Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Office-Productivity

Rss Feed Group items tagged

Gary Edwards

Office Productivity Software Is No Closer To Becoming A Commodity | Forrester Blogs - 0 views

  • We just published a report on the state of adoption of Office 2013 And Productivity Suite Alternatives based on a survey of 155 Forrester clients with responsibility for those investments. The sample does not fully represent the market, but lets us draw comparisons to the results of our previous survey in 2011. Some key takeaways from the data:   One in five firms uses email in the cloud. Another quarter plans to move at some point. More are using Office 365 (14%) than Google Apps (9%).  Just 22% of respondents are on Office 2013. Another 36% have plans to be on it. Office 2013's uptake will be slower than Office 2010 because fewer firms plan to combine the rollout of Office 2013 with Windows 8 as they combined Office 2010 with Windows 7. Alternatives to Microsoft Office show little traction. In 2011, 13% of respondents supported open source alternatives to Office. This year the number is just 5%. Google Docs has slightly higher adoption and is in use at 13% of companies. 
  • Microsoft continues to have a stranglehold on office productivity in the enterprise: Just 6% of companies in our survey give all or some employees an alternative instead of the installed version of Microsoft Office. Most surprising of all, multi-platform support is NOT a priority. Apps on iOS and Android devices were important to 16% of respondents, and support for non-Windows PCs was important to only 11%. For now, most technology decision-makers seem satisfied with leaving employees to self-provision office productivity apps on their smartphones and tablets if they really want them. 
  • Do you think we're getting closer to replacing Microsoft Office in the workplace?
  •  
    Wow, OpenOffice (3%) and Libre Office (2%) are actually losing gound!  In 2011 they had a combined marketshare of 13%.  Google Docs has a 13% marketshare, but i suspect most of those document originate in legacy MSOffice!!!!!  Making Google Drive - Apps a front end for mobile access and back-end backup.  In the middle of this mess, productivity workers struggle with shredded formats and the confusion of highly interactive and data intensive / time-sensitive compound documents going static (pdf) or otherwise disconnected. Intro: "We (Forrester) just published a report on the state of adoption of Office 2013 And Productivity Suite Alternatives based on a survey of 155 Forrester clients with responsibility for those investments. The sample does not fully represent the market, but lets us draw comparisons to the results of our previous survey in 2011. Some key takeaways from the data:   One in five firms uses email in the cloud. Another quarter plans to move at some point. More are using Office 365 (14%) than Google Apps (9%).  Just 22% of respondents are on Office 2013. Another 36% have plans to be on it. Office 2013's uptake will be slower than Office 2010 because fewer firms plan to combine the rollout of Office 2013 with Windows 8 as they combined Office 2010 with Windows 7. Alternatives to Microsoft Office show little traction. In 2011, 13% of respondents supported open source alternatives to Office. This year the number is just 5%. Google Docs has slightly higher adoption and is in use at 13% of companies. "
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

Exclusive: TSA's Secret Behavior Checklist to Spot Terrorists - The Intercept - 0 views

  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening. The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program.
  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening.
  • The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program. The checklist ranges from the mind-numbingly obvious, like “appears to be in disguise,” which is worth three points, to the downright dubious, like a bobbing Adam’s apple. Many indicators, like “trembling” and “arriving late for flight,” appear to confirm allegations that the program picks out signs and emotions that are common to many people who fly.
  • ...5 more annotations...
  • A TSA spokesperson declined to comment on the criteria obtained by The Intercept. “Behavior detection, which is just one element of the Transportation Security Administration’s (TSA) efforts to mitigate threats against the traveling public, is vital to TSA’s layered approach to deter, detect and disrupt individuals who pose a threat to aviation,” a spokesperson said in an emailed statement.
  • Since its introduction in 2007, the SPOT program has attracted controversy for the lack of science supporting it. In 2013, the Government Accountability Office found that there was no evidence to back up the idea that “behavioral indicators … can be used to identify persons who may pose a risk to aviation security.” After analyzing hundreds of scientific studies, the GAO concluded that “the human ability to accurately identify deceptive behavior based on behavioral indicators is the same as or slightly better than chance.” The inspector general of the Department of Homeland Security found in 2013 that TSA had failed to evaluate SPOT, and “cannot ensure that passengers at United States airports are screened objectively, show that the program is cost-effective, or reasonably justify the program’s expansion.” Despite those concerns, TSA has trained and deployed thousands of Behavior Detection Officers, and the program has cost more than $900 million since it began in 2007, according to the GAO.
  • The 92-point checklist listed in the “Spot Referral Report” is divided into various categories with a point score for each. Those categories include a preliminary “observation and behavior analysis,” and then those passengers pulled over for additional inspection are scored based on two more categories: whether they have “unusual items,” like almanacs and “numerous prepaid calling cards or cell phones,” and a final category for “signs of deception,” which include “covers mouth with hand when speaking” and “fast eye blink rate. Points can also be deducted from someone’s score based on observations about the traveler that make him or her less likely, in TSA’s eyes, to be a terrorist. For example, “apparent” married couples, if both people are over 55, have two points deducted off their score. Women over the age of 55 have one pointed deducted; for men, the point deduction doesn’t come until they reach 65. Last week, the ACLU sued TSA to obtain records related to its behavior detection programs, alleging that they lead to racial profiling. The lawsuit is based on a Freedom of Information Act request the ACLU filed last November asking for numerous documents related to the program, including the scientific justification for the program, changes to the list of behavior indicators, materials used to train officers and screen passengers, and what happens to the information collected on travelers.
  • “The TSA has insisted on keeping documents about SPOT secret, but the agency can’t hide the fact that there’s no evidence the program works,” said Hugh Handeyside, staff attorney with the ACLU National Security Project, in a statement announcing the lawsuit. Being on the lookout for suspicious behavior is a “common sense approach” that is used by law enforcement, according to TSA. “No single behavior alone will cause a traveler to be referred to additional screening or will result in a call to a law enforcement officer (LEO),” the agency said in its emailed statement. “Officers are trained and audited to ensure referrals for additional screening are based only on observable behaviors and not race or ethnicity.” One former Behavior Detection Officer manager, who asked not to be identified, said that SPOT indicators are used by law enforcement to justify pulling aside anyone officers find suspicious, rather than acting as an actual checklist for specific indicators. “The SPOT sheet was designed in such a way that virtually every passenger will exhibit multiple ‘behaviors’ that can be assigned a SPOT sheet value,” the former manager said.
  • The signs of deception and fear “are ridiculous,” the source continued. “These are just ‘catch all’ behaviors to justify BDO interaction with a passenger. A license to harass.” The observations of a TSA screener or a Behavior Detection Officer shouldn’t be the basis for referring someone to law enforcement. “The program is flawed and unnecessarily delays and harasses travelers. Taxpayer dollars would be better spent funding real police at TSA checkpoints,” the former manager said. A second former Behavior Detection Officer manager, who also asked not to be identified, told The Intercept that the program suffers from lack of science and simple inconsistency, with every airport training its officers differently. “The SPOT program is bullshit,” the manager told The Intercept. “Complete bullshit.”
  •  
    I've completely boycotted airlines in the U.S. since 2002 because I refuse to submit to the outrageous treatment by government that is now required to board a commercial airliner. If the airlines want my business, they need to start lobbying to end the politics of fear and the Gestapo tactics of government. plus pushing for an honest investigation of the 9/11/2001 incidents.  
Gary Edwards

The Ultimate Net Monitoring Tool: NARUS - 0 views

  •  
    Chilling stuff.  Note that Mark Klien is an important whistleblower whose testimony has helped expose the  Federal Government - NSA domestic dragnet that has violated the constitutional rights of hundreds of thousands of law abiding American citizens.  The question I have concerns cooperation between NSA NARUS spying and the IRS. We know that the IRS used key words such as "TEA PARTY", "PATRIOT", "Constitution", and "Tenth Amendment" to target American citizens.  Does the NSA NARUS target Americans in the same way?  Are there political enemy lists with background surveillance information now circulating through different government agencies based on this targeted and illegal spying? The first thing we need to do is protect whistle blowers who are risking it all to protect the constitutional rights of American citizens and save our country.   "The equipment that technician Mark Klein learned was installed in the National Security Agency's "secret room" inside AT&T's San Francisco switching office isn't some sinister Big Brother box designed solely to help governments eavesdrop on citizens' internet communications. Rather, it's a powerful commercial network-analysis product with all sorts of valuable uses for network operators. It just happens to be capable of doing things that make it one of the best internet spy tools around. "Anything that comes through (an internet protocol network), we can record," says Steve Bannerman, marketing vice president of Narus, a Mountain View, California, company. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on, we can reconstruct their (voice over internet protocol) calls."" Narus' product, the Semantic Traffic Analyzer, is a software application that runs on standard IBM or Dell servers using the Linux operating system. It's renowned within certain circles for its ability to inspect traffic in real time on high-bandwidth pipes, identifying packets of interest as they r
Gary Edwards

An interview with Lt. Gen. Ion Pacepa, the highest ranking Soviet bloc intel officer to... - 0 views

