Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Facebook

Rss Feed Group items tagged

Joseph Skues

How Trade Deals Boost the Top 1% and Bust the Rest | Robert Reich - 0 views

  • Suppose that by enacting a particular law we'd increase the U.S. Gross Domestic Product. But almost all that growth would go to the richest 1 percent. The rest of us could buy some products cheaper than before. But those gains would be offset by losses of jobs and wages.This is pretty much what "free trade" has brought us over the last two decades.I used to believe in trade agreements. That was before the wages of most Americans stagnated and a relative few at the top captured just about all the economic gains.
  • The biggest things big American corporations sell overseas are ideas, designs, franchises, brands, engineering solutions, instructions, and software.Google, Apple, Uber, Facebook, Walmart, McDonalds, Microsoft, and Pfizer, for example, are making huge profits all over the world.But those profits don't depend on American labor -- apart from a tiny group of managers, designers, and researchers in the U.S.
  • According to Economic Policy Institute, the North American Free Trade Act cost U.S. workers almost 700,000 jobs, thereby pushing down American wages.
  • ...7 more annotations...
  • Korea-U.S. Free Trade Agreement, America's trade deficit with Korea has grown more than 80 percent, equivalent to a loss of more than 70,000 additional U.S. jobs.
  • The new-style global corporate agreements mainly enhance corporate and financial profits, and push down wages.
  • Trans Pacific Partnership -- the giant deal among countries responsible for 40 percent of the global economy.
  • also guard their overseas profits.
  • even more patent protection oversea
  • And it would allow them to challenge any nation's health, safety and environmental laws that stand in the way of their profits -- including our own.
  • White House strategists seem to think such corporations are accountable to the U.S. government. Wrong. At most, they're answerable to their shareholders, who demand high share prices whatever that requires.
Paul Merrell

CT Soldier Demands Apology From Karl Rove; Rove Says No Apology Needed For Iraq War - H... - 0 views

  • yan Henowitz says he was 20 years old and a medic with the 2nd Battalion of the 7th Infantry Regiment when he saw his friends “torn apart and Iraqi children screaming for their parents as indiscriminate shrapnel scarred them and us in ways that we will never know,” he told Karl Rove Tuesday at the University of Connecticut in Storrs. “Take responsibility and apologize for your decision in sending a generation to lose their humanity” and “apologize to the millions of fathers and mothers who lost their children on both sides” of the war, Henowitz demanded. WATCH: Karl Rove Calls Sen. Elizabeth Warren 'Pocahontas' Karl Rove calls Sen. Elizabeth Warren “Pocahontas” during an event on UConn's Storrs campus Tuesday evening. Karl Rove calls Sen. Elizabeth Warren “Pocahontas” during an event on UConn's Storrs campus Tuesday evening. See more videos Rove, former deputy chief of staff and senior adviser to President George W. Bush, who was in Storrs at the invitation of UConn College Republicans, thanked Henowitz for his service and said he was sorry for “what you went through,” but said he would not apologize for the war.
  • “It was right to remove Saddam Hussein from power. ... We should be proud of what we were able to do in Iraq and we should be sorry that we left them alone, because when we left them, things deteriorated,” Rove said.
  •  
    Over a million killed in Iraq and that country is in worse turmoil than ever, but Karl Rove is still unrepentant, says that removing Saddam from power was worth it. That war was a highly illegal war of aggression even by the Bush II Administration's own justifications. "Regime change" is not a lawful casus belli. 
Paul Merrell

Britain Used Spy Team to Shape Latin American Public Opinion on Falklands - The Intercept - 0 views

