Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Bundle

Rss Feed Group items tagged

Paul Merrell

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com - 0 views

  • It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords, briefly locking out the FBI until it gained back control. The new details emerged in local press reports from a Thursday bail hearing in Dublin, Ireland, where Marques, 28, is fighting extradition to America on charges that Freedom Hosting facilitated child pornography on a massive scale. He was denied bail today for the second time since his arrest in July. Freedom Hosting was a provider of turnkey “Tor hidden service” sites — special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network. Tor hidden services are used by sites that need to evade surveillance or protect users’ privacy to an extraordinary degree – including human rights groups and journalists. But they also appeal to serious criminal elements, child-pornography traders among them.
  • On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the Tor Browser Bundle, reporting back to a mysterious server in Northern Virginia. The FBI was the obvious suspect, but declined to comment on the incident. The FBI also didn’t respond to inquiries from WIRED today. But FBI Supervisory Special Agent J. Brooke Donahue was more forthcoming when he appeared in the Irish court yesterday to bolster the case for keeping Marques behind bars, according to local press reports. Among the many arguments Donahue and an Irish police inspector offered was that Marques might reestablish contact with co-conspirators, and further complicate the FBI probe. In addition to the wrestling match over Freedom Hosting’s servers, Marques allegedly dove for his laptop when the police raided him, in an effort to shut it down.
  • The apparent FBI-malware attack was first noticed on August 4, when all of the hidden service sites hosted by Freedom Hosting began displaying a “Down for Maintenance” message. That included at least some lawful websites, such as the secure email provider TorMail. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address. By midday, the code was being circulated and dissected all over the net. Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. Though many older revisions of Firefox were vulnerable to that bug, the malware only targeted Firefox 17 ESR, the version of Firefox that forms the basis of the Tor Browser Bundle – the easiest, most user-friendly package for using the Tor anonymity network. That made it clear early on that the attack was focused specifically on de-anonymizing Tor users. Tor Browser Bundle users who installed or manually updated after June 26 were safe from the exploit, according to the Tor Project’s security advisory on the hack.
  • ...2 more annotations...
  • Perhaps the strongest evidence that the attack was a law enforcement or intelligence operation was the limited functionality of the malware. The heart of the malicious Javascript was a tiny Windows executable hidden in a variable named “Magneto.” A traditional virus would use that executable to download and install a full-featured backdoor, so the hacker could come in later and steal passwords, enlist the computer in a DDoS botnet, and generally do all the other nasty things that happen to a hacked Windows box. But the Magneto code didn’t download anything. It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
  • The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway. The code’s behavior, and the command-and-control server’s Virginia placement, is also consistent with what’s known about the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007. Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor. Prior to the Freedom Hosting attack, the code had been used sparingly, which kept it from leaking out and being analyzed.
  •  
    Taking down the entire Freedom Hosting service because some content was kiddie porn is reminiscent of the U.S. government's proxy take-down of Mega-Upload in New Zealand. Such actions that disable legitimate users or deny access to their data are in my opinion violative of the 1st and 4th Amendments.  It suppresses the Freedom of Speech and seizes more than the 4th Amendment allows.  That our own government would use malware for surveillance purposes under any circumstance is just plain chilling.
Gary Edwards

A Government Failure, Not a Market Failure - WSJ.com - 0 views

  •  
    Excerpt: After 2000, the national push toward home ownership intensified in three dimensions, leading to a doubling of housing prices in just five years' time. First, the Federal Reserve Board's interest-rate policy drove down the cost of borrowing money to unprecedented lows. Second, a common conviction arose that home ownership should be available even to those who, under prevailing conditions, could not afford it. Finally, private agencies charged with determining the risk and value of securities were exceptionally generous in their assessment of the financial products known as "derivatives" whose collateral resided in the value of thousands of mortgages bundled together. The rating agencies understated the risks from these bundled mortgages by assuming that home prices were simply going to rise forever. When the housing bubble burst in 2006, the damage to the financial system pushed the global economy into the worst contraction since the Great Depression. In the midst of the pain and suffering that have accompanied financial collapse and economic contraction-over $15 trillion in wealth has been lost by American households alone while, to date, more than 6 million job losses have boosted the unemployment rate to 9.4 percent-much of the blame has been placed on unregulated financial markets whose behavior is said to have revealed a terrible flaw in the foundation of capitalism itself. This was a market failure, we are told, and the promise of capitalism has always been that the self-correcting mechanisms built into the system would preclude the possibility of a systemic market failure. But the housing bubble only burst after government subsidies pushed house prices up so fast that marginal buyers could no longer afford to chase prices even higher. A bubble created by rigged financial markets and a government-sponsored obsession with home ownership is not a result of market failure, but rather, a result of bad public policy. The belief that home ownership,
Gary Edwards

Google Reader - garylyn's shared items - 0 views

  •  
    Still experimenting with Google Reader "Shared Settings".  This is a public page of ALL my gReader items tagged "Shared".  Banksters is a sub group in this "Bundle".  
Gary Edwards

The Farce-Hole Gets Deeper: Obama's "Bankster Robo-Settlement For Votes" Cost To Taxpay... - 1 views

  •  
    Incredible.  The Banksters were caught perpetrating a massive fraud on mortgage holders in default.  They set up document mills packed with "robo" signers forging legal documents to prove in a foreclosure procedure that they are in fact the mortgage provider for that property.  The fraud itself revelas the essentials of what went wrong with the entire mortgage securities scam that brought down the worlds financial structures in 2008. The MERS (Mortgage Electronic Registration systems, Inc.) electronic database was set up in 1995 as a means to enable participating Banksters to side step the quilt of State and County laws governing real estate transactions, non judicial foreclosure rights, and property ownership recording requirements.  MERS was essential to the bundling and trade in mortgage-backed securities.  In essence, MERS replaced public recordation requirements with a private, Bankster owned one. This all sounded good until waves of home owners facing default began to take their banksters to court.  Turns out that MERS mortgages lacked the legal documentation to establish a legal chain of ownership.  Realizing their mistake, and with thousands upon thousands of foreclosures hanging in the balance, the Banksters created the robo document industry, forging millions of foreclosure documents overnight.  Criminal fraud on steroids. The banksters got caught, with State Attorney Generals launching massive consumer protection law suits against the big banksters.  This put a halt to the illegal foreclosures, forcing banksters to turn to short sales on homes in default.  The short sale industry rocketed in 2011, but the to perfect a short sale, the banksters were taking the loss; sometimes as much as $100K to $250K per home.  But the real estate market inventory was effectively being cleared and market pricing corrected. The Banksters were unhappy.  Seeking to get back on the foreclosure track but facing what amounted to across the boards class action la
Gary Edwards

