Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged academic

Rss Feed Group items tagged

Paul Merrell

Wikimedia v. NSA | American Civil Liberties Union - 0 views

  • The ACLU has filed a lawsuit challenging the constitutionality of the NSA’s mass interception and searching of Americans’ international communications. At issue is the NSA's “upstream” surveillance, through which the U.S. government monitors almost all international – and many domestic – text-based communications. The ACLU’s lawsuit, filed in March 2015 in the U.S. District Court for the District of Maryland, is brought on behalf of nearly a dozen educational, legal, human rights, and media organizations that collectively engage in hundreds of billions of sensitive Internet communications and have been harmed by NSA surveillance.
  • The plaintiffs in the lawsuit are: Wikimedia Foundation, The National Association of Criminal Defense Lawyers, Human Rights Watch, Amnesty International USA, PEN American Center, Global Fund for Women, The Nation Magazine, The Rutherford Institute, and The Washington Office on Latin America. These plaintiffs’ sensitive communications have been copied, searched, and likely retained by the NSA. Upstream surveillance hinders the plaintiffs’ ability to ensure the basic confidentiality of their communications with crucial contacts abroad – among them journalists, colleagues, clients, victims of human rights abuses, and the tens of millions of people who read and edit Wikipedia pages. Read the complaint » Upstream surveillance, which the government claims is authorized by the FISA Amendments Act of 2008, is designed to ensnare all of Americans’ international communications, including emails, web-browsing content, and search engine queries. It is facilitated by devices installed, with the help of companies like Verizon and AT&T, directly on the internet “backbone” – the network of high-capacity cables, switches, and routers across which Internet traffic travels.
  • The NSA intercepts and copies private communications in bulk while they are in transit, and then searches their contents using tens of thousands of keywords associated with NSA targets. These targets, chosen by intelligence analysts, are never approved by any court, and the limitations that do exist are weak and riddled with exceptions. Under the FAA, the NSA may target any foreigner outside the United States believed likely to communicate “foreign intelligence information” – a pool of potential targets so broad that it encompasses journalists, academic researchers, corporations, aid workers, business persons, and others who are not suspected of any wrongdoing.
  • ...1 more annotation...
  • Through its general, indiscriminate searches and seizures of the plaintiffs’ communications, upstream surveillance invades their Fourth Amendment right to privacy, infringes on their First Amendment rights to free expression and association, and exceeds the statutory limits of the FAA itself. The nature of plaintiffs' work and the law’s permissive guidelines for targeting make it likely that the NSA is also retaining and reading their communications, from email exchanges between Amnesty staff and activists, to Wikipedia browsing by readers abroad. The ACLU litigated an earlier challenge to surveillance conducted under the FAA – Clapper v. Amnesty – which was filed less than an hour after President Bush signed the FAA into law in 2008. In a 5-4 vote, the Supreme Court dismissed the case in February 2013 on the grounds that the plaintiffs could not prove they had been spied on. Edward Snowden has said that the ruling contributed to his decision to expose the full scope of NSA surveillance a few months later. Among his disclosures was upstream surveillance, the existence of which was later confirmed by the government.
Paul Merrell

The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus - The Intercept - 0 views

