Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged application

Rss Feed Group items tagged

Gary Edwards

A Battering Ram Becomes a Stonewall - WSJ.com - 0 views

  • "I don't know." "I don't remember." "I'm not familiar with that detail." "It's not my precise area." "I'm not familiar with that letter." These are quotes from the Internal Revenue Service officials who testified this week before the House and Senate. That is the authentic sound of stonewalling, and from the kind of people who run Washington in the modern age—smooth, highly credentialed and unaccountable. They're surrounded by legal and employment protections, they know how to parse a careful response, they know how to blur the essential point of a question in a blizzard of unconnected factoids. They came across as people arrogant enough to target Americans for abuse and harassment and think they'd get away with it. So what did we learn the past week, and what are the essentials to keep in mind?
  • We learned the people who ran and run the IRS are not going to help Congress find out what happened in the IRS. We know we haven't gotten near the bottom of the political corruption of that agency. We do not know who ordered the targeting of conservative groups and individuals, or why, or exactly when it began. We don't know who executed the orders or directives. We do not know the full scope or extent of the scandal. We don't know, for instance, how many applicants for tax-exempt status were abused.
  • With all the talk and the hearings and the news reports, it is important to keep the essentials of this story in mind.
  • ...4 more annotations...
  • First, only conservative groups were targeted in this scandal by the IRS. Liberal or progressive groups were not targeted. The IRS leaked conservative groups' confidential applications and donor lists to liberal groups, never the other way around.
  • This was a political operation. If it had not been, then the statistics tell us left-wing groups would have been harassed and abused, and seen their applications leaked to the press.
  • And all of this apparently took place in the years leading up to the 2012 election. Meaning that before that election, groups that were anti-Obamacare, or pro-life, or pro-Second Amendment or constitutionalist, or had words like "tea party" or "patriot" in their name—groups that is that would support Republicans, not Democrats—were suppressed, thwarted, kept from raising money and therefore kept from fully operating.
  • if what happened at the IRS is not stopped now—if the internal corruption within it is not broken—it will never stop, and never be broken. The American people will never again be able to have the slightest confidence in the revenue-gathering arm of their government. And that, actually, would be tragic.
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

A summary of the Bureau's application to the European Court of Human Rights | The Burea... - 0 views

  • The Bureau of Investigative Journalism has made an application to the European Court of Human Rights asking the court to rule on whether UK legislation adequately protects journalistic communications from government mass surveillance programs.  The case was filed in the court on September 12 2014. Lawyers working on the case include Gavin Millar QC at Doughty Street Chambers, Conor McCarthy at Monckton chambers and Rosa Curling at Leigh Day solicitors. The Bureau will publish all documents related to this case in due course. Below is the summary of the case:
Paul Merrell

Hackers Stole Secrets of U.S. Government Workers' Sex Lives - The Daily Beast - 0 views

