Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged acknowledgment

Rss Feed Group items tagged

Paul Merrell

Ukrainian military acknowledges it may have shot down flight MH17 - Fort Russ - 0 views

  • An anonymous source in one of Ukraine's security agencies said that the Malaysian Boeing was shot down as a result of an unauthorized Ukrainian Buk-M1 launch. RIA Novosti reports citing a source in a Ukrainian security agency that the MH17 catastrophe may have been the result of an unanticipated situation during the training of one of Ukraine's air defense units. The anonymous source states the following: "On July 17 2014, the commander of the 156th Anti-Aircraft Missile Regiment was instructed to conduct missile crew training on providing coverage for Ukrainian ground forces in the suburbs of Donetsk, which entailed deploying the battalions, training target acquisition and tracking procedures, and carry out a simulated destruction of an aerial target using Buk-M1 missiles." He said that battery commanders were issued launch keys, however, there were no plans to launch an actual 9M38M1 missile. The training exercise involved two Su-25 aircraft, their task was to conduct aerial reconnaissance and designated training targets in the vicinity of Ukrainian troop concentration to the West of Donetsk.
  • The source: "After one of the aircraft entered Buk detection zone, it began to be tracked by a missile crew located near Zaroshchenskoye. In all likelihood, due to a tragic coincidence the flight paths of the Malaysian Boeing and the Su-25 coincided and, in spite of the altitude difference, were indicated on the Buk radar as a single target which proved fatal for the Boeing. If two targets are located on the same azimuth from the launch vehicle, the tracking system automatically shifts to the one which represents the largest radar target."SBU is trying to establish why the unauthorized launch took place. The source does not possess information about the course of that investigation. We should note that the scenario described above is consistent with the results of the recent investigation conducted by Almaz-Antey. According to Russian experts, the Boeing was shot down by a 9M38M1 missile launched by a Buk-M1 system located near the village of Zaroshchenskoye which was under Ukrainian control.
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Gary Edwards

The 6 Grand Illusions That Keep Us Enslaved to the Matrix - 0 views

  • Bansky, the revered and elusive revolutionary street artist, once commented: “People are taking the piss out of you everyday. They butt into your life, take a cheap shot at you and then disappear. They leer at you from tall buildings and make you feel small. They make flippant comments from buses that imply you’re not sexy enough and that all the fun is happening somewhere else. They are on TV making your girlfriend feel inadequate. They have access to the most sophisticated technology the world has ever seen and they bully you with it. They are The Advertisers and they are laughing at you.” – Banksy  Advertising is just the tip of the iceberg. When we look further we see that the overall organization of life is centered around the pursuit of illusions and automatic obedience to institutions and ideas which are not at all what they seem. We are in a very real sense enslaved. Many call this somewhat intangible feeling of oppression ‘the matrix,’ a system of total control that invades the mind, programming individuals to pattern themselves in accordance with a mainstream conformist version of reality, no matter how wicked it gets. The grandest of the illusions which keep us enslaved to the matrix, the ones that have so many of us still entranced, are outlined below for your consideration.
  • 1. The Illusion of Law, Order and Authority For so many of us, following the law is considered a moral obligation, and many of us gladly do so even though corruption, scandal, and wickedness repeatedly demonstrate that the law is plenty flexible for those who have the muscle to bend it. Police brutality and police criminality is rampant in the US, the courts favor the wealthy, and we can longer even lead our lives privately thanks to the intrusion of state surveillance. And all the while the illegal and immoral Orwellian permanent war rages on in the background of life, murdering and destroying whole nations and cultures. The social order is not what it seems, for it is entirely predicated on conformity, obedience and acquiescence which are enforced by fear of violence. History teaches us again and again that the law is just as often as not used as an instrument of oppression, social control and plunder, and any so-called authority in this regard is false, hypocritical, and unjust. When the law itself does not follow the law, there is no law, there is no order, and there is no justice. The pomp and trappings of authority are merely a concealment of the truth that the current world order is predicated on control, not consent.
  • 2. The Illusion of Prosperity and Happiness Adorning oneself in expensive clothes and trinkets, and amassing collections of material possessions that would be the envy of any 19th century monarch has become a substitute for genuine prosperity. Maintaining the illusion of prosperity, though, is critical to our economy as it is, because its foundation is built on consumption, fraud, credit and debt. The banking system itself has been engineered from the top down to create unlimited wealth for some while taxing the eternity out of the rest of us. True prosperity is a vibrant environment and an abundance of health, happiness, love, and relationships. As more people come to perceive material goods as the form of self-identification in this culture, we slip farther and farther away from the experience of true prosperity.
  • ...5 more annotations...
  • 3. The Illusion of Choice and Freedom Read between the lines and look at the fine print, we are not free, not by any intelligent standard. Freedom is about having choice, yet in today’s world, choice has come to mean a selection between available options, always from within the confines of a corrupt legal and taxation system and within the boundaries of culturally accepted and enforced norms. Just look no further than the phony institution of modern democracy to find a shining example of false choices appearing real. Two entrenched, corrupt, archaic political parties are paraded as the pride and hope of the nation, yet third party and independent voices are intentionally blocked, ridiculed and plowed under. The illusion of choice and freedom is a powerful oppressor because it fools us into accepting chains and short leashes as though they were the hallmarks of liberty. Multiple choice is different than freedom, it is easy servitude.
  • 4. The Illusion of Truth Truth has become a touchy subject in our culture, and we’ve been programmed to believe that ‘the‘ truth comes from the demigods of media, celebrity, and government. If the TV declares something to be true, then we are heretics to believe otherwise. In order to maintain order, the powers that be depend our acquiescence to their version of the truth. While independent thinkers and journalists continually blow holes in the official versions of reality, the illusion of truth is so very powerful that it takes a serious personal upheaval to shun the cognitive dissonance needed to function in a society that openly chases false realities.
  • 5. The Illusion of Time They say that time is money, but this is a lie. Time is your life. Your life is an ever-evolving manifestation of the now. Looking beyond the five sense world, where we have been trained to move in accordance with the clock and the calendar, we find that the spirit is eternal, and that the each individual soul is part of this eternity. The big deception here is the reinforcement of the idea that the present moment is of little to no value, that the past is something we cannot undo or ever forget, and that the future is intrinsically more important than both the past and the present. This carries our attention away from what is actually happening right now and directs it toward the future. Once completely focused on what is to come rather than what is, we are easy prey to advertisers and fear-pimps who muddy our vision of the future with every possible worry and concern imaginable. We are happiest when life doesn’t box us in, when spontaneity and randomness gives us the chance to find out more about ourselves. Forfeiting the present moment in order to fantasize about the future is a trap. The immense, timeless moments of spiritual joy that are found in quiet meditation are proof that time is a construct of the mind of humankind, and not necessarily mandatory for the human experience. If time is money, then life can be measured in dollars. When dollars are worth less, so is life. This is total deception, because life is, in truth, absolutely priceless.
  • 6. The Illusion of Separateness On a strategic level, the tactic of divide and conquer is standard operating procedure for authoritarians and invading armies, but the illusion of separateness runs even deeper than this. We are programmed to believe that as individuals we are in competition with everyone and everything around us, including our neighbors and even mother nature. Us vs. them to the extreme. This flatly denies the truth that life on this planet is infinitely inter-connected. Without clean air, clean water, healthy soil, and a vibrant global sense of community we cannot survive here. While the illusion of separateness comforts us by gratifying the ego and and offering a sense of control, in reality it only serves to enslave and isolate us.
  • Conclusion The grand illusions mentioned here have been staged before us as a campaign to encourage blind acquiescence to the machinations of the matrix. In an attempt to dis-empower us, they demand our conformity and obedience, but we must not forget that all of this is merely an elaborate sales pitch. They can’t sell what we don’t care to buy.
  •  
    "SOURCE: SIGMUND FRAUD, WAKING TIMES "In prison, illusions can offer comfort." - Nelson Mandela For a magician to fool his audience his deceit must go unseen, and to this end he crafts an illusion to avert attention from reality. While the audience is entranced, the deceptive act is committed, and for the fool, reality then becomes inexplicably built upon on a lie. That is, until the fool wakes up and recognizes the truth in the fact that he has been duped. Maintaining the suspension of disbelief in the illusion, however, is often more comforting than acknowledging the magician's secrets. We live in a world of illusion. So many of the concerns that occupy the mind and the tasks that fill the calendar arise from planted impulses to become someone or something that we are not. This is no accident. As we are indoctrinated into this authoritarian-corporate-consumer culture that now dominates the human race, we are trained that certain aspects of our society are untouchable truths, and that particular ways of being and behaving are preferred.  Psychopaths disempower people in this way. They blind us with never ceasing barrages of suggestions and absolutes that are aimed at shattering self-confidence and confidence in the future.  "
Paul Merrell

Ukraine's President Poroshenko Says Overthrow of Yanukovych Was a Coup | Global Researc... - 0 views

  • Ukraine’s President Petro Poroshenko requests the supreme court of Ukraine to declare that his predecessor, Viktor Yanukovych, was overthrown by an illegal operation; in other words, that the post-Yanukovych government, including Poroshenko’s own Presidency, came into power from a coup, not from something democratic, not from any authentic constitutional process at all. In a remarkable document, which is not posted at the English version of the website of the Constitutional Court of Ukraine, but which is widely reported outside the United States, including Russia, Poroshenko, in Ukrainian (not in English), has petitioned the Constitutional Court of Ukraine (as it is being widely quoted in English): “I ask the court to acknowledge that the law ‘on the removal of the presidential title from Viktor Yanukovych’ as unconstitutional.”
  • If the Court grants Poroshenko’s petition, then the appointment of Arseniy Yatsenyuk by the U.S. State Department’s Victoria Nuland on 4 February 2014, which was confirmed by the Ukrainian parliament (or Rada) at the end of the coup on February 26th, and the other appointments which were made, including that of Oleksandr Turchynov to fill in for Yanukovych as caretaker President until one of the junta’s chosen candidates would be ‘elected’ on May 25th of 2014, which ‘election’ Poroshenko won — all of this was illegal. However, this illegality had already been known. It was already explained in detail on 28 February 2014, that, “Yanukovych’s removal was unconstitutional.” That’s for lawyers; but, now, finally, Ukraine’s Constitutional Court is faced with the shocking predicament of Ukraine’s own President, who won his post as a result of this coup, requesting them to “acknowledge” that it was a coup, much as the founder of the “private CIA” firm Stratfor had even called it, “the most blatant coup in history.” (It was that because the authentic video and other evidence of its having been a Washington job was so massive.) Also in the news now is that Dmitriy Yarosh‘s Right Sector — the same group that Washington had hired for the coup and for the ethnic cleansing campaign in Ukraine’s former Donbass region — have announced that they will assemble in Kiev on July 3rd to overthrow Petroshenko unless he restarts right now the war against Donbass. The people whom Washington paid to oust Yanukovych are planning to do the same to Poroshenko. There is a struggle inside the Obama Administration about how far they can successfully go with their Ukrainian nazis not formally leading the country.
Gary Edwards

