Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Oregon

Rss Feed Group items tagged

Paul Merrell

Feinstein promotes bill to strengthen NSA's hand on warrantless searches | World news |... - 0 views

  • A Senate bill promoted as a surveillance reform would codify the ability of the National Security Agency to search its troves of foreign phone and email communications for Americans’ information, and permit law enforcement agencies to search the vast databases as well. The Fisa Improvements Act, promoted by Dianne Feinstein, the California Democrat who chairs the Senate intelligence committee, would both make permanent a loophole permitting the NSA to search for Americans’ identifying information without a warrant – and, civil libertarians fear, contains an ambiguity that might allow the FBI, the DEA and other law enforcement agencies to do the same thing. “For the first time, the statute would explicitly allow the government to proactively search through the NSA data troves of information without a warrant,” said Michelle Richardson, the surveillance lobbyist for the ACLU.
  • “It may also expand current practices by allowing law enforcement to directly access US person information that was nominally collected for foreign intelligence purposes. This fourth amendment back door needs to be closed, not written into stone.” Feinstein’s bill passed the committee on an 11 to 4 vote on 31 October. An expanded report on its provisions released by the committee this week added details about the ability of both intelligence and law enforcement to sift through foreign communications databases that it accumulates under section 702 of the Fisa Amendments Act of 2008. Section 6 of Feinstein’s bill blesses what her committee colleague Ron Wyden, the Oregon Democrat and civil libertarian, has called the “backdoor search provision,” which the Guardian revealed thanks to a leak by Edward Snowden.  The section permits intelligence agencies to search “the contents of communications” collected primarily overseas for identifying information on US citizens, resident aliens and people inside the US, provided that the “purpose of the query is to obtain foreign intelligence information or information necessary to understand foreign intelligence information or to assess its importance.”
  • Section 6 bills itself as a “restriction,” but it would not stop the NSA from performing the warrantless search, merely requiring intelligence agencies to log their queries and make them “available for review” to Congress, the Fisa court, the Justice Department and inspectors general inside the executive branch. Additionally, the report on Section 6 explicitly states that the provision “does not limit the authority of law enforcement agencies to conduct queries of data acquired pursuant to Section 702 of Fisa for law enforcement purposes.” There is ambiguity surrounding whether the FBI can currently search through the NSA’s foreign communications databases, or is reliant on the NSA to pass on information from the databases relevant to the bureau. A declassified Fisa court document from 2011 refers to “FBI minimization procedures,” but it is unclear what those procedures are. A copy of the FBI minimization procedures from 2009, acquired by the ACLU under the Freedom of Information Act is almost completely redacted. So is the section in the government’s most recent report on its Section 702 collection dealing with the FBI’s role, though it contains references to how the FBI “receive[s] … unminimized Section 70 acquired communications” from the NSA. 
  • ...1 more annotation...
  • Feinstein’s bill “seems to imply there is currently some authority for law enforcement to query the database, which [intelligence community] officials have not mentioned in any of their remarks on Section 702,” said Alan Butler, an attorney with the Electronic Privacy Information Center. The provision is also unclear about whether law enforcement agencies can search through the foreign communications databases for information on US persons. Feinstein’s office did not respond to a request for clarification by deadline. The ambiguity concerns civil libertarians, as it opens a door for law enforcement agencies to sidestep warrant requirements. “If Senator Feinstein or other congressional supporters of this bill believe that it would in fact expand law enforcement access to the database, that would be an unjustified expansion of surveillance over Americans,” Butler said.
Paul Merrell

NSA performed warrantless searches on Americans' calls and emails - Clapper |... - 0 views

  • US intelligence chiefs have confirmed that the National Security Agency has used a "back door" in surveillance law to perform warrantless searches on Americans’ communications.The NSA's collection programs are ostensibly targeted at foreigners, but in August the Guardian revealed a secret rule change allowing NSA analysts to search for Americans' details within the databases.Now, in a letter to Senator Ron Wyden, an Oregon Democrat on the intelligence committee, the director of national intelligence, James Clapper, has confirmed the use of this legal authority to search for data related to “US persons”.
  • “There have been queries, using US person identifiers, of communications lawfully acquired to obtain foreign intelligence targeting non-US persons reasonably believed to be located outside the United States,” Clapper wrote in the letter, which has been obtained by the Guardian.“These queries were performed pursuant to minimization procedures approved by the Fisa court and consistent with the statute and the fourth amendment.” The legal authority to perform the searches, revealed in top-secret NSA documents provided to the Guardian by Edward Snowden, was denounced by Wyden as a “backdoor search loophole.”Many of the NSA's most controversial programs collect information under the law affected by the so-called loophole. These include Prism, which allows the agency to collect data from Google, Apple, Facebook, Yahoo and other tech companies, and the agency's Upstream program – a huge network of internet cable taps.
  • Clapper did not say how many warrantless searches had been performed by the NSA. It was not the first time the searches had been confirmed: after the Snowden leaks, the office of the director of national intelligence declassified documents that discussed the rule change. But Clapper's letter drew greater attention to the issue.Confirmation that the NSA has searched for Americans’ communications in its phone call and email databases complicates President Barack Obama’s initial defenses of the broad surveillance in June.“When it comes to telephone calls, nobody is listening to your telephone calls. That’s not what this program’s about,” Obama said. “As was indicated, what the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people’s names, and they’re not looking at content.”Obama was referring specifically to the bulk collection of US phone records, but his answer misleadingly suggested that the NSA could not examine Americans’ phone calls and emails.
  • ...4 more annotations...
  • At a recent hearing of the Privacy and Civil Liberties Oversight Board, administration lawyers defended their latitude to perform such searches. The board is scheduled to deliver a report on the legal authority under which the communications are collected, Section 702 of the Foreign Intelligence Surveillance Act (Fisa), passed in 2008. Wyden and Colorado Democrat Mark Udall failed in 2012 to persuade their fellow Senate intelligence committee members to prevent such warrantless searches during the re-authorisation of the 2008 Fisa Amendments Act, which wrote Section 702 into law. Dianne Feinstein, the California Democrat who chairs the committee, defended the practice, and argued that it did not violate the act’s “reverse targeting” prohibition on using NSA’s vast powers to collect content on Americans.
  • Much of the NSA's bulk data collection is covered by section 702 of the Fisa Amendments Act. This allows for the collection of communications – content and metadata alike – without individual warrants, so long as there is a reasonable belief the communications are both foreign and overseas.The communications of Americans in direct contact with foreign targets can also be collected without a warrant, and the intelligence agencies acknowledge that purely domestic communications can also be inadvertently swept into its databases. That process is known as "incidental collection".Initially, NSA rules on such data prevented the databases being searched for any details relating to "US persons" – that is, citizens or residents of the US. However, in October 2011 the Fisa court approved new procedures which allowed the agency to search for US person data, a revelation contained in documents revealed by Snowden.
  • The ruling appears to give the agency free access to search for information relating to US people within its vast databases, though not to specifically collect information against US citizens in the first place. However, until the DNI's disclosure to Wyden, it was not clear whether the NSA had ever actually used these powers.On Tuesday, Wyden and Udall said the NSA’s warrantless searches of Americans’ emails and phone calls “should be concerning to all.” “This is unacceptable. It raises serious constitutional questions, and poses a real threat to the privacy rights of law-abiding Americans. If a government agency thinks that a particular American is engaged in terrorism or espionage, the fourth amendment requires that the government secure a warrant or emergency authorisation before monitoring his or her communications. This fact should be beyond dispute,” the two senators said in a joint statement.
  • They continued: “Today’s admission by the Director of National Intelligence is further proof that meaningful surveillance reform must include closing the back-door searches loophole and requiring the intelligence community to show probable cause before deliberately searching through data collected under section 702 to find the communications of individual Americans."
Paul Merrell

