Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged 2013

Rss Feed Group items tagged

3More

The DEA isn't just tracking license plates - it's taking pictures of vehicles' passenge... - 0 views

  • The Drug Enforcement Administration is collecting information about more than just license plates with the tracking system revealed by the American Civil Liberties Union. Documents released by the ACLU this morning show that the DEA is also using the license plate readers (LPRs) on which this system relies to capture photographs of a vehicles’ passengers. The images can then be run through facial recognition software. This is meant to give the DEA more context about the people whose movements it’s tracking with this program, which gathers data from more than 100 LPRs managed by an unknown number of police departments around the country to aid in their investigations. The program was originally meant to assist with civil asset forfeiture cases, but it has since expanded to assist departments approved by the El Paso Intelligence Center with investigations into murders, rapes, and other crimes, the Wall Street Journal reports.
  • Previous reports indicated that the DEA was collecting license plate information about “millions” of Americans. That figure might be low if it didn’t account for the number of plates collected versus the number of people in a vehicle when these images are taken. Either way, this program represents a clear violation of privacy for many Americans, most of whom didn’t know the DEA could collect this information. As I wrote before: The result is a national surveillance program with an unknown number of contributors offering up location data about millions of Americans; all to a database used by an untold number of police departments without any public oversight regarding their searches.
  • That’s a problem. Backchannel reported in December that police have used their access to license plate readers to stalk former colleagues, and IB Times revealed earlier this month that Gov. Chris Christie (R-NJ) used location data to smear a political rival. Perhaps the DEA will support the program by claiming that learning who is in a vehicle isn’t much different from learning where the vehicle was going — it could all be considered metadata, and the government considers that information to be fair game.
4More

New Trade Data Come at the Worst Possible Time for Obama | The Nation - 0 views

  • President Obama’s push for a massive new trade deal with Asia is predicated on the idea it will help everyday Americans: that it will “level the playing field for the middle class,” in Obama’s words. But as the debate over the Trans-Pacific Partnership enters its endgame, newly released government data about the US trade deficit shows recent trade deals have done the opposite of what was promised—and have inflicted added damage on American jobs. The Census Bureau’s annual trade data for 2014, released Thursday morning, shows the US trade deficit in 2014 jumped 6 percent to $505 billion in 2013. This increase received a late boost from the December 2014 numbers, which showed at 17.1 percent increase in the trade deficit—resulting in the biggest trade imbalance since December 2012. A country’s trade balance is a crucial economic indicator; a nation that is exporting far more goods than it is importing is generally in good economic health. Conversely, a country that is increasingly importing more than it exports—as is the case with the United States—is watching valuable dollars and jobs flow overseas.
  • The data shows a small, 1 percent growth in US exports for 2014, though the domestic oil and gas boom accounts for much of that. US manufacturing exports fell by more than $5 billion in 2014, and the US goods trade deficit rose to $736.8 billion. (More on that number in a minute; it doesn’t tell the full story.) There’s a simple explanation for the widening trade deficit: the US dollar is strong, and there’s weak growth overseas, which would naturally depress exports. But congressional critics of the TPP seized on a broader point on Thursday morning—robust promises about the benefits of past trade deals have turned out to be empty. “We signed those trade deals, and the result has been the opposite,” said Representative Rosa DeLauro on a Thursday morning conference call with reporters. “The administration continues to pursue the same failed policies of the past several years.”
  • Of particular note is the increasing trade deficit with Korea, which increased a whopping 20 percent in 2014, to $25.1 billion. Obama signed a free-trade agreement with Korea during his first term, calling the deal “a major win for American workers and businesses,” and it took effect in early 2012. But the US goods trade deficit with Korea was 81 percent higher in 2014 than in 2011. That translates to a loss of 74,000 jobs, by the administration’s own metrics for measuring job gains from trade. “[The new information] basically confirms a lot of our suspicions, and our positions and votes over the years about how these trade agreements have really been a bad deal for the American worker,” said Representative Tim Ryan.
  • ...1 more annotation...
  • DeLauro also offered some broadsides about how the administration was spinning the Census report.
4More

Egypt's foreign policy accommodates world's multipolarity: ECFA discussion | Cairo Post - 0 views

  • In a step to follow the world’s political  evolution, Egypt is working on changing its foreign policy to accommodate the “multipolarity” system, former Minister of Foreign Affairs Mohamed Kamel Amr said in a conference held by the Egyptian Council for Foreign Affairs (ECFA), Tuesday. The two-day international conference dubbed “Egypt and the World… a New Era” was held in order to “correct misconceptions” of Egypt’s political development after the ouster of President Mohamed Morsi. The members of ECFA, which was formed 15 years ago, are predominantly former diplomats. “To say that Egypt is turning its back to a certain power is emotional for it is rebalancing its relations,” Amr said at the “Egypt and the World’s Major Powers” session of the conference. The U.S. delivered 10 Apache Helicopters to Egypt in November, but other than that, strategic cooperation has pretty much stopped in the past two years, said Mostafa Elwi, a Cairo University professor of political science. China and Russia supported the change after June 30, 2013, when millions marched to topple Morsi, and exchanged visits between Egyptian officials and their counterparts from these two countries have been “very fruitful,” unlike U.S. Secretary of State John Kerry’s visits to Egypt, Elwi added. Amr explained that Egypt’s foreign policy has been successful in moving forward in coalitions, rather than its own, in the face of major powers, such as the Non-Aligned Movement, the Arab League and as part of coordination with regional forces.
  • “Ridding Egypt of the U.S. dominancy is not an easy task because it is the only country in the world that has the four factors of being a dominant power: military, economy, culture and science,” Elwy said. However, he added that as bilateral relations with China and Russia have very wide and open horizons, renewed strategic relations with them should not stop at purchasing arms, but should expand to cooperation in manufacturing weapons in Egypt.
  • For his part, Councilor of the Chinese People’s Institute of Foreign Affairs Wu Sike emphasized that China respects the Egyptian people’s will, and that foreign interference in Egypt’s internal affairs is “unacceptable.” Economically, Elwy and Sike underlined that their countries realize the potential of their anticipate cooperation, especially in the New Suez Canal Project and the proposed project of the New Silk Road, planned to pass through Egypt and expected to change the course of world trade. “After the revolution of June 30, relations with Egypt, including strategic relations, will deepen. Our government encourages Chinese companies to invest in Egypt’s Suez Canal and the route of the Silk Road in its territory,” said Sike, who was also a former Egyptian Ambassador, calling on Egypt to focus on development efforts to “compensate for the time it lost.”
  •  
    One I had missed in December, 2014. China is bankrolling an upgrade of the Suez Canal and Egypt has rejected U.S. hegemony. Egypt will buy Russian and Chinese weapons but wants to expand to collaborative manufacture of weapons in Egypt.  The U.S. is paying the price of having initiated a failed "color revolution" in Egypt that gave temporary control of Egyptian government to the non-secular Muslim Brotherhood, subsquently overthrown by the Egyptian military with enormous public support. 
4More