  • It was already being described as the worst hack of the U.S. government in history. And it just got much worse.A senior U.S. official has confirmed that foreign hackers compromised the intimate personal details of an untold number of government workers. Likely included in the hackers’ haul: information about workers’ sexual partners, drug and alcohol abuse, debts, gambling compulsions, marital troubles, and any criminal activity.Those details, which are now presumed to be in the hands of Chinese spies, are found in the so-called “adjudication information” that U.S. investigators compile on government employees and contractors who are applying for security clearances. The exposure suggests that the massive computer breach at the Office of Personnel Management is more significant and potentially damaging to national security than officials have previously said.
  • Three former U.S. intelligence officials told The Daily Beast that the adjudication information would effectively provide dossiers on current and former government employees, as well as contractors. It gives foreign intelligence agencies a roadmap for finding people with access to the government’s most highly classified secrets.Obama administration officials had previously acknowledged the breach of information that applicants voluntarily disclose on a routine questionnaire, called Standard Form 86, but the theft of the more detailed and wide-ranging adjudication information appears to have gone overlooked.
  • “Whoever compromised the adjudication information is going to have clear knowledge, beyond what’s in the SF86, about who the best targets for espionage are in the United States,” Michael Adams, a computer security expert who served more than two decades in the U.S. Special Operations Command, told The Daily Beast. “This is the most successful cyber attack in the history of the United States,” owing to the amount and quality of the information that was stolen, Adams said. U.S. intelligence officers spend years trying to recruit foreign spies to gather the kinds of details and insights that are contained in adjudication information, one former senior U.S. official said. This official, who requested anonymity, added that adjudication information would give foreign intelligence services “enormous leverage” over U.S. personnel whom they might forcibly interrogate for information or try to recruit.
  • ...4 more annotations...
  • The adjudication process had a broad scope, taking into account the SF86 questionnaire, reports from background investigations, interviews with the applicant's family members and associates, his or her employment history, and for people seeking high-level clearances, the results of polygraph investigations.Seymour said such records “span an employee’s career” and could stretch back as far as 30 years. Officials have said that as many as 18 million people may have been affected by the breach. Asked specifically what information the hackers had obtained, Seymour told lawmakers that she preferred to answer later in a “classified session.” Seymour didn’t specify how many people’s information was stolen. But the OPM oversees background investigations, which comprise a key part of the adjudication process, for more than 90 percent of security clearance applicants, according to the Congressional Research Service. An OPM spokesman didn’t respond to a request for comment in time for publication.
  • A former senior U.S. intelligence official, who asked to remain anonymous, said the OPM breach would cause more damage to national security operations and personnel than the leaks by Edward Snowden about classified surveillance by the National Security Agency.“This is worse than Snowden, because at least programs that were running before the leaks could be replaced or rebuilt,” the former official said. “But OPM, that’s the gift that keeps on giving. You can’t rebuild people.”Adjudicators are in a powerful position because in deciding whether to recommend granting a security clearance, they have access to the entire scope of an applicant’s file and are told to make a subjective analysis.“The adjudication process is the careful weighing of a number of variables known as the whole-person concept,” according to official guidelines. “Available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination.”
  • By design, adjudication is an invasive process, meant to unearth risk factors including drug and alcohol abuse, extramarital affairs, a history of violence, and other events that speak to a person’s “trustworthiness” and their susceptibility to blackmail or being recruited to spy for a foreign government.For instance, “compulsive gambling is a concern, as it may lead to financial crimes including espionage,” the guidelines say. Adjudicators are told to note “a pattern of compulsive, self-destructive, or high risk sexual behavior,” “relapse after diagnosis of alcohol abuse,” and “emotionally unstable, irresponsible, dysfunctional, violent, paranoid, or bizarre behavior,” among other warning signs in 13 categories. Some of the embarrassing personal details found in some adjudications have been made public. That’s what happens after an applicant who was denied a security clearance launched an appeal.
  • Armed with such intimate details of a person’s worst moments, foreign spies would have unprecedented advantage against their U.S. adversaries. And the news is especially bad for people who hold the highest levels of clearance, which require more rigorous background checks, noted Adams, the computer security expert. “The higher up you go in your sensitivity levels, the more data that’s in your adjudication file,” he said.
Gary Edwards

Judge Rules: Obama Social Security Card Fraud May Finally Get Answers | - 1 views

