Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 100

Rss Feed Group items tagged

Paul Merrell

Putin signs "undesirable NGOs" Bill into Law | nsnbc international - 0 views

  • Russian President Vladimir Putin has signed a bill, enabling the designation of foreign and foreign-funded NGOs as undesirables after the bill passed both the Lower and Upper House of Parliament.
  • The bill authorizes the designation of foreign and foreign funded non-profit as well as for profit NGOs as “undesirables” on grounds of “national security. The bill passed the second reading in Russia’s Lower House of Parliament (State Duma), last week and was approved by the Upper House of Parliament, the Federation Council. The bill had been proposed by legislators of the governing United Russia party of President Vladimir Putin, The passing of the bill in both houses of parliament and the signing of the bill by Putin was no surprise since United Russia has a majority in both chambers. The bill has been heavily criticized by foreign, particularly western media, western politicians and primarily western-based or funded NGOs, including Human Rights Watch, Amnesty International, among many others. One of the NGOs that is certain to fall under the provisions of the bill is USAID.
  • he new law follows up on a law that was adopted in 2012 that obliged foreign-funded non-governmental organizations to register as “foreign agents”. The law provides for declaring foreigners and foreign-funded NGOs as“undesirable”. Persons who are violating the newly adopted law could face a fine up to 10,000 dollar to be paid in local currency and up to six years imprisonment. Supporters of the bill are referring to the risk that foreign-funded NGOs could pose to the Russian Federation’s national security while critics maintain that the wording of the legislation and especially the term “undesirable” is ambiguous and opens the floodgates for the abuse of the law to crack down on legal and legitimate dissent.
  • ...5 more annotations...
  • While the wording and the use of “undesirable” is ambiguous and does pose legal problems as much as it opens the floodgates for the abuse of the legislation, there may be a good reason for keeping the wording ambiguous. Internationally acting NGOs have increasingly become “weaponized”; That is, that they have increasingly been utilized as tool for everything from supporting legitimate dissent to the organization of political violence and coup d’état. Another disturbing fact is that this pattern includes UN organizations such as the UN Interagency Framework Team for Preventive Action (Framework Team). Examples? Doctors Without Borders (MSF) played a key role in accusing the Syrian government for the use of chemical weapons, stating MSF sources. Later on the NGO had to admit that it had no staff in Damascus and exclusively relied on statements by “partners” in “rebel-held territories”.
  • Amnesty International for its part issued a report about alleged war crimes committed during NATO’s bombing of Libya in 2011. A 2012 report by Amnesty International claimed that Operation Unified Protector, authorized by UNSC Resolution 1973 has resulted in 55 documented cases of named civilian casualties, including 16 children and 14 women that were killed in air strikes in the capital Tripoli and the towns of Zliten, Majer, Sirte, and Brega. The low figure is utterly inconsistent with casualty figures provided by local NGOs as well as documented eyewitness reports. Two things are worth considering with regard to the Amnesty report. During the first night of the operation NATO forces launched over 100 cruise missiles into Tripoli alone.
  • The Director of Amnesty International at that time was Suzanne Nozzel, who also worked as adviser on U.S. government – NGO relations for the then U.S. Secretary of State Hillary Clinton.
  • While Human Right Watch does, indeed, engage in justified human rights advocacy, it has also been engaged in issuing strongly biased reports, in politicizing that “representatives are denied entry to e.g. Egypt”, while failing to mention that proper visa procedures had not been followed, and so forth. The most disturbing NGO may, however, be the UN Interagency Framework Team for Preventive Action. The Framework Team is largely privately funded with George Soros as one of the primary sponsors. The NGO under UN cover is “coordinating UN, governmental and non-governmental initiatives”.
  • The UN organization could undoubtedly be useful but it has also been sharply criticized for “fanning the flames” of the inter-communal violence in Myanmar’s Rakhine State, and for its active role in creating rather than preventing ethnic and sectarian disputes and violence in Nepal. In both the case of Myanmar and in the case of Nepal it is easy to establish ties between the Framework Team and Western or Western allied intelligence services. Criticism of the ambiguous wording of the new Russian legislation is, in other words, as justified as criticism of NGOs who prostitute themselves and the best intentions of the members at their base as pawns in geopolitical chess-games.
  •  
    More than understandable given the long history of the U.S. weaponizing NGOs in aid of its "color revolutions" strategy to overthrow governments in secular states and left-leaning democracies. The most recent examples are the successful U.S. coup in Ukraine and the thrice-failed coup attempts in Venezuela.  U.S. NGOs have been attempting to provoke such a coup in Russia for some time but have failed thus far because of Putin's immense popularity and a perhaps better-informed Russian public. The Russian people know they are under attack and have wisely closed ranks rather than falling for a divide-and-conquer strategy. Venezuela recently enacted similar legislation.  
Paul Merrell

Prospects dim for 11th-hour PATRIOT Act deal - Burgess Everett and Seung Min Kim - POLI... - 0 views

  • The PATRIOT Act is going to need a miracle to survive the weekend unscathed. Backers of the post-9/11 anti-terror measure are scrambling this week to prevent the law’s key surveillance programs from lapsing at midnight Sunday. But with the Senate not slated to return to Washington until just hours before that deadline, opponents like Sens. Rand Paul (R-Ky.) and Ron Wyden (D-Ore.) showing no signs of budging, and the House so far unwilling to bail out the upper chamber, the prospects for an eleventh-hour breakthrough look slim.
  • “Our options are a lot more limited” given the time constraints, said Utah Sen. Mike Lee, the chief Republican backer of the bill in the Senate. “We can either let the provisions at issue expire, or we can pass the House-passed USA Freedom Act.” The problem is that doing anything ahead of the midnight deadline would take the cooperation of all 100 senators. That’s hardly a given since Paul is still insisting that McConnell allow votes on privacy-related amendments, and Wyden has vowed to block any clean extension of what he calls a “bad law.”
  • n an appearance in Kentucky on Tuesday, McConnell acknowledged the strong support for the USA Freedom Act “makes it pretty challenging to extend the law as it is.” In Washington, top Republican aides could not — or would not — explain how the Senate will escape the fix beyond the possibility that Senate leaders can somehow persuade Paul and Wyden to stop blocking a PATRIOT Act extension with the promise of a robust Senate debate to follow.
  • ...3 more annotations...
  • The 57-42 vote in the Senate on the USA Freedom Act has its backers tasting victory. Sen. Mark Kirk (R-Ill.) switched his vote on the floor to “no” but indicated afterward that he had been “inclined” to let the House bill proceed. Sen. Mike Enzi (R-Wyo.) missed the late-night votes but signaled in a statement released by his office that he would support changes to bulk collection. Backers have also eyed Republican Sens. Bill Cassidy of Louisiana and John Boozman (R-Ark.) as potential votes in favor. Aides to the two lawmakers didn’t return requests seeking comment on Tuesday. “Some of those members voted ‘no’ on Friday night,” Lee said. “I suspect that now that we’re in this posture, some of those might flip.”
  • The reform bill stalled, yet there appears to be a path to 60 if McConnell allows another vote and stops advocating against it. Sen. Steve Daines (R-Mont.), for one, said he expects another attempt Sunday to break a filibuster on the USA Freedom Act.
  • The more immediate question is what happens on Sunday. If the Senate passes anything other than the USA Freedom Act as it stands, the House would need to agree to go along — which might be impossible given that the chamber isn’t scheduled to return until Monday. Some privacy advocates have a backup plan for Congress: Don’t do anything at all. “If Congress can’t coalesce around far-reaching changes,” said Neema Singh Guliani, the legislative counsel for the American Civil Liberties Union, “they should allow the expiring provisions of the PATRIOT Act to sunset.”
Paul Merrell

Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global ... - 0 views

  • One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens  all without a court order or judicial warrant.
  • The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
  • GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
  • ...3 more annotations...
  • GCHQ vacuums up the website browsing histories using “probes” that tap into the international fiber-optic cables that transport Internet traffic across the world. A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events”  a term the agency uses to refer to metadata records  with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held  41 percent  was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it saidwould be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.” HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs.
  • The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
Paul Merrell

Lavabit To Release Code As Open Source, As It Creates Dark Mail Alliance To Create Even... - 0 views

  • This whole morning, while all these stories of the NSA hacking directly into Google and Yahoo's network have been popping up, I've been at the Inbox Love conference, all about the future of email. The "keynote" that just concluded, was Ladar Levison from Lavabit (with an assist from Mike Janke from Silent Circle), talking about the just announced Dark Mail Alliance, between Lavabit and Silent Circle -- the other "security" focused communications company who shut down its email offering after Lavabit was forced to shut down. Levison joked that they went with "Dark Mail" because "Black Mail" might have negative connotations. Perhaps just as interesting, Levison is going to be releasing the Lavabit source code (and doing a Kickstarter project to support this), with the hope that many others can set up their own secure email using Lavabit's code, combined with the new Dark Mail Alliance secure technology which will be available next year. As noted, the Alliance is working on trying to create truly secure and surveillance-proof email. Of course, nothing is ever 100% surveillance proof -- and both members of the alliance have previously claimed that it was almost impossible to do surveillance-proof email. However, they're claiming they've had a "breakthrough" that will help.
  • The newly developed technology has been designed to look just like ordinary email, with an interface that includes all the usual folders—inbox, sent mail, and drafts. But where it differs is that it will automatically deploy peer-to-peer encryption, so that users of the Dark Mail technology will be able to communicate securely. The encryption, based on a Silent Circle instant messaging protocol called SCIMP, will apply to both content and metadata of the message and attachments. And the secret keys generated to encrypt the communications will be ephemeral, meaning they are deleted after each exchange of messages. For the NSA and similar surveillance agencies across the world, it will sound like a nightmare. The technology will thwart attempts to sift emails directly from Internet cables as part of so-called “upstream” collection programs and limit the ability to collect messages directly from Internet companies through court orders. Covertly monitoring encrypted Dark Mail emails would likely have to be done by deploying Trojan spyware on a targeted user. If every email provider in the world adopted this technology for all their users, it would render dragnet interception of email messages and email metadata virtually impossible.
  • Importantly, they're not asking everyone to just trust them to be secure -- even though both companies have the right pedigree to deserve some level of trust. Instead, they're going to release the source code for public scrutiny and audits, and they're hoping that other email providers will join the alliance. At the conference, Levison recounted much of what's happened over the last few months (with quite a bit of humor), joking about how he tried to be "nice" in giving the feds Lavabit's private keys printed out, by noting that he included line numbers to help (leaving unsaid that this would make OCR'ing the keys even more difficult). He also admitted that giving them the paper version was really just a way to buy time to shut down Lavabit.
  • ...1 more annotation...
  • Janke came up on stage to talk about the importance of changing the 40-year-old architecture of email, because it's just not designed for secure communications. The hope is that as many other email providers as possible will join the Alliance and that this new setup becomes the de facto standard for end-to-end secure email, which is where Levison's open sourcing of his code gets more interesting. In theory, if it all works out, it could be a lot easier for lots of companies to set up their own "dark mail" email providers. Either way, I would imagine that this development can't make the NSA all that happy.
  •  
    Oh, Goody!
Paul Merrell

Revealed: NSA pushed 9/11 as key 'sound bite' to justify surveillance | Al Jazeera America - 0 views

