Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Open

Rss Feed Group items tagged

Gary Edwards

The List: Unnecessarily Shut Down by Obama to Inflict Public Pain - 0 views

  •  
    "The media may or may not report on these individual occurrences, but what they will never do is provide the American people with the full context and scope of Obama's shrill pettiness. Below is a list of illogical, unnecessary, and shockingly spiteful moves our government is making in the name of essential and non-essential. This list will be regularly updated, and if you have something you feel should be added, please email me at jnolte@breitbart.com or tweet me @NolteNC.Please include a link to the news source. -- 1. Treatments for Children Suffering From Cancer - The GOP have agreed to a compromise by funding part of the government, including the National Institutes of Health, which offers children with cancer last-chance experimental treatment. Obama has threatened to veto this funding. 2. The World War II Memorial - The WWII memorial on the DC Mall is a 24/7 open-air memorial that is not regularly staffed. Although the White House must have known that WWII veterans in their eighties and nineties had already booked flights to visit this memorial, the White House still found the resources to spitefully barricade the attraction.  The Republican National Committee has offered to cover any costs required to keep the memorial open. The White House refused. Moreover, like the NIH, the GOP will pass a compromise bill that would fund America's national parks. Obama has threatened to veto that bill. 3. Furloughed Military Chaplains Not Allowed to Work for Free - Furloughed military chaplains willing to celebrate Mass and baptisms for free have been told they will be punished for doing so. 4. Business Stops In Florida Keys - Although the GOP have agreed to compromise in the ongoing budget stalemate and fund the parks, Obama has threatened to veto that funding. As a result, small businesses, hunters, and commercial fisherman can't practice their trade. While the feds have deemed the personnel necessary to keep this area open "non-essential," the "enforcement office
Paul Merrell