NSA loophole allows warrantless search for US citizens' emails and phone calls | World ... - 0 views

  • The National Security Agency has a secret backdoor into its vast databases under a legal authority enabling it to search for US citizens' email and phone calls without a warrant, according to a top-secret document passed to the Guardian by Edward Snowden.The previously undisclosed rule change allows NSA operatives to hunt for individual Americans' communications using their name or other identifying information. Senator Ron Wyden told the Guardian that the law provides the NSA with a loophole potentially allowing "warrantless searches for the phone calls or emails of law-abiding Americans".The authority, approved in 2011, appears to contrast with repeated assurances from Barack Obama and senior intelligence officials to both Congress and the American public that the privacy of US citizens is protected from the NSA's dragnet surveillance programs.
  • The intelligence data is being gathered under Section 702 of the of the Fisa Amendments Act (FAA), which gives the NSA authority to target without warrant the communications of foreign targets, who must be non-US citizens and outside the US at the point of collection.The communications of Americans in direct contact with foreign targets can also be collected without a warrant, and the intelligence agencies acknowledge that purely domestic communications can also be inadvertently swept into its databases. That process is known as "incidental collection" in surveillance parlance.But this is the first evidence that the NSA has permission to search those databases for specific US individuals' communications.
  • A secret glossary document provided to operatives in the NSA's Special Source Operations division – which runs the Prism program and large-scale cable intercepts through corporate partnerships with technology companies – details an update to the "minimization" procedures that govern how the agency must handle the communications of US persons. That group is defined as both American citizens and foreigners located in the US."While the FAA 702 minimization procedures approved on 3 October 2011 now allow for use of certain United States person names and identifiers as query terms when reviewing collected FAA 702 data," the glossary states, "analysts may NOT/NOT [not repeat not] implement any USP [US persons] queries until an effective oversight process has been developed by NSA and agreed to by DOJ/ODNI [Office of the Director of National Intelligence]."The term "identifiers" is NSA jargon for information relating to an individual, such as telephone number, email address, IP address and username as well as their name.The document – which is undated, though metadata suggests this version was last updated in June 2012 – does not say whether the oversight process it mentions has been established or whether any searches against US person names have taken place.
  • ...2 more annotations...
  • Wyden, an Oregon Democrat on the Senate intelligence committee, has obliquely warned for months that the NSA's retention of Americans' communications incidentally collected and its ability to search through it has been far more extensive than intelligence officials have stated publicly. Speaking this week, Wyden told the Guardian it amounts to a "backdoor search" through Americans' communications data."Section 702 was intended to give the government new authorities to collect the communications of individuals believed to be foreigners outside the US, but the intelligence community has been unable to tell Congress how many Americans have had their communications swept up in that collection," he said."Once Americans' communications are collected, a gap in the law that I call the 'back-door searches loophole' allows the government to potentially go through these communications and conduct warrantless searches for the phone calls or emails of law-abiding Americans."
  • Exclusive: Spy agency has secret backdoor permission to search databases for individual Americans' communications
Paul Merrell

NSA Whistleblower: Snowden Never Had Access to the "Juiciest" Intelligence Documents | ... - 0 views

  • NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping. Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:
  • He says the NSA started spying on President Obama when he was a candidate for Senate:
  • Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this. Washington’s Blog called Tice to find out more about what he saw when he was at NSA.
  • ...8 more annotations...
  • NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.] Does Snowden even have documents which contain the information which you’ve seen? RUSSELL TICE:  The answer is no. WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
  • RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden? Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing? They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.] Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” - Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way. I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.
  • Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS. And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance]. ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks. These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
  • It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency. When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up. There was no such thing beforehand. It was made up … to try to placate the American people. The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of. So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
  • Snowden’s Failure To Understand the Most Important Documents RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG. The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at. But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there. I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
  • Cheney Was Running the Show WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive]. Is that right … and if so, how do you know that? RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington. WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means? RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.
  • NSA Is Spying On CONTENT as Well as Metadata WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata? RUSSELL TICE: Of course it is. Of course. [Background. But see this.] NSA Spying On Journalists, Congress, Admirals, Lawyers … RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such. I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state. Or an Admiral and his wife, and his kids and his staffers …
  • The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else. These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.
  •  
    Whistleblower Russell Tice says that there are super-classified domestic surveillance records that Edward Snowden, Congressional oversight committees, and the NSA Inspector-General did not have access to. Must-read.
Paul Merrell

