Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged US

Rss Feed Group items tagged

Paul Merrell

Victory! World's Largest Nation Bans GMO Food Crops | New Eastern Outlook - 0 views

  • Victories are to be celebrated and for the future of healthy life on our planet we all can celebrate a beautiful victory. The world’s largest nation, the Russian Federation, whose landmass spans Eurasia from the Baltic and Ukraine on the west to Vladivostock and the Pacific on her east, has formally declared all commercial planting of Genetically Modified Organisms, GMOs, to be prohibited. The issue has been subject of a heated debate for some months inside Russia. In February 2014, just days prior to the US-orchestrated coup d’etat in Ukraine, Russian Prime Minister Dmitry Medvedev created a national research project to obtain scientific information so the Government and Duma might make a decision on GMOs in Russia. Now a definitive decision has been made, and it goes against Monsanto and the US-led GMO cartel. We can say Russia’s crisis has concentrated minds on the essentials of life.
  • Russian Deputy Prime Minister Arkady Dorkovich told an international biotechnology conference in Kirov September 18, “As far as genetically-modified organisms are concerned, we have made the decision not to use any GMO in food productions.” Last year the Duma or parliament voted to make tough GMO labeling laws as a first step to the new ban in order to inform consumers of presence of GMO in various foods they buy. That was before US and EU sanctions led to Russian counter-sanctions against EU imports of agriculture products. In August 2014, the Russian government announced its bans on import from the EU and several other countries of meat, fish, dairy products, fruit and vegetables as a response to the sanctions. It produced surprising results. Since the imposition of tough Russian food import bans, Russian agriculture has undergone a spectacular rebirth.
  • This July, taking a page out of American history, the Russian government announced it was drafting a Russian “Homestead Act.” The Russian government is finalizing a bill which will give an opportunity to every Russian citizen to obtain one hectare of land, or a maximum of five hectares for a family of five, in the Russian Far East for free. They can use the land to farm, to do forestry or simply build a home and live, so long as they use the land for the first five years. After, they own the land free if the plot has been used for activities not banned by Russian laws, reported TASS. In the case of non-use the land will be confiscated and revert back to the government. Foreigners will have no right to get the free land. The new land law, if passed in the Duma, will take effect in January, 2016.
  • ...2 more annotations...
  • Food production in Russia’s under-populated far-east region is also set to boom. On September 3 in Vladivostok at the first Eastern Economic Forum, Russia’s Agriculture Ministry announced the creation of a new $10 billion agriculture development fund together with China. A number of financial institutions, including Russia’s state-owned Sberbank, will participate in its operations. The aim of the fund is to stimulate the production of 10 million tons of grain and agricultural products annually, beginning 2020.
  • A recent poll suggests there is significant interest in the offer, with some 30 million mostly young Russians ready to “go east.” Following the economic devastation of Russia during the Yeltsin era of the 1990s, eastern regions suffered economic collapse and significant depopulation as people migrated to cities to survive. Into this broader context of recent developments, the definitive government ban on growing GMO crops in the Russian Federation adds a major new attraction. Russia stands to become one of the world’s most desired producers of natural, organic non-GMO-contaminated food for the world. Today, the once-great American agriculture has been de-humanized, industrialized, by giant agribusiness concerns, and contaminated by Monsanto and GMO plants along with its deadly herbicides containing toxic glyphosate. More than 80% of all US corn is GMO and almost 100% of USA soybeans. This is no small matter. Exports of GMO soybeans and corn are allowed unlabeled, by loopholes, into the European Union as well as into China. That means that most of the meat and even farmed fish that European and Chinese consumers eat contains indirect GMO crops and toxins. In light of all this it might make sense to treat Russia a little more politely in the future if we want to eat healthy food. They are doing what we should be doing, but don’t. Why?
  •  
    5 hectares == 12.35 acres. Times 30 million Russians == 370.5 million acres less space for a home and a driveway. That's a lot of new agricultural production.  Bear in mind that Russia imported most of its food from Europe before the Ukraine sanctions. This article is about the evaporation of foreign trade that Europe will never get back.And it's about new Russian agricultural exports to China. Perhaps even about eventual exports to the U.S. for those who want a "GMO-free" label on their food. This is very bad news for Monsanto and other biotech companies in the U.S, especially a few years down the road when other countries begin importing Russian GMO-free food.  
Paul Merrell

What Obama Told Us At West Point -- Paul Craig Roberts - PaulCraigRoberts.org - 0 views

  • At West Point Obama told us, to the applause of West Point cadets, that “American exceptionalism” is a doctrine that justifies whatever Washington does. If Washington violates domestic and international law by torturing “detainees” or violates the Nuremberg standard by invading countries that have undertaken no hostile action against the US or its allies, “exceptionalism” is the priest’s blessing that absolves Washington’s sins against law and international norms. Washington’s crimes are transformed into Washington’s affirmation of the rule of law. Here is Obama in his own words: “I believe in American exceptionalism with every fiber of my being. But what makes us exceptional is not our ability to flout international norms and the rule of law; it is our willingness to affirm them through our actions.” Actions indeed. In the 21st century “American exceptionalism” has destroyed seven countries in whole or in part. Millions of people are dead, maimed, and displaced, and all of this criminal destruction is evidence of Washington’s reaffirmation of international norms and the rule of law. Destruction and murder are merely collateral damage from Washington’s affirmation of international norms.
  • “American exceptionalism” also means that US presidents can lie through their teeth and misrepresent those they choose to demonize. Listen to Obama’s misrepresentations of the Putin and Assad governments: “Russia’s aggression towards former Soviet states unnerves capitals in Europe . . . In Ukraine, Russia’s recent actions recall the days when Soviet tanks rolled into Eastern Europe .” Obama misrepresents Assad as “a dictator who bombs and starves his own people.” Did any of the cadets in Obama’s West Point audience wonder why, if Assad is a brutal dictator who bombs and starves his own people, the Syrian people are supporting Assad instead of the American-backed “liberation forces,” the combination of imported jihadists and al Qaeda fighters who object to Assad’s government because it is secular? The US military is taught to respect its civilian commander-in-chief, but if West Point cadets actually do obtain an education, it is remarkable that Obama’s audience did not break out in laughter.
  • Obama’s speech is probably the most disingenuous ever given by a Western politician. We could have fun for hours with all the crimes that Washington commits but buries in rhetoric directed at others. Perhaps my favorite is Obama evoking a world in which “individuals aren’t slaughtered because of political belief.” I am sure Obama was thinking of this just world when he murdered without due process of law four American citizens “outside of areas of active hostilities.” Another favorite is the way Obama flushed the US Constitution of its meaning. Obama said, with reference to bringing the Guantanamo prisoners to the US, that “American values and legal traditions don’t permit the indefinite detention of people beyond our borders.” No, Obama, the US Constitution prevents the indefinite detention of US citizens by the US government anywhere on earth, especially within our borders. By detaining and by murdering US citizens without due process of law, Obama has violated his oath of office and should be impeached. It was only a short time ago that President Bill Clinton was impeached by the US House of Representatives (the Senate saved him from conviction) for lying about his sexual affair with a White House intern. How times change. Today a president who violates his oath of office to protect the Constitution from enemies foreign and domestic gets a free ride. The Constitution has lost its power to protect citizens from the arbitrary power of government. The US is the Constitution. Without the Constitution the US ceases to exist, and the country becomes a tyranny, both at home and abroad.Today the US is a tyranny cloaked in the garb of “freedom and democracy.”
  • ...2 more annotations...
  • Instead of laughing our way through Obama’s ridiculous speech to what apparently was a dumbed-down West Point graduating class, lets pay attention to Obama’s bottom line: “America must always lead on the world stage. . . . The military is, and always will be, the backbone of that leadership.” In other words, Washington doesn’t use diplomacy. Washington uses coercion. The favorite threat is: “Do as you are told or we will bomb you into the Stone Age.” Obama’s speech is a justification of Washington’s criminal actions on the grounds that Washington acts for the exceptional Americans whose exceptionalism places them and, thereby, their government above law and international norms. In this way of thinking, only the failure to prevail constitutes failure. Americans are the new ubermensch, the new master race. Inferior humans can be bombed, invaded, and sanctioned. Obama’s West Point speech asserts American superiority over all others and Washington’s determination to continue this superiority by preventing the rise of other powers. This arrogant hubris was not enough for the Washington Post editorial board. The newspaper’s editorial damned Obama for binding US power and limiting its use to “a narrow set of core interest,” such as direct threats to America.
  • The American “liberal media” object that Obama’s claim of exceptionalism is not broad enough for Washington’s purposes. Obama’s address, the Washington Post wrote, bound “US power” and “offered scant comfort” to those militarists who want to overthrow Syria, Iran, Russia, and China. The world should take note that the most militarily aggressive American president in history is considered a wimp by the neoconized American media. The media drives wars, and the American media, firmly allied with the military/security complex, is driving the world to the final war.
  •  
    Obama's speech at West Point was indeed a gigantic slap in the face at international law and at the Constitution. http://goo.gl/icJGDz The Rule of Law is no longer a guiding light in the White House, now only an obligatory nod of nominal respect. The Imperial Presidency has announced that we are now citizens of post-constitutional America.  
Paul Merrell

