Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Greenwald-book

Rss Feed Group items tagged

Paul Merrell

The best way to read Glenn Greenwald's 'No Place to Hide' - 0 views

  • Journalist Glenn Greenwald just dropped a pile of new secret National Security Agency documents onto the Internet. But this isn’t just some haphazard WikiLeaks-style dump. These documents, leaked to Greenwald last year by former NSA contractor Edward Snowden, are key supplemental reading material for his new book, No Place to Hide, which went on sale Tuesday. Now, you could just go buy the book in hardcover and read it like you would any other nonfiction tome. Thanks to all the additional source material, however, if any work should be read on an e-reader or computer, this is it. Here are all the links and instructions for getting the most out of No Place to Hide.
  • Greenwald has released two versions of the accompanying NSA docs: a compressed version and an uncompressed version. The only difference between these two is the quality of the PDFs. The uncompressed version clocks in at over 91MB, while the compressed version is just under 13MB. For simple reading purposes, just go with the compressed version and save yourself some storage space. Greenwald also released additional “notes” for the book, which are just citations. Unless you’re doing some scholarly research, you can skip this download.
  • No Place to Hide is, of course, available on a wide variety of ebook formats—all of which are a few dollars cheaper than the hardcover version, I might add. Pick your e-poison: Amazon, Nook, Kobo, iBooks. Flipping back and forth Each page of the documents includes a corresponding page number for the book, to allow readers to easily flip between the book text and the supporting documents. If you use the Amazon Kindle version, you also have the option of reading Greenwald’s book directly on your computer using the Kindle for PC app or directly in your browser. Yes, that may be the worst way to read a book. In this case, however, it may be the easiest way to flip back and forth between the book text and the notes and supporting documents. Of course, you can do the same on your e-reader—though it can be a bit of a pain. Those of you who own a tablet are in luck, as they provide the best way to read both ebooks and PDF files. Simply download the book using the e-reader app of your choice, download the PDFs from Greenwald’s website, and dig in. If you own a Kindle, Nook, or other ereader, you may have to convert the PDFs into a format that works well with your device. The Internet is full of tools and how-to guides for how to do this. Here’s one:
  • ...1 more annotation...
  • Kindle users also have the option of using Amazon’s Whispernet service, which converts PDFs into a format that functions best on the company’s e-reader. That will cost you a small fee, however—$0.15 per megabyte, which means the compressed Greenwald docs will cost you a whopping $1.95.
Paul Merrell

Propaganda Rules The News --Paul Craig Roberts - PaulCraigRoberts.org - 0 views

  • Greenwald is entirely admirable. He has intelligence, integrity, and courage. He is one of the brave to whom my just published book, How America Was Lost, is dedicated. As for RT’s Abby Martin, I admire her and have been a guest on her program a number of times. My criticism of Greenwald and Martin has nothing to do with their integrity or their character. I doubt the claims that Abby Martin grandstanded on “Russia’s invasion of Ukraine” in order to boost her chances of moving into the more lucrative “mainstream media.” My point is quite different. Even Abby Martin and Greenwald, both of whom bring us much light, cannot fully escape Western propaganda. For example, Martin’s denunciation of Russia for “invading” Ukraine is based on Western propaganda that Russia sent 16,000 troops to occupy Crimea. The fact of the matter is that those 16,000 Russian troops have been in Crimea since the 1990s. Under the Russian-Ukrainian agreement, Russia has the right to base 25,000 troops in Crimea.
  • So, here we have three of the smartest and most independent journalists of our time, and all three are under the impression created by Western propaganda that Russia has invaded Ukraine. It appears that the power of Washington’s propaganda is so great that not even the best and most independent journalists can escape its influence. What chance does truth have when Abby Martin gets kudos from Glenn Greenwald for denouncing Russia for an alleged “invasion” that has not taken place, and when independent Pat Buchanan opens his column dissenting from the blame-Russia-crowd by accepting that an invasion has taken place?
  • Apparently, neither Abby Martin nor Glenn Greenwald, two intelligent and aware people, knew this fact. Washington’s propaganda is so pervasive that two of our best reporters were victimized by it. As I have written several times in my columns, Washington organized the coup in Ukraine in order to promote its world hegemony by capturing Ukraine for NATO and putting US missile bases on Russia’s border in order to degrade Russia’s nuclear deterrent and force Russia to accept Washington’s hegemony. Russia has done nothing but respond in a very low-key way to a major strategic threat orchestrated by Washington. It is not only Martin and Greenwald who have fallen under Washington’s propaganda. They are joined by Patrick J. Buchanan. Pat’s column calling on readers to “resist the war party on Crimea” opens with Washington’s propagandistic claim: “With Vladimir Putin’s dispatch of Russian Troops into Crimea.” http://www.informationclearinghouse.info/article37847.htm No such dispatch has occurred. Putin has been granted authority by the Russian Duma to send troops to Ukraine, but Putin has stated publicly that sending troops would be a last resort to protect Crimean Russians from invasions by the ultra-nationalist neo-nazis who stole Washington’s coup and established themselves as the power in Kiev and western Ukraine.
  • ...1 more annotation...
  • The entire story that the presstitutes have told about the Ukraine is a propaganda production. The presstitutes told us that the deposed president, Viktor Yanukovych, ordered snipers to shoot protesters. On the basis of these false reports, Washington’s stooges, who comprise the existing non-government in Kiev, have issued arrest orders for Yanukovych and intend for him to be tried in an international court. In an intercepted telephone call between EU foreign affairs minister Catherine Ashton and Estonian foreign affairs minister Urmas Paet who had just returned from Kiev, Paet reports: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” Paet goes on to report that “all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides . . . and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Ashton, absorbed with EU plans to guide reforms in Ukraine and to prepare the way for the IMF to gain control over economic policy, was not particularly pleased to hear Paet’s report that the killings were an orchestrated provocation. You can listen to the conversation between Paet and Ashton here: http://rt.com/news/ashton-maidan-snipers-estonia-946/ What has happened in Ukraine is that Washington plotted against and overthrew an elected legitimate government and then lost control to neo-nazis who are threatening the large Russian population in southern and eastern Ukraine, provinces that formerly were part of Russia. These threatened Russians have appealed for Russia’s help, and just like the Russians in South Ossetia, they will receive Russia’s help. The Obama regime and its presstitutes will continue to lie about everything.
Paul Merrell

Glenn Greenwald: the explosive day we revealed Edward Snowden's identity to the world |... - 0 views

