Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Hoover

Rss Feed Group items tagged

Paul Merrell

FBI monitored and critiqued African American writers for decades | Books | The Guardian - 0 views

  • Newly declassified documents from the FBI reveal how the US federal agency under J Edgar Hoover monitored the activities of dozens of prominent African American writers for decades, devoting thousands of pages to detailing their activities and critiquing their work. Academic William Maxwell first stumbled upon the extent of the surveillance when he submitted a freedom of information request for the FBI file of Claude McKay. The Jamaican-born writer was a key figure in the Harlem Renaissance, author of the sonnet If We Must Die, supposedly recited by Winston Churchill, and Maxwell was preparing an edition of his complete poems. When the file came through from the FBI, it stretched to 193 pages and, said Maxwell, revealed “that the bureau had closely read and aggressively chased McKay” – describing him as a “notorious negro revolutionary” – “all across the Atlantic world, and into Moscow”.
  • Maxwell, associate professor of English and African American studies at Washington University in St Louis, decided to investigate further, knowing that other scholars had already found files on well-known black writers such as Langston Hughes and James Baldwin. He made 106 freedom of information requests about what he describes as “noteworthy Afro-modernists” to the FBI; 51 of those writers had files, ranging from three to 1,884 pages each. “I suspected there would be more than a few,” said Maxwell. “I knew Hoover was especially impressed and worried by the busy crossroads of black protest, leftwing politics, and literary potential. But I was surprised to learn that the FBI had read, monitored, and ‘filed’ nearly half of the nationally prominent African American authors working from 1919 (Hoover’s first year at the Bureau, and the first year of the Harlem Renaissance) to 1972 (the year of Hoover’s death and the peak of the nationalist Black Arts movement). In this, I realised, the FBI had outdone most every other major institution of US literary study, only fitfully concerned with black writing.”
  • Maxwell’s book about his discovery, FB Eyes: How J Edgar Hoover’s Ghostreaders Framed African American Literature, is out on 18 February from Princeton University Press. It argues that the FBI’s attention was fuelled by Hoover’s “personal fascination with black culture”, that “the FBI is perhaps the most dedicated and influential forgotten critic of African American literature”, and that “African American literature is characterised by a deep awareness of FBI ghostreading”.
  • ...2 more annotations...
  • Digital copies of 49 of the FBI files have been made available to the public online. “The collected files of the entire set of authors comprise 13,892 pages, or the rough equivalent of 46 300-page PhD theses,” Maxwell writes in the book. “FBI ghostreaders genuinely rivalled the productivity of their academic counterparts.” The academic told the Guardian that he believes the FBI monitoring stems from the fact that “from the beginning of his tenure at the FBI ... Hoover was exercised by what he saw as an emerging alliance between black literacy and black radicalism”.
  • The files show how the travel arrangements of black writers were closely scrutinised by the FBI, with the passport records of a long list of authors “combed for scraps of criminal behaviour and ‘derogatory information’”, writes Maxwell. Some writers were threatened by “‘stops’, instructions to advise and defer to the Bureau if a suspect tried to pass through a designated point of entry” to the US.
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Gary Edwards

The Mythical Banking Crisis and the Failure of the New Deal :: The Mises Economics Blog... - 0 views

  •  
    Everything you know about FDR, The New Deal and the Great Depression Banking Crisis is wrong!!!! "From David Stockman's Contra Corner. Remarks to the Committee For The Republic, Washington DC, February 2014 (Part 4 in a 6-Part Series) Go to Part 1. The Great Depression thus did not represent the failure of capitalism or some inherent suicidal tendency of the free market to plunge into cyclical depression-absent the constant ministrations of the state through monetary, fiscal, tax and regulatory interventions.  Instead, the Great Depression was a unique historical occurrence-the delayed consequence of the monumental folly of the Great War, abetted by the financial deformations spawned by modern central banking. But ironically, the "failure of capitalism" explanation of the Great Depression is exactly what enabled the Warfare State to thrive and dominate the rest of the 20th century because it gave birth to what have become its twin handmaidens--Keynesian economics and monetary central planning. Together, these two doctrines eroded and eventually destroyed the great policy barrier--that is, the old-time religion of balanced budgets- that had kept America a relatively peaceful Republic until 1914. To be sure, under Mellon's tutelage, Harding, Coolidge and Hoover strove mightily, and on paper successfully, to restore the pre-1914 status quo ante on the fiscal front.  But it was a pyrrhic victory-since Mellon's surpluses rested on an artificially booming, bubbling economy that was destined to hit the wall. The Hoover Recovery of 1932 Worse still, Hoover's bitter-end fidelity to fiscal orthodoxy, as embodied in his infamous balanced budget of June 1932, got blamed for prolonging the depression.  Yet, as I have demonstrated in the chapter of my book called "New Deal Myths of Recovery", the Great Depression was already over by early summer 1932."
Paul Merrell