A Hidden History of Evil by Claire Berlinski, City Journal Spring 2010 - 0 views

  •  
    The originals of most of Stroilov's documents remain in the Kremlin archives, where, like most of the Soviet Union's top-secret documents from the post-Stalin era, they remain classified. They include, Stroilov says, transcripts of nearly every conversation between Gorbachev and his foreign counterparts-hundreds of them, a near-complete diplomatic record of the era, available nowhere else. There are notes from the Politburo taken by Georgy Shakhnazarov, an aide of Gorbachev's, and by Politburo member Vadim Medvedev. There is the diary of Anatoly Chernyaev-Gorbachev's principal aide and deputy chief of the body formerly known as the Comintern-which dates from 1972 to the collapse of the regime. There are reports, dating from the 1960s, by Vadim Zagladin, deputy chief of the Central Committee's International Department until 1987 and then Gorbachev's advisor until 1991. Zagladin was both envoy and spy, charged with gathering secrets, spreading disinformation, and advancing Soviet influence. When Gorbachev and his aides were ousted from the Kremlin, they took unauthorized copies of these documents with them. The documents were scanned and stored in the archives of the Gorbachev Foundation, one of the first independent think tanks in modern Russia, where a handful of friendly and vetted researchers were given limited access to them. Then, in 1999, the foundation opened a small part of the archive to independent researchers, including Stroilov. The key parts of the collection remained restricted; documents could be copied only with the written permission of the author, and Gorbachev refused to authorize any copies whatsoever. But there was a flaw in the foundation's security, Stroilov explained to me. When things went wrong with the computers, as often they did, he was able to watch the network administrator typing the password that gave access to the foundation's network. Slowly and secretly, Stroilov copied the archive and sent it to secure locat
Paul Merrell

Is Obama Moving the 'War on Terror' to Africa? | The Nation - 0 views

  • Despite talk of a pivot to Asia, the US military’s gaze has settled on Africa. That isn’t news for anyone who has followed the expansion of US Africa Command (AFRICOM) on the continent. But it’s a decisive shift that until now US officials have been loath to acknowledge. The veil lifted slightly on Wednesday when President Obama asked Congress for $5 billion to train and equip foreign governments for counterterrorism activities. Most of the countries he cited are in northern Africa, including Somalia, Libya and Mali. US Special Operations are reportedly already training new counterterrorism units in Libya and Mali, as well as Niger and Mauritania. “Today’s principal threat no longer comes from a centralized Al Qaeda leadership. Instead, it comes from decentralized Al Qaeda affiliates and extremists, many with agendas focused in the countries where they operate,” Obama said. “We need a strategy that matches this diffuse threat; one that expands our reach without sending forces that stretch our military thin, or stir up local resentments.”
  • The Counter-Terrorism Partnerships Fund, as the administration dubbed the program, would apparently add more money and a new name to an existing slate of security cooperation programs. Over the last few years the United States has spent millions training proxy forces to combat local insurgents in Africa; one example is a $500 million operation called the Trans-Saharan Counterterrorism Initiative that provides training and equipment to ten African partners. According to the journalist Nick Turse, who has covered AFRICOM extensively for TomDispatch, the number of operations, programs and missions conducted by the US military in Africa has increased by more than 200 percent since the command was established in 2008. In 2012 alone the United States planned fourteen major training operations across the continent, including in Mali, Morocco, Uganda, Botswana, Lesotho, Senegal and Nigeria. “AFRICOM talks about this like it’s small-scale and low-key to the public, but when you listen to what they’re saying in private it’s really startling,” Turse told me. He’s heard officers refer to Africa as “the battlefield of tomorrow, today.” One AFRICOM official acknowledged to a room full of private contractors that the command had “shifted from our original intent of being a more congenial combatant command to an actual war-fighting combatant command.”
  • Counterterrorism cooperation sounds innocuous enough, particularly when presented rhetorically as an alternative to ground wars. However light-footed, the strategy Obama made explicit on Wednesday nevertheless endorses expanded US military activity on the continent. Unfortunately, the president was not so much signaling the end of the era of military adventurism as directing it towards a new arena in fresh packaging. And as with more conventional military endeavors, deeper involvement in Africa carries risks of blowback, particularly by drawing large militant networks into local conflicts.
Paul Merrell

Testimony of the National Intelligence Director - NYTimes.com - 0 views

  • “Edward Snowden, Whistle-Blower” (editorial, Jan. 2) repeats the allegation that James R. Clapper Jr., the director of national intelligence, “lied” to Congress about the collection of bulk telephony metadata. As a witness to the relevant events and a participant in them, I know that allegation is not true.
  • ROBERT S. LITT General Counsel, Office of the Director of National Intelligence Washington, Jan. 3, 2014
  •  
    The NSA's General Counsel attempts to paint James Clapper's lie to Congress as not a lie while acknowledging that his answer was false. Don't look for logic here. Whatever happened to Clapper's later admission that his answer was "the least untruthful answer" he could give in a public session.  Clapper needs to be prosecuted for perjury in his Congressional testimony.   
Gary Edwards

