Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 2010

Rss Feed Group items tagged

Gary Edwards

Next Leg Of The Ponzi Revealed - Foreign Central Banks To Begin Buying US Stocks Outrig... - 0 views

  •  
    Another great chart detailing the Feds destruction of our currency.  Is this money laundering or a giant ponzi scheme? The good news is that the stock market is on a tear.  The bad news?  International banksters are gobbling up US corporate stocks with the Trillions of freshly printed dollars our Federal Reserve Cartel was kind enough to provide.   Recall that the July 2010 GAO audit of the Federal Reserve Banksters revealed an eye-popping $16.1 Trillion dollars had been distributed to domestic and international banksters between December 2007 and January 2010.   Where did the money go?  How do those dollars make their way back into the world economy?  And what will happen to the value of the dollar when these vast sums do show up in world financial markets? The banksters are not lending.  And companies are not borrowing.  The Trillions flooding the worlds banksters was originally thought to provide liquidity and keep the economy churning.  While there are many competing answers to the question of why this massive bailout and reboot didn't work, were now witnessing the wholesale purchase of corporate ownership with those dollars.   "Don't want to borrow those Trillions?  Good.  We'll buy you then." Sorry, but this looks like a gigantic money laundering scheme where hot dollars are dumped off in exchange for real assets. excerpt:  In other words, while the Fed's charter forbids it from buying US equities outright, it certainly can promise that it will bail out such bosom friends as the Bank of Israel, the Swiss National Bank, and soon everyone else, if and when their investment in Apple should sour. Luckily, this means that the exponential phase in risk is approaching as everyone will now scramble to frontrun central bank purchases no longer in bonds, but in stocks outright, leading to epic surges in everything risk related, then collapse and force the Fed to print tens of trillions to bail everyone out all over again, rinse repea
Paul Merrell

US v. Warshak, 631 F. 3d 266 - Court of Appeals, 6th Circuit 2010 - Google Scholar - 0 views

  • While a letter is in the mail, the police may not intercept it and examine its contents unless they first obtain a warrant based on probable cause. Ibid. This is true despite the fact that sealed letters are handed over to perhaps dozens of mail carriers, any one of whom could tear open the thin paper envelopes that separate the private words from the world outside. Put another way, trusting a letter to an intermediary does not necessarily defeat a reasonable expectation that the letter will remain private. See Katz, 389 U.S. at 351, 88 S.Ct. 507 ("[W]hat [a person] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."). Given the fundamental similarities between email and traditional forms of communication, it would defy common sense 286*286 to afford emails lesser Fourth Amendment protection. See Patricia L. Bellia & Susan Freiwald, Fourth Amendment Protection for Stored E-Mail, 2008 U. Chi. Legal F. 121, 135 (2008) (recognizing the need to "eliminate the strangely disparate treatment of mailed and telephonic communications on the one hand and electronic communications on the other"); City of Ontario v. Quon, ___ U.S. ___, 130 S.Ct. 2619, 2631, 177 L.Ed.2d 216 (2010) (implying that "a search of [an individual's] personal e-mail account" would be just as intrusive as "a wiretap on his home phone line"); United States v. Forrester, 512 F.3d 500, 511 (9th Cir.2008) (holding that "[t]he privacy interests in [mail and email] are identical"). Email is the technological scion of tangible mail, and it plays an indispensable part in the Information Age.
  • Over the last decade, email has become "so pervasive that some persons may consider [it] to be [an] essential means or necessary instrument[] for self-expression, even self-identification." Quon, 130 S.Ct. at 2630. It follows that email requires strong protection under the Fourth Amendment; otherwise, the Fourth Amendment would prove an ineffective guardian of private communication, an essential purpose it has long been recognized to serve. See U.S. Dist. Court, 407 U.S. at 313, 92 S.Ct. 2125; United States v. Waller, 581 F.2d 585, 587 (6th Cir.1978) (noting the Fourth Amendment's role in protecting "private communications"). As some forms of communication begin to diminish, the Fourth Amendment must recognize and protect nascent ones that arise. See Warshak I, 490 F.3d at 473 ("It goes without saying that like the telephone earlier in our history, e-mail is an ever-increasing mode of private communication, and protecting shared communications through this medium is as important to Fourth Amendment principles today as protecting telephone conversations has been in the past.").
  • If we accept that an email is analogous to a letter or a phone call, it is manifest that agents of the government cannot compel a commercial ISP to turn over the contents of an email without triggering the Fourth Amendment. An ISP is the intermediary that makes email communication possible. Emails must pass through an ISP's servers to reach their intended recipient. Thus, the ISP is the functional equivalent of a post office or a telephone company. As we have discussed above, the police may not storm the post office and intercept a letter, and they are likewise forbidden from using the phone system to make a clandestine recording of a telephone call—unless they get a warrant, that is. See Jacobsen, 466 U.S. at 114, 104 S.Ct. 1652; Katz, 389 U.S. at 353, 88 S.Ct. 507. It only stands to reason that, if government agents compel an ISP to surrender the contents of a subscriber's emails, those agents have thereby conducted a Fourth Amendment search, which necessitates compliance with the warrant requirement absent some exception. In Warshak I, the government argued that this conclusion was improper, pointing to the fact that NuVox contractually reserved the right to access Warshak's emails for certain purposes. While we acknowledge that a subscriber agreement might, in some cases, be sweeping enough to defeat a reasonable expectation of privacy in the contents of an email account, see Warshak I, 490 F.3d at 473; Warshak II, 532 F.3d at 526-27, we doubt that will be the case in most situations, and it is certainly not the case here.
  • ...1 more annotation...
  • Accordingly, we hold that a subscriber enjoys a reasonable expectation of privacy in the contents of emails "that are stored with, or sent or received through, a commercial ISP." Warshak I, 490 F.3d at 473; see Forrester, 512 F.3d at 511 (suggesting that "[t]he contents [of email messages] may deserve Fourth Amendment protection"). The government may not compel a commercial ISP to turn over the contents of a subscriber's emails without first obtaining a warrant based on probable cause. Therefore, because they did not obtain a warrant, the government agents violated the Fourth Amendment when they obtained the contents of Warshak's emails. Moreover, to the extent that the SCA purports to permit the government to obtain such emails warrantlessly, the SCA is unconstitutional.
  •  
    A 2010 decision by the U.S. 6th Circuit Court of Appeals that I had missed up to now. It finds the Stored Communications Act's section that excuses email in the possession of an ISP for more than 180 days from the 4th Amendment's judicial warrant clause. There may yet be hope for cloud computing in the U.S. 
Paul Merrell

