Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Converse

Rss Feed Group items tagged

Paul Merrell

Fearing 'enemies,' Turkey blocks YouTube | Europe | DW.DE | 28.03.2014 - 0 views

  • First Twitter, now YouTube. The Turkish telecoms authority TIB said the move to was an "administrative measure." But only a few hours before the measure came into force, a rather provocative recording was posted on the site. According to the official view, the audio clip is one of the most flagrant among the many that anonymous opponents of the government have been leaking online over the last few months. It exposes the Islamic-conservative government led by Prime Minister Recep Tayyip Erdogan just before the municipal elections scheduled to take place on March 30. The conversation that was leaked this time is between Foreign Minister Ahmet Davutoglu and several heads of the intelligence service and the military. Participants of the conversation were apparently looking for a reason to go to war with Syria.
  • According to reports from the Turkish newspaper Hürriyet, the Turkish foreign ministry has confirmed the authenticity of the recording and has explained that the conversation took place in the foreign ministry. The ministry also emphasized, however, that the contents of the recording were distorted. In a statement issued by the Ministry of Foreign Affairs this explanation was given: "Monitoring such a meeting of a highly confidential nature which was held at a location such as the office of the foreign minister, where the most sensitive security issues of the state are discussed; and releasing these conversations to the public are a despicable attack, an act of espionage and a very serious crime against the national security of Turkey. This incident reveals the extent the threats of cyber and electronic attacks that Turkey encounters." The statement called the perpetrators "enemies of our state" and said they would be identified and severely punished as soon as possible.
  • The Turkish radio and television supervisory board RTÜK banned several Turkish media outlets from spreading the video or communicating its contents. According to the newspaper Hürriyet, the Turkish federal prosecutor's office has already initiated investigations against those responsible for the video. Measures taken too far According to legal expert Bertan Tokuzlu, the recording gives the impression that the government wanted to make trouble internationally, in order to distract the public from internal problems. "If the government wanted to create a reason for war, that is absolutely not in keeping with international legal standards," says Tokuzlu.
  • ...2 more annotations...
  • But according to the legal expert, another aspect of the problem is at stake here. "This is a case of espionage. The alleged conversation took place in a secure location and it is on a very sensitive topic - the question of whether there should or should not be a war with Syria," he says. Tokuzlu added that the content of the conversation was clearly supposed to be released to the public in order to influence the results of this Sunday's (30.03.2014) local elections. But blocking the whole YouTube site was never an appropriate solution, Tokuzlu maintains. "There is no reason to block entire sites. You could block individual accounts or videos; that would be legitimate in this sort of a case," he said. Tokuzlu also explained that blocking YouTube could not be compared with the move to block Twitter: "The Security Council in Turkey held an emergency meeting. Right after, YouTube was blocked. That shows how important this case is."
  • The recording also mentions Turkish arms deliveries to Syrian opposition groups. "If that is the case and we have a war crime to deal with, then the public has a right to know this information, according to the European Court of Human Rights," Tokuzlu stressed, adding that the Turkish government's reaction to the publication of the conversation was very thin-skinned. "If the recording provides evidence of a war crime, then that might mean the government will be brought before a war crimes tribunal in the near future. That is a delicate subject."
  •  
    This article is from 28 March 2014. The Turkish government a few days ago restored access to YouTube and Twitter, after reports that more than 300,000 Turks had thwarted the ban by learning to use Tor and VPN tunneling, posing a long-term obstacle to Turkish intelligence service surveillance. The Foreign Ministry recording was of the Foreign Minister and other high Turkish officials discussing plans for a false flag attack on Turkey to justify Turkey launching its own direct military attacks on Syria. Because Turkey is a member of NATO, an attack on Turkey triggers the obligations of other NATO member nations to join Turkey's "defense." 
Paul Merrell

Turkish Intelligence's Alleged Arms Trade Emerges with ISIL Investigation - 0 views

  • An alleged telephone conversation tape proving that Turkish National Intelligence Organization (MİT) involved in arms trading, emerged from the case file regarding ISIL attack in central Anatolian province Niğde.
  • An alleged telephone conversation tape proving that Turkish National Intelligence Organization (MİT) involved in arms trading, emerged from the case file regarding ISIL attack in central Anatolian province Niğde. Masum Gök According to the court file regarding the two suspects of ISIL's terrorist action in Niğde, Ayhan Orli and Kassuma code named terrorist Muzaffer Yılmaz had a phone conversation regarding arms trading. According to the tape obtained by Turkish Gendarmarie forces, Arms dealer Ayhan Orli said "Brother, the goods are not in their hands. Intelligence (MİT) is keeping the goods," adding that the Grad rockets are in Mersin province. Here's the full text of the alleged telephone conversation between Ayhan Orli and Muzaffer Yılmaz (Kassuma) in 29 July 2014:
  • Who is Ayhan Orli? The figures such as Ayhan Orli and Heysem Topalca who have a strong contact with terrorist groups in Syria, turned the civil war into a highly beneficial business. Ayhan Orli who lives in Yayladağı district of Hatay is a Syrian Turkmen. Orli moved to Syria to join the AKP backed terrorist groups after the beginning of civil war. His brother Adil Orli is one of the leaders of the Turkmen Batallion fighting against Syrian regime. One of the prisoners staying in a Syrian prison said in an interview that Ayhan Orli is cooperating with Turkish intelligence and there is an intense deal between them. Ayhan Orli receives million dollar worth commissions from the weapons provided to terrorist groups in Syria. He not only cooperates with intelligence organizations but also a number of international mafia organizations.
  • ...2 more annotations...
  • An alleged telephone conversation tape proving that Turkish National Intelligence Organization (MİT) involved in arms trading, emerged from the case file regarding ISIL attack in central Anatolian province Niğde. Masum Gök According to the court file regarding the two suspects of ISIL's terrorist action in Niğde, Ayhan Orli and Kassuma code named terrorist Muzaffer Yılmaz had a phone conversation regarding arms trading. According to the tape obtained by Turkish Gendarmarie forces, Arms dealer Ayhan Orli said "Brother, the goods are not in their hands. Intelligence (MİT) is keeping the goods," adding that the Grad rockets are in Mersin province. Here's the full text of the alleged telephone conversation between Ayhan Orli and Muzaffer Yılmaz (Kassuma) in 29 July 2014:
  • Muzaffer Yılmaz (Kassuma): Let's say you have 300 grads (rocket) ok? Ayhan Orli: Yes. Kassuma: Let's say there are 300 grads. Can someone from our side see them? Not from the other side. Either me or Abu Ala or you. Orli: Brother, they don't have the goods. The intelligence (MİT) is keeping them. They don't let them to be transferred. They (Agents) just prepare the goods and say take it from the border gate. Kassuma: Ok. What did Abu Ala said to you? Orli: Abu Ala said alright. He wants the money in cash. Kassuma: When we gonna pay the money? Orli: Today. Kassuma: I did not understand... Orli: Half of the grads are in Mersin. If you don't pay they will not let them to be transferred. If you don't show the draft, they will not bring the goods.
Paul Merrell

How the NSA Converts Spoken Words Into Searchable Text - The Intercept - 0 views

  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest. The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
  • ...9 more annotations...
  • The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s. What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds. In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited. Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
  • A 2008 document from the Snowden archive shows that  transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing: (U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing. A version of the system the NSA uses is now even available commercially.
  • But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.” The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states. A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
  • According to a 2011 memo, “How is Human Language Technology (HLT) Progressing?“, NSA that year deployed “HLT Labs” to Afghanistan, NSA facilities in Texas and Georgia, and listening posts in Latin America run by the Special Collection Service, a joint NSA/CIA unit that operates out of embassies and other locations. “Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
  • The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America. For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.” The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
  • VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
  • What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.” The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
  • Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
  • The presidentially appointed but independent Privacy and Civil Liberties Oversight Board (PCLOB) didn’t mention speech-to-text technology in its public reports. “I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept. His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
Paul Merrell

Transcript: Comey Says Authors of Encryption Letter Are Uninformed or Not Fair-Minded |... - 0 views