MAJOR DEVELOPMENT: Rand Paul, Ron Wyden to Introduce 28 Pages Resolution in Senate | 28... - 0 views

  • The growing, nonpartisan drive to declassify a 28-page finding on foreign government support of the 9/11 hijackers is about to take an enormous step forward with the introduction of a Senate resolution urging the president to release the material to the public. Dramatically compounding the issue’s visibility, the resolution is being introduced by high-profile Republican presidential hopeful Rand Paul of Kentucky. A spokesperson for Senator Paul told 28Pages.org that Oregon Democrat Ron Wyden will cosponsor the resolution, which will serve as the upper chamber’s companion to House Resolution 14. Wyden is a member of the Senate intelligence committee.
  • ones, Lynch and Massie introduced H.Res.14 and have been championing the issue—and seeking like-minded senators to lead the cause in the upper chamber—since December 2013. Aided by Graham, who co-chaired the joint congressional 9/11 inquiry that wrote the 28 pages as one chapter in a far larger report, their success in securing the leadership of Paul and Wyden represents a critical milestone for the 28 pages movement. As Paul and Wyden seek cosponsors for the resolution, there are 11 senators whose support should—on principle, if not politics—be automatic:  Patrick Leahy (VT), Barbara Mikulski (MD), Harry Reid (NV), Barbara Boxer (CA), Patty Murray (WA), Dick Durbin (IL), Jack Reed (RI), Chuck Schumer (NY), Bill Nelson (FL), Tom Carper (DE) and Maria Cantwell (WA). 
  • What do these 11 Democrats have in common? Months after the December 2002 release of the congressional intelligence report that holds the 28 pages, each of them signed a 2003 letter to President George W. Bush protesting his decision to redact the 28 pages and urging him to release them. In part, that letter read: Unfortunately, because all but two pages of the entire section have been deemed too secret for public disclosure, the American people remain in the dark about other countries that may have facilitated the terrorist attacks. It has been widely reported in the press that the foreign sources referred to in this portion of the Joint Inquiry analysis reside primarily in Saudi Arabia. The decision to classify this information sends the wrong message to the American people about our nation’s anti-terror effort and makes it seem as if there will be no penalty for foreign abettors of the hijackers…Protecting the Saudi regime by eliminating any public penalty for the support given to terrorists from within its borders would be a mistake.
  • ...2 more annotations...
  • Among those 11 natural candidates to join the Paul-Wyden resolution, one stands out: Schumer led the 2003 letter-writing effort. At the time, he said, “The bottom line is that keeping this material classified only strengthens the theory that some in the U.S. government are hellbent on covering up for the Saudis. If we’re going to take terrorism down, that kind of behavior has got to be nipped in the bud and shedding some light on these 28 pages would start that process.”
  • Former Senator Graham and House leaders of the 28 pages movement who’ve read the 28 pages argue that their release is vital to the ongoing struggle with terrorism. According to Graham, “the 28 pages primarily relate to who financed 9/11 and they point a very strong finger at Saudi Arabia as being the principal financier.” He has also said the U.S. government’s shielding of Saudi Arabia’s role in funding extremism helped pave the way for the rise of ISIS. The House’s Lynch made a similar point in a 2014 story written by the Boston Globe’s Bryan Bender:
  •  
    I suspect that Mr. Obama won't be eager to make the Saudis the patsies  for what it really looks like Israel's far right government and some colaborators in high levels of U.S. government made happen on 9-11.  Heavens! The Saudis might start selling selling their oil in something other than U.S. dollars and bring down the Western banksters house of cards. 
Paul Merrell

The Island - 0 views

  • Barack Obama’s determined, if unbelievably secretive, bid to fast-track agreement on the Trans-Pacific Partnership (TPP) ‘not tomorrow, as they say, but yesterday’ is clearly driven by the bitter knowledge that America got well and truly pipped-at-the-post when China launched the Asian Infrastructure Investment Bank (AIIB). "Evidence of the relative power of the Chinese and American economies," wrote Pepe Escobar in Asia Times, "was the world’s reaction to China’s launch of the badly needed AIIB to provide development funds for Asia and beyond.   The level of funding necessary for such development has long been denied by the US-dominated World Bank and IMF."   More galling to the self-annointed ‘Indispensable Nation’ was that even its staunch allies, UK and Israel, unhesitatingly got on board AIIB – despite, as Escobar reveals, "the bullying of the US to stop them leaving the US and its cat’s paw in East Asia, Japan, out in the cold." More amazingly, added Escobar, the US actually thought it could write the rules of trade for China and East Asia!
  • Consider for instance, Obama’s speech on May 8, 2015 at a Nike factory in Oregon: "We have to make sure America writes the rules of the global economy and we should do it today while our economy is in a position of global strength. If we don’t write the rules for trade around the world, guess what, China will. And they’ll write those rules in a way that gives Chinese workers and Chinese businesses the upper hand." What is one to conclude from such an unabashed ‘confession’ except that the imperial mind-set is still very much alive and kicking in the 21st Century? The TPP or Trans-Pacific Partnership is being put together in absolute secrecy, so what little has become public knowledge is thanks to Wikileaks. What needs to be remembered is that the US already trades heavily with the other 11 nations included in the TPP talks. Economist and leading commentator Paul Krugman’s blunt assessment: "This not a trade agreement. It’s about intellectual property and dispute resolution; the big beneficiaries are likely to be pharma companies and firms that want to sue governments."
  • And that, precisely, happens to be the bone of contention between Obama and Democratic Senator Elizabeth Warren, who has been particularly critical of the so-called ‘Investor State Dispute Settlement’ provisions in the TPP which, she charged publicly, would empower corporations to use international courts to sue the US government and other state institutions of signatory governments that enact regulations and ‘protections’ which impact on the profits of corporations. The Obama administration, for its part, argues that the deal is instead about trade and increasing American exports abroad. It has set up a web page on the US Trade Representative’s (USTR) site listing the benefits of exports from each of America’s fifty states resulting from the TPP. But an obscure government document put out by that very same USTR office adequately makes Senator Warren’s case for her! That document happens to be the USTR’s annual report on "foreign trade barriers" around the world, going country by country to list complaints the US government has about their laws with respect to commerce.
Paul Merrell

