Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Belgium

Rss Feed Group items tagged

Gary Edwards

The Great Deceiver - The Federal Reserve - 0 views

  • From November 2013 through January 2014 Belgium with a GDP of $480 billion purchased $141.2 billion of US Treasury bonds. Somehow Belgium came up with enough money to allocate during a 3-month period 29 percent of its annual GDP to the purchase of US Treasury bonds. Certainly Belgium did not have a budget surplus of $141.2 billion. Was Belgium running a trade surplus during a 3-month period equal to 29 percent of Belgium GDP? No, Belgium's trade and current accounts are in deficit. Did Belgium's central bank print $141.2 billion worth of euros in order to make the purchase? No, Belgium is a member of the euro system, and its central bank cannot increase the money supply. So where did the $141.2 billion come from?
  • There is only one source. The money came from the US Federal Reserve, and the purchase was laundered through Belgium in order to hide the fact that actual Federal Reserve bond purchases during November 2013 through January 2014 were $112 billion per month. In other words, during those 3 months there was a sharp rise in bond purchases by the Fed. The Fed's actual bond purchases for those three months are $27 billion per month above the original $85 billion monthly purchase and $47 billion above the official $65 billion monthly purchase at that time. (In March 2014, official QE was tapered to $55 billion per month and to $45 billion for May.) Why did the Federal Reserve have to purchase so many bonds above the announced amounts and why did the Fed have to launder and hide the purchase? Some country or countries, unknown at this time, for reasons we do not know dumped $104 billion in Treasuries in one week.
  • What are the reasons for this deception by the Federal Reserve?
  • ...6 more annotations...
  • The Fed realized that its policy of Quantitative Easing initiated in order to support the balance sheets of "banks too big to fail" and to lower the Treasury's borrowing cost was putting pressure on the US dollar's value. Tapering was a way of reassuring holders of dollars and dollar-denominated financial instruments that the Fed was going to reduce and eventually end the printing of new dollars with which to support financial markets. The image of foreign governments bailing out of Treasuries could unsettle the markets that the Fed was attempting to soothe by tapering.
  • Its wars and hundreds of overseas military bases could not be financed.
  • Washington's power ultimately rests on the dollar as world reserve currency. This privilege, attained at Bretton Woods following World War 2, allows the US to pay its bills by issuing debt. The world currency role also gives the US the power to cut countries out of the international payments system and to impose sanctions.
  • As impelled as the Fed is to protect the large banks that sit on the board of directors of the NY Fed, the Fed has to protect the dollar. That the Fed believed that it could not buy the bonds outright but needed to disguise its purchase by laundering it through Belgium suggests that the Fed is concerned that the world is losing confidence in the dollar. If the world loses confidence in the dollar, the cost of living in the US would rise sharply as the dollar drops in value. Economic hardship and poverty would worsen. Political instability would rise. If the dollar lost substantial value, the dollar would lose its reserve currency status. Washington would not be able to issue new debt or new dollars in order to pay its bills.
  • A hundred billion dollar sale of US Treasuries is a big sale. If the seller was a big holder of Treasuries, the sale could signal the bond market that a big holder might be selling Treasuries in large chunks. The Fed would want to keep the fact and identity of such a seller secret in order to avoid a stampede out of Treasuries. Such a stampede would raise interest rates, collapse US financial markets, and raise the cost of financing the US debt. To avoid the rise in interest rates, the Fed would have to accept the risk to the dollar of purchasing all the bonds. This would be a no-win situation for the Fed, because a large increase in QE would unsettle the market for US dollars.
  • The withdrawal from unsustainable empire would begin. The rest of the world would see this as the silver lining in the collapse of the international monetary system brought on by the hubris and arrogance of Washington.
  •  
    Incredible.  Since 2009, the Fed has been pumping $85 Billion per month into the Wall Street hedge funds of it's member banks.  Economist Paul Craig Roberts noticed some funny business the past few months regarding the Fed's numbers.  It turns out that while the Fed has been trying to convince the world that they are tapering off on their $85 Billion per month debt printing spree, the truth is just the opposite.  They have increased the debt spree to $112 Billion per month; with the help of a secret money laundering operation involving Belgium! Incredible!
Paul Merrell

Belgium on "Red Alert": Gov Suspects Terrorist Attack including Chemical Weapon - nsnbc... - 0 views

  • The Belgian OCAM Crisis Center and the government raised the country’s “terror alert” to the highest level, warning about the imminent risk for a terrorist attack. The measure comes one week after the attacks in Paris that claimed 129 lives and injured hundreds. Experts warn about the possible use of a chemical weapon.
  • The OCAM and the Belgian government announced a “red alert” for Brussels and the region around Brussels, warning that a serious terrorist attack may be imminent. The Belgian Interior Ministry issued a statement, saying: “The analysis shows a serious and imminent threat requiring specific security measures as well as detailed recommendations to the population.” The Belgian capital resembles a city under siege with police and military deployed while a large number of citizens have been scared into staying at home and avoiding public places as much as possible. The OCAM, in fact, called on residents in Brussels and the region around the city to avoid crowded places including transport hubs.
  • Several Belgian security analysts warned about the risk of the possible use of an improvised chemical weapon. Within this context it is noteworthy that chemical weapons attacks in Syria, especially that in the Damascus suburb East Ghouta, has been proven to have been carried out by the Saudi Arabian intelligence asset Liwa-al-Islam. The attack implicated the highest levels of Saudi and US governments, military and intelligence services. Belgium hosts the headquarters of the North Atlantic Treaty Organization (NATO / OTAN) as well as the European Union (EU). Belgian officials declined to provide additional information about the alleged imminent threat, stating that there was a need for time to allow for the ongoing police and judicial investigation to take its course. Hours before the announcement of the “red alert” authorities charged a third “unnamed” suspect who had been arrested the day before for involvement in the terrorist attacks in Paris on Friday, November 13.
Paul Merrell

Belgium sues Facebook over illegal Privacy Violations of Users and Non-Users | nsnbc in... - 0 views

