Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Converse

Rss Feed Group items tagged

Paul Merrell

The Anti-Empire Report #126 - March 7th, 2014 - William Blum - 0 views

  • Since the end of the Cold War the United States has been surrounding Russia, building one base after another, ceaselessly looking for new ones, including in Ukraine; one missile site after another, with Moscow in range; NATO has grabbed one former Soviet Republic after another. The White House, and the unquestioning American mainstream media, have assured us that such operations have nothing to do with Russia. And Russia has been told the same, much to Moscow’s continuous skepticism. “Look,” said Russian president Vladimir Putin about NATO some years ago, “is this is a military organization? Yes, it’s military. … Is it moving towards our border? It’s moving towards our border. Why?” The Holy Triumvirate would love to rip Ukraine from the Moscow bosom, evict the Russian Black Sea Fleet, and establish a US military and/or NATO presence on Russia’s border. (In case you were wondering what prompted the Russian military action.) Kiev’s membership in the EU would then not be far off; after which the country could embrace the joys of neo-conservatism, receiving the benefits of the standard privatization-deregulation-austerity package and join Portugal, Ireland, Greece, and Spain as an impoverished orphan of the family; but no price is too great to pay to for being part of glorious Europe and the West!
  • The Ukrainian insurgents and their Western-power supporters didn’t care who their Ukrainian allies were in carrying out their coup against President Viktor Yanukovych last month … thugs who set policemen on fire head to toe … all manner of extreme right-wingers, including Chechnyan Islamic militants … a deputy of the ultra-right Svoboda Party, part of the new government, who threatens to rebuild Ukraine’s nukes in three to six months. … the snipers firing on the protestors who apparently were not what they appeared to be – A bugged phone conversation between Urmas Paet, the Estonian foreign minister, and EU foreign policy chief Catherine Ashton, reveals Paet saying: “There is now stronger and stronger understanding that behind the snipers it was not Yanukovych, but it was somebody from the new coalition.” … neo-Nazi protestors in Kiev who have openly denounced Jews, hoisting a banner honoring Stepan Bandera, the infamous Ukrainian nationalist who collaborated with the German Nazis during World War II and whose militias participated in atrocities against Jews and Poles. The Israeli newspaper Haaretz reported on February 24 that Ukrainian Rabbi Moshe Reuven Azman advised “Kiev’s Jews to leave the city and even the country.” Edward Dolinsky, head of an umbrella organization of Ukrainian Jews, described the situation for Ukrainian Jews as “dire” and requested Israel’s help. All in all a questionable gang of allies for a dubious cause; reminiscent of the Kosovo Liberation Army thugs Washington put into power for an earlier regime change, and has kept in power since 1999.
  • The now-famous recorded phone conversation between top US State Department official Victoria Nuland and the US ambassador to the Ukraine, wherein they discuss which Ukrainians would be to Washington’s liking in a new government, and which not, is an example of this regime-change mentality. Nuland’s choice, Arseniy Yatseniuk, emerged as interim prime minister. The National Endowment for Democracy, an agency created by the Reagan administration in 1983 to promote political action and psychological warfare against states not in love with US foreign policy, is Washington’s foremost non-military tool for effecting regime change. The NED website lists 65 projects that it has supported financially in recent years in Ukraine. The descriptions NED gives to the projects don’t reveal the fact that generally their programs impart the basic philosophy that working people and other citizens are best served under a system of free enterprise, class cooperation, collective bargaining, minimal government intervention in the economy, and opposition to socialism in any shape or form. A free-market economy is equated with democracy, reform, and growth; and the merits of foreign investment in their economy are emphasized. The idea was that the NED would do somewhat overtly what the CIA had been doing covertly for decades, and thus, hopefully, eliminate the stigma associated with CIA covert activities. Allen Weinstein, who helped draft the legislation establishing NED, declared in 1991: “A lot of what we do today was done covertly 25 years ago by the CIA.”
  • ...2 more annotations...
  • NED, receives virtually all its financing from the US government ($5 billion in total since 1991 ), but it likes to refer to itself as an NGO (Non-governmental organization) because this helps to maintain a certain credibility abroad that an official US government agency might not have. But NGO is the wrong category. NED is a GO. Its long-time intervention in Ukraine is as supra-legal as the Russian military deployment there. Journalist Robert Parry has observed: For NED and American neocons, Yanukovych’s electoral legitimacy lasted only as long as he accepted European demands for new “trade agreements” and stern economic “reforms” required by the International Monetary Fund. When Yanukovych was negotiating those pacts, he won praise, but when he judged the price too high for Ukraine and opted for a more generous deal from Russia, he immediately became a target for “regime change.” Thus, we have to ask, as Mr. Putin asked – “Why?” Why has NED been funding 65 projects in one foreign country? Why were Washington officials grooming a replacement for President Yanukovych, legally and democratically elected in 2010, who, in the face of protests, moved elections up so he could have been voted out of office – not thrown out by a mob? Yanukovych made repeated important concessions, including amnesty for those arrested and offering, on January 25, to make two of his adversaries prime minister and deputy prime minister; all to no avail; key elements of the protestors, and those behind them, wanted their putsch.
  • Carl Gershman, president of NED, wrote last September that “Ukraine is the biggest prize”. The man knows whereof he speaks. He has presided over NED since its beginning, overseeing the Rose Revolution in Georgia (2003), the Orange Revolution in Ukraine (2004), the Cedar Revolution in Lebanon (2005), the Tulip Revolution in Kyrgyzstan (2005), the Green Revolution in Iran (2009), and now Ukraine once again. It’s as if the Cold War never ended. The current unbridled animosity of the American media toward Putin also reflects an old practice. The United States is so accustomed to world leaders holding their tongue and not voicing criticism of Washington’s policies appropriate to the criminality of those policies, that when a Vladimir Putin comes along and expresses even a relatively mild condemnation he is labeled Public Enemy Number One and his words are accordingly ridiculed or ignored. On March 2 US Secretary of State John Kerry condemned Russia’s “incredible act of aggression” in Ukraine (Crimea) and threatened economic sanctions. “You just don’t in the 21st century behave in 19th century fashion by invading another country on completely trumped up pre-text.” Iraq was in the 21st century. Senator John Kerry voted for it. Hypocrisy of this magnitude has to be respected.
Paul Merrell

Kiev Snipers Shooting From Bldg Controlled By Maidan Forces - Ex-Ukraine Security Chief - 0 views