Israel: Gas, Oil and Trouble in the Levant | Global Research - 0 views

  • Israel is set to become a major exporter of gas and some oil, if all goes to plan. The giant Leviathan natural gas field, in the eastern Mediterranean, discovered in December 2010, is widely described as “off the coast of Israel.”
  • Coupled with Tamar field, in the same location, discovered in 2009, the prospects are for an energy bonanza for Israel, for Houston, Texas based Noble Energy and partners Delek Drilling, Avner Oil Exploration and Ratio Oil Exploration.
  • However, even these estimates may prove modest. In their: “Assessment of Undiscovered Oil and Gas Resources of the Levant Basin Province, Eastern Mediterranean”, the US Department of the Interior’s US Geological Survey, wrote in 2010: “We estimated a mean of 1.7 billion barrels of recoverable oil and a mean of 122 trillion cubic feet of recoverable gas in this province using a geology based assessment methodology.”
  • ...3 more annotations...
  • Whilst Israel claims them as her very own treasure trove, only a fraction of the sea’s wealth lies in Israel’s bailiwick as maps (iv, v, see below) clearly show. Much is still unexplored, but currently Palestine’s Gaza and the West Bank between them show the greatest discoveries, with anything found in Lebanon and Syria’s territorial waters sure to involve claims from both countries.
  • In a pre-emptive move, on Christmas Day, Syria announced a deal with Russia to explore 2,190 kilometres (850 Sq. miles) for oil and gas off its Mediterranean coast, to be: “… financed by Russia, and should oil and gas be discovered in commercial quantities, Moscow will recover the exploration costs.” Syrian Oil Minister, Ali Abbas said during the signing ceremony that the contract covers “25 years, over several phases.”
  • The agreement is reported to have resulted from “months of long negotiations” between the two countries. Russia, as one of the Syrian government’s main backers, looks set to also become a major player in the Levant Basin’s energy wealth. (vi) Lebanon disputes Israel’s map of the Israeli-Lebanese maritime border, filing their own map and claims with the UN in 2010. Israel claims Lebanon is in the process of granting oil and gas exploration licenses in what Israel claims as its “exclusive economic zone.” That the US in the guise of Vice President Joe Biden, as honest broker, acting peace negotiator in the maritime border dispute would be laughable, were it not potential for Israel to attack their neighbour again. In a visit to Israel in March 2010, Biden announced: “There is absolutely no space between the United States and Israel when it comes to Israel’s security- none at all”, also announcing on arrival in Israel:”It’s good to be home.” Given US decades of  “peace brokering” between Israel and Palestine, this is already a road of pitfalls, one sidedness and duplicity, well traveled. There is trouble ahead.
  •  
    More evidence that oil and gas natural resources play a role in Mideast politics and wars. And Joe Biden's "It's good to be home" remark on arrival in Israel adds further evidence that the U.S. is not an honest negotiator/mediator when it comes to Israel/Palestine and the Syrian peace process. It's actually pretty outrageous that a U.S. Vice  President would stoop so low as to call Israel his "home." It's indicative of divided loyalty at best.
Paul Merrell

Panetta Says Rahm Emanuel Cussed Him Out for Cooperating With Torture Inquiry - The Int... - 0 views

  • Former CIA Director Leon Panetta, in his new book, describes being summoned to a White House meeting and cussed out by President Obama’s chief of staff after he agreed to give the Senate intelligence committee access to documents chronicling the agency’s use of torture during the Bush administration. “The president wants to know who the fuck authorized this release to the committees,” Rahm Emanuel, who served as Obama’s chief of staff and enforcer in 2009 and 2010, is quoted as saying while slamming the table for emphasis.
  • He describes being micromanaged and second-guessed by White House aides who seemed focused on political appearance over substance. White House pushback on the Senate torture inquiry, which came despite Obama’s pledge to run the most transparent administration ever, is in that way typical – as is Emanuel’s profane tirade. (Emanuel, as I’ve written before, saw even the most deeply moral and legal decisions in purely political terms.)
  • Here’s what he said happened next: I was summoned down to a meeting in the Situation Room, where I was told I would have to “explain” this deal to Rahm… It did not take long to get ugly. “The president wants to know who the fuck authorized this release to the committees,” Rahm said, slamming his hand down on the table. “I have a president with his hair on fire, and I want to know what the fuck you did to fuck this up so bad!” Panetta describes then-director of national intelligence Dennis Blair as coming to his rescue, asking Emanuel: “If the president’s hair is on fire,” he retorted, “I want to know who the fuck set his hair on fire.”
  • ...1 more annotation...
  • Blair was fired in May 2010 and replaced by James Clapper, with sources citing as a main reason “the mutual distrust between the White House and members of Mr. Blair’s staff.” John Brennan, who was then Obama’s counter-terrorism adviser and is now CIA director, was one of the people Panetta implied had set the president’s hair on fire. This new account from Panetta has particular relevance today, said Katherine Hawkins, national security fellow at pro-transparency group Open the Government. “It seems that the White House’s and Director Brennan’s opposition to Senate Intelligence Committee oversight over the torture program began sooner than we knew,” she wrote in an email. “This explains why, over six months after the President promised to support release of the torture report, the White House and CIA are still insisting on unacceptable redactions. It also explains why there have been no consequences for Brennan’s role in the unlawful search of Senate computers.”
Paul Merrell

The Handover - An FP Slideshow | Foreign Policy - 0 views

  • Tuesday marked a milestone for the 12-year-old war in Afghanistan, with NATO forces officially handing over responsibility for the country's security to Afghan government forces. Since 2010, when President Barack Obama accelerated training as part of his rapid surge of forces into the country, the Afghan National Army has grown from around 100,000 members to 195,000. But it still faces a number of challenges, including a desertion rate so high that it needs 50,000 new recruits every year to replace those who leave). In December 2012, a Pentagon report determined that only one of the Afghan military's 23 brigades was able to operate effectively without NATO support. Now, Afghan troops will have to do just that; except in rare cases, they will no longer be able to rely on the support of U.S. warplanes, medical evacuation helicopters, or ground troops.
  • Tuesday marked a milestone for the 12-year-old war in Afghanistan, with NATO forces officially handing over responsibility for the country's security to Afghan government forces. Since 2010, when President Barack Obama accelerated training as part of his rapid surge of forces into the country, the Afghan National Army has grown from around 100,000 members to 195,000. But it still faces a number of challenges, including a desertion rate so high that it needs 50,000 new recruits every year to replace those who leave). In December 2012, a Pentagon report determined that only one of the Afghan military's 23 brigades was able to operate effectively without NATO support. Now, Afghan troops will have to do just that; except in rare cases, they will no longer be able to rely on the support of U.S. warplanes, medical evacuation helicopters, or ground troops. Here's a look back at the long preparation for this week's big handover. An Afghan National Army soldier assigned to the Mobile Strike Force Kandak fires an RPG-7 rocket-propelled grenade launcher during a live-fire exercise supervised by Marines Team on Camp Shorabak, Helmand province, Afghanistan on May 20, 2013.
  •  
    Here in one paragraph are a lot of the reasons two of Obama's claims about U.S. plans in Afghanistan cannot both be true: [i] all U.S. -and NATO combat troops will be withdrawn from Afghanistan by the end of 2014; and [ii] a fairly large contingent of U.S. non-combat troops will remain on U.S. bases in Afghanistan to advise, train, and support the Karzai government's defense forces.  1. The "surge" didn't work even though Obama sent more troops than the military had requested. Even at the peak of U.S. forces in that country, the U.S. military had been beaten back into enclaves by the Taliban. Nonetheless, Obama has  continued to draw down U.S. forces there. NATO allies have been pulling up their tent pegs too. 2. The Afghan government forces are utterly incapable of holding out against the Taliban without strong NATO backing that Obama says is ending. 3. Therefore, a small non-combatant U.S. force left behind after 2014 would be virtually defenseless if left behind. There seems to be no question that U.S. involvement in Afghanistan is winding down steadily. And Obama isn't dumb enough to have a few thousand U.S. troops stay behind to be slaughtered. So his "stay behind" claims are a bluff. The Taliban can read those tea leaves at least as well as I can. This is Vietnam War Redux, also a repeat of the Soviet retreat from Afghanistan. Obama has no credible stick to wield in negotiations with the Taliban. Therefore, the negotiations are either a sham or Obama has to offer the Taliban a carrot of suitable size. The Taliban has no incentive to participate in a sham; they've won their war and the U.S. departure is imminent. Therefore, we need consider what carrot Obama might offer the Taliban. A better royalty agreement on the sidetracked Trans-Afghanistan Pipeline that would supply India with natural gas? .  That doesn't seem enough.  But a consortium of western investors willing to pay royalties t
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Gary Edwards

t r u t h o u t | Recent Rulings Could Shield 62 Million Homes From Foreclosure - 0 views

