Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Disability

Rss Feed Group items tagged

Paul Merrell

Revealed: how the FBI coordinated the crackdown on Occupy | Naomi Wolf | Comment is fre... - 0 views

  • New documents prove what was once dismissed as paranoid fantasy: totally integrated corporate-state repression of dissent
  • It was more sophisticated than we had imagined: new documents show that the violent crackdown on Occupy last fall – so mystifying at the time – was not just coordinated at the level of the FBI, the Department of Homeland Security, and local police. The crackdown, which involved, as you may recall, violent arrests, group disruption, canister missiles to the skulls of protesters, people held in handcuffs so tight they were injured, people held in bondage till they were forced to wet or soil themselves –was coordinated with the big banks themselves. The Partnership for Civil Justice Fund, in a groundbreaking scoop that should once more shame major US media outlets (why are nonprofits now some of the only entities in America left breaking major civil liberties news?), filed this request. The document – reproduced here in an easily searchable format – shows a terrifying network of coordinated DHS, FBI, police, regional fusion center, and private-sector activity so completely merged into one another that the monstrous whole is, in fact, one entity: in some cases, bearing a single name, the Domestic Security Alliance Council. And it reveals this merged entity to have one centrally planned, locally executed mission. The documents, in short, show the cops and DHS working for and with banks to target, arrest, and politically disable peaceful American citizens.
  • As Mara Verheyden-Hilliard, executive director of the PCJF, put it, the documents show that from the start, the FBI – though it acknowledges Occupy movement as being, in fact, a peaceful organization – nonetheless designated OWS repeatedly as a "terrorist threat"
  • ...1 more annotation...
  • Verheyden-Hilliard points out the close partnering of banks, the New York Stock Exchange and at least one local Federal Reserve with the FBI and DHS, and calls it "police-statism":"This production [of documents], which we believe is just the tip of the iceberg, is a window into the nationwide scope of the FBI's surveillance, monitoring, and reporting on peaceful protestors organizing with the Occupy movement … These documents also show these federal agencies functioning as a de facto intelligence arm of Wall Street and Corporate America."
Paul Merrell

HKS Research Administration Office - 0 views

  • The Financial Legacy of Iraq and Afghanistan: How Wartime Spending Decisions Will Constrain Future National Security Budgets Bilmes, Linda J. "The Financial Legacy of Iraq and Afghanistan: How Wartime Spending Decisions Will Constrain Future National Security Budgets." HKS Faculty Research Working Paper Series RWP13-006, March 2013.
  • Abstract The Iraq and Afghanistan conflicts, taken together, will be the most expensive wars in US history – totaling somewhere between $4 to $6 trillion. This includes long-term medical care and disability compensation for service members, veterans and families, military replenishment and social and economic costs. The largest portion of that bill is yet to be paid. Since 2001, the US has expanded the quality, quantity, availability and eligibility of benefits for military personnel and veterans. This has led to unprecedented growth in the Department of Veterans Affairs and the Department of Defense budgets. These benefits will increase further over the next 40 years. Additional funds are committed to replacing large quantities of basic equipment used in the wars and to support ongoing diplomatic presence and military assistance in the Iraq and Afghanistan region. The large sums borrowed to finance operations in Iraq and Afghanistan will also impose substantial long-term debt servicing costs. As a consequence of these wartime spending choices, the United States will face constraints in funding investments in personnel and diplomacy, research and development and new military initiatives. The legacy of decisions taken during the Iraq and Afghanistan wars will dominate future federal budgets for decades to come. Attachment pdf  
Gary Edwards

The End of the Middle Class is The End of America - 0 views

Financial expert Porter Stansberry recently posted the following commentary at The Project to Restore America. Chilling stuff. The number speak for themselves. This comes from Porter's newslette...

Porter-Stansberry financial-collapse Federal-Reserve-Bankster-Cartel

started by Gary Edwards on 27 Jun 13 no follow-up yet
Paul Merrell

M of A - "Dramatic Rescue! Man With Kid Runs Towards Camera!" - 44 Staged Pictures - 0 views

  • A man with a kid in arm runs towards the camera. The kid's face is heavily colored, but it looks otherwise fine. On the lower left we see the back of a man with a "White Helmets" logo on his vest. Dust in the background. Always dust or smoke. A bunch of men looking very busy but are they actually doing anything? That would be a lucky by-chance photo shot for any normal photographer. Even in country where rubble from a fresh bombing may be around some near corner. But this is a typical "White Helmets rescue kid" propaganda picture. The photo above is, except for maybe the old rubble, likely completely staged. There the 43 similar pictures below the fold to demonstrate that. Just ask yourself: Could all these very similar by-chance pics, taken within about a year, be real? Really?
  • The pictures above all look astonishingly similar: rubble, dust or rather haze from a smoke grenade in the background, dusted/greasepaint bloody kids who have no visible trauma, the rescuer with the kid moving towards the camera. Dramatic, high quality scenes which do get distributed by news agencies and published again and again by major "western" media. Isn't it an amazing fortune that so many kids get rescued alive by the "White Helmets", without any serious wounds visible, just moments after bomb impacts? This week after week? With all the same attributes in each picture? No photo editor at any of the big media ever wondered about that? These staged photos are part of the war propaganda against the Syrian people and their government. The "White Helmets" take and distribute these photos. They also distribute lots of "kids rescued from rubble" videos. We wrote about those a month ago: Other typical features of these movies, see this one, are smoke (grenades) in the streets, dramatic but small open fires nearby, dust or some red color on the children's face or arms. The camera is often used in a hectic, intentionally amateurish first person view, a style extensively developed in the 1999 horror clip Blair Witch Project. Sometimes sounds of additional "bomb impact" bangs or screaming/wailing women are added. The "White Helmets" are part of the (anti-)Syria Campaign. "Kid rescued from rubble" is their standard shtick. They are financed with some $60+ million from your taxes by the U.S., the UK and other governments. Such money will buy a lot of good cameras and props and will pay for many actors and extras.
  • The Syria Campaign was created by Purpose Campaigns LLC. The company fabricates and runs for you any world-wide "grass root" movement you would like. With Purpose LLC or other such companies involved, big dollars will buy you big effects. How about an automated Twitter campaign to spread anti-Shia sectarianism? Someone paid for it and here it is. The "White Helmets" campaign demonstrates the amazing manipulation potential such companies and their high paying customers have.
  •  
    A U.S.-U.K. propaganda front operating behind ISIL and al-Nusrah lines. See also: http://www.moonofalabama.org/2016/06/gallery-dramatic-rescue-man-with-kid-runs-towards-camera-43-staged-pictures.html#c6a00d8341c640e53ef01b8d1fb87c3970c amd https://www.youtube.com/watch?v=5k6hSS6xBTw&feature=youtu.be The U.S. State Department admits to providing $23 million to this group operating behind al-Nusrah and ISIL lines. 
Paul Merrell

