Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Iowa

Rss Feed Group items tagged

4More

The Trump/Sanders Phenomena | Consortiumnews - 0 views

  • At nearly every juncture, Hillary Clinton has opted for what seemed like the safe play at the time. Indeed, it is hard to think of any case in which she showed anything approaching genuine political courage or statesmanlike wisdom. Here is just a short list of her misjudgments after the Iraq War:–In summer 2006, as a New York senator, Clinton supported Israel’s air war against southern Lebanon which killed more than 1,000 Lebanese. At a pro-Israel rally in New York on July 17, 2006, Clinton shared a stage with Israel’s Ambassador to the United Nations Dan Gillerman, a renowned Muslim basher who proudly defended Israel’s massive violence against targets in Lebanon.“Let us finish the job,” Gillerman told the crowd. “We will excise the cancer in Lebanon” and “cut off the fingers” of Hezbollah. Responding to international concerns that Israel was using “disproportionate” force in bombing Lebanon and killing hundreds of civilians, Gillerman said, “You’re damn right we are.” [NYT, July 18, 2006] Clinton did not protest Gillerman’s remarks.–In late 2006, Clinton fell for the false conventional wisdom that President George W. Bush’s nomination of Robert Gates to be Secretary of Defense was an indication that Bush was preparing to wind down the Iraq War when it actually signaled the opposite, the so-called “surge.” Later, to avoid further offending the Democratic base as she ran for president, she opposed the “surge,” though she later acknowledged that she did so for political reasons, according to Gates’s memoir Duty.
  • In the early months of the Obama administration, with Gates still Defense Secretary and Clinton the new Secretary of State, Gates reported what he regarded as a stunning admission by Clinton, writing: “Hillary told the president that her opposition to the surge in Iraq had been political because she was facing him in the Iowa primary [in 2008]. She went on to say, ‘The Iraq surge worked.’”–In 2009, Clinton joined with Gates and General David Petraeus to pressure President Barack Obama into a similar “surge” in Afghanistan which – like the earlier “surge” in Iraq – did little more than get another 1,000 U.S. soldiers killed along with many more Iraqis and Afghans while extending the bloody chaos in both countries.–Also, in 2009, Clinton supported a right-wing coup in Honduras, overthrowing left-of-center President Manuel Zelaya.–In 2011, Clinton helped spearhead the U.S.-backed “regime change” in Libya, which led to the torture/murder of Libyan leader Muammar Gaddafi as Clinton chuckled, “we came, we saw, he died.” Like the “regime change” in Iraq, the Libyan “regime change” left the once-prosperous nation in bloody anarchy with major gains by Islamic extremists, including the Islamic State.
  • –Also, in 2011, Clinton pressed for a similar “regime change” in Syria adopting the popular though false notion that a “moderate opposition” would neatly fill the void after the ouster of President Bashar al-Assad. The reality was that Al Qaeda and its spin-off, the Islamic State, stood to be the real beneficiaries of the U.S.-supported destabilization of Syria. These Islamic terrorist groups now have major footholds in all three Arab countries where Clinton supported “regime change” – Iraq, Syria and Libya.
  • ...1 more annotation...
  • Throughout her time as Senator and Secretary of State, Clinton supported the aggressive foreign policy prescriptions of the neoconservatives and their liberal-interventionist allies. In each of these cases, the neocons and liberal hawks were dominating Official Washington’s debate and it would have taken some political courage to stand in their way. Hillary Clinton never did.The enduring mystery with Hillary Clinton is whether she is a true neocon or whether she simply judges that embracing neocon positions is the “safest” course for her career – that by parroting the neocon “group think” she can win praise from the national-security elite and that big donors who favor a hard-line strategy for the Middle East will reward her with campaign contributions.Whatever the case, Clinton has carefully curried favor with key neocons, including consulting with Robert Kagan, a co-founder of the neocon Project for the New American Century, and promoting his wife, Victoria Nuland, making her the State Department spokesperson and putting her on track to become Assistant Secretary of State for European Affairs. In that post, Nuland orchestrated “regime change” in Ukraine, which like other neocon targets has descended into bloody chaos, but this adventure also has precipitated a dangerous showdown with nuclear-armed Russia.
4More