  • In a gripping interview with Blaze Books in connection with his most-recent title, “Disinformation“, the highest-ranking Soviet bloc intelligence officer to ever defect, Lt. Gen. Ion Pacepa provided his insights on a wide array of topics, from Putin’s Russia to the disinformation campaign to rebrand Pope Pius XII to “Hitler’s Pope” to the links between Leftism and anti-Semitism to the Boston bombing, and all things in-between.
  • Playing devil’s advocate here, some might argue that since the Soviet Union was defeated, Americans shouldn’t care about a book on Soviet disinformation tactics. What would you say to these people? Pacepa: The very idea that the Soviet Union was defeated is disinformation in itself. The Soviet Union changed its name and dropped its façade of Marxism, but it remained the same samoderzhaviye, the historical Russian form of autocracy in which a tsar is running the country with the help of his political police. During the Soviet Union, the KGB was a state within the state. Now the KGB is the state. Over 6,000 former KGB officers are running Russia’s federal and local governments. The Soviet Union had one KGB officer for every 428 citizens. In 2004, Russia had one FSB officer for every 297 citizens.
  • How would you describe today’s Russia? Russia today is the first intelligence dictatorship in history. It is a brand new form of totalitarianism, which we are not yet familiar with. Now the KGB, rechristened FSB, is openly running Russia. On Sept. 11, 2002, hordes of former KGB officers gathered in Moscow at the Lubyanka—the headquarters of the old and new KGB. They had not congregated to sympathize with America’s national tragedy of the previous year, but to celebrate the 125th birthday of Feliks Dzerzhinsky—the man who created the most criminal institution in contemporary history. One of my former bosses, KGB chairman Vladimir Semichastny, groused to a crowd: “I think a goal was set to destroy the KGB, to make it toothless.”[1] A few days later, Moscow’s mayor, Yury Lushkov, one of Russia’s most influential politicians, reversed himself by saying he now wanted to restore Dzerzhinsky’s statue to its place on Lubyanka Square. It will not be easy to break Russia’s five-century-old tradition of being a police state. Nevertheless, man would not have learned to walk on the moon had he not first studied what the moon was really made of and where it lay in the universe. This is one reason we wrote “Disinformation.” Let’s hope a new generation of Russians will learn the truth, and will give that immense country a new national identity.
  • ...1 more annotation...
  • Pacepa: That Marxism and its earthly Socialism are immense disinformation operations, and that all they have left behind is former Marxist countries that ended up looking like trailer camps hit by a hurricane, and leaders roasting in Dante’s Inferno. That all Marxists who have ever risen to lead a country have ended up in hell—all, from Trotsky to Stalin, Tito to Enver Hoxha to Mátyás Rakosi, Sékou Touré, Nyeree and Hugo Chavez. That all had their days of temporary glory, but that all ended in eternal disgrace. Some, like Khrushchev and Ceausescu, were even found unworthy of having their final resting place marked by any gravestone. A few remnants, like Fidel and Raul Castro, are still hanging on, but they certainly have a place in hell reserved and waiting for them. Perhaps our book may also help President Obama abandon his craving for Marx’s utopian ideology, “to each according to his need,” which is transforming the United States into a decaying socialist country in all but name.
Paul Merrell

Libya Coming Full Circle. When A Deemed "Conspiracy Theory" Becomes Reality | Global Re... - 0 views

  • In the duration of the “revolutionary frenzy” that categorized western media coverage of the Libyan Civil War in 2011, public audiences were captivated with both tales of rebels aspiring for “democracy” and with complimenting stories of unabated brutality by Gaddafi forces. Without any serious mainstream criticism, an imperialist mythology centered on the interventionist doctrine of the “Responsibility to Protect” was cemented in public consciousness with even usually non-mainstream and “anti-imperialist” figures such as Juan Cole deliberately misrepresenting the situation in Libya. In Cole’s perspective, no reference to armed militants from the start of the conflict or the role of extremism and western premeditation found its way into the narrative and he predicted a simplistic narrative where the overthrow of Gaddafi would lead the region into an era of unity, prosperity and freedom. Libya Today How is Libya today? If one denied the existence of hell, they need not look further than Libya to observe a case of hell on Earth. Libya as a functioning, cohesive state has virtually ceased to exist, having been replaced by a myriad of conflicting factions divided on tribal and religious lines. While mainstream media tends to obscure the identity of these factions and their connection to western imperialists, Eric Draitser in his analysis, “Benghazi, the CIA, and the War in Libya” shows the beyond the fractious infighting, both primary factions engaging in direct combat have been beneficiaries of the NATO imperialist powers in their systematic aggression against the Libyan state.
  • “Confirmed: U.S. Armed Al Qaeda to Topple Libya’s Gaddaffi” with a very astonishing admission by “top military officers, CIA insiders and think-tankers” confirming the obvious truth that “conspiracy theorists” have been saying since 2011. The US backed Al Qaeda in Libya and that the Benghazi attack was a byproduct of this. Washington’s Blog notes that in 2012, it documented that: The U.S. supported opposition which overthrew Libya’s Gadaffi was largely comprised of Al Qaeda terrorists. According to a 2007 report by West Point’s Combating Terrorism Center’s center, the Libyan city of Benghazi was one of Al Qaeda’s main headquarters – and bases for sending Al Qaeda fighters into Iraq – prior to the overthrow of Gaddafi: The Hindustan Times reported last year: “There is no question that al Qaeda’s Libyan franchise, Libyan Islamic Fighting Group, is a part of the opposition,” Bruce Riedel, former CIA officer and a leading expert on terrorism, told Hindustan Times. It has always been Qaddafi’s biggest enemy and its stronghold is Benghazi. Al Qaeda is now largely in control of Libya.  Indeed, Al Qaeda flags were flown over the Benghazi courthouse once Gaddafi was toppled. What was once deemed conspiracy theory became confirmed reality when the Daily Mail reported as Washington’s Blog subsequently pointed out:
  • A self-selected group of former top military officers, CIA insiders and think-tankers, declared Tuesday in Washington that a seven-month review of the deadly 2012 terrorist attack has determined that it could have been prevented – if the U.S. hadn’t been helping to arm al-Qaeda militias throughout Libya a year earlier. ‘The United States switched sides in the war on terror with what we did in Libya, knowingly facilitating the provision of weapons to known al-Qaeda militias and figures,’ Clare Lopez, a member of the commission and a former CIA officer, told MailOnline. She blamed the Obama administration for failing to stop half of a $1 billion United Arab Emirates arms shipment from reaching al-Qaeda-linked militants. ‘Remember, these weapons that came into Benghazi were permitted to enter by our armed forces who were blockading the approaches from air and sea,’ Lopez claimed. ‘They were permitted to come in. … [They] knew these weapons were coming in, and that was allowed.. ‘The intelligence community was part of that, the Department of State was part of that, and certainly that means that the top leadership of the United States, our national security leadership, and potentially Congress – if they were briefed on this – also knew about this.’
  • ...4 more annotations...
  • ‘The White House and senior Congressional members,’ the group wrote in an interim report released Tuesday, ‘deliberately and knowingly pursued a policy that provided material support to terrorist organizations in order to topple a ruler [Muammar Gaddafi] who had been working closely with the West actively to suppress al-Qaeda.’ ‘Some look at it as treason,’ said Wayne Simmons, a former CIA officer who participated in the commission’s research. While Wayne Simmons’ characterization of such actions by the globalist, imperialist establishment in the United States as “treason” is correct in the sense that it was a clear violation of not only the Constitution, but the public interest of America, there is a rather disingenuous factor involved when some people, especially on the Neo-Con right, attempt to play the “treason card.”
  • Clearly the Neo-Con agenda has been coming full circle since the first Gulf War in the 1990s. The US “gun-walking” to jihadis in Syria from Libya, noted by the Washington Times and New York Times (albeit with partisan spin and distortion), was actually planned under Bush in 2007 as noted by Seymour Hersh in “The Redirection.” It has continued under Obama, influenced by Council on Foreign Relations figures throughout both administrations from Dick Cheney to Hillary Clinton. Consider the following points from “The Redirection”: To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda.
  • To dispel critics’ notions that this is passive, uncontrollable, and indirect support, consider: [Saudi Arabia's] Bandar and other Saudis have assured the White House that “they will keep a very close eye on the religious fundamentalists. Their message to us was ‘We’ve created this movement, and we can control it.’ It’s not that we don’t want the Salafis to throw bombs; it’s who they throw them at—Hezbollah, Moqtada al-Sadr, Iran, and at the Syrians, if they continue to work with Hezbollah and Iran. Neo-Conservative writer Gary Gambill would ride on this wave of terrorist aggression and pen an article for the Neo-Con “Middle East Forum” titled “Two Cheers for Syrian Islamists.” As noted in the analysis of the piece by Tony Cartalucci titled “Globalist Rag Gives ‘Two Cheers’ for Terrorism”, one can see how terrorism is a useful piece of capital of globalist imperialism that is easy to hide in the sight of inattentive masses with easy ploys of political spin and plausible deniability.
  • Libyan terrorists are invading Syria. They have been doing so since the influx of jihadis began, enabled by outside powers. These are not simply rogue networks operating independently but rather include state-sponsorship, especially of NATO-member Turkey and NATO’s criminal proxy government in Tripoli, Libya. We are told by the media that the regime in Tripoli under the auspice of the National Transitional Council, and populated with puppets like Mustapha Abdul Jalil, is a moderate regime distinct from the “marginal Islamist forces.” However, even in mainstream accounts, one can note that these “official, moderate” groups are involved with funding terrorism themselves as many geopolitical analysts have noted. Tony Cartalucci notes that, “In November 2011, the Telegraph in their article, “Leading Libyan Islamist met Free Syrian Army opposition group,” would report”: Abdulhakim Belhadj, head of the Tripoli Military Council and the former leader of the Libyan Islamic Fighting Group, “met with Free Syrian Army leaders in Istanbul and on the border with Turkey,” said a military official working with Mr Belhadj. “Mustafa Abdul Jalil (the interim Libyan president) sent him there.”
  •  
    Lots of documentation on the tawdry moves by the War Party in Libya and Benghazi, now blowing up in their faces. 
Paul Merrell

Emails to Hillary contradict French tale on Libya war - Al-Monitor: the Pulse of the Mi... - 0 views

