Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Actor

Rss Feed Group items tagged

Paul Merrell

Washington Confesses to Backing "Questionable Actors" in Syria | New Eastern Outlook - 0 views

  • However, now, there is a US Department of Defense (DoD) document confirming without doubt that the so-called “Syrian opposition” is Al Qaeda, including the so-called “Islamic State” (ISIS), and that the opposition’s supporters – the West, Turkey, Jordan, Saudi Arabia, and Qatar – specifically sought to establish safe havens in Iraq and eastern Syria, precisely where ISIS is now based. America is Behind ISISFirst appeared: http://journal-neo.org/2015/05/25/washington-confesses-to-backing-questionable-actors-in-syria/
  •  
    Finally out in the open. The U.S. DoD document released by Judical Watch makes it crystal clear that the U.S. and allies in 2012 were supporting al-Nusrah (al Qaeda in Syria) and the Islamic State in Iraq (Salafist predecessor to the proclaimed Islamic State). In Pogo's words, "we have met the enemy and he is us." This is confirmation of a mountain of evidence that the U.S. and its allies have supplied and provided command and control for ISIL and al Qaeda/al Nusrah foreces in Iraq and Syria. The document admits a similar relationshp with the Muslim Brotherhood fighting forces in those nations. More importantly than the confirmatiion, the document constitutes an admission by the U.S. that it is waging a proxy war against the nations of Iraq and Syria. The emergence of the Islamic State can no longer credibly serve as justification for U.S. military action in Syria because that justification depends on a combination of the right to militarily aid a nation at war that requests it and the doctrine that when a nation (Syria) is unwilling or unable to control civilian actors who inflict harm on another nation (Iraq), the injured nation has the right to invade the other nation to the extent necessary to remove the threat. But with this document in the open, we have a doctrine of unclean hands barrier to the U.S. assertion of right to invade Syria's sovereign territory; the U.S. is concurrently backing the civilian force in Syria that is threatening Iraq. Therefore, the U.S. has unclean hands and may not lawfully invoke the doctrine permitting a state to invade a state unwilling or unable to control civilian actors who injure another state. U.S. invasion of Syria is now established as a war of agression, the most serious of war crimes. This also means that President Obama has been far less than candid in requesting a retroactive Authorization for Use of Military Force in Congress that would encompass military invasion of Syria, raising the issue of an impeachable abu
charliecollin

R2-D2 Actor Kenny Baker Dead At 81 - 0 views

  •  
    13 August 2016 Kenny Baker, the actor behind the famous droid R2-D2 in Star Wars, died earlier this morning according to his family at age 81. His family reported his death on August 13th, citing problems with his lungs and his ongoing illness. His niece Abigail Shield also provided a statement on his death.
charliecollin

Criminal Minds Actor Suspended Following Outbursts - 0 views

  •  
    11 August 2016 CBS suspended Criminal Minds actor Thomas Gibson after allegedly starting a physical fight with a writer on the show according to TMZ. According to the reports, the fight began as Gibson directed and acted in a scene for the twelfth season.
Gary Edwards