  • The Belgian government will be suing Facebook. The Commission for the Protection of Privacy states that Facebook violates Belgian and EU law by tracking systems that target both Facebook users as well as non-Facebook users. Facebook is known for cooperating with the U.S.’ National Security Agency. 
  • The Belgian privacy watchdog’s case against the internet giant Facebook will be heard at a court in Brussels on Thursday. The Commission has repeatedly requested that Facebook should comply with Belgian and EU law. Facebook failed to comply, and the Commission has no power to enforce the law; hence the decision to sue Facebook to attain a a court ruling. The President of the Commission for the Protection of Privacy, Willem Debeuckelaere, told the press that: “Facebook treats its users’ private lives without respect and that needs tackling. It’s not because we want to start a lawsuit over this, but we cannot continue to negotiate through other means. .. We want a judge to impose our recommendations. These recommendations are chiefly aimed at protecting internet users who are not Facebook members.”
  • The Belgian privacy watchdog alleges that Facebook tracks the web browsing of all visitors, including those who have specifically turned the tracking function off; This gathering of private information allegedly also includes those who do not have a Facebook account. Moreover, the Commission claims that Facebook has the capability to surveil computers without consent, even when users are logged out; and Facebook can monitor every PC of users that use websites with Facebook plugins. The capability to monitor both Facebook users and non-Facebook users allegedly functions via Cookies that store information about user’s internet activities, including preferential settings of websites and which websites internet users have visited. The Commission claims that Facebook installs these Cookies on all computers that visit websites that for example have a Facebook plugin to share internet content. That includes the computers of persons who do not make use of Facebook’s “share” or “like” button.
  • ...1 more annotation...
  • In other words, Facebook has the capacity to monitor your browser settings as well as which websites you have visited if you have read this article or any other article on any website that contains a Facebook “share” button, whether you “like” it or not. The Commissions lawsuit against Facebook is or particular importance due to the fact that the corporation is known for its cooperation with the United States’ National Security Agency (NSA). While the lawsuit is of particular interest for Belgian and EU citizens, it also sheds light on Facebook’s monitoring of U.S. citizens.
Paul Merrell

Tzipi Livni cancels Brussels trip amid threat of arrest | Israel News | Al Jazeera - 0 views

  • Israel's former foreign minister cancelled a trip to Brussels after Belgian prosecutors confirmed they wanted to question her over war crimes allegations. Tzipi Livni was expected to meet Jewish leaders in the city on Monday, but cancelled ahead of time. A spokesman for the event said Livni cancelled for "personal reasons" but local newspaper Le Soir said prosecutors had been hoping to question her over allegations of war crimes in the 2008-9 Israeli war in Gaza, when she was foreign minister. "We wanted to take advantage of her visit to try to advance the investigation," a spokesman for Belgium's federal prosecutor Thierry Werts told the AFP news agency. Livni is named along with other political and military leaders in a complaint filed in June 2010 over alleged crimes committed during the Gaza war. More than 1,400 Palestinians, mostly civilians, died during the Israeli offensive between December 27, 2008 to January 18, 2009. 
  • Belgian authorities have the right to detain a suspect in its territory on crimes related to international law, as one of the victims had Belgian citizenship. The Belgian federal prosecutor's office believes Livni, now a member of parliament and opposition leader, is not protected by immunity.
  • The Belgian-Palestinian Association supporting the complaint said in a statement it wanted to hold Livni responsible for her role in the war, as well as Ehud Olmert and Ehud Barak, then prime minister and minister of defence. In December 2009, Livni cancelled a visit to London after being informed that she was the subject of an arrest warrant issued by a UK court over her role in the same war. An Israeli foreign ministry spokesman said the planned interrogation was "a cheap publicity stunt with no legal basis".
  •  
    High Israeli officials are not safe from arrest for war crimes outside Israel.
Paul Merrell

Brussels Attack: Implications of Alleged ISIS Links - nsnbc international | nsnbc inter... - 0 views

  • Just days after arresting French-born Belgium national  and terror suspect Salah Abdeslam in Brussels, a coordinated terror attack unfolded in the very same city, killing at least 28, and injuring many more.
  • NBC News has already  announced that European officials are linking the attack to ISIS, though it is unclear whether or not Abdeslam’s network – which carried out the November 2015 Paris terror attacks – was directly involved.
  • Police in Brussels were still hunting for several other alleged accomplices of Abdeslam, including Najim Laachraoui and Mohamed Abrini. Laachraoui and Abrini, like virtually every other suspect involved in a string of terrorist attacks across North America, Europe, and Australia, were well known to Western security agencies, having both been documented as having traveled to Syria to fight against Damascus under ISIS, with Abrini having been arrested and jailed several times in the past, and Laachraoui already having a 2014 international arrest warrant issued for him in connection to a trial involving recruiting Europeans to fight for ISIS.
  • ...5 more annotations...
  • In other words, all of the suspects have been under the nose, on the radar, and in the prisons of Western security agencies on and off for years, yet were still able to carry out at least one high profile terrorist attack – possibly two, and with the vast majority of the suspects involved having traveled to Syria to fight alongside ISIS before inexplicably being allowed to re-enter Europe and rejoin society without consequence – as if inviting them to take their extremism to the next level.
  • The Guardian’s “Brussels attack: were they revenge for Abdeslam’s arrest?,” attempted to link the bombings in Brussels to the arrest of Abdeslam and the Paris attack terror network. The op-ed acknowledges that these terrorist attacks are being carried out by locals – Europeans – using local resources. Should the Brussels attack be linked to this same terror network, it will greatly complicate efforts by some to leverage this tragedy to further their agendas against refugees and even to change the dynamics of the war in Syria itself. Europeans are clearly already being radicalized and then leaving to Syria to fight alongside ISIS and then returning – rather than a torrent of foreigners streaming in from abroad and carrying out violence against European targets. Should the Brussels attack turn out to be the work of this ISIS-linked terror group, considering the familiarity European security agencies had with all the suspects long before even the 2015 Paris attacks, indicates criminal negligence at best, and complicity at worst.
  • ISIS’ own alleged agenda of transforming the world into a “caliphate” is cartoonishly absurd. In reality, it is clear that ISIS shows up and exercises force in regions of the world the US and its allies cannot intervene in directly. This includes North Africa, the Middle East, and even as far as Asia. Far from a “conspiracy theory,” it would be the US’ own Defense Intelligence Agency (DIA) that would admit as much in a leaked 2012 report (.pdf) which stated: If the situation unravels there is the possibility of establishing a declared or undeclared Salafist principality in eastern Syria (Hasaka and Der Zor), and this is exactly what the supporting powers to the opposition want, in order to isolate the Syrian regime, which is considered the strategic depth of the Shia expansion (Iraq and Iran). To clarify just who these “supporting powers” were that sought the creation of a “Salafist” (Islamic) principality” (State), the DIA report explains: The West, Gulf countries, and Turkey support the opposition; while Russia, China, and Iran support the regime.
  • Between this admission, and an earlier exposé in 2007 by veteran journalist Seymour Hersh in his New Yorker piece titled, “The Redirection” where US and Saudi plans to use Al Qaeda to wage proxy war on Syria and Iran were revealed, it is clear that both Al Qaeda and ISIS are being used by the West to wage war on Damascus, Baghdad, Tehran, and even Moscow. ISIS supply lines clearly, even admittedly run from NATO territory in Turkey where the US and its regional allies have categorically failed to interdict them and even appear to be aiding and abetting the flow of men and materiel into ISIS-held territory in Syria and Iraq. These supply lines are what has allowed pressure to be continuously placed upon Damascus and its allies over the past 5 years in ways nonexistent “moderate rebels” couldn’t.
  • In Indonesia, as Jakarta clearly began re-balancing toward Beijing, ISIS carried out its first deadly attack on the Southeast Asian nation. Thailand’s similar re-balancing also prompted threats from the US that an “ISIS attack” was imminent. In Europe, where the flames of a “clash of civilizations” are being furiously and intentionally fanned, ISIS serves as a constant implement to empower extremists on both sides, while drowning out the voices of unity, moderation, and peace in the middle. It allows for a growing police state and xenophobic tendencies to flourish at home, while justifying further war abroad. While some Western newspapers are already trying to frame the Belgium attack as “incompetence” by European security agencies, there must be a better explanation as to why this “war with ISIS” continues to drag on, when the source of ISIS’ fighting capacity appears to be within rather than beyond the West – and aiding rather than opposing Western special interests.
  •  
    Reeks of a false flag attack.
Gary Edwards