  • French spies secretly organized and funded the Libyan rebels who defeated Moammar Gadhafi, according to confidential emails to Hillary Clinton that were made public on June 22.
  • The memos from Clinton adviser Sidney Blumenthal contradict the popular French narrative about its intervention in Libya, raising fresh questions about a war that toppled a dictator but left chaos and radicalism in his stead. They were allegedly written by retired CIA operative Tyler Drumheller and released by a special congressional panel investigating the 2012 attack on the US mission in Benghazi. The oft-repeated media tale in France holds that then-President Nicolas Sarkozy was outraged by Gadhafi’s crackdown on protesters in February 2011 but had no clear idea who to support. Enter a swash-buckling “intellectual,” Bernard-Henri Levy, who met with Transitional National Council leader Mustafa Abdul Jalil on March 4, immediately called Sarkozy, and had the French president invite Jalil to the Elysee Palace — and recognize the council as the country’s official government by March 10. The emails to Clinton tell a distinctly less heroic story. According to one entry from March 22, 2011, “officers” with the General Directorate for External Security — the French intelligence service — “began a series of secret meetings” with Jalil and Gen. Abdul Fatah Younis in Benghazi in late February and gave them “money and guidance” to set up the council, whose formation was announced Feb. 27. The officers, “speaking under orders from [Sarkozy] promised that as soon as the [council] was organized France would recognize [it] as the new government of Libya.”
  • “In return for their assistance,” the memo states, “the DGSE officers indicated that they expected the new government of Libya to favor French firms and national interests, particularly regarding the oil industry in Libya.” The email goes on to state that Jalil and Younis “accepted this offer” and “have maintained contact with the DGSE officers in Cairo.” The memo is titled, “How the French created the National Libyan Council, ou l’argent parle.” Another memo dated May 5 asserts that individuals close to the council stated “in strictest confidence” that as early as mid-April 2011 French humanitarian flights also included “executives from the French company TOTAL, the large construction from VINCI and the European Aeronautic Defence and Space Company N.V. (EADS).” Subsequent flights have allegedly carried representatives “from the conglomerate THALYS and other large French firms, all with close ties to [Sarkozy].” “After meeting with the [council] these French business executives leave discreetly by road, via Tobruk to Egypt,” the memo states. “These convoys are organized and protected by para-military officers [from the DGSE].” The memo adds that Levy himself came up with the idea and obtained the council’s signature on an agreement to give French firms “favorable consideration” in business matters. He is said to have used “his status as a journalist to provide cover for his activities.”
  • ...2 more annotations...
  • A later memo, from September 2011, asserts that Sarkozy urged the Libyans to reserve 35% of their oil industry for French firms — Total in particular — when he traveled to Tripoli that month. In the end, however, Italy’s Eni came out ahead with Russian and Chinese firms biding their time, even as the Libyan oil production plummeted because of the civil war. The veracity of the memos’ content is difficult if not impossible to ascertain. While Levy has long been a controversial figure in France, the council was riven by internal rivalries. Younis himself was assassinated in July 2011 — at Jalil’s urging according to an Aug. 8 memo to Clinton. And Drumheller himself has courted controversy for his role in the run-up to the 2003 Iraq war, with liberals celebrating him as a truth-teller and conservatives saying he helped concoct some of the false information he later debunked.
  • French spymasters’ role in Libya has been alluded to before, most notably in the 2012 book “The Truth About our War in Libya” by French historian Jean-Christophe Notin. That book said Henry-Levy’s role in the French decision to go to war had been overblown. “All has not been said about this war, because it has only had one narrator: Bernard-Henri Levy,” Notin told L’Express magazine. “Yes, he was one of the Libyans’ interlocutors. But his telling glosses over not only the coalition’s military exploits, but also the underground work of diplomatic and military officials on the ground, sometimes for quite some time, in Libya.” Other memos released June 22 give credence to the notion that Sarkozy was determined from the start of the uprising to get rid of Gadhafi, despite earlier efforts to court him after he abandoned his weapons program and sought closer ties with the West. A March 20 memo, for instance, states that Sarkozy “plans to have France lead the attacks on [Gadhafi] over an extended period of time” and “sees this situation as an opportunity for France to reassert itself as a military power.”
Paul Merrell

WikiLeaks Reveals The "Snowden Stopper": CIA Tool To Track Whistleblowers - 0 views

  • As the latest installment of it’s ‘Vault 7’ series, WikiLeaks has just dropped a user manual describing a CIA project known as ‘Scribbles’ (a.k.a. the “Snowden Stopper”), a piece of software purportedly designed to allow the embedding of ‘web beacon’ tags into documents “likely to be stolen.” The web beacon tags are apparently able to collect information about an end user of a document and relay that information back to the beacon’s creator without being detected. Per WikiLeaks’ press release:
  • Today, April 28th 2017, WikiLeaks publishes the documentation and source code for CIA’s “Scribbles” project, a document-watermarking preprocessing system to embed “Web beacon”-style tags into documents that are likely to be copied by Insiders, Whistleblowers, Journalists or others. The released version (v1.0 RC1) is dated March, 1st 2016 and classified SECRET//ORCON/NOFORN until 2066. Scribbles is intended for off-line preprocessing of Microsoft Office documents. For reasons of operational security the user guide demands that “[t]he Scribbles executable, parameter files, receipts and log files should not be installed on a target machine, nor left in a location where it might be collected by an adversary.”
  • The ‘Scribbles’ User Guide explains how the tool generates a random watermark for each document, inserts that watermark into the document, saves all such processed documents in an output directory, and creates a log file which identifies the watermarks inserted into each document. Scribbles can watermark multiple documents in one batch and is designed to watermark several groups of documents.
  • ...1 more annotation...
  • Dr. Martin McHugh, Information Technology Programme chair at Dublin Institute of Technology, gave the RT more details on how the “Scribbles” tool can be used for “bad as well as good.” “Methods of tracking have historically been developed for our protection but have evolved to become used to track us without our knowledge.” “Web beacons typically go unnoticed. A tiny file is loaded as part of a webpage. Once this file is accessed, it records unique information about you, such as your IP address and sends this back to the creator of the beacon.” But, the “Scribbles” user guide notes there is just one small problem with the program…it only works with Microsoft Office products.  So, if end users use other programs such as OpenOffice of LibreOffice then the CIA’s watermarks become visible to the end user and their cover is blown.
Gary Edwards

Startup turns carbon dioxide into fuels - 0 views

  • The research has received funding from the Air Force Office of Scientific Research (AFSOR), the National Science Foundation and the Department of Energy (DOE). The collaboration between Liquid Light and the University was supported by the DOE Small Business Innovation Research program and the AFOSR Small Business Technology Transfer program. Princeton's agreement with Liquid Light allowed the company to continue to collaborate with Bocarsly and his research team. Before long, new discoveries were emerging. "They started noticing interesting chemistry that we wouldn't have predicted," said Bocarsly.
  • The Princeton scientists did some additional studies, and made a surprising discovery: They could turn CO2, which contains only one carbon, into a compound with a carbon-carbon bond, which vastly increases the possibilities for creating commercial applications. This was radical because although the reaction is certainly possible, it is highly unlikely to happen because so many other competing reactions are occurring. "Everyone who electrochemically reduces CO2 today makes compounds with only one carbon," said Bocarsly. "Nobody makes things with carbon-carbon bonds." He paused. "But we can." "That was a very 'wow' moment," recalled Cole, "because we thought that our process could only make methanol. But now we were finding that we could make a variety of products, and that is what makes this technology commercially interesting." She said Liquid Light scientists can now make more than 20 different products from CO2.
  • One of the chemicals Liquid Light can make is isopropanol, commonly known as rubbing alcohol and an important industrial chemical. Another is butanol, which could be commercially important as a fuel. Liquid Light's technology offers the potential to make these chemicals at lower cost than today's methods, which involve starting with fossil fuels such as petroleum and natural gas.
  • ...3 more annotations...
  • Why does pyridinium work so well as a catalyst for the reaction? Based on its structure, the ring-shaped molecule is an unlikely catalyst for this reaction because it shuttles just one electron at a time. But to convert CO2 to methanol requires six electrons, and to make higher-carbon molecules takes even more electrons. Bocarsly and his team — in collaboration with Steven Bernasek, professor of chemistry — are doing studies to understand the steps in the chemical reaction, and they are making rapid progress. "There are clearly some intermediate products formed during the reaction that do not sit around for a long time and are not there in very high concentrations," said Bocarsly.
  • The Princeton team also is studying the factors that determine which products can be made from CO2. The researchers have found that very subtle changes in the electrode surface can lead to production of different chemicals. For example, CO2 plus a pyridinium catalyst and a platinum electrode make methanol. However, the same catalyst and a different electrode give a different product. The team published its findings on how the reaction is affected by catalyst concentration, temperature and pressure in the journal ChemSusChem last year.
  • Citing government statistics that the United States generates about 5.5 billion metric tons of CO2 per year, Teamey said it will not be hard to obtain the starting materials for this new industry. However, the CO2 needs to be relatively pure, a requirement that rules out gasoline tailpipes and coal-fired power plants. Instead, said Teamey, the CO2 could come from manufacturing facilities, such as fertilizer manufacturers and cement plants, which according to Teamey emit some 100 million tons of high-purity CO2 each year.
  •  
    "Today, carbon dioxide (CO2) is a hot topic. Scientists around the globe are searching for ways to store, dispose of, or prevent the formation of the greenhouse gas, which is a major driver of global climate change. Liquid Light hopes to take this concept one step further and harness waste CO2 as a source of carbon to make industrial chemicals and fuels. The technology behind the process is simple: Take CO2 and mix it in a water-filled chamber with an electrode and a catalyst. The ensuing chemical reaction converts CO2 into a new molecule, methanol, which can be used as a fuel, an industrial solvent or a starting material for the manufacture of other chemicals. Liquid Light's founders include Bocarsly and his former graduate student Emily Cole, who earned her Ph.D. from Princeton in 2009. Cole helped revive efforts in Bocarsly's lab to study the conversion of CO2 into usable fuels, which led to the launch of Liquid Light and an ongoing collaboration that Bocarsly said has been extremely positive for his research team at the University. "We've made some discoveries that wouldn't have been made in a university setting, and this has really accelerated the research," Bocarsly said. "It is a very productive relationship." Back in the 1990s, a former Ph.D. student of Bocarsly's named Chao Lin conducted some of the earliest experiments on turning CO2 into methanol. He used palladium metal as the electrode and pyridinium, an inexpensive ring-shaped molecule, as the catalyst. By plugging the electrode into an electrical outlet, he could drive an electrochemical reaction that converted CO2 into methanol. As Bocarsly recalled, Lin was quite excited about his success. However, said Bocarsly, "We published that finding in 1994 and there was approximately zero interest in it." The work languished until 2005 when Cole, then a new graduate student, told Bocarsly she wanted to work on a clean-energy project. She took up the challenge of reproducing Lin's results, but this time
Paul Merrell

Glenn Greenwald: The NSA Can "Literally Watch Every Keystroke You Make" - 0 views