  • Earlier today, FBI Director James Comey implied that a broad coalition of technology companies, trade associations, civil society groups, and security experts were either uninformed or were not “fair-minded” in a letter they sent to the President yesterday urging him to reject any legislative proposals that would undermine the adoption of strong encryption by US companies. The letter was signed by dozens of organizations and companies in the latest part of the debate over whether the government should be given built-in access to encrypted data (see, for example, here, here, here, and here for previous iterations). The comments were made at the Third Annual Cybersecurity Law Institute held at Georgetown University Law Center. The transcript of his encryption-related discussion is below (emphasis added).
  • Increasingly, communications at rest sitting on a device or in motion are encrypted. The device is encrypted or the communication is encrypted and therefore unavailable to us even with a court order. So I make a showing of probable cause to a judge in a criminal case or in an intelligence case to the Foreign Intelligence Surveillance Court judge that the content of a particular defense or a particular communication stream should be collected to our statutory authority, and the judge approves, increasingly we are finding ourselves unable to read what we find or we’re unable to open a device. And that is a serious concern. I am actually — I think encryption is a good thing. I think there are tremendous societal benefits to encryption. That’s one of the reasons the FBI tells people not only lock your cars, but you should encrypt things that are important to you to make it harder for thieves to take them.
  • A group of tech companies and some prominent folks wrote a letter to the President yesterday that I frankly found depressing. Because their letter contains no acknowledgment that there are societal costs to universal encryption. Look, I recognize the challenges facing our tech companies. Competitive challenges, regulatory challenges overseas, all kinds of challenges. I recognize the benefits of encryption, but I think fair-minded people also have to recognize the costs associated with that. And I read this letter and I think, “Either these folks don’t see what I see or they’re not fair-minded.” And either one of those things is depressing to me. So I’ve just got to continue to have the conversation. I don’t know the answer, but I don’t think a democracy should drift to a place where suddenly law enforcement people say, “Well, actually we — the Fourth Amendment is an awesome thing, but we actually can’t access any information.”
  • ...2 more annotations...
  • But we have a collision going on in this country that’s getting closer and closer to an actual head-on, which is our important interest in privacy — which I am passionate about — and our important interest in public safety. The logic of universal encryption is inexorable that our authority under the Fourth Amendment — an amendment that I think is critical to ordered liberty — with the right predication and the right oversight to obtain information is going to become increasingly irrelevant. As all of our lives become digital, the logic of encryption is that all of our lives will be covered by strong encryption, therefore all of our lives — I know there are no criminals here, but including the lives of criminals and terrorists and spies — will be in a place that is utterly unavailable to court ordered process. And that, I think, to a democracy should be very, very concerning. I think we need to have a conversation about it. Again, how do we strike the right balance? Privacy matters tremendously. Public safety, I think, matters tremendously to everybody. I think fair-minded people have to recognize that there are tremendous benefits to a society from encryption. There are tremendous costs to a society from universal strong encryption. And how do we think about that?
  • We’ve got to have a conversation long before the logic of strong encryption takes us to that place. And smart people, reasonable people will disagree mightily. Technical people will say it’s too hard. My reaction to that is: Really? Too hard? Too hard for the people we have in this country to figure something out? I’m not that pessimistic. I think we ought to have a conversation.
  •  
    Considering that I'm over 10 times as likely to die from a police shoooting as I am from a terrorist attack, how about we begin this conversation, Mr. Comey, by you providing formal notice to everyone who's had the telephone metadata gathered or searched all dates on which such gatherings and searches were conducted so citizens can file suit for violation of their privacy rights? Note that the Second U.S. Circuit Court of Appeals held last week that the FBI exceeded statutory authority in gathering and searching that information. Because the gathering and searching was not authorized, that would bring the gathering and searching under the protections of the Privacy Act, including the FBI duty to account for the disclosures  and to pay at least the statutory minimum $1,500 in damges per incident.  Then I would like to have an itemization of all of the commercial software and hardware products that your agency and or your buddies at NSA built backdoors into.  Then your resignation for millions of violations of the Privacy Act would be deeply appreciated. Please feel free to delegate the above mentioned tasks to your successor. 
Paul Merrell

United States v. United States Dist. Court for Eastern Dist. of Mich., 407 US 297 - Sup... - 0 views

  • But a recognition of these elementary truths does not make the employment by Government of electronic surveillance a welcome development—even when employed with restraint and under judicial supervision. There is, understandably, a deep-seated uneasiness and apprehension that this capability will be used to intrude upon cherished privacy of law-abiding citizens.[13] We 313*313 look to the Bill of Rights to safeguard this privacy. Though physical entry of the home is the chief evil against which the wording of the Fourth Amendment is directed, its broader spirit now shields private speech from unreasonable surveillance. Katz v. United States, supra; Berger v. New York, supra; Silverman v. United States, 365 U. S. 505 (1961). Our decision in Katz refused to lock the Fourth Amendment into instances of actual physical trespass. Rather, the Amendment governs "not only the seizure of tangible items, but extends as well to the recording of oral statements . . . without any `technical trespass under . . . local property law.'" Katz, supra, at 353. That decision implicitly recognized that the broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails[14] necessitate the application of Fourth Amendment safeguards.
  • National security cases, moreover, often reflect a convergence of First and Fourth Amendment values not present in cases of "ordinary" crime. Though the investigative duty of the executive may be stronger in such cases, so also is there greater jeopardy to constitutionally protected speech. "Historically the struggle for freedom of speech and press in England was bound up with the issue of the scope of the search and seizure 314*314 power," Marcus v. Search Warrant, 367 U. S. 717, 724 (1961). History abundantly documents the tendency of Government—however benevolent and benign its motives —to view with suspicion those who most fervently dispute its policies. Fourth Amendment protections become the more necessary when the targets of official surveillance may be those suspected of unorthodoxy in their political beliefs. The danger to political dissent is acute where the Government attempts to act under so vague a concept as the power to protect "domestic security." Given the difficulty of defining the domestic security interest, the danger of abuse in acting to protect that interest becomes apparent. Senator Hart addressed this dilemma in the floor debate on § 2511 (3):
  • "As I read it—and this is my fear—we are saying that the President, on his motion, could declare— name your favorite poison—draft dodgers, Black Muslims, the Ku Klux Klan, or civil rights activists to be a clear and present danger to the structure or existence of the Government."[15] The price of lawful public dissent must not be a dread of subjection to an unchecked surveillance power. Nor must the fear of unauthorized official eavesdropping deter vigorous citizen dissent and discussion of Government action in private conversation. For private dissent, no less than open public discourse, is essential to our free society.
  • ...8 more annotations...
  • As the Fourth Amendment is not absolute in its terms, our task is to examine and balance the basic values at stake in this case: the duty of Government 315*315 to protect the domestic security, and the potential danger posed by unreasonable surveillance to individual privacy and free expression. If the legitimate need of Government to safeguard domestic security requires the use of electronic surveillance, the question is whether the needs of citizens for privacy and free expression may not be better protected by requiring a warrant before such surveillance is undertaken. We must also ask whether a warrant requirement would unduly frustrate the efforts of Government to protect itself from acts of subversion and overthrow directed against it. Though the Fourth Amendment speaks broadly of "unreasonable searches and seizures," the definition of "reasonableness" turns, at least in part, on the more specific commands of the warrant clause. Some have argued that "[t]he relevant test is not whether it is reasonable to procure a search warrant, but whether the search was reasonable," United States v. Rabinowitz, 339 U. S. 56, 66 (1950).[16] This view, however, overlooks the second clause of the Amendment. The warrant clause of the Fourth Amendment is not dead language. Rather, it has been
  • "a valued part of our constitutional law for decades, and it has determined the result in scores and scores of cases in courts all over this country. It is not an inconvenience to be somehow `weighed' against the claims of police efficiency. It is, or should 316*316 be, an important working part of our machinery of government, operating as a matter of course to check the `well-intentioned but mistakenly overzealous executive officers' who are a part of any system of law enforcement." Coolidge v. New Hampshire, 403 U. S., at 481. See also United States v. Rabinowitz, supra, at 68 (Frankfurter, J., dissenting); Davis v. United States, 328 U. S. 582, 604 (1946) (Frankfurter, J., dissenting). Over two centuries ago, Lord Mansfield held that common-law principles prohibited warrants that ordered the arrest of unnamed individuals who the officer might conclude were guilty of seditious libel. "It is not fit," said Mansfield, "that the receiving or judging of the information should be left to the discretion of the officer. The magistrate ought to judge; and should give certain directions to the officer." Leach v. Three of the King's Messengers, 19 How. St. Tr. 1001, 1027 (1765).
  • Lord Mansfield's formulation touches the very heart of the Fourth Amendment directive: that, where practical, a governmental search and seizure should represent both the efforts of the officer to gather evidence of wrongful acts and the judgment of the magistrate that the collected evidence is sufficient to justify invasion of a citizen's private premises or conversation. Inherent in the concept of a warrant is its issuance by a "neutral and detached magistrate." Coolidge v. New Hampshire, supra, at 453; Katz v. United States, supra, at 356. The further requirement of "probable cause" instructs the magistrate that baseless searches shall not proceed. These Fourth Amendment freedoms cannot properly be guaranteed if domestic security surveillances may be conducted solely within the discretion of the Executive 317*317 Branch. The Fourth Amendment does not contemplate the executive officers of Government as neutral and disinterested magistrates. Their duty and responsibility are to enforce the laws, to investigate, and to prosecute. Katz v. United States, supra, at 359-360 (DOUGLAS, J., concurring). But those charged with this investigative and prosecutorial duty should not be the sole judges of when to utilize constitutionally sensitive means in pursuing their tasks. The historical judgment, which the Fourth Amendment accepts, is that unreviewed executive discretion may yield too readily to pressures to obtain incriminating evidence and overlook potential invasions of privacy and protected speech.[17]
  • It may well be that, in the instant case, the Government's surveillance of Plamondon's conversations was a reasonable one which readily would have gained prior judicial approval. But this Court "has never sustained a search upon the sole ground that officers reasonably expected to find evidence of a particular crime and voluntarily confined their activities to the least intrusive means consistent with that end." Katz, supra, at 356-357. The Fourth Amendment contemplates a prior judicial judgment,[18] not the risk that executive discretion may be reasonably exercised. This judicial role accords with our basic constitutional doctrine that individual freedoms will best be preserved through a separation of powers and division of functions among the different branches and levels of Government. Harlan, Thoughts at a Dedication: Keeping the Judicial Function in Balance, 49 A. B. A. J. 943-944 (1963). The independent check upon executive discretion is not 318*318 satisfied, as the Government argues, by "extremely limited" post-surveillance judicial review.[19] Indeed, post-surveillance review would never reach the surveillances which failed to result in prosecutions. Prior review by a neutral and detached magistrate is the time-tested means of effectuating Fourth Amendment rights. Beck v. Ohio, 379 U. S. 89, 96 (1964).
  • But we do not think a case has been made for the requested departure from Fourth Amendment standards. The circumstances described do not justify complete exemption of domestic security surveillance from prior judicial scrutiny. Official surveillance, whether its purpose be criminal investigation or ongoing intelligence gathering, risks infringement of constitutionally protected privacy of speech. Security surveillances are especially sensitive because of the inherent vagueness of the domestic security concept, the necessarily broad and continuing nature of intelligence gathering, and the temptation to utilize such surveillances to oversee political dissent. We recognize, as we have before, the constitutional basis of the President's domestic security role, but we think it must be exercised in a manner compatible with the Fourth Amendment. In this case we hold that this requires an appropriate prior warrant procedure. We cannot accept the Government's argument that internal security matters are too subtle and complex for judicial evaluation. Courts regularly deal with the most difficult issues of our society. There is no reason to believe that federal judges will be insensitive to or uncomprehending of the issues involved in domestic security cases. Certainly courts can recognize that domestic security surveillance involves different considerations from the surveillance of "ordinary crime." If the threat is too subtle or complex for our senior law enforcement officers to convey its significance to a court, one may question whether there is probable cause for surveillance.
  • Nor do we believe prior judicial approval will fracture the secrecy essential to official intelligence gathering. The investigation of criminal activity has long 321*321 involved imparting sensitive information to judicial officers who have respected the confidentialities involved. Judges may be counted upon to be especially conscious of security requirements in national security cases. Title III of the Omnibus Crime Control and Safe Streets Act already has imposed this responsibility on the judiciary in connection with such crimes as espionage, sabotage, and treason, §§ 2516 (1) (a) and (c), each of which may involve domestic as well as foreign security threats. Moreover, a warrant application involves no public or adversary proceedings: it is an ex parte request before a magistrate or judge. Whatever security dangers clerical and secretarial personnel may pose can be minimized by proper administrative measures, possibly to the point of allowing the Government itself to provide the necessary clerical assistance.
  • Thus, we conclude that the Government's concerns do not justify departure in this case from the customary Fourth Amendment requirement of judicial approval prior to initiation of a search or surveillance. Although some added burden will be imposed upon the Attorney General, this inconvenience is justified in a free society to protect constitutional values. Nor do we think the Government's domestic surveillance powers will be impaired to any significant degree. A prior warrant establishes presumptive validity of the surveillance and will minimize the burden of justification in post-surveillance judicial review. By no means of least importance will be the reassurance of the public generally that indiscriminate wiretapping and bugging of law-abiding citizens cannot occur.
  • As the surveillance of Plamondon's conversations was unlawful, because conducted without prior judicial approval, the courts below correctly held that Alderman v. United States, 394 U. S. 165 (1969), is controlling and that it requires disclosure to the accused of his own impermissibly intercepted conversations. As stated in Alderman, "the trial court can and should, where appropriate, place a defendant and his counsel under enforceable orders against unwarranted disclosure of the materials which they may be entitled to inspect." 394 U. S., at 185.[21]
Paul Merrell