  • Most courts continue to look the other way on MERS' lack of standing to sue, but the argument has picked up enough steam to consider the rather stunning implications. If MERS is not the title holder of properties held in its name, the chain of title has been broken and no one may have standing to sue. In MERS v. Nebraska Department of Banking and Finance, MERS insisted that it had no actionable interest in title, and the court agreed.
  • An August 2010 article in Mother Jones titled "Fannie and Freddie's Foreclosure Barons" exposes a widespread practice of "foreclosure mills" in backdating assignments after foreclosures have been filed. Not only is this perjury, a prosecutable offense, but if MERS was never the title holder, there is nothing to assign. The defaulting homeowners could wind up with free and clear title.
  • "'Produce the Note' Movement Helps Stall Foreclosures":
  • ...3 more annotations...
  • "The ticking time bomb in the US banking system is not resetting subprime mortgage rates. The real problem is the contractual ability of investors in mortgage bonds to require banks to buy back the loans at face value if there was fraud in the origination process.
  • "... The loans at issue dwarf the capital available at the largest US banks combined and investor lawsuits would raise stunning liability sufficient to cause even the largest US banks to fail...."
  • homeowner movement to tear off the predatory mask called MERS
  •  
    Technicality or Fatal Flaw? To foreclose on real property, the plaintiff must be able to produce a promissory note or assignment establishing title. Early cases focused on MERS' inability to produce such a note, but most courts continued to consider the note a mere technicality and ignored it. Landmark newer opinions, however, stress that this defect is not just a procedural. but a substantive failure, one that is fatal to the plaintiff's case. The latest of these decisions came down in California on May 20, 2010, in a bankruptcy case called In re Walker, Case no. 10-21656-E-11. The court held that MERS could not foreclose because it was a mere nominee and that as a result plaintiff Citibank could not collect on its claim. The judge opined: "Since no evidence of MERS' ownership of the underlying note has been offered and other courts have concluded that MERS does not own the underlying notes, this court is convinced that MERS had no interest it could transfer to Citibank. Since MERS did not own the underlying note, it could not transfer the beneficial interest of the Deed of Trust to another. Any attempt to transfer the beneficial interest of a trust deed without ownership of the underlying note is void under California law."
Gary Edwards

Sandy Hook and Obama's Connecticut Social Security number | Fellowship of the Minds - 1 views

  • In May 2011, blogger The Obama Hustle conducted a database pull for SSN 042-68-4425 and got the names of Harrison J. Bounel and Barack Obama (see below), indicating that one SSN was being used by both men.
  •  
    "Sandy Hook and Obama's Connecticut Social Security number Posted on December 27, 2014 by Dr. Eowyn | 18 Comments One of the many curiosities about the sitting President of the United States is the fact that, unlike us, he has not one, but multiple Social Security numbers (SSN). In 2010, two licensed private investigators, Susan Daniels and Neal Sankey, found that multiple SS numbers are associated with Barack Obama's name. Daniels and Sankey put their findings in sworn affidavits. Dr. Orly Taitz further verified their information with a third source, a retired Department of Homeland Security senior investigator named John Sampson. In May 2010, the mystery deepened when it was determined that the SSN Obama is currently using (042-68-4425) has a Connecticut prefix, 042, but Obama had never lived in nor had associations with the state of Connecticut. Obama has been using that 042 SS number since 1979 when he was 18 years old. In an article for Western Journalism, Stephen Baldwin writes: All told, there are 49 addresses and 16 different Social Security numbers listed for a person whose name is spelled "Barack Obama." […] the one Social Security number Obama most frequently used, the one beginning with 042, is a number issued in Connecticut sometime during 1976-1977, yet there is no record of Obama ever living or working in Connecticut. Indeed, during this time period Obama would have been 15-16 years old and living in Hawaii at the time. In late February 2011, the mystery further deepened when retired US Air Force Col. Gregory Hollister, the litigant in an Obama eligibility lawsuit, conducted a search for Obama's Connecticut SSN in the Social Security Number Verification System used by small businesses to verify employment eligibility. The results came back as: Failed: SSN not in file (never issued) To the question of why Obama obtained a Connecticut-issued SSN instead of one by Hawaii, Joel Gilbert, maker of the documentary Dreams from
Paul Merrell

As Yemen Crumbled, a Disappeared US Detainee Called Home in Fear for His Life | VICE News - 0 views

  • On January 20, as Houthi fighters battled the guards watching the compound of Yemen's president and further expanded their grip on the capital, a US citizen who has been detained in Sana'a since 2010 and hasn't been seen in almost a year called home to say that the Shia rebels had taken over the prison where he is held and that they planned to "kill everyone," according to his wife who resides in the US."Yemen is in complete turmoil as of yesterday," she wrote on a Facebook page advocating for his release. "He was able to make a call and asked for his country, America, to save his life by rescuing him from a sectarian battle between two groups [with] which he has no involvement."Sharif Mobley, a 31-year-old father of three from New Jersey, was snatched by Yemeni security officers 5 years ago and is suspected by the US of having ties to terrorist groups after he made contract with US-born Islamist cleric Anwar al-Awlaki, who was killed in a US drone attack in Yemen in 2011. His wife, who lived with him at the time of his capture, said they had traveled to Yemen to study Arabic and the teachings of Islam.
  • On January 20, as Houthi fighters battled the guards watching the compound of Yemen's president and further expanded their grip on the capital, a US citizen who has been detained in Sana'a since 2010 and hasn't been seen in almost a year called home to say that the Shia rebels had taken over the prison where he is held and that they planned to "kill everyone," according to his wife who resides in the US.
  • On January 20, as Houthi fighters battled the guards watching the compound of Yemen's president and further expanded their grip on the capital, a US citizen who has been detained in Sana'a since 2010 and hasn't been seen in almost a year called home to say that the Shia rebels had taken over the prison where he is held and that they planned to "kill everyone," according to his wife who resides in the US."Yemen is in complete turmoil as of yesterday," she wrote on a Facebook page advocating for his release. "He was able to make a call and asked for his country, America, to save his life by rescuing him from a sectarian battle between two groups [with] which he has no involvement."Sharif Mobley, a 31-year-old father of three from New Jersey, was snatched by Yemeni security officers 5 years ago and is suspected by the US of having ties to terrorist groups after he made contract with US-born Islamist cleric Anwar al-Awlaki, who was killed in a US drone attack in Yemen in 2011. His wife, who lived with him at the time of his capture, said they had traveled to Yemen to study Arabic and the teachings of Islam.
  • ...7 more annotations...
  • Mobley was shot in the leg during his abduction, and interrogated by FBI agents and representatives of the US Department of Defense while in hospital on January 30, 2010 — but never charged with terrorism. Instead, Yemeni authorities later charged him with the murder of a guard during a failed escape attempt, for which he now faces the death penalty. His lawyer was never formally notified of the charges against him.While his trial is ongoing, Mobley hasn't been seen in court since February 2014. In sporadic, frantic calls made from the cell phone of the occasional sympathetic guard, he has reportedly told his wife that he is being tortured and threatened. On his last call, two days before Yemen's president resigned, plunging the country into political chaos, Mobley once again told his wife that he fears for his life.
  • Mobley's lawyer, Cori Crider — the legal director of Reprieve, a UK-based legal aid group — told us that Islam is "really, really scared right now." "There is no trial process anymore, it hasn't happened for ages," said Crider, who hasn't been told where her client is and hasn't been able to speak with him in nearly a year. "[The US] really needs to renegotiate with what remains of the Yemeni state to get this guy deported and back to where he's gonna be safe, because he's really at risk right now."Crider and Islam said that US officials know where Mobley is — but that they won't tell them.
  • Mobley's whereabouts over the last year have not been confirmed — including by US officials who claimed to have visited him and found him "in good health and with  no major complaints," as reported by the Guardian. Mobley was believed to be in the hands of Yemen's Specialized Criminal Court — a secretive national security court known for its record of human rights abuse and targeting of political opponents and journalists.At some point last year, Mobley was believed to be detained at a Sana'a military base. A number of Sana'a's official facilities have recently passed under the control of Houthi rebels — including one seized Thursday, where US officials had previously trained Yemeni security forces on counter-terrorism tactics.
  • "They won't tell me and they won't tell his family," she added. "Even though they know, they refuse to tell us where their citizen is held at a time when the country is going into total chaos."Under America's Privacy Act, the state department cannot reveal any information related to a US citizen's "location, welfare, intentions, or problems" to anyone without that person's permission — this includes relatives and members of Congress.But Crider believes the US government may not only know where Sharif is, but she says they may also have had something to do with his disappearance.
  • US agents backed Mobley's initial arrest, Crider said, but they may have also been behind his subsequent disappearance. An unnamed Yemeni security source told NBC News that Mobley had been transferred in coordination with the US and that American officials have participated in his interrogation."We are very disturbed by recent reports that suggest that they are in some way implicated in the second disappearance," Crider said, adding that she has been fighting the government to disclose more information, including through government records requests. "If that's right, that's a problem of a totally different magnitude."
  • A State Department official told VICE News that there are no current plans for the US to directly evacuate Americans and that the US does not evacuate prisoners in a crisis situation, but declined to discuss Mobley's case, citing privacy laws. That's the same reasoning US officials have given to Crider — who has been fighting for months to find her client."I was like, guys, I'm this person's attorney," she said. "He has a right to see his legal representative — that is basic under Yemeni law just like it would be under US law. So you know where he is, you know he has a right to an attorney, what are you doing? Where is he?"
  • In previous calls to his wife, Mobley said that his captors had forced him to drink from bottles that had previously contained urine, and sprayed him with mace when he asked to speak with embassy officials. Lawyers with Reprieve said that during his detention he was beaten, chained to a bed, and dragged down the stairs.
  •  
    The State Department's Privacy Act excuse for withholding the location of Sharif Mobley is a load of bull puckey intended for media consumption, not as a serious legal argument. The Privacy Act has an exception for just such situations: "(b) Conditions of Disclosure.- No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, *unless disclosure of the record would be-* ... (8) to a person pursuant to a showing of compelling circumstances affecting the health or safety of an individual if upon such disclosure notification is transmitted to the last known address of such individual;" 5 U.S.C. 552a(b), http://www.law.cornell.edu/uscode/text/5/552a. This is an outrageous cover-up!
Paul Merrell