Reading the Runes in the Latest Report on Iran's Nuclear Program « LobeLog - 0 views

  • The latest report from the International Atomic Energy Agency on Iran’s nuclear program contains much that is worth emphasizing. Iran is continuing to account for all its declared nuclear material (and the agency appears to have no reason to suspect the existence of undeclared nuclear material). Iran is also continuing to comply fully with the commitments it made to the United States and others on November 24, 2013 and which it has renewed since. Much of the commentary on the report on Iran will inevitably highlight Iran’s continuing failure to resolve two concerns the IAEA raised in May 2014. I, however, am surprised, that the IAEA director general omits all mention of two Iranian attempts, since the last IAEA report in mid-November, to address those and some other allegations that the IAEA is investigating. On December 2, Reuters reported that in a statement to the IAEA Iran had rejected accusations that it was stonewalling IAEA investigations. Instead, Iran had affirmed that it had given the IAEA “pieces of evidence” indicating that documents adduced by the IAEA as reasons for concern were “full of mistakes and contain fake names with specific pronunciations which only point towards a certain IAEA member as their forger.” (The member Iran probably had in mind was Israel). Yet there is no mention whatsoever of this Iranian rebuttal in the latest report, still less any detailed IAEA rebuttal of the rebuttal. Instead, the director general resorts to an exceptionally bland (and in the circumstances misleading) phrase: “Iran has not provided any explanations that enable the Agency to clarify the two outstanding practical measures [concerns].”
  • In effect Iran is being asked to prove its innocence. But when it tries to do so, the evidence it submits is rejected out of hand because it calls into question the evidence that is being used to justify the suspicion of guilt. Is that consistent with due process? Also surprising is the omission of any mention of Iran’s offer of access to a suspected nuclear site at Marivan, reported by Reuters on December 11. A controversial annex to the IAEA’s November 2011 report referred to one member state having informed the agency that major high-explosives tests were conducted at Marivan in the first part of the last decade. Since the IAEA has not taken Iran up on the offer, it presumably believes that a visit to Marivan would serve no useful purpose. If that is the case, do they not owe it to Iran to withdraw the November 2011 charge relating to Marivan? If the agency isn’t arranging a site visit, it should explain to IAEA member states that it considers the information provided by “a member state” to have been unreliable or irrelevant.
  • raise these questions not to criticise the IAEA secretariat, which continues to do a first-class job in Iran, as professional and objective as ever. Rather, I want to offset the hue and cry that opponents of a nuclear deal will raise over the reference in the latest report to Iran’s failure to provide explanations. I’m suggesting that there is more to this than meets the eye.
  • ...1 more annotation...
  • Turning back to the positive, Iran is continuing to allow exceptional access to centrifuge assembly workshops, centrifuge rotor production workshops, and storage facilities. This access has enabled the IAEA to conclude that centrifuge rotor manufacturing and assembly are consistent with Iran’s replacement program for failed centrifuges. In other words, Iran is not manufacturing and diverting rotors to some clandestine enrichment facility. This is highly significant. Amid the endless furor over the number of centrifuges that Iran should retain under a comprehensive agreement, the public could be forgiven for failing to appreciate that, theoretically, Iran is far more likely to “sneak out”—using a clandestine enrichment facility—than to “break out” under the eyes of IAEA inspectors, using the centrifuges it wants to retain. I inserted “theoretically” to emphasize that at this point there is no evidence that Iran intends either to break out or to sneak out. And as long as the IAEA retains access to Iran’s rotor manufacturing, assembly, and storage facilities—which it will lose if the opponents of a deal have their way—we can all feel confident of a continuing absence of intention. In essence, the latest IAEA report contains nothing that would justify the United States and its allies declining to close a deal with Iran in the course of the coming four weeks. I, for one, am rooting for their success.
9More

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • ...5 more annotations...
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
6More

BBC News - Swiss police raid HSBC's Geneva office - 0 views

  • Swiss prosecutors have searched offices of the Geneva subsidiary of HSBC bank in an inquiry into alleged money-laundering. They said they were investigating HSBC Private Bank (Suisse) and "persons unknown for suspected aggravated money laundering". The investigation could be extended to people suspected of committing or participating in money laundering. HSBC said it was "co-operating with the Swiss authorities." The raid comes more than a week after allegations first emerged that HSBC's Swiss private bank may have helped wealthy clients evade tax. HSBC published a full-page advert in several weekend papers containing an apology over the claims.
  • The chief executive of HSBC's Swiss private bank, Franco Morra, said last week it had shut down accounts from clients who "did not meet our high standards". Mr Morra added the revelations about "historical business practices" were a reminder that the old business model of Swiss private banking was no longer acceptable.
  • HM Revenue & Customs was given the leaked data in 2010 and has identified 1,100 people who had not paid their taxes. Last week, HSBC admitted that it was "accountable for past control failures", but said it had now "fundamentally changed". "We acknowledge that the compliance culture and standards of due diligence in HSBC's Swiss private bank, as well as the industry in general, were significantly lower than they are today," it added. The bank faces criminal investigations in the US, France, Belgium and Argentina, but not in the UK, where HSBC is based. HSBC said it was "co-operating with relevant authorities".
  • ...3 more annotations...
  • Geneva's attorney general, Olivier Jornot, told reporters the investigation could be extended to individuals suspected of money laundering or tax fraud. "The goal of this investigation is precisely to verify if the information that has been made public are well-founded and if de facto reproaches can be made, whether it be towards the bank, or towards physical persons, like collaborators or clients," he said. Offshore accounts are not illegal, but many people use them to hide cash from the tax authorities. And while tax avoidance is perfectly legal, deliberately hiding money to evade tax is not. The allegations have caused a political storm in the UK over who knew what and when.
  • The leaked data was not received by the government until 2010 by which time the coalition had taken power, but refers to tax evasion that took place under the last Labour government between 2005 and 2007. The man in charge of HSBC at the time, Stephen Green, was made a Conservative peer and appointed to the government. Lord Green was made a minister eight months after HMRC had been given the leaked documents from his bank. He served as a minister of trade and investment until 2013.
  • Related Stories Oborne calls for Telegraph inquiry 18 FEBRUARY 2015, UK Balls challenges Osborne over HSBC 17 FEBRUARY 2015, UK POLITICS Timeline 2007-2015: HSBC tax files Watch 09 FEBRUARY 2015, BUSINESS Tax officials defended over HSBC 09 FEBRUARY 2015, UK POLITICS HSBC 'helped clients dodge tax' 10 FEBRUARY 2015, BUSINESS
2More

