New U.S. air strategy in Afghanistan: First, do no harm
LOOK FOR PLACE TO BOMB, TO DO NO HARM
Chinese Internal Security documents translated
CHINA: Internal Documents for all media censorship of opposition views. How this secretive police force works day by day
CIA secret operations Yemen
Obama Approved Secret Operations in Yemen to Eliminate al Queda Leaders January 27, 2010 /PRESSWIRE/ The US has engaged in a six-week operation in Yemen against al Queda that has resulted in the deaths of six regional al Qaeda leaders in that country, The Washington Post reports. President Barack Obama approved a December 24 operation…
Groundhog Day in Afghanistan
The daily grind of aid work in Afghanistan mirrors the country’s broader inertia. More than eight years after the U.S. invasion, the international community is still struggling to break out of a seemingly endless cycle of government crises and move toward a stable government — and a clear path home. The international conference on Afghanistan…
CIA operative retracts claims of Torture
Well, it’s official now: John Kiriakou, the former CIA operative who affirmed claims that waterboarding quickly unloosed the tongues of hard-core terrorists, says he didn’t know what he was talking about. Kiriakou, a 15-year veteran of the agency’s intelligence analysis and operations directorates, electrified the hand-wringing national debate over torture in December 2007 when he…
Obama Fails report card Bioterror Threats
President Barack Obama will use his State of the Union address to unveil a new plan for a better and quicker response to bioterrorism threats and attacks, the White House said Tuesday. Government leaders will be told to rethink their plans for medical countermeasures so that quick, reliable and affordable antidotes will be available during…
The King of Spades Hanged
The last Chapter of Chemical Ali. DAMASCUS – Three big stories came out of the Arab world on Monday, starting with the explosion of an Ethiopian airplane in the skies off Beirut, which led to the death of all 90 passengers, on to three deadly attacks in Baghdad, which killed 37 people, and finally, the…
Breaches show how sophisticated industrial espionage is becoming.
Black Swans throughout cyber space. Caveat Emptor The big question: Who’s behind them? Not to long ago, computer hacking was mainly the handiwork of individuals with overactive imaginations and good programming skills, and they often broke into computers for sport. More recently, people with more sinister motives – including organized criminal gangs – have made…