Mexican government says Donald Trump did not threaten to send troops to Mexico | The In... - 0 views

  • Mexico has denied Donald Trump threatened to send American soldiers into the country during a telephone conversation with his counterpart, President Enrique Peña Nieto. Such a threat “did not happen during that call,” the Mexican government said in a statement, released on Twitter on Wednesday night.   “I know it with absolute certainty, there was no threat,” a spokesman for Mr Peña Nieto, Eduardo Sanchez, said in a radio interview. “The things that have been said are nonsense and a downright lie.”
Paul Merrell

Nuke option necessary in case of massive cyberwar, report concludes - Stripes - Indepen... - 0 views

  • The United States should be prepared to use every military option, including nuclear retaliation, in response to a huge computer attack, an independent Department of Defense task force said. But the nation must determine whether its nuclear arsenal can withstand computer hackers, the Defense Science Board warns in a newly declassified report obtained by the Tribune-Review. In a full-scale cyber war, the board's experts say, the United States' weapons could be disabled or turned against its troops. "It would have to be extreme," Paul Kaminski, chair of the Science Board and a member of the President's Intelligence Advisory Board, said about the kind of attack that might trigger a nuclear response. "It would have to be the kind of attack that we would judge would be threatening our survival." The United States must assume that computer attacks will be part of conflicts, said the report from the task force made up of civilian experts with government advisers. Yet, the report said the country cannot be confident that its military's computer systems would still work under attack from a sophisticated adversary nation with a full range of military and intelligence options.
  • Some steps to increase computer defenses could be done "relatively inexpensively," said Brian Hughes, the Science Board's executive director. The report suggests the military segregate some weapons - such as 20 bombers out of a fleet of hundreds - from integrated computer networks. The planes would lose some capability but remain operational if a computer attack grounded the rest of the fleet. Other proposals include adding to the number of "cyber warriors," which Defense plans to do, and spending more time playing war games with launching and defending computer attacks. The military must be ready to launch potentially hundreds of simultaneous, synchronized computer attacks even as it defends against them.
  •  
    So much for the Open Web. R.I.P.
Paul Merrell

[Heart of Empire] | The Long Shadow of a Neocon, by Andrew Cockburn | Harper's Magazine - 0 views