Shell stops Arctic activity after 'disappointing' tests - BBC News - 0 views

  • Royal Dutch Shell has stopped Arctic oil and gas exploration off the coast of Alaska after "disappointing" results from a key well in the Chukchi Sea.In a surprise announcement, the company said it would end exploration off Alaska "for the foreseeable future".Shell said it did not find sufficient amounts of oil and gas in the Burger J well to warrant further exploration.The company has spent about $7bn (£4.5bn) on Arctic offshore development in the Chukchi and Beaufort seas."Shell continues to see important exploration potential in the basin, and the area is likely to ultimately be of strategic importance to Alaska and the US," said Marvin Odum, president of Shell USA. "However, this is a clearly disappointing exploration outcome for this part of the basin."
  • Indeed some analysts suggested Shell might give up on the Arctic completely. "It is possible that Shell might almost be relieved as they can stop exploration for a legitimate operational reason, rather than being seen to bow to environmental pressure," Stuart Elliott from energy information group Platts told the BBC."With the oil price around $50 a barrel, it was a risky endeavour with no guarantee of success. "You could argue that this has been bad for Shell's reputation and it wouldn't be a big surprise if they abandoned Arctic drilling altogether."
  • So, what changed?Certainly, the first findings from the Burger J exploration well 150 miles off the Alaskan coast were not promising.Second, although President Barack Obama had given the necessary permissions for drilling to start again following the problems of rig fires in 2012, Mrs Clinton's tweet revealed that political risks were still substantial.
  • ...3 more annotations...
  • The US Geological Survey estimates that the Arctic holds about 30% of the world's undiscovered natural gas, as well as 13% of its oil.According to Shell, this amounts to around 400 billion barrels of oil equivalent, 10 times the total oil and gas produced in the North Sea to date.
  • However, environmental groups oppose Arctic offshore drilling, saying it will pollute and damage a natural wilderness largely untouched by human activity. They also argue that fossil fuels such as oil and gas must be left in the ground if the world is to avoid dangerous climate change.Over the summer, protesters in kayaks unsuccessfully tried to block Arctic-bound Shell vessels in Seattle and Portland, Oregon. "Big oil has sustained an unmitigated defeat," said Greenpeace UK executive director John Sauven."The Save the Arctic movement has exacted a huge reputational price from Shell for its Arctic drilling programme, and as the company went another year without striking oil, that price finally became too high."Shell had continued to explore for oil despite the slump in the price of oil. Other oil and gas majors have shelved expensive exploration projects but, having invested billions of dollars in its Arctic project, Shell persisted, believing that Arctic oil would be competitive in the longer term.This is why the announcement came as such a surprise.
  • More on this story Video Shell calls end to Alaska oil search 52 minutes ago Shell has made a costly call to abandon Alaska 28 September 2015 'Volatile' oil price hard to predict, says Shell boss 17 September 2015 Why mega-merger is so important for Shell 8 April 2015 BP profits fall on low oil price 28 July 2015
  •  
    Not mentioned in the article, but environmental groups recently announced that they would begin a consumer boycott of Shell fuels because of its Artic drilling.  
Paul Merrell