  • The reason for the judge’s amendment seems to be a procedural one. Taitz filed suit with the court prior to receiving word back from her Freedom of Information Act request, which she did receive on July 29, 2013 from Dawn S. Wiggins, a Fredom of Information Officer. Wiggins replied to Taitz: I have enclosed a copy of the SS-5s for Mr. Tsarnaev and Ms. Dunham. . . . We were unable to find any information for Mr. Bounel based on the information you provided to us. Mr. Bounel may not have applied for a Social Security number (SSN) or may have given different information on the application for a number.
  • The controversy over Barack Hussein Obama and his past, along with fraudulent documents continues to make headlines. Yet, the items needed to actually verify who Obama is continue to be kept from the public eye. Well, that all may be about to change. Attorney Orly Taitz may have just found a chink in the federal government’s armor in protecting Barack Obama from scrutiny, following a judge’s ruling over her Freedom of Information Act request from the Social Security Administration. Taitz has claimed that Obama uses the Social Security number of Harry Bounel and has submitted several Freedom of Information Act requests for the information from the Social Security Administration. Each time, she has been met with stonewalling by the Social Security Administration. However, Judge Ellen Lipton Hollander has ruled to give Taitz “an opportunity to file a second amended complaint and add allegations of SSA not doing a proper search and withholding records.”
  • Additionally, there is an increased tampering with the web site of Orly Taitz and with her ability to send mass -emails. It seems her private server is somehow affected and Taitz is unable to send mass e-mails on two different programs.
  • ...4 more annotations...
  • From Taitz’s Press Release: Judge Hollander in Maryland gives Attorney Orly Taitz 21 days to file a second amended complaint and add allegations in regards to an improper withholding by the Social Security Administration of records of Harry Bounel, whose Social security number is being illegally used by Barack Obama. When Taitz filed the complaint, SSA did not respond at all. After the law suit was filed, SSA responded by fraudulently claiming that the records were not found. Taitz responded that this is a fraudulent assertion, since the records were found before and denied to another petitioner due to privacy concerns, however Social Security has no right to claim privacy as according to their own 120 year rule they have a duty to release the records. The judge stated that the plaintiff Taitz might be correct, however at this time she cannot rule in her favor as her original complaint was filed before SSA responded, so the judge gave Taitz an opportunity to refile a second amended complaint and add new allegations, stating the SSA responded but improperly hidden the records . This is a great development. This all but assures that the judge will order the SSA to release the SS-5, Social Security application of resident of CT, Harrison (Harry) Bounel, whose CT SSN 042-68-4425 was stolen by Obama and used in Obama’s 2009 tax returns, which initially were posted on WhiteHouse.gov without proper redaction, without flattening of the file. Taitz will be very careful not to be Breitbarted or Fuddied in the next 21 days.
  • It’s interesting that Taitz points out that she will be “careful not to be Breitbarted or Fuddied,” indicating that she believes that both Andrew Breitbart and Andrew Breitbart and Loretta Fuddy were targeted by Obama for assassination.” Breitbart died on the very day that he said he would begin vetting Obama for the 2012 elections, which raised suspicions. Fuddy, best remembered as being instrumental in issuing the Hawaii long-form birth certificate, was the only person to die aboard a small plane that crashed off the coast of Hawaii last week. Already, there are questions surrounding the narrative of her death.
  • Taitz alleged that Mr. Bounel was born in 1890, and therefore, under the “’120 Year Rule’ implemented by the SSA in 2010,” pertaining to “‘extremely aged individuals,’” Bounel’s “Social Security applications have to be released under FOIA without proof of [his] death . . . .”
  • It appears that once the amendment is submitted, this may force the Social Security Administration to explain exactly what is going on with Barack Obama’s Social Security number. We should know something about the case by the second week in January 2014.
  •  
    @ One passage in the article: "It appears that once the amendment is submitted, this may force the Social Security Administration to explain exactly what is going on with Barack Obama's Social Security number." That's far too optimistic, probably reflecting a lack of understanding of Freedom of Information Act and the processing of a FOIA complaint in federal court. I read the judge's opinion. After the amended complaint is filed, the government gets another shot at summary judgment, submitting a new affidavit about the scope of the search that meets the judge's criticism. (The judge did not rule that the search was inadequate, merely that it was inadequately described and might have been inadequate.) That shifts the burden to the plaintiff to prove that the search was inadequate. If she meets that burden, which isn't easy, the government has to do a new search, file a new motion for summary judgment with a new affidavit, rinse, lather, and repeat. So long as someone is willing to sign an affidavit describing the search and stating that nothing was found, the plaintiff will eventually be unable to prove that the search was inadequate and will lose the case. On the other hand, a new search may find the requested record and result in disclosure. But I'm not confident that this case will go very far. From the description of the complaint that the judge ruled on, it was fatally defective anyway, suggesting that the plaintiff doesn't know much about FOIA litigation. The complaint sought an order that the government be required to respond to her FOIA request letter. But once a FOIA request goes unanswered for 20 business days, the request is deemed denied and the plaintiff can file suit to compel disclosure of the records. The FOIA does not provide for lawsuits to compel the agency to answer a FOIA request. So the plaintiff apparenttly obviously does not understand the FOIA, probably making her easy pickings for an Assistant U.S. District Attorney whose specialty
Paul Merrell