  • Former chief of Ukraine’s Security Service has confirmed allegations that snipers who killed dozens of people during the violent unrest in Kiev operated from a building controlled by the opposition on Maidan square.
  • Shots that killed both civilians and police officers were fired from the Philharmonic Hall building in Ukraine’s capital, former head of the Security Service of Ukraine Aleksandr Yakimenko told Russia 1 channel. The building was under full control of the opposition and particularly the so-called Commandant of Maidan self-defense Andrey Parubiy who after the coup was appointed as the Secretary of the National Security and Defense Council of Ukraine, Yakimenko added.
  • “When the first wave of shootings ended, many have witnessed 20 people leaving the building,” former chief says, noting that they were well-equipped and were carrying military style bag for carrying sniper and assault rifles with optical sights. Not only the law enforcers, but people from the opposition’s Freedom, Right Sector, Fatherland, and Klitschko’s UDAR party have also seen this, Yakimenko claims. The former security head also said that according to the intelligence those snipers could be foreigners, including mercenaries from former Yugoslavia as well former Special Forces employees from Ukraine’s Defense Ministry. Yakimenko claims that Parubiy was part of a group that was heavily influenced by the people associated with the US secret services. “These were the forces that carried out everything that they were told by their leadership – the United States,” Yakimenko explained, claiming that Maidan leaders practically lived in the US embassy.
  • ...1 more annotation...
  • Aleksandr Yakimenko’s account supports previously voiced concerns over unknown snipers shooting both protesters and the police indiscriminately – who were the topic of the recently leaked phone conversation between EU’s Catherine Ashton and Estonian Foreign Minister Urmas Paet. In a leaked phone conversation that took place February 26 Ashton and Paet discussed rumors that snipers were hired by some of the opposition leaders. “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovich, but it was somebody from the new coalition,” Paet said during the conversation. “I think we do want to investigate. I mean, I didn’t pick that up, that’s interesting. Gosh,” Ashton answered. Almost 100 people were killed and another 900 injured during the violent standoff near Maidan Square in Kiev last month that forced president Yanukovich out of the country and installed a new government. Ukrainian self-proclaimed authorities maintain that the shooting was authorized by Yanukovich. On Wednesday Moscow suggested setting up a probe to investigate the crimes perpetrated by extremist and armed elements of the opposition over the past three months. The proposal to the Parliamentary Assembly of the Council of Europe (PACE) also seeks to examine the legitimacy of the post-coup Ukrainian government.
Paul Merrell

Obamacare Full Frontal: Of 953,000 Jobs Created In 2013, 77%, Or 731,000 Are Part-Time ... - 0 views

  • When the payroll report was released last month, the world finally noticed what we had been saying for nearly three years: that the US was slowly being converted to a part-time worker society. This slow conversion accelerated drastically in the last few months, and especially in June, when part time jobs exploded higher by 360K while full time jobs dropped by 240K. In July we are sad to report that America's conversation to a part-time worker society is not "tapering": according to the Household Survey, of the 266K jobs created (note this number differs from the establishment survey), only 35% of jobs, or 92K, were full time. The rest were... not.
Paul Merrell

Hillary Clinton: we need to talk sensibly about spying | World news | The Guardian - 0 views

  • Hillary Clinton has called for a "sensible adult conversation", to be held in a transparent way, about the boundaries of state surveillance highlighted by the leaking of secret NSA files by the whistleblower Edward Snowden.In a boost to Nick Clegg, the British deputy prime minister, who is planning to start conversations within government about the oversight of Britain's intelligence agencies, the former US secretary of state said it would be wrong to shut down a debate.Clinton, who is seen as a frontrunner for the 2016 US presidential election, said at Chatham House in London: "This is a very important question. On the intelligence issue, we are democracies thank goodness, both the US and the UK."We need to have a sensible adult conversation about what is necessary to be done, and how to do it, in a way that is as transparent as it can be, with as much oversight and citizens' understanding as there can be."
  • In her remarks, Clinton did not comment on the UK's oversight arrangements. But she indicated she was wholly supportive of the approach adopted by Barack Obama who – in contrast to Downing Street – has said he welcomes a debate on surveillance in the wake of the NSA leaks.Answering a question from the Guardian at Chatham House, she said the discussion had to take place within a framework that addressed issues of privacy and protection of citizens because some surveillance programmes remained a "really critical ingredient in our homeland security."Clinton, who is considering whether to make her second challenge for the Democratic presidential nomination, added: "It would be going down a wrong path if we were to reject the importance of the debate, and the kinds of intelligence activities that genuinely keep us safe."So how do we sort all of this out? This is a problem that is well over a decade old, where these capacities have corresponded with increasing outreach to consumers on the business side and increasing concern about security on the government side. People need to be better informed."
  •  
    Some surveillance programmes remained a "really critical ingredient in our homeland security." So the politics of fear and faux terrorism is more important to Hillary than civil liberties. There is only one political party in the U.S., the War Party.
Paul Merrell

Spying on the president -- Obama, Merkel and the NSA | Fox News - 0 views

  • When German Chancellor Angela Merkel celebrated the opening of the new U.S. embassy in Berlin in 2008, she could not have imagined that she was blessing the workplace for the largest and most effective gaggle of American spies anywhere outside of the U.S. It seems straight out of a grade-B movie, but it has been happening for the past eleven years: The NSA has been using Merkel as an instrument to spy on the president of the United States.  We now know that the NSA has been listening to and recording Merkel’s cellphone calls since 2002. 
  • In 2008, when the new embassy opened, the NSA began using more sophisticated techniques that included not only listening, but also following her.  Merkel uses her cellphone more frequently than her landline, and she uses it to communicate with her husband and family members, the leadership of her political party, and her colleagues and officials in the German government. She also uses her cellphone to speak with foreign leaders, among whom have been President George W. Bush and President Obama. 
  • Thus, the NSA -- which Bush and Obama have unlawfully and unconstitutionally authorized to obtain and retain digital copies of all telephone conversations, texts and emails of everyone in the U.S., as well as those of hundreds of millions of persons in Europe and Latin America -- has been listening to the telephone calls of both American presidents whenever they have spoken with the chancellor.
  • ...3 more annotations...
  • Obama apparently has no such revulsion. One would think he’s not happy that his own spies have been listening to him.  One would expect that he would have known of this.  Not from me, says Gen. Keith Alexander, the director of the NSA, who disputed claims in the media that he told Obama of the NSA spying network in Germany last summer.  Either the president knew of this and has denied it, or he is invincibly ignorant of the forces he has unleashed on us and on himself.
  • One can only imagine what NSA agents learned from listening to Bush and Obama as they spoke to Merkel and 34 other friendly foreign leaders, as yet unidentified publicly. Now we know how pervasive this NSA spying is: It not only reaches the Supreme Court, the Pentagon, the CIA, the local police and the cellphones and homes of all Americans; it reaches the Oval Office itself. Yet when the president denies that he knows of this, that denial leads to more questions. The president claims he can start secret foreign wars using the CIA, secretly kill Americans using drones, and now secretly spy on anyone anywhere using the NSA. 
  • Is the president an unwitting dupe to a secret rats’ nest of uncontrolled government spies and killers?  Or is he a megalomaniacal, totalitarian secret micromanager who lies regularly, consistently and systematically about the role of government in our lives? Which is worse? What do we do about it?
  •  
    Judge Napolitano raises an interesting point: Did Barack Obama realize that his conversations with 35 foreign national leaders were being wiretapped? General Alexander says not. 
Paul Merrell

NSA spied on the Vatican as cardinals elected Pope Francis | The Raw Story - 0 views