President Xi's speech to Davos in full | World Economic Forum - 0 views

  • “It was the best of times, it was the worst of times.” These are the words used by the English writer Charles Dickens to describe the world after the Industrial Revolution. Today, we also live in a world of contradictions. On the one hand, with growing material wealth and advances in science and technology, human civilization has developed as never before. On the other hand, frequent regional conflicts, global challenges like terrorism and refugees, as well as poverty, unemployment and widening income gap have all added to the uncertainties of the world. Many people feel bewildered and wonder: What has gone wrong with the world? To answer this question, one must first track the source of the problem. Some blame economic globalization for the chaos in the world. Economic globalization was once viewed as the treasure cave found by Ali Baba in The Arabian Nights, but it has now become the Pandora’s box in the eyes of many. The international community finds itself in a heated debate on economic globalization.
  • Today, I wish to address the global economy in the context of economic globalization. The point I want to make is that many of the problems troubling the world are not caused by economic globalization. For instance, the refugee waves from the Middle East and North Africa in recent years have become a global concern. Several million people have been displaced, and some small children lost their lives while crossing the rough sea. This is indeed heartbreaking. It is war, conflict and regional turbulence that have created this problem, and its solution lies in making peace, promoting reconciliation and restoring stability. The international financial crisis is another example. It is not an inevitable outcome of economic globalization; rather, it is the consequence of excessive chase of profit by financial capital and grave failure of financial regulation. Just blaming economic globalization for the world’s problems is inconsistent with reality, and it will not help solve the problems.
  • But we should also recognize that economic globalization is a double-edged sword. When the global economy is under downward pressure, it is hard to make the cake of global economy bigger. It may even shrink, which will strain the relations between growth and distribution, between capital and labor, and between efficiency and equity. Both developed and developing countries have felt the punch. Voices against globalization have laid bare pitfalls in the process of economic globalization that we need to take seriously. As a line in an old Chinese poem goes, “Honey melons hang on bitter vines; sweet dates grow on thistles and thorns.” In a philosophical sense, nothing is perfect in the world. One would fail to see the full picture if he claims something is perfect because of its merits, or if he views something as useless just because of its defects. It is true that economic globalization has created new problems, but this is no justification to write economic globalization off completely. Rather, we should adapt to and guide economic globalization, cushion its negative impact, and deliver its benefits to all countries and all nations.
  • ...15 more annotations...
  • Whether you like it or not, the global economy is the big ocean that you cannot escape from. Any attempt to cut off the flow of capital, technologies, products, industries and people between economies, and channel the waters in the ocean back into isolated lakes and creeks is simply not possible. Indeed, it runs counter to the historical trend.
  • First, lack of robust driving forces for global growth makes it difficult to sustain the steady growth of the global economy. The growth of the global economy is now at its slowest pace in seven years. Growth of global trade has been slower than global GDP growth. Short-term policy stimuli are ineffective. Fundamental structural reform is just unfolding. The global economy is now in a period of moving toward new growth drivers, and the role of traditional engines to drive growth has weakened. Despite the emergence of new technologies such as artificial intelligence and 3-D printing, new sources of growth are yet to emerge. A new path for the global economy remains elusive. Second, inadequate global economic governance makes it difficult to adapt to new developments in the global economy. Madame Christine Lagarde recently told me that emerging markets and developing countries already contribute to 80 percent of the growth of the global economy. The global economic landscape has changed profoundly in the past few decades. However, the global governance system has not embraced those new changes and is therefore inadequate in terms of representation and inclusiveness. The global industrial landscape is changing and new industrial chains, value chains and supply chains are taking shape. However, trade and investment rules have not kept pace with these developments, resulting in acute problems such as closed mechanisms and fragmentation of rules.
  • Third, uneven global development makes it difficult to meet people’s expectations for better lives. Dr. Schwab has observed in his book The Fourth Industrial Revolution that this round of industrial revolution will produce extensive and far-reaching impacts such as growing inequality, particularly the possible widening gap between return on capital and return on labor. The richest one percent of the world’s population own more wealth than the remaining 99 percent. Inequality in income distribution and uneven development space are worrying. Over 700 million people in the world are still living in extreme poverty. For many families, to have warm houses, enough food and secure jobs is still a distant dream. This is the biggest challenge facing the world today. It is also what is behind the social turmoil in some countries. All this shows that there are indeed problems with world economic growth, governance and development models, and they must be resolved. The founder of the Red Cross Henry Dunant once said, “Our real enemy is not the neighboring country; it is hunger, poverty, ignorance, superstition and prejudice.” We need to have the vision to dissect these problems; more importantly, we need to have the courage to take actions to address them.
  • First, we should develop a dynamic, innovation-driven growth model. The fundamental issue plaguing the global economy is the lack of driving force for growth.Innovation is the primary force guiding development. Unlike the previous industrial revolutions, the fourth industrial revolution is unfolding at an exponential rather than linear pace. We need to relentlessly pursue innovation. Only with the courage to innovate and reform can we remove bottlenecks blocking global growth and development. With this in mind, G-20 leaders reached an important consensus at the Hangzhou Summit, which is to take innovation as a key driver and foster new driving force of growth for both individual countries and the global economy. We should develop a new development philosophy and rise above the debate about whether there should be more fiscal stimulus or more monetary easing. We should adopt a multipronged approach to address both the symptoms and the underlying problems. We should adopt new policy instruments and advance structural reform to create more space for growth and sustain its momentum. We should develop new growth models and seize opportunities presented by the new round of industrial revolution and digital economy. We should meet the challenges of climate change and aging population. We should address the negative impact of IT application and automation on jobs. When cultivating new industries and new forms models of business models, we should create new jobs and restore confidence and hope to our peoples.
  • Second, we should pursue a well-coordinated and inter-connected approach to develop a model of open and win-win cooperation. Today, mankind has become a close-knit community of shared future. Countries have extensive converging interests and are mutually dependent. All countries enjoy the right to development. At the same time, they should view their own interests in a broader context and refrain from pursuing them at the expense of others. We should commit ourselves to growing an open global economy to share opportunities and interests through opening-up and achieve win-win outcomes. One should not just retreat to the harbor when encountering a storm, for this will never get us to the other shore of the ocean. We must redouble efforts to develop global connectivity to enable all countries to achieve inter-connected growth and share prosperity. We must remain committed to developing global free trade and investment, promote trade and investment liberalization and facilitation through opening-up and say no to protectionism. Pursuing protectionism is like locking oneself in a dark room. While wind and rain may be kept outside, that dark room will also block light and air. No one will emerge as a winner in a trade war.
  • Third, we should develop a model of fair and equitable governance in keeping with the trend of the times. As the Chinese saying goes, people with petty shrewdness attend to trivial matters, while people with vision attend to governance of institutions. There is a growing call from the international community for reforming the global economic governance system, which is a pressing task for us. Only when it adapts to new dynamics in the international economic architecture can the global governance system sustain global growth. Countries, big or small, strong or weak, rich or poor, are all equal members of the international community. As such, they are entitled to participate in decision-making, enjoy rights and fulfill obligations on an equal basis. Emerging markets and developing countries deserve greater representation and voice. The 2010 IMF quota reform has entered into force, and its momentum should be sustained. We should adhere to multilateralism to uphold the authority and efficacy of multilateral institutions. We should honor promises and abide by rules. One should not select or bend rules as he sees fit. The Paris Agreement is a hard-won achievement which is in keeping with the underlying trend of global development. All signatories should stick to it instead of walking away from it as this is a responsibility we must assume for future generations.
  • Fourth, we should develop a balanced, equitable and inclusive development model. As the Chinese saying goes, “A just cause should be pursued for common good.”Development is ultimately for the people. To achieve more balanced development and ensure that the people have equal access to opportunities and share in the benefits of development, it is crucial to have a sound development philosophy and model and make development equitable, effective and balanced.
  • We should foster a culture that values diligence, frugality and enterprise and respects the fruits of hard work of all. Priority should be given to addressing poverty, unemployment, the widening income gap and the concerns of the disadvantaged to promote social equity and justice. It is important to protect the environment while pursuing economic and social progress so as to achieve harmony between man and nature and between man and society. The 2030 Agenda for Sustainable Development should be implemented to realize balanced development across the world. A Chinese adage reads, “Victory is ensured when people pool their strength; success is secured when people put their heads together.” As long as we keep to the goal of building a community of shared future for mankind and work hand in hand to fulfill our responsibilities and overcome difficulties, we will be able to create a better world and deliver better lives for our peoples.
  • This is a path that puts people’s interests first. China follows a people-oriented development philosophy and is committed to bettering the lives of its people. Development is of the people, by the people and for the people. China pursues the goal of common prosperity. We have taken major steps to alleviate poverty and lifted over 700 million people out of poverty, and good progress is being made in our efforts to finish building a society of initial prosperity in all respects. This is a path of pursuing reform and innovation. China has tackled difficulties and met challenges on its way forward through reform. China has demonstrated its courage to take on difficult issues, navigate treacherous rapids and remove institutional hurdles standing in the way of development. These efforts have enabled us to unleash productivity and social vitality. Building on progress of 30-odd years of reform, we have introduced more than 1,200 reform measures over the past four years, injecting powerful impetus into China’s development.
  • This is a path of pursuing common development through opening-up. China is committed to a fundamental policy of opening-up and pursues a win-win opening-up strategy. China’s development is both domestic and external oriented; while developing itself, China also shares more of its development outcomes with other countries and peoples. China’s outstanding development achievements and the vastly improved living standards of the Chinese people are a blessing to both China and the world. Such achievements in development over the past decades owe themselves to the hard work and perseverance of the Chinese people, a quality that has defined the Chinese nation for several thousand years. We Chinese know only too well that there is no such thing as a free lunch in the world. For a big country with over 1.3 billion people, development can be achieved only with the dedication and tireless efforts of its own people. We cannot expect others to deliver development to China, and no one is in a position to do so. When assessing China’s development, one should not only see what benefits the Chinese people have gained, but also how much hard effort they have put in, not just what achievements China has made, but also what contribution China has made to the world. Then one will reach a balanced conclusion about China’s development.
  • Between 1950 and 2016, despite its modest level of development and living standard, China provided more than 400 billion yuan of foreign assistance, undertook over 5,000 foreign assistance projects, including nearly 3,000 complete projects, and held over 11,000 training workshops in China for over 260,000 personnel from other developing countries. Since it launched reform and opening-up, China has attracted over $1.7 trillion of foreign investment and made over $1.2 trillion of direct outbound investment, making huge contribution to global economic development. In the years following the outbreak of the international financial crisis, China contributed to over 30 percent of global growth every year on average. All these figures are among the highest in the world. The figures speak for themselves. China’s development is an opportunity for the world; China has not only benefited from economic globalization but also contributed to it. Rapid growth in China has been a sustained, powerful engine for global economic stability and expansion. The inter-connected development of China and a large number of other countries has made the world economy more balanced. China’s remarkable achievement in poverty reduction has contributed to more inclusive global growth. And China’s continuous progress in reform and opening-up has lent much momentum to an open world economy.
  • Despite a sluggish global economy, China’s economy is expected to grow by 6.7 percent in 2016, still one of the highest in the world. China’s economy is far bigger in size than in the past, and it now generates more output than it did with double-digit growth in the past. Household consumption and the services sector have become the main drivers of growth. In the first three quarters of 2016, added value of the tertiary industry took up 52.8 percent of the GDP and domestic consumption contributed to 71 percent of economic growth. Household income and employment have steadily risen, while per unit GDP energy consumption continues to drop. Our efforts to pursue green development are paying off. The Chinese economy faces downward pressure and many difficulties, including acute mismatch between excess capacity and an upgrading demand structure, lack of internal driving force for growth, accumulation of financial risks, and growing challenges in certain regions. We see these as temporary hardships that occur on the way forward. And the measures we have taken to address these problems are producing good results. We are firm in our resolve to forge ahead. China is the world’s largest developing country with over 1.3 billion people, and their living standards are not yet high. But this reality also means China has enormous potential and space for development. Guided by the vision of innovative, coordinated, green, open and shared development, we will adapt to the new normal, stay ahead of the curve, and make coordinated efforts to maintain steady growth, accelerate reform, adjust economic structure, improve people’s living standards and fend off risks. With these efforts, we aim to achieve medium-high rate of growth and upgrade the economy to higher end of the value chain.
  • — China will foster an enabling and orderly environment for investment. We will expand market access for foreign investors, build high-standard pilot free trade zones, strengthen protection of property rights, and level the playing field to make China’s market more transparent and better regulated. In the coming five years, China is expected to import $8 trillion of goods, attract $600 billion of foreign investment and make $750 billion of outbound investment. Chinese tourists will make 700 million overseas visits. All this will create a bigger market, more capital, more products and more business opportunities for other countries. China’s development will continue to offer opportunities to business communities in other countries. China will keep its door wide open and not close it. An open door allows both other countries to access the Chinese market and China itself to integrate with the world. And we hope that other countries will also keep their door open to Chinese investors and keep the playing field level for us.
  • — China will vigorously foster an external environment of opening-up for common development. We will advance the building of the Free Trade Area of the Asia Pacific and negotiations of the Regional Comprehensive Economic Partnership to form a global network of free trade arrangements. China stands for concluding open, transparent and win-win regional free trade arrangements and opposes forming exclusive groups that are fragmented in nature. China has no intention to boost its trade competitiveness by devaluing the RMB, still less will it launch a currency war. Over three years ago, I put forward the “Belt and Road” initiative. Since then, over 100 countries and international organizations have given warm responses and support to the initiative. More than 40 countries and international organizations have signed cooperation agreements with China, and our circle of friends along the “Belt and Road” is growing bigger. Chinese companies have made over $50 billion of investment and launched a number of major projects in the countries along the routes, spurring the economic development of these countries and creating many local jobs. The “Belt and Road” initiative originated in China, but it has delivered benefits well beyond its borders.
  • Ladies and Gentlemen,Dear Friends, World history shows that the road of human civilization has never been a smooth one, and that mankind has made progress by surmounting difficulties. No difficulty, however daunting, will stop mankind from advancing. When encountering difficulties, we should not complain about ourselves, blame others, lose confidence or run away from responsibilities. We should join hands and rise to the challenge. History is created by the brave. Let us boost confidence, take actions and march arm-in-arm toward a bright future.
  •  
    Very important speech. A must-read (I snipped only portions).
Paul Merrell