CIA's Self-Authorization for Ice-Drowning Human Beings | emptywheel - 0 views

  • The WaPo has a story that repeats what I’ve been harping on for over a year (and in some cases, has been clear even longer): the Senate Torture Report shows that CIA repeatedly lied to Congress. There are, however, ugly new details about the torture (though it’s not clear whether they show up in the report): particularly regarding the treatment of Ammar al-Baluchi. If declassified, the report could reveal new information on the treatment of a high-value detainee named Ali Abdul Aziz Ali, the nephew of Khalid Sheik Mohammed, the self-proclaimed mastermind of the Sept. 11 attacks. The Pakistanis captured Ali, known more commonly as Ammar al-Baluchi, on April, 30, 2003, in Karachi and turned him over to the CIA about a week later. He was taken to a CIA black site called “Salt Pit” near Kabul. At the secret prison, Baluchi endured a regime that included being dunked in a tub filled with ice water. CIA interrogators forcibly kept his head under the water while he struggled to breathe and beat him repeatedly, hitting him with a truncheon-like object and smashing his head against a wall, officials said. As with Zubaida and even Nashiri, officials said, CIA interrogators continued the harsh treatment even after it appeared that Baluchi was cooperating. The report notes that two other prisoners — members of the Libyan Islamic Fighting Group — were subjected to similar treatment at the same time.
  • Two other terrorism suspects, from Libya — Mohammed al-Shoroeiya and Khalid al-Sharif — endured similar treatment at Salt Pit, according to Human Rights Watch. One of the men said CIA interrogators “would pour buckets of very cold water over his nose and mouth to the point that he felt he would suffocate. Icy cold water was also poured over his body. He said it happened over and over again,” the report says. CIA doctors monitored their body temperatures so they wouldn’t suffer hypothermia. Ultimately, CIA got DOJ to authorize “water dousing” — in the manner that CIA always got DOJ to approve mere shadows of what they actually did, and the approval more closely matches the description of the LIFG prisoners — in the Bradbury Techniques Memo (see page 10). But not before it got used over and over at the Salt Pit (the same place where water dousing had already contributed to Gul Rahman’s death). Which is, I’m quite certain, one thing that CIA was doing with the Legal Principles document, a set of legal guidelines the CIA wrote for itself (with John Yoo’s freelance help) as the CIA’s legal problems started to mount. As I’ve noted, the first draft of the memos got hand-carried to John Yoo on April 28, 2003, just as these detainees were in the Salt Pit. There were several more discussions internally at CIA in anticipation of litigation before they tried (unsuccessfully) to create a fait accompli with Pat Philbin on June 16, 2003. At that point, the document only generally approved techniques equivalent to those already approved. As CIA would later explain,
  • We rely on the applicable law and OLC guidance to assess the lawfulness of detention and interrogation techniques. For example, using the applicable law and relying on OLC’s guidance, we concluded that the abdominal slap previously discussed with OLC (and mentioned in the June 2003 summary points) is a permissible interrogation technique. Similarly, in addition to the sitting and kneeling stress positions discussed earlier with OLC, the Agency has added to its list of approved interrogation techniques two standing stress positions involving the detainee leaning against a wall. I guess, in similar fashion, John Yoo and his CIA buddies believe ice-drowning is equivalent, as another kind of simulated drowning, to waterboarding, which had been approved? Then the next year, when Scott Muller tried the same trick with Jack Goldsmith — trying to get him to sign off on the techniques CIA had freelanced its own legal opinion — he asked to include water dousing (and another water-based technique and one still-redacted technique) explicitly. Of course, the description of water dousing fell far short of what the CIA was actually doing — dunking men in ice-water repeatedly — though the outlines, especially the concern about detainees ingesting water and hypothermia — show the outlines of the torture such language was meant to gloss. To understand the CIA’s torture program, you have to understand what these bureaucratic maneuvers were meant to cover. Now we know they were intended to authorize controlled drowning of men in ice water.
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

U.S. AWOL soldier André Shepherd: European Court of Justice Advocate General ... - 0 views