  • “Is this related to what we talked about before?” Bencsáth said, referring to a previous discussion they’d had about testing new services the company planned to offer customers. “No, something else,” Bartos said. “Can you come now? It’s important. But don’t tell anyone where you’re going.” Bencsáth wolfed down the rest of his lunch and told his colleagues in the lab that he had a “red alert” and had to go. “Don’t ask,” he said as he ran out the door. A while later, he was at Bartos’ office, where a triage team had been assembled to address the problem they wanted to discuss. “We think we’ve been hacked,” Bartos said.
  • They found a suspicious file on a developer’s machine that had been created late at night when no one was working. The file was encrypted and compressed so they had no idea what was inside, but they suspected it was data the attackers had copied from the machine and planned to retrieve later. A search of the company’s network found a few more machines that had been infected as well. The triage team felt confident they had contained the attack but wanted Bencsáth’s help determining how the intruders had broken in and what they were after. The company had all the right protections in place—firewalls, antivirus, intrusion-detection and -prevention systems—and still the attackers got in.
  • Bencsáth was a teacher, not a malware hunter, and had never done such forensic work before. At the CrySyS Lab, where he was one of four advisers working with a handful of grad students, he did academic research for the European Union and occasional hands-on consulting work for other clients, but the latter was mostly run-of-the-mill cleanup work—mopping up and restoring systems after random virus infections. He’d never investigated a targeted hack before, let alone one that was still live, and was thrilled to have the chance. The only catch was, he couldn’t tell anyone what he was doing. Bartos’ company depended on the trust of customers, and if word got out that the company had been hacked, they could lose clients. The triage team had taken mirror images of the infected hard drives, so they and Bencsáth spent the rest of the afternoon poring over the copies in search of anything suspicious. By the end of the day, they’d found what they were looking for—an “infostealer” string of code that was designed to record passwords and other keystrokes on infected machines, as well as steal documents and take screenshots. It also catalogued any devices or systems that were connected to the machines so the attackers could build a blueprint of the company’s network architecture. The malware didn’t immediately siphon the stolen data from infected machines but instead stored it in a temporary file, like the one the triage team had found. The file grew fatter each time the infostealer sucked up data, until at some point the attackers would reach out to the machine to retrieve it from a server in India that served as a command-and-control node for the malware.
  • ...1 more annotation...
  • Bencsáth took the mirror images and the company’s system logs with him, after they had been scrubbed of any sensitive customer data, and over the next few days scoured them for more malicious files, all the while being coy to his colleagues back at the lab about what he was doing. The triage team worked in parallel, and after several more days they had uncovered three additional suspicious files. When Bencsáth examined one of them—a kernel-mode driver, a program that helps the computer communicate with devices such as printers—his heart quickened. It was signed with a valid digital certificate from a company in Taiwan (digital certificates are documents ensuring that a piece of software is legitimate). Wait a minute, he thought. Stuxnet—the cyberweapon that was unleashed on Iran’s uranium-enrichment program—also used a driver that was signed with a certificate from a company in Taiwan. That one came from RealTek Semiconductor, but this certificate belonged to a different company, C-Media Electronics. The driver had been signed with the certificate in August 2009, around the same time Stuxnet had been unleashed on machines in Iran.
Paul Merrell

HSBC's clients linked to dictators, arms dealers and tax dodgers | Center for Public In... - 0 views

  • Secret documents reveal that global banking giant HSBC profited from doing business with arms dealers who channeled mortar bombs to child soldiers in Africa, bag men for Third World dictators, traffickers in blood diamonds and other international outlaws. The leaked files, based on the inner workings of HSBC’s Swiss private banking arm, relate to accounts holding more than $100 billion. They provide a rare glimpse inside the super-secret Swiss banking system — one the public has never seen before. The documents, obtained by the International Consortium of Investigative Journalists (ICIJ) via the French newspaper Le Monde, show the bank’s dealings with clients engaged in a spectrum of illegal behavior, especially in hiding hundreds of millions of dollars from tax authorities. They also show private records of famed soccer and tennis players, cyclists, rock stars, Hollywood actors, royalty, politicians, corporate executives and old-wealth families.
  • These disclosures shine a light on the intersection of international crime and legitimate business, and they dramatically expand what’s known about potentially illegal or unethical behavior in recent years at HSBC, one of the world’s largest banks. How the offshore banking industry shelters money and hides secrets has enormous implications for societies across the globe. Academics conservatively estimate that $7.6 trillion is held in overseas tax havens, costing government treasuries at least $200 billion a year. In many instances the records do describe questionable behavior, such as bankers advising clients on how to take a range of measures to avoid paying taxes in their home countries — and customers telling bankers that their accounts are not declared to their governments.
Paul Merrell

U.S. Intensifies Effort to Blunt ISIS' Message - NYTimes.com - 0 views

  • The Obama administration is revamping its effort to counter the Islamic State’s propaganda machine, acknowledging that the terrorist group has been far more effective in attracting new recruits, financing and global notoriety than the United States and its allies have been in thwarting it.At the heart of the plan is expanding a tiny State Department agency, the Center for Strategic Counterterrorism Communications, to harness all the existing attempts at countermessaging by much larger federal departments, including the Pentagon, Homeland Security and intelligence agencies.The center would also coordinate and amplify similar messaging by foreign allies and nongovernment agencies, as well as by prominent Muslim academics, community leaders and religious scholars who oppose the Islamic State, also called ISIS or ISIL, and who may have more credibility with ISIS’ target audience of young men and women than the American government.
Paul Merrell