  • Faced with mounting international pressure over the Falkland Islands territorial dispute, the British government enlisted its spy service, including a highly secretive unit known for using “dirty tricks,” to covertly launch offensive cyberoperations to prevent Argentina from taking the islands. A shadowy unit of the British spy agency Government Communications Headquarters (GCHQ) had been preparing a bold, covert plan called “Operation QUITO” since at least 2009. Documents provided to The Intercept by National Security Agency whistleblower Edward Snowden, published in partnership with Argentine news site Todo Notícias, refer to the mission as a “long-running, large scale, pioneering effects operation.” At the heart of this operation was the Joint Threat Research and Intelligence Group, known by the acronym JTRIG, a secretive unit that has been involved in spreading misinformation.
  • The British government, which has continuously administered the Falkland Islands — also known as the Malvinas — since 1833, has rejected Argentine and international calls to open negotiations on territorial sovereignty. Worried that Argentina, emboldened by international opinion, may attempt to retake the islands diplomatically or militarily, JTRIG and other GCHQ divisions were tasked “to support FCO’s [Foreign and Commonwealth Office’s] goals relating to Argentina and the Falkland Islands.” A subsequent document suggests the main FCO goal was to “[prevent] Argentina from taking over the Falkland Islands” and that new offensive cyberoperations were underway in 2011 to further that end. Tensions between the two nations, which fought a war over the small archipelago in the South Atlantic Ocean in 1982, reached a boil in 2010 with the British discovery of large, offshore oil and gas reserves potentially worth billions of dollars.
  • While the full extent of JTRIG’s tactics used in the Falklands mission is unclear, the scope of JTRIG’s approved capabilities offers an idea of what may have been done. The group, first revealed last year by NBC News and The Intercept, has developed various techniques — including “false flag” operations, sexual “honey traps,” and implanting computer viruses — to collect intelligence, plant propaganda and diminish or discredit opponents. As reported in The Intercept last year, JTRIG “has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, ‘amplif[y]’ sanctioned messages on YouTube,” and plant false Facebook wall posts for “entire countries.” According to a study of the group by the U.K.’s Defence Science and Technology Laboratory (DSTL), “the language of JTRIG’s operations is characterized by terms such as ‘discredit,’ promote ‘distrust,’ ‘dissuade,’ ‘deceive,’ ‘disrupt,’ ‘delay,’ ‘deny,’ ‘denigrate/degrade,’ and ‘deter.’” The unit’s activities generally break down into two symbiotic categories: online Human Intelligence, or HUMINT, and “effects operations.” Online HUMINT is the collection of information on human targets through passive tracking or overt interaction with a target through an alias. These operations may sometimes be in support of, or in conjunction with, covert MI-6 agents on the ground.
  • ...2 more annotations...
  • Effects operations are used to disseminate deception and disruption online. A full catalog of JTRIG’s capabilities as of 2012 can be seen here. Operation QUITO, the group’s operation to support the Foreign Office’s “goals relating to Argentina and the Falkland Islands” is called a “pioneering effects operation.” That operation, still in the planning stages, had undergone “a significant amount of prep work” and was “almost complete” as of 2009.
  • GCHQ’s mission regarding the Falkland Islands also appears to extend beyond just Argentina and involve regional leaders and attitudes. A November 2011 workshop on “Mission Driven Access” gathered staff to “build on pioneering work already done” and tried to develop new ideas for real world scenarios. One such scenario: “GCHQ has consistently underperformed on Brazil, with growing concerns that [South] American attitudes on the Falklands are swinging behind Argentina. A forthcoming Ministerial visit to Chile provides an opportunity to counter the trend. The Foreign Office are looking for advice.”
Paul Merrell

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
Paul Merrell

Did Russia just "gently" threaten the USA? | The Vineyard of the Saker - 0 views

  • Interesting stuff today.  A major Russian TV channel just aired a report about Putin meeting with his top military commanders.  I don’t have the time to translate what Putin said word for word, but basically he said that the USA had refused every single Russian offer to negotiate about the US anti-missile system in Europe and that while the US had initially promised that the real target of this system was Iran, now that the Iranian nuclear issue had been solved, the US was still deploying the system.  Putin added that the US was clearly attempting to change the world’s military balance.  And then the Russian footage showed this:
  • According to the Kremlin was mistakenly leaked secret document.  And just to make sure that everybody got it, RT wrote a full article in English about this in an article entitled “‘Assured unacceptable damage’: Russian TV accidentally leaks secret ‘nuclear torpedo’ design“. According to RT The presentation slide titled “Ocean Multipurpose System: Status-6” showed some drawings of a new nuclear submarine weapons system. It is apparently designed to bypass NATO radars and any existing missile defense systems, while also causing heavy damage to “important economic facilities” along the enemy’s coastal regions. The footnote to the slide stated that Status-6 is intended to cause “assured unacceptable damage” to an adversary force. Its detonation “in the area of the enemy coast” would result in “extensive zones of radioactive contamination” that would ensure that the region would not be used for “military, economic, business or other activity” for a “long time.” According to the blurred information provided in the slide, the system represents a massive torpedo, designated as “self-propelled underwater vehicle,” with a range of up to 10 thousand kilometers and capable of operating at a depth of up to 1,000 meters. Actually, such ideas are nothing new.  The late Andrei Sakharov had already proposed a similar idea to basically wipe out the entire US East Coast.  The Russians have also look into the possibility to detonate a nuclear device to set off the “Yellowstone Caldera” and basically destroy most of the USA in one shot.  While in the early years following WWII the Soviets did look into all sort of schemes to threaten the USA with destruction, the subsequent development of Soviet nuclear capabilities made the development of this type of “doomsday weapons” useless.  Personally, I don’t believe for one second that the Russians are now serious about developing such system as it would be literally a waste of resources.  So what is going on here?
  • This so-called “leak” of “secret documents” is, of course, no leak at all.  This is a completely deliberate action.  To imagine that a Russian journalist could, just by mistake, film a secret document (helpfully held up for him by a general) and then just walk away, get it passed his editor and air it is laughable.  Any footage taken in a meeting of the President with his senior generals would be checked many times over.  No, this was a deliberate way to remind the USA that if they really are hell-bent on spending billions of dollars in a futile quest to create some kind of anti-missile system Russia could easily develop a cheap weapon system to still threaten the USA with total annihilation.  Because, make no mistake, the kind of long range torpedo being suggested here would be rather cheap to build using only already existing technologies.  I would even add that rather than setting such a weapon off the US coast the system could also be designed to fire off a secondary missile (ballistic or cruise) which could then fly to any inland target.  Again, such technologies already exist in the Russian military and have even been deployed on a smaller scale. See for yourself:
  • ...1 more annotation...
  • Coming back to the real world, I don’t believe for one second that any type of anti-missile system could be deployed in Europe to shield NATO the EU or the US from a Russian retaliatory strike should the Empire ever decide to attack Russia.  All the East Europeans are doing is painting a cross-hair on themselves as these will be the very first targets to be destroyed in case of a crisis.  How? By use of special forces first and, if needed, by Iskander missile strikes if all else fails.  But the most likely scenario is that key components of the anti-missile system will suddenly experience “inexplicable failures” which will render the entire system useless.  The Russians know that and so do the Americans.  But just to make sure that everybody got the message the Russians have now shown that even a fully functional and survivable US anti-missile system will not protect anybody from a Russian retaliation. The sad thing is that US analysts all fully understand that but they have no say in a fantastically corrupt Pentagon.  The real purpose of the US program is not to protect anybody against a non-existing Russian threat, but to dole out billions of dollars to US corporations and their shareholders.  And if in the process the US destabilizes the entire planet and threatens the Russians – then “to hell with ‘em Russikes!  We are the indispensable nation and f**k the rest of the planet!”  Right? Wrong. What happened today is a gentle reminder of that.
Paul Merrell

