Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged adds

Rss Feed Group items tagged

3More

Chaos - not Victory - is the Empire's "Name of the Game" | Global Research - Centre for... - 0 views

  • “Once again a country “liberated” by the West is sinking deeper and deeper into chaos.” Global Research.  This could be anyone of the countries in conflict, where Washington and its Western and Middle Eastern stooges sow war – eternal chaos, misery, death – and submission. This is precisely the point: The Washington / NATO strategy is not to ‘win’ a war or conflict, but to create ongoing – endless chaos. That’s the way (i) to control people, nations and their resources; (ii) to assures the west a continuous need for military – troops and equipment – remember more than 50% of the US GDP depends on the military industrial complex, related industries and services; and (iii) finally, a country in disarray or chaos, is broke and needs money – money with hardship conditions, ‘austerity’ money from the notorious IMF, World Bank and other associated nefarious ‘development institutions’ and money lenders; money that equals enslavement, especially with corrupt leaders that do not care for their people.
  • That’s the name of the game – in Yemen, in Ukraine, in Syria, in Iraq, in Sudan, in Central Africa, in Libya…. you name it. Who fights against whom is unimportant. ISIS / ISIL / IS / DAISH / DAESH / Al-Qaeda and whatever other names for the mercenary killer organizations you want to add to the list – are just tags to confuse. You might as well add Blackwater, Xe, Academi and all its other successive names chosen to escape easy recognition. They are prostitutes for the Zionist-Anglo-Saxon Empire, prostitutes of the lowest level. Then come elite prostitutes, like Saudi Arabia, Qatar, Bahrain and other Gulf States, plus the UK and France, of course.
  •  
    More and more writers are beginning to recognize that victory is no longer the goal of U.S. military and foreign policy, that ongoing instability and chaos is. A tip of the hat is due Pepe Escobar, who years ago dubbed the U.S. the "Empire of Chaos." 
3More

Establish "No Spy Zones"? Current Law Could Make It Hard - Secrecy News - 0 views

  • Disclosure of U.S. intelligence surveillance activities in Germany and other allied countries has aroused angry public reaction in those countries, and has prompted discussion of the possibility of negotiating “no spy zones” abroad in which certain types of intelligence collection would be renounced and prohibited. Some have spoken of extending to Germany or other countries the “Five Eyes” agreement that has long existed among the US, the UK, Canada, Australia and New Zealand to share intelligence, and not to spy on each other. But a rarely-noted statute could make it difficult for any U.S. administration to achieve an international agreement involving binding new limits on intelligence collection against a foreign country, unless Congress enacts the limitation itself.
  • In the FY 2001 intelligence authorization act (P.L. 106-567, sect. 308), Congress said that the imperatives of U.S. intelligence gathering are to be understood to take precedence over any treaty or international agreement: “No Federal law enacted on or after the date of the enactment of the Intelligence Authorization Act for Fiscal Year 2001 that implements a treaty or other international agreement shall be construed as making unlawful an otherwise lawful and authorized intelligence activity of the United States Government or its employees, or any other person to the extent such other person is carrying out such activity on behalf of, and at the direction of, the United States, unless such Federal law specifically addresses such intelligence activity.” By way of explanation, the Senate Intelligence Committee said in a 2000 report:  “There has been a concern that future legislation implementing international agreements could be interpreted…. as restricting intelligence activities that are otherwise entirely consistent with U.S. law and policy.” At a minimum, this provision appears to complicate any such restriction on intelligence activities that is advanced by international agreement, unless it is explicitly affirmed by Congress itself.
  •  
    The quoted passage include a link to the public law version of the quoted statute, which includes a definition of "authorized intelligence activities" and a reference indicating the law was codified at 50 U.S.C. 442. But it ain't there in the LII Cornell online version of the Code or in the Senate's online version. The Senate version has a reference saying that it was editorially transferred to another location in a Title dealing with disposal of government records. But the referenced sections do not exist there. So a trip to the law library to check the printed version and Westlaw. At this point I cannot confirm that the statute is still in force. But this is a great example of the evils of tucking substantive legislation into appropriation and other "Christmas Tree" bills. Oregon has a state constitutional provision limiting legislative enactments to a single subject. It's been used as authority by Oregon courts to void legislation on many occasions. But good luck trying to get the federal constitution amended to add a similar limitation.   
3More