  • On Sunday, the German publication Der Spiegel revealed new details about secretive hacking—a secretive hacking unit inside the NSA called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Still with us, Jameel Jaffer, deputy legal director of the ACLU, director of the ACLU’s Center for Democracy, and Glenn Greenwald, the journalist who first broke the story about Edward Snowden. Glenn, can you just talk about the revelations in Der Spiegel?
  • And one of the ways that they’re doing it is that they intercept products in transit, such as if you order a laptop or other forms of Internet routers or servers and the like, they intercept it in transit, open the box, implant the malware, factory-seal it and then send it back to the user. They also exploit weaknesses in Google and YouTube and Yahoo and other services, as well, in order to implant these devices. It’s unclear to what extent, if at all, the companies even know about it, let alone cooperate in it. But what is clear is that they’ve been able to compromise the physical machines themselves, so that it makes no difference what precautions you take in terms of safeguarding the sanctity of your online activity.
  • But we’ve actually been working, ourselves, on certain stories that should be published soon regarding similar interdiction efforts. And one of the things that I think is so amazing about this, Amy, is that the U.S. government has spent the last three or four years shrilly, vehemently warning the world that Chinese technology companies are unsafe to purchase products from, because they claim the Chinese government interdicts these products and installs surveillance, backdoors and other forms of malware onto the machinery so that when you get them, immediately your privacy is compromised. And they’ve actually driven Chinese firms out of the U.S. market and elsewhere with these kinds of accusations. Congress has convened committees to issue reports making these kind of accusations about Chinese companies. And yet, at the same time, the NSA is doing exactly that which they accuse these Chinese companies of doing. And there’s a real question, which is: Are these warnings designed to steer people away from purchasing Chinese products into the arms of the American industry so that the NSA’s ability to implant these devices becomes even greater, since now everybody is buying American products out of fear that they can no longer buy Chinese products because this will happen to them?
  • ...1 more annotation...
  • And the final thing I want to say is, you know, all this talk about amnesty for Edward Snowden, and it’s so important that the rule of law be applied to him, it’s really quite amazing. Here’s Michael Hayden. He oversaw the illegal warrantless eavesdropping program implemented under the Bush administration. He oversaw torture and rendition as the head of the CIA. James Clapper lied to the face of Congress. These are felonies at least as bad, and I would say much worse, than anything Edward Snowden is accused of doing, and yet they’re not prosecuted. They’re free to appear on television programs. The United States government in Washington constantly gives amnesty to its highest officials, even when they commit the most egregious crimes. And yet the idea of amnesty for a whistleblower is considered radical and extreme. And that’s why a hardened felon like Michael Hayden is free to walk around on the street and is treated on American media outlets as though he’s some learned, wisdom-drenched elder statesman, rather than what he is, which is a chronic criminal.
  •  
    Greenwald asks a very good question about the U.S. government accusing the Chinese government of cyber-espionage and the government's finding that Chinese-manufactured ware pose a security risk. Was that intended to drive people to purchase hardware that comes equipped with NSA backdoors? The flip side, of course, is whether the world should be beating feet to purchase their hardware from the Chinese in order to escape the NSA backdoors. Then there is the question of how those backdoors might have made their way into the hardware devices without the acquiescence of their manufacturers, who surely would have realized that their businesses might take enormous financial hits if knowledge of the backdoors became public? Bribing key staff? The manufacturers named in the Der Spiegel article surely are going to face some hard questions and they may face some very unhappy shareholders if their stock prices take a dive. It would be fun to see a shareholder's derivative class action against one of these companies for having acquiesced to NSA implantation of backdoors, leading to the disclosure and the fall in stock price. Caption the case as Wall Street, Inc. v. National Security Agency, dba Seagate Technology, PLC, then watch the feathers and blood fly.  "Seagate is the company the world trusts to store our lives - our files and photos, our libraries and histories, our science and progress."   Yes, and your stockholders trusted you not to endanger their investment by adding NSA backdoors in your products.
Paul Merrell

Russia Abandons PetroDollar By Opening Reserve Fund - 0 views

  • 2015 has not been good to Russia; the spread between Brent and WTI is gone in anticipation of US exports and both benchmarks have flirted with sub $45 prices. A hostage to such prices, the ruble has yet to begin its turnaround and the state’s finances are in extreme disarray. President Vladimir Putin’s approval ratings remain sky-high, but his country has not faced such difficult times since he took office more than 15 years ago. Since the turn of the new year the ruble has fallen over 13 percent and Russia’s central bank and finance department are running out of options – to date, policy makers have hiked interest rates to their highest level since the 1998 Russian financial crisis and embarked on a 1 trillion-ruble ($15 billion) bank recapitalization plan to little effect. Their latest, and most dramatic, plan is to abandon the dollar – at least somewhat.
  • In late December, the Kremlin ordered five large state-owned exporters – including oil and gas giants Rosneft and Gazprom – to sell their foreign currency reserves. Specifically, the companies must bring their foreign reserves to October levels by the beginning of March. To comply, the exporters may have to sell a combined $1 billion per day until March. Private companies have not yet been hit by these soft capital controls, but have instead been advised to manage their foreign exchange maneuvers responsibly. More recently, the Kremlin announced it will open its $88 billion sovereign wealth fund and flip it for rubles. The plan will see Russia convert as much as $8 billion to rubles (~500 billion) over a two-month span and place them in deposits for banks. Overall, the move will provide the Russian economy with some much needed liquidity and could speed up the healing if oil were to rebound, but it sends the wrong signals to investors and Economy Minister Alexei Ulyukaev believes the country’s credit rating will soon be marked below investment grade.
  • In any case, the move does little for the country’s ailing oil industry. The domestic market is projected to shrink amid the economic slowdown, and competition for market share abroad is increasingly competitive. Production forecasts are no rosier and the EIA predicts Russian crude production growth will be among the worst performers in both 2015 and 2016 – contrasted by continued growth in North America. Russia’s gas industry has fared no better. Gazprom’s 2014 output was historically awful and LNG is ever more a counter to the country’s pipeline politics.
  • ...2 more annotations...
  • While Russia likely envisioned abandoning its dollars under far better circumstances, the news is just as worrying for the United States and its dollar hegemony. Along with Russia, energy exporters worldwide are pulling their petrodollars out of world financial markets and other USD-denominated assets in favor of greater, and certainly necessary, spending domestically. In the past, these dollars have given life to the loan market and helped fund debt among energy importers, contributing to overall growth.
  • Petrodollar exports – otherwise known as petrodollar recycling – were negative in 2014 for the first time in nearly two decades. The result is falling global market liquidity, record low US Treasury rates, and higher borrowing costs for everyone – a tough pill to swallow for energy producers if oil prices remain low. The US dollar remains the global reserve currency for now, but the fact remains that nations are increasingly transacting on their own terms, and often times without the USD.
  •  
    Re: "EIA predicts Russian crude production growth will be among the worst performers in both 2015 and 2016 - contrasted by continued growth in North America." That's not what is being reported. Many shale oil production facilities are no longer profitable in North America and credit for new efforts has completely dried up. And unless Congress can raise enough votes in both houses to overried Obama's promised veto of a bill to alow construction of the KXL Pipeline, Most of Canada's new oil production capacity will never reach the market. (Canada has ruled out pipelines from the Alberta tar sands to its own ocean coasts, so there is no alternative to KXL.)
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Gary Edwards