  • In the hours after his name became known, the entire world was searching for the NSA whistleblower, and it became vital that his whereabouts in Hong Kong remained secret. In an extract from a new book, No Place to Hide, Glenn Greenwald recalls the dramatic events surrounding the moment Snowden revealed himself in June 2013
  •  
    Excerpt from Greenwald's forthcoming book, No Place to Hide: Edward Snowden, the NSA and the Surveillance State
Paul Merrell

Book Reveals Wider Net of U.S. Spying on Envoys - NYTimes.com - 0 views

  • In May 2010, when the United Nations Security Council was weighing sanctions against Iran over its nuclear program, several members were undecided about how they would vote. The American ambassador to the United Nations, Susan E. Rice, asked the National Security Agency for help “so that she could develop a strategy,” a leaked agency document shows.The N.S.A. swiftly went to work, developing the paperwork to obtain legal approval for spying on diplomats from four Security Council members — Bosnia, Gabon, Nigeria and Uganda — whose embassies and missions were not already under surveillance. The following month, 12 members of the 15-seat Security Council voted to approve new sanctions, with Lebanon abstaining and only Brazil and Turkey voting against. Continue reading the main story Related Coverage Books of The Times: ‘No Place to Hide,’ by Glenn GreenwaldMAY 12, 2014 Later that summer, Ms. Rice thanked the agency, saying its intelligence had helped her to know when diplomats from the other permanent representatives — China, England, France and Russia — “were telling the truth ... revealed their real position on sanctions ... gave us an upper hand in negotiations ... and provided information on various countries ‘red lines.’ ”
  • The two documents laying out that episode, both leaked by the former N.S.A. contractor Edward J. Snowden, are reproduced in a new book by Glenn Greenwald, “No Place to Hide: Edward Snowden, the N.S.A., and the U.S. Surveillance State.” The book is being published Tuesday.
Paul Merrell

Activists Take Credit for Notorious FBI Raid That Spilled Secrets-Forty-two Years Ago |... - 0 views

  • It’s a mystery I covered from the start and now it has been solved. A big breaking story this morning features startling revelations about the infamous raid by antiwar activists on the FBI office in Media, Pennsylvania, (yes, that’s the name) in 1971, on the night of the Ali-Frazier “fight of the century,” who are finally exposing themselves in a new book and film. The book is by the Washington Post reporter who received some of the leak files back then, Betty Medsger. The activists, none of them household names then or now, cleared out all the files there that day and this led to the first big scoops on illegal FBI surveillance and the notorious COINTELPRO program, which we covered so widely at Crawdaddy that decade. One of the perps even waved to Edward Snowden on the Today show today and said, “Hi, from one whistleblower to another.” And The New York Times has now posted a thirteen-minute video.
  • Of course, by 1971, there had been rumors and personal reports about undercover FBI snooping, including use of electronic surveillance, for years but with little black-and-white official evidence. Hell, we even had a break-in at the Crawdaddy office that seemed suspicious and, as a longtime (if minor) antiwar activist, I always figured I might have drawn some official attention. But the Media raid proved incredibly valuable, even as it made many of us more paranoid. Indeed, as NBC reports: Among the stolen files: plans to enhance “paranoia” among “New Left” groups by instilling fears that “there is an FBI agent behind every mailbox.” Another instructed agents in the Philadelphia area to monitor the “clientele” of “Afro-American type bookstores” and recruit informants among the “the Negro militant movement.” The raid and its results didn’t immediately stop COINTELPRO, then run by good old Deep Throat himself, Mark Felt.
  • the Media raid had finally produced some of the aims sought by the burglars. From NBC: “These documents were explosive,” said Medsger, who was the first reporter to write about them after receiving a batch of the files anonymously in the mail. Her book traces how the stolen files led to a landmark Senate investigation of intelligence and law enforcement agency abuses by the late Idaho Sen. Frank Church, and eventually to new Justice Department guidelines that barred the bureau from conducting investigations based on First Amendment protected political activity. After the burglary, said Medsger, “The FBI was never the same.” Glenn Greenwald weighs in on today’s revelations. He is, of course, supportive of the 1971 action.
  •  
    The New York Times video is worth watching for its historical footage and the linked post by Glenn Greenwald adds valuable perspective about the failure of NYT and the LA Times to do anything with the documents. Only the Washington Post pushed the story. One might wonder if these days, any mainstream media might have covered the Snowden documents had The Guardian not told The Washington Post that the Guardian was going to run with the story regardless. 
Paul Merrell

The Stunning Hypocrisy of the U.S. Government | Washington's Blog - 0 views

  • Congress has exempted itself from the prohibition against trading on inside information … the law that got Martha Stewart and many other people thrown in jail. There are many other ways in which the hypocrisy of the politicians in D.C. is hurting our country. Washington politicians say we have to slash basic services, and yet waste hundreds of billions of dollars on counter-productive boondoggles. If the politicos just stopped throwing money at corporate welfare queens, military and security boondoggles and pork, harmful quantitative easing, unnecessary nuclear subsidies, the failed war on drugs, and other wasted and counter-productive expenses, we wouldn’t need to impose austerity on the people. The D.C. politicians said that the giant failed banks couldn’t be nationalized, because that would be socialism. Instead of temporarily nationalizing them and then spinning them off to the private sector – or breaking them up – the politicians have bailed them out to the tune of many tens of billions of dollars each year, and created a system where all of the profits are privatized, and all of the losses socialized. Obama and Congress promised help for struggling homeowners, and passed numerous bills that they claimed would rescue the little guy. But every single one of these bills actually bails out the banks … and doesn’t really help the homeowner.
  • The Federal Reserve promises to do everything possible to reduce unemployment. But its policies are actually destroying jobs. Many D.C. politicians pay lip service to helping the little guy … while pushing policies which have driven inequality to levels surpassing slave-owning societies. The D.C. regulators pretend that they are being tough on the big banks, but are actually doing everything they can to help cover up their sins. Many have pointed out Obama’s hypocrisy in slamming Bush’s spying programs … and then expanding them (millions more). And in slamming China’s cyber-warfare … while doing the same thing. And – while the Obama administration is spying on everyone in the country – it is at the same time the most secretive administration ever (background). That’s despite Obama saying he’s running the most transparent administration ever.
  • Glenn Greenwald – the Guardian reporter who broke the NSA spying revelations – has documented for many years the hypocritical use of leaks by the government to make itself look good … while throwing the book at anyone who leaks information embarrassing to the government. Greenwald notes today: Prior to Barack Obama’s inauguration, there were a grand total of three prosecutions of leakers under the Espionage Act (including the prosecution of Dan Ellsberg by the Nixon DOJ). That’s because the statute is so broad that even the US government has largely refrained from using it. But during the Obama presidency, there are now seven such prosecutions: more than double the number under all prior US presidents combined.
  • ...3 more annotations...
  • The irony is obvious: the same people who are building a ubiquitous surveillance system to spy on everyone in the world, including their own citizens, are now accusing the person who exposed it of “espionage”. It seems clear that the people who are actually bringing “injury to the United States” are those who are waging war on basic tenets of transparency and secretly constructing a mass and often illegal and unconstitutional surveillance apparatus aimed at American citizens – and those who are lying to the American people and its Congress about what they’re doing – rather than those who are devoted to informing the American people that this is being done.
  • Similarly, journalists who act as mere stenographers for the government who never criticize in more than a superficial fashion are protected and rewarded … but reporters who actually report on government misdeeds are prosecuted and harassed. Further, the biggest terrorism fearmongers themselves actually support terrorism. And see this. In the name of fighting terrorism, the U.S. has been directly supporting Al Qaeda and other terrorists and providing them arms, money and logistical support in Syria, Libya, Mali, Bosnia, Chechnya, Iran, and many other countries … both before and after 9/11. And see this. The American government has long labeled foreigners as terrorists for doing what America does. Moreover, government officials may brand Americans as potential terrorists if they peacefully protest, complain about the taste of their water, or do any number of other normal, all-American things.
  • This is especially hypocritical given that liberals like Noam Chomsky and conservatives like the director of the National Security Agency under Ronald Reagan (Lt. General William Odom) all say that the American government is the world’s largest purveyor of terrorism. As General Odom noted: Because the United States itself has a long record of supporting terrorists and using terrorist tactics, the slogans of today’s war on terrorism merely makes the United States look hypocritical to the rest of the world. These are just a couple of ways in which the D.C. politicians are hypocrites.
Paul Merrell