  • US secret services allegedly eavesdropped on cardinals before the conclave in March to elect a new pope, Italian weekly magazine Panorama claimed Wednesday. “The National Security Agency wiretapped the pope,” the magazine said, accusing the United States of listening in to telephone calls to and from the Vatican, including the accommodation housing cardinal Jorge Mario Bergoglio before he was elected Pope Francis. The allegations follow a report on surveillance website Cryptome which said the United States intercepted 46 million telephone calls in Italy in December 2012 and early January 2013. Among those, “there are apparently also calls from and to the Vatican,” Panorama said. “It is feared that the great American ear continued to tap prelates’ conversations up to the eve of the conclave,” it said, adding that there were “suspicions that the conversations of the future pope may have been monitored”. Bergoglio “had been a person of interest to the American secret services since 2005, according to Wikileaks,” it said.
  • The bugged conversations were divided into four categories: “leadership intentions”, “threats to financial systems”, “foreign policy objectives” and “human rights,” it claimed. Vatican spokesman Federico Lombardi said “we have heard nothing of this and are not worried about it.” If true, the US spying would be an embarrassing blow to an institution famous for its secrecy. The goings-on of the conclave are particularly clock-and-dagger, with a system installed in the Sistine chapel where the cardinals meet in order to scramble any mobile phone communications and excommunication for those who spill the beans.
Gary Edwards

Nate Jackson: Does Seeking to Jail Political Opponents Count as a 'Smidgen of Corruptio... - 0 views

  • And they wonder why people don’t trust the NSA’s mass metadata collection. The conversations that began at least in 2010 continued for three years. In fact, two days before Lerner “apologized” and outed the whole conspiracy, she wrote an email to the acting IRS commissioner’s chief of staff detailing ongoing discussions with DOJ officials. “These new documents show that the Obama IRS scandal is also an Obama DOJ and FBI scandal,” said Judicial Watch President Tom Fitton. “The FBI and Justice Department worked with Lois Lerner and the IRS to concoct some reason to put President Obama’s opponents in jail before his reelection. And this abuse resulted in the FBI’s illegally obtaining confidential taxpayer information. How can the Justice Department and FBI investigate the very scandal in which they are implicated?”
  • The answer to that last, albeit rhetorical, question is that they can’t and they aren’t. Any “investigation” by the DOJ or FBI will no doubt exonerate anyone of importance in the Obama administration. If any guilt is unavoidable, it will be hung around the necks of those rascals in Cincinnati or some other unfortunate scapegoat. All while Lerner continues to enjoy her comfortable retirement, and Obama himself remains untouched. On top of the serious breach of law and abuse of power in targeting Obama’s political opponents, the agencies' carefully crafted stonewall blocked the timely release of information. As with Hillary Clinton’s emails and the Benghazi cover-up, the slow bleed of information leaves the public tired of hearing “old news” and makes it all the more certain the perpetrators won’t face real accountability, much less justice.
  • Finally, we’re reminded of a commencement speech Obama delivered in 2009 at Arizona State University, after university officials declined to give Obama an honorary doctorate. Obama “joked” that “[university president Michael] Crowe and the Board of Regents will soon learn all about being audited by the IRS.” Clearly, that wasn’t much of a joke.
  •  
    "There was "not even a smidgen of corruption" at the IRS, Barack Obama told us in February 2014, though he conceded "there were some bone-headed decisions." That was a bald-faced lie at the time, and new information only reinforces that conclusion. While the mainstream media turns a blind eye and deaf ear, Judicial Watch has continued digging for information regarding IRS targeting of Tea Party and Patriot groups leading up to (and almost surely aiding in) Obama's re-election in 2012. And they discovered some serious collusion that sounds more like something out of Soviet Russia or Red China than here in the U.S. "Judicial Watch … released new Department of Justice (DOJ) and Internal Revenue Service (IRS) documents that include an official 'DOJ Recap' report detailing an October 2010 meeting between Lois Lerner, DOJ officials and the FBI to plan for the possible criminal prosecution of targeted nonprofit organizations for alleged illegal political activity." In other words, imprisoning political opponents. Remember when the IRS initially blamed the whole fiasco on a couple of low-level employees in Cincinnati? Good times. The documents reveal numerous conversations between the three agencies, including Lois Lerner, about creative ways to charge and jail conservatives for the "crime" of political activity opposing Obama. To do so, the DOJ and FBI needed to illegally obtain taxpayer information from the IRS. So the IRS sent the FBI more than one million pages of taxpayer information on 113,000 non-profit groups."
Paul Merrell

Vodafone reveals existence of secret wires that allow state surveillance | Business | T... - 0 views

  • Vodafone, one of the world's largest mobile phone groups, has revealed the existence of secret wires that allow government agencies to listen to all conversations on its networks, saying they are widely used in some of the 29 countries in which it operates in Europe and beyond.The company has broken its silence on government surveillance in order to push back against the increasingly widespread use of phone and broadband networks to spy on citizens, and will publish its first Law Enforcement Disclosure Report on Friday. At 40,000 words, it is the most comprehensive survey yet of how governments monitor the conversations and whereabouts of their people.The company said wires had been connected directly to its network and those of other telecoms groups, allowing agencies to listen to or record live conversations and, in certain cases, track the whereabouts of a customer. Privacy campaigners said the revelations were a "nightmare scenario" that confirmed their worst fears on the extent of snooping.
  • Vodafone's group privacy officer, Stephen Deadman, said: "These pipes exist, the direct access model exists."We are making a call to end direct access as a means of government agencies obtaining people's communication data. Without an official warrant, there is no external visibility. If we receive a demand we can push back against the agency. The fact that a government has to issue a piece of paper is an important constraint on how powers are used."Vodafone is calling for all direct-access pipes to be disconnected, and for the laws that make them legal to be amended. It says governments should "discourage agencies and authorities from seeking direct access to an operator's communications infrastructure without a lawful mandate".
  • In America, Verizon and AT&T have published data, but only on their domestic operations. Deutsche Telekom in Germany and Telstra in Australia have also broken ground at home. Vodafone is the first to produce a global survey.
  • ...2 more annotations...
  • Peter Micek, policy counsel at the campaign group Access, said: "In a sector that has historically been quiet about how it facilitates government access to user data, Vodafone has for the first time shone a bright light on the challenges of a global telecom giant, giving users a greater understanding of the demands governments make of telcos. Vodafone's report also highlights how few governments issue any transparency reports, with little to no information about the number of wiretaps, cell site tower dumps, and other invasive surveillance practices."
  • Snowden, the National Security Agency whistleblower, joined Google, Reddit, Mozilla and other tech firms and privacy groups on Thursday to call for a strengthening of privacy rights online in a "Reset the net" campaign.Twelve months after revelations about the scale of the US government's surveillance programs were first published in the Guardian and the Washington Post, Snowden said: "One year ago, we learned that the internet is under surveillance, and our activities are being monitored to create permanent records of our private lives – no matter how innocent or ordinary those lives might be. Today, we can begin the work of effectively shutting down the collection of our online communications, even if the US Congress fails to do the same."
  •  
    The Vodafone disclosures will undoubtedly have a very large ripple effect. Note carefully that this is the first major telephone service in the world to break ranks with the others and come out swinging at secret government voyeur agencies. Will others follow. If you follow the links to the Vodafone report, you'll find a very handy big PDF providing an overview of the relevant laws in each of the customer nations. There's a cute Guardian table that shows the aggregate number of warrants for interception of content via Vodafone for each of those nations, broken down by content type. That table has white-on-black cells noting where disclosure of those types of surveillance statistics are prohibited by law. So it is far from a complete picture, but it's a heck of a good start.  But several of those customer nations are members of the E.U., where digital privacy rights are enshrined as human rights under an EU-wide treaty. So expect some heat to roll downhill on those nations from the European treaty organizations, particularly the European Court of Human Rights, staffed with civil libertarian judges, from which there is no appeal.     
Paul Merrell