Arnold Ahlert: Russia Would Love a Third Obama Term - The Patriot Post - 0 views

  • New York Post columnist John Crudele obliterates the despicable word-parsing. “Clinton was so careless when using her BlackBerry that the Russians stole her password,” he writes. “All Russian President Vladimir Putin’s gang had to do was log into Clinton’s account and read whatever they wanted.” When it comes to the DNC hack, “The Russians did it” is the theme-du-jour. Clinton campaign manager, Robby Mook stated Sunday that “experts are telling us that Russian state actors broke into the DNC, stole these emails, [and are] releasing these emails for the purpose of helping Donald Trump.” The campaign itself echoed that assertion. “This is further evidence the Russian government is trying to influence the outcome of the election.”
  • The reliably leftist Politico — so far left that reporter Ken Vogel remains employed there despite sending a story to the DNC before he sent it to his own editor — is quite comfortable advancing that agenda, using it as a vehicle to buff up Clinton’s tenure as secretary of state. “Former U.S. officials who worked on Russia policy with Clinton say that Putin was personally stung by Clinton’s December 2011 condemnation of Russia’s parliamentary elections, and had his anger communicated directly to President Barack Obama,” Politico reports. “They say Putin and his advisers are also keenly aware that, even as she executed Obama’s ‘reset’ policy with Russia, Clinton took a harder line toward Moscow than others in the administration. And they say Putin sees Clinton as a forceful proponent of ‘regime change’ policies that the Russian leader considers a grave threat to his own survival.” Yet even Politico is forced to admit the payback angle is “speculation,” and that some experts remain “unconvinced that Putin’s government engineered the DNC email hack or that it was meant to influence the election in Trump’s favor as opposed to embarrassing DNC officials for any number of reasons.”
  • Americans would also be wise to remain highly skeptical of this claim for any number of reasons. WikiLeaks founder Julian Assange asserts there is “there is no proof whatsoever” Russia is behind the hack and that “this is a diversion that’s being pushed by the Hillary Clinton campaign.” To be fair, Assange is a Russian sympathizer, and leftists aren’t the only ones attributing the hack to the Russians. The same FBI that gave Clinton a pass will be investigating the DNC hack, and at some point the bureau will reach a conclusion. In the meantime, it might be worth considering that this smacks of a carefully orchestrated disinformation campaign similar to the one Clinton and several other Obama administration officials engineered with regard to Benghazi. While Clinton was never held personally or legally accountable for the deaths of four Americans, it is beyond dispute that she lied unabashedly about a video causing the attack, while sending her daughter a damning email at 11:12 p.m. on Sept. 11, 2012, admitting the administration knew “the attack had nothing to do with the film. It was a planned attack, not a protest.” The theme of this coordinated narrative? Clinton campaign chair John Podesta referred Monday night to “a kind of bromance going on” between Putin and Trump. Clinton campaign manager Robby Mook echoed that assertion, insisting the email dump comes on the heels of “changes to the Republican platform to make it more pro-Russian.”
  • ...3 more annotations...
  • The Leftmedia were equally obliging. “The theory that Moscow orchestrated the leaks to help Trump … is fast gaining currency within the Obama administration because of the timing of the leaks and Trump’s own connections to the Russian government,” reports the Daily Beast. Other Leftmedia examples abound. “Until Friday, that charge, with its eerie suggestion of a Kremlin conspiracy to aid Donald J. Trump, has been only whispered,” shouted the New York Times. “Because the leaks are widely suspected of being the result of a Russian hacking operation, they can be used to reinforce the narrative that Russian President Vladimir Putin is rooting for Trump and that Trump, in turn, would be too accommodating to Moscow,” adds the Los Angeles Times. “Why would Russian President Vladimir Putin want to help Donald Trump win the White House?” asks NPR. “If you want to indulge in a bit of conspiracy theory, remember that Russian President Vladimir Putin has praised candidate Trump as recently as June,” states the Burlington Free Press.
  • Ultimately, here’s the question: If the Russians could access the DNC server, they could certainly access Clinton’s unsecure server. And if they could access Clinton’s server, including the 33,000 emails she deleted (maybe some were about how the Clintons profited from selling American uranium to Russia), ask yourself who they’d rather have in the Oval Office: Donald Trump, who professed admiration for Putin but remains a highly unpredictable individual — or Hillary Clinton, who could be subjected to blackmail for as long as eight years? Russia’s clear objective would be to have the weakest American leadership they can get. Blackmail aside, what would be weaker than an extension of Obama’s presidency?
  • Moreover, it is just as likely a number of the so-called “experts” as well as Clinton’s useful idiot media apparatchiks have considered the blackmail possibility and are trying to divert attention from it with a phony Trump connection story. Democrats can theorize, complain and blame to their hearts' content, but none of it obscures the reality that the DNC — and by extension Hillary Clinton and the entire Democrat Party — are a conglomeration of morally bereft, utterly incompetent individuals wholly ill-equipped to handle internal security, much less national security. And they are aided and abetted by an equally corrupt media, more than willing to abide that potentially catastrophic reality as long as it gets a Democrat in the Oval Office. WikiLeaks has promised additional dumps with be forthcoming. How much deeper Democrats sink is anyone’s guess.
  •  
    "If one lives by the vulnerable server, one dies by the vulnerable server. As the week unfolds, America is witnessing the ultimate unmasking of the Democrat Party, an entity whose self-aggrandizing claims of unity, fairness and intellectual honesty have been revealed as utterly fraudulent by a flood of DNC emails released by WikiLeaks. Moreover, a stunning level of hypocrisy attends the entire exposure, as DNC Chairwoman Debbie Wasserman Schultz is sent packing for this breach of confidential party information, while Hillary Clinton, whose equally accessible private server contained far more critical top-secret information, officially became the party's standard-bearer. But not to worry, assured FBI Director James Comey, who insisted there was no direct evidence that Clinton's server had been hacked by hostile actors - before adding it was possible that hostile actors "gained access" to Clinton's accounts. Clinton was equally adept at making semantical distinctions. "If you go by the evidence, there is no evidence that the system was breached or hacked successfully," Clinton said. "And I think that what's important here is follow the evidence. And there is no evidence. And that can't be said about a lot of other systems, including government systems.""
Paul Merrell

CNN Caught Staging News Segments on Syria With Actors - | Intellihub.com - 0 views

  • The primary “witness” that the mainstream media is using as a source in Syria has been caught staging fake news segments.  Recent video evidence proves that “Syria Danny”, the supposed activist who has been begging for military intervention on CNN, is really just a paid actor and a liar.
  • By pointing out that the mainstream media is orchestrating their entire coverage of this incident, we are not denying that there is a tremendous amount of death and violence in Syria right now.  However, we are showing that the mainstream media version of events is scripted and staged propaganda. The following video shows him contradicting himself while off air, and even asking crew members to “get the gunfire sounds ready” for his video conference with Anderson Cooper on CNN.
  • “Syria Danny” has also appeared on many other news programs, and every single time his story on specific events has changed.
Gary Edwards