U.S. accuses China of cyber spying on American companies | Reuters - 0 views

  • The United States on Monday charged five Chinese military officers and accused them of hacking into American nuclear, metal and solar companies to steal trade secrets, ratcheting up tensions between the two world powers over cyber espionage. China immediately denied the charges, saying in a strongly worded Foreign Ministry statement the U.S. grand jury indictment was "made up" and would damage trust between the two nations.Officials in Washington have argued for years that cyber espionage is a top national security concern. The indictment was the first criminal hacking charge that the United States has filed against specific foreign officials, and follows a steady increase in public criticism and private confrontation, including at a summit last year between U.S. President Barack Obama and Chinese President Xi Jinping.
  • Federal prosecutors said the suspects targeted companies including Alcoa Inc, Allegheny Technologies Inc, United States Steel Corp, Toshiba Corp unit Westinghouse Electric Co, the U.S. subsidiaries of SolarWorld AG, and a steel workers' union.
  • According to the indictment, Chinese state-owned companies "hired" Unit 61398 of the People's Liberation Army "to provide information technology services" including assembling a database of corporate intelligence. The Chinese companies were not named.The Shanghai-based Unit 61398 was identified last year by cybersecurity firm Mandiant as the source of a large number of espionage operations. All five defendants worked with 61398, according to the indictment.
  • ...4 more annotations...
  • U.S. officials have maintained that they do not steal secrets to give an advantage to U.S. companies, but in China, Lewis said, the line between military and business prowess is unclear.Unit 61398 has hundreds of active spies and is just one of dozens of such bodies in China, said Jen Weedon, an analyst at Mandiant, now owned by global network security company FireEye Inc. She said the group is not among the most sophisticated.
  • Washington announced the charges as new claims emerged last week about the scope of overseas spying by the United States. Documents leaked by Snowden showed the agency intercepted and modified equipment made by Cisco Systems Inc that was headed overseas.Cisco responded by asking Obama to curtail U.S. surveillance programs, underscoring the vulnerability of multinationals to a whipsaw of competing government interests.
  • Skeptics said U.S. authorities would not be able to arrest those indicted because Beijing would not hand them over. Still, the move would prevent the individuals from traveling to the United States or other countries that have an extradition agreement with the United States.
  • In an indictment filed in the Western District of Pennsylvania, prosecutors said the officers hacked into computers starting in 2006, often by infecting machines with tainted "spear phishing" emails to employees that purport to be from colleagues.Prosecutors alleged that one hacker, for example, stole cost and pricing information in 2012 from an Oregon-based solar panel production unit of SolarWorld. The company was losing market share at the time to Chinese competitors who were systematically pricing exports below production costs, according to the indictment.Another officer is accused of stealing technical and design specifications about pipes for nuclear plants from Westinghouse Electric as the company was negotiating with a Chinese company to build four power plants in China, prosecutors said.
  •  
    Yesterday I watched the DoJ press conference announcing charges. This article does not capture its spirit. AG Ben Holder faced stiff questions directed by attending reporters. One of the first questions went something like this: "Is it true that the U.S. has extradition treaty with China and these defendants will never be actually prosecuted, and if so, what's the real reason for the charges?" Others raised the hypocrisy of the U.S. move in light of what the NSA has been doing. Holder ducked the tough questions  The press conference was a farce and too many of the reporters realized it. Recall that Obama was days away from traveling to China with the announced purpose of chastising its leader for waging cyberesionage against the U.S. when the first Edward Snowden pulled the moral high ground from beneath Obama's feet. This stunt looks more like it was designed to lesson the government pain by promoting Obama's "everyone does it" meme.   Also not mentioned in this article, at the press confernence the five defendants were identified as generals in the Chinese Army. Might we see China respond by charging a few former and present NSA generals with cyber-espionage? Fun and games on the Beltway. 
Paul Merrell

Profiting from Your Thirst as Global Elite Rush to Control Water Worldwide :: The Marke... - 0 views