Is NSA spying really about blackmail? | This Can't Be Happening! - 0 views

  • A revealing page-one article in today’s New York Times (“Tap on Merkel Provides Peek a Vast Spy Net”) reports on how the NSA’s global spying program, dating back at least to early in the Bush/Cheney administration, was vacuuming up the phone conversations (and no doubt later the internet communications) of not just leaders like German Chancellor Angela Merkel, but opposition leader Merkel before her party took power in Germany. As the Times puts it, the phone monitoring, which actually dates back to the Cold War Era before 1990, “is hardly limited to the 35 leaders of countries like Germany, and also includes their top aides and the heads of opposing parties.” That’s pretty far-reaching, and the paper says that it has learned, primarily courtesy of revelations from the documents released by fugitive whistleblower Edward Snowden, that the spying went even beyond that, to target up-and-coming potential leaders of so-called “friendly states.”
  • What the Times does not ask in its entire report on this spying program on leaders and potential leaders is whether there could be another motive for this extraordinary spying campaign on leaders: blackmail.
  • How else to explain the remarkably tepid response from the leaders who are the victims of this spying by the NSA on their private communications? How else to explain Europe’s unwillingness to grant sanctuary to Snowden, who after all has allowed them to know about the perfidy of the US? How else to explain Europe’s supine acquiescence to the US in its criminal wars against Iraq and Afghanistan, and its unquestioning support of Israel?
  •  
    The author goes on to raise the question whether NSA surveillance is also being used to blackmail U.S. leaders. This is a question that has been on my mind too. Certainly, J. Edgar Hoover used the apparatus of the FBI to assemble dossiers on U.S. leaders; that was the key to his power, the knowledge that he had the ability to end the political careers of elected officials. Hoover and the FBI also played a key role in the COINTELPRO abusive surveillance, disruption, and sabotage efforts aimed at peace, environmental, and black activists and leaders, along with the NSA and CIA, that was thoroughly aired in the 1976 Church Committee hearings. See https://en.wikipedia.org/wiki/COINTELPRO  
Gary Edwards

The Age of Prosperity Is Over - WSJ.com - 0 views

  •  
    According to Reagan Economist Arthur Laffer: This administration and Congress will be remembered like Herbert Hoover. Twenty-five years down the line, what this administration and Congress have done will be viewed in much the same light as what Herbert Hoover did in the years 1929 through 1932. Whenever people make decisions when they are panicked, the consequences are rarely pretty. We are now witnessing the end of prosperity.
Paul Merrell

PoppyLeaks, Part 1 - WhoWhatWhy - 0 views

  • The Story of Bush 41 the Establishment Won’t Publish
  • A particular memo caught his eye, and he leaned in for a closer look. Practically jumping off the screen was a memorandum from FBI director J. Edgar Hoover, dated November 29, 1963. Under the subject heading “Assassination of President John F. Kennedy,” Hoover reported that, on the day after JFK’s murder, the bureau had provided two individuals with briefings. One was “Captain William Edwards of the Defense Intelligence Agency.” The other: “Mr. George Bush of the Central Intelligence Agency.”
  • McBride shook his head. George H.W. Bush? In the CIA in 1963? Dealing with Cubans and the JFK assassination? Could this be the same man who was now vice president of the United States? Even when Bush was named CIA director in 1976 amid much agency-bashing, his primary asset had been the fact that he was not a part of the agency during the coups, attempted coups, and murder plots in Iran, Cuba, Chile, and other hot spots about which embarrassing information was being disclosed every day in Senate hearings.
  • ...3 more annotations...
  • Bush served at the CIA for one year, from early 1976 to early 1977. He worked quietly to reverse the Watergate-era reforms of CIA practices, moving as many operations as possible offshore and beyond accountability. Although a short stint, it nevertheless created an image problem in 1980 when Bush ran unsuccessfully for the Republican presidential nomination against former California governor Ronald Reagan. Some critics warned of the dangerous precedent in elevating someone who had led the CIA, with its legacy of dark secrets and covert plots, blackmail and murder, to preside over the United States government.
  •  George H.W. Bush: Spy from the age of 18 Almost a decade would pass between Bush’s election in 1988 and the declassification and release in 1996 of another government document that shed further light on the matter. This declassified document would help to answer some of the questions raised by the ’63 Hoover memo — questions such as, “If George Herbert Walker Bush was already connected with the CIA in 1963, how far back did the relationship go?”But yet another decade would pass before this second document would be found, read, and revealed to the public. Fast-forward to December 2006, on a day when JFK researcher Jerry Shinley sat, as he did on so many days, glued to his computer, browsing through the digitized database of documents on the Web site of the Mary Ferrell Foundation.On that December day, Shinley came upon an internal CIA memo that mentioned George H.W. Bush [the Bush designated Director of Central Intelligence (DCI)]. Dated November 29, 1975, it reported, in typically spare terms, the revelation that the man who was about to become the head of the CIA actually had prior ties to the agency. And the connection discussed here, unlike that unearthed by McBride, went back not to 1963, but to 1953 — a full decade earlier. Writing to the chief of the spy section of the analysis and espionage agency, the chief of the “cover and commercial staff” noted:
  • Through Mr. Gale Allen … I learned that Mr. George Bush, DCI designate has prior knowledge of the now terminated project WUBRINY/LPDICTUM which was involved in proprietary commercial operations in Europe. He became aware of this project through Mr. Thomas J. Devine, a former CIA Staff Employee and later, oil-wildcatting associate with Mr. Bush. Their joint activities culminated in the establishment of Zapata Oil [sic] [in 1953] which they eventually sold. After the sale of Zapata Oil, Mr. Bush went into politics, and Mr. Devine became a member of the investment firm of Train, Cabot and Associates, New York … The attached memorandum describes the close relationship between Messrs. Devine and Bush in 1967-1968 which, according to Mr. Allen, continued while Mr. Bush was our ambassador to the United Nations.In typical fashion for the highly compartmentalized and secretive intelligence organization, the memo did not make clear how Bush knew Devine, or whether Devine was simply dropping out of the spy business to become a true entrepreneur. For Devine, who would have been about twenty-seven years old at the time, to “resign” at such a young age, so soon after the CIA had spent a great deal of time and money training him was, at minimum, highly unusual. It would turn out, however, that Devine had a special relationship allowing him to come and go from the agency, enabling him to do other things without really leaving its employ. In fact, CIA history is littered with instances where CIA officers have tendered their “resignation” as a means of creating deniability while continuing to work closely with the agency …
Paul Merrell

