Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Experts

Rss Feed Group items tagged

Paul Merrell

The ultimate goal of the NSA is total population control | Antony Loewenstein | Comment... - 0 views

  • William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.
  • “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.Binney, who featured in a 2012 short film by Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government intrusion unlimited.“The ultimate goal of the NSA is total population control”, Binney said, “but I’m a little optimistic with some recent Supreme Court decisions, such as law enforcement mostly now needing a warrant before searching a smartphone.”
  • It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”The lack of official oversight is one of Binney’s key concerns, particularly of the secret Foreign Intelligence Surveillance Court (Fisa), which is held out by NSA defenders as a sign of the surveillance scheme's constitutionality.“The Fisa court has only the government’s point of view”, he argued. “There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally.”
  • ...4 more annotations...
  • He praised the revelations and bravery of former NSA contractor Edward Snowden and told me that he had indirect contact with a number of other NSA employees who felt disgusted with the agency’s work. They’re keen to speak out but fear retribution and exile, not unlike Snowden himself, who is likely to remain there for some time.
  • Binney recently told the German NSA inquiry committee that his former employer had a “totalitarian mentality” that was the "greatest threat" to US society since that country’s US Civil War in the 19th century. Despite this remarkable power, Binney still mocked the NSA’s failures, including missing this year’s Russian intervention in Ukraine and the Islamic State’s take-over of Iraq.The era of mass surveillance has gone from the fringes of public debate to the mainstream, where it belongs. The Pew Research Centre released a report this month, Digital Life in 2025, that predicted worsening state control and censorship, reduced public trust, and increased commercialisation of every aspect of web culture.It’s not just internet experts warning about the internet’s colonisation by state and corporate power. One of Europe’s leading web creators, Lena Thiele, presented her stunning series Netwars in London on the threat of cyber warfare. She showed how easy it is for governments and corporations to capture our personal information without us even realising.Thiele said that the US budget for cyber security was US$67 billion in 2013 and will double by 2016. Much of this money is wasted and doesn't protect online infrastructure. This fact doesn’t worry the multinationals making a killing from the gross exaggeration of fear that permeates the public domain.
  • Wikileaks understands this reality better than most. Founder Julian Assange and investigative editor Sarah Harrison both remain in legal limbo. I spent time with Assange in his current home at the Ecuadorian embassy in London last week, where he continues to work, release leaks, and fight various legal battles. He hopes to resolve his predicament soon.At the Centre for Investigative Journalism conference, Harrison stressed the importance of journalists who work with technologists to best report the NSA stories. “It’s no accident”, she said, “that some of the best stories on the NSA are in Germany, where there’s technical assistance from people like Jacob Appelbaum.” A core Wikileaks belief, she stressed, is releasing all documents in their entirety, something the group criticised the news site The Intercept for not doing on a recent story. “The full archive should always be published”, Harrison said.
  • With 8m documents on its website after years of leaking, the importance of publishing and maintaining source documents for the media, general public and court cases can’t be under-estimated. “I see Wikileaks as a library”, Assange said. “We’re the librarians who can’t say no.”With evidence that there could be a second NSA leaker, the time for more aggressive reporting is now. As Binney said: “I call people who are covering up NSA crimes traitors”.
Paul Merrell

BBC News - Ebola deaths mount in Sierra Leone and Liberia - 0 views

  • High numbers of new cases of the Ebola virus are being reported in Sierra Leone and Liberia, with 19 deaths over three days this week, the UN's World Health Organization (WHO) says. Such figures showed that it was a race against time to control the epidemic in Sierra Leone, medical charity MSF said.
  • Medecins Sans Frontieres said its teams in eastern Sierra Leone were "racing against time to stop the spread of the disease". "We're under massive time pressure: the longer it takes to find and follow up with people who have come in contact with sick people, the more difficult it will be to control the outbreak," MSF emergency co-ordinator Anja Wolz said in a statement. "We still have no idea how many villages are affected. I'm afraid we've only seen the tip of the iceberg." The disease creates fear within communities and sick people are often stigmatised so experts believe the key to stopping the spread of the virus is to make sure affected communities understand it better.
  • "Families can be driven out of their villages, and sick people can be cast out to die on their own," said Ms Wolz. The WHO gathers data on confirmed, probable and suspected cases and deaths in Guinea, Liberia and Sierra Leone. So far in the West African outbreak there have been 888 cases.
  •  
    Ebola is one of the nastiest killers on earth. Whenever it appears, you need to keep an eye out for government involvement. Ebola at least was one of the biological warfare agents weaponized by the U.S. Army's CBW freaks at Ft. Detrick, Maryland. Although the U.S. officially renounced biological warfare, At least a couple of African outbreaks were strongly suspected of being Army CBW tests. 
Paul Merrell

WASHINGTON: CIA admits it broke into Senate computers; senators call for spy chief's ou... - 0 views

  • An internal CIA investigation confirmed allegations that agency personnel improperly intruded into a protected database used by Senate Intelligence Committee staff to compile a scathing report on the agency’s detention and interrogation program, prompting bipartisan outrage and at least two calls for spy chief John Brennan to resign.“This is very, very serious, and I will tell you, as a member of the committee, someone who has great respect for the CIA, I am extremely disappointed in the actions of the agents of the CIA who carried out this breach of the committee’s computers,” said Sen. Saxby Chambliss, R-Ga., the committee’s vice chairman.
  • The rare display of bipartisan fury followed a three-hour private briefing by Inspector General David Buckley. His investigation revealed that five CIA employees, two lawyers and three information technology specialists improperly accessed or “caused access” to a database that only committee staff were permitted to use.Buckley’s inquiry also determined that a CIA crimes report to the Justice Department alleging that the panel staff removed classified documents from a top-secret facility without authorization was based on “inaccurate information,” according to a summary of the findings prepared for the Senate and House intelligence committees and released by the CIA.In other conclusions, Buckley found that CIA security officers conducted keyword searches of the emails of staffers of the committee’s Democratic majority _ and reviewed some of them _ and that the three CIA information technology specialists showed “a lack of candor” in interviews with Buckley’s office.
  • The inspector general’s summary did not say who may have ordered the intrusion or when senior CIA officials learned of it.Following the briefing, some senators struggled to maintain their composure over what they saw as a violation of the constitutional separation of powers between an executive branch agency and its congressional overseers.“We’re the only people watching these organizations, and if we can’t rely on the information that we’re given as being accurate, then it makes a mockery of the entire oversight function,” said Sen. Angus King, an independent from Maine who caucuses with the Democrats.The findings confirmed charges by the committee chairwoman, Sen. Dianne Feinstein, D-Calif., that the CIA intruded into the database that by agreement was to be used by her staffers compiling the report on the harsh interrogation methods used by the agency on suspected terrorists held in secret overseas prisons under the George W. Bush administration.The findings also contradicted Brennan’s denials of Feinstein’s allegations, prompting two panel members, Sens. Mark Udall, D-Colo., and Martin Heinrich, D-N.M., to demand that the spy chief resign.
  • ...7 more annotations...
  • Another committee member, Sen. Ron Wyden, D-Ore., and some civil rights groups called for a fuller investigation. The demands clashed with a desire by President Barack Obama, other lawmakers and the CIA to move beyond the controversy over the “enhanced interrogation program” after Feinstein releases her committee’s report, which could come as soon as next weekMany members demanded that Brennan explain his earlier denial that the CIA had accessed the Senate committee database.“Director Brennan should make a very public explanation and correction of what he said,” said Sen. Carl Levin, D-Mich. He all but accused the Justice Department of a coverup by deciding not to pursue a criminal investigation into the CIA’s intrusion.
  • “I thought there might have been information that was produced after the department reached their conclusion,” he said. “What I understand, they have all of the information which the IG has.”He hinted that the scandal goes further than the individuals cited in Buckley’s report.“I think it’s very clear that CIA people knew exactly what they were doing and either knew or should’ve known,” said Levin, adding that he thought that Buckley’s findings should be referred to the Justice Department.A person with knowledge of the issue insisted that the CIA personnel who improperly accessed the database “acted in good faith,” believing that they were empowered to do so because they believed there had been a security violation.“There was no malicious intent. They acted in good faith believing they had the legal standing to do so,” said the knowledgeable person, who asked not to be further identified because they weren’t authorized to discuss the issue publicly. “But it did not conform with the legal agreement reached with the Senate committee.”
  • Feinstein called Brennan’s apology and his decision to submit Buckley’s findings to the accountability board “positive first steps.”“This IG report corrects the record and it is my understanding that a declassified report will be made available to the public shortly,” she said in a statement.“The investigation confirmed what I said on the Senate floor in March _ CIA personnel inappropriately searched Senate Intelligence Committee computers in violation of an agreement we had reached, and I believe in violation of the constitutional separation of powers,” she said.It was not clear why Feinstein didn’t repeat her charges from March that the agency also may have broken the law and had sought to “thwart” her investigation into the CIA’s use of waterboarding, which simulates drowning, sleep deprivation and other harsh interrogation methods _ tactics denounced by many experts as torture.
  • Buckley’s findings clashed with denials by Brennan that he issued only hours after Feinstein’s blistering Senate speech.“As far as the allegations of, you know, CIA hacking into, you know, Senate computers, nothing could be further from the truth. I mean, we wouldn’t do that. I mean, that’s _ that’s just beyond the _ you know, the scope of reason in terms of what we would do,” he said in an appearance at the Council on Foreign Relations.White House Press Secretary Josh Earnest issued a strong defense of Brennan, crediting him with playing an “instrumental role” in the administration’s fight against terrorism, in launching Buckley’s investigation and in looking for ways to prevent such occurrences in the future.Earnest was asked at a news briefing whether there was a credibility issue for Brennan, given his forceful denial in March.“Not at all,” he replied, adding that Brennan had suggested the inspector general’s investigation in the first place. And, he added, Brennan had taken the further step of appointing the accountability board to review the situation and the conduct of those accused of acting improperly to “ensure that they are properly held accountable for that conduct.”
  • The allegations and the separate CIA charge that the committee staff removed classified documents from the secret CIA facility in Northern Virginia without authorization were referred to the Justice Department for investigation.The department earlier this month announced that it had found insufficient evidence on which to proceed with criminal probes into either matter “at this time.” Thursday, Justice Department officials declined comment.
  • In her speech, Feinstein asserted that her staff found the material _ known as the Panetta review, after former CIA Director Leon Panetta, who ordered it _ in the protected database and that the CIA discovered the staff had it by monitoring its computers in violation of the user agreement.The inspector general’s summary, which was prepared for the Senate and the House intelligence committees, didn’t identify the CIA personnel who had accessed the Senate’s protected database.Furthermore, it said, the CIA crimes report to the Justice Department alleging that panel staffers had removed classified materials without permission was grounded on inaccurate information. The report is believed to have been sent by the CIA’s then acting general counsel, Robert Eatinger, who was a legal adviser to the interrogation program.“The factual basis for the referral was not supported, as the author of the referral had been provided inaccurate information on which the letter was based,” said the summary, noting that the Justice Department decided not to pursue the issue.
  • Christopher Anders, senior legislative counsel with the American Civil Liberties Union, criticized the CIA announcement, saying that “an apology isn’t enough.”“The Justice Department must refer the (CIA) inspector general’s report to a federal prosecutor for a full investigation into any crimes by CIA personnel or contractors,” said Anders.
  •  
    And no one but the lowest ranking staffer knew anything about it, not even the CIA lawyer who made the criminal referral to the Justice Dept., alleging that the Senate Intelligence Committee had accessed classified documents it wasn't authorized to access. So the Justice Dept. announces that there's insufficient evidence to warrant a criminal investigation. As though the CIA lawyer's allegations were not based on the unlawful surveillance of the Senate Intelligence Committee's network.  Can't we just get an official announcement that Attorney General Holder has decided that there shall be a cover-up? 
Paul Merrell

Revelations of German Pilot: Shocking Analysis of the "Shooting Down" of Malaysian MH17... - 1 views

  • First, I was amazed at how few photos can be found from the wreckage with Google. All are in low resolution, except one: The fragment of the cockpit below the window on the pilots side. This image, however, is shocking. In Washington, you can now hear views expressed of a “potentially tragic error / accident” regarding MH 017. Given this particular cockpit image it does not surprise me at all. Entry and exit impact holes of projectiles in the cockpit area
  • I recommend to click on the little picture to the left. You can download this photo as a PDF in good resolution. This is necessary, because that will allow you understand what I am describing here. The facts speak clear and loud and are beyond the realm of speculation: The cockpit shows traces of shelling! You can see the entry and exit holes. The edge of a portion of the holes is bent inwards. These are the smaller holes, round and clean, showing the entry points most likely that of a 30 millimeter caliber projectile. The edge of the other, the larger and slightly frayed exit holes showing shreds of metal pointing produced by the same caliber projectiles. Moreover, it is evident that at these exit holes of the outer layer of the double aluminum reinforced structure are shredded or bent – outwardly! Furthermore, minor cuts can be seen, all bent outward, which indicate that shrapnel had forcefully exited through the outer skin from the inside of the cockpit. The open rivets are are also bent outward.
  • In sifting through the available images one thing stands out: All wreckage of the sections behind the cockpit are largely intact, except for the fact that only fragments of the aircraft remained . Only the cockpit part shows these peculiar marks of destruction. This leaves the examiner with an important clue. This aircraft was not hit by a missile in the central portion. The destruction is limited to the cockpit area. Now you have to factor in that this part is constructed of specially reinforced material. This is on account of the nose of any aircraft having to withstand the impact of a large bird at high speeds. You can see in the photo, that in this area significantly stronger aluminum alloys were being installed than in the remainder of the outer skin of the fuselage. One remembers the crash of Pan Am over Lockerbie. It was a large segment of the cockpit that due to the special architecture survived the crash in one piece. In the case of flight MH 017 it becomes abundantly clear that there also an explosion took place inside the aircraft.
  • ...1 more annotation...
  • So what could have happened? Russia recently published radar recordings, that confirm at least one Ukrainian SU 25 in close proximity to MH 017. This corresponds with the statement of the now missing Spanish controller ‘Carlos’ that has seen two Ukrainian fighter aircraft in the immediate vicinity of MH 017. If we now consider the armament of a typical SU 25 we learn this: It is equipped with a double-barreled 30-mm gun, type GSh-302 / AO-17A, equipped with: a 250 round magazine of anti-tank incendiary shells and splinter-explosive shells (dum-dum), arranged in alternating order. The cockpit of the MH 017 has evidently been fired at from both sides: the entry and exit holes are found on the same fragment of it’s cockpit segment! Now just consider what happens when a series of anti-tank incendiary shells and splinter-explosive shells hit the cockpit. These are after all designed to destroy a modern tank. The anti-tank incendiary shells partially traversed the cockpit and exited on the other side in a slightly deformed shape. (Aviation forensic experts could possibly find them on the ground presumably controlled by the Kiev Ukrainian military; the translator). After all, their impact is designed to penetrate the solid armor of a tank. Also, the splinter-explosive shells will, due to their numerous impacts too cause massive explosions inside the cockpit, since they are designed to do this. Given the rapid firing sequence of the GSh-302 cannon, it will cause a rapid succession of explosions within the cockpit area in a very short time. Remeber each of these is sufficient to destroy a tank.
Paul Merrell

Inside the CIA's Syrian Rebels Vetting Machine - 0 views

  • Nothing has come in for more mockery during the Obama administration’s halting steps into the Syrian civil war than its employment of “moderate” to describe the kind of rebels it is willing to back.
  • Behind the jokes, however, is the deadly serious responsibility of the CIA and Defense Department to vet Syrians before they receive covert American training, aid and arms. But according to U.S. counterterrorism veterans, a system that worked pretty well during four decades of the Cold War has been no match for the linguistic, cultural, tribal and political complexities of the Middle East, especially now in Syria. “We’re completely out of our league,” one former CIA vetting expert declared on condition of anonymity, reflecting the consensus of intelligence professionals with firsthand knowledge of the Syrian situation. “To be really honest, very few people know how to vet well. It’s a very specialized skill. It’s extremely difficult to do well” in the best of circumstances, the former operative said. And in Syria it has proved impossible.
Paul Merrell

Abbott to say No to Xi and the New Asia Infrastructure Investment Bank - Twice | nsnbc ... - 0 views

  • Australian Prime Minister Tony Abbott is expected to say no to Chinese President Xi about joining the new Chinese-led Asia Infrastructure Development Bank (AIIB) when he will meet Xi at the ASEAN summit in Beijing this week. Abbott’s no to joining the bank would come against the advise of Australian treasurer Joe Hockey and after intense U.S. pressure for Australia to reject the proposed participation.
  • The decision to reject Australia’s participation in the 21 nation regional bank was made during a session of the Australian government’s National Security Committee and was explained as a “decision made on strategic grounds”. The decision has been criticized by several of Australia’s leading experts on economy. The Asian Development Bank  (ADB) estimated in 2011 that Asia would require some US$750 per year through 2020 to meet the needs for regional infrastructure development. In 2012 the ADB merely lent US$7.5 billion reported Australia’s Treasury.
  • A growing number of regional governments including Thailand, Malaysia, Indonesia, Laos, Myanmar and many other are gravitating towards China as China increasingly opens up its economy and banking system for foreign businesses and investment.
  • ...3 more annotations...
  • Australian Treasurer Joe Hockey repeatedly stressed that Australia’s national interests would be better served by joining the new AIIB while Abbott attempted to position the AIIB as a “unilateral institution”. While it is correct that China is the main investor into the bank, it is a 21 nation project and Abbott’s explanation is given little credence by objective economists who are aware of the inherent problems with U.S. dominance and the dominance of rogue corporate cartels who hold e.g the World Bank, the IMF and the US government in a state of capture.
  • The development gains perspective, considering that the former Chief Economist of the Bank for International Settlements (BIS) William White in 2013, and other top-economists are predicting that a collapse of the U.S. dollar and the Bretton Woods institutions has become unavoidable, that it may happened overnight, and that it is likely to happen sometime by the end of 2014 or the first half of 2015. A recent analysis of the development described U.S. pressure against nations’ joining the new Asia Infrastructure Development Bank as the choice between gold and gunfire, noting that the U.S. applies relative soft pressure against Australia, while it won’t hesitate to provoke civil wars in for example Thailand to prolong the (f)ailing new American Century, just a little bit longer.
  • Gold or Gunfire: Hedging Against the Collapse of the Dollar
Paul Merrell

Tomgram: Peter Van Buren, Iraq and the Battle of the Potomac | TomDispatch - 0 views

  • What Could Possibly Go Right? Four Months into Iraq War 3.0, the Cracks Are Showing -- on the Battlefield and at the Pentagon By Peter Van Buren Karl von Clausewitz, the famed Prussian military thinker, is best known for his aphorism “War is the continuation of state policy by other means.” But what happens to a war in the absence of coherent state policy? Actually, we now know. Washington’s Iraq War 3.0, Operation Inherent Resolve, is what happens. In its early stages, I asked sarcastically, “What could possibly go wrong?” As the mission enters its fourth month, the answer to that question is already grimly clear: just about everything. It may be time to ask, in all seriousness: What could possibly go right?
  • The U.S. Department of State lists 60 participants in the coalition of nations behind the U.S. efforts against the Islamic State. Many of those countries (Somalia, Iceland, Croatia, and Taiwan, among them) have never been heard from again outside the halls of Foggy Bottom. There is no evidence that America’s Arab “allies” like Saudi Arabia, Qatar, and the United Arab Emirates, whose funding had long-helped extreme Syrian rebel groups, including IS, and whose early participation in a handful of air strikes was trumpeted as a triumph, are still flying. Absent the few nations that often make an appearance at America's geopolitical parties (Canada, the Brits, the Aussies, and increasingly these days, the French), this international mess has quickly morphed into Washington's mess. Worse yet, nations like Turkey that might actually have taken on an important role in defeating the Islamic State seem to be largely sitting this one out. Despite the way it’s being reported in the U.S., the new war in the Middle East looks, to most of the world, like another case of American unilateralism, which plays right into the radical Islamic narrative.
  • While American strategy may be lacking on the battlefield, it’s alive and well at the Pentagon. A report in the Daily Beast, quoting a generous spurt of leaks, has recently made it all too clear that the Pentagon brass “are getting fed up with the short leash the White House put them on.” Senior leaders criticize the war’s decision-making process, overseen by National Security Adviser Susan Rice, as “manic and obsessed.” Secretary of Defense Chuck Hagel wrote a quickly leaked memo to Rice warning that the president’s Syria strategy was already unraveling thanks to its fogginess about the nature of its opposition to Assad and because it has no “endgame.” Meanwhile, the military's “intellectual” supporters are already beginning to talk -- shades of Vietnam -- about “Obama's quagmire.”
  • ...4 more annotations...
  • The U.S. military came out of the Vietnam War vowing one thing: when Washington went looking for someone to blame, it would never again be left holding the bag.
  • Taken as a whole, the military's near-mutinous posture is eerily reminiscent of MacArthur's refusal to submit to President Harry Truman's political will during the Korean War. But don’t hold your breath for a Trumanesque dismissal of Dempsey any time soon. In the meantime, the Pentagon’s sights seem set on a fall guy, likely Susan Rice, who is particularly close to the president. The Pentagon has laid down its cards and they are clear enough: the White House is mismanaging the war. And its message is even clearer: given the refusal to consider sending in those ground-touching boots, Operation Inherent Resolve will fail. And when that happens, don't blame us; we warned you.
  • Joint Chiefs Chairman General Martin Dempsey has twice made public statements revealing his dissatisfaction with White House policy. In September, he said it would take 12,000 to 15,000 ground troops to effectively go after the Islamic State. Last month, he suggested that American ground troops might, in the future, be necessary to fight IS. Those statements contrast sharply with Obama's insistence that there will never be U.S. combat troops in this war. In another direct challenge, this time to the plan to create those Sunni National Guard units, Dempsey laid down his own conditions: no training and advising the tribes will begin until the Iraqi government agrees to arm the units themselves -- an unlikely outcome. Meanwhile, despite the White House's priority on training a new Syrian moderate force of 5,000 fighters, senior military leaders have yet to even select an officer to head up the vetting process that’s supposed to weed out less than moderate insurgents.
  • In or out, boots or not, whatever its own mistakes and follies, those who run the Pentagon and the U.S. military are already campaigning strategically to win at least one battle: when Iraq 3.0 collapses, as it most surely will, they will not be the ones hung out to dry. Of the very short list of what could go right, the smart money is on the Pentagon emerging victorious -- but only in Washington, not the Middle East.
Paul Merrell

Investigation finds 50,000 'ghost' soldiers in Iraqi army, prime minister says - The Wa... - 0 views

  • The Iraqi army has been paying salaries to at least 50,000 soldiers who don’t exist, Iraqi Prime Minister Haider al-Abadi said Sunday, an indication of the level of corruption that permeates an institution that the United States has spent billions equipping and arming. A preliminary investigation into “ghost soldiers” — whose salaries are being drawn but who are not in military service — revealed the tens of thousands of false names on Defense Ministry rolls, Abadi told parliament Sunday. Follow-up investigations are expected to uncover “more and more,” he added.
  • Abadi, who took power in September, is under pressure to stamp out the graft that flourished in the armed forces under his predecessor, Nouri al-Maliki. Widespread corruption has been blamed for contributing to the collapse of four of the army’s 14 divisions in June in the face of an offensive by Islamic State extremists.
  • The United States is encouraging Abadi to create a leaner, more efficient military as the Pentagon requests $1.2 billion to train and equip the Iraqi army next year. The United States spent more than $20 billion on the force from the 2003 invasion until U.S. troops withdrew at the end of 2011. With entry-level soldiers in Iraq drawing salaries of about $600 a month, the practice of “ghost soldiers” is likely to be costing Iraq at least $380 million a year — though officials say that’s probably only a fraction of the true expense.
  • ...2 more annotations...
  • “It could be more than triple this number,” said Hamid ­al-Mutlaq, a member of the parliamentary defense and security committee, pointing out that more thorough on-the-ground investigations are planned. “The people who are responsible for this should be punished. Iraq’s safe has been emptied.” The corrupt practice is often perpetrated by officers who pretend to have more soldiers on their books in order to pocket their salaries, experts say.
  • The United States is focusing its efforts on three divisions in order to begin effective counteroffensive operations against the Islamic State, which controls around a third of the country’s territory. The Pentagon also has requested $24 million to train and equip tribal fighters and $354 million for Kurdish forces as part of its strategy to turn the tide against the Islamic State.
Paul Merrell

Controversies - Insurance Industry Adjusts to Earthquake Risk Caused by Fracking - AllG... - 0 views

  • In another sign that fracking is increasingly being acknowledged as a cause of earthquakes, the insurance industry has announced that it is now linking the controversial drilling procedure with seismic activity in establishing its rates. Before insurance companies set their rates for an upcoming year, they turn to the U.S. Geological Survey (USGS) for information on quake activity. Specifically, insurers look at the USGS’s National Seismic Hazard Map, which “predicts where future earthquakes will occur, how often they will occur and how strongly they will shake the ground,” according to the Dallas Morning News. But this map will now take into account earthquakes that occur within the vicinity of fracking wells, the USGS has decided. That means insurance rates may go up in some areas considered more at risk of seismic events because of fracking operations. Between the years 2010 and 2013, central and eastern United States had an average of five times as many quakes per year as between 1970 and 2000. Human activity, including fracking, has been cited by scientists as the cause, according to Dallas Morning News.
  • Last year, USGS connected a 5.7-magnitude quake in Oklahoma to that state’s robust fracking industry. “The observation that a human-induced earthquake can trigger a cascade of earthquakes, including a larger one, has important implications for reducing the seismic risk from wastewater injection,” USGS seismologist and coauthor of the study Elizabeth Cochran said at the time. More than 120 quakes have hit the Dallas area in the past six years, and scientists have cited the work performed at nearby fracking sites as the reason, according to Homeland Security News Wire. Even the Texas Oil & Gas Association agreed that some research into the nexus of fracking and quakes is called for. “The oil and natural gas industry agrees that recent seismic activity warrants robust investigation to determine the precise location, impact and cause or causes of seismic events,” Todd Staples, the association’s president, said in a statement. A study published in the Bulletin of the Seismological Society of America says fracking near Ohio’s Poland Township triggered a previously undiscovered fault. The result was more than 70 earthquakes ranging in magnitude of 2.1 to 3.0, the latter of which was described as “rare” by the experts.
  •  
    Yet another factor to contribute to the piercing of the shale oil bubble in the U.S. economy.The shale oil and gas industry in the U.S. is collapsing because its production costs can not result in profits when the price of oil is so low. Banksters have ended the flow of new well development funding. Shale oil development companies are going bankrupt by the dozens  and tens of thousands of shale oil workers have been laid off.  
Paul Merrell

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
Paul Merrell

Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise - The Intercept - 0 views

  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
  • By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content: Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect. The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists: INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting: A = Indian Diplomatic & Indian Navy B = Central Asian diplomatic C = Chinese Human Rights Defenders D = Tibetan Pro-Democracy Personalities E = Uighur Activists F = European Special Rep to Afghanistan and Indian photo-journalism G = Tibetan Government in Exile
  • In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.” In instances where hacking may compromise data from the U.S. and U.K. governments, or their allies, notification was given to the “relevant parties.” In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge. “Analysts are potentially missing out on valuable open source information relating to cyber defence because of an inability to easily keep up to date with specific blogs and Twitter sources,” according to one document. GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media. The Twitter accounts designated for collection in the 2012 document:
  • ...3 more annotations...
  • Documents published with this article: LOVELY HORSE – GCHQ Wiki Overview INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers – SIDtoday  HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress NATO Civilian Intelligence Council – Cyber Panel – US Talking Points
  • These accounts represent a cross section of the hacker community and security scene. In addition to monitoring multiple accounts affiliated with Anonymous, GCHQ monitored the tweets of Kevin Mitnick, who was sent to prison in 1999 for various computer and fraud related offenses. The U.S. Government once characterized Mitnick as one of the world’s most villainous hackers, but he has since turned security consultant and exploit broker. Among others, GCHQ monitored the tweets of reverse-engineer and Google employee, Thomas Dullien. Fellow Googler Tavis Ormandy, from Google’s vulnerability research team Project Zero, is featured on the list, along with other well known offensive security researchers, including Metasploit’s HD Moore and James Lee (aka Egypt) together with Dino Dai Zovi and Alexander Sotirov, who at the time both worked for New York-based offensive security company, Trail of Bits (Dai Zovi has since taken up a position at payment company, Square). The list also includes notable anti-forensics and operational security expert “The Grugq.” GCHQ monitored the tweets of former NSA agents Dave Aitel and Charlie Miller, and former Air Force intelligence officer Richard Bejtlich as well as French exploit vendor, VUPEN (who sold a one year subscription for its binary analysis and exploits service to the NSA in 2012).
  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
Paul Merrell

'Realists' Warn Against Ukraine Escalation | Consortiumnews - 0 views

  • The neocons’ war-and-more-war bandwagon is loaded up again and rolling downhill as “everyone who matters” in Washington is talking up sending sophisticated weapons to Kiev to escalate Ukraine’s civil war, but some “realists,” an endangered species in U.S. foreign policy, dissent, notes Robert Parry.
  • In Foreign Policy, Wald notes that despite the emerging consensus to ship arms to Ukraine, “few experts think this bankrupt and divided country is a vital strategic interest and no one is talking about sending U.S. troops to fight on Kiev’s behalf. So the question is: does sending Ukraine a bunch of advanced weaponry make sense? The answer is no.”
  •  
    While I have a lot of respect for Mearsheimer and Wald, they have completely missed why the U.S. is involved in the Ukraine. The U.S. has done its level best to create an arc of instability from Russia south to the Mediterranean and Suez Canal in order to protect the petrodollar from merger of the European and Asian markets. It's about pipelines and railroads both existing and to be built in the future. It's about getting in the way of China's rising economy. It's about combating de-dollarization. It makes sense to Western banksters, in a "prolong the decline of the American Empire as long as possible" way.  
Paul Merrell

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle - 0 views

  • AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania. In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
  • With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
  • Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
  • ...2 more annotations...
  • According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto. Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
  • The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
  •  
    Remember all those NSA claims that no evidence of their misbehavior has emerged? That one should never take wing again. Monitoring call content without the involvement of any court? Without a warrant? Without probable cause?  Was there even any Congressional authorization?  Wiretapping unequivocally requires a judicially-approved search warrant. It's going to be very interesting to learn the government's argument for this misconduct's legality. 
Paul Merrell

In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle - NYTimes.com - 0 views

  • In the fall of 2008, a 30-year-old computer expert named Zarrar Shah roamed from outposts in the northern mountains of Pakistan to safe houses near the Arabian Sea, plotting mayhem in Mumbai, India’s commercial gem.Mr. Shah, the technology chief of Lashkar-e-Taiba, the Pakistani terror group, and fellow conspirators used Google Earth to show militants the routes to their targets in the city. He set up an Internet phone system to disguise his location by routing his calls through New Jersey. Shortly before an assault that would kill 166 people, including six Americans, Mr. Shah searched online for a Jewish hostel and two luxury hotels, all sites of the eventual carnage.
  • But he did not know that by September, the British were spying on many of his online activities, tracking his Internet searches and messages, according to former American and Indian officials and classified documents disclosed by Edward J. Snowden, the former National Security Agency contractor. They were not the only spies watching. Mr. Shah drew similar scrutiny from an Indian intelligence agency, according to a former official briefed on the operation. The United States was unaware of the two agencies’ efforts, American officials say, but had picked up signs of a plot through other electronic and human sources, and warned Indian security officials several times in the months before the attack.
Paul Merrell

CIA's Hidden Hand in 'Democracy' Groups | Consortiumnews - 0 views

  • Documents from the Reagan presidential library reveal that two major institutions promoting “democracy” and “freedom” — Freedom House and National Endowment for Democracy — worked hand-in-glove, behind-the-scenes, with a CIA propaganda expert in the 1980s, reports Robert Parry.
  • But the Russian law would impede NED’s efforts to destabilize the Russian government through funding of political activists, journalists and civic organizations, so it was denounced as an infringement of human rights and helped justify Freedom House’s rating of Russia as “not free.”The Russian government’s concerns were not entirely paranoid. On Sept. 26, 2013, Gershman, in effect, charted the course for the crisis in Ukraine and the greater neocon goal of regime change in Russia. In a Washington Post op-ed, Gershman called Ukraine “the biggest prize” and explained how pulling it into the Western camp could contribute to the ultimate defeat of Russian President Vladimir Putin.“Ukraine’s choice to join Europe will accelerate the demise of the ideology of Russian imperialism that Putin represents,” Gershman wrote. “Russians, too, face a choice, and Putin may find himself on the losing end not just in the near abroad but within Russia itself.”With NED’s budget now exceeding $100 million a year — and with many NGOs headquartered in Washington — Gershman has attained the status of a major paymaster for the neocon movement with his words carrying extra clout because he can fund or de-fund many a project.
  • Thus, three decades after CIA Director William Casey and his propaganda specialist Walter Raymond Jr. struggled to arrange funding for Freedom House and other organizations that would promote an interventionist agenda, their brainchild – the National Endowment for Democracy – was still around picking up those tabs.
Paul Merrell

China says wants closer military ties with Iran | Reuters - 0 views

  • China wants to have closer military ties with Iran, the Chinese defense minister told the visiting head of the Iranian navy on Thursday, state media reported, reaffirming diplomatic links despite controversy over Iran's nuclear plans.
  • Naval cooperation between Iran and China is aimed at reinforcing Iran's military capability in the Gulf, analysts say, as well as displaying China's plan to exert greater influence and presence beyond East Asia.“The (port) call reflects China’s military-to-military relationship with Iran," said Christian Le Mière, a naval expert at the International Institute for Strategic Studies think-tank."It is the most explicit sign of Beijing’s acknowledgment of this relationship, which has remained relatively covert until now."
  • China's People's Liberation Army Daily separately reported that Sayyari had been given tours of a Chinese submarine and warships, where he "listened to an introduction on equipment ability and weapons systems".Sayyari said he hoped Iran and China could cooperate on anti-piracy operations, the newspaper said.China is Iran's top oil buyer and has been the most aggressive in raising its crude purchases after an easing of the Western sanctions aimed at ending Tehran's disputed nuclear program.
  • ...1 more annotation...
  • China, a participant at the nuclear talks with Iran, has consistently urged a negotiated solution and decried efforts to place sanctions which have not been endorsed by the United Nations on Iran.
Paul Merrell

Islamic State militants allegedly used chlorine gas against Iraqi security forces - The... - 0 views

  • Dizzy, vomiting and struggling to breathe, 11 Iraqi police officers were rushed to a government hospital 50 miles north of the capital last month. The diagnosis: poisoning by chlorine gas. The perpetrators, according to the officers: Islamic State extremists. The chlorine attack appears to be the first confirmed use of chemical weapons by the Islamic State on the battlefield. An Iraqi Defense Ministry official corroborated the events, and doctors said survivors’ symptoms were consistent with chlorine poisoning. Iraqi forces say two other crude chlorine attacks have occurred since the extremists seized vast tracts of Iraqi territory this summer, but details on those incidents remain sketchy. The reported assaults all raise concerns that the militants are attempting to hone their chemical weapons capabilities as they push to control more ground
  • Chlorine, a common component in industry, is sold legally, but its use as a weapon violates the Chemical Weapons Convention. It was widely employed in trench warfare during World War I, including infamously at Ypres in Belgium, where German forces dispersed more than 160 tons of chlorine into the breeze, killing thousands of French and Allied soldiers.
  • One physician on the team, Hassanain Mohammed, had treated similar cases­ before. In 2006 and 2007, al-Qaeda in Iraq, a group that later morphed into the Islamic State, carried out a string of chlorine bombings in the country.
  • ...3 more annotations...
  • An Iraqi Defense Ministry official confirmed this week that a bomb rigged with chlorine canisters was used in the Duluiyah attack. “They use it just to create terror,” said the official, who spoke on the condition of anonymity because he was not authorized to provide the information publicly. “But of course we are very concerned.” In a statement, the Defense Ministry confirmed that the Islamic State has used the gas in a “primitive and ineffective way” near water-treatment plants where it has gained access to chlorine, as well as in roadside bomb attacks. It did not specify the locations of the attacks, but there are several water plants near Duluiyah on territory controlled by the Islamic State.
  • Chlorine bombs are an easy-to-create but inexact weapon, experts say. All that is needed is a small explosive charge to rupture containers filled with the substance. “It’s difficult to deliver on target in combat situations,” said Jean Pascal Zanders, an independent researcher who specializes in chemical and biological weapons and disarmament. “Chlorine dissipates fast unless someone is able to concentrate it in a confined area.” Fighters in Duluiyah say it was not the only time chlorine has been used against them. Another attack this month caused minor injuries, and the fighters were treated locally, police officials said.
  • Soldiers who escaped an Islamic State rout of a besieged army base in Saqlawiyah, where hundreds of soldiers were killed last month, also said chlorine gas was used there — though reports of where and how the gas was delivered varied and could not be confirmed. While some officers said they believed artillery- or mortar-launched canisters fired by the attackers fell short of the base, others, who claimed to have remained in the installation for a longer period, said the canisters fell within its perimeter. Another claimed that the militants detonated chlorine-filled containers.
Paul Merrell

Ebola? How Do You Know, WHO and CDC? | nsnbc international - 0 views

  • There is something perversely strange about the entire hoopla around the so-called Ebola outbreaks. An African man is admitted to a Dallas hospital with symptoms, treated, released and re-admitted, the “first” case of Ebola in the USA. What the guardians of truth in the mainstream media never ask is how reliable is the test that determines if someone has Ebola.
  • One courageous scientist who did question the Gallo HIV-AIDS hypothesis was Kary Mullis, who in 1996 wrote, “The HIV/AIDS hypothesis is one hell of a mistake.” Mullis won the Nobel Prize in chemistry in 1993. His devastating comments were ignored by the ever-vigilant mainstream media and medical profession. In 1983 Gallo arbitrarily transformed correlation into causality and said he had discovered the “virus” causing acquired immunodeficiency or AID, which was then named a “syndrome,” or AIDS. Gallo had just before that announcement won a patent for the only known test to determine of someone had AIDS. An habitual user of certain drugs like amyl nitrite or poppers, or even a pregnant woman would show HIV-positive with the Gallo test. Fears of a new global plague were stoked in the media by irresponsible scientists. Gallo sold his AIDS test to five pharmaceutical companies and sat back to reap the royalties. The Ebola Test
  • Can the PCR blood test tell how much Ebola virus is in a person’s body? The same Kary Mullis cited above regarding the HIV/AIDS hypothesis invented the PCR test in 1983, the basis on which his Nobel Prize was awarded. He told journalist John Lauritsen years back of his test and warned against its misuse. Lauritsen reported: With regard to the viral-load tests, which attempt to use PCR for counting viruses, Mullis has stated: “Quantitative PCR is an oxymoron.” PCR is intended to identify substances qualitatively, but by its very nature is unsuited for estimating numbers. Although there is a common misimpression that the viral-load tests actually count the number of viruses in the blood, these tests cannot detect free, infectious viruses at all; they can only detect proteins that are believed, in some cases wrongly, to be unique to HIV. The tests can detect genetic sequences of viruses, but not viruses themselves.
  • ...2 more annotations...
  • Now we are again reading similar terrorizing stories in the mass media, this time about Ebola–fears stoked by the pharma-industry-controlled WHO in Geneva under Director General Margaret Chan’s Scientific Advisory Group of Experts and their ties to Big Pharma giants, and the US Government Centers for Disease Control in Atlanta. What exactly is the Ebola test that is being used by doctors or health workers in Sierre Leone or Liberia to “prove” Ebola in a sick person? When the African man was re-hospitalized in Dallas, the head of the CDC, Tom Frieden, declared the patient was diagnosed with Ebola based on a test that is “highly accurate. It’s a PCR test of blood.” But that PCR test of blood is not highly accurate. Rather it is highly flawed. As Jon Rappoport points out, “Among the problems of the PCR test is that it is open to errors. Is the sample taken from the patient actually a virus or a piece of a virus? Or is just an irrelevant piece of debris? Another problem is inherent in the method of the PCR itself. The test is based on the amplification of a tiny, tiny speck of genetic material taken from a patient—blowing it up millions of times until it can be observed and analyzed. Researchers who employ the test claim that, as a result of the procedure, they can also infer the quantity of virus that is present in the patient. This is crucial, because unless a patient has millions and millions of Ebola virus in his body, there is absolutely no reason to think he is sick or will become sick.”
  • Nor can the Mullis PCR test count the number of Ebola viruses in a person’s blood. Yet the CDC claims, wrongly according to Mullis, that it can. Can it be that the entire Ebola fear campaign launched by Chan’s WHO and the CDC is based on fiction and a pharmaceutical industry ready to jab millions with their untested “Ebola vaccines”?
Paul Merrell

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
Paul Merrell

Jeb Bush's Administration Steered Florida Pension Money to George W. Bush's Fundraisers - 0 views

  • Four years before the financial collapse, Goldman Sachs executive George Herbert Walker IV had much to be thankful for. "I've been fortunate to be a small part of teams leading U.S. restructurings, European privatizations, global pension management and now hedge fund and private equity investing,” he said in the annual report of a banking colossus that would soon be known as the “great vampire squid” of Wall Street. “The world,” said Walker, “just keeps getting more interesting." As the head of Goldman Sachs’ alternative investment unit, Walker’s ebullience was understandable. At the same time he was raising $100,000 for his cousin George W. Bush’s successful presidential re-election effort, the administration of another cousin, Florida Gov. Jeb Bush, returned the family favor, delivering $150 million of Florida pension money to an alternative investment fund run by Walker’s firm. Like other executives whose companies received Florida pension money, Walker is now renewing the cycle, reportedly attending in February a high-dollar fundraiser for Jeb Bush’s political committee.
  • Walker is not alone: He is one of 19 top fundraisers for George W. Bush -- known as “Pioneers” and “Rangers” -- whose financial firms received state business from Jeb Bush’s administration in Tallahassee. In all, an International Business Times’ review of government documents shows Jeb Bush oversaw Florida directing at least $1.7 billion of state workers’ retirement money to the financial firms of his elder brother’s major donors. As Jeb Bush oversaw the State Board of Administration (SBA) that runs Florida’s massive public pension system, the state shifted billions of dollars into higher-risk, higher-fee alternative investments, benefiting the same sector of the investment industry he would work in upon leaving office. Many of those state deals delivered returns that fell short of projections. Roughly 20 percent of that system’s 53 private investment deals during Bush’s governorship went to companies that employed his brother’s Pioneers. Those financial firms, in turn, delivered more than $5 million of campaign cash to George W. Bush, the Republican National Committee and Jeb Bush’s Republican Party of Florida. (Click here to see the full list of Bush Pioneers whose firms received Florida pension investments from Jeb Bush’s administration).
  • Ethics experts say the connection between Bush family donors and Florida pension deals raises questions about whether the investments were properly insulated from political influence. “If not an actual conflict of interest, these examples would provide fodder for apparent conflicts of interest,” said Common Cause Florida’s Peter Butzin. “Those folks who give … expect something in return. And if that something in return is not blatantly sending business their way or resulting in a particular vote, it most certainly is at least providing an opportunity for access, to get the foot in the door, so that they can make the case with that official.” Jeb Bush’s aides did not respond to questions from IBTimes, and Walker declined to comment for this story. Dennis MacKee, an SBA spokesperson, said the agency’s “elected Trustees do not now, nor did they during Governor Bush’s term, participate in the selection of individual investments.” MacKee’s statement conflicts with emails reviewed by IBTimes that show that, as governor, Jeb Bush was deeply involved in the state’s investment decisions, periodically brokering conversations between Florida officials and individual financial firms, including one whose top executive was a longtime Bush family donor.
« First ‹ Previous 341 - 360 of 403 Next › Last »
Showing 20 items per page