Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Solaris

Rss Feed Group items tagged

Paul Merrell

US Military Uses IMF and World Bank to Launder 85% of Its Black Budget | Global Researc... - 1 views

  • hough transparency was a cause he championed when campaigning for the presidency, President Obama has largely avoided making certain defense costs known to the public. However, when it comes to military appropriations for government spy agencies, we know from Freedom of Information Act requests that the so-called “black budget” is an increasingly massive expenditure subsidized by American taxpayers. The CIA and and NSA alone garnered $52.6 billion in funding in 2013 while the Department of Defense black ops budget for secret military projects exceeds this number. It is estimated to be $58.7 billion for the fiscal year 2015. What is the black budget? Officially, it is the military’s appropriations for “spy satellites, stealth bombers, next-missile-spotting radars, next-gen drones, and ultra-powerful eavesdropping gear.” However, of greater interest to some may be the clandestine nature and full scope of the black budget, which, according to analyst Catherine Austin Fitts, goes far beyond classified appropriations. Based on her research, some of which can be found in her piece “What’s Up With the Black Budget?,” Fitts concludes that the during the last decade, global financial elites have configured an elaborate system that makes most of the military budget unauditable. This is because the real black budget includes money acquired by intelligence groups via narcotics trafficking, predatory lending, and various kinds of other financial fraud.
  • The result of this vast, geopolitically-sanctioned money laundering scheme is that Housing and Urban Devopment and other agencies are used for drug trafficking and securities fraud. According to Fitts, the scheme allows for at least 85 percent of the U.S. federal budget to remain unaudited. Fitts has been researching this issue since 2001, when she began to believe that a financial coup d’etat was underway. Specifically, she suspected that the banks, corporations, and investors acting in each global region were part of a “global heist,” whereby capital was being sucked out of each country. She was right.
  • As Fitts asserts, “[She] served as Assistant Secretary of Housing at the US Department of Housing and Urban Development (HUD) in the United States where I oversaw billions of government investment in US communities…..I later found out that the government contractor leading the War on Drugs strategy for U.S. aid to Peru, Colombia and Bolivia was the same contractor in charge of knowledge management for HUD enforcement. This Washington-Wall Street game was a global game. The peasant women of Latin America were up against the same financial pirates and business model as the people in South Central Los Angeles, West Philadelphia, Baltimore and the South Bronx.” This is part of an even larger financial scheme. It is fairly well-established by now that international financial institutions like the World Trade Organization, the World Bank, and the International Monetary Fund operate primarily as instruments of corporate power and nation-controlling infrastructure investment mechanisms. For example, the primary purpose of the World Bank is to bully developing countries into borrowing money for infrastructure investments that will fleece trillions of dollars while permanently indebting these “debtor” nations to West. But how exactly does the World Bank go about doing this? John Perkins wrote about this paradigm in his book, Confessions of an Economic Hitman. During the 1970s, Perkins worked for the international engineering consulting firm, Chas T. Main, as an “economic hitman.” He says the operations of the World Bank are nothing less than “pure economic colonization on behalf of powerful corporations and banks that use the United States government as their tool.”
  • ...1 more annotation...
  • In his book, Perkins discusses Joseph Stiglitz, the Chief Economist for the World Bank from 1997-2000, at length. Stiglitz described the four-step plan for bamboozling developing countries into becoming debtor nations: Step One, according to Stiglitz, is to convince a nation to privatize its state industries. Step Two utilizes “capital market liberalization,” which refers to the sudden influx of speculative investment money that depletes national reserves and property values while triggering a large interest bump by the IMF. Step Three, Stiglitz says, is “Market-Based Pricing,” which means raising the prices on food, water and cooking gas. This leads to “Step Three and a Half: The IMF Riot.” Examples of this can be seen in Indonesia, Bolivia, Ecuador and many other countries where the IMF’s actions have caused financial turmoil and social strife. Step 4, of course, is “free trade,” where all barriers to the exploitation of local produce are eliminated. There is a connection between the U.S. black budget and the trillion dollar international investment fraud scheme. Our government and the banking cartels and corporatocracy running it have configured a complex screen to block our ability to audit their budget and the funds they use for various black op projects. However, they can not block our ability to uncover their actions and raise awareness.
Paul Merrell

Testosterone Pit - Home - The Other Reason Why IBM Throws A Billion At Linux ... - 0 views

