Glenn Greenwald full interview on Snowden, the NSA, et al




NSA and GCHQ target Tor network that protects anonymity of web users

• Top-secret documents detail repeated efforts to crack Tor

• US-funded tool relied upon by dissidents and activists

Attacking Tor: the technical details

  • By , and
  • One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets’ computers. Photograph: Felix Clay

    The National Security Agency has made repeated attempts to develop attacks against people using Tor, a popular tool designed to protect online anonymity, despite the fact the software is primarily funded and promoted by the US government itself.

    Top-secret NSA documents, disclosed by whistleblower Edward Snowden, reveal that the agency’s current successes against Tor rely on identifying users and then attacking vulnerable software on their computers. One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets’ computers, including access to files, all keystrokes and all online activity.

    But the documents suggest that the fundamental security of the Tor service remains intact. One top-secret presentation, titled ‘Tor Stinks’, states: “We will never be able to de-anonymize all Tor users all the time.” It continues: “With manual analysis we can de-anonymize a very small fraction of Tor users,” and says the agency has had “no success de-anonymizing a user in response” to a specific request.

    Another top-secret presentation calls Tor “the king of high-secure, low-latency internet anonymity”.

    Tor – which stands for The Onion Router – is an open-source public project that bounces its users’ internet traffic through several other computers, which it calls “relays” or “nodes”, to keep it anonymous and avoid online censorship tools.

    It is relied upon by journalists, activists and campaigners in the US and Europe as well as in China, Iran and Syria, to maintain the privacy of their communications and avoid reprisals from government. To this end, it receives around 60% of its funding from the US government, primarily the State Department and the Department of Defense – which houses the NSA.

    Despite Tor’s importance to dissidents and human rights organizations, however, the NSA and its UK counterpart GCHQ have devoted considerable efforts to attacking the service, which law enforcement agencies say is also used by people engaged in terrorism, the trade of child abuse images, and online drug dealing.

    Privacy and human rights groups have been concerned about the security of Tor following revelations in the Guardian, New York Times and ProPublica about widespread NSA efforts to undermine privacy and security software. A report by Brazilian newspaper Globo also contained hints that the agencies had capabilities against the network.

    While it seems that the NSA has not compromised the core security of the Tor software or network, the documents detail proof-of-concept attacks, including several relying on the large-scale online surveillance systems maintained by the NSA and GCHQ through internet cable taps.

    One such technique is based on trying to spot patterns in the signals entering and leaving the Tor network, to try to de-anonymise its users. The effort was based on a long-discussed theoretical weakness of the network: that if one agency controlled a large number of the “exits” from the Tor network, they could identify a large amount of the traffic passing through it.

    The proof-of-concept attack demonstrated in the documents would rely on the NSA’s cable-tapping operation, and the agency secretly operating computers, or ‘nodes’, in the Tor system. However, one presentation stated that the success of this technique was “negligible” because the NSA has “access to very few nodes” and that it is “difficult to combine meaningfully with passive Sigint”.

    While the documents confirm the NSA does indeed operate and collect traffic from some nodes in the Tor network, they contain no detail as to how many, and there are no indications that the proposed de-anonymization technique was ever implemented.

    Other efforts mounted by the agencies include attempting to direct traffic toward NSA-operated servers, or attacking other software used by Tor users. One presentation, titled ‘Tor: Overview of Existing Techniques’, also refers to making efforts to “shape”, or influence, the future development of Tor, in conjunction with GCHQ.

    Another effort involves measuring the timings of messages going in and out of the network to try to identify users. A third attempts to degrade or disrupt the Tor service, forcing users to abandon the anonymity protection.

    Such efforts to target or undermine Tor are likely to raise legal and policy concerns for the intelligence agencies.

    Foremost among those concerns is whether the NSA has acted, deliberately or inadvertently, against internet users in the US when attacking Tor. One of the functions of the anonymity service is to hide the country of all of its users, meaning any attack could be hitting members of Tor’s substantial US user base.

    Several attacks result in implanting malicious code on the computer of Tor users who visit particular websites. The agencies say they are targeting terrorists or organized criminals visiting particular discussion boards, but these attacks could also hit journalists, researchers, or those who accidentally stumble upon a targeted site.