Great Britain Creates a Cyber Brigade to Manipulate Public Opinion | New Eastern Outlook - 0 views

  • t’s no coincidence then that the White House advised London to establish a special unit within its military structure – the British Cyber Command, transferring up to 1500 officers under its command just “for starters”. One must note that Washington has already created its own special unit for cyberwarfare back in 2009. This unit goes under the name of United States Cyber Command, with its headquarters being located at Fort Meade (Maryland). According to The Guardian, the 77th brigade will formally come into being in April. The brigade will be carrying out covert operations on social networks exclusively, in an effort to spread disinformation and manipulate the population of certain countries, which should create “favorable conditions” for applying political pressure or the executing of regime change in strategically important regions of the world. Its headquarters will be located to the west of London in Newbury (Berkshire) while it’s official insignia will be the famous symbol of Chindits (a mythical god-like lion guarding temples in Myanmar and other countries in South-East Asia), that was used by a a British India ‘Special Force’ which participated in the suppression of guerrilla Japanese troops deep in the forests of Southeast Asia. The use of social networks to overthrow unwanted regimes has been Washington’s modus operandi for decades now. This led to the creation of a whole industry of disinformation and the manipulation of public opinion. The events surrounding the Arab Spring, countless other color revolutions and the latest events in Ukraine can serve as a perfect example of how an unstable sociopolitical and economic situation in a country can be exploited by Western intelligence agencies to a achieve a radical change in the sovereign governments of other states .First appeared: http://journal-neo.org/2015/02/11/rus-v-britanii-sozdayut-internetarmiyu/
  •  
    In Egypt, Tunisia, Yemen, Algeria, Jordan, Syria, Ukraine, and Hong Kong along with a number of other countries, social networks have been used to coordinate the movement of protest groups, which allowed the gathering of a considerable number of protesters in designated areas. Back in 2011 the The Guardian reported the US Department of Defense was developing special software designed solely for manipulating social network users into buying pro-American propaganda. This operation was codenamed Operation Earnest Voice. This software has been put to "good use" in Britain, the United States and other Western countries during the Ukraine crisis for mass distribution of misleading information about Russia. This operation went as far as attempting to rewrite the history of World War II, with the active participation of Polish and Baltic politicians. The news on the creation of the 77th Brigade came short after the announcement made by Lieutenant General Marshall Webb the Commander, NATO Special Operations Forces HQ on the need to improve counter-information efforts against the Islamic State, as well as Russian and alternative media's coverage of the true causes of the ongoing events in Ukraine, and the large scale extermination of the civilian population by Kiev military units. These concerns, along with the recent events in Afghanistan, Iraq, and Syria, were the reason behind the assembly of a British cyber squad.
3More

Feds identify suspected 'second leaker' for Snowden reporters - Yahoo News - 0 views

  • The FBI has identified an employee of a federal contracting firm suspected of being the so-called "second leaker" who turned over sensitive documents about the U.S. government's terrorist watch list to a journalist closely associated with ex-NSA contractor Edward Snowden, according to law enforcement and intelligence sources who have been briefed on the case. The FBI recently executed a search of the suspect's home, and federal prosecutors in Northern Virginia have opened up a criminal investigation into the matter, the sources said.
  • vestigative website co-founded by Glenn Greenwald, the reporter who first published sensitive NSA documents obtained from Snowden. Headlined "Barack Obama's Secret Terrorist-Tracking System, by the Numbers," the story cited a classified government document showing that nearly half the people on the U.S. government's master terrorist screening database had "no recognized terrorist affiliation."
  • The story, co-authored by Jeremy Scahill and Ryan Devereaux, was accompanied by a document "obtained from a source in the intelligence community" providing details about the watch-listing system that were dated as late as August 2013, months after Snowden fled to Hong Kong and revealed himself as the leaker of thousands of top secret documents from the NSA. This prompted immediate speculation that there was a "second leaker" inside the U.S. intelligence community providing material to Greenwald and his associates.
11More

