Department computer crimes prosecutor tells me, speaking on background, “I’ve heard that the Israelis can listen in to our calls.”

Retired CIA counterterrorism and counterintelligence officer Philip Giraldi says this is par for the course in the history of Israeli penetrations in the U.S. He notes that Israel always features prominently in the annual FBI report called “Foreign Economic Collection and Industrial Espionage” – Israel is second only to China in stealing U.S. business secrets. The 2005 FBI report states, for example, “Israel has an active program to gather proprietary information within the United States. These collection activities are primarily directed at obtaining information on military systems and advanced computing applications that can be used in Israel’s sizable armaments industry.” A key Israeli method, warns the FBI report, is computer intrusion.

In the big picture of U.S. government spying on Americans, the story ties into 1994 legislation called the Communications Assistance for Law Enforcement Act, or CALEA, which effected a sea-change in methods of electronic surveillance. Gone are the days when wiretaps were conducted through on-site tinkering with copper switches. CALEA mandated sweeping new powers of surveillance for the digital age, by linking remote computers into the routers and hubs of telecom firms – a spyware apparatus linked in real-time, all the time, to American telephones and modems. CALEA made spy equipment an inextricable ligature in our telephonic life. Top officials at the FBI pushed for the legislation, claiming it would improve security, but many field agents have spoken up to complain that CALEA has done exactly the opposite. The data-mining techniques employed by NSA in its wiretapping exploits could not have succeeded without the technology mandated by CALEA. It could be argued that CALEA is the hidden heart of the NSA wiretap scandal.


According to former CIA officer Giraldi and other US intelligence sources, software manufactured and maintained by Verint, Inc. handles most of American law enforcement’s wiretaps. Says Giraldi: “Phone calls are intercepted, recorded, and transmitted to U.S. investigators by Verint, which claims that it has to be ‘hands on’ with its equipment to maintain the system.” Giraldi also notes Verint is reimbursed for up to 50 percent of its R&D costs by the Israeli Ministry of Industry and Trade. According to Giraldi, the extent of the use of Verint technology “is considered classified,” but sources have spoken out and told Giraldi they are worried about the security of Verint wiretap systems. The key concern, says Giraldi, is the issue of a “trojan” embedded in the software.

A trojan in information security hardware/software is a backdoor that can be accessed remotely by parties who normally would not have access to the secure system. Allegations of massive trojan spying have rocked the Israeli business community in recent years. An AP article in 2005 noted, “Top Israeli blue chip companies…are suspected of using illicit surveillance software to steal information from their rivals and enemies.” Over 40 companies have come under scrutiny. “It is the largest cybercrime case in Israeli history,” Boaz Guttmann, a veteran cybercrimes investigator with the Israeli national police, tells me. “Trojan horse espionage is part of the way of life of companies in Israel. It’s a culture of spying.”

This is of course the culture on which the U.S. depends for much of its secure software for data encryption and telephonic security. “There’s been a lot discussion of how much we should trust security products by Israeli telecom firms,” says Philip Zimmerman, one of the legendary pioneers of encryption technology (Zimmerman invented the cryptographic and privacy authentication system known as Pretty Good Privacy, or PGP, now one of the basic modern standards for communications encryption). “Generally speaking, I wouldn’t trust stuff made overseas for data security,” says Zimmerman. “A guy at NSA InfoSec” – the information security division of the National Security Agency – “once told me, ‘Foreign-made crypto is our nightmare.’ But to be fair, as our domestic electronics industry becomes weaker and weaker, foreign-made becomes inevitable.” Look at where the expertise is, Zimmerman adds: Among the ranks of the International Association for Cryptological Research, which meets annually, there is a higher percentage of Israelis than any other nationality. The Israeli-run Verint is today the provider of telecom interception systems deployed in over 50 countries.

Carl Cameron, chief politics correspondent at Fox News Channel, is one of the few reporters to look into federal agents’ deepening distress over possible trojans embedded in Verint technology. In a wide-ranging four-part investigation into Israeli-linked espionage that aired in December 2001, Cameron made a number of startling discoveries regarding Verint, then known as Comverse Infosys. Sources told Cameron that “while various FBI inquiries into Comverse have been conducted over the years,” the inquiries had “been halted before the actual equipment has ever been thoroughly tested for leaks.” Cameron also noted a 1999 internal FCC document indicating that “several government agencies expressed deep concerns that too many unauthorized non-law enforcement personnel can access the wiretap system.” Much of this access was facilitated through “remote maintenance.”

Immediately following the Cameron report, Comverse Infosys changed its name to Verint, saying the company was “maturing.” (The company issued no response to Cameron’s allegations, nor did it threaten a lawsuit.) Meanwhile, security officers at DEA, an adjunct of the Justice Department, began examining the agency’s own relationship with Comverse/Verint. In 1997, DEA transformed its wiretap infrastructure with the $25 million procurement from Comverse/Verint of a technology called “T2S2” – “translation and transcription support services” – with Comverse/Verint contracted to provide the hardware and software, plus “support services, training, upgrades, enhancements and options throughout the life of the contract,” according to the “contracts and acquisitions” notice posted on the DEA’s website. This was unprecedented. Prior to 1997, DEA staff used equipment that was developed and maintained in-house.

But now Cameron’s report raised some ugly questions of vulnerability in T2S2.

The director of security programs at DEA, Heidi Raffanello, was rattled enough to issue an internal communiqué on the matter, dated Dec. 18, 2001, four days after the final installment in the Cameron series. Referencing the Fox News report, she worried that “Comverse remote maintenance” was “not addressed in the C&A [contracts and acquisitions] process.” She also cited the concerns in Justice Department order 2640.2D, and noted that the “Administrator” – meaning then DEA head Asa Hutchinson – had been briefed. Then there was this stunner: “It remains unclear if Comverse personnel are security cleared, and if so, who are they and what type of clearances are on record….Bottom line we should have caught it.” On its face, the Raffanello memo is a frightening glimpse into a bureaucracy caught with its pants down.