U.S. State Dept. Document Confirms Regime Change Agenda in Middle East | Middle East Br... - 0 views

  • The Obama Administration has been pursuing a policy of covert support for the Muslim Brotherhood and other insurgent movements in the Middle East since 2010.  MEB has obtained a just-released U.S. State Department document through a Freedom of Information Act lawsuit that confirms the Obama Administration’s pro-active campaign for regime change throughout the Middle East and North Africa region. The October 22, 2010 document, titled “Middle East Partnership Initiative: Overview,” spells out an elaborate structure of State Department programs aimed at directly building “civil society” organizations, particularly non-governmental organizations (NGOs), to alter the internal politics of the targeted countries in favor of U.S. foreign policy and national security objectives. The five-page document, while using diplomatic language, makes clear that the goal is promoting and steering political change in the targeted countries:  “The Middle East Partnership Initiative (MEPI) is a regional program that empowers citizens in the Middle East and North Africa to develop more pluralistic, participatory, and prosperous societies.  As the figures in this overview illustrate, MEPI has evolved from its origins in 2002 into a flexible, region-wide tool for direct support to indigenous civil society that mainstreams that support into the daily business of USG diplomacy in the region.  MEPI engages all the countries of the NEA region except Iran.  In the seven of NEA’s eighteen countries and territories with USAID missions, country-level discussions and communication between MEPI and USAID in Washington ensure that programming efforts are integrated and complementary.”
  • According to the October 2010 document, the Deputy Chief of Mission (DCM) at every U.S. embassy in the MENA (Middle East/North Africa) is in charge of the MEPI program, giving it a clear high priority.  The document makes clear that the Middle East Partnership Initiative is not coordinated with host governments:  “MEPI works primarily with civil society, through NGO implementers based in the United States and in the region.  MEPI does not provide funds to foreign governments, and does not negotiate bilateral assistance agreements.  As a regional program, MEPI can shift funds across countries and to new issue-areas as needed.” The document makes clear that special priority, as early as 2010, was given to Yemen, Saudi Arabia, Tunisia, Egypt and Bahrain, and that project headquarters in Abu Dhabi and Tunis were overall coordinating centers for the entire regional program.  Within a year of its inception, Libya and Syria were added to the list of countries on the priority list for civil society intervention.
  • The State Department document was released as part of an FOIA suit focused on Presidential Study Directive 11, which remains classified “secret” and has not yet been released to the public.  According to MEB sources, PSD-11 spelled out the Obama Administration’s plans to support the Muslim Brotherhood and other allied “political Islam” movements believed at the time to be compatible with U.S. foreign policy objectives in the region.
Paul Merrell

Israel Banned Renowned Doctor and Human Rights Activist Mads Gilbert from Entering Gaza... - 0 views

