United States backed Genocides: From Guatemala to Congo

By GLEN FORD | BLACK AGENDA REPORT | MARCH 28, 2013

Guatemala has put its U.S.-backed genocidal maniac on trial, but Washington continues to protect its agents of mass murder in the Democratic Republic of Congo. “There is no auditorium big enough to hold the all the living Americans who should justly be charged with genocide, war crimes, and crimes against humanity.”

The man who unleashed a genocide against the Maya Indians of Guatemala, former dictator and general Efrain Rios Montt, went on trial for his crimes against humanity in Guatemala City, this week. By all rights, the 86 year-old Montt should be joined in the dock by scores of still-living United States officials, including former President George Bush the First.

“The genocide would have been impossible without the United States.”

Back in 1954, the CIA overthrew the reformist government of President Jacobo Arbenz, whose land reform measures had angered the United Fruit Company. The U.S. termination with extreme prejudice of Guatemalan democracy ultimately led to a 36-year rebellion and civil war, with the Americans backing a succession of dictators.

General Montt was the most monstrous. In the 1980s, his regime declared total war on the Mayan people of the country’s highlands. Whole villages were massacred and entire regions laid waste as the military attempted to drain the human sea in which the guerilla movement swam. Army documents show clearly that the native Maya were targeted for extermination because of their ethnicity; that all Maya – a majority of Guatemala’s population – were considered enemies of the state. Rios Montt is the first Latin American former head of state to be charged with genocide in his own country.

However, this crime is not Rios Montt’s, alone. The genocide would have been impossible without the United States, which had run the show in Guatemala since 1954 and had armed the general to the teeth. The U.S. corporate media like to call President Ronald Reagan the “Great Communicator” but, in Guatemala, he was the Great Exterminator, encouraging and financing General Rios Montt’s orgy of mass murder.

Reagan described the racist butcher as “a man of great personal integrity and commitment” who was “getting a bum rap.” All told, a quarter million or more Guatemalans died in the 40 years since the CIA robbed them of their democracy and independence.

“The Maya were targeted for extermination because of their ethnicity.”

In 1999, when the civil war was over, President Bill Clinton apologized for the harm done to Guatemala by the United States. But by then, Clinton had already set in motion a far larger genocide in the Democratic Republic of Congo – a U.S.-sponsored holocaust that has so far claimed 6 million lives.

In a just world, Slick Willie would join an auditorium full of Obama, Bush and Clinton administration operatives who, over the space of 16 years, made eastern Congo the charnel house of the planet. Susan Rice would have a place of prominence in this vast assemblage of criminals, as among the most culpable for the worst bloodbath since World War Two.

In fact, there is no auditorium big enough to hold the all the living Americans who should justly be charged with genocide, war crimes, and crimes against humanity. There are too many – great crowds of them from each administration, especially in the last ten years, since the invasion of Iraq. Imperialism in its last stages maintains an ever-lengthening Kill List.

Guatemala is coming to grips with its past, in a trial that will probably last a few months. The United States has an infinity of crimes to answer for.

U.S. Drones violate Pakistan’s Sovereignty

By SEBASTIAN ABBOT | AP | MARCH 15, 2013

The head of a U.N. team investigating casualties from U.S. drone strikes in Pakistan declared after a secret research trip to the country that the attacks violate Pakistan’s sovereignty.

Ben Emmerson, the U.N. special rapporteur on human rights and counter-terrorism, said the Pakistani government made clear to him that it does not consent to the strikes – a position that has been disputed by U.S. officials.

President Barack Obama has stepped up covert CIA drone strikes targeting al-Qaida and Taliban militants in Pakistan’s tribal region along the Afghan border since he took office in 2009.

The strikes have caused growing controversy because of the secrecy surrounding them and claims that they have caused significant civilian casualties – allegations denied by the United States.

According to a U.N. statement that Emmerson emailed to The Associated Press on Friday, the Pakistani government told him it has confirmed at least 400 civilian deaths by U.S. drones on its territory. The statement was initially released on Thursday, following the investigator’s three-day visit to Pakistan, which ended Wednesday. The visit was kept secret until Emmerson left.

Imtiaz Gul, an expert on Pakistani militancy who is helping Emmerson’s team, said Friday that the organization he runs, the Centre for Research and Security Studies, gave the U.N. investigator during his visit case studies on 25 strikes that allegedly killed around 200 civilians.