American law enforcement was not alone in suspecting T2S2 equipment purchased from Comverse/Verint. In November 2002, sources in the Dutch counterintelligence community began airing what they claimed was “strong evidence that the Israeli secret service has uncontrolled access to confidential tapping data collected by the Dutch police and intelligence services,” according to the Dutch broadcast radio station Evangelische Omroep (EO). In January 2003, the respected Dutch technology and computing magazine, c’t, ran a follow-up to the EO scoop, headlined “Dutch Tapping Room not Kosher.” The article began: “All tapping equipment of the Dutch intelligence services and half the tapping equipment of the national police force…is insecure and is leaking information to Israel.” The writer, Paul Wouters, goes on to discuss the T2S2 tap-ware “delivered to the government in the last few years by the Israeli company Verint,” and quoted several cryptography experts on the viability of remote monitoring of encrypted “blackbox” data. Wouters writes of this “blackbox cryptography”:

…a very important part of strong cryptography is a good random source. Without a proper random generator, or worse, with an intentionally crippled random generator, the resulting ciphertext becomes trivial to break. If there is one single unknown chip involved with the random generation, such as a hardware accelerator chip, all bets are off….If you can trust the hardware and you have access to the source code, then it should theoretically be possible to verify the system. This, however, can just not be done without the source code.

Yet, as Wouters was careful to add, “when the equipment was bought from the Israelis, it was agreed that no one except [Verint] personnel was authorized to touch the systems....Source code would never be available to anyone.”

Cryptography pioneer Philip Zimmerman warns that “you should never trust crypto if the source code isn’t published. Open source code means two things: if there are deliberate backdoors in the crypto, peer review will reveal those backdoors. If there are inadvertent bugs in the crypto, they too will be discovered. Whether the weaknesses are by accident or design, they will be found. If the weakness is by design, they will not want to publish the source code. Some of the best products we know have been subject to open source review: Linux; Apache. The most respected crypto products have been tested through open source. The little padlock in the corner when you visit a browser? You’re going through a protocol called Secure Socket Layer. Open source tested and an Internet standard. FireFox, the popular and highly secure browser, is all open source.”


None of U.S. law enforcement’s problems with Amdocs and Verint could have come to pass without the changes mandated by the Communications Assistance for Law Enforcement Act of 1994, which, as noted, sought to lock spyware into telecom networks. CALEA, to cite the literature, requires that terrestrial carriers, cellular phone services and other telecom entities enable the government to intercept “all wire and oral communications carried by the carrier concurrently with their transmission.” T2S2 technology fit the bill perfectly: Tied into the network, T2S2 bifurcates the line without interrupting the data-stream (a T2S2 bifurcation is considered virtually undetectable). One half of the bifurcated line is recorded and stored in a remote tapping room; the other half continues on its way from your mouth or keyboard to your friend’s. (What is “T2S2”? To simplify: The S2 computer collects and encrypts the data; the T2 receives and decrypts.)

CALEA was touted as a law enforcement triumph, the work of decades of lobbying by FBI. Director Louis Freeh went so far as to call it the bureau’s “highest legislative priority.” Indeed, CALEA was the widest expansion of the government’s electronic surveillance powers since the Crime Control and Safe Streets Act of 1968, which mandated carefully limited conditions for wiretaps. Now the government could use coercive powers in ordering telecom providers to “devise solutions” to law enforcement’s “emerging technology-generated problems” (imposing a $10,000 per day penalty on non-compliant carriers). The government’s hand would be permanently inserted into the design of the nation's telecom infrastructure. Law professor Lillian BeVier, of the University of Virginia, writes extensively of the problems inherent to CALEA. “The rosy scenario imagined by the drafters cannot survive a moment's reflection,” BeVier observes. “While it is conventionally portrayed as ‘but the latest chapter in the thirty year history of the federal wiretap laws,’ CALEA is not simply the next installment of a technologically impelled statutory evolution. Instead, in terms of the nature and magnitude of the interests it purports to ‘compromise’ and the industry it seeks to regulate, in terms of the extent to which it purports to coerce private sector solutions to public sector problems, and in terms of the foothold it gives government to control the design of telecommunications networks, the Act is a paradigm shift. On close and disinterested inspection, moreover, CALEA appears to embody potentially wrong-headed sacrifices of privacy principles, flawed and incomplete conceptions of law enforcement's ends and means, and an imperfect appreciation of the incompatible incentives of the players in the game that would inevitably be played in the process of its implementation.”(emphasis mine)

The real novelty – and the danger – of CALEA is that telecom networks are today configured so that they are vulnerable to surveillance. “We’ve deliberately weakened the computer and phone networks, making them much less secure, much more vulnerable both to legal surveillance and illegal hacking,” says former DOJ cybercrimes prosecutor Mark Rasch. “Everybody is much less secure in their communications since the adopting of CALEA. So how are you going to have secure communications? You have to secure the communications themselves, because you cannot have a secure network. To do this, you need encryption. What CALEA forced businesses and individuals to do is go to third parties to purchase encryption technology. What is the major country that the U.S. purchases IT encryption from overseas? I would say it’s a small Middle Eastern democracy. What we’ve done is the worst of all worlds. We’ve made sure that most communications are subject to hacking and interception by bad guys. At the same time, the bad guys – organized crime, terrorist operations – can very easily encrypt their communications.” It is notable that the first CALEA-compliant telecom systems installed in the U.S. were courtesy of Verint Inc.


If a phone is dialed in the U.S., Amdocs Ltd. likely has a record of it, which includes who you dialed and how long you spoke. This is known as transactional call data. Amdocs’ biggest customers in the U.S. are AT&T and Verizon, which have collaborated widely with the Bush Administration’s warrantless wiretapping programs. Transactional call data has been identified as a key element in NSA data mining to look for “suspicious” patterns in communications.