Defense Manual Allows for Journalists' Detention | Al Jazeera America - 0 views

  • New Defense Department guidelines allow commanders to punish journalists and treat them as "unprivileged belligerents" if they believe journalists are sympathizing or cooperating with the enemy. The Law of War manual, updated to apply for the first time to all branches of the military, contains a vaguely worded provision that military commanders could interpret broadly, experts in military law and journalism say. Commanders could ask journalists to leave military bases or detain journalists for any number of perceived offenses. "In general, journalists are civilians," the 1,180 page manual says, but it adds that "journalists may be members of the armed forces, persons authorized to accompany the armed forces, or unprivileged belligerents." A person deemed to be an "unprivileged belligerent" is not entitled to the rights afforded by the Geneva Convention. A commander could restrict from certain coverage areas or even hold indefinitely without charges any reporter considered an "unprivileged belligerent." The manual adds, "Reporting on military operations can be very similar to collecting intelligence or even spying. A journalist who acts as a spy may be subject to security measures and punished if captured." It is not specific as to the punishment or under what circumstances a commander can decide to "punish" a journalist.
  • Defense Department officials said the reference to "unprivileged belligerents" was intended to point out that armed group members or spies could be masquerading as reporters. The designation was also made to warn against someone who works publications like Al-Qaeda's "Inspire" magazine that can be used to encourage or recruit adherents. Another provision says that "relaying of information" could be construed as "taking a direct part in hostilities." Officials said that is intended to refer to passing information about ongoing operations, locations of troops or other classified data to an enemy. Army Lt. Col. Joe Sowers, a Pentagon spokesman, said it was not the Defense Department's intent to allow an overzealous commander to block journalists or take action against those who write critical stories.
  • But Ken Lee, an ex-Marine and military lawyer who specializes in "law of war" issues and is now in private practice, said it was worrisome that the detention of a journalist could come down to a commander's interpretation of the law.  If a reporter writes an unflattering story, "does this give a commander the impetus to say, now you're an unprivileged belligerent? I would hope not," Lee said. Defense officials said the manual describes the law for informational purposes and is not an authorization for anyone to take any particular action regarding journalists. The manual also notes that journalists captured by the enemy are supposed to be given the rights of prisoners of war under the Geneva Convention.
2More

Wiretap Numbers Don't Add Up | Just Security - 0 views

  • Last week, the Administrative Office (AO) of the US Courts published the 2014 Wiretap Report, an annual report to Congress concerning intercepted wire, oral, or electronic communications as required by Title III of the Omnibus Crime Control and Safe Streets Act of 1968. News headlines touted that the number of federal and state wiretaps for 2014 was down 1% for a total of 3,554. Of these, there were few involving encrypted communications; and for those, law enforcement agencies were in most cases able to overcome the encryption. But there is a bigger story that calls into question the accuracy of the all of the prior reports submitted to the AO and the overall data provided to Congress and the public in the Wiretap Reports. Since the Snowden revelations, more and more companies have started publishing “transparency reports” about the number and nature of government demands to access their users’ data. AT&T, Verizon, and Sprint published data for 2014 earlier this year and T-Mobile published its first transparency report on the same day the AO released the Wiretap Report. In aggregate, the four companies state that they implemented 10,712 wiretaps, a threefold difference over the total number reported by the AO. Note that the 10,712 number is only for the four companies listed above and does not reflect wiretap orders received by other telephone carriers or online providers, so the discrepancy actually is larger.
  • So what accounts for the huge gap in reporting? That is a question Congress and the AO should be asking prosecutors and judges who are required by law to make complete and accurate reports of the number of wiretaps conducted each year. Are wiretaps being consistently under­reported to Congress and the public? Based on the data reported by the four major carriers for 2013 and 2014, it certainly would appear to be the case.
39More

The Daily Bell - Doug Casey on the Continuing Debasement of Money, Language and Banking... - 0 views