Wells Fargo Fined Over Secret Sales Policy to Open Fake Customer Accounts - nsnbc inter... - 0 views

  • The Consumer Financial Protection Bureau (CFPB) has fined Wells Fargo for $100 million based on fraudulent customer account practices. An additional $85 million is to be paid to the city of Los Angeles in California, along with the Office of the Comptroller of the Currency.
  • Last year Wells Fargo was sued by employees (current and former) and customers all across the nation for setting up “unwanted accounts, unwarranted fees”. According to the lawsuit, this was “the largest California-based bank violated state and federal laws by misusing confidential information and failing to notify customers when personal information was breached.” Using “aggressive tactics” to coerce new customers, Wells Fargo made it “difficult to correct the mistakes” made by Wells Fargo and return fees to customers because of “high-pressure sales culture set unrealistic quotas, spurring employees to engage in fraudulent conduct to keep their jobs and boost the company’s profits.” Over the course of an extended period of time, “Wells Fargo employees secretly opened unauthorized accounts to hit sales targets and receive bonuses.” There were 1.5 million accounts opened without the authorization of customers and 500,000 credit cards accounts to boot. Wells Fargo has consistently blames “a few rogue employees. Five hundred employees were terminated, according to a Wells Fargo spokesperson. There was no mention of rescinding of bonuses paid to those employees, and there is no clear evidence that executive’s payouts totaling $155 million for “performance based compensation” for 2012 through 2013 was returned to the bank.
  • Those bonuses were administered based on the fraudulent accounts opened without customer approval. In a statement, Wells Fargo expressed belated regret and a sudden desire to “take responsibility for any instances where customers may have received a product that they did not request.” The training that caused this problem in the first place was a cross-selling strategy called “Going For Gr-Eight” which is a brochure for employees to push banking products onto households of existing customers to increase fee potential and overall profitability. Wells Fargo “staffers, fearing disciplinary action from managers, begged friends and family members to open ghost accounts” and forged signatures “and falsified phone numbers” of customers who did not want to open an account. This practice drove Wells Fargo’s financial success with an estimated “26% of the company’s revenue was from fee income, including those from credit and debit card accounts, trusts and investments.” The bank not only stole money from customers but “also damage their credit scores” and put some into collections to garner fees “for unauthorized accounts went unpaid”. In case of a complaining customer, Wells Fargo would “sandbag” their customers; meaning “failing to open accounts when requested by customers, and instead accumulating a number of account applications to be opened at a later date.”
  • ...1 more annotation...
  • Another devious tactic Wells Fargo employed was “bundling” or “incorrectly informing customers that certain products are available only in packages with other products such as additional accounts, insurance, annuities, and retirement plans.” This is not an isolated incident. Wells Fargo has fired 5,300 employees for this same “illegal behavior”. Beyond this questionable business practice, Wells Fargo was previously recognized by the CFPB for misapplying student loan payments in order to increase fee income. In this case, Wells Fargo was fined $3.6 million and forced to pay $410,000 to student loan borrowers for restitution.
Paul Merrell

Gov't Amasses Riot Police, Military Gear, And Opens Makeshift Prisons To Prepare For RNC - 0 views

  • Authorities in Cleveland, Ohio, are adding fuel to an already “combustible” atmosphere, some activists say, as the city readies extra jail space and courtrooms and shuts down a local university to house 1,700 riot police and their weapons in preparation for demonstrations at next week’s Republican Party convention. Democracy Now! reported Thursday that city officials “say some courts will be kept open almost 24 hours per day in case protesters are arrested en masse. Authorities have also opened up extra jail space to hold protesters.” The decision to shut down classes at Case Western Reserve University to house riot police drew ire from students and faculty,
  • Adding tension to the situation in Cleveland is the fact that several Black Lives Matter protests last week saw mass arrests and violent behavior from police, leading civil rights groups in Louisiana to sue the Baton Rouge police force for violating demonstrators’ First Amendment rights—not to mention the fatal police shootings of two black men in St. Pauland Baton Rouge a week prior. In Cleveland in particular, there is widespread distrust of the police department that fatally shot 12-year-old Tamir Rice, and then lied about the circumstances of the killing to cover themselves. Police nationwide have also been on edge since a lone gunman ambushed a peaceful protest in Dallas, killing five officers. Moreover, it emerged on Thursday that officials from the FBI have been personally contacting civil rights activists associated with the Black Lives Matter movement to warn them that they shouldn’t show up at the convention, the Independent reports.
  • As Ohio has an “open carry” law allowing the open display of guns, observers expect many convention-goers to be armed. “Should violence break out during protests in Cleveland, open-carry activists bearing long-gun rifles may distract officers, frighten demonstrators, or inadvertently endanger themselves,” CityLab argued.
  • ...2 more annotations...
  • Activists are preparing for the worst. The Boston Globe reported that hundreds of demonstrators “will undergo training to help ensure their safety. Some will don neon green caps and be tasked with documenting—with video—the use of force by police or attacks by other groups.” “Activists are being trained to make sure their hands are always exposed, so it’s evident they are not holding weapons, and to clearly articulate if approached by police that they are ‘complying, not resisting,'” the newspaper added.
  • Heads of the Department of Homeland Security and the FBI both told reporters that theyfear violence from “radical activists” at next week’s convention, ABC reported. “It’s a threat we’re watching very, very carefully,” FBI director James Comey said.
  •  
    The DNC convention may be every bit as tension-filled, with Sanders supporters aiming to bring 1 million people to the convention to sway the vote on floor amendments to the Democratic platform.
Gary Edwards