Secret US cybersecurity report: encryption vital to protect private data | US news | Th... - 0 views

  • A secret US cybersecurity report warned that government and private computers were being left vulnerable to online attacks from Russia, China and criminal gangs because encryption technologies were not being implemented fast enough. The advice, in a newly uncovered five-year forecast written in 2009, contrasts with the pledge made by David Cameron this week to crack down on encryption use by technology companies.
  • In the wake of the Paris terror attacks, the prime minister said there should be no “safe spaces for terrorists to communicate” or that British authorites could not access. Cameron, who landed in the US on Thursday night, is expected to urge Barack Obama to apply more pressure to tech giants, such as Apple, Google and Facebook, which have been expanding encrypted messaging for their millions of users since the revelations of mass NSA surveillance by the whistleblower Edward Snowden.
  • Cameron said the companies “need to work with us. They need also to demonstrate, which they do, that they have a social responsibility to fight the battle against terrorism. We shouldn’t allow safe spaces for terrorists to communicate. That’s a huge challenge but that’s certainly the right principle”. But the document from the US National Intelligence Council, which reports directly to the US director of national intelligence, made clear that encryption was the “best defence” for computer users to protect private data. Part of the cache given to the Guardian by Snowden was published in 2009 and gives a five-year forecast on the “global cyber threat to the US information infrastructure”. It covers communications, commercial and financial networks, and government and critical infrastructure systems. It was shared with GCHQ and made available to the agency’s staff through its intranet.
  • ...6 more annotations...
  • An unclassified table accompanying the report states that encryption is the “[b]est defense to protect data”, especially if made particularly strong through “multi-factor authentication” – similar to two-step verification used by Google and others for email – or biometrics. These measures remain all but impossible to crack, even for GCHQ and the NSA. The report warned: “Almost all current and potential adversaries – nations, criminal groups, terrorists, and individual hackers – now have the capability to exploit, and in some cases attack, unclassified access-controlled US and allied information systems.” It further noted that the “scale of detected compromises indicates organisations should assume that any controlled but unclassified networks of intelligence, operational or commercial value directly accessible from the internet are already potentially compromised by foreign adversaries”.
  • The report had some cause for optimism, especially in the light of Google and other US tech giants having in the months prior greatly increased their use of encryption efforts. “We assess with high confidence that security best practices applied to target networks would prevent the vast majority of intrusions,” it concluded. Official UK government security advice still recommends encryption among a range of other tools for effective network and information defence. However, end-to-end encryption – which means only the two people communicating with each other, and not the company carrying the message, can decode it – is problematic for intelligence agencies as it makes even warranted collection much more difficult.
  • The previous week, a day after the attack on the Charlie Hebdo office in Paris, the MI5 chief, Andrew Parker, called for new powers and warned that new technologies were making it harder to track extremists. In November, the head of GCHQ, Robert Hannigan, said US social media giants had become the “networks of choice” for terrorists. Chris Soghoian, principal senior policy analyst at the American Civil Liberties Union, said attempts by the British government to force US companies to weaken encryption faced many hurdles.
  • The Guardian, New York Times and ProPublica have previously reported the intelligence agencies’ broad efforts to undermine encryption and exploit rather than reveal vulnerabilities. This prompted Obama’s NSA review panel to warn that the agency’s conflicting missions caused problems, and so recommend that its cyber-security responsibilities be removed to prevent future issues.
  • The memo requested a renewal of the legal warrant allowing GCHQ to “modify” commercial software in violation of licensing agreements. The document cites examples of software the agency had hacked, including commonly used software to run web forums, and website administration tools. Such software are widely used by companies and individuals around the world. The document also said the agency had developed “capability against Cisco routers”, which would “allow us to re-route selected traffic across international links towards GCHQ’s passive collection systems”. GCHQ had also been working to “exploit” the anti-virus software Kaspersky, the document said. The report contained no information on the nature of the vulnerabilities found by the agency.
  • Michael Beckerman, president and CEO of the Internet Association, a lobby group that represents Facebook, Google, Reddit, Twitter, Yahoo and other tech companies, said: “Just as governments have a duty to protect to the public from threats, internet services have a duty to our users to ensure the security and privacy of their data. That’s why internet services have been increasing encryption security.”
Paul Merrell

Virtual Economy's Phantom Job Gains Are Based on Statistical Fraud. And More Fraud Is i... - 0 views

  • Washington can’t stop lying.  Don’t be convinced by last Thursday’s job report that it is your fault if you don’t have a job. Those 288,000 jobs and 6.1% unemployment rate are more fiction than reality.  In his analysis of the June Labor Data from the Bureau of Labor Statistics, John Williams (www.ShadowStats.com) wrote that the 288,000 June jobs and 6.1% unemployment rate  are “far removed from common experience and underlying reality.” Payrolls were overstated by “massive, hidden shifts in seasonal adjustments,” and the Birth-Death model added the usual phantom jobs.  Williams reports that “the seasonal factors are changed each and every month as part of the concurrent seasonal-adjustment process, which is tantamount to a fraud,” as the changes in the seasonal factors can inflate the jobs number.  While the headline numbers always are on a new basis, the prior reporting is not revised so as to be consistent.
  • The monthly unemployment rates are not comparable, so one doesn’t know whether the official U.3 rate (the headline rate that the financial press reports) went up or down. Moreover, the rate does not count discouraged workers who, unable to find a job, cease looking. To be counted among the U.3 unemployed, the person must have actively looked for work during the four weeks prior to the survey. The U.3 rate automatically declines as people who have been unable to find jobs cease trying to find one and thereby cease to be counted as unemployed. There is a second official measure of unemployment that includes people who have been discouraged for less than one year. That rate, known as U.6, is seldom reported and is double the 6.1% rate. Since 1994 there has been no official measure than includes discouraged people who have not looked for a job for more than a year. Including all discouraged workers produces an unemployment rate that currently stands at 23.1%, almost four times the rate that the financial press reports.
  • What you can take away from this is the opposite of what the presstitute media would have you believe.  The measured rate of unemployment can decline simply because large numbers of the unemployed become discouraged workers, cease looking for work, and cease to be counted in the U.3 and U.6 measures of the unemployment rate.   The decline in the employment-population ratio from 63% prior to the 2008 downturn to 59% today reflects the growth in discouraged workers.  Indeed, the ratio has not recovered its previous level during the alleged recovery, an indication that the recovery is an illusion created by the understated measure of inflation that is used to deflate nominal GDP growth.
  • ...8 more annotations...