  • The National Security Agency advised its officials to cite the 9/11 attacks as justification for its mass surveillance activities, according to a master list of NSA talking points. The document, obtained by Al Jazeera through a Freedom of Information Act request, contains talking points and suggested statements for NSA officials (PDF) responding to the fallout from media revelations that originated with former NSA contractor Edward Snowden. Invoking the events of 9/11 to justify the controversial NSA programs, which have caused major diplomatic fallout around the world, was the top item on the talking points that agency officials were encouraged to use. Under the subheading “Sound Bites That Resonate,” the document suggests the statement “I much prefer to be here today explaining these programs, than explaining another 9/11 event that we were not able to prevent.”
  • NSA head Gen. Keith Alexander used a slightly different version of that statement when he testified before Congress on June 18 in defense of the agency’s surveillance programs. Asked to comment on the document, NSA media representative Vanee M. Vines pointed Al Jazeera to Alexander’s congressional testimony on Tuesday, and said the agency had no further comment. In keeping with the themes listed in the talking points, the NSA head told legislators that “it is much more important for this country that we defend this nation and take the beatings than it is to give up a program that would result in this nation being attacked.” Critics have long noted the tendency of senior U.S. politicians and security officials to use the fear of attacks like the one that killed almost 3,000 Americans to justify policies ranging from increased defense spending to the invasion of Iraq.
  • Al Jazeera obtained the 27 pages of talking points from the NSA this week in response to a FOIA request filed June 13. The statements had been prepared for agency officials facing questions from Congress or the media over the revelations contained in classified documents that Snowden leaked to journalists Glenn Greenwald, Barton Gellman and others. A letter accompanying the documents notes that the talking points “are prepared and approved for a speaker to use and do not necessarily represent what the speaker actually said at the event.” The NSA has not yet turned over to Al Jazeera the documents the agency used to prepare the talking points, saying those materials require additional review before they can be released.  The attacks on the World Trade Center and the Pentagon also appear at the top of another talking-points document titled “Media Leaks One Card,” which contains 13 bullet points to explain the rationale behind the surveillance programs. Those points include “First responsibility is to defend the nation” and “NSA and its partners must make sure we connect the dots so that the nation is never attacked again like it was on 9/11.”
  • ...2 more annotations...
  • The master talking points list goes on to explain, under a subheading titled “We Needed to Connect the Dots,” that “post-9/11 we made several changes and added a number of capabilities to enable us to connect the dots.” Continuing revelations from the Snowden documents reveal surveillance on a scale that appears to go far beyond the scope of monitoring potential attackers, however. The agency’s “head of state collection” program, for example, reportedly included the monitoring of German Chancellor Angela Merkel’s mobile phone. The talking points document advises officials to emphasize the word “lawful” when discussing NSA surveillance programs, and to state that “our allies have benefited … just as we have.” “We believe that over 100 nations are capable of collecting signals intelligence or operating a lawful intercept capability that enable them to monitor communications,” the document continued.
  • Critics have called into question the veracity of the claim that NSA surveillance has thwarted more than 50 “potential” attacks. They claim evidence to support such assertions is lacking. NSA officials are advised to respond to questions about any potential civil liberties violations by citing talking points that say there have not been any “willful violations” and that the NSA is committed to “upholding the privacy and civil liberties of the American people.”
  •  
    27 pages of talking points appended to the article, plus a two-page cover letter. It's the scripts for just about everything official that's been coming out of NSA and the Administration. Interesting reading; they cover some things that haven't yet come up.   
Paul Merrell

Bangkok Blast: Confronting the West's "Pundit Investigation" | nsnbc international - 0 views

  • The investigation continues into a powerful bomb that tore through downtown Bangkok Monday, killing 20 and injuring over 100 more. The attack was timed as the current government reshuffled top positions, the new national charter prepared to move forward, and ousted prime minister Thaksin Shinawatra faced the loss of his police rank.
  • The investigation faces many technical challenges but as the government, police, and military attempt to carry it out, the Western media  has attempted to “take over” and begin its own investigation, carried out by unqualified pundits and subjected to public opinion rather than actual fact. The objective of the Western media is not truth, but rather to undermine the current government while attempting to exonerate Thaksin Shinawatra - leader of an ousted client regime groomed by and in the service of Western interests since as early as the 1990’s. To confront this intentional, politically motivated manipulation, it may be useful to examine several key questions facing any investigation and answer them with what real evidence now stands.
  • In reality, such a conflict is not possible. Shinawatra does not, nor did he ever have, the support or the operational capacity to lead such a war. However, wide scale terrorism dressed up by a complicit Western media was not only a very real possibility, it was the only possibility left for Shinawatra and his foreign backers.
  • ...1 more annotation...
  • With the Western media attempting  – just as the bombers themselves did – to undermine the current Thai government, the truth is slowly being buried under a mountain of lies, spin, and intentional misdirection. The Western media is attempting to sow enough mistrust and confusion that no matter how conclusive Thailand’s final investigation is, the West will be able to claim “reasonable doubt.” However, looking at the above evidence, as it stands, it is difficult to imagine Shinawatra was not involved. He had the means, the motive, an opportunity, and a history of violence including the use of bombs almost identical to the ones used in the most recent attacks. His violent political and militant fronts have openly threatened to carry out large scale violence. And now that violence has been realized.
  •  
    Tony Cartalluci continues to pull together the evidence that the recent bombing in Bangkok was engineered by deposed prime minister in hiding Thaksan Shinawatra, a puppet of the Carlyle Group, which is deeply invested in the U.S. defense industry. Shinawatra "red shirts" have been committing widespread acts of violence in Thailand since Shinawatra -- forced out of office by a corruption conviction -- was succeeded by his sister, who was then ousted by military coup in 2014. During the sister's reign, she repeatedly and openly admitted that her brother was actually making the decisions. It is a situation where American attempts to overthrow a foreign government have been at the zenith of visibility. 
Paul Merrell

How Global Real Estate Giant Profits from Stolen Palestinian Land | Global Research - C... - 0 views

  • US-based multinational RE/MAX is marketing properties in illegal Jews-only settlements built on stolen Palestinian land such as Ariel, near Salfit in the West Bank. Keren Manor/ActiveStills Agents working for the US-headquartered real estate giant RE/MAX are promoting themselves as specialists in property built in Israel’s settlements on occupied Palestinian land. The Colorado-based corporation which says it operates in nearly 100 countries was identified as responsible by a 2013 United Nations’ probe for how its Israeli franchises sell houses and apartments in the occupied West Bank. Despite that criticism, many RE/MAX representatives are continuing to handle such property.
  • In fact, all of these “communities” are Israeli settlements inside the West Bank and are illegal under international law. Their construction and growth violates the Fourth Geneva Convention, which forbids an occupying power from transferring its civilian population into a territory that it occupies.
  • Scores of properties in the occupied West Bank (including East Jerusalem) are currently listed as for sale on RE/MAX websites. Some of them are on the market for high prices. RE/MAX is trying to sell a three-bedroom house in Jerusalem’s Old City for $1.7 million. According to RE/MAX, the house was “built over 600 years ago by the Turks.” A video for the same property posted to YouTube by Benzaquen, states that the “light train is just nearby.” That is a reference to a tram network which connects Israel’s settlements in East Jerusalem to other parts of the city. The French corporation Veolia has faced years of criticism and activist campaigns for its large-scale involvement in building the Jerusalem light rail, which Palestinians see as a means of tightening Israel’s grip on their city. RE/MAX’s Colorado headquarters did not reply to requests for comment.
  • ...1 more annotation...
  • The firm has generally kept silent when its activities have been highlighted by Palestine solidarity activists. It did, however, issue a terse statement last year. The statement tried to distance the firm’s headquarters from its Israeli franchise and noted that RE/MAX had reduced the number of its offices in the West Bank. It failed to acknowledge that many of the agents handling property in East Jerusalem and the wider West Bank are working from offices in West Jerusalem. But the company seems to be sensitive to activist criticism that it is involved in selling homes in illegal settlements within the Israeli-occupied West Bank. Searches on the RE/MAX Israel website suggest the company may be engaging in deliberate obfuscation of its West Bank settlement listings.
Paul Merrell