interfluidity » Tradeoffs - 0 views

  • I think it is not coincidental that support for the security state is highly correlated with seniority and influence, in both of our increasingly irrelevant political parties. The apparatus we are constructing, have constructed, creates incredible scope for digging up dirt on people and their spouses, their children, their parents. It doesn’t take much to manage the shape of the economy of influence. There are, how shall we say, network effects.
  • I’m going to excerpt a bit from a great, underdiscussed piece by Beverly Gage: [J. Edgar] Hoover exercised powerful forms of control over potential critics. If the FBI learned a particularly juicy tidbit about a congressman, for instance, agents might show up at his office to let him know that his secrets—scandalous as they might be—were safe with the bureau. This had the predictable effect: Throughout the postwar years, Washington swirled with rumors that the FBI had a detailed file on every federal politician. There was some truth to the accusation. The FBI compiled background information on members of Congress, with an eye to both past scandals and to political ideology. But the files were probably not as extensive or all-encompassing as people believed them to be. The point was that it didn’t matter: The belief alone was enough to keep most politicians in line, and to keep them voting yes on FBI appropriations. Today, James Bamford quotes a former senior CIA official, describing current spymaster Keith Alexander: We jokingly referred to him as Emperor Alexander — with good cause, because whatever Keith wants, Keith gets… We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else. Bribery and blackmail go together, of course. The carrot and the stick.
  • This is not, ultimately, a story about evil individuals. The last thing I want to do with my time is get into an argument over the character of our President. I could care less. The problem we face here is social, institutional. Bribery, blackmail, influence peddling, flattery — these have always been and always will be part of any political landscape. Our challenge is to minimize the degree to which they corrupt the political process. “Make better humans” is not a strategy that is likely succeed. “Find better leaders” is just slightly less naive. Institutional problems require institutional solutions. We did manage to reduce the malign influence of the J. Edgar Hoover security state, by placing institutional checks on what law enforcement and intelligence agencies could do, and by placing those agencies under more public and intrusive supervision. I think that much of our task today is devising a sufficient surveillance architecture for our surveillance architecture. But as we are talking about all this, let’s remember what we are talking about. We are not talking about a tradeoff between “security” and “privacy”. That framing is a distraction. Our current path is to pay for (alleged) security by acquiescence to increasingly corrupt and corruptible governance. We ought to ask ourselves whether a very secure, very corrupt state is better than the alternatives, whether security for corruption is a tradeoff we are willing to make.
Paul Merrell

Leahy: NSA surveillance 'not making us safer' | TheHill - 0 views

  • Sen. Patrick Leahy (D-Vt.) warned about the government’s collection of massive quantities about data about American citizens on Wednesday.During a panel discussion titled “The Big Brother Problem" at the World Economic Forum in Davos, Switzerland, Leahy said government officials “don’t make ourselves safer by wiretapping or investigating every single person.”“In the United States, which should be one of the freest countries to express yourself, we are collecting far too much information,” the Senate Judiciary Committee chairman said. “It is not making us safer.”ADVERTISEMENTLeahy also compared the dangers posed by the National Security Agency’s (NSA) collection of information to abuses conducted by former longtime FBI Director J. Edgar Hoover or the Nixon administration during the Watergate scandal.“Just because we can do it in the United States doesn’t mean we should,” he told the panel. “I don’t think it makes us safer any more than the horrible excesses of Watergate and J. Edgar Hoover and all made us safer. It made us less safe.”
Gary Edwards