'Top Secret' emails found as Clinton probe expands to key aides | McClatchy DC - 0 views

  • As pressure builds on Hillary Clinton to explain her official use of personal email while serving as secretary of state, she faced new complications Tuesday. It was disclosed her top aides are being drawn into a burgeoning federal inquiry and that two emails on her private account have been classified as “Top Secret.”The inspector general for the Intelligence Community notified senior members of Congress that two of four classified emails discovered on the server Clinton maintained at her New York home contained material deemed to be in one of the highest security classifications - more sensitive than previously known. The notice came as the State Department inspector general’s office acknowledged that it is reviewing the use of “personal communications hardware and software” by Clinton’s former top aides after requests from Congress.
  • The expanding inquiry threatens to further erode Clinton’s standing as the front-runner for the Democratic presidential nomination. Since her reliance on private email was revealed in March, polls in crucial swing states show that increasing numbers of voters say Clinton is not honest and trustworthy, in part, because of her use of private emails.
  • Sen. Chuck Grassley, the Republican chairman of the Judiciary Committee, wants Clinton and her aides to “come clean and cough up” information about their personal email use. “Both the State Department and Intelligence Community inspectors general should be looking into the staff use of the Clinton private server for official State Department business. This means giving both inspectors general access and custody of all emails that haven’t already been deleted,” said Grassley of Iowa. “From what is publicly known, it appears that the investigation thus far has focused so much on the former secretary of state, that it’s gotten lost that high-level staff apparently also used this server too.” State Department spokesman John Kirby referred to the Intelligence Community’s disclosure as a recommendation to “upgrade” the two emails’ classification to “Top Secret.” In a statement, he said that “while we work with the Director of National Intelligence to resolve whether, in fact, this material is actually classified, we are taking steps to ensure the information is protected and stored appropriately.”
  • ...1 more annotation...
  • At least four top aides have turned over records, including copies of work emails on personal accounts, to the State Department, which is collecting them in response to a subpoena from Capitol Hill, according to the department. Lawmakers have demanded records, including personal emails, from six other aides, but it’s unknown whether they used personal email for work.
16More

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
5More

FBI says search warrants not needed to use "stingrays" in public places | Ars Technica - 0 views

  • The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed "stingrays," the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts. The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa). In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were "concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests" of Americans. According to the letter, which was released last week: For example, we understand that the FBI’s new policy requires FBI agents to obtain a search warrant whenever a cell-site simulator is used as part of a FBI investigation or operation, unless one of several exceptions apply, including (among others): (1) cases that pose an imminent danger to public safety, (2) cases that involve a fugitive, or (3) cases in which the technology is used in public places or other locations at which the FBI deems there is no reasonable expectation of privacy.
  • The letter was prompted in part by a Wall Street Journal report in November that said the Justice Department was deploying small airplanes equipped with cell-site simulators that enabled "investigators to scoop data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location." The bureau's position on Americans' privacy isn't surprising. The Obama Administration has repeatedly maintained that the public has no privacy in public places. It began making that argument as early as 2010, when it told a federal appeals court that the authorities should be allowed to affix GPS devices on vehicles and track a suspect's every move without court authorization. The Supreme Court, however, eventually ruled that warrants are required. What's more, the administration has argued that placing a webcam with pan-and-zoom capabilities on a utility pole to spy on a suspect at his or her residence was no different from a police officer's observation from the public right-of-way. A federal judge last month disagreed with the government's position, tossing evidence gathered by the webcam that was operated from afar.
  • In their letter, Leahy and Grassley complained that little is known about how stingrays, also known as ISMI catchers, are used by law enforcement agencies. The Harris Corp., a maker of the devices from Florida, includes non-disclosure clauses with buyers. Baltimore authorities cited a non-disclosure agreement to a judge in November as their grounds for refusing to say how they tracked a suspect's mobile phone. They eventually dropped charges rather than disclose their techniques. Further, sometimes the authorities simply lie to judges about their use or undertake other underhanded methods to prevent the public from knowing that the cell-site simulators are being used.
  • ...1 more annotation...
  • Hanni Fakhoury, an attorney for the Electronic Frontier Foundation, said some states and judges are pushing back against stingrays. "In Tacoma, judges now require police (to) specifically note they plan to use an IMSI catcher and promise not to store data collected from people who are not investigation targets," he said. "The Florida and Massachusetts state supreme courts ruled warrants were necessary for real-time cell phone tracking. Nine states—Colorado, Illinois, Indiana, Maryland, Minnesota, Tennessee, Utah, Virginia, and Wisconsin—passed laws specifically requiring police to use a warrant to track a cell phone in real time."
  •  
    Is there any problem here that couldn't be cured by discharge and public flogging for any government official caught using information derived from a stingray?
3More