  • As jihadists everywhere celebrate their stunning victories in Mosul and Tikrit, as well as the abject retreat of the United States from Afghanistan, we can only hope that they accord due credit to a man who was indispensable to their success. Now an obscure businessman seeking crumbs from the table as an “international consultant,” Zalmay Khalilzad was in his day an imperial envoy sent by the United States to decree the fates of Afghanistan and Iraq. His decisions, most especially his selection of puppet overseers to administer the conquered lands, were uniformly disastrous, contributing in large degree to the catastrophes of today. To be sure, many others among the neocon clique and their liberal-democrat interventionist allies deserve a place on the jihadist honor roll of useful idiots, but few contributed as much as Khalilzad, the Afghan-born former academic who selected Hamid Karzai and Nuri al-Maliki as suitable leaders for their respective countries. Initially promoted up the ranks of the national-security clerisy by Albert Wohlstetter, the dark eminence of neoconservative theology who also mentored neocon godfather Richard Perle, Khalilzad found a useful niche in such company as the only Muslim any of them knew, ready to spout their militarist nostrums at the flutter of a grant check. I myself got an early intimation of Khalilzad’s tenuous grasp on military reality in 1981, when he assured me in all seriousness that the Afghan mujahideen were enjoying great success in disabling Soviet tanks by thrusting thick carpets into their treads. During the administration of the elder Bush, he worked in the Pentagon under Paul Wolfowitz and Scooter Libby. In 1992 he wrote the initial draft of the Defense Planning Guidance, which became an iconic neoconservative text.
  • Khalilzad’s leap out of relative obscurity came with the post-9/11 invasion and occupation of Afghanistan. Following the collapse of the Taliban regime in 2001, an Afghan Loya Jirga assembly indicated by a clear majority that they wanted their aged king, Zahir Shah, to return from his long exile in Rome to preside over the government. This was not to the taste of presidential special envoy, and later ambassador, Khalilzad, who importuned Italian premier Silvio Berlusconi to prevent the Shah from leaving Rome as he meanwhile brusquely informed the Loya Jirga that their leader was to be Hamid Karzai, a Pashtun of modest reputation. Afghan politicians of all stripes concluded that Khalilzad had purposefully picked someone with little internal support in order to ensure that his own authority remained unchallenged. This authority he exercised by operating as supreme warlord, rewarding or threatening the lesser strongmen who had emerged in various provincial power bases with grants of aid or threats of airstrikes from the bombers and Predator drones at his command. Afghans who could foresee the inevitable consequence of this laissez-faire policy toward the universally hated warlords did their best to persuade Khalilzad to change course. One of them later related to me that he suggested that Khalilzad put “ten of them in handcuffs and ship them off to the International Court at The Hague for crimes against humanity.”
  • “I’m going to bring them in and demobilize them,” countered Khalilzad confidently. “No, Zal,” replied the Afghan sadly, “you’re going to legitimize them.” So it transpired. While Karzai presided, in his self-designed costume of furry hat and cape, over a regime of staggering corruption, large swaths of Afghanistan fell under the control of characters like Hazrat Ali, a ruffian of pliable loyalties who used American support to gain control of the eastern city of Jalalabad and installed himself, with Khalilzad’s approval, as security chief of Nangahar Province. He then began vying with fellow warlord Sher Mohammed Akhunzada for the title of world’s leading heroin trafficker (a practice both men denied engaging in) while delivering hapless victims labeled “high value targets” to the torture cells of Bagram or the oubliette of Guantánamo. In inevitable consequence, disgusted Afghans rallied to a resurgent Taliban. The rest is history.
  • ...2 more annotations...
  • Resolutely failing upward, Khalilzad became the U.S. ambassador to Iraq in 2005. His signal accomplishment came in 2006, when, searching for a suitable candidate to replace Ibrahim al-Jaafari as prime minister, he summoned Nuri al-Maliki, a relatively low-ranking Dawa Party functionary who had spent much of his adult life in exile in Damascus (with an intervening spell in Tehran), where he subsisted on the earnings of a butcher shop he’d opened. Maliki’s party activities were largely related to security, and his experiences imbued him with a generally paranoid attitude to the outside world — not the best preparation for reconciling Iraq’s disparate sects and factions. Nevertheless, Khalilzad thought Maliki was just the man to make piece with the Sunnis, crack down on Moqtada al-Sadr (whom the American government mistakenly believed to be an Iranian pawn), and stand up to the Iranians. Summoned by Khalilzad, Maliki was abruptly informed that he was to become prime minister. “Are you serious?” said the astonished erstwhile butcher. The British ambassador, William Patey, had been invited to attend the meeting but when he started to object to Maliki’s anointment, Khalilzad promptly kicked him out of the room.
  • True to form, all of Khalilzad’s presumptions about Maliki turned out to be wholly in error. So far from reconciling with Sunnis, Maliki went out of his way to alienate them, combining paranoia about the possibility of a neo-Baathist coup with an opportunistic calculation that heightened sectarian tension would bolster his support among Shia. He showed no sign of serving as the wished-for bulwark against Tehran, and, most importantly, evinced little interest in building a responsible administration. Instead, Iraqi government, never a model of probity, devolved into a midden of corruption in which every office, including those in the military, was for sale. By 2014, the going price for command of an Iraqi army division was reported to be around $1 million, payable over two years as the purchaser recouped his investment via fees levied at roadblocks and other revenue streams. Little wonder that when called on to fight the disciplined and ruthless ISIS, the Iraqi army has melted away. Meanwhile, Khalilzad’s other choice, Hamid Karzai, has overseen a reign of pillage similar in scale to Maliki’s, opening the way for a Taliban restoration and rendering futile the entire American investment in Afghanistan. Defeat is an orphan, they say, but it would be a shame if this particular parent of America’s twenty-first-century humiliations were to be totally forgotten.
  •  
    With neocons angling again to have Iraq's Maliki replaced by Ahmed Chalibi, it's a good time to check in again on the neocon kingmaker for Southwest Asia, Zalmay Khalilzad.
Paul Merrell

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet - The In... - 0 views

  • The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
  • he “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities: • “Change outcome of online polls” (UNDERPASS) • “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH) • “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
  • • “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO) • “Find private photographs of targets on Facebook” (SPRING BISHOP) • “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE) • “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM) • “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR) • “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
  • ...1 more annotation...
  • • “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE) • “Ability to spoof any email address and send email under that identity” (CHANGELING) • “For connecting two target phone together in a call” (IMPERIAL BARGE) While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”
Paul Merrell

Protocols of the Hackers of Zion? « LobeLog - 0 views

  • When Israeli Prime Minister Benjamin Netanyahu met with Google chairman Eric Schmidt on Tuesday afternoon, he boasted about Israel’s “robust hi-tech and cyber industries.” According to The Jerusalem Post, “Netanyahu also noted that ‘Israel was making great efforts to diversify the markets with which it is trading in the technological field.'” Just how diversified and developed Israeli hi-tech innovation has become was revealed the very next morning, when the Russian cyber-security firm Kaspersky Labs, which claims more than 400 million users internationally, announced that sophisticated spyware with the hallmarks of Israeli origin (although no country was explicitly identified) had targeted three European hotels that had been venues for negotiations over Iran’s nuclear program.
  • Wednesday’s Wall Street Journal, one of the first news sources to break the story, reported that Kaspersky itself had been hacked by malware whose code was remarkably similar to that of a virus attributed to Israel. Code-named “Duqu” because it used the letters DQ in the names of the files it created, the malware had first been detected in 2011. On Thursday, Symantec, another cyber-security firm, announced it too had discovered Duqu 2 on its global network, striking undisclosed telecommunication sites in Europe, North Africa, Hong Kong, and  Southeast Asia. It said that Duqu 2 is much more difficult to detect that its predecessor because it lives exclusively in the memory of the computers it infects, rather than writing files to a drive or disk. The original Duqu shared coding with — and was written on the same platform as — Stuxnet, the computer worm  that partially disabled enrichment centrifuges in Iranian nuclear power plants, according to a 2012 report in The New York Times. Intelligence and military experts said that Stuxnet was first tested at Dimona, a nuclear-reactor complex in the Negev desert that houses Israel’s own clandestine nuclear weapons program. While Stuxnet is widely believed to have been a joint Israeli-U.S. operation, Israel seems to have developed and implemented Duqu on its own.
  • Coding of the spyware that targeted two Swiss hotels and one in Vienna—both sites where talks were held between the P5+1 and Iran—so closely resembled that of Duqu that Kaspersky has dubbed it “Duqu 2.” A Kaspersky report contends that the new and improved Duqu would have been almost impossible to create without access to the original Duqu code. Duqu 2’s one hundred “modules” enabled the cyber attackers to commandeer infected computers, compress video feeds  (including those from hotel surveillance cameras), monitor and disrupt telephone service and Wi-Fi, and steal electronic files. The hackers’ penetration of computers used by the front desk would have allowed them to determine the room numbers of negotiators and delegation members. Duqu 2 also gave the hackers the ability to operate two-way microphones in the hotels’ elevators and control their alarm systems.
Paul Merrell