  • In the legal case of U.S. AWOL soldier André Shepherd (37) the European Court of Justice Advocate General, Eleanor Sharpton, today published her final opinion. This official statement contains guiding deliberations for the interpretation of the so-called Qualification Directive of the European Union. Amongst other considerations, these rules state that those endangered by prosecution or punishment for refusal to perform military service involving an illegal war or commital of war crimes, should be protected by the European Union. André Shepherd, former U.S. Army helicopter mechanic in the Iraq War, during leave in Germany, left his unit and in 2008, requested asylum in that country. 2011, the German Federal Office for Migration and Refugees refused Shepherd's application. Shepherd's resulting court action challenge resulted in the Munich Administrative Court's asking for the opinion of the European Court in Luxemburg on significant questions concerning the interpretation of the Qualification Directive. The Justice Advocate General came to the following conclusions:
  • - The protection guaranteed by the Qualification Directive is also applicable to soldiers not directly involved in combat, when their duties could support war crimes. The German Federal Office for Migration and Refugees has as yet failed to respect this definition. - Within the asylum application process, a deserter is not obliged to prove that he was or could be involved in war crimes, as the German Federal Office for Migration and Refugees required. Necessary is only the evidence of war crime probability, based on past occurrences. - Even a U.N. mandate for a war, in which the deserter was, or could have been involved, cannot serve as grounds for rejection of his rights as a refugee. - The deserter must prove that he either had already been involved in a military service refusal case, or that for concrete reasons, he could not take advantage of this right. - In deciding the question, whether the military service objector is a member of a social or ethnic group as defined within the framework of E.U. Refugee Rights, the national authority should not only consider the degree and importance of his convictions, but also the degree of discrimination experienced in his own country.
  • - The national authorities must investigate whether the asylum applicant's membership in a social or ethnic group could in probability lead to discriminative treatment as the result of a military court action or even dishonorable discharge.
  •  
    Big one from the Advocate Genereral of the European Court of Justice. The Court nearly always follows the opinion of the Advocate General. So members of the U.S. military may soon be able to desert the U.S. armed forces and find refuge in the E.U., free from fear of extradition by the U.S.   The Court's press release is here. http://goo.gl/nvKpfN (.) That page includes a link to the court's docket where the Advocate General's opinion is found and where the Court's judgment will appear when delivered.
Gary Edwards

Multiple Agencies Involved with IRS in Intimidation - 0 views

  •  
    Tea party groups' allegations that the IRS has long been targeting them for their political beliefs were recently confirmed by an apology from the IRS. The scandal gained traction as congressional leaders began efforts to hold the IRS accountable and understand the depths of the federal government's politically-motivated abuses of power. True the Vote, a Houston-based nonprofit which focuses on election integrity issues, was formed by Catherine Engelbrecht and her King Street Patriots Tea Party group. True the Vote applied to the IRS for their 501(c3) non-profit status in July 2010, and almost immediately their problems began.  Within two years, multiple federal agencies, along with an EPA-affiliated Texas state agency, began auditing True the Vote and its founders, visiting their group, their businesses, and asking questions of people who knew them. The IRS was not the only governmental agency involved.  "Engelbrecht's application with the IRS for non-profit status allegedly triggered aggressive audits of one of her family's personal businesses as well. The FBI (Federal Bureau of Investigation) began a series of inquiries about her and her group; the BATF (Bureau of Alcohol Tobacco and Firearms) began demanding to see her family's firearms in surprise audits of her and her husband's small gun dealership--which had done less than $200 in sales; OSHA (Occupational Safety Hazards Administration) began a surprise audit of their small family manufacturing business; and the EPA-affiliated TCEQ (Texas Commission on Environment Quality) did a surprise visit and audit due to "a complaint being called in."  The Democratic Party of Texas filed a lawsuit against her, as did an ACORN affiliated group. Both the FBI and the BATF continued to poke around her life, the lives of people in her Tea Party group, and her businesses."
Gary Edwards

Operation Sleeping Giant: "Breaking The Silver Manipulation Barrier" by Brandon Smith - 0 views

  •  
    Written in August of 2011, this article continues to be an important guideline to understanding Gold and Silver prices, and the efforts of Banksters to manipulate these competing forms of monetary exchange to the US Dollar.  Good stuff.  And i did write Brandon a proposal for a mobile application connecting PayPal to the Storage Vault Depositories he sites in this article (based on the GOLD app design i provided to Tino in 2008). excerpt: China Competes With The Comex As of this summer China now has its own Comex, called the Hong Kong Mercantile Exchange. The exchange opened for trade on May 18th (the CME's incredible margin hikes in silver began only weeks before, which suggests to me that they were trying to preempt the positive effects the HKMEX would have on metals). The HKMEX moved into action only five months after the Chinese Pan American Gold Exchange was instituted. The exchange issues its own ETF's in gold and silver. These securities, though, are not based on leverage or derivatives like most Comex based ETFs. The bottom line; the Comex global monopoly on commodities trade is over: How To Break The Barrier Methods for smaller investors to fight back against the market manipulations of large banks have been sparse, and often limited to desperate appeals to the CFTC and the government, who are bought and paid for, and who have no intention of ever stopping global financiers from dragging their unwashed behinds across the face of the planet. Relying on bureaucrats to mend the wounds they themselves encouraged or inflicted is foolhardy, to say the least. Top down solutions are NOT an option now, and I'm not sure if they ever were. This leaves us with only one other choice; to fix the problem with our own hands from the bottom up. This is, of course, easier said than done… In the case of silver manipulation, what we are faced with is an unprecedented effort to subvert and suppress an alternative system so that the mainstream system can continue to
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Gary Edwards