  • Insurance (most likely the paperwork of Obamacare) contributed 8,500 jobs. As so few can purchase homes, “real estate rental and leasing” contributed 8,500 jobs. Professional and business services contributed 67,000 jobs, but 57% of these jobs were in employment services, temporary help services, and services to buildings and dwellings.   That old standby, education and health services, accounted for 33,700 jobs consisting mainly of ambulatory health care services jobs and social assistance jobs of which three-quarters are in child day care services.   The other old standby, waitresses and bartenders, gave us 32,800 jobs, and amusements, gambling, and recreation gave us 3,500 jobs.
  • In other words, the economy did not gain 288,000 new jobs last month.   But let’s assume the economy did gain 288,000 jobs and exam where the claimed jobs are reported to be. Of the alleged 288,000 new jobs, 16,000, or 5.5 percent are in manufacturing, which is not very promising for engineers and blue collar workers.  Growth in goods producing jobs has almost disappeared from the US economy.  As explained below, to alter this problem the government is going to change definitions in order to artificially inflate manufacturing jobs. In June private services account for 82 percent of the supposed new jobs.  The jobs are found mainly in non-tradable domestic services that pay little and cannot be exported to help to close the large US trade deficit. Wholesale and retail trade account for 55,300 jobs.  Do you believe sales are this strong  when retailers are closing stores and when shopping malls are closing?
  • Another indication that there has been no recovery is that Sentier Research’s index of real median household income continued to decline for two years after the alleged recovery began in June 2009.   There has been a slight upturn in real median household income since June 2011, but income remains far below the pre-recession level.   The Birth-Death model adds an average of 62,000 jobs to the reported payroll jobs numbers each month. This arbitrary boost to the payroll jobs numbers is in addition to the Bureau of Labor Statistics’ underlying assumption that unreported jobs lost to business failures are matched by unreported new jobs from new business startups, an assumption that does not well fit an economy that fell into recession and is unable to recover.   John Williams concludes that in current BLS reporting, “the aggregate average overstatement of employment change easily exceeds 200,000 jobs per month.”
  • Local government, principally education, gave us 22,000 jobs.   So, where are the jobs for university graduates?  They are practically non-existent. Think of all the MBAs, but June had only 2,300 jobs for management of companies and enterprises. Think of the struggle to get into law and medical schools.  There’s no job payoff. June had jobs for 1,200 in legal services, which includes receptionists and para-legals.  Where are all the law school graduates finding jobs? Offices of physicians (mainly people who fill out the mandated paperwork and comply with all the regulations, which have multiplied under ObamaCare) hired 4,000 people.  Outpatient care centers hired 700 people.  Nursing care facilities hired 2,400 people.  So where are the jobs for the medical school graduates? Aside from all the exaggerations in the jobs numbers of which ShadowStats.com has informed us, just taking the jobs as reported, what kind of economy do these jobs indicate:  a superpower whose pretensions are to exercise hegemony over the world or an economy in which opportunities are disappearing and incomes are falling?
  • Do you think that this jobs picture would be the same if the government in Washington cared about you instead of the mega-rich? Some interesting numbers can be calculated from table A.9 in the BLS press release.  John Williams advises that the BLS is inconsistent in the methods it uses to tabulate the data in table A.9 and that the data is also afflicted by seasonal adjustment problems.  However, as the unemployment rate and payroll jobs are reported regardless of their problems, we can also report the BLS finding that in June 523,000 full-time jobs disappeared and 800,000 part time jobs appeared. Here, perhaps, we have yet another downside of the misnamed Obama “Affordable Care Act.”  Employers are terminating full-time employment and replacing the jobs with part-time employment in order to come in under the 50-person full time employment that makes employers responsible for fringe benefits such as health care. Americans are already experiencing difficulties making ends meet, despite the alleged “recovery.”  If yet another half million Americans have been forced onto part-time pay with consequent loss of health care and other benefits, consumer demand is further compressed, with the consequence, unless hidden by statistical trickery, of a 2nd quarter negative GDP and thus officially the reappearance of recession.
  • What will the government do if a recession cannot be hidden?  If years of unprecedented money printing and Keynesian fiscal deficits have not brought recovery, what will bring recovery?  How far down will US living standards fall for the 99% in order that the 1% can become ever more mega-rich while Washington wastes our diminishing substance exercising hegemony over the world? Just as Washington lied to you about Saddam Hussein’s weapons of mass destruction, Assad’s use of chemical weapons, Russian invasion of Ukraine, Waco, and any number of false flag or nonexistent attacks such as Tonkin Gulf, Washington lies to you about jobs and economic recovery.  Don’t believe the spin that you are unemployed because you are shiftless and prefer government handouts to work.  The government does not want you to know that you are unemployed because the corporations offshored American jobs to foreigners and because economic policy only serves the oversized banks and the one percent. Just as the jobs and inflation numbers are rigged and the financial markets are rigged, the corrupt Obama regime is now planning to rig US manufacturing and trade statistics in order to bury all evidence of offshoring’s adverse impact on our economy.
  • The federal governments Economic Classification Policy Committee has come up with a proposal to redefine fact as fantasy in order to hide offshoring’s contribution to the US trade deficit, artificially inflate the number of US manufacturing jobs, and redefine foreign-made manufactured products as US manufactured products.  For example, Apple iPhones made in China and sold in Europe would be reported as a US export of manufactured goods. Read Ben Beachy’s important report on this blatant statistical fraud in CounterPunch’s July 4th weekend edition: http://www.counterpunch.org/2014/07/04/we-didnt-offshore-manufacturing/ China will not agree that the Apple brand name means that the phones are not Chinese production. If the Obama regime succeeds with this fraud, the iPhones would be counted twice, once by China and once by the US, and the double-counting would exaggerate world GDP. For years I have exposed the absurd claim that offshoring is merely the operation of free trade, and I have exposed the incompetent studies by such as Michael Porter at Harvard and Matthew Slaughter at Dartmouth that claimed to prove that the US was benefitting from offshoring its manufacturing.  My book published in 2012 in Germany and in 2013 in the US, The Failure of Laissez Faire Capitalism and Economic Dissolution of the West, proves that offshoring has dismantled the ladders of upward mobility that made the US an opportunity society and is responsible for the decline in US economic growth. The lost jobs and decline in the middle class has contributed to the rise in income inequality, the destruction of tax base for cities and states, and loss of population in America’s once great manufacturing centers.
  • For the most part economists have turned a blind eye. Economists serve the globalists.  It pays them well. The corruption in present-day America is total. Psychologists and anthropologists serve war and torture. Economists serve globalism and US financial hegemony. Physicists and chemists serve the war industries. Physicists and computer geeks serve NSA. The media serves the government and the corporations. The political parties serve the six powerful private interest groups that rule the country. No one serves truth and liberty. I predict that within ten years truth and liberty will be forbidden words uttered only by “domestic extremists” who are a threat that must be exterminated without due process of law. America has left us.  We now have the tyranny of the Orwellian state that rules, not by the ballot box and Constitution, but by force and propaganda.
Paul Merrell