    The efforts could also raise concerns in the State Department and other US government agencies that provide funding to increase Tor’s security – as part of the Obama administration’s internet freedom agenda to help citizens of repressive regimes – circumvent online restrictions.

    Material published online for a discussion event held by the State Department, for example, described the importance of tools such as Tor.

    “[T]he technologies of internet repression, monitoring and control continue to advance and spread as the tools that oppressive governments use to restrict internet access and to track citizen online activities grow more sophisticated. Sophisticated, secure, and scalable technologies are needed to continue to advance internet freedom.”

    The Broadcasting Board of Governors, a federal agency whose mission is to “inform, engage, and connect people around the world in support of freedom and democracy” through networks such as Voice of America, also supported Tor’s development until October 2012 to ensure that people in countries such as Iran and China could access BBG content. Tor continues to receive federal funds through Radio Free Asia, which is funded by a federal grant from BBG.

    The governments of both these countries have attempted to curtail Tor’s use: China has tried on multiple occasions to block Tor entirely, while one of the motives behind Iranian efforts to create a “national internet” entirely under government control was to prevent circumvention of those controls.

    The NSA’s own documents acknowledge the service’s wide use in countries where the internet is routinely surveilled or censored. One presentation notes that among uses of Tor for “general privacy” and “non-attribution”, it can be used for “circumvention of nation state internet policies” – and is used by “dissidents” in “Iran, China, etc”.

    Yet GCHQ documents show a disparaging attitude towards Tor users. One presentation acknowledges Tor was “created by the US government” and is “now maintained by the Electronic Frontier Foundation (EFF)”, a US freedom of expression group. In reality, Tor is maintained by an independent foundation, though has in the past received funding from the EFF.

    The presentation continues by noting that “EFF will tell you there are many pseudo-legitimate uses for Tor”, but says “we’re interested as bad people use Tor”. Another presentation remarks: “Very naughty people use Tor”.

    The technique developed by the NSA to attack Tor users through vulnerable software on their computers has the codename EgotisticalGiraffe, the documents show. It involves exploiting the Tor browser bundle, a collection of programs, designed to make it easy for people to install and use the software. Among these is a version of the Firefox web browser.

    The trick, detailed in a top-secret presentation titled ‘Peeling back the layers of Tor with EgotisticalGiraffe’, identified website visitors who were using the protective software and only executed its attack – which took advantage of vulnerabilities in an older version of Firefox – against those people. Under this approach, the NSA does not attack the Tor system directly. Rather, targets are identified as Tor users and then the NSA attacks their browsers.

    According to the documents provided by Snowden, the particular vulnerabilities used in this type of attack were inadvertently fixed by Mozilla Corporation in Firefox 17, released in November 2012 – a fix the NSA had not circumvented by January 2013 when the documents were written.

    The older exploits would, however, still be usable against many Tor users who had not kept their software up to date.

    A similar but less complex exploit against the Tor network was revealed by security researchers in July this year. Details of the exploit, including its purpose and which servers it passed on victims’ details to, led to speculation it had been built by the FBI or another US agency.

    At the time, the FBI refused to comment on whether it was behind the attack, but subsequently admitted in a hearing in an Irish court that it had operated the malware to target an alleged host of images of child abuse – though the attack did also hit numerous unconnected services on the Tor network.

    Roger Dingledine, the president of the Tor project, said the NSA’s efforts serve as a reminder that using Tor on its own is not sufficient to guarantee anonymity against intelligence agencies – but showed it was also a great aid in combating mass surveillance.

    “The good news is that they went for a browser exploit, meaning there’s no indication they can break the Tor protocol or do traffic analysis on the Tor network,” Dingledine said. “Infecting the laptop, phone, or desktop is still the easiest way to learn about the human behind the keyboard.

    “Tor still helps here: you can target individuals with browser exploits, but if you attack too many users, somebody’s going to notice. So even if the NSA aims to surveil everyone, everywhere, they have to be a lot more selective about which Tor users they spy on.”

    But he added: “Just using Tor isn’t enough to keep you safe in all cases. Browser exploits, large-scale surveillance, and general user security are all challenging topics for the average internet user. These attacks make it clear that we, the broader internet community, need to keep working on better security for browsers and other internet-facing applications.”