J.P. Morgan Chase's Ugly Family Secrets Revealed | Matt Taibbi | Rolling Stone - 0 views

  •  
    Socialist blogger and Rolling Stone Magazine journalist Matt Taibi has made a career out of exposing Banksters and their criminal activities causing the 2008 collapse of the global financial industry.  Here he sights a story in American Banker that fully demonstrates the depths of depravity and criminal activities that continues to characterize big Banksters. The mortgage-foreclosure-robo signing scandal is just the tip of the ice berg.  Matt recounts the story of Linda Almonte, a JP Morgan Chase employee in charge of Credit Card debt bundling.  It's horrific. Money shot: The financial crash wouldn't have happened if even a slim plurality of financial executives had done what Linda Almonte did, i.e. simply refuse to sign off on a bogus transaction. If companies had merely upheld their own stated policies and stayed within the ballpark of the law, none of these messes could have accumulated: fraudulent mortgages wouldn't have been sold, families wouldn't have been foreclosed upon based on robo-signed documentation, investors wouldn't have been duped into buying huge packets of "misrepresented assets." ............. excerpt: In a story that should be getting lots of attention, American Banker has released an excellent and disturbing exposé of J.P. Morgan Chase's credit card services division, relying on multiple current and former Chase employees. One of them, Linda Almonte, is a whistleblower whom I've known since last September; I'm working on a recount of her story for my next book. One of the things we were promised by the lawmakers who passed the Dodd-Frank reform bill a few years back is that this would be a new era for whistleblowers who come forward to tell the world about problems in our financial infrastructure. This story now looms as a test case for that proposition. American Banker reporter Jeff Horwitz did an outstanding job in this story detailing the sweeping irregularities in-house at Chase, but his very thoroughness means the news may have ram
Gary Edwards

Newt Gingrich: 15 Things You Don't Know About Him - 1 views

  •  
    Good article on Newt; covers the good, the bad, and the ugly.  Personally i don't trust Newt.  As former repubican senator Jim Talent of Missouri says, "He's not a reliable and trusted conservative leader".  Strangely, Talent supports Romney. And there is nothing conservative about Romney.   The one thing i do like about Newt is that he is a bomb thrower extraordinaire.  There isn't a Libertarian (moi), conservative, or Constitutional conservative anywhere that wouldn't love to see Newt in the ring with Obama, hammering his Marxist ass without mercy.  But i'm not so sure that that desire is enough to overcome the serious character flaws and self centered egotistical baggage Newt hauls around.  He proves time and again that he lacks the core values of a true conservative, including dedication to the upholding the Constitution and Rule of Law. Funny though that a valueless establishment repubican "we can manage big government more efficiently and make it work" guy like Romney is attacking Newt as not being a true conservative?  What does that make Romney?  At least Newt can point to the awesome Contract with America repubican take over of Congress - after 40 years in the wilderness. Even though Ron Paul has lost it on foreign policy, i continue to send money.  My switch from Reagan Constitutional Conservative to Libertarian has "nearly" everything to do with the 2008 financial collapse, and the years of research and study that followed.   I say "nearly" because i just couldn't pull the trigger until unexpectedly i found myself in a Bloomberg discussion questioning my support for Herman Cain.  Sadly, Herman supports the Federal Reserve, including full approval of both Greenspan and Bernacke policies that have destroyed the US dollar and enabled the Banksters to run off with over $29 Trillion of our money.  Of course, this is an indefensible and inexcusable position.  The Libertarian's in the discussion pointed out that the problems this country faces cann
  •  
    disclosure: I met Cokie and Steve Roberts at an intimate house party in NH. Probably in 1991. Very nice people but they are full blown unionist-socialist-progressives iron bent on the European Socialism model. Not Constitutionalist in any way shape of form. Certainly not Constitutional Capitalist or free market types either.
Gary Edwards

Scribd: Obama Green Energy Investment Scam - Your money, his campaign funding - 0 views

  •  
    The Solyndras are coming!  The Solyndras are coming!  Thanks to Republican congressman Darryl Issa, California, and his investigation into the Obama Energy Department, we now know that Obama has funneled $6.5 BILLION in taxpayer money into a growing collection of Solyndras.   The Solyndras are turning out to be bankrupt green energy companies headed by wealthy investors actively bundling and raising campaign finance funds for Obama.  Ex: Solyndra investor George Kaiser raised over $100,000 for Obama's election campaign, and got a kick back / bankruptcy bailout of over a half Billion Dollars from the Energy Department.  Not enough to save the already failed Solyndra, but enough to make the bundlers and fund raisers whole.  Lesser shareholders and over a thousand employees took the hit. Thanks to Rep Issa, we now know that the Obama - Solyndra scam was actually a formula for transforming (moving) taxpayer funds into private bundler investments.  Awful stuff.  Corruption on steroids in that the Energy Department knew far in advance of the bankruptcy filings that these companies were going down.  Yet the bailout funds were still approved.  Also note that Obama bundlers, banksters, and financiers have open access to the White House.  The visitor log is itself an explosive indictment of the corrosive crony socialism - banksterism that has become the hallmark of the Obama regime. Most of the money for the Solyndras comes out of the failed $1 Trillion Obamulous bill passed by his socialist party early on his administration - February of 2009.
  •  
    Awful stuff. We are no longer a republic. This is fascism.
Gary Edwards

How the Money Vanished - The Bear Stearns "House of Cards" story by William Cohan - 0 views

  • At 2:00 a.m. on Friday -- Mr. Cohan tells us -- Mr. Geithner called Donald Kohn, the vice chairman of the Federal Reserve, and told him that he "wasn't confident that the fallout from the bankruptcy of Bear Stearns could be contained." Taxpayers reading this fascinating tale may wonder whether the fallout from the government's intervention can be contained and, if so, at what cost.
  •  
    Meeting the characters in "House of Cards," it's not easy to conceive of people less deserving of federal assistance. In 1997, Bear Stearns helped pioneer the subprime mortgage-backed security by serving as co-underwriter on a $385 million offering. By the mid-2000s, Bear was the leading issuer of such securities and a leader in collateralized debt obligations, which offered even less transparency to investors. Bear was a vertically integrated manufacturer of mortgage chaos, making individual loans to home buyers, servicing the loans, bundling them into pools for investors, marketing the securities and also borrowing huge sums to finance internal hedge funds that held onto these dodgy assets. House of Cards By William D. Cohan (Doubleday, 468 pages, $27.95) Mr. Cohan describes the succession of government policies that encouraged Bear and others to invest so heavily in mortgage finance, from the Fed's easy money to Clinton-era changes to the Community Reinvestment Act requiring more loans to low-income borrowers. But the firm itself deserves the lion's share of the blame for its own collapse. Suggestions to sell some of its risky mortgage assets, or to raise capital, or to consider merger partners were brushed aside in the years and months leading up to the debacle. Paul Friedman, chief operating officer of Bear's fixed-income division, tells Mr. Cohan that "we did this to ourselves. . . . It's our fault for allowing it to get this far, and for not taking any steps to do anything about it."
Gary Edwards