Land Destroyer: CNN: Libyan "Rebels" Are Now ISIS - 0 views

  • The United States has attempted to claim that the only way to stop the so-called "Islamic State" in Syria and Iraq is to first remove the government in Syria. Complicating this plan are developments in Libya, benefactor of NATO's last successful regime change campaign. In 2011, NATO armed, funded, and backed with a sweeping air campaign militants in Libya centered around the eastern Libyan cities of Tobruk, Derna, and Benghazi. By October 2011, NATO successfully destroyed the Libyan government, effectively handing the nation over to these militants. 
  • What ensued was a campaign of barbarism, genocide, and sectarian extremism as brutal in reality as what NATO claimed in fiction was perpetrated by the Libyan government ahead of its intervention. The so-called "rebels" NATO had backed were revealed to be terrorists led by Al Qaeda factions including the Libyan Islamic Fighting Group (LIFG) and Al-Qaeda in the Islamic Maghreb (AQIM). The so-called "pro-democracy protesters" Libyan leader Muammar Qaddafi was poised to attack in what NATO claimed was pending "genocide" were in fact heavily armed terrorists that have festered for decades in eastern Libya. Almost immediately after NATO successfully destroyed Libya's government, its terrorist proxies were mobilized to take part in NATO's next campaign against Syria. Libyan terrorists were sent first to NATO-member Turkey were they were staged, armed, trained, and equipped, before crossing the Turkish-Syrian border to take part in the fighting. 
  • CNN in an article titled, "ISIS comes to Libya," claims: The black flag of ISIS flies over government buildings. Police cars carry the group's insignia. The local football stadium is used for public executions. A town in Syria or Iraq? No. A city on the coast of the Mediterranean, in Libya.  Fighters loyal to the Islamic State in Iraq and Syria are now in complete control of the city of Derna, population of about 100,000, not far from the Egyptian border and just about 200 miles from the southern shores of the European Union.  The fighters are taking advantage of political chaos to rapidly expand their presence westwards along the coast, Libyan sources tell CNN. Only the black flag of Al Qaeda/ISIS has already long been flying over Libya - even at the height of NATO's intervention there in 2011.  ISIS didn't "come to" Libya, it was always there in the form of Al Qaeda's local franchises LIFG and AQIM - long-term, bitter enemies of the now deposed and assassinated Libyan leader Muammar Qaddafi.
  • ...7 more annotations...
  • CNN's latest article is merely the veneer finally peeling away from the alleged "revolution" it had attempted to convince readers had taken place in 2011.
  • Even amid CNN's own spin, it admits ISIS' presence in Libya is not a new phenomenon but rather the above mentioned sectarian extremists who left Libya to fight in Syria simply returning and reasserting themselves in the eastern Cyrenaica region. CNN also admits that these terrorists have existed in Libya for decades and were kept in check primarily by Libyan leader Muammar Qaddafi. With Qaddafi eliminated and all semblance of national unity destroyed by NATO's intervention in 2011, Al Qaeda has been able to not only prosper in Libya but use the decimated nation as a spingboard for invading and destroying other nations. Worst of all, Al Qaeda's rise in Libya was not merely the unintended consequence of a poorly conceived plan by NATO for military intervention, but a premeditated regional campaign to first build up then use Al Qaeda as a mercenary force to overthrow and destroy a series of nations, beginning with Libya, moving across North Africa and into nations like Egypt, Syria, Lebanon, Iraq, and eventually Iran. From there, NATO's mercenary force would be on the borders of Russia and China ready to augment already Western-backed extremists in the Caucasus and Xinjiang regions. In 2011, geopolitical analyst Dr. Webster Tarpley in his article, "The CIA’s Libya Rebels: The Same Terrorists who Killed US, NATO Troops in Iraq," noted that the US strategy was to:
  • ...use Al Qaeda to overthrow independent governments, and then either Balkanize and partition the countries in question, or else use them as kamikaze puppets against larger enemies like Russia, China, or Iran. Dr. Tarpley would also note in 2011 that: One of the fatal contradictions in the current State Department and CIA policy is that it aims at a cordial alliance with Al Qaeda killers in northeast Libya, at the very moment when the United States and NATO are mercilessly bombing the civilian northwest Pakistan in the name of a total war against Al Qaeda, and US and NATO forces are being killed by Al Qaeda guerrillas in that same Afghanistan-Pakistan theater of war. The force of this glaring contradiction causes the entire edifice of US war propaganda to collapse. The US has long since lost any basis in morality for military force.  In fact, terrorist fighters from northeast Libya may be killing US and NATO troops in Afghanistan right now, even as the US and NATO protect their home base from the Qaddafi government. Indeed, the very terrorists NATO handed the entire nation of Libya over to, are now allegedly prime targets in Syria and Iraq. The "pro-democracy rebels" of 2011 are now revealed to be "ISIS terrorists" with long-standing ties to Al Qaeda.
  • Not even mentioning the fact that Al Qaeda's very inception was to serve as a joint US-Saudi mercenary force to fight a proxy war in Afghanistan against the Soviet Union, the terrorist organization has since played a central role in the Balkans to justify NATO intervention there, and as a divisive force in Iraq during the US occupation to blunt what began as a formidable joint Sunni-Shia'a resistance movement. In 2007, it was revealed by Pulitzer Prize-winning veteran journalist Seymour Hersh that the United States, Israel, and Saudi Arabia were conspiring to use Al Qaeda once again, this time to undermine, destabilize, and destroy the governments of Syria and Iran in what would be a regional sectarian bloodbath. Hersh would report (emphasis added): To undermine Iran, which is predominantly Shiite, the Bush Administration has decided, in effect, to reconfigure its priorities in the Middle East. In Lebanon, the Administration has coöperated with Saudi Arabia’s government, which is Sunni, in clandestine operations that are intended to weaken Hezbollah, the Shiite organization that is backed by Iran. The U.S. has also taken part in clandestine operations aimed at Iran and its ally Syria. A by-product of these activities has been the bolstering of Sunni extremist groups that espouse a militant vision of Islam and are hostile to America and sympathetic to Al Qaeda. 
  • Hersh would note that Iran was perceived to be the greater threat and therefore, despite a constant barrage of propaganda claiming otherwise, Al Qaeda and its various affiliates were "lesser enemies." Even in 2007, Hersh's report would predict almost verbatim the cataclysmic regional sectarian bloodbath that would take place, with the West's extremists waging war not only on Shia'a populations but also on other religious minorities including Christians. His report would note: Robert Baer, a former longtime C.I.A. agent in Lebanon, has been a severe critic of Hezbollah and has warned of its links to Iranian-sponsored terrorism. But now, he told me, “we’ve got Sunni Arabs preparing for cataclysmic conflict, and we will need somebody to protect the Christians in Lebanon. It used to be the French and the United States who would do it, and now it’s going to be Nasrallah and the Shiites.  And this is precisely what is happening, word for word, page by page - everything warned about in Hersh's report has come to pass. In 2011, geopolitical analyst Dr. Webster Tarpley and others would also reiterate the insidious regional campaign Western policymakers were carrying out with Al Qaeda terrorists disguised as "rebels," "activists," and "moderate fighters" for the purpose of arming, funding, and even militarily intervening on their behalf in attempts to effect regime change and tilt the balance in the Middle East and North Africa region against Iran, Russia, and China. CNN's attempt to explain why ISIS is "suddenly" in Libya is one of many attempts to explain the regional rise of this organization in every way possible besides in terms of the truth - that ISIS is the result of multinational state sponsored terrorism including the US, UK, EU, Turkey, Jordan, Saudi Arabia, Qatar, and Israel as its chief backers.
  • Inexplicably, amid allegedly fighting ISIS in Iraq and Syria, the United States now claims it must first overthrow the Syrian government, despite it being the only viable, secular force in the region capable of keeping ISIS and its affiliates in check. CNN, in an article titled, "Sources: Obama seeks new Syria strategy review to deal with ISIS, al-Assad," would report: President Barack Obama has asked his national security team for another review of the U.S. policy toward Syria after realizing that ISIS may not be defeated without a political transition in Syria and the removal of President Bashar al-Assad, senior U.S. officials and diplomats tell CNN. Neither CNN, nor the politicians it cited in its article were able to articulate just why removing Syrian President Bashar al-Assad from power would somehow diminish the fighting capacity of ISIS. With CNN's recent article on ISIS' gains in Libya despite US-led NATO regime change there, after decades of Libyan leader Qaddafi keeping extremists in check, it would appear that NATO is once again attempting not to stop Al Qaeda/ISIS, but rather hand them yet another country to use as a base of operations. The goal is not to stop ISIS or even effect regime change in Syria alone - but rather hand Syria over as a failed, divided state to terrorists to use as a springboard against Iran, then Russia and China.
  • Clearly, ISIS' appearance in Libya negates entirely the already incomprehensible strategy the US has proposed of needing to first depose the Syrian government, then fight ISIS. The Syrian government, like that of Libyan leader Muammar Qaddafi, is the only effective force currently fighting ISIS and Al Qaeda's many other franchises operating in the region. Deposing the government in Damascus would compound the fight against sectarian terrorists - and the West is fully aware of that. Therefore, attempts to topple the secular government in Damascus is in every way the intentional aiding and abetting of ISIS and the sharing in complicity of all the horrific daily atrocities ISIS and its affiliates are carrying out. The morally bankrupt, insidious, dangerous, and very genocidal plans hatched in 2007 and executed in earnest in 2011 illustrate that ISIS alone is not the greatest threat to global peace and stability, but also those that constitute its multinational state sponsors. The very West purportedly defending civilization is the chief protagonist destroying it worldwide.  
Paul Merrell

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Jus... - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

Wall Street: The Trump-China missing link - RT Op-Edge - 0 views

  • The yuan is about to enter the IMF’s basket of reserve currencies this coming Saturday - alongside the US dollar, pound, euro and yen. This is no less than a geoeconomic earthquake. Not only does this represent yet another step in China’s irresistible path towards economic primacy; the Chinese currency’s inclusion in the Special Drawing Rights (SDR) basket will also lead central banks and hyper-wealthy funds – especially from the US – to increasingly buy more Chinese assets.At the first US presidential debate, Donald Trump took no prisoners, criticizing China’s currency manipulation. This is what he said:“You look at what China’s doing to our country in terms of making our product, they’re devaluing their currency and there’s nobody in our government to fight them… They’re using our country as a piggy bank to rebuild China, and many other countries are doing the same thing.”
  • Well, China is not “making our product”; the manufacturing process is Made in China – then exported to the US. Most of the profits benefit US corporations – everything from design, licensing and royalties to advertising, financing and retail margins. If the mantras manage to spell out a partial truth - the US has lost manufacturing jobs to China, China is the “factory of the world” – they don't spell out the hidden truth that those who profit are essentially major corporations.China does not “devalue their currency”; the People’s Bank of China periodically adjusts the yuan according to a very narrow band. The major practitioners of quantitative easing (QE) are actually the US, as well as Japan and the European Central Bank (ECB). And the currency of global consumer goods manufacturing continues to be the US dollar, not the yuan.
  • Beijing also is not “using our country as a piggy bank to rebuild China.” This is all about balance of payments. What US consumers spend on Made in China products – many of them delocalized by US corporations – is pumped back to the US as capital inflows that keep interest rates down and help to support the Empire of Chaos’s global hegemony.
  • ...6 more annotations...
  • For all his incapacity to formulate thoughts above the language skills of a third grader, Trump has been piling up astonishing proposals that resonate wildly, way beyond the “basket of deplorables” spectrum.
  • The bottom line is that to recover US manufacturing jobs – as Trump has been forcefully promising – he will have to stare down the whole Wall Street finance oligarchy.So no wonder these oligarchs – responsible for shipping all those US manufacturing jobs to Asia and lavishly profiting from bailouts to the 'Too Big To Fail' racket – hate him with all their golden-plated guts.
  • Trump’s attention span is notoriously minimalist. If his advisers managed to imprint – tweet? - a few one-liners on his brain, he would be able to explain to US public opinion how the US-China game is really played, something that all relevant parties in both nations know by heart.And the – crucial - missing link in the whole game is Wall Street.This is how it works.
  • He is against Cold War 2.0 and the pivot to Asia, when he says “wouldn’t it be nice to get along with Russia and China for a change?”He no less than pre-empted WWIII when he said he would be against a US nuclear first-strike.He totally abhors global “free trade” – from NAFTA to TPP and TTIP - because it has “hollowed out the lives of American workers”, as US corporations (under Wall Street’s “incentive”) delocalize and then import back into the US tariff-free.
  • Trump was even open to nationalizing Wall Street banks after the 2008 financial crisis.
  • So we’re faced with the ultimate surrealist spectacle of a billionaire denouncing corporate globalization, which has been responsible for stripping the US lower middle classes of countless, decent blue-collar jobs and social benefits – not to mention turning them into hostages of rotting public infrastructure. And all that with absolutely no one among the US establishment condemning the most astonishing wealth transfer to the 0.0001% in history.If in the next two presidential debates Trump points to the crucial missing link in the whole plot – Wall Street - he might as well lock on as a surefire winner.
Paul Merrell

Putin Advisor Proposes "Anti-Dollar Alliance" To Halt US Aggression Abroad | Zero Hedge - 0 views