NONE DARE CALL IT CONSPIRACY  by Gary Allen - 1 views

  •  
    "NONE DARE CALL IT CONSPIRACY" - Web Version Copyright © 1971 by Gary Allen with Larry Abraham  ISBN: 0899666612 Sourced INTRODUCTION 1. DON'T CONFUSE ME WITH FACTS 2. SOCIALISM - ROYAL ROAD TO POWER FOR THE SUPER-RICH 3. THE MONEY MANIPULATORS 4. BANKROLLING THE BOLSHEVIK REVOLUTION 5. ESTABLISHING THE ESTABLISHMENT 6. THE ROCKEFELLERS AND THE REDS 7. PRESSURE FROM ABOVE AND PRESSURE FROM BELOW 8. YOU ARE THE ANSWER     FOURTEEN SIGNPOSTS TO SLAVERY     WHAT WILL YOU DO?     MEMBERS OF THE COUNCIL ON FOREIGN RELATIONS NOMINATED AND APPOINTED BY PRESIDENT NIXON TO GOVERNMENT POSTS     OPERATION COUNTERATTACK WHAT THOSE "IN THE KNOW" SAY I wish that every citizen of every country in the free world and every slave behind the Iron Curtain might read this book. Ezra Taft Benson - Former Secretary of Agriculture NDCC is an admirable job of amassing information to prove that communism is socialism and socialism (a plot to enslave the world) is not a movement of the downtrodden but a scheme supported and directed by the wealthiest of people. If enough Americans read and act upon NDCC, they really can save the Republic from the conspirators - whose plans for the destruction of our country are galloping fast toward completion. Dan Smoot - Former Assistant to J. Edgar Hoover Now that NDCC is available, I no longer need to answer "no" to the question which is often put to me, namely: "Mr. Dodd, is there a book which I can read so I can know what you know?" No higher praise is possible for this book. Norman Dodd - Chief Investigator Reece Committee to Investigate Foundations This book concerns the way in which our nation and other nations are actually governed. As Benjamin Disaeli said, this is not the way in which most people think nations are governed. The whole subject of the Insiders who so largely control our political and economic lives is a fascinating mystery. For the reader who is intelligent but uninitiated in the literature of super
Gary Edwards

Boxworks 2013: New Box Preview Converts Documents Into HTML5 - 1 views

  •  
    "Who Killed JFK?" is a new book from investigative reporter, Jerome Corsi. This first interview with Corsi was outstanding! (There are three mp3's available on request). The Dallas assacination was the third attempt to kill JFK, and Corsi insists that JFK was aware of the first two attempts. JFK knew the risk of going to Dallas. The first attempt was in Chicago, followed by one in Tampa Bay in August. The coupe was carried out by the CIA and primary planners included the Dulles brothers, Lyndon Johnson, Herbert Hoover, General Curtis Lemay as well as key mafia figures. The plan itself was a copy of a 1957 CIA coupe in Ecuador, hatched by E Howard Hunt. And yes, both Nixon and Poppy Bush were in Dallas that fateful weekend. Date: 09-17-13 excerpt: As we prepare for the 50th anniversary of the JFK assassination, author and columnist Jerome Corsi discussed his extensive research into the killing of Kennedy. The ballistics evidence proves that more than one shooter was involved, and that the lone gunman theory is false, he said. When Kennedy was brought into the Parkland Hospital after the shooting, the doctors recorded an entrance wound in the front of the head. But in examining frames from the end of the Zapruder film, when the car was about to go under the underpass, you can see the back of JFK's head is blown out. Lee Harvey Oswald, shooting supposedly from the Book Depository, was positioned behind Kennedy, and therefore couldn't have been the only shooter, Corsi stated. "A shot from the front means there was two shooters at least." One reason for JFK's assassination was that he wouldn't go along with an arranged New World Order, and refused to use the US military to support business interests, and he planned to dismantle the CIA, Corsi outlined. He named Allen Dulles, the former head of the CIA, as one of the planners of the JFK assassination and detailed how that in addition to Dallas, there were 2 other attempts to kill the President in November 1963
  •  
    Wrong link and title here, Gary.
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Gary Edwards

Volcker: A "Little Inflation" Is A Terrible Idea - 0 views

  •  
    Henry Blodgett picks up Paul Volkers comments on inflation ".....The government would quietly but desperately love to inflate our way out of this mess--destroying the dollar so the real burden of our mountain of debt shrivels to a molehill.  This remedy, of course, would punish everyone who has saved up a nest egg or lives on a fixed-income, but they're likely to be considered an expendable minority...." There is also a link on this page to the Aron Task interview with Peter Schiff, "The stimulous bill will lead to unmitigated disaster." http://www.businessinsider.com/2009/2/peter-schiff-stimulus-bill-will-lead-to-unmitigated-disaster Peter compares Bush to Hoover and Obama to Roosevelt, predicting an unmitigated disaster; a depression with hyperinflation. He argues that the great depression was tempered by the fact that government spending and intervention was limited by the godl standard. Today, the Federal Reserve has no such limitation!
Gary Edwards