Top Stories - If Terrorist Attacks are on the Rise, What Does that Say about the 13-Yea... - 0 views

  • The phrase “war on terror” was first used shortly after the September 11, 2001, attacks by then-President George W. Bush. More recently, President Barack Obama declared in 2013 that he’s no longer pursuing the war on terror in favor of “a series of persistent, targeted efforts to dismantle specific networks of violent extremists that threaten America.” But regardless of whether the United States claims to be in such a war, terror attacks continue to increase. The most recent figures from the State Department show that there was a sharp increase in terror attacks worldwide in 2014 over the numbers from the previous year. According to its figures, attacks increased 35% and fatalities jumped 81% over 2013’s numbers, with the increase coming mainly in Iraq, Afghanistan and Nigeria. Part of the reason for the huge increase in fatalities was the jump in large-scale attacks, those killing more than 100 people. There were 20 such attacks in 2014, compared to two in 2013. There were a total of 13,463 terrorist attacks last year. The month of May, when fighting in Afghanistan heats up with the weather, had the most with 1,338.
  • Those aren’t the only metrics available on the war on terror, of course. Another is how much money has been spent. A report (pdf) from the Congressional Research Service (CRS) says that $1.6 trillion has gone into U.S. war efforts since 9/11. That includes “military operations, base support, weapons maintenance, training of Afghan and Iraq security forces, reconstruction, foreign aid, embassy costs, and veterans’ health care for the war operations initiated since the 9/11 attacks,” according to the report. That spending continues to grow. Those numbers don’t include money appropriated since the Consolidated Appropriations Act for fiscal year 2014. CRS’s dollar figure is stunning on its own. But the Costs of War project, a nonpartisan, nonprofit, scholarly initiative based at Brown University’s Watson Institute for International and Public Affairs, came up with even more eye-popping numbers. They put the cost of the post-9/11 fighting at $4.4 trillion. In addition to the costs of bullets and bandages, they included the interest on the money borrowed to fight the war (remember—Bush sought no tax increases to fund the fighting); the money it took out of the economy and cost Americans in increased interest; the future cost of treating and healing wounded veterans (expected to peak in 30 or 40 years at more than $1 trillion); and increased homeland security spending.
  • Interest payments on the money borrowed to pay for the war on terror will continue far into the future and are expected to be astronomical as well: $1 trillion by 2023, or more than $7 trillion by 2053. The Costs of War also looked at what the war on terror cost in terms of lost opportunities; that is, what the money could have been spent on instead of the military, such as domestic infrastructure and non-military job creation.
  • ...1 more annotation...
  • The phrase “war on terror” was first used shortly after the September 11, 2001, attacks by then-President George W. Bush. More recently, President Barack Obama declared in 2013 that he’s no longer pursuing the war on terror in favor of “a series of persistent, targeted efforts to dismantle specific networks of violent extremists that threaten America.” But regardless of whether the United States claims to be in such a war, terror attacks continue to increase.
  •  
    Yes, Virginia. We have lost the War on Terror and the piper must be paid. 
Paul Merrell

Turkey Plans to Invade Syria, But to Stop the Kurds, Not ISIS - The Daily Beast - 0 views

  • Turkey’s President Recep Tayyip Erdogan is planning a military intervention into northern Syria to prevent Syrian Kurds from forming their own state there, despite concerns among his own generals and possible criticism from Washington and other NATO allies, according to reports in both pro- and anti-government media. In a speech last Friday, Erdogan vowed that Turkey would not accept a move by Syrian Kurds to set up their own state in Syria following gains by Kurdish fighters against the so-called Islamic State, or ISIS, in recent weeks. “I am saying this to the whole world: We will never allow the establishment of a state on our southern border in the north of Syria,” Erdogan said. “We will continue our fight in that respect whatever the cost may be.” He accused Syrian Kurds of ethnic cleansing in Syrian areas under their control.After the speech, several news outlets reported that the president and Prime Minister Ahmet Davutoglu had decided to send the Turkish army into Syria, a hugely significant move by NATO’s second-biggest fighting force after the U.S. military. Both the daily Yeni Safak, a mouthpiece of the government, and the newspaper Sozcu, which is among Erdogan’s fiercest critics, ran stories saying the Turkish Army had received orders to send soldiers over the border. Several other media had similar stories, all quoting unnamed sources in Ankara. There has been no official confirmation or denial by the government.
  • The reports said up to 18,000 soldiers would be deployed to take over and hold a strip of territory up to 30 kilometers deep and 100 kilometers long that is held by ISIS. It stretches from close to the Kurdish-controlled city of Kobani in the east to an area further west held by the pro-Western Free Syrian Army (FSA) and other rebel groups, beginning around the town of Mare. This “Mare Line,” as the press calls it, is to be secured with ground troops, artillery and air cover, the reports said. Yeni Safak reported preparations were due to be finalized by next Friday. There has been speculation about a Turkish military intervention ever since the Syrian conflict began in 2011. Ankara has asked the United Nations and its Western allies to give the green light to create a buffer zone and a no-fly area inside Syria to prevent chaos along the Turkish border and to help refugees on Syrian soil before they cross over into Turkey. But the Turkish request has fallen on deaf ears.
  • The daily Hurriyet reported Erdogan and Davutoglu wanted to “kill two birds with one stone” with a military intervention along the Mare Line. One aim would be to drive ISIS away from the Turkish border, depriving the jihadists of their last foothold on the frontier and thereby cutting off supply lines. Such a move would tie in with the U.S. strategy to contain and weaken ISIS.A second goal of the operation would be closer to Ankara’s own interests. The English-language Hurriyet Daily News quoted one source saying there was a need to  “prevent the PYD from taking full control over the Turkish-Syrian border,” and also to create a zone on Syrian territory rather than in Turkey to take in new waves of refugees.But the military is reluctant, the reports said. Generals told the government that Turkish troops could come up against ISIS, Kurds, and Syrian government troops and get drawn into the Syrian quagmire. Retaliation attacks by ISIS and Kurdish militants on Turkish territory are another concern.
  • ...1 more annotation...
  • Finally, the soldiers pointed to the international dimension. The military leadership told the government that the international community might get the impression that Turkey’s intervention was directed against Syria’s Kurds, the newspaper Haberturk reported.Turkey’s NATO partners, some of whom have deployed troops operating Patriot missile defense units near the Syrian border to shield member country Turkey against possible attacks from Syria, are unlikely to be happy with a Turkish intervention.
Paul Merrell