Jim Crow returns | Al Jazeera America - 0 views

  • Election officials in 27 states, most of them Republicans, have launched a program that threatens a massive purge of voters from the rolls. Millions, especially black, Hispanic and Asian-American voters, are at risk. Already, tens of thousands have been removed in at least one battleground state, and the numbers are expected to climb, according to a six-month-long, nationwide investigation by Al Jazeera America. At the heart of this voter-roll scrub is the Interstate Crosscheck program, which has generated a master list of nearly 7 million names. Officials say that these names represent legions of fraudsters who are not only registered but have actually voted in two or more states in the same election — a felony punishable by 2 to 10 years in prison. Until now, state elections officials have refused to turn over their Crosscheck lists, some on grounds that these voters are subject to criminal investigation. Now, for the first time, three states — Georgia, Virginia and Washington — have released their lists to Al Jazeera America, providing a total of just over 2 million names.
  • The Crosscheck list of suspected double voters has been compiled by matching names from roughly 110 million voter records from participating states. Interstate Crosscheck is the pet project of Kansas’ controversial Republican secretary of state, Kris Kobach, known for his crusade against voter fraud. The three states’ lists are heavily weighted with names such as Jackson, Garcia, Patel and Kim — ones common among minorities, who vote overwhelmingly Democratic. Indeed, fully 1 in 7 African-Americans in those 27 states, plus the state of Washington (which enrolled in Crosscheck but has decided not to utilize the results), are listed as under suspicion of having voted twice. This also applies to 1 in 8 Asian-Americans and 1 in 8 Hispanic voters. White voters too — 1 in 11 — are at risk of having their names scrubbed from the voter rolls, though not as vulnerable as minorities.If even a fraction of those names are blocked from voting or purged from voter rolls, it could alter the outcome of next week’s electoral battle for control of the U.S. Senate — and perhaps prove decisive in the 2016 presidential vote count.
  • Based on the Crosscheck lists, officials have begun the process of removing names from the rolls — beginning with 41,637 in Virginia alone. Yet the criteria used for matching these double voters are disturbingly inadequate.
  • ...8 more annotations...
  • In practice, all it takes to become a suspect is sharing a first and last name with a voter in another state. Typical “matches” identifying those who may have voted in both Georgia and Virginia include:Kevin Antonio Hayes of Durham, North Carolina, is a match for a man who voted in Alexandria, Virginia, as Kevin Thomas Hayes.John Paul Williams of Alexandria is supposedly the same man as John R. Williams of Atlanta, Georgia.Robert Dewey Cox of Marietta, Georgia is matched with Robert Glen Cox of Springfield, Virginia.
  • That was the sales pitch. But the actual lists show that not only are middle names commonly mismatched and suffix discrepancies ignored, even birthdates don’t seem to have been taken into account. Moreover, Crosscheck deliberately ignores Social Security mismatches, in the few instances when the numbers are even collected. The Crosscheck instructions for county election officers state, “Social Security numbers are included for verification; the numbers might or might not match.”
  • There are 6,951,484 names on the target list of the 28 states in the Crosscheck group; each of them represents a suspected double voter whose registration has now become subject to challenge and removal. According to a 2013 presentation by Kobach to the National Association of State Election Directors, the program is a highly sophisticated voter-fraud-detection system. The sample matches he showed his audience included the following criteria: first, last and middle name or initial; date of birth; suffixes; and Social Security number, or at least its last four digits.
  • Al Jazeera America visited these and several other potential double voters. John Paul Williams of Alexandria insists he has never used the alias “John R. Williams.” “I’ve never lived in Georgia,” he says.Jo Cox, wife of suspected double voter Robert Glen Cox of Virginia, says she has a solid alibi for him. Cox “is 85 years old and handicapped. He wasn’t in Georgia. Never voted there,” she says. He has also never used the middle name “Dewey.” Twenty-three percent of the names — nearly 1.6 million of them — lack matching middle names. “Jr.” and “Sr.” are ignored, potentially disenfranchising two generations in the same family. And, notably, of those who may have voted twice in the 2012 presidential election, 27 percent were listed as “inactive” voters, meaning that almost 1.9 million may not even have voted once in that race, according to Crosscheck’s own records.
  • Mark Swedlund is a specialist in list analytics whose clients have included eBay, AT&T and Nike. At Al Jazeera America’s request, he conducted a statistical review of Crosscheck’s three lists of suspected double voters. According to Swedlund, “It appears that Crosscheck does have inherent bias to over-selecting for potential scrutiny and purging voters from Asian, Hispanic and Black ethnic groups. In fact, the matching methodology, which presumes people in other states with the same name are matches, will always over-select from groups of people with common surnames.” Swedlund sums up the method for finding two-state voters — simply matching first and last name — as “ludicrous, just crazy.”
  • elen Butler is the executive director of Georgia’s Coalition for the Peoples’ Agenda, which conducts voter drives in minority communities. Any purge list that relies on name matches will contain a built-in racial bias against African-Americans, she says, because “We [African-Americans] took our slave owners’ names.” The search website PeopleSmart notes that 86,020 people in the United States have the name John Jackson. And according to the 2000 U.S. Census, which is the most recent data set, 53 percent of Jacksons are African-American.
  • In North Carolina, state officials have hired former FBI agent Charles W. “Chuck” Stuber, who played a major role in the campaign finance fraud case brought against former North Carolina Sen. John Edwards, to, in the words of their press release, “investigate cases of possible voter fraud identified by an interstate cross-check comparing election records from 28 states.”
  • But despite knowing the names and addresses of 192,207 supposed double voters in the state, Stuber has not nabbed a single one in his five months on the job. Josh Lawson, a spokesman for the board of elections, says, “This agency has made no determination as to which portion of these [lists] represent data error or voter fraud.” In fact, to date, Lawson admits that Stuber has found only errors and not one verified fraudulent voter.
3More

Poll: Bush now tops GOP field; Clinton runs ahead of all Republicans - The Washington Post - 0 views

  • Former Florida governor Jeb Bush now leads the field of prospective Republican candidates for the party’s 2016 presidential nomination, but former secretary of state Hillary Rodham Clinton enjoys a decided advantage over Bush and other potential GOP rivals in hypothetical general election matchups, according to a new Washington Post-ABC News poll. At this early stage in the 2016 competition, the prospective candidates suffer from image weaknesses, but the Republicans have a more acute problem. Most Republicans are not well known, but at this point, not a single one of six Republicans included in the survey has a favorability rating that is net positive.
  • Bush — by far the best known among those running for the GOP nomination — is viewed favorably by 33 percent of the public, while 53 percent say they view him unfavorably. Only Clinton among all those included in the poll has a net positive rating, but by the slender margin of three percentage points (49 percent to 46 percent). Her favorability rating has dropped nine points in the past year and 18 points since she left the State Department in 2013. Clinton stands now as the leading contender in either party for the White House, with no serious opposition at this point in the race for the Democratic nomination. But as she prepares to launch her campaign, she emerges also as a polarizing figure, with huge differences in the way she is perceived by Republicans and Democrats. [Full poll results here.]
  •  
    You can have your pick between two dynasties. 
2More

Boston Marathon Bombings' Guilty Verdict Exposed as a Gross Travesty of Justice | Globa... - 0 views

  • With the official government narrative of the 9/11 attack filled with a plethora of lies that have since been subsequently exposed, the next biggest “war on terror” event on US soil that the feds failed to stop was the April 2013 Boston Marathon bombings. And now the lone living suspect from that horrific crime that killed three people, left 17 limbless and injured 264 victims (though that number’s been accused of being purposely inflated) has now been found guilty of all 30 counts after the jury’s 11 hour deliberation earlier this week. As we mark the second anniversary of this tragic event and the second and final phase of the trial beginning on Monday that will decide the fate of Dzhokhar Tsarnaev – whether he’ll live out the rest of his life in prison or be put to death, a critical review of preceding events and developments surrounding his high profile, extremely significant case seems both timely and much needed.
  •  
    A must-read. The Boston bombing case has cover-up of government involvement dripping from every edge, evidence that was excluded or never raised in the trial.  
7More