Four Horseman of Fear II - What's News Tonight - 0 views

  •  
    Amity Schlaes, author, "The Forgotten Man," re the mistakes made by Herbert Hoover and/or FDR in 1931-1934 that deepened the recession into the Great Depression.  Amity identified the four errors, what I call the four horseman, as taxes, protectionism, class warfare, and the abuse of private capital so that it leaves the marketplace.  One of these four is already in place in the closing weeks of the Bush administration as a result of the extraordinary bullying session of October 13 at the grandiose office of Hank Paulson at Treasury when the nine biggest banks in the country were forced to accept Treasury billions in exchange for accepting the regulations and unknowns of the executive and the legislative branches.  Private capital is no longer safe from Congress, and in the 1930s the effect was to drive private capital into hiding.  
Gary Edwards

How Tax Day Became Payday | The Foundry: Conservative Policy News. - 0 views

  •  
    Ok, this goes into the must read category. I don't however agree with the proposed solution. There's no mention that governments must stop spending money they don't have. Stop the borrowing. Cut the spending. Cut payroll, pension and healthcare spending. Privatize. Return Federal assets to the States, and let them handle the leasing and privatization. Flatten the tax code. Eliminate corporate and unearned (investment) income taxes.  When this country came out of WWII, there was great apprehension that the great depression would simply pick up where it left off. These concerns led to a break with the Hoover-Roosevelt big and bigger government - tax and spend approach. Congress moved to cut taxes and level the margins. Depression over.  excerpt:  Today the Federal government is carrying an even bigger debt per GDP than the cost of WWII had left us with! The out of control spending has to stop. For just over half of all Americans today is Tax Day. But for the other half it is just another day on the calendar. That's because they pay no federal income taxes. The old saying goes "you can't get something for nothing." But these "non-payers" receive government services and benefits without chipping in.
Gary Edwards

Why the Debt Crisis Is Even Worse Than You Think - BusinessWeek - 0 views

  •  
    For all our obsessing about it, the national debt is a singularly bad way of measuring the nation's financial condition. It includes only a small portion of the nation's total liabilities. And it's focused on the past. An honest assessment of the country's projected revenue and expenses over the next generation would show a reality different from the apocalyptic visions conjured by both Democrats and Republicans during the debt-ceiling debate. It would be much worse. That's why the posturing about whether and how Congress should increase the debt ceiling by Aug. 2 has been a hollow exercise. Failure to increase the borrowing limit would harm American prestige and the global financial system. But that's nothing compared with the real threats to the U.S.'s long-term economic health, which will begin to strike with full force toward the end of this decade: Sharply rising per-capita health-care spending, coupled with the graying of the populace; a generation of workers turning into an outsize generation of beneficiaries. Hoover Institution Senior Fellow Michael J. Boskin, who was President George H.W. Bush's chief economic adviser, says: "The word 'unsustainable' doesn't convey the problem enough, in my opinion." Even the $4 trillion "grand bargain" on debt reduction hammered out by President Barack Obama and House Speaker John Boehner (R-Ohio)-a deal that collapsed nearly as quickly as it came together-would not have gotten the U.S. where it needs to be. A June analysis by the Congressional Budget Office concluded that keeping the U.S.'s ratio of debt to gross domestic product at current levels until the year 2085 (to avoid scaring off investors) would require spending cuts, tax hikes, or a combination of both equal to 8.3 percent of GDP each year for the next 75 years, vs. the most likely (i.e. "alternative") scenario. That translates to $15 trillion over the next decade-or more than three times what Obama and Boehner we
Gary Edwards

Lipsky: Obama Making Same Mistakes That Led to Great Depression - 0 views

  •  
    Interview with Seth Lipsky, former Wall street Asia - NY Sun editor, and journalist.  Seth explains the constitutional requirements that Congress control and protect a hard currency.  He also explains his support for Ron Paul, the Paul-Perry-Cain "flat tax" proposals, and the Federal Reserve Bankster Cartel.  Hard to believe Seth worked for the Wall Street Journal, otherwise known as the globalist bankster voice.  IMHO, no one has done more to confuse the public with free market - capitalism posturing while promoting outrageous banksterism, crony capitalism and a militaristic global corporatism that threatens the sovereignty of the USA than the WSJ.  Seth however is great. excerpt: The founding fathers named the U.S. currency after a coin called a Spanish-milled dollar, which represented 371.25 grains of pure silver, and put protecting its value in the hands of Congress. "They meant the dollar to be a measure of value and in fact they gave Congress the power to coin money and regulate the value thereof in the same sentence of the Constitution in which they gave Congress the power to fix the standards of weights and measures," Lipsky told Newsmax.TV. _________________________________________________________ Editor's note: To get 'It Shines for All' at a great price - Click Here Now. _________________________________________________________  "What the reform movement that we have been covering in The Sun wants Congress to do is to step up to that Constitutional responsibility to establish a proper value to the dollar, and then we wouldn't have to worry about inflation and rising prices," he said. "We would have to conduct the government's budgetary operations in a way that didn't result in a collapse in the value of our currency," said Lipsky. Under President Obama, the White House has enacted stimulus measures to incentivize job creation while the Federal Reserve has flooded the economy with money and swollen its balance sheet in an effort to spur
Paul Merrell