The U.N. investigation into civilian casualties from drone strikes and other targeted killings in Pakistan and several other countries was launched in January and is expected to deliver its conclusions in October.

The U.S. rarely discusses the strikes in public because of their covert nature. But a few senior officials, including CIA chief John Brennan, have publicly defended the strikes, saying precision weapons help avoid significant civilian casualties.

A 2012 investigation by the AP into 10 of the recent deadliest drone strikes in Pakistan over the previous two years found that a significant majority of the casualties were militants, but civilians were also killed.

Villagers told the AP that of at least 194 people killed in the attacks, about 70 percent – at least 138 – were militants. The remaining 56 were either civilians or tribal police, and 38 of them were killed in a single attack on March 17, 2011.

Pakistani officials regularly criticize the attacks in public as a violation of the country’s sovereignty, a popular position in a country where anti-American sentiment runs high.

But the reality has been more complicated in the past.

For many years, Pakistan allowed U.S. drones to take off from bases within the country. Documents released by WikiLeaks in 2010 showed that senior Pakistani officials consented to the strikes in private to U.S. diplomats, while at the same time condemning them in public.

Cooperation has certainly waned since then as the relationship between Pakistan and the U.S. has deteriorated. In 2011, Pakistan kicked the U.S. out of an air base used by American drones in the country’s southwest, in retaliation for U.S. airstrikes that killed 24 Pakistani soldiers.

But U.S. officials have insisted that cooperation has not ended altogether and key Pakistani military officers and civilian politicians continue to consent to the strikes. The officials have spoken on condition of anonymity because of the covert nature of the drone program.

However, Emmerson, the U.N. investigator, came away with a black and white view after his meetings with Pakistani officials.

“The position of the government of Pakistan is quite clear,” said Emmerson. “It does not consent to the use of drones by the United States on its territory and it considers this to be a violation of Pakistan’s sovereignty and territorial integrity.”

The drone campaign “involves the use of force on the territory of another state without its consent and is therefore a violation of Pakistan’s sovereignty,” he said.

Pakistan claimed the drone strikes were radicalizing a new generation of militants and said it was capable of fighting the war against Islamist extremism in the country by itself, said Emmerson.

A major reason why the U.S. has stepped up drone attacks in Pakistan is because it has failed to convince the government to target Taliban militants using its territory to launch cross-border attacks against American troops in Afghanistan.

Emmerson met with a variety of Pakistani officials during his visit, as well as tribal leaders from the North Waziristan tribal area – the main target for U.S. drones in the country – and locals who claimed they were injured by the attacks or had lost loved ones.

The tribal leaders said innocent tribesmen were often mistakenly targeted by drones because they were indistinguishable from Taliban militants, said Emmerson. Both groups wear the same traditional tribal clothing and normally carry a gun at all times, he said.

“It is time for the international community to heed the concerns of Pakistan, and give the next democratically elected government of Pakistan the space, support and assistance it needs to deliver a lasting peace on its own territory without forcible military interference by other states,” said Emmerson.

Is the U.S. stepping up Internet control push over unproven hacking allegations?

By BARRY GREY | WSW | FEBRUARY 21, 2013

The Obama administration is utilizing unsubstantiated charges of Chinese government cyber-attacks to escalate its threats against China. The past two days have seen allegations of hacking into US corporate and government web sites, hyped by the US media without any examination of their validity, employed to disorient the American public and justify an expansion of the Obama administration’s drive to isolate China and prepare for an eventual military attack.

The accusations of hacking against China will also be used to justify increased domestic surveillance of computer and Internet communications, as well as an expanded use of cyber warfare methods internationally.

The New York Times, functioning once again as a conduit for the Pentagon and the CIA, has taken the lead in the latest provocation against Beijing. On Tuesday it published a bellicose front-page article headlined “China’s Army Seen as Tied to Hacking Against US,” and carrying the ominous subhead “Power Grid is a Target.”

The article drips with cynicism and hypocrisy. It is well known that the United States is the world’s most ruthless practitioner of cyber warfare. The article itself acknowledged that the US worked with Israel to disrupt the Iranian nuclear program by introducing the Stuxnet virus into Iran’s computer systems. That bit of sabotage—itself an illegal act of aggression—was accompanied by a series of assassinations of Iranian scientists carried out by Israel with Washington’s support.