Over the last decade, Amdocs has been the target of several investigations looking into whether individuals within the company shared sensitive U.S. government data with organized crime elements and Israeli intelligence services. Beginning in 1997, the FBI conducted a far-flung inquiry into alleged spying by an Israeli employee of Amdocs, who worked on a telephone billing program purchased by the CIA. According to Paul Rodriguez and J. Michael Waller, of Insight Magazine, which broke the story in May of 2000, the targeted Israeli had apparently also facilitated the tapping of telephone lines at the Clinton White House (recall Monica Lewinsky’s testimony before Ken Starr: the president, she claimed, had warned her that “a foreign embassy” was listening to their phone sex, though Clinton under oath later denied saying this). More than two dozen intelligence, counterintelligence, law-enforcement and other officials told Insight that a “daring operation,” run by Israeli intelligence, had “intercepted telephone and modem communications on some of the most sensitive lines of the U.S. government on an ongoing basis.” Insight’s chief investigative reporter, Paul Rodriguez, told me in an e-mail that the May 2000 spy probe story “was (and is) one of the strangest I've ever worked on, considering the state of alert, concern and puzzlement” among federal agents. According to the Insight report, FBI investigators were particularly unnerved over discovering the targeted Israeli subcontractor had somehow gotten his hands on the FBI’s “most sensitive telephone numbers, including the Bureau's ‘black’ lines used for wiretapping.” “Some of the listed numbers,” the Insight article added, “were lines that FBI counterintelligence used to keep track of the suspected Israeli spy operation. The hunted were tracking the hunters.” Rodriguez confirmed the panic this caused in American intel. “It's a huge security nightmare,” one senior U.S. official told him. “The implications are severe,” said a second official. “All I can tell you is that we think we know how it was done,” a third intelligence executive told Rodriguez. “That alone is serious enough, but it's the unknown that has such deep consequences.” No charges, however, were made public in the case. (What happened behind the scenes depends on who you talk to in law enforcement: When FBI counterintelligence sought a warrant for the Israeli subcontractor, the Justice Department strangely refused to cooperate, and in the end no warrant was issued. FBI investigators were baffled.)

London Sunday Times reporter Uzi Mahnaimi quotes sources in Tel Aviv saying that during this period e-mails from President Clinton had also been intercepted by Israeli intelligence. Mahnaimi’s May 2000 article reveals that the operation involved “hacking into White House computer systems during intense speculation about the direction of the peace process.” Israeli intelligence had allegedly infiltrated a company called Telrad, subcontracted by Nortel, to develop a communications system for the White House. According to the Sunday Times, “Company managers were said to have been unaware that virtually undetectable chips installed during manufacture made it possible for outside agents to tap into the flow of data from the White House.”

In 1997, detectives with the Los Angeles Police Department, working in tandem with the Secret Service, FBI, and DEA, found themselves suffering a similar inexplicable collapse in communications security. LAPD was investigating Israeli organized crime: drug runners and credit card thieves based in Israel and L.A., with tentacles in New York, Miami, Las Vegas, and Egypt. The name of the crime group and its members remains classified in “threat assessment” papers this reporter obtained from LAPD, but the documents list in some detail the colorful scope of the group’s operations: $1.4 million stolen from Fidelity Investments in Boston through sophisticated computer fraud; extortion and kidnapping of Israelis in L.A. and New York; cocaine distribution in connection with Italian, Russian, Armenian and Mexican organized crime; money laundering; and murder. The group also had access to extremely sophisticated counter-surveillance technology and data, which was a disaster for LAPD. According to LAPD internal documents, the Israeli crime group obtained the unlisted home phone, cell phone, and pager numbers of some 500 of LAPD’s narcotics investigators, as well as the contact information for scores of federal agents – black info, numbers unknown even to the investigators’ kin. The Israelis even set up wiretaps of LAPD investigators, grabbing from cell-phones and landlines conversations with other agents – FBI and DEA, mostly – whose names and phone numbers were also traced and grabbed.

LAPD was horrified, and as the word got out of the seeming total breakdown in security, the shock spread to agents at DEA, FBI and even CIA, who together spearheaded an investigation. It turned out that the source of much of this black intel could be traced to a company called J&J Beepers, which was getting its phone numbers from a billing service that happened to be a subsidiary of Amdocs.

A source familiar with the inquiries into Amdocs put to me several theories regarding the allegations of espionage against the company. “Back in the early 1970s, when it became clear that AT&T was going to be broken up and that there was an imminent information and technology revolution, Israel understood that it had a highly-educated and highly-worldly population and it made a few calculated economic and diplomatic discoveries,” the source says. “One was that telecommunications was something they could do: because it doesn’t require natural resources, but just intellect, training and cash. They became highly involved in telecommunications. Per capita, Israel is probably the strongest telecommunications nation in the world. AT&T break-up occurs in 1984; Internet technology explodes; and Israel has all of these companies aggressively buying up contracts in the form of companies like Amdocs. Amdocs started out as a tiny company and now it’s the biggest billing service for telecommunications in the world. They get this massive telecommunications network underway. Like just about everything in Israel, it’s a government sponsored undertaking.

“So it’s been argued that Amdocs was using its billing records as an intelligence-gathering exercise because its executive board over the years has been heavily peopled by retired and current members of the Israeli government and military. They used this as an opportunity to collect information about worldwide telephone calls. As an intelligence-gathering phenomenon, an analyst with an MIT degree in algorithms would rather have 50 pages of who called who than 50 hours of actual conversation. Think about conversations with friends, husbands, wives. That raw information doesn’t mean anything. But if there’s a pattern of 30 phone calls over the course of a day, that can mean a lot. It’s a much simpler algorithm.”

Another anonymous source – a former CIA operative – tells me that U.S. intelligence agents who have aired their concerns about Verint and Amdocs have found themselves attacked from all sides. “Once it’s learned that an individual is doing footwork on this [the Verint/Amdocs question], he or she is typically identified somehow as a troublemaker, an instigator, and is hammered mercilessly,” says the former CIA operative. “Typically, what happens is the individual finds him or herself in a scenario where their retirement is jeopardized – and worse. The fact that if you simply take a look at this question, all of a sudden you’re an Arabist or anti-Semitic – it’s pure baloney, because I will tell you first-hand that people whose heritage lies back in that country have heavily worked this matter. You can’t buy that kind of dedication.”