  • This isn't going to last because the way you get wealthy is by producing more than you consume and saving the difference – not by consuming more than you produce, and borrowing the difference. With the Fed keeping interest rates at artificially low levels, hoping to increase consumption, they're making it very foolish to save – when you get ½% or 1% on your savings. So people are saving less and they're borrowing more than they otherwise would. This is a formula for making things worse, not better.
  • They are, idiotically, doing exactly the opposite of what they should be.
  • In point of fact, the Fed should be abolished; the market, not bureaucrats, should determine interest rates. We wouldn't be in this pickle to start with if the government wasn't involved in the economy.
  • ...35 more annotations...
  • The Chinese, the Japanese – everybody is selling, trying to pass the Old Maid card of US Government debt, which represents return–free risk. Nobody other than the Fed is buying, and interest rates would skyrocket if they stopped. The more QE there is, the more distortions it will cause, however, making for a bigger disaster the longer it goes on.
  • Will the Fed continue to inflate the money supply? Doug Casey: They have to, because with the huge amount of debt in the world – and the amount of debt in the world has increased something like 40 or 50% just since the Greater Depression started – if they don't keep increasing the amount of money in the world then nobody's going to be able to service the huge amount of debt that is out there. So I don't see anything changing in the years to come. They've truly painted themselves into a corner. They're caught between Scylla and Charybdis, and we don't have Odysseus steering the ship of state.
  • Let me say, again, that the Fed serves no useful purpose and it should be abolished. Central banks create "super money" by buying government or other debt with new currency units that they credit to the sellers' accounts at commercial banks. That's the actual engine of inflation.
  • But it's greatly compounded in the commercial banking system through fractional reserve lending – which would not be possible without a central bank. Fractional reserve lending allows banks to multiply the money supply several times.
  • If $100 of Fed super money, freshly created, is deposited in a commercial bank like Chase or Citibank, then $90 can be lent out with a 10% reserve, the current number. That money is redeposited. They'll then lend out 90% of that $90, or $81, and then 90% of that $81, so it multiplies.
  • Central banking and fractional reserve lending go hand-in-hand.
  • Without a central bank, any bank that engaged in fractional reserve banking would be considered guilty of fraud and, when discovered, would be punished by a bank run, followed by criminal charges. The point to be made here is that the entire banking system today is totally unsound and totally corrupt.
  • In a sound banking system you have two types of deposits – checking account (or demand) deposits, and savings account (or time) deposits. They are completely different businesses. With demand deposits, you pay the bank to store your money securely, and write checks against it. A bank should no more lend out demand deposit money than Allied Storage should lend out the furniture you're paying them to store.
  • Savings accounts are completely different. Here you lend money to a bank, perhaps at 3%, and they relend it at 6%, making 3% to cover costs, risks and profits. A sound bank not only has to match the maturities of its deposits with the maturities of its loans, but must insure loans are both highly secured and self-liquidating.
  • These principles have been totally lost. Today banks operate as hedge funds.
  • As an aside, if someone were to set up a well-capitalized 100% reserve bank in a tax haven, especially using gold as an alternative currency, it would be immensely successful in the years to come – when most all conventional banks will fail.
  • By all historical, normal parameters, the stock market is greatly overvalued.
  • The trillions of new currency units that the Fed is creating are creating bubbles, and one of them is in the stock market. The biggest bubble, of course, is in the bond market – that's a super bubble.
  • Not only does the dollar have no real value but the banks you keep it in are all insolvent.
  • There are few sound investments out there. Today there are no investments; there are only speculations.
  • From the economist's point of view, the bubbles created by central banking are a disaster, but from a speculator's point of view they're a godsend. It's becoming harder and harder to be an investor; I define an investor as someone who allocates capital to productive business. It's hard to be an investor because you now have to spend more money on lawyers than on engineers and workers if you want to produce something. You're increasingly forced to be a speculator in today's climate.
  • Stock and bond markets all over the world are overpriced – with the exception of Russian stocks right now; they could be a very interesting speculation. I wouldn't touch anything in China yet, because all the Chinese banks are going to go bust.
  • The Chinese have been more profligate inflating the yuan than the Americans have been with the dollar. It's fantastic what the Chinese have done since Deng liberalized the economy in the early '80s, but now's not a time to be in their markets.
  • You've got to remember there are two types of people in the world: people who want to control material reality and people who want to control other people.
  • It's that second type who go into politics. They play games – here it's called the Great Game, which dignifies it in a way it shouldn't be – with other people's lives and property. It's been this way ever since the state was created about 5,000 years ago, and I don't think you should play games with other people's lives.
  • On the bright side, there are more scientists and engineers alive today than in all of human history put together, and so technology is advancing more rapidly than ever for that reason. That's a huge plus.
  • The second good thing is that the average person, at least those who aren't on welfare, tries to produce more than he consumes. That creates capital.
  • But I'm afraid that Western civilization reached its peak before World War I. World War I destroyed a huge amount of capital and, more importantly, it changed the moral bases of so many things.
  • Then World War II institutionalized the State as the most important part of society – which is perverse, because the state is actually the enemy of civil society.
  • I think Western civilization reached its peak in 1913, when it reached its maximum geographical extent. That was coincidental with the peak of its technological and philosophical influence on the world, much the way the Roman Empire reached its peak at about the end of the first century, then went down, slowly at first and then quickly. That's what's happening to the West.
  • Relative to the rest of the world, and contribution to world production, our piece of the economic pie is getting smaller and smaller. If we have another serious war it would be absolutely smaller, and the final nail in the coffin. Meanwhile, the US, with its bloated military, is just itching for another war. It's out of control, and unlikely to change at this point. That's a big trend that is in motion that I think is going to stay in motion.
  • Europe is in particularly bad shape. The place is a fascist/socialist disaster.
  • It was possible for the average European to keep his head above water through tax evasion in the past, but now those governments have broken bank secrecy everywhere, and it will destroy a lot of capital.
  • The "nation-state" is a really stupid and dysfunctional idea, and I'm glad it's on its way out.
  • That said, even the US, which from a cultural point of view is as much of a country as any place in the world, should actually break up into at least five or six regions.
  • Canada should break up into at least five or six regions initially.
  • I don't think politically; politics is the problem, not the solution. I think that the ideal solution is for every individual to opt out of the current system. When they give a war, you don't come. When they give a tax, you don't pay. When they give an election, you don't vote. You even try not to use their currency and their banking system. T
  • he ideal thing is to let the system collapse under its own weight as opposed to starting a new political party and then continuing to act politically, which is to say to use force on other people.
  • Market risk is huge today, but political risk is even bigger. One indication of that was, when the banks in Cyprus went bust some months ago, the government essentially confiscated everybody's account above 100,000 euros, in what they called a "bail-in."
  • You need several options. It seems like people haven't learned anything from what happened in Russia in 1917, Germany in 1933, China in 1948, Cuba in 1959, or Vietnam in 1975. Rwanda, Cambodia, Yugoslavia, Zimbabwe, Ukraine, Syria ... there are lots of examples and these things can and will eventually happen almost everywhere. When the chimpanzees go crazy, you don't want to be where they are. You've got to have a Plan B. You've got to have a crib out of that political jurisdiction. Acting like a plant, and staying put, isn't a good survival strategy for a human.
  •  
    "Doug Casey: I don't see a real recovery until they stop debasing the currency, radically cut government spending and taxation and eliminate most regulation. In other words, cease doing the things that caused this depression. And that's not going to happen until there's a collapse of the current order. Things have cyclically improved since the height of the crisis of 2008-09. The trillions of currency units created by the Federal Reserve have jammed the stock market higher and kept the big banks from going under. What surprises me is that retail prices have not moved as significantly as I would have expected. The reason, I believe, is that most of that money is still sitting in financial institutions. It has gone into cash out of fear, into stocks because they represent real wealth with earning power and into various speculative assets like artwork and collectible cars. Real estate has recovered somewhat, not because of strong fundamentals but strictly because of money creation. This isn't going to last because the way you get wealthy is by producing more than you consume and saving the difference - not by consuming more than you produce, and borrowing the difference. With the Fed keeping interest rates at artificially low levels, hoping to increase consumption, they're making it very foolish to save - when you get ½% or 1% on your savings. So people are saving less and they're borrowing more than they otherwise would. This is a formula for making things worse, not better. They are, idiotically, doing exactly the opposite of what they should be. Although, I hasten to add, I hate to pontificate on what the Fed "should" do. In point of fact, the Fed should be abolished; the market, not bureaucrats, should determine interest rates. We wouldn't be in this pickle to start with if the government wasn't involved in the economy. In fact, if it wasn't for the state, I suspect we'd all have a vastly higher standard of living, and would be colonizing the Moon, Mars and
20More