Israel's anti-boycott law will hit Palestinians hardest, rights groups warn | The Elect... - 0 views

  • Israel’s high court on Thursday upheld a 2011 law imposing stiff sanctions on those advocating boycotts of Israel or its colonial settlements in the occupied West Bank and Golan Heights. The so-called Law for the Prevention of Damage to the State of Israel through Boycott allows entities to sue and win compensation from individuals or organizations that call for economic, cultural or academic boycott. It also allows the finance ministry to financially penalize any organization that receives state funding that participates in such calls. The court threw out only one minor provision of the law, which would have allowed anyone to sue for boycott-related damages without showing proof they were harmed.
  • Sawsan Zaher, an attorney for Adalah – the Legal Center for Arab Minority Rights in Israel, said the law “harms Palestinians more than others because they are on the frontlines of struggling against the occupation and the violation of the human rights of their people under occupation in the West Bank and Gaza.” In a press release from Adalah, Zaher added that the law would also hit Palestinians in occupied East Jerusalem hard, as it would prevent them from using the “main civil protest tool of boycott to end the occupation.”
  • In their challenge, the petitioners pointed out that the law was discriminatory, as it did not outlaw boycotts for purposes other than supporting Palestinian rights. Israelis have successfully used consumer boycotts for a host of causes, for example in order to fight for lower cottage cheese prices.
  •  
    The court's decision does little more than emphasize how painful the international BSD campaign has become for Israel's government globally.
Paul Merrell

Documents Reveal Canada's Secret Hacking Tactics - The Intercept - 0 views

  • Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents. Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show. The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems. The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.
  • Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?” According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities. One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.
  • According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”) Notably, CSE has gone beyond just adopting a range of tools to hack computers. According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.
  • ...1 more annotation...
  • The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.
Paul Merrell

The FBI Has a New Plan to Spy on High School Students Across the Country | Alternet - 0 views

  • Under new guidelines, the FBI is instructing high schools across the country to report students who criticize government policies and “western corruption” as potential future terrorists, warning that “anarchist extremists” are in the same category as ISIS and young people who are poor, immigrants or travel to “suspicious” countries are more likely to commit horrific violence.Based on the widely unpopular British “anti-terror” mass surveillance program, the FBI’s "Preventing Violent Extremism in Schools" guidelines, released in January, are almost certainly designed to single out and target Muslim-American communities. However, in its caution to avoid the appearance of discrimination, the agency identifies risk factors that are so broad and vague that virtually any young person could be deemed dangerous and worthy of surveillance, especially if she is socio-economically marginalized or politically outspoken.
  • This overwhelming threat is then used to justify a massive surveillance apparatus, wherein educators and pupils function as extensions of the FBI by watching and informing on each other.The FBI’s justification for such surveillance is based on McCarthy-era theories of radicalization, in which authorities monitor thoughts and behaviors that they claim to lead to acts of violent subversion, even if those people being watched have not committed any wrongdoing. This model has been widely discredited as a violence prevention method, including by the U.S. government, but it is now being imported to schools nationwide as official federal policy.
  • Under the category of domestic terrorists, the educational materials warn of the threat posed by “anarchist extremists.” The FBI states, “Anarchist extremists believe that society should have no government, laws, or police, and they are loosely organized, with no central leadership… Violent anarchist extremists usually target symbols of capitalism they believe to be the cause of all problems in society—such as large corporations, government organizations, and police agencies.”Similarly, “Animal Rights Extremists and Environmental Extremists” are placed alongside “white supremacy extremists”, ISIS and Al Qaeda as terrorists out to recruit high school students. The materials also instruct students to watch out for  extremist propaganda messages that communicate criticisms of "corrupt western nations" and express "government mistrust.”If you "see suspicious behavior that might lead to violent extremism," the resource states, consider reporting it to "someone you trust," including local law enforcement officials like police officers and FBI agents.
  • ...3 more annotations...
  • “The whole concept of CVE is based on the conveyor belt theory – the idea that ‘extreme ideas’ lead to violence,” Michael German, a fellow with the Brennan Center for Justice’s Liberty and National Security Program, told AlterNet. “These programs fall back on the older ‘stages of radicalization’ models, where the identified indicators are the expression of political grievances and religious practices.”The lineage of this model can be traced to the first red scare in America, as well as J. Edgar Hoover’s crackdown on civil rights and anti-war activists. In the post-9/11 era, the conveyor-belt theory has led to the mass surveillance of Muslims communities by law enforcement outfits ranging from the FBI to the New York Police Department.U.S. government agencies continue to embrace this model despite the fact that it has been thoroughly debunked by years of scholarly research, Britain’s M15 spy agency and an academic study directly supported by the Department of Homeland Security.
  • “The document aims to encourage schools to monitor their students more carefully for signs of radicalization but its definition of radicalization is vague,” said Arun Kundnani, author of The Muslims are Coming! Islamophobia, extremism, and the domestic War on Terror and an adjunct professor at New York University. “Drawing on the junk science of radicalization models, the document dangerously blurs the distinction between legitimate ideological expression and violent criminal actions.”
  • As Hugh Handeyside, staff attorney for the ACLU’s national security project, told AlterNet, “Broadening the definition of violent extremism to include a range of belief-driven violence underscores that the FBI is diving head-first into community spying. Framing this conduct as ‘concerning behavior’ doesn’t conceal the fact that the FBI is policing students’ thoughts and trying to predict the future based on those thoughts.”
Paul Merrell