Freedom to Fascism - the movie - 0 views

  •  
    "Are you aware the money in your pocket is printed by a private bank? Are you aware the REAL ID law will require you to carry a national identification card? Are you aware that there are plans being developed to have all Americans embedded with a Radio Frequency Identification (RFID) computer chip under their skin so they can be tracked wherever they go? Are you aware the Supreme Court has ruled that the government has no authority to impose a direct unapportioned tax on the labor of the American people, and the 16th Amendment does not give the government that power? Are you aware that computer voting machines can be rigged and there is no way to ensure that vote is counted Our Friend and Hero, Aaron Russo Has Passed Esteemed filmmaker, ardent activist and loyal patriot Aaron Russo lost his battle to cancer on August 24, 2007 at the age of 64. Aaron will be profoundly missed but always remembered. He was a husband, father, friend, mentor, and inspiration to many. Aaron's long list of achievements includes his work in the areas of filmmaking and political activism. His documentary film, "America: From Freedom to Fascism", debunked the justification of both the IRS and the Federal Reserve as well as exposed their crooked basis. This movie received widespread acclaim, including opening to standing ovations at the Cannes Film Festival. Congressman Ron Paul was also featured in the documentary, in which he presents his views on the economy and the Federal Reserve. Aaron's work in the realm of activism proved to be invaluable and selfless. He will be perpetually revered as a true patriot and tireless fighter for our freedom. We must continue to venerate Aaron's legacy as we move forward by honoring his great words: "There are no boundaries one must adhere to when preserving one's liberty"."
Gary Edwards

Dreams From My Real Father (Full Movie) | Before It's News - 0 views

  •  
    Incredible!!  I saw the interview Alex Jones of InfoWars had with Joel Gilbert about his research into the real Barack Housain Davis-Obama.   this is the movies Joel made based on those years of research. Note that Joel's research indicates that Obama's real father is the Marxist Frank Marshall Davis.  Which means he is a natural born citizen.  Albeit one that changed his citizenship when his mother married Sotero, the Indonesian.  Obama never reinstated his lost citizenship, failing to register for the draft at 18 yrs of age.  He also attended  aprivate school in Hawaii and Occidental on a foreign exchange student scholarship. excerpt: Published on Jul 6, 2012 by Rickvsnewworldorder What are the true origins of Obama's life and politics? At age 18, Barack Obama admittedly arrived at Occidental College a committed revolutionary Marxist. What was the source of Obama's foundation in Marxism? Throughout his 2008 Presidential campaign and term in office, questions have been raised regarding Barack Obama's family background, economic philosophy, and fundamental political ideology. Dreams from My Real Father is the alternative Barack Obama "autobiography," offering a divergent theory of what may have shaped our 44th President's life and politics. In Dreams from My Real Father, Barack Obama is portrayed by a voiceover actor who chronicles Barack Obama's life journey in socialism, from birth through his election to the Presidency. The film begins by presenting the case that Barack Obama's real father was Frank Marshall Davis, a Communist Party USA propagandist who likely shaped Obama's world view during his formative years. Barack Obama sold himself to America as the multi-cultural ideal, a man who stood above politics. Was the goat herding Kenyan father only a fairy tale to obscure a Marxist agenda, irreconcilable with American values? This fascinating narrative is based in part on 2 years of research, interviews, newly unearthed footage and photos, and the wr
Paul Merrell

Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks an... - 0 views

  • Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution. The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous. One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
  • Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
  • In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.” “News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.” Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name. The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
  • ...2 more annotations...
  • The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges. In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens. The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)
  • It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”
  •  
    "... the Obama administration urged foreign allies to file criminal charges against Assange over the group's publication of the Afghanistan war logs." Sweden promptly launches an alleged rape investigation and Assange is forced by the UK courts to take refuge in the London embassy of Ecuador. Because of urging by the Obama administration aimed at chilling the the First Amendment rights of journalists. That should be grounds for impeachment.  
Paul Merrell

Interview With Iran Foreign Minister: "The President of the US is Being Pushed into a T... - 0 views

  • Video and Transcript Press TV has conducted an exclusive interview with Iran’s Foreign Minister Mohammad Javad Zarif
  • The use of chemical weapons is a crime, we believe it is a crime against humanity, but we believe that also the use of force, the threat of use of force, is also a criminal offense in international law. Unfortunately it seems to me that the United States seems to be living in the 19th century when the use of force was a prerogative of states, it is not. I believe the United States, the president of the United States, who seems to be a very fine constitutional lawyer, has to look into his law books, his international law books, which he has not, I think, reviewed recently, and consider the fact, that when he concedes, as he did last night before the American people, that there is no imminent or direct threat against the United States, then the United States doesn’t have any standing under any provision of international law, to take law in its own hands.
  • There is a need for the United States to come to the realization, and I believe this is an important realization for the United States, that not only the use of force is illegal, that not only the threat of force is against a preemptory international norm of law, but also and more importantly the use of force is ineffective. Force has lost its utility in international relations and it lost its utility long time ago. In 1928, civilized countries decided to reject the use of force as an instrument of national policy, before then, force or war was an instrument of national policy, they thought that war was diplomacy by another means. But since then, the international community has come to its senses, believing that the use of force doesn’t provide the necessary outcome that those who started it wanted to provide and wanted to produce and that is why they have outlawed the use of force. It is not a bunch of idealistic lawyers who sat down and banned the use of force, but in fact because of the reality that it has lost the utility that. Let me just tell you that in the 20th century, 85 percent of the cases, where a country resorted to force, have resulted in that country either being annihilated or not achieving the intended consequences of the war, so that shows to you empirically that force is no longer effective. I hope that the United States, which is the mightiest country on the face of the earth, would come to this realization that it is important to use other means of influence; force is no longer effective
  • ...4 more annotations...
  • I believe the statement “all options are on the table” is an outdated statement because all options are not on the table, at least for the countries that claim to be law-abiding, for countries that claim to be following the UN charter, for countries which push others to live to their international obligations under the UN charter, push others, who want to punish others for violating internationals law, they have to know that all options are not on the table. The threat or the use of force have been removed from the table long time ago by countries, including the United States when they gathered in San Francisco and decided to save the succeeding generations from the scourge of war, which twice in their generation caused untold misery. So this comes from the charter of the United Nations adopted under the US hospitality in San Francisco in 1945. So, they have to understand that all options are not on the table.
  • Unfortunately a great deal of foreign intervention, a great deal of arms shipment to the various rebel groups, extremist groups, groups that have caused havoc in the region and beyond the region is continuing for very shortsighted interests. They should know that those who help, create and breed extremism in the region [will] fall victim to that extremism. Whether that extremism was that of al-Qaeda, whether it was that of Taliban or that of Saddam Hussein. Those who sponsor them will be their final victims.
  • We have indications and we had shared those indications in the past with the United States and with others that unfortunately, and this is extremely dangerous, the chemical weapons were being smuggled into Syria to groups, armed groups that are fighting the Syrian people and the Syrian government. This was information that we had for some time. A number of arrests have been made earlier this year in the neighboring countries, indicating the fact that this was actually taking place.
  • We alerted them, we told them that this was taking place, we told them and we still tell them that this is a continuing nightmare, chemical weapons in the hands of non-state actors, particularly extremist non-state actors is a threat to everybody. It recognizes no borders, it will become a menace for the entire region and those who help these groups have access to chemical weapons will need to address the question how they are going to deal with that? The addresses are unknown. The possibilities for the use of these chemical weapons are unknown. I am not in the business of fear mongering, I am not in that business but this is a real concern. We need to be able to address this issue and to find a way. Now we are very happy that the Syrians are dealing with some sort of an international arrangement to deal with their chemical weapons, but it is important also at the same time to deal with the weapons that are in the hands of the extremists.
Paul Merrell