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
1More

The Keynesian Endpoint: A Gold Medal in Economic Incompetence - 0 views

  •  
    They fought the correction; the correction won. We refer to Bernanke, Summers, Obama, Geithner, Krugman - the whole lot of them. They added three trillion dollars to US debt in the last two years. In two more years the debt will be at 100% of GDP. Add in the debts they've guaranteed - from Fannie Mae, for example, and state and local debt implicitly backed by the feds - and you're already at 150% of GDP. Worse than Greece, in other words.
1More

Thoughts from the Frontline : Six Impossible Things by John Mauldin - 0 views

  •  
    Funny but a year ago we were hearing quite a bit of noise about the "End of Capitalism".  Today, the world is looking at the "End of Socialism".  How quickly things change. Six Impossible Things I have written several letters over the years about the basic economic equation GDP = C + I + G + (Net Exports) Which is to say, that Gross Domestic Product in a country is equal to total Consumption (personal and business) plus Investments plus Government Spending plus next exports. This equation is known as an identity equation. It is true for all countries and times. Now, gentle reader, I am going to spare you a few pages of algebra and cut to the chase. Let's divide a country's economy into three sections, private, government and exports. If you play with the variables a little bit you find that you get the following equation. Domestic Private Sector Financial Balance + Governmental Fiscal Balance - the Current Account Balance (or Trade Deficit/Surplus) = 0 This equation was introduced to you a few months ago in an Outside the Box written by Rob Parenteau. We are going to review this briefly, as it is VERY important. Paragraphs in quotes will be from that letter. As Rob noted, "...keep in mind this is an accounting identity, not a theory. If it is wrong, then five centuries of double entry book keeping must also be wrong." By Domestic Private Sector Financial Balance we mean the net balance of business and consumers. Are they borrowing money or paying down debt? Government Fiscal Balance is the same: is the government borrowing or paying down debt? And the Current Account Balance is the trade deficit or surplus. The implications are simple. The three items have to add up to zero. That means you cannot have both surpluses in the private and government sectors and run a trade deficit. You have to have a trade surplus.
1More

Our $7.4 Trillion Bailout | John Carney ClusterStock - 0 views

  •  
    How is it that anyone can claim with a straight face that the government will likely make money from its various bailout investments? We suspect that anyone saying this is completely out of touch with the size of the losses, bailout funds and emergency lending programs. Because if you add those up, as Bloomberg did today, they amount to more than $7.4 trillion dollars. And it's growing. Where's all that money coming from?
1More

Naked Capitalism: "Only 21% Say U.S. Government Has Consent of the Governed ... - 0 views

  •  
    A new Rasmussen poll finds: The founding document of the United States, the Declaration of Independence, states that governments derive "their just powers from the consent of the governed." Today, however, just 21% of voters nationwide believe that the federal government enjoys the consent of the governed. *** Seventy-one percent (71%) of all voters now view the federal government as a special interest group, and 70% believe that the government and big business typically work together in ways that hurt consumers and investors.That helps explain why 75% of voters are angry at the policies of the federal government, and 63% say it would be better for the country if most members of Congress are defeated this November… In his new book, In Search of Self-Governance, Scott Rasmussen observes that the American people are "united in the belief that our political system is broken, that politicians are corrupt, and that neither major political party has the answers." He adds that "the gap between Americans who want to govern themselves and the politicians who want to rule over them may be as big today as the gap between the colonies and England during the 18th century." *** Sixty percent (60%) of voters think that neither Republican political leaders nor Democratic political leaders have a good understanding of what is needed today. Thirty-five percent (35%) say Republicans and Democrats are so much alike that an entirely new political party is needed to represent the American people. Nearly half of all voters believe that people randomly selected from the phone book could do as good a job as the current Congress.
1More

Offshoring has destroyed the economy :      Information Clearing House: ICH - 0 views

  •  
    Good read!  Many thanks to the mighty marbux for the link.  Be sure to catch the YouTube video series featuring Sir James Goldsmith congressional testimony decrying free trade and corporatism. excerpt: "May 31, 2011 "Information Clearing House" --These are discouraging times, but once in a blue moon a bit of hope appears. I am pleased to report on the bit of hope delivered in March of 2011 by Michael Spence, a Nobel prize-winning economist, assisted by Sandile Hlatshwayo, a researcher at New York University. The two economists have taken a careful empirical look at jobs offshoring and concluded that it has ruined the income and employment prospects for most Americans. To add to the amazement, their research report, "The Evolving Structure of the American Economy and the Employment Challenge," was published by the very establishment Council on Foreign Relations. http://www.cfr.org/industrial-policy/evolving-structure-american-economy-employment-challenge/p24366  For a decade I have warned that US corporations, pressed by Wall Street and large retailers such as Wal-Mart, to move offshore their production for US consumer markets, were simultaneously moving offshore US GDP, US tax base, US consumer income, and irreplaceable career opportunities for American citizens.
1More