  • Israel has banned Norwegian doctor and human rights activist Mads Gilbert from entering Gaza for life. Gilbert, a professor at the University Hospital of North Norway, where he has worked since 1976, earned international renown for his philanthropic work in late 2008, during Israel’s Operation Cast Lead, an attack that, according to Israeli human rights organization B’Tselem, killed roughly 1,400 Gazans, including almost 800 civilians, 350 of whom were children. The aid worker, along with fellow Norwegian doctor Erik Fosse, decided to volunteer in Gaza as soon as he heard that bombing had started, on 27 December 2008. Thanks to diplomatic and economic support (in the sum of $1 million dollar of emergency funding from the Norwegian Ministry of Foreign Affairs), the two physicians managed to arrive in the strip by 30 December.
  • The Israeli government prevented all international press from entering Gaza during Cast Lead (a documentary, The War Around Us, was made about the only two foreign reporters in the strip at the time), in what Gilbert called Israel’s insidious “PR plan.” The doctor, as one of the only international aid workers in Gaza, thus devoted considerable time to speaking with local Palestinian news outlets, some of whom were reporting on behalf of foreign networks including BBC, CNN, ABC, and Al Jazeera. BBC aired an interview with Gilbert, conducted in the hospital. The questions asked, and the answers garnered, were eerily similar to those he would give just five years later, during Operation Protective Edge. The interviewer began asking him to respond to Israel’s claims that it was not targeting civilians, that it was only attacking Hamas militants. Gilbert called the claim “an absolutely stupid statement” and explained that, among the hundreds of patients he had seen at that point, only two had been fighters. The “large majority” were women, children, and men civilians. “These numbers are contradictory to everything Israel says,” he reported.
  • The doctor directed one heart-wrenching passage to President Obama, writing “Mr Obama – do you have a heart? I invite you – spend one night – just one night – with us in Shifa. I am convinced, 100 per cent, it would change history. Nobody with a heart and power could ever walk away from a night in Shifa without being determined to end the slaughter of the Palestinian people.” Israel later attacked Shifa hospital. Doctors Without Borders (MSF) “strongly condemn[ed]” the incursion, saying it “demonstrate[d] how civilians in Gaza have nowhere safe to go.” MSF director Marie-Noëlle Rodrigue stated, in an official statement, “When the Israeli army orders civilians to evacuate their houses and their neighborhoods, where is there for them to go? Gazans have no freedom of movement and cannot take refuge outside Gaza. They are effectively trapped.” Shifa was one of the over 10 medical facilities Israel bombed in its 50-day offensive.
  • ...5 more annotations...
  • Gilbert drew attention to the fact that the overflowing hospital did not have enough supplies to treat all of its patients, and censured the international community for doing nothing to assist them. Israel would not let in foreign doctors, and yet Palestinians were “dying waiting for surgery.” “This is a complete disaster,” he remarked, calling it “the worst man-made disaster” he could think of. “There are injuries you just don’t want to see in this world.” Operation Protective Edge In 2008 and 2009, Gilbert treated Palestinians who had been grievously wounded by Israel’s use of experimental and illegal chemical weapons, including white phosphorous, dense inert metal explosives (DIME) munitions, and flechette shells. In July 2014, in the midst of Israel’s most recent attack on Gaza, Gilbert spoke with Electronic Intifada, revealing that he saw indications of renewed use of DIME weapons and flechettes. While volunteering in Shifa hospital, Gaza’s principal medical facility, Gilbert penned an open letter, lamenting the unspeakable horrors the Israeli military was instigating.
  • Before Operation Protective Edge commenced in early July 2014, Gilbert toured medical and health facilities and individual homes in Gaza, researching for a United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) report on the dire state of the strip’s health sector. He wrote of “overstretched” health facilities, widespread physical and psychological trauma, “a deep financial crisis,” a lack of needed medical supplies, and a “severe energy crisis.” He also noted the “devastating results of the blockade imposed by the Government of Israel,” with rampant poverty, a 38.5% unemployment rate, food insecurity in at least 57% of households, and inadequate access to clean water. All of these already extreme ills were only exacerbated by the July-August Israeli assault on Gaza, an onslaught that left roughly 2,200 Palestinians dead, including over 1,500 civilians, more than 500 of whom were children. Gilbert is not the only one Israel has recently prevented from entering Gaza. In August, just after the end of its military assault, Israel refused to allow Amnesty International and Human Rights Watch, the world’s leading human rights organizations, from entering the strip, impeding them from conducting war crimes investigations. The organizations had been requesting access for over a month, before Israel had even begun its ground invasion of Gaza, yet were continuously prevented from doing so, Israeli journalist Amira Hass reported in Haaretz, “using various bureaucratic excuses.”
  • Other aid workers and medical professionals have faced even worse consequences for volunteering to help Palestinians. In August, Israeli occupation forces killed a social worker. In the same month, as the Israeli military engaged in a campaign to target and openly murder Palestinian civilians who spoke Hebrew, Israeli forces assassinated volunteers working with the Palestine Red Crescent, a non-profit humanitarian organization, part of the International Red Cross and Red Crescent Movement. A common myth suggests that Israel ended its occupation of Gaza with its 2005 disengagement. The state’s ability to ban, and even kill, internationally recognized human rights organizations and doctors—not to mention food,construction equipment, and medical supplies—from entering Palestinian territory, however, demonstrates that Gaza is by no means autonomous. Israel’s siege of the strip is clearly a continuation of its 47-year-long illegal military occupation. As legal scholar Noura Erakat explains
  • Despite removing 8,000 settlers and the military infrastructure that protected their illegal presence, Israel maintained effective control of the Gaza Strip and thus remains the occupying power as defined by Article 47 of the Hague Regulations. To date, Israel maintains control of the territory’s air space, territorial waters, electromagnetic sphere, population registry and the movement of all goods and people. … Palestinians have yet to experience a day of self-governance. Israel immediately imposed a siege upon the Gaza Strip when Hamas won parliamentary elections in January 2006 and tightened it severely when Hamas routed Fatah in June 2007. The siege has created a “humanitarian catastrophe” in the Gaza Strip. Inhabitants will not be able to access clean water, electricity or tend to even the most urgent medical needs. The World Health Organization explains that the Gaza Strip will be unlivable by 2020. Not only did Israel not end its occupation, it has created a situation in which Palestinians cannot survive in the long-term.
  • In a late October discussion with the Daily Targum, Gilbert encouraged Americans to do what they can to speak out against Israel’s illegal occupation and blockade of the Palestinian territories, and to pressure their government to stop its indefatigable support for Israeli crimes. At present, the US provides Israel with over 3.1$ billion of military aid per year. In the past 52 years, over $100 billion US tax dollars have been given to the country in military aid alone. “You are the change-makers,” Gilbert told American readers. “The key to the change when it comes to the occupation of Palestine lies in the United States.” “Solidarity, not pity,” he said, is the solution.
Gary Edwards

Just 62 people control more wealth than half the world's population: study - CSMonitor.com - 1 views

  • Oxfam argues that there are several reasons for why the disparity between rich and poor has become so vast, including what the report terms “the global spider’s web of tax havens and the industry of tax avoidance, which has blossomed over recent decades.”Oxfam estimates that nearly $7.6 trillion, or more than twice the combined GDP of the United Kingdom and Germany, is currently being held offshore.
  • The Oxfam study also suggests that the global economy’s push on the importance of capital over labor is another reason for widening inequality. This not only concentrates national incomes in the hands of those few that control it, Oxfam says, but has implications for private companies as well. It increases pay for executives while preventing many workers in the very lowest-paying jobs at the bottom from earning higher wages.
  •  
    "A recent study conducted by Oxfam International indicates that just 62 people, 53 of them men, now control over half the world's wealth. The study, 'An Economy for the 1 Percent,' was released ahead of the World Economic Forum (WEF) in Davos, Switzerland. The study from the anti-poverty NGO calculated that 62 people held the same amount of wealth as the world's 3.6 billion poorest citizens in 2015.  That's a huge drop from the estimated 388 people who controlled that amount of wealth in 2010, and the concentrated amount of wealth that those 62 people possess has increased by 44 percent over that same five-year period, to $1.76 trillion dollars. It is true that global poverty has declined substantially since 1990, according to Oxfam. However, the study found that at the same time that global wealth rose dramatically among the world's richest 1 percent, the relative wealth of those living in extreme poverty has declined dramatically since 2010, by approximately $1 trillion."
  •  
    The divide between the haves and the have-nots has been deepening for decades and is well known. This year, the topic has become part of presidential election politics thanks to Bernie Sanders. But while the situation has no public defenders, we have yet to see a single piece of legislation submitted to remedy the situation. That leaves the situation as a talking point rather than the focus of remedial action, which leads to the conclusion that those who talk about it don't care enough about it to do anything to reverse the situation. Example, since the financial crash of 2007 we have no bill to reintroduce Glass\Seagall, no bill to break up the too-big-to-fail banks (which are no bigger than before), no bill to back the U.S. out of the trade agreements that have shipped millions of American jobs overseas, no bill to increase taxes for the wealthy, etc. Instead, we see a majority of members of Congreess voting to maintain the status quo, which is that the rich get richer and the poor get poorer. The cure? Step 1 is adoption of the We the People Amendment to get corporations and money out of the election process. https://movetoamend.org/wethepeopleamendment
Paul Merrell

U.S. First Shields Its Torturers and War Criminals From Prosecution, Now Officially Hon... - 0 views

  • As vice president, Dick Cheney was a prime architect of the worldwide torture regime implemented by the U.S. government (which extended far beyond waterboarding), as well as the invasion and destruction of Iraq, which caused the deaths of at least 500,000 people and more likely over a million. As such, he is one of the planet’s most notorious war criminals. President Obama made the decision in early 2009 to block the Justice Department from criminally investigating and prosecuting Cheney and his fellow torturers, as well as to protect them from foreign investigations and even civil liability sought by torture victims. Obama did that notwithstanding a campaign decree that even top Bush officials are subject to the rule of law and, more importantly, notwithstanding a treaty signed in 1984 by Ronald Reagan requiring that all signatory states criminally prosecute their own torturers. Obama’s immunizing Bush-era torturers converted torture from a global taboo and decades-old crime into a reasonable, debatable policy question, which is why so many GOP candidates are now openly suggesting its use.
  • But now, the Obama administration has moved from legally protecting Bush-era war criminals to honoring and gushing over them in public. Yesterday, the House of Representatives unveiled a marble bust of former Vice President Cheney, which — until a person of conscience vandalizes or destroys it — will reside in Emancipation Hall of the U.S. Capitol. At the unveiling ceremony, Cheney was, in the playful words of NPR, “lightly roasted” — as though he’s some sort of grumpy though beloved avuncular stand-up comic. Along with George W. Bush, one of the speakers in attendance was Vice President Joe Biden, who spoke movingly of Cheney’s kind and generous soul
  • Yesterday, the U.S. government unambiguously signaled to the world that not only does it regard itself as entirely exempt from the laws of wars, the principal Nuremberg prohibition against aggressive invasions, and global prohibitions on torture (something that has been self-evident for many years), but believes that the official perpetrators should be honored and memorialized provided they engage in these crimes on behalf of the U.S. government. That’s a message that most of the U.S. media and thus large parts of the American population will not hear, but much of the world will hear it quite loudly and clearly. How could they not?
Paul Merrell