GAO Audit: Fed Gave $16 Trillion in Emergency Loans to Bankster Cartel! - 0 views

  •  
    The U.S. Federal Reserve gave out $16.1 trillion in emergency loans to U.S. and foreign financial institutions between Dec. 1, 2007 and July 21, 2010, according to figures produced by the government's first-ever audit of the central bank. Last year, the gross domestic product of the entire U.S. economy was $14.5 trillion. Of the $16.1 trillion loaned out, $3.08 trillion went to financial institutions in the U.K., Germany, Switzerland, France and Belgium, the Government Accountability Office's (GAO) analysis shows. Additionally, asset swap arrangements were opened with banks in the U.K., Canada, Brazil, Japan, South Korea, Norway, Mexico, Singapore and Switzerland. Twelve of those arrangements are still ongoing, having been extended through August 2012. Out of all borrowers, Citigroup received the most financial assistance from the Fed, at $2.5 trillion. Morgan Stanley came in second with $2.04 trillion, followed by Merill Lynch at $1.9 trillion and Bank of America at $1.3 trillion. The audit also found that the Fed mostly outsourced its lending operations to the very financial institutions which sparked the crisis to begin with, and that they delegated contracts largely on a no-bid basis. The GAO report recommends new policies that would eliminate such conflicts of interest, and suggests that in the future the Fed should keep better records of their emergency decision-making process.
Gary Edwards

America's Terrorism Fear Factory Rolls On | The National Interest - 0 views

  • n her review of Risen’s book in the New York Times, Louise Richardson lauds his criticism of “the profligacy of government agencies and the ‘over-sight free zone’ they operated” as well as of “self-appointed terrorism experts” who promote fear “while drawing lucrative consulting contracts for themselves.
  • She is troubled, however, that Risen “makes no mention of the press,” which she considers a key member of the terrorism industry and “at least as guilty as others in his book of stirring up public anxiety for public gain.”             
  • Fear-mongering by officials and by the media is politically (and economically) understandable, but it is also decidedly irresponsible. Especially when public safety is the concern, it is vital to get the threats right and to evaluate counterterrorism measures in a systematic and coherent manner. Money and effort spent to deal with lesser threats is money unavailable for dealing with greater ones.     
  •  
    ""Fear sells," points out journalist James Risen in his recent book, Pay Any Price.             There was a great deal of selling on ABC's "Good Morning America" on Friday. Segueing neatly from a report on raids against terrorists in Belgium, host George Stephanopoulos noted that "fears in Europe are matched by growing anxiety here about homegrown terror." He then stoked those anxieties as he introduced a segment on an apparently current "sting operation to stop a radicalized young man planning a deadly attack on our nation's Capitol."            Only at the end of the "exclusive" report, and in passing, was it noted that the plot actually took place three years ago. And nowhere was it pointed out that the man had overstayed his visitor's visa by 12 years (and therefore could have been deported at any time), that he had been evicted from his apartment in Virginia, or that FBI operatives had paid him $5,700 for living expenses and provided him with every scrap of weaponry he possessed. Also unmentioned: FBI informants had promised to pay the man's destitute parents in Morocco up to $1,000 a month after he killed himself in the process of detonating a small (FBI-provided) bomb in a ludicrous mission to bring down the Capitol dome. The average monthly household income in Morocco is less than $600.              It is often assumed that, even without the FBI's aid, a determined homegrown terrorist would eventually find someone else to supply him with his required weaponry. However, as Trevor Aaronson observes in his book, The Terror Factory, there has never "been a single would-be terrorist in the United States who has become operational through a chance meeting with someone able to provide the means for a terrorist attack." Only the police and FBI have been able to supply that service.             In his book, Risen skewers what he calls the "homeland security-industrial complex." American leaders, he
Paul Merrell

MH17: Malaysia's Barring from Investigation Reeks of Cover-up | nsnbc international - 0 views