Israel Retaliates over EU's Directive on Labeling Goods from Occupied Arab Territories ... - 0 views

  • The administration of Israeli Prime Minister Benjamin Netanyahu responded to the recently adopted EU directive on labeling goods from occupied Arab territories by suspending the Israeli – European Union dialog over the Israeli – Palestinian peace process. 
  • In November the EU adopted a directive that prescribes the labeling of Israeli products and goods from Israeli occupied Arab territories, which are, occupied territories in the Palestinian West Bank, East Jerusalem, the Israeli occupied Syrian Golan Heights, and the Israeli occupied Lebanese Sheba Farm area. The EU stressed that the adoption of the directive was not a hostile act against Israel. Instead, noted the EU, the directive aimed at providing consumers correct information about the origin of goods.
  • Prime Minister Netanyahu’s Cabinet plans reportedly to implement additional measures against six specific countries, which are Belgium, France, Ireland, Luxemburg, Malta and Sweden. The measures are likely to include the suspension of cooperation with regard to rehabilitation projects in the Palestinian Gaza Strip and projects aimed at strengthening the Palestinian Authority (PA).
  • ...2 more annotations...
  • On Wednesday, December 2, the Speaker of the Israeli Parliament (Knesset), Yuli Edelstein commented on the EU directive during a special session of the German Bundestags (Parliamentary) Committee on Foreign Affairs and the Defense Committee. Edelstein denounced the EU directive as “unfortunate” and complained that the EU provides fertile ground for the international Boycott Divestment Sanctions (BDS) campaign. Edelstein especially denounced measures such as economic and academic boycotts as “improper”. Israel has occupied large swaps of the Palestinian West Bank, East Jerusalem, the Syrian Golan Heights and the Lebanese Sheba Farm Area since the 1967 “six days war”. Israel continues the occupation in defiance of multiple UN resolutions as well as international and humanitarian law. Israel has officially stated that it plans to permanently annex the Syrian Golan Heights. Foreign Minister Avigdor Lieberman, for example, stated that Israel and the Golan are part and parcel, and that the international community should accept the annexation as a fact. It is noteworthy that there has been a discovery of major Syrian oil resources in the Golan Heights. Entrepreneurs with vested interests include the US-based Genie Energy. Members of the “think tank” are, among others, Dick Cheney, James Woolsey, Bill Richardson, Jacob Lord Rothschild, Rupert Murdoch, Larry Summers and Michael Steinhardt who all are members of the Strategic Advisory Board of a Newark, New Jersey-based oil and gas group with the name, Genie Energy.
  • Late November, Israeli Prime Minister Benjamin Netanyahu stated that Israel would not concede one meter of the occupied Palestinian West Bank’s Area C. Israel is providing support for the Syrian Al-Qaeda franchise Jabhat al-Nusrah and other jihadist mercenary forces via the occupied Syrian Golan Heights. Al-Nusrah insurgents are also known for using the Israeli occupied Lebanese Sheba Farms area to infiltrate into Lebanon, and especially Lebanon’s Bekaa Valley.
Paul Merrell