Glenn Greenwald: how the NSA tampers with US-made internet routers | World news | The G... - 0 views

  • The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide
  • For years, the US government loudly warned the world that Chinese routers and other internet devices pose a "threat" because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA's documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.
  • The Rogers committee voiced fears that the two companies were enabling Chinese state surveillance, although it acknowledged that it had obtained no actual evidence that the firms had implanted their routers and other systems with surveillance devices. Nonetheless, it cited the failure of those companies to cooperate and urged US firms to avoid purchasing their products
  • ...3 more annotations...
  • The constant accusations became such a burden that Ren Zhengfei, the 69-year-old founder and CEO of Huawei, announced in November 2013 that the company was abandoning the US market. As Foreign Policy reported, Zhengfei told a French newspaper: "'If Huawei gets in the middle of US-China relations,' and causes problems, 'it's not worth it'."
  • But while American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organisations would have been well advised to beware of American-made ones. A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)".Eventually, the implanted device connects back to the NSA. The report continues: "In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network."
  • Warning the world about Chinese surveillance could have been one of the motives behind the US government's claims that Chinese devices cannot be trusted. But an equally important motive seems to have been preventing Chinese devices from supplanting American-made ones, which would have limited the NSA's own reach. In other words, Chinese routers and servers represent not only economic competition but also surveillance competition.
Gary Edwards

Security, the Edward Snowden Way - Datamation - 0 views

  • NoScript NoScript is a free extension for Mozilla-based web browsers, including Firefox. It blocks executable web content by default. This blocking includes JavaScript, Java, Flash and Silverlight. You can whitelist sites if you want to use such content on a site-by-site basis. Or, if you choose, you can make all sites active by default and choose to blacklist sites you think might be dangerous. A visual button tells you if active content has been blocked on the current site.
  • PGP In the first chapter of his book “No Place to Hide,” journalist Glenn Greenwald wrote that Edward Snowden contacted him using the alias “Cincinnatus,” and said he would tell Greenwald some highly newsworthy facts, but only if he installed Pretty Good Privacy (PGP) first. (Greenwald didn’t know the magnitude of the scoop being offered to him and didn’t get around to installing PGP for months, thus delaying the leak.) PGP, of course, is a 23-year-old encryption program that can be used for email, as well as files and other things.
  • Tor Tor is a free application that routes your Internet traffic through a global volunteer network of thousands of relays that play a shell game with your data so your location and Internet travels are concealed. Tor, which used to stand for “The Onion router” in a reference to layers of encryption, encrypts data in multiple layers that prevents snoops from being able to figure out any details about your web travels, such as where you are or what you’re looking at. Tor was developed in part by US government funding as a way to enable citizens in repressive countries to communicate safely. And the NSA has a lot of respect for it. But in a recent controversy, two Carnegie Mellon researchers said they would give a talk at the Black Hat USA 2014 conference next month telling how to identify Tor users inexpensively (for only $3,000). The session was cut from the lineup because university lawyers didn’t approve it. The institute that the researchers work for is funded by the Pentagon, but the Department of Homeland Security said they did not request that the talk be cancelled.
  •  
    "Whether you think NSA whistleblower Edward Snowden is a hero or a traitor, you have to admit: The guy knows how to keep his information secure. The fact that Snowden isn't sitting in Guantanamo right now with ankle cuffs and a bag over his head demonstrates his ability to avoid detection. Snowden spoke at the Hope X conference in New York this month via a Google+ Hangout from Russia, and called on developers to build privacy and security into everyday products. He also hinted that he planned to work on building such technology. If you look into the details of what's been happening with tracking, surveillance, spying, hacking and global cyber industrial espionage, you can see that Snowden is right. We all need a lot better protection from snoops of all stripes. But how does the non-expert get started? One option is to listen to Snowden himself. Over the past year, Snowden has in one format or another, made specific product recommendations. Here are the products Snowden has explicitly recommended since the trove of documents on the NSA has been publicly revealed. (The list is in alphabetical order.) Ghostery Ghostery, made by a company called Evidon, is a browser extension for Chrome, Firefox, Safari and Internet Explorer. It exists for two purposes. The first is to block tracking code, which makes browsing the web both more private and also faster. The second purpose is, somewhat contradictory -- Evidon collects data from you to help advertisers avoid being blocked. It also enables website owners to gain insights into the tracking code deployed on their site by third-party advertising companies. Note that Snowden recommended Ghostery some time ago. But this month, the Electronic Frontier Foundation launched a competing product that I would imagine Snowden would recommend called Privacy Badger."
  •  
    I'd back Snowden in 2016 as a write-in candidate for President.
Paul Merrell