The Purchase Of Our Republic | Zero Hedge - 0 views

  • The massive consolidation of wealth, combined with the removal of any limits on money in campaigns, has allowed for the purchase of our government. Today I am publishing a comprehensive and important guest essay, The Purchase of Our Republic, by longtime correspondent Y. Falkson.
  • Americans know that something is wrong, deeply wrong. They see signs of the problem everywhere: income inequality, growing concentration and power of mega corporations, political donations/corruption, the absence of jobs with decent salaries, the explosion of the US prison population, healthcare costs, student loan debt, homelessness, etc. etc.  However, the true causes and benefactors behind these problems are purposely hidden from view. What Americans see is Kabuki Theater of a functioning form of capitalism and democracy, but beyond this veneer our country has devolved into the exact opposite. Those who benefit from this crony capitalist state go to extreme lengths to paper over the reality and convince Americans that the system works, the American Dream is still a reality and that American democracy is in fact democratic. Below I hope to begin to outline some of the underlying dynamics and trends that have evolved in recent decades and led us so far from what we once were. As fun as it would be, the answer is not some evil conspiracy by the Illuminati, but rather the unfortunate result of three long term and mutually reinforcing components that have been attacking the fundamental roots of the structure of our Republic. The first is the increased concentr
  • ation of corporate and private wealth. Both of which are quickly yelled down in the media as anti-free market and class war hysteria. The second is the use of this wealth to capture all three branches of government in order to ensure the continued extraction of capital from the many and to the few.The rich might have climbed the ladder because they earned it, but they have then purchased government to pull up the ladder behind them. The consequence of the first two components is a democracy in name only that represents the very few.
  • ...28 more annotations...
  • 1. Faux Capitalism = Wealth Consolidation / Income Inequality
  • While there is no true beginning to the story, we can start with the incredible build up and concentration of wealth among corporations in recent decades. The USA now boasts a cartel-like set of corporate titans in almost every industry. It goes beyond, but certainly includes, our Too Biggerer To Fail banks, merged from what was 37 banks in 1995 into a Frankenstein’s monster like 5 (Citigroup, JP Morgan-Chase, Bank of America, Wells Fargo and Goldman Sachs). In agriculture, Monsanto alone controls over 85% of all corn and soy bean crops, four companies control 83% of the beef market, 66% of the hog market and 58% of the chicken market. So while shopping at the grocery store might appear to be the manifestation of capitalism at its finest, it doesn’t take much digging to look behind the curtain to see how little competition truly exists.
  • When the average American goes to pick up some groceries, they are shopping at Walmart and buying something from P&G that is mostly made of Monsanto corn. Is that true choice? The same story plays out with our news and media (and other industries) where we have gone from 50 companies in 1983 to the big 6 which control over 90% of all media. Is choosing to watch one of 30 news channels, all of which are owned by News Corp (Rupert Murdoch) a real choice? This is not capitalism and they are not competing, not in the true sense of the word. Along with this consolidation of corporations in recent decades, their senior leaders have taken up a larger and larger piece of the pie at the expense of their employees. In particular, the ratio of CEO-to-worker pay has increased 1,000 percent since 1950. Unsurprisingly, Walmart is both the largest employer in the country and the worst CEO pay offender with a ratio of over 1000:1. This is at a time where worker productivity has increased significantly, something that historically correlated with increased pay. But no more. It’s a new twist on the old Soviet saying “we pretend to work and they pretend to pay us”, but now it’s closer to “we do all of the work and they pretend to pay us”.
  • Private Wealth: As a consequence of the royal tribute we pay to the C-suite class these days, we have likely surpassed the pre-Depression Roaring Twenties in terms of inequality.
  • This, amazingly, has only accelerated since the crisis in 2008 in thanks to bailouts, Quantitative Easing and other gifts from Congress and the Fed. The wealthy 1% and in particular the .01% have now grown their fortunes to levels that tax comprehension and even their ability to spend it (the decisions by a few billionaires such as Bill Gates to essentially donate his fortune is a tacit acknowledgement that our current system over provides wealth to a select few).
  • So what is an incredibly wealthy capitalist CEO of a mega-corporation do once they control their industry and have essentially limitless wealth? Well in a competitive market, the only way to go from the top is down and the only thing that can make that happen is competition. Consequently, competition must be avoided whenever possible.
  • To squash or prevent competition, the oligopolies and oligarchs target their resources on the one place that can make competition illegal, our government.Something to keep in mind the next time you see a corporate billionaire grandstanding about the importance of “Free Markets” when their strategy is quite the opposite. As this capture of the government has taken place we have essentially shifted from capitalism and to crony capitalism. So we now have industries that have mastered the art of faking capitalism by turning our government into one that fakes democracy. This government takeover took time, but the purchase of all 3 branches of government has almost been completed by 2014. You don’t have to take my word for it, luckily that has now been empirically proven in an analysis of over 20 years of government policy where the clear conclusion was that policy makers respond solely to those in the top 90th percentile and essentially ignore the large majority of Americans.
  • 2. Wealthy Purchase of Government Institutions / Elections
  • Purchase of the Executive Branch:
  • Let’s take a step back and take a glimpse at how the government was purchased, beginning with the executive branch. In 1980, Reagan’s election cost less than $300 million. When Bush beat Kerry in 2004, it cost almost 3x times as much, almost $900 Million. 4 years later, the 2008 election cost a record $1.3 Billion. It was in this election where Obama hammered the final nail in the coffin for government funded for elections. Obama, more so than any other candidate in recent decades had the widespread support of millions of small donors, but in the end I guess it wasn’t enough. So when Obama “leaned to the green”, it forever set the precedent that you can’t win without the backing of our nation’s oligarchs. Consequently, the money has only gushed in since as the cost of Obama’s reelection in 2012 skyrocketed to an unfathomable $7 billion. Needless to say this is slightly above the rate of inflation. Our Presidents are now preselected exclusively by a tiny fraction of Americans can have the money to fund what has become necessary for a legitimate run. Summary: Candidates spend years courting the super-rich to build up a multi-billion dollar war chest. Only those who succeed can actually run a campaign that an average American will be aware of. Then Americans get to choose one of the pre-selected “candidates”. No wonder voter turnout is so low… Executive branch, check!
  • – Note that media corporations benefit doubly as they can use their cash to fund elections, but are also the beneficiary of all that money as it is used for campaign spending.
  • Purchase of the Legislative Branch:
  • The process has progressed similarly in Congress. In 1978, outside groups spent $303,000 on congressional races. In 2012 that was up to $457,000,000. That is over 1,500 times the level in 1978. It would be funny, if it was so blatant and terrifying. By many accounts, our “leaders” in Congress spend 50% or more of their time working the phones or fundraisers rather than trying (and failing) to actually do the “people’s business”. Let’s also take a minute to appreciate the hypocrisy of anyone that pretends that the money doesn’t influence our government. Businesses do not give to politicians for charity. This is a payment for services that has proven exceedingly reliable and profitable. The ROI for money invested in purchasing Congressman is what CEO dreams are made of. No wonder the incentive is to invest in Congress rather than R&D or marketing. There are very few places in the world or times in history where you can find ROI’s in the thousands, or even the tens of thousands.
  • Review: Congressmen beg for money to get elected, make sure to vote the way your benefactors would like, consequently get more money to get elected again. If at any point they do lose or quit, they take the big payday to work for those who have been paying them all along. Legislative Branch, Check!
  • In addition, increasingly those who work on Congress (and regulators) were previously employed by these large corporations or expect to work there later. A recent example is Chris Dodd who left the Senate the head lobbyist for Hollywood at the MPAA, the guys behind SOPA and PIPA, but there are many many others.
  • Judicial Branch Endorsement of the Purchase of Government:
  • Last but not least, we have the enabling Judicial Branch. It only took a few purchased presidents to ensure the appointment of a majority of “free market” and “pro-business” judges. For instance, and disgracefully, Clarence Thomas was once legal counsel for Monsanto, but has not once recused himself from any cases involving Monsanto and always votes in their favor. These radicals have now fully endorsed and enabled the influx of money used to purchase the other branches. Specifically, 2 major decisions have completely opened the floodgates, Citizens United and McCutcheon. The first allowed unlimited contributions of corporate money into elections and brought us the notorious declaration that “corporations are people” and that “money is free speech”. This was more recently followed up with the private wealth equivalent in McCutcheon. In this ruling, Supreme Court Chief Justice John Roberts said as part of his majority opinion (presumably with a straight face) “… nor does the possibility that an individual who spends large sums may garner influence over or access to elected officials or political parties”. And with this, the Supreme Court has fully endorsed both major sources of immense wealth to purchase our elections and consequently our government. Review: The rich fund Presidential elections, Presidents nominate “business-friendly” judges and then the bought Congress approves their nominations. New judge then votes to ensure even more money is allowed to purchase elections. Judicial Branch, CHECK!
  • 3. A Faux Republic Dependent Upon the Funders and Not the Voters
  • The Founder’s Hope and the Sad Reality:
  • Acknowledging where we are as a country, it is often helpful to look to where we started for some perspective. Unsurprisingly, this type of problem was not overlooked back in the 18th century. In 1776, James Madison stated that his goal was to design a republic in which “powerful interest groups would be rendered incapable of subdoing the general will”. Madison hoped, perhaps naively, that factions would be thwarted by competing with other factions. Sadly, we are now in a time where factions (aka wealthy special interests) subdue the will of the people and ensure the government responds to them alone on those issues where they have a “special interest” and consequently asymmetric stakes in the game (Charles Hugh Smith). As a result, these groups essentially collude to allocate their resources to their own issues, but do not “thwart” or compete with other factions as they do the same. It’s a pretty great system, as long as you’re one of the wealthy few who can use their money to drown out the poor and voiceless many. And just like that, what was once a Republic has become a corrupt shell of its past self. All the signs are still there; votes, elections, campaigns, branches of government, etc., but behind the scenes the only ones represented are those who can afford to be heard.
  • Summary: This massive consolidation of wealth, combined with the removal of any limits on money in campaigns, has allowed for the purchase of our government, or as Dick Durban once stated, “frankly they [the banks in this case] own the place”. If money = free speech, then those with all the money, have all the free speech.
  • What Might Help? Now that I have likely and thoroughly depressed the reader, let’s bounce around some ideas for what can be done. As stated in the beginning, this is not an unknown problem and many people are promoting a number of ways to fix or at least ameliorate the problem. I will briefly describe just a few which I think provide some direction any of us could easily implement or support.
  • Change the Rules: Laurence Lessig of Harvard Law has put forward a visionary proposal for re-writing the way that campaigns are financed in his book, Republic, Lost: How Money Corrupts Congress--and a Plan to Stop It. Put simply, he would like to empower every voter with a stipend, say $150 per election to give to whatever candidate or candidates they prefer. If you would like to accept this money, you would need to forgo any other contributions or support (one would hope including the indirect PAC kind). This would actually provide even more money than is used in current elections, but would effectively democratize the funding process. While there would still be a “funding election” that takes place before the actual election, the funding would not be unequally provided. Lessig’s work has only begun, as this sort of bill or likely constitutional reform is nearly impossible to achieve, but he has undertaken and I assume will continue to implement many brave and creative ways of bringing about the change all American’s should support. Most recently he has suggested we begin to fund, ironically enough, a Super PAC to end all Super PACs. It would be funded with the solitary goal of changing how money impacts our elections. Please support them here: www.mayone.us/
  • Change Our Day-to-Day: At the more micro level, Charles Hugh Smith believes that we will inevitably see our overly centralized and inefficient system erode away as it is replaced by more resilient, local and efficient businesses and societies outside of the current system. With that in mind, he recommends that “all anyone can do is the basic things--lower our energy footprint, stay healthy and avoid unnecessary medications and procedures, support local businesses, organic food growers, etc. In other words, what we can do is support local businesses that are part of the emerging economy rather than support corporate cartels.” Your Vote Does Matter: Do you live in Ohio, Florida or New Hampshire? Probably not. Despite what we are told every 4 years, there are actually states outside of the “swing states”, and even more surprising, the very large majority of Americans live in those states where your “vote doesn’t matter”. New Yorkers an Californians all know their state will turn Blue no matter who the candidates are and either don’t vote at all, or often vote for the Blue team in order to feel like they are on the winning side.
  • The truth is that if you see the election as Red vs. Blue, you vote probably doesn’t matter. But here is the trick, if all the people who think their vote didn’t matter decided to vote for whom they might actually believe in, then their votes just might matter.
  • What if all the growing number of “Independents” (who usually still vote Blue), chose to vote for a third party? What if a third party candidate won a state like New York or California? What if that candidate was one whose primary promise to the voters was to champion a change to the role of money in government (perhaps in line with what Lessig proposes)? Would you vote for such a person?I would argue you should. If California alone (with 55 electoral votes) were to vote for a 3rd party that would likely prevent either Red or Blue candidate from winning the requisite 270 electoral votes.
  • Think about the message that would send to both parties. I would predict that both sides would start to bend over backwards for an endorsement from that 3rd party and they would have to get it by taking up the same primary cause for reforming money in government. Consequently, at the root of our corrupted system which is perpetually ignored as both sides might suddenly become the big issue of the election. Then maybe we might begin to turn things around.
  • Sources: Charles Hugh Smith (oftwominds, Surivival+, etc.), Yves Smith (Naked Capitalism, Econned), Laurence Lessig (Republic Lost, multiple TED Talks), Matt Taibbi (blog at Rolling Stone and now at The Intercept), Zero Hedge, John Robb, Max Keiser, Clay Shirky (Cognitive Surplus), Aldous Huxley (Brave New World, Brave New World Revisited), George Orwell (1984), Michael Lewis, Daniel Kahneman (Thinking Fast and Slow), James Richards (Currency Wars), Han Joon Chang (23 Things They Don’t Tell You About Capitalism) and Joseph Stiglitz (Mismeasuring Our Lives) 
Paul Merrell