    The Guardian asked the NSA how it justified attacking a service funded by the US government, how it ensured that its attacks did not interfere with the secure browsing of law-abiding US users such as activists and journalists, and whether the agency was involved in the decision to fund Tor or efforts to “shape” its development.

    The agency did not directly address those questions, instead providing a statement.

    It read: “In carrying out its signals intelligence mission, NSA collects only those communications that it is authorized by law to collect for valid foreign intelligence and counter-intelligence purposes, regardless of the technical means used by those targets or the means by which they may attempt to conceal their communications. NSA has unmatched technical capabilities to accomplish its lawful mission.

    “As such, it should hardly be surprising that our intelligence agencies seek ways to counteract targets’ use of technologies to hide their communications. Throughout history, nations have used various methods to protect their secrets, and today terrorists, cybercriminals, human traffickers and others use technology to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that.”

    • This article was amended on 4 October after the Broadcasting Board of Governors pointed out that its support of Tor ended in October 2012.

    Bruce Schneier is an unpaid member of the Electronic Frontier Foundation’s board of directors. He has not been involved in any discussions on funding. 




    Can Iran Trust the United States?

    Duplicitous Diplomacy?

    Mohammad Mossadegh

    Iran’s Prime Minister Mohammad Mossadegh viewing the Liberty Bell during trip to the US, 1951.  He had the subversive idea that his country’s oil riches should benefit Iranians first and foremost. He had to go.

    by SHELDON RICHMAN
    People ask whether the United States can trust Iran. The better question is whether Iran can trust the United States.

    Since 1979 the U.S. government has prosecuted a covert and proxy war against Iran. The objective has been regime change and installation of a government that will loyally serve U.S. state objectives. This war began after the popular overthrow of the U.S. government’s client, Shah Mohammad Reza Pahlavi, whose brutal regime the Eisenhower administration and CIA had preserved by driving Iran’s popular Prime Minister Mohammad Mossadegh from office in 1953.

    Had the U.S. government not supported the shah and his secret police, there would have been no 1979 Islamic Revolution or 444-day hostage-taking at the U.S. embassy in Tehran.

    The U.S. government has pursued regime change in a variety of ways. When Saddam Hussein’s Iraqi army invaded Iran in 1980, the Reagan administration supplied Saddam with intelligence and the ingredients for chemical weapons. Saddam, helped by that intelligence, used poison gas against Iranian troops.

    During the Iraq-Iran war, the U.S. Navy shot down an Iranian civilian airplane over Iranian airspace, killing 290 passengers and crew members. The captain of the USS Vincennes said his ship was being attacked by gunboats at the time, and the Airbus A300 was misidentified as an attacking F-14 Tomcat. Iran countered that the civilian flight left Iran every day at the same time. Witnesses with Italy’s navy and on a nearby U.S. warship said the airliner was climbing, not diving (as a plane would for an attack), when it was shot down.

    The U.S. government, or its closest Middle East ally, Israel, has helped ethnic insurgents to attack Iran’s regime. Some groups encouraged by the U.S. government, such as Jundallah and the Mujahedin e-Khalq cult, have been regarded as terrorist organizations by the State Department. Covert warfare has also taken the form of the assassination of Iranian scientistsand cyber warfare. (It strains credulity to think that Israel, which annually receives billions in U.S. military assistance, acts without the knowledge of U.S. officials.)

    Then there are the economic sanctions. In international law, sanctions are an act of war. How could they not be? They aim to deprive a population of food, medicine, and other needed goods. The sanctions are said to “cripple the Iranian economy,” but an economy consists of people. Thus, sanctions inflict harm on innocent individuals, with the greatest damage to children, the elderly, and the sick. That is cruel and unconscionable. It must stop, yet some in Congress would toughen the sanctions further.

    As one can see, the Iranians are the aggrieved party in the conflict with the United States. Thus they have good reason to doubt the sincerity of recent conciliatory statements, especially when President Obama insists that “all options are on the table” — which logically includes a military and even nuclear attack. Obama should match the conciliatory words with action.