Why Does Anyone Trust the National-Security State? - Conor Friedersdorf - The Atlantic - 0 views

  • The ongoing debate about the national-security state's conduct drills down, for many participants, to this question: How much do you trust the people in charge? Do you believe they'll reliably uphold the laws and norms of a free society? Or do you think that, permitted enough secrecy, they'll break U.S. laws and violate rights? For me, it isn't a close call. The United States needs protection from the people protecting it, always has, and always will. The character of the president isn't the issue. Neither are the individuals running the FBI, CIA, NSA, JSOC, or the Department of Homeland Security. It wouldn't matter if the national-security state was staffed from top to bottom with people I could hand select based on my esteem for their character. Letting them operate in secret would still be dangerous.
  • That conclusion isn't something I've derived in the abstract from political philosophy. The best reason to mistrust the national-security state is its track record. Abuses at the FBI, CIA, and NSA go back a long way, as any student of the J. Edgar Hoover era or the Church Committee report can attest in shocking detail. There's no reason to think that generation was more prone to misbehave than ours. But one needn't look to past generations to find good reasons for mistrust. The War on Terrorism is full of them.
  •  
    Excellent essay on why the national security folk deserve no trust.
Paul Merrell

Nunn-Lugar Revisited - 0 views

  • Washington, DC, November 22, 2013 – The final shipment of highly enriched uranium from former Soviet nuclear warheads to the U.S. on November 14, and President Obama's award of the Presidential Medal of Freedom to former Senator Richard Lugar on November 20, have brought new public attention to the underappreciated success story of the Nunn-Lugar initiative — the subject of a new research project by the National Security Archive, which organized the first "critical oral history" gathering this fall of U.S. and Russian veterans of Nunn-Lugar. The former Soviet Union in the 1990s achieved an unprecedented "proliferation in reverse" with the denuclearization of former republics and the consolidation of nuclear weapons and fissile material inside Russia. Notwithstanding the well-grounded fears of policymakers on both sides of the waning Cold War in 1990-1991, the dissolution of the Soviet Union did not result in a nuclear Yugoslavia spread over eleven time zones. Instead, the "doomsday clock" of the Bulletin of the Atomic Scientists marched backwards, in its largest leaps ever away from midnight. Key to this extraordinary accomplishment was the U.S.-Russian Cooperative Threat Reduction Program, colloquially known as Nunn-Lugar after its two leading sponsors in the U.S. Senate, Sam Nunn of Georgia and Richard Lugar of Indiana.
  • Unfortunately, this success did not get major publicity at the time, and remains largely unknown today outside the expert communities in both countries. This lack of appreciation culminated in 2012 with Russia's withdrawal from the program and assertion of independence from foreign aid. Yet below the radar the cooperation continued, for example with the February 2013 U.S.-Russian removal of enriched uranium from the Czech Republic, and the September 2013 agreement to work together to destroy Syrian chemical weapons — clear signals of the continuing relevance of the two-decade-long Nunn-Lugar experiment.
  • One week earlier, on November 14, the Washington Post reported from St. Petersburg, Russia: "Take a canister, fill it with down-blended uranium worth $2.5 million, secure it and 39 others to the deck of a container ship, send it off toward Baltimore, and you've just about completed a deal that provided commercial uses in the United States for the remains of 20,000 dismantled Russian nuclear bombs." The story, headlined "U.S.-Russia uranium deal sends its last shipment," by Will Englund, reported: "The program provided jobs to nuclear technicians at a time when Russia was in chaos; it sparked the development of a dilution process than enables bombs to become fuel for power plants; and it may have helped to keep poorly secured nuclear materials out of the wrong hands — at least that's what Americans say. Russians strongly deny that the materials were not secured."
  • ...2 more annotations...
  • To ground the Musgrove discussions in the primary sources, Archive staff prepared a 450-page conference briefing book containing 70 key documents, primarily on the early Nunn-Lugar years from 1991 through 1997, but also including the March 2013 summary of Nunn-Lugar success that is featured on The Lugar Center website. The documents range from telcons of President George H. W. Bush's conversations with then-Soviet leader Mikhail Gorbachev about safe dismantling of nuclear warheads in 1991, to the memcons of the Bush meetings with Russian President Boris Yeltsin in 1992 on nuclear weapons withdrawal from the former Soviet republics, to the State Department cables about negotiations with Ukraine over the Soviet-era nuclear weapons located there. Sources of the documents range from Freedom of Information Act requests to the Bush Presidential Library, to donations by veterans such as Ambassador James Goodby and experts such as David Hoffman, to files at the Archives of the Russian Federation in Moscow and at the Hoover Institution at Stanford.
  • Today's posting is the first in the Nunn-Lugar series of electronic briefing books in Russian and English that will make widely available the documents from all sides. The transcripts of the "critical oral history" conferences organized by the Archive will provide the foundation for one or more books analyzing the Nunn-Lugar experience, and will guide further research both by the Archive staff and by the conference participants. Maintaining this expert dialogue about the cooperative threat reduction experience will also make a significant contribution to the ongoing challenge of U.S.-Russia engagement.
  •  
    Nice graphic image on the linked web page breaking down accomplishments in  nuclear disarmament by former Soviet republics. The downside: all of those former Soviet warheads had their uranium diluted and exported to the U.S. for manufacturer of nuclear fuel rods, which means that the U.S. nuclear power industry was perpetuated and our legacy of radioactive wastes continues to grow, despite not even yet having a safe disposal site or method. All of those expended nuclear fuel rods still sitting on reactor sites around the nation, being water cooled, and posing the risk of Fukushima-like disasters. This is progress?  
Paul Merrell