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
Paul Merrell

Obama Rejects GOP's Islamophobic Statements « LobeLog - 0 views

  • It didn’t take long for Republican presidential candidates to stake out strikingly anti-Muslim immigration positions following the terrorist attacks in Paris that left at least 129 people dead and over 300 injured. French flags were flown and moments of silence observed across the U.S. and around the world, but Sen. Ted Cruz (R-TX), Sen. Marco (R-FL), Ben Carson, and Donald Trump decided it was an opportunity to stoke anti-immigrant and anti-Muslim fears. The anti-immigrant and Islamophobic comments led President Obama, speaking from the G20 summit in Turkey, to denounce the statements as “shameful.” Cruz claimed that “there is no meaningful risk of Christians committing acts of terror” so the U.S. should focus on admitting displaced Christians, but it was “lunacy” to allow Muslim refugees into the country. Rubio outright rejected accepting any Syrian refugees into the U.S. because “there’s no way to background check” them. Ben Carson said that accepting Syrian refugees into the U.S. would require “a suspension of intellect.” Donald Trump, doubling down on his anti-immigrant campaign platform, warned that Syrian refugees could be “one of the great Trojan horses.” Louisiana Governor Bobby Jindal called for sealing the U.S. border, and Sen. David Vitter (R-LA) started a petition to stop Syrian refugees from entering Louisiana.
  • The comments from Republicans led Obama, speaking to the press at the close of the G-20 Summit today in Antalya, Turkey, to hit back against the growing sentiment on the right to only allow Christian refugees into the country. Obama pointed to the hypocrisy of politicians who “themselves come from families who benefited from protection when they were fleeing political prosecution,” a jab at Rubio and Cruz, both of whom are the children of Cuban immigrants to the U.S. “We don’t have religious tests to our compassion,” said Obama, adding that “while I had a lot of disagreements with President George W. Bush on policy, but I was very proud after 9/11 when he was adamant and clear about the fact that this is not a war on Islam.” Watch Obama’s comments here:
  •  
    Under international law, all nations are required to grant asylum to refugees, regardless of their religion or race. 
Paul Merrell