The Torture Report and the "Glomar Fig Leaf" | Just Security - 0 views

  • Buried in the SSCI’s report is an arresting passage that suggests that the CIA was quietly releasing information about the torture program to journalists while it was contending in court that release of such information to the public would compromise national security. After the April 15, 2005 National Security Principals Committee meeting, the CIA drafted an extensive document describing the CIA’s Detention and Interrogation Program for an anticipated media campaign.  CIA attorneys, discussing aspects of the campaign involving off-the-record disclosures, cautioned against attributing the information to the CIA itself.  One senior attorney stated that the proposed press briefing was “minimally acceptable, but only if not attributed to a CIA official.”  The CIA attorney continued: “This should be attributed to an ‘official knowledgeable’ about the program (or some similar obfuscation), but should not be attributed to a CIA or intelligence official.”
  • Referring to CIA efforts to deny Freedom of Information Act (FOIA) requests for previously acknowledged information, the attorney noted that, “[o]ur Glomar fig leaf is getting pretty thin.”  Another CIA attorney noted that the draft “makes the [legal] declaration I just wrote about the secrecy of the interrogation program a work of fiction.” The reference to the “Glomar fig leaf” related to an argument the CIA was making in ACLU litigation that was pending before Judge Alvin K.  Hellerstein in the Southern District of New York.  In connection with Freedom of Information Act requests we’d filed in October 2003 and June 2004, we were seeking, among other things, three documents we’d learned of from media reports: the Memorandum of Notification (MON) in which President Bush had authorized the CIA to establish black sites overseas, and two memos in which lawyers from the Office of Legal Counsel had concluded that CIA interrogators could lawfully torture prisoners in their custody.  The CIA responded with a “Glomar” response—it argued that the existence or non-existence of the three documents was a properly classified fact. 
  • As the SSCI report makes clear, CIA lawyers didn’t really believe what the agency was saying in its sworn declarations.  They understood that the sworn declarations the agency was filing in federal court were “work[s] of fiction.”  The agency was telling the courts that nothing could be disclosed about its torture program without compromising national security, but at the same time, it was providing quotations and “facts” to the media in order to persuade the public that its activities were lawful, necessary and effective. If all of this sounds familiar, it’s because the CIA is now doing precisely the same thing with respect to the targeted-killing program. To the courts, the CIA says that any disclosure about the program will gravely compromise national security.  To the media, it supplies a continuous stream of cherry-picked facts meant to cast the program in the most favorable light.
  • ...1 more annotation...
  • The SSCI report makes clear that some CIA lawyers were uncomfortable with the chasm between the agency’s representations to the court in the torture FOIA litigation and the agency’s actual conduct.  According to the SSCI, some CIA lawyers “urged that CIA leadership … ‘confront the inconsistency’ between CIA court declarations ‘about how critical it is to keep this information secret’ and the CIA ‘planning to reveal darn near the entire” program.’” Presumably those lawyers were worried about the possibility that a court would sanction the agency’s declarants; perhaps they were also worried about compliance with their own professional obligations. One wonders whether the CIA’s lawyers are worried about the same things today.
Paul Merrell

The U.S. Government's Secret Plans to Spy for American Corporations - The Intercept - 0 views

  • Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. So critical is this denial to the U.S. government that last August, an NSA spokesperson emailed The Washington Post to say (emphasis in original): “The department does ***not*** engage in economic espionage in any domain, including cyber.” After that categorical statement to the Post, the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations.
  • In a graphic describing an “illustrative example,” the report heralds “technology acquisition by all means.” Some of the planning relates to foreign superiority in surveillance technology, but other parts are explicitly concerned with using cyber-espionage to bolster the competitive advantage of U.S. corporations. The report thus envisions a scenario in which companies from India and Russia work together to develop technological innovation, and the U.S. intelligence community then “conducts cyber operations” against “research facilities” in those countries, acquires their proprietary data, and then “assesses whether and how its findings would be useful to U.S. industry” (click on image to enlarge):
  • One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” Such a development, the report says “could put the United States at a growing—and potentially permanent—disadvantage in crucial areas such as energy, nanotechnology, medicine, and information technology.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence” (emphasis added). In particular, the DNI’s report envisions “cyber operations” to penetrate “covert centers of innovation” such as R&D facilities.
  • ...3 more annotations...
  • Director of National Intelligence James Clapper, for instance, responded to the Petrobras revelations by claiming: “It is not a secret that the Intelligence Community collects information about economic and financial matters…. What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of—or give intelligence we collect to—U.S. companies to enhance their international competitiveness or increase their bottom line.” But a secret 2009 report issued by Clapper’s own office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies as they identify future threats to the U.S. and lay out the actions the U.S. intelligence community should take in response. It anticipates a series of potential scenarios the U.S. may face in 2025, from a “China/Russia/India/Iran centered bloc [that] challenges U.S. supremacy” to a world in which “identity-based groups supplant nation-states,” and games out how the U.S. intelligence community should operate in those alternative futures—the idea being to assess “the most challenging issues [the U.S.] could face beyond the standard planning cycle.”
  • he report describes itself as “an essential long-term piece, looking out between 10 and 20 years” designed to enable ”the IC [to] best posture itself to meet the range of challenges it may face.” Whatever else is true, one thing is unmistakable: the report blithely acknowledges that stealing secrets to help American corporations secure competitive advantage is an acceptable future role for U.S. intelligence agencies. In May, the U.S. Justice Department indicted five Chinese government employees on charges that they spied on U.S. companies. At the time, Attorney General Eric Holder said the spying took place “for no reason other than to advantage state-owned companies and other interests in China,” and “this is a tactic that the U.S. government categorically denounces.” But the following day, The New York Times detailed numerous episodes of American economic spying that seemed quite similar. Harvard Law School professor and former Bush Justice Department official Jack Goldsmith wrote that the accusations in the indictment sound “a lot like the kind of cyber-snooping on firms that the United States does.” But U.S. officials continued to insist that using surveillance capabilities to bestow economic advantage for the benefit of a country’s corporations is wrong, immoral, and illegal.
  • Yet this 2009 report advocates doing exactly that in the event that ”that the technological capacity of foreign multinational corporations outstrip[s] that of U.S. corporations.” Using covert cyber operations to pilfer “proprietary information” and then determining how it ”would be useful to U.S. industry” is precisely what the U.S. government has been vehemently insisting it does not do, even though for years it has officially prepared to do precisely that.
  •  
    DNI James Clapper caught telling another whopper. 
Gary Edwards

Civil Unrest Ahead - LewRockwell.com - 0 views

  • The Victimized Inner Cities
  • This social disruption has motivated the enthusiastic growth and militarization of our local police departments. The law and order crowd thrives on excessive laws and regulations that no US citizen can escape. The out-of-control war on drugs is the worst part, and it generates the greatest danger in poverty-ridden areas via out-of-control police. It is estimated that these conditions have generated up to 80,000 SWAT raids per year in the United States. Most are in poor neighborhoods and involve black homes and businesses being hit disproportionately. This involves a high percentage of no-knock attacks. As can be expected many totally innocent people are killed in the process. Property damage is routine and compensation is rare. The routine use of civil forfeiture of property has become an abomination, totally out of control, which significantly contributes to the chaos. It should not be a surprise to see resentment building up against the police under these conditions. The violent reaction against local merchants in retaliation for police actions further aggravates the situation —hardly a recipe for a safe neighborhood.
  • Civil liberties are ignored by the police, and the private property of innocent bystanders is disregarded by those resenting police violence.
  • ...50 more annotations...
  • The entitlement mentality is a source of much anger and misunderstanding. It leads people who see themselves as victims to one conclusion: they are entitled to be taken care of.
  • If one trillion dollars per year doesn’t do the job, then make it $2 trillion. If the war on poverty’s $16 trillion hasn’t worked, make it $32 trillion.
  • The wealthy special interests, such as banks, the military-industrial complex, the medical industry, the drug industry, and many other corporatists, quickly gain control of the system.
  • Honest profits of successful entrepreneurs are quite different than profits of the corporate elite who gain control of the government and, as a consequence, accumulate obscene wealth by “robbing” the middle class.
  • To blame and destroy those who make an honest living by satisfying consumers without the use of special benefits from the government is destructive to liberty and wealth.
  • Crumbs may be thrown to the poor, but the principle of wealth transfer is hijacked and used for corporate and foreign welfare instead of wealth transfers to the poor.
  • True satisfaction comes from productive effort and self-reliance and not from a government transferring wealth in an effort to bring about an egalitarian society.
  • The people have too little confidence that most problems can be solved in a voluntary manner in a society that cherishes civil liberties. There’s never an admission that government problem-solving doesn’t work. Government-created problems are a road to poverty and resentment. Too many people believe that “free stuff” from the government can solve our problems. They mistakenly believe that deficits don’t matter and that wealth can come from a printing press.
  • The high profile episodes of police violence and overreaction are a consequence of conditions that in many ways were generated by government policy.
  • equal justice requires the end of welfare redistribution
  • Retraining the police won’t touch the complex problems that pit the police against the victims of complex social conditions generated by hate, violence and bad economic policies.
  • Redistribution is a process that is always destined to help a small minority, whether in an economy like ours that endorses central economic planning or in one run by radical fascists or communists.
  • Under an authoritarian regime, those in power take care of themselves. This always leads to poverty and discrepancy in wealth distribution.
  • Eventually the social strife that is predictable leads to an overthrow of the government.
  • The strife that we are witnessing is a reflection of a growing number of people who are recognizing the discrepancy between rich and poor, the weak and the powerful, Wall Street and Main Street.
  • Both political parties are financed by Wall Street, the big banks, and the military-industrial complex. Getting rich by being part of the government class is the problem.
  • Indeed the rich are getting richer and the poor poorer. The extreme current inequality is not a consequence of free markets and true liberty. Rather it results from the welfare state that, as always, morphs into a system that provides excesses for the powerful few.
  • The economic interventionist system under which we live today rewards those who benefit from government economic planning by the Federal Reserve, access to government contracts, and targeted special regulations to help one group over the other
  • There are two problems. First is conceding the principle that government has the moral authority to redistribute wealth. Second is believing the redistribution will be managed wisely and without corruption.
  • Police brutality and militarization may well induce a violent event far beyond what we have seen in Ferguson. It also can serve as an excuse. But it is not the root cause of turmoil. The real cause is poverty, the entitlement mentality, and the breakdown of the rule of law. Moral decay and the national police state are the real culprits.
  • We must limit the government’s role to protecting equal justice in defense of life, liberty, and property.
  • We have too many police, too many laws, and too much exemption of government officials from the crimes they commit.
  • There has to be an understanding that productive effort and self-reliance on the part of everyone is required for a free society to thrive.
  • The loss of our liberty has sharply accelerated since the 9/11 attacks. We have done to ourselves what no foreign enemy could have possibly accomplished.
  • Welfare, for the rich or poor, cannot exist without the sacrifice of the principal of property ownership.
  • The national police are made up of over 100,000 bureaucrats and police officials who carry guns to enforce federal law on the American citizens.
  • Today every American is a suspect. Our president has established a policy that an American citizen can be assassinated without even being charged with a crime.
  • The Founders and our Constitution intended that policing powers would be the responsibility of the individual states. That was forgotten a long time ago
  • the Feds are there taking charge over all local officials and property owners,
  • The Founders did not even want a standing army. They wanted only a militia.
  • Old-fashioned colonialism was deemed necessary by various European powers to secure natural resources along with control over sea lanes and markets for selling manufactured goods.
  • European-style colonialism — supporting a mercantilistic economy — came to be seen as politically unrealistic and unnecessary.
  • We are now subject to an out-of-control domestic police force while the US military maintains our Empire overseas.
  • When free-trade principles were utilized, colonialism did not die; it only changed form. Mercantilism in various forms and degrees drove trade policies of nations with strong economies and militaries.
  • The United States military presence around the world provides a “private” police force to protect US and other international companies against any local resistance or leaders that turn unfriendly. Our military presence overseas has nothing to do with protecting our freedoms and defending our Constitution.
  • The international monetary system is a powerful tool for the select few.
  • In fact, the real heroes are the ones who expose the truth and refuse to fight foreign wars for the international corporations.
  • The “one percenters,” generally speaking, are internationalists who are not champions of individual liberty and free trade. They are supporters of managed trade and international institutions like the WTO where the interests of the one percent can influence the rulings that frequently have little to do with advancing advertised goals of low tariffs and free trade.
  • Disengaging our troops from around the world and refusing to defend American neocolonialism is pursuing a course compatible with the qualities that Americans claim to stand for.
  • The obsession with continuing all the same policies has increased our poverty, increased violence between the classes, and lowered the standard of living for all except the elite one percent. And worst of all, the sacrifice of liberty was for naught.
  • Losing both liberty and the right to truly own property undermines the ability to create wealth.
  • When this process gets out-of-control the economy goes into a death spiral, in the beginning of which we currently find ourselves. Without a correction to the basic understanding of the proper role of government, the downward spiral will continue.
  • Tax revenues will continue to rise, aiding the policy of the government spending the people’s money rather than those who earned it.
  • Wall Street will be protected, and the trillions of dollars of big banks derivatives will be absorbed by the Fed, the FDIC, and ultimately by the American taxpayers in the next financial crisis.
  • There’s no doubt the poor will get poorer and the rich richer until the spirit of revolution in the people calls a halt to the systematic destruction of freedom in America.
  • Authoritarianism has overtaken our economic system as the welfare mentality takes over at every level of government.
  • Once the initiation of force by government is accepted by the people, even minimally, it escalates and involves every aspect of society. The only question that remains is just who gets to wield the power to distribute the largess to their friends and chosen beneficiaries.
  • It’s a recipe for steady growth of the government at the expense of liberties, even if official documents and laws written to limit government power are in place.
  • Restraining the few who thrive on the use of force to rule over us is the challenge. Fortunately they are outnumbered by those who would choose liberty yet lack the will to challenge the humanitarian monsters who gain support from naive and apathetic citizens.
  • The sentiments supporting secession, jury nullification, nullification of federal laws by state legislatures, and a drive for more independence from larger governments will continue.
  •  
    "If Americans were honest with themselves they would acknowledge that the Republic is no more. We now live in a police state. If we do not recognize and resist this development, freedom and prosperity for all Americans will continue to deteriorate. All liberties in America today are under siege. It didn't happen overnight. It took many years of neglect for our liberties to be given away so casually for a promise of security from the politicians. The tragic part is that the more security was promised - physical and economic - the less liberty was protected. With cradle-to-grave welfare protecting all citizens from any mistakes and a perpetual global war on terrorism, which a majority of Americans were convinced was absolutely necessary for our survival, our security and prosperity has been sacrificed. It was all based on lies and ignorance. Many came to believe that their best interests were served by giving up a little freedom now and then to gain a better life. The trap was set. At the beginning of a cycle that systematically undermines liberty with delusions of easy prosperity, the change may actually seem to be beneficial to a few. But to me that's like excusing embezzlement as a road to leisure and wealth - eventually payment and punishment always come due. One cannot escape the fact that a society's wealth cannot be sustained or increased without work and productive effort. Yes, some criminal elements can benefit for a while, but reality always sets in. Reality is now setting in for America and for that matter for most of the world. The piper will get his due even if "the children" have to suffer. The deception of promising "success" has lasted for quite a while. It was accomplished by ever-increasing taxes, deficits, borrowing, and printing press money. In the meantime the policing powers of the federal government were systematically and significantly expanded. No one cared much, as there seemed to be enough "gravy" for the rich, th
Paul Merrell