The sprawling front-page article, which continued on an entire inside page of the newspaper, was based on a 60-page report released that day by a private computer security firm with close ties to the Times, as well as to the US military and intelligence agencies. The report by Mandiant—founded by a retired Air Force officer and based in Alexandria, Virginia—provides no real evidence to substantiate its claim that a unit of China’s People’s Liberation Army based in Shanghai is directing hacking attacks on US corporations, organizations and government institutions.

In its report, Mandiant claims to have tracked 141 cyber attacks by the same Chinese hacker group since 2006, 115 of which targeted US corporations. On the basis of Internet footprints, including Internet provider addresses, Mandiant concludes that 90 percent of the hacking attacks come from the same neighborhood in Shanghai. It then notes that the headquarters of Unit 61398 of the People’s Liberation Army is located in that neighborhood. From this coincidence, Mandiant draws the entirely unwarranted inference that the cyber-attacks are coming from the PLA building.

As the Times admits in its article, “The firm was not able to place the hackers inside the 12-story [PLA Unit 61398 headquarters] building…” The newspaper goes on to report that “Mandiant also discovered an internal China Telecom memo discussing the state-owned telecom company’s decision to install high-speed fiber-optic lines for Unit 61398’s headquarters.” One can only assume that Mandiant “discovered” this memo by carrying out its own hacking of Chinese computers.

Chinese spokesmen have denied any involvement by the government or the military in hacking attacks and dismissed the Mandiant report as lacking any proof of its charges. The Chinese Ministry of Defense released a statement Wednesday pointing out that Internet provider addresses do not provide a reliable indication of the origin of hacking attacks, since hackers routinely usurp IP addresses. A Foreign Ministry spokesman pointed out that China is constantly being targeted by hackers, most of which originate in the US.

The Chinese position was echoed by Dell Secureworks cyber-security expert Joe Stewart, who told the Christian Science Monitor: “We still don’t have any hard proof that [the hacker group] is coming out of that [PLA Unit 61398’s] building, other than a lot of weird coincidence pointing in that direction. To me, it’s not hard evidence.”

The Obama administration followed up the Times article, which sparked a wave of frenzied media reports of Chinese cyber-attacks, by announcing on Wednesday that it would step up diplomatic pressure and consider more punitive laws to counter what it described as a wave of trade secret theft by China and other countries. The Associated Press reported that the administration was discussing “fines, penalties and tougher trade restrictions” directed against China.

The latest propaganda attack points to an escalation of the US offensive against China that went by the name “pivot to Asia” in Obama’s first term. That policy included whipping up territorial disputes in the East China and South China seas between China and a series of countries in East Asia, including Japan, Vietnam and the Philippines.

It has also included the establishment of closer military ties and new US installations in a number of countries, including India and Australia, to militarily encircle China.

The Times concluded its article by reporting that “The mounting evidence of state sponsorship… and the growing threat to American infrastructure are leading officials to conclude that a far stronger response is necessary.” It cited Rep. Mike Rogers, the Republican chairman of the House Intelligence Committee, as saying that Washington must “create a high price” to force the Chinese to back down.

In an editorial published Wednesday, the Times noted that the administration has decided to give US Internet providers and anti-virus vendors information on the signatures of Chinese hacker groups, leading to a denial of access to US networks for these groups. It also reported that President Obama last week signed an executive order authorizing increased sharing of information on cyber threats between the government and private companies that oversee critical infrastructure, such as the electrical grid.

The Wall Street Journal in its editorial called for “targeted sanctions” against Chinese individuals and institutions.

The background to this new salvo of anti-China propaganda underscores that it is part of an aggressive expansion of US military capabilities, both conventional and cyber-based. Obama raised the issue of cyber war in his February 12 State of the Union address, accusing US “enemies” of seeking to “sabotage our power grid, our financial institutions, our air traffic control systems,” and insisting that action be taken against such attacks.

In the same speech, he defended his drone assassination program, which is based on the claim that the president has the unlimited and unilateral power to order the murder of anyone anywhere in the world, including US citizens.

Last October, Obama signed an executive order expanding military authority to carry out cyber-attacks and redefine as “defensive” actions that would previously have been considered acts of aggression—such as the cutting off of computer networks. Around the same time, Defense Secretary Leon Panetta gave a bellicose speech in which he warned of a “cyber Pearl Harbor.” Panetta told Time magazine: “The three potential adversaries out there that are developing the greatest capabilities are Russia, China and Iran.”