Secret to Prism program: Even bigger data seizure - 0 views

  • The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe. But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort. Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet's backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.
  • Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information. The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president's daily briefing. Prism makes sense of the cacophony of the Internet's raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.
  • The NSA is prohibited from spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant. Despite that prohibition, shortly after the Sept. 11 terrorist attacks, President George W. Bush secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans' private conversations. Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light. "You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades. The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed that the company had allowed the NSA to install a computer at its San Francisco switching center, a key hub for fiber optic cables.
  • ...11 more annotations...
  • Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism's success. The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far. The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.
  • The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as it is labeled as belonging to an American and stored in a special, restricted part of a computer. That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them unless the emails become relevant to a national security investigation. The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems innocuous today might be significant a year from now. What's unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can tap to investigative whatever Congress declares a threat to national security.
  • The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its techniques and targets to a secret court in Washington, but individual warrants would not be required. Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.
  • That's one example of how emails belonging to Americans can become swept up in the hunt. In that way, Prism helps justify specific, potentially personal searches. But it's the broader operation on the Internet fiber optics cables that actually captures the data, experts agree. "I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face conversation, that they could not have access to."
  • When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies knew what was about to happen.
  • For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take information without warrants. Though the companies didn't know it, the passage of the Protect America Act gave birth to a top-secret NSA program, officially called US-98XN. It was known as Prism. Though many details are still unknown, it worked like this:
  • Facebook said it received between 9,000 and 10,000 requests for data from all government agencies in the second half of last year. The social media company said fewer than 19,000 users were targeted.
  • Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data "directly from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more. Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the program, was likely meant to differentiate Prism's neatly organized, company-provided data from the unstructured information snatched out of the Internet's major pipelines. In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the fiber-optic cables. Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user. With Prism, the government gets a user's entire email inbox. Every email, including contacts with American citizens, becomes government property. Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target communicated. All those people can be investigated, too.
  • What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans. Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.
  • A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and phone calls of Americans than they were supposed to. Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems were fixed.
  • Schneier, the author and security expert, said it doesn't really matter how Prism works, technically. Just assume the government collects everything, he said. He said it doesn't matter what the government and the companies say, either. It's spycraft, after all. "Everyone is playing word games," he said. "No one is telling the truth."
  •  
    Associated Press is now doing its job with a masterful overview of NSA capabilities, discussing how NSA scoops up all "backbone" telecommunications, then uses PRISM to narrow down the specific communications they decide to look at. This one is a "must read" article if you're interested in the NSA scandal. It ties a lot of the pieces together.  
Paul Merrell