Poland Considers Deployment of U.S. Tactical Nuclear Weapons, Directed against Russia |... - 0 views

  • Last weekend, Polish Deputy Defense Minister Tomasz Szatkowski said that Poland is considering asking for access to nuclear weapons through a NATO program allowing non-nuclear states “to borrow” the warheads from the US. This is a reverberation from the intensified debates within alliances regarding the nuclear support of NATO’s operations.
  • Commenting on the debates that took place during an Oct. 8 meeting in Brussels between the defense ministers of NATO countries, Adam Thomson, the UK Permanent Representative to NATO, publicly bemoaned the fact that the alliance “has done conventional exercising and nuclear exercising” but has not conducted exercises on “the transition from one to the other.” He claimed that such a recommendation is being looked at within the North Atlantic alliance. NATO Secretary General Jens Stoltenberg also supports strengthening the nuclear component in the military planning of this alliance that has identified Russia as its primary enemy. In their analyses, military-political and academic insiders in the West typically do not distinguish between the strategic and tactical nuclear weapons belonging to the three Western nuclear powers: the UK, US, and France. As they calculate how best to defend “the entire territory of NATO,” they begin with the assumption that all those nuclear weapons can be commanded en masse. And because those weapons must be used “as a means to deter aggression, along with conventional weapons,” their special status should once again be recognized, as it was during the height of the Cold War during the 1960s-1980s.
  • In his statement Tomasz Szatkowski emphasized the need for the Polish armed forces to have access to the same American nuclear weapons as those entrusted to five of the member states of the North Atlantic pact: Belgium, Italy, the Netherlands, Turkey and Germany, all of which consented to stationing those weapons within their borders: “We want to see an end to the division of NATO members into two categories,” he said, explaining that he was referring to states that have long hosted American nuclear weapons vs. countries that still do not have them, meaning the allies that have only recently joined this military bloc, especially Poland. The Polish Defense Ministry hastened to disavow their own colleague’s words, arguing that “within the defense ministry there is presently no work underway concerning the accession of our country to the NATO Nuclear Sharing program.” But the further clarification that followed this message suggests otherwise, since the Polish defense ministry literally stated the following: “We have to consider various options, including some form of Poland’s participation in this program.” And as we all know, that program allows US nuclear weapons to be deployed within the borders of other states and to be used in military exercises that include the dropping of mock “nuclear bombs” from aircraft. We must also look closely at how the first part of that answer is expressed: “there is presently no work underway …” Today. And perhaps that is true. But in the future?
Paul Merrell

Even as Clinton opposes sanctions over Israeli settlements, new poll shows her Democrat... - 0 views