KeepTheWebOpen.com - 0 views

  •  
    Keep the Web Open and out of the hands of Agenda 21 UN socialists and the tyranny of ACTA. California Representative Darryl Issa has proposed  OPEN - the Online Protection & ENforcement of Ditital Trade Act.  Join the movement to keep the Web Open and sign on today. The background to this urgency is that Obama is trying to run an end around Congress, claiming that he has the authority to sign ACTA: From the Vanguard of Freedom: The Anti-Counterfeiting Trade Agreement. ACTA is supposed to strengthen intellectual property rights; that is, the rights of artists to protect their creations from being copied and counterfeited, essentially stolen and reproduced without consent. However, many including Congressman Darrel Issa (via his website on this subject) has called ACTA "an unconstitutional power grab started by President George W. Bush and completed by President Barack Obama - despite the White House's January 14 criticism of legislative solutions that harm the Internet and erode individual rights." Says Issa: "…The Constitution gives Congress the power to pass intellectual property legislation - like SOPA and PIPA - and gives the Senate the power to ratify treaties. But the Obama Administration maintains that ACTA is not even a treaty, justifying the exclusion of both American citizens and their elected representatives. It is a practice Vice President Joe Biden decried as a U.S. Senator…" Maira Sutton and Parker Higgins, writing for the Electronic Frontier Foundation, an "electronics" rights advocacy organization, say in an article they authored, that "…We Have Every Right to Be Furious About ACTA." Sutton and Higgins write: "…Negotiated in secret, ACTA bypassed checks and balances of existing international IP norm-setting bodies, without any meaningful input from national parliaments, policymakers, or their citizens. Worse still, the agreement creates a new global institution, an 'ACTA Committee' to ove
Gary Edwards

Birth of an Internet independence movement | CIO - 0 views

  • The arrogance and utter incongruity of declaring Internet and telephone networks equivalent has led a group of friends, all of them reluctant activists, to convene an effort to restore Internet independence. So far, the group of “Tech Innovators” includes John Perry Barlow, Mark Cuban, Tim Draper, Tom Evslin, Dave Farber, Charlie Giancarlo, George Gilder, John Gilmore, Brian Martin, Bob Metcalfe, Ray Ozzie, Jeff Pulver, Michael Robertson, Scott McNealy and Les Vadasz. Through this civic initiative, we hope to defend the remarkable success of the Internet and lead a conversation toward the future — not the past, where laws enacted under FDR must inevitably lead us. The open Internet rules from the FCC end the “permissionless innovation” they purport to protect by inviting the commission to regulate computer networks for the first time. The uncertain benefits and certain unintended consequences of the policy reversal expose the communicating public to unnecessary risk and threaten to upend the success of the past 20 years. The Tech Innovators believe that by recognizing “Internet Independence Day,” Congress can help initiate and advance bipartisan legislation to restore the private-sector framework responsible for of the success of the Internet.
  • Americans today enjoy a thousand-fold improvement from the 56Kbps dial-up modems that 15 million Internet early adopters relied on in the ’90s. The Internet now reaches 3 billion people, and a proliferation of services push communication options far beyond the long-distance phone call of 1995. The FCC plan to impose public utility Title II provisions ends the policies responsible for these accomplishments. Domains subject to telephone-style regulations suffer stagnation without exception. A routine 10Mbps connection available as a nonregulated information service prior to the Open Internet Order would have cost $10,000 per month as a Title II data service in 1995. The insertion of fiat regulatory powers will prove fatal to the entrepreneurial energies responsible for building what FCC Chairman Wheeler calls “the most powerful network in the history of mankind” — a network built beyond the reach of FCC regulatory jurisdiction.
  • The Open Internet Order invents artificial distinctions between content companies, Internet providers and end users for the purposes of regulation. This will lead to the same types of regulatory arbitrage and innovation-deadening consequences as prior distinctions such as “long distance” or “intra-lata.” History demonstrates that asserting artificial market distinctions for purposes of regulation always invites arbitrage and unintended consequences. Resources White Paper 802.11ac: Wireless The Easy Way White Paper Web Application Acceleration: Practical Implementations See All Go The commission obtains jurisdiction by changing the definition of “public switched network” to include networks with IP addresses. The complete transformation of a policy landscape represents a decision the Constitution grants exclusively to Congress.
  • ...1 more annotation...
  • The coming litigation leaves the Internet ecosystem in jeopardy without regard to the outcome. The preference for a congressional action addressing current conditions and issues relative to the prospects of an 80-year-old regulatory framework should not be controversial. The privatization of the Internet represented an experiment. Restoring Internet independence merely recognizes the remarkable success of the commercial Internet.
  •  
    "The 20th anniversary of the privatization of the Internet deserves recognition by the U.S. Congress and celebration by all Americans as "Internet Independence Day." Two decades ago, on April 30, 1995, the Internet was privatized with the decommissioning of the NSFNET backbone. State of the CIO 2015 More than 500 top IT leaders responded to our online survey to help us gauge the state of the READ NOW The past two decades of Internet-driven success were set in motion with the passage of the High Performance Computing Act of 1991, championed by Sen. Al Gore and signed into law by President George H.W. Bush. That decision of the U.S. government to step back and privatize the Internet led to a thriving and open Internet that provides a remarkable platform for innovation. Ironically, the Federal Communication Commission's recently announced Open Internet Order reasserts government control over the Internet by the means of repurposing Depression-era industrial policy meant to address a monopoly in voice-transmission technology. The FCC went down the dangerous and uncertain legal path of reverting to traditional, utility-style regulation under Title II of the Communications Act of 1934."
Gary Edwards

The Civil War is Here | Frontpage Mag - 0 views

  •  
    "Daniel Greenfield, a Shillman Journalism Fellow at the Freedom Center, is a New York writer focusing on radical Islam. A civil war has begun. This civil war is very different than the last one. There are no cannons or cavalry charges. The left doesn't want to secede. It wants to rule. Political conflicts become civil wars when one side refuses to accept the existing authority. The left has rejected all forms of authority that it doesn't control. The left has rejected the outcome of the last two presidential elections won by Republicans. It has rejected the judicial authority of the Supreme Court when it decisions don't accord with its agenda. It rejects the legislative authority of Congress when it is not dominated by the left. It rejected the Constitution so long ago that it hardly bears mentioning.   It was for total unilateral executive authority under Obama. And now it's for states unilaterally deciding what laws they will follow. (As long as that involves defying immigration laws under Trump, not following them under Obama.) It was for the sacrosanct authority of the Senate when it held the majority. Then it decried the Senate as an outmoded institution when the Republicans took it over. It was for Obama defying the orders of Federal judges, no matter how well grounded in existing law, and it is for Federal judges overriding any order by Trump on any grounds whatsoever. It was for Obama penalizing whistleblowers, but now undermining the government from within has become "patriotic". There is no form of legal authority that the left accepts as a permanent institution. It only utilizes forms of authority selectively when it controls them. But when government officials refuse the orders of the duly elected government because their allegiance is to an ideology whose agenda is in conflict with the President and Congress, that's not activism, protest, politics or civil disobedience; it's treason. After losing Congress, the left consolidated
Gary Edwards

Character Matters and Mitt Romney has it - 1 views

The following eMail message is being forwarded around the Web and it does confirm my own personal experiences with then Governor Romney in 2005-2006. The issue then was the Massachusetts Open Gove...