2012: The Year of the Cooperative by Jessica Reeder - YES! Magazine - 0 views

  • The United Nations has named 2012 as the International Year of Cooperatives, and indeed, co-ops seem poised to become a dominant business model around the world. Today, nearly one billion people worldwide are cooperative member-owners. That’s one in five adults over 15
  • Most co-ops also follow the Seven Cooperative Principles, a unique set of guidelines that help maintain their member-driven nature.
  • In fact, the United States is full of co-ops — around 30,000 of them with nearly 900,000 members. Thirty percent of Americans belong to cooperatively-owned credit unions, the largest of which serves 3.4 million Department of Defense employees and has $45 billion in assets. In 2004, the ten largest co-ops in America earned over $12 billion in revenues
  • ...3 more annotations...
  • In America, 93 million credit union member-owners control $920 billion in assets.
  • “Cooperatives, in their various forms, promote the fullest possible participation in the economic and social development of all people, including women, youth, older persons, persons with disabilities and indigenous peoples, are becoming a major factor of economic and social development and contribute to the eradication of poverty.” - UN Resolution 64/136, 2010
  • The trend is well-established: The cooperative model is expected to be the world’s fastest-growing business model by 2025.
  •  
    Are worker-owned co-ops replacing unions as the method to ensure that workers share in business profits and productivity gains? The thought had occurred to me until now. But we buy most of our groceries from Winco, a worker-owned grocery chain because their prices are lowest, even lower than Walmart. And many of the forestry-related companies in our area are worker-owned co-ops. They have big competitive advantages for several reasons, not the least of which is that their bottom-up leadership is far smaller and less expensive than the leadership of a top-down stock corporation with comparable sales. No competition between the workers and upper managers/external stockholders for profit sharing. Far less turnover in workers; as owners the workers are more committed to the co-op and to staying with it. Are co-ops part of a shadow economy emerging from the ashes of the U.S. bankster-driven economy? And is there enough flexibility in U.S. law for a bottom-up shadow government to begin taking shape, based on contract law perhaps? No one could be forced to sign the contract, of course, but I see room for at least an alternate dispute resolution process to resolve disputes between contract parties. One based on mediation rather than arbitration, as the U.S. judicial system behaves. (The U.S. judicial system is beyond salvage, in my studied opinion.)  Food for thought. 
Paul Merrell

Newest Remote Car Hacking Raises More Questions About Reporter's Death - WhoWhatWhy - 0 views

  • As readers of WhoWhatWhy know, our site has been one of the very few continuing to explore the fiery death two years ago of investigative journalist Michael Hastings, whose car left a straight segment of a Los Angeles street at a high speed, jumped the median, hit a tree, and blew up.Our original report described anomalies of the crash and surrounding events that suggest cutting-edge foul play—that an external hacker could have taken control of Hastings’s car in order to kill him. If this sounds too futuristic, a series of recent technical revelations has proven that “car hacking” is entirely possible. The latest just appeared this week.
  • Hackers, seeking to demonstrate the vulnerability of automobiles to remote attacks, were able to largely take over the Jeep Cherokee driven by a writer for the tech magazine Wired:Their code is an automaker’s nightmare: software that lets hackers send commands through the Jeep’s entertainment system to its dashboard functions, steering, brakes, and transmission, all from a laptop that may be across the country.They were able to make his car decelerate suddenly, causing the writer to “narrowly avert death” at the hands of a semi-trailer coming up behind him.In an earlier demonstration, they had been able to do similar things with other vehicles:In the summer of 2013, I drove a Ford Escape and a Toyota Prius around a South Bend, Indiana, parking lot while they sat in the backseat with their laptops, cackling as they disabled my brakes, honked the horn, jerked the seat belt, and commandeered the steering wheel.
  • All of this is increasingly drawing the attention—and action— of the authorities. U.S. Senators Richard Blumenthal (D-CT) and Edward J. Markey (D-MA), members of the Commerce, Science and Transportation Committee, introduced legislation Tuesday seeking to establish federal standards for security and privacy of drivers in today’s computer-laden cars.What we do not hear is any discussion about whether the risk has gone beyond the realm of possibility…to a reality.
  • ...2 more annotations...
  • Back when Michael Hastings died, former counterterrorism czar Richard Clarke—by all accounts a sober, no-nonsense man—said that the Hastings’s crash was “consistent with a car cyber attack” and that it was likely that intelligence agencies knew “how to remotely seize control of a car.”It is worth noting, too, that the day before his death, Hastings had “urgently” requested to borrow his neighbor’s car—he wanted to get out of town, but he feared his own car was being tampered with.How is it then that “mainstream” publications, including even Wired, do not talk about the very odd circumstances surrounding the death of a journalist who had made powerful enemies? Did the fact that he had caused a famed general to be fired, that he was investigating the CIA chief, that he told colleagues he himself was being investigated by the FBI—did none of this at least raise the slightest suspicion on the part of our journalistic community? How about the fiery explosion when his car hit a palm tree—which automotive experts say should not normally take place; what about the fact that the engine flew out of the vehicle and landed a considerable distance away–which, again, we are told, is highly unusual?
  • As with so many of these things, the authorities raced to conclude that it was all an unfortunate accident and that there was no more to the story. And virtually the entirety of journalism—Left, Right and Center, Mainstream and “Alternative”—accepted this conclusion without so much as a hint of skepticism.So, now that it has been dramatically demonstrated that accidents can be caused remotely by those targeting a driver, will we see other media stepping up to take a good hard look at the key question: What really happened to Michael Hastings? We hope so, but we aren’t taking any bets.
Joseph Skues