M of A - Media Neglect Turkish False Flag Attack Leak And Its Implications - 0 views

  • Some more thoughts on the leaked tape from a meeting in the Turkish foreign ministry which is only very selectively reported in "western" media. A video with recorded voices and English text is available as is the seemingly complete text in two parts. The setting of the recording is this: The voices of the illegal recording believed to belong to Davutoğlu, National Intelligence Organization (MİT) Hakan Fidan, Foreign Ministry Undersecretary Feridun Sinirlioğlu, and Deputy Chief of General Staff Gen. Yaşar Gürel. According to the information obtained from sources, the recording consists of a chat between four officials in Davutoğlu’s office before the commencement of the official meeting with the participation of more civil and military bureaucrats in another room at the Foreign Ministry. It is not clear when exactly the meeting happened. It would fit the situation late last year or early 2014.
  • The major points from my view: Turkey has delivered 2,000 trucks of weapons and ammunition to the insurgents in Syria. There are plans for false flag attacks on Turkey or Turkish property to justify an attack from Turkey on Syria. The Turkish military has great concerns going into and fighting Syria. The general atmosphere between these deciders is one of indecisiveness. Everyone seems to be unclear what Erdogan wants and is waiting for clear orders from above. U.S. military has shortly before the meeting presented fresh plans for a no-fly one over Syria. Then there is the fact in itself that this tape and others leaked. Internal government communication in Turkey and personal communication of Turkish official has been thoroughly compromised. This will hinder future decision making and will erode any trust Turkish government allies may have in it.
  • It is somewhat astonishing how "western" media avoid the content of the leaked tape. An AP report on it makes a lot of the youtube blocking the Turkish government ordered in reaction to the tape. Of the recording itself the AP only mentions this: The four are allegedly heard discussing a military intervention in neighboring Syria, a sensitive political issue in Turkey, although the context of the conversation is not clear. The Washington Post filed that AP report under Technology. This is an incredible disservice to its readers. The Guardian report based on Reuters is not any better: The move by the TIB came hours after an anonymous YouTube account posted a leaked audio recording allegedly of a confidential conversation between Turkish intelligence chief Hakan Fidan, foreign minister Ahmet Davutoglu, undersecretary of the foreign ministry Feridun Sinirlioglu and deputy chief of the general staff, Yasar Gürel, discussing possible military action in Syria. There is no mentioning at all of the false flag attack. The Wall Street Journal comes somewhat nearer to the truth: ... a leaked recording published anonymously on the platform purported to reveal a conversation in which Turkey's foreign minister, spy chief and a top general appear to discuss how to create a pretext for a possible Turkish attack within Syria. For once kudos to the NYT which at least touches one point but leaves out the other important ones: ... the officials were heard discussing a plot to establish a justification for military strikes in Syria. One option that is said to have been discussed was orchestrating an attack on the Tomb of Suleyman Shah ... German media did not do any better.
  • ...2 more annotations...
  • A NATO ally is planning a false flag attack on its own territory which would implicate NATO Article 5 and other NATO countries' forces and the media do not even touch the issue? This is ludicrous. Related to the Syria issue is another thinly sourced trial balloon, the tenth or so, by the unofficial CIA spokesperson David Ignatius in the Washington Post: The Obama administration, stung by reversals in Ukraine and Syria, appears to have decided to expand its covert program of training and assistance for the Syrian opposition, deepening U.S. involvement in that brutal and stalemated civil war. ... Details of the plan were still being debated Thursday, but its likely outlines were described by knowledgeable officials: ... It follows the list of issues that have been discussed on and on over the last three years, more CIA training for insurgents in Jordan, more weapons, maybe some MANPADs. Ignatius source is here seems to be the CIA friends in the Syrian opposition: The expanded program would “send a clear message to the Assad regime that there is no military solution to the struggle,” according to a March memo to the White House from the opposition. Assad “has no incentive to talk” now, the memo argued, because he thinks he is winning. The rationale, bluntly stated, is that to reach an eventual diplomatic settlement in Syria, it is necessary now to escalate the conflict militarily. This has been a hard pill for Obama to swallow, but prodded by the Saudis, he seems to have reached that point.
  • There are so many caveats in here - "appears to have decided", 2still being debated", "seems to have reached that point" - that I do not believe a word of it. The loudly announced, by Ignatius and others, attack on south Syria has yet to appear and the halfhearted attack by the Turkish supported Jihadists in the north seems to be stuck. I do not anticipate any bigger action by Turkey or the U.S. especially as the such action right now would likely lead to harsher reaction by Russia.
  •  
    "A NATO ally is planning a false flag attack on its own territory which would implicate NATO Article 5 and other NATO countries' forces and the media do not even touch the issue? This is ludicrous." Beyond ludicrous. If a NATO member is attacked, all NATO nations are required by treaty to come to that nation's military aid. That Turkey is planning a false flag attack on Syria that could force us into a war deserves far more widespread news coverage.
Paul Merrell

The Cartel: How BP Got Insider Tips Through a Secret Chat Room - Bloomberg - 0 views

  • Copies of messages sent to BP traders over the course of a year were provided to Bloomberg News by a person with access to the online conversations. The person, who redacted the names of banks sending the messages and dates of conversations, said they came from firms whose senior foreign-exchange traders belonged to a chat room called “The Cartel” that was set up by Usher and included dealers at JPMorgan, Citigroup Inc. (C), Barclays Plc and UBS Group AG. (UBSN) The information offered an insight into currency moves minutes, sometimes hours before they happened. The messages could drag the U.K.’s biggest energy company into a scandal that has enveloped 11 banks and led to more than 30 traders from London to Singapore losing or being suspended from their jobs. Last month six banks were fined $4.3 billion for passing along information about their clients and working together to rig foreign-exchange markets.
  • While there’s no evidence that any BP traders were members of the Cartel, Usher participated in at least one chat room with White, according to a person who has examined conversations that included both men. It couldn’t be determined from the messages reviewed by Bloomberg News who sent the information to BP or whether BP employees acted on any of the tips.
  • In the clubby, lightly regulated world of foreign exchange, traders passed around tips to their circle of trusted contacts like candy. The victims: mutual-fund investors, pensioners and day traders who took the other side of a transaction at a lower price than they would have if they had the same information. “The authorities have made it clear in the enforcement notices accompanying the recent fines that irrespective of whether specific markets are regulated, banks cannot have pockets of business where traders behave as if they’re dealing in the Wild West,” said Janine Alexander, a partner at law firm Collyer Bristow LLP in London who specializes in financial-services litigation. “Banks have a responsibility to preserve market integrity, and traders must consider the effect of their behavior on clients and the market as a whole.”
  • ...3 more annotations...
  • The settlements the banks reached with regulators reveal that in the minutes before 4 p.m. the traders would meet on chat rooms to discuss their positions and how they planned to execute them. Sometimes they also agreed to work together to push exchange rates around to boost their profits –- something they called “double-teaming.”
  • The four banks in the Cartel controlled about 45 percent of the global spot-currency market, according to a survey by Euromoney Institutional Investor Plc, so information about their plans was valuable. Some days they worked together to push around the 4 p.m. fix, settlements with the banks show.
  • The party came to an end in October 2013, when regulators around the world announced they were investigating allegations of abuses in the currency market. The four members of the Cartel have left their firms, and JPMorgan, Citigroup and UBS were among banks fined in November. Individuals could face criminal charges when the U.S. Department of Justice and the U.K.’s Serious Fraud Office conclude their own investigations.
Paul Merrell