  • It was a Malaysian jet, carrying Malaysian passengers, flown by Malaysian pilots, yet after Malaysia Airlines flight MH17 was shot down over Ukraine in July 2014, Malaysia has been systematically blocked from participating in the investigation, leaving an overwhelmingly pro-NATO bloc in charge of the evidence, investigation and outcome as well as the manner in which the investigation will be carried out. Despite the integral role Malaysia has played during several pivotal moments in the aftermath of the disaster, it appears that the closer to the truth the investigation should be getting, the further Malaysia itself is being pushed from both the evidence and any influence it has on the likely conclusions of the investigation. With the downed aircraft in question being Malaysian, Malaysia as a partner in the investigation would seem a given. Its exclusion from the investigation appears to be an indication that the investigation’s objectivity has been compromised and that the conclusions it draws will likely be politically motivated.
  • With the Dutch leading the investigation, the logic being that the flight originated from the Netherlands and the majority of the passengers were Dutch, it has formed a Joint Investigation Team (JIT). At the onset of its creation it seemed obvious that Malaysia would too be included, considering it lost the second largest number of citizens to the disaster and the plane itself was registered in Malaysia. Instead, JIT would end up comprised of Belgium, Ukraine, and Australia, specifically excluding Malaysia. Malaysia was both surprised and has protested its exclusion from JIT, and has repeatedly expressed a desire to be included directly in the investigation.
  • The Malaysian Insider cited Malaysian scholar Dr. Chandra Muzaffar who believes the decision to exclude his country from the investigation is politically motivated, aiming at excluding members that may urge caution and objectivity instead of draw conclusions first and bend the investigation’s results around those conclusions. In particular, Dr. Muzaffar believes that the investigations is intentionally being skewed to target Russia. Ukraine’s involvement in the investigation is particularly troublesome. Had MH17 crashed in Ukraine under different circumstances, Ukraine’s role would be welcome. However, it was apparently shot down specifically in a conflict in which Kiev itself is a participant. With both sides of the conflict possessing anti-aircraft weapons and with Kiev itself confirmed to possess weapons capable of reaching the altitude MH17 was flying at when it was allegedly hit, Kiev becomes a possible suspect in the investigation. Kiev’s inclusion in JIT represents a monumental conflict of interest.
  • ...3 more annotations...
  • And to compound this already glaring conflict of interest, it was revealed recently that an alleged “secret deal” was struck by JIT in which any member could bar the release of evidence. With all members of JIT being pro-NATO and decidedly arrayed against Moscow, such a “deal” could prevent crucial evidence from being revealed that would effect an otherwise distorted conclusion drawn by the investigators aimed specifically at advancing their greater political agenda in Eastern Europe. Had Malaysia been a member of JIT, the ability of other members to withhold evidence would have been greatly diminished and it is likely such a bizarre deal would not have been conceivable, real or imaged, in the first place.
  • With the ongoing conflict in Ukraine perceived as a proxy war between NATO and Moscow, JIT’s membership including the NATO-backed Kiev regime itself (a possible suspect), two NATO members (Belgium and the Netherlands) and Australia who has passed sanctions against Russia over the conflict, is a textbook case of conflict of interest.
  • To casual observers, the current investigation led by NATO members and Kiev, a possible suspect, would be no different than the Donetsk People’s Republic and Russia leading it. Few would consider a DPR or Russian led investigation impartial, and few should see a NATO-led investigation as impartial. Had Malaysia been included in the process, an argument could have been made that an actual investigation was taking place rather than a complex propaganda campaign. Malaysia’s exclusion is a troubling sign for the victims of the MH17 disaster, meaning the true culprits will never be known. The overt politically motivated nature of the investigation will on one hand  help fuel NATO’s propaganda war, but on the other hand, fuel the doubts of millions worldwide over the true events that took place in the skies of eastern Ukraine that day. Like so many other events in human history that took place amid a high stake political struggle, the downing of MH17 will be shrouded in mystery, mystery draped over the truth by the irresponsible leadership of NATO, and those in Washington, London and Brussels egging on the conflict in Ukraine to this very day.
Paul Merrell

Paris: Made in Libya, not Syria? | Asia Times - 0 views

  • Using the criterion cui bono (who benefits?) to the Paris outrage, one notes an apparent shortage of “bono” to ISIL, unless the thinking of the leadership runs to: “It would be an excellent idea to focus the fury of the West upon us here in Iraq instead of laying low and letting the West go along with the GCC/Turkish plan of quagmiring Russia in Syria.” Doesn’t make too much sense.  Which is why, in my opinion, is why you see a lot of metaphysical hand waving that the real motive for the attacks was to erase the Muslim “grey zone,” provoke a fatal over-reaction from the West, contribute to the agonies of the Syrian refugees in Europe, rend the time-space continuum and thereby bring the Crusaders to their knees, etc.
  • Media and analyst coverage appears determined to overlay a profitable traffic-building and mission-enhancing narrative of “Western civilization under attack by ISIL,” and ignore the factors that point to the attack as a murderous local initiative, not by ISIL or the mythical immigrant threat, but by alienated Muslim citizens of the EU.  The rhetoric of righteous, united fury against a monstrosity committed by the external “other,” perhaps, is easier to digest than the awkward theme of national minorities committing extreme acts of violence against societies they believe oppress and marginalize them. So we get lots about the horrors of ISIL and relatively little about the, to me, rather eye-opening statistic that while 8% of the population of France is Muslim, it is estimated that 70% of the prison population is.  I suppose it would be churlish to explore the issue of blowback from French penal and social policies at this juncture.  But there is some interesting data that places the alleged and now apparently deceased mastermind, Abdelhamid Abaaoud, in context concerning the degree of his allegiance to ISIL.
  • Katibat al-Battar al-Libi, in other words, was formed as a rather bloody piece of outreach by Libyan Islamists to share Libya experience in insurrection and revolution with Syria.  After IS arose and became a dominant military and financial force, the “KBL” threw in their lot with ISIS, and members of the brigade subsequently returned to Libya to establish an IS beachhead. A July 2015 study by Small Arms Survey confirms the autonomous character of Katibat al-Battar al-Libi. While the uncertain relationship between JAN and IS was being clarified, Libyans stayed ‘outside’ the fray, remaining in their own units and not integrating into other IS hierarchies or command structures. In Latakia for instance, Libyans kept their own separate battalion (The Daily Star, 2013). As the split between JAN and IS deepened, Libyans chose IS but remained apart, forming the Katibat al-Battar al-Libiya (KBL) (The Libyan al-Battar Brigade), under the auspices of IS. Since its formation, the KBL has been active in eastern Syria, notably in Al Hasakah and Deir az-Zor. The battalion maintained links with Ansar al-Sharia in Libya, an early and prominent supporter of IS. Ansar al-Sharia proved to be an excellent recruiting tool and played a role in the arrival of many Libyans in Syria prior to 2014. And who is Ansar al-Sharia in Libya?  Via The Telegraph:
  • ...3 more annotations...
  • Abaaoud, a citizen of Belgium of Moroccan descent, was well known as a violent radical miscreant linked to an Islamic cell in Verviers, Belgium, that did all sorts of mean, murderous crap.  As far as Belgian and French authorities were concerned, he had been an item long before Paris.
  • Washington believes the group is responsible for the 2012 attack on the US consulate in Benghazi that killed the ambassador and three other Americans.  In November, the United Nations blacklisted Ansar al-Sharia Benghazi and its sister group, Ansar al-Sharia Derna, over links to Al-Qaeda and for running camps for the Islamist State group.  So there you have your soundbite.  The Paris outrage: Made in Libya.  Not Syria.  And brought to us by the people who killed Christopher Stevens in Benghazi. I am sure that Hillary Clinton is grateful to the French police for botching the raid to capture Abaaoud and pumping 5000 rounds into his apartment instead of capturing him; otherwise, he might have become a lively topic of interest and curiosity and the right wing could have cooked off the Benghazi! munitions through election day.  For that matter, it seems unlikely that the governments of the West, or the media cheerleaders thirsting for a rousing good vs. evil narrative, are very interested in exploring the morally fraught issue of blow back from the spectacular Libyan disaster, either. To sum up: the alleged and now reportedly deceased architect of the Paris attacks, Abdelhamid Abaaoud, did not fight “for IS.”  He fought “with” Katibat al-Battar al-Libi, a Libyan outfit whose presence in Syria predates that of ISIS.  Even after Katibat al-Battar al-Libi decided to pledge allegiance to ISIS, it retained its independent identity.  And it would appear unlikely that Abaaoud, as a European of Moroccan descent, would be a central figure in the brigade, whose personnel, funding, and mission seem to have largely emanated from Libya.
  • Despite his seemingly junior status in an autonomous militia, it is possible that Abaaoud was recruited by al-Baghdadi to commit the Paris outrage.  But foreign fighters flock to Syria not only to accumulate general jihadi merit, but also to acquire skills they could apply in their own struggles.  And Abaaoud may have gone to the Syrian war zone to hook up with an extremely capable Libyan outfit and acquire the experience and connections to fulfill his own ambitions for mayhem in Europe, and not necessarily to support the global or even local objectives of the IS caliphate.  So it is by no means axiomatic that Abaaoud returned to Europe with the mission to execute a high-level ISIS strategy. Instead, Abaaoud might have been an angry guy with the skills, resources, and inclination to commit mass murder on his own kick.  The police were already after him big time after the Verviers raid in January (we are now told that Abaaoud was “on” or a “candidate for” a spot on the drone assassination assignment list, but I wonder if this is post-hoc ass-covering).  So maybe he and his friends decided to pull the pin, and go out in a big way. I doubt we’ll ever get the full story.  But “Paris: Made in Libya” is an honest hook.
  •  
    So the "mastermind" of the Paris attacks was a product of the U.S. war on Libya, not of ISIL. Why am I not surprised? 
Paul Merrell