Fanniegate: Gamechanger For The GOP? | Via Meadia - 0 views

  • The story doesn’t just attack a failure of Democratic policy execution; it exposes a key flaw in New Democratic thinking.  The Third Way as dreamed up by Bill Clinton and Tony Blair sought to harness the power of financial markets to a public service agenda.  Old style command and control liberalism believed in directly mandating business to do what politicians thought should be done.  AT&T had to serve rural communities, but in exchange it had a phone monopoly and regulators made sure that it made a good profit.  The airlines and bus companies had to service unprofitable routes, but regulators made sure that their route networks as a whole were profitable.
  • a new and updated liberalism appeared.
  • The sad fact remains that the current president, according to longstanding government clearance protocols, could not be hired as a janitor in a federal building with the amount of personal background information that he has provided. Run for President? No problem. Get any other federal job? No way. Quite apart from the issue of any sort of birth certificates, real or imagined, genuine or forged, is the fact that Barack Obama’s school records, SAT and LSAT scores, college and law school admission records and scholarship paperwork and grade transcripts and thesis papers, medical records, passport history, Illinois state senate tenure records, presidential campaign foreign donor lists, complete White House visitor logs and many other relevant records and documents have all never been released or allowed to be subjected to any sort of scrutiny, despite several years of repeated requests for disclosure by numerous individuals and non-traditional media organizations. Virtually the entire paper trail of Barack Obama’s existence has always been deeply hidden away in a tight shroud of secrecy. The Obama 2008 campaign and subsequent administration have to date spent a substantial sum on legal fees, estimated in the millions of dollars, to fight Freedom of Information Act filings and other motions and requests to examine some of this material. The powerful international law firm Perkins Coie, the counsel of record to the Democractic National Committee, has been their primary provider of these services and continues in that role.
  •  
    excerpt:  Democrats, watch out. The Republican Party and especially its Tea Party wing have just acquired a new weapon of mass destruction - and it has nothing to do with any of Congressman Wiener's rogue body parts.  If they deploy this weapon effectively in the next election cycle - a big if - then they have the biggest opportunity to move the country rightward since Ronald Reagan took the oath of office back in 1981. The Tea Party WMD stockpile is currently stored in book form:  Reckless Endangerment: How Outsized Ambition, Greed, and Corruption Led to Economic Armageddon. By Gretchen Morgenson, one of America's best business journalists who is currently at The New York Times, and noted financial analyst Joshua Rosner, Reckless Endangerment gives the best available account of how the growing chaos in the mortgage and personal finance markets and the rampant bundling of dubious loans into exotically toxic securities plunged the world, and millions of American families, into the gravest financial crisis since World War Two. It is gripping reading as well, and its explanations are clear enough that readers without any background in finance will have no trouble following the plot.  The villains?  An unholy alliance between Wall Street, the Democratic establishment, community organizing groups like ACORN and La Raza, and politicians like Barney Frank, Nancy Pelosi and Henry Cisneros.  (Frank got a cushy job for a lover, Pelosi got a job and layoff protection for a son, Cisneros apparently got a license to mint money bilking Mexican-Americans of their life savings in cheesy housing developments.)
Gary Edwards

Schneiderman Is Said to Face Pressure to Back Bank Deal - NYTimes.com - 0 views

  • Terms of the possible settlement under consideration center on foreclosure improprieties like so-called robo-signing and submitting apparently forged documents to the courts to speed up the process of removing troubled borrowers from homes.
  • An initial term sheet outlining a possible settlement emerged in March, with institutions including Bank of America, Citigroup, JPMorgan Chase and Wells Fargo being asked to pay about $20 billion that would go toward loan modifications and possibly counseling for homeowners
  • In exchange, the attorneys general participating in the deal would have agreed to sign broad releases preventing them from bringing further litigation on matters relating to the improper bank practice
  • ...1 more annotation...
    • Gary Edwards
       
      You've got to be kidding me!  $20 Billion and these crooks get to illegally foreclose on mortgages they can't document or prove they own?  They've stolen trillions of dollars, sunk the worlds economy, and maybe ended the greatest experiment in self government / individual liberty in mankind's 4,000 year history.  And the tab is only $20 Billion?  The Banksters steal that much in while putting on their pants in the morning.
  •  
    By GRETCHEN MORGENSON Published: August 21, 2011 Eric T. Schneiderman, the attorney general of New York, has come under increasing pressure from the Obama administration to drop his opposition to a wide-ranging state settlement with banks over dubious foreclosure practices, according to people briefed on discussions about the deal. Eric T. Schneiderman has objected to elements of the settlement for months.  In recent weeks, Shaun Donovan, the secretary of Housing and Urban Development, and high-level Justice Department officials have been waging an intensifying campaign to try to persuade the attorney general to support the settlement, said the people briefed on the talks. Mr. Schneiderman and top prosecutors in some other states have objected to the proposed settlement with major banks, saying it would restrict their ability to investigate and prosecute wrongdoing in a variety of areas, including the bundling of loans in mortgage securities. But Mr. Donovan and others in the administration have been contacting not only Mr. Schneiderman but his allies, including consumer groups and advocates for borrowers, seeking help to secure the attorney general's participation in the deal, these people said. One recipient described the calls from Mr. Donovan, but asked not to be identified for fear of retaliation.
Paul Merrell