Netanyahu said to have offered Lewinsky tapes for Pollard | The Times of Israel - 0 views

  • ASHINGTON — Israel attempted to use tapes of former US president Bill Clinton’s steamy conversations with intern Monica Lewinsky to leverage the release of Jonathan Pollard, a new book on the Clinton family’s political enterprises has claimed. In the book, titled “Clinton Inc: The Audacious Rebuilding of a Political Machine,” author Daniel Halper relies on on-the-record interviews with former officials together with a close analysis of documents termed “the Monica Files” to paint a salacious – and uncomplimentary – picture of one of the most prominent political families in the United State
  • Halper is not the first to claim that Israel illicitly taped the steamy conversations between Clinton and Lewinsky and tried to leverage it to its advantage. In 1999, UK author Gordon Thomas claimed that the Mossad had collected some 30 hours’ worth of phone sex conversations between Lewinsky and Clinton and was using them to blackmail the US or to protect a deeply-embedded mole in the White House.
  • Halper, the online editor of the Weekly Standard, says that he “was well aware that the former (and perhaps future) first family and its massive retinue of loyalty enforcers, professional defamers and assorted gadflies would rue my intent to examine the real Clintons” and had been warned “of what to expect from the Clinton PR team.” In a piece that he wrote for the Huffington Post late Tuesday, Halper said that all of the warnings he had received about clever steps to downplay the impact of his book had proven true. Copies of Halper’s book were sent out in PDF form to hundreds of reporters days before the book’s official release by a previously unknown individual, in what Halper suggests was an effort to reduce the impact of the book’s release.
  •  
    If it happened, it's far more likely that the phone intercepts were performed by the IDF's Unit 8100. It does signals intelligence for the Izzie government; Mossad does human intelligence and covert operations. 
Paul Merrell

How the FBI Created a Terrorist - The Intercept - 0 views

  • Informant-led sting operations are central to the FBI’s counterterrorism program. Of 508 defendants prosecuted in federal terrorism-related cases in the decade after 9/11, 243 were involved with an FBI informant, while 158 were the targets of sting operations. Of those cases, an informant or FBI undercover operative led 49 defendants in their terrorism plots, similar to the way Osmakac was led in his. In these cases, the FBI says paid informants and undercover agents are foiling attacks before they occur. But the evidence suggests — and a recent Human Rights Watch report on the subject illustrates — that the FBI isn’t always nabbing would-be terrorists so much as setting up mentally ill or economically desperate people to commit crimes they could never have accomplished on their own.
  • At least in Osmakac’s case, FBI agents seem to agree with that criticism, though they never intended for that admission to become public. In the Osmakac sting, the undercover FBI agent went by the pseudonym “Amir Jones.” He’s the guy behind the camera in Osmakac’s martyrdom video. Amir, posing as a dealer who could provide weapons, wore a hidden recording device throughout the sting. The device picked up conversations, including, apparently, back at the FBI’s Tampa Field Office, a gated compound beneath the flight path of Tampa International Airport, among agents and employees who assumed their words were private and protected. These unintentional recordings offer an exclusive look inside an FBI counterterrorism sting, and suggest that, even in the eyes of the FBI agents involved, these sting targets aren’t always the threatening figures they are made out to be.
  • OW OSMAKAC CAME to the attention of law enforcement in the first place is still unclear. In a December 2012 Senate floor speech, Dianne Feinstein, chairwoman of the Senate Intelligence Committee, cited Osmakac’s case as one of nine that demonstrated the effectiveness of surveillance under the FISA Amendments Act. Senate legal counsel later walked back those comments, saying they were misconstrued. Osmakac is among terrorism defendants who were subjected to some sort of FISA surveillance, according to court records, but whether he was under individual surveillance or identified through bulk collection is unknown. Discovery material referenced in a defense motion included a surveillance log coversheet with the description, “CT-GLOBAL EXTREMIST INSPIRED.” If he first came onto the FBI’s radar as a result of eavesdropping, then it’s plausible that as part of the sting, the FBI manufactured another explanation for his targeting. This is a long-running, if controversial process known as “parallel construction,” which has also been used by the U.S. Drug Enforcement Administration when drug offenders are identified through bulk collection and then prosecuted for drug crimes. In court records, the FBI maintained that Osmakac came to agents’ attention through Dabus. The informant reached out to the FBI after meeting Osmakac, and soon offered him a job at Java Village.
  •  
    A judge denied the defense access to FBI transcripts of conversations among agents on grounds that they would provide no assistance to the defense beyond what was available to the defense by discovery. He also entered a protective order barring their disclosure. The defendant was found guilty and sentenced to 40 years in prison.  But the FBI transcripts were leaked to The Intercept, apparently by someone inside the Dept. of Justice or the judicial system, since the defense never was provided with them. The transcripts along with evidence from the case and gathered through interviews provide a chilling look into the methods the FBI uses to manufacture "terrorists" for prosecution and conviction (in this case victimizing a young Muslim American with a severe mental illness), obviously only for propaganda and to justify its counter-terrorism budget. This is an area that needs Congressional attention. The courts' protections from entrapment are far too lax, particularly when members of a particular religion are being targeted for political reasons and anti-Muslim hysteria is sweeping the land. The government should not be permitted to manufacture criminals.
Paul Merrell

NSA Spied on Israel and US Lawmakers over Iran Deal | News | teleSUR English - 0 views