Greenwald - The Intercept - 0 views

  • Sunday morning news television is where Washington sets its media agenda for the week and, more importantly, defines its narrow range of conventional, acceptable viewpoints. It’s where the Serious People go to spout their orthodoxies and, through the illusion of “tough questioning,” disseminate DC-approved bipartisan narratives. Other than the New York Times front page, Sunday morning TV was the favorite tool of choice for Bush officials and neocon media stars to propagandize the public about Iraq; Dick Cheney’s media aide, Catherine Martin, noted in a memo that the Tim Russert-hosted Meet the Press lets Cheney “control message,” and she testified at the Lewis Libby trial that, as a result, “I suggested we put the vice president on Meet the Press, which was a tactic we often used. It’s our best format.” Over the last couple months, the Sunday morning TV shows — NBC’s Meet the Press, CBS’s Face The Nation, ABC’s This Week, Fox’s News Sunday, and CNN’s State of the Union — have focused on a deal with Iran as one of their principal topics. In doing so, they have repeatedly given a platform to fanatical anti-Iran voices, including Israeli officials such as Prime Minister Benjamin Netanyahu. They have sycophantically interviewed officials from the U.S.-supported, anti-Iranian Gulf tyrannies such as Saudi Arabia and Jordan; two weeks ago, Chuck Todd interviewed Saudi Ambassador to the U.S. Adel Al-Jubeir and didn’t utter a word about extreme Saudi repression,
  • In the last three weeks alone, Meet the Press has interviewed the Israeli prime minister, the Saudi ambassador, and the Israeli ambassador to the U.S.
  • Meanwhile, their “expert media panels” almost always feature the most extremist “pro-Israel,” anti-Iran American pundits such as Jeffrey Goldberg, who played a leading role in spreading false claims about Iraq under the guise of “reporting” (and only became more beloved and credible in DC for it), was dubbed Netanyahu’s “faithful stenographer” by New York Times columnist Roger Cohen, and even joined the Israeli military in his young adulthood. In 2014, Face the Nation interviewed Netanyahu five times and featured his “faithful stenographer,” Goldberg, three times; in 2015, the CBS show just last week interviewed Netanyahu and has already hosted Goldberg four times. ABC’s This Week with George Stephanopoulos actually features supreme neocon propagandist Bill Kristol as a regular “ABC News Contributor” and has also interviewed Netanyahu. And that’s to say nothing of the “hawkish,” AIPAC-loyal and/or evangelical members of the U.S. Congress who are fanatically devoted to Israel and appear literally almost every week on these programs. But as these shows “cover” the Iran deal, one thing is glaringly missing: Iranian voices. There has not been a single Iranian official recently interviewed by any of these Sunday morning shows. When I raised this issue on Twitter a couple of weeks ago, a Meet the Press senior editor, Shawna Thomas, said the show had “put in a request” with Iran for an interview, while MSNBC’s Chris Hayes also suggested that it can be difficult to secure interviews with Iranian government officials.
  • ...4 more annotations...
  • That may be, but even if it is difficult to obtain interviews with Iranian government officials, it is extremely easy to interview Iranian experts, scholars, journalists and other authoritative voices from Tehran. Last week, Democracy Now’s Amy Goodman and Juan Gonzalez hosted a fascinating hour-long discussion about Iran with Seyed Hossein Mousavian, a former nuclear negotiator for Iran who was Iran’s ambassador to Germany from 1990 to 1997, and now teaches at Princeton. Just this week, CNN International’s Christiane Amanpour interviewed Tehran University Professor Sadegh Zibakalam about Tehran’s views and actions in the Iran deal. Beyond those in Iran, there are Iranian-American groups and Iranian-American experts who actually speak Farsi who don’t see the world the way Jeffrey Goldberg and Lindsey Graham do. Outside the Sunday shows, Iranian officials have been interviewed occasionally by U.S. media figures. In sum, the only way to exclude Iranian voices is if you choose to exclude them. That’s exactly what Sunday morning television programs have done, and continue to do. And it matters a great deal for several reasons.
  • For one, excluding the Iranian viewpoint ensures that these shows spew propaganda to the American public. Iran is talked about, almost always in demonic terms, but is almost never heard from. That means that these shows, which endlessly boast of their own “objectivity,” are in fact far more akin to state media. My Intercept colleague Jon Schwarz this week wrote an article detailing seven historically indisputable facts about what the U.S. has done to Iran — which cause some in that country to chant “Death to America” — and it went viral. Why? Because those facts, though quite well-established, are virtually never mentioned in U.S. media accounts that depict Iran as filled with irrational, primitive, inexplicable hatred for the U.S., designed to show how unstable and blindly hateful they are. That is propaganda by definition: amplifying one side’s views (the U.S. and Israeli governments’) while suppressing others’. Then there’s the ease with which those who are rendered invisible are easily demonized. For decades, the key to depicting gay people as mentally ill predators was ensuring they were never heard from, forced to be mute in the closet; once they were out in the open and understood, that demonization became impossible.
  • This has also been the favored foreign policy dynamic in the U.S. for decades. When Americans are killed by a foreign Muslim, we are deluged with information about the American victims and their grieving families, while we hear almost nothing about the innocent victims killed by the U.S. or its allies — not even their names. This gross imbalance in coverage creates the illusion that Americans are innocent victims of terrorism but never its perpetrators. Identically, when American journalists are imprisoned by an adversary of the U.S. government, American journalists trumpet it endlessly, while foreign journalists imprisoned for years with no trial by the U.S. government are all but disappeared. Silencing The Other Side is a key U.S. media propaganda tactic. There are all sorts of dubious claims presented about Iran, the U.S. and Israel that are treated as unchallenged truth in U.S. media discourse. The range of “debate” allowed by the U.S. media — is Obama’s deal with Iran a good idea or not? — all assumes those dubious claims about Iran to be true. But those claims are vehemently disputed in large parts of the world, certainly in Tehran. But Americans, especially the millions who get their news from Sunday morning television or from outlets whose agenda is shaped by those programs, literally have no idea about any of that, because the people who can best advocate those views — i.e. Iranians — are simply never heard from.
  • It’s remarkably telling that the only voices heard on Sunday morning TV shows are those who spout the U.S. government line about Iran, including officials from the repressive regimes most closely allied with the U.S. Obviously, one can find the arguments of Iranians unpersuasive or even harbor hostility to that nation’s government, but what possible justification is there for the leading Sunday morning news shows in the U.S. to simply suppress those views altogether?
2More