007 producers to make movie on Snowden book - Washington Times - 0 views

  • The stewards of the James Bond franchise will use their talent for intrigue to produce a movie based on reporter Glenn Greenwald’s book about Edward Snowden’s leak of top-secret U.S. surveillance documents. Sony Pictures said Wednesday that EON Productions’ Michael Wilson and Barbara Broccoli will produce the film based on “No Place to Hide: Edward Snowden, the NSA and the U.S. Surveillance State.” The book was released for sale on Tuesday.
Paul Merrell

It's Time to Rewrite the Internet to Give Us Better Privacy, and Security - The Daily B... - 0 views

  • Almost 15 years ago, as I was just finishing a book about the relationship between the Net (we called it “cyberspace” then) and civil liberties, a few ideas seemed so obvious as to be banal: First, life would move to the Net. Second, the Net would change as it did so. Gone would be simple privacy, the relatively anonymous default infrastructure for unmonitored communication; in its place would be a perpetually monitored, perfectly traceable system supporting both commerce and the government. That, at least, was the future that then seemed most likely, as business raced to make commerce possible and government scrambled to protect us (or our kids) from pornographers, and then pirates, and now terrorists. But another future was also possible, and this was my third, and only important point: Recognizing these obvious trends, we just might get smart about how code (my shorthand for the technology of the Internet) regulates us, and just possibly might begin thinking smartly about how we could embed in that code the protections that the Constitution guarantees us. Because—and here was the punchline, the single slogan that all 724 people who read that book remember—code is law. And if code is law, then we need to be as smart about how code regulates us as we are about how the law does so.
  • There is, after all, something hopeful about a future that was smart about encoding our civil liberties. It could, in theory at least, be better. Better at protecting us from future Nixons, better at securing privacy, and better at identifying those keen to commit crime.
  • But what astonishes me is that today, more than a decade into the 21st century, the world has remained mostly oblivious to these obvious points about the relationship between law and code. That’s the bit in the Edward Snowden interview that is, to me, the most shocking. As he explained to Glenn Greenwald: The NSA specially targets the communications of everyone. It ingests them by default. It collects them in its system, and it filters them and it analyzes them and it measures them and it stores them for periods of time simply because that’s the easiest and the most efficient and most valuable way to achieve these ends ... Not all analysts have the ability to target everything. But I sitting at my desk certainly had the authority to wiretap anyone—from you [the reporter, Glenn Greenwald], to your accountant, to a federal judge, to even the president if I had a personal email. We don’t know yet whether Snowden is telling the truth. Lots of people have denied specifics, and though his interview is compelling, just now, we literally don’t know. But what we do know are the questions that ought to be asked in response to his claims. And specifically, this: Is it really the case that the government has entrusted our privacy to the good judgment of private analysts? Are there really no code-based controls for assuring that specific surveillance is specifically justified? And what is the technology for assuring that rogues paid by our government can’t use data collected by our government for purposes that none within our government would openly and publicly defend?
  • ...1 more annotation...
  • Because the fact is that there is technology that could be deployed that would give many the confidence that none of us now have. “Trust us” does not compute. But trust and verify, with high-quality encryption, could. And there are companies, such as Palantir, developing technologies that could give us, and more importantly, reviewing courts, a very high level of confidence that data collected or surveilled was not collected or used in an improper way. Think of it as a massive audit log, recording how and who used what data for what purpose. We could code the Net in a string of obvious ways to give us even better privacy, while also enabling better security. But we don’t, or haven’t, obviously. Maybe because of stupidity. How many congressmen could even describe how encryption works? Maybe because of cupidity. Who within our system can resist large and lucrative contracts to private companies, especially when bundled with generous campaign funding packages? Or maybe because the “permanent war” that Obama told us we were not in has actually convinced all within government that old ideas are dead and we just need to “get over it”—ideas like privacy, and due process, and fundamental proportionality. These ideas may be dead, for now. And they will stay dead, in the future. At least until we finally learn how liberty can live in the digital age. And here’s the hint: not through law alone, but through law that demands code that even the Electronic Frontier Foundation could trust.
  •  
    As the most prominent among law professors concerned with online civil liberties and now specializing in government corruption, if Lawrence Lessig says there are technical solutions for protecting us from online government snooping, I'm all years. He directs attention to technology being developed by Palantir, http://www.palantir.com/
Gary Edwards

The Stunning Hypocrisy of the U.S. Government - BlackListedNews.com - 1 views

  • Please read this rather good summary in this morning’s New York Times of the worldwide debate Snowden has enabled – how these disclosures have “set off a national debate over the proper limits of government surveillance” and “opened an unprecedented window on the details of surveillance by the NSA, including its compilation of logs of virtually all telephone calls in the United States and its collection of e-mails of foreigners from the major American Internet companies, including Google, Yahoo, Microsoft, Apple and Skype” – and ask yourself: has Snowden actually does anything to bring “injury to the United States”, or has he performed an immense public service?
  • The irony is obvious: the same people who are building a ubiquitous surveillance system to spy on everyone in the world, including their own citizens, are now accusing the person who exposed it of “espionage”.
  • It seems clear that the people who are actually bringing “injury to the United States” are those who are waging war on basic tenets of transparency and secretly constructing a mass and often illegal and unconstitutional surveillance apparatus aimed at American citizens – and those who are lying to the American people and its Congress about what they’re doing – rather than those who are devoted to informing the American people that this is being done.
  • ...13 more annotations...
  • The Obama administration leaks classified information continuously. They do it to glorify the President, or manipulate public opinion, or even to help produce a pre-election propaganda film about the Osama bin Laden raid.
  • The Obama administration does not hate unauthorized leaks of classified information. They are more responsible for such leaks than anyone.
  • What they hate are leaks that embarrass them or expose their wrongdoing.
  • The “enemy” they’re seeking to keep ignorant with selective and excessive leak prosecutions are not The Terrorists or The Chinese Communists.
  • It’s the American people.
  • The people who have learned things they didn’t already know are American citizens who have no connection to terrorism or foreign intelligence, as well as hundreds of millions of citizens around the world about whom the same is true.
  • What they have learned is that the vast bulk of this surveillance apparatus is directed not at the Chinese or Russian governments or the Terrorists, but at them.
  • And that is precisely why the US government is so furious and will bring its full weight to bear against these disclosures.
  • What has been “harmed” is not the national security of the US but the ability of its political leaders to work against their own citizens and citizens around the world in the dark, with zero transparency or real accountability.
  • If anything is a crime, it’s that secret, unaccountable and deceitful behavior: not the shining of light on it.
  • At a press conference to discuss the accusations, an N.S.A. spokesman surprised observers by announcing the spying charges against Mr. Snowden with a totally straight face. “These charges send a clear message,” the spokesman said. “In the United States, you can’t spy on people.”
  • “The American people have the right to assume that their private documents will remain private and won’t be collected by someone in the government for his own purposes.”
  • “Only by bringing Mr. Snowden to justice can we safeguard the most precious of American rights: privacy,” added the spokesman, apparently serious.
  •  
    Extremely well linked story from "Washington's Blog" excerpt: "The Government's Hypocrisy Is the Core Problem Congress has exempted itself from the prohibition against trading on inside information … the law that got Martha Stewart and many other people thrown in jail. There are many other ways in which the hypocrisy of the politicians in D.C. are hurting our country. Washington politicians say we have to slash basic services, and yet waste hundreds of billions of dollars on counter-productive boondoggles.  If the politicos just stopped throwing money at corporate welfare queens, military and security boondoggles and pork, harmful quantitative easing, unnecessary nuclear subsidies,  the failed war on drugs, and other wasted and counter-productive expenses, we wouldn't need to impose austerity on the people. The D.C. politicians said that the giant failed banks couldn't be nationalized, because that would be socialism.  Instead of temporarily nationalizing them and then spinning them off to the private sector - or breaking them up - the politicians have bailed them out to the tune of many tens of billions of dollars each year, and created a system where all of the profits are privatized, and all of the losses socialized. Obama and Congress promised help for struggling homeowners, and passed numerous bills that they claimed would rescue the little guy.  But every single one of these bills actually bails out the banks … and doesn't really help the homeowner. The D.C. regulators pretend that they are being tough on the big banks, but are actually doing everything they can to help cover up their sins. Many have pointed out Obama's hypocrisy in slamming Bush's spying programs … and then expanding them  (millions more). And in slamming China's cyber-warfare … while doing the same thing. And - while the Obama administration is spying on everyone in the country - it is at the same time the most secretive administration ever (ba
Paul Merrell