A Distorted Lens Justifying An Illegitimate Ukrainian Government - 0 views

  • Support it or oppose it, a coup d’état took place in Kiev after an EU-brokered agreement was signed by the Ukrainian government and the mainstream opposition on Feb. 21. The agreement called for power sharing between both sides through the formation of a national unity government and for an end to the opposition-led street protests in Kiev. President Viktor Yanukovych ordered the Ukrainian police and security forces to withdraw from their positions, and even earlier, he had made multiple concessions to the opposition leadership. Instead of keeping its end of the bargain, the Ukrainian mainstream opposition executed a coup through the use of violence by organized ultra-nationalist gangs, which some analysts have compared to stay-behinds or secretive militias that were created by NATO during the Cold War. These armed ultra-nationalist groups took over administrative bodies in Ukraine and fought until they managed to oust the Ukrainian government and opened the path for opposition leaders to take power on Feb. 25. The Ukrainian mainstream opposition used the EU-brokered agreement, which the Brussels-based European Commission deliberately refused to enforce, as a means of justifying the formation of a coup-imposed government.
  • In the absence of almost half the Ukrainian Verkhovna Rada, or Ukrainian Parliament, the opposition parties began to arbitrarily pass unconstitutional laws. They also unconstitutionally selected Oleksandr/Aleksandr Valentynovych Turchynov as the acting president of Ukraine before President Viktor Yanukovych was even impeached. Intimidation and violence were additionally used to secure the cooperation of any disagreeing parliamentarians or state officials in Kiev. Saying that the ultra-nationalists and fascists are marginal elements, the mainstream media networks in North America and the European Union have simply dismissed the armed ultra-nationalist groups involved in the coup that are presently integrated into the putsch regime running Kiev. The militant ultra-nationalists, however, are very influential and amassing power under the illegal premiership of Arseniy Yatsenyuk.  Yatsenyuk, himself, is from Yulia Tymoshenko’s notoriously corrupt All-Ukrainian Union Fatherland Party (Batkivshchyna) and essentially a U.S. and EU appointee. There is even a pre-coup leaked telephone interception, likely either recorded by the intelligence services of Russia or Ukraine, in which U.S. Assistant Secretary of State Victory Nuland says that Yatsenyuk will be appointed as the prime minister of the Ukrainian government that the U.S. is putting together.
  • It is unlikely that Yatsenyuk and the loosely-knit alliance of the governing parties that ran Ukraine under the Yushchenko-Tymoshenko governments, foreign-based Ukrainians, and the forces behind the Orange Revolution that form the Orangist camp which he belongs to could have gotten back into power in Ukraine without pressure, the use of force and foreign backing. Yatsenyuk was even threatened and booed by the Ukrainians gathered at Independence Square when it was announced that he would be appointed as the prime minister of the post-coup government. A vast segment of the protesters made it clear that Tymoshenko, Yatsenyuk’s party leader, was no alternative to the ousted President Viktor Yanukovych in their eyes, either, when it was announced that she wanted to run for prime minister. The Orangists do not have the support of a majority of the population, nor did they form the parliamentary majority in the Verkhovna Rada. Their Orangist president, Viktor Yushchenko, only got 5 percent of the vote in January 2010, in a show of no-confidence, whereas Viktor Yanukovych won the first and second rounds of the presidential elections in 2010. According to Victoria Nuland, the U.S. has also poured $5 billion into “democracy promotion” inside Ukraine. This is U.S. State Department doublespeak for politicized funding that Washington has sent to Ukraine to organize the Orange Revolution and its Euromaidan sequel or what can frankly be described as regime change.
  • ...10 more annotations...
  • To rule Ukraine once more, the Orangists and their foreign backers have used and manipulated the ultra-nationalist elements of the population — some of which are openly anti-European Union — as their foot soldiers in an application of force against their democratically-elected opponents. Despite their views, the ultra-nationalists are actually more honest than the Orangist liberal figures like Arseniy Yatsenyuk. Unlike the misleading and utterly corrupt Orangist leaders, the ultra-nationalists do not hide their agendas and platforms.
  • The ultra-nationalists have inconsolably anti-Russian attitudes. Many of them also dislike a vast spectrum of other groups, including Jews, Armenians, Roma, Poles, Tatars, supporters of the Party of Regions and communists. In this context, it should come as no surprise that one of the first decisions that the post-coup regime in Kiev made was to remove the legal status of the Russian language as the regional language of half of Ukraine. Right Sector is, itself, a coalition of militant ultra-nationalists. These militants were instrumental in fighting government forces and taking over both government buildings in Kiev and regional governments in the western portion of Ukraine. Despite the protests of First Deputy Defense Minister Oleynik, Deputy Defense Minister Mozharovskiy and Defense Minister Babenk, Arseniy Yatsenyuk’s post-coup government has even given the ultra-nationalist opposition militias official status within the Ukrainian military and security forces. Yatsenyuk and the Orangists also dismissed all the officials that protested that the move would fracture the country and make the political divide in Ukraine irreversible.
  • Several members of Svoboda have been given key cabinet and government posts. One of the two junior deputy prime ministers, or assistant deputy prime ministers, is Oleksandr Sych. The ministry of agriculture and food has been given for management to Ihor Shvaika. The environment and natural resources ministry has been assigned to Andry/Andriy Mokhnyk. The defense minister is Ihor Tenyukh, a former admiral in the Ukrainian Navy who obstructed Russian naval movements in Sevastopol during the Russo-Georgian War over South Ossetia and who was later dismissed by the Ukrainian government for insubordination. Oleh Makhnitsky, another member of Svoboda, has been assigned as the new prosecutor-general of Ukraine by the coup government. Andry Parubiy, one of the founders of Svoboda, is now the post-coup secretary of the National Security and Defense Council of Ukraine (RNBO). He was the man controlling the so-called “Euromaidan security forces” that fought government forces in Kiev. His job as secretary is to represent the president and act on his behalf in coordinating and implementing the RNBO’s decisions. As a figure, Parubiy clearly illustrates how the mainstream opposition in Ukraine is integrated with the ultra-nationalists. Parubiy is an Orangist and was a leader in the Orange Revolution. He has changed parties several times. After founding Svoboda, he joined Viktor Yushchenko’s Our Ukraine before joining Yulia Tymoshenko’s Fatherland Party and being elected as one of the Fatherland Party’s deputies, or members of parliament.
  • While the mainstream media in North America and the EU look the other way about the ultra-nationalists in the coup government in Kiev, the facts speak for themselves. Both the EU and the U.S. governments have rubbed their elbows with the ultra-nationalists. Oleh Tyahnybok, the leader of Svoboda (formerly the Social Nationalist Party of Ukraine), was even part of the opposition triumvirate that all the U.S. and EU officials visiting Kiev met with while performing their political pilgrimages to Ukraine to encourage the protesters to continue with their demonstrations and riots demanding Euro-Atlantic integration. Svoboda has popularly been described as a neo-Nazi grouping. The World Jewish Congress has demanded that Svoboda be banned. The ultra-nationalist party was even condemned by the EU’s own European Parliament, which passed a motion on Dec. 13, 2012 categorically condemning Svoboda.
  • The ultra-nationalists are such an integral part of the mainstream opposition that the U.S.-supported Orangist president of Ukraine, Viktor Yushchenko, posthumously awarded the infamous Nazi collaborator Stepan Bandera the title and decoration of the “Hero of Ukraine” in 2010. Foreign audiences, however, would not know that if they relied on reportage from the likes of the U.S. state-run Radio Free Europe, which tried to protect Yushchenko because he wanted to reorient Ukraine toward the U.S. and EU. Parubiy also lobbied the European Parliament not to oppose Yushchenko’s decision. Other smaller ultra-nationalists parties were also given government posts, and several of the independent cabinet members are also aligned to these parties. Dmytro Yarosh from Right Sector (Pravyi Sektor) is the deputy secretary of the RNBO, and the Trizub Party was given the education ministry. Trizub had Sergey Kvit appointed to the post of education minister.
  • The role of the ultra-nationalists in executing the coup has been essentially ignored by the mainstream media in North America and the EU. The roots of the bloodshed in Kiev have been ignored, too. The shootings of protesters by snipers have simply been presented as the vile actions of the Ukrainian government, never taking into consideration the agitation of the armed ultra-nationalist gangs and the mainstream opposition leaders for a conflict. According to a leaked telephone conversation on Feb. 26 between Estonian Foreign Minister Urmas Paet and European Union Commissionaire Catherine Ashton, which was leaked by the Security Service of Ukraine (SBU) , the snipers who shot at protesters and police in Kiev were allegedly hired by Ukrainian opposition leaders. Estonian Foreign Minister Paet made the statements on the basis of details he was given by one of the head doctors of the medical team of the anti-government protests, Olga Bogomolets, an opponent of Viktor Yanukovych’s government who wanted it removed from power. Paet tells Ashton the following first: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” This is also corroborated by the fact that Yanukovych actually had ordered the Ukrainian riot police and security forces not to use lethal force.
  • The Estonian official then mentions that it was verified to him that the same snipers were killing people on both sides. He tells Ashton the following: “And second, what was quite disturbing, this same Olga [Bogomolets] told as well that all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides.” Another important point that Paet makes to Ashton is the following: “[Dr. Olga Bogomolets] then also showed me some photos she said that as a medical doctor she can say that it is the same handwriting, the same type of bullets, and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Past reports that the mainstream media were hostile to the ousted Ukrainian government also raise serious questions that corroborate what has been said about the snipers intentionally killing protesters to instigate regime change.
  • The Telegraph reported on Feb. 20 that “[a]t least three of the bodies displayed single bullet wounds to the heads,” and “were shot in the head, the neck or the heart. None were shot anywhere else like in the legs.” This means that the snipers were making kill shots by design, which seems like the last thing that the Ukrainian government would want to do when it was trying to appease the protesters and bring calm to Kiev. The Ukrainian journalist Alexey Yaroshevsky’s account of the sniper shootings is also worth noting, and it is backed up by footage taken by his Russian crew in Kiev.  Their footage shows armed opposition members running away from the scene of the shooting of anti-government protesters. What comes across as unusual is that the armed members of the opposition were constantly agitating to start firefights at every opportunity that they could get.
  • The commandant of the SSU, Major-General Oleksandr Yakimenko, has testified that his counter-intelligence forces were monitoring the CIA in Ukraine during the protests. According to the SSU, the CIA was active on the ground in Kiev and collaborating with a small circle of opposition figures. Yakimenko has also said that it was not the police or government forces that fired on the protesters, but snipers from the Philharmonic Building that was controlled by the opposition leader Andriy Parubiy, which he asserts was interacting with the CIA. Speaking to the Russian media, Yakimenko said that 20 men wearing “special combat clothes” and carrying “sniper rifle cases, as well as AKMs with scopes” ran out of the opposition-controlled Philharmonic Building and split into two groups of 10 people, with one taking position at the Ukraine Hotel. The anti-government protesters even saw this and asked Ukrainian police to pursue them, and even figures from Right Sector and Svoboda asked Yakimenko’s SSU to investigate and apprehend them, but Parubiy prevented it. Major-General Yakimenko has categorically stated that opposition leaders were behind the shootings. Following the release of the conversation between Paet and Ashton, the Estonian Foreign Ministry confirmed that the leak was authentic, whereas the European Commission kept silent. The mainstream media in North America and the EU either ignored it or said very little. The Telegraph even claimed that Dr. Bogomolets told it that she had not treated any government forces even though she contradicts this directly in an interview with CNN where says she treated military personnel.
  • CNN, on the other hand, quickly glossed over the story, giving it only enough attention to create the impression that the network is fairly covering the news. Opting not to give the story the airtime that it deserved, CNN instead posted it on its webpage. The conversation is immediately discredited, undermined and dismissed in the first sentence of the article, which is attributed to Foreign Minister Paet: “Don’t read too much into the conversation.” The article was deliberately structured by CNN to undermine the important information that would challenge the narrative that the U.S. mainstream media have been painting. The title, sub-titles and opening sentences of most texts act as microcosms or summaries of the articles, and in many cases, readers evaluate or decide to read the articles on the basis of what these texts communicate. Moreover, the first sentence of the article sets the tempo for readers and and influences their opinion, too. Although anyone who listens to the conversation between Paet and Ashton and considers the evidence that is being discussed would realize just how important the news was, the message being set forth by CNN was a dismissive one.
Paul Merrell