Tsarnaev Guilty, but Who Made the Bombs? - WhoWhatWhy - 0 views

  • It took a jury just over 11 hours to find Boston Marathon bomber Dzhokhar Tsarnaev guilty of 30 counts in connection with the worst terrorist attack on American soil since 9/11. Federal prosecutors argued Tsarnaev, 21, deliberately “shredded the bodies” of his victims and waged violent jihad to “punish Americans.”Assistant US Attorney Aloke Chakravarty portrayed Tsarnaev as a heartless terrorist who, along with his  brother Tamerlan, carried out the April 2013 attacks that killed three and injured 264 others.But while evidence of Tsarnaev’s culpability—including an admission of guilt from his own defense team—virtually guaranteed a guilty verdict, that wasn’t enough to stop prosecutors from twisting important facts to suit their own agenda.Referencing “bomb-making” paraphernalia seized from Tamerlan Tsarnaev’s apartment, Chakravarty told the court that, “there is evidence, at least in part, that the bombs were built at 410 Norfolk Street.”
  • What the jury didn’t know is that in May 2014, prosecutors said they had no evidence the bombs were constructed at Norfolk Street, and in October 2014, a year-and-a-half after the bombings, the FBI said it still had no idea where the bombs were built, or who actually built them.
6More

Israeli officials head to France in last-minute bid to block nuclear deal | World news ... - 0 views

  • Unable to find support from its US allies, Israel is turning to France to help head off what it sees as a bad and dangerous nuclear deal with Iran.
  • In an interview with the Associated Press in Paris, the Israeli intelligence minister, Yuval Steinitz, said on Monday that dialogue with France over Iran’s nuclear program “has proven in the past that it was productive” and makes this week’s last-minute diplomatic mission to Paris worthwhile. France played a key role strengthening an interim agreement with Iran in late 2013 that froze important parts of the Islamic republic’s nuclear program in exchange for some relief from western sanctions. The so-called P5+1 group – Britain, China, France, Russia, the United States and Germany – is attempting to reach a final nuclear deal with Iran before a deadline expires at the end of the month.
  • The Iranian president, Hassan Rouhani, said on Saturday that “achieving a deal is possible” by the target date. A preliminary accord then is meant to lead to a final deal by the end of June that would permanently crimp Tehran’s nuclear programs in exchange for the lifting of sanctions. Iran claims that its program is only aimed at generating power, but other nations fear it is trying to develop nuclear weapons.
  • ...2 more annotations...
  • Steinitz and Israel’s national security adviser, Yossi Cohen, were meeting with the French foreign minister, Laurent Fabius, and other top diplomats involved in the Iran talks. He told the AP only a deal that “dismantles, not simply freezes” Iran’s nuclear program would be acceptable. France has been more hawkish than the US at the negotiating table, reportedly demanding more stringent restrictions than other western delegations. Shimon Stein, a former Israeli ambassador to Germany who has been briefed on the P5+1 efforts with Iran, says Steinitz’s trip to France is a natural course of action given Israel’s opposition and the way the talks have been progressing. He said Prime Minister Benjamin Netanyahu’s 3 March address to Congress essentially exhausted the American option for Israel, and it is now trying to exert its influence against the deal wherever that is possible. Against a perception that the Americans are rushing to a deal and willing to cut corners to do so, he said France has become a potential ally from Israel’s perspective, supplanting Britain as the most hawkish European country regarding Iran.
  • “It’s only natural that given Netanyahu’s concern of a deal with Iran that he would turn to France,” Stein said. “France is the weak link among the group.” In the interview Steinitz declined to discuss what would happen if the deal now on the table goes through. “We don’t have a plan B, we only have a plan A and this is to try to prevent a bad deal with Iran or at least to try to make it more reasonable and to close some of the gaps and loopholes that made it even worse,” he said. In Tehran on Monday, an Iranian nuclear negotiator urged world powers to find a “common position” to achieve a “balanced” final nuclear deal. The deputy foreign minister, Abbas Araghchi, said Iran saw a lack of coordination among the six-nation group at the latest round of talks. The US and Iran broke off nuclear negotiations in Lausanne, Switzerland, on Friday for consultations but they are to resume the talks on Wednesday. Iran and the US have reported substantial progress in the talks but also say gaps remain. President Rouhani said on Saturday that “there is nothing that can’t be resolved”.
  •  
    "He said Prime Minister Benjamin Netanyahu's 3 March address to Congress essentially exhausted the American option for Israel ..."  If true, then the battleground has shifted from Congress to France.
6More

Clinton Foundation's Deep Financial Ties to Ukrainian Oligarch Revealed | Global Research - 0 views

  • Fortunately, I did decide to take a look and pretty soon my jaw absolutely hit the floor. Although the Wall Street Journal didn’t play up the connection, I was stunned to see that of all the oligarchs connected to foreign governments who donated to the Clinton Foundation while she was Secretary of State, Ukraine was at the very top. I thought this to be strange, but as I read on I just couldn’t believe how connected the main donor was to the current regime in power. Considering this is the main geopolitical hotspot on earth right now, many, many questions need to be asked.
  • Let’s also recall some of the more shady aspects of the new government in Ukraine by taking a look back at the post, Made in the USA – How the Ukrainian Government is Giving Away Citizenships so Foreigners Can Run the Country [17]. Here are a few excerpts:
  • Claims that the new government in Ukraine is nothing more than a Western puppet Parliament have been swirling around consistently since February. Nevertheless, I think it’s very significant that the takeover is now overt, undeniable and completely out in the open. Nothing proves this fact more clearly than the recent and sudden granting of citizenship to three foreigners so that they can take top posts in the government. At the top of the list is American, Natalie Jaresko, who runs private equity fund Horizon Capital. She will now be Ukraine’s Finance Minister, and I highly doubt she will be forced to pay the IRS Expatriation Tax [18] (one set of laws for the rich and powerful, another set of laws for the peasants). For Economy Minister, a Lithuanian investment banker, Aivaras Abromavicius, will take the reins. Health Minister will be Alexander Kvitashvili of Georgia. Now read the following from the WSJ [14]:
  • ...3 more annotations...
  • The Clinton Foundation swore off donations from foreign governments when Hillary Clinton was secretary of state. That didn’t stop the foundation from raising millions of dollars from foreigners with connections to their home governments, a review of foundation disclosures shows. Some donors have direct ties to foreign governments. One is a member of the Saudi royal family. Another is a Ukrainian oligarch and former parliamentarian. Others are individuals with close connections to foreign governments that stem from their business activities. Their professed policy interests range from human rights to U.S.-Cuba relations. All told, more than a dozen foreign individuals and their foundations and companies were large donors to the Clinton Foundation in the years after Mrs. Clinton became secretary of state in 2009, collectively giving between $34 million and $68 million, foundation records show. Some donors also provided funding directly to charitable projects sponsored by the foundation, valued by the organization at $60 million.
  • Former President Bill Clinton promised the Obama administration the foundation wouldn’t accept most foreign-government donations while his wife was secretary of state. The agreement didn’t place limits on donations from foreign individuals or corporations. Between 2009 and 2013, including when Mrs. Clinton was secretary of state, the Clinton Foundation received at least $8.6 million from the Victor Pinchuk Foundation, according to that foundation, which is based in Kiev, Ukraine. It was created by Mr. Pinchuk, whose fortune stems from a pipe-making company. He served two terms as an elected member of the Ukrainian Parliament and is a proponent of closer ties between Ukraine and the European Union. In 2008, Mr. Pinchuk made a five-year, $29 million commitment to the Clinton Global Initiative, a wing of the foundation that coordinates charitable projects and funding for them but doesn’t handle the money. The pledge was to fund a program to train future Ukrainian leaders and professionals “to modernize Ukraine,” according to the Clinton Foundation. Several alumni are current members of the Ukrainian Parliament. Actual donations so far amount to only $1.8 million, a Pinchuk foundation spokesman said, citing the impact of the 2008 financial crisis. During Mrs. Clinton’s time at the State Department, Mr. Schoen, the pollster, registered as a lobbyist for Mr. Pinchuk, federal records show. Mr. Schoen said he and Mr. Pinchuk met several times with Clinton aides including Melanne Verveer, a Ukrainian-American and then a State Department ambassador-at-large for global women’s issues. The purpose, Mr. Schoen said, was to encourage the U.S. to pressure Ukraine’s then-President Viktor Yanukovych to free his jailed predecessor, Yulia Tymoshenko.
  • Mr. Schoen said his lobbying was unrelated to the donations. “We were not seeking to use any leverage or any connections or anything of the sort relating to the foundation,” he said. Please Schoen, don’t piss on my leg and tell me it’s raining.
2More