Jamie Dimon's $13 Billion Secret | The Nation - 0 views

  • In the end, the abject fear of Ben Wagner got Jamie Dimon to cave.For much of 2013, Dimon, the chairman and chief executive of the formidable JPMorgan Chase & Company, was telling anyone who would listen that it was unfair and unjust for federal and state prosecutors to blame him and his bank for the manufacture and sale of mortgage-backed securities that occurred at Bear Stearns & Company and at Washington Mutual in the years leading up to the financial crisis. When JPMorgan Chase bought those two failing firms in 2008, Dimon argued, he was just doing what Ben Bernanke, Hank Paulson and Timothy Geithner had asked him to do. Why should his bank be held financially accountable for the bad behavior at Bear and WaMu?It was a clever argument—and wrong. Dimon's relentless effort to spin his patriotic story soon collided with the fact that Wagner, the US Attorney for the Eastern District of California, had uncovered evidence that JPMorgan itself was guilty of many of the same greedy and irresponsible behaviors. Piles of subpoenaed documents and e-mails revealed that JPMorgan bankers and traders had underwritten billions of dollars' worth of questionable mortgage-backed securities that Dimon had been telling everyone had originated at Bear Stearns and WaMu. Worse, the bad behavior had occurred on Dimon's watch.
  • The likelihood that the Justice Department would file Wagner's civil complaint last fall—exposing publicly for the first time the litany of wrongdoing at JPMorgan and threatening to push it off the perch that Dimon had so artfully constructed for it over the years—ultimately brought Dimon to the table. On September 26, just weeks after the Justice Department shared a draft copy of Wagner's complaint with Dimon, the two sides arranged for a summit meeting between Dimon and Attorney General Eric Holder. By mid-November, the bank had agreed to pay $13 billion in a comprehensive settlement of mortgage-related securities claims with various branches of the federal government and a group of states, led by the attorneys general of New York, California, Illinois, Massachusetts and Delaware.It was the largest financial settlement of all time, and it kept Wagner's complaint away from the prying eyes of the public. One thing is clear: Dimon's claim that his own bankers and traders had done nothing wrong in the years leading up to the financial crisis wasn't true. "The investigators and the lawyers were uncovering very viable evidence," explains Associate Attorney General Tony West, who headed up the settlement negotiations on behalf of the Justice Department. "I think there was recognition that we had enough evidence there that would support the complaint and would support a robust lawsuit."
  • [A disclosure of my own: after JPMorgan Chase fired me as a managing director in January 2004, I brought—and lost—a wrongful-dismissal arbitration against the bank. Separately, I remain in litigation with the bank as the result of a soured investment I made in 1999.]
  • ...1 more annotation...
  • Dimon was more circumspect. In a conference call the day the settlement was announced, he mostly kept quiet while Marianne Lake, the firm's CFO, led financial analysts through the details, including how $7 billion of the $13 billion fine would be tax-deductible.
  •  
    In a Matt Taibbi-quality lengthy report, William Cohan takes the reader inside the lengthy negotiations of JPMorgan's $13 billion settlement with state and federal prosecutors. JPMorgan admitted to criminal wrongdoing, and the settlement does not include immunity from criminal prosecution for anybody. But the author notes that there is not even a hint that anyone is working on criminal charges. There's a lot of discussion of dissension within the ranks of different state and federal attorneys involved. The article paints Ben Wagner, the US Attorney for the Eastern District of California, as the hero.  In my book, no one involved deserves hero status because no criminal charges have been filed against any JPMorgan managers or board members, hence there is still no incentive for any of the fraudsters who brought down the economy in 2008 to behave differently in the future. JPMorgan emains not too big to fail but too politically connected for its principals to be jailed. According to the article, the government lawyers had iron-clad proof that a group of JPMorgan managing directors had been informed that pools of mortages they were planning to buy were toxic but "buy two of the loan pools anyway, including those with the squirrelly mortgages. JPMorgan then proceeded to bundle "hundreds of millions of dollars of loans from those pools into one security." Wagner found that between the start of 2006 and the middle of 2007-when the mortgage securitization frenzy was at its peak-JPMorgan packaged and sold securities containing thousands of mortgages that were rated by a third-party evaluator to be of extremely low quality, meeting few, if any, of the bank's underwriting standards." If true, that is very serious fraud deserving of the directors' prosecution for criminal fraud and lengthy prison sentences.   The article touches on A.G. Holder's too big to jail argument but that argument, in my opinion, deserves no credibility before antitrust actions are filed to c
Paul Merrell

E-Mails Show Flaws in JPMorgan's Mortgage Securities - NYTimes.com - 0 views

  • When an outside analysis uncovered serious flaws with thousands of home loans, JPMorgan Chase executives found an easy fix. Rather than disclosing the full extent of problems like fraudulent home appraisals and overextended borrowers, the bank adjusted the critical reviews, according to documents filed early Tuesday in federal court in Manhattan. As a result, the mortgages, which JPMorgan bundled into complex securities, appeared healthier, making the deals more appealing to investors.
  • The trove of internal e-mails and employee interviews, filed as part of a lawsuit by one of the investors in the securities, offers a fresh glimpse into Wall Street’s mortgage machine, which churned out billions of dollars of securities that later imploded. The documents reveal that JPMorgan, as well as two firms the bank acquired during the credit crisis, Washington Mutual and Bear Stearns, flouted quality controls and ignored problems, sometimes hiding them entirely, in a quest for profit.
  • The lawsuit, which was filed by Dexia, a Belgian-French bank, is being closely watched on Wall Street. After suffering significant losses, Dexia sued JPMorgan and its affiliates in 2012, claiming it had been duped into buying $1.6 billion of troubled mortgage-backed securities. The latest documents could provide a window into a $200 billion case that looms over the entire industry. In that lawsuit, the Federal Housing Finance Agency, which oversees Fannie Mae and Freddie Mac, has accused 17 banks of selling dubious mortgage securities to the two housing giants. At least 20 of the securities are also highlighted in the Dexia case, according to an analysis of court records.
  • ...3 more annotations...
  • The Dexia lawsuit centers on complex securities created by JPMorgan, Bear Stearns and Washington Mutual during the housing boom. As profits soared, the Wall Street firms scrambled to pump out more investments, even as questions emerged about their quality.
  • Dexia’s lawsuit is part of a broad assault on Wall Street for its role in the 2008 financial crisis, as prosecutors, regulators and private investors take aim at mortgage-related securities. New York’s attorney general, Eric T. Schneiderman, sued JPMorgan last year over investments created by Bear Stearns between 2005 and 2007.
  • In a statement shortly after he sued JPMorgan Chase, Mr. Schneiderman said the lawsuit was a template “for future actions against issuers of residential mortgage-backed securities that defrauded investors and cost millions of Americans their homes.”
Paul Merrell

It's Time to Rewrite the Internet to Give Us Better Privacy, and Security - The Daily B... - 0 views