Partnership between Facebook and police could make planning protests impossible - RT USA - 0 views

  • A partnership between police departments and social media sites discussed at a convention in Philadelphia this week could allow law enforcement to keep anything deemed criminal off the Internet—and even stop people from organizing protests. A high-ranking official from the Chicago Police Department told attendees at a law enforcement conference on Monday that his agency has been working with a security chief at Facebook to block certain users from the site “if it is determined they have posted what is deemed criminal content,” reports Kenneth Lipp, an independent journalist who attended the lecture. Lipp reported throughout the week from the International Association of Chiefs of Police conference, and now says that a speaker during one of the presentations suggested that a relationship exists between law enforcement and social media that that could be considered a form of censorship. According to Lipp, the unnamed CPD officer said specifically that his agency was working with Facebook to block users’ by their individual account, IP address or device, such as a cell phone or computer.
  •  
    Here's a First Amendment conspiracy civil rights case waiting to happen. Prior restraints on speech are a very big constitutional no-no. When private actors such as Facebook staff conspire with government officials to violate federal rights, they are just as susceptible to a civil rights lawsuit as the government officials are. Query, does Mark Zuckerberg now know how to hire and effectively use competent lawyers? 
Paul Merrell

M of A - U.S. Again Gunning For "Regime Change" In Iraq - 0 views

  • Three days ago we said: The U.S. has conditioned any involvement on the Iraqi government side on a change in its structure towards some "unity government" that would include representatives of the rebellious Sunni strains. Prime Minister Maliki, who received good results in the recent elections, will see no reason to go for that. As expected Maliki declined to follow orders out of Washington DC and he is right to do so. Isn't Iraq supposed to be a sovereign state? No says Washington. It is us who are choosing a new Iraqi prime minister: Over the past two days the American ambassador, Robert S. Beecroft, along with Brett McGurk, the senior State Department official on Iraq and Iran, have met with Usama Nujaifi, the leader of the largest Sunni contingent, United For Reform, and with Ahmad Chalabi, one of the several potential Shiite candidates for prime minister, according to people close to each of those factions, as well as other political figures. “Brett and the ambassador met with Mr. Nujaifi yesterday and they were open about this, they do not want Maliki to stay,” Nabil al-Khashab, the senior political adviser to Mr. Nujaifi, said Thursday.
  • This move lets arouse suspicions that the recent insurgency against the Iraqi state, with ISIS takfiris in the front line, did not just by chance started after Maliki's party, the State of Law Coalition, won in the parliamentary elections a few weeks ago. It had been decided that he had to go. When the elections confirmed him, other methods had to be introduced. Thus the insurgency started and is now used as a pretext for "regime change". The U.S. media and policies again fall for the "big bad man" cliche portraying Nouri al-Maliki (Arabic for Ngo Dinh Diem) as the only person that stands in the way of Iraq as a "liberal democracy". That is of course nonsense. Maliki is not the problem in Iraq: The most significant factor behind Iraq’s problems has been the inability of Iraq’s Sunni Arabs and its Sunni neighbors to come to terms with a government in which the Shias, by virtue of their considerable majority in Iraq’s population, hold the leading role. This inability was displayed early on, when Iraq’s Sunnis refused to take part in Iraq’s first parliamentary elections, and resorted to insurgency almost immediately after the US invasion and fall of Saddam Hussein. All along, the goal of Iraqi Sunnis has been to prove that the Shias are not capable of governing Iraq. Indeed, Iraq’s Sunni deputy prime minister, Osama al Najafi, recently verbalized this view. The Sunnis see political leadership and governance to be their birthright and resent the Shia interlopers.
  • The U.S., with strong support from its GCC allies who finance the insurgency, now seems to again lean towards the Sunni minority side in Iraq and wants to subvert the ruling of a Shia majority and its candidate. Maliki doesn't follow Washington orders, is somewhat friendly with Iran and even wins elections. Such man can not be let standing. So the program is again "regime change" in Iraq, now with the help of Jihadists proxies, even after the recent catastrophic "successes" in similar endeavors in Libya, Egypt and Ukraine and the failure in Syria. Phil Greaves seems thereby right when he characterizes the insurgency and ISIS as a expression of Washington's imperialism: The ISIS-led insurgency currently gripping the western and northern regions of Iraq is but a continuation of the imperialist-sponsored insurgency in neighboring Syria. The state actors responsible for arming and funding said insurgency hold the same principal objectives in Iraq as those pursued in Syria for the last three years, namely: the destruction of state sovereignty; weakening the allies of an independent Iran; the permanent division of Iraq and Syria along sectarian lines establishing antagonistic “mini-states” incapable of forming a unified front against US/Israeli imperial domination. The best thing Maliki could now do is to shut down the U.S. embassy and request support from Russia, China and Iran. South Iraq is producing lots of oil and neither money nor the number of potential recruits for a big long fight are his problem. His problem is the insurgency and the states, including the United States, behind it. The fight would be long and Iraq would still likely be parted but the likely outcome would at least guarantee that the will of the majority constituency can not be ignored by outside actors.
Paul Merrell