Nusra Front quietly rises in Syria as Islamic State targeted - The Washington Post - 0 views

  • The Nusra Front, Syria’s al-Qaida affiliate, is consolidating power in territory stretching from the Turkish border to central and southern Syria, crushing moderate opponents and forcibly converting minorities using tactics akin to its ultraconservative rival, the Islamic State group. But while the Islamic State group gets most of the attention largely because its penchant for gruesome propaganda, the Nusra Front quietly has become one of the key players in the four-year civil war, compromising other rebel groups the West may try to work with while increasingly enforcing its own brutal version of Islamic law. Its scope of influence now abuts the Golan Heights bordering Israel, and its membership largely composed of Syrian nationals refuse any negotiations with the government of embattled President Bashar Assad, further complicating the brutal conflict.
  • “The Nusra Front will most likely outlast ISIS in Syria, and will represent a severe and existential threat to the aspirations of the Syrian people in terms of a pluralistic, democratic society,” said Fawaz A. Gerges, director of the Middle East Center at the London School of Economics, using an alternate acronym for the extremist group. The Islamic State group helped create the Nusra Front, providing financing, manpower and military hardware in 2012. But the group and its patron eventually had a falling out in 2013 for ideological as well as strategic reasons. The Nusra Front, while loyal to al-Qaida, has cooperated with other Syrian rebel factions in the fight to oust Assad. In recent months, the group has overrun rebel strongholds in Syria’s Idlib province, trouncing two prominent, U.S.-backed rebel factions, Harakat Hazm and the Syria Revolutionaries Front. Following the deadly clashes, SRF leader Jamal Maarouf fled to Turkey and Hazm announced it was dissolving.
4More

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
7More

Tech firms and privacy groups press for curbs on NSA surveillance powers - The Washingt... - 0 views

  • The nation’s top technology firms and a coalition of privacy groups are urging Congress to place curbs on government surveillance in the face of a fast-approaching deadline for legislative action. A set of key Patriot Act surveillance authorities expire June 1, but the effective date is May 21 — the last day before Congress breaks for a Memorial Day recess. In a letter to be sent Wednesday to the Obama administration and senior lawmakers, the coalition vowed to oppose any legislation that, among other things, does not ban the “bulk collection” of Americans’ phone records and other data.
  • We know that there are some in Congress who think that they can get away with reauthorizing the expiring provisions of the Patriot Act without any reforms at all,” said Kevin Bankston, policy director of New America Foundation’s Open Technology Institute, a privacy group that organized the effort. “This letter draws a line in the sand that makes clear that the privacy community and the Internet industry do not intend to let that happen without a fight.” At issue is the bulk collection of Americans’ data by intelligence agencies such as the National Security Agency. The NSA’s daily gathering of millions of records logging phone call times, lengths and other “metadata” stirred controversy when it was revealed in June 2013 by former NSA contractor Edward Snowden. The records are placed in a database that can, with a judge’s permission, be searched for links to foreign terrorists.They do not include the content of conversations.
  • That program, placed under federal surveillance court oversight in 2006, was authorized by the court in secret under Section 215 of the Patriot Act — one of the expiring provisions. The public outcry that ensued after the program was disclosed forced President Obama in January 2014 to call for an end to the NSA’s storage of the data. He also appealed to Congress to find a way to preserve the agency’s access to the data for counterterrorism information.
  • ...3 more annotations...
  • Despite growing opposition in some quarters to ending the NSA’s program, a “clean” authorization — one that would enable its continuation without any changes — is unlikely, lawmakers from both parties say. Sen. Ron Wyden (D-Ore.), a leading opponent of the NSA’s program in its current format, said he would be “surprised if there are 60 votes” in the Senate for that. In the House, where there is bipartisan support for reining in surveillance, it’s a longer shot still. “It’s a toxic vote back in your district to reauthorize the Patriot Act, if you don’t get some reforms” with it, said Rep. Thomas Massie (R-Ky.). The House last fall passed the USA Freedom Act, which would have ended the NSA program, but the Senate failed to advance its own version.The House and Senate judiciary committees are working to come up with new bipartisan legislation to be introduced soon.
  • The tech firms and privacy groups’ demands are a baseline, they say. Besides ending bulk collection, they want companies to have the right to be more transparent in reporting on national security requests and greater declassification of opinions by the Foreign Intelligence Surveillance Court.
  • Some legal experts have pointed to a little-noticed clause in the Patriot Act that would appear to allow bulk collection to continue even if the authority is not renewed. Administration officials have conceded privately that a legal case probably could be made for that, but politically it would be a tough sell. On Tuesday, a White House spokesman indicated the administration would not seek to exploit that clause. “If Section 215 sunsets, we will not continue the bulk telephony metadata program,” National Security Council spokesman Edward Price said in a statement first reported by Reuters. Price added that allowing Section 215 to expire would result in the loss of a “critical national security tool” used in investigations that do not involve the bulk collection of data. “That is why we have underscored the imperative of Congressional action in the coming weeks, and we welcome the opportunity to work with lawmakers on such legislation,” he said.
  •  
    I omitted some stuff about opposition to sunsetting the provisions. They  seem to forget, as does Obama, that the proponents of the FISA Court's expansive reading of section 215 have not yet come up with a single instance where 215-derived data caught a single terrorist or prevented a single act of terrorism. Which means that if that data is of some use, it ain't in fighting terrorism, the purpose of the section.  Patriot Act § 215 is codified as 50 USCS § 1861, https://www.law.cornell.edu/uscode/text/50/1861 That section authorizes the FBI to obtain an iorder from the FISA Court "requiring the production of *any tangible things* (including books, records, papers, documents, and other items)."  Specific examples (a non-exclusive list) include: the production of library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person." The Court can order that the recipient of the order tell no one of its receipt of the order or its response to it.   In other words, this is about way more than your telephone metadata. Do you trust the NSA with your medical records? 
6More