The Sides Are Forming For The Coming Civil War. | Militia News - 1 views

  • America is in the choosing sides phase of the coming civil war. To use a college recruiting phrase, it is accurate to state that the letters of intent to join one side or another have mostly been signed and the commitments offered. However, there is one big uncommitted piece, but very soon the sides will be drawn.
  • The Chess Pieces of Civil War What is going on today in America all about choosing sides. There are clear lines being formed in the United States. The recruiting pool consists of the Department of Homeland Security, the American military, local law enforcement, the Russian troops pouring into the United States, the trickle of Chinese troops coming into the country through Hawaii and, of course, the poor, the middle class and elite. This is the recruiting pool which will form the chess pieces of the coming American Civil War. Even if all parties in this country wanted the country to continue, even in its present mortally wounded state, it would be foolish to believe that it could continue for much longer.
  • Barring a false flag event, US martial law will have a trigger event, which will lead to martial law, that will be financial and it will naturally occur as we are already on a collision course with destiny.
  • ...18 more annotations...
  • The net result of these staggering numbers can only end one way, and that is with a financial collapse, followed by a bank holiday, rioting in the streets and the full roll out of martial law. These financial numbers guarantee that the party cannot continue much longer. Since America, in her present form, cannot continue much longer without experiencing a cataclysmic shift, we would be wise to realize what resources are going to be the impetus for civil war. When you play the board game, Monopoly, the properties on Boardwalk are among the most coveted. It is no different in real life. The biggest prize of the coming conflict is real estate. Homes, office buildings and shopping malls are the most coveted prize. The MERS mortgage fraud continues unabated as millions of homes have been confiscated through mortgage fraud. When the dollar is worthless and is awaiting its replacement (e.g. the Amero or the Worldo), real estate will be more valuable than gold.
  • Other big game that is being hunted by both sides in the coming civil war will be bank accounts, which must be looted before the dormant computer digits we call money can be converted into hard assets. That is why my advice is, and has been, convert your cash into tangible assets which can enhance your survivability in the upcoming crash.
  • Also, your pensions, your 401K’s and your various entitlement programs are also at risk as evidenced by Secretary of Treasury Jack Lew’s “borrowing” from various Federal retirement accounts in order to increase the debt ceiling fight that will resurface in Congress, again, early next year.
  • Again, my advice is to convert your assets in tangible items which will aid in getting you through some very dark days coming up in the near future.
  • Before the cognitive dissonance crowd rears their ugly heads and accuses me of fear mongering, ask yourself what the elite did prior to the crash of the economy in 1929. For example, Joseph Kennedy took his money out of the stock market the day BEFORE it crashed. Vanderbilt, Rockefeller, Westinghouse, et al., all took their money out just prior to the crash, leaving the ignorant masses unaware of what was coming. Don’t make the same mistake.
  • I have news for you, there are Federal officials in every town, city and county in America. If one violates HR 347, they will be immediately arrested and charged with a felony.
  • The NDAA constitutes another big fence being built around the people in which all due process will soon be gone. The NDAA will allow the administration the “legal” right to secretly remove any burgeoning leadership of citizen opposition forces.
  • There are three paramount numbers that every American should be paying attention to and they are (1) national deficit ($17 trillion dollars), (2) the unfunded liabilities debt ($238 trillion dollars), and (3) the derivatives/futures debt (one quadrillion dollars which is 16 times the entire wealth of the planet.
  • In short, this spells the potential enslavement of the American people.
  • For those of you who still have your blinders on, research the NDAA and EO 13603 and then when you realize that I am correct in my interpretation, ask yourself one question; If the powers that be were not going to seize every important asset, then why would the government give itself the power to do just that?
  • And while you are at it, remember the Clean Water Act gives the EPA to control all private property as well as the precious resources of all water. And then of course, the FDA and the conflicts with local farmers is escalating.
  • And if this is not enough to convince the sheep of this country that the storm clouds are overhead, then take a look at HR 347 which outlaws protesting and takes away the First Amendment. This unconstitutional legislation makes it illegal to criticize the President and the government, as a whole, in the presence of Federal officials.
  • The second provision which will allow this country to quickly transition to martial law is Executive Order (EO) 13603 which allows the President to take control over any resource, property and even human labor within the United States. This EO gives the President unlimited authority including the ability to initiate a civilian draft as well as a military draft.
  • I just saw the Hunger Games sequel, Catching Fire, and this is eerily similar to what I saw in the movies in that the people are being provoked to revolution.
  • in the TV show, Revolution, the most evil entity in the series is the re-emergence of the United States government and the heroes of the show are rebelling against the abuse.
  • It seems like everywhere we turn in the media, the people are being encouraged to rise up now and challenge authority. I am sure the establishment would rather confront a small group of dissidents and squelch the rebellion now, before the numbers can become significant and overwhelming to the establishment and this theme is being carried out in the media.
  • The final action will consist of gun confiscation and one side of the coming conflict is attempting to position themselves to do that in the near future and that would be the DHS, the Russians and the Chinese.
  • I cannot think of another legitimate reason which would describe why they are here.
  •  
    While I'd be the first to agree that the degree of fiscal mismanagement of this nation's economy is beyond insane and have to admit that I see very little to admire in Barack Obama's presidency, the meme about Executive Order 13603 authorizing confiscation of any property and enslavement of the American public needs to be put to rest. See http://www.archives.gov/federal-register/executive-orders/2012.html#13603 E.O. 13603 is not much more than an updating of similar executive orders issued by prior presidents beginning with Dwight Eisenhower. In fact, in skimming it a few minutes ago, I didn't see anything drastically different from some of the prior related orders. E.g., it reflects that a bunch of agencies that were formerly either independent or under other departments are now under the newish Department of Homeland Security, whose Secretary now gets the authority formerly delegated to other department and agency heads. If blame must be cast, it belongs on the Congress that enacted the Defense Production Act of 1950, 50 U.S.C. 2061, et seq. The executive order does no more than obey that Act's instructions. For example there is a section authorizing pre-emption of manufacturing capacity of critical industries over any existing civilian contracts in the event of a national emergency, but that language is in the statute as well. But that power hasn't had much traction since Harry Truman tried to nationalize the steel industry to break a nationwide strike. The Supreme Court swatted down that effort as an abuse of a power that would be lawful in a true emergency, like another major. But even that semi-radical "survival" power is ameliorated by other provisions of the statute and the order that authorize loan guarantees for companies' construction and maintenance of critical productive capacity. Much of that has been implemented over the years as outright grants. So for example, many chemical manufacturing plants were built with Defense Production Act funds, with
Paul Merrell

Leaked docs show spyware used to snoop on US computers | Ars Technica - 0 views

  • Software created by the controversial UK-based Gamma Group International was used to spy on computers that appear to be located in the United States, the UK, Germany, Russia, Iran, and Bahrain, according to a leaked trove of documents analyzed by ProPublica. It's not clear whether the surveillance was conducted by governments or private entities. Customer e-mail addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer, and the Qatari government.
  • The leaked files—which were posted online by hackers—are the latest in a series of revelations about how state actors including repressive regimes have used Gamma's software to spy on dissidents, journalists, and activist groups. The documents, leaked last Saturday, could not be readily verified, but experts told ProPublica they believed them to be genuine. "I think it's highly unlikely that it's a fake," said Morgan Marquis-Bore, a security researcher who while at The Citizen Lab at the University of Toronto had analyzed Gamma Group's software and who authored an article about the leak on Thursday. The documents confirm many details that have already been reported about Gamma, such as that its tools were used to spy on Bahraini activists. Some documents in the trove contain metadata tied to e-mail addresses of several Gamma employees. Bill Marczak, another Gamma Group expert at the Citizen Lab, said that several dates in the documents correspond to publicly known events—such as the day that a particular Bahraini activist was hacked.
  • The leaked files contain more than 40 gigabytes of confidential technical material, including software code, internal memos, strategy reports, and user guides on how to use Gamma Group software suite called FinFisher. FinFisher enables customers to monitor secure Web traffic, Skype calls, webcams, and personal files. It is installed as malware on targets' computers and cell phones. A price list included in the trove lists a license of the software at almost $4 million. The documents reveal that Gamma uses technology from a French company called Vupen Security that sells so-called computer "exploits." Exploits include techniques called "zero days" for "popular software like Microsoft Office, Internet Explorer, Adobe Acrobat Reader, and many more." Zero days are exploits that have not yet been detected by the software maker and therefore are not blocked.
  • ...2 more annotations...
  • Many of Gamma's product brochures have previously been published by the Wall Street Journal and Wikileaks, but the latest trove shows how the products are getting more sophisticated. In one document, engineers at Gamma tested a product called FinSpy, which inserts malware onto a user's machine, and found that it could not be blocked by most antivirus software. Documents also reveal that Gamma had been working to bypass encryption tools including a mobile phone encryption app, Silent Circle, and were able to bypass the protection given by hard-drive encryption products TrueCrypt and Microsoft's Bitlocker.
  • The documents also describe a "country-wide" surveillance product called FinFly ISP which promises customers the ability to intercept Internet traffic and masquerade as ordinary websites in order to install malware on a target's computer. The most recent date-stamp found in the documents is August 2, coincidung with the first tweet by a parody Twitter account, @GammaGroupPR, which first announced the hack and may be run by the hacker or hackers responsible for the leak. On Reddit, a user called PhineasFisher claimed responsibility for the leak. "Two years ago their software was found being widely used by governments in the middle east, especially Bahrain, to hack and spy on the computers and phones of journalists and dissidents," the user wrote. The name on the @GammaGroupPR Twitter account is also "Phineas Fisher." GammaGroup, the surveillance company whose documents were released, is no stranger to the spotlight. The security firm F-Secure first reported the purchase of FinFisher software by the Egyptian State Security agency in 2011. In 2012, Bloomberg News and The Citizen Lab showed how the company's malware was used to target activists in Bahrain. In 2013, the software company Mozilla sent a cease-and-desist letter to the company after a report by The Citizen Lab showed that a spyware-infected version of the Firefox browser manufactured by Gamma was being used to spy on Malaysian activists.
Paul Merrell

Israeli ex-officers issue peace plan, condemn government inaction - The Boston Globe - 0 views

  • JERUSALEM — A group of more than 200 retired Israeli military and intelligence officers criticized the government for a lack of action in resolving the Israeli-Palestinian conflict on Friday and issued a detailed plan they say can end the impasse.The report’s publication closely follows a week of turmoil in Israeli politics that saw the appointment of a defense minister who is an outspoken skeptic of peace efforts with the Palestinians. Advertisement With peace talks in a deep freeze, the plan by Commanders for Israel’s Security on Friday called to ‘‘preserve conditions’’ for negotiations with the Palestinians. It urges a combination of political and security initiatives together with delivering economic benefits to Palestinians in Gaza, the West Bank, and East Jerusalem simultaneously.It calls for a freeze on settlement building, the acceptance in principle of the Arab Peace Initiative and the recognition that East Jerusalem should be part of a future Palestinian state ‘‘when established as part of a future agreement.’’ The Israeli opposition and much of the international community have long argued for these proposals.Commanders for Israel’s Security is a group comprising more than 200 retired generals and intelligence officers, veterans of decades of regional strife who are seeking to resolve the conflict. War veterans are well-respected in Israel, and their input has previously shifted debate.
  • The group’s chairman, Amnon Reshef, a fabled Israeli war hero and a former commander of its armored corps, said the plan ‘‘refutes the fear mongers’’ who claim there is currently no Palestinian peace partner or that conditions are not right for negotiations. He said such an argument, which is common in Israel after years of conflict and failed talks, ‘‘should not serve as an excuse for passivity and inaction.’’ Advertisement Reshef warned ‘‘the current status quo is an illusion’’ that endangers a two-state solution to the conflict.The report widens a growing rift between the government and the country’s military leaders. The former defense minister Moshe Yaalon was forced out after backing the military in a series of disagreements with political hard-liners. His ultranationalist successor, Avigdor Lieberman, is largely at odds with the military he now commands.
  • Reshef said his group’s plan aims to preserve conditions for future peace talks with the Palestinians while bettering Israel’s national security, regional and international ties in the interim. ‘‘In our experience we know that you cannot defeat terror only by military means, you have to improve the Palestinians quality of life,’’ he said.The group of military veterans said it hopes the plan will be considered by decision-makers and by the general public in Israel as well as in the United States.
  •  
    We're years past the point where a two-state solution was possible, if it ever was. 
Paul Merrell