Romney ODF Massachusetts-Lesson Massachusetts-RFi Microsoft OOXML

started by Gary Edwards on 17 Apr 12 no follow-up yet
Gary Edwards

The Libertarian View: Are Tariffs Bad? - 1 views

  •  
    As many know, i spent quite a bit of time working for a Chinese Company seeking to enter the USA-European software market.  My task was to research the market, discover and define a market opportunity, design the product, and then work as product manager to get that service to market.  I took this job to better understand the Chinese marketplace and how sovereign Chinese companies work.  What i learned is how the Chinese seek to exploit and totally dominate open markets.  Software is just a category whose time has come.  and there are thousands of Chinese companies lining up.  The first step though is to fine tune the existing blueprint used by other Sina sovereigns.  amazing stuff. My take away from this experience is that the USA MUST set up a 30% tariff on ALL imports, and do so IMMEDIATELY!!!  Yesterday is not soon enough! As a newly minted libertarian, i wondered about the obvious conflict with Austrian Economics and their dedication to free markets and free trade?  I found the answer at this Libertarian forum, where many members were in heated discussion.  Comment #7 sums it up best i think.  Including a link to Ron Paul's Tariff-NAFTA speech. The thing is, the 30% Tariff should be part of an overall TAX REDUCTION PLAN.  I support the FAIR TAX and the Balanced Budget Amendment.  As an alternative to the Fair Tax, I would also support a 17% flat tax with no exceptions.  The ideal situation being an immediate, uncompromising, no exceptions 30% tariff on ALL imports coupled with the Fair Tax and the Balanced Budget Amendment.   And yes, i do believe this plan is consistent with the Founding Fathers Constitution.  But it took some kind of research to establish that opinion.   I've also concluded that "conservatism" is a convenient philosophical vehicle for the corrupt crony corporatism of both the military-industrial-complex, banksters and, international corporations.  Free trade and open markets concepts are perverted to become a thin veil
Gary Edwards

How World War I Paved the Way for the Warfare State :: The Mises Economics Blog: The Ci... - 0 views

  •  
    Part ONE "by David Stockman Remarks To The Committee For The Republic, Washington DC, February 2014 (Part 1 of 6 Parts) [From David Stockman's Contra Corner.] Flask in hand, Boris Yelstin famously mounted a tank outside the Soviet Parliament in August 1991. Presently, the fearsome Red Army stood down-an outcome which 45 years of Cold War military mobilization by the West had failed to accomplish. At the time, the U.S. Warfare State's budget- counting the pentagon, spy agencies, DOE weapons, foreign aid, homeland security and veterans--was about $500 billion in today's dollars.  Now, a quarter century on from the Cold War's end, that same metric stands at $900 billion. This near doubling of the Warfare State's fiscal girth is a tad incongruous.  After all, America's war machine was designed to thwart a giant, nuclear-armed industrial state, but, alas, we now have no industrial state enemies left on the planet. The much-shrunken Russian successor to the Soviet Union, for example, has become a kleptocracy run by a clever thief who prefers stealing from his own citizens. Likewise, the Red Chinese threat consists of a re-conditioned aircraft carrier bought second-hand from a former naval power--otherwise known as the former Ukraine. China's bubble-ridden domestic economy would collapse within six weeks were it to actually bomb the 4,000 Wal-Mart outlets in America on which its mercantilist export machine utterly depends. On top of that, we've been fired as the world's policeman, al Qaeda has splintered among warlords who inhabit the armpits of the world from Yemen to Somalia and during last September's Syria war scare the American people even took away the President's keys to the Tomahawk missile batteries.  In short, the persistence of America's trillion dollar Warfare State budget needs some serious "splainin". The Great War and Its Aftermath My purpose tonight is to sketch the long story of how it all happened, starti
Paul Merrell

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

Germany Opens Criminal Investigation On Alleged NSA Merkel Phone Tap - 0 views

  • German prosecutors have opened an investigation into the alleged monitoring of Chancellor Angela Merkel’s cellphone by the U.S. National Security Agency, officials said Wednesday, in a move that could again complicate diplomatic relations between the two allies. It was not immediately clear what the new investigation might mean in terms of possible prosecutions of Americans. Documents provided by National Security Agency leaker Edward Snowden indicated in October that the U.S. was monitoring Merkel’s cellphone conversations, as well as those of 35 other foreign leaders. Merkel expressed outrage and accused Washington of a grave breach of trust. In the ensuing diplomatic fallout, President Barack Obama acknowledged Germany’s anger and promised that new guidelines would cut back on such monitoring, except in the case of a national security interest. “The leaders of our close friends and allies deserve to know that if I want to learn what they think about an issue, I will pick up the phone and call them rather than turning to surveillance,” Obama said at the time.
  • Following the news of the German probe, Obama’s deputy national security adviser, Ben Rhodes, said the U.S. believes direct dialogue between the two countries rather than an investigation is the best way to address Germany’s concerns. “We believe we have an open line and good communication” with Merkel and her team, Rhodes told reporters aboard Air Force One as Obama flew to Brussels for a meeting of the Group of Seven nations. After mulling for months whether to open a formal probe, Chief Federal Prosecutor Harald Range determined “that sufficient factual evidence exists that unknown members of U.S. intelligence services spied on the mobile phone of Chancellor Angela Merkel,” his office said. In a similarly thorny diplomatic case, Germany got as far as issuing warrants for 13 unidentified CIA agents suspected of kidnapping a German terrorism suspect and taking him to a detention center in Afghanistan. The case was shelved in 2007 after the U.S. Justice Department said extraditing the agents would harm “American national interests.”
  • In his Wednesday announcement, Range’s office said he was not opening a formal investigation of wider allegations of blanket surveillance of telecommunications data in Germany by U.S. and British intelligence, saying that there was not yet sufficient factual evidence of concrete crimes. His office said that will remain under consideration. Merkel’s spokesman, Steffen Seibert, declined to comment on Range’s decision or on whether the government fears it will weigh on relations with the U.S. The government didn’t exert any influence on the prosecutor, Seibert told reporters. “I am not going to evaluate here the decision he has made,” he said. Separately, the German Parliament earlier this year set up a committee to investigate the scope of spying by the NSA and other intelligence services in Germany.
  •  
    There's a bit of comedy beneath the surface here. When Edward Snowden was in Hong Kong and news of the NSA leak hit, the U.S. Dept. of Justice promptly filed a criminal espionage charge against Snowden and attempted to extradite him from Hong Kong. Snowden left Hong Kong before the extradition paperwork was processed enough to result in his arrest.  Now with a pending criminal investigation of the NSA's espionage activities aimed at Germany's chancellor, the Obama White House says it wants dialog, not a criminal investigation. Would the U.S. honor its extradition treaty with Germany if NSA officials or the Director of Intelligence were charged with espionage in Germany? One might suspect that a dual-standard would be deployed, in effect saying that only espionage charges that the U.S. lodges can justify extradition. Or at least that's the way it worked when Italy tried and convicted in absentia several CIA officials and an Air Force officer of espionage activities, relating to the kidnapping and "extraordinary rendition" of a gentleman in Italy.       But this incident serves as a reminder that when the NSA officials conduct foreign intelligence activities, they will in most cases be deliberately violating the criminal laws of other nations. And the same activity aimed at U.S. citizens is also criminal, which is undoubtedly why Sen. Ron Wyden asked Director of Intelligence Clapper if the NSA had taken account of the Computer Fraud and Abuse Act in its processing of domestic digital communications. Clapper said he would get back to Wyden on that in writing. So far as I'm aware, Wyden is still waiting for that answer. There are lots of comedians in Washington, D.C. Most of them have no idea that they are comedians.   
Paul Merrell