    But, some will say, Iran is building a nuclear bomb. The problem is that this is not true. Twice the American intelligence complex (some 14 agencies) has concluded that Iran abandoned whatever weapons program it had in 2003, the year the U.S. government eliminated its archenemy, Saddam Hussein. Israeli intelligence agrees that Iran has not decided to build a bomb. Indeed, Iran’s Supreme Leader, Ayatollah Ali Khamenei, issued a religious fatwacondemning  nuclear weapons years ago and has repeatedly invoked it.

    It is true that Iran has enriched uranium to near 20 percent (as it may do legally), but it is turning that uranium into plates, which, although suitable for medical purposes, are unsuitable for bombs. (Weapons-grade uranium is 90 percent enriched.)

    Moreover, Iran, a party to the nuclear Non-Proliferation Treaty, submits to inspections from the International Atomic Energy Agency, which has repeatedly certified that Iran’s uranium has not been diverted to making bombs. On the other hand, Israel, a nuclear power whose government (and American lobby) agitates for war between America and Iran, is not a member of the NPT.

    Ask yourself: What would Iran do with a nuclear weapon when Israel has hundreds of them and America has thousands?

    Despite the peace overtures from President Rouhani, which echo those of his predecessors, Obama is on a course for war. He should spurn the warmongers and choose peace.

    Sheldon Richman  is vice president and editor at The Future of Freedom Foundation in Fairfax, Va. (www.fff.org




    Dave Foreman and the First Green Scare Case

    Targeting Earth First!
    by JOSHUA FRANK AND JEFFREY ST. CLAIR, Counterpunch & greenmucktaker.com

    dave-foremanDave Foreman, co-founder of Earth First!, awoke at five in the morning on May 30, 1989 to the sound of three FBI agents shouting his name in his Tucson, Arizona home. Foreman’s wife Nancy answered the door frantically and was shoved aside by brawny FBI agents as they raced toward their master bedroom where her husband was sound asleep, naked under the sheets, with plugs jammed in his ears to drown out the noise of their neighbor’s barking Doberman pincher. By the time Foreman came to, the agents were surrounding his bed, touting bulletproof vests and .357 Magnums.

    He immediately thought of the murder of Fred Hampton in Chicago, expecting to be shot in cold blood. But as Foreman put it, “Being a nice, middle-class honky male, they can’t get away with that stuff quite as easily as they could with Fred, or with all the native people on the Pine Ridge Reservation back in the early 70s.”

    So instead of firing off a few rounds, they jerked a dazed Foreman from his slumber, let him pull on a pair of shorts, and hauled him outside where they threw him in the back of an unmarked vehicle. It took over six hours before Foreman even knew why he had been accosted by Federal agents.

    Foreman’s arrest was the culmination of three years and two million tax dollars spent in an attempt to frame a few Earth First! activists for conspiring to damage government and private property. The FBI infiltrated Earth First! groups in several states with informants and undercover agent-provocateurs. Over 500 hours of tape recordings of meetings, events and casual conversation had been amassed. Phones had been tapped and homes broken in to. The FBI was doing their best to intimidate radical environmentalists across the country, marking them as potential threat to national security.

    It was the FBI’s first case of Green Scare.

    The day before Foreman was yanked from bed and lugged in to the warm Arizona morning, two so-called co-conspirators, biologist Marc Baker and antinuclear activist Mark Davis, were arrested by some 50 agents on horseback and on foot, with a helicopter hovering above as the activists stood at the base of a power line tower in the middle of desert country in Wenden, Arizona, 200 miles northwest of Foreman’s home. The next day Peg Millet, a self-described “redneck woman for wilderness,” was arrested at a nearby Planned Parenthood where she worked. Millet earlier evaded the FBI’s dragnet.

    Driven to the site by an undercover FBI agent, the entire episode, as Foreman put it, was the agent’s conception. Foreman, described by the bureau as the guru and financier of the operation, was also pegged for having thought up the whole elaborate scheme, despite the fact that their evidence was thin.

    Back in the 1970s the FBI issued a memo to their field offices stating that when attempting to break up dissident groups, the most effective route was to forget about hard intelligence or annoying facts. Simply make a few arrests and hold a public press conference. Charges could later be dropped. It didn’t matter; by the time the news hit the airwaves and was printed up in the local newspapers, the damage had already been done.