The former CIA operative adds, “There is no defined policy, at this time, for how to deal with this [security issues involving Israel] – other than wall it off, contain it. It’s not cutting it. Not after 9/11. The funeral pyre that burned on for months at the bottom of the rubble told a lot of people they did not need to be ‘politically correct.’ The communications nexuses [i.e. Amdocs/Verint] didn’t occur yesterday; they started many years ago. And that’s a major embarrassment to organizations that would like to say they’re on top of things and not co-opted or compromised. As you start to work this, you soon learn that many people have either looked the other way or have been co-opted along the way. Some people, when they figure out what has occurred, are highly embarrassed to realize that they’ve been duped. Because many of them are bureaucrats, they don’t want to be made to look as stupid as they are. So they just go along with it. Sometimes, it’s just that simple.”

Christopher Ketcham writes for Vanity Fair, GQ, Harper’s, Salon and many other magazines and websites. You can reach him at

Friday, November 21, 2008

Raw Story: Georgia election at risk -- after 2002 Election Stolen

Allegations about 2002 Georgia election raise doubts on current voting

11/21/2008 @ 1:59 pm

Filed by Muriel Kane

As the state of Georgia prepares to conduct a runoff between incumbent Senator Saxby Chambliss and his Democratic challenger, Jim Martin, old doubts about the election in which Chambliss took the Senate seat from Max Cleland six years ago are attracting fresh notice.

Chambliss was the victor in the 2002 election by seven percentage points, despite polls which showed him trailing by five points just a week earlier. That unexpected turnaround, combined with the exclusive control over the voting machines by Diebold Election Systems, raised suspicions of electronic vote-tampering from the start.

According to cyber-security expert Stephen Spoonamore, "If you look at the case of Saxby Chambliss, that's ridiculous. The man was not elected. He lost that election by five points. Max Cleland won. They flipped the votes, clear as day."

Spoonamore has been speaking out since last summer about the problems with the 2002 election, drawing on his examination of a software patch which the president of Diebold's election unit personally brought to Georgia to be installed prior to the voting.

Spoonamore received the patch from Diebold whistleblower Chris Hood, who first came forward two years ago and spoke with Robert F. Kennedy, Jr. for an article in Rolling Stone.

"We ran the election," Hood told Kennedy. "We had 356 people that Diebold brought into the state. Diebold opened and closed the polls and tabulated the votes. Diebold convinced [Georgia Secretary of State Cathy] Cox that it would be best if the company ran everything due to the time constraints, and in the interest of a trouble-free election, she let us do it."

Hood has now repeated his doubts about the 2002 Georgia election, as well as about voting problems in Maryland in 2004, in an interview with former ABC News producer Rebecca Abrahams. "I have come to believe that these errors are now permanently embedded into the system," Hood told Abrahams.

Abrahams states, "Jim Martin should be concerned about the veracity and validity of the November election results after anomalies in the last election and the statement by Chris Hood. In fact, voters should demand to know if Chambliss had any knowledge that the 2002 election was rigged and whether he knew that Georgia citizens voted on electronic voting machines that had been patched with uncertified software days before the election in clear violation of Georgia law."

Chambliss, meanwhile, may be growing testy as the runoff election approaches. He was recently asked about his refusal to testify in a case involving Imperial Sugar and responded by putting his hand over the camera lens and saying, "You can take it away now."

This video was posted by Velvet Revolution on YouTube on November 21, 2008.

Sunday, November 16, 2008

Mike Whitney: Secretary Paulson Is Simply Prolonging the Scam

Weekend Edition
November 14 / 16, 2008
The Self-Inflicted Crisis
Paulson the Bungler


Henry Paulson's time at Treasury has been one pratfall after another. Even so, on Tuesday he managed to outdo himself. Paulson held a "surprise" press conference where he announced that the $700 billion Troubled Asset Relief Program (TARP) wouldn't be used to buy troubled assets after all. Instead, the money will used to bail out insurance giant AIG, provide extra capital for the banks to hoard, and now (this is the new part) give money to "nonbank financial institutions, like insurers and specialty-finance companies" so they can lend to credit-worthy consumers. Isn't that why we gave money to the banks?

Paulson's announcement was like tossing a hand-grenade in a San-i-can; it blew the stock market to Kingdom come. Just minutes after the opening bell on the New York Stock Exchange (NYSE) stocks plummeted to new lows ending the session in a 400 point death-spiral. Wall Street doesn't like uncertainty and Paulson's sudden about-face sent jittery investors running for cover. The message to investors is clear, the government doesn't have the foggiest idea of what it's doing and is just grasping at straws.

But Paulson's no fool; he knew exactly what the reaction would be on Wall Street. He simply decided that blowing up the equities market was worth the price of reviving "securitization"--the transformation of loans into securities. You see, securitization is Wall Street's Golden Goose. It's the foundation block upon which structured finance and all its complex credit-enhancing derivatives rests. Keep in mind, that all these exotic, financially-engineered products--the CDOs, MBS, and CDS--were all created with one goal in mind; to maximize leverage with minimum capital so that profits can be skimmed off the top. That's how Paulson managed to walk away from Goldman Sachs with hundreds of millions of dollars in his pockets. It's a racket.

There's a myth that credit is contracting because the banks won't lend. But, in truth, total bank credit expanded by $575 billion over the past 10 weeks. The real problem is that the securitzation market remains frozen.

So now Paulson wants to breathe new life into securitization by providing liquidity for nonbank financial institutions who get their money from the wholesale market. Of course, no one really knows how this will work since these operations are completely unregulated by the federal government. No worries; the charade will persist behind the dodgy claim that "it's needed to get credit to the consumer". Baloney. What the consumer needs job security and a pay-raise, not more debt. This is just more Paulson flim-flam.