How NSA Can Secretly Aid Criminal Cases | Consortiumnews - 0 views

  • Though the NSA says its mass surveillance of Americans targets only “terrorists,” the spying may turn up evidence of other illegal acts that can get passed on to law enforcement which hides the secret source through a ruse called “parallel construction,” writes ex-CIA analyst Ray McGovern. By Ray McGovern Rarely do you get a chance to ask a just-retired FBI director whether he had “any legal qualms” about what, in football, is called “illegal procedure,” but at the Justice Department is called “parallel construction.” Government wordsmiths have given us this pleasant euphemism to describe the use of the National Security Agency’s illegal eavesdropping on Americans as an investigative tool to pass on tips to law enforcement agencies which then hide the source of the original suspicion and “construct” a case using “parallel” evidence to prosecute the likes of you and me.
  • For those interested in “quaint” things like the protections that used to be afforded us by the Fourth and Fifth Amendments to the Constitution, information about this “parallel construction” has been in the public domain, including the “mainstream media,” for at least a year or so. So, I welcomed the chance to expose this artful practice to still more people with cameras rolling at a large conference on “Ethos & Profession of Intelligence” at Georgetown University on Wednesday, during the Q & A after former FBI Director Robert Mueller spoke. Mueller ducked my question regarding whether he had any “legal qualms” about this “parallel construction” arrangement. He launched into a discursive reply in which he described the various ”authorities” enjoyed by the FBI (and the CIA), which left the clear impression not only that he was without qualms but that he considered the practice of concealing the provenance of illegally acquired tip-off information somehow within those professed “authorities.”
  • Bottom line? Beware, those of you who think you have “nothing to hide” when the NSA scoops up your personal information. You may think that the targets of these searches are just potential “terrorists.” But the FBI, Internal Revenue Service, Drug Enforcement Administration and countless other law enforcement bodies are dipping their cursors into the huge pool of mass surveillance.
  • ...8 more annotations...
  • Former FBI Division Counsel in Minneapolis Coleen Rowley – who, with Jesselyn Radack, Tom Drake and me, visited Snowden in Russia last October – told me of two legal doctrines established many decades ago: the “exclusionary rule” and the rule regarding the “fruit of the poisonous tree.” These were designed to force over-zealous law enforcement officers to adhere to the Constitution by having judges throw out cases derived from improperly obtained evidence. To evade this rule, law enforcement officials who have been on the receiving end of NSA’s wiretap data must conceal what tipped off an investigation.
  • Last week a journalist asked me why I thought Congress’ initial outrage – seemingly genuine in some quarters – over bulk collection of citizens’ metadata had pretty much dissipated in just a few months. What started out as a strong bill upholding Fourth Amendment principles ended up much weakened with only a few significant restraints remaining against NSA’s flaunting of the Constitution? Let me be politically incorrect and mention the possibility of blackmail or at least the fear among some politicians that the NSA has collected information on their personal activities that could be transformed into a devastating scandal if leaked at the right moment. Do not blanch before the likelihood that the NSA has the book on each and every member of Congress, including extramarital affairs and political deal-making. We know that NSA has collected such information on foreign diplomats, including at the United Nations in New York, to influence votes on the Iraq War and other issues important to U.S. “national security.”
  • We also know how the late FBI Director J. Edgar Hoover used much more rudimentary technology a half century ago to develop dossiers on the personal indiscretions of political and ideological opponents. It makes sense that people with access to the NSA’s modern surveillance tools would be sorely tempted to put these new toys to use in support of their own priorities.
  • We cannot escape some pretty dismal conclusions here. Not only have the Executive and Legislative branches been corrupted by establishing, funding, hiding and promoting unconstitutional surveillance programs for over 12 years, but the Judicial branch has been corrupted, too. The discovery process in criminal cases is now stacked in favor of the government through its devious means for hiding unconstitutional surveillance and using it in ways beyond the narrow declared purpose of thwarting terrorism. Moreover, federal courts at the district, appeals and Supreme Court levels have allowed the government to evade legal accountability by insisting that plaintiffs must be able to prove what often is not provable, that they were surveilled through highly secretive NSA means. And, if the plaintiffs make too much progress, the government can always get a lawsuit thrown out by invoking “state secrets.” The Separation of Powers designed by the Constitution’s Framers to prevent excessive accumulation of power by one of the branches has stopped functioning amid the modern concept of “permanent war” and the unwillingness of all but a few hearty souls to challenge the invocation of “national security.” Plus, the corporate-owned U.S. media, with very few exceptions, is fully complicit.
  • The concept of a “United Stasi of America,” coined by Pentagon Papers whistleblower Daniel Ellsberg a year ago, has been given real meaning by the unconstitutional behavior and dereliction of duty on the part of both the George W. Bush and Obama administrations. Just days after the first published disclosure from Snowden, Ellsberg underscored that the NSA, FBI and CIA now have surveillance capabilities that East Germany’s Stasi secret police could scarcely have imagined.
  • Last June, Mathew Schofield of McClatchy conducted an interesting interview of Wolfgang Schmidt, a former lieutenant colonel in the Stasi, in Berlin. With the Snowden revelations beginning to tumble out into the media, Schofield described Schmidt as he pondered the sheer magnitude of domestic spying in the United States.
  • “So much information, on so many people,” says Schmidt who, at that point, volunteers a stern warning for Schofield and the rest of us: “It is the height of naiveté to think that, once collected, this information won’t be used. This is the nature of secret government organizations. The only way to protect the people’s privacy is not to allow the government to collect their information in the first place.”
  • Take note, those of you who may still feel fearless, those of you with “nothing to hide.”
Paul Merrell