    It was the FBI’s assertion that the action stopped by the arrests under that Arizona power line in late May, 1989, was to be a test run for a much grander plot involving Davis, Baker, Millet, and the group’s leader, Dave Foreman. The FBI charged the four with the intent to damage electrical transmission lines that lead to the Rocky Flats nuclear weapons facility in Colorado.

    “The big lie that the FBI pushed at their press conference the day after the arrests was that we were a bunch of terrorists conspiring to cut the power lines into the Palo Verde and Diablo Canyon nuclear facilities in order to cause a nuclear meltdown and threaten public health and safety,” explained Foreman.

    In the late 1980s the FBI launched operation THERMCON in response to an act of sabotage of the Arizona Snowbowl ski lift near Flagstaff, Arizona that occurred in October 1987, allegedly by Davis, Millet and Baker. Acting under the quirky name, Evan Mecham Eco-Terrorist International Conspiracy (EMETIC) — the eco-saboteurs wrecked several of the company’s ski lifts, claiming that structures were cutting in to areas of significant biological importance.

    This was not the first act the group claimed responsibility for. A year prior EMETIC sent a letter declaring they were responsible for the damage at the Fairfield Snow Bowl near Flagstaff. The group’s letter also included a jovial threat to “chain the Fairfield CEO to a tree at the 10,000-foot level and feed him shrubs and roots until he understands the suicidal folly of treating the planet primarily as a tool for making money.”

    The group used an acetylene torch to cut bolts from several of the lift’s support towers, making them inoperable. Upon receiving the letter, the Arizona ski resort was forced to shut down the lift in order to repair the damages, which rang up to over $50,000.

    But the big allegations heaved at these eco-saboteurs wasn’t for dislodging a few bolts at a quaint ski resort in the heart of the Arizona mountains, or for inconveniencing a few ski bums from their daily excursions. No, the big charges were levied at the group for allegedly plotting to disrupt the functions of the Rocky Flats nuclear facility hundreds of miles away. Ironically, at the moment of their arrests, the FBI was simultaneously looking into public health concerns due to an illegal radioactive waste leak at the nuclear power site, which led Earth First! activist Mike Roselle to quip, “ [the FBI] would have discharged its duty better by assisting in a conspiracy to cut power to Rocky Flats, instead of trying to stop one.”

    ***

    Gerry Spence climbed into his private jet in Jackson, Wyoming estate almost immediately after he heard about the FBI arrest of Dave Foreman in Arizona. Spence had made a name for himself among environmental activists in the late-1970s for his case against energy company Kerr-McGee, when he provided legal services to the family of former employee Karen Silkwood, who died suspiciously after she challenged the company of environmental abuses at one of their most productive nuclear facilities. Silkwood, who made plutonium pellets for nuclear reactors, had been assigned by her union to investigate health and safety concerns at a Kerr-McGee plant near Crescent, Oklahoma. In her monitoring of the facility Silkwood found dozens of evident regulatory violations, including faulty respiratory equipment as well as many cases of workers being exposed to radioactive material.

    Silkwood went public after the company seemingly ignored her and her union’s concerns, even going as far as to testify to the Atomic Energy Commission (AEC) about the issues, claiming that regulations were sidestepped in an attempt to up the speed of production. She also claimed that workers had been mishandling nuclear fuel rods, but the company has covered up the incidences by falsifying inspection reports.

    On the night of November 13, 1974, Silkwood left a union meeting in Crescent with documents in hand to drive to Oklahoma City where she was to meet and discuss Kerr-McGee’s alleged violations with a union official and two New York Times reporters. She never made it. Silkwood’s body was found the next day in the driver’s seat of her car on the side of the road, stuck in a culvert. She was pronounced dead on the scene and no documents were found in her car.

    An independent private investigation revealed that Silkwood was in full control of her vehicle when it was struck from behind and forced off to the side of the road. According to the private investigators, the steering wheel of her car was bent in a manner that showed conclusively that Silkwood was prepared for the blow of the accident as it occurred. She had not been asleep at the wheel as investigators initially thought. The coroner concluded she had not died as a result of the accident, but possibly from suffocation.

    No arrests or charges were ever made. Silkwood’s children and father filed a lawsuit against Kerr-McGee on behalf of her estate. Gerry Spence was their lead attorney. An autopsy of Silkwood’s body showed extremely high levels of plutonium contamination. Lawyers for Kerr-McGee argued first that the levels found were normal, but after damning evidence to the contrary, they were forced to argue that Silkwood had likely poisoned herself.