How an arrest in Iraq revealed Isis's $2bn jihadist network | World news | The Guardian - 0 views

  • Seizure of 160 computer flash sticks revealed the inside story of Isis, the band of militants that came from nowhere with nothing to having Syrian oil fields and control of Iraq's second city
  •  
    This article has a strong stench of cover story to hide the financing of the Islamic State of Iraq and the Levant (al Sham), known by the acronyms "ISIL" or "ISIS." The essence of the cover story is here: "'They had taken $36m from al-Nabuk alone [an area in the Qalamoun mountains west of Damascus]. The antiquities there are up to 8,000 years old,' the intelligence official said. 'Before this, the western officials had been asking us where they had gotten some of their money from, $50,000 here, or $20,000 there. It was peanuts. Now they know and we know. They had done this all themselves. *There was no state actor at all behind them, which we had long known.* They don't need one.'" To the contrary, it has been long known that financial backing for ISIL has been coming from the governments of Saudi Arabia, United Arab Emirates, and Qatar. Command and control was by the House of Saud's former chief of intelligence,  Bandar Bush. Supply was via Turkey, with the active involvement of the U.S. State Dept. and CIA. A ratline had been run from Benghazi to Turkey to supply them with weapons formerly controlled by the Libyan government before Gadhafi was deposed.   But political pressure has been growing for the Obama Administration to get tough with the Gulf states and force them to stop funding and supplying both ISIL and al-Nusrah to bring the Syrian War to an end. Suddenly, we have an elaborate cover story absolving the Gulf States of guilt in funding ISIL. Over 160 captured thumb drives decrypted by the CIA, with a set of books detailing its funds, their sources, and a complete list of its commanders. All told, with the money supposedly seized from banks in Mosul, we have an ISIL with $2.375 billion in cash, enough to launch a fledgling ISIL national government in the portions of Syria and Iraq that it has captured.        So now those calling on Obama to crack down on the Gulf states to end their funding of ISIL are supposed to accept this story and walk awa
Paul Merrell

The 'Athens Affair' shows why we need encryption without backdoors | Trevor Timm | Comm... - 0 views

  • Just as it seems the White House is close to finally announcing its policy on encryption - the FBI has been pushing for tech companies like Apple and Google to insert backdoors into their phones so the US government can always access users’ data - new Snowden revelations and an investigation by a legendary journalist show exactly why the FBI’s plans are so dangerous. One of the biggest arguments against mandating backdoors in encryption is the fact that, even if you trust the United States government never to abuse that power (and who does?), other criminal hackers and foreign governments will be able to exploit the backdoor to use it themselves. A backdoor is an inherent vulnerability that other actors will attempt to find and try to use it for their own nefarious purposes as soon as they know it exists, putting all of our cybersecurity at risk. In a meticulous investigation, longtime NSA reporter James Bamford reported at the Intercept Tuesday that the NSA was behind the notorious “Athens Affair”. In surveillance circles, the Athens Affair is stuff of legend: after the 2004 Olympics, the Greek government discovered that an unknown attacker had hacked into Vodafone’s “lawful intercept” system, the phone company’s mechanism of wiretapping phone calls. The attacker spied on phone calls of the president, other Greek politicians and journalists before it was discovered. According to Bamford’s story, all this happened after the US spy agency cooperated with Greek law enforcement to keep an eye on potential terrorist attacks for the Olympics. Instead of packing up their surveillance gear, they covertly pointed it towards the Greek government and its people. But that’s not all: according to Snowden documents that Bamford cited, this is a common tactic of the NSA. They often attack the “lawful intercept” systems in other countries to spy on government and citizens without their knowledge:
  • Exploiting the weaknesses associated with lawful intercept programs was a common trick for NSA. According to a previously unreleased top-secret PowerPoint presentation from 2012, titled “Exploiting Foreign Lawful Intercept Roundtable”, the agency’s “countries of interest” for this work included, at that time, Mexico, Indonesia, Egypt and others. The presentation also notes that NSA had about 60 “Fingerprints” — ways to identify data — from telecom companies and industry groups that develop lawful intercept systems, including Ericsson, as well as Motorola, Nokia and Siemens. It’s the exact nightmare scenario security experts have warned about when it comes to backdoors: they are not only available to those that operate them “legally”, but also to those who can hack into them to spy without anyone’s knowledge. If the NSA can do it, so can China, Russia and a host of other malicious actors.
Paul Merrell