BofA Said to Split Regulators Over Moving Merrill Derivatives to Bank Unit - Bloomberg - 0 views

  • Bank of America Corp. (BAC), hit by a credit downgrade last month, has moved derivatives from its Merrill Lynch unit to a subsidiary flush with insured deposits, according to people with direct knowledge of the situation. The Federal Reserve and Federal Deposit Insurance Corp. disagree over the transfers, which are being requested by counterparties, said the people, who asked to remain anonymous because they weren’t authorized to speak publicly. The Fed has signaled that it favors moving the derivatives to give relief to the bank holding company, while the FDIC, which would have to pay off depositors in the event of a bank failure, is objecting, said the people. The bank doesn’t believe regulatory approval is needed, said people with knowledge of its position.
  • Three years after taxpayers rescued some of the biggest U.S. lenders, regulators are grappling with how to protect FDIC- insured bank accounts from risks generated by investment-banking operations. Bank of America, which got a $45 billion bailout during the financial crisis, had $1.04 trillion in deposits as of midyear, ranking it second among U.S. firms. “The concern is that there is always an enormous temptation to dump the losers on the insured institution,” said William Black, professor of economics and law at the University of Missouri-Kansas City and a former bank regulator. “We should have fairly tight restrictions on that.”
  • Moody’s Investors Service downgraded Bank of America’s long-term credit ratings Sept. 21, cutting both the holding company and the retail bank two notches apiece. The holding company fell to Baa1, the third-lowest investment-grade rank, from A2, while the retail bank declined to A2 from Aa3.
  • ...5 more annotations...
  • The Moody’s downgrade spurred some of Merrill’s partners to ask that contracts be moved to the retail unit, which has a higher credit rating, according to people familiar with the transactions. Transferring derivatives also can help the parent company minimize the collateral it must post on contracts and the potential costs to terminate trades after Moody’s decision, said a person familiar with the matter. Bank of America estimated in an August regulatory filing that a two-level downgrade by all ratings companies would have required that it post $3.3 billion in additional collateral and termination payments, based on over-the-counter derivatives and other trading agreements as of June 30. The figure doesn’t include possible collateral payments due to “variable interest entities,” which the firm is evaluating, it said in the filing.
  • Derivatives are financial instruments used to hedge risks or for speculation. They’re derived from stocks, bonds, loans, currencies and commodities, or linked to specific events such as changes in the weather or interest rates. Dodd-Frank Rules Keeping such deals separate from FDIC-insured savings has been a cornerstone of U.S. regulation for decades, including last year’s Dodd-Frank overhaul of Wall Street regulation. The legislation gave the FDIC, which liquidates failing banks, expanded powers to dismantle large financial institutions in danger of failing. The agency can borrow from the Treasury Department to finance the biggest lenders’ operations to stem bank runs. It’s required to recoup taxpayer money used during the resolution process through fees on the largest firms.
  • Bank of America’s holding company -- the parent of both the retail bank and the Merrill Lynch securities unit -- held almost $75 trillion of derivatives at the end of June, according to data compiled by the OCC. About $53 trillion, or 71 percent, were within Bank of America NA, according to the data, which represent the notional values of the trades. That compares with JPMorgan’s deposit-taking entity, JPMorgan Chase Bank NA, which contained 99 percent of the New York-based firm’s $79 trillion of notional derivatives, the OCC data show.
  • Moving derivatives contracts between units of a bank holding company is limited under Section 23A of the Federal Reserve Act, which is designed to prevent a lender’s affiliates from benefiting from its federal subsidy and to protect the bank from excessive risk originating at the non-bank affiliate, said Saule T. Omarova, a law professor at the University of North Carolina at Chapel Hill School of Law. “Congress doesn’t want a bank’s FDIC insurance and access to the Fed discount window to somehow benefit an affiliate, so they created a firewall,” Omarova said. The discount window has been open to banks as the lender of last resort since 1914. As a general rule, as long as transactions involve high- quality assets and don’t exceed certain quantitative limitations, they should be allowed under the Federal Reserve Act, Omarova said.
  • In 2009, the Fed granted Section 23A exemptions to the banking arms of Ally Financial Inc., HSBC Holdings Plc, Fifth Third Bancorp, ING Groep NV, General Electric Co., Northern Trust Corp., CIT Group Inc., Morgan Stanley and Goldman Sachs Group Inc., among others, according to letters posted on the Fed’s website. The central bank terminated exemptions last year for retail-banking units of JPMorgan, Citigroup, Barclays Plc, Royal Bank of Scotland Plc and Deutsche Bank AG. The Fed also ended an exemption for Bank of America in March 2010 and in September of that year approved a new one. Section 23A “is among the most important tools that U.S. bank regulators have to protect the safety and soundness of U.S. banks,” Scott Alvarez, the Fed’s general counsel, told Congress in March 2008.
  •  
    So according to Bloomberg, JPMorgan's commercial bank was the recipient of 99 percent of JPMorgan's $79 trillion (face value of derivatives) in bad bets. So adding JPMorgan's $78 trillion or so to the $75 trillion in bad bets Bank of America unloaded on its FDIC insured subsidiary, we arrive at $153 trillion in bad bets moved by two investment banks alone under the FDIC umbrella. Meanwhile, FDIC has authority under Dodd-Frank to liquidate these insolvent banks but doesn't, despite several successful lawsuits to recover the value of toxic derivatives that they sold to smaller banks that failed (which implies that FDIC could tell JPMorgan and BoA's investment banksters that they've got to pay off the toxic assets they transferred to their commercial banks, rather than diluting the insurance for normal depositors. Problem: the two big investment banks don't have sufficient assets to absorb those losses, so the too-politically-connected-to-fail factor kicks in. Note that I have not done any legal research in regard to these issues and am basing these observations on what has been stated about legal requirements in various media articles.
Paul Merrell