Speech Recognition is NSA's Best-Kept Open Secret - The Intercept - 0 views

  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition.
  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition. One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.”
  • One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.” Assange, who went on to found WikiLeaks, said at the time: “This patent should worry people. Everyone’s overseas phone calls are or may soon be tapped, transcribed and archived in the bowels of an unaccountable foreign spy agency.” The most comprehensive post-Snowden descriptions of NSA’s surveillance programs are strangely silent when it comes to speech recognition. The report from the President’s Review Group on Intelligence and Communications Technologies doesn’t mention it, and neither does the October 2011 FISA Court ruling, or the detailed reports from the Privacy and Civil Liberties Oversight Board.
  • ...3 more annotations...
  • There is some mention of speech recognition in the “Black Budget” submitted to Congress each year. But there’s no clear sign that anybody on the Hill has ever really noticed. As The Intercept reported on Tuesday, items from the Snowden archive document the widespread use of automated speech recognition by the NSA. The strategic advantage, invasive potential and policy implications of being able to turn spoken words into text are not trivial: Suddenly, voice conversations, historically considered ephemeral and unsearchable, can be scanned, catalogued and archived — not perfectly, but well enough to dramatically increase the effective scope of eavesdropping. Former senior NSA executive turned whistleblower Thomas Drake, who’s seen NSA’s automated speech recognition at work, says the silence is telling.
  • “You’re seeing a black hole,” Drake told The Intercept. “That means there’s something there that’s really significant. You’re seeing some of the fuzzy contours of this whole other program.”
  • Senator Ron Wyden, D-Ore., arguably the foremost congressional critic of NSA overreach, wouldn’t comment directly on the question of speech recognition. But, he said through a spokesperson: “After 14 years on the Intelligence Committee, I’ve learned that senators must be constantly on the lookout for secret interpretations of the law and advances in surveillance that Congress isn’t aware of.” He added: “For centuries, individual privacy was protected in part by the limited resources of governments. It simply wasn’t possible for governments to secretly collect information on every single citizen without investing in massive networks of spies and informants. But in the 21st century mass surveillance is no longer difficult and expensive — it’s increasingly cheap and easy. The only privacy protections that will matter in the future are the ones that are written into law and defended by public demand for freedom and openness.”
  •  
    A "black hole" at the NSA? Voice-to-text is indeed an ultra-powerful intelligence tool, but only if you are gathering verbal conversations. As content, verbal conversations should be off-limits without a court order. But is NSA honoring that limitation? And is the FISA Court enforcing it?
Paul Merrell

Donald J. Trump on Twitter: "Russia vows to shoot down any and all missiles fired at Sy... - 0 views

  • Donald J. Trump‏Verified account @realDonaldTrump 9h9 hours ago Follow Follow @realDonaldTrump Following Following @realDonaldTrump Unfollow Unfollow @realDonaldTrump Blocked Blocked @realDonaldTrump Unblock Unblock @realDonaldTrump Pending Pending follow request from @realDonaldTrump Cancel Cancel your follow request to @realDonaldTrump More Copy link to Tweet Embed Tweet Mute @realDonaldTrump Unmute @realDonaldTrump Mute this conversation Unmute this conversation Block @realDonaldTrump Unblock @realDonaldTrump Report Tweet Add to other Moment Add to new Moment Russia vows to shoot down any and all missiles fired at Syria. Get ready Russia, because they will be coming, nice and new and “smart!” You shouldn’t be partners with a Gas Killing Animal who kills his people and enjoys it! 3:57 AM - 11 Apr 2018
  •  
    Astounding. The head choppers have been evacuated. Russia says its soldiers couldn't find any sign of a chemical attack. Red Crescent says flatly that there was no attack. A false flag. And trump declares war before there's been any investigation.
Paul Merrell

Julian Assange on Twitter: "Two IC officials close to Pence stated privately this month... - 0 views

  • Julian Assange‏ @JulianAssange Mar 14 Follow Following Unfollow Blocked Unblock Pending Cancel More Share via Direct Message Copy link to Tweet Embed Tweet Mute @JulianAssange Unmute @JulianAssange Mute this conversation Unmute this conversation Block @JulianAssange Unblock @JulianAssange Report Tweet Add to other Moment Add to new Moment Two IC officials close to Pence stated privately this month that they are planning on a Pence takeover. Did not state if Pence agrees.
Paul Merrell

Are all telephone calls recorded and accessible to the US government? | Glenn Greenwald... - 0 views

  • On Wednesday night, Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could:BURNETT: Tim, is there any way, obviously, there is a voice mail they can try to get the phone companies to give that up at this point. It's not a voice mail. It's just a conversation. There's no way they actually can find out what happened, right, unless she tells them?
  • "All of that stuff" - meaning every telephone conversation Americans have with one another on US soil, with or without a search warrant - "is being captured as we speak". On Thursday night, Clemente again appeared on CNN, this time with host Carol Costello, and she asked him about those remarks. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored:
  • CLEMENTE: "No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. It's not necessarily something that the FBI is going to want to present in court, but it may help lead the investigation and/or lead to questioning of her. We certainly can find that out.BURNETT: "So they can actually get that? People are saying, look, that is incredible.CLEMENTE: "No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not."
  • ...1 more annotation...
  • Let's repeat that last part: "no digital communication is secure", by which he means not that any communication is susceptible to government interception as it happens (although that is true), but far beyond that: all digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.
Paul Merrell

New Political Earthquake in Brazil: Is It Now Time for Media Outlets to Call This a "Co... - 0 views