Bechtel Corporation: Key UK Benefits - 0 views

  • employees can opt to include spouse/family members under the company scheme at a cost
  • Business travel accident insurance Company paid accident insurance
  • employee contributions, plus company contributions, into an employees
  • ...20 more annotations...
  • pension account.
  • offering financial protection for the employee and the employee and their families, both during the employee’s career
  • and after retirement.
  • employees can change which funds the pension account is invested in. 
  • Long Term Disability insurance
  • at no cost. 
  • Employees will receive 50 percent of base salary from the scheme after six months absence from work. 
  • benefits including Bechtel University online training, mentoring and leadership programmes
  • breast cancer awareness workshops
  • The Well programme is offered to all employees at no cos
  • nutrition advise and guidance
  • professional membership reimbursement.
  • provides a health manager who is on site every Thursday and Friday
  • advises employees on health issues such as high blood pressure, BMI, high cholesterol, diabetes, weight management, and work life balance;
  • all employees receive at the beginning of employment with Bechtel.
  • Confidential telephone and face-to-face counselling services are offered to all employees at no cost
  • Bechtel recognises that everyone needs some assistance in dealing with the changes and challenges in their lives.
  • a season ticket loan scheme for London office permanent staff
  • Loans will be based on the actual cost of second class rail season tickets and/or London Zone Travel Cards between the employee’s home and London office by the most direct route that does not impose undue travel restrictions on the employee.
  • mployees to sacrifice a maximum of £220 per month; in return, the employee receives childcare vouchers and savings in tax and National Insurance contributions.
Paul Merrell

Where global solutions are shaped for you | News & Media | HUMAN RIGHTS COUNCIL OPENS S... - 0 views

  • Kyung-wha Kang, Assistant Secretary-General for Humanitarian Affairs and Deputy Emergency Relief Coordinator, stated that at least 18 medical facilities, including five UNRWA health clinics, had been hit by airstrikes and shelling since the beginning of the fighting.  The seven-year blockade had destroyed Gaza’s economy, with high unemployment rates and growing dependence on international assistance.  The United Nations was feeding 67 per cent of the population.  The international community and the parties to the conflict had to live up to their obligations.  Lance Bartholomeusz, Director of Legal Affairs of the United Nations Relief and Works Agency for Palestine Refugees in the Near East, said that by yesterday evening, 22 July, approximately 118,000 Palestinians had sought refuge in 77 UNRWA schools.  That was about 6 per cent of the population of Gaza and double the peak in UNRWA shelters during the 2008 to 2009 conflict.  The conflict had not spared UNRWA premises.  Makarim Wibisono, Special Rapporteur for the situation of human rights in the Occupied Palestinian Territory, speaking on behalf of the Coordination Committee of the Special Procedures of the Human Rights Council, said in addition to at least 599 Palestinians killed, the destruction of numerous houses had left several thousand families homeless.  At the same time, the right of the Palestinian people to resist occupation could not justify the launching of thousands of rockets and mortars directed against Israeli civilians. 
  • NAVI PILLAY, United Nations High Commissioner for Human Rights, said since Israel announced its military operation “Protective Edge” on 7 July, Gaza had been subjected to daily intensive bombardment from the air, land and sea, employing well over 2,100 air strikes alone.  The hostilities had resulted in the deaths of more than 600 Palestinians, including at least 147 children and 74 women.  As in the two previous crises in 2009 and 2012, it was innocent civilians in the Gaza Strip, including children, women, the elderly and persons with disabilities, who suffered the most.  According to preliminary United Nations figures, around 74 per cent of those killed so far were civilians, and thousands more had been injured.  Hundreds of homes and other civilian buildings, such as schools, had been destroyed or severely damaged in Gaza, and more than 140,000 Palestinians had been displaced.  Two Israeli civilians had also lost their lives and between 17 and 32 others had been reported injured as a result of rockets and other projectiles fired from Gaza, and 27 Israeli soldiers had been killed during military operations in Gaza.  The indiscriminate firing by Hamas and other armed groups of more than 2,900 rockets and mortars from Gaza continued to endanger the lives of civilians in Israel, and Ms. Pillay once again condemned such indiscriminate attacks.  It was unacceptable to locate military assets in densely populated areas or to launch attacks from such areas.  However, international law was clear - the actions of one party did not absolve the other party of the need to respect its obligations under international law.
  • he also warned that the current situation in Gaza overshadowed the backdrop of heightened tensions in the occupied West Bank, including East Jerusalem and expressed concern about a significant rise in incitement to violence against Palestinians, including through social media.  Only those responsible for criminal acts could legitimately be punished, she said, individuals should not be subject to collective penalties. 
  • ...2 more annotations...
  • LANCE BARTHOLOMEUSZ, Acting Director of Legal Affairs, United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNWRA), said UNRWA was deeply alarmed and affected by the escalation of violence in the Gaza Strip and the devastating human and physical toll it was taking on civilians, including Palestine refugees.  Far too many lives were being lost and the traumas resulting from the military operations would mark the population for years to come.  Among ordinary Palestinians there was a profound crisis of confidence in the ability of international law and international mechanisms to protect civilians, and to prevent and address violations of international law.  Because of military operations, and because over 40 per cent of Gaza’s territory was affected by Israel evacuation warnings or declarations of “no-go zones”, thousands of people continued to flee to shelters run by UNRWA and by partners.  By yesterday evening, 22 July, approximately 118,000 Palestinians had sought refuge in 77 UNRWA schools.  That was about 6 per cent of the population of Gaza and double the peak in UNRWA shelters during the 2008 to 2009 conflict.
  • The conflict had not spared UNRWA premises, 77 of which had been damaged by air raids and other fire, which was totally unacceptable.  All parties to the conflict must respect at all times the neutrality and inviolability of UNRWA’s premises.  The situation of the population of Gaza and of Palestine Refugees in Gaza had become completely unsustainable.  Israel’s illegal blockade had deepened poverty levels and Gaza's aquifer would be entirely contaminated in the next three to four years making the Strip essentially unliveable.  Today, these indicators paled in comparison to the intensity of the bombardments, fighting and the immediate fears for security and survival. 
Paul Merrell