Murky Special Ops Have Become Corporate Bonanza, Says Report - The Intercept - 0 views

  • The U.S. government is paying private contractors billions of dollars to support secretive military units with drones, surveillance technology, and “psychological operations,” according to new research. A detailed report, published last week by the London-based Remote Control Project, shines a light on the murky activities of the U.S. Special Operations Command by analyzing publicly available procurement contracts dated between 2009 and 2013. USSOCOM encompasses four commands – from the Army, Navy, Air Force, and Marine Corps – and plays a key role in orchestrating clandestine U.S. military missions overseas.
  • Researcher Crofton Black, who also works as an investigator for human rights group Reprieve, was able to dig through the troves of data and identify the beneficiaries of almost $13 billion worth of spending by USSOCOM over the five-year period. He found that more than 3,000 companies had provided services that included aiding remotely piloted drone operations in Afghanistan and the Philippines, helping to conduct surveillance of targets, interrogating prisoners, and launching apparent propaganda campaigns. “This report is distinctive in that it mines data from the generally classified world of U.S. special operations,” says Caroline Donnellan, manager of the Remote Control Project, a progressive thinktank focused on developments in military technology. “It reveals the extent to which remote control activity is expanding in all its facets, with corporations becoming more and more integrated into very sensitive elements of warfare. The report’s findings are of concern given the challenges remote warfare poses for effective investigation, transparency, accountability and oversight.”
  • According to the report, USSOCOM tendered a $1.5 billion contract that required support with “Psychological Operations related to intelligence and information operations.” Prospective contractors were told they would have to provide “military and civilian persuasive communications planning, produce commercial quality products for unlimited foreign public broadcast, and develop lines of persuasion, themes, and designs for multi-media products.” The contract suggested that aim of these “persuasion” operations was to “engage local populations and counter nefarious influences” in parts of Europe and Africa.
  • ...3 more annotations...
  • A separate document related to the same contract noted that one purpose of the effort was to conduct “market research” of al-Qaida and its affiliates in Libya, Tunisia, Mali, Northern Nigeria, and Somalia. Four American companies eventually won the $1.5 billion contract: Tennessee-based Jacobs Technology and Virginia-based Booz Allen Hamilton, CACI-WGI, and SRA International. Notably, while some 3,000 contractors provided service in some capacity to USSOCOM, just eight of the contractors earned more than 50 percent of the $13 billion total identified in Black’s report. Those were: Lockheed Martin, L-3 Communications, Boeing, Harris Corporation, Jacobs Engineering Group, MA Federal, Raytheon, and ITT Corporation.
  • One of the largest single transactions ($77 million) was paid to a subsidiary of Alaska’s Shee Atika – a company that the report says provided “interrogation services” as well as translation assistance.
  • Last year, the then-commander of USSOCOM, Adm. William McRaven, told the House Armed Services Committee that U.S. special operations forces were engaged in “annual deployments to more than 100 countries.” But very little is known about the scope and purpose of those operations, given the extreme secrecy that often shrouds them. The report from the Remote Control Project, however, is a reminder of how public data can sometimes be used to obtain information about even the most shadowy government activities – in this case, offering a valuable glimpse into the burgeoning nature of the U.S. military’s special operations and, in particular, the supporting role played by private contractors. “The Special Operations Command is outsourcing many of its most sensitive information activities,” says Black. “Remote warfare is increasingly being shaped by the private sector.”
  •  
    Contracting out "interrogation services?" Sheesh!
1 - 20 of 22 Next ›
Showing 20 items per page