  • Brazil today awoke to stunning news of secret, genuinely shocking conversations involving a key minister in Brazil’s newly installed government, which shine a bright light on the actual motives and participants driving the impeachment of the country’s democratically elected president, Dilma Rousseff. The transcripts were published by the country’s largest newspaper, Folha de São Paulo, and reveal secret conversations that took place in March, just weeks before the impeachment vote in the lower house was held. They show explicit plotting between the new planning minister (then-senator), Romero Jucá, and former oil executive Sergio Machado — both of whom are formal targets of the “Car Wash” corruption investigation — as they agree that removing Dilma is the only means for ending the corruption investigation. The conversations also include discussions of the important role played in Dilma’s removal by the most powerful national institutions, including — most importantly — Brazil’s military leaders. The transcripts are filled with profoundly incriminating statements about the real goals of impeachment and who was behind it. The crux of this plot is what Jucá calls “a national pact” — involving all of Brazil’s most powerful institutions — to leave Michel Temer in place as president (notwithstanding his multiple corruption scandals) and to kill the corruption investigation once Dilma is removed. In the words of Folha, Jucá made clear that impeachment will “end the pressure from the media and other sectors to continue the Car Wash investigation.” Jucá is the leader of Temer’s PMDB party and one of the “interim president’s” three closest confidants.
  • It is unclear who is responsible for recording and leaking the 75-minute conversation, but Folha reports that the files are currently in the hand of the prosecutor general. The next few hours and days will likely see new revelations that will shed additional light on the implications and meaning of these transcripts. The transcripts contain two extraordinary revelations that should lead all media outlets to seriously consider whether they should call what took place in Brazil a “coup”: a term Dilma and her supporters have used for months. When discussing the plot to remove Dilma as a means of ending the Car Wash investigation, Jucá said the Brazilian military is supporting the plot: “I am talking to the generals, the military commanders. They are fine with this, they said they will guarantee it.” He also said the military is “monitoring the Landless Workers Movement” (Movimento dos Trabalhadores Rurais Sem Terra, or MST), the social movement of rural workers that supports PT’s efforts of land reform and inequality reduction and has led the protests against impeachment.
  • The second blockbuster revelation — perhaps even more significant — is Jucá’s statement that he spoke with and secured the involvement of numerous justices on Brazil’s Supreme Court, the institution that impeachment defenders have repeatedly pointed to as vesting the process with legitimacy in order to deny that Dilma’s removal is a coup. Jucá claimed that “there are only a small number” of Court justices to whom he had not obtained access (the only justice he said he ultimately could not get to is Teori Zavascki, who was appointed by Dilma and who — notably — Jucá viewed as incorruptible in obtaining his help to kill the investigation (a central irony of impeachment is that Dilma has protected the Car Wash investigation from interference by those who want to impeach her)). The transcripts also show him saying that “the press wants to take her [Dilma] out,” so “this shit will never stop” — meaning the corruption investigations — until she’s gone. The transcripts provide proof for virtually every suspicion and accusation impeachment opponents have long expressed about those plotting to remove Dilma from office. For months, supporters of Brazil’s democracy have made two arguments about the attempt to remove the country’s democratically elected president: (1) the core purpose of Dilma’s impeachment is not to stop corruption or punish lawbreaking, but rather the exact opposite: to protect the actual thieves by empowering them with Dilma’s exit, thus enabling them to kill the Car Wash investigation; and (2) the impeachment advocates (led by the country’s oligarchical media) have zero interest in clean government, but only in seizing power that they could never obtain democratically, in order to impose a right-wing, oligarch-serving agenda that the Brazilian population would never accept.
  •  
    Gutsy. Glenn Greenwald and his partner live in Brazil. 
Paul Merrell

Why Turkey wanted to provoke war with a 'false flag' terrorist attack on Syria - Stop t... - 0 views

  • A leaked talk by high-ranking Turkish officials reveals them talking about how easy it would be to create a false flag incident, and how they could use that to justify a wide military intervention inside Syria.
  • It was stunning to hear the highest-ranking Turks causally discussing how to provoke a false flag incident that would justify a large military intervention in Syria. This is a big deal because Turkish troops in Syria opens the door to NATO troops in Syria, which drastically expands the conflict. As someone who has spent a number of years living and working in the Middle East, and having been to Syria multiple times, I was encouraged by my colleagues at Casey Research to share my perspective on this.
  • Turkey owns a very small piece of territory inside of Syria that dates back to the Ottoman Empire. This small piece of land is the tomb of Suleyman Shah, a relative of one of the founding Ottomans. It’s guarded by 24 Turkish troops and is considered sovereign Turkish territory. Having Turkish troops in this area is not controversial, as the Syrian government has long agreed to it. The region where this tomb is located has totally fallen out of the Syrian government’s control for many months. And now, the hardcore ISIL group controls the surrounding area. It has threatened the Turkish soldiers and told them to leave. The Turks refused, and that’s why the Turkish government is getting skittish. This is where the leaked tape comes in.
  • ...3 more annotations...
  • The conversation started out with the Turks talking about how they can protect this tomb from ISIL. This is not controversial. I don’t believe the Syrian government would care about the Turks intervening to protect the tomb, since this is an area where it has lost control anyways. Plus, I’d bet the Syrian government would be happy to see the Turks bogged down fighting ISIL militants who’d otherwise be fighting them. However, that was not the end of the conversation. The really sinister part comes when the high-ranking Turks talk about how easy it would be to create a false flag incident involving the tomb, and how they could use that to justify a much wider military intervention inside Syria. Such an incident would be a sort of foot in the door to further military activities inside Syria and would allow the Turks to help their favored rebel groups, which have seen serious setbacks lately.
  • That step would clearly cause them to go to war with the Syrian government and drastically expand the conflict. And once Turkey is involved inside Syria, that opens the door for NATO to be involved. The Erdogan government has staked a huge amount of domestic political capital by supporting the Syrian rebels. They gambled that their favored rebel groups would quickly win and as a result, Turkey would have more geopolitical influence in a post-Assad Syria. It was a losing bet. Turkey’s favored rebels have seriously faltered, and a growing number of Turkish voters have become skeptical of their government’s intervention and the blowback it’s causing. A false flag incident with the tomb would be a way for Erdogan to double down in a desperate attempt to turn things around in Syria. Whoever leaked this conversation clearly timed it to take the wind out the sails of such a strategy.
  • There are only a few people with the capability and motivation to do this. As an ally of the Syrian government, Russian intelligence is at the top of that list. They have leaked similarly shocking private conversations in Ukraine recently. Members of the Turkish military opposed to Erdogan could have also done it. Instead of coming up with a classy way of saying “touché,” the Turkish government responded by throwing a childish fit, futilely trying to block YouTube and Twitter. In this digital age, restricting Internet access, seizing and spying on digital data, and otherwise tampering with an individual’s digital presence have become new tools in the traditional toolbox of desperate governments.
Paul Merrell

Turkey Sends 300 Troops into Syria - Middle East - News - Israel National News - 0 views

  • Turkish Prime Minister Recep Tayyip Erdogan has confirmed reports that Turkey has sent 300 troops into neighboring Syria to guard the tomb of a leading Turkish figure believed to be under threat from radical Islamist rebels, according to Today's Zaman. The Turkish military force, which also included several armored vehicles, is being sent to bolster a small existing unit at the tomb of Süleyman Shah, grandfather of the founder of the Ottoman Empire. The move - which essentially amounts to a limited military intervention in wore-torn Syria - should come as no surprise, after secret conversations were leaked online in which leading Turkish political and military figures can be heard discussing military intervention in Syria to protect the tomb from the Islamic State of Iraq and the Levant (ISIS). ISIS, a radical breakaway faction of Al Qaeda, has taken advantage of the chaos to implement its puritanical version of Islam in some areas of northern Syria.
  • The leaked conversations prompted a ban on Youtube in Turkey. Turkey's escalating intervention is not the first time a neighboring country has sent troops into Syria to protect its interests, using threats to Islamic shrines as a pretext. Shia Islamist fighters from Lebanon's Hezbollah and a variety of other Iranian-backed Lebanese and Iraqi militias have played a prominent role in backing the regime of Bashar al-Assad, having initially justified their intervention as a way of protecting Shia Muslim shrines deemed heretical by Sunni Islamist rebels.
  •  
    More detail on the Turkish forces here. http://www.albawaba.com/conflict-syria/turkey-troops-syria-571489 (300 men, several armored vehicles, 6 tanks, and a "food truck." Note that staging an attack on the particular tomb, which is part of Turkey entirely surrounded by Syria, is the precise formula for the false flag attack spelled out in the leaked secret conversation. So is Turkey moving those troops to the tomb to repel the false-flag attack, or is it merely a precaution? The tomb is in the city of Homs, Syria, where the Assad Syrian government is in the mopping up stage of ejecting all "rebel" forces after a lengthy and fierce battle. Also see the latest by former CIA officer Philip Girardi adding further context to Turkey's false flag Sarin gas attack in Syria as well as the leaked secret conversation. http://www.theamericanconservative.com/articles/turkey-cooks-the-books-in-syria/
Gary Edwards

Everyone is on the Gold Standard. It's not a choice any country or central bank can make. - 0 views