  • Last weekend Hillary Clinton joined the Republican candidates in coming down hard against Boycott, Divestment and Sanctions against Israel. Speaking to her financial sponsor Haim Saban as well as a D.C. audience, she described the campaign as anti-semitic and wrong, and meantime offered vague opposition to Israeli settlements. Well there’s a good reason Clinton doesn’t want the issue politicized. If the matter were actually debated openly between Republicans and Democrats, her own base would be against her. A new poll of American attitudes on the conflict from Shibley Telhami at the Brookings Institution says that Democrats favor sanctions to counter Israeli settlement construction. Telhami reports: It is notable that among Democrats, more people (49%) recommend either imposing economic sanctions or taking more serious action [re settlements], than those recommending doing nothing or limiting U.S. opposition towards (46%)
  • The poll also shows broad support for a one-state outcome among Americans. The poll at Telhami’s academic site defines one state as “a single democratic state in which both Jews and Arabs are full and equal citizens, covering all of what is now Israel and the Palestinian Territories.” Those who advocate a one-state solution, 31%, are now comparable to those who advocate a two-state solution, 35%. The most notable change is that Republicans this year equally support a two-state solution vs. one-state solution (29% each). This shows that Democrats support a two-state-solution over one state by 45 to 33. Still: a third of Dem voters are for a single democratic state with equal citizenship. Dems don’t like the Israel lobby either. The poll shows that by more than a three-to-one ratio, Democrats feel that Israel has too much influence in American politics. And Americans generally also are turned off:
  • Overall, twice as many Americans say the Israeli government has too much influence (37%) than say too little influence (18%), while a plurality (44 %) say it’s the right level. The story once again is more pronounced in the partisan views: Among Democrats, about half (49%) say Israel has too much influence, compared with 14% who say Israel has too little influence, and 36 % who say it’s the right level. Netanyahu’s popularity has crashed among Dems, though he’s a heroic figure to Republicans. Notice that Democratic attitudes on blame for the recent “escalation in violence” actually track attitudes on our site. Democrats understand the Palestinian violence as a response to lack of freedom: A plurality of Democrats, 37%, blame continued Israeli occupation and settlement expansion, followed by 35% who blame the absence of serious peace diplomacy, while 15% blame Palestinian extremists. In contrast, 40% of Republicans blame Palestinian extremists first…
  • ...1 more annotation...
  • And again, Americans are for a secular democracy there. Where did we ever get that idea? Strong American majorities continue to favor Israel’s democracy over its Jewishness in the absence of a two-state solution (72% in 2015, compared with 71% in 2014). Hillary Clinton has very different attitudes. She calls Israel “a thriving raucous democracy” and a “light unto the nations,” and is fundamentally opposed to the idea of any pressure on Israel. She said: Some proponents of BDS may hope that pressuring Israel may lead to peace. Well that’s wrong too. No outside force is going to resolve the conflict between Israeli’s and Palestinian’s.
  •  
    "Negotiations" for a two-state solution has never been anything more than an excuse for prolonging an apartheid government across all of Palestine. The fact that public support is building in the U.S. for a single-state, secular government for all of Palestine including Israel has to be keeping Israel's right-wing leadership up at night. Israel is losing the BDS battle for U.S. hearts and minds. Hillary risks eroding her support by continuing to push for the increasingly unpopular two-state solution.
Paul Merrell

Report reveals 9 Israel lobby tactics to silence students | The Electronic Intifada - 0 views

  • Lawyers have responded to nearly 300 incidents of “censorship, punishment, or other burdening of advocacy for Palestinian rights” filed by Palestine solidarity activists on more than 65 US campuses in the last year and a half. Palestine Legal and the Center for Constitutional Rights (CCR) detail the assault in a new 124-page report, “The Palestine Exception to Free Speech: A Movement Under Attack in the US.” “As the movement for Palestinian rights is growing in the US, so too are concerted efforts to silence any and all criticism of Israel,” said Radhika Sainath, staff attorney with Palestine Legal and cooperating counsel with CCR. A video featuring students and members of faculty who have experienced silencing, repression and intimidation was also released by Palestine Legal and CCR and can be viewed above.
  • The report, which is the first of its kind, documents the suppression of Palestine advocacy in the US and identifies nine separate tactics Israel lobby groups use to crush Palestine solidarity activism — especially on campuses. The groups say that 85 percent of the hundreds of incidents to which Palestine Legal has responded since 2014 involving the targeting of students and scholars “include baseless legal complaints, administrative disciplinary actions, firings, harassment and false accusations of terrorism and anti-Semitism.” Such tactics have a chilling effect on speech, the report says. “These strategies … [result in] intimidating or deterring Palestinian solidarity activists from speaking out. The fear of punishment or career damage discourages many activists from engaging in activities that could be perceived as critical of Israel,” the report says. Sainath told The Electronic Intifada that “on the one hand, we’ve seen that peoples’ lives and reputations have been destroyed because of speaking out critically about Israel’s policies — one example is professor Steven Salaita, [whose story] is covered in the report.” Salaita was fired from the University of Illinois after he expressed his criticism of Israel’s attack on Gaza in the summer of 2014.
  • Meanwhile, lawyers and students say they are bracing for an array of dirty tactics being planned by Israel lobby groups. Earlier this year, Republican party mega-donor Sheldon Adelson, along with Haim Saban, billionaire supporter of the Democratic party, poured tens of millions of dollars into Israel lobby groups on campus with the explicit intent of suppressing Palestine rights-based organizing. “One of the things that we’re concerned about and preparing for is a wave of anti-boycott legislation,” Sainath said, “as well as increased efforts to stop students from introducing referendums or resolutions for Palestinian rights.”
  • ...2 more annotations...
  • Also today, Jewish Voice for Peace (JVP) released a 79-page report, “Stifling Dissent: How Israel’s Defenders Use False Charges of Anti-Semitism to Limit the Debate over Israel on Campus.” It lays out in detail the methods that Israel lobby groups use to stifle debate about Palestine. It also includes numerous case studies and accounts of employment discrimination against US professors who have been targeted for their political views on Israel. Tallie Ben-Daniel, academic advisory council coordinator for JVP, told The Electronic Intifada that the report grew out of concerns over “the climate of repression” around speech critical of Israel, especially following Salaita’s firing.
  • Ben-Daniel said that young Jews “are more critical of Israeli state policy than ever before, and are building coalitions through their Palestine solidarity work — and yet are silenced by the very organizations that are supposed to represent them on campus.” One section of JVP’s report “details how Jewish students are subjected to a political litmus test on Israel in order to participate in Jewish institutional life on campus.” Organizations such as Hillel, JVP points out, demand that their members abide by guidelines which prohibit co-sponsoring or supporting events of speakers who are critical of Israeli policies and who support the Palestinian-led boycott, divestment and sanctions (BDS) campaign. Ben-Daniel added that JVP’s report “only tallies the cases that gained national attention — there are innumerable more Jewish students who in all probability do not participate in institutional Jewish campus life because of this litmus test.” JVP says that the report is meant to educate and provide resources to students and faculty alike who may be facing repression or silencing on campus and in classrooms.
  •  
    A sign that BDS is beginning to make Israeli government truly worried about economic impacts, the Adelson/Saban big donations for anti-BDS work on U.S. college campuses. 
Paul Merrell