  • IBM announced today that it would throw another billion at Linux, the open-source operating system, to run its Power System servers. The first time it had thrown a billion at Linux was in 2001, when Linux was a crazy, untested, even ludicrous proposition for the corporate world. So the moolah back then didn’t go to Linux itself, which was free, but to related technologies across hardware, software, and service, including things like sales and advertising – and into IBM’s partnership with Red Hat which was developing its enterprise operating system, Red Hat Enterprise Linux. “It helped start a flurry of innovation that has never slowed,” said Jim Zemlin, executive director of the Linux Foundation. IBM claims that the investment would “help clients capitalize on big data and cloud computing with modern systems built to handle the new wave of applications coming to the data center in the post-PC era.” Some of the moolah will be plowed into the Power Systems Linux Center in Montpellier, France, which opened today. IBM’s first Power Systems Linux Center opened in Beijing in May. IBM may be trying to make hay of the ongoing revelations that have shown that the NSA and other intelligence organizations in the US and elsewhere have roped in American tech companies of all stripes with huge contracts to perfect a seamless spy network. They even include physical aspects of surveillance, such as license plate scanners and cameras, which are everywhere [read.... Surveillance Society: If You Drive, You Get Tracked].
  • Then another boon for IBM. Experts at the German Federal Office for Security in Information Technology (BIS) determined that Windows 8 is dangerous for data security. It allows Microsoft to control the computer remotely through a “special surveillance chip,” the wonderfully named Trusted Platform Module (TPM), and a backdoor in the software – with keys likely accessible to the NSA and possibly other third parties, such as the Chinese. Risks: “Loss of control over the operating system and the hardware” [read.... LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Links The NSA.
  • It would be an enormous competitive advantage for an IBM salesperson to walk into a government or corporate IT department and sell Big Data servers that don’t run on Windows, but on Linux. With the Windows 8 debacle now in public view, IBM salespeople don’t even have to mention it. In the hope of stemming the pernicious revenue decline their employer has been suffering from, they can politely and professionally hype the security benefits of IBM’s systems and mention in passing the comforting fact that some of it would be developed in the Power Systems Linux Centers in Montpellier and Beijing. Alas, Linux too is tarnished. The backdoors are there, though the code can be inspected, unlike Windows code. And then there is Security-Enhanced Linux (SELinux), which was integrated into the Linux kernel in 2003. It provides a mechanism for supporting “access control” (a backdoor) and “security policies.” Who developed SELinux? Um, the NSA – which helpfully discloses some details on its own website (emphasis mine): The results of several previous research projects in this area have yielded a strong, flexible mandatory access control architecture called Flask. A reference implementation of this architecture was first integrated into a security-enhanced Linux® prototype system in order to demonstrate the value of flexible mandatory access controls and how such controls could be added to an operating system. The architecture has been subsequently mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel, spawning a wide range of related work.
  • ...1 more annotation...
  • Among a slew of American companies who contributed to the NSA’s “mainstreaming” efforts: Red Hat. And IBM? Like just about all of our American tech heroes, it looks at the NSA and other agencies in the Intelligence Community as “the Customer” with deep pockets, ever increasing budgets, and a thirst for technology and data. Which brings us back to Windows 8 and TPM. A decade ago, a group was established to develop and promote Trusted Computing that governs how operating systems and the “special surveillance chip” TPM work together. And it too has been cooperating with the NSA. The founding members of this Trusted Computing Group, as it’s called facetiously: AMD, Cisco, Hewlett-Packard, Intel, Microsoft, and Wave Systems. Oh, I almost forgot ... and IBM. And so IBM might not escape, despite its protestations and slick sales presentations, the suspicion by foreign companies and governments alike that its Linux servers too have been compromised – like the cloud products of other American tech companies. And now, they’re going to pay a steep price for their cooperation with the NSA. Read...  NSA Pricked The “Cloud” Bubble For US Tech Companies
Paul Merrell

DOD, HUD Defrauded Taxpayers Of $21 Trillion From 1998 To 2015 - 0 views

  • Last year, a Reuters article brought renewed scrutiny to the budgeting practices of the U.S. Department of Defense (DOD), specifically the U.S. Army, after it was revealed that the department  had “lost” $6.5 trillion in 2015 due to “wrongful budget adjustments.” Nearly half of that massive sum, $2.8 trillion, was lost in just one quarter. Reuters noted that the Army “lacked the receipts and invoices to support those numbers [the adjustments] or simply made them up” in order to “create an illusion that its books are balanced.” Officially, the DOD has acknowledged that its financial statements for 2015 were “materially misstated.” However, this was hardly the first time the department had been caught falsifying its accounting or the first time the department had mishandled massive sums of taxpayer money.
  • The report, which examined in great detail the budgets of both the DOD and the Department of Housing and Urban Development (HUD), found that between 1998 and 2015 these two departments alone lost over $21 trillion in taxpayer funds. The funds lost were a direct result of “unsupported journal voucher adjustments” made to the departments’ budgets. According to the Office of the Comptroller, “unsupported journal voucher adjustments” are defined as “summary-level accounting adjustments made when balances between systems cannot be reconciled. Often these journal vouchers are unsupported, meaning they lack supporting documentation to justify the adjustment [receipts, etc.] or are not tied to specific accounting transactions.” The report notes that, in both the private and public sectors, the presence of such adjustments is considered “a red flag” for potential fraud. The amount of money lost is truly staggering. As co-author Fitts noted in an interview with USA Watchdog, the amount unaccounted for over this 17 year period amounts to “$65,000 for every man, woman and child resident in America.” By comparison, the cost per taxpayer of all U.S. wars waged since 9/11 has been $7,500 per taxpayer. The sum is also enough to cover the entire U.S. national debt, which broke $20 trillion less than a month ago, and still have funds left over. What’s more, the actual amount of funds lost — measured at $21 trillion – is likely to be much higher, as the researchers were unable to recover data for every year over the period, meaning the assessment is incomplete.
Paul Merrell

DOD and HUD Missing Money: Supporting Documentation - The Missing Money - 0 views

  • Subsequent to the publication of Dr. Skidmore’s report, the Office of the Inspector General at the Department of Defense (DOD) and the Department of Housing and Urban Development (HUD) took reports off line, consequently our primary links in the table below are to the same documents posted on our website. We have preserved the original DOD and HUD links in the footnotes – if they result in a 404 error or not found message, this indicates they were taken down or moved subsequent to publication. On October 5, 2017 we discovered that the link to the report “Army General Fund Adjustments Not Adequately Documented or Supported” had been disabled. Within a several days, the links to other OIG documents we identified in our search were also disabled. The sequential non-random nature of this disabling process suggests a purposeful decision on the part of OIG to make key documents unavailable to the public via the website, as opposed to website reorganization, etc. We also revisited the website intermittently to see whether the documents had been reposted under different URLs—until very recently they had not been reposted. On December 11, 2017, we learned that key documents had been reposted on the OIG website, but with different URLs. Documents now appear to be reposted on new URLs. As we find the new URLs we are adding them in the footnotes entitled “new link” next to the original link.
1 - 4 of 4
Showing 20 items per page