NSA router bugging: Glenn Greenwald - 0 views

  • An excerpt of investigative reporter Glenn Greenwald's new book No Place to Hide published today in The Guardian asserts that the National Security Agency "routinely" bugs computer network equipment made in the United States and sent to customers abroad: A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers, and other computer network devices being exported from the US before they are delivered to the international customers. Advertisement The agency then implants backdoor surveillance tools, repackages the devices with a factory seal, and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)". The excerpt doesn't say whether the bugging was done to entire shipments of equipment (as opposed to individual items ordered by specific surveillance targets).
Paul Merrell

Keith Alexander Unplugged: on Bush/Obama, 1.7 million stolen documents and other matter... - 0 views

  • The just-retired long-time NSA chief, Gen. Keith Alexander, recently traveled to Australia to give a remarkably long and wide-ranging interview with an extremely sycophantic “interviewer” with The Australian Financial Review. The resulting 17,000-word transcript and accompanying article form a model of uncritical stenography journalism, but Alexander clearly chose to do this because he is angry, resentful, and feeling unfairly treated, and the result is a pile of quotes that are worth examining, only a few of which are noted below:
  • How Edward Snowden managed to steal an alleged 1.7 million documents from the NSA. Sunday: http://t.co/gbrIu5yMcc — 60 Minutes (@60Minutes) December 13, 2013 Mike McConnell, the vice chairman of Booz Allen and former Director of National Intelligence in the Bush administration, then claimed that ”Snowden absconded with 1.7 million to 1.8 million documents.” Ever since then, that Snowden “stole” 1.7 or 1.8 million documents from the NSA has been repeated over and over again by US media outlets as verified fact. The Washington Post‘s Walter Pincus, citing an anonymous official source, purported to tell readers that “among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports”. Reuters frequently includes in its reports the unchallenged assertion that “Snowden was believed to have taken 1.7 million computerized documents.” Just this week, the global news agency told its readers that “Snowden was believed to have taken 1.7 million computerized documents.”
  • AFR: Can you now quantify the number of documents [Snowden] stole? Gen. Alexander: Well, I don’t think anybody really knows what he actually took with him, because the way he did it, we don’t have an accurate way of counting. What we do have an accurate way of counting is what he touched, what he may have downloaded, and that was more than a million documents. It’s hard to recall a better and clearer example of how mindless and uncritical the American media is when it comes to the unproven pronouncements of the U.S. Government. Back in December, 60 Minutes broadcast a now-notorious segment of pure access journalism in which they gullibly disseminated one false NSA claim after the next in exchange for being given exclusive(!) access to a few Secret and Exciting Rooms inside the agency’s headquarters. The program claimed that Snowden “is believed to still have access to 1.5 million classified documents he has not leaked”. On its Twitter account, 60 Minutes made this claim to promote its show:
  • ...2 more annotations...
  • In fact, that number is and always has been a pure fabrication, as even Keith Alexander admits. The claimed number has changed more times than one can count: always magically morphing into randomly chosen higher and scarier numbers. The reality, in the words of the General, is that the US Government ”really [doesn't] know[] what he actually took with him” and they ”don’t have an accurate way of counting”. All they know is how many documents he accessed in his entire career at NSA, which is a radically different question from how many documents he took. But that hasn’t stopped American media outlets from repeatedly affirming the inflammatory evidence-free claim that Snowden took 1.7 million documents. As usual, even the most blatantly unreliable claims from National Security State officials are treated as infallible papal pronouncements by our Adversarial Watchdog Press. There’s an equally vital point made by Alexander’s admission. The primary defense of the NSA and its defenders is that one need not worry about the staggering sums of data they collect because they have implemented very rigorous oversight mechanisms and controls that prevent abuse. Yet Edward Snowden spent months downloading a large amount of highly sensitive documents right under their noses. And not only did they have no idea that he was doing it, but now – even after spending large sums of money to find out – they are still completely incapable of learning which documents he took or even how many he took. Does that at all sound like a well-managed, tightly controlled system that you can trust to safeguard your most personal data and to detect and prevent abuse of this system by the tens of thousands of people who have access to it?
  • The release date for my book on the NSA, privacy, and our reporting of the surveillance story, No Place to Hide, is next Tuesday, May 13, at which time all of the previously unpublished NSA documents that are reported on in the book will be placed online, with free access, at the book’s website.
Gary Edwards

THE TRUTH ABOUT SPYING: The Feds Are Intercepting Your Internet Data And Tech Giants Kn... - 0 views