Enron Corpus - Wikipedia, the free encyclopedia - 0 views

  • The Enron Corpus is a large database of over 600,000 emails generated by 158 employees[1] of the Enron Corporation and acquired by the Federal Energy Regulatory Commission during its investigation after the company's collapse.[2]
  • The Enron data was originally collected at Enron Corporation headquarters in Houston during two weeks in May 2002 by Joe Bartling,[3] a litigation support and data analysis contractor working for Aspen Systems, now Lockheed Martin, whom the Federal Energy Regulatory Commission (FERC) had hired to preserve and collect the vast amounts of data in the wake of the Enron Bankruptcy in December 2001. In addition to the Enron employee emails, all of Enron's enterprise database systems,[4] hosted in Oracle databases on Sun Microsystems servers, were also captured and preserved including its online energy trading platform, EnronOnline. Once collected, the Enron emails were processed and hosted in litigation platform Concordance, and then iCONECT, for the investigative team from the Federal Energy Regulatory Commission, the Commodity Futures Trading Commission, and Department of Justice investigators to review. At the conclusion of the investigation, and upon the issuance of the FERC staff report,[5] the emails and information collected were deemed to be in the public domain, to be used for historical research and academic purposes. The email archive was made publicly available and searchable via the web using iCONECT 24/7, but the sheer volume of email of over 160GB made it impractical to use. Copies of the collected emails and databases were made available on hard drives.
  • A copy of the email database was subsequently purchased for $10,000 by Andrew McCallum, a computer scientist at the University of Massachusetts Amherst.[6] He released this copy to researchers, providing a trove of data that has been used for studies on social networking and computer analysis of language.
  • ...1 more annotation...
  • The corpus is unique in that it is one of the only publicly available mass collections of real emails easily available for study, as such collections are typically bound by numerous privacy and legal restrictions which render them prohibitively difficult to access.[6] In 2010, EDRM.net published a revised version 2 of the corpus.[7] This expanded corpus, containing over 1.7 million messages, is now available on Amazon S3 for easy access to the research community. Jitesh Shetty and Jafar Adibi from the University of Southern California processed this corpus in 2004 and released a MySQL version[8] of it and also published some link analysis results based on this.[9]
« First ‹ Previous 61 - 72 of 72
Showing 20 items per page