Still Secret: Second Circuit Keeps More Drone Memos From the Public | Just Security - 0 views

  • Secret law has been anathema to our democracy since its Founding, but a federal appeals court just gave us more of it.
  • We might forgive the citizenry’s confusion, though, in attempting to square those principles with the decision by the Second Circuit Court of Appeals, published yesterday, holding that the government may continue to keep secret nine legal memoranda by the Justice Department’s Office of Legal Counsel analyzing the legality of targeted killings carried out by the US government. It was just more than a year ago that the same panel of the same court ordered the government to disclose key portions of a July 2010 OLC memorandum that authorized the targeted killing of an American citizen in Yemen. At the time, the court’s opinion seemed to promise at least a partial solution to a problem straight (as the district court in the same case put it) from Alice in Wonderland: that [a] thicket of laws and precedents … effectively allow the Executive Branch of our Government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws, while keeping the reasons for its conclusion a secret.
  • Yesterday’s opinion retreats from that promise by keeping much of the government’s law of the targeted killing program secret. (In this and two other cases, the ACLU continues to seek more than 100 other legal memoranda authored by various agencies concerning targeted killing.) It does so in two ways that warrant attention. First, the court suggests that OLC merely gives advice to executive branch agencies, and that OLC’s legal memoranda do not establish the “working law” of the government because agencies might not “adopt” the memoranda’s legal analysis as their own. This argument is legally flawed and, moreover, it flies in the face of the public evidence concerning how the executive branch treats opinions issued by OLC. In an OLC memorandum published, ironically or not, the same day (July 16, 2010) and over the same signature (David Barron’s) as the targeted killing memorandum released at the Second Circuit’s behest last year, the OLC explains that its “central function” is to provide “controlling legal advice to Executive Branch officials.” And not even two weeks ago, the acting head of the OLC told the public that even informally drafted legal advice emanating from his office is “binding by custom and practice in the executive branch,” that “[i]t’s the official view of the office, and that “[p]eople are supposed to and do follow it.”
  • ...2 more annotations...
  • But that’s not what the government told the Second Circuit, and it’s not what the Second Circuit has now suggested is the law. Second, the Second Circuit’s new opinion endorses the continued official secrecy over any discussion of a document that has supplied a purported legal basis for the targeted killing program since almost immediately after the September 11 attacks. The document — a September 17, 2001 “Memorandum of Notification” — is not much of a secret. The government publicly identified it in litigation with the ACLU eight years ago; the Senate Intelligence Committee cited it numerous times in its recent torture report; and the press frequently makes reference to it. Not only that, but the Central Intelligence Agency’s former top lawyer, John Rizzo, freely discussed it in his recent memoir. According to Rizzo, the September 17 MON is “the most comprehensive, most ambitious, most aggressive, and most risky” legal authorization of the last decade and a half — which is saying something. Rizzo explains that the MON authorizes targeted killings of suspected terrorists by the CIA, and in his new book, Power Wars, Charlie Savage reports that the MON is the original source of the controversial (and legally novel) “continuing and imminent threat” standard the government uses to govern the lethal targeting of individuals outside of recognized battlefields. The MON is also likely to have authorized an end run around the assassination “ban” in Executive Order 12333 — a legal maneuver that is discussed in, but almost entirely redacted from, an earlier OLC analysis of targeted killing.
  • In yesterday’s opinion, the Second Circuit upheld the government’s withholding of a 2002 OLC memorandum that “concerns Executive Order 12333,” which almost certainly analyzes the effect of the September 17 MON, as well as of five other memoranda that “discuss another document that remains entitled to protection.” If indeed that “document” is the MON, it would seem to be yet another case of what the DC Circuit pointedly criticized, in a 2013 opinion, as the granting of judicial “imprimatur to a fiction of deniability that no reasonable person would regard as plausible.” In that case, the DC Circuit went on to quote Justice Frankfurter: “‘There comes a point where … Court[s] should not be ignorant as judges of what [they] know as men’ and women.” Last year, the Second Circuit took that admonishment to heart when it published the July 2010 OLC memorandum. Unfortunately, yesterday, rather than once again opening the country’s eyes to the law our government is applying behind closed doors, the Second Circuit closed its own.
Paul Merrell

MoD pays out millions to Iraqi torture victims | Law | The Guardian - 0 views

  • The Ministry of Defence has paid out £14m in compensation and costs to hundreds of Iraqis who complained that they were illegally detained and tortured by British forces during the five-year occupation of the south-east of the country.Hundreds more claims are in the pipeline as Iraqis become aware that they are able to bring proceedings against the UK authorities in the London courts.
  • Lawyers representing former prisoners of the British military say that more than 700 further individuals are likely to make claims next year.Most of those compensated were male civilians who said they had been beaten, deprived of sleep and threatened before being interrogated by British servicemen and women who had detained them on suspicion of involvement in the violent insurgency against the occupation. Others said that they suffered sexual humiliation and were forced into stress positions for prolonged periods.
  • Many of the complaints arise out of the actions of a shadowy military intelligence unit called the Joint Forward Interrogation Team (Jfit) which operated an interrogation centre throughout the five-year occupation. Officials of the International Committee of the Red Cross complained about the mistreatment of detainees at Jfit not long after it was first established.Despite this, the interrogators shot hundreds of video films in which they captured themselves threatening and abusing men who can be seen to be bruised, disoriented, complaining of starvation and sleep deprivation and, in some cases, too exhausted to stand unaided.
  • ...2 more annotations...
  • During proceedings brought before the high court in London, lawyers representing the former Jfit prisoners suggested the interrogation centre could be regarded as "Britain's Abu Ghraib".
  • Next month, the high court will hear a judicial review of the MoD's refusal to hold a public inquiry into the abuses. Human rights groups and lawyers for the former prisoners say the UK government is obliged to hold an inquiry to meet its obligations under the European convention on human rights – and particularly under article three of the convention, which protects individuals from torture.After a hearing, the high court highlighted matters supporting the allegations of systemic abuse. These included:• The same techniques being used at the same places for the same purpose: to assist interrogation.• The facilities being under the command of an officer.• Military doctors examining each prisoner at various stages in their detention.• Investigations by the Royal Military police that were concluded without anyone being held to account.
  •  
    The Brits at least have the decency to attempt to make amends for its soldiers who tortured prisoners. Not so in the U.S. *Every* "war on terror" detainee who has filed a case for damages in the U.S. has been thrown out of court at the government's request, usually on grounds of the State Secrets privilege. It is a sad situation that our courts allow government secrecy about unlawful conduct to trump individual rights to redress for injury. 
Paul Merrell

Reassured by NSA's Internal Procedures? Don't Be. They Still Don't Tell the Whole Story... - 0 views