  • Friendly relations between US and Israel could turn sour over revelations that the NSA tapped Netanyahu, revealing efforts to block the Iran nuclear deal. The U.S. National Security Agency spied on close ally Israel, exposing how Israelis lobbied U.S. authorities to undermine the Iranian nuclear deal, RT reports.   The monitoring came in spite of a U.S. pledge to tone down surveillance of friendly states, while the latest snooping even included some Congress members private conversations. Former Chairman of the House Intelligence Committee Pete Hoekstra called the interceptions an “abuse of power” and called for an investigation into the allegations. “WSJ (Wall Street Journal) report that NSA spied on Congress and Israel communications very disturbing. Actually outrageous. Maybe unprecedented abuse of power,” Hoekstra wrote on his official Twitter account. “NSA and Obama officials need to be investigated and prosecuted if any truth to WSJ reports. NSA loses all credibility. Scary,” he added.
  • Friendly relations between US and Israel could turn sour over revelations that the NSA tapped Netanyahu, revealing efforts to block the Iran nuclear deal. The U.S. National Security Agency spied on close ally Israel, exposing how Israelis lobbied U.S. authorities to undermine the Iranian nuclear deal, RT reports.   The monitoring came in spite of a U.S. pledge to tone down surveillance of friendly states, while the latest snooping even included some Congress members private conversations. Former Chairman of the House Intelligence Committee Pete Hoekstra called the interceptions an “abuse of power” and called for an investigation into the allegations. “WSJ (Wall Street Journal) report that NSA spied on Congress and Israel communications very disturbing. Actually outrageous. Maybe unprecedented abuse of power,” Hoekstra wrote on his official Twitter account. “NSA and Obama officials need to be investigated and prosecuted if any truth to WSJ reports. NSA loses all credibility. Scary,” he added.
  • Massive surveillance has continued under President Barack Obama’s two terms, and the revelations of Edward Snowden in 2013 over the extent of the data harvested from civilians did little to dent the spy agency’s activities, according to the Wall Street Journal. A “protected list” rapidly pulled together by the Obama administration in the wake of the scandal to safeguard its closest allies from monitoring included countries including Germany and France. Israel, however, was not on this list, and was instead placed as NSA’s top monitoring priority, as was Turkey. A senior US official said told the Wall Street Journal, “Going dark on Bibi? Of course we wouldn’t do that,” using Israeli Prime Minister Benjamin Netanyahu’s nickname.
  • ...4 more annotations...
  • As Obama’s administration painstakingly worked toward reaching a nuclear deal with Iran, the NSA tapped communications between Israeli and U.S. lawmakers, revealing the lengths Netanyahu’s government was going to prevent the negotiations from concluding successfully.
  • Yet the White House was unable to use much of the information gleaned from surveillance as it would have been “politically risky:” exposing a “paper trail stemming out from a request.” But, the Wall Street Journal reports that when the NSA was tasked with deciding which information could be shared and which withheld, the agency recognized the conversations they had swept up included U.S. lawmakers, creating an “Oh-s— moment,” an official said, that the NSA was also spying on its own Congress members. The NSA dealt with the sticking point by removing the lawmakers’ names from intelligence reports and any trace of personal information.
  • Republican presidential candidate Ted Cruz said the revelation is “indicative of the Obama Clinton foreign policy and their inability to distinguish their friends from their enemies” and attacked Obama’s stance on Israel.
  • “The Obama administration has been the most hostile and antagonistic to the nation of Israel in our country’s history … it’s not surprising at all that the focus of the Obama administration would be on trying to intercept the communications of our very close friend and ally, Prime Minister Netanyahu,” CBS journalist Alan He reported Cruz as saying on Wednesday. But U.S. commentators have pointed out the irony of NSA “defenders” being scandalized by spying, when they happen to be the subject. “As usual, NSA defenders in Congress only get outraged about spying on Americans when the Americans happen to be them,” said U.S. journalist Trevor Timm.
Paul Merrell

Director Of National Intelligence Confirms Smart Devices May Be Used To Spy On Americans - 0 views

  • Director of National Intelligence James Clapper stated to the Senate Armed Services Committee that the Internet of Things (IoT) — so-called “smart” devices, vehicles, and appliances which employ various computer technologies — may be used to spy and keep tabs on people in the future. “In the future, intelligence services might use the IoT for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials,” Clapper’s prepared testimony claimed. Though his remarks were ostensibly, and not surprisingly, directed toward the fight against ‘terrorism,’ the potential implications for all civilians cannot be ignored — particularly considering the IoT comprises everything from smart cars and fitness tracking devices to televisions and Barbie dolls. Clapper warns the threat from Russia, China, Iran, North Korea, and such non-state actors as ISIL and al-Qaeda. can be expected in the form of cyber attacks, gathering information about individuals, and even psy-ops, which make the IoT vulnerable to malicious intent — and ideal for U.S. intelligence-gathering purposes. “Future cyber operations will almost certainly include an increased emphasis on changing or manipulating data to compromise its integrity (i.e., accuracy and reliability) … Broader adoption of IoT devices and AI [artificial intelligence] — in settings such as public utilities and health care — will only exacerbate these potential effects,” said Clapper.
  • No matter the possible veracity in concerns of National Intelligence, the agency’s desire to thwart terrorism with an exponential increase in surveillance should be disquieting to all civilians wishing to maintain a modicum of privacy. As researchers with the Berkman Center for Internet & Society at Harvard warned in their recent report, Don’t Panic: “The Internet of Things promises a new frontier for networking objects, machines, and environments in ways that we [are] just beginning to understand. When, say, a television has a microphone and a network connection, and is reprogrammable by its vendor, it could be used to listen in to one side of a telephone conversation taking place in its room — no matter how encrypted the telephone service itself might be. These forces are on a trajectory towards a future with more opportunities for surveillance.” In fact, the Nest is a home automation producer of programmable, self-learning, sensor-driven, Wi-Fi-enabled thermostats, smoke detectors, and other security systems. It’s also one of the devices can be used to spy on people in their homes. Clapper’s testimony carefully constructs a potential legal justification for expanding surveillance via, say, your dishwasher, in his assertion that homegrown violent extremists — who have now earned an acronym, HVEs — present the greatest looming threat inside the United States. According to his remarks:
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Gary Edwards

Sheriff…Time to arrest members of Congress! | Scanned Retina Blog - 0 views

  • Title 26, USC, is a private law that applies to “U.S. corporate ‘citizens’”, all employees of the corporation identified at 28 USC, section 3002.
    • Gary Edwards
       