'We have no future!' EU anger unites millions in protest (PHOTOS, VIDEO) - RT - 0 views

  • Massive anti-austerity strikes and protests swept across Europe as millions took to the streets to express their frustration over rising unemployment and dire economic prospects. Many rallies ended with violent clashes with police. Workers marched in 23 countries across Europe to mark the European Day of Action and Solidarity.General strikes had been called in Spain and Portugal, paralyzing public services and international flights, in Belgium and France transport links were partially disrupted by strikes and demonstrations, in Italy and Greece thousands of workers and students marched through the streets.
  • The Europe-wide strike action, the largest in a series of protests against the austerity policies, was coordinated by the European Trade Union Confederation (ETUC)
kiranmatkar

Jayalalithaa's Legacy: Industrial, Social, Crime Rankings Among India's Best - 1 views

http://www.indiaspend.com/cover-story/jayalalithaas-legacy-industrial-social-crime-rankings-among-indias-best-21065 Tamil Nadu's 19th chief minister (she was also the 11th, 14th, 16th and 18th) J ...

Jayalalithaa Jayalalithaa-news Tamil-Nadu's-19th-chief-minister

started by kiranmatkar on 06 Dec 16 no follow-up yet
Paul Merrell

NSA infected 50,000 computer networks with malicious software - nrc.nl - 0 views

  • The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this. A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software. One example of this type of hacking was discovered in September 2013 at the Belgium telecom provider Belgacom. For a number of years the British intelligence service - GCHQ – has been installing this malicious software in the Belgacom network in order to tap their customers’ telephone and data traffic. The Belgacom network was infiltrated by GCHQ through a process of luring employees to a false Linkedin page.
  • The NSA computer attacks are performed by a special department called TAO (Tailored Access Operations). Public sources show that this department employs more than a thousand hackers. As recently as August 2013, the Washington Post published articles about these NSA-TAO cyber operations. In these articles The Washington Post reported that the NSA installed an estimated 20,000 ‘implants’ as early as 2008. These articles were based on a secret budget report of the American intelligence services. By mid-2012 this number had more than doubled to 50,000, as is shown in the presentation NRC Handelsblad laid eyes on.
  • Cyber operations are increasingly important for the NSA. Computer hacks are relatively inexpensive and provide the NSA with opportunities to obtain information that they otherwise would not have access to. The NSA-presentation shows their CNE-operations in countries such as Venezuela and Brazil. The malware installed in these countries can remain active for years without being detected.
  • ...1 more annotation...
  • The malware can be controlled remotely and be turned on and off at will. The ‘implants’ act as digital ‘sleeper cells’ that can be activated with a single push of a button. According to the Washington Post, the NSA has been carrying out this type of cyber operation since 1998.
  •  
    Nice interactive graphic too. 
Paul Merrell