  • Last year James Bamford of Wired — who wrote the book "The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America" — reported that the NSA hired secretive companies linked to Israeli intelligence to establish 10 to 20 wiretapping rooms at key Internet Service Provider (ISP) telecommunication points throughout the country.
  • In 2004 AT&T engineer Mark Klein discovered that a special NSA network actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T," emphasizing that "much of the data sent through AT&T to the NSA was purely domestic."
  • Glenn Greenwald revealed that the National Security Agency (NSA) is secretly using the so-called "business records" provision of the Patriot Act to collect telephone records of millions of Americans from Verizon. Greenwald noted that "previous reporting has suggested the NSA has collected cell records from all major mobile networks," which was best illustrated by this ACLU infographic graphic illustrating how the NSA intercepts more than a billion electronic records and communications every day.
  • ...4 more annotations...
  • NSA whistleblowers William Binney and Thomas Drake corroborated Klein's assertions: Binney contends that the NSA analyzes the information "to be able to monitor what people are doing" and who they are doing it with while Drake maintains that the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications."
  • Eric Lichtblau and James Risen of the New York Times won a Pulitzer-Prize for this 2005 story: As part of the program approved by President Bush for domestic surveillance without warrants, the N.S.A. has gained the cooperation of American telecommunications companies to obtain backdoor access to streams of domestic and international communications, the officials said.
  • in January Google released a transparency report detailing the government's use of controversial legislation that bypasses judicial approval to access the online information of private citizens.
  • Given the fact that the CIA's recently visited tech conference to detail the Agency's vision for collecting and analyzing all of the information people put on the Internet, it would be naïve to think that American tech giants hasn't know that all their data belongs to NSA.
  •  
    Timeline for reports and whistleblower information going public about NSA world wide dragnet of information and communications.  Note that the official timeline the NSA slides depict the start of the Internet dragnet as late 2007, when the Bush Administration wrangled Microsoft as a source.  The whistleblower timeline starts in 2001 and is rolling worldwide by 2004.
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
Paul Merrell

Hillary Clinton Goes to Militaristic, Hawkish Think Tank, Gives Militaristic, Hawkish S... - 0 views

  • Leading Democratic presidential candidate Hillary Clinton this morning delivered a foreign policy speech at the Brookings Institution in Washington. By itself, the choice of the venue was revealing. Brookings served as Ground Zero for centrist think tank advocacy of the Iraq War, which Clinton (along with potential rival Joe Biden) notoriously and vehemently advocated. Brookings’ two leading “scholar”-stars — Kenneth Pollack and Michael O’Hanlon — spent all of 2002 and 2003 insisting that invading Iraq was wise and just, and spent the years after that assuring Americans that the “victorious” war and subsequent occupation were going really well (in April 2003, O’Hanlon debated with himself over whether the strategy that led to the “victory” in his beloved war should be deemed “brilliant” or just extremely “clever,” while in June 2003, Pollack assured New York Times readers that Saddam’s WMD would be found).
  • Since then, O’Hanlon in particular has advocated for increased military force in more countries than one can count. That’s not surprising: Brookings is funded in part by one of the Democratic Party’s favorite billionaires, Haim Saban, who is a dual citizen of the U.S. and Israel and once said of himself: “I’m a one-issue guy, and my issue is Israel.” Pollack advocated for the attack on Iraq while he was “Director of Research of the Saban Center for Middle East Policy.” Saban became the Democratic Party’s largest fundraiser — even paying $7 million for the new DNC building — and is now a very substantial funder of Hillary Clinton’s campaign. In exchange, she’s written a personal letter to him publicly “expressing her strong and unequivocal support for Israel in the face of the Boycott, Divestment and Sanction movement.” So the hawkish Brookings is the prism through which Hillary Clinton’s foreign policy worldview can be best understood. The think tank is filled with former advisers to both Bill and Hillary Clinton, and would certainly provide numerous top-level foreign policy officials in any Hillary Clinton administration. As she put it today at the start: “There are a lot of long-time friends and colleagues who perch here at Brookings.” And she proceeded to deliver exactly the speech one would expect, reminding everyone of just how militaristic and hawkish she is.
  • Clinton proclaimed that she “too [is] deeply concerned about Iranian aggression and the need to confront it. It’s a ruthless, brutal regime that has the blood of Americans, many others and including its own people on its hands.” Even worse, she said, “Its political rallies resound with cries of ‘Death to America.’ Its leaders talk about wiping Israel off the face of the map, most recently just yesterday, and foment terror against it. There is absolutely no reason to trust Iran.” She repeated that claim several times for emphasis: “They vow to destroy Israel. And that’s worth saying again. They vow to destroy Israel.” She vowed that in dealing with Iran, she will be tougher and more aggressive than Reagan was with the Soviet Union: “You remember President Reagan’s line about the Soviets: Trust but verify? My approach will be distrust and verify.” She also explicitly threatened Iran with war if they fail to comply: “I will not hesitate to take military action if Iran attempts to obtain a nuclear weapon, and I will set up my successor to be able to credibly make the same pledge.” She even depicted the Iran Deal as making a future war with Iran easier and more powerful:
  • ...4 more annotations...
  • Should it become necessary in the future having exhausted peaceful alternatives to turn to military force, we will have preserved and in some cases enhanced our capacity to act. And because we have proven our commitment to diplomacy first, the world will more likely join us. As for Israel itself, Clinton eagerly promised to shower it with a long, expensive, and dangerous list of gifts. Here’s just a part of what that country can expect from the second President Clinton: I will deepen America’s unshakeable commitment to Israel’s security, including our long standing tradition of guaranteeing Israel’s qualitative military edge. I’ll increase support for Israeli rocket and missile defenses and for intelligence sharing. I’ll sell Israel the most sophisticated fire aircraft ever developed. The F-35. We’ll work together to develop and implement better tunnel detection technology to prevent arms smuggling and kidnapping as well as the strongest possible missile defense system for Northern Israel, which has been subjected to Hezbollah’s attacks for years.
  • She promised she “will sustain a robust military presence in the [Persian Gulf] region, especially our air and naval forces.” She vowed to “increase security cooperation with our Gulf allies” — by which she means the despotic regimes in Saudi Arabia, United Arab Emirates and Qatar, among others. She swore she will crack down even further on Hezbollah: “It’s time to eliminate the false distinction that some still make between the supposed political and military wings. If you’re part of Hezbollah, you’re part of a terrorist organization, plain and simple.” Then she took the ultimate pledge: “I would not support this agreement for one second if I thought it put Israel in greater danger.” So even if the deal would benefit the U.S., she would not support it “for one second” if it “put Israel in greater danger.” That’s an unusually blunt vow to subordinate the interests of the U.S. to that foreign nation.
  • But when it comes to gifts to Israel, that’s not all! Echoing the vow of several GOP candidates to call Netanyahu right away after being elected, Clinton promised: “I would invite the Israeli prime minister to the White House during my first month in office to talk about all of these issues and to set us on a course of close, frequent consultation right from the start, because we both rely on each other for support as partners, allies and friends.” She then addressed “the people of Israel,” telling them: “Let me say, you’ll never have to question whether we’re with you. The United States will always be with you.” For good measure, she heaped praise on “my friend Chuck Schumer,” who has led the battle to defeat the Iran Deal, gushing about what an “excellent leader in the Senate” he will make. What’s a little warmongering among friends? Just as was true in her book, she implicitly criticized Obama — who boasts that he has bombed seven predominantly Muslim countries — of being insufficiently militaristic, imperialistic, and violent. She said she wanted more involvement in Syria from the start (though did not call for the U.S. to accept any of its refugees). In a clear rebuke to the current president, she decreed that any criticisms U.S. officials may utter of Israel should be done only in private (“in private and behind, you know, closed doors”), not in public, lest “it open[] the door to everybody else to delegitimize Israel to, you know, pile on in ways that are not good for the — the strength and stability, not just of Israel.” About Russia, she said, “I think we have not done enough” and put herself “in the category of people who wanted us to do more in response to the annexation of Crimea and the continuing destabilization of Ukraine.”
  • Two words that did not come out of Clinton’s mouth during the entire event: “Palestinians” (do they exist?) and “Libya” (that glorious war she supported that was going to be the inspiring template for future “humanitarian interventions” before it predictably destroyed that whole country).
  •  
    Glenn Greenwald tags Hillary pandering to the Chicken Hawk Party
Gary Edwards