  • Almost 15 years ago, as I was just finishing a book about the relationship between the Net (we called it “cyberspace” then) and civil liberties, a few ideas seemed so obvious as to be banal: First, life would move to the Net. Second, the Net would change as it did so. Gone would be simple privacy, the relatively anonymous default infrastructure for unmonitored communication; in its place would be a perpetually monitored, perfectly traceable system supporting both commerce and the government. That, at least, was the future that then seemed most likely, as business raced to make commerce possible and government scrambled to protect us (or our kids) from pornographers, and then pirates, and now terrorists. But another future was also possible, and this was my third, and only important point: Recognizing these obvious trends, we just might get smart about how code (my shorthand for the technology of the Internet) regulates us, and just possibly might begin thinking smartly about how we could embed in that code the protections that the Constitution guarantees us. Because—and here was the punchline, the single slogan that all 724 people who read that book remember—code is law. And if code is law, then we need to be as smart about how code regulates us as we are about how the law does so.
  • There is, after all, something hopeful about a future that was smart about encoding our civil liberties. It could, in theory at least, be better. Better at protecting us from future Nixons, better at securing privacy, and better at identifying those keen to commit crime.
  • But what astonishes me is that today, more than a decade into the 21st century, the world has remained mostly oblivious to these obvious points about the relationship between law and code. That’s the bit in the Edward Snowden interview that is, to me, the most shocking. As he explained to Glenn Greenwald: The NSA specially targets the communications of everyone. It ingests them by default. It collects them in its system, and it filters them and it analyzes them and it measures them and it stores them for periods of time simply because that’s the easiest and the most efficient and most valuable way to achieve these ends ... Not all analysts have the ability to target everything. But I sitting at my desk certainly had the authority to wiretap anyone—from you [the reporter, Glenn Greenwald], to your accountant, to a federal judge, to even the president if I had a personal email. We don’t know yet whether Snowden is telling the truth. Lots of people have denied specifics, and though his interview is compelling, just now, we literally don’t know. But what we do know are the questions that ought to be asked in response to his claims. And specifically, this: Is it really the case that the government has entrusted our privacy to the good judgment of private analysts? Are there really no code-based controls for assuring that specific surveillance is specifically justified? And what is the technology for assuring that rogues paid by our government can’t use data collected by our government for purposes that none within our government would openly and publicly defend?
  • ...1 more annotation...
  • Because the fact is that there is technology that could be deployed that would give many the confidence that none of us now have. “Trust us” does not compute. But trust and verify, with high-quality encryption, could. And there are companies, such as Palantir, developing technologies that could give us, and more importantly, reviewing courts, a very high level of confidence that data collected or surveilled was not collected or used in an improper way. Think of it as a massive audit log, recording how and who used what data for what purpose. We could code the Net in a string of obvious ways to give us even better privacy, while also enabling better security. But we don’t, or haven’t, obviously. Maybe because of stupidity. How many congressmen could even describe how encryption works? Maybe because of cupidity. Who within our system can resist large and lucrative contracts to private companies, especially when bundled with generous campaign funding packages? Or maybe because the “permanent war” that Obama told us we were not in has actually convinced all within government that old ideas are dead and we just need to “get over it”—ideas like privacy, and due process, and fundamental proportionality. These ideas may be dead, for now. And they will stay dead, in the future. At least until we finally learn how liberty can live in the digital age. And here’s the hint: not through law alone, but through law that demands code that even the Electronic Frontier Foundation could trust.
  •  
    As the most prominent among law professors concerned with online civil liberties and now specializing in government corruption, if Lawrence Lessig says there are technical solutions for protecting us from online government snooping, I'm all years. He directs attention to technology being developed by Palantir, http://www.palantir.com/
Paul Merrell

Wells Fargo Fined Over Secret Sales Policy to Open Fake Customer Accounts - nsnbc inter... - 0 views

  • The Consumer Financial Protection Bureau (CFPB) has fined Wells Fargo for $100 million based on fraudulent customer account practices. An additional $85 million is to be paid to the city of Los Angeles in California, along with the Office of the Comptroller of the Currency.
  • Last year Wells Fargo was sued by employees (current and former) and customers all across the nation for setting up “unwanted accounts, unwarranted fees”. According to the lawsuit, this was “the largest California-based bank violated state and federal laws by misusing confidential information and failing to notify customers when personal information was breached.” Using “aggressive tactics” to coerce new customers, Wells Fargo made it “difficult to correct the mistakes” made by Wells Fargo and return fees to customers because of “high-pressure sales culture set unrealistic quotas, spurring employees to engage in fraudulent conduct to keep their jobs and boost the company’s profits.” Over the course of an extended period of time, “Wells Fargo employees secretly opened unauthorized accounts to hit sales targets and receive bonuses.” There were 1.5 million accounts opened without the authorization of customers and 500,000 credit cards accounts to boot. Wells Fargo has consistently blames “a few rogue employees. Five hundred employees were terminated, according to a Wells Fargo spokesperson. There was no mention of rescinding of bonuses paid to those employees, and there is no clear evidence that executive’s payouts totaling $155 million for “performance based compensation” for 2012 through 2013 was returned to the bank.
  • Those bonuses were administered based on the fraudulent accounts opened without customer approval. In a statement, Wells Fargo expressed belated regret and a sudden desire to “take responsibility for any instances where customers may have received a product that they did not request.” The training that caused this problem in the first place was a cross-selling strategy called “Going For Gr-Eight” which is a brochure for employees to push banking products onto households of existing customers to increase fee potential and overall profitability. Wells Fargo “staffers, fearing disciplinary action from managers, begged friends and family members to open ghost accounts” and forged signatures “and falsified phone numbers” of customers who did not want to open an account. This practice drove Wells Fargo’s financial success with an estimated “26% of the company’s revenue was from fee income, including those from credit and debit card accounts, trusts and investments.” The bank not only stole money from customers but “also damage their credit scores” and put some into collections to garner fees “for unauthorized accounts went unpaid”. In case of a complaining customer, Wells Fargo would “sandbag” their customers; meaning “failing to open accounts when requested by customers, and instead accumulating a number of account applications to be opened at a later date.”
  • ...1 more annotation...
  • Another devious tactic Wells Fargo employed was “bundling” or “incorrectly informing customers that certain products are available only in packages with other products such as additional accounts, insurance, annuities, and retirement plans.” This is not an isolated incident. Wells Fargo has fired 5,300 employees for this same “illegal behavior”. Beyond this questionable business practice, Wells Fargo was previously recognized by the CFPB for misapplying student loan payments in order to increase fee income. In this case, Wells Fargo was fined $3.6 million and forced to pay $410,000 to student loan borrowers for restitution.
Paul Merrell

Goldman Sachs Sued for Selling Libya Billions in "Worthless" Options | Global Research - 0 views