  • It has been a while since both Ukraine, and the ongoing Russian response to western sanctions (which set off the great Eurasian axis in motion, pushing China and Russia close together, and accelerating the "Holy Grail" gas deal between the two countries) have made headlines. It is still not clear just why the western media dropped Ukraine coverage like a hot potato, especially since the civil war in Ukraine's Donbas continues to rage and claim dozens of casualties on both sides. Perhaps the audience has simply gotten tired of hearing about mixed chess/checkers game between Putin vs Obama, and instead has reverted to reading the propaganda surrounding just as deadly events in the third war of Iraq in as many decades. However, "out of sight" may be just what Russia's political elite wants. In fact, as VoR's  Valentin Mândr??escu reports, while the great US spin and distraction machine is focused elsewhere, Russia is already preparing for the next steps. Which brings us to Putin advisor Sergey Glazyev, the same person who in early March was the first to suggest Russia dump US bonds and abandon the dollar in retaliation to US sanctions, a strategy which worked because even as the Kremlin has retained control over Crimea, western sanctions have magically halted (and not only that, but as the Russian central bank just reported, the country's 2014 current account surplus may be as high as $35 billion, up from $33 billion in 2013, and a far cry from some fabricated "$200+ billion" in Russian capital outflows which Mario Draghi was warning about recently). Glazyev was also the person instrumental in pushing the Kremlin to approach China and force the nat gas deal with Beijing which took place not necessarily at the most beneficial terms for Russia.
  • It is this same Glazyev who published an article in Russian Argumenty Nedeli, in which he outlined a plan for "undermining the economic strength of the US" in order to force Washington to stop the civil war in Ukraine. Glazyev believes that the only way of making the US give up its plans on starting a new cold war is to crash the dollar system. As summarized by VoR, in his article, published by Argumenty Nedeli, Putin's economic aide and the mastermind behind the Eurasian Economic Union, argues that Washington is trying to provoke a Russian military intervention in Ukraine, using the junta in Kiev as bait. If fulfilled, the plan will give Washington a number of important benefits. Firstly, it will allow the US to introduce new sanctions against Russia, writing off Moscow's portfolio of US Treasury bills. More important is that a new wave of sanctions will create a situation in which Russian companies won't be able to service their debts to European banks. According to Glazyev, the so-called "third phase" of sanctions against Russia will be a tremendous cost for the European Union. The total estimated losses will be higher than 1 trillion euros. Such losses will severely hurt the European economy, making the US the sole "safe haven" in the world. Harsh sanctions against Russia will also displace Gazprom from the European energy market, leaving it wide open for the much more expensive LNG from the US.
  • Co-opting European countries in a new arms race and military operations against Russia will increase American political influence in Europe and will help the US force the European Union to accept the American version of the Transatlantic Trade and Investment Partnership, a trade agreement that will basically transform the EU into a big economic colony of the US. Glazyev believes that igniting a new war in Europe will only bring benefits for America and only problems for the European Union. Washington has repeatedly used global and regional wars for the benefit of  the American economy and now the White House is trying to use the civil war in Ukraine as a pretext to repeat the old trick. Glazyev's set of countermeasures specifically targets the core strength of the US war machine, i.e. the Fed's printing press. Putin's advisor proposes the creation of a "broad anti-dollar alliance" of countries willing and able to drop the dollar from their international trade. Members of the alliance would also refrain from keeping the currency reserves in dollar-denominated instruments. Glazyev advocates treating positions in dollar-denominated instruments like holdings of junk securities and believes that regulators should require full collateralization of such holdings. An anti-dollar coalition would be the first step for the creation of an anti-war coalition that can help stop the US' aggression.
  • ...1 more annotation...
  • Unsurprisingly, Sergey Glazyev believes that the main role in the creation of such a political coalition is to be played by the European business community because America's attempts to ignite a war in Europe and a cold war against Russia are threatening the interests of big European business. Judging by the recent efforts to stop the sanctions against Russia, made by the German, French, Italian and Austrian business leaders, Putin's aide is right in his assessment. Somewhat surprisingly for Washington, the war for Ukraine may soon become the war for Europe's independence from the US and a war against the dollar.
  •  
    Russia takes aim at the Fed's printing press with a U.S. dollar boycott to end the war in Ukraine. There are a lot of incentives for EU investors to join the boycott. Interesting idea; I'll need to think about this.  
Paul Merrell

Declassified Papers Shed Light on US Role in Liaquat's Murder | Arab News - 0 views

  • 18 July 2006 — Oil, Iran and air bases, seem to be issues of recent times. Not indeed. It was some 55 years back that these issues were very much in play and a recently declassified document indicates that these were the reasons behind the assassination of Liaquat Ali Khan, Pakistan’s first prime minister on Oct. 16, 1951.
  • A recent declassified document from the US State Department brings to light some interesting facts. According to the document, a telegram was sent by the American Embassy in New Delhi on Oct. 30, 1951. “Is Liaquat Ali Khan’s assassination a result of a deep-laid American conspiracy?” The telegram from the US Embassy in New Delhi carried the summary of an article published in the Urdu daily of Bhopal, “Nadeem” on Oct. 24, 1951, charging the US with the responsibility of Khan’s death. The summary then points to the facts raised in the Nadeem article, “It was neither a local incident nor connected with the Pashtoonistan movement (as some may have believed then). It had behind it a deep-rooted conspiracy and recognizable hand.” The article then says that the then Afghan government “knew about the conspiracy and the assassin was an Afghan, yet, the plot was hatched neither in Kabul nor in Karachi (the then capital of Pakistan).”
  • The declassified document reveals that the day before assassination, the secretary to the American ambassador in Karachi absent-mindedly jotted down “holiday” for Oct. 19 in a table diary and then immediately struck it off. Following the secretary’s departure, Mohammad Hussain, a Pakistani employee at the American Embassy in Karachi asked the secretary’s British clerk about the holiday. The clerk described it as a possible slip. “Mistake meaningful,” however, because “the secretary knew the embassy would be closed (on) Oct. 17 (sic) although no American or Pakistani holiday was scheduled then to fall that day. The story in Nadeem then points to another fact, as given in the declassified document. The American ambassador (in Karachi) offered condolences to Liaquat’s wife (Raana Liaquat Ali Khan) on the phone, some three and a half minutes before even the Governor General of Pakistan Khawaja Nazimuddin managed to offer his condolences. This was despite the fact that the governor general was the first to be informed (of the killing) by the Rawalpindi authorities. Indeed with no mobile connection, no live transmissions, even no TV, those were different days and the flow of information was much slower than today. The question that the newspaper article thus tried to raise was how did the American ambassador come to know of the assassination before the governor general of Pakistan found out?
  • ...3 more annotations...
  • The newspaper article, as summarized by the declassified US document, then discusses the possible reason for the disenchantment of the US and the UK governments with the Pakistan prime minister and his government. Liaquat was not ready to toe the US line, the newspaper pointed out and hence the US wanted him eliminated.
  • According to the article, Liaquat Ali Khan declined to accede to the request. “The US then threatened to annul the secret pact on Kashmir (between Pakistan and the US). Liaquat replied that Pakistan has annexed half of Kashmir without American support and would be able to take the other half too.” Not only that, Prime Minister Liaquat Ali Khan also demanded that the US vacate air bases in Pakistan. “Liaquat’s demand was a bombshell for Washington. Americans who had been dreaming of conquering Soviet Russia from Pakistan air bases were flabbergasted,” the article emphasized. And hence the plot to kill Liaquat was hatched, says the article. However, “the US wanted a Muslim assassin, so as to obviate international complications. The US could not find a traitor in Pakistan (apparently for the reason that the new country was then brimming with nationalistic pride and hope for future),” the article added. The US then turned to Kabul. “Washington contacted the US Embassy in Kabul. They in turn got in touch with Pashtoonistan leaders, pointing to Liaquat as their only hurdle and assuring them that if some of them could kill Liaquat, the US would undertake the task of establishing Pashtoonistan by 1952.”
  • At this the “Pashtoon leaders induced Akbar to take the job and also made arrangements for him to be killed immediately after so as to conceal the conspiracy. The Pakistani currency recovered from the assassin’s body also reveal that others were also involved. Due to already strained relations between Pakistan and Afghanistan no currency exchange was then taking place between the two countries. Hence only the “American Embassy (in Kabul) could have supplied the Pakistani currency notes to the assassin,” the summary argued. The article also mentioned that the cartridges recovered from the body of the assassinated Pakistani premier were US made. The type of bullet used to kill the Pakistani prime minister were in “use by high-ranking American officers”, and were “not usually available in the market”. The rest is for us to deduce. The article then summarized that all these facts prove that the real culprit behind the killing was the US, which had committed similar acts in the Middle East as well.
Paul Merrell

The Fundamentals of US Surveillance: What Edward Snowden Never Told Us? | Global Resear... - 0 views