    Spence had been victorious. Kerr-McGee’s defense was caught in a series of unavoidable contradictions. Silkwood’s body was laden with poison as result of her work at the nuclear facility. In her death Spence vindicated her well-documented claims. The initial jury verdict was for the company to pay $505,000 in damages and $10,000,000 in punitive damages. Kerr-McGee appealed and drastically reduced the jury’s verdict, but the initial ruling was later upheld by the Supreme Court. On the way to a retrial the company agreed to pay $1.38 million to the Silkwood estate.

    Gerry Spence was not cowed by the antics of the Kerr-McGee Corporation, and when he agreed to take on Dave Foreman’s case pro-bono, justice seemed to be on the horizon for the Earth First! activists as well.

    “Picture a little guy out there hacking at a dead steel pole, an inanimate object, with a blowtorch. He’s considered a criminal,” said Spence, explaining how he planned to steer the narrative of Foreman’s pending trial. “Now see the image of a beautiful, living, 400-year-old-tree, with an inanimate object hacking away at it. This non-living thing is corporate America, but the corporate executives are not considered criminals at all.”

    Like so many of the FBI charges brought against radical activists throughout the years, the case against Dave Foreman was less exciting than the investigation that led up to his arrest. The bureau had done its best to make Foreman and Earth First! out to be the most threatening activists in America.

    Spence was not impressed and in fact argued as much, stating the scope of the FBI’s operation THERMCON was “very similar to the procedures the FBI used during the 1960s against dissident groups.” No doubt Spence was right. Similar to the movement disruption exemplified by COINTELPRO against Martin Luther King Jr., the Black Panthers and the American Indian Movement, the FBI’s crackdown of Earth First! in the late 1980s had many alarming parallels to the agency of old.

    “Essentially what we need to understand is that the Federal Bureau of Investigation, which was formed during the Palmer Raids in 1921, was set up from the very beginning to inhibit internal political dissent. They rarely go after criminals. They’re a thought police,” said Foreman of the FBI’s motives for targeting environmentalists. “Let’s face it, that’s what the whole government is. Foreman’s first law of government reads that the purpose of the state, and all its constituent elements, is the defense of an entrenched economic elite and philosophical orthodoxy. Thankfully, there’s a corollary to that law—they aren’t always very smart and competent in carrying out their plans.”

    The man who was paid to infiltrate Earth First! under the guise of THERMCON was anything but competent. Special agent Michael A. Fain, stationed in the FBI’s Phoenix office, befriended Peg Millet and begun attending Earth First! meetings in the area. Fain, who went by alias, Mike Tait, posed as a Vietnam vet who dabbled in construction and gave up booze after his military service. On more than one occasion, while wearing a wire, Fain had tried to entice members of Earth First! in different acts of vandalism. They repeatedly refused.

    During pre-trial evidence discovery the defense was allowed to listen to hours of Fain’s wire-tapings, when they found that the not-so-careful agent inadvertently forgot to turn off his recorder. Fain, while having a conversation with two other agents at a Burger King after a brief meeting with Foreman, spoke about the status of his investigation, exclaiming, “I don’t really look for them to be doing a lot of hurting people… [Dave Foreman] isn’t really the guy we need to pop — I mean in terms of an actual perpetrator. This is the guy we need to pop to send a message. And that’s all we’re really doing… Uh-oh! We don’t need that on tape! Hoo boy!”

    Here the FBI was, acting as if these Earth First!ers were, publicly vilifying them, while privately admitting that they posed no real threat. “[The agency is acting] as if [its] dealing with the most dangerous, violent terrorists that the country’s ever known,” explained Spence at the time. “And what we are really dealing with is ordinary, decent human beings who are trying to call the attention of America to the fact that the Earth is dying.”

    The FBI’s rationale for targeting Foreman was purely political as he was one of the most prominent and well-spoken radical environmentalists of the time. Despite their claims that they were not directly targeting Earth First! or Foreman, and were instead investigating threats of sabotage of power lines that led to a nuclear power plant — their public indictment painted quite a different story.