  • Goldman Sachs, the Wall Street investment bank, is being sued in London for selling Libya “worthless” derivatives trades in 2008 that the country’s financial managers did not understand. Libya says it lost approximately $1.2 billion on the deals, while Goldman made $350 million.
  • “We think the claims are without merit, and will defend them,” Fiona Laffan, a Goldman Sachs spokeswoman in London, told Bloomberg news service. However, the bank recently claimed that it had retrained its staff to ensure that customers are no longer blind sided by sales pitches for complex products. “For all of our employees, the experience of initiating, approving and executing a transaction for a client at Goldman Sachs is now fundamentally different,” Goldman claimed at its annual meeting last year. Goldman Sachs is not the first Wall Street bank to be accused of taking advantage of naive foreign investors. Morgan Stanley was sued for selling bundled sub-prime mortgages to China Development Industrial Bank (CDIB) from Taiwan that they knew would fail. Even Standard & Poors (S&P), Wall Street’s top ratings agency, has been accused of helping banks to sell “collateralized debt obligations” that they knew were likely to go sour.
  • But this is not the first time that Goldman Sachs has been happy to help governments carry out dodgy deals. Back in 2001, Goldman reportedly charged Greece $300 million to engage on “‘blatant balance sheet cosmetics” to help the country join the European Monetary Union.
  • ...1 more annotation...
  • Members of the union were required to have government debt under 60 percent of gross domestic product and a budget deficit to gross domestic product ratio of under 3 percent. Unfortunately, Greece debt exceeded 100 percent and deficits were at 3.7 percent Goldman Sachs took advantage of a loophole that allowed countries to enter the EMU if they could demonstrate that they were lowering their debt and their budget deficit. To do this, Goldman Sachs sold Greece a “cross-currency swap” that gave the government cash up front in return for a big payment at the end of the loan period. The beauty of the arrangement was that since such currency swaps were permitted by the European Statistical Agency (Eurostat), the debt and deficit appeared to shrink. 
Paul Merrell

Inside TAO: The NSA's Shadow Network - SPIEGEL ONLINE - 0 views

  • The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of "covert" routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with "implants" that then allow the government hackers to control the computers remotely. (Click here to read a related article on the NSA's "implants".) In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person's computer. Of course, a cookie doesn't automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint.
  • Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID. This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer. The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: "Wait for client to initiate new connection," "Shoot!" and "Hope to beat server-to-client response." Like any competition, at times the covert network's surveillance tools are "too slow to win the race." Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document.
  • At the same time, it is in no way true to say that the NSA has its sights set exclusively on select individuals. Of even greater interest are entire networks and network providers, such as the fiber optic cables that direct a large share of global Internet traffic along the world's ocean floors. One document labeled "top secret" and "not for foreigners" describes the NSA's success in spying on the "SEA-ME-WE-4" cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle. The document proudly announces that, on Feb. 13, 2013, TAO "successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4)." With the help of a "website masquerade operation," the agency was able to "gain access to the consortium's management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network."
  • ...3 more annotations...
  • It appears the government hackers succeeded here once again using the QUANTUMINSERT method. The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure. But that was only the first step. "More operations are planned in the future to collect more information about this and other cable systems," it continues. But numerous internal announcements of successful attacks like the one against the undersea cable operator aren't the exclusive factors that make TAO stand out at the NSA. In contrast to most NSA operations, TAO's ventures often require physical access to their targets. After all, you might have to directly access a mobile network transmission station before you can begin tapping the digital information it provides.
  • To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour's work.
  • Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors. Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer. These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world."
  •  
    From page 3 of a 3-page article. The entire article is well worth reading. I chose this page to bookmark because of its disclosure that NSA is intercepting new computers before they are delivered and installing hardware and software backdoors, then reshipping them to their intended recipients. Although not mentioned, this implies the complicity of package shipment companies and conceivably government mail systems and original equipment manufacturers ("OEMs").  
Paul Merrell

JPMorgan Chase Reaches $4.5B Deal With Investors - ABC News - 0 views

  • JPMorgan Chase & Co. has reached a $4.5 billion settlement with investors who said the bank deceived them about bad mortgage investments. The settlement, announced Friday, covers 21 major institutional investors, including JPMorgan competitor Goldman Sachs, BlackRock Financial Management, and Metropolitan Life Insurance Co. The mortgage-backed securities were sold by JPMorgan and Bear Stearns between 2005 and 2008. The deal is the latest in a series of legal settlements over JPMorgan's sales of mortgage-backed securities in the years preceding the financial crisis. As the housing market collapsed between 2006 and 2008, millions of homeowners defaulted on high-risk mortgages. That led to billions of dollars in losses for investors who bought securities created from bundles of mortgages. Those securities were sold by JPMorgan and other big Wall Street banks.
Paul Merrell