It was clear that the Treasury Secretary was concocting a new swindle a couple weeks ago when Fed chief Bernanke defended "securitzation” in a speech where he said:

"The ability of financial intermediaries to sell the mortgages they originate into the broader capital market by means of the securitization process serves two important purposes: First, it provides originators much wider sources of funding than they could obtain through conventional sources, such as retail deposits; second, it substantially reduces the originator's exposure to interest rate, credit, prepayment, and other risks associated with holding mortgages to maturity, thereby reducing the overall costs of providing mortgage credit."

This is nonsense. What it does is create the optimal environment for speculative leveraging, debt-pyramiding and massive profit-taking. But, that's beside the point. The real issue is that securitization is dead already because Paulson and his ilk poisoned the well by adding subprime garbage and Alt As to the mix. Now investors are steering clear of any securities that bundle debt. It's a confidence issue.

According to the Wall Street Journal:

"Banks and other finance companies making loans for autos, credit cards and college tuition are having virtually no success in selling those loans to other investors, a potent sign of just how tight credit markets remain.

“The market for selling such loans — by packaging, or securitizing, them into bonds — had just one $500 million deal for all of October, according to Barclays Capital. That compares with $50.7 billion worth of deals made one year earlier, according to market-research firm Dealogic. The overall market for so-called asset-backed securitization is estimated at $2.5 trillion.” (Bond Woes Choke off some Credit to Consumers, Wall Street Journal, Robin Sidel)

$500 million is just 1 percent of $50 billion! Securitization will be dead for a decade or so; it was destroyed by lax lending standards and easy credit. Paulson and his fellows will have to find a new way to fleece gulible investors.

The TARP is most expensive boondoggle in history. No one even knows what the banks are doing with the money. There's neither accountability nor transparency. As a result, investor confidence has deteriorated and stocks have continued to fall. No one trusts Paulson to do the right thing anymore; it's that simple.

The Treasury's new Financial Stability Oversight Board has met four times, but they still can't say how the banks are using the money. It's a joke. Congress has been missing in action, too. They promised to create their own oversight board, but five weeks have passed and still nothing has happened. Apparently, the idea throwing $700 billion down rathole isn't enough to prod Ms. Pelosi and her congressional cohorts into action. All that really matters to them is getting reelected and nuzzling ever-closer to the public trough.

The TARP fiasco is not taking place in a vacuum either; the country is at the beginning of the deepest consumer-led recession in the last half century. Retail spending and automobile sales have been following the same grim flightpath as housing, while unemployment is at a 7 year high soaring to nearly 4 million. Household debt is at record levels of $14 trillion. The job market is steadily weakening while the consumer is more vulnerable than ever. Meanwhile, Paulson has dragged his feet on rewriting mortgages to slow foreclosures, stalled on providing another stimulus package, and diverted all the money from the $700 billion bailout to his friends in the financial industry. Not one dime has gone to a working man or woman. Paulson continues to play games while Rome burns even though, according to his colleague, former G-Sax chairman John Whitehead, the current downturn will be worse than the Great Depression.

According to Reuters:

"The economy faces a slump deeper than the Great Depression and a growing deficit threatens the credit of the United States itself, former Goldman Sachs chairman John Whitehead ...

"I think it would be worse than the depression," Whitehead said. "We're talking about reducing the credit of the United States of America, which is the backbone of the economic system. ... I see nothing but large increases in the deficit, all of which are serving to decrease the credit standing of America. ... I just want to get people thinking about this, and to realize this is a road to disaster. I've always been a positive person and optimistic, but I don't see a solution here."

The first thing to realize is that it is not a matter of "fixing" the economy. The economy is fixing itself by purging the unsustainable debt from the system. That's how markets work. Greenspan's low interest rates created a subsidy for debt which--along with the alphabet soup of leveraged derivatives--buoyed the economy along on the biggest wave of speculative financing the world has ever seen. The distortions that were caused by the unprecedented credit expansion stimulated artificial demand that created the appearance of growth and prosperity but, in truth, was nothing more than an equity bubble. Now the bubble has popped and the financial system is returning to the mean. That means that credit will probably contract by 30 to 40 per cent putting us on the path to another Great Depression. Unless the government takes preventative action to get money into the hands of consumers and restore confidence, the nation will face widespread panic. That's probably why all the voting machines and exit polls finally matched up with the election results in the 2008 presidential balloting for the first time in 8 years; because the ruling elites know that they need a popular executive to put in front of the cameras when they try to calm the crowds and keep the country from disintegrating into anarchy. It also explains the nervous smiles on the faces of the money-lenders and graybeards assembled on the stage behind Obama at his first press conference. The American establishment is placing all its hopes for economic survival on the narrow shoulders of their newest posterboy, Barak Obama.

There's more pain to come, but the suffering can be mitigated by sound decision-making and Keynesian policies. That means public work programs, bankruptcy reform, and extensions on unemployment. Paul Krugman recommends a stimulus package of $600 billion. That's a good start, but it will take much more than that. And foreign investors will have to be confident in our choices or the sale of Treasurys will slip and the US will face a funding crisis. The Fed's lending facilities have already loaned $2 trillion while the Treasury's bailout is $700 billion. By the end of 2010, fiscal deficits will be nearly $2 trillion and the total cost to the US taxpayer will be at least $5 trillion. That means rising interest rates, flagging growth and hard times ahead.

The present financial crisis is a self-inflicted wound. It started at the Federal Reserve with their cynical neoliberal monetary policies. Any solution, that does not involve the dismantling of the Fed, is unacceptable.

Mike Whitney lives in Washington state. He can be reached at fergiewhitney@msn.comh

Eliot Spitzer: How to Keep Financial Markets in Check

How to Ground The Street
The Former 'Enforcer' On the Best Way to Keep Financial Markets in Check.

By Eliot L. Spitzer
Sunday, November 16, 2008; B01

President-elect Barack Obama will soon face the extraordinary task of saving capitalism from its own excesses, much as Franklin D. Roosevelt had to do 76 years ago. Up until this point in the crisis, policymakers have appropriately applied the rules of triage -- Band-Aids and tourniquets, then radical surgery -- to keep the global financial system alive. Capital infusions, bailouts, mega-mergers, government guarantees of unimaginable proportions -- all have been sought and supported by officials and corporate chief executives who had until now opposed any government participation in the marketplace. But put aside for the moment the ideological cartwheel we have seen and look at the big picture: The rules of modern capitalism have been re-written before our eyes.