US pushing local cops to stay mum on surveillance - Yahoo News - 0 views

  • WASHINGTON (AP) -- The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods, The Associated Press has learned. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any about the purchase and use of such powerful surveillance equipment. Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.
  • One well-known type of this surveillance equipment is known as a Stingray, an innovative way for law enforcement to track cellphones used by suspects and gather evidence. The equipment tricks cellphones into identifying some of their owners' account information, like a unique subscriber number, and transmitting data to police as if it were a phone company's tower. That allows police to obtain cellphone information without having to ask for help from service providers, such as Verizon or AT&T, and can locate a phone without the user even making a call or sending a text message. But without more details about how the technology works and under what circumstances it's used, it's unclear whether the technology might violate a person's constitutional rights or whether it's a good investment of taxpayer dollars. Interviews, court records and public-records requests show the Obama administration is asking agencies to withhold common information about the equipment, such as how the technology is used and how to turn it on. That pushback has come in the form of FBI affidavits and consultation in local criminal cases.
  • "These extreme secrecy efforts are in relation to very controversial, local government surveillance practices using highly invasive technology," said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, which has fought for the release of these types of records. "If public participation means anything, people should have the facts about what the government is doing to them." Harris Corp., a key manufacturer of this equipment, built a secrecy element into its authorization agreement with the Federal Communications Commission in 2011. That authorization has an unusual requirement: that local law enforcement "coordinate with the FBI the acquisition and use of the equipment." Companies like Harris need FCC authorization in order to sell wireless equipment that could interfere with radio frequencies. A spokesman from Harris Corp. said the company will not discuss its products for the Defense Department and law enforcement agencies, although public filings showed government sales of communications systems such as the Stingray accounted for nearly one-third of its $5 billion in revenue. "As a government contractor, our solutions are regulated and their use is restricted," spokesman Jim Burke said.
  • ...4 more annotations...
  • Local police agencies have been denying access to records about this surveillance equipment under state public records laws. Agencies in San Diego, Chicago and Oakland County, Michigan, for instance, declined to tell the AP what devices they purchased, how much they cost and with whom they shared information. San Diego police released a heavily censored purchasing document. Oakland officials said police-secrecy exemptions and attorney-client privilege keep their hands tied. It was unclear whether the Obama administration interfered in the AP requests. "It's troubling to think the FBI can just trump the state's open records law," said Ginger McCall, director of the open government project at the Electronic Privacy Information Center. McCall suspects the surveillance would not pass constitutional muster. "The vast amount of information it sweeps in is totally irrelevant to the investigation," she said.
  • A court case challenging the public release of information from the Tucson Police Department includes an affidavit from an FBI special agent, Bradley Morrison, who said the disclosure would "result in the FBI's inability to protect the public from terrorism and other criminal activity because through public disclosures, this technology has been rendered essentially useless for future investigations." Morrison said revealing any information about the technology would violate a federal homeland security law about information-sharing and arms-control laws — legal arguments that that outside lawyers and transparency experts said are specious and don't comport with court cases on the U.S. Freedom of Information Act. The FBI did not answer questions about its role in states' open records proceedings.
  • But a former Justice Department official said the federal government should be making this argument in federal court, not a state level where different public records laws apply. "The federal government appears to be attempting to assert a federal interest in the information being sought, but it's going about it the wrong way," said Dan Metcalfe, the former director of the Justice Department's office of information and privacy. Currently Metcalfe is the executive director of American University's law school Collaboration on Government Secrecy project. A criminal case in Tallahassee cites the same homeland security laws in Morrison's affidavit, court records show, and prosecutors told the court they consulted with the FBI to keep portions of a transcript sealed. That transcript, released earlier this month, revealed that Stingrays "force" cellphones to register their location and identifying information with the police device and enables officers to track calls whenever the phone is on.
  • One law enforcement official familiar with the Tucson lawsuit, who spoke on condition of anonymity because the official was not authorized to speak about internal discussions, said federal lawyers told Tucson police they couldn't hand over a PowerPoint presentation made by local officers about how to operate the Stingray device. Federal officials forwarded Morrison's affidavit for use in the Tucson police department's reply to the lawsuit, rather than requesting the case be moved to federal court. In Sarasota, Florida, the U.S. Marshals Service confiscated local records on the use of the surveillance equipment, removing the documents from the reach of Florida's expansive open-records law after the ACLU asked under Florida law to see the documents. The ACLU has asked a judge to intervene. The Marshals Service said it deputized the officer as a federal agent and therefore the records weren't accessible under Florida law.
  •  
    The Florida case is particularly interesting because Florida is within the jurisdiction of the U.S. Eleventh Circuit Court of Appeals, which has just ruled that law enforcement must obtain a search warrant from a court before using equipment to determine a cell phone's location.  
Paul Merrell

Secret Docs Reveal Dubious Details of Targeted Killings in Afghanistan - SPIEGEL ONLINE - 0 views

  • Combat operations in Afghanistan may be coming to an end, but a look at secret NATO documents reveals that the US and the UK were far less scrupulous in choosing targets for killing than previously believed. Drug dealers were also on the lists.
  • The child and his father are two of the many victims of the dirty secret operations that NATO conducted for years in Afghanistan. Their fate is described in secret documents to which SPIEGEL was given access. Some of the documents concerning the International Security Assistance Force (ISAF) and the NSA and GCHQ intelligence services are from the archive of whistleblower Edward Snowden. Included is the first known complete list of the Western alliance's "targeted killings" in Afghanistan. The documents show that the deadly missions were not just viewed as a last resort to prevent attacks, but were in fact part of everyday life in the guerilla war in Afghanistan. The list, which included up to 750 people at times, proves for the first time that NATO didn't just target the Taliban leadership, but also eliminated mid- and lower-level members of the group on a large scale. Some Afghans were only on the list because, as drug dealers, they were allegedly supporting the insurgents.
  • Different rules apply in war than in fighting crime in times of peace. But for years the West tied its campaign in Afghanistan to the promise that it was fighting for different values there. A democracy that kills its enemies on the basis of nothing but suspicion squanders its claim to moral superiority, making itself complicit instead. This lesson from Afghanistan also applies to the conflicts in Syria, Iraq, Pakistan and Yemen. The material SPIEGEL was able to review is from 2009 to 2011, and falls within the term of US President Barack Obama, who was inaugurated in January 2009. For Obama, Afghanistan was the "good" war and therefore legitimate -- in contrast to the Iraq war. The president wanted to end the engagement in Iraq as quickly as possible, but in Afghanistan his aim was to win.
  • ...9 more annotations...
  • After Obama assumed office, the US government opted for a new strategy. In June 2009, then Defense Secretary Robert Gates installed Stanley McChrystal, a four-star general who had served in Iraq, as commander of US forces in Afghanistan. McChrystal promoted the aggressive pursuit of the Taliban. Obama sent 33,000 additional troops to Afghanistan, but their deployment was tied to a demand that military officials provide a binding date for the withdrawal of US forces. At the same time, the president distanced himself from the grand objectives the West had proclaimed when it first marched into Kabul. The United States would not try to make Afghanistan "a perfect place," said Obama. Its new main objective was to fight the insurgency.
  • This marked the beginning of one of the bloodiest phases of the war. Some 2,412 civilians died in Afghanistan in 2009. Two-thirds of them were killed by insurgents and 25 percent by NATO troops and Afghan security forces. The number of operations against the Taliban rose sharply, to between 10 and 15 a night. The operations were based on the lists maintained by the CIA and NATO -- Obama's lists. The White House dubbed the strategy "escalate and exit." McChrystal's successor, General David Petraeus, documented the strategy in "Field Manual 3-24" on fighting insurgencies, which remains a standard work today. Petraeus outlined three stages in fighting guerilla organizations like the Taliban. The first was a cleansing phase, in which the enemy leadership is weakened. After that, local forces were to regain control of the captured areas. The third phase was focused on reconstruction. Behind closed doors, Petraeus and his staff explained exactly what was meant by "cleansing." German politicians recall something that Michael T. Flynn, the head of ISAF intelligence in Afghanistan, once said during a briefing: "The only good Talib is a dead Talib."
  • Under Petraeus, a merciless campaign began to hunt down the so-called shadow governors and local supporters aligned with the Islamists. For the Americans, the fact that the operations often ended in killings was seen as a success. In August 2010, Petraeus proudly told diplomats in Kabul that he had noticed a shifting trend. The figures he presented as evidence made some of the ambassadors feel uneasy. At least 365 insurgent commanders, Petraeus explained, had been neutralized in the last three months, for an average of about four killings a day. The existence of documents relating to the so-called Joint Prioritized Effects List (JPEL) has only been described in vague terms until now. The missions by US special units are mentioned but not discussed in detail in the US Army Afghanistan war logs published by WikiLeaks in 2010, together with the New York Times, the Guardian and SPIEGEL. The documents that have now become accessible provide, for the first time, a systematic view of the targeted killings. They outline the criteria used to determine who was placed on the list and why.
  • According to the NSA document, in October 2008 the NATO defense ministers made the momentous decision that drug networks would now be "legitimate targets" for ISAF troops. "Narcotics traffickers were added to the Joint Prioritized Effects List (JPEL) list for the first time," the report reads. In the opinion of American commanders like Bantz John Craddock, there was no need to prove that drug money was being funneled to the Taliban to declare farmers, couriers and dealers as legitimate targets of NATO strikes.
  • The document also reveals how vague the basis for deadly operations apparently was. In the voice recognition procedure, it was sufficient if a suspect identified himself by name once during the monitored conversation. Within the next 24 hours, this voice recognition was treated as "positive target identification" and, therefore, as legitimate grounds for an airstrike. This greatly increased the risk of civilian casualties. Probably one of the most controversial decisions by NATO in Afghanistan is the expansion of these operations to include drug dealers. According to an NSA document, the United Nations estimated that the Taliban was earning $300 million a year through the drug trade. The insurgents, the document continues, "could not be defeated without disrupting the drug trade."
  • When an operation could potentially result in civilian casualties, ISAF headquarters in Kabul had to be involved. "The rule of thumb was that when there was estimated collateral damage of up to 10 civilians, the ISAF commander in Kabul was to decide whether the risk was justifiable," says an ISAF officer who worked with the lists for years. If more potential civilian casualties were anticipated, the decision was left up to the relevant NATO headquarters office. Bodyguards, drivers and male attendants were viewed as enemy combatants, whether or not they actually were. Only women, children and the elderly were treated as civilians. Even officers who were involved in the program admit that these guidelines were cynical. If a Taliban fighter was repeatedly involved in deadly attacks, a "weighing of interests" was performed. The military officials would then calculate how many human lives could be saved by the "kill," and how many civilians would potentially be killed in an airstrike.
  • In early 2009, Craddock, NATO's Supreme Allied Commander for Europe at the time, issued an order to expand the targeted killings of Taliban officials to drug producers. This led to heated discussions within NATO. German NATO General Egon Ramms declared the order "illegal" and a violation of international law. The power struggle within NATO finally led to a modification of Craddock's directive: Targets related to the drug production at least had to be investigated as individual cases. The top-secret dossier could be highly damaging to the German government. For years, German authorities have turned over the mobile phone numbers of German extremists in Afghanistan to the United States. At the same time, the German officials claimed that homing in on mobile phone signals was far too imprecise for targeted killings. This is apparently an untenable argument. According to the 2010 document, both Eurofighters and drones had "the ability to geolocate a known GSM handset." In other words, active mobile phones could serve as tracking devices for the special units.
  • The classified documents could now have legal repercussions. The human rights organization Reprieve is weighing legal action against the British government. Reprieve believes it is especially relevant that the lists include Pakistanis who were located in Pakistan. "The British government has repeatedly stated that it is not pursuing targets in Pakistan and not doing air strikes on Pakistani territory," says Reprieve attorney Jennifer Gibson. The documents, she notes, also show that the "war on terror" was virtually conflated with the "war on drugs." "This is both new and extremely legally troubling," says Gibson.
  • A 2009 CIA study that addresses targeted killings of senior enemy officials worldwide reaches a bitter conclusion. Because of the Taliban's centralized but flexible leadership, as well as its egalitarian tribal structures, the targeted killings were only moderately successful in Afghanistan. "Morover, the Taliban has a high overall ability to replace lost leaders," the study finds.
Gary Edwards