Federal watchdogs complain of access woes - POLITICO.com - 0 views

  • A group of 47 official federal agency watchdogs sent a rare joint letter to Congress on Tuesday complaining that management at some agencies has delayed or denied access to government records that the watchdogs believe they are legally entitled to see on demand. In the letter to the bipartisan leadership of major committees across Capitol Hill, the inspectors general complain that the access issues have impeded investigations and threaten the ability of the fraud-waste-and-abuse hunters to do their work. "Refusing, restricting, or delaying an Inspector General’s access to documents leads to incomplete, inaccurate, or significantly delayed findings or recommendations, which in turn may prevent the agency from promptly correcting serious problems and deprive Congress of timely information regarding the agency’s performance," the IGs wrote in their letter (posted here).
  • The letter was made public by Sen. Chuck Grassley (R-Iowa), who said he was troubled by the problems the IGs were facing. "This is an Administration that pledged to be the most transparent in history. Yet, these non-partisan, independent agency watchdogs say they are getting stonewalled.  How are the watchdogs supposed to be able to do their jobs without agency cooperation?" Grassley asked in a statement. "I’ll continue working with the committees of jurisdiction to fix the access problems, through oversight and possibly legislation.” While the signers of Tuesday's letter represent a large majority of IGs, not all the federal watchdogs signed on. At least 21 IGs appear to have passed on joining the letter. Some of those represent small agencies, and a few represent congressional branch agencies that may not face the same kinds of access issues. However, the non-signatories include several large Cabinet agencies.
  • The full list of those who did sign can be viewed here.
8More

Yellowstone Oil Spills Expose Threat to Pipelines Under Rivers Nationwide | Inside Clim... - 0 views