Marco Rubio wins another neoconservative cash primary - Mondoweiss - 0 views

  •      As we’ve stated, FL Senator Marco Rubio is the neoconservative horse in the Republican race. His original backer Norman Braman says that the US must remain strong militarily so it can support Israel– and Rubio visited Israel for the first time in 2010 with Braman, days after he was elected to the Senate. There’s further evidence that Rubio is bought by pro-Israel forces, and that our press is unwilling to talk openly about the Israel lobby. The New York Times reports that Paul Singer, an “influential billionaire” has thrown his support to Marco Rubio. The piece never uses the word “neoconservative” and only mentions Israel three times in passing, and states that Singer has no litmus tests. But he clearly has a litmus test on ferocious support for Israel. Eli Clifton has documented Singer’s extensive contributions to rightwing pro-Israel groups: It has not only been AIPAC, Rubio, and the American Enterprise Institute… that have enjoyed Singer’s largesse… The Israel Project (TIP), now headed up by AIPAC’s former chief spokesperson Josh Block, has received increasingly large contributions from the billionaire. Singer gave $500,000 to the group in 2007 and $1 million in the 2012 tax year (the year Block took over the group’s leadership and the last year for which there are publicly available tax filings). That makes Singer one of TIP’s two largest donors since Block arrived.
  • Jeb Bush lost the Paul Singer primary in part because of his relationship to Jim Baker, who criticized Israeli settlement growth as an impediment to peace in a speech to J Street.
  • The Times also fails to state that Rubio has promised to reverse the Iran deal on his first day as president.
Paul Merrell

Richard Branson: A.I. will make universal basic income necessary - 0 views

  • Billionaire serial entrepreneur Richard Branson says cash handouts will eventually be required to keep people from becoming homeless in the US. "I think with the coming on of AI and other things there is certainly a danger of income inequality," Branson tells CNN's Christine Romans in a piece published Thursday. The inequality will be caused by "the amount of jobs [artificial intelligence] is going to take away and so on," Branson says. "There is no question" technology will eliminate jobs, he says. Microsoft co-founder Bill Gates echoed this sentiment recently. "AI is just the latest in technologies that allow us to produce a lot more goods and services with less labor," says Gates, speaking with "Hamilton" composer Lin-Manuel Miranda and his wife, Melinda, at Hunter College in New York City earlier in February. "AI will bring us immense new productivity."
  • So new jobs will have to be created, says Branson. But also, a "basic minimum earnings," or a universal basic income, should be instituted "so that there is nobody that is having to sleep on the street," Branson tells CNN. "One hundred percent, I think that is really important." Universal basic income is a cash handout, distributed irrespective of employment status.
  • Billionaire SpaceX and Tesla chief Elon Musk told CNBC in 2016 that he expects cash handouts will be necessary too. "There is a pretty good chance we end up with a universal basic income, or something like that, due to automation," says Musk to CNBC. "Yeah, I am not sure what else one would do. I think that is what would happen." Additionally, Facebook founder and CEO Mark Zuckerberg promoted the idea of universal basic income during his commencement speech to Harvard in May. "Now it's our time to define a new social contract for our generation. We should explore ideas like universal basic income to give everyone a cushion to try new things," says Zuckerberg.
Paul Merrell