      There is no explanation or quote to explain Title 26 and 28 USC, section 3002!  At the least we should be provided with a link here.
  • When the Sheriff seizes property from a Citizen under the non-authority of the IRS agent, the Sheriff has committed a Second Degree Felony, Conversion of Property.
  • Tyranny is defined as:
  • ...26 more annotations...
  • Dominance through threat of punishment and violence, oppressive rule, abusive government, cruelty and injustice. What better definition than this fits the abusive IRS.
  • Title 12, USC
  • The Federal Reserve Notes in use are mere evidence of a debt.
  • The legal definition of “dollar” is “a gold or silver coin of a specific weight and with specific markings
  • The Federal Reserve Banking system is a private cartel that has usurped the authority of the Congress to coin Money.
  • Article I, section 8, we find that only Congress was given the authority “To coin money, regulate the Value thereof, and of foreign Coin, and fix the Standard of Weights and Measures”.
  • The Federal Reserve Act is a “private law” passed by four Congressmen after the Congressional session closed in December of 1913.
  • The “Killing Blow”, the coup de grace[pronounced gra] was delivered upon the American People by Franklin D. Roosevelt in 1933 by removing the Gold Standard from the American economy.  FDR assisted the FRB in heisting the gold supply from this country right out from under our noses. 
  • If you still refuse to pay, the IRS will file a document called a “Notice of Federal Tax Lien” in the local County Clerk’s office.
  • a “Notice” is not the “Lien” itself. The “Lien” is a totally separate and distinct document from the “Notice”.
  • The County Clerk, through abysmal ignorance files the “Notice of Federal Tax Lien” as if it was an actual “Lien”. These are two separate and distinct documents. The County Clerk never requests the actual “Lien” from the IRS agent.
  • The Seventh Amendment of the Bill of Rights of this Constitution for the united States of America guarantees you the Right of Trial by Jury in any controversy where the amount shall exceed twenty dollars.
  • You have never owed any money to the IRS. The IRS is simply the enforcer, the debt collector for the Federal Reserve Banking System. However, because you are using a private credit system, wherein the medium of exchange are fancy pieces of paper called Federal Reserve Notes, you owe the Federal Reserve Bank a “user fee”.
  • All the current paycheck garnishments in the entire country could be stopped by having your employer request the above mentioned documents, to wit:
  • A copy of the Driver’s License of the IRS agent A copy of the “Pocket Commission” showing the authority of the IRS agent A copy of the assessment shown on form 23C against the American Citizen A copy of the “Abstract of the Court Judgment” that verifies that you had a trial by jury.
  • As Sheriff of San Miguel County, I will provide educational classes to the County Clerk and the employers who are currently garnishing wages and paychecks to identify areas where they may have broken the law and unwittingly stolen their employees Federal Reserve Notes and thus committed “Conversion of Property”, a second degree felony. Furthermore, I will work closely with the County Clerk through education and knowledge so that the Clerk can stop breaking the law and committing financial terrorism against the Citizens of San Miguel County.
  • When the Citizens of San Miguel County elect me as their new Sheriff in town, I will ban the IRS from San Miguel County, and if I catch an IRS agent within the boundaries of the county, without my permission, I will arrest them for TRESPASSING.
  • In the 1950’s, with the stroke of the pen, the BIR was transformed into the current notorious IRS and brought onto the 50 united States.
  • The IRS is formerly the Bureau of Internal Revenue (BIR) situated in and with authority only in the Philippine Islands (Trust Fund # 61), and moved into Puerto Rico (Trust Fund # 62).
  • Here it is in a nutshell. The IRS is a private, debt collection agency for the private banking system known as the Federal Reserve Bank. The IRS is not a government agency. I repeat, the IRS is not a government agency. Never has been, never will be.
  • This was done without any Congressional authority whatsoever.
  • the IRS is the “Private, debt collection agency for the private banking system known as the Federal Reserve Banks”.
  • Title 26, Internal Revenue Code, is the “Debt Collection Manual” for the IRS.  This manual has nothing with “Constitutitonal Rights”.
  • The IRS does not collect an “income tax”.  The IRS is simply collecting a user fee due to the Federal Reserve Banks because we, Americans, are using a private credit systeem.
  • Title 26, United States Code, is “non-positive” law, which means that no American Citizen is subject to it.  However, all “U.S. citizens” are subject to it.  In order to understand “U.S. citizen” you must go to 28 USC, section 3002.
  • Most American Citizens have voluntarily given up their Sovereignty in exchange for “immunities and privileges” of the 14th Amendment.
  •  
    On accessing federal law, two sites to bookmark: Legal Information Institute, Cornell University, http://www.law.cornell.edu/lii/get_the_law Justia.com, http://www.justia.com/ A further resource, the Jureeka extension for Chrome and Firefox will automatically link legal citations in your brower's display to the corresponding web pages on the LII site. http://www.law.cornell.edu/jureeka/download/
Gary Edwards

The Empire Takes a Hit: NSA Update - 2 views

........................................................................................ NSA Conversation with retired lawyer and Open Source legal expert, "Marbux". ...........................

Federal-Reserve-Bankster-Cartel NSA

started by Gary Edwards on 15 Jun 13 no follow-up yet
Gary Edwards

75 Economic Numbers From 2012 That Are Almost Too Crazy To Believe - 0 views

  •  
    Thanks to Marbux we have this extraordinary collection of facts and figures describing the economic catastrophe that has hit the USA.  excerpt: "What a year 2012 has been!  The mainstream media continues to tell us what a "great job" the Obama administration and the Federal Reserve are doing of managing the economy, but meanwhile things just continue to get even worse for the poor and the middle class.  It is imperative that we educate the American people about the true condition of our economy and about why all of this is happening.  If nothing is done, our debt problems will continue to get worse, millions of jobs will continue to leave the country, small businesses will continue to be suffocated, the middle class will continue to collapse, and poverty in the United States will continue to explode.  Just "tweaking" things slightly is not going to fix our economy.  We need a fundamental change in direction.  Right now we are living in a bubble of debt-fueled false prosperity that allows us to continue to consume far more wealth than we produce, but when that bubble bursts we are going to experience the most painful economic "adjustment" that America has ever gone through.  We need to be able to explain to our fellow Americans what is coming, why it is coming and what needs to be done.  Hopefully the crazy economic numbers that I have included in this article will be shocking enough to wake some people up. The end of the year is a time when people tend to gather with family and friends more than they do during the rest of the year.  Hopefully many of you will use the list below as a tool to help start some conversations about the coming economic collapse with your loved ones.  Sadly, most Americans still tend to doubt that we are heading into economic oblivion.  So if you have someone among your family and friends that believes that everything is going to be "just fine", just show them these numbers.  They are a good summary of the problems that the U
Paul Merrell

Clinton to drop Israel from 'public events,' put it back in with donors --Email - 0 views