Obama administration opts not to force firms to decrypt data - for now - The Washington... - 0 views

  • After months of deliberation, the Obama administration has made a long-awaited decision on the thorny issue of how to deal with encrypted communications: It will not — for now — call for legislation requiring companies to decode messages for law enforcement. Rather, the administration will continue trying to persuade companies that have moved to encrypt their customers’ data to create a way for the government to still peer into people’s data when needed for criminal or terrorism investigations. “The administration has decided not to seek a legislative remedy now, but it makes sense to continue the conversations with industry,” FBI Director James B. Comey said at a Senate hearing Thursday of the Homeland Security and Governmental Affairs Committee.
  • The decision, which essentially maintains the status quo, underscores the bind the administration is in — balancing competing pressures to help law enforcement and protect consumer privacy. The FBI says it is facing an increasing challenge posed by the encryption of communications of criminals, terrorists and spies. A growing number of companies have begun to offer encryption in which the only people who can read a message, for instance, are the person who sent it and the person who received it. Or, in the case of a device, only the device owner has access to the data. In such cases, the companies themselves lack “backdoors” or keys to decrypt the data for government investigators, even when served with search warrants or intercept orders.
  • The decision was made at a Cabinet meeting Oct. 1. “As the president has said, the United States will work to ensure that malicious actors can be held to account — without weakening our commitment to strong encryption,” National Security Council spokesman Mark Stroh said. “As part of those efforts, we are actively engaged with private companies to ensure they understand the public safety and national security risks that result from malicious actors’ use of their encrypted products and services.” But privacy advocates are concerned that the administration’s definition of strong encryption also could include a system in which a company holds a decryption key or can retrieve unencrypted communications from its servers for law enforcement. “The government should not erode the security of our devices or applications, pressure companies to keep and allow government access to our data, mandate implementation of vulnerabilities or backdoors into products, or have disproportionate access to the keys to private data,” said Savecrypto.org, a coalition of industry and privacy groups that has launched a campaign to petition the Obama administration.
  • ...3 more annotations...
  • To Amie Stepanovich, the U.S. policy manager for Access, one of the groups signing the petition, the status quo isn’t good enough. “It’s really crucial that even if the government is not pursuing legislation, it’s also not pursuing policies that will weaken security through other methods,” she said. The FBI and Justice Department have been talking with tech companies for months. On Thursday, Comey said the conversations have been “increasingly productive.” He added: “People have stripped out a lot of the venom.” He said the tech executives “are all people who care about the safety of America and also care about privacy and civil liberties.” Comey said the issue afflicts not just federal law enforcement but also state and local agencies investigating child kidnappings and car crashes — “cops and sheriffs . . . [who are] increasingly encountering devices they can’t open with a search warrant.”
  • One senior administration official said the administration thinks it’s making enough progress with companies that seeking legislation now is unnecessary. “We feel optimistic,” said the official, who spoke on the condition of anonymity to describe internal discussions. “We don’t think it’s a lost cause at this point.” Legislation, said Rep. Adam Schiff (D-Calif.), is not a realistic option given the current political climate. He said he made a recent trip to Silicon Valley to talk to Twitter, Facebook and Google. “They quite uniformly are opposed to any mandate or pressure — and more than that, they don’t want to be asked to come up with a solution,” Schiff said. Law enforcement officials know that legislation is a tough sell now. But, one senior official stressed, “it’s still going to be in the mix.” On the other side of the debate, technology, diplomatic and commerce agencies were pressing for an outright statement by Obama to disavow a legislative mandate on companies. But their position did not prevail.
  • Daniel Castro, vice president of the Information Technology & Innovation Foundation, said absent any new laws, either in the United States or abroad, “companies are in the driver’s seat.” He said that if another country tried to require companies to retain an ability to decrypt communications, “I suspect many tech companies would try to pull out.”
Gary Edwards

NY Fed Under Geithner Implicated in Lehman Accounting Fraud Allegation « nak... - 0 views

  •  
    Quite a few observers, including this blogger, have been stunned and frustrated at the refusal to investigate what was almost certain accounting fraud at Lehman. Despite the bankruptcy administrator's effort to blame the gaping hole in Lehman's balance sheet on its disorderly collapse, the idea that the firm, which was by its own accounts solvent, would suddenly spring a roughly $130+ billion hole in its $660 balance sheet, is simply implausible on its face. Indeed, it was such common knowledge in the Lehman flailing about period that Lehman's accounts were sus that Hank Paulson's recent book mentions repeatedly that Lehman's valuations were phony as if it were no big deal. Well, it is folks, as a newly-released examiner's report by Anton Valukas in connection with the Lehman bankruptcy makes clear. The unraveling isn't merely implicating Fuld and his recent succession of CFOs, or its accounting firm, Ernst & Young, as might be expected. It also emerges that the NY Fed, and thus Timothy Geithner, were at a minimum massively derelict in the performance of their duties, and may well be culpable in aiding and abetting Lehman in accounting fraud and Sarbox violations. We need to demand an immediate release of the e-mails, phone records, and meeting notes from the NY Fed and key Lehman principals regarding the NY Fed's review of Lehman's solvency. If, as things appear now, Lehman was allowed by the Fed's inaction to remain in business, when the Fed should have insisted on a wind-down (and the failed Barclay's said this was not infeasible: even an orderly bankruptcy would have been preferrable, as Harvey Miller, who handled the Lehman BK filing has made clear; a good bank/bad bank structure, with a Fed backstop of the bad bank, would have been an option if the Fed's justification for inaction was systemic risk), the NY Fed at a minimum helped perpetuate a fraud on investors and counterparties. This pattern further suggests the Fed, which by its
Gary Edwards