WHO ARE SYRIA'S WHITE HELMETS (terrorist linked)? - 0 views

  • The White Helmets have been demonstrated to be a primarily US and NATO funded organisation embedded in Al Nusra and ISIS held areas exclusively. This is an alleged “non-governmental” organisation, the definition of an NGO, that thus far has received funding from at least three major NATO governments, including $23 million from the US Government and $29 million (£19.7 million) from the UK Government, $4.5 million (€4 million) from the Dutch Government. In addition, it receives material assistance and training funded and run by a variety of other EU Nations. A request has been put into the EU Secretary General to provide all correspondence relating to the funding and training of the White Helmets. By law this information must be made transparent and available to the public. There has been a concerted campaign by a range of investigative journalists to expose the true roots of these Syria Civil Defence operatives, known as the White Helmets.  The most damning statement, however, did not come from us, but from their funders and backers in the US State Department who attempted to explain the US deportation of the prominent White Helmet leader, Raed Saleh, from Dulles airport on the 18th April 2016.
  • To condense our research on the Syria White Helmets, we have collated all relevant articles and interviews below.  We condemn wholeheartedly any senseless murder but we recommend that there is serious public and political re-evauluation of the morality of funding a US NATO organisation established to further “regime change” objectives in Syria. Mass murder is being committed across Syria and the region by US and NATO proxy terrorist militants. Funding the White Helmets will serve to prolong the suffering and bloodshed of the Syrian people.
  • Vanessa Beeley 21st Century Wire Who are the White Helmets? This is a question that everyone should be asking themselves. A hideous murder of a rising star in UK politics, Jo Cox MP, has just sent shock waves across the world. Within hours of her death, a special fund was established in her name to raise money for 3 causes. One of those causes is the Syrian White Helmets. Are we seeing a cynical and obscene exploitation of Jo Cox’s murder to revive the flagging credibility of a US State Department & UK Foreign Office asset on the ground in Syria, created and sustained as first responders for the US and NATO Al Nusra/Al Qaeda forces?
  • ...12 more annotations...
  • FOLLOW THE MONEY: The White Helmets are just one component of the new NGO Complex.
  • “It was unclear whether Mr. Saleh’s name might have shown up on a database, fed by a variety of intelligence and security agencies and intended to guard against the prospect of terrorism suspects slipping into the country.” ~ New York Times Mark Toner, State Department spokesperson: “And any individual – again, I’m broadening my language here for specific reasons, but any individual in any group suspected of ties or relations with extremist groups or that we had believed to be a security threat to the United States, we would act accordingly. But that does not, by extension, mean we condemn or would cut off ties to the group for which that individual works for.” http://https://www.youtube.com/watch?v=792ODrhwKkk So we come back to the initial question.  Why is the tragic death of a passionate and ambitious politician being exploited? Why are all political parties in the UK endorsing the Jo Cox fund to provide financial assistance for an organisation the UK Government is already funding and training? Why are the public once more being used as political pawns to further our government’s imperialist objectives inside Syria and their covert, illegal, proxy intervention of a sovereign nation via both terrorist forces and phony humanitarian first responders?
  • The White Helmets are perhaps being demonstrated to be the most crucial component of the US and NATO shadow state building inside Syria.  Led by the US and UK this group is essential to the propaganda stream that facilitates the continued media and political campaign against the elected Syrian government and permits the US and NATO to justify their regime of crippling economic and humanitarian sanctions against the Syrian people. If this latest mechanised ‘NGO’ blueprint is successful then we could see it being re-deployed as key to future neo-colonialist projects. The White Helmets are a direct intra-venus line into the terrorist enclaves within Syria, acting as a conduit for information, equipment and medical support to maintain the US NATO forces. Is this the future of warfare, is this the “swarming” outlined in a 2000 report produced by the RAND Corporation and entitled: Swarming and the Future of Conflict. “The emergence of a military doctrine based on swarming pods and clusters requires that defense policymakers develop new approaches to connectivity and control and achieve a new balance between the two. Far more than traditional approachesto battle, swarming clearly depends upon robust information flows. Securing these flows, therefore, can be seen as a necessary condition for successful swarming.”
  • An important “previously unpublished interview with Jo Cox” was released today by Adam Barnett.  In this interview Jo Cox makes a clear statement regarding the way the UK Government should be maximising the use of their assets, the White Helmets, inside Syria: “Second thing: many organisations, whether it’s the White Helmets or others, have got really creative ideas about how to operate under the siege and civil war conditions. They’ve got really interesting ideas about channelling money, getting aid in, thinking creatively about how they operate, which DfID [Department for International Development] should be listening to. [emphasis added] And then the third thing is about giving airtime to civil society groups, making sure that they get more time on panels– and making sure this is representative of the diversity of civil society views as well, whether that’s women’s groups, or the White Helmets, or NGOs, or just doctors or people who are literally trying to get on with making society function in response to the humanitarian crisis.” Is this why we are seeing what is, in effect, crowd funding for  proxy war? Do we really want to look back and be “judged by history” for enabling conflict and state terrorism, violating international law and invading sovereign nations.  Are we prepared to accept the consequences of such actions, consequences that should be taken by our governments alone but are now being diffused outwards to the general public.  Is this an attempt by our government to disassociate themselves from their criminal actions?