Racism, Colonialism And Exceptionalism - 0 views

  • "What makes America different, what makes us exceptional, is that we are dedicated to act." (Barak Obama, speech, September, 2013)
  • It seems to be possible for nations, and the majority of their citizens, to commit the worst imaginable atrocities, including torture, murder and genocide, while feeling that what they are doing is both noble and good.. Some understanding of how this is possible can be gained by watching the 3-part BBC documentary, “The History of Racism”.
  • Looking at the BBC documentary we can see how often in human history economic greed and colonial exploitation have been justified by racist theories. The documentary describes almost unbelievable cruelties committed against the peoples of the Americas and Africa by Europeans. For example, in the Congo, a vast region which which King Leopold II of Belgium claimed as his private property, the women of villages were held as hostages while the men were forced to gather rubber in the forests. Since neither the men nor the women could produce food under these circumstances, starvation was the result. Leopold's private army of 90,000 men were issued ammunition, and to make sure that the used it in the proper way, the army was ordered to cut off the hands of their victims and send them back as proof that the bullets had not been wasted. Human hands became a kind of currency, and hands were cut off from men, women and children when rubber quotas were not fulfilled. Sometimes more than a thousand human hands were gathered in a single day. During the rule of Leopold, roughly 10,000,000 Congolese were killed, which was approximately half the population of the region. According to the racist theories that supported these atrocities, it was the duty of philanthropic Europeans like Leopold to bring civilization and the Christian religion to Africa. Similar theories were used to justify the genocides committed by Europeans against the native inhabitants of the Americas. Racist theories were also used to justify enormous cruelties committed by the British colonial government in India. For example, during the great famine of 1876-1878, during which ten million people died, the Viceroy, Lord Lytton, oversaw the export to England of a record 6.4 million hundredweight of wheat.
  • ...1 more annotation...
  • Meanwhile, in Europe,almost everyone was proud of the role which they were playing in the world. All that they read in newspapers and in books or heard from the pulpits of their churches supported the idea that they were serving the non-Europeans by bringing them the benefits of civilization and Christianity. Kipling wrote: “Take up the White Man's burden, Send forth the best ye breed, Go bind your sons to exile, To serve your captives' need; To wait in heavy harness, On fluttered folk and wild, Your new-caught, sullen peoples, Half-devil and half-child.” On the whole, the mood of Europe during this orgy of external cruelty and exploitation, was self-congratulatory. Can we not see a parallel with the self-congratulatory mood of the American people and their allies, who export violence to the whole world, but who think of themselves as “exceptional”?
Paul Merrell

Al Qaeda: The Database | Global Research - 0 views

  • This article originally published by Global Research in 2005 sheds light on the nature of Al Qaeda, an intelligence construct used by Washington to destabilize and destroy sovereign countries, while sustaining the illusion of  an outside enemy, which threatens the security of the Western World.
  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . .
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.” “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat.
  • ...5 more annotations...
  • “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world. “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
  • This article originally published by Global Research in 2005 sheds light on the nature of Al Qaeda, an intelligence construct used by Washington to destabilize and destroy sovereign countries, while sustaining the illusion of  an outside enemy, which threatens the security of the Western World. *       *       * Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . .
  • “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
Paul Merrell

EU to Label Products Made in Illegal Settlements - International Middle East Media Center - 0 views

  • The European Union (EU) will soon begin to mark the products of Israeli settlements, according to the Associated Press.
  • According to Al Ray, the EU had frozen its decision to put marks on settlements products under the pressure of the United States, in 2013, but this move was restored again and approved by 13 European countries. The report added that 16 foreign ministers of EU demanded in less than two months, to go forward with procedures to mark settlement products in European marketing networks. The foreign ministers assured that the continued expansion of illegal settlements in the occupied Palestinian territories, and in other areas occupied by "Israel" in 1967, threatens the chances of reaching a final and fair peace deal. European diplomats said that "after the Israeli elections, and in the light of Prime Minister Benjamin Netanyahu's latest statements against two-state solution, it was decided to renew the initiative of marking the Israeli products ." The Belgian Foreign Minister, Dedea Rendr, is the initiator of the draft letter, according to the diplomats.
  • In 2014, Belgium published instructions obliging the marketing networks to mark the agricultural products of settlements in the occupied West Bank, the Golan Heights and East Jerusalem. To be noted, German Foreign Minister Frank-Walter Steinmeier is the only one of the five major foreign ministers of European countries who did not sign the letter.
  •  
    See also http://nsnbc.me/2015/06/14/eu-to-label-products-made-in-illegal-settlements/ This has set off some fireworks on Capitol Hill.
Paul Merrell

Al Qaeda: The Database | Global Research - Centre for Research on Globalization - 0 views