New Article Advocates for Consolidating Nuclear Complex - 0 views

  • This week Robert Alvarez published an article in the Bulletin of the Atomic Scientists about the National Nuclear Security Administration called "Rebranding the nuclear weapons complex won’t reform it." The piece details the long history of the Department of Energy’s management (and mismanagement) of the nuclear weapons complex, the establishment of the semi-autonomous NNSA, and the many conflicts of interest that have prevented the downsizing of the sprawling U.S. nuclear weapons complex. Alvarez also highlighted the astronomical costs associated with these facilities and recommended a truly independent commission, made up of specialists who do not have conflicts of interests, to review the complex:
  • Lab overcapacity, in particular, contributes to an inflated weapons complex cost structure, within which the average full time employee is two to three times as expensive as in the private sector. Since 2006, when management of the weapons labs was transferred from the nonprofit University of California to for-profit entities, administrative fees have jumped by 650 percent at Los Alamos. The bloat in the weapons complex is hardly limited to the national labs; the Y-12 nuclear weapons plant in Tennessee has excess capacity that is comparable, in size, to two auto assembly plants. The Obama administration should establish a commission—one, this time, that is not dominated by the very contractors that run the nuclear weapons complex—to analyze and downsize the redundant elements of that complex. The Defense Department accomplished such a downsizing over the past 20 years; it's long past time for the Energy Department to begin shedding its surplus capacity. Given that weapons facilities dominate the wage and benefit structures of large areas in several states, such streamlining will no doubt meet stiff congressional resistance. Still, the downsizing sword could eliminate redundant facilities and free up funding to rebuild those that are truly needed.
  •  
    Those who argue for privatization *never* acknowledge that outsourcing government work invariably results in a strong vested interest lobby for spending even more. Here's a classic example of that. We've seen many other examples, e.g., the privatization of prisons resulting in the prison industry lobbying for lengthening prison sentences and creating new criminal prohibitions punishable by incarceration.   
Paul Merrell

Guess who credits the Mossad with producing the 'laptop documents?' | Middle East Eye - 0 views

  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
  • Although it has never been mentioned in news media, former International Atomic Energy Agency (IAEA) Director General, Mohamed El Baradei recalled in his memoirs that he was doubtful of the authenticity of the documents. “No one knew if any of this was real,” he wrote in reference to the laptop documents. Another former senior IAEA official told me, “It just really didn’t add up.  It made more sense that this information originated in another country.”  And as I have detailed in articles and in my book, key documents in the collection bear clear indications of fabrication. Support for that virtually unknown part of the Iran nuclear story has come from a surprising source: a popular Israeli account, celebrating the successes of the Mossad’s covert operations. “Mossad: The Greatest Missions of the Israeli Secret Service,” first published in Hebrew in 2010, and then published in English in 2012, was Israel’s best-selling book for months in 2010. But not only does it acknowledge that it was indeed the MEK that delivered the documents, it also suggests that at least some of the documents came from the Mossad.  
  • The co-authors of the book are far from critics of Israel’s policy toward Iran; One of the co-authors, Michael Bar-Zohar, is a well-connected former member of the Israeli Knesset and former paratrooper, who had previously written an authorised biography of Shimon Peres, as well as the biography of Isser Harel, the Mossad chief who presided over the kidnapping of Adolph Eichmann in Argentina. Much of what Bar-Zohar chronicled in the book had already been reported earlier by Israeli journalists - especially Ronen Bergman of the daily Yedioth Ahronoth.  In fact, Bergman accused Bar-Zohar of plagiarising his articles for much of the book, while changing only a few words.  But one thing that Bar-Zohar and co-author Nisham Mishal did not get from other Israeli journalists, was the role of the Mossad in regard to the laptop documents. 
  • ...5 more annotations...
  • Although they do not flatly state that the Mossad was the source of the documents, they certainly lead the reader to that conclusion. They begin by establishing the fact that the MEK was fronting for the Mossad in its revelation in August 2002 of Iran’s first enrichment facility at Natanz. The CIA, they write, “appeared to believe that the Mossad and the British MI6 were feeding MEK intelligence they had obtained, using the Iranian opposition as a hopefully credible source”.  And they explicitly confirm CIA’s suspicions. “According to Israeli sources,” they write, “It was, in fact, a watchful Mossad officer who had discovered the mammoth centrifuge installation at Natanz.”  Other sources, including Seymour Hersh and Connie Bruck have reported that the MEK got the intelligence on Natanz from the Israelis, but theirs is the first explicit acknowledgement attributed to an Israeli source that the MEK had revealed Natanz on the basis of Mossad intelligence.  What the Israeli co-authors do not say is that the Mossad was simply guessing at the purpose of Natanz, which the MEK mistakenly called a “fuel fabrication” facility, rather than a centrifuge enrichment facility.
  • Bar-Zohar and Mishal are little concerned with whether the Mossad’s laptop caper involved fraud or not. They obviously view the Israeli intelligence agency’s use of an Iranian exile group to get out documents that had been central to the international sanctions regime against Iran as a great triumph. But whatever their reasons, their book adds another layer to the growing body of evidence showing that the Bush administration and its allies hoodwinked the rest of the world with those documents.
  • The authors further suggest that the Mossad was behind information later released by the MEK on Mohsen Fakhrizadeh, the Iranian physics professor said to be shown in the laptop documents as the man in charge of that purported Iranian nuclear weapons research program. The MEK disclosed such personal details as Fakhrizadeh’s passport number and his home telephone number. But the Mossad chroniclers write: “This abundance of detail and means of transmission leads one to believe that, again, “a certain secret service” ever suspected by the West of pursuing its own agenda, painstakingly collected these facts and figures about the Iranian scientists and passed them to the Iranian resistance.” I asked Bar-Zohar’s research assistant, Nilly Ovnat, whether he had Israeli sources for those statements relating to the MEK and the laptop documents. She responded by          e-mail: “Professor Bar Zohar had other sources for most of the material concerning MEK and Natanz [and the] laptop, yet they could not be mentioned and cannot be discussed.”
  • Turning to the laptop documents, they make it clear that western intelligence had indeed obtained the documents from the MEK and suggest that the MEK got them from somewhere else. “The dissidents wouldn’t say how they had gotten hold of the laptop,” they write. They again frame the question of the origins of those documents in terms of CIA suspicions. “[T]he skeptical Americans suspected that the documents had been only recently scanned into the computer,” they write. “They accused the Mossad of having slipped in some information obtained from our own sources - and passing it to the MEK leaders for delivery to the West." Bar-Zohar and Mishal steer clear of any suggestion that the Mossad fabricated any documents, but their account leaves little doubt that they are convinced that the Mossad should be credited for the appearance of the documents. Their approach of referring to US suspicions, rather than stating it directly, appears to be a way of avoiding problems with Israeli military censors, who often clamp down on local reporting on sensitive issues while allowing references to foreign reports.
  • In the United States and Europe, it is unchallenged in political and media circles that intelligence documents purporting to be from a covert Iranian nuclear weapons program for which the IAEA long demanded an Iranian explanation are genuine.   But evidence has continued to accumulate that the documents - sometimes called the “laptop documents” because they were said to have been on a laptop computer belonging to one of the participants in the program - were fabricated by Israel’s foreign intelligence agency (Mossad).  We now know that the documents did not come from an Iranian participant in the alleged project, as the media were led to believe for years; they were turned over to German intelligence by the anti-regime Iranian terrorist organisation, Mujahedeen E Khalq, (MEK). I first reported this in 2008 and have now confirmed from an authoritative German source in my book on the Iran nuclear issue. The MEK was well known to have been a client of the Mossad, serving to launder Israeli intelligence claims that the Israelis did not want attributed to themselves.
Paul Merrell