  • Vanessa Beeley speaks to Mike Robinson of UK Column about recent executions of Syrian Arab Army soldiers celebrated by White Helmet operatives.” Watch:
  • “Speaking to Mnar Muhawesh on ‘Behind the Headline,’ investigative journalist Vanessa Beeley pulls back the curtain on the anti-Assad ‘freedom fighters’ and ‘moderate rebels,’ revealing a carefully calibrated propaganda campaign to drive US intervention in the war-torn country.” Watch:
  • Video made by Hands Off Syria in Sydney Australia based upon the research of Vanessa Beeley on the White Helmets. Watch: http://https://www.youtube.com/watch?v=5k6hSS6xBTw Mint Press: US Propaganda War in Syria: Report Ties White Helmets to US Intervention “White Helmets primary function is propaganda” reported an independent journalist, who tied the group to George Soros and the controversial advocacy group Avaaz.” Change.org Petition: Do NOT give 2016 Nobel Peace Prize to Syria White Helmets This petition has currently garnered 1370 signatures. The White Helmets have received over $ 40 million in funding from the US Government [USAID] and the UK Foreign Office despite their claims of being “fiercely independent and accepts no money from governments, corporations or anyone directly involved in the Syrian conflict.” Sputnik: Soros Sponsored NGO in Syria Aims at Ousting Assad not Saving Civilians “One of the largest humanitarian organizations operating in war-torn Syria – the White Helmets – has been accused of being an anti-government propaganda arm that encourages direct foreign intervention.” 21st Century Wire: Syria’s White Helmets, War by Way of Deception Part 1 This piece examines the role of the Syria Civil Defence aka,’The White Helmets’ currently operating in Syria and take a closer look at their financial sources and mainstream media partners in order to better determine if they are indeed “neutral” as media moguls proclaim these “humanitarians” to be.
  • 21st Century Wire: Part II. Syria’s White Helmets, “Moderate” Executioners The NGO hydra has no more powerful or influential serpentine head in Syria than the Syria Civil Defence aka The White Helmets who, according to their leader and creator, James Le Mesurier, hold greater sway than even ISIS or Al Nusra confabs over the Syrian communities. This article explores the White Helmet involvement in terrorist executions of civilians particularly in Aleppo. 21st Century Wire: Humanitarian Propaganda War Against Syria – Led by Avaaz and the White Helmets “The White Helmets in their haste to point the finger of blame at Moscow, managed to tweet about Russia’s air strikes several hours before the Russian Parliament actually authorized the use of the Air Force in Syria.” ~ Sott.net UK Column: Syria White Helmets “Mike Robinson speaks to Vanessa Beeley about the so-called NGO, the White Helmets. Are they really the humanitarian first responder organisation they claim to be?” Watch: http://https://www.youtube.com/watch?v=mLa9ztvAGWw Eva Bartlett: Human Rights Front Groups Warring on Syria This page will continue to expand as more so-called “Human Rights” groups are outed for propagating anti-Syria war rhetoric and false allegations against the Syrian government and Syrian Arab Army.  As it is, the list of players is quite extensive.  Below, I’ll list the known HR front people and groups (many, if not most, with links to the US State Department and criminals like George Soros). Ron Paul Institute: Syria the Propaganda Ring We have demonstrated that the White Helmets are an integral part of the propaganda vanguard that ensures obscurantism of fact and propagation of Human Rights fiction that elicits the well-intentioned and self righteous response from a very cleverly duped public. A priority for these NGOs is to keep pushing the No Fly Zone scenario which has already been seen to have disastrous implications for innocent civilians in Libya, for example. Dissident Voice: Seven Steps of Highly Effective Manipulators “But White Helmets primary function is propaganda. White Helmets demonizes the Assad government and encourages direct foreign intervention.”
  • Prof Tim Anderson: Syrian Women Denounce the White Helmets “A range of Syrian women have denounced the US-UK funded group the ‘White Helmets’, led by a former British soldier and recently revealed to be financed by USAID. They come from all the country’s communities (e.g. Sunni, Alawi, Druze, Christian) but, like most Syrians, prefer to identify simply as Syrian.” Khamenei.ir: Interview with Prof. Tim Anderson NATO’s Dirty War on Syria “The ‘White Helmets’ are a Wall Street creation, funded and led by the US and the UK, to give ‘humanitarian’ cover to the al Qaeda groups they support.” AlternativeView7:  Syria: White Helmets Exposed “We live in a world governed by propaganda where the majority of media mouthpieces are gagged by those who own them and only permitted to release information that serves the narrative of the ruling elite or Imperialist powers.”
  • Please note that the child that is rescued is very clean considering she has allegedly been buried under the rubble of “regime” bombing raids..we do not in any way wish to detract from the heroic work of the true first responders on the ground in Syria, the real Syria Civil Defence and the Red Crescent who are never mentioned in the western media but we do wish to draw your attention to the propaganda methods being employed to amplify US and NATO narratives that are insisting upon “regime change.”
  • We will add to the above articles and interviews as they become available.  Vanessa Beeley has just completed a speaking tour of the UK and Iran during which she highlighted the role of the NGO complex in general and the White Helmets in particular as a new breed of predatory humanitarianism being unleashed against target nations. Videos of her talks will be published as soon as they become available from the AV7 conference and Frome Stop War.
  • Author Vanessa Beeley is a special contributor to 21WIRE, and since 2011, she has spent most of her time in the Middle East reporting on events there – as a independent researcher, writer, photographer and peace activist. She is also a US Peace Council delegate and a volunteer with the Global Campaign to Return to Palestine. See more of her work at her blog The Wall Will Fall.
Paul Merrell