  • Shortly before his untimely death, former British Foreign Secretary Robin Cook told the House of Commons that “Al Qaeda” is not really a terrorist group but a database of international mujaheddin and arms smugglers used by the CIA and Saudis to funnel guerrillas, arms, and money into Soviet-occupied Afghanistan. Courtesy of World Affairs, a journal based in New Delhi, WMR can bring you an important excerpt from an Apr.-Jun. 2004 article by Pierre-Henry Bunel, a former agent for French military intelligence. “I first heard about Al-Qaida while I was attending the Command and Staff course in Jordan. I was a French officer at that time and the French Armed Forces had close contacts and cooperation with Jordan . . . “Two of my Jordanian colleagues were experts in computers. They were air defense officers. Using computer science slang, they introduced a series of jokes about students’ punishment. “For example, when one of us was late at the bus stop to leave the Staff College, the two officers used to tell us: ‘You’ll be noted in ‘Q eidat il-Maaloomaat’ which meant ‘You’ll be logged in the information database.’ Meaning ‘You will receive a warning . . .’ If the case was more severe, they would used to talk about ‘Q eidat i-Taaleemaat.’ Meaning ‘the decision database.’ It meant ‘you will be punished.’ For the worst cases they used to speak of logging in ‘Al Qaida.’
  • “In the early 1980s the Islamic Bank for Development, which is located in Jeddah, Saudi Arabia, like the Permanent Secretariat of the Islamic Conference Organization, bought a new computerized system to cope with its accounting and communication requirements. At the time the system was more sophisticated than necessary for their actual needs. “It was decided to use a part of the system’s memory to host the Islamic Conference’s database. It was possible for the countries attending to access the database by telephone: an Intranet, in modern language. The governments of the member-countries as well as some of their embassies in the world were connected to that network. “[According to a Pakistani major] the database was divided into two parts, the information file where the participants in the meetings could pick up and send information they needed, and the decision file where the decisions made during the previous sessions were recorded and stored. In Arabic, the files were called, ‘Q eidat il-Maaloomaat’ and ‘Q eidat i-Taaleemaat.’ Those two files were kept in one file called in Arabic ‘Q eidat ilmu’ti’aat’ which is the exact translation of the English word database. But the Arabs commonly used the short word Al Qaida which is the Arabic word for “base.” The military air base of Riyadh, Saudi Arabia is called ‘q eidat ‘riyadh al ‘askariya.’ Q eida means “a base” and “Al Qaida” means “the base.”
  • “In the mid-1980s, Al Qaida was a database located in computer and dedicated to the communications of the Islamic Conference’s secretariat. “In the early 1990s, I was a military intelligence officer in the Headquarters of the French Rapid Action Force. Because of my skills in Arabic my job was also to translate a lot of faxes and letters seized or intercepted by our intelligence services . . . We often got intercepted material sent by Islamic networks operating from the UK or from Belgium. “These documents contained directions sent to Islamic armed groups in Algeria or in France. The messages quoted the sources of statements to be exploited in the redaction of the tracts or leaflets, or to be introduced in video or tapes to be sent to the media. The most commonly quoted sources were the United Nations, the non-aligned countries, the UNHCR and . . . Al Qaida. “Al Qaida remained the data base of the Islamic Conference. Not all member countries of the Islamic Conference are ‘rogue states’ and many Islamic groups could pick up information from the databases. It was but natural for Osama Bin Laden to be connected to this network. He is a member of an important family in the banking and business world.
  • ...3 more annotations...
  • “Because of the presence of ‘rogue states,’ it became easy for terrorist groups to use the email of the database. Hence, the email of Al Qaida was used, with some interface system, providing secrecy, for the families of the mujaheddin to keep links with their children undergoing training in Afghanistan, or in Libya or in the Beqaa valley, Lebanon. Or in action anywhere in the battlefields where the extremists sponsored by all the ‘rogue states’ used to fight. And the ‘rogue states’ included Saudi Arabia. When Osama bin Laden was an American agent in Afghanistan, the Al Qaida Intranet was a good communication system through coded or covert messages.
  • “Al Qaida was neither a terrorist group nor Osama bin Laden’s personal property . . . The terrorist actions in Turkey in 2003 were carried out by Turks and the motives were local and not international, unified, or joint. These crimes put the Turkish government in a difficult position vis-a-vis the British and the Israelis. But the attacks certainly intended to ‘punish’ Prime Minister Erdogan for being a ‘toot tepid’ Islamic politician. ” . . . In the Third World the general opinion is that the countries using weapons of mass destruction for economic purposes in the service of imperialism are in fact ‘rogue states,” specially the US and other NATO countries. ” Some Islamic economic lobbies are conducting a war against the ‘liberal” economic lobbies. They use local terrorist groups claiming to act on behalf of Al Qaida. On the other hand, national armies invade independent countries under the aegis of the UN Security Council and carry out pre-emptive wars. And the real sponsors of these wars are not governments but the lobbies concealed behind them. “The truth is, there is no Islamic army or terrorist group called Al Qaida. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the ‘TV watcher’ to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US and the lobbyists for the US war on terrorism are only interested in making money.”
  • In yet another example of what happens to those who challenge the system, in December 2001, Maj. Pierre-Henri Bunel was convicted by a secret French military court of passing classified documents that identified potential NATO bombing targets in Serbia to a Serbian agent during the Kosovo war in 1998. Bunel’s case was transferred from a civilian court to keep the details of the case classified. Bunel’s character witnesses and psychologists notwithstanding, the system “got him” for telling the truth about Al Qaeda and who has actually been behind the terrorist attacks commonly blamed on that group. It is noteworthy that that Yugoslav government, the government with whom Bunel was asserted by the French government to have shared information, claimed that Albanian and Bosnian guerrillas in the Balkans were being backed by elements of “Al Qaeda.” We now know that these guerrillas were being backed by money provided by the Bosnian Defense Fund, an entity established as a special fund at Bush-influenced Riggs Bank and directed by Richard Perle and Douglas Feith. French officer Maj. Pierre-Henri Bunel, who knew the truth about “Al Qaeda” — Another target of the neo-cons.
Joseph Skues

America: No Vacation Time For You | NEWS JUNKIE POST - 0 views

  • In the richest country in the world, there is no right to any vacation time
  • In most other wealthy nations, there are between 20-35 vacation days per year (4-7 weeks).
  • 1 in 4 private-sector workers in the US do not receive any paid vacation or paid holidays
  • ...22 more annotations...
  • *The average paid vacation + paid holidays provided to U.S. workers in the private sector (15) is less than the minimum required by law in nearly every other rich country
  • 69% of low wage workers have vacation
  • 36% of part time workers have any paid vacation
  • The United States is the only advanced economy in the world that does not guarantee its workers paid vacation.
  • but most of the rest of the world’s rich countries offer between five and 13 paid holidays per year.
  • For example, the average lower-wage worker (less than $15 per hour) with a vacation benefit received only 10 days of paid vacation per year in 2005, compared to 14 days of paid vacation for higher-wage workers with paid vacations. If we look at all workers ? those who receive paid vacations and those who don’t ? the vacation gap between lower-wage and higher-wage workers is even larger: only 7 days for lower-wage workers, compared to 13 days for higher-wage workers.
  • we also note that several foreign countries offer additional time off for younger and older workers, shift workers, and those engaged in community service including jury duty.
  • Three countries even mandate that employers pay vacationing workers a small premium above their standard pay in order to help with vacation-related expenses
  • Our analysis does not cover paid leave for other reasons such as sick leave, parental leave, or leave to care for sick relatives.
  • A 2007 report by the World Tourism Organization cataloged a sampling of nations to compare and contrast figures of the average number of vacation days offered: Italy 42 days France 37 days Germany 35 days Brazil 34 days United Kingdom 28 days Canada 26 days Korea 25 days Japan 25 days U.S. 13 days
  • Even Koreans who work hundreds of more hours per year than Americans average nearly twice the number of paid vacation days
  • On the other side of the scale, people in The Netherlands work hundreds of hours less per year than Americans,  and averaged 45 paid days off at one time (recent data not available).
  • One in six workers in the US are unable to take any vacation days for various reasons (usually due to workload), with some people going for years without taking their offered time off.
  • They calculate this to be worth $19.3 billion a year to their employers.
  • And 53% of respondents did not know that US employees receive considerably less annual vacation time than their counterparts in other industrialized countries.
  • The research firm Ipsos
  • lists the percentage of people in the following countries that used the full amount of their offered paid vacation time: France: 89 percent Argentina: 80 percent Hungary: 78 percent Britain: 77 percent Spain: 77 percent Saudi Arabia: 76 percent Germany: 75 percent Belgium: 74 percent Turkey: 74 percent Indonesia: 70 percent Mexico: 67 percent Russia: 67 percent Italy 66 percent Poland: 66 percent China: 65 percent Sweden: 63 percent Brazil: 59 percent India: 59 percent Canada: 58 percent United States: 57 percent South Korea: 53 percent Australia: 47 percent South Africa: 47 percent Japan: 33 percent Why the discrepancy?  Kathleen E. Christensen, the founder of the Workplace, Work Force and Working Families program at the Alfred P. Sloan Foundation and author of the book Workplace Flexibility: Realigning 20th-Century Jobs for a 21st-Century Workforce, states
  • Many of these countries have strong labor unions and the workers are more protected than in the U.S.”
  • Ironic that the country with the largest economy and greatest wealth in the world does not require any vacation time for the workers who create the wealth with their labor.  When paid annual and holiday leave is offered, it is less than half of what most other countries receive, and of that almost half of Americans do not use all of their days.
  • addition to our finding that the United States is the only country in the group that does not require employers to provide paid vacation time, we also note that several foreign countries offer additional time off for younger and older workers, shift workers, and those engaged in community service including jury duty
  • addition to our finding that the United States is the only country in the group that does not require employers to provide paid vacation time, we also note that several foreign countries offer additional time off for younger and older workers, shift workers, and those engaged in community service including jury duty
  • n addition to our finding that the United States is the only country in the group that does not require employers to provide paid vacation time, we also note that several foreign countries offer additional time off for younger and older workers, shift workers, and those engaged in community service including jury duty.
Paul Merrell