After Brit spies 'snoop' on families' lawyers, UK govt admits: We flouted human rights ... - 0 views

  • The British government has admitted that its practice of spying on confidential communications between lawyers and their clients was a breach of the European Convention on Human Rights (ECHR). Details of the controversial snooping emerged in November: lawyers suing Blighty over its rendition of two Libyan families to be tortured by the late and unlamented Gaddafi regime claimed Her Majesty's own lawyers seemed to have access to the defense team's emails. The families' briefs asked for a probe by the secretive Investigatory Powers Tribunal (IPT), a move that led to Wednesday's admission. "The concession the government has made today relates to the agencies' policies and procedures governing the handling of legally privileged communications and whether they are compatible with the ECHR," a government spokesman said in a statement to the media, via the Press Association. "In view of recent IPT judgments, we acknowledge that the policies applied since 2010 have not fully met the requirements of the ECHR, specifically Article 8. This includes a requirement that safeguards are made sufficiently public."
  • The guidelines revealed by the investigation showed that MI5 – which handles the UK's domestic security – had free reign to spy on highly private and sensitive lawyer-client conversations between April 2011 and January 2014. MI6, which handles foreign intelligence, had no rules on the matter either until 2011, and even those were considered void if "extremists" were involved. Britain's answer to the NSA, GCHQ, had rules against such spying, but they too were relaxed in 2011. "By allowing the intelligence agencies free rein to spy on communications between lawyers and their clients, the Government has endangered the fundamental British right to a fair trial," said Cori Crider, a director at the non-profit Reprieve and one of the lawyers for the Libyan families. "For too long, the security services have been allowed to snoop on those bringing cases against them when they speak to their lawyers. In doing so, they have violated a right that is centuries old in British common law. Today they have finally admitted they have been acting unlawfully for years."
  • Crider said it now seemed probable that UK snoopers had been listening in on the communications over the Libyan case. The British government hasn't admitted guilt, but it has at least acknowledged that it was doing something wrong – sort of. "It does not mean that there was any deliberate wrongdoing on the part of the security and intelligence agencies, which have always taken their obligation to protect legally privileged material extremely seriously," the government spokesman said. "Nor does it mean that any of the agencies' activities have prejudiced or in any way resulted in an abuse of process in any civil or criminal proceedings. The agencies will now work with the independent Interception of Communications Commissioner to ensure their policies satisfy all of the UK's human rights obligations." So that's all right, then.
  •  
    If you follow the "November" link you'[l learn that yes, indeed, the UK government lawyers were happily getting the content of their adversaries privileged attorney-client communications. Conspicuously, the promises of reform make no mention of what is surely a disbarment offense in the U.S. I doubt that it's different in the UK. Discovery rules of procedure strictly limit how parties may obtain information from the other side. Wiretapping the other side's lawyers is not a permitted from of discovery. Hopefully, at least the government lawyers in the case in which the misbehavior was discovered have been referred for disciplinary action.  
Paul Merrell

CIA admits to spying on Senate staffers | World news | The Guardian - 0 views

  • The director of the Central Intelligence Agency, John Brennan, issued an extraordinary apology to leaders of the US Senate intelligence committee on Thursday, conceding that the agency employees spied on committee staff and reversing months of furious and public denials. Brennan acknowledged that an internal investigation had found agency security personnel transgressed a firewall set up on a CIA network, which allowed Senate committee investigators to review agency documents for their landmark inquiry into CIA torture. Among other things, it was revealed that agency officials conducted keyword searches and email searches on committee staff while they used the network.The admission brings Brennan’s already rocky tenure at the head of the CIA under renewed question. One senator on the panel said he had lost confidence in the director, although the White House indicated its support for a man who has been one of Barack Obama’s most trusted security aides.
  • CIA spokesman Dean Boyd acknowledged that agency staff had improperly monitored the computers of committee staff members, who were using a network the agency had set up, called RDINet. “Some CIA employees acted in a manner inconsistent with the common understanding reached between [the committee] and the CIA in 2009 regarding access to the RDINet,” he said.Asked if Brennan had or would offer his resignation, a different CIA spokesman, Ryan Trapani, replied: “No.”
  • McClatchy first reported the apology on Thursday.
  •  
    A bit more detail on what CIA admits to doing. 
Paul Merrell

The Absolution of Jamie Dimon » CounterPunch: Tells the Facts, Names the Names - 0 views

  • Here are some of the good things JPMorgan has done in recent years.  In 2012 it reduced the compensation of Jamie Dimon, its chairman, president and CEO from $23 million to $11.5 million. That was his punishment for all the bad things the bank acknowledged that it had been doing while under his supervision. The bank acknowledged its sins by paying almost $20 billion in fines and penalties. Included in the $20 billion was $13 billion it agreed to pay in November 2013 that was described in the Wall Street Journal as “the biggest combination of fines and damages extracted by the U.S. government in a civil settlement with any single company.” For a bank the size of JPMorgan to pay $20 billion in fines as penance is a bit like the parishioner entering the confessional and seeking forgiveness from the supervisor of the man on the other side of the partition.  It has no effect on his future conduct. Nonetheless, paying the fines was a good thing since each fine was an act of contrition and those acts are always welcomed by those sitting in judgment on bad actors.   Here, however, are two bad things JPMorgan has been doing since leaving the federal government’s confessional at the end of 2013.
  • t increased Mr. Dimon’s compensation package by 74%, raising it to $20 million as a result of which Jamie’s compensation went from $31,506.84 per day to $54,794.52 per day. Since much of that is in restricted stock he cannot run out and spend it all.  Here is why that was a bad thing for the bank to have done.  It turns out that notwithstanding the $20 billion in penance paid, JPMorgan had discovered yet another way to make money at the expense of its customers.  It did this by ignoring part of the bankruptcy laws.
  • The bankruptcy law notwithstanding, some do.  Jamie Dimon’s bank is one of them. Just as it bundled subprime mortgages it had issued and sold them to investors at great profit to itself, according to a report in the New York Times, JPMorgan and other banks have been selling debts discharged in bankruptcy to outside investors.  Instead of showing that the debt of an individual to the bank has been discharged and is no longer collectible, the bank continues to described the debt as unpaid and that is how it appears on the borrower’s credit report.  If the borrower tries to get credit following a bankruptcy and the credit report does not disclose that the debt cannot be collected, a discharged debtor may be unable to get a new loan or a job or be otherwise adversely affected.  The bank, of course, makes money by selling the discharged debt to investors who are willing to take the chance that the debtor will continue to pay on the debt in order to get it removed from the credit report.
  • ...2 more annotations...
  • Judge Robert D. Drain, a bankruptcy judge sitting in White Plains, New York, has confronted the issue of discharged debts being sold to investors by banks.  He observed that the buyers of those debts know that a bank “will refuse to correct the credit report to reflect the obligor’s bankruptcy discharge, which means that the debtor will feel significant added pressure to obtain a ‘clean’ report by paying the debt.” In refusing to throw out a lawsuit that has been filed in which the plaintiffs are seeking class action status for their claims against JPMorgan he observed that “the complaint sets forth a cause of action that Chase is using the inaccuracy of its credit reporting on a systematic basis to further its business of selling debts and its buyer’s collection of such debt.”
  • A U.S. Senate report released November 19, 2014, was highly critical of JPMorgan and other banks for, among other things, exceeding federal limits on commodity holdings.  Whether the activities described in the report will result in JPMorgan or any of the other banks paying a fine or Jamie Dimon suffering a salary reduction only time will tell. One thing we know without waiting for events to unfold.  JPMorgan stock is a good investment. The bank is always looking for creative ways to make money.
Paul Merrell

HSBC files show how Swiss bank helped clients dodge taxes and hide millions | Business ... - 0 views