  • A disturbing trend in the water sector is accelerating worldwide. The new “water barons” --- the Wall Street banks and elitist multibillionaires --- are buying up water all over the world at unprecedented pace. Familiar mega-banks and investing powerhouses such as Goldman Sachs, JP Morgan Chase, Citigroup, UBS, Deutsche Bank, Credit Suisse, Macquarie Bank, Barclays Bank, the Blackstone Group, Allianz, and HSBC Bank, among others, are consolidating their control over water. Wealthy tycoons such as T. Boone Pickens, former President George H.W. Bush and his family, Hong Kong’s Li Ka-shing, Philippines’ Manuel V. Pangilinan and other Filipino billionaires, and others are also buying thousands of acres of land with aquifers, lakes, water rights, water utilities, and shares in water engineering and technology companies all over the world. The second disturbing trend is that while the new water barons are buying up water all over the world, governments are moving fast to limit citizens’ ability to become water self-sufficient (as evidenced by the well-publicized Gary Harrington’s case in Oregon, in which the state criminalized the collection of rainwater in three ponds located on his private land, by convicting him on nine counts and sentencing him for 30 days in jail). Let’s put this criminalization in perspective:
  • Billionaire T. Boone Pickens owned more water rights than any other individuals in America, with rights over enough of the Ogallala Aquifer to drain approximately 200,000 acre-feet (or 65 billion gallons of water) a year. But ordinary citizen Gary Harrington cannot collect rainwater runoff on 170 acres of his private land. It’s a strange New World Order in which multibillionaires and elitist banks can own aquifers and lakes, but ordinary citizens cannot even collect rainwater and snow runoff in their own backyards and private lands.
  • In 2008, Goldman Sachs called water “the petroleum for the next century” and those investors who know how to play the infrastructure boom will reap huge rewards, during its annual “Top Five Risks” conference. Water is a U.S.$425 billion industry, and a calamitous water shortage could be a more serious threat to humanity in the 21st century than food and energy shortages, according to Goldman Sachs’s conference panel. Goldman Sachs has convened numerous conferences and also published lengthy, insightful analyses of water and other critical sectors (food, energy). Goldman Sachs is positioning itself to gobble up water utilities, water engineering companies, and water resources worldwide. Since 2006, Goldman Sachs has become one of the largest infrastructure investment fund managers and has amassed a $10 billion capital for infrastructure, including water.
  • ...7 more annotations...
  • Citigroup’s top economist Willem Buitler said in 2011 that the water market will soon be hotter the oil market (for example, see this and this): “Water as an asset class will, in my view, become eventually the single most important physical-commodity based asset class, dwarfing oil, copper, agricultural commodities and precious metals.” In its recent 2012 Water Investment Conference, Citigroup has identified top 10 trends in the water sector, as follows:
  • Specifically, a lucrative opportunity in water is in hydraulic fracturing (or fracking), as it generates massive demand for water and water services. Each oil well developed requires 3 to 5 million gallons of water, and 80% of this water cannot be reused because it’s three to 10 times saltier than seawater. Citigroup recommends water-rights owners sell water to fracking companies instead of to farmers because water for fracking can be sold for as much as $3,000 per acre-foot instead of only $50 per acre/foot to farmers.
  • One of the world’s largest banks, JPMorgan Chase has aggressively pursued water and infrastructure worldwide. In October 2007, it beat out rivals Morgan Stanley and Goldman Sachs to buy U.K.’s water utility Southern Water with partners Swiss-based UBS and Australia’s Challenger Infrastructure Fund. This banking empire is controlled by the Rockefeller family; the family patriarch David Rockefeller is a member of the elite and secretive Bilderberg Group, Council on Foreign Relations, and Trilateral Commission.
  • Barclays PLC is a U.K.-based major global financial services provider operating in all over the world with roots in London since 1690; it operates through its subsidiary Barclays Bank PLC and its investment bank called Barclays Capital. Barclays Bank’s unit Barclays Global Investors manages an exchange-traded fund (ETF) called iShares S&P Global Water, which is listed on the London Stock Exchanges and can be purchased like any ordinary share through a broker. Touting the iShares S&P Global Water as offering “a broad based exposure to shares of the world’s largest water companies, including water utilities and water equipment stocks” of water companies around the world, this fund as of March 31, 2007 was valued at U.S.$33.8 million.
  • Deutsche Bank is one of the major players in the water sector worldwide. Its Deutsche Bank Advisors have identified water as a part of the climate investment strategies. In its presentation, “Global Warming: Implications for Investors,” they have identified the four following major areas for water investment: § Distribution and management: (1) Supply and recycling, (2) water distribution and sewage, (3) water management and engineering. § Water purification: (1) Sewage purification, (2) disinfection, (3) desalination, (4) monitoring. § Water efficiency (demand): (1) Home installation, (2) gray-water recycling, (3) water meters. § Water and nutrition: (1) Irrigation, (2) bottled water.
  • Moreover, Deutsche Bank has channeled €6 billion (U.S.$8.55 billion) into climate change funds, which will target companies with products that cut greenhouse gases or help people adapt to a warmer world, in sectors from agriculture to power and construction (Reuters, October 18, 2007). In addition to SCM, Deutsche Bank also has the RREEF Infrastructure, part of RREEF Alternative Investments, headquartered in New York with main hubs in Sydney, Singapore, and London. RREEF Infrastructure has more than €6.7 billion in assets under management. One of its main targets is utilities, including electricity networks, water-treatment or distribution operations, and natural-gas networks. In October 2007, RREEF partnered with Goldman Sachs, GE, Prudential, and Babcok & Brown Ltd. to bid unsuccessfully for U.K.’s water utility Southern Water. § Crediting the boom in European infrastructure investment, the RREEF fund by August 2007 had raised €2 billion (U.S.$2.8 billion); Europe’s infrastructure market is valued at between U.S.$4 trillion to U.S.$6 trillion (DowJones Financial News Online, August 7, 2007). § Bulgaria --- Deutsche Bank Bulgaria is planning to participate in large infrastructure projects, including public-private partnership projects in water and sewage worth up to €1 billion (Sofia Echo Media, February 26, 2008). § Middle East --- Along with Ithmaar Bank B.S.C. (an private-equity investment bank in Bahrain), Deutsche Bank co-managed a U.S.$2 billion Shari'a-compliant Infrastructure and Growth Capital Fund and plans to target U.S.$630 billion in regional infrastructure.
  • In my 2008 article, I overlooked the astonishingly large land purchases (298,840 acres, to be exact) by the Bush family in 2005 and 2006. In 2006, while on a trip to Paraguay for the United Nation’s children’s group UNICEF, Jenna Bush (daughter of former President George W. Bush and granddaughter of former President George H.W. Bush) reportedly bought 98,840 acres of land in Chaco, Paraguay, near the Triple Frontier (Bolivia, Brazil, and Paraguay). This land is said to be near the 200,000 acres purchased by her grandfather, George H.W. Bush, in 2005. The lands purchased by the Bush family sit over not only South America’s largest aquifer --- but the world’s as well --- Acuifero Guaraní, which runs beneath Argentina, Brazil, Paraguay, and Uruguay. This aquifer is larger than Texas and California combined. Online political magazine Counterpunch quoted Argentinean pacifist Adolfo Perez Esquivel, the winner of 1981 Nobel Peace Prize, who “warned that the real war will be fought not for oil, but for water, and recalled that Acuifero Guaraní is one of the largest underground water reserves in South America….”
  •  
     Like the land rush for Arctic lands soon to be bared of ice by global warming, banksters are also moving to capitalize on looming water shortages, aided by IMF privatization loan conditions the the dwindling of potable water supplies globally via pollution, deforestation, and aquifer depletion. All trace to the common problem over human overpopulation of the planet.  
Paul Merrell

Justice Dept. Criticized on Spying Statements - NYTimes.com - 0 views

  • Two Democratic senators accused the Obama administration on Tuesday of seeking to “ignore or justify” statements it made to the Supreme Court about warrantless surveillance by the National Security Agency, contributing to what they called a “culture of misinformation” by the executive branch.In a letter to Solicitor General Donald B. Verrilli Jr., the senators, Mark Udall of Colorado and Ron Wyden of Oregon, maintained that the Justice Department was not being forthright about what they portrayed as factual misrepresentations to the Supreme Court in 2012. The case involved a challenge to the constitutionality of a law permitting warrantless N.S.A. surveillance.
Paul Merrell

NSA surveillance reform bill passes House by 303 votes to 121 | World news | theguardia... - 0 views