Chinese State Media Declares iPhone a Threat To National Security - Slashdot - 0 views

  • "When NSA whistleblower Edward Snowden came forth last year with U.S. government spying secrets, it didn't take long to realize that some of the information revealed could bring on serious repercussions — not just for the U.S. government, but also for U.S.-based companies. The latest to feel the hit? None other than Apple, and in a region the company has been working hard to increase market share: China. China, via state media, has today declared that Apple's iPhone is a threat to national security — all because of its thorough tracking capabilities. It has the ability to keep track of user locations, and to the country, this could potentially reveal "state secrets" somehow. It's being noted that the iPhone will continue to track the user to some extent even if the overall feature is disabled. China's iPhone ousting comes hot on the heels of Russia's industry and trade deeming AMD and Intel processors to be untrustworthy. The nation will instead be building its own ARM-based "Baikal" processor.
Paul Merrell

U.S. Embedded Spyware Overseas, Report Claims - NYTimes.com - 0 views

  • The United States has found a way to permanently embed surveillance and sabotage tools in computers and networks it has targeted in Iran, Russia, Pakistan, China, Afghanistan and other countries closely watched by American intelligence agencies, according to a Russian cybersecurity firm.In a presentation of its findings at a conference in Mexico on Monday, Kaspersky Lab, the Russian firm, said that the implants had been placed by what it called the “Equation Group,” which appears to be a veiled reference to the National Security Agency and its military counterpart, United States Cyber Command.
  • It linked the techniques to those used in Stuxnet, the computer worm that disabled about 1,000 centrifuges in Iran’s nuclear enrichment program. It was later revealed that Stuxnet was part of a program code-named Olympic Games and run jointly by Israel and the United States.Kaspersky’s report said that Olympic Games had similarities to a much broader effort to infect computers well beyond those in Iran. It detected particularly high infection rates in computers in Iran, Pakistan and Russia, three countries whose nuclear programs the United States routinely monitors.
  • Some of the implants burrow so deep into the computer systems, Kaspersky said, that they infect the “firmware,” the embedded software that preps the computer’s hardware before the operating system starts. It is beyond the reach of existing antivirus products and most security controls, Kaspersky reported, making it virtually impossible to wipe out.
  • ...1 more annotation...
  • In many cases, it also allows the American intelligence agencies to grab the encryption keys off a machine, unnoticed, and unlock scrambled contents. Moreover, many of the tools are designed to run on computers that are disconnected from the Internet, which was the case in the computers controlling Iran’s nuclear enrichment plants.
Paul Merrell

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
Paul Merrell

Secret program at secret Guantánamo prison hears everything | Miami Herald - 0 views

  • A secret Defense Department program provides unfettered eavesdropping on the accused terrorists imprisoned at Guantánamo’s clandestine Camp 7 lockup, recently released war court documents show.Army Col. James L. Pohl, the judge in 9/11 trial, discovered the existence of the secret surveillance program during a recent war court hearing. Little is publicly known about the program, not even its unclassified two-word nickname.
  • The disclosure of pervasive eavesdropping at Guantánamo’s lockup for 14 former CIA prisoners comes in before-and-after documents released by the court from the recent Oct. 19-30 pretrial hearings in the death-penalty case of five men accused of orchestrating the hijackings that killed nearly 3,000 people on Sept. 11, 2001.At issue was accused 9/11 plotter Walid bin Attash’s request for guidance on how he could function as his own attorney. Bin Attash is a Yemeni in his mid-30s who is accused of training some of the hijackers. “You must assume anything you say in Camp 7 is not confidential and will be disclosed to the U.S. Government,” warns an Oct. 23 draft of the advisory, crafted after the judge was informed of the covert program. “Only when you are in Echo 2 will anything you say be covered by the attorney-client privilege.”An Oct. 20 draft of the advisory omits those lines.
  • This is not the first time in the proceedings that a surveillance program caught Pohl by surprise. In January 2013, he ordered the CIA to unplug a button that allowed an unseen observer to cut the court’s audio feed to the public. Perhaps ironically, the lone site the judge considers safe for consultative trial preparation — the Camp Echo compound of wooden huts, each containing a cell — at one time had covert recording devices that looked like smoke detectors. The judge ordered them disabled in February 2013.Attorney Dror Ladin of the American Civil Liberties Union, who was an observer at the Guantánamo hearings last month, said the apparent disclosure of “pervasive surveillance at Camp 7” is the latest issue to challenge the possibility of a fair trial.“It is shocking that for years neither defense counsel nor the judge were made aware that the government was capturing everything said aloud by the detainees there,” he said Thursday. It also adds to mounting questions of “how these military commissions can produce a fair result,” said Ladin, especially if one of the men represents himself. “These are detainees who really can’t see the evidence against them and simultaneously have been provided no rehabilitation services for the torture they suffered for years. It would be astonishing if any of them could craft a fair defense for capital charges.”
  • ...3 more annotations...
  • A defense attorney in another case said the prosecution wants to use a surreptitiously recorded conversation between two Camp 7 captives against an alleged al-Qaida commander. And in 2012 the journalist Daniel Klaidman wrote in his book “Kill or Capture” that the U.S. government had recordings made in a Guantánamo prison recreation yard of the alleged Sept. 11 mastermind Khalid Sheik Mohammed talking about evidence that could be used against him.The latest disclosure comes at a time of decreasing transparency at the war court.On Oct. 29, the judge held a 13-minute secret session without advanced notice to the public. A day later the judge wrote in a three-page ruling that he closed the court at the request of “the Government” — war-court-speak for the prosecution — to protect state secrets whose disclosure “could result in grave danger to national security.”Pohl also ordered the court to issue a censored transcript of the parts the excluded public and accused would be allowed to see. No transcript has been released.Then the next day, Oct. 30, the judge held a daylong, open hearing on a restraining order he issued forbidding female guards from touching the 9/11 accused when they are being taken to court or legal meetings. The judge’s order has outraged members of Congress and the Pentagon brass.
  • In that public court hearing, soldiers called as witnesses from the prison discussed staffing patterns at Camp 7. Normally the Pentagon releases transcripts of open hearings the same day. Unusually, the court has not yet released the Oct. 30 transcript. A Pentagon spokesman suggested Thursday — 13 days after the open court hearing — that somebody was scrubbing the transcript of information already made public. “The security review of the Oct. 30 transcript remains ongoing,” said Navy Cmdr. Gary Ross. “We will provide an update once additional information becomes available.”Much of the October session focused on bin Attash’s question about how he’d act as his own lawyer in a system that does not let the accused terrorist see classified information in the case. The judge and attorneys devoted days to designing a script Pohl would read to any accused 9/11 terrorist who tries to take charge of his defense — and spent a full afternoon huddling in a closed meeting on the secret program.
  • In it, Pohl made clear that he never intended to let bin Attash dismiss his Pentagon-paid defense attorneys — Chicago criminal defense attorney Cheryl Bormann and Air Force Maj. Michael Schwartz. Instead, the script shows Pohl planned to appoint Bormann and Schwartz as “standby counsel” the judge could activate to carry out cross-examination of certain witnesses who might have “particular sensitivities” to being questioned by the alleged terrorist.“If you are represented by lawyers, then it is the lawyers, and not you, who will conduct the defense,” the warning says. “Correspondingly, if you represent yourself, you will be able to perform the lawyer’s core functions, but you will not necessarily be allowed to direct special appearances by counsel when it is convenient to you.”The language suggests a far more limited role by the American lawyers than those carried out in an aborted attempt to hold the Sept. 11 trial during the Bush administration. In those proceedings, alleged 9/11 terrorists serving as their own lawyer regularly had standby counsel write and argue motions in court.The script also envisions a scenario in which an accused 9/11 plotter serving as his own lawyer becomes unruly, disruptive or disobedient rather than respect “the dignity of the courtroom.” In such a case, the judge said he could deal with “obstructionist misconduct” by putting “physical restraints” on bin Attash or ejecting him from the court.Bin Attash, for his part, has not been noticeably disruptive across years of pretrial proceedings. An amputee, he was brought to his May 5, 2012 arraignment in a Guantánamo prison restraint chair routinely used for forced-feeding of hunger strikers — with guards carrying his prosthetic leg separately.
  •  
    It's long past time to recognize that the military cannot provide a fair trial for GITMOI detainees, transfer them to the U.S., and try them in a civilian Article II court. If this kind of crap were going down before an Article II judge, those conducting the surveillance would be sitting in jail. 
Paul Merrell