U.S. Federal Deficits, Presidents, and Congress - 1 views

  •  
    Last updated 6/30/2011.  Awesome tabulation of the numbers.  Stephen Boch runs the deficit spending - deficit numbers for each President going back to 1911, about the time when the Federal Reserve, the IRS, and the Income Tax were first conceived.  He also adjust for inflation.  Not surprisingly, the Obama-Bush 2008-2009 debacle rattles the teeth.  The conversion of private Bankster debt into national "public" debt that took place during that shared fiscal year is something else.  Although Mr. Boch is primarily concerned about War and Budgets, Presidential and Congressional party affiliations, and their impact on the debt; there is nothing in the history of the USA that compares to what the Banksters have done.  Even if you add up the total debt of Bush and Obama, it doesn't come close to the $23 Trillion the Banksters sacked us with.  But then, without the full and complete complicity of Bush and Obama, and their Congresses, the Banksters could not have pulled this off.
1More

Interview with Harold Hamm: How North Dakota Became Saudi Arabia - WSJ.com - 0 views

  •  
    A USA Oil and Natural Gas revolution - WSBJ Stephen Moore interview Harold Hamm of Continental Resources.  Hamm recounts his discussion with the watermelon in chief, Obama. (Green on the outside and red on the inside).  Seems Obama really believes his green energy will totally replace oil and natural gas within the next five years.  What an idiot. excerpt: Harold Hamm, the Oklahoma-based founder and CEO of Continental Resources, the 14th-largest oil company in America, is a man who thinks big. He came to Washington last month to spread a needed message of economic optimism: With the right set of national energy policies, the United States could be "completely energy independent by the end of the decade. We can be the Saudi Arabia of oil and natural gas in the 21st century." "President Obama is riding the wrong horse on energy," he adds. We can't come anywhere near the scale of energy production to achieve energy independence by pouring tax dollars into "green energy" sources like wind and solar, he argues. It has to come from oil and gas. You'd expect an oilman to make the "drill, baby, drill" pitch. But since 2005 America truly has been in the midst of a revolution in oil and natural gas, which is the nation's fastest-growing manufacturing sector. No one is more responsible for that resurgence than Mr. Hamm. He was the original discoverer of the gigantic and prolific Bakken oil fields of Montana and North Dakota that have already helped move the U.S. into third place among world oil producers. How much oil does Bakken have? The official estimate of the U.S. Geological Survey a few years ago was between four and five billion barrels. Mr. Hamm disagrees: "No way. We estimate that the entire field, fully developed, in Bakken is 24 billion barrels."
1More

Meltdown | Thomas E Woods, Jr. - YouTube - 0 views

  •  
    Tom Woods speaking in Boulder, Co.  This video is 1 hour long, but it may be the best 1 hour ever spent!  Should be mandatory viewing for every American before they enter the voting booth.  Hayek and the Austrian Business - Economic cycle theory are fully explained and applied to historical cycles of boom and bust, with particular attention, very humurous attention i might add, to the 2001 and 2008 financial collapse. One thing puzzles me though.  I kept wondering how it is we restructure the banking system?  Killing the Federal reserve is just the start.  But how do we "free" the market balance of investment, resources and savings from the disruption of artificial or mistaken interest rates?  It seems to me that Banks have always had difficulty with the allocation of investment resources - "capital" with a K. As i listened to Tom, totally captured by his engaging presentation, the depths of his thinking, and the humorous delivery, i couldn't help but think that one way of ending the vicious cycles of interest rate buffoonery would be to end the Federal Bankster Reserve, put the currency into the hands of the US Treasury, with the States electing currency governors to control the Treasury; but fixing the interest rate of treasury currency to the value of "Lawful money" as defined in the Constitution to be that which is redeemable in Gold or Silver.  As in, the historical value of the dollar = 371.25 troy grains of silver.  The fact is, "Lawful money" is a Constitutional requirement. Today we have two kinds of dollars: fiat, or funny money, and, Lawful money.  The conversion rate between fiat dollars and Gold is once again near $1700 per ounce.  My question is; How do we derive a "Lawful Interest Rate" from the ratio of fiat to "Lawful money"?  Seems to me that for the Austrian business cycle to work, some guidance to a "Lawful Interest Rate" must be outlined.
1More

American Thinker: Whose Mess? - 0 views

  •  
    Economic comparison that describes the prosperity differences between a Republican led congress and a Democratic controlled congress. Excerpt: If you want to give Bill Clinton credit for economic results during his terms, you have to link those results to his policies.  If you want to give him credit for those policies, you must admit that they were virtually all in line with Republican rhetoric and antithetical to modern liberalism. But here's what you can't do and remain intellectually honest:  praise Clinton and damn Bush, and then encourage Obama to do the exact opposite of what Clinton did and to add multiple trillions of dollars to Bush's spending and deficit levels. Conservatives like me have always encouraged tax rate cuts, spending cuts, free trade and eliminating government programs like welfare and the byzantine farm program.  Reagan did what he could (with a Democrat-controlled House the entire time), and the economy grew 3.5% annually over his eight years.  Clinton did these things as well (with Republicans controlling both houses of Congress his last six years), and the economy grew 3.8% annually over his eight years. This is not hard: cut taxes, cut spending, cut programs.  Oh, and elect Republicans to the Senate.  At least that's what the facts say.
7More

NSA Spying Inspires ProtonMail 'End-to-End' Encrypted Email Service | NDTV Gadgets - 0 views