  • The first legislation aimed specifically at curbing US surveillance abuses revealed by Edward Snowden passed the House of Representatives on Thursday, with a majority of both Republicans and Democrats.But last-minute efforts by intelligence community loyalists to weaken key language in the USA Freedom Act led to a larger-than-expected rebellion by members of Congress, with the measure passing by 303 votes to 121.The bill's authors concede it was watered down significantly in recent days, but insist it will still outlaw the practice of bulk collection of US telephone metadata by the NSA first revealed by Snowden.Some members of Congress were worried that the bill will fail to prevent the National Security Agency from continuing to collect large amounts of data on ordinary US citizens.
  • “Perfect is rarely possible in politics, and this bill is no exception,” said Republican Jim Sensenbrenner, who has led efforts on the House judiciary committee to rein in the NSA.“In order to preserve core operations of the intelligence and law enforcement agencies, the administration insisted on broadening certain authorities and lessening certain restrictions. Some of the changes raise justifiable concerns. I don’t blame people for losing trust in their government, because the government violated their trust.”
  • But the revised language lost the support of several influential members of the judiciary committee who had previously voted for it, including Republicans Darrell Issa, Ted Poe and Raul Labrador and Democrat Zoe Lofgren.Issa also chairs the House oversight committee. Adam Smith, the most senior Democrat on the armed services committee, also voted against the bill.“Regrettably, we have learned that the intelligence community will run a truck through ambiguity,” said Lofgren during an hour and 15 minutes of debate which preceded the vote. No amendments were allowed.
  • ...4 more annotations...
  • After the vote, Mark Jaycox, a legislative analyst at the Electronic Frontier Foundation, said: “The bill is littered with loopholes. The problem right now, especially after multiple revisions, is that it doesn't effectively end mass surveillance.”In a statement, Zeke Johnson, the director of Amnesty International USA's security and human rights program, said the House had “failed to deliver serious surveillance reform”.
  • The size of the rebellion and the seniority of the rebels may support efforts to tighten language in the legislation as it makes its way to the Senate.Senator Patrick Leahy, the chair of the Senate judiciary committee and the lead Democratic author of the Freedom Act, said that the actions of the house in passing it was an “important step towards reforming our nation's surveillance authorities”which “few could have predicted less than a year ago.”However, in a statement issued on Thursday, Leahy expressed disappointment that the bill, which he had introduced jointly with Sensenbrenner in October, had been diluted.
  • Senator Ron Wyden, the Oregon Democrat who has waged an often lonely campaign against NSA surveillance, said he opposed the House bill in the form that passed on Thursday. "I am gravely concerned that the changes that have been made to the House version of this bill have watered it down so far that it fails to protect Americans from suspicionless mass surveillance," he said.He said the Senate version of the bill remained strong, and that he hoped that its provisions could be preserved.
  • The bill was the first vote on a NSA related matter in either the House or Senate since last July, when Republican congressman Justin Amash failed by 205-217 votes to pass an amendment to an appropriations bill that would have stripped funding for bulk surveillance.The revised USA Freedom Act was supported by the White House. Obama had urged for a solution to ending bulk collection of telephone metadata in ways that would not unduly constrain the NSA.
  •  
    On to the Senate. No meaningful reform from the House. That the measure passed was supported by Obama tells the story of its effectiveness. It will "constrain the NSA."
Paul Merrell

Wyden Ponders Release of CIA Torture Report Without White House Consent | The World's G... - 0 views

  • A senior Senate Democrat is firing a warning shot at the White House against stalling the release of a report about the past use of torture by the U.S. intelligence community. Sen. Ron Wyden is talking with his colleagues about the possibility of using a seldom-invoked procedure to declassify an Intelligence Committee report on the use of torture in the event the White House does not move ahead quickly. Speaking with reporters on a variety of subjects Thursday, the Oregon Democrat referred to the Senate’s “Resolution 400″ — the Abraham A. Ribicoff-sponsored resolution that established the Intelligence Committee back in 1976. Wyden said he was discussing invoking the resolution “in order to move this along if we have to, through the committee process, to get it declassified.” Matt Bai of Yahoo! News reported earlier Thursday that Wyden mentioned the same procedure to him. And it was not the first time he’s discussed the possibility. Wyden previously explained the provision in October 2013, KATU reported. The Senate Intelligence Committee voted on April 3 to provide for declassification of the report into the use of harsh interrogation practices by the CIA during the administration of President George W. Bush. That action set the gears in motion for declassification review. The report is now in the hands of the White House.
  •  
    Senate Resolution 400 provides in relevant part that the Intelligence Committee can vote to declassify documents, giving the White House 5 days to object. If such an objection is made, then the full Senate votes on whether to declassify. It should be recognized, however, that senators' immunity from prosecution for statements made in Congress or in committee hearings in effect grants any member of Congress the ability to declassify documents simply by reading them into the Congressional Record.   
Paul Merrell

Activist Post: FBI Thwarts Terror Plot on Capitol (That They Planned) - 0 views

  • The FBI is at it again. Creating fake terror plots to justify their existence. And this plot hits on all the themes one would expect from a good fake terror plot. The FBI initially found a patsy by trolling Twitter for support of ISIS. That's exciting because finding someone retarded enough to admit support for murderers is really difficult. Then they sent an in-house jihadist to team up with the patsy to plan a grand terror attack on the nation's Capitol. Heroically, the moment the 20-year-old patsy said he would "go forward with violent jihad" the FBI steps in and declares a victory in the war on terror. NBC News reports: Ohio man was arrested Wednesday and accused of planning to attack the U.S. Capitol, U.S. officials told NBC News. But the officials said the man, identified as Christopher Cornell, 20, was dealing with an undercover agent the entire time and was never in a position to carry out his plan. "There was never a danger to the public," an official told NBC News. The officials said that starting in August, Cornell began posting comments on Twitter in support of ISIS under an alias, Raheel Mahrus Ubaydah. Shortly after those posts began appearing, the FBI sent an undercover operative to meet with him.
  • During a meeting with the operative, court documents say, Cornell said he wanted "to go forward with violent jihad" and that Anwar al-Awlaki — the U.S.-born Muslim cleric who was killed by a U.S. drone in September 2011 and was the first U.S. citizen publicly known to have been added to the U.S. kill-or-capture list — and others had encouraged that kind of action. Seriously, Anwar al-Awlaki again? Hasn't his name become synonymous with "false flag"? He's a proven federal asset who also supposedly handled the Fort Hood Shooter, the Underwear Bomber and even the recent Paris Shooters - all incredibly shady events that served to advance the "war on terror" agenda. The FBI has incubated fake terror plots over and over: See this, this, this, this, this, this, this, and this. Surely they'd never let an event go live, would they? What would they have to gain? Well, the only reason this story exists at all is to make the public feel that there are genuine terror threats targeting the US Capitol. That is then used to justify spying on the Internet and funding the huge terrorism-industrial complex that has nothing better to do than make up the reasons to keep giving them money. The police state is a ruthless business, and false flag terror is its most effective marketing tool. UPDATE: Surprise, the salesmen are already using this fake story to push their agenda: John Boehner Credits Government Surveillance For Uncovering Capitol Bomb Threat
Paul Merrell