On this Veterans Day, suicide has caused more American casualties than wars in Iraq and... - 0 views

  • One of the most tragic problems afflicting those who served their country is the specter of suicide, often the fallout of post traumatic stress disorder (PTSD). After more than a year of intense lobbying by veterans groups, Congress this year passed the Clay Hunt Suicide Prevention for American Veterans Act, named for a Marine veteran who took his own life even after working as an advocate for suicide prevention. The law is designed to reduce military and veteran suicides, and improve access to quality mental health care. But veterans experts estimate that 17 of the 22 daily suicides involve vets not enrolled in the VA’s healthcare system, suggesting more research — and far greater funding — will be necessary to get a handle on the problem.
  • With U.S. combat operations winding down in Afghanistan and Iraq, the suicide rate among ex-military members has risen from 18 a day in 2010, although studies undertaken by the Veterans Administration have failed to pinpoint a direct cause. Only about a third of all vets use the VA for healthcare, which leaves a wide swath of people who once wore the uniform outside the reach of the military’s data gathering.“Common sense would have us expect a correlation between number of deployments and combat with suicide risk,” says Fred MacRae, lead suicide prevention coordinator at the VA hospital in Palo Alto. But recent research suggests that’s not necessarily the case. #AD_text{ font-size: 11px; color: #999999; } Advertisement Not even the horrors of battle are a proven cause. “More and more,” says Jackie Maffucci, research director for Iraq and Afghanistan Veterans of America (IAVA), “the data are suggesting that exposure to combat is not one of the high-risk factors.”
  • Almost everyone who has served in the military now knows someone — often several someones — who suffers from disabling depression. Some end their own lives. Members of the IAVA were asked in a survey last year if they knew at least one post-9/11 veteran who had attempted suicide, and 47 percent answered yes. Another 40 percent knew at least one veteran who had died by suicide. “And 31 percent indicated they had thought about taking their own life since joining the military,” says Maffucci. “Those are startling numbers.”Daniel Faddis told another veteran in his family that he felt he had let down his military buddies when he was booted out. “He carried around a lot of guilt about that,” Stan Faddis says. “Some guys he knew ended up dying in combat, and he felt bad he wasn’t there to save them, or to die with them.”The current wait time for a mental health appointment at the VA in Palo Alto is about 12 days, and in a recent national study by the Government Accountability Office it averaged 26 days. Still, that’s considerably shorter than when the country went on a wartime footing following 9/11. “In 2001, your chances of dying by suicide were greater if you got your care in the VA system than if you got it elsewhere,” MacRae acknowledges. The new federal legislation is creating a program to help the VA recruit psychiatrists by assisting with their tuition payments, and it also requires an annual evaluation of VA mental health and suicide-prevention programs.
Paul Merrell

Survey: One in four US adults burdened by medical debt - World Socialist Web Site - 0 views