  • ne new email service promising "end-to-end" encryption launched on Friday, and others are being developed while major services such as Google Gmail and Yahoo Mail have stepped up security measures.A major catalyst for email encryption were revelations about widespread online surveillance in documents leaked by Edward Snowden, the former National Security Agency contractor."A lot of people were upset with those revelations, and that coalesced into this effort," said Jason Stockman, a co-developer of ProtonMail, a new encrypted email service which launched Friday with collaboration of scientists from Harvard, the Massachusetts Institute of Technology and the European research lab CERN.Stockman said ProtonMail aims to be as user-friendly as the major commercial services, but with extra security, and with its servers located in Switzerland to make it more difficult for US law enforcement to access.
  • "Our vision is to make encryption and privacy mainstream by making it easy to use," Stockman told AFP. "There's no installation. Everything happens behind the scenes automatically."Even though email encryption using special codes or keys, a system known as PGP, has been around for two decades, "it was so complicated," and did not gain widespread adoption, Stockman said.After testing over the past few months, ProtonMail went public Friday using a "freemium" model a basic account will be free with some added features for a paid account.
  • By locating in Switzerland, ProtonMail hopes to avoid the legal woes of services like Lavabit widely believed to be used by Snowden which shut down rather than hand over data to the US government, and which now faces a contempt of court order.Even if a Swiss court ordered data to be turned over, Stockman said, "we would hand over piles of encrypted data. We don't have a key. We never see the password."
  • ...3 more annotations...
  • As our users from China, Iran, Russia, and other countries around the world have shown us in the past months, ProtonMail is an important tool for freedom of speech and we are happy to finally be able to provide this to the whole world," the company said in a blog post.Google and Yahoo recently announced efforts to encrypt their email communications, but some specialists say the effort falls short."These big companies don't want to encrypt your stuff because they spy on you, too," said Bruce Schneier, a well-known cryptographer and author who is chief technology officer for CO3 Systems."Hopefully, the NSA debate is creating incentives for people to build more encryption."Stockman said that with services like Gmail, even if data is encrypted, "they have the key right next to it if you have the key and lock next to each other, so it's pretty much useless."
  • Lavabit founder Ladar Levison meanwhile hopes to launch a new service with other developers in a coalition known as the "Dark Mail Alliance."Levison told AFP he hopes to have a new encrypted email system in testing within a few months and widely available later this year."The goal is to make it ubiquitous, so people don't have to turn it on," he said.But he added that the technical hurdles are formidable, because the more user-friendly the system becomes, "the more susceptible it is to a sophisticated attacker with fake or spoofed key information."Levison said he hopes Dark Mail will become a new open standard that can be adopted by other email services.
  • on Callas, a cryptographer who developed the PGP standard and later co-founded the secure communications firm Silent Circle, cited challenges in making a system that is both secure and ubiquitous."If you are a bank you have to have an email system that complies with banking regulations," Callas told AFP, which could allow, for example, certain emails to be subject to regulatory or court review."Many of the services on the Internet started with zero security. We want to start with a system that is totally secure and let people dial it down."The new email system would complement Silent Circle's existing secure messaging system and encrypted mobile phone, which was launched earlier this year."If we start competing for customers on the basis of maximum privacy, that's good for everybody," Callas said.
  •  
    They're already so swamped that you have to reserve your user name and wait for an invite. They say they have to add servers. Web site is at https://protonmail.ch/ "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones. It's as simple as visiting our site and logging in. There are no plugins or apps to install - simply use your favorite web browser." "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones.
8More

"Top secret" Shin Bet memo suggested dead Arafat would benefit Israel | The Electronic ... - 0 views

  • A “top secret” Israeli intelligence memo from 2000 concluded that the “disappearance” of Palestinian leader Yasser Arafat would be beneficial to Israel. The memo, revealed in a book to be published this week by British-Israeli political scientist Ahron Bregman, adds evidence to support the thesis that Arafat, who died in November 2004 in a French military hospital, was assassinated. The Electronic Intifada obtained an advance copy of Bregman’s book, Cursed Victory: A History of Israel and the Occupied Territories (Penguin).
  • Bregman himself is circumspect about whether Israel had a hand in Arafat’s death, but sees a number of clues, including public statements by then Prime Minister Ariel Sharon that Israel wanted him dead and was prepared to kill him. Yet Bregman finds a “clear indication that the Israelis did intend to kill Arafat” in a “Top Secret” document dated 15 October 2000 – a few months before Sharon came to power and a few weeks into the second Palestinian uprising – from the Shabak, Israel’s General Security Service (also known as Shin Bet).
  • Bregman then describes the document’s reasoning and conclusions: After going through “why Arafat is necessary,” and then “why Arafat is not necessary,” the document says that “the damage [Arafat] causes is bigger than his benefits….” And the subsequent conclusion is straightforward: “7. Arafat, the person, is a serious threat to the security of the state. His disappearance outweighs the benefits of his continuing existence.” And yet, even this Shabak “Top Secret” report does not provide us with enough evidence of assassination and we will probably have to wait for more information to ascertain what really killed Arafat.
  • ...4 more annotations...
  • Al Jazeera English investigative reporting since 2012 has revealed that Arafat’s personal effects contained high levels of the radioactive element polonium. Independent Swiss scientists later conducted tests on Arafat’s exhumed remains and concluded there was “moderate” support for the theory that Yasser Arafat was poisoned. While separate French and Russian scientific reports, also based on samples of Arafat’s remains, cast doubt on the conclusions by the Swiss radiation scientists at the Radiophysics Institute in Lausanne, the Swiss have hit back explaining why the French conclusions were flawed.
  • The French and Russian reports – unlike the Swiss findings – were never made public, but the Swiss scientists obtained copies and have explained, in an article in the Swiss magazine Le Temps last month, why the French and Russian test results actually support their conclusions. All three reports found high levels of polonium-210 in Arafat’s body. “Not only were the levels of polonium of the same order” in all three reports, Le Temps says, “but the scientists also noted similar differences” among the samples from different parts of Arafat’s remains. The key difference was not therefore in the test results, but in the interpretation.
  • The French concluded that the high level of the radioactive element was caused by radon, a naturally occurring element in the environment, but had not taken any measurements from the surrounding area to support this thesis. According to the Swiss, the French conclusion amounts to speculation. The more thorough Swiss, by contrast, did take samples from the surrounding area. Le Temps reports: “The Swiss anticipated the possible interference of radon. In their report they demolish the hypothesis. Not only was the level of radon in the sealed tomb very weak, but the soil situated under [Arafat’s] abdominal cavity, and therefore in contact with the body, was 17 times more ‘contaminated’ than soil situated far from the body.”
  • The presence of radon, which would be the same throughout the area, could not possibly explain such concentrations. While the Swiss findings look stronger than ever, the debate continues. Bregman’s revelations add a new, albeit circumstantial element, showing that Israeli intelligence, which has assassinated many Palestinian leaders, saw a rationale for eliminating Arafat as well.
  •  
    For those who support secret violence by governments, may the fleas of a thousand camels infest your armpits for the remainder of your lives.  
5More