The new president's team must soon get to the root causes of the mistakes that have brought us to the economic precipice. Yes, we have all derided the explosion of leverage, the failure to regulate derivatives, the flood of subprime lending that was bound to default and the excesses of CEO compensation. But these are all mere manifestations of three deeper structural problems that require greater attention: misconceptions about what a "free market" really is, a continuing breakdown in corporate governance and an antiquated and incoherent federal financial regulatory framework.

First, we must confront head-on the pervasive misunderstanding of what constitutes a "free market." For long stretches of the past 30 years, too many Americans fell prey to the ideology that a free market requires nearly complete deregulation of banks and other financial institutions and a government with a hands-off approach to enforcement. "We can regulate ourselves," the mantra went.

Those of us who raised red flags about this were scoffed at for failing to understand or even believe in "the market." During my tenure as New York state attorney general, my colleagues and I sought to require investment banking analysts to provide their clients with unbiased recommendations, devoid of undisclosed and structural conflicts. But powerful voices with heavily vested interests accused us of meddling in the market.

When my office, along with the Department of Justice, warned that some of American International Group's reinsurance transactions were little more than efforts to create the false impression of extra capital on the company's balance sheet, we were jeered at for attacking one of the nation's great insurance companies, which surely knew how to balance risk and reward.

And when the attorneys general of all 50 states sought to investigate subprime lending, believing that some lending practices might be toxic, we were blocked by a coalition of the major banks and the Bush administration, which invoked a rarely used statute to preempt the states' ability to probe. The administration claimed that it had the situation under control and that our inquiry was unnecessary.

Time and again, whether at the state level, in Congress or at the Securities and Exchange Commission under Bill Donaldson, those who tried to enforce the basic principles that would allow the market to survive were told that the "invisible hand" of the market and self-regulation could handle the task alone.

The reality is that unregulated competition drives corporate behavior and risk-taking to unacceptable levels. This is simply one of the ways in which some market participants try to gain a competitive advantage. As one lawyer for a company charged with malfeasance stated in a meeting in my office (amazingly, this was intended as a winning defense): "You're right about our behavior, but we're not as bad as our competitors."

No major market problem has been resolved through self-regulation, because individual competitive behavior doesn't concern itself with the larger market. Individual actors care only about performing better than the next guy, doing whatever is permitted -- or will go undetected. Look at the major bubbles and market crises. Long-Term Capital Management, Enron, the subprime lending scandals: All are classic demonstrations of the bitter reality that greed, not self-discipline, rules where unfettered behavior is allowed.

Those who truly understand economics, as did Adam Smith, do not preach an absence of government participation. A market doesn't exist in a vacuum. Rather, a market is a product of laws, rules and enforcement. It needs transparency, capital requirements and fidelity to fiduciary duty. The alternative, as we are seeing, is anarchy.

One of the great advantages U.S. capital markets have enjoyed over the decades has been the view -- held worldwide -- that there was an underlying integrity to the representations market participants made, because the regulatory framework in which they were made was believed to provide genuine oversight. But as we all know, the laws requiring such integrity are meaningless without a government dedicated to enforcing them.

Second, our corporate governance system has failed. We need to reexamine each of the links in its chain. Boards of directors, compensation and audit committees, the trio of facilitators (lawyers, investment bankers and auditors) whose job it is to create the impression of legal compliance, and shareholders themselves -- all abdicated their responsibilities.

Institutional shareholders, in particular mutual funds, pension funds and endowments, must reengage in corporate governance. Over the past decade, arguably the sole challenge to corporate mismanagement and poor corporate strategies has come from private-equity firms or activist hedge funds. These firms were among the few shareholders or pools of capital willing to purchase and revamp encrusted corporate machines. So it shouldn't be surprising that the corporate world has taken a skeptical view of them -- especially short-selling hedge funds, which have often been a rare voice raising the alarm.

Boards of directors were also missing in action over the past decade; not only did they not provide answers, they all too often failed even to ask the appropriate questions. And the roles of compensation committees, of course, must be totally rethought. No longer can Garrison Keillor's brilliant observation about our kids -- that they are all above average -- apply to CEOs and propel failed leaders' paychecks through the roof. Today's momentary public oversight and outrage over executive compensation, while long overdue, is no substitute over the long term for firm standards set by compensation committees and boards of directors.

Finally, we need to completely overhaul the federal financial regulatory framework.

Let's leave aside the ideological hesitancy that has long hamstrung regulatory agencies. Today's balkanized regulatory framework for financial services no longer matches in any way the needs of a fully integrated global financial system. The divisions of the past -- commercial banking vs. investment banking vs. insurance vs. hedge funds vs. private equity -- have become distinctions without a difference. But these old boxes and formalities still determine how entities are viewed and regulated. It should surprise nobody that capital found the crevices in the regulatory framework. That is what capital is paid to do. But we failed to respond with a regulatory framework flexible enough to plug the leaks.

We do not need additional fragmented areas of federal regulation to handle hedge funds, sovereign wealth funds or derivatives. We need a unified approach that addresses the underlying issues: what kinds of leverage we wish to tolerate, how to measure risk, how much disclosure various trading products should provide. We cannot survive with the current system: the SEC, the Office of the Comptroller of the Currency, the Federal Deposit Insurance Corporation, the Fed, the Office of Thrift Supervision and on and on. We must go from the Rube Goldberg structure we now have to a sleek iPod design that is cleaner, has better operating software and may even look good.

We began to try to craft such a unified model in New York, as did Treasury Secretary Henry M. Paulson Jr. in Washington last year. But it is urgent that we finish the job. Having flooded the market with cash and seen the government take a chunk of many of our largest financial institutions, we now need to craft the rules that will apply to all market participants.