Dear WSJ Moderator, I tried to post a comment to the community forum for the article, "Currency Chaos; Where do we go from here?" My comments were rejected with the error message, "The language y...

gold gold-currency wsj robert-mundell milton-friedman fiat-currencies

started by Gary Edwards on 20 Oct 10 no follow-up yet
Gary Edwards

Dear Lou Dobbs, Who Owns the Federal Reserve? - 0 views

  •  
    This is the March of 2008 repub of the infamous Dear Lou letter, written by Jesse Richard. Tracks exactly with the March 2008 collapse of Bear Stearns and the subsequent Federal Reserve - US Treasury bailout. IMHO, the Bear Stearns bailout and conversion was a test run to determine how the public and Congress would react. The key factor was the massive conversion of private Bankster debt to public (taxpayer) debt. Another way of saying this: socialize the losses and privatize the profits. The go between in this mechanism is the secret connection between the Federal Reserve cartel of private Banksters, and the US Treasury. Congress, through war and social programs, racks up enormous debt. Currently about $4 Billion of debt per day. This is the amount of spending beyond taxes and other revenue sources. To fund this debt, the Treasury sells bonds, most of which are currently being purchased by Banksters and Financial interests closely associated with a cascading network of interconnected Federal Reserve shareholders. Foreign sovereign bond purchasers like China and Japan mostly dropped out of participation in the Treasury auctions in 2008, as they started dumping US Treasury holdings. Today, the circle of USA debt works like this; the Federal Reserve provides member Banksters and International Bankster associates with Trillions of dollars of near interest free money ($16.1 Trillion in 2009-2010). The Banksters then purchase the US treasury bonds at whatever the auction interest rate turns out to be. In essence, we are loaning ourselves the money to pay off our government debt, with interest. Exactly as Mr Richard claims in his infamous letter. excerpt: Let me ask you a simple question: what country in its right mind would create a system that would force it to lend itself money and have to repay the money WITH INTEREST? What country would charge itself interest? What nation would put itself out of business by making it bankrupt because
Paul Merrell

Leaked Audio Reveals Venezuelan Opposition in Secret Talks with IMF | venezuelanalysis.com - 0 views

  • A leaked audio of a conversation between Venezuelan businessman, Lorenzo Mendoza, and former politician, Ricardo Hausman, has revealed Venezuela’s political and business opposition to be seeking collaboration with the IMF (International Monetary Fund) ahead of the country’s parliamentary elections on December 6th. In the phone conversation, leaked in Venezuela last Wednesday, both men speak about the possibility of IMF intervention in the Venezuelan economy and frequently refer to each other as “mate”.   Mendoza currently ranks as one the wealthiest businessmen in the world and controls key areas of the Venezuelan economy, such as the production of cornflour, beer and other household staples. Government supporters hold him responsible for the widespread shortage of key products, which they say is an attempt to destabilise the administration of current leftwing President Nicolas Maduro.   Hausman was formerly Planning Minister (1992-1993) to disgraced ex-Venezuelan President president, Carlos Andres Perez. He currently resides in the US where he is a lecturer at the Kennedy School of Government at Harvard University. 
  • In the audio, which is dominated by Hausman, the ex-minister reveals that he is a longterm friend of the IMF’s Vice-president for the Western Hemisphere, who has asked him to go to the organisation to “talk about Venezuela”. He explains that the fund is “worried” that it will have to “intervene” in the country.   “The condition is that we have a small committee meeting to speak, gloves off, about what the hell we can do to see… Or, if you were to receive a call from Obama or Holland, or whoever and they say… Hell, mate, for us it’s really important that they get involved in Venezuela,” says Hausman.  The economist also assures Mendoza that he is committed to the “war in Venezuela” despite his absence, stating that “there is no exit for Venezuela without substantial international help,” appearing to reference the opposition’s violent street campaign to unseat the government last year, entitled La Salida (the exit).  Specifically Hausman recommends a 40-50 billion dollar loan from the IMF, which he says will entail a significant restructure of the country’s “debt profile” and “what they euphemistically term, private sector involvement”. The two men also reference a group of Hausman’s students in the US, who appear to have been pinned by both men to carry out the economic restructuring in a post-Chavista government.  The conversation finishes with Hausman revealing that he has “projects” in Colombia, Mexico, Peru and Albania, and confirming that the time is right for “carrying out an adjustment plan in Venezuela”. 
  • The recording has caused shockwaves amongst Venezuela’s citizens, who have widely rejected any IMF involvement in the country’s economics. The fund is largely held responsible by citizens for the country’s debt crisis in the 1980s, the economic turmoil of the 1990s, as well as for the riots known as the Caracazo in 1989 which led to widespread police repression and thousands of killings.  The IMF’s poisonous legacy in the country has led the country’s political opposition to distance itself publicly from the organisation. Nonetheless, its spokespeople have been consistently linked to the ill reputed fund over the past fifteen years of leftist government.  Earlier in February 2015, the political opposition led by Leopoldo Lopez, Maria Corina Machado and Antonio Ledezma, released a “Call for a National Transition Agreement” just days before the national government reported that it had uncovered plans for an attempted coup amongst the airforce.  “The Call for a National Transition” contained a number of points orientating the politics of a transitional regime in Venezuela, including selling off national public enterprises and the input of “international financial organisations”. 
  • ...1 more annotation...
  • After the government publicly released the recording between Hausman and Mendoza last week, Venezuelan President Nicolas Maduro accused the opposition of once again seeking financial support from the IMF in order to promote “insurrectionary violence” in the country.  “I have proof that the IMF has received a visit from a group of technocrats… who have requested 60 billion dollars in order to put their plan into action, and the fund has told them that they will give them [the money] if they unseat the government,” stated the president on his weekly television show, In Contact with Maduro.  Although Maduro has yet to reveal evidence, Mendoza at least seems to have corroborated the authenticity of the phone conversation, which he has slammed as an “illegal” recording of a “private talk” that he had with Hausman.  Maduro has called for Mendoza to be prosecuted.  “I hope the judicial bodies react,” he stated. 
Paul Merrell

US watched ISIS rise in Syria and hoped to use it -- Kerry on leaked tape - 0 views

  • Last fall Secretary of State Kerry met privately with anti-Assad Syrian activists at the U.N.  The meeting was secretly taped, and you can listen to the tape here:
  • The New York Times got a hold of the tape back in September and wrote a story about it. So did CNN. More on their accounts later. The thrust of the conversation was the mutual frustration of Kerry and the Syrians that Bashar al-Assad was still in power and able to commit atrocities with the support of the Russians, who don’t adhere to international law the way we Americans do. I’d recommend listening to the whole tape; but the conversation went something like this: The Syrians complained we aren’t helping enough.  Kerry and his associates said we and the Saudis and Qatar and Turkey had provided huge amounts of aid to the rebels, who unfortunately were sort of aligned with extremists. “Nusra makes it hard,” Kerry said, referring to Jabhat al-Nusra, the Al Qaeda affiliate in Syria. “Nusra and Daesh [ISIS] both make it hard, because you have this extreme element out there and unfortunately some of the opposition has kind of chosen to work with them.” The rise of extremists had led to Russia’s intervention. Kerry said (at minute 26) that when Daesh, or ISIS, started to grow, the US watched and thought we could “manage” the ISIS situation, because it might push Assad to negotiate, but instead Putin came in. Kerry:
  • “The reason Russia came in is because ISIL was getting stronger, Daesh was threatening the possibility of going to Damascus and so forth. And that’s why Russia went in. Because they didn’t want a Daesh government and they supported Assad. “And we know that this was growing. We were watching. We saw that Daesh was growing in strength, and we thought Assad was threatened. We thought, however, we could probably manage, that Assad would then negotiate. Instead of negotiating, he got Putin to support him.” The Syrian activists present wanted more US aid, but Kerry and an aide said more military aid was problematic. “Right now we’re putting an extraordinary amount of arms in,” the secretary of state said. His aide said that arms are a double edged sword, because “when you pump more weapons into a place like Syria, it doesn’t end well for Syria. Because there’s always someone willing to put in arms from the other side.” Kerry spelled that out: “The problem is that, you know, you get, quote, enforcers in there and then everybody ups the ante, right? Russia puts in more, Iran puts in more; Hezbollah is there more and Nusra is more; and Saudi Arabia and Turkey put all their surrogate money in, and you all are destroyed.”
  • ...1 more annotation...
  • Kerry said the US wants a “political process” to supplant the fighting: elections, with millions of Syrian refugees in other countries allowed to vote– so that in his view Assad was sure to lose.  The Syrians present rejected this. One insisted that Assad had to be toppled by an invasion, because Syrians even outside the country would fear for their loved ones in the country. Kerry said a ground invasion by America would not be supported by Americans, due to thousands dead from our other wars.  Kerry said he was one of those within the Administration who wanted more action, but he lost the argument.  He was as frustrated as they were. “It’s hard because Congress will not authorize the use of force.” So the conversation was mostly about that frustration, but along the way Kerry said some rather revealing things. Combine this with the wikileaks revelation that the US State Department and Hillary Clinton knew our Arab allies Saudi Arabia and Qatar were giving ISIS “clandestine financial and logistic support” as it swept across Iraq and Syria in 2014, and you have the anti-interventionist view of America’s role in the Syrian war all nicely set out by John Kerry and someone in the State Department: We and our Arab allies supplied weapons. This caused the violence to escalate.  The good rebels “kind of” work with extremists, who get direct funding from our Arab allies. We thought the rise of ISIS would prove useful in pressuring Assad, but Putin intervened not because Russia wants to bomb civilians but because of the rise of ISIS. So our arming of the rebels and our clever hopes to manage the rise of ISIS while it put pressure on Assad led to more violence. This all sounds like a list of reasons for why the U.S. shouldn’t have intervened, along with the fact that we had no right to do so.
Paul Merrell