The frightening promise of self-tracking pills | The Verge - 0 views

  • Some morning in the future, you take a pill — maybe something for depression or cholesterol. You take it every morning. Buried inside the pill is a sand-sized grain, one millimeter square and a third of a millimeter thick, made from copper, magnesium, and silicon. When the pill reaches your stomach, your stomach acids form a circuit with the copper and magnesium, powering up a microchip. Soon, the entire contraption will dissolve, but in the five minutes before that happens, the chip taps out a steady rhythm of electrical pulses, barely audible over the body's background hum. The signal travels as far as a patch stuck to your skin near the navel, which verifies the signal, then transmits it wirelessly to your smartphone, which passes it along to your doctor. There's now a verifiable record that the pill reached your stomach.
  • This is the vision of Proteus, a new drug-device accepted for review by the Food and Drug Administration last month. The company says it's the first in a new generation of smart drugs, a new source of data for patients and doctors alike. But bioethicists worry that the same data could be used to control patients, infringing on the intensely personal right to refuse medication and giving insurers new power over patients’ lives. As the device moves closer to market, it raises a serious question: Is tracking medicine worth the risk?
  • But not everyone's convinced that the ability to track pills will be good news for patients. The right to refuse treatment is an important, fragile principle in health care. Many are worried that tracking whether a pill is being consumed will be the first step towards punishing patients that don't comply. While doctors can’t force a patient to take a pill, court orders frequently mandate treatments involving specific drug regimens.
  • ...3 more annotations...
  • NYU bioethicist Arthur Caplan says he can imagine a judge using Proteus to enforce medication as part of a sentence: miss a pill, and your parole is revoked. "The temptation in the legal system to say, 'I can monitor you and make sure you're not a threat' is going to be huge," Caplan says. "Maybe that's good, maybe it's bad, but it's a different world than saying I consent to taking these pills." Those court orders are rare at the moment, since there’s no way to ensure a patient is taking medication outside of a controlled treatment facility — but as pill-tracking becomes easier, those measures could become much more common. That's particularly likely given the way Proteus is entering the market. The device's first partnership bundles it with Abilify, a powerful antipsychotic most commonly used to treat mood disorders, schizophrenia, and Tourette's. The most common effects are improved concentration and decreased hallucinations, but it comes with extreme side effects like increased suicide risk and a lower seizure threshold. It's most often prescribed in cases of severe mental illness, often in psychiatric institutions or as part of a court-mandated treatment program — exactly the scenarios bioethicists like Caplan are most worried about.
  • Patient's biggest protection are medical privacy laws like HIPAA, which prevent medical data from being shared with anyone outside the hospital system. That would stop your boss or your parents from using Proteus to make sure you haven't fallen behind on your anti-anxiety medication. But those laws won't keep data out of the hands of healthcare providers, and Caplan is concerned the pill could also be used to enforce compliance. Insurers might offer a discounted rate on tracked pills, then hit patients with a $100 co-pay for every treatment they miss. It's not as oppressive as a court order, but the end result would be similar.
  • Still, those concerns are unlikely to keep Proteus out of the hands of doctors. The upcoming FDA approval will focus largely on safety and efficacy, leaving the larger ethical challenges to be solved after the drug is released to doctors and patients at large. With the technology available, it will be up to the courts to decide when it’s legal and ethical to use it. As far as Proteus is concerned, the power of the technology outweighs the risks. "There are challenges with bringing digital into any sector," a company representative said. "The reason to embrace the challenge in health care is because the need is so great."
  •  
    Let's not forget that because Congress recently decided to revive Patriot Act sect. 215, the FBI is authorized to gather medical records for foreign intelligence and anti-terrorism purposes and according to ex-NSA chief scientist William Binney, the NSA in fact collects medical records and makes them available to law enforcement agencies without a warrant or court order.  http://motherboard.vice.com/read/i-toured-stasi-hq-with-nsa-whistleblowers  One judge has found that statute unconstitutional and may rule in the next few days. A court of appeals has found that the statute did not authorize bulk collection of telephone metadata records. An Oregon federal judge ruled that the DEA cannot obtain prescription records (in part because they are medical records) without an individualized search warrant, specifically ruling against the bulk collection argument. Maybe someday someone in federal government will get a clue that medical records are not one of the "haystacks" the NSA is permitted to create.  Involuntary medical treatment is another giant legal hairball. See https://en.wikipedia.org/wiki/Involuntary_treatment   
Paul Merrell

Iraqi Army Downs Two British Planes Carrying Weapons for ISIL Terrorists | Global Research - 0 views

  • Iraq’s army has shot down two British planes as they were carrying weapons for the ISIL terrorists in Al-Anbar province, a senior lawmaker disclosed on Monday. “The Iraqi Parliament’s National Security and Defense Committee has access to the photos of both planes that are British and have crashed while they were carrying weapons for the ISIL,” Head of the committee Hakem al-Zameli said, according to a Monday report of the Arabic-language information center of the Islamic Supreme Council of Iraq. He said the Iraqi parliament has asked London for explanations in this regard. The senior Iraqi legislator further unveiled that the government in Baghdad is receiving daily reports from people and security forces in al-Anbar province on numerous flights by the US-led coalition planes that airdrop weapons and supplies for ISIL in terrorist-held areas.
  • The Iraqi lawmaker further noted the cause of such western aids to the terrorist group, and explained that the US prefers a chaotic situation in Anbar Province which is near the cities of Karbala and Baghdad as it does not want the ISIL crisis to come to an end. Earlier today, a senior Iraqi provincial official lashed out at the western countries and their regional allies for supporting Takfiri terrorists in Iraq, revealing that US and Israeli-made weapons have been discovered from the areas purged of ISIL terrorists. “We have discovered weapons made in the US, European countries and Israel from the areas liberated from ISIL’s control in Al-Baqdadi region,” the Al-Ahad news website quoted Head of Al-Anbar Provincial Council Khalaf Tarmouz as saying. He noted that the weapons made by the European countries and Israel were discovered from the terrorists in the Eastern parts of the city of Ramadi. Al-Zameli had also disclosed in January that the anti-ISIL coalition’s planes have dropped weapons and foodstuff for the ISIL in Salahuddin, Al-Anbar and Diyala provinces. Al-Zameli underlined that  the coalition is the main cause of ISIL’s survival in Iraq.
  • “There are proofs and evidence for the US-led coalition’s military aid to ISIL terrorists through air(dropped cargoes),” he told FNA in January. He noted that the members of his committee have already proved that the US planes have dropped advanced weaponry, including anti-aircraft weapons, for the ISIL, and that it has set up an investigation committee to probe into the matter. “The US drops weapons for the ISIL on the excuse of not knowing about the whereabouts of the ISIL positions and it is trying to distort the reality with its allegations. He noted that the committee had collected the data and the evidence provided by eyewitnesses, including Iraqi army officers and the popular forces, and said, “These documents are given to the investigation committee … and the necessary measures will be taken to protect the Iraqi airspace.” Also in January, another senior Iraqi legislator reiterated that the US-led coalition is the main cause of ISIL’s survival in Iraq. “The international coalition is only an excuse for protecting the ISIL and helping the terrorist group with equipment and weapons,” Jome Divan, who is member of the al-Sadr bloc in the Iraqi parliament, said. He said the coalition’s support for the ISIL is now evident to everyone, and continued, “The coalition has not targeted ISIL’s main positions in Iraq.”
  • ...1 more annotation...
  • In October, a high-ranking Iranian commander also slammed the US for providing aid supplies to ISIL, adding that the US claims that the weapons were mistakenly airdropped to ISIL were untrue. “The US and the so-called anti-ISIL coalition claim that they have launched a campaign against this terrorist and criminal group – while supplying them with weapons, food and medicine in Jalawla region (a town in Diyala Governorate, Iraq). This explicitly displays the falsity of the coalition’s and the US’ claims,” Deputy Chief of Staff of the Iranian Armed Forces Brigadier General Massoud Jazayeri said. The US claimed that it had airdropped weapons and medical aid to Kurdish fighters confronting the ISIL in Kobani, near the Turkish border in Northern Syria. The US Defense Department said that it had airdropped 28 bundles of weapons and supplies, but one of them did not make it into the hands of the Kurdish fighters. Video footage later showed that some of the weapons that the US airdropped were taken by ISIL militants. The Iranian commander insisted that the US had the necessary intelligence about ISIL’s deployment in the region and that their claims to have mistakenly airdropped weapons to them are as unlikely as they are untrue.
  •  
    Woo hoo! Talk about sending a message. Iraq shoots down two UK military aircraft and publicizes it to drive home their point: The U.S. and allies are arming and supplying ISIL by air. 
Paul Merrell

Terrorists Supported by America: U.S. Helicopter Delivering Weapons to the Islamic Stat... - 1 views