  • At the time the Poplar pipeline ruptured, about 110 feet of it was completely uncovered along the bottom of the Yellowstone River, exposing it to damage.
  • Bridger Pipeline LLC was so sure its Poplar oil line was safely buried below the Yellowstone River that it planned to wait five years to recheck it. But last month, 3.5 years later, the Poplar wasn't eight feet under the river anymore. It was substantially exposed on the river bottom—and leaking more than 30,000 gallons of oil upstream from Glendive, Montana. An ExxonMobil pipeline wasn't buried deeply enough for the Yellowstone River, either. High floodwaters in 2011 uncovered the Silvertip pipe, leaving it defenseless against the fast-moving current and traveling debris. It broke apart in July, and sent 63,000 gallons of oil into the river near Laurel, Montana.
  • Both companies underestimated the river's power and its penchant for scouring away the earth that's covering and protecting their pipelines. That miscalculation led to the Exxon Silvertip spill and it's likely to be declared a significant factor, at a minimum, in the Poplar spill. Such misjudgments have potentially troubling implications nationwide, since pipelines carrying crude oil and petroleum products pass beneath rivers and other bodies of water in more than 18,000 places across America. Many of them are buried only a few feet below the water. "There were a lot of people who wanted to think that the last pipeline spill in the Yellowstone River in 2011 was a freak accident that would never happen again. After this most recent spill, no one believes that anymore," said Scott Bosse, Northern Rockies director for American Rivers. "The truth is, there are probably hundreds of pipelines across the country that are at considerable risk of rupturing under our rivers."
  • ...4 more annotations...
  • While corrosion is the No. 1 cause of pipeline spills, a sizable number of pipelines at water crossings have ruptured or been endangered by river scour. Among them: ► The Poplar (Jan. 2015) and Silvertip (July 2011) pipeline failures on the Yellowstone River. ► More than 20 pipeline river crossings in Montana were found to be "dangerously close to exposure" during inspections of nearly 90 pipeline crossings in 2011, according to one report. Many of them have since been reburied significantly deeper. The Poplar pipeline was not among the crossings tagged as being close to exposure. ► Nearly half of the 55 oil and gas pipelines that cross the Missouri River were found to have sections buried 10 feet or less below the riverbed, according to the Wall Street Journal. A study by the U.S. Geological Survey, meanwhile, found that the Missouri riverbed had deepened by nine to 41 feet in 27 places because of severe scouring during the 2011 floods. ► An Enterprise Products Partners LLP pipeline that was uncovered by river scouring and ruptured in August 2011. The line spilled more than 28,350 gallons of a gasoline additive into the Missouri River in Iowa. ► A June 2012 spill in Alberta, Canada, where an oil pipeline owned by Plains Midstream Canada failed along the Red Deer River and released more than 122,000 gallons of light crude. Investigators concluded that the pipe was uncovered by scour during high flood waters and subjected to vibrations from the river flow that led a weld to fail.
  • Three Enbridge Corp. crude oil pipelines crossing Minnesota's Tamarac River were exposed by floodwater erosion years ago, and were still exposed in mid-2014. None of the pipes had failed at that point, but one was being propped up by steel legs, according to an MPR News account. Federal regulations aren't much help. The only rule that addresses pipe burial at major river crossings requires petroleum pipelines to be laid at least four feet below the riverbed at the time of construction. Once a pipeline's installed, there are no requirements regarding burial depth. There is no rule requiring exposed pipelines to be reburied, though a spill under those conditions would invite regulatory penalties for leaving the line exposed to hazards. What's more, federal rules put the pipeline companies in charge of identifying all threats that could cause a spill in highly populated or environmentally sensitive areas, and the companies get wide latitude in deciding what to do about them, according to Rebecca Craven, program manager at the Pipeline Safety Trust, a nonprofit group that tracks pipeline risks and regulations.
  • Indeed, the required four-foot minimum initial burial depth for pipelines can be completely eliminated by natural erosion over time or by a single flood event. Active free-flowing rivers can carve with enough ferocity to lower their riverbeds by 20 feet or shift the waterway onto an entirely new path, which can add new stresses to the pipeline or put the river over pipe that has less cover or lacks reinforcement or protective cement casings. The hotly debated Keystone XL oil pipeline project would cross nearly 2,000 rivers, streams and reservoirs in Montana, South Dakota and Nebraska, according to one estimate. The route takes the pipe across the Missouri and Yellowstone rivers, where owner TransCanada has pledged to install the pipeline 35 feet below the riverbeds.
  • See Also: Ruptured Yellowstone Oil Pipeline Was Built With Faulty Welding in 1950sIce Hinders Cleanup of Yellowstone Oil Pipeline SpillExxon Overlooked, Masked Safety Threats in Years Before Pegasus Pipeline BurstDilbit in Exxon's Pegasus May Have Contributed to Pipeline's Rupture
  •  
    One of the hidden costs of oil dependence. 
1More

Hillary Clinton Will Run for President in 2016 - NYTimes.com - 0 views

  • Hillary Rodham Clinton will seek the presidency for a second time, one of her top advisers said Sunday, ending two years of speculation and coy denials and immediately establishing herself as the likely 2016 Democratic nominee.The announcement came in emails from John Podesta, Mrs. Clinton’s campaign chairman, to donors and others.“I wanted to make sure you heard it first from me – it’s official: Hillary’s running for president,” the email reads. It goes on to say that Mrs. Clinton will soon meet with voters in Iowa and will host a formal kickoff event some time next month.The announcement effectively began what could be one of the least contested races, without an incumbent, for the Democratic presidential nomination in recent history — a stark contrast to the 2008 primaries, when Mrs. Clinton, the early front-runner, ended up in a long and expensive battle won by Barack Obama. It could also be the first time a woman captures a major party’s nomination.
5More