US pushing local cops to stay mum on surveillance - Yahoo News - 0 views

  • WASHINGTON (AP) -- The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods, The Associated Press has learned. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any about the purchase and use of such powerful surveillance equipment. Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.
  • One well-known type of this surveillance equipment is known as a Stingray, an innovative way for law enforcement to track cellphones used by suspects and gather evidence. The equipment tricks cellphones into identifying some of their owners' account information, like a unique subscriber number, and transmitting data to police as if it were a phone company's tower. That allows police to obtain cellphone information without having to ask for help from service providers, such as Verizon or AT&T, and can locate a phone without the user even making a call or sending a text message. But without more details about how the technology works and under what circumstances it's used, it's unclear whether the technology might violate a person's constitutional rights or whether it's a good investment of taxpayer dollars. Interviews, court records and public-records requests show the Obama administration is asking agencies to withhold common information about the equipment, such as how the technology is used and how to turn it on. That pushback has come in the form of FBI affidavits and consultation in local criminal cases.
  • "These extreme secrecy efforts are in relation to very controversial, local government surveillance practices using highly invasive technology," said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, which has fought for the release of these types of records. "If public participation means anything, people should have the facts about what the government is doing to them." Harris Corp., a key manufacturer of this equipment, built a secrecy element into its authorization agreement with the Federal Communications Commission in 2011. That authorization has an unusual requirement: that local law enforcement "coordinate with the FBI the acquisition and use of the equipment." Companies like Harris need FCC authorization in order to sell wireless equipment that could interfere with radio frequencies. A spokesman from Harris Corp. said the company will not discuss its products for the Defense Department and law enforcement agencies, although public filings showed government sales of communications systems such as the Stingray accounted for nearly one-third of its $5 billion in revenue. "As a government contractor, our solutions are regulated and their use is restricted," spokesman Jim Burke said.
  • ...4 more annotations...
  • Local police agencies have been denying access to records about this surveillance equipment under state public records laws. Agencies in San Diego, Chicago and Oakland County, Michigan, for instance, declined to tell the AP what devices they purchased, how much they cost and with whom they shared information. San Diego police released a heavily censored purchasing document. Oakland officials said police-secrecy exemptions and attorney-client privilege keep their hands tied. It was unclear whether the Obama administration interfered in the AP requests. "It's troubling to think the FBI can just trump the state's open records law," said Ginger McCall, director of the open government project at the Electronic Privacy Information Center. McCall suspects the surveillance would not pass constitutional muster. "The vast amount of information it sweeps in is totally irrelevant to the investigation," she said.
  • A court case challenging the public release of information from the Tucson Police Department includes an affidavit from an FBI special agent, Bradley Morrison, who said the disclosure would "result in the FBI's inability to protect the public from terrorism and other criminal activity because through public disclosures, this technology has been rendered essentially useless for future investigations." Morrison said revealing any information about the technology would violate a federal homeland security law about information-sharing and arms-control laws — legal arguments that that outside lawyers and transparency experts said are specious and don't comport with court cases on the U.S. Freedom of Information Act. The FBI did not answer questions about its role in states' open records proceedings.
  • But a former Justice Department official said the federal government should be making this argument in federal court, not a state level where different public records laws apply. "The federal government appears to be attempting to assert a federal interest in the information being sought, but it's going about it the wrong way," said Dan Metcalfe, the former director of the Justice Department's office of information and privacy. Currently Metcalfe is the executive director of American University's law school Collaboration on Government Secrecy project. A criminal case in Tallahassee cites the same homeland security laws in Morrison's affidavit, court records show, and prosecutors told the court they consulted with the FBI to keep portions of a transcript sealed. That transcript, released earlier this month, revealed that Stingrays "force" cellphones to register their location and identifying information with the police device and enables officers to track calls whenever the phone is on.
  • One law enforcement official familiar with the Tucson lawsuit, who spoke on condition of anonymity because the official was not authorized to speak about internal discussions, said federal lawyers told Tucson police they couldn't hand over a PowerPoint presentation made by local officers about how to operate the Stingray device. Federal officials forwarded Morrison's affidavit for use in the Tucson police department's reply to the lawsuit, rather than requesting the case be moved to federal court. In Sarasota, Florida, the U.S. Marshals Service confiscated local records on the use of the surveillance equipment, removing the documents from the reach of Florida's expansive open-records law after the ACLU asked under Florida law to see the documents. The ACLU has asked a judge to intervene. The Marshals Service said it deputized the officer as a federal agent and therefore the records weren't accessible under Florida law.
  •  
    The Florida case is particularly interesting because Florida is within the jurisdiction of the U.S. Eleventh Circuit Court of Appeals, which has just ruled that law enforcement must obtain a search warrant from a court before using equipment to determine a cell phone's location.  
Paul Merrell

Annals of National Security: The Redirection : The New Yorker - 0 views

  • In the past few months, as the situation in Iraq has deteriorated, the Bush Administration, in both its public diplomacy and its covert operations, has significantly shifted its Middle East strategy. The “redirection,” as some inside the White House have called the new strategy, has brought the United States closer to an open confrontation with Iran and, in parts of the region, propelled it into a widening sectarian conflict between Shiite and Sunni Muslims. To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda.
  • Jumblatt said, “We told Cheney that the basic link between Iran and Lebanon is Syria—and to weaken Iran you need to open the door to effective Syrian opposition.” There is evidence that the Administration’s redirection strategy has already benefitted the Brotherhood. The Syrian National Salvation Front is a coalition of opposition groups whose principal members are a faction led by Abdul Halim Khaddam, a former Syrian Vice-President who defected in 2005, and the Brotherhood. A former high-ranking C.I.A. officer told me, “The Americans have provided both political and financial support. The Saudis are taking the lead with financial support, but there is American involvement.” He said that Khaddam, who now lives in Paris, was getting money from Saudi Arabia, with the knowledge of the White House. (In 2005, a delegation of the Front’s members met with officials from the National Security Council, according to press reports.) A former White House official told me that the Saudis had provided members of the Front with travel documents.
  • Jumblatt then told me that he had met with Vice-President Cheney in Washington last fall to discuss, among other issues, the possibility of undermining Assad. He and his colleagues advised Cheney that, if the United States does try to move against Syria, members of the Syrian Muslim Brotherhood would be “the ones to talk to,” Jumblatt said.
  • ...5 more annotations...
  • Partition would leave Israel surrounded by “small tranquil states,” he said. “I can assure you that the Saudi kingdom will also be divided, and the issue will reach to North African states. There will be small ethnic and confessional states,” he said. “In other words, Israel will be the most important and the strongest state in a region that has been partitioned into ethnic and confessional states that are in agreement with each other. This is the new Middle East.”
  • Nasrallah said he believed that America also wanted to bring about the partition of Lebanon and of Syria. In Syria, he said, the result would be to push the country “into chaos and internal battles like in Iraq.” In Lebanon, “There will be a Sunni state, an Alawi state, a Christian state, and a Druze state.” But, he said, “I do not know if there will be a Shiite state.”
  • Fourth, the Saudi government, with Washington’s approval, would provide funds and logistical aid to weaken the government of President Bashir Assad, of Syria. The Israelis believe that putting such pressure on the Assad government will make it more conciliatory and open to negotiations.
  • Flynt Leverett, a former Bush Administration National Security Council official, told me that “there is nothing coincidental or ironic” about the new strategy with regard to Iraq. “The Administration is trying to make a case that Iran is more dangerous and more provocative than the Sunni insurgents to American interests in Iraq, when—if you look at the actual casualty numbers—the punishment inflicted on America by the Sunnis is greater by an order of magnitude,” Leverett said. “This is all part of the campaign of provocative steps to increase the pressure on Iran. The idea is that at some point the Iranians will respond and then the Administration will have an open door to strike at them.”
  • “It seems there has been a debate inside the government over what’s the biggest danger—Iran or Sunni radicals,” Vali Nasr, a senior fellow at the Council on Foreign Relations, who has written widely on Shiites, Iran, and Iraq, told me. “The Saudis and some in the Administration have been arguing that the biggest threat is Iran and the Sunni radicals are the lesser enemies. This is a victory for the Saudi line.”
  •  
    Propaganda issued by the U.S. government has it that the war in Syria began with peaceful protesters seeking reform of the Syrian government. This Seymour Hersh article from 2007 gives us a better glimpse of the truth, that the Neocon-led Bush II Administration worked with Saudi Arabia to undermine the Syrian government using radical Sunnis as their vehicle. That is in line with the Israeli/Zionist long-term plan to Balkanize other nations in the Mideast while expanding Israeli territory and influence. 
Paul Merrell

Wells Fargo charged with opening accounts without customers' permission - May. 5, 2015 - 0 views