  • A new survey shows that 26 percent of US adults ages 18-64 say they or someone in their household had problems paying their medical bills in the past 12 months. The Kaiser Family Foundation/New York Times Medical Bills Survey shows that those from all walks of life are saddled with medical debt, with the uninsured and low-income households carrying the heaviest burden.
  • Being uninsured has a strong correlation with medical bill difficulties, with 53 percent of the uninsured reporting problems paying household medical bills in the past year. However, as the survey’s findings point out, “insurance is not a panacea against these problems.” About one in five of those with insurance—either through an employer, Medicaid or purchased on their own—also report problems paying medical bills. Among those with private insurance, the prevalence of high-deductible health coverage significantly impacts the financial burden on households, with 26 percent of those with high-deductible coverage reporting difficulties paying their medical bills. Although the survey does not indicate which of those interviewed purchased their coverage through the Affordable Care Act (ACA), it is clear that the high deductible plans dominating the ACA marketplace are becoming increasingly common among plans sold by private insurance companies.
  • Not surprisingly, households with lower or moderate incomes are more likely to report problems paying their medical bills. Nearly four in 10 (37 percent) of those with household incomes below $50,000 report these problems, compared with 26 percent of those with incomes between $50,000 and $100,000, and 14 percent of those with household incomes greater than $100,000. Women are slightly more likely than men to experience problems paying medical bills (29 percent versus 23 percent), as are adults under age 30 compared with those ages 30-64 (31 percent versus 24 percent). Residents in the South reported the highest share of medical bill problems (32 percent), while those in the Northeast reported the lowest (18 percent). At 24 percent, whites reported slightly less difficulty pay their bills than blacks (31 percent) and Hispanics (32 percent). People with the greatest medical needs are also more likely to face problems paying their medical bills. Of those who say they have a disability that prevents them from participating fully in daily activities, 47 percent report medical bill problems. Among those who rate their own heath as fair or poor, 45 percent report these problems, while 34 percent of those who say they receive regular treatment for a chronic condition report problems.
  • ...4 more annotations...
  • When asked to describe their financial situation, 43 percent of those who have experienced problems paying medical bills say they just scrape by covering their basic household expenses, while 18 percent say they don’t have the financial resources to cover them. The survey also shows that compared to those without medical debt, those with medical bill problems are less likely to have a credit card or a retirement savings account. Of those with difficulties paying bills, the total amount owed ranged from 10 percent owing $500 or less, to 24 percent owing $2,500 to less than $5,000, to 13 percent owing in excess of $10,000. For an individual or family living paycheck to paycheck, or facing unemployment, even a $500 unpaid medical bill—accompanied by calls from health providers’ offices or their bill collectors—can become an overwhelming burden. In a further cruel twist, those facing medical bill problems also often face the complicating factor of income loss due to an illness. Three in 10 respondents say someone in their household had to take a cut in pay or hours as a result of the illness that led to the medical bills, either due to the illness itself or in order to care for the person who was sick.
  • The medical bills burdening households are for a wide variety of medical services, both one-time events and chronic conditions. Of those surveyed, bills incurred included those for doctor visits (65 percent), diagnostic tests (65 percent), lab fees (64 percent) and emergency room visits (61 percent). About half say they had problems paying for prescription drugs, hospitalizations or dental care. Those surveyed were asked to briefly describe the illness or injury that led to their medical bills. Respondents describe the nightmare scenario in which they face the double impact of serious medical conditions and the inability to pay the bills incurred to treat them.
  • The ACA is contributing to and compounding these devastating financial conditions for millions of Americans. The program, popularly known as Obamacare, forces uninsured individuals to purchase coverage from for-profit insurers under threat of penalty, offering only modest subsidies to those who qualify. The most affordable of these plans come with deductibles in excess of $5,000 and other high out-of-pocket costs and there are no meaningful restraints on the premiums insurance companies can charge. These Obamacare plans are serving as a model for employer-sponsored coverage, where high-deductible plans are becoming more and more the norm. Architects of the ACA further predict that employer-sponsored coverage will largely be done away with by 2025.
  • The solution to the financial crisis ordinary Americans face paying their medical bills—along with the other scourges of the US for-profit medical system—lies in putting an end to the privately owned insurance companies, pharmaceuticals and giant health care chains and establishing socialized medicine.
Paul Merrell

U.S. military closer to making cyborgs a reality - CNNPolitics.com - 0 views

  • The U.S. military is spending millions on an advanced implant that would allow a human brain to communicate directly with computers.If it succeeds, cyborgs will be a reality.The Pentagon's research arm, the Defense Advanced Research Projects Agency (DARPA), hopes the implant will allow humans to directly interface with computers, which could benefit people with aural and visual disabilities, such as veterans injured in combat.The goal of the proposed implant is to "open the channel between the human brain and modern electronics" according to DARPA's program manager, Phillip Alvelda.
  • DARPA sees the implant as providing a foundation for new therapies that could help people with deficits in sight or hearing by "feeding digital auditory or visual information into the brain."A spokesman for DARPA told CNN that the program is not intended for military applications.
  • But some experts see such an implant as having the potential for numerous applications, including military ones, in the field of wearable robotics -- which aims to augment and restore human performance.Conor Walsh, a professor of mechanical and biomedical engineering at Harvard University, told CNN that the implant would "change the game," adding that "in the future, wearable robotic devices will be controlled by implants."Walsh sees the potential for wearable robotic devices or exoskeletons in everything from helping a medical patient recover from a stroke to enhancing soldiers' capabilities in combat.The U.S. military is currently developing a battery-powered exoskeleton, the Tactical Assault Light Operator Suit, to provide superior protection from enemy fire and in-helmet technologies that boost the user's communications ability and vision.The suits' development is being overseen by U.S. Special Operations Command.In theory, the proposed neural implant would allow the military member operating the suit to more effectively control the armored exoskeleton while deployed in combat.
  • ...1 more annotation...
  • In its announcement, DARPA acknowledged that an implant is still a long ways away, with breakthroughs in neuroscience, synthetic biology, low-power electronics, photonics and medical-device manufacturing needed before the device could be used.DARPA plans to recruit a diverse set of experts in an attempt to accelerate the project's development, according to its statement announcing the project.
  •  
    Let's assume for the moment that DARPA's goal is realizable and brain implants for commuication with computers become common. How long will it take for FBI, NSA, et ilk to get legislation or a court order allowing them to conduct mass surveillance of people's brains? Not long, I suspect. 
‹ Previous 21 - 40 of 42 Next ›
Showing 20 items per page