  • Former US intelligence contractor Edward Snowden’s revelations rocked the world.  According to his detailed reports, the US had launched massive spying programs and was scrutinizing the communications of American citizens in a manner which could only be described as extreme and intense. The US’s reaction was swift and to the point. “”Nobody is listening to your telephone calls,” President Obama said when asked about the NSA. As quoted in The Guardian,  Obama went on to say that surveillance programs were “fully overseen not just by Congress but by the Fisa court, a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them”. However, it appears that Snowden may have missed a pivotal part of the US surveillance program. And in stating that the “nobody” is not listening to our calls, President Obama may have been fudging quite a bit.
  • In fact, Great Britain maintains a “listening post” at NSA HQ. The laws restricting live wiretaps do not apply to foreign countries  and thus this listening post  is not subject to  US law.  In other words, the restrictions upon wiretaps, etc. do not apply to the British listening post.  So when Great Britain hands over the recordings to the NSA, technically speaking, a law is not being broken and technically speaking, the US is not eavesdropping on our each and every call. It is Great Britain which is doing the eavesdropping and turning over these records to US intelligence. According to John Loftus, formerly an attorney with  the Department of Justice and author of a number of books concerning US intelligence activities, back in the late seventies  the USDOJ issued a memorandum proposing an amendment to FISA. Loftus, who recalls seeing  the memo, stated in conversation this week that the DOJ proposed inserting the words “by the NSA” into the FISA law  so the scope of the law would only restrict surveillance by the NSA, not by the British.  Any subsequent sharing of the data culled through the listening posts was strictly outside the arena of FISA. Obama was less than forthcoming when he insisted that “What I can say unequivocally is that if you are a US person, the NSA cannot listen to your telephone calls, and the NSA cannot target your emails … and have not.”
  • According to Loftus, the NSA is indeed listening as Great Britain is turning over the surveillance records en masse to that agency. Loftus states that the arrangement is reciprocal, with the US maintaining a parallel listening post in Great Britain. In an interview this past week, Loftus told this reporter that  he believes that Snowden simply did not know about the arrangement between Britain and the US. As a contractor, said Loftus, Snowden would not have had access to this information and thus his detailed reports on the extent of US spying, including such programs as XKeyscore, which analyzes internet data based on global demographics, and PRISM, under which the telecommunications companies, such as Google, Facebook, et al, are mandated to collect our communications, missed the critical issue of the FISA loophole.
  • ...2 more annotations...
  • U.S. government officials have defended the program by asserting it cannot be used on domestic targets without a warrant. But once again, the FISA courts and their super-secret warrants  do not apply to foreign government surveillance of US citizens. So all this sturm and drang about whether or not the US is eavesdropping on our communications is, in fact, irrelevant and diversionary.
  • In fact, the USA Freedom Act reinstituted a number of the surveillance protocols of Section 215, including  authorization for  roving wiretaps  and tracking “lone wolf terrorists.”  While mainstream media heralded the passage of the bill as restoring privacy rights which were shredded under 215, privacy advocates have maintained that the bill will do little, if anything, to reverse the  surveillance situation in the US. The NSA went on the record as supporting the Freedom Act, stating it would end bulk collection of telephone metadata. However, in light of the reciprocal agreement between the US and Great Britain, the entire hoopla over NSA surveillance, Section 215, FISA courts and the USA Freedom Act could be seen as a giant smokescreen. If Great Britain is collecting our real time phone conversations and turning them over to the NSA, outside the realm or reach of the above stated laws, then all this posturing over the privacy rights of US citizens and surveillance laws expiring and being resurrected doesn’t amount to a hill of CDs.
Gary Edwards

How Can the US Get Back its AAA Rating? | NewsyStocks.com - 0 views

  • First among the recommendations of S&P 500, it expects the US government to get the federal debt down to around 60 percent or 65 percent of GDP, which has been historically around 40 percent.
  • . Its concerns were divided into two categories. First, the Americans are growing old and the cons
  • Currently, t
  • ...9 more annotations...
  • S&P had made it clear that budget cuts alone are not sufficient but taxes must be increased.
  • S&P wants the US to generate enough savings from its debt deal to stabilize the national debt so that it will no longer
  • w faster than t
  • The government requires at least $4 trillion to $5 trillion in savings over the next 10 years to achieve the debt target.
  • tinue to gro
  • ncreases in entitlement costs cannot be sustained alone by the current tax collections for programs like Social S
  • ecurity.
  • budget cuts alone are not enough to reduce deficits. So taxes have to be increased to add revenue to the Treasury.
  • A cap on spending would act as sort of a stopgap preventing lawmakers from letting party politics put a blockade in the way on necessary steps towards the economic recovery of the US.
  •  
    S&P wants the US to generate enough savings from its debt deal to stabilize the national debt so that it will no longer continue to grow faster than the economy. Its concerns were divided into two categories. First, the Americans are growing old and the consequent increases in entitlement costs cannot be sustained alone by the current tax collections for programs like Social Security. So, the government needs to create a framework to address the costs of an aging American population. This could require an increase in the age limit at which Social Security and Medicare Benefits could be accessed and to exclude those people who have savings or jobs from both of these programs.   The other crucial area of concerns highlighted by S&P is that budget cuts alone are not enough to reduce deficits. So taxes have to be increased to add revenue to the Treasury. While increasing revenue and cutting spending will help in reducing the deficit and help in balancing the budget. A cap on spending would act as sort of a stopgap preventing lawmakers from letting party politics put a blockade in the way on necessary steps towards the economic recovery of the US.   Analysts believe that the US needs to compromise on its defence budget also, which still supports large deployments of armed forces and material overseas. The US has commitments to NATO in Afghanistan and Iraq, and the federal government believes that it needs to support strategic initiatives in place like Japan. The government has to take strong steps in its policy towards these obligations to put the country's economy back on track.   The US owes maximum of its debt to China. So the Congress needs to put pressure on the Chinese government to alter the value of its currency to make the trade between the two countries fair. Furthermore, cheap goods exported by China have caused a loss of manufacturing jobs in the US, so the latter should place tariffs on more Chinese goods as a way to raise money and prevent dumping of pro
Paul Merrell

FBI demands new powers to hack into computers and carry out surveillance | US news | Th... - 0 views

  • The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world. Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violate first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight. The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.
  • “This is a giant step forward for the FBI’s operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move,” said Ahmed Ghappour, an expert in computer law at University of California, Hastings college of the law, who will be addressing next week’s hearing. The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district. But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.
  • Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.
  • ...2 more annotations...
  • Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week’s meeting: “This should not be the first public forum for discussion of an issue of this magnitude.” Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that “this is an investigative technique that we haven’t seen before and we haven’t thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved.” Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.
  • Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that. In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as “a search of foreign property known to contain criminal evidence, for which a warrant was not necessary”.
  •  
    This rule change has been in the works during the last year.  "The change is designed specifically to help federal investigators carry out surveillance on computers that have been "anonymized" - that is, their location has been hidden using tools such as Tor."  Are we dizzy yet? The State Department is pushing the use of TOR by dissidents in nations whose governments State and the CIA intends to overthrow. Meanwhile, Feed Bag, Inc. wants use of TOR to be sufficient grounds for installing malware on anyone using it to make their systems and all their systems can see or hear be an open book. Let's see. There's the First Amendment right to anonymous speech just to begin with. McIntyre v. Ohio Elections Comm'n, 514 US 334 (1995). ("Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation-and their ideas from suppression-at the hand of an intolerant society. The right to remain anonymous may be abused when it shields fraudulent conduct. But political speech by its nature will sometimes have unpalatable consequences, and, in general, our society accords greater weight to the value of free speech than to the dangers of its misuse.") (Internal citation omitted.) And of course there's the Natural Law liberty to whisper, to utter words in a way that none but the intended recipient can hear. So throw on the violation of the Fifth Amendment's Liberty clause. Then there's the plain language of the Fourth Amendment warrant clause, "particularly describing the *place* to be searched." Not to mention the major reason for the Fourth Amendment, to abolish the "general warrant" that had enabled the Crown to search wherever the warrant's executor's little heart desired.  And th
Paul Merrell