What Is Bitcoin - 0 views

  •  
    That GOLD! app for iOS and Android is looking pretty good :)  C'mon Tino.  Now is the time.  Link to Priced-in-gold (http://pricedingold.com) excerpt: You may be dreaming of a gold backed dollar, or just everyone carrying around clinking gold coins in their pockets, but a rising community has a different idea. It's called Bitcoin, and it's a peer-to-peer currency that can be used to exchange goods and services online, digital and otherwise, without fees. In order to get Bitcoins, you need to exchange other currencies for Bitcoins (like dollars, euros, or pounds) at places like Mt.Gox. You can also sell goods and services online for Bitcoins. Some examples of Bitcoin stores include online gaming credits, pet wear, and coffee (more examples here). OR, you can create a new 'block,' which is a series of transactions, and you will receive 50 bitcoins. This is very rare, however, and the value of creating a new block will decrease over time. The idea behind Bitcoin is that it is a peer-to-peer exchange system, with an established and predictable rate of currency production. The creation of bitcoins is restricted by an algorithm, so the currency's worth cannot be modified by any actor (banks, central banks, treasuries). Individuals are involved in "mining" for Bitcoins, but it is extremely costly and requires significant computing power. Bitcoins could theoretically act as a store of value in the event of further inflation and devaluation of the U.S. dollar or other currencies.
Paul Merrell

BOSTON WRONG: Marathon Bombing Evidence "As Seen on TV" - WhoWhatWhy - 0 views

  • The story of the Boston Marathon Bombing is rife with contradictions, canards, misconceptions and blatant untruths. Boston Wrong is part of WhoWhatWhy’s attempt to set the record straight. This is the first in an occasional series of articles debunking the faulty stories and “facts” which persist, despite evidence to the contrary. *** Verbal intimations by government officials and a TV re-enactment have given some potential Boston Marathon bombing jurors the mistaken belief they have seen a video of suspect Dzhokhar Tsarnaev setting down a bomb-laden backpack in front of a restaurant. There’s just one problem: that footage has never been made available to the public. During jury selection on Jan. 26, Juror 186 said she believes Tsarnaev is guilty because of the “surveillance video from Lord & Taylor,” a department store across the street from the Forum restaurant. Early media reports suggested that the store’s dome surveillance camera captured Tsarnaev dropping his backpack at the spot of the second explosion.
  • What the public has seen, however, is a re-creation of the footage in a made-for-TV docudrama by National Geographic called “Inside the Hunt for the Boston Bombers.” While the movie provides a disclaimer that some of the video has been re-created for effect, the purposefully grainy footage of an actor playing Tsarnaev doesn’t specifically mention that it’s a recreation. In fact, an Arizona production company filmed the re-enactment on a Phoenix street using extras and other actors.
  • Tsarnaev’s attorneys have filed three motions asking that the trial be moved outside of Boston because of pre-trial publicity, arguing that Tsarnaev can’t get a fair hearing in the city. More than 68 percent of the potential jurors already think he’s guilty. That kind of lopsided number is no surprise when all the evidence some jurors need to convict is a made-for-TV docudrama.
Paul Merrell