The Daily Bell - Richard Ebeling on Higher Interest Rates, Collectivism and the Coming ... - 0 views

  • The "larger dysfunction," as you express it, arises out of a number of factors. The primary one, in my view, is a philosophical and psychological schizophrenia among the American people.
  • While many on "the left" ridicule the idea, there is a strong case for the idea of "American exceptionalism," meaning that the United States stands out as something unique, different and special among the nations of the world.
  • the American Founding Fathers constructed a political system in the United States based on a concept on which no other country was consciously founded:
  • ...95 more annotations...
  • But the American Revolution and the US Constitution hailed a different conception of man, society and government.
  • n the rest of the world, and for all of human history, the presumption has been that the individual was a slave or a subject to a higher authority. It might be the tribal chief; or the "divinely ordained" monarch who presumed to rule over and control people in the name of God; or, especially after the French Revolution and the rise of modern socialism, "the nation" or "the people" who laid claim to the life and work of the individual.
  • the idea of individual rights.
  • That is, as long as the individual did not violate the equal rights of others to their life, liberty and property, each person was free to shape and guide his own future, and give meaning and value to his own life as he considered best in the pursuit of that happiness that was considered the purpose and goal of each man during his sojourn on this Earth.
  • Governments did not exist to give or bestow "rights" or "privileges" at its own discretion.
  • Governments were to secure and protect each individual's rights, which he possessed by "the nature of things."
  • The individual was presumed to own himself. He was "sovereign."
  • The real and fundamental notion of "self-government" referred to the right of each individual to rule over himself.
  • Each individual, by his nature and his reason, had a right to his life, his liberty and his honestly acquired property.
  • during the first 150 years of America's history there was virtually no Welfare State and relatively few government regulations, controls and restrictions on the choices and actions of the free citizen.
  • But for more than a century, now, an opposing conception of man, society and government has increasingly gained a hold over the ideas and attitudes of people in the US.
  • It was "imported" from Europe in the form of modern collectivism.
  • The individual was expected to see himself as belonging to something "greater" than himself. He was to sacrifice for "great national causes."
  • He was told that if life had not provided all that he desired or hoped for, it was because others had "exploited" him in some economic or social manner, and that government would redress the "injustice" through redistribution of wealth or regulation of the marketplace.
  • If he had had financial and material success, the individual should feel guilty and embarrassed by it, because, surely, if some had noticeably more, it could only be because others had been forced to live with noticeably less.
  • left on its own, free competition tends to evolve into harmful monopolies and oligopolies, with the wealthy "few" benefiting at the expense of the "many."
  • They are the crises of the Interventionist-Welfare State: the attempt to impose reactionary collectivist policies of political paternalism and redistributive plunder on a society still possessing parts of its original individualist and rights-based roots.
  • it is in the form of communism's and socialism's critique of capitalism.
  • Unregulated capitalism leads to "unearned" and "excessive" profits; unbridled markets generate the business cycle and the hardships of recessions and depressions;
  • These two conflicting conceptions of man, society and government have been and are at war here in the United States.
  • And if it cannot be gotten and guaranteed through the redistributive mechanisms of the European Union and the euro, well, maybe we should return power to our own nation-states to provide the jobs, the social "safety nets" and the financial means to pay for it through, once again, printing our own national paper currencies.
  • This is the political-philosophical bankruptcy of the West and the dead ends of the collectivist promises of the last 100 years.
  • Ludwig von Mises's book, Socialism: An Economic and Sociological Analysis, originally published in 1922, demonstrated how and why a socialist, centrally planned system was inherently unworkable.
  • The nationalization of productive property, the abolition of markets and the prohibition of all competitive exchange among the members of society would prevent the emergence and operation of a price system, without which it is impossible to know people's demands for desired goods and the relative value they place on them.
  • It also prevents the emergence of prices for the factors of production (land, labor, capital) and makes it impossible to know their opportunity costs – the value of those factors of production in alternative competing uses among entrepreneurs desiring to employ them.
  • Without such a price system the central planners are flying blind, unable to rationally know or decide how best to utilize labor, capital and resources in productively efficient ways to make the goods and services most highly valued by the consuming public.
  • Thus, Mises concluded, comprehensive socialist central planning would lead to "planned chaos."
  • And, therefore, there is no guarantee that the amount of investments undertaken and their time horizons are compatible with the available resources not also being demanded and used for more immediate consumer goods production in the society.
  • As a consequence, financial markets do not work like real markets.
  • Thus, the interventionist state leads to waste, inefficiency and misuses of resources that lower the standards of living that we all, otherwise, could have enjoyed.
  • We cannot be sure what the amount of real savings may be in the society to support real and sustainable investment and capital formation.
  • Government intervention prevents prices from "telling the truth" about the real supply and demand conditions thus leading to imbalances and distortions in the market.
  • We cannot know what the "real cost" of borrowing should be, since interest rates are not determined by actual, private sector savings and investment decisions.
  • Government production regulations, controls, restrictions and prohibitions prevent entrepreneurs from using their knowledge, ability and capital in ways that most effectively produce the goods consumers actually want and at the most cost-competitive prices possible.
  • This is why countries around the world periodically experience booms and busts, inflations and recessions − not because of some inherent instabilities or "irrationalities" in financial markets, but because of monetary central planning through central banking that does not allow market-based financial intermediation to develop and work as it could and would in a real free-market setting.
  • But in the United States and especially in Europe, government "austerity" means merely temporarily reducing the rate of increase in government spending, slowing down the rate at which new debt is accumulating and significantly raising taxes in an attempt to close the deficit gap.
  • The fundamental problem is that over the decades, the size and scope of governments in the Western world have been growing far more than the rates at which their economies have been expanding, so that the "slice" of the national economic "pie" eaten by government has been growing larger and larger, even when the "pie" in absolute terms is bigger than it was, say, 30 or 40 years ago.
  • European governments, in general, take the view that "austerity" means squeezing the private sector more through taxes and other revenue sources to avoid any noticeable and significant cuts in what government does and spends.
  • So there is "austerity" for the private sector and a mad rush for financial "safety nets" for the government and those who live off the State.
  • In reality, of course, it is the burdens of government regulation, taxation and impediments to more flexible labor and related markets that have generated the high unemployment rates and the retarded recovery from the recession.
  • Instead, the "common market" ideal has been transformed into the goal of a European Union "Super-State" to which the individual countries and their citizens would be subservient and obedient.
  • Keynesian policies offer people and politicians what they want to hear. Claiming that any sluggish business or lost jobs are due to a lack of "aggregate demand," Keynes argued that full employment and profitable business could only be reestablished and maintained through "activist" government monetary and fiscal policy – print money and run budget deficits.
  • What Britain and Europe should have as its goal is the ideal of the classical liberal free traders of the 19th century – non-intervention by governments in people's lives, at home and abroad. That is, a de-politicization of society, so people may freely work, trade and travel as they peacefully wish, with government merely the protector of people's individual rights.
  • Take the benefits away and tell people they are free to come and work to support themselves and their families. Restore more flexibility and competitiveness to labor markets and reduce taxes and business regulations.
  • Then those who come to Britain's shores will be those wanting freedom and opportunity without being a burden upon others.
  • What was needed was a change in ideas from the statist mentality to one of individual freedom and unhampered free markets.
  • In an epoch of collectivist ideas, don't be surprised if governments regulate, control, intervene and redistribute wealth.
  • The tentacle of regulations, restrictions and politically-correct social controls are spreading out in every direction from Brussels and its European-wide manipulating and mismanaging bureaucracy.
  • In the name of assuring "national prosperity," politicians could spend money to buy the votes that get them elected and reelected to government offices.
  • And every special interest group could make the case that government-spending programs that benefitted them were all reasonable and necessary to assure a fully employed and growing economy.
  • Furthermore, the Keynesian rationale for government deficit spending enabled politicians to seem to be able to offer something for nothing. They could offer, say, $100 of government spending to voters and special interest groups but the tax burden imposed in the present might only be $75, since the remainder of the money to pay for that government spending was borrowed. And that borrowed money would not have to be repaid until some indefinite time in the future by unspecific taxpayers when that "tomorrow" finally arrived.
  • instability
  • Keynes argued that the market economy's inherent
  • arose from the
  • who were subject to irrational and unpredictable waves of "optimism" and "pessimism."
  • animal spirits" of businessmen
  • Mises argued that there was nothing inherent in the market economy to bring about these swings of economic booms followed by periods of depression and unemployment.
  • If markets got out of balance with the necessity of an eventual correction in the economy to, once again, set things right, the source of this instability was government monetary policy.
  • Central banks too often followed a policy of trying to create "good times" in the economy by expanding the money supply through the banking system.
  • With new, excess funds created by the central bank available for lending, banks lower rates of interest to attract borrowers.
  • But this throws savings and investment out of balance, since the rate of interest no longer serves as a reliable indicator and signal concerning the availability of real savings in the economy in relation to those wanting to borrow funds for various investment purposes.
  • The economic crisis comes when it is discovered that all the claims on resources, capital and labor for all the attempted consumption and investment activities in the economy are greater than the actual and available amounts of such scarce resources.
  • The recession period, in Mises's view, is the necessary "correction" period when in the post-boom era, people must adapt and adjust to the newly discovered "real" supply and demand conditions in the market.
  • Any interference with the "rebalancing" of the economy by government raising taxes, imposing more regulations, or new artificial government "stimulus" activities merely makes it more difficult and time-consuming for people in the private sector to get the economy back on an even keel.
  • Friedrich A. Hayek, once observed, unemployment is not "caused" by stopping an inflation, but rather inflation induces the artificial employments that cannot be sustained and which inevitably disappear once the inflation is reined in.
  • The recession of 2008-2009 was the result of several years of central bank stimulus.
  • From 2003 to 2008, the Federal Reserve increased the money supply by about 50 percent.
  • Interest rates for much of this time, when adjusted for inflation, were either zero or negative.
  • Awash in cash, banks extended loans to virtually anyone, with no serious and usual concern about the borrower's credit-worthiness.
  • This was most notably true in the housing market, where government agencies like Fannie May and Freddie Mac were pressuring banks to make mortgage loans by promising a guarantee that they would make good on any bad home loans.
  • Since 2008-2009, the Federal Reserve has, again, turned on the monetary spigot, increasing its own portfolio by almost $3 trillion, by buying US Treasuries, US mortgages and other assets.
  • So why has there not been a complementary explosion of price inflation?
  • In some areas there has been, most clearly in the stock market and the bond market, But the reason why all that newly created money has not brought about a higher price inflation is due to the fact that a large part of all newly created money is sitting as unlent reserves in banks.
  • This is because the Federal Reserve has been paying banks a rate of interest slightly above the market interest rates to induce banks not to lend.
  • (a) general "regime uncertainty," that is, no one knows what government policy will be tomorrow; will ObamaCare be fully implemented after January 2014?;
  • Among the reasons for the sluggish jobs growth in the US are:
  • (b) what will taxes be for the rest of the current president's term in the White House
  • (c) what will the regulatory environment be like for the next three years – in 2012, the government implemented around 80,000 pages of regulations as printed in the Federal Registry;
  • (d) how will the deficit and debt problems play out between Congress and the White House and will it threaten the general financial situation in the country; an
  • (e) what wars, if any, will the government find itself involved in, in places like the Middle East?
  • China
  • is still a controlled and commanded society, with a government that works hard to try to determine what people read, see and think.
  • All these building projects have been brought into existence by a government that not only controls the money supply and manipulates interest rates but also heavy-handedly tells banks whom to specifically loan to and for what investment activities.
  • Central planning is alive and well in China, with the motives being both power and profits for those inside and outside the Communist Party having the most influence and connections in "high" places.
  • In my opinion, China is heading for a great economic crisis, resulting from a highly imbalanced and distorted economic system still guided far more by politics than sound market decision-making.
  • global financial markets in any foreseeable future. It is a money that still primarily exists to serve the political purposes of those who sit in the "inner circles" of power in Beijing.
  • One hundred years ago, in 1913, how many could have predicted that a year later a European-wide war would break out that would lead to the destruction of great European empires and set the stage for the rise of totalitarian collectivism that resulted in an even worse global war two decades later?
  • Thus, whether, at the end of the day, freedom triumphs and the future is one of liberty and prosperity is partly on each one of us.
  • Near the end of his great book, Socialism, Ludwig von Mises said:
  • "Everyone carries a part of society on his shoulders; no one is relieved of his share of responsibility by others. And no one can find a safe way out for himself if society is sweeping towards destruction. Therefore, everyone, in his own interest, must thrust himself vigorously into the intellectual battle. None can stand aside with unconcern; the interests of everyone hang on the result. Whether he chooses or not, every man is drawn into the great historical struggle, the decisive battle into which our epoch has plunged us . . . Whether society shall continue to evolve or where it shall decay lies . . . in the hands of man."
  • In my view, the idea of a "soft landing" is an illusion based on the idea held by central bankers, themselves, that they have the wisdom and ability to know how to "micro-manage" the all the changes and adjustments resulting from their own manipulations of the monetary aggregates. They do not have this wisdom and ability. So hold on for what is most likely to be another rocky road.
  • It was Mises's clear vision that once society has broken the relationship between value and payment, sooner or later people would not know the price of anything.
  • At this point, investment ceases and business becomes furtive and transactional.
  • People cannot plan for the future because they do not understand the reality of the present.
  • Society begins to sink.
  •  
    Incredible.  A simple explanation that explains everything.  Rchard Ebeling's "Unified Theory of Everything" is something every American can understand.  If only they would take a break from "Dancing with the Stars" and pay attention to the future of their country and the world.  It's a future where either "individual freedom", as defined by our Constitution and Declaration of Independence, will win out; or, the forces of fascist socialism / marxism will continue to roll and rule.  Incredible read!!!!
Gary Edwards