  • I’ve been on the road for days, and a few more Clinton emails have thudded down from the Wikileaks heavens revealing deliberations about Israel inside the Clinton braintrust. Some day we will put together a leatherbound edition with morocco covers of Clinton’s Israel emails, but for now we’re just trying to chase the latest. And these three are stunners because they baldly expose the importance of Israel to donors and the party establishment. First, there was this amazing email thread among top strategists from May 2015 about revising Clinton’s talking points in her speeches at rallies and fundraisers in the weeks before she officially launched her candidacy. You just gotta read these comments as they fall. The conversation started out on a bunch of different talking points, but everyone quickly turned to Israel, and the public and private messaging.
  • Jake Sullivan, foreign policy aide: “Would add a sentence on standing up for our allies and our values, including Israel and other fellow democracies, and confronting terrorists and dictators with strength and cunning.” Mandy Grunwald, media advisor: “I thought this was largely for her TP [talking points] with public events not fundraisers. Do we need Israel etc for that?” Sullivan: “We def need the etc. I think good to have Israel too.” Joel Benenson, pollster and chief strategist: “Why would we call out Israel in public events now? The only voters elevating FP at all are Republican primary voters.” Robby Mook, campaign manager: “I’m w Joel. We shouldn’t have Israel at public events. Especially dem activists.” Sullivan: “I won’t fall on sword over Israel but we need more than climate in that paragraph.” Dan Schwerin, speechwriter: “What about this as a base, and then she can drop in Israel when she’s with donors: “Fourth and finally, we have to protect our country from the global threats that we see, from terrorists to dictators to diseases – and the ones that are still over the horizon. We have to assert confident American leadership to shape global events rather than be shaped by them. That includes taking on global warming and those who continue to deny that it exists. And it means always standing up for our allies and our values, especially our fellow democracies.” Mook: “I’m fine with that.” Benenson: “Good.”
  • That’s a smoking gun email. It says just what Stephanie Schriock of Emily’s List and J.J. Goldberg said at J Street earlier this year, the role of Jewish donors on the Democratic side is “gigantic” and “shocking.” And those Jewish donors are seen as pro-Israel all the time, by folks who study politics. But meantime, Robby Mook says just what we’ve been saying here for a couple of years: the lobby has lost the Democratic base on Israel. Young Dems, people of color, women — they’re more sympathetic to Palestinians than Israelis. Don’t mention Israel with dem activists. So the system really is rigged. They don’t want to hear from the people on this.
  • ...4 more annotations...
  • One other thing: Chief strategist Benenson shows how pathetic the Bernie Sanders campaign was on this issue. He says that the only voters who care about foreign policy are Republicans. It would be a year before Bernie made Israel a wedge issue, in the New York primary debate, when he dared to say that Benjamin Netanyahu is not right all the time, and Clinton had no response. That moment was brave, reluctant, and spasmodic. Had Bernie worked the Israel issue, there was political capital to be made. And everyone in the Clinton braintrust knew it. Don’t mention Israel with dem activists. Bernie followed the same script, pretty much.
  • Gotta keep going here. Here’s another leaked email to campaign chair John Podesta from his daughter Megan Rouse in May 2015, headlined “Israel”: I’ve heard a concern from some folks who care deeply about Israel that Hillary will be the president “most unfriendly to Israel in our history, worse than Obama.” Thoughts on how I might respond in conversation? Podesta wrote back: That’s a bit crazy. Obama developed a real feud with Bibi, but she has been a staunch defender of Israel since her Senate days. Probably her very best supporters are Haim Saban, and Danny Abraham who would not be with her if she wasn’t totally committed to Israeli security. Eli Clifton offers the moral of this story: “Podesta’s acknowledgement that two of Hillary Clinton’s key donors condition their support on her support of Israel’s security is a striking moment of candor from Podesta, but a statement which is consistent with her previous actions to placate the concerns of her biggest financial backers.”
  • This is also fantastic. When “Bibi” — no one calls him Benjamin Netanyahu in Dem circles– won reelection in the Israeli elections in March 2015, Clinton campaign chair John Podesta asked Paul Begala for his take on Netanyahu’s victory. Wow is Begala a whiz. He worked for Yitzhak Herzog, who lost; and he wrote back in part: Just as patterns of immigration are moving the US left, patterns of immigration are moving Israel right. I have never seen anything like Bibi’s furious surge to the right in the last 4 days. Nothing like it in America. He had robo-calls calling the President “Hussein Obama, the Muslim,” he had ads saying the Arabs will vote in droves. He accused Herzog of wanting to divide Jerusalem. Bibi did not win because of Iran. He won because of race. He cannibalized the smaller parties on the right: Bennett’s Jewish Home lost 4 seats, Shas lost 4 seats, Lieberman’s party lost 5 seats, United Torah lost 1. That is a 14 seat decline on the right. Bibi gained 10… All the smart guys in Tel Aviv thought Bibi was having a nervous breakdown. In the US you could never get away with those kind of racist appeals. But, man, did it work.
  • There’s really only one thing to say about this email. Begala is on television all the time slashing Donald Trump. Has he ever told American audiences that Benjamin Netanyahu is a racist in a way that no American politician could be? Not even Trump? And Israel is a place of creeping fascism (as Moshe Ya’alon and Yair Golan have explained)? Begala doesn’t say that because of emails 1 and 2 in this post; “Bibi” is necessary for the maintenance of the American establishment as it now stands. And President Clinton has promised: “I would also invite the Israeli prime minister to the White House in my first month in office.” Another leaked email says that Clinton says reaching out to Netanyahu, I mean Bibi, is “near the top” of her list of priorities. I wonder why.
  •  
    Not news in the sense that it's been clear for more than a year that Hillary will be even more pro-Israeli right-wing leadership than Obama has been. But now her Israeli policy conflict with the majority of voters who elect Democratic presidents has been outed.
Gary Edwards

Liberal Activists Worked With AGs to Target Conservatives - 0 views

  • violate “constitutionally protected rights of freedom of speech, freedom from unreasonable searches and seizures, and due process of law and constitute the common law tort of abuse of process.”
  • ExxonMobil also alleges that Walker’s delegation of his prosecutorial power to a private law firm “likely on a contingency-fee basis” violates basic “due process of law and fundamental fairness,” particularly because that same law firm has “pursued a bitterly contested and contentious litigation in an unrelated lawsuit against ExxonMobil … which could result in a substantial fee award if Cohen Milstein’s client were to prevail.”
  • That raises “substantial doubts about whether that firm should be permitted to serve as the ‘disinterested prosecutor’ whose impartiality is demanded by law and expected by the public.”
  • ...6 more annotations...
  • ExxonMobil asks the Texas court to declare that the “issuance and mailing of the subpoena” violates various provisions of the U.S. Constitution, federal law, and the Texas Constitution.
  • . According to The Washington Free Beacon, “a small coalition of prominent climate change activists and political operatives” met on Jan. 8 in a closed door meeting at the Rockefeller Family Fund in Manhattan. Their agenda: taking down oil giant ExxonMobil through a coordinated campaign of legal action, divestment efforts, and political pressure.”
  • A copy of the agenda from that meeting states that two of the common goals of these activists are to “establish in public’s mind [sic.] that Exxon is a corrupt institution that has pushed humanity (and all creation) toward climate chaos and grave harm” and to “delegitimize them as a political actor.” Part of the discussion of their grand strategy was how to include “industry associations, scientists and front groups” in their targeting. And at the top of their list for “legal actions & related campaigns” was state “AGs.”
  • That last goal was apparently put into action. According to Fox News, a series of emails obtained by the Energy & Environmental Legal Institute showed communications between some of these same anti-fossil fuel activists and the attorneys general that are part of this “Green” coalition against climate change dissenters.
  • Some of them secretly briefed state attorneys general before their March press conference on arguments they could present to justify “climate change litigation” and the “imperative of taking action now.” The attorneys general and their staff tried to hide this discussion and coordination with the activists by “using a ‘Common Interest Agreement’… [that] sought to protect as privileged the discussions about defending President Obama’s controversial global warming rules, and going after political opponents using the Racketeer Influenced and Corrupt Organizations Act.”
  • Some state attorneys general have criticized the dangerous and misguided efforts of their inquisitorial peers. As Louisiana Attorney General Jeff Landry correctly states, they are using “prosecutorial weapons to intimidate critics, silence free speech, or chill the robust exchange of ideas” about a public policy issue. And it is just as malevolent as the burning of books in the society depicted by Bradbury in “Fahrenheit 451.”
  •  
    "In Ray Bradbury's classic dystopian novel, "Fahrenheit 451," a future society criminalizes the possession of books and burns them in order to suppress any dissenting ideas, opinions, and views. Today, we have state attorneys general trying to implement their own version of "Fahrenheit 451" to criminalize dissent over a disputed, unproven scientific theory: man-induced climate change. Recently, the attorney general of the Virgin Islands, Claude Walker, unleashed a subpoena on the Competitive Enterprise Institute seeking 10 years' worth of research and communications about climate change. It turns out that same Grand Inquisitor, Claude Walker, has hit ExxonMobil with a similar subpoena that seeks all of that company's communications, conversations, and correspondence with 88 conservative and libertarian think tanks, foundations, and universities, and 54 individual researchers, scientists, and writers."
‹ Previous 21 - 40 of 251 Next › Last »
Showing 20 items per page