    “Mr. Foreman is the worst of the group,” Assistant U.S. Attorney Roger Dokken announced to the court. “He sneaks around in the background … I don’t like to use the analogy of a Mafia boss, but they never do anything either. They just sent their munchkins out to do it.”

    But agent Michael Fain’s on-tape gaffes were simply too much for the prosecution to manage, and the case against Foreman, having been deferred almost seven years, was finally reduced in 1996 to a single misdemeanor and a meager $250 in fines. The $2 million the FBI wasted tracking Earth First! over the latter part of the 1980s had only been nominally successful. Yet the alleged ring-leader was still free. Unfortunately, the FBI may have gotten exactly what they wanted all along. Dave Foreman later stepped down as spokesman to Earth First! and inherited quite a different role in the environmental movement — one of invisibility and near silence.

    Peg Millet, Mark Davis and Marc Baker were all sentenced separately in 1991 for their involvement in their group EMETIC’s acts of ecotage against the expansion of Arizona Snowbowl. Davis got 6 years and $19,821 in restitution. Millet only 3 years, with the same fine, while Baker only received 6 months and a $5,000 fine.

    Little did these activists know that there capture and subsequent arraignments were only the beginning. THERMCON’s crackdown of Earth First! would prove to be a dry-run for the Federal Bureau of Investigations.

    Joshua Frank is author of Left Out! How Liberals Helped Reelect George W. Bush (Common Courage Press, 2005), and along with Jeffrey St. Clair, the editor of Red State Rebels: Tales of Grassroots Resistance in the Heartland, and of Hopeless: Barack Obama and the Politics of Illusion, published by AK Press. Hopeless is now available in Kindle format.  He can be reached at brickburner@gmail.com.

    Jeffrey St. Clair’s latest books are Born Under a Bad Sky and Hopeless: Barack Obama and the Politics of Illusion, published by AK Press. Hopeless is now available in Kindle format.  He can be reached at: sitka@comcast.net

     




    What Really Happened at Westgate

    Carnage Abounds
    by ANDRE VLTCHEK, Counterpunch

    Nairobi

    Thick smoke hangs above the access road to The Westgate – the up-market shopping mall that serves mainly expats, UN staff and Kenyan elites.

    Sporadic gunfire and explosions are clearly heard from the direction of the compound; overtaken on Saturday 21 September, by Somali fighters from the Muslim militant group Al-Shabaab.

    Police forces and military duck for cover, and new troops are being bussed in order to take part in the operation.

    Combat helicopters are circling around the site. Even higher than them, almost above the clouds, one can spot small airplanes. The sky is very busy. And it is overcast; the weather is gloomy and when the clouds are high up, aircraft are hardly visible.

    Dozens of reporters, local and international, are shouting their dispatches into mobile phones. Some are Tweeting, or recording interviews with rescued hostages, nurses, and security officers.

    Everything appears to be surprisingly well organized, including the supply of food, water and medicine. A Chinese clinic is offering help, as well as several voluntary organizations. People are donating blood. There are blankets and tents readily available.

    But the gunfire keeps raging.

    There are all sorts of speculations: the leader, the commander, is the ‘White Widow’, an English lady who was married to one of the Muslim attackers of the London Underground. Other ‘unconfirmed reports’ speaks about American jihadi fighters. And then, there is of course that semi-confirmed information about Israeli commandos, about US involvement and UK participation.

    Who is inside that most luxurious shopping complex in East Africa? They say, there are no more than 10 attackers holed up inside, mainly Somalis, but there also others, some coming from outside the African continent. The rumors and official reports first speak about a few dozen hostages, then about 200. The number keeps swelling.

    The armed forces and reporters are interacting.

    “6 soldiers died”, one army officer whispers into my ear. “They do not admit it, but I know, I was just there”.

    At one point I spot my Indian-Malaysian dentist, next to her son, also a dentist, who is said to have saved several people in the course of the first day. She is visibly shaken and her eyes are red, from lack of sleep, or maybe from tears.

    It is all very emotional, very raw. Days and nights are blending together.

    Al-Shabaab is Tweeting. It tells the world that the pain inflicted during those days is just a tiny fraction of what Kenya is inflicting on Somalia. Twitter is quickly shutting down all the sites of Al-Shabbab, but new sites are being instantly created.