The Empire Takes a Hit: NSA Update - 2 views

........................................................................................ NSA Conversation with retired lawyer and Open Source legal expert, "Marbux". ...........................

Federal-Reserve-Bankster-Cartel NSA

started by Gary Edwards on 15 Jun 13 no follow-up yet
Paul Merrell

Netanyahu and Trump: A Shared Focus on Terrorism « LobeLog - 0 views

  • Scholars of terrorism credit a specific 1979 symposium in Jerusalem as a turning point in the U.S. and international usage of “terrorism” as we understand it today. The Jonathan Institute, founded following the death of Benjamin Netanyahu’s brother Yonatan during a raid to rescue hostages from a PLO hijacking, hosted a 1979 conference in Jerusalem— and a follow up in 1984 in Washington—on “International Terrorism.” Directed by Benjamin Netanyahu, the Jonathan Institute maintained close ties to the Israeli government. Current and former Israeli officials across the political spectrum—including Golda Meir, Menachem Begin, Yitzhak Rabin, Ezer Weizman, Moshe Dayan, and Shimon Peres—dominated its administrative committee. Lisa Stampnitsky, in her 2013 book Disciplining Terror, discusses how the Jonathan Institute helped internationalize Israel’s use of the term to describe terrorist violence as both irrational and illegitimate in both means and ends, and as primarily targeting democracies and “the West.” Previously, she notes, terrorism referred largely to rational political violence, either state or individual, and was dealt with as an issue of criminality and law. The shift helped Israel delegitimize the political aims of certain groups, such as the Palestinian resistance to its colonization and territorial occupation. One cannot be a “freedom fighter” if one’s political aims are demonized as illegitimate or irrational. Stampnitsky argues that the shift to using terrorism to describe violence outside the law also set the stage for retaliatory strikes (such as the 1986 U.S. air strikes in Libya in response to a bombing at a Berlin disco that killed an American soldier) and eventually for the doctrine of preemptive force that has characterized the post-9/11 “War on Terror.”
  • Israel’s role in the development of a specifically anti-Muslim discourse of terrorism is deeply intertwined with the foreign policies of American politicians. As Deepa Kumar and others have pointed out, American neocons and Israel’s Likud party jointly developed a shared language around Islamic terrorism. The 1979 Jonathan Institute conference was attended by prominent American officials and political figures, including future President George H.W. Bush and representatives of the American Enterprise Institute, the Center for Strategic and International Studies, and Commentary magazine who brought the ideas, and later a follow-up conference, back to the U.S. Intended to serve as an intervention into the international discourse on terrorism, the explicit aim of the Jerusalem conference was to awaken the Western world to the problem of terrorism as defined by the conference organizers. It contributed to entrenching in the minds of American conservatives what was popularized a few years later as the “clash of civilizations,” firmly situating Israel in the category of Western democracies threatened by Soviets and Palestinians. The follow-up conference in the United States in 1984 went further by emphasizing the relationship between Islam and terror. As Netanyahu himself wrote in the book that came out of the conference: “the battle against terrorism was part of a much larger struggle, one between the forces of civilization and the forces of barbarism.” Then, as now, Netanyahu presented Israel as the bulwark against terrorism, a specific kind of illegitimate political violence that threatens not just Israel but all democracies and the Western world.
  • Echoes of this framing of the debate on terrorism can be found in how Western politicians, including Netanyahu and Trump, discuss the issue. Terrorism, which has no single agreed-upon definition in U.S. or international law, now serves as a moniker applied to all violence that established states deem illegitimate. Most often these days, Western democracies use “terrorism” to describe violence committed by Muslims. As journalist Glenn Greenwald writes, “In other words, any violence by Muslims against the West is inherently ‘terrorism,’ even if targeted only at soldiers at war and/or designed to resist invasion and occupation.” The term functions not as a descriptive tool but an ideological one. It doesn’t merely identify a particular kind of violence. It justifies and even requires a particular kind of forceful response by the state. Israel today presents itself as the world’s expert on counterterrorism. It maintains a profitable security industry predicated on selling expertise and technology tested in its interactions with Palestinians. American tax dollars have been funneled into this industry through U.S. military aid, over 25% of which Israel was allowed to spend domestically (the new military aid deal signed by the Obama White House will phase out this allowance over the next 10 years, sending the rest of the $3.8 billion per year to U.S. defense contractors). The United States and Israel collaborate on counterterrorism initiatives, including joint military exercises and police exchange programs. Here tactics and skills are developed and exchanged for surveillance and violent repression of protests that primarily impact Muslims and people of color in the U.S. and Palestinians and Black Jews in Israel.
  • ...1 more annotation...
  • In this context, Trump’s framing of his anti-Muslim immigration policies as a national security priority to keep out terrorists is nothing new. What is new in this political moment is the extent to which the U.S. public is seeing straight through this discourse and rallying against discrimination and bigotry. Ahead of Trump and Netanyahu’s meeting this week, there’s an opportunity to pay attention to how these discourses have enabled Israel to justify decades of military occupation and human rights abuses with the discourse of national security and counterterrorism. As the Trump administration goes back to the drawing board to devise restrictive immigration policies that will hold up in court, Netanyahu and Israel’s example shouldn’t be far from mind.
Gary Edwards