A First Look at the Book "The Liberty Amendments", by Mark Levin - Tea Party Command Ce... - 0 views

  •  
    Excellent youtube interview! "Mark Levin has just published his much-anticipated book The Liberty Amendments: Restoring the American Republic. Three of his eleven proposed Constitutional amendments appear below, and a Sean Hannity interview of Levin appears at the bottom of this post. Levin's book is centered around the Constitution's Article V (aka "Article 5″). That article specifies two methods for amending the Constitution. Just briefly - In the first method of creating amendments, Congress proposes and the States dispose. In the second method of creating amendments, the States propose and the States dispose. The second method has never been used successfully, although there have been many attempts.  It is that second method that the Founders provided as a remedy for an overreaching federal government. In the second method, neither Congress, nor the President, nor the Supreme Court have any voting or veto authority whatsoever.  The states are in full control. Period. It is, by design, the ultimate override for an over-spending, over-taxing, over-regulating, and increasingly dictatorial and lawless federal government. Clearly, its time has come. In that second method, Congress has at most a mere ministerial role.  Of course Congress is very protective of its power, and could, through delay and inaction, attempt to convert their mere ministerial role into a de facto veto power, halting any attempt for a state-driven amendment action. Apparently Congress has done exactly that many times, acting in bad faith and contrary to the Framers' spirit and intent for Article V which is clearly expressed in the Federalist Papers. Legal scholars have been trying to find a way around the federal government's intransigence, so far with little success. Now more than ever, it is time for We the People to bring the power of Article V to the center ring of American politics. That starts with awareness, and Levin's book will br
Gary Edwards

Stopping America's Federal Debt Explosion by Martin Feldstein - Project Syndicate - 0 views

  • the fiscal deficit is the most serious long-term economic problem facing US policymakers.
  • A decade ago, the federal debt was just 35% of GDP. It is now more than double that and projected to reach 86% in 2016. But that’s just the beginning. The annual budget deficit projected for 2016 is 5% of GDP. If it stays at that level, the debt ratio would eventually rise to 125%.
  • The high and rising level of the national debt hurts the US economy in many ways. Paying the interest requires higher federal taxes or a larger budget deficit. In 2016, the interest on the national debt is equal to nearly 16% of the revenue from personal income tax. By 2026, the projected interest on the national debt will equal more than 31% of this revenue, even if interest rates rise as slowly as the CBO projects.
  • ...3 more annotations...
  • the time will come when the US will have to pay the interest by exporting more goods and services than it imports. And boosting net exports will require a weaker dollar to make US products more attractive to foreign buyers and foreign goods more expensive to US buyers, implying a loss in Americans’ standard of living.
  • Increased borrowing by the federal government also means crowding out the private sector. Lower borrowing and capital investment by firms reduces future productivity growth and growth in real incomes.
  • Federal taxes now take 18.3% of GDP and are projected to remain at that level for the next decade, unless tax rules or rates are changed. The rate structure for personal taxation has changed over the past 30 years, with the top tax rate rising from 28% in 1986 to more than 40% now. The corporate rate of 35% is already the highest in the industrial world.
  •  
    "CAMBRIDGE - The US Congressional Budget Office (CBO) has just delivered the bad news that the national debt is now rising faster than GDP and heading toward ratios that we usually associate with Italy or Spain. That confirms my view that the fiscal deficit is the most serious long-term economic problem facing US policymakers. A decade ago, the federal debt was just 35% of GDP. It is now more than double that and projected to reach 86% in 2016. But that's just the beginning. The annual budget deficit projected for 2016 is 5% of GDP. If it stays at that level, the debt ratio would eventually rise to 125%. Support Project Syndicate's mission Project Syndicate needs your help to provide readers everywhere equal access to the ideas and debates shaping their lives. LEARN MORE Even that projection assumes that interest rates on the national debt will rise slowly, averaging less than 3.5% in 2026. But if the US debt ratio really is on the fast track to triple-digit levels, investors in the US and abroad may rightly fear that the government has lost control of the budget process. With debt exploding, foreign bondholders could begin to worry that the US will find a way to reduce its real value by stoking inflation or imposing a withholding tax on all government bond interest. In that case, investors will insist on a risk premium: higher interest rates on Treasury debt. Higher interest rates, in turn, would increase the deficit - and thus the future level of the debt ratio - even more. The high and rising level of the national debt hurts the US economy in many ways. Paying the interest requires higher federal taxes or a larger budget deficit. In 2016, the interest on the national debt is equal to nearly 16% of the revenue from personal income tax. By 2026, the projected interest on the national debt will equal more than 31% of this revenue, even if interest rates rise as slowly as the CBO projects. Foreign investors now own more than half of net government debt, and
1 - 20 of 91 Next › Last »
Showing 20 items per page