What's the big deal between Russia and the Saudis? - RT Op-Edge - 0 views

  • Amidst the wilderness of mirrors surrounding the Syrian tragedy, a diamond-shaped fact persists: Despite so many degrees of separation, the Saudis are still talking to the Russians. Why? A key reason is because a perennially paranoid House of Saud feels betrayed by their American protectors who, under the Obama administration, seem to have given up on isolating Iran.
  • From the House of Saud’s point of view, three factors are paramount. 1) A general sense of ‘red alert’ as they have been deprived from an exclusive relationship with Washington, thus becoming incapable of shaping US foreign policy in the Middle East; 2) They have been mightily impressed by Moscow’s swift counter-terrorism operation in Syria; 3) They fear like the plague the current Russia-Iran alliance if they have no means of influencing it.
  • That explains why King Salman’s advisers have pressed the point that the House of Saud has a much better chance of checking Iran on all matters - from “Syraq” to Yemen - if it forges a closer relationship with Moscow. In fact, King Salman may be visiting Putin before the end of the year.
  • ...6 more annotations...
  • One of the untold stories of the recent Syria-driven diplomatic flurry is how Moscow has been silently working on mollifying both Saudi Arabia and Turkey behind the scenes. That was already the case when the foreign ministers of US, Russia, Turkey and Saudi Arabia met before Vienna.Vienna was crucial not only because Iran was on the table for the first time but also because of the presence of Egypt – incidentally, fresh from recent discovery of new oil reserves, and engaging in a reinforced relationship with Russia.The absolute key point was this paragraph included in Vienna’s final declaration: “This political process will be Syrian-led and Syrian-owned, and the Syrian people will decide the future of Syria.”It’s not by accident that only Russian and Iranian media chose to give the paragraph the appropriate relevance. Because this meant the actual death of the regime change obsession, much to the distress of US neocons, Erdogan and the House of Saud.
  • The main point is the death of the regime change option, brought about by Moscow. And that leaves Putin free to further project his extremely elaborate strategy. He called Erdogan on Wednesday to congratulate him on his and the AKP’s election landslide. This means that now Moscow clearly has someone to talk to in Ankara. Not only about Syria. But also about gas.Putin and Erdogan will have a crucial energy-related meeting at the G20 summit on November 15 in Turkey; and there’s an upcoming visit by Erdogan to Moscow. Bets are on that the Turk Stream agreement will be – finally – reached before the end of the year. And on northern Syria, Erdogan has been forced to admit by Russian facts on the ground and skies that his no-fly zone scheme will never fly.
  • That leaves us with the much larger problem: the House of Saud.There’s a wall of silence surrounding the number one reason for Saudi Arabia to bomb and invade Yemen, and that is to exploit Yemen’s virgin oil lands, side by side with Israel – no less. Not to mention the strategic foolishness of picking a fight with redoubtable warriors such as the Houthis, which have sowed panic amidst the pathetic, mercenary-crammed Saudi army.Riyadh, following its American reflexes, even resorted to recruiting Academi – formerly Blackwater - to round up the usual mercenary suspects as far away as Colombia.It was also suspected from the beginning, but now it's a done deal that the responsible actor for the costly Yemen military disaster is none other than Prince Mohammad bin Salman, the King’s son who, crucially, was sent by his father to meet Putin face-to-face.
  • Meanwhile, Qatar will keep crying because it was counting on Syria as a destination point for its much-coveted gas pipeline to serve European customers, or at least as a key transit hub on the way to Turkey.Iran on the other hand needed both Iraq and Syria for the rival Iran-Iraq-Syria gas pipeline because Tehran could not rely on Ankara while it was under US sanctions (this will now change, fast). The point is Iranian gas won’t replace Gazprom as a major source for the EU anytime soon. If it ever did, or course, that would be a savage blow to Russia.
  • In oil terms, Russia and the Saudis are natural allies. Saudi Arabia cannot export natural gas; Qatar can. To get their finances in order – after all even the IMF knows they are on a highway to hell - the Saudis would have to cut back around ten percent of production with OPEC, in concert with Russia; the oil price would more than double. A 10 percent cutback would make a fortune for the House of Saud.So for both Moscow and Riyadh, a deal on the oil price, to be eventually pushed towards $100 a barrel, would make total economic sense. Arguably, in both cases, it might even mean a matter of national security.But it won’t be easy. OPEC’s latest report assumes a basket of crude oil to be quoted at only $55 in 2015, and to rise by $5 a year reaching $80 only by 2020. This state of affairs does not suit either Moscow or Riyadh.
  • Meanwhile, fomenting all sorts of wild speculation, ISIS/ISIL/Daesh still manages to collect as much as $50 million a month from selling crude from oilfields it controls across “Syraq”, according to the best Iraq-based estimates.The fact that this mini-oil caliphate is able to bring in equipment and technical experts from “abroad” to keep its energy sector running beggars belief. “Abroad” in this context means essentially Turkey – engineers plus equipment for extraction, refinement, transport and energy production.One of the reasons this is happening is that the US-led Coalition of the Dodgy Opportunists (CDO) – which includes Saudi Arabia and Turkey - is actually bombing the Syrian state energy infrastructure, not the mini oil-Caliphate domains. So we have the proverbial “international actors” in the region de facto aiding ISIS/ISIL/Daesh to sell crude to smugglers for as low as $10 a barrel.Saudis – as much as Russian intel - have noted how ISIS/ISIL/Daesh is able to take over the most advanced US equipment that takes months to master, and instead integrate it into their ops at once. This implies they must have been extensively trained. The Pentagon, meanwhile, sent and will be sending top military across “Syraq” with an overarching message: if you choose Russia we won’t help you.ISIS/ISIL/Daesh, for their part, never talks about freeing Jerusalem. It’s always about Mecca and Medina.
  •  
    Pepe Escobar brings us up to speed on big changes in the Mideast, including the decline of U.S. influence. Not mentioned, but the Saudis' feelings of desertion by the Washington Beltway and its foreplay with Russia could bring about an end to the Saudis insistence on being paid for oil in U.S. dollars, and there goes the western economy. 
Gary Edwards

STRATFOR George Friedman predictions for the future - Business Insider - 1 views

  •  
    excellent read with lots of non political reality based thinking. good stuff, even if you disagree. "George Friedman founded Strategic Forecasting in 1996. Stratfor's existence is based on the controversial but now influential premise that geopolitical events can be anticipated and even predicted in ways that can benefit private-sector actors. Friedman stayed at the pioneering political-risk firm until May 2015, when he left to found a new company called Geopolitical Futures. Friedman is a commentator on international affairs and author of the book "The Next 100 Years." He spoke to Business Insider earlier this month about the future of war, the next stage in the European debt crisis, and how and whether it's even possible to predict what's coming next. This interview has been edited for length and clarity."
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
1 - 20 of 88 Next › Last »
Showing 20 items per page