  • HSBC’s Swiss banking arm helped wealthy customers dodge taxes and conceal millions of dollars of assets, doling out bundles of untraceable cash and advising clients on how to circumvent domestic tax authorities, according to a huge cache of leaked secret bank account files. The files – obtained through an international collaboration of news outlets, including the Guardian, the French daily Le Monde, BBC Panorama and the Washington-based International Consortium of Investigative Journalists – reveal that HSBC’s Swiss private bank: • Routinely allowed clients to withdraw bricks of cash, often in foreign currencies of little use in Switzerland. • Aggressively marketed schemes likely to enable wealthy clients to avoid European taxes. • Colluded with some clients to conceal undeclared “black” accounts from their domestic tax authorities. • Provided accounts to international criminals, corrupt businessmen and other high-risk individuals.
  • The revelations will amplify calls for crackdowns on offshore tax havens and stoke political arguments in the US, Britain and elsewhere in Europe where exchequers are seen to be fighting a losing battle against fleet-footed and wealthy individuals in the globalised world. Approached by the Guardian, HSBC, the world’s second largest bank, has now admitted wrongdoing by its Swiss subsidiary. “We acknowledge and are accountable for past compliance and control failures,” the bank said in a statement. The Swiss arm, the statement said, had not been fully integrated into HSBC after its purchase in 1999, allowing “significantly lower” standards of compliance and due diligence to persist. That response raises serious questions about oversight of the Swiss operation by the then senior executives of its parent company, HSBC Group, headquartered in London. It has now acknowledged that it was not until 2011 that action was taken to bring the Swiss bank into line. “HSBC was run in a more federated way than it is today and decisions were frequently taken at a country level,” the bank said.
  • Although tax authorities around the world have had confidential access to the leaked files since 2010, the true nature of the Swiss bank’s misconduct has never been made public until now. Hollywood stars, shopkeepers, royalty and clothing merchants feature in the files along with the heirs to some of Europe’s biggest fortunes.
  • ...2 more annotations...
  • The files show how HSBC in Switzerland keenly marketed tax avoidance strategies to its wealthy clients. The bank proactively contacted clients in 2005 to suggest ways to avoid a new tax levied on the Swiss savings accounts of EU citizens, a measure brought in through a treaty between Switzerland and the EU to tackle secret offshore accounts. The documents also show HSBC’s Swiss subsidiary providing banking services to relatives of dictators, people implicated in African corruption scandals, arms industry figures and others. Swiss banking rules have since 1998 required high levels of diligence on the accounts of politically connected figures, but the documents suggest that at the time HSBC happily provided banking services to such controversial individuals. The Guardian’s evidence of a pattern of misconduct at HSBC in Switzerland is supported by the outcome of recent court cases in the US and Europe.
  • HSBC is already facing criminal investigations and charges in France, Belgium, the US and Argentina as a result of the leak of the files, but no legal action has been taken against it in Britain. Former tax inspector Richard Brooks tells BBC Panorama in a programme to be aired on Monday night: “I think they were a tax avoidance and tax evasion service. I think that’s what they were offering. “There are very few reasons to have an offshore bank account, apart from just saving tax. There are some people who can use an ... account to avoid tax legally. For others it’s just a way to keep money secret.”
Paul Merrell

Baker Creating J Street Challenge for Jeb - Commentary Magazine Commentary Magazine - 0 views

  • The announcement that former Secretary of State James Baker was one of the advisors to Jeb Bush’s presidential campaign created a minor stir a few weeks ago. As our Michael Rubin noted at the time, Baker’s long record of hostility to Israel and consistent backing for engagement with rogue regimes ought to make him radioactive for a candidate seeking to brand himself as a supporter of the Jewish state and a critic of the Obama administration’s foreign policy. But Baker’s status as a faithful family retainer for the Bush family might have given Jeb a pass, especially since, as Michael wrote, another far wiser former secretary of state — George P. Schultz — is considered to be Jeb’s top foreign policy advisor. But the news that Baker will serve as a keynote speaker at the upcoming annual conference of the left-wing J Street lobby ought to change the conversation about this topic. Coming as it does hard on the heels of the president’s open threats to isolate Israel, having someone so closely associated with his campaign serve in that role at an event dedicated to support for Obama’s hostile attitude toward Israel obligates Jeb to not let this happen without saying or doing something to disassociate himself from Baker.
  •  
    The neocons are howling about former Reagan Secretary of State James Baker being one of Jeb Bush's advisors. Baker has never been forgiven by the neocons since he barred the Israeli Deputy Foreign Minister -- Benjamin Netanyahu -- from being allowed into the State Dept. building because of his outrageous public statements. Now Baker is doubly hated because he is scheduled to be a keynote.  speaker at a conference of the liberal pro-Israel J Street lobbying group. J Street is "left-leaning" in neocon eyes because it actully supports a 2-state solution in Palestine, rather than using the 2-state solution as a political fig leaf while Israel completes its colonization of Palestine and then annexes it. But while screaming that only AIPAC represents Israel's real interests and acknowledging that Baker is closely tied to the Bush family, they're not addressing the political reality that Baker is the global oil industry's top lobbyist nor the fact that it was Baker who put the kibosh on the neocons' goal of privatizing all the oil in Iraq and flooding the market with cheap oil to break the OPEC Cartel. The western oil companies are profoundly against privately owned oil in the Mideast and even less enthused about breaking the OPEC Cartel, which normally keep crude oil prices high, enabling higher oil company profits. Apparently the oil industry also wants the 2-state solution to actually happen in order to obtain a more stable Middle East. And that is anathema to Netanyahu, AIPAC, and the neocons..   
Paul Merrell

Court Accepts DOJ's 'State Secrets' Claim to Protect Shadowy Neocons: a New Low - The I... - 0 views

  • A truly stunning debasement of the U.S. justice system just occurred through the joint efforts of the Obama Justice Department and a meek and frightened Obama-appointed federal judge, Edgardo Ramos, all in order to protect an extremist neocon front group from scrutiny and accountability. The details are crucial for understanding the magnitude of the abuse here. At the center of it is an anti-Iranian group calling itself “United Against Nuclear Iran” (UANI), which is very likely a front for some combination of the Israeli and U.S. intelligence services. When launched, NBC described its mission as waging “economic and psychological warfare” against Iran. The group was founded and is run and guided by a roster of U.S., Israeli and British neocon extremists such as Joe Lieberman, former Bush Homeland Security adviser (and current CNN “analyst”) Fran Townsend, former CIA Director James Woolsey, and former Mossad Director Meir Dagan. One of its key advisers is Olli Heinonen, who just co-authored a Washington Post Op-Ed with former Bush CIA/NSA Director Michael Hayden arguing that Washington is being too soft on Tehran.
  • This group of neocon extremists was literally just immunized by a federal court from the rule of law. That was based on the claim — advocated by the Obama DOJ and accepted by Judge Ramos — that subjecting them to litigation for their actions would risk disclosure of vital “state secrets.” The court’s ruling was based on assertions made through completely secret proceedings between the court and the U.S. government, with everyone else — including the lawyers for the parties — kept in the dark. In May 2013, UANI launched a “name and shame” campaign designed to publicly identify — and malign — any individuals or entities enabling trade with Iran. One of the accused was the shipping company of Greek billionaire Victor Restis, who vehemently denies the accusation. He hired an American law firm and sued UANI for defamation in a New York federal court, claiming the “name and shame” campaign destroyed his reputation.
  • Up until that point, there was nothing unusual about any of this: just a garden-variety defamation case brought in court by someone who claims that public statements made about him are damaging and false. That happens every day. But then something quite extraordinary happened: In September of last year, the U.S. government, which was not a party, formally intervened in the lawsuit, and demanded that the court refuse to hear Restis’s claims and instead dismiss the lawsuit against UANI before it could even start, on the ground that allowing the case to proceed would damage national security. When the DOJ intervened in this case and asserted the “state secrets privilege,” it confounded almost everyone. The New York Times’s Matt Apuzzo noted at the time that “the group is not affiliated with the government, and lists no government contracts on its tax forms. The government has cited no precedent for using the so­-called state­ secrets privilege to quash a private lawsuit that does not focus on government activity.” He quoted the ACLU’s Ben Wizner as saying: “I have never seen anything like this.” Reuters’s Allison Frankel labeled the DOJ’s involvement a “mystery” and said “the government’s brief is maddeningly opaque about its interest in a private libel case.”
  • ...2 more annotations...
  • But in this case, there is no apparent U.S. government conduct at issue in the lawsuit. At least based on what they claim about themselves, UANI is just “a not-for-profit, non-partisan, advocacy group” that seeks to “educate” the public about the dangers of Iran’s nuclear program. Why would such a group like this even possess “state secrets”? It would be illegal to give them such material. Or could it be that the CIA or some other U.S. government agency has created and controls the group, which would be a form of government-disseminated propaganda, which happens to be illegal? What else could explain the basis for the U.S. government’s argument that allowing UANI to be sued would risk the disclosure of vital “state secrets” besides a desire to cover up something quite untoward if not illegal? What “state secrets” could possibly be disclosed by suing a nice, little “not-for-profit, non-partisan, advocacy group”?
  • This sham worked. This week, Judge Ramos issued his ruling dismissing the entire lawsuit (see below). As a result of the DOJ’s protection, UANI cannot be sued. Among other things, it means this group of neocon extremists now has a license to defame anyone they want. They can destroy your reputation with false accusations in a highly public campaign, and when you sue them for it, the DOJ will come in and whisper in the judge’s ear that national security will be damaged if — like everyone else in the world — UANI must answer in a court of law for their conduct. And subservient judicial officials like Judge Ramos will obey the U.S. government’s dictates and dismiss your lawsuit before it begins, without your having any idea why that even happened. Worse, in his written ruling, the judge expressly acknowledges that dismissal of the entire lawsuit at the start on secrecy grounds is what he calls a “harsh sanction,” and also acknowledges that “it is particularly so in this case because Plaintiffs not only do not get their day in court, but cannot be told why” (emphasis added). But he does it anyway, in a perfunctory 18-page opinion that does little other than re-state some basic legal principles, and then just concludes that everything the government whispered in his ear should be accepted.
  •  
    Unless the district court decision is overturned by a higher court, the Restis case looks to be over. The secrecy concerns of the Dark State trump justice, again. It should be noted that the Constitution is silent on the issue of state secrets (the so-called "state secrets privilege" was manufactured from whole cloth by the Supreme Court in the early 1950s). On the other hand, several provisions of the Constitution expressly require that justice be done, not the least of which is the Due Process clause.  
Paul Merrell

Mastermind of The Bamako Terror Attack Mokhtar Belmokhtar: A CIA Sponsored "Intelligenc... - 0 views