Court Accepts DOJ's 'State Secrets' Claim to Protect Shadowy Neocons: a New Low - The I... - 0 views

  • A truly stunning debasement of the U.S. justice system just occurred through the joint efforts of the Obama Justice Department and a meek and frightened Obama-appointed federal judge, Edgardo Ramos, all in order to protect an extremist neocon front group from scrutiny and accountability. The details are crucial for understanding the magnitude of the abuse here. At the center of it is an anti-Iranian group calling itself “United Against Nuclear Iran” (UANI), which is very likely a front for some combination of the Israeli and U.S. intelligence services. When launched, NBC described its mission as waging “economic and psychological warfare” against Iran. The group was founded and is run and guided by a roster of U.S., Israeli and British neocon extremists such as Joe Lieberman, former Bush Homeland Security adviser (and current CNN “analyst”) Fran Townsend, former CIA Director James Woolsey, and former Mossad Director Meir Dagan. One of its key advisers is Olli Heinonen, who just co-authored a Washington Post Op-Ed with former Bush CIA/NSA Director Michael Hayden arguing that Washington is being too soft on Tehran.
  • This group of neocon extremists was literally just immunized by a federal court from the rule of law. That was based on the claim — advocated by the Obama DOJ and accepted by Judge Ramos — that subjecting them to litigation for their actions would risk disclosure of vital “state secrets.” The court’s ruling was based on assertions made through completely secret proceedings between the court and the U.S. government, with everyone else — including the lawyers for the parties — kept in the dark. In May 2013, UANI launched a “name and shame” campaign designed to publicly identify — and malign — any individuals or entities enabling trade with Iran. One of the accused was the shipping company of Greek billionaire Victor Restis, who vehemently denies the accusation. He hired an American law firm and sued UANI for defamation in a New York federal court, claiming the “name and shame” campaign destroyed his reputation.
  • Up until that point, there was nothing unusual about any of this: just a garden-variety defamation case brought in court by someone who claims that public statements made about him are damaging and false. That happens every day. But then something quite extraordinary happened: In September of last year, the U.S. government, which was not a party, formally intervened in the lawsuit, and demanded that the court refuse to hear Restis’s claims and instead dismiss the lawsuit against UANI before it could even start, on the ground that allowing the case to proceed would damage national security. When the DOJ intervened in this case and asserted the “state secrets privilege,” it confounded almost everyone. The New York Times’s Matt Apuzzo noted at the time that “the group is not affiliated with the government, and lists no government contracts on its tax forms. The government has cited no precedent for using the so­-called state­ secrets privilege to quash a private lawsuit that does not focus on government activity.” He quoted the ACLU’s Ben Wizner as saying: “I have never seen anything like this.” Reuters’s Allison Frankel labeled the DOJ’s involvement a “mystery” and said “the government’s brief is maddeningly opaque about its interest in a private libel case.”
  • ...2 more annotations...
  • But in this case, there is no apparent U.S. government conduct at issue in the lawsuit. At least based on what they claim about themselves, UANI is just “a not-for-profit, non-partisan, advocacy group” that seeks to “educate” the public about the dangers of Iran’s nuclear program. Why would such a group like this even possess “state secrets”? It would be illegal to give them such material. Or could it be that the CIA or some other U.S. government agency has created and controls the group, which would be a form of government-disseminated propaganda, which happens to be illegal? What else could explain the basis for the U.S. government’s argument that allowing UANI to be sued would risk the disclosure of vital “state secrets” besides a desire to cover up something quite untoward if not illegal? What “state secrets” could possibly be disclosed by suing a nice, little “not-for-profit, non-partisan, advocacy group”?
  • This sham worked. This week, Judge Ramos issued his ruling dismissing the entire lawsuit (see below). As a result of the DOJ’s protection, UANI cannot be sued. Among other things, it means this group of neocon extremists now has a license to defame anyone they want. They can destroy your reputation with false accusations in a highly public campaign, and when you sue them for it, the DOJ will come in and whisper in the judge’s ear that national security will be damaged if — like everyone else in the world — UANI must answer in a court of law for their conduct. And subservient judicial officials like Judge Ramos will obey the U.S. government’s dictates and dismiss your lawsuit before it begins, without your having any idea why that even happened. Worse, in his written ruling, the judge expressly acknowledges that dismissal of the entire lawsuit at the start on secrecy grounds is what he calls a “harsh sanction,” and also acknowledges that “it is particularly so in this case because Plaintiffs not only do not get their day in court, but cannot be told why” (emphasis added). But he does it anyway, in a perfunctory 18-page opinion that does little other than re-state some basic legal principles, and then just concludes that everything the government whispered in his ear should be accepted.
  •  
    Unless the district court decision is overturned by a higher court, the Restis case looks to be over. The secrecy concerns of the Dark State trump justice, again. It should be noted that the Constitution is silent on the issue of state secrets (the so-called "state secrets privilege" was manufactured from whole cloth by the Supreme Court in the early 1950s). On the other hand, several provisions of the Constitution expressly require that justice be done, not the least of which is the Due Process clause.  
16More

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
« First ‹ Previous 1301 - 1320 of 1378 Next › Last »
Showing 20 items per page