Justice for the MH17 victims is what we all need | Oriental Review - 0 views

  • After keeping a meaningful two-month pause in covering the course of investigation of the MH17 tragedy, the international press has suddenly broke into another wave of baseless accusations against “pro-Russia separatists”, triggered by a “secret report” made by the BND (Bundesnachrichtendienst, German foreign intelligence) for the Bundestag Control Committee on October 8, 2014. Ten days later the Spiegel alleged that at the meeting the BND president Gerhard Schindler had provided “satellite images and diverse photo evidence” to back up his case “proving that pro-Russian separatists captured a BUK air defense missile system at a Ukrainian military base and fired a missile on July 17 that exploded in direct proximity to the Malaysian aircraft”. The allegation was immediately caught up by a number of other top international media. On October 20 Alexander Nerad’ko, the director of Russia’s Federal Air Transport Agency, invited the German intelligence to publish documentation demonstrating the involvement of the insurgents or the Ukrainian army in the disaster. Unfortunately, his request is not met till now. Ironically, one day before BND presented its report to Bundestag, the former Dutch Foreign Affairs Minister Frans Timmermans has casually let out that “the body of one passenger was found wearing an oxygen mask”.
  • This piece of information trashes the theory (which we used to hold too) of a shoot down by a surface-to-air missile as in this case the instantaneous depressurization of the MH17 passenger cabin would cause immediate death of all passengers. Both Western and Russian experts understand that serious conclusions on the causes of MH17 tragedy should be based on professional forensic study of the wreckage and damaging elements. All available technical data from Ukrainian dispatch lines, surveillance by Russia and USA, information of the Ukrainian Air Defense and Boeing Corporation should be made available for the International MH17 investigation commission. All other “leakages” are pointless talks and deceitful manipulation of the public opinion. E.g. the British barrister Alexander Mercouris has provided a detailed analysis depicting numerous controversies in the German report (as least in its clauses leaked to the press).
  • The Russian experts has already gathered all available data and released the Incident Report on MH17 tragedy back in mid-August this year. Its full text in English is available here.
  • ...1 more annotation...
  • Of course, there are plenty of parties interested in concealing the real facts about flight MH17. Symptomatically, on August 8, 2014 the Ukraine, the Netherlands, Belgium and Australia signed a non-disclosure agreement on the crash investigation. Procrastination and delaying of an objective investigation by these sides and international organizations raises doubts whether the concerned parties will make public the findings and true circumstances of the crash of the Malaysia Airlines Boeing 777. Are the relatives of those who died in the flight MH17 the only interested people in bringing the real perpetrators of this horrible criminal act to justice?
  •  
    The point using the body found wearing an oxygen mark ruling out a surface to air missile because of instant cabin depressurization is a very strong point. Another sign pointing to the Ukraine fighter jet shooting out the cockpit, instantly killing the cockpit crew through depressurization, but the plane continuing to fly on autopilot for a period of time before the passenger cabin depressurized. 
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Paul Merrell

Hold the front page: Spain's anti-Google lobbyists lobby for Google News return * The R... - 0 views

  • Anti-Google lobby group the AEDE, which represents publishers in Spain, has asked the country's government to prevent the ad giant from shuttering its news-scraping service. The volte-face comes after Mountain View threatened on Thursday to kill Google News in Spain, because it argued that a clumsy, new intellectual property law was bad for business. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_business/front&sz=300x250%7C300x600&tile=3&c=33VI4CoKwQrMoAADx4lg4AAANB&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_business/front&sz=300x250%7C300x600&tile=3&c=33VI4CoKwQrMoAADx4lg4AAANB&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""> </a> That legislation, expected to be implemented in the new year, will tackle any website that links to pirated content. The law would allow the AEDE (Association of Editors of Spanish Dailies) to charge content aggregators like Google and Yahoo! for any snippets of news that they publish. Additionally, authorities will be granted powers to fine websites up to €600,000 for linking to pirated content.
  • Google News boss Richard Gingras griped about the tax on the multi-billion-dollar corporation in a blog post on 11 December, in which he said: [S]adly, as a result of a new Spanish law, we’ll shortly have to close Google News in Spain. Let me explain why. This new legislation requires every Spanish publication to charge services like Google News for showing even the smallest snippet from their publications, whether they want to or not. As Google News itself makes no money (we do not show any advertising on the site) this new approach is simply not sustainable. So it’s with real sadness that on 16 December (before the new law comes into effect in January) we’ll remove Spanish publishers from Google News, and close Google News in Spain. Now, the AEDE has asked the Spanish government to try to prevent Google's exit. “AEDE requires the intervention of Spanish and community authorities, and competition authorities, to effectively protect the rights of citizens and companies,” it said.
  • A spokeswoman at the lobby group told The Spain Report that the AEDE had not asked "Google to take a step backwards, we’ve always been open to negotiations with Google”. She reportedly added: “Google has not taken a neutral stance". “Of course they are free to close their business, but one thing is the closure of Google News and quite another the positioning in the general index.” Publishers in Spain are no doubt panicking about the prospect of their web traffic plummeting if Google does pull the plug on its news service next week.
  • ...1 more annotation...
  • Belgium and most recently Germany have failed to bring in a law that protects intellectual works, while taxing Google for its news-scraping tactics. It would seem that it's now the turn of Spanish publishers to have a bad news day.
  •  
    As expected.
1 - 20 of 37 Next ›
Showing 20 items per page