Federal judge rules no-fly list process is unconstitutional | Law | theguardian.com - 0 views

  • A federal judge ruled on Tuesday that the US government's no-fly list banning people accused of links to terrorism from commercial flights violates their constitutional rights because it gives them no meaningful way to contest that decision. US District Judge Anna Brown, ruling in a lawsuit filed in federal court in Oregon by 13 Muslim Americans who were branded with the no-fly status, ordered the government to come up with new procedures that allow people on the no-fly list to challenge that designation. The 13 plaintiffs – four of them veterans of the US military – deny they have links to terrorism and say they only learned of their no-fly status when they arrived at an airport and were blocked from boarding a flight.
  • The American Civil Liberties Union, which brought a suit against the policy in 2010, argues that secrecy surrounding the list and lack of any reasonable opportunity for plaintiffs to fight their placement on it violates their clients' constitutional rights to due process. The government contends there is an adequate means of contesting the flight ban and that individuals listed under the policy may ultimately petition a US appeals court directly for relief.
Paul Merrell

Obama on CIA's post-9/11 tactics: 'We tortured some folks' - RT USA - 0 views

  • President Barack Obama made a rare acknowledgment during a Friday press briefing concerning the United States’ past use of enhanced interrogation tactics in the wake of the September 11 terrorist attacks. “In the immediate aftermath of 9/11, we did some things that were wrong. We did a whole lot of things that were right, but we tortured some folks. We did things that were contrary to our values,” Pres. Obama said near the end of a nearly hour-long press briefing at the White House in Washington, DC.
  • Earlier this week, Sen. Ron Wyden (D-Oregon) told The Daily Beast that “The American people will be profoundly disturbed about what will be revealed in this report.”
  • The word “torture” to describe the tactics used by the CIA is rarely used by government officials, but Pres. Obama has indeed condemned the agency’s past abuses before. During an address last year at the National Defense University, Obama said that, in some cases, “I believe we compromised our basic values -- by using torture to interrogate our enemies, and detaining individuals in a way that ran counter to the rule of law.” “So after I took office, we stepped up the war against Al-Qaeda but we also sought to change its course. We relentlessly targeted Al-Qaeda’s leadership. We ended the war in Iraq, and brought nearly 150,000 troops home. We pursued a new strategy in Afghanistan, and increased our training of Afghan forces. We unequivocally banned torture, affirmed our commitment to civilian courts, worked to align our policies with the rule of law and expanded our consultations with Congress,” Obama said in that address from last May.
  •  
Paul Merrell

Asia Times Online :: China's silky road to glory - 0 views

  • If there were any remaining doubts about the unlimited stupidity Western corporate media is capable of dishing out, the highlight of the Asia-Pacific Economic Cooperation (APEC) summit in Beijing has been defined as Russian President Vladimir Putin supposedly "hitting" on Chinese President Xi Jinping's wife - and the subsequent Chinese censoring of the moment when Putin draped a shawl over her shoulders in the cold air where the leaders were assembled. What next? Putin and Xi denounced as a gay couple?

    Let's dump the clowns and get down to the serious business. Right at the start, President Xi urged APEC to "add firewood to



    the fire of the Asia-Pacific and world economy". Two days later, China got what it wanted on all fronts.
  • 3) Beijing and Moscow committed to a second gas mega-deal - this one through the Altai pipeline in Western Siberia - after the initial "Power of Siberia" mega-deal clinched last May. 4) Beijing announced the funneling of no less than US$40 billion to start building the Silk Road Economic Belt and the 21st Century Maritime Silk Road.
  • Predictably, once again, this vertiginous flurry of deals and investment had to converge towards the most spectacular, ambitious, wide-ranging plurinational infrastructure offensive ever attempted: the multiple New Silk Roads - that complex network of high-speed rail, pipelines, ports, fiber optic cables and state of the art telecom that China is already building across the Central Asian stans, linked to Russia, Iran, Turkey and the Indian Ocean, and branching out to Europe all the way to Venice, Rotterdam, Duisburg and Berlin
  • ...3 more annotations...
  • ) Beijing had all 21 APEC member-nations endorsing the Free Trade Area of the Asia-Pacific (FTAAP) - the Chinese vision of an "all inclusive, all-win" trade deal capable of advancing Asia-Pacific cooperation - see South China Morning Post (paywall). The loser was the US-driven, corporate-redacted, fiercely opposed (especially by Japan and Malaysia) 12-nation Trans-Pacific Partnership (TPP). [See also here. 2) Beijing advanced its blueprint for "all-round connectivity" (in Xi's words) across Asia-Pacific - which implies a multi-pronged strategy. One of its key features is the implementation of the Beijing-based US$50 billion Asian Infrastructure Investment Bank. That's China's response to Washington refusing to give it a more representative voice at the International Monetary Fund than the current, paltry 3.8% of votes (a smaller percentage than the 4.5% held by stagnated France).
  • Now imagine the paralyzed terror of the Washington/Wall Street elites as they stare at Beijing interlinking Xi's "Asia-Pacific Dream" way beyond East Asia towards all-out, pan-Eurasia trade - with the center being, what else, the Middle Kingdom; a near future Eurasia as a massive Chinese Silk Belt with, in selected latitudes, a sort of development condominium with Russia.
  • Vlad doesn't do stupid stuff As for "Don Juan" Putin, everything one needs to know about Asia-Pacific as a Russian strategic/economic priority was distilled in his intervention at the APEC CEO summit.
  •  
    Pepe Escobar chronicles the decline of the American empire and the ascension of the China-funded New Silk Roads.
‹ Previous 21 - 36 of 36
Showing 20 items per page