    ***

    Since 2011, Kenya has been occupying a substantial part of Somalia, and many analysts are questioning the legitimacy of this action. Oil rich southern Somalia is perhaps seen as the trophy by both Kenya, and the Western powers.

    For years and decades now, the West has been destabilizing Somalia. Kenya and Ethiopia, two staunch allies of the West in the region, are playing a deadly game, incessantly. Thousands of civilians have already died.

    Kenya is one of the closest allies of the West in Africa, with both US and UK military bases all over the nation, and with Israeli intelligence personnel on the Swahili coast and elsewhere.

    That brutal invasion is not discussed, of course: in the Kenyan media and in the international press, the war and the attack on the shopping mall are carefully separated, disconnected.

    And so is the brutality factor of the Kenyan troops in the territory of occupied Somalia: one can only judge from the stories told by refugees in Dadaab and other camps. The battleground is fully off-limits to foreign war correspondents – for our own protection, of course!

    ***

    Efficiency appears to be only on the surface.

    Dig deeper and chaotic pictures emerge.

    Japanese acquaintances working for the UN, recalled how awfully unhelpful the local UN security system has been, since the attack:

    “We were held in a bookshop, inside the Westgate. “ As the gunfight was raging all around, she and her little daughter were held for over two hours. She called the UN security. Their reply was chillingly laconic: ‘stay safe!’”

    It took the Kenyan police 30 minutes to get to the scene. Their excuse was; they got stuck in a traffic jam!

    A retired Peruvian UNICEF staff member was shot to death while inside a car, and his 13-year-old daughter was shot through her arm. She had to remain inside the car with her dead father for two hours, before being rescued.

    It had been common knowledge among the expat community in Nairobi that the attack against the Westgate Mall was very likely to come. Al-Shabaab had been threatening almost ever since the Kenyan invasion of Somalia, that it was ready to blow up tall buildings in the capital. All local media carried these threats. Still, the security at all the shopping centers of Nairobi remained ridiculously lax.

    And how is it possible that it took several days for the entire army and police to defeat a small band of insurgents, and even after that, only after foreign forces got involved?

    ***

    By the latest count, around 130 people lost their lives, but the real number could still be much higher.

    Rumors are there, still. Interpol issued arrest warrants and the hunt for the ‘White Widow’ is just beginning. And that despite the fact that one body, of a white woman, an insurgent, has already been found.

    More bodies are being pulled from the rubble. Some people working inside the compound said that they could not exclude the possibility that several insurgents are still hiding in the rubble of the Mall.

    But the most important question now is what will happen to war-torn Somalia. And what will happen to over two million Somalis (exact numbers are constantly being disputed) who are living in refugee camps like Dadaab, behind barbed wire, as well as in depressing neighborhoods around the Kenyan capital and other cities.

    Westgate burning

    Westgate burning.

    Westgate

    Westgate.

    Soldiers before storming Westgate

    Soldiers before storming Westgate.

    nurses from Chinese Hospital

    Nurses from Chinese Hospital.

    Kenyan army and foreign element

    Kenyan army and foreign element.

    Jehova Witnesses taking advantage of chaos

    Jehova Witnesses taking advantage of chaos.

    Helicopter near Westgate

    Helicopter near Westgate.

    battle

    Battle scene.

    Andre Vltchek is a novelist, filmmaker and investigative journalist. He covered wars and conflicts in dozens of countries. His discussion with Noam Chomsky On Western Terrorism is now going to print. His critically acclaimed political novel Point of No Return is now re-edited and available. Oceania is his book on Western imperialism in South Pacific. His provocative book about post-Suharto Indonesia and market-fundamentalist model is called “Indonesia – The Archipelago of Fear”. He just completed feature documentary “Rwanda Gambit” about Rwandan history and the plunder of DR Congo. After living for many years in Latin America and Oceania, Vltchek presently resides and works in East Asia and Africa. He can be reached through his website or his Twitter.

    _______________________________

    Nauseated by the
    vile corporate media?
    Had enough of their lies, escapism,
    omissions and relentless manipulation?

    GET EVEN.
    Send a donation to 

    The Greanville Post–or

    SHARE OUR ARTICLES WIDELY!
    But be sure to support YOUR media.
    If you don’t, who will?

    ________________________________