  • In response to the tragic Paris events of November 13, Central Intelligence Agency director  John Brennan  warned that “ISIL is planning additional attacks… It is clear to me that ISIL has an external agenda, that they are determined to carry out these types of attacks.” (Quoted in Daily Telegraph, November 16, 2015) Five days later following the CIA Chief’s  premonition, the Bamako Radisson Hotel Blu in Mali’s capital was the object of a terrorist attack, resulting in  21 people dead. Following the attack and the taking of hostages by the terrorists, French and Malian special forces raided the hotel. US. Africa Command (AFRICOM) also confirmed that US special forces were involved.
  • The Bamako terror operation was allegedly coordinated by Mokhtar Belmokhtar (aka Khaled Abu al-Abbas), leader of an affiliate of Al Qaeda in the Islamic Maghreb (AQIM), the Islamist al-Mulathameen (Masked) Brigade, or “Those who Sign with Blood.” Belmokhtar’s group was created in 2012 in the wake of the war on Libya. His organization has also allegedly been involved in the drug trade, smuggling as well kidnapping operations of foreigners in North Africa.  While his whereabouts are said to be known, French intelligence has dubbed Belmokhtar “the uncatchable”. In June he was reported dead  as a result in a U.S. air strike in Libya. His death was subsequently denied. Based on shaky evidence, The New York Times report below (November 20) concludes that Belmokhtar’s group (together with AQIM) is unequivocally behind the Bamako attacks:
  • A member of Al Qaeda in Africa confirmed Saturday that the attack Friday on a hotel in Bamako, Mali, had been carried out by a jihadist group loyal to Mokhtar Belmokhtar, an Algerian operative for Al Qaeda. The Qaeda member, who spoke via an online chat, said that an audio message and a similar written statement in which the group claimed responsibility for the attack were authentic. The SITE Intelligence Group, which monitors jihadist groups, also confirmed the authenticity of the statement. The Qaeda member, who refused to be named for his protection, said that Mr. Belmokhtar’s men had collaborated with the Saharan Emirate of Al Qaeda in the Islamic Maghreb, … In the audio recording, the group, known as Al Mourabitoun, says it carried out the operation in conjunction with Al Qaeda’s branch in the Islamic Maghreb. The recording was released to the Al Jazeera network and simultaneously to Al Akhbar, … The recording states: “We, in the group of the Mourabitoun [Arabic Rebel Group], in cooperation with our brothers in Al Qaeda in Islamic Maghreb, the great desert area, claim responsibility for the hostage-taking operation in the Radisson hotel in Bamako.” (emphasis added)
  • ...7 more annotations...
  • In turn, the French Minister of Defense acknowledged –prior to the conduct of a police investigation– that the authors of the attack were “most likely” led by Mokhtar Belmokhtar’s group in association with Al Qaeda in the Islamic Maghreb (AQIM). What Defense Minister Jean-Yves Le Drain failed to mention was that both Belmokhtar and AQIM have longstanding links to the CIA, which in turn has a working relationship with France’s  General Directorate for External Security, Direction générale de la sécurité extérieure (DGSE).  Casually ignored by the Western media, the leaders of Al Qaeda in the Islamic Maghreb (AQIM) including Belmokhtar were trained and recruited by the CIA in Afghanistan. Acknowledged by the Washington based Council on Foreign Relations (CFR): Most of AQIM’s major leaders are believed to have trained in Afghanistan during the 1979-1989 war against the Soviets as part of a group of North African volunteers known as “Afghan Arabs” that returned to the region and radicalized Islamist movements in the years that followed. The group is divided into “katibas” or brigades, which are clustered into different and often independent cells. The group’s top leader, or emir, since 2004 has been  Abdelmalek Droukdel, also known as Abou Mossab Abdelwadoud, a trained engineer and explosives expert who has fought in Afghanistan and has roots with the GIA in Algeria. (Council on Foreign Relations, Al Qaeda in the Islamic Maghreb, cfr.org, undated)
  • Mokhtar Belmokhtar: Post Cold War CIA intelligence asset?  The Council on Foreign Relations erroneously describes “Mokhtar Belmokhtar as the one-eyed veteran of the anti-Soviet Afghan insurgency.” (CFR, op cit, emphasis added). Belmokhtar (born in 1972) did not fight in the Soviet-Afghan war (1979-1989). He was recruited in 1991 at the age of 19 in the immediate wake of the Cold War. CIA recruitment continued in the wake of the Cold War. It was in large part directed against the Russian Federation and the former Soviet Republics as well as the Middle East. The purpose of this later CIA recruitment was to establish a network of “intelligence assets” to be used in the CIA’s post-cold war insurgencies. Leaders of the Chechen Islamist insurgencies were also trained in CIA camps in Afghanistan and Pakistan, including the notorious leader of the Chechen insurrection Ibn al-Khattab (a citizen of Saudi Arabia).
  • Following his training and recruitment and a two year stint in Afghanistan (1991-1993), Mokhtar Belmokhtar was sent back to Algeria in 1993 at age 21 where he joined the  Salafist Group for Preaching and Combat (GSPC) (emblem left). The latter was initially part of the so-called Armed Islamic Group  (Groupe islamique armé (GIA)) in Algeria which sought to overthrow the secular Algerian Government with a view to installing a theocratic Islamic State. Supported covertly by the CIA, Belmokhtar fought in Southern Algeria in the civil war opposing Islamist forces and the secular government. He was also  instrumental in the integration and merging of “jihadist” forces. In January 2007,  the Armed islamic Group (GIA) which had been prominent in the 1990s, officially changed its name to the Al-Qaeda Organization in the Islamic Maghreb (AQIM). In turn, as of 2007, the newly formed AQIM established a close relationship with the Libya Islamic Fighting Group (LIFG), which was directly supported by NATO during the 2011 war on Libya, “providing weapons, training, special forces and even aircraft to support them in the overthrow of Libya’s government.” (Tony Cartalucci, The Geopolitical Reordering of Africa: US Covert Support to Al Qaeda in Northern Mali, France “Comes to the Rescue”, Global Research, January 2013). British SAS Special Forces had also been brought into Libya prior to the onset of the insurrection, acting as military advisers to the LIFG. In fact, what has unfolded since the war on Libya is the merging of LIFG and AQIM forces. In turn, many of the LIFG operatives have been dispatched to Syria to fight within the ranks of Al Nusrah and the ISIS.
  • It is worth noting that the 2007  restructuring  of jihadist forces in Algeria and the Maghreb coincided with  the appointment of Robert Stephen Ford as US ambassador to Algeria in August 2006. Ford had been reassigned by the State Department from Baghdad to Algiers. From 2004 to 2006, he worked closely with Ambassador John Negroponte at the US embassy in Baghdad in supporting the creation of  both Shia and Sunni death squads in Iraq. This project consisted in recruiting and training terrorists modelled on the so-called “Salvador Option” which had been applied by the CIA in Central America. Negroponte as we recall played a central role in supporting the Contras terrorists in Nicaragua as ambassador to Honduras from 1981-1985. For further details see Michel Chossudovsky, “The Salvador Option For Syria”: US-NATO Sponsored Death Squads Integrate “Opposition Forces”, Global Research,  May 28, 2012) The 2006 appointment of Robert Stephen Ford to head the US Embassy in Algeria was timely. It coincided with the consolidation of jihadist groups within Algeria and the Maghreb. It preceded the 2011 US-NATO sponsored insurrections in Libya and Syria. In 2010, Ford was approved by the US Congress as US Ambassador to Syria. He presented his credentials to president Bashar al Assad in January 2011, barely two months prior to the onslaught of the terrorist insurrection in the border city of Daraa in mid-March 2011. Ford played a central role in assisting the channelling of US and allied support to Syrian “opposition” groups including Al Nusrah and the ISIS.
  • Belmokhtar’s history and involvement in Afghanistan confirms that from the very outset he was an instrument of US intelligence. While, he operates with a certain degree of independence and autonomy in relation to his intelligence sponsors, he and his organization are bona fide CIA “intelligence assets”, which can be used by the CIA as part of a covert agenda. There are various definitions of  an “intelligence asset”. From the standpoint of US intelligence, “assets” linked up to terrorist organizations must not be aware that they are supported and monitored by Western intelligence. With regard to Al Qaeda, from the outset in 1979, the CIA chose to operate through various front organizations as well as indirectly through its Saudi, Qatari and Pakistani intelligence partners. CIA’s Milton Beardman who played a central role in the Soviet Afghan war confirms that members of Al Qaeda including Osama bin Laden were not aware of the role they were playing on behalf of Washington. In the words of bin Laden (quoted by Beardman): “neither I, nor my brothers saw evidence of American help”(Michel Chossudovsky, Who is Osama bin Laden, Global Research, September 12, 2001): Motivated by nationalism and religious fervor, the Islamic warriors were unaware that they were fighting the Soviet Army on behalf of Uncle Sam. While there were contacts at the upper levels of the intelligence hierarchy, Islamic rebel leaders in theatre had no contacts with Washington or the CIA.  (Ibid) Amply documented, Al Qaeda in the Islamic Maghreb (AQIM)and its affiliated groups including the Libya Islamic Fighting Group (LIFG) was serving the interests of the Western military alliance. Confirmed by the Washington Post, June 29, 2011 (See below), France was supplying weapons to the LIFG at the height of NATO’s bombing raids.
  • AQIM in turn was receiving weapons from the LIFG, which was supported by NATO. Moreover, LIFG mercenaries had integrated AQIM brigades. According to alleged Terror Mastermind Mokhtar Belmokhtar, who also coordinated the 2013 In Amenas Mali kidnapping operation: “We have been one of the main beneficiaries of the revolutions in the Arab world. As for our benefiting from the (Libyan) weapons, this is a natural thing in these kinds of circumstances.” http://www.hanford.gov/c.cfm/oci/ci_terrorist.cfm?dossier=174 Al Qaeda in the Islamic Maghreb (AQIM) is indelibly tied into a Western intelligence agenda. While it is described  as  ”one of the region’s wealthiest, best-armed militant groups”, financed covertly by Saudi Arabia and Qatar. France’s  Canard enchaîné revealed (June 2012) that Qatar (a staunch ally of the United States) has been funding various terrorist entities in Mali: The original report cites a French military intelligence report as indicating that Qatar has provided financial support to all three of the main armed groups in northern Mali: Iyad Ag Ghali’s Ansar Ed-Dine, al-Qa’ida in the Islamic Maghreb (AQIM) and the Movement for Unity and Jihad in West Africa (MUJWA). The amount of funding given to each of the groups is not mentioned but it mentions that repeated reports from the French DGSE to the Defense Ministry have mentioned Qatar’s support for ‘terrorism’ in northern Mali. (quoted by Jeune Afrique June 2012)
  • Qatar is a proxy state, a de facto Persian Gulf territory largely controlled by Washington. It hosts  a number of Western military and intelligence facilities. The Emir of Qatar does not finance terrorism without the consent of the CIA. And with regard to Mali, the CIA coordinates its activities in liaison with its French intelligence partners and counterparts, including la Direction du renseignement militaire (DRM) and the Direction générale de la sécurité extérieure (DGSE). The implications are obvious and should be carefully understood by Western public opinion. Inasmuch as Belmokhtar and AQIM are “intelligence assets”, both US and French intelligence are (indirectly) behind the Bamako attacks. Both US and French intelligence are complicit in the State sponsorship of terrorism.
« First ‹ Previous 41 - 60 of 319 Next › Last »
Showing 20 items per page