At the end of January, the New York Times accused Chinese authorities of hacking into its news operations, a charge that was quickly seconded by the Washington Post and the Wall Street Journal. That same week, the Washington Post reported that the US military had approved a five-fold increase of personnel in its Cyber Command. Days later, the Times reported on its front page that the Obama administration had concluded that the president had the power to authorize pre-emptive cyber war attacks.

This bellicose posture toward China and expansion of cyber warfare methods goes hand in hand with growing threats to democratic rights at home. The cyber war plans include options for military action within the US. The Times reported earlier this month that the military “would become involved in cases of a major cyber-attack within the United States” under certain vaguely defined conditions.

Efforts to increase government control of the Internet and surveillance of Internet communications are being stepped up. Just last week, Rep. Rogers of Michigan and Democratic Senator Dutch Ruppersberger of California reintroduced the Cyber Intelligence Sharing and Protection Act (CISPA). The bill died in the Senate last year in the midst of protests over provisions allowing the government to spy on emails and other Internet-based communications.

Terrorists in Argelia same as the ones who opperated in Benghazi

By LUIS MIRANDA | THE REAL AGENDA | JANUARY 23, 2013

Some Egyptians who participated in the mass kidnapping of a gas plant in Algeria last week also participated in the attack on the U.S. consulate in Benghazi that killed four diplomats, as reported Tuesday by the New York Times, whose sources are allegedly Algerian officials.

Based on this information, the Egyptians who were part of the jihadist command died in the assault carried out by the Algerian army that killed 67 people after four days of siege. No clutch, three of the terrorists were captured alive and one of them was the one who provided this information, the report said.

This relationship reinforces the notion that jihadist groups that have become strong in the Sahara cooperate across borders, an issue that Western defense officials have warned about. For example, the alleged organizer of the assault on the gas plant, Mokhtar Belmojtar, is believed to be based in Mali. Belmojtar has also been identified by other sources as a CIA agent.

In the video below, Belmojtar appears taking credit for the terror attack perpetrated against the gas plant in Algeria.

 

According to Infowars.com, Belmokhtar was recruited and trained by the CIA in Afghanistan. The man was recruited from North Africa and worked for the American intelligence agency as well as the Pakistani ISI. The Mujahideen organization would later splinter into al-Qaeda and the Taliban. After the war in Afghanistan, Belmokhtar went back to Algeria in the 1990s and immediately a group known as the Salafists for Preaching and Combat (GSPC).

U.S. Secretary of State Hillary Clinton warned of these cross-border ties between terrorist groups which by all accounts occurred shortly after the assault on Benghazi, reports the New York Daily, but Clinton gave no concrete evidence of these relationships. Clinton said the Islamist uprising in northern Mali, now fighting against the French and African troops, had provided a “safe area” for terrorists to “extend its influence.” Mrs. Clinton did not denounce the allegiance concocted by the CIA with all these terrorist groups, though.

From Kurt Nimmo’s article at Inforwars.com:

“Al-Qaeda in the Islamic Maghreb from the outset in 2007 had established a close relationship to the Libyan Islamic Fighting Group, whose leaders had also been trained and recruited in Afghanistan by the CIA,” writes Michel Chossudovsky. “The LIFG is supported covertly by the CIA and Britain’s MI6.”

The GSPC was purportedly founded by Hassan Hattab, a former Groupe Islamique Armé (GIA) commander. Mohammed Samraoui, the Algerian army’s deputy chief counterintelligence specialist, claims GSPC was established by the Algerian army in an attempt to weaken and destroy the moderate Islamic Salvation Front, an Islamist political party poised to take power in Algeria’s elections. GSPC members were recruited by Algerian intelligence upon returning from the jihad in Afghanistan.

Infowars.com also cites a document from MI6, as proof that British intelligence were more than aware about plans to assassinate former Libyan leader Muammar Gaddafi, who was deposed and murdered with the help of Western forces that infiltrated Libya last year.

The official source cited in the reports did not say why they have given credibility to the statement issued by the terrorist, nor if this information was obtained under torture. The information does match the kind of relationships that the United States government maintain with terrorist groups all over the Middle East and Northern Africa, which serve as proxy trouble makers operating under Western sponsorship.