MoA - Gas From Israel And The Flynn Wiretapping - Behind The Deep-State Infighting Over... - 0 views

  • What is really behind the deep-state infighting over the U.S. elections and the "wire tapping" of the Trump campaign? Why was the CIA-Neocon axis vehemently lobbying against Trump? What foreign interests and what money is involved in this? Answers to these questions are now emerging. The former director of the CIA under Clinton, James Woolsey, went to the Wall Street Journal and offered some information (likely some true and some false) on the retired General Flynn and the lobbying businesses he was involved in. Woolsey is an arch-neoconservative. He had worked on the transition team of Trump but got fired over "growing tensions over Trump’s vision for intelligence agencies." Flynn is the former National Security Advisor of Trump who later also got fired. Woolsey was a board member of Flynn's former lobbying company FIG. Woolsey claims: In September 2016 he took part in a meeting between Flynn and high level Turkish officials, including the Turkish foreign minister and the energy minister who is the son-in-law of the Turkish president Erdogan. During the meeting, Woolsey claims, a brainstorming took place over how the Turkish cult leader Fethullah Gülen could -probably by illegal means- be removed from the U.S. and handed over to Turkey. Gülen is accused by the Erdogan mafia of initiating a coup attempt against it. The U.S. claims officially that there is no evidence for such an accusation and that Gülen can therefore not be rendered to Turkey. Gülen is an old CIA asset that helped the U.S. deep state to control Turkey.  Erdogan divorced from the Gülen organization after it became useless for his neo-Ottoman project. Here is the WSJ report on the Woolsey claims and a video clip with parts of his WSJ interview. Woolsey also went on CNN where he repeated his WSJ story. Flynn was accused by the anti-Trump campaign to have worked for Russia. He had taken several $10,000 for speeches he gave in Moscow. He also, at times, had argued for better U.S. relations with Russia. But Flynn's pro-Russia stand was probably honest. (Or the bribes involved were just smaller than the ones paid by others.) The money he got on the speaker circus was rather small for a man in his position. Flynn's real corruption was on another issue. After having been fired from the Trump administration, Flynn retroactively filed under the Foreign Agent Registration Act (FARA). His lobbying firm had a contract over $530,000 to work for a company near to the Turkish president Erdogan: In its filing, Mr. Flynn’s firm said its work from August to November “could be construed to have principally benefited the Republic of Turkey.” The filing said his firm’s fee, $530,000, wasn’t paid by the government but by Inovo BV, a Dutch firm owned by a Turkish businessman, Ekim Alptekin.
  • This lobbying, not the alleged Flynn-Putin relation, is the real scandal and part of the Trump/CIA/Clinton deep-state in-fighting. The meeting Woolsey described was under the "Turkish" Flynn contract. The Turkish business man, and owner of Inovo, Ekim Alptekin is a member of the Erdogan gang. But hidden at the very end of the WSJ story is the real key to understand the shady network: Inovo hired Mr. Flynn on behalf of an Israeli company seeking to export natural gas to Turkey, the filing said, and Mr. Alptekin wanted information on the U.S.-Turkey political climate to advise the gas company about its Turkish investments. It was the Israeli gas company, not the Alptekin outlet, that drove the issue. The Leviatan (and Tamar) gas fields in the Mediterranean along the Israeli coast are a huge energy and profit resource IF the gas from them can be exported to Europe. Several companies are involved in the exploration and all are looking for ways to connect the fields to the European gas network. There are (likely true) rumors that huge bribes have been payed in Israel, Jordan and elsewhere to win exploration contracts and to sell the gas. Negotiations between Israel and Turkey over the pipeline have been on and off. They depend on a positive climate towards Israel in the Turkish government which again depends on the often changing political position of the Erdogan gang.
  • The picture evolving here (lots of sleuthing and sources) is this: An Israeli company (or whoever is behind it) wants a gas pipeline to Turkey. It hires Flynn and Alptekin to arrange a positive climate for the Leviathan pipeline within the Turkish government. It offers Flynn more than half a million for a little (4-month long) influence work. His job is to create a "friendly atmosphere" for the deal by using his influence in the U.S. to accommodate Erdogan. A major point that is expected from Flynn is to arrange the handover of Gülen, by whatever means, from the U.S. to Erdogan. After accepting the (lobbying) bribe Flynn-the-whore suddenly changes his former anti-Turkish, pro-Russian, pro-Kurdish political position into a pro-Turkish, neutral-Russian and anti-Kurdish one. (His lobbying firm also makes some smaller payments related to the Clinton email-server scandal. This may be related to links between the Clinton family and the Gülen school empire.) He has a meeting with the Turkish government/Erdogan officials part of which is a discussion of a removal of Gülen to Turkey. He pens a pro Erdogan anti-Gülen op-ed which is published on the day of the election and he denigrates the Pentagon plan to work with the Kurds in Syria. The NSA, CIA and the FBI are listening to Flynn's conversations with Turkish and Israeli interests. (For the old and long history of such "wiretapping" of Turkish and Israeli connections and various dirty and criminal deals they revealed read and ask Sibel Edmonds.) The projects which Flynn is involved in, especially removing Gülen, are against the long term interests of the (neoconservative-driven) CIA. Selected tapes of his talks are transcribed and distributed within the anti-Trump campaign. This is the origin of the "wiretapping" of the Trump Tower the U.S. president lamented about. The stuff the CIA dug up about Flynn's dealing was and is used against Trump. Woolsey is caught up in this as he also worked for Flynn's lobbying firm. (His neocon-pro-Zionist history suggests that he is the senior Israeli watchdog over Flynn in all this.) He is now engaged in damage control and is "coming clean" and selectively leaking his anti-Flynn stuff to exculpate himself. (There is probably also some new, better deal involved that will pay off from him.) The Israeli-Turkish pipeline and the related deep-state fight are not the only issue involved in the campaign against Trump. There are also British interests and British intelligence involvement especially with the accusations against Russia of "hacking" of the DNC. If and how these fit in with above has not yet been revealed.
Paul Merrell