  • The Iraqi popular forces who shot down a US helicopter carrying weapons for the ISIL forces in Al-Baqdadi region released the photos of the shot down chopper through the Internet. A group of Iraqi popular forces known as Al-Hashad Al-Shabi shot down the US Army helicopter that was carrying weapons for the ISIL in the western parts of Al-Baqdadi region in Al-Anbar province on Thursday.
  • Last week, Head of the Iraqi Parliament’s National Security and Defense Committee Hakem al-Zameli announced that the helicopters of the US-led anti-ISIL coalition were dropping weapons and foodstuff for the ISIL terrorists in the Southern parts of Tikrit. He underscored that he had documents and photos showing that the US Apache helicopters airdropped foodstuff and weapons for the ISIL.
  • Last Monday, a senior lawmaker disclosed that Iraq’s army had shot down two British planes as they were carrying weapons for the ISIL terrorists in Al-Anbar province. “The Iraqi Parliament’s National Security and Defense Committee has access to the photos of both planes that are British and have crashed while they were carrying weapons for the ISIL,” al-Zameli said, according to a Monday report of the Arabic-language information center of the Islamic Supreme Council of Iraq. He said the Iraqi parliament has asked London for explanations in this regard. The senior Iraqi legislator further unveiled that the government in Baghdad is receiving daily reports from people and security forces in al-Anbar province on numerous flights by the US-led coalition planes that airdrop weapons and supplies for ISIL in terrorist-held areas. The Iraqi lawmaker further noted the cause of such western aids to the terrorist group, and explained that the US prefers a chaotic situation in Anbar Province which is near the cities of Karbala and Baghdad as it does not want the ISIL crisis to come to an end. Earlier today, a senior Iraqi provincial official lashed out at the western countries and their regional allies for supporting Takfiri terrorists in Iraq, revealing that US and Israeli-made weapons have been discovered from the areas purged of ISIL terrorists.
  • ...5 more annotations...
  • He noted that the members of his committee have already proved that the US planes have dropped advanced weaponry, including anti-aircraft weapons, for the ISIL, and that it has set up an investigation committee to probe into the matter. “The US drops weapons for the ISIL on the excuse of not knowing about the whereabouts of the ISIL positions and it is trying to distort the reality with its allegations. He noted that the committee had collected the data and the evidence provided by eyewitnesses, including Iraqi army officers and the popular forces, and said, “These documents are given to the investigation committee … and the necessary measures will be taken to protect the Iraqi airspace.” Also in January, another senior Iraqi legislator reiterated that the US-led coalition is the main cause of ISIL’s survival in Iraq. “The international coalition is only an excuse for protecting the ISIL and helping the terrorist group with equipment and weapons,” Jome Divan, who is member of the al-Sadr bloc in the Iraqi parliament, said. He said the coalition’s support for the ISIL is now evident to everyone, and continued, “The coalition has not targeted ISIL’s main positions in Iraq.”
  • “We have discovered weapons made in the US, European countries and Israel from the areas liberated from ISIL’s control in Al-Baqdadi region,” the Al-Ahad news website quoted Head of Al-Anbar Provincial Council Khalaf Tarmouz as saying. He noted that the weapons made by the European countries and Israel were discovered from the terrorists in the Eastern parts of the city of Ramadi. Al-Zameli had also disclosed in January that the anti-ISIL coalition’s planes have dropped weapons and foodstuff for the ISIL in Salahuddin, Al-Anbar and Diyala provinces. Al-Zameli underlined that the coalition is the main cause of ISIL’s survival in Iraq. “There are proofs and evidence for the US-led coalition’s military aid to ISIL terrorists through air(dropped cargoes),” he told FNA in January.
  • In late December, Iraqi Parliamentary Security and Defense Commission MP disclosed that a US plane supplied the ISIL terrorist organization with arms and ammunition in Salahuddin province. MP Majid al-Gharawi stated that the available information pointed out that US planes are supplying ISIL organization, not only in Salahuddin province, but also other provinces, Iraq TradeLink reported. He added that the US and the international coalition are “not serious in fighting against the ISIL organization, because they have the technological power to determine the presence of ISIL gunmen and destroy them in one month”. Gharawi added that “the US is trying to expand the time of the war against the ISIL to get guarantees from the Iraqi government to have its bases in Mosul and Anbar provinces.” Salahuddin security commission also disclosed that “unknown planes threw arms and ammunition to the ISIL gunmen Southeast of Tikrit city”. Also in Late December, a senior Iraqi lawmaker raised doubts about the seriousness of the anti-ISIL coalition led by the US, and said that the terrorist group still received aids dropped by unidentified aircraft.
  • “The international coalition is not serious about air strikes on ISIL terrorists and is even seeking to take out the popular (voluntary) forces from the battlefield against the Takfiris so that the problem with ISIL remains unsolved in the near future,” Nahlah al-Hababi told FNA. “The ISIL terrorists are still receiving aids from unidentified fighter jets in Iraq and Syria,” she added. Hababi said that the coalition’s precise airstrikes are launched only in those areas where the Kurdish Pishmarga forces are present, while military strikes in other regions are not so much precise. In late December, the US-led coalition dropped aids to the Takfiri militants in an area North of Baghdad. Field sources in Iraq told al-Manar that the international coalition airplanes dropped aids to the terrorist militants in Balad, an area which lies in Salahuddin province North of Baghdad. In October, a high-ranking Iranian commander also slammed the US for providing aid supplies to ISIL, adding that the US claims that the weapons were mistakenly airdropped to ISIL were untrue.
  • The US and the so-called anti-ISIL coalition claim that they have launched a campaign against this terrorist and criminal group – while supplying them with weapons, food and medicine in Jalawla region (a town in Diyala Governorate, Iraq). This explicitly displays the falsity of the coalition’s and the US’ claims,” Deputy Chief of Staff of the Iranian Armed Forces Brigadier General Massoud Jazayeri said. The US claimed that it had airdropped weapons and medical aid to Kurdish fighters confronting the ISIL in Kobani, near the Turkish border in Northern Syria. The US Defense Department said that it had airdropped 28 bundles of weapons and supplies, but one of them did not make it into the hands of the Kurdish fighters. Video footage later showed that some of the weapons that the US airdropped were taken by ISIL militants. The Iranian commander insisted that the US had the necessary intelligence about ISIL’s deployment in the region and that their claims to have mistakenly airdropped weapons to them are as unlikely as they are untrue.
  •  
    And the U.S. commanders wonder why the Iraqi and Iranian generals didn't tell them of their plans to attack Tikrit? 
1 - 20 of 25 Next ›
Showing 20 items per page