Tomgram: Dilip Hiro, Behind the Coup in Egypt | TomDispatch - 0 views

  • Given how long the United States has been Egypt’s critical supporter, the State Department and Pentagon bureaucracies should have built up a storehouse of understanding as to what makes the Land of the Pharaohs tick. Their failure to do so, coupled with a striking lack of familiarity by two administrations with the country’s recent history, has led to America’s humiliating sidelining in Egypt. It’s a story that has yet to be pieced together, although it’s indicative of how from Kabul to Bonn, Baghdad to Rio de Janeiro so many ruling elites no longer feel that listening to Washington is a must.
  • The helplessness of Washington before a client state with an economy in freefall was little short of stunning. Pentagon officials, for instance, revealed that since the “ouster of Mr. Morsi,” Defense Secretary Chuck Hagel had had 15 telephone conversations with coup leader General Sisi, pleading with him to “change course” -- all in vain. Five weeks later, the disjuncture between Washington and Cairo became embarrassingly overt. On September 23rd, the Cairo Court for Urgent Matters ordered the 85-year-old Muslim Brotherhood disbanded. In a speech at the U.N. General Assembly the next day, President Obama stated that, in deposing Morsi, the Egyptian military had “responded to the desires of millions of Egyptians who believed the revolution had taken a wrong turn.” He then offered only token criticism, claiming that the new military government had “made decisions inconsistent with inclusive democracy” and that future American support would “depend upon Egypt's progress in pursuing a more democratic path.” General Sisi was having none of this. In a newspaper interview on October 9th, he warned that he would not tolerate pressure from Washington “whether through actions or hints.” Already, there had been a sign that Uncle Sam’s mild criticism was being diluted. A day earlier, National Security Council spokeswoman Caitlin Hayden stated that reports that all military assistance to Egypt would be halted were “false.”
  • In early November, unmistakably pliant words came from Secretary of State John Kerry. “The roadmap [to democracy] is being carried out to the best of our perception,” he said at a press conference, while standing alongside his Egyptian counterpart Nabil Fahmy during a surprise stopover in Cairo. “There are questions we have here and there about one thing or another, but Foreign Minister Fahmy has reemphasized to me again and again that they have every intent and they are determined to fulfill that particular decision and that [democratic] track.”
  • ...1 more annotation...
  • By this time, the diplomatic and financial support of the oil rich Gulf States ruled by autocratic monarchs was proving crucial to the military regime in Cairo. Immediately after the coup, Saudi Arabia, Kuwait, and the United Arab Emirates (UAE) poured $12 billion into Cairo's nearly empty coffers. In late January 2014, Saudi Arabia and the UAE came up with an additional $5.8 billion. This helped Sisi brush off any pressure from Washington and monopolize power his way.
  •  
    Add Egypt to the score card of nations departing from U.S. control, with the U.S. still shoving money at it. (The Egyptian generals told the U.S. that they would cut a weapons deal with Russia if the U.S. stopped providing them. Of course when the profits of the U.S. armaments industry and Israel's imperial ambitions are involved, incredible human rights violations don't look nearly as bad in the White House. And note that the Egyptian generals were assisted in their escape by the House of Saud, United Arab Emirates, and Qatar. Note that I've added a new tag, "nations-jumping-ship" to begin tracking what nations formerly under U.S. control are jumping off the U.S. ship.
6More

FBI demands new powers to hack into computers and carry out surveillance | US news | Th... - 0 views