  • Yesterday, the Guardian released two previously-classified documents describing the internal "minimization" and "targeting" procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA's vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren't reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant. Which would be bad enough, if it were the end of the story. But it's not.
  • Unless the government substantially changed the procedures between August 2010 and October 2011, these are the very procedures that the FISC eventually found resulted in illegal and unconstitutional surveillance. In October 2011, the FISC issued an 86-page opinion finding that collection carried out under the NSA's classified minimization procedures was unconstitutional. The opinion remains secret, but it is very likely that yesterday's leaked NSA documents show the very minimization procedures the Director of National Intelligence admitted the FISC had found resulted in surveillance that was “unreasonable under the Fourth Amendment" and "circumvented the spirit of the law." And for good reason: the procedures are unconstitutional. They allow for the government to obtain and keep huge amounts of information it could never Constitutionally get without a warrant based on probable cause. As we explained, the procedures are designed such that the NSA will routinely fail to exclude or remove United States persons' communications, and the removal of those communications are wholly entrusted to the "reasonable discretion" of an analyst.  
  • Yesterday, the Guardian released two previously-classified documents describing the internal "minimization" and "targeting" procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA's vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren't reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant. Which would be bad enough, if it were the end of the story. But it's not. The targeting and minimization documents released yesterday are dated a few months after the first publicly known scandal over the new FAA procedures: In April 2009, the New York Times reported that Section 702 surveillance had “intercepted the private e-mail messages and phone calls of Americans . . . on a scale that went beyond the broad legal limits established by Congress." In June 2009, the Times reported that members of Congress were saying NSA's "recent intercepts of the private telephone calls and e-mail messages of Americans are broader than previously acknowledged." Rep. Rush Holt described the problems as "so flagrant that they can't be accidental."
  • ...2 more annotations...
  • Presumably, following these "flagrant" abuses (and likely in response to the Congressional criticism of the original procedures), the government refined the procedures. The documents released yesterday are the "improved" targeting and minimization procedures, which appear to have been reused the following year, in 2010, in the FISC's annual certification. But these amended procedures still didn't stop illegal spying under Section 702. Unless the government substantially changed the procedures between August 2010 and October 2011, these are the mimization rules that the FISC eventually found to result in illegal and unconstitutional surveillance. In October 2011, the FISC issued an 86-page opinion finding that collection carried out under the NSA's minimization procedures was unconstitutional. The opinion remains secret, but it is likely that yesterday's leaked NSA documents show the very procedures the Director of National Intelligence admitted had been found to result in surveillance that was “unreasonable under the Fourth Amendment" and "circumvented the spirit of the law." And for good reason: the procedures are unconstitutional.
  • EFF has been litigating to uncover this critical FISC opinion through the Freedom of Information Act and to uncover the "secret law" the government has been hiding from the American public. And EFF isn't alone in fighting for the release of these documents. A bipartisan coalition of Senators just announced legislation that would require the Attorney General to declassify significant FISC opinions, a move they say would help put an end to precisely this kind of "secret law."
Paul Merrell

US Corporations Used Personal Armies To Uproot, Terrorize Colombia - 0 views

  • Some of the numerous foreign corporations accused of serious human rights abuses in Colombia include fruit companies Dole, Del Monte, and Chiquita, agribusiness giant Cargill, and other representatives of the fossil fuel industry like Texaco (formerly Texas Petroleum Company) and Exxon Mobil. Heeding corporate orders, paramilitary groups murdered union and labor rights activists, tortured and terrorized countless indigenous and Afro-Colombian people, and devastated entire villages of subsistence farmers to make way for mining, fossil fuel extraction, or plantations that would bring massive profits to foreign corporations. The Colombian military — and, in at least one high-profile massacre, the U.S. military — sometimes lent a hand in these human rights crimes. “Every human rights person I work with in Colombia believes the peace process is a necessary precondition” to ending corporate exploitation of Colombia, Dan Kovalik, a human rights and labor rights lawyer who teaches at the University of Pittsburgh School of Law, told MintPress News.
  • In court, “Chiquita admitted to paying paramilitaries and giving them 3,000 Kalashnikov rifles between 1997 and 2004,” Kovalik said. Chiquita allied with the United Auto-Defense Forces of Colombia (AUC), one of the country’s most violent paramilitary groups, Steven Cohen noted in a report for ThinkProgress in 2014. The AUC, a group once designated as a terrorist group by the U.S. government, is responsible for thousands of deaths in Colombia. It turns out that Chiquita had been playing both sides of the conflict. Cohen reported: “By its own account, Chiquita made at least 100 payments — $1.7 million in total — to the AUC between 1997 and 2004. In the decade prior to that, the company had maintained a similar arrangement with the Revolutionary Armed Forces of Colombia (FARC), the nominally leftist rebel group chased out of the region by the combined (and coordinated) efforts of the AUC and Colombian military.”
  • “There’s been some recent reports that [Chiquita’s funding of paramilitaries] may have continued until very recently through a subsidiary,” Kovalik added. While these allegations remain unproven in court, they do suggest a staggering number of victims. Multiple lawsuits were consolidated in 2011, accusing Chiquita of being involved in the killings of as many as 4,000 Colombian nationals. While the evidence is clearest in the case of Chiquita, other international banana growers are suspect as well. “According to Salvatore Mancuso, a high-ranking paramilitarian in U.S. prison, Dole and Del Monte also worked with the paramilitaries,” Kovalik said. “All the banana companies have.” Mancuso is currently serving a 15-year sentence in a federal prison and has been spoken openly about the influence that corporations like Chiquita hold in Colombia.
  • ...6 more annotations...
  • The influence of banana growers in Colombia pre-dates the ongoing civil war. In 1928, the Colombian government brutally shut down a strike by United Fruit Company banana pickers under threat from the U.S. government. Some estimates put the death toll from the military action as high as 2,000, including workers, women and children. United Fruit was once one of the most powerful corporations in the world, manipulating the governments and economies of multiple Latin American countries. Chiquita was a trademark of United Fruit until 1990, when the company renamed itself Chiquita Brands International in an effort to rehabilitate its image. (Chiquita was purchased by two Brazilian companies in 2015, and is now headquartered in Switzerland.)
  • “It should be noted under the peace agreement, at least the one that went down in October, Coca-Cola was one of the companies named [that will be] subjected to further investigation for paramilitary ties,” Kovalik said. Coca-Cola, or at least its Colombian bottlers, have also been linked to paramilitary groups and human rights abuses. The bottlers and the company’s Atlanta headquarters have faced multiple lawsuits over attacks on union organizers. A 2010 documentary, “The Coca-Cola Case,” focused on the soda giant’s role in turning Colombia into the “trade union murder capital of the world,” June Chua wrote in a review for Rabble.ca that year.
  • Colombia is rich with resources that foreign corporations are eager to exploit, particularly in the mining, agriculture, and biofuels industries. “Mining is probably the biggest threat now to indigenous people, Afro-Colombians and peasants, and will continue to be as the peace agreement goes forward,” Kovalik added. Justin Podur, an author and global political analyst, told MintPress that Colombian human rights activists frequently say that “displacement in Colombia is not a side effect of the war, it’s really the point of the war.” Whether by design or coincidence, decades of unrest created fertile ground for profit.
  • In one of the most shocking examples of fossil fuel companies supporting the death and displacement of Colombian people, Kovalik highlighted the “the Santo Domingo massacre, in which Occidental Petroleum were part of an operation to bomb the Santo Domingo community.”
  • In a 2005 article for Z Net on the massacre, Kovalik and Luis Galvis explained: “On December 13, 1998, in what has become one of the most notorious war crimes in Colombia, the hamlet of Santo Domingo was attacked by a U.S. cluster bomb from a Colombian Air Force helicopter. Seventeen civilians, including 7 children, were killed as a result of the bombing.” In 2002, the Los Angeles Times revealed that the bombing had actually been carried out at the behest of, and with the assistance of, the Houston-based oil company which had its headquarters in Los Angeles at the time. Times staff writer T. Christian Miller wrote: “Los Angeles-based Occidental Petroleum, which runs an oil complex 30 miles north of Santo Domingo, provided crucial assistance to the operation. It supplied, directly or through contractors, troop transportation, planning facilities and fuel to Colombian military aircraft, including the helicopter crew accused of dropping the bomb.”
  • And, earlier this year, Gilberto Torres, a Colombian union activist, sued BP in London. He alleges that in 2002, he was kidnapped and tortured for 42 days by paramilitaries who were following orders from the oil giant.
Gary Edwards