  • Wells Fargo is accused of opening up accounts and credit cards in customers' names without their authorization. The accounts are being opened by Wells Fargo employees under pressure to meet unrealistic sales goals and quotas, according to the civil complaint filed by the Los Angeles City Attorney.
  • The complaint charges that bank employees opened new accounts for existing customers without their authorization, in order to meet sales quotas. The employees also allegedly transferred money from customers' authorized accounts to pay fees on the unauthorized accounts. When fees on unauthorized accounts went unpaid, some customers were placed into collection. Others had negative information placed on their credit reports as a result. The complaint, filed in California Superior Court on Monday, seeks a $2,500 fine for every unauthorized account, and seeks to have all of the money taken from customers returned. It did not estimate how much those penalties could cost the bank. Wells Fargo said it would "vigorously defend" itself from the suit. But the statement it issued did not deny or even address whether its employees opened unauthorized accounts as charged.
Paul Merrell

The Mystery of ISIS' Toyota Army Solved | New Eastern Outlook - 0 views

  • The US Treasury has recently opened an inquiry about the so-called “Islamic State’s” (ISIS/ISIL) use of large numbers of brand-new Toyota trucks. The issue has arisen in the wake of Russia’s air operations over Syria and growing global suspicion that the US itself has played a key role in arming, funding, and intentionally perpetuating the terrorist army across Syria and Iraq. ABC News in their article, “US Officials Ask How ISIS Got So Many Toyota Trucks,” reports: U.S. counter-terror officials have asked Toyota, the world’s second largest auto maker, to help them determine how ISIS has managed to acquire the large number of Toyota pick-up trucks and SUVs seen prominently in the terror group’s propaganda videos in Iraq, Syria and Libya, ABC News has learned. 
  • Toyota says it does not know how ISIS obtained the vehicles and is “supporting” the inquiry led by the Terror Financing unit of the Treasury Department — part of a broad U.S. effort to prevent Western-made goods from ending up in the hands of the terror group. The report went on to cite Iraqi Ambassador to the US, Lukman Faily: “This is a question we’ve been asking our neighbors,” Faily said. “How could these brand new trucks… these four wheel drives, hundreds of them — where are they coming from?” Not surprisingly, it appears the US Treasury is asking the wrong party. Instead of Toyota, the US Treasury’s inquiry should have started next door at the US State Department.
  • Just last year it was reported that the US State Department had been sending in fleets of specifically Toyota-brand trucks into Syria to whom they claimed was the “Free Syrian Army.” US foundation-funded Public Radio International (PRI) reported in a 2014 article titled, “This one Toyota pickup truck is at the top of the shopping list for the Free Syrian Army — and the Taliban,” that: Recently, when the US State Department resumed sending non-lethal aid to Syrian rebels, the delivery list included 43 Toyota trucks. Hiluxes were on the Free Syrian Army’s wish list. Oubai Shahbander, a Washington-based advisor to the Syrian National Coalition, is a fan of the truck. “Specific equipment like the Toyota Hiluxes are what we refer to as force enablers for the moderate opposition forces on the ground,” he adds. Shahbander says the US-supplied pickups will be delivering troops and supplies into battle. Some of the fleet will even become battlefield weapons..
  • ...3 more annotations...
  • The British government has also admittedly supplied a number of vehicles to terrorists fighting inside of Syria.
  • It’s fair to say that whatever pipeline the US State Department and the British government used to supply terrorists in Syria with these trucks was likely used to send additional vehicles before and after these reports were made public. The mystery of how hundreds of identical, brand-new ISIS-owned Toyota trucks have made it into Syria is solved. Not only has the US and British government admitted in the past to supplying them, their military forces and intelligence agencies ply the borders of Turkey, Jordan, and even Iraq where these fleets of trucks must have surely passed on their way to Syria – even if other regional actors supplied them. While previous admissions to supplying the vehicles implicates the West directly, that nothing resembling interdiction operations have been set up along any of these borders implicates the West as complicit with other parties also supplying vehicles to terrorists inside of Syria.
  • Of course, much of this is not new information. So the question remains – why is the US Treasury just now carrying on with this transparent charade? Perhaps those in Washington believe that if the US government is the one asking this obvious question of how ISIS has managed to field such an impressive mechanized army in the middle of the Syrian desert, no one will suspect they had a role in it.
  •  
    Of course those who follow this stuff already knew the answer when Treasury popped the question. The question Treasury hasn't asked yet is why the U.S. didn't bomb all those Toyotas when they convoyed out of Syria into Iraq for the opening of the ISIL war in Iraq? Out in the open desert, the U.S. surely was aware of that mass movement of vehicles.
Paul Merrell

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth - 0 views

  • Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".
  • Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.
  • This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):
  • ...4 more annotations...
  • 1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.
  • If you think this is an excusable and responsible statement, raise your hand now.Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.
  • Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.
  • Privacy remains your own responsibility.
  •  
    And of course, Google would never succumb to a subpoena requiring it to turn over the audio stream to the NSA. The Tor Browser just keeps looking better and better. https://www.torproject.org/projects/torbrowser.html.en
Paul Merrell

Former Oil Tycoon Launches Pro-European Political Movement within Russia | nsnbc intern... - 0 views

  • September the 20th marked the launch of Open Russia, a pro-European political movement spearheaded by former Russian oil tycoon Mikhail Khodorkovsky. Russia’s former wealthiest man was released from prison in December 2013 due to a pardon by Vladimir Putin, after serving close to 10 years in jail following his conviction in 2005.
  • Although officially convicted of tax evasion and embezzlement, it seems that Khodorkovsky was singled out among the Russian oligarchs due to him using his mass fortune to interfere in domestic Russian politics, in an attempt to overthrow Putin for the benefit of the Western elite. Open Russia is the rebirth of the Open Russia Foundation, which was launched in 2001 by Khodorkovsky to foster animosity in Russia but was later shut down after the tycoon was behind bars. The board of the Open Russia Foundation included two Anglo-American titans, namely Henry Kissinger and Lord Jacob Rothschild, revealing the mindset and intentions of the individuals who steered the foundation.
  • Khodorkovsky profited immensely from the mass privatisation of state assets following the collapse of the Soviet Union in the 1990’s, at a time when corruption and back-door deals was the norm in Russia. He was the Chairman and CEO of the Russian based ‘Yakos Oil Company’ from 1997 to 2004, where he acquired an immense fortune leading him to be named the 16th wealthiest person on earth by Forbes magazine in 2004, worth a staggering $15 billion. Immediately after his release from prison at the end of 2013, Khodorkovsky declared on numerous occasions that he had no desire to enter politics. Yet only months after his initial statements he has launched a pro-European political movement within Russia, openly called for the overthrow of Putin in Moscow, announced he would be interested in leading Russia as President in the coming years, as well as asserting that Ukraine is the “model” for Russia to follow in the future. “I feel it imperative that the section of the population that is Europe-centered would have the opportunity to impact the way the country develops…. Without a doubt, Putin’s leaving is one of the necessary elements of Russia being able to take a European path of development…. It’s clear that Ukraine is that model that Russia is ready to accept and it’s precisely for this reason that Putin was so not interested in seeing the success of that revolution”, Khodorkovsky told the Daily Beast in an interview earlier this month.
  • ...1 more annotation...
  • Khodorkovsky recently demonstrated that he still has very close links with the Anglo-American Establishment after speaking at the most distinguished think tank in America, the Council on Foreign Relations (CFR). He also delivered a speech at Freedom House, an organisation that has been involved in the majority of Western orchestrated colour revolutions that have erupted across the planet over the past two decades.
1 - 20 of 755 Next › Last »
Showing 20 items per page