  • The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world. Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violate first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight. The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.
  • “This is a giant step forward for the FBI’s operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move,” said Ahmed Ghappour, an expert in computer law at University of California, Hastings college of the law, who will be addressing next week’s hearing. The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district. But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.
  • Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.
  • ...2 more annotations...
  • Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week’s meeting: “This should not be the first public forum for discussion of an issue of this magnitude.” Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that “this is an investigative technique that we haven’t seen before and we haven’t thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved.” Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.
  • Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that. In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as “a search of foreign property known to contain criminal evidence, for which a warrant was not necessary”.
  •  
    This rule change has been in the works during the last year.  "The change is designed specifically to help federal investigators carry out surveillance on computers that have been "anonymized" - that is, their location has been hidden using tools such as Tor."  Are we dizzy yet? The State Department is pushing the use of TOR by dissidents in nations whose governments State and the CIA intends to overthrow. Meanwhile, Feed Bag, Inc. wants use of TOR to be sufficient grounds for installing malware on anyone using it to make their systems and all their systems can see or hear be an open book. Let's see. There's the First Amendment right to anonymous speech just to begin with. McIntyre v. Ohio Elections Comm'n, 514 US 334 (1995). ("Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation-and their ideas from suppression-at the hand of an intolerant society. The right to remain anonymous may be abused when it shields fraudulent conduct. But political speech by its nature will sometimes have unpalatable consequences, and, in general, our society accords greater weight to the value of free speech than to the dangers of its misuse.") (Internal citation omitted.) And of course there's the Natural Law liberty to whisper, to utter words in a way that none but the intended recipient can hear. So throw on the violation of the Fifth Amendment's Liberty clause. Then there's the plain language of the Fourth Amendment warrant clause, "particularly describing the *place* to be searched." Not to mention the major reason for the Fourth Amendment, to abolish the "general warrant" that had enabled the Crown to search wherever the warrant's executor's little heart desired.  And th
5More

CIA Torture Report: Oversight, But No Remedies Yet - 0 views

  • The release of the executive summary of the Senate Intelligence Committee report on CIA’s post-9/11 interrogation program is, among other things, an epic act of record preservation. Numerous CIA records that might not have been disclosed for decades, or ever, were rescued from oblivion by the Senate report and are now indelibly cited and quoted, even if many of them are not yet released in full. That’s not a small thing, since the history of the CIA interrogation program was not a story that the Agency was motivated or equipped to tell. “The CIA informed the Committee that due to CIA record retention policies, the CIA could not produce all CIA email communications requested by the Committee,” the report noted, explaining that the desired information was sometimes recovered from a reply message when the original email was missing. Agency emails turned out to be a critical source of information, a fact that illuminates the Committee’s sharp response recently to the (now suspended) CIA proposal to the National Archives (NARA) to destroy most Agency emails of non-senior officials.
  • Thus, the gruesome record of the waterboarding of al Qaeda operative Abu Zubaydah “was referenced in emails, but was not documented or otherwise noted in CIA cables.” (This is at odds with NARA’s initial view that “It is unlikely that permanent records will be found in these email accounts that is not filed in other appropriate files.”) The Committee report is also a remarkable demonstration of the congressional oversight function that is all the more impressive because it was performed in adverse, unfavorable conditions. It is striking to see how the CIA sometimes treated the Senate Intelligence Committee, its leadership and its staff with the same disdain and evasiveness that is often perceived by FOIA requesters and other members of the public. Committee questions were ignored, inaccurate information was provided, and the oversight process was gamed.
  • “Internal CIA emails include discussion of how the CIA could ‘get… off the hook on the cheap’ regarding [then-Committee] Chairman [Bob] Graham’s requests for additional information…. In the end, CIA officials simply did not respond to Graham’s requests prior to his departure from the Committee in January 2003,” the report said. “I am deeply disturbed by the implications of the study for the committee’s ability to discharge its oversight responsibility,” wrote Sen. Angus King (I-Maine) in his additional remarks. “Because it appears from the study that the committee was continuously misled as to virtually all aspects of this program, it naturally raises the extremely troubling question as to whether we can trust the representations of the agency in connection with difficult or sensitive issues in the future.” But minority members of the Committee disputed this characterization: “In reality, the overall pattern of engagement with the Congress shows that the CIA attempted to keep the Congress informed of its activities,” they wrote in their extensive dissenting views. Perhaps the most important achievement of the Committee report was to document and memorialize the fact that agents of the US Government practiced torture. Not “harsh measures” or “enhanced techniques,” but torture.
  • ...2 more annotations...
  • Senator Susan Collins (R-Maine), who criticized what she said were methodological flaws in the Committee report, said in her additional views that “Despite these significant flaws, the report’s findings lead me to conclude that some detainees were subject to techniques that constituted torture. This inhumane and brutal treatment never should have occurred.” By the same token, the most important omission from the report is the absence of any discussion of remedies. Now that it is firmly established that “we tortured some folks,” as President Obama awkwardly put it, the question is what to do about it. Confession without atonement is incomplete. Prosecution seems problematic for a number of reasons, including the difficulty of localizing responsibility, when it is entire institutions and not just particular officials that failed. A different approach to the problem would start by considering the individuals who suffered abuse at the hands of the U.S. government, including a number of persons who were detained in error. Congress could now ask how some of them (i.e. those who are still alive) could be compensated in some measure for what was wrongly done to them.
  • Several previous efforts to seek remedies for torture were deflected by use of the state secrets privilege. In light of the detailed findings of the Senate Intelligence Committee report, that sort of evasion should be harder to sustain. Congress could accelerate a resolution of the problem with a focused investigation of what potential remedies are now feasible and appropriate.
« First ‹ Previous 61 - 80 of 282 Next › Last »
Showing 20 items per page