Senator Aims to End Phone Searches at Airports and Borders | Mother Jones - 0 views

  • More than a month after Sen. Ron Wyden (D-Ore.) requested information about US Customs and Border Protection's practice of searching cell phones at US borders and airports, he's still waiting for answers—but he's not waiting to introduce legislation to end the practice. "It's very concerning that [the Department of Homeland Security] hasn't managed to answer my questions about the number of digital searches at the border, five weeks after I requested that basic information," Wyden, a leading congressional advocate for civil liberties and privacy, told Mother Jones on Tuesday through a spokesman. "If CBP were to undertake a system of indiscriminate digital searches, that would distract CBP from its core mission, dragging time and attention away from catching the bad guys." Wyden's request to DHS and CBP came on the heels of a February 18 report from the Associated Press of a "fivefold increase" in electronic media searches in fiscal year 2016 over the previous year, from fewer than 5,000 to nearly 24,000. It also followed Homeland Security Secretary John Kelly's suggestion that visitors from a select group of countries, mainly Muslim, might be required to hand over passwords to their social media accounts as a condition of entry. (That comment came a week after President Donald Trump first unveiled his executive order⁠ banning travel from seven majority-Muslim countries.) The Knight First Amendment Institute, which advocates for freedom of speech, sued DHS on Monday for records relating to the seizure of electronic devices at border checkpoints. Wyden requested similar data on CBP device searches and demands for travelers' passwords. "There are well-established legal rules governing how law enforcement agencies may obtain data from social media companies and email providers," Wyden wrote in the February 20 letter to DHS and CBP. "By requesting a traveler's credentials and then directly accessing their data, CBP would be short-circuiting the vital checks and balances that exist in our current system." The senator wrote that the searches not only violate civil liberties but could reduce international business travel or force companies to outfit employees with "burner" laptops and mobile devices, "which some firms already use when employees visit nations like China."
  • "Folks are going to be less likely to travel freely to the US with the devices they need if they don't feel their sensitive business information is going to be safe at the border," Wyden said Tuesday, noting that CBP can copy the information it views on a device. "Then they can store that information and search it without a warrant." Wyden will soon introduce legislation to force law enforcement to obtain warrants before searching devices at the border. His bill would also prevent CBP from compelling travelers to reveal passwords to their accounts. A DHS spokesman said in a statement that "all travelers arriving to the US are subject to CBP inspection," which includes inspection of any electronic devices they may be carrying. Access to these devices, the spokesman said, helps CBP agents ascertain the identity and admissibility of people from other countries and "deter the entry of possible terrorists, terrorist weapons, controlled substances," and other prohibited items. "CBP electronic media searches," the spokesman said, "have resulted in arrests for child pornography, evidence helpful in combating terrorist activity, violations of export controls, convictions for intellectual property rights violations, and visa fraud discoveries." In a March 27 USA Today op-ed, Joseph B. Maher, DHS acting general counsel, compared device searches to searching luggage. "Just as Customs is charged with inspecting luggage, vehicles and cargo containers upon arrival to the USA, there are circumstances in this digital age when we must inspect an electronic device for violations of the law," Maher wrote.
  • But in a unanimous 2014 ruling, the Supreme Court found that police need warrants to search cell phones. Chief Justice John Roberts wrote in the opinion that cell phones are "such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy." In response to a Justice Department argument that cell phones were akin to wallets, purses, and address books, Roberts wrote: "That is like saying a ride on horseback is materially indistinguishable from a flight to the moon." The law, however, applies differently at the border because of the "border search doctrine," which has traditionally given law enforcement wider latitude under the Fourth Amendment to perform searches at borders and international airports. CBP says it keeps tight controls on its searches and is sensitive to personal privacy. Wyden isn't convinced. "Given Trump's worrying track record so far, and the ease with which CBP could change its guidelines, it's important we create common-sense statutory protections for Americans' liberty and security," he says.
  • ...1 more annotation...
  • Sophia Cope, a staff attorney with the Electronic Frontier Foundation who has written extensively about searches of electronic devices, says that searches of mobile devices appear to be on the rise. "They realized that people are carrying these devices with them all the time, it's just another thing for them to search," she says. "But also it does seem that after the executive order that they've been emboldened to do this even more." Wyden says that the data collection creates an opportunity for hackers. "Given how frequently hackers have stolen government information," he says, "I think a lot of Americans would be worried to know their whole lives could be sitting in a government database that's got a huge bull's-eye on it for hackers."
« First ‹ Previous 181 - 192 of 192
Showing 20 items per page