Beware: Someone Is Trying to Convince You That Bernie Can't Win | Common Dreams | Break... - 0 views

  • Perhaps you’ve noticed. Some people and institutions are working feverishly to convince us that real social change is not possible. Their target is Bernie Sanders and the growing army of his supporters who are fed up with politics as usual and the grip of Wall Street and corporate America on our political, economic and social system. The theme is to desperately convince us that Sanders can’t win. They repeat it over and over, even though Sanders polls as well or better than Hillary Clinton does against every leading Republican candidate. Behind this effort is an alarmed corporate old guard that still runs the Democratic Party establishment and their allies in the corporate think tanks and the media, with a special nod to NBC/MSNBC, which is owned and operated by General Electric and Comcast.
  • In this scenario to blunt the Sanders’ surge, and what it represents for the millions of people who want to reverse income inequality, guarantee health care to everyone, break up the banks, carry out meaningful environmental justice and criminal justice reform, and all the other far reaching planks of Sanders’ campaign and the coalition supporting it. A thrust of their effort is to persuade Sanders supporters that he cannot win, in large part by using all the well-funded mechanisms in their control to retard wider exposure to the message of Sanders and his allies. The power elite form of turning down the gaslights. Here’s a small part of how the manipulation works. 
  • The Democratic National Committee slashes the number of debates and schedules debates on Saturday nights when far fewer people are watching, and pressures its elected officials and convention super delegates for an early endorsement in an effort to lock down a coronation of their preferred candidate. Meanwhile the media, in particular NBC/MSNBC which has the biggest network audience of presumed Democratic Party voters, limits coverage of Sanders while it’s parent company, GE, also directs its Hollywood subsidiaries, including Universal Studios (co-owned by Comcast) and its NBC shows, to line up its contracted celebrities to endorse the politics as usual campaign. Other national media, which also has a stake in the status quo, contributes as well. While Sanders has now drawn more than 400,000 people to his rallies – far more than any other candidate – he routinely receives less coverage than most of the other leading candidates. A report, circulated by Media Matters, found that on one network alone Donald Trump has been given 81 minutes of coverage compared to less than one minute for Sanders, even though, as The Nation’s John Nichols notes, Sanders has broader support among Democratic voters than Trump does among Republicans in the first voting state, Iowa.
  • ...1 more annotation...
  • In a fall speech to the DNC, Sanders put it bluntly. “The people of our country understand that given the collapse of the middle class and a grotesque level of income inequality, we do not need more establishment politics or establishment economics.”  “What we need,” Sanders emphasized, “is a political movement that is prepared to take on the billionaire class, a movement that works for all of us and not just the corporate class and a handful of the wealthiest people in this country.”  It’s a message, a campaign, and an uprising that has sent chills through those whose primarily loyalty is to the wealthy donors in mansions and corporate suites and the policy architects on Wall Street.  But it’s a message that sure has resonated in the grassroots.
  •  
    Sanders is getting the same treatment Ron Paul got last time around. But my guess is that like Trump, if elected Sanders wouldn't live long enough to take office. 
1More

"He Has Summoned a Political Revolution": The Nation Magazine Endorses Bernie Sanders f... - 0 views

  • With just weeks to go, polls show Vermont Senator Bernie Sanders is edging ahead of front-runner Hillary Clinton in the primary season’s first two contests. Numbers released this week give Sanders a five-point lead over Clinton in Iowa and a four-point lead in New Hampshire. Sanders has also narrowed Clinton’s once commanding lead nationwide, pulling within seven points.
‹ Previous 21 - 29 of 29
Showing 20 items per page