Three overarching priorities should guide government actions in the new structure. First, we need better control of systemic risk. The currently splintered federal regulatory authority, the continued presence of off-balance-sheet transactions for financial entities (even post-Enron) and the failure to subject major players to any government oversight means that nobody can really understand the full risk facing the financial system.

Second, investors must be protected with adequate, accurate information. Firms must offer transparency both to individual investors and to government regulators.

And third, as Eric R. Dinallo, the superintendent of the New York State Insurance Department, has wisely pointed out, we will have to step back from the current environment in which government has become a guarantor of all major risk. The so-called moral hazard will serve to devalue risk in the market, and this too will have a debilitating long-term effect on capital flows. Only if private actors have to bear the real risks they incur will the market function properly. We are now perilously close to nationalizing risk.

As the rules of modern capitalism are rewritten over the next year, those who benefit from the enormous flow of cash being spread throughout the U.S. economy must be expected to compete within a system of rules that creates a true market -- based on sound, skilled regulation, vigorous corporate governance and transparency.

Although mistakes I made in my private life now prevent me from participating in these issues as I have in the past, I very much hope and expect that President Obama and his new administration will have the strength and wisdom to do again what FDR did.

Eliot L. Spitzer was governor of New York from 2007-08 and state attorney general from 1999-2006.

Saturday, November 15, 2008

Jeffrey St. Clair: How Clinton Doomed the Spotted Owl

Weekend Edition
November 14 / 16, 2008
A Cautionary Tale for Greens in the Age of Obama
How Clinton Doomed the Spotted Owl


When biologist Jack Ward Thomas handed President Bill Clinton the final copy of his plan for the ancient forests of the Pacific Northwest Forest, Clinton asked only one question: “How much timber will it cut?”

With this revealing query began the bizarre final chapter in the saga of Clinton’s adventure in the rainforests of the Northwest, the home of the salmon and the spotted owl.

In the final two weeks of April 1994, the Clinton administration saw its strategy to reinitiate timber sales in Northwest forests come to a shocking fruition, when most of the key environmental groups in the region agreed to lift the three-year old federal injunction prohibiting new timber sales in spotted owl habitat. At the same moment, one of the nation’s largest forest products companies announced its glowing support for Clinton’s forest plan.

Watch how neatly the pattern of events unfolded.

On April 14, 1994, the Clinton administration submitted the Record of Decision for its Northwest forest plan to federal Judge William Dwyer in Seattle. A disturbing codicil to the original plan (widely known as Option 9), the 200-page Record of Decision granted a series of last-minute concessions to timber interests that were designed to accelerate the preparation of new timber sales in old-growth and keep the plan’s annual timber sale above the one billion board foot mark—the psychological barrier demanded by the timber industry.

The animals pay the price. For example, in order to meet the politically-driven cut levels, the final document shrank protection of the rare Marbled Murrelet by 250,000 acres in southern Oregon alone. The Marbled Murrelet is a chunky sea-faring bird that nests only in old-growth forests near the Pacific Ocean. It is listed as a threatened species. The diminished Murrelet was specifically tailored to clear the way for several enormous timber sales slated for the Siskiyou National Forest. Some of these sales, including the hotly contested Sugarloaf sale, are located in roadless areas.

Despite the intense uproar from the public and the scientific community over the prospect of logging and roadbuilding inside these ancient forest reserves, the Clinton plan greenlights thinning and salvage logging inside these supposedly sacrosanct areas without being subject to a detailed environmental assessment. This change was geared toward accelerating logging in the Oregon Coast Range and the Olympic Peninsula, the two areas where the Spotted Owl is most vulnerable to local extinction.

Most seriously, the final document dramatically weakened the standards for watershed analysis in order to “fast-track” logging operations in key basins. Back in 1993, Clinton and Bruce Babbitt hailed these detailed environmental assessments as the analytical and procedural cornerstone of the new ecosystem management approach. The basin-wide reviews were supposed to force timber sale planners to closely scrutinize the effects of logging and roadbuilding on entire watersheds. In fact, the group of scientists that peer-reviewed the draft Clinton plan concluded that these watershed assessment were “critical to the eventual success of adaptive management.” But with a stroke of the pen, Thomas and Clinton wiped them away.

As Clinton was taking with one hand, he was giving with the other. On April 15, 1994, a band of timber executives announced that they would not oppose the implementation of the new Clinton plan in court, opting instead for a “congressional strategy.” This meant that the industry planned to beg their congressional clients—men like Senator Mark Hatfield and House Speaker Tom Foley—to simply inscribe into law higher timber sales levels for the region than are called for under the Option 9 scheme and to insure that, once the levels are set, they remain immune from judicial scrutiny.

Forest Service chief Jack Ward Thomas indicated that he “might have a personal preference for timber targets” set by congress. This is where the slippery nature of Clintonism turns opaque. Instead of fighting for the ecological integrity of their own forest plan, they sent up a smoke signal to congress begging them to subvert it.

But this was a tall order. For starters, Congress didn’t want to take the blame for Clinton’s failures. Sen. George Mitchell told Bruce Babbitt point blank that he would fight any effort by the administration to shield its plan from legal review. Even traditional architects of so-called sufficiency legislation (laws that set timber and road-building targets and free activities from compliance with environmental statutes) displayed a distinct lack of enthusiasm for this approach without having an explicit and public nod of support from Clinton himself—a commitment that the president was unwilling to make.

Meanwhile, the federal courts had already struck a blow to the legality of the approach used to craft Clinton’s logging plan. In March 1994, in a suit brought by the Native Forest Council, Federal Judge Thomas Jackson ruled that the secretive process used to develop Option 9 violated the Federal Advisory Committee Act, or FACA. Along with the Freedom of Information Act, FACA stands as one of the pillars of open government. It requires that all advisory panels to the federal government contain balanced representation, hold public hearings, and make their deliberative records open to public review. Judge Jackson ruled that the Clinton approach violated each of these requirements.