US hegemonic quest in Mideast creates chaos - Global Times - 0 views

  • Editor's Note:With the rise of the Islamic State (IS), the conflicts in Syria and Iraq, and the struggle between Iran and the West over nuclear issues, the Middle East remained chaotic in 2014. What about 2015? What kind of role will the US play in the regional political landscape? At a seminar held by the Chongyang Institute for Financial Studies, Renmin University of China, Global Times (GT) reporter Liu Zhun talked to Flynt Leverett (Flynt), former senior director of Middle East Affairs at the National Security Council (NSC), and Hillary Mann Leverett (Hillary), former director of Iran, Afghanistan and Persian Gulf Affairs at the NSC, about these issues. GT: What is your forecast of the situation of the Middle East this year?
  • Flynt: More and more negative consequences of the failed US drive for the hegemony in the Middle East will become increasingly evident. The US is struggling to come to terms with that. Washington should reconsider its basic strategy for this region, but President Barack Obama has a great belief in US' hegemonic agenda. Many analysts in the US argue that Washington should "double-down" on its strategy. But this is the wrong direction.Hillary: There will be more violence throughout the region - violence encouraged by the US. A potential difference rests on the possibility that an alternative mindset will be brought in by China as it rises. Whether Russia, with the support of China and Iran, can put Syria's conflicts on a different trajectory toward resolution is important - whether they can bring in a different paradigm for conflict resolution. I am not sure they can yet, but I am encouraged by China's rise and its focus on sovereignty and conflict resolution. GT: If the US changes its course, will the region be a better place?Flynt: Yes, it will be a better place. The historical record has proven that. For 20 years after China's revolution, the US was doing everything it could to isolate and hurt the People's Republic of China. After it gave up its hostile policies toward China, China, as well as other East Asian countries, embarked on a long and productive period of economic expansion with rising prosperity for hundreds of millions of people. The Middle East will not be perfect after the US changes its policy, but it will be better.
  • GT: But the chaos in the Middle East, much of which is driven by religious issues, is more complicated than the conflicts China encountered with the US, which were basically ideological. What do you think of the role of Islam in the chaos of the Middle East?Hillary: There has been a perception that there is something wrong with Islam and that it is the major contributor to the complications of the problems in the Middle East. But if you look historically, that is not really true. There is no evidence that Muslims are historically terrorists. The head of the IS was in an American prison, where he became more extreme in his own views and forged a network with other extremists.The perennial chaos of the Middle East, to a large extent, is caused by a long history of military penetration by Western countries such as France, the UK and now the US. GT: You suggest the US should shift its Middle East policy and pull back from trying to be a hegemon - for example, by restoring ties with Iran. What do you think of Obama's current strategy to the Middle East?Flynt: People are talking about the Obama doctrine and his being less interventionist. I don't really think that is right. I think the Obama administration is no less committed to so-called global leadership, which is actually hegemony, over strategically important areas like the Middle East. The Obama administration thinks it has a smarter way of promoting that leadership than its immediate predecessor. But that is more a tactical than strategic difference.
  • ...1 more annotation...
  • GT: China's "One Belt and One Road" project is believed to have a major influence on the Middle East. Will it be a counterbalance of the US' influence in the region?Flynt: US power in the Persian Gulf is in relative decline. But because it is desperate to cling to its hegemonic ambitions in the region, Washington is trying to put China's interests at risk. China will decide what its interests are in the Middle East. As an analytic point, though, if China really wants to have an independent and balanced foreign policy, China will need to decide how accommodating it wants to be of US preferences and to what extent it wants to pursue its own interests, even when the US is not necessarily happy about that. I think the Middle East's engagement in the Silk Road, especially Iran, is going to be a testing ground for China. Hillary: I think the US will definitely disagree with the project. After the collapse of the Soviet Union, the US has really focused on trying to expand its influence, military or otherwise, on Central Asian states in a bid to put pressure on Russia. This has been a consistent theme through both Democratic and Republican administrations. China's project will unavoidably reach Central Asia, which could lessen interest in those states in aligning with various American projects and make it harder for the US to pressure Russia. Besides, as Iran is central for both Silk Roads, China's good relationship with Iran will be very problematic for the US interests, and also for its hegemonic ambitions across the entire Middle East.
Paul Merrell

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
Paul Merrell

Ending Syria's Nightmare will Take Pressure From Below  - 0 views

  • On Wednesday, the US airlifted hundreds of mainly-Kurdish fighters to an area behind ISIS lines where they were dropped near the town of al-Tabqa. The troops– who are part of the US-backed Syrian Democratic Forces or SDF– were accompanied by an undisclosed number of US Marines serving as advisors. Ostensibly, the deployment was intended to encircle ISIS positions and retake the area around the strategic Tabqa Dam. But the operation had the added effect of blocking the Syrian Arab Army (SAA) from advancing  along the main road towards Raqqa, the so called Capital of ISIS.  While the blocking move might have been coincidental, there’s a strong possibility that Washington is in the opening phase of a broader strategy to splinter the war-torn country and prevent the reemergence of a united secular Syria. According to Almasdar News: “The Coalition supported the offensive with air movement and logistical support, precision airstrikes, Apache helicopters in close air support, Marine artillery, and special operations advice and assistance to SDF leadership,” the US-led coalition said in a statement.” (AMN News) In a matter of weeks, Washington’s approach to the war in Syria has changed dramatically. While the US has reportedly ended its support for the Sunni militias that have torn the country apart and killed over 400,000 people, the US has increased its aid to the SDF that is making impressive territorial gains across the eastern corridor. The ultimate goal for the SDF fighters is an autonomous Kurdish homeland carved out of West Iraq and East Syria, while US objectives focus primarily on the breakup of the Syrian state, the removal of the elected government, the control over critical pipelines routes, and the redrawing of national borders to better serve the interests of the US and Israel.
  • The most recent adaptation of Yinon’s plan was articulated by Brookings Institute analyst Michael O’ Hanlon in a piece that appeared in the Wall Street Journal titled “A Trump Strategy to End Syria’s Nightmare”.  In the article, O’ Hanlon states bluntly: “To achieve peace, Syria will need self-governance within a number of autonomous zones. One option is a confederal system by which the whole country is divided into such zones. A less desirable but minimally acceptable alternative could be several autonomous zones within an otherwise still-centralized state—similar to how Iraqi Kurdistan has functioned for a quarter-century…. Security in the Sunni Arab and Kurdish autonomous zones would be provided by local police and perhaps paramilitary forces raised, trained and equipped with the direct support of the international community. …(“A Trump Strategy to End Syria’s Nightmare”, Wall Street Journal) In an earlier piece, O’ Hanlon referred to his scheme as “Deconstructing Syria” a plan that “would produce autonomous zones that would never again have to face the prospect of rule by either Assad or ISIL.” Many of the details in O’ Hanlon’s piece are identical to those in Trump’s plan which was announced by Secretary of State Tillerson just last week. The Brookings strategy appears to be the script from which the administration is operating.
  • In his presentation, Tillerson announced that US troops would not leave Iraq after the siege of Mosul was concluded which has led many to speculate that the same policy will be used in Syria. Here’s an excerpt from an article at the WSWS that explains this point: “US Secretary of State Rex Tillerson declared Washington’s intention to keep troops deployed more or less indefinitely in the territories now occupied by Islamic State in Iraq and Syria in remarks delivered at the beginning of a two-day meeting of the US-organized anti-ISIS coalition in Washington. “The military power of the coalition will remain where this fraudulent caliphate has existed in order to set the conditions for a full recovery from the tyranny of ISIS,” he told an audience that included Iraqi Prime Minister Haider al-Abadi. He gave no indication of when, if ever, US troops could be withdrawn from a war zone extending across Iraq and Syria, where there has been fighting of greater or lesser intensity throughout the 14 years since the US first invaded Iraq.” (Tillerson pledges long-term US military role in Iraq and Syria, World Socialist web Site) US Defense Secretary James “Mad Dog” Mattis reinforced Tillerson’s comments adding that the US plans a indefinite occupation of Iraq (and, possibly, Syria) stating that it was in America’s “national interest.”
  • ...3 more annotations...
  • “We will pursue a new foreign policy that finally learns from the mistakes of the past…We will stop looking to topple regimes and overthrow governments…. Our goal is stability not chaos, because we want to rebuild our country [the United States] …In our dealings with other countries, we will seek shared interests wherever possible and pursue a new era of peace, understanding, and good will.” There won’t be any peace under Mattis or McMaster, that’s for sure. Both men are anti-Moscow hardliners who think Russia is an emerging rival that must be confronted and defeated. Even more worrisome is the fact that uber-hawk John McCain recently stated that he talks with both men “almost daily” (even though he has avoided talking to Trump since he was elected in November.) According to German Marshall Fund’s Derek Chollet, a former Obama Pentagon official. “(McCain) is trying to run U.S. defense policy through Mattis and effectively ignore Trump.” (Kimberly Dozier, Daily Beast contributing editor)  Chollet’s comments square with our belief that Trump has relinquished his control over foreign policy to placate his critics.
  • In response to Mattis’s comments, Syrian President Bashar al Assad said: “Any military operation in Syria without the approval of the Syrian government is illegal, and  any troops on the Syrian soil,  is an invasion, whether to liberate Raqqa or any other place. …The (US-led) coalition has never been serious about fighting ISIS or the terrorists.” Clearly, Washington is using the fight against ISIS as a pretext for capturing and holding territory in a critical, energy-rich area of the world. The plan to seize parts of East Syria for military bases and pipeline corridors fits neatly within this same basic strategy.   But it also throws a wrench in Moscow’s plan to restore the country’s borders and put an end to the six year-long conflict. And what does Tillerson mean when he talks about “interim zones of stability” a moniker that the Trump administration carefully crafted to avoid the more portentous-sounding “safe zones”. (Readers will recall that Hillary Clinton was the biggest proponent of safe zones in Syria, even though they would require a huge commitment of US troops as well as the costly imposition of a no-fly zone.) Tillerson’s comments suggest that the Trump administration is deepening its involvement in Syria despite the risks of a catastrophic clash with Moscow. Ever since General Michael Flynn was forced to step down from his position as National Security Advisor, (Flynn wanted to “normalize” relations with Russia), Trump has filled his foreign policy team with Russophobic hawks who see Moscow as “hostile revisionist power” that “annex(es) territory, intimidates our allies, develops nuclear weapons, and uses proxies under the cover of modernized conventional militaries.” Those are the words of  the man who replaced Flynn as NSA,  Lt. General HR McMaster. While the media applauded the McMaster appointment as an “outstanding choice”, his critics think it signals a departure from Trump’s campaign promise:
  • Washington’s Syria policy is now in the hands of a small group of right-wing extremists who think Russia is the biggest threat the nation has faced since WW2. That’s why there’s been a sharp uptick in the number of troops deployed to the region. 
Paul Merrell