The Honduran Coup's Ugly Aftermath | Consortiumnews - 0 views

  • As Secretary of State in 2009, Hillary Clinton helped a right-wing coup in Honduras remove an elected left-of-center president, setting back the cause of democracy and enabling corrupt and drug-tainted forces to tighten their grip on the poverty-stricken country, as Jonathan Marshall explains.
  • Bowing to pressure from conservative Republicans in Congress, Secretary of State Hillary Clinton refused to condemn the ouster of leftist President Manuel Zelaya in 2009. By her own admission, she began plotting within days to prevent him from returning to office.Her recently released emails show that she sought help from a pro-coup lobbyist for Honduran business interests to establish communications with the new military-backed president. She also approved the continuation of U.S. aid to the illegitimate new regime, blocked demands by the Organization of American States for Zelaya’s return, and accepted subsequent presidential elections that were condemned by most international observers as unfair and marred by violent intimidation.
  • In 2011, President Obama officially welcomed Honduras’s dubious new president to the White House and praised his “strong commitment to democracy.” (His wife is the target of the shoe purchase investigation noted above.)A year later, two leading human rights organizations reported that more than 100 political killings had occurred since the coup, accompanied by “death threats against activists, lawyers, journalists, trade unionists, and campesinos, as well as attempted killings, torture, sexual violence, arbitrary arrests and detentions.”The coup represented a disastrous step backward for Honduran society as well as its politics. University of California historian Dana Frank observed that “A vicious drug culture already existed before the coup, along with gangs and corrupt officials. But the thoroughgoing criminality of the coup regime opened the door for it to flourish on an unprecedented scale.
Paul Merrell

The Politics of Betrayal: Obama Backstabs Kurds to Appease Turkey - 0 views

  • The Kurdish militias (YPG, PKK) have been Washington’s most effective weapon in the fight against ISIS in Iraq and Syria. But the Obama administration has sold out the Kurds in order to strengthen ties with Turkey and gain access to Turkey’s Incirlik Air Base. The agreement to switch sides was made in phone call between President Obama and Turkish President Recep Tayyip Erdogan less than 48 hours after a terrorist incident in the Turkish town of Suruc killed 32 people and wounded more than 100 others. The bombing provided Obama with the cover he needed to throw the Kurds under the bus, cave in to Turkey’s demands, and look the other way while Turkish bombers and tanks pounded Kurdish positions in Syria and Iraq. The media has characterized this shocking reversal of US policy as a “game-changer” that will improve US prospects for victory over ISIS. But what the about-face really shows is Washington’s inability to conduct a principled foreign policy as well as Obama’s eagerness to betray a trusted friend and ally if he sees some advantage in doing so.
  • Turkish President Erdogan has launched a war against the Kurds; that is what’s really happening in Syria at present. The media’s view of events–that Turkey has joined the fight against ISIS–is mostly spin and propaganda. The fact that the Kurds had been gaining ground against ISIS in areas along the Turkish border, worried political leaders in Ankara that an independent Kurdish state could be emerging. Determined to stop that possibility,  they decided to use the bombing in Suruc as an excuse to round up more than 1,000 of Erdogans political enemies (only a small percentage of who are connected to ISIS) while bombing the holy hell out of Kurdish positions in Syria and Iraq. All the while, the media has been portraying this ruthless assault on a de facto US ally, as a war on ISIS. It is not a war on ISIS. It is the manipulation of a terrorist attack to advance the belligerent geopolitical agenda of Turkish and US elites.
  • The Turks know who they’re bombing. They are bombing their 30-year long enemy, the Kurds.  Here’s more on the topic from Telesur: “A decades-old conflict between Turkey and the Kurdish PKK has been reignited. Turkey vowed Saturday to continue attacks against the Kurdistan Workers’ Party (PKK), along with strikes against the Islamic State group. “The operations will continue for as long as threats against Turkey continue,” Prime Minister Ahmet Davutoglu said, according to Turkey’s Anadolu Agency. Ankara also confirmed it carried out airstrikes against PKK sites in Iraq. While Davutoglu said any organizations that “threaten” Turkey would be targeted in a crackdown on militants, on Friday President Tayyip Erdogan said the PKK would be the main focus of attacks.”  (“Turkey Says More Anti-PKK Strikes to Come“, Telesur) Repeat: “Erdogan said the PKK would be the main focus of attacks.”
  •  
    A must-read from Mike Whitney.
Paul Merrell

Hedge funds tell Puerto Rico: lay off teachers and close schools to pay us back | World... - 0 views

  • Billionaire hedge fund managers have called on Puerto Rico to lay off teachers and close schools so that the island can pay them back the billions it owes. The hedge funds called for Puerto Rico to avoid financial default – and repay its debts – by collecting more taxes, selling $4bn worth of public buildings and drastically cutting public spending, particularly on education. The group of 34 hedge funds hired former International Monetary Fund (IMF) economists to come up with a solution to Puerto Rico’s debt crisis after the island’s governor declared its $72bn debt “unpayable” – paving the way for bankruptcy. The funds are “distressed debt” specialists, also known as vulture funds, and several have also sought to make money out of crises in Greece and Argentina, the collapse of Lehman Brothers and the near collapse of Co-op Bank in the UK.
  • The report, entitled For Puerto Rico, There is a Better Way, said Puerto Rico could save itself from default if it improves tax collection and drastically cuts back on public spending. It accused the island, where 56% of children live in poverty, of spending too much on education even though the government has already closed down almost 100 schools so far this year.
Paul Merrell

Supply and Demand in the Gold and Silver Futures Markets - Paul Craig Roberts and Dave ... - 0 views

  • This article establishes that the price of gold and silver in the futures markets in which cash is the predominant means of settlement is inconsistent with the conditions of supply and demand in the actual physical or current market where physical bullion is bought and sold as opposed to transactions in uncovered paper claims to bullion in the futures markets. The supply of bullion in the futures markets is increased by printing uncovered contracts representing claims to gold. This artificial, indeed fraudulent, increase in the supply of paper bullion contracts drives down the price in the futures market despite high demand for bullion in the physical market and constrained supply. We will demonstrate with economic analysis and empirical evidence that the bear market in bullion is an artificial creation. The law of supply and demand is the basis of economics. Yet the price of gold and silver in the Comex futures market, where paper contracts representing 100 troy ounces of gold or 5,000 ounces of silver are traded, is inconsistent with the actual supply and demand conditions in the physical market for bullion. For four years the price of bullion has been falling in the futures market despite rising demand for possession of the physical metal and supply constraints.
Paul Merrell

Is the "military option" on Iran off the table? - Baltimore Sun - 0 views

  • f, as seems likely, President Barack Obama retains enough support to complete the nuclear deal with Iran, it will be largely because enough members of the House and Senate are persuaded by his argument that the only other real option is war.This was the rhetorical gauntlet the president threw down at his press conference last week. Equally significant, Mr. Obama omitted the until-now obligatory warning that "all options, including the military one, remain on the table."
  • Since then, Israeli media have been pressing hard to restore the military option to its accustomed place "on the table." Flying to Israel Sunday night for a handholding mission with top Israeli officials, U.S. Defense Secretary Ashton Carter tried to make his reception in Tel Aviv less frosty, telling accompanying journalists that the nuclear deal with Iran "does nothing to prevent the military option." The context, however, seemed to be one in which Iran was caught cheating on the nuclear deal.That this kind of rhetoric, even when it is not from the president, is still poison to Tehran was clear in the immediate reaction by Iran's Foreign Minister, Mohammad Javad Zarif, who insisted Monday: "Applying force ... is not an option but an unwise and dangerous temptation."
  • Looking for changes in official public statements was my bread and butter during a long tenure as a Kremlinologist. So on Wednesday, as I watched Mr. Obama defend the deal with Iran, I leaned way forward at each juncture — and there were several — where the timeworn warning about all options being "on the table" would have been de rigueur. He avoided saying it. "All options on the table?" The open-ended nature of this Bush/Cheney-esque bully-type warning is at odds with Western international understandings spanning more than three and half centuries — from the treaties of Westphalia (1648), to the Kellogg-Briand Pact (1928) to the post-World War II Nuremberg Tribunal to the UN Charter (1945). Try raising that with Establishment Washington, though, and be prepared to be dismissed as "picky-picky," or as quaint and as obsolete as the Geneva Conventions. Undergirding all this is the chauvinism reflected in President Obama's repeated reminders that the U.S. "is the sole indispensable country in the world."But in the wake of last week's accord with Iran in Vienna, it is possible now to hope that the "military option" is finally off the table — in reality, if not in occasional rhetorical palliatives for Israel.
  • ...1 more annotation...
  • Most Americans have no idea of how close we came to making war on Iran in 2008, the last year of the Bush/Cheney administration. Nor do they know of the essential role played by courageous managers of intelligence who, for the first time on the Iran nuclear issue, supervised a strictly evidence-based, from-the-bottom-up National Intelligence Estimate (NIE) that concluded in November 2007 that Iran had stopped working on a nuclear weapon at the end of 2003 and had not resumed that work. That key judgment issued unanimously and "with high confidence" by all 16 U.S. intelligence agencies played a huge role in strengthening the hand of Mike Mullen, then-chairman of the Joint Chiefs of Staff, and other reasonable national security leaders in dissuading President Bush from following Vice President Cheney's prompting to launch a war that would have made the war in Iraq look like a volleyball match between the Quaker School and Ursuline Academy.The juggernaut toward war with Iran was already rolling downhill. Recall that then-CENTCOM commander Adm. William Fallon was abruptly cashiered after saying "we're not going to do Iran on my watch." And Mr. Cheney later admitted churlishly that Mr. Bush had been a big disappointment in giving in to intelligence and military officials on Iran.In Mr. Bush's memoir "Decision Points," he complains bitterly that the NIE "tied my hands on the military side. ... After the NIE, how could I possibly explain using the military to destroy the nuclear facilities of a country the intelligence community said had no active nuclear weapons program?"
  •  
    By former CIA senior analyst Ray McGovern. 
Paul Merrell

Saudi Arabia and Venezuela Talk Oil Prices | nsnbc international - 0 views

  • Venezuelan Foreign Minister Delcy Rodriguez said Saturday evening that Saudi King Salman and President Nicolas Maduro had spoken on the phone and reached an understanding concerning oil cooperation.
  • “Both heads of state agreed to deploy joint efforts to recover the stability of the oil market and strengthen OPEC,” Rodriguez said on Twitter. Maduro has lobbied for months for an emergency meeting of the Organization of Petroleum Exporting Countries (OPEC) and coordination with non-OPEC oil producers to cut production in order to stem the downward trend in oil prices, which last month reached a six-year low. Venezuelan crude now hovers just above $40 a barrel which, in stark contrast to last year’s $100 barrel, has played a major role in the country’s current economic strife. The South American nation relies on oil for 97 percent of its foreign income. Despite Rodriguez’s affirmations, Saudi Arabian representatives have previously said they see no need to interfere in the oil market, or call an emergency summit. Indeed, analysts have pointed to the Gulf nation, the largest oil exporter in the world, as a key player in a game of strategy that has seen a decline in prices as nations vie for market share.
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Putin's Line in the Sand: No Regime Change in Syria - 0 views

  • The Syrian war can divided into two parts: The pre-Incirlik period and the post-Incirlik period. The pre-Incirlik period is roughly the four year stretch during which US-backed Islamic militias and al Qaida-linked groups fought the Syrian army with the intention of removing President Bashar al Assad from power. This first phase of the war ended in a draw. The post-Incirlik period looks like it could produce an entirely different outcome due to the fact that the US will be able to deploy its drones and warplanes from a Turkish airbase (Incirlik) that’s just 15 minutes flying-time from Syria. That will boost the number of sorties the USAF can able to carry out while increasing the effectiveness of its jihadi forces on the ground which will conduct their operations under the protection of US air cover. This will greatly improve their chances for success. The New York Times calls the Incirlik deal a “game-changer” which is an understatement. By allowing US F-16s to patrol the skies over Syria, Washington will impose a de facto no-fly zone over the country severely limiting Assad’s ability to battle the US-backed militias that have seized large swaths of the countryside and are now descending on Damascus. And while the war cannot be won by airpower alone, this new tactical reality tilts the playing field in favor the jihadis. In other words, the Incirlik agreement changes everything.
  • The Obama administration now believes that regime change is within its reach. Yes, they know it will require some back-up from US Special Forces and Turkish combat troops, but it’s all doable.  This is why Obama has shrugged off Russia’s plan for a transitional government or for forming a coalition to defeat ISIS.  The US doesn’t have to compromise on these matters because, after all, it has a strategically-located airbase from which it can protect its proxy-army, bomb cross-border targets, and control the skies over Syria. All Obama needs to do is intensify the war effort, put a little more pressure on Assad, and wait for the regime to collapse. This is why we should expect a dramatic escalation as we begin Phase 2 of the conflict. Russian President Vladimir Putin knows this, which is why he’s sending more weapons, supplies and advisors to Syria. He’s signaling to Washington that he knows what they’re up to and that he’ll respond if they carry things too far. In an interview with Russia’s state Channel 1, Putin said, “We have our ideas about what we will do and how we will do it in case the situation develops toward the use of force or otherwise. We have our plans.”
  • The administration is very nervous about Putin’s plans which is why they keep probing to see if they can figure out what he has up his sleeve.
  • ...2 more annotations...
  • But the fact is, Putin is not going to allow Assad to be removed by force. It’s that simple. Obama and his advisors suspect this, but they are not 100 percent certain so they keep looking for confirmation one way or the other. But Putin is not going to provide a clear answer because he doesn’t want to tip his hand or appear confrontational. But that doesn’t mean he’s not resolute. He is, and Washington knows it. In effect, Putin has drawn a line in the sand and told the US that if they cross that line, there’s going to trouble. So it’s up to Obama really. He can either seek a peaceful solution along the lines that Moscow has recommended or push for regime change and risk a confrontation with Russia. Those are the two choices. Unfortunately, Washington doesn’t have an “off” switch anymore, so changing policy is really not in the cards. Instead, the US war machine will continue to lumber ahead erratically until it hits an impasse and sputters to a halt. Once again, the immovable object will prevail over the unstoppable force (as it did in Ukraine), albeit at great cost to the battered people of Syria, their nation and the entire region.
  • It’s clear that Obama is emboldened by the Incirlik deal and believes that, with Turkey’s help, he can achieve US imperial ambitions in Syria. But it’s not going to happen.  Russia, Iran and Hezbollah are prepared to defend their ally Assad and stop Washington dead-in-its-tracks.  Obama will have succeeded in destroying another sovereign nation and scattering its people across the Middle East and Europe. But the US mission will fall short of its original objectives. There will be no regime change in Syria. Putin, Nasrallah and Khamenei will make sure of it.
Paul Merrell

Blast Shakes Ankara Just in Time to Justify NATO Incursion into Syria | nsnbc internati... - 0 views

  • A massive blast has killed at least 30 and injured over 100 more in NATO-member Turkey’s capital of Ankara. The blast appears to have targeted the pro-Kurdish Peoples’ Democratic Party (HDP) who was holding a peace rally at the moment of the explosion.
  • CNN would report in their article, “30 killed in bombing near main train station in Turkey’s capital,” that: At least one powerful bomb hit near the main train station in the Turkish capital Saturday morning, killing 30 people,authorities said, making it the deadliest attack in Ankara in recent memory. It would also claim that: No group has yet claimed responsibility for the attack, though suspicion immediately fell on the ISIS terrorist group or on Kurdish separatists in Turkey.  Turkey avoided, for quite some time, any conflict with ISIS, perhaps in exchange for the release earlier this year of dozens of Turkish hostages seized in the Iraqi city of Mosul. No details of those negotiations have been released.  However, Turkey recently changed its stance and allowed the U.S. to launch strikes on ISIS from the Incirlik Air Base in southern Turkey.
  • While CNN attempts to portray Turkey as holding a generally hostile stance toward the so-called “Islamic State” (ISIS, ISIL, Daesh), it finally admits toward the end of its report that: New reports have said that many Turks have joined ISIS’ ranks and that Turks, many of whom have been recruiting in Ankara, may make up a third of ISIS’ ranks. Indeed, with nearly a third of ISIS composed of Turkish terrorists, with Turkey being a regional, even global state-sponsor of terrorism targeting as far afield as China and Thailand, and with Turkey allowing its borders to remain open and feed what is clearly ISIS’ primary supply corridor just north of the Syrian city of Aleppo, it is clear that if “ISIS” was behind the blasts – it was Ankara itself who organized and executed them, and who will attempt to leverage them for maximum benefit.
Paul Merrell

Victory! World's Largest Nation Bans GMO Food Crops | New Eastern Outlook - 0 views

  • Victories are to be celebrated and for the future of healthy life on our planet we all can celebrate a beautiful victory. The world’s largest nation, the Russian Federation, whose landmass spans Eurasia from the Baltic and Ukraine on the west to Vladivostock and the Pacific on her east, has formally declared all commercial planting of Genetically Modified Organisms, GMOs, to be prohibited. The issue has been subject of a heated debate for some months inside Russia. In February 2014, just days prior to the US-orchestrated coup d’etat in Ukraine, Russian Prime Minister Dmitry Medvedev created a national research project to obtain scientific information so the Government and Duma might make a decision on GMOs in Russia. Now a definitive decision has been made, and it goes against Monsanto and the US-led GMO cartel. We can say Russia’s crisis has concentrated minds on the essentials of life.
  • Russian Deputy Prime Minister Arkady Dorkovich told an international biotechnology conference in Kirov September 18, “As far as genetically-modified organisms are concerned, we have made the decision not to use any GMO in food productions.” Last year the Duma or parliament voted to make tough GMO labeling laws as a first step to the new ban in order to inform consumers of presence of GMO in various foods they buy. That was before US and EU sanctions led to Russian counter-sanctions against EU imports of agriculture products. In August 2014, the Russian government announced its bans on import from the EU and several other countries of meat, fish, dairy products, fruit and vegetables as a response to the sanctions. It produced surprising results. Since the imposition of tough Russian food import bans, Russian agriculture has undergone a spectacular rebirth.
  • This July, taking a page out of American history, the Russian government announced it was drafting a Russian “Homestead Act.” The Russian government is finalizing a bill which will give an opportunity to every Russian citizen to obtain one hectare of land, or a maximum of five hectares for a family of five, in the Russian Far East for free. They can use the land to farm, to do forestry or simply build a home and live, so long as they use the land for the first five years. After, they own the land free if the plot has been used for activities not banned by Russian laws, reported TASS. In the case of non-use the land will be confiscated and revert back to the government. Foreigners will have no right to get the free land. The new land law, if passed in the Duma, will take effect in January, 2016.
  • ...2 more annotations...
  • Food production in Russia’s under-populated far-east region is also set to boom. On September 3 in Vladivostok at the first Eastern Economic Forum, Russia’s Agriculture Ministry announced the creation of a new $10 billion agriculture development fund together with China. A number of financial institutions, including Russia’s state-owned Sberbank, will participate in its operations. The aim of the fund is to stimulate the production of 10 million tons of grain and agricultural products annually, beginning 2020.
  • A recent poll suggests there is significant interest in the offer, with some 30 million mostly young Russians ready to “go east.” Following the economic devastation of Russia during the Yeltsin era of the 1990s, eastern regions suffered economic collapse and significant depopulation as people migrated to cities to survive. Into this broader context of recent developments, the definitive government ban on growing GMO crops in the Russian Federation adds a major new attraction. Russia stands to become one of the world’s most desired producers of natural, organic non-GMO-contaminated food for the world. Today, the once-great American agriculture has been de-humanized, industrialized, by giant agribusiness concerns, and contaminated by Monsanto and GMO plants along with its deadly herbicides containing toxic glyphosate. More than 80% of all US corn is GMO and almost 100% of USA soybeans. This is no small matter. Exports of GMO soybeans and corn are allowed unlabeled, by loopholes, into the European Union as well as into China. That means that most of the meat and even farmed fish that European and Chinese consumers eat contains indirect GMO crops and toxins. In light of all this it might make sense to treat Russia a little more politely in the future if we want to eat healthy food. They are doing what we should be doing, but don’t. Why?
  •  
    5 hectares == 12.35 acres. Times 30 million Russians == 370.5 million acres less space for a home and a driveway. That's a lot of new agricultural production.  Bear in mind that Russia imported most of its food from Europe before the Ukraine sanctions. This article is about the evaporation of foreign trade that Europe will never get back.And it's about new Russian agricultural exports to China. Perhaps even about eventual exports to the U.S. for those who want a "GMO-free" label on their food. This is very bad news for Monsanto and other biotech companies in the U.S, especially a few years down the road when other countries begin importing Russian GMO-free food.  
Paul Merrell

The frightening promise of self-tracking pills | The Verge - 0 views

  • Some morning in the future, you take a pill — maybe something for depression or cholesterol. You take it every morning. Buried inside the pill is a sand-sized grain, one millimeter square and a third of a millimeter thick, made from copper, magnesium, and silicon. When the pill reaches your stomach, your stomach acids form a circuit with the copper and magnesium, powering up a microchip. Soon, the entire contraption will dissolve, but in the five minutes before that happens, the chip taps out a steady rhythm of electrical pulses, barely audible over the body's background hum. The signal travels as far as a patch stuck to your skin near the navel, which verifies the signal, then transmits it wirelessly to your smartphone, which passes it along to your doctor. There's now a verifiable record that the pill reached your stomach.
  • This is the vision of Proteus, a new drug-device accepted for review by the Food and Drug Administration last month. The company says it's the first in a new generation of smart drugs, a new source of data for patients and doctors alike. But bioethicists worry that the same data could be used to control patients, infringing on the intensely personal right to refuse medication and giving insurers new power over patients’ lives. As the device moves closer to market, it raises a serious question: Is tracking medicine worth the risk?
  • But not everyone's convinced that the ability to track pills will be good news for patients. The right to refuse treatment is an important, fragile principle in health care. Many are worried that tracking whether a pill is being consumed will be the first step towards punishing patients that don't comply. While doctors can’t force a patient to take a pill, court orders frequently mandate treatments involving specific drug regimens.
  • ...3 more annotations...
  • NYU bioethicist Arthur Caplan says he can imagine a judge using Proteus to enforce medication as part of a sentence: miss a pill, and your parole is revoked. "The temptation in the legal system to say, 'I can monitor you and make sure you're not a threat' is going to be huge," Caplan says. "Maybe that's good, maybe it's bad, but it's a different world than saying I consent to taking these pills." Those court orders are rare at the moment, since there’s no way to ensure a patient is taking medication outside of a controlled treatment facility — but as pill-tracking becomes easier, those measures could become much more common. That's particularly likely given the way Proteus is entering the market. The device's first partnership bundles it with Abilify, a powerful antipsychotic most commonly used to treat mood disorders, schizophrenia, and Tourette's. The most common effects are improved concentration and decreased hallucinations, but it comes with extreme side effects like increased suicide risk and a lower seizure threshold. It's most often prescribed in cases of severe mental illness, often in psychiatric institutions or as part of a court-mandated treatment program — exactly the scenarios bioethicists like Caplan are most worried about.
  • Patient's biggest protection are medical privacy laws like HIPAA, which prevent medical data from being shared with anyone outside the hospital system. That would stop your boss or your parents from using Proteus to make sure you haven't fallen behind on your anti-anxiety medication. But those laws won't keep data out of the hands of healthcare providers, and Caplan is concerned the pill could also be used to enforce compliance. Insurers might offer a discounted rate on tracked pills, then hit patients with a $100 co-pay for every treatment they miss. It's not as oppressive as a court order, but the end result would be similar.
  • Still, those concerns are unlikely to keep Proteus out of the hands of doctors. The upcoming FDA approval will focus largely on safety and efficacy, leaving the larger ethical challenges to be solved after the drug is released to doctors and patients at large. With the technology available, it will be up to the courts to decide when it’s legal and ethical to use it. As far as Proteus is concerned, the power of the technology outweighs the risks. "There are challenges with bringing digital into any sector," a company representative said. "The reason to embrace the challenge in health care is because the need is so great."
  •  
    Let's not forget that because Congress recently decided to revive Patriot Act sect. 215, the FBI is authorized to gather medical records for foreign intelligence and anti-terrorism purposes and according to ex-NSA chief scientist William Binney, the NSA in fact collects medical records and makes them available to law enforcement agencies without a warrant or court order.  http://motherboard.vice.com/read/i-toured-stasi-hq-with-nsa-whistleblowers  One judge has found that statute unconstitutional and may rule in the next few days. A court of appeals has found that the statute did not authorize bulk collection of telephone metadata records. An Oregon federal judge ruled that the DEA cannot obtain prescription records (in part because they are medical records) without an individualized search warrant, specifically ruling against the bulk collection argument. Maybe someday someone in federal government will get a clue that medical records are not one of the "haystacks" the NSA is permitted to create.  Involuntary medical treatment is another giant legal hairball. See https://en.wikipedia.org/wiki/Involuntary_treatment   
« First ‹ Previous 261 - 280 of 386 Next › Last »
Showing 20 items per page