The secret corporate takeover of trade agreements | Business | The Guardian - 0 views

  • The US and the world are engaged in a great debate about new trade agreements. Such pacts used to be called free-trade agreements; in fact, they were managed trade agreements, tailored to corporate interests, largely in the US and the EU. Today, such deals are more often referred to as partnerships, as in the Trans-Pacific Partnership (TPP). But they are not partnerships of equals: the US effectively dictates the terms. Fortunately, America’s “partners” are becoming increasingly resistant. It is not hard to see why. These agreements go well beyond trade, governing investment and intellectual property as well, imposing fundamental changes to countries’ legal, judicial, and regulatory frameworks, without input or accountability through democratic institutions. Perhaps the most invidious – and most dishonest – part of such agreements concerns investor protection. Of course, investors have to be protected against rogue governments seizing their property. But that is not what these provisions are about. There have been very few expropriations in recent decades, and investors who want to protect themselves can buy insurance from the Multilateral Investment Guarantee Agency, a World Bank affiliate, and the US and other governments provide similar insurance. Nonetheless, the US is demanding such provisions in the TPP, even though many of its partners have property protections and judicial systems that are as good as its own.
  • The real intent of these provisions is to impede health, environmental, safety, and, yes, even financial regulations meant to protect America’s own economy and citizens. Companies can sue governments for full compensation for any reduction in their future expected profits resulting from regulatory changes. This is not just a theoretical possibility. Philip Morris is suing Uruguay and Australia for requiring warning labels on cigarettes. Admittedly, both countries went a little further than the US, mandating the inclusion of graphic images showing the consequences of cigarette smoking. The labeling is working. It is discouraging smoking. So now Philip Morris is demanding to be compensated for lost profits. In the future, if we discover that some other product causes health problems (think of asbestos), rather than facing lawsuits for the costs imposed on us, the manufacturer could sue governments for restraining them from killing more people. The same thing could happen if our governments impose more stringent regulations to protect us from the impact of greenhouse gas emissions.
  • When I chaired Bill Clinton’s council of economic advisers, when he was president, anti-environmentalists tried to enact a similar provision, called “regulatory takings”. They knew that once enacted, regulations would be brought to a halt, simply because government could not afford to pay the compensation. Fortunately, we succeeded in beating back the initiative, both in the courts and in the US Congress. But now the same groups are attempting an end run around democratic processes by inserting such provisions in trade bills, the contents of which are being kept largely secret from the public (but not from the corporations that are pushing for them). It is only from leaks, and from talking to government officials who seem more committed to democratic processes, that we know what is happening.
  • ...3 more annotations...
  • Fundamental to America’s system of government is an impartial public judiciary, with legal standards built up over the decades, based on principles of transparency, precedent, and the opportunity to appeal unfavourable decisions. All of this is being set aside, as the new agreements call for private, non-transparent, and very expensive arbitration. Moreover, this arrangement is often rife with conflicts of interest; for example, arbitrators may be a judge in one case and an advocate in a related case. The proceedings are so expensive that Uruguay has had to turn to Michael Bloomberg and other wealthy Americans committed to health to defend itself against Philip Morris. And, though corporations can bring suit, others cannot. If there is a violation of other commitments – on labour and environmental standards, for example – citizens, unions, and civil society groups have no recourse. If there ever was a one-sided dispute-resolution mechanism that violates basic principles, this is it. That is why I joined leading US legal experts, including from Harvard, Yale, and Berkeley, in writing a letter to Barack Obama explaining how damaging to our system of justice these agreements are.
  • American supporters of such agreements point out that the US has been sued only a few times so far, and has not lost a case. Corporations, however, are just learning how to use these agreements to their advantage. And high-priced corporate lawyers in the US, Europe and Japan will likely outmatch the underpaid government lawyers attempting to defend the public interest. Worse still, corporations in advanced countries can create subsidiaries in member countries through which to invest back home, and then sue, giving them a new channel to bloc regulations. If there were a need for better property protection, and if this private, expensive dispute-resolution mechanism were superior to a public judiciary, we should be changing the law not just for well heeled foreign companies but also for our own citizens and small businesses. But there has been no suggestion that this is the case.
  • Rules and regulations determine the kind of economy and society in which people live. They affect relative bargaining power, with important implications for inequality, a growing problem around the world. The question is whether we should allow rich corporations to use provisions hidden in so-called trade agreements to dictate how we will live in the 21st century. I hope citizens in the US, Europe and the Pacific answer with a resounding no. Joseph Stiglitz, a Nobel laureate in economics, is a professor at Columbia University. His most recent book, co-authored with Bruce Greenwald, is Creating a Learning Society: A New Approach to Growth, Development, and Social Progress
  •  
    Economist Joseph Stiglitz takes on the TPP (Trans Pacific Partnership) trade agreement, explaining how corporations will use the agreement to side step environmental and regulatory laws of sovereign nations. Amazing stuff. No doubt Wall Street Money is behind these trade agreement. The Banksters are said to own over 40% of the world's corporations and these agreements are designed to establish corporate sovereignty while greatly diminishing state sovereignty. It's the New World Order. "Terms such as 'investor' and 'partner' are taking on new meanings as multinationals manipulate deals to take legal action against sovereign states"
Paul Merrell

In Letter to Obama, Cisco CEO Complains About NSA Allegations | Re/code - 0 views

  • Warning of an erosion of confidence in the products of the U.S. technology industry, John Chambers, the CEO of networking giant Cisco Systems, has asked President Obama to intervene to curtail the surveillance activities of the National Security Agency. In a letter dated May 15 (obtained by Re/code and reprinted in full below), Chambers asked Obama to create “new standards of conduct” regarding how the NSA carries out its spying operations around the world. The letter was first reported by The Financial Times. The letter follows new revelations, including photos, published in a book based on documents leaked by former NSA contractor Edward Snowden alleging that the NSA intercepted equipment from Cisco and other manufacturers and loaded them with surveillance software. The photos, which have not been independently verified, appear to show NSA technicians working with Cisco equipment. Cisco is not said to have cooperated in the NSA’s efforts.
1 - 20 of 21 Next ›
Showing 20 items per page