Arnold Ahlert: The Real American Divide - The Patriot Post - 0 views

  • Nancy Pelosi and Hillary Clinton provided great examples of the Ruling Class' arrogant mindset. Pelosi believes, as she stated last week, that white, non-college-educated men who vote Republican have “voted against their own economic interests because of guns, because of gays, and because of God — the three G’s, God being the woman’s right to choose.” Clinton was worse. Regarding abortion on demand, she insisted last year that “deep-seated cultural codes, religious beliefs and structural biases have to be changed.” In other words, one embraces the progressive elitist viewpoint, or one is a religiously inspired bigot with a passé worldview that must be demolished. Thus it is no surprise these elitists conflate anything that dissents from their globalist agenda as a “world of wall-builders,” who have “already done great damage,” states The Economist. That damage includes the Brexit, the rise of nationalist (read: right-wing) parties, and “more electoral victories for closed-world types who pose the greatest threat since Communism.” In other words, elitists disdain national sovereignty and democratically determined destiny, logical responses to skyrocketing levels of elitist-enabled terrorism and uncontrolled immigration, and deeply felt concerns by non-elitists about a global economy that has devastated millions left behind in its wake.
  • The Ruling Class “solutions” for Country Class problems? “Let goods and investment flow freely, but strengthen the social safety-net to offer support and new opportunities for those whose jobs are destroyed,” The Economist states. “To manage immigration flows better, invest in public infrastructure, ensure that immigrants work and allow for rules that limit surges of people.” Codevilla explains what this really means, noting that “our Ruling Class' first priority in any and all matters, its solution to any and all problems, is to increase the power of the government — meaning those who run it, meaning themselves.” To achieve that end, new laws are longer than ever, “because length is needed to specify how people will be treated unequally.” Thus, these laws become “primarily grants of discretion,” because “all anybody has to know about them is whom they empower.” Codevilla adds, “This defines ‘crony capitalism.’”
  • If that sounds familiar, maybe it’s because WikiLeak emails reveal the DNC granted itself the sole discretion to empower Hillary Clinton’s presidential nomination, right from the beginning. Thus, when Hillary spoke of “bringing people together” during her speech at the convention, it was really about doing so on her and her fellow insiders' terms. And when she promised to get money out of politics, it can be assumed the billions of dollars that have flowed into the Clinton Foundation — dollars that conspicuously align themselves with a number of dubious initiatives — will remain exempt, even as another sham investigation of Clinton behavior conducted by an equally corrupted IRS lends an imprimatur of genuine concern to the spectacle. “If Americans, or at least a majority of them, have not completely lost their own self-regard as a free people, then the November election should turn out to be a referendum on the ‘ruling class,’ and a massive repudiation of Hillary Clinton’s sense of entitlement to be the first woman elected President of the United States,” writes American Thinker’s Salim Mansur. Perhaps. But traditional thinking dies hard. And a corrupt mainstream media — epitomized by CNN anchor Wolf Blitzer and Chief Political Analyst Gloria Borger drinking wine and celebrating with Democrat delegates at the convention’s conclusion — isn’t about to jeopardize their own Ruling Class status to provide the Country Class with any potentially unifying political insight. Which brings us to Donald Trump. In exclusive communication with The Patriot Post, Codevilla maintained there were no circumstances under which he could support Hillary or any other Democrat, but his view of Trump “is more unfavorable than ever.” He does, however, grant that Trump “is the lesser of two evils.” He sees both candidates as “identical in their disregard for the U.S. Constitution and in the establishment of a post-republican regime — an empire of the will, by of and for favored sectors of the ruling class.”
  • ...3 more annotations...
  • No doubt Codevilla’s take resonates with millions of Americans appalled by a broken, Ruling Class-dominated political system that produced both candidates. Yet realistically, we are faced with a binary choice, made by either commission or omission. And while Codevilla believes “there is no vehicle for opposition” as yet to a Ruling Class “represented by the establishment of both parties,” our own Mark Alexander warns that “the outcome of the November election will not only determine our president for at least the next four years, but also the composition of the Supreme Court for at least the next quarter-century.” That quarter century could be one in which a constitutionally contemptuous Supreme Court majority appointed by Hillary Clinton makes representative government obsolete, and eliminates any chance, short of armed revolution, for the Country Class to take America back from the Ruling Class. A nation where, as Ayn Rand put it, “The government is free to do anything it pleases, while the citizens may act only by permission.” A Trump presidency may be nothing more than a distasteful, bite-the-bullet
  • impediment to Ruling Class hegemony. But it is better than no impediment at all.
  • “While most Americans pray to the God who created us in His own image, our Ruling Class prays to themselves as saviors of the planet and as shapers of mankind in their own image.” —from The Ruling Class: How They Corrupted America and What We Can Do About It by Angelo Codevilla, 2010. While many still frame the 2016 election in terms of Democrats vs. Republicans, those divisions are losing their meaning. This election could be the first one in which Americans will either choose to continue abiding a globalist Ruling Class and their government-dominant, one-world agenda, or decide that national sovereignty, the Constitution and American exceptionalism and individualism are worth preserving. To be clear, nationalism does not equal protectionism, nativism or Islamophobia, nor is it solely embraced by know-nothing rubes unworthy of serious consideration — despite the ongoing efforts of the Ruling Class to paint it that way. Codevilla calls people who oppose the Ruling Class the Country Class, and he describes it as a diverse, often inharmonious group that “shares above all the desire to be rid of rulers it regards as inept and haughty.”
  •  
    ""While most Americans pray to the God who created us in His own image, our Ruling Class prays to themselves as saviors of the planet and as shapers of mankind in their own image." -from The Ruling Class: How They Corrupted America and What We Can Do About It by Angelo Codevilla, 2010. While many still frame the 2016 election in terms of Democrats vs. Republicans, those divisions are losing their meaning. This election could be the first one in which Americans will either choose to continue abiding a globalist Ruling Class and their government-dominant, one-world agenda, or decide that national sovereignty, the Constitution and American exceptionalism and individualism are worth preserving. To be clear, nationalism does not equal protectionism, nativism or Islamophobia, nor is it solely embraced by know-nothing rubes unworthy of serious consideration - despite the ongoing efforts of the Ruling Class to paint it that way. Codevilla calls people who oppose the Ruling Class the Country Class, and he describes it as a diverse, often inharmonious group that "shares above all the desire to be rid of rulers it regards as inept and haughty." Ruling Class haughtiness, argues Codevilla, derives from "an educational system that exposed them to the same ideas and gave them remarkably uniform guidance," and engenders "a social canon of judgments about good and evil, complete with secular sacred history, sins … and saints," all conveyed in an "in" language that serves as their "badge of identity." Irrespective of their professions, the Ruling Class is also united by the reality that "their road up included government channels and government money. … Hence, whether formally in government, out of it, or halfway in, America's Ruling Class speaks the language and has the tastes, habits, and tools of bureaucrats." Just as critically, this "fraternity" can only be joined by one who Codevilla says "shares the manners, the tastes, and the i
Paul Merrell

Federal Reserve Audit Bill Overwhelmingly Passes The House - 0 views

  • WASHINGTON -- In a rare moment of bipartisanship, the House overwhelmingly passed a bill by Rep. Ron Paul (R-Texas) to audit the Federal Reserve. The bill, which has 270 co-sponsors, passed 327 to 98. All but one Republican -- Rep. Bob Turner of New York -- voted for it, along with 89 Democrats. Paul teamed up with former Rep. Alan Grayson (D-Fla.) in 2010 to pass similar legislation that became part of the final Wall Street reform bill. But Paul has said new audit legislation is needed because the 2010 bill didn't go far enough. Specifically, he states on his website that the audit called for in the 2010 bill only focused on emergency credit programs and procedural issues, rather than on the substantive details of the lending transactions. The 2012 bill doesn't limit the focus of the audit.
  • "The Fed creates trillions of dollars out of nothing and gives it to banks. Congress is in the dark. The Fed sets the stage for the subprime meltdown. Congress is in the dark. The Fed takes a dive on LIBOR. Congress is in the dark. The Fed doesn’t tell regulators what is going on. Congress is in the dark," Kucinich shouted on the House floor, just before the vote. "It is time for us to bring the Fed into the sunshine of accountability," he said.
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
‹ Previous 21 - 40 of 450 Next › Last »
Showing 20 items per page