This case laid the legal groundwork for the substantive challenges to future timber sales offered under the Clinton plan. For example, FACA seems likely to be a fruitful angle of attack against the consensus-based planning processes that are proliferating under the Adaptive Management approach. The response of the Clinton administration was to test congressional sentiment for a repeal of FACA. Sound familiar?

On April 19, several of the environmental plaintiffs in the Spotted Owl lawsuits declared their dissatisfaction with the Clinton plan at a press conference in Washington, DC. “The plan has come a long way politically, but falls short ecologically,” charged Andy Kerr, conservation director of the Oregon Natural Resources Department. “It fails to protect hundreds of species identified as dependent on old-growth forests, placing many at risk of extinction. Clearly, this doesn’t meet President Clinton’s own standard that the plan be scientifically credible and legally responsible.”

Kerr and Julie Norman, director of Headwaters, a southern Oregon conservation group, vowed that the environmentalists would mount a full-blown legal assault on the Clinton forest plan. She said the legal challenge would focus on “salmon, economics, and some owl claims.”

Here’s where things turn mysterious. One short day after these brawny pronouncements, Judge William Dwyer convened a status conference on the case in Seattle. At this hearing, the Forest Service officially requested that the injunction on new timber sales in Spotted Owl habitat be dissolved. The agency’s attorneys claimed that merely by filing the new plan with the court they had fully complied with the judge’s orders. At that point, Sierra Club Legal Defense Fund’s attorney shocked the court. True told Dwyer that the eleven environmental groups represented by his law firm would not oppose the Clinton administration’s request to lift the injunction and begin logging in old-growth again. He said that while the environmentalists might file an “amended complaint” to the old lawsuit, they were unlikely to seek a new injunction.

This was the second capitulation by the green lawyers to Clinton in less than a year. In September of 1993, in “a gesture of goodwill” to the Clinton administration, the environmentalists agreed to allow logging with fifty-four timber sales in old-growth forests vital to the survival of the Spotted Owl. It was at that point that the Forest Conservation Council, a Santa Fe-based group, split from the coalition and got new lawyers to press the fight.

And as the Sierra Club Legal Defense Fund offered to give up the entire injunction, only the Forest Conservation Council and the Native Forest Council of Eugene, Oregon demonstrated any resistance to the Clinton crowd’s political pressure to surrender the hard-won legal victory. The Native Forest Council was not a plaintiff in the original suit, but was granted amicus status by the court. Both organizations filed briefs with Judge Dwyer voicing strenuous objections to the release of the injunction. They argued that the burden of proof should lie with Clinton’s Forest Service to demonstrate that it is in compliance with the judge’s orders. But those suits were a long shot, a final protestation of a politically-driven sellout.

With the injunction lifted, the Forest Service began implementing the Clinton logging plan in June of 1994. The agency told the court it was ready to put forward 165 million board feet of timber in owl habitat during the summer—the first new timber sales since the Bush administration.

On April 21, Weyerhaeuser fulfilled its end of the bargain. The timber giant’s executive vice-president declared that the company was satisfied with the Clinton logging plan and pledged to defend it in Congress or the courts “by any means necessary.” You know you’re in deep trouble when corporate executives start quoting Malcolm X.

But Weyerhaeuser’s support for the Clinton plan shouldn’t have come as a surprise. The company, along with other industrial forest land owners, such as Plum Creek, ITT-Rayonier, Simpson and Georgia-Pacific, were the clear winners in the Option 9 sweepstakes. After all, these corporations had already been the financial beneficiaries of declining federal timber sales. As the price of lumber soared, so did their profits. The Clinton plan’s permanent restrictions on the rate of federal land logging substantially increases the long-term value of their own holdings.

More importantly for Weyerhaeuser, under the generous provisions of the Clinton administration’s new 4(d) Rule, industrial forest land owners were largely exempted from the Endangered Species Act’s strict prohibition against the “incidental taking” (that is, killing) of a listed species. This regressive rule punishes small landowners, but allows these multinational timber titans to continue clearcutting unabated in Spotted Owl habitat on their own lands, even when it ravages the owl’s already declining population.

Of course, the biggest victory for companies such as Weyerhaeuser and Plum Creek came when the Clinton administration stiff-armed environmentalists and labor leaders by refusing to stem the flow of raw log exports from private, corporate, and industrial lands in the Northwest. Even though the owl takes the rap, these exports are the leading cause of job loss in the timber sector.

For years, environmental strategists had plotted the ultimate crack-up of the timber monolith, pitting private landowners against public timber buyers (such as Louisiana-Pacific), domestic millers against log exporters. Well, the fissures finally came, but they didn’t unfold the way many expected—the most socially and environmentally deviant corporations emerged as unscathed victors.

What do we make of this odd accumulation of events, this carefully executed endgame to the Northwest forest crisis? Some grassroots environmentalists and labor organizers for the pulp and paper workers’ union charge that a three-way deal was cut between mainstream green groups, log exporters, and the Clinton administration. From a distance, the pattern to this rapid denouement seemed horribly prearranged. But the conspiracy falters on one salient point: the environmentalists received nothing for their gestures of goodwill, their reluctant dealmaking. Option 9 degenerated with every concession; it didn’t improve. In the end, only the lawyers made out. Trees for fees.

No, the bizarre and tragic conclusion to the Northwest forest fight simply revealed the fundamental nature of the Clinton approach and its abiding allegiance to corporate culture. If Clinton and Al Gore really shared an interest in protecting American timber workers and the ecology of the temperate rainforests of the Pacific Northwest, there was an obvious solution: end commercial logging on public lands and terminate the export of unprocessed logs to overseas ports. But Clinton didn’t align himself with the owl, the working stiffs, or the grassroots. He sided with the suits.

This essay is adapted from Born Under a Bad Sky: Notes From the Dark Side of the Earth by Jeffrey St. Clair (CounterPunch/AK Press).

Jeffrey St. Clair is the author of Been Brown So Long It Looked Like Green to Me: the Politics of Nature and Grand Theft Pentagon. His newest book, Born Under a Bad Sky, is just out from AK Press / CounterPunch books. He can be reached at: