Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Experts

Rss Feed Group items tagged

Paul Merrell

These experts still don't buy the FBI claim that North Korea hacked Sony - LA Times - 0 views

  • resident Obama has done his best to tamp down fury at North Korea for hacking Sony--"I don't think it was an act of war," he said Sunday on CNN, but "cybervandalism"--but to find true skepticism about North Korea's role in the attack, you have to turn to the professional hacking and anti-hacking community.
  • Many hackers, anti-hackers and cybersecurity experts still don't share the FBI's conclusion that "the North Korean government is responsible for these actions," as the agency declared last week. They've picked apart the FBI's evidence, which was set forth in a public memo Friday and a much more detailed alert circulated to corporation security departments early in December, and found it wanting. 
  • As we explained earlier, that's important for two main reasons: You don't want to stoke anger at a government that may be either innocent or peripherally involved (North Korea has denied responsibility for the Sony attack), and you don't want the real perpetrators to evade the law-enforcement net.Let's take a look at what the experts are saying.
Paul Merrell

Blair and Bush went to war in Iraq despite South Africa's WMD assurances, book states |... - 0 views

  • Tony Blair went to war in Iraq despite a report by South African experts with unique knowledge of the country that showed it did not possess weapons of mass destruction, according to a book published on Sunday.
  • God, Spies and Lies, by South African journalist John Matisonn, describes how then president Thabo Mbeki tried in vain to convince both Blair and President George W Bush that toppling Saddam Hussein in 2003 would be a terrible mistake. Mbeki’s predecessor, Nelson Mandela, also tried to convince the American leader, but was left fuming that “President Bush doesn’t know how to think”. The claim was this week supported by Mbeki’s office, which confirmed that he pleaded with both leaders to heed the WMD experts and even offered to become their intermediary with Saddam in a bid to maintain peace. South Africa had a special insight into Iraq’s potential for WMD because the apartheid government’s own biological, chemical and nuclear weapons programme in the 1980s led the countries to collaborate. The programme was abandoned after the end of white minority rule in 1994 but the expert team, known as Project Coast, was put back together by Mbeki to investigate the US and UK assertion that Saddam had WMD – the central premise for mounting an invasion.
  • Mbeki, who enjoyed positive relations with both Blair and Saddam, asked for the team to be granted access. “Saddam agreed, and gave the South African team the freedom to roam unfettered throughout Iraq,” writes Matisonn, who says he drew on sources in Whitehall and the South African cabinet. “They had access to UN intelligence on possible WMD sites. The US, UK and UN were kept informed of the mission and its progress.” The experts put their prior knowledge of the facilities to good use, Matisonn writes. “They already knew the terrain, because they had travelled there as welcome guests of Saddam when both countries were building WMD.” On their return, they reported that there were no WMDs in Iraq. “They knew where the sites in Iraq had been, and what they needed to look like. But there were now none in Iraq.”
  • ...1 more annotation...
  • In January 2003, Mbeki, who succeeded Mandela as president, sent a team to Washington to explain the findings, but with little success. Mbeki himself then met Blair for three hours at Chequers on 1 February, the book relates. He warned that the wholesale removal of Saddam’s Ba’ath party could lead to a national resistance to the occupying coalition forces. But with huge military deployments already under way, Blair’s mind was clearly made up. When Frank Chikane, director-general in the president’s office, realised that the South Africans would be ignored, it was “one of the greatest shocks of my life”, he later wrote in a memoir. Matisonn adds: “Mandela, now retired, had tried as well. On Iraq, if not other issues, Mandela and Mbeki were on the same page. Mandela phoned the White House and asked for Bush. Bush fobbed him off to [Condoleezza] Rice. Undeterred, Mandela called former President Bush Sr, and Bush Sr called his son the president to advise him to take Mandela’s call. Mandela had no impact. He was so incensed he gave an uncomfortable comment to the cameras: ‘President Bush doesn’t know how to think,’ he said with visible anger.”
  •  
    'President Bush doesn't know how to think,' 
Paul Merrell

Turkey finds sarin gas in homes of suspected Syrian Islamists - reports - RT News - 0 views

  • Turkish security forces found a 2kg cylinder with sarin gas after searching the homes of Syrian militants from the Al-Qaeda linked Al-Nusra Front who were previously detained, Turkish media reports. The gas was reportedly going to be used in a bomb.
  • In March, the Syrian government invited the United Nations to investigate possible chemical weapons use in the Khan al-Assal area of rural Aleppo. Military experts and officials said a chemical agent, most likely sarin, was used in the attack which killed 26 people, including government forces. Damascus claimed Al-Qaeda linked fighters were behind the attack, further alleging Turkey had a hand in the incident. “The rocket came from a placed controlled by the terrorist and which is located close to the Turkish territory. One can assume that the weapon came from Turkey,” Zoabi said in an interview with Interfax news agency.
  • US President Barack Obama has warned any confirmed use of chemical weapons by Damascus would cross a "red line" which would prompt further action. Both Washington and London claimed there was growing evidence that such chemical agents had been used. Less clear perhaps is whether a similar red line would apply to Syrian opposition groups such as Al-Nusra by the US and NATO allies.
  • ...2 more annotations...
  • This case being similar to an earlier one, with the findings of UN chemical weapons expert Carla Del Ponte  - who had found evidence of their use by the rebels – some think the fallout will be what it was then as well. Journalist and RT contributor, Afshin Rattansi believes that the same fate will befall this story, as far as media coverage goes. All possible doubts will either be hushed or directed elsewhere, as they were toward Del Ponte’s findings. “Carla Del Ponte – one of the greatest experts on this from the United Nations – did do an in-depth investigation only a few weeks ago, and of course, the mainstream media tried their best to ignore it and to character-assassinate Del Ponte… she did masses of work on this, and [found] It was the rebels and not the government.”
  • A day before the Reyhanlı bombing, Erdogan released a statement claiming he had evidence the Syrian government had had used chemical weapons, crossing the red line set by President Obama.The accusation contradicted a statement made at the time by a leading UN investigator.Carla Del Ponte, who heads The Independent International Commission of Inquiry on Syria, said there were “concrete suspicions but not yet incontrovertible proof of the use of sarin gas” in Syria. "This was use on the part of the opposition, the rebels, not by the government authorities," Del Ponte continued.
Paul Merrell

Web's Reach Binds N.S.A. and Silicon Valley Leaders - NYTimes.com - 0 views

  • When Max Kelly, the chief security officer for Facebook, left the social media company in 2010, he did not go to Google, Twitter or a similar Silicon Valley concern. Instead the man who was responsible for protecting the personal information of Facebook’s more than one billion users from outside attacks went to work for another giant institution that manages and analyzes large pools of data: the National Security Agency. Mr. Kelly’s move to the spy agency, which has not previously been reported, underscores the increasingly deep connections between Silicon Valley and the agency and the degree to which they are now in the same business. Both hunt for ways to collect, analyze and exploit large pools of data about millions of Americans. The only difference is that the N.S.A. does it for intelligence, and Silicon Valley does it to make money.
  • Yet technology experts and former intelligence officials say the convergence between Silicon Valley and the N.S.A. and the rise of data mining — both as an industry and as a crucial intelligence tool — have created a more complex reality. Silicon Valley has what the spy agency wants: vast amounts of private data and the most sophisticated software available to analyze it. The agency in turn is one of Silicon Valley’s largest customers for what is known as data analytics, one of the valley’s fastest-growing markets. To get their hands on the latest software technology to manipulate and take advantage of large volumes of data, United States intelligence agencies invest in Silicon Valley start-ups, award classified contracts and recruit technology experts like Mr. Kelly. “We are all in these Big Data business models,” said Ray Wang, a technology analyst and chief executive of Constellation Research, based in San Francisco. “There are a lot of connections now because the data scientists and the folks who are building these systems have a lot of common interests.” Although Silicon Valley has sold equipment to the N.S.A. and other intelligence agencies for a generation, the interests of the two began to converge in new ways in the last few years as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data — at the same time that the value of the data for use in consumer marketing began to rise. “These worlds overlap,” said Philipp S. Krüger, chief executive of Explorist, an Internet start-up in New York. The sums the N.S.A. spends in Silicon Valley are classified, as is the agency’s total budget, which independent analysts say is $8 billion to $10 billion a year.
  • Despite the companies’ assertions that they cooperate with the agency only when legally compelled, current and former industry officials say the companies sometimes secretly put together teams of in-house experts to find ways to cooperate more completely with the N.S.A. and to make their customers’ information more accessible to the agency. The companies do so, the officials say, because they want to control the process themselves. They are also under subtle but powerful pressure from the N.S.A. to make access easier.
  • ...1 more annotation...
  • Skype, the Internet-based calling service, began its own secret program, Project Chess, to explore the legal and technical issues in making Skype calls readily available to intelligence agencies and law enforcement officials, according to people briefed on the program who asked not to be named to avoid trouble with the intelligence agencies. Project Chess, which has never been previously disclosed, was small, limited to fewer than a dozen people inside Skype, and was developed as the company had sometimes contentious talks with the government over legal issues, said one of the people briefed on the project. The project began about five years ago, before most of the company was sold by its parent, eBay, to outside investors in 2009. Microsoft acquired Skype in an $8.5 billion deal that was completed in October 2011. A Skype executive denied last year in a blog post that recent changes in the way Skype operated were made at the behest of Microsoft to make snooping easier for law enforcement. It appears, however, that Skype figured out how to cooperate with the intelligence community before Microsoft took over the company, according to documents leaked by Edward J. Snowden, a former contractor for the N.S.A. One of the documents about the Prism program made public by Mr. Snowden says Skype joined Prism on Feb. 6, 2011. Microsoft executives are no longer willing to affirm statements, made by Skype several years ago, that Skype calls could not be wiretapped. Frank X. Shaw, a Microsoft spokesman, declined to comment.
Paul Merrell

Saudi Press Just Accuses US Govt Of Carrying Out 9/11 Attacks - 0 views

  • In response to the U.S. Senate’s unanimous vote to allow 9/11 victims’ families to sue Saudi Arabia in federal court, a report published in the London-based Al-Hayat daily, by Saudi legal expert Katib al-Shammari, claims that the U.S. masterminded the terror attacks as a means of creating a nebulous “enemy” in order garner public support for a global war on terror. The report by al-Shammari, translated by the Middle East Media Research Institute (MEMRI), claims that long-standing American policy is “built upon the principle of advance planning and future probabilities,” which the U.S. has now turned toward the Saudi regime after being successfully employed against first the Taliban and al-Qaeda, then Saddam Hussein and his secular Baathist controlled Iraq. Al-Shammari claims the recent U.S. threats to “expose” documents implicating the Saudi government are simply the continuation of a U.S. policy, which he refers to as “victory by means of archive.” He highlights that during the initial invasion of Iraq, under George H.W. Bush, Saddam Hussein was left alive and in power to be used as “a bargaining chip,” but upon deciding that he was “no longer an ace up their sleeve” Washington moved to topple his government and install a U.S.-backed ruling party.
  • The terrorist attacks of 9/11 are now the “ace up the sleeve” of the U.S. government, according to al-Shammari. “September 11 is one of winning cards in the American archives, because all the wise people in the world who are experts on American policy and who analyze the images and the videos [of 9/11] agree unanimously that what happened in the [Twin] Towers was a purely American action, planned and carried out within the U.S. Proof of this is the sequence of continuous explosions that dramatically ripped through both buildings… Expert structural engineers demolished them with explosives, while the planes crashing [into them] only gave the green light for the detonation – they were not the reason for the collapse. But the U.S. still spreads blame in all directions. [This policy] can be dubbed ‘victory by means of archives.” The impetus behind the attacks, writes al-Shammari, was to create “an obscure enemy – terrorism – which became what American presidents blamed for all their mistakes” and that would provide justification for any “dirty operation” in any nation. According to al-Shammari’s report in Al-Hayat: “On September 11, the U.S. attained several victories at the same time, that [even] the hawks [who were at that time] in the White House could not have imagined. Some of them can be enumerated as follows:
  • 1. The U.S. created, in public opinion, an obscure enemy – terrorism – which became what American presidents blamed for all their mistakes, and also became the sole motivation for any dirty operation that American politicians and military figures desire to carry out in any country. [The] terrorism [label] was applied to Muslims, and specifically to Saudi Arabia. 2. Utilizing this incident [9/11], the U.S. launched a new age of global armament. Everyone wanted to acquire all kinds of weapons to defend themselves and at the same time battle the obscure enemy, terrorism – [even though] up to this very moment we do not know the essence of this terrorism of which the U.S. speaks, except [to say that] that it is Islamic… 3. The U.S. made the American people choose from two bad options: either live peacefully [but] remain exposed to the danger of death [by terrorism] at any moment, or starve in safety, because [the country’s budget will be spent on sending] the Marines even as far as Mars to defend you.” The Saudi press has been in a frenzy since the unanimous Senate vote to allow for the House of Saud to be held liable in U.S. federal court for the 9/11 attacks, with the U.S. being accused of being in alliance with Iran – to press warnings that passage of the “Satanic” bill would “open the gates of hell,” as reported by Breitbart.
  • ...1 more annotation...
  • Al-Shammari makes extremely clear that he views the problem as the U.S. imperial machine itself, stating, “the nature of the U.S. is that it cannot exist without an enemy.” The nature of the U.S. is that it cannot exist without an enemy… [For example,] after a period during which it did not fight anyone [i.e. following World War II], the U.S. created a new kind of war – the Cold War… Then, when the Soviet era ended, after we Muslims helped the religions and fought Communism on their [the Americans’] behalf, they began to see Muslims as their new enemy! The U.S. saw a need for creating a new enemy – and planned, organized, and carried this out [i.e. blamed Muslims for terrorism]. This will never end until it [the U.S.] accomplishes the goals it has set for itself. While it seems fighting Islamic terrorism is great for increasing fear and State propaganda meant to elicit compliant civilian populations that passively accept loss of liberty for promises of greater security, the military-industrial complex needs a bigger enemy to justify their $600 billion dollar-a-year budgets, thus beginning the transition to labeling Russia/China as “aggressive Russia/China,” in an effort to begin to pivot away from one bogeyman to other, more profitable, ones.
  •  
    Has the ring of plausability to it although it seems to ignore the Israeli role. 
Paul Merrell

Killing of Hamas-linked drone expert in Tunisia draws public anger | Middle East Eye - 0 views

  • The assassination of a Tunisian aviation engineer outside his home near Sfax on 15 December has drawn fierce condemnation from the public and rekindled old tensions with the state of Israel, which many suspect of being behind the attack.Thousands gathered in Sfax on 24 December to protest the man’s killing and what some considered to be a tepid response from their government.Mohamed Zouari, a 49-year-old Tunisian drone expert who is reported to have pioneered Hamas's drone programme, was gunned down earlier this month in an ambush plot that involved "foreign elements," Tunisian authorities have confirmed.Hamas’s military wing, the Qassam Brigades, acknowledged Zouari as a "Qassam leader" and accused Israel of perpetrating the attack in a statement shortly after his death.The Tunisian government, which did not release an official statement until days later, has received a barrage of criticism over their handling of the case. Many questioned how a foreign network could have infiltrated the country and carried out such a plot, and expressed frustration that officials did not issue a more stern and direct rebuke.
  • Finding themselves under scrutiny, Tunisian security officials scoured the scene of the crime, finding evidence of rental cars, handguns and silencers, and arrested eight Tunisian suspects in connection with the attack. At least two foreigners, thought to be the authors of the plot, are still behind sought, security sources said.Tunisian Minister of the Interior Hedi Mejdoub has rebuffed calls to resign in the wake of the incident, including by former Tunisian president Moncef Marzouki."The state must fully assume its responsibility in this matter," Marzouki said. 
  • Zouari, whose background as a Hamas operative is only beginning to emerge, was a key figure in the organisation's drone programme and had reportedly developed an unmanned naval submarine with military capabilities.
Gary Edwards

Arnold Ahlert: Russia Would Love a Third Obama Term - The Patriot Post - 0 views

  • New York Post columnist John Crudele obliterates the despicable word-parsing. “Clinton was so careless when using her BlackBerry that the Russians stole her password,” he writes. “All Russian President Vladimir Putin’s gang had to do was log into Clinton’s account and read whatever they wanted.” When it comes to the DNC hack, “The Russians did it” is the theme-du-jour. Clinton campaign manager, Robby Mook stated Sunday that “experts are telling us that Russian state actors broke into the DNC, stole these emails, [and are] releasing these emails for the purpose of helping Donald Trump.” The campaign itself echoed that assertion. “This is further evidence the Russian government is trying to influence the outcome of the election.”
  • The reliably leftist Politico — so far left that reporter Ken Vogel remains employed there despite sending a story to the DNC before he sent it to his own editor — is quite comfortable advancing that agenda, using it as a vehicle to buff up Clinton’s tenure as secretary of state. “Former U.S. officials who worked on Russia policy with Clinton say that Putin was personally stung by Clinton’s December 2011 condemnation of Russia’s parliamentary elections, and had his anger communicated directly to President Barack Obama,” Politico reports. “They say Putin and his advisers are also keenly aware that, even as she executed Obama’s ‘reset’ policy with Russia, Clinton took a harder line toward Moscow than others in the administration. And they say Putin sees Clinton as a forceful proponent of ‘regime change’ policies that the Russian leader considers a grave threat to his own survival.” Yet even Politico is forced to admit the payback angle is “speculation,” and that some experts remain “unconvinced that Putin’s government engineered the DNC email hack or that it was meant to influence the election in Trump’s favor as opposed to embarrassing DNC officials for any number of reasons.”
  • Americans would also be wise to remain highly skeptical of this claim for any number of reasons. WikiLeaks founder Julian Assange asserts there is “there is no proof whatsoever” Russia is behind the hack and that “this is a diversion that’s being pushed by the Hillary Clinton campaign.” To be fair, Assange is a Russian sympathizer, and leftists aren’t the only ones attributing the hack to the Russians. The same FBI that gave Clinton a pass will be investigating the DNC hack, and at some point the bureau will reach a conclusion. In the meantime, it might be worth considering that this smacks of a carefully orchestrated disinformation campaign similar to the one Clinton and several other Obama administration officials engineered with regard to Benghazi. While Clinton was never held personally or legally accountable for the deaths of four Americans, it is beyond dispute that she lied unabashedly about a video causing the attack, while sending her daughter a damning email at 11:12 p.m. on Sept. 11, 2012, admitting the administration knew “the attack had nothing to do with the film. It was a planned attack, not a protest.” The theme of this coordinated narrative? Clinton campaign chair John Podesta referred Monday night to “a kind of bromance going on” between Putin and Trump. Clinton campaign manager Robby Mook echoed that assertion, insisting the email dump comes on the heels of “changes to the Republican platform to make it more pro-Russian.”
  • ...3 more annotations...
  • The Leftmedia were equally obliging. “The theory that Moscow orchestrated the leaks to help Trump … is fast gaining currency within the Obama administration because of the timing of the leaks and Trump’s own connections to the Russian government,” reports the Daily Beast. Other Leftmedia examples abound. “Until Friday, that charge, with its eerie suggestion of a Kremlin conspiracy to aid Donald J. Trump, has been only whispered,” shouted the New York Times. “Because the leaks are widely suspected of being the result of a Russian hacking operation, they can be used to reinforce the narrative that Russian President Vladimir Putin is rooting for Trump and that Trump, in turn, would be too accommodating to Moscow,” adds the Los Angeles Times. “Why would Russian President Vladimir Putin want to help Donald Trump win the White House?” asks NPR. “If you want to indulge in a bit of conspiracy theory, remember that Russian President Vladimir Putin has praised candidate Trump as recently as June,” states the Burlington Free Press.
  • Ultimately, here’s the question: If the Russians could access the DNC server, they could certainly access Clinton’s unsecure server. And if they could access Clinton’s server, including the 33,000 emails she deleted (maybe some were about how the Clintons profited from selling American uranium to Russia), ask yourself who they’d rather have in the Oval Office: Donald Trump, who professed admiration for Putin but remains a highly unpredictable individual — or Hillary Clinton, who could be subjected to blackmail for as long as eight years? Russia’s clear objective would be to have the weakest American leadership they can get. Blackmail aside, what would be weaker than an extension of Obama’s presidency?
  • Moreover, it is just as likely a number of the so-called “experts” as well as Clinton’s useful idiot media apparatchiks have considered the blackmail possibility and are trying to divert attention from it with a phony Trump connection story. Democrats can theorize, complain and blame to their hearts' content, but none of it obscures the reality that the DNC — and by extension Hillary Clinton and the entire Democrat Party — are a conglomeration of morally bereft, utterly incompetent individuals wholly ill-equipped to handle internal security, much less national security. And they are aided and abetted by an equally corrupt media, more than willing to abide that potentially catastrophic reality as long as it gets a Democrat in the Oval Office. WikiLeaks has promised additional dumps with be forthcoming. How much deeper Democrats sink is anyone’s guess.
  •  
    "If one lives by the vulnerable server, one dies by the vulnerable server. As the week unfolds, America is witnessing the ultimate unmasking of the Democrat Party, an entity whose self-aggrandizing claims of unity, fairness and intellectual honesty have been revealed as utterly fraudulent by a flood of DNC emails released by WikiLeaks. Moreover, a stunning level of hypocrisy attends the entire exposure, as DNC Chairwoman Debbie Wasserman Schultz is sent packing for this breach of confidential party information, while Hillary Clinton, whose equally accessible private server contained far more critical top-secret information, officially became the party's standard-bearer. But not to worry, assured FBI Director James Comey, who insisted there was no direct evidence that Clinton's server had been hacked by hostile actors - before adding it was possible that hostile actors "gained access" to Clinton's accounts. Clinton was equally adept at making semantical distinctions. "If you go by the evidence, there is no evidence that the system was breached or hacked successfully," Clinton said. "And I think that what's important here is follow the evidence. And there is no evidence. And that can't be said about a lot of other systems, including government systems.""
Paul Merrell

Scientists Challenge EPA On Claim That Fracking Doesn't Contaminate Water - 0 views

  • An independent board of scientists said Thursday the Environmental Protection Agency should clarify why it said in a landmark draft report on fracking that there is a lack of evidence of widespread impacts on water. In a much-awaited report submitted to EPA Administrator Gina McCarthy, the agency’s independent Science Advisory Board (SAB) said it was concerned about the clarity and adequacy to support “several major findings” found in a draft assessment report on fracking the EPA first published last year.
  • “The EPA did not support quantitatively its conclusion about lack of evidence for widespread, systemic impacts of hydraulic fracturing on drinking water resources, and did not clearly describe the system(s) of interest (e.g., groundwater, surface water), the scale of impacts (i.e., local or regional), nor the definitions of “systemic” and “widespread,” the report reads. The SAB report is a blow to the oil and gas industry which had backed the EPA’s draft conclusions ever since the preliminary report included the landmark statement that emboldened the industry’s position that fracking is safe. It comes just weeks after thousands of environmentalists marched ahead of the Democratic National Convention, calling for a nationwide ban on fracking. The EPA developed the draft assessment report on fracking in response to a request in 2009 from Congress, which urged the EPA to review the relationship between hydraulic fracturing and drinking water. Experts havetold ThinkProgress in the past that the study process could be the preamble to a federal fracking rule, given that the embattled Mercury Air Toxics Standard — commonly referred to as MATS — started in a similar fashion. The SAB, comprised of 30 experts, also recommended the EPA discuss “significant data limitations and uncertainties” when presenting major findings on the fracking report, a document that condenses available scientific literature and data on the potential impacts of fracturing. It furthermore said the EPA should compile toxicological information on the chemicals employed in fracturing in “a more inclusive manner,” and recognize the many stresses fracking has on surface or groundwater resources.
  • Environmental groups quickly applauded the SAB review and said they would push for the EPA to adopt the recommendations that the agency could theoretically dismiss. “By choosing politics over science, the EPA failed the public with its misleading and controversial line, dismissing fracking’s impacts on drinking water and sacrificing public health and welfare along the way,” said Hugh MacMillan, senior researcher at Food & Water Watch. “We are calling on the EPA to act quickly on the recommendations from the EPA SAB and be clear about fracking’s impacts on drinking water resources.” The final EPA report could be published as early as next year.
  •  
    When Richard Nixon created the EPA by executive order, he chose the wrong name: it should be the Environmental Puppydog Agency. Like most federal agencies, EPA was quickly captured by the same interests it is supposed to regulate. It has been in thrall to industry ever since.
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Paul Merrell

Forget Metadata ... The NSA Is Spying On EVERYTHING Washington's Blog - 0 views

  • The NSA’s spying on everyone’s metadata can tell them just about everything about us … and it violates our Constitutional right to freedom of association. But people are getting distracted from the big picture by focusing on metadata. As security expert Bruce Schneier wrote yesterday: What frustrates me about all of this — [the Privacy and Civil Liberties Oversight Board] report, the president’s speech, and so many other things — is that they focus on the bulk collection of cell phone call records. There’s so much more bulk collection going on — phone calls, e-mails, address books, buddy lists, text messages, cell phone location data, financial documents, calendars, [smartphone apps] etc. — and we really need legislation and court opinions on it all. But because cell phone call records were the first disclosure, they’re what gets the attention. Indeed, Schneier confirmed last October what we’ve been saying for years … don’t get too distracted by the details, because the government is spying on everything:
  • Honestly, I think the details matter less and less. We have to assume that the NSA has EVERYONE who uses electronic communications under CONSTANT surveillance. New details about hows and whys will continue to emerge …but the big picture will remain the same. He’s right. As just one example, there is substantial evidence from top NSA and FBI whistleblowers that the government is recording the content of our calls and emails … word-for-word. So what should we make of the government’s denials that it records content? Given that the government has been caught lying about spying again and again, I’m not sure how much weight we should give to such denials. NSA whistleblower Russ Tice notes: They’re collecting content … word-for-word. *** You can’t trust these people. They lie, and they lie a lot.
  •  
    Personally, I don't think the focus is on metadata because it was the first target exposed. I see it more as a propaganda weapon to divert attention from the other NSA targets.  In any event, this page offers a very comprehensive list of the types of data the NSA is collecting, with links to further information on each type.
Paul Merrell

Putin's quiet Latin America play | TheHill - 0 views

  • Away from the conflict in Ukraine, Russian President Vladimir Putin is quietly seeking a foothold in Latin America, military officials warn.To the alarm of lawmakers and Pentagon officials, Putin has begun sending navy ships and long-range bombers to the region for the first time in years.ADVERTISEMENTRussia’s defense minister says the country is planning bases in Cuba, Venezuela, and Nicaragua, and just last week, Putin’s national security team met to discuss increasing military ties in the region.“They’re on the march,” Sen. Joe Donnelly (D-Ind.) said at a Senate hearing earlier this month. “They’re working the scenes where we can’t work. And they’re doing a pretty good job.”
  • Gen. James Kelly, commander of U.S. Southern Command said there has been a “noticeable uptick in Russian power projection and security force personnel” in Latin America.“It has been over three decades since we last saw this type of high-profile Russian military presence,” Kelly said at the March 13 hearing. The U.S. military says it has been forced to cut back on its engagement with military and government officials in Latin America due to budget cuts. Kelly said the U.S. military had to cancel more than 200 effective engagement activities and multi-lateral exercises in Latin America last year.With the American presence waning, officials say rivals such as Russia, China and Iran are quickly filling the void.
  • Iran has opened up 11 additional embassies and 33 cultural centers in Latin America while supporting the "operational presence" of militant group Lebanese Hezbollah in the region.“On the military side, I believe they're establishing, if you will, lily pads for future use if they needed to use them,” Kelly said. China is making a play for Latin America a well, and is now the fastest growing investor in the region, according to experts. Although their activity is mostly economic, they are also increasing military activity through educational exchanges. The Chinese Navy conducted a goodwill visit in Brazil, Chile and Argentina last year and conducted its first-ever naval exercise with the Argentine Navy.
  • ...3 more annotations...
  • “Our relationships, our leadership, and our influence in the Western Hemisphere are paying the price,” Kelly said.Some experts warn against being too alarmist, and say Russia, China and Iran do not have the ability or desire to project military power beyond their borders. Army War College adjunct professor Gabriel Marcella said Russia's maneuvering is more about posturing than a real threat. "Latin America is seen as an opportunity to challenge the United States in terms of global presence," he said. "They want to show the flag to assert their presence and say they need to be counted on the world stage." Other experts said the encroachment of rivals has huge economic implications for the U.S., which has more trade partners in Latin America than in any other region in the world. 
  • “[Russia’s presence] serves to destabilize what has become a more stabilized, middle class continent with an increasing respect for the rule of law. ... Any type of unsettling of that environment will scare off investors,” said Jason Marczak, deputy director at the Atlantic Council’s Adrienne Arsht Latin America Center.“Market economies and democracies are fundamental for trade, for jobs, and for stable investment environments," he said. Marczak noted the instability in Venezuela, which is facing civil unrest from anti-government protestors.“In Venezuela, a lot of the money that’s been able to prop up President Chavez and now Maduro has been Chinese money,” Kelly said. 
  • And while Chinese investment in Latin America could have positive aspects for the region, it could also make it more difficult for U.S. official to push labor and environmental safeguards that it argues are building blocks for democracy, Marczak said.  Angel Rabasa, a senior political scientist at RAND, said cuts to the defense budget are going to accelerate a long trend of U.S. neglect and disengagement with Latin America. According to Sen. Tim Kaine (D-Va.), there are 10 countries in Latin America that currently have no U.S. ambassador because they either haven’t been nominated yet or confirmed, a sign that the region is seen as a low priority.“We will be losing the ability to influence developments in a region that is very important to us because of proximity,” Rabasa said. 
  •  
    While Obama shifts to the East and tries to encircle Russia with NATO missile batteries, Putin shifts to the Southwest, surrounding the U.S. with missile batteries. One gets the sniff that the BRICS nations are setting up a military defense.   
Gary Edwards

Larry Summers and the Secret "Bankster End Game" Memo : http://goo.gl/wDhDhL - 1 views

  •  
    Diigo is screwing up the URL AGAIN!!!!! WTF!!! The correct title is "Larry Summers and the Secret "End-Game" Memo :: http://goo.gl/wDhDhL From the marbux treasure trove of truth we have financial expert Greg Palast describing how the Banksters engineered the 2008 World Financial Collapse. Greg names names, sighting an important 1997 memo signed by then Deputy Treasury Secretary, Larry Summers. The memo describes the Banksters "end game", and authorizes pulling the trigger on a process of forcing the world's financial institutions to accept the game of derivative roulette where high risk financial schemes and casino bets had to be accepted as "financial assets". Good story and as from everything I know, the absolute truth. Read it carefully because these same Banksters control the Obama Administration and seek to continue the great shakedown. One item of note is the recent resignation of Larry Summers as Obama nominee to head the Federal Reserve Bankster Cartel. Summers is one of the architects of the 2008 financial collapse, but is seen be Wall Street as hesitant to continue with the current Bernake flooding of the money markets with $85 Billion per month in freshly minted paper. Even the hint of rolling back the Bankster bailout a bit is enough to do in Summers. alternative Fed Banster Czar Janette Yellin promises to up the $85 Billion monthly bailout, and Wall Street celebrated with a near doubling of trades. We're so screwed! We started the "Socialism and the End of the American Dream" Diigo group in September of 2008 as an effort to understand the financial collapse. In this short article, Greg Palast summarizes the story and places the important facts on the table for all to see. Pray with me for his health and safety. excerpt: "The year was 1997.  US Treasury Secretary Robert Rubin was pushing hard to de-regulate banks.  That required, first, repeal of the Glass-Steagall Act to dismantle the barrier between commercial ba
  •  
    Related link: Summers Withdraws From Consideration for Fed Chairmanship, http://www.bloomberg.com/news/2013-09-15/obama-said-he-accepted-summers-decision-to-withdraw-his-name.html
  •  
    From the marbux treasure trove of truth we have financial expert Greg Palast describing how the Banksters engineered the 2008 World Financial Collapse. Greg names names, sighting an important 1997 memo signed by then Deputy Treasury Secretary, Larry Summers. The memo describes the Banksters "end game", and authorizes pulling the trigger on a process of forcing the world's financial institutions to accept the game of derivative roulette where high risk financial schemes and casino bets had to be accepted as "financial assets". Good story and as from everything I know, the absolute truth. Read it carefully because these same Banksters control the Obama Administration and seek to continue the great shakedown. One item of note is the recent resignation of Larry Summers as Obama nominee to head the Federal Reserve Bankster Cartel. Summers is one of the architects of the 2008 financial collapse, but is seen be Wall Street as hesitant to continue with the current Bernake flooding of the money markets with $85 Billion per month in freshly minted paper. Even the hint of rolling back the Bankster bailout a bit is enough to do in Summers. alternative Fed Banster Czar Janette Yellin promises to up the $85 Billion monthly bailout, and Wall Street celebrated with a near doubling of trades. We're so screwed! We started the "Socialism and the End of the American Dream" Diigo group in September of 2008 as an effort to understand the financial collapse. In this short article, Greg Palast summarizes the story and places the important facts on the table for all to see. Pray with me for his health and safety. excerpt: "The year was 1997.  US Treasury Secretary Robert Rubin was pushing hard to de-regulate banks.  That required, first, repeal of the Glass-Steagall Act to dismantle the barrier between commercial banks and investment banks.  It was like replacing bank vaults with roulette wheels. Second, the banks wanted the right to play a new high-risk game:  "d
Paul Merrell

Nunn-Lugar Revisited - 0 views

  • Washington, DC, November 22, 2013 – The final shipment of highly enriched uranium from former Soviet nuclear warheads to the U.S. on November 14, and President Obama's award of the Presidential Medal of Freedom to former Senator Richard Lugar on November 20, have brought new public attention to the underappreciated success story of the Nunn-Lugar initiative — the subject of a new research project by the National Security Archive, which organized the first "critical oral history" gathering this fall of U.S. and Russian veterans of Nunn-Lugar. The former Soviet Union in the 1990s achieved an unprecedented "proliferation in reverse" with the denuclearization of former republics and the consolidation of nuclear weapons and fissile material inside Russia. Notwithstanding the well-grounded fears of policymakers on both sides of the waning Cold War in 1990-1991, the dissolution of the Soviet Union did not result in a nuclear Yugoslavia spread over eleven time zones. Instead, the "doomsday clock" of the Bulletin of the Atomic Scientists marched backwards, in its largest leaps ever away from midnight. Key to this extraordinary accomplishment was the U.S.-Russian Cooperative Threat Reduction Program, colloquially known as Nunn-Lugar after its two leading sponsors in the U.S. Senate, Sam Nunn of Georgia and Richard Lugar of Indiana.
  • Unfortunately, this success did not get major publicity at the time, and remains largely unknown today outside the expert communities in both countries. This lack of appreciation culminated in 2012 with Russia's withdrawal from the program and assertion of independence from foreign aid. Yet below the radar the cooperation continued, for example with the February 2013 U.S.-Russian removal of enriched uranium from the Czech Republic, and the September 2013 agreement to work together to destroy Syrian chemical weapons — clear signals of the continuing relevance of the two-decade-long Nunn-Lugar experiment.
  • One week earlier, on November 14, the Washington Post reported from St. Petersburg, Russia: "Take a canister, fill it with down-blended uranium worth $2.5 million, secure it and 39 others to the deck of a container ship, send it off toward Baltimore, and you've just about completed a deal that provided commercial uses in the United States for the remains of 20,000 dismantled Russian nuclear bombs." The story, headlined "U.S.-Russia uranium deal sends its last shipment," by Will Englund, reported: "The program provided jobs to nuclear technicians at a time when Russia was in chaos; it sparked the development of a dilution process than enables bombs to become fuel for power plants; and it may have helped to keep poorly secured nuclear materials out of the wrong hands — at least that's what Americans say. Russians strongly deny that the materials were not secured."
  • ...2 more annotations...
  • To ground the Musgrove discussions in the primary sources, Archive staff prepared a 450-page conference briefing book containing 70 key documents, primarily on the early Nunn-Lugar years from 1991 through 1997, but also including the March 2013 summary of Nunn-Lugar success that is featured on The Lugar Center website. The documents range from telcons of President George H. W. Bush's conversations with then-Soviet leader Mikhail Gorbachev about safe dismantling of nuclear warheads in 1991, to the memcons of the Bush meetings with Russian President Boris Yeltsin in 1992 on nuclear weapons withdrawal from the former Soviet republics, to the State Department cables about negotiations with Ukraine over the Soviet-era nuclear weapons located there. Sources of the documents range from Freedom of Information Act requests to the Bush Presidential Library, to donations by veterans such as Ambassador James Goodby and experts such as David Hoffman, to files at the Archives of the Russian Federation in Moscow and at the Hoover Institution at Stanford.
  • Today's posting is the first in the Nunn-Lugar series of electronic briefing books in Russian and English that will make widely available the documents from all sides. The transcripts of the "critical oral history" conferences organized by the Archive will provide the foundation for one or more books analyzing the Nunn-Lugar experience, and will guide further research both by the Archive staff and by the conference participants. Maintaining this expert dialogue about the cooperative threat reduction experience will also make a significant contribution to the ongoing challenge of U.S.-Russia engagement.
  •  
    Nice graphic image on the linked web page breaking down accomplishments in  nuclear disarmament by former Soviet republics. The downside: all of those former Soviet warheads had their uranium diluted and exported to the U.S. for manufacturer of nuclear fuel rods, which means that the U.S. nuclear power industry was perpetuated and our legacy of radioactive wastes continues to grow, despite not even yet having a safe disposal site or method. All of those expended nuclear fuel rods still sitting on reactor sites around the nation, being water cooled, and posing the risk of Fukushima-like disasters. This is progress?  
Paul Merrell

Conflicts of interest in the Syria debate | Public Accountability Initiative - 1 views

  • During the public debate around the question of whether to attack Syria, Stephen Hadley, former national security adviser to George W. Bush, made a series of high-profile media appearances. Hadley argued strenuously for military intervention in appearances on CNN, MSNBC, Fox News, and Bloomberg TV, and authored a Washington Post op-ed headlined “To stop Iran, Obama must enforce red lines with Assad.” In each case, Hadley’s audience was not informed that he serves as a director of Raytheon, the weapons manufacturer that makes the Tomahawk cruise missiles that were widely cited as a weapon of choice in a potential strike against Syria. Hadley earns $128,500 in annual cash compensation from the company and chairs its public affairs committee. He also owns 11,477 shares of Raytheon stock, which traded at all-time highs during the Syria debate ($77.65 on August 23, making Hadley’s share’s worth $891,189). Despite this financial stake, Hadley was presented to his audience as an experienced, independent national security expert.
  • Though Hadley’s undisclosed conflict is particularly egregious, it is not unique. The following report documents the industry ties of Hadley, 21 other media commentators, and seven think tanks that participated in the media debate around Syria. Like Hadley, these individuals and organizations have strong ties to defense contractors and other defense- and foreign policy-focused firms with a vested interest in the Syria debate, but they were presented to their audiences with a veneer of expertise and independence, as former military officials, retired diplomats, and independent think tanks. The report offers a new look at an issue raised by David Barstow’s 2008 Pulitzer Prize-winning New York Times series on the role military analysts played in promoting the Bush Administration’s narrative on Iraq. In addition to exposing coordination with the Pentagon, Barstow found that many cable news analysts had industry ties that were not disclosed on air. If the recent debate around Syria is any guide, media outlets have done very little to address the gaps in disclosure and abuses of the public trust that Barstow exposed. Some analysts have stayed the same, others are new, and the issues and range of opinion are different. But the media continues to present former military and government officials as venerated experts without informing the public of their industry ties – the personal financial interests that may be shaping their opinions of what is in the national interest.
  • This report details these ties, in addition to documenting the industry backing of think tanks that played a prominent role in the Syria debate. It reveals the extent to which the public discourse around Syria was corrupted by the pervasive influence of the defense industry, to the point where many of the so-called experts appearing on American television screens were actually representatives of companies that profit from heightened US military activity abroad. The threat of war with Syria may or may not have passed, but the threat that these conflicts of interest pose to our public discourse – and our democracy – is still very real.
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

Judicial Watch Played Into The Government's Hands -- Americans Are Blinded By Agendas -... - 0 views

  • Disinformation succeeds because so many people and interest groups across the political spectrum find that it serves their agendas as well as the agenda of the government. Consider for example the explanation of 9/11 that blamed Muslim terrorists for the attack. This served the interests of the neoconservatives, the private armaments companies, the US military, the private security companies, government security agencies such as the CIA, the left-wing, the right-wing, the Israel Lobby, and the print and TV media. The official explanation gave the neoconservatives the “new Pearl Harbor” that they needed for their program of invasions of Middle Eastern countries. The private armaments companies could look forward to decades of high profits. Wars always bring the military rapid promotions and higher retirement benefits. Private manufacturers of security equipment and spyware enjoy a rising demand for their products and have grown fat from the products sold to the TSA and NSA. Homeland Security has vastly expanded the federal workforce and administrative positions. The left-wing has proof of “blowback” caused by US interference in the internal affairs of other countries. The right-wing has proof that America has enemies against whom defense at all costs is necessary. The Israel Lobby has the US to overthrow the regimes in the way of Israel’s territorial expansion. The media has the story of the century with which to boost ratings and curry the favor of government.
  • In other words, the government’s story cannot stand the light cast by the facts and independent experts, and the government’s false story must be protected by shutting down the truth-telling experts. The government, Sunstein argued, needs to either gain control over these experts or to shut them down. Just as many different collections of interest groups and people have stakes in the Obama regime’s story of the killing of Osama bin Laden by US Navy SEALS in Abbottabad, Pakistan. This story and its selling by an enthusiastic media guaranteed Obama’s reelection. It served the emotions of super patriots desperate for revenge who wear their gullibility on their sleeves. It served the myth of CIA and NSA prowess. It served the reputation of the killing power of US Special Forces teams. It proved that America won even though it lost the wars in Iraq and Afghanistan. All the trillions of dollars spent were worth it. We got revenge on the guy who did 9/11. No one remembered that the US government, unable to find bin Laden for 10 years, had settled on a different “9/11 mastermind,” Khalid Sheikh Mohammed, and had him water-boarded 183 times until he confessed to being responsible for 9/11. If Khalid Sheikh Mohammed “was responsible for the 9/11 operation from A to Z,” why were SEALS sent, illegally, into Pakistan to murder bin Laden? As the FBI says, there is no evidence that bin Laden is responsible for 9/11. That is why bin Laden was not wanted on that charge by the FBI, as the FBI publicly stated.
  • Judicial Watch has been trying to pry the (nonexistent) photos of a dead bin Laden from the government’s hands. For “national security reasons” the US government does not want anyone to see evidence that supports its far-fetched tale of bin Laden’s murder. The photographic evidence of a successful raid are off limits. They are like the alleged videos of the airliner hitting the Pentagon that we are not permitted to see for “national security reasons.” In other words, the photos and videos do not exist and never did. No government, not even the American one, would be so totally stupid as to withhold the evidence for its claims. The government, seeing its unbelievable stories lose believability at home and abroad used Judicial Watch’s lawsuit to boost the credibility of its story. Judicial Watch filed a Freedom of Information Act lawsuit for the photos that the Obama regime alleged to have of the murdered bin Laden but refused to release. Obviously, the government has no such photos and never had any such photos. But the government does not need evidence when it can rely on the gullibility of the American people.
  • ...3 more annotations...
  • How was bin Laden, who was known in 2001 to be suffering from terminal illnesses, including renal failure, and whose death was widely reported in 2001 still alive ten years later to be murdered by SEALs? What sense does it make that the greatest terrorist leader of our time only had two unarmed women to protect him. What sense does it make that the US would murder the terrorist mastermind with all the plots in his head instead of capturing and questioning him? How can anyone be so gullible as to believe such a nonsense tale as told to them by Obama and the presstitute media? Is America really a nation of utter fools? Like the 9/11 story, the story of bin Laden’s murder is losing credibility with the US population. Pakistani National TV shot Obama’s story down with an eyewitness interview that reported that not one single person, dead body, or any piece of evidence left Abbottadad, because the only helicopter that landed blew up when it attempted to leave and there were no survivors. No other helicopters landed. So there was no dead bin Laden to be buried at sea (there are no known witnesses to the alleged burial) and no photographs of a dead bin Laden.
  • As the government had no photos to release, the US government decided to use the opportunity presented by Judicial Watch to bolster its story that photos of bin Laden murdered and dead were once in its possession. The government released to Judicial Watch a document under the Freedom of Information Act that is an order from Special Operations Commander Admiral William McRaven to “destroy immediately” the photos of the dead bin Laden. Judicial Watch took the bait. Instead of realizing that there was no reason whatsoever for the government to destroy the only evidence that might support its claim to have murdered bin Laden, Judicial Watch focused on the illegality of destroying the evidence. Judicial Watch says that “Federal law contains broad prohibitions against the ‘concealment, removal, or mutilation generally’ of government records.” http://www.globalresearch.ca/top-pentagon-leader-ordered-destruction-of-bin-laden-death-photos/5368389 Judicial Watch played into the government’s hands. Judicial Watch president Tom Fitton was maneuvered by the government into defining the scandal as the destruction of evidence, “revealing both contempt for the rule of law and the American people’s right to know.” To the contrary, the real scandal is the massive lie that bin Laden was killed by a SEAL raid and the acceptance of this lie by the American people and Judicial Watch.
  • By damning the government for destroying evidence, Judicial Watch has given credibility to the government’s claim that SEALs murdered Osama bin Laden. The SEAL team credited with bin Laden’s murder was quickly eliminated when the team was loaded onto a 1960s vintage helicopter in Afghanistan. Apparently the team members were asking one another, “Were you on that mission that killed bin Laden?” Of course, no one was, and this information was too dangerous for the Obama regime.
  •  
    Paul Craig Roberts goes on record as a 9-11 Truther and as a deep sceptic of Obama's claim that Seal Team 6 killed Osama bin Laden in 2011. 
Paul Merrell

Media Blackout over Syria | Global Research - 0 views

  • On April 6, The London Review of Books published in its online journal Seymour Hersh’s “The Red Line and the Rat Line.” Hersh continues to expose details surrounding the staged August 21 chemical attack incident in Syria, which apparently pretty much everyone in Washington’s intelligence bureaucracy suspected was carried out by the rebels as soon as it happened. Seymour Hersh is a Pulitzer Prize winning journalist whose 40+ years career includes the exposing of the My Lai Massacre  and its cover-up, as well as the Abu Ghraib prison scandal. His December 19 report, “Whose Sarin?” -was his first report to expose the Syria chemical attack hoax based on close contact with US Intelligence officials. While “Whose Sarin” was originally prepared for the Washington Post, the newspaper rejected it and a media blackout followed in American press. Currently, Hersh’s newest investigative findings are going unacknowledged in mainstream US media.
  • Hersh’s report confirms the following: Obama’s push for attack on Syria was halted last minute when evidence that the Syrian government had nothing to do with the August 21 chemical attack became too overwhelming It had been well known to US government officials throughout the summer of 2013 that Turkish PM Erdogan was supporting al-Nusra Front in attempts to manufacture Sarin US military knew of Turkish and Saudi program for bulk Sarin production inside Syria from the spring of 2013 UN inspectors knew the rebels were using chemical weapons on the battlefield since the spring of 2013 As a result of the staged chemical incident, the White House ordered readiness for a “monster strike” on Syria, which included “two B-22 air wings and two thousand pound bombs” -and a target list which included military and civilian infrastructure targets (note: most of these are in densely populated civilian areas)
  • Full military strike was set for September 2 UK defense officials relayed to their American counterparts in the lead up to planned attack: “We’re being set up here.” CIA, MI6, Saudi Arabia, Qatar, and Turkey set up a “rat line” back in 2012 to run Libyan weapons into Syria via Turkey, including MANPADS; the Benghazi consulate was headquarters for the operation Obama OK’ed Turkish-Iranian gold export scam (that went from March 2012 to July 2013) which erupted in a Turkish scandal that nearly brought down the Erdogan government US Intelligence community had immediate doubts about Syrian regime responsibility for Aug. 21 attack, yet “reluctant to contradict the president” US government will not expose continued Turkey support of terrorism simply because “they’re a NATO ally”
  • ...2 more annotations...
  • In addition, last Thursday freelance Middle East journalist Sara Elizabeth Williams broke the story of a CIA/US Military run training camp for Syrian rebels in the Jordanian desert. VICE UK ran her story, “I Learned to Fight Like an American at the FSA Training Camp in Jordan,” yet it too failed to make it across the Atlantic into American reporting. International Syria experts thought her story hugely significant, but it got little attention. Top Syria expert in the US, Joshua Landis, announced on his Twitter account Thursday: “Sara Williams gets the scoop on the top secret FSA Training Camp in Jordan.” This courageous young freelancer revealed, with photos, the ins and outs of this secretive facility -yet the mainstream carefully shielded Americans from knowledge of the explosive report. In email conversation with her this weekend, Williams told me: “The access was tough to get, but I think it was worth the effort: to my mind, it’s important that people know what their government is doing in their name, with their tax dollars.” According to her investigative report:
  • Confirmed: “US-run training camp” for Syrian rebels in Northern Jordan Rebel recruits go “off the grid” while in secretive training camp Rebel fighter: “The Americans who taught us wore military uniforms I did not recognize. We called them by their first names and they spoke English to us.” Camp awash with “American food and American dollars”: recruits eat Kentucky Fried Chicken and live in temporary “pre-fabricated housing” units Recruits sent through intense 40 day program, which includes exercise, training in anti-tank missiles, and boot camp style atmosphere with orders given by US military instructors Upon graduation, US trained insurgents slip back across Syria’s southern border Experts say there are more camps like this one American trained rebel insurgent says: “America is benefiting from the destruction and the killing in order to weaken both sides.”
  •  
    It really says something about mainstream media when a story as explosive as Sy Hersh's new report on Obama's decision to postpone and then cancel military strikes on Syria is ignored by mainstream media. Hersh is one of the most respected of American war and intelligence journalists. 
Paul Merrell

Dutch MH17 Investigation Omits US "Intel". Fabrications and Omissions Supportive of US-... - 0 views

  • The absence of America’s so-called “intelligence” regarding the downing of Malaysia Airlines MH17 over Ukraine in a 34 page Dutch Safety Board preliminary report raises serious questions about the credibility and legitimacy of both America’s political agenda, and all agencies, organizations, and political parties currently behind it. The report titled, “Preliminary Report: Crash involving Malaysia Airlines Boeing 777-200 flight MH17″ (.pdf), cites a wide variety of evidence in its attempt to determine the cause of flight MH17′s crash and to prevent similar accidents or incidents from occurring again in the future. Among this evidence includes the cockpit voice recorder (CVR), the flight data recorder (FDR), analysis of recorded air traffic control (ATC) surveillance data and radio communication, analysis of the meteorological circumstances, forensic examination of the wreckage (if recovered and possible foreign objects if found), results of the pathological investigation, and analysis of the in-flight break up sequence.
  • Satellite images are referenced in regards to analyzing the crash site after the disaster, however, no where in the report is mentioned any evidence whatsoever of satellite images of missile launchers, intelligence from the United States regarding missile launches, or any information or evidence at all in any regard suggesting a missile had destroyed MH17. In fact, the report concludes by stating: This report is preliminary. The information must necessarily be regarded as tentative and subject to alternation or correction if additional evidence becomes available. Further work will at least include the following areas of interest to substantiate the factual information regarding:
  • The report specifically mentions information collected from Russia, including air traffic control and radar data – both of which were publicly shared by Russia in the aftermath of the disaster. The report also cites data collected from Ukraine air traffic controllers. The United States however, apart from providing technical information about the aircraft itself considering it was manufactured in the US, provided absolutely no data in any regard according to the report.
  • ...3 more annotations...
  • Had the US actually possessed any credible information to substantiate its claims that MH17 was shot down by a missile, such evidence surely would have been submitted to and included in the Dutch Safety Board’s preliminary reporting. That it is predictably missing confirms what commentators, analysts, and politicians around the world had long since suspected – the West’s premature conclusions regarding MH17′s demise were driven by a political agenda, not a factually based search for the truth. The evidence that MH17 was shot down by a missile as the West insisted is missing because it never existed in the first place. That the Dutch Safety Board possesses such a vast amount of information but is still unable to draw anything but the most tentative conclusions, exposes the alleged certainty of Western pundits and politicians in the hours and days after MH17′s loss as an utterly irresponsible, politically motivated, exploitation of tragedy at best, and at worst, exposing the West – NATO in particular – as possible suspects in a crime they clearly stood the most to benefit from.
  • In the wake of the MH17 tragedy, the West would rush through a series of sanctions against Russia as well as justify further military aid for the regime in Kiev, Ukraine and the literal Neo-Nazi militant battalions serving its pro-Western agenda amid a brutal civil war raging in the country’s eastern most provinces. With sanctions in hand, and the war raging on in earnest, the MH17 disaster dropped entirely out of Western narratives as if it never occurred. Surely if the West had solid evidence implicating eastern Ukrainian rebels and/or Russia, the world would never have heard the end of the MH17 disaster until the truth was fully aired before the public. When Dutch investigators published their preliminary report, the West merely reiterated its original claims, simply imposing their contradictory nature upon the report – most likely believing the public would never actually read its 34 pages. For example, Reuters in a report titled, “Malaysia: Dutch report suggests MH-17 shot down from ground,” would brazenly claim:
  • Malaysia Airlines flight MH17 broke apart over Ukraine due to impact from a large number of fragments, the Dutch Safety Board said on Tuesday, in a report that Malaysia’s prime minister and several experts said suggested it was shot down from the ground. The title of Reuters’ propaganda piece directly contradicts its first paragraph which reveals “experts,” not the actual Dutch Safety Board report, claimed it was “shot down from the ground,” while the report itself says nothing of the sort. The experts cited by Reuters in fact had no association whatsoever with the preliminary report and instead are the same mainstay of cherry picked commentators the West constantly defers to while building up and perpetuating utterly fabricated narratives to advance its agenda globally.
Paul Merrell

Did Iranian Weapons Kill Americans? Another phony argument against a deal with Iran | C... - 0 views

  • There is a new entrant in the already crowded field of Israeli Lobby funded groups opposed to an agreement with Iran over its nuclear program. It is the “wounded warriors” and their families denouncing the perfidious Persians. The first salvo was fired on August 4th in a letter to Rupert Murdoch’s New York Post from the daughter of an Army Lieutenant Colonel killed in Iraq by “Iranian weapons,” who concluded that “we are already at war with Iran.” After the letter ads began to appear in television markets where congressmen considered to be vulnerable to pressure from Israel’s friends were located. The ads were produced by a group called “Veterans Against an Iran Deal,” whose executive director is Michael Pregent, a former adviser to General David Petraeus who is also an “Expert” affiliated with the Washington Institute for Near East Policy (WINEP), an American Israel Public Affairs Committee (AIPAC) spin off. The group has a website which claims that “the Iranian regime murdered and maimed thousands of Americans” but there is no indication who exactly supports it and is providing funding or what kind of following it has. The group’s first ad featured as a spokesman a retired army Staff Sergeant named Robert Bartlett. In the video, Bartlett, whose face bears the scars resulting from being on the receiving end of an improvised explosive device in Iraq, claims he was “blown up by an Iranian bomb.” In addition to blaming Iran for providing Iraqi insurgents with the weapons that were used to maim him and kill his colleagues he also tells how Iranians would “kidnap kids” and kill them in front of their parents. Per Bartlett, those who deal with Iran will have “blood on their hands” and will be responsible for funding Iranian terror.
  • Bartlett’s anger is nevertheless understandable, but his claim that he was maimed by Iranian provided weapons should not go unchallenged. In actual fact, it is a lie. In 2005 the Bush Administration began to claim that Iran had been “interfering” in Iraq. The claim, rarely backed up by an substance, was based on suppositions about Tehran’s likely interests regarding its predominantly Shi’ite neighbor and it was little more than an excuse to explain the persistence and intensity of Iraqi resistance to the American invasion. Sophisticated roadside bombs using shaped charges, initially referred to as Improvised Explosive Devices (IEDs) and subsequently as Explosively Formed Penetrators (EFPs), first appeared in Iraq in the summer of 2004. Initial reports on the weapon in June 2005, stated that it was being used by Sunni insurgents and was likely produced by ordnance experts from the disbanded Iraqi Army. Saddam Hussein’s Iraq had a large army with a sophisticated if limited ability to produce some weapons in its own armories. When the army was foolishly disbanded by the Coalition Provisional Authority, skilled workers who had been employed in the weapons shops were made redundant and took with them the knowledge to make any number of improvised weapons using the materiel that remained in Iraq’s arms storage depots.
  • The indictment of Iran as the source of weapons being used by insurgents continued and intensified as the security situation in Iraq deteriorated. Some media coverage attributed the killing of hundreds of American soldiers to Iranian supplied weapons because any death by EFP was immediately attributed to Iran. In spite of the lack of any solid evidence, the largely neoconservative supporters of pre-emptive action against Iran stated specifically that Iran was “killing American soldiers” through its provision of sophisticated weaponry. A nearly hysterical progress report given to Congress by General David Petraeus and Ambassador Ryan Crocker on April 8, 2008 went even farther, claiming that Iran was responsible for most of the violence occurring in Iraq. But the argument about Iranian involvement in Iraq was itself logically inconsistent, something that Crocker and Petraeus should have understood. The Iraqi insurgency in the period 2004-2006 was largely Sunni and hostile to Iran. That the Iranians would be supplying the Sunnis or that the Sunnis would have sought such aid was implausible.
  •  
    Shia Iran providing IED weapons to Sunni militants in Iraq? Preposterous. The latest Israel lobby false propaganda blast aimed at shooting down the agreement with Iran in Congress.  
Paul Merrell

FBI demands new powers to hack into computers and carry out surveillance | US news | Th... - 0 views

  • The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world. Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violate first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight. The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.
  • “This is a giant step forward for the FBI’s operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move,” said Ahmed Ghappour, an expert in computer law at University of California, Hastings college of the law, who will be addressing next week’s hearing. The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district. But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.
  • Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.
  • ...2 more annotations...
  • Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week’s meeting: “This should not be the first public forum for discussion of an issue of this magnitude.” Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that “this is an investigative technique that we haven’t seen before and we haven’t thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved.” Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.
  • Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that. In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as “a search of foreign property known to contain criminal evidence, for which a warrant was not necessary”.
  •  
    This rule change has been in the works during the last year.  "The change is designed specifically to help federal investigators carry out surveillance on computers that have been "anonymized" - that is, their location has been hidden using tools such as Tor."  Are we dizzy yet? The State Department is pushing the use of TOR by dissidents in nations whose governments State and the CIA intends to overthrow. Meanwhile, Feed Bag, Inc. wants use of TOR to be sufficient grounds for installing malware on anyone using it to make their systems and all their systems can see or hear be an open book. Let's see. There's the First Amendment right to anonymous speech just to begin with. McIntyre v. Ohio Elections Comm'n, 514 US 334 (1995). ("Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation-and their ideas from suppression-at the hand of an intolerant society. The right to remain anonymous may be abused when it shields fraudulent conduct. But political speech by its nature will sometimes have unpalatable consequences, and, in general, our society accords greater weight to the value of free speech than to the dangers of its misuse.") (Internal citation omitted.) And of course there's the Natural Law liberty to whisper, to utter words in a way that none but the intended recipient can hear. So throw on the violation of the Fifth Amendment's Liberty clause. Then there's the plain language of the Fourth Amendment warrant clause, "particularly describing the *place* to be searched." Not to mention the major reason for the Fourth Amendment, to abolish the "general warrant" that had enabled the Crown to search wherever the warrant's executor's little heart desired.  And th
‹ Previous 21 - 40 of 403 Next › Last »
Showing 20 items per page