The Real Agenda encourages the sharing of its original content ONLY through the tools provided at the bottom of every article. Please DON’T copy articles from The Real Agenda and redistribute by email or post to the web.

Macedonia convicted of aiding CIA with torture of prisoners

By LUIS MIRANDA | THE REAL AGENDA | DECEMBER 14, 2012

On Thursday Macedonia became the first European country to be found guilty for collaborating with the U.S. in the so-called secret CIA flights and for hosting secret CIA torture sites. The Strasbourg Court said the country was guilty for aiding the CIA to torture a German citizen of Lebanese descent who was mistaken as a terrorist.

The European Court of Human Rights has established that Khaled el Masri was tortured after his arrest on December 31, 2003 and before being delivered 23 days later to the CIA, which sent him to a prison camp in Afghanistan where he remained for 6 months.

Macedonia broke up four articles of the European Convention of Human Rights, according to the Court, which places special emphasis on the third article, which prohibits torture and therefore condemns the country to pay the complainant € 60,000 in damages.

The country also violated the right to liberty and security, respect for private and family life and the right to an effective remedy, according to the judgment. Macedonia not only practiced torture with El Masri but gave him to the CIA knowing that he risked further torture, said the ruling.

“This sentence deserves to be described as historic: it is the first conviction in an international court of the practice of illegal transportation of detainees and the CIA’s secret detention,” said the president of the Parliamentary Assembly of the Council of Europe, Jean-Claude Mignon.

This pan-European body, which brings together 47 States of the Old Continent, whipped these shady practices that emerged after the attacks of September 11, 2001, in a report by Swiss senator Dick Marty in 2006, in which he detailed that 14 European countries collaborated in these illegal practices.

Amnesty International, meanwhile, saw the ruling as “a milestone in the fight against impunity” and a first step to convict other countries who also collaborated with the CIA.

The Human Rights Court validated the testimony of El Masri, born in 1963 and living in the German city of Ulm, who said he was mistaken for a terrorist when he arrived in Skopje on December 31, 2003 for sightseeing.

There he was arrested by the Macedonian authorities, who took him to a hotel room, There, he was held for 23 days without any legal help, interrogated in English  — a language he did not speak properly — and isolated from all external contact. This, he says put him in a permanent a state of distress.

But his ordeal had just begun, because 23 days later he was handcuffed, hooded and taken to the airport, where he waited a group of CIA agents who subjected him to harsh torture while in custody of Macedonian authorities. “The Macedonian government’s responsibility is accepted in regard to acts committed on its territory by agents of a foreign state,” said the statement issued by the Court.

El-Masri was beaten, stripped and sodomized with an object, reads the statement. These forms of torture “were used with premeditation in order to provoke El-Masri severe pain and suffering to obtain information from him. The Court considers that torture,” say the judges.

While the Court issued this statement, in the United States, the Senate intelligence committee has officially concluded that CIA interrogations were ineffective. “The report is the most detailed independent examination to date of the agency’s efforts to “break” dozens of detainees through physical and psychological duress, a period of CIA history that has become a source of renewed controversy,” reports the Washington Post.

In the case of El-Masri, he was sedated and placed in an aircraft. After a stopover in Baghdad, the plane landed in Afghanistan, where El-Masri was detained in a detention center and kept in a small concrete cell. They suffered further torture and made two hunger strikes before May 28, 2004, five months after his arrest, when he was transferred to Germany.

Visibly affected by torture, and weighing 18 kilos less than before, El Masri filed a complaint that year and since then has struggled to make European and U.S. authorities recognize the mistake made by the CIA.
One of the most important elements in the trial of Macedonia as an accomplice of the CIA was the testimony of the country’s Interior Minister at the time of the facts, who confirmed the arrest of El-Masri and his surrender to the CIA.

In a similar case, the British government settled a case with Sami al Saadi, a Libyan dissident by paying him 2.2 million pounds (2.7 million euros) after he was secretly handed over to the regime of Muammar Gaddafi in 2004. The Libyan was captured with the help of the British intelligence service MI6. Saadi claimed he was tricked by MI6 and the CIA, taken to Libya and tortured while he was there.

The Real Agenda encourages the sharing of its original content ONLY through the tools provided at the bottom of every article. Please DON’T copy articles from The Real Agenda and redistribute by email or post to the web.