How Barack Obama turned his back on Saudi Arabia and its Sunni allies | Middle East | N... - 0 views

  • Commentators have missed the significance of President Barack Obama’s acerbic criticism of Saudi Arabia and Sunni states long allied to the US for fomenting sectarian hatred and seeking to lure the US into fighting regional wars on their behalf. In a series of lengthy interviews with Jeffrey Goldberg published in The Atlantic magazine, Mr Obama explains why it is not in the US’s interests to continue the tradition of the US foreign policy establishment, whose views he privately disdains, by giving automatic support to the Saudis and their allies.  Obama’s arguments are important because they are not off-the-cuff remarks, but are detailed, wide ranging, carefully considered and leading to new departures in US policy. The crucial turning point came on 30 August 2013 when he refused to launch air strikes in Syria. This would, in effect, have started military action by the US to force regime change in Damascus, a course of action proposed by much of the Obama cabinet as well by US foreign policy specialists.  Saudi Arabia, Turkey and the Gulf monarchies were briefly convinced that they would get their wish and the US was going to do their work for them by overthrowing President Bashar al-Assad. They claimed this would be easy to do, though it would have happened only if there had been a full-scale American intervention and it would have produced a power vacuum that would have been filled by fundamentalist Islamic movements as in Iraq, Afghanistan and Libya. Mr Goldberg says that by refusing to bomb Syria, Obama “broke with what he calls, derisively, ‘the Washington Playbook’. This was his liberation day”.
  • It will be important to know after the US election if the new president will continue to rebalance US foreign policy away from reliance on Sunni powers seeking to use American military and political “muscle” in their own interests. Past US leaders have closed their eyes to this with disastrous consequences in Afghanistan, Iraq, Libya and Syria. Mr Goldberg says that President Obama “questioned, often harshly, the role that America’s Sunni Arab allies play in fomenting anti-American terrorism. He is clearly irritated that foreign policy orthodoxy compels him to treat Saudi Arabia as an ally”.  What is truly strange about the new departures in US foreign policy is that they have taken so long to occur. Within days of 9/11, it was known that 15 out of the 19 hijackers were Saudi, as was Osama bin Laden and the donors who financed the operation. Moreover, the US went on treating Saudi Arabia, Turkey, Pakistan and the Gulf monarchies as if they were great powers, when all the evidence was that their real strength and loyalty to the West were limited. 
  • Though it was obvious that the US would be unable to defeat the Taliban so long as it was supported and given sanctuary by Pakistan, the Americans never confronted Pakistan on the issue. According to Goldberg, Obama “privately questions why Pakistan, which he believes is a disastrously dysfunctional country, should be considered an ally of the US at all”. As regards Turkey, the US President had hopes of its President Recep Tayyip Erdogan, but has since come to see him as an authoritarian ruler whose policies have failed.
  • ...2 more annotations...
  • A striking feature of Obama’s foreign policy is that he learns from failures and mistakes. This is in sharp contrast to Britain where David Cameron still claims he did the right thing by supporting the armed opposition that replaced Muammar Gaddafi in Libya, while George Osborne laments Parliament’s refusal to vote for the bombing of Syria in 2013. 
  • It will become clearer after November’s presidential election how far Obama’s realistic take on Saudi Arabia, Turkey, Pakistan and other US allies and his scepticism about the US foreign policy establishment will be shared by the new administration. The omens are not very good since Hillary Clinton supported the invasion of Iraq in 2003, intervention in Libya in 2011 and bombing Syria in 2013. If she wins the White House, then the Saudis and the US foreign policy establishment will breathe more easily. 
  •  
    Patrick Cockburn, one of the very best Mideast investigative reporters, riffs on Obama's foreign policy changes and questions whether Obama's realist foreign policy will survive a new resident at 1600 Pennsylvania Avenue.
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
Paul Merrell

Obama Issues Threats To Russia And NATO -- Paul Craig Roberts - PaulCraigRoberts.org - 0 views

  • The Obama regime has issued simultaneous threats to the enemy it is making out of Russia and to its European NATO allies on which Washington is relying to support sanctions on Russia. This cannot end well. As even Americans living in a controlled media environment are aware, Europeans, South Americans, and Chinese are infuriated that the National Stasi Agency is spying on their communications. NSA’s affront to legality, the US Constitution, and international diplomatic norms is unprecedented. Yet, the spying continues, while Congress sits sucking its thumb and betraying its oath to defend the Constitution of the United States. In Washington mumbo-jumbo from the executive branch about “national security” suffices to negate statutory law and Constitutional requirements. Western Europe, seeing that the White House, Congress and the Federal Courts are impotent and unable to rein-in the Stasi Police State, has decided to create a European communication system that excludes US companies in order to protect the privacy of European citizens and government communications from the Washington Stasi.
  • The Obama regime, desperate that no individual and no country escape its spy net, denounced Western Europe’s intention to protect the privacy of its communications as “a violation of trade laws.” Obama’s US Trade Representative, who has been negotiating secret “trade agreements” in Europe and Asia that give US corporations immunity to the laws of all countries that sign the agreements, has threatened WTO penalties if Europe’s communications network excludes the US companies that serve as spies for NSA. Washington in all its arrogance has told its most necessary allies that if you don’t let us spy on you, we will use WTO to penalize you. So there you have it. The rest of the world now has the best possible reason to exit the WTO and to avoid the Trans-Pacific and Trans-Atlantic “trade agreements.” The agreements are not about trade. The purpose of these “trade agreements” is to establish the hegemony of Washington and US corporations over other countries. In an arrogant demonstration of Washington’s power over Europe, the US Trade Representative warned Washington’s NATO allies: “US Trade Representative will be carefully monitoring the development of any such proposals” to create a separate European communication network. http://rt.com/news/us-europe-nsa-snowden-549/ Washington is relying on the Chancellor of Germany, the President of France, and the Prime Minister of the UK to place service to Washington above their countries’ communications privacy.
  • It has dawned on the Russian government that being a part of the American dollar system means that Russia is open to being looted by Western banks and corporations or by individuals financed by them, that the ruble is vulnerable to being driven down by speculators in the foreign exchange market and by capital outflows, and that dependence on the American international payments system exposes Russia to arbitrary sanctions imposed by the “exceptional and indispensable country.” Why it took the Russian government so long to realize that the dollar payments system puts countries under Washington’s thumb is puzzling.
  • ...2 more annotations...
  • Now that the Russian government understands that Russia must depart the dollar system in order to protect Russian sovereignty, President Putin has entered into barter/ruble oil deals with China and Iran. However, Washington objects to Russia abandoning the dollar international payment system. Zero Hedge, a more reliable news source than the US print and TV media, reports that Washington has conveyed to both Russia and Iran that a non-dollar oil deal would trigger US sanctions. http://www.zerohedge.com/news/2014-04-04/us-threatens-russia-sanctions-over-petrodollar-busting-deal Washington’s objection to the Russian/Iranian deal made it clear to all governments that Washington uses the dollar-based international payments system as a means of control. Why should countries accept an international payments system that infringes their sovereignty? What would happen if instead of passively accepting the dollar as the means of international payment, countries simply left the dollar system? The value of the dollar would fall and so would Washington’s power. Without the power that the dollar’s role as world reserve currency gives the US to pay its bills by printing money, the US could not maintain its aggressive military posture or its payoffs to foreign governments to do its bidding. Washington would be just another failed empire, whose population can barely make ends meet, while the One Percent who comprise the mega-rich compete with 200-foot yachts and $750,000 fountain pins. The aristocracy and the serfs. That is what America has already become. A throwback to the feudal era. It is only a matter of time before it is universally recognized that the US is a failed state. Let’s pray this recognition occurs before the arrogant inhabitants of Washington blow up the world in pursuit of hegemony over others.
  • Washington’s provocative military moves against Russia are reckless and dangerous. The buildup of NATO air, ground, and naval forces on Russia’s borders in violation of the 1997 NATO-Russian treaty and the Montreux Convention naturally strike the Russian government as suspicious, especially as the buildups are justified on the basis of lies that Russia is about to invade Poland, the Baltic States, and Moldova in addition to Ukraine. These lies are transparent. The Russian Foreign Minister Sergey Lavrov has asked NATO for an explanation, stating: “We are not only expecting answers, but answers that will be based fully on respect for the rules we agreed on.” http://rt.com/news/lavrov-ukraine-nato-convention-069/ Anders Fogh Rasmussen, Washington’s puppet installed as NATO figurehead who is no more in charge of NATO than I am, responded in a way guaranteed to raise Russian anxieties. Rasmussen dismissed the Russian Foreign Minister’s request for explanation as “propaganda and disinformation.” Clearly, what we are experiencing are rising tensions caused by Washington and NATO. These tensions are in addition to the tensions arising from Washington’s coup in Ukraine. These reckless and dangerous actions have destroyed the Russian government’s trust in the West and are moving the world toward war. Little did the protesters in Kiev, called into the streets by Washington’s NGOs, realize that their foolishness was setting the world on a path to armageddon.
« First ‹ Previous 41 - 60 of 4187 Next › Last »
Showing 20 items per page