US Regime-Change Operation in Ukraine Exposed in Leaked Diplomatic Phone Call | Global ... - 0 views

  • A leaked phone conversation between Victoria Nuland, assistant secretary of state for European and Eurasian affairs, and Geoffrey Pyatt, the US ambassador to Ukraine, has exposed the anti-democratic and colonialist character of the Obama administration’s intervention in the former Soviet republic. The discussion between the two officials includes a detailed review of which right-wing opposition figures Washington is working to install in office, and how it is using the United Nations to rubber-stamp the operation. While Germany and other European powers have worked closely with the Obama administration in promoting the violent protests against President Viktor Yanukovych, the leaked phone call reveals tensions between the imperialist powers. At one point Nuland tells Pyatt, “Fuck the EU.”
  • Nuland continues: “Yats [Yatsenyuk] is the guy that who’s got the economic experience, the governing experience.” Pyatt later warns Nuland that “Klitschko has been the top dog” within the opposition, and that she will need to “move fast on all this stuff” and speak with the UDAR leader as part of their “personality management” of the opposition leadership. The utter criminality of Washington’s drive to install a pliant regime in Kiev sharply emerges in Nuland and Pyatt’s discussion of Oleh Tyahnybok, the leader of the neo-fascist All-Ukrainian Union (Svoboda) party. Nuland describes Tyahnybok as one of the “big three” within the opposition leadership. The State Department operative goes on to tell Pyatt that “what [Yatsenyuk] needs [after he is installed in office] is Klitsch and Tyahnybok on the outside—he needs to be talking to them four times a week.” These remarks confirm that there is no confusion whatsoever within the Obama administration that it is working in partnership with fascist movements in Ukraine.
  • Tyahnybok is the leader of the Svoboda party, which was initially called the Social-National Party of Ukraine and featured a neo-Nazi logo. In 2004, Tyahnybok praised right-wing Ukrainian partisans in World War II, who, he declared, “did not fear, but took up their automatic rifles, going into the woods to fight Muscovites, Germans, Jewry and other filth.” He added that Ukraine still had to be liberated from a “Moscow-Jewish mafia.” In 2005, Tyahnybok signed an open letter to Ukrainian leaders demanding a halt to the “criminal activities” of “organised Jewry,” which, he declared, was attempting to commit “genocide” against the Ukrainian people. This is one of the “big three” figures with whom the Obama administration is working to install a client regime in Ukraine. Yesterday, Nuland met with several opposition figures, among them Oleh Tyahnybok. No details of the discussion have been made public, but Ambassador Pyatt released via Twitter a photo of a smiling Nuland posing next to the pro-Nazi leader and his colleagues.
  •  
    There was far more in that telephone conversation than an F-bomb leveled at the E.U., not that you would learn this from mainstream media.
Gary Edwards

Startup turns carbon dioxide into fuels - 0 views

  • The research has received funding from the Air Force Office of Scientific Research (AFSOR), the National Science Foundation and the Department of Energy (DOE). The collaboration between Liquid Light and the University was supported by the DOE Small Business Innovation Research program and the AFOSR Small Business Technology Transfer program. Princeton's agreement with Liquid Light allowed the company to continue to collaborate with Bocarsly and his research team. Before long, new discoveries were emerging. "They started noticing interesting chemistry that we wouldn't have predicted," said Bocarsly.
  • The Princeton scientists did some additional studies, and made a surprising discovery: They could turn CO2, which contains only one carbon, into a compound with a carbon-carbon bond, which vastly increases the possibilities for creating commercial applications. This was radical because although the reaction is certainly possible, it is highly unlikely to happen because so many other competing reactions are occurring. "Everyone who electrochemically reduces CO2 today makes compounds with only one carbon," said Bocarsly. "Nobody makes things with carbon-carbon bonds." He paused. "But we can." "That was a very 'wow' moment," recalled Cole, "because we thought that our process could only make methanol. But now we were finding that we could make a variety of products, and that is what makes this technology commercially interesting." She said Liquid Light scientists can now make more than 20 different products from CO2.
  • One of the chemicals Liquid Light can make is isopropanol, commonly known as rubbing alcohol and an important industrial chemical. Another is butanol, which could be commercially important as a fuel. Liquid Light's technology offers the potential to make these chemicals at lower cost than today's methods, which involve starting with fossil fuels such as petroleum and natural gas.
  • ...3 more annotations...
  • Why does pyridinium work so well as a catalyst for the reaction? Based on its structure, the ring-shaped molecule is an unlikely catalyst for this reaction because it shuttles just one electron at a time. But to convert CO2 to methanol requires six electrons, and to make higher-carbon molecules takes even more electrons. Bocarsly and his team — in collaboration with Steven Bernasek, professor of chemistry — are doing studies to understand the steps in the chemical reaction, and they are making rapid progress. "There are clearly some intermediate products formed during the reaction that do not sit around for a long time and are not there in very high concentrations," said Bocarsly.
  • The Princeton team also is studying the factors that determine which products can be made from CO2. The researchers have found that very subtle changes in the electrode surface can lead to production of different chemicals. For example, CO2 plus a pyridinium catalyst and a platinum electrode make methanol. However, the same catalyst and a different electrode give a different product. The team published its findings on how the reaction is affected by catalyst concentration, temperature and pressure in the journal ChemSusChem last year.
  • Citing government statistics that the United States generates about 5.5 billion metric tons of CO2 per year, Teamey said it will not be hard to obtain the starting materials for this new industry. However, the CO2 needs to be relatively pure, a requirement that rules out gasoline tailpipes and coal-fired power plants. Instead, said Teamey, the CO2 could come from manufacturing facilities, such as fertilizer manufacturers and cement plants, which according to Teamey emit some 100 million tons of high-purity CO2 each year.
  •  
    "Today, carbon dioxide (CO2) is a hot topic. Scientists around the globe are searching for ways to store, dispose of, or prevent the formation of the greenhouse gas, which is a major driver of global climate change. Liquid Light hopes to take this concept one step further and harness waste CO2 as a source of carbon to make industrial chemicals and fuels. The technology behind the process is simple: Take CO2 and mix it in a water-filled chamber with an electrode and a catalyst. The ensuing chemical reaction converts CO2 into a new molecule, methanol, which can be used as a fuel, an industrial solvent or a starting material for the manufacture of other chemicals. Liquid Light's founders include Bocarsly and his former graduate student Emily Cole, who earned her Ph.D. from Princeton in 2009. Cole helped revive efforts in Bocarsly's lab to study the conversion of CO2 into usable fuels, which led to the launch of Liquid Light and an ongoing collaboration that Bocarsly said has been extremely positive for his research team at the University. "We've made some discoveries that wouldn't have been made in a university setting, and this has really accelerated the research," Bocarsly said. "It is a very productive relationship." Back in the 1990s, a former Ph.D. student of Bocarsly's named Chao Lin conducted some of the earliest experiments on turning CO2 into methanol. He used palladium metal as the electrode and pyridinium, an inexpensive ring-shaped molecule, as the catalyst. By plugging the electrode into an electrical outlet, he could drive an electrochemical reaction that converted CO2 into methanol. As Bocarsly recalled, Lin was quite excited about his success. However, said Bocarsly, "We published that finding in 1994 and there was approximately zero interest in it." The work languished until 2005 when Cole, then a new graduate student, told Bocarsly she wanted to work on a clean-energy project. She took up the challenge of reproducing Lin's results, but this time
1 - 20 of 251 Next › Last »
Showing 20 items per page