Tea Party Primary prior to RINO Primary - Tea Party Command Center - 0 views

  •  
    Reply by Gary Edwards to the question:   "Should the TEA Party select their slate of candidates prior to the establishment RiNO primaries?" This question really surprised me.  Of course the Tea Party should enter the establishment RiNO primary with a full slate of previously selected candidates for all levels of elected office. The reasons are obvious.  The establishment RiNOS consistently win by flooding the primary, encouraging multiple conservative and libertarian candidates; all the while knowing exactly who they have hand picked and expect the party to coalesce around. It's divide and conqueror.  The incredible thing is how routinely and with ease the RiNOS can rope-a-dope Rush Limbaugh and the entire cadre of conservative leadership.  And do it year after year. The rope-a-dope maneuver only requires that conservatives and libertarians wait for the establishment primary process to begin before they can begin the drawn out process needed to coalesce and vote as a block. As a block, the Tea Party wins easily.  And, they would actually get candidates ready to stand and fight for the Constitution. Once the game of electoral money ball starts though, it's impossible to select and coalesce based on principles.  Money drives the game.  And that plays right into the hands of the establishment. Think of it this way.  The Tea Party has the "votes" and the "ground game".  The establishment has the "money", and position to make the "rules". The current system of selecting candidates in the establishment primary ALWAYS results in "money" and "rule making" dominating and determining the winners.  The Tea Parties numerical and ground game advantages are quickly diluted, dispersed and split by multiple candidates vying for the same vote.  The RiNO slate wins through the fractional split of their Tea Party opponents, which they encourage and expect, and, the hardball application of their money and rules advantages.  The result is that less than a third of
Gary Edwards

Hillary Clinton Email -- Classified Information Was Obvious to Her, and She Lied | Nati... - 1 views

  •  
    "For mishandling 'top secret' information and lying about it, she should be prosecuted. So now Hillary finally knows what the "(C)" stands for in government documents: It's Cartwright . . . as in four-star Marine General James E. Cartwright, the retired 67-year-old former vice chairman of the Joint Chiefs of Staff, the expendable federal official against whom laws protecting classified information actually get enforced. (C), see? Oh wait - sorry. I don't mean to confuse Mrs. Clinton by starting this second paragraph with "(C)". After all, as she diva-'splained to the FBI, she could only "speculate" that "(C)" must have something to do with organizing paragraphs "in alphabetical order." Speculation was necessary, she said, apparently with a straight face, because she didn't really know what "(C)" meant. The question arose because the "(C)" designation - applicable to classified information at the confidential level - turned up in at least one of Clinton's personal e-mails. Those would be the e-mails that, she repeatedly insisted, never, ever contained classified information. Or at least, that's what she insisted until government agencies confessed that hundreds of the e-mails do contain classified information. Then Clinton's "never, ever" tale morphed into the more narrowly tailored lie that there were no e-mails "marked classified." Alas, that claim could not withstand examination of the e-mails, during which the "(C)" markings were found . . . whereupon the explanation underwent more, shall we say, refining. Thus the final, astonishing claim that she didn't know what the markings meant, along with the laugh-out-loud whopper that maybe it was all about alphabetical order. Yeah, that's the ticket! In case you're keeping score: When a person being prosecuted for a crime changes her story multiple times, as if she were playing Twister (kids, ask your parents), the prosecutor gets to prov
Teresa Carter

Installment Repayment Loans- Get Easy Cash Support Via online Mode without Any Hurdle! - 0 views

  •  
    Installment Repayment Loans are easily available online with affordable terms and conditions. This is simply arranging money to the low credit borrowers without any lengthy procedure. The loan amount deposited borrower's bank account within short time of application.
Paul Merrell

Trump's travel ban has revoked 60,000 visas for now - 0 views

  • About 60,000 visas were revoked under U.S. President Donald Trump's executive order temporarily halting immigration from seven Muslim-majority countries, the State Department said on Friday, in one of several government communications clarifying how the order is being rolled out.The revocation means the government voided travel visas for people trying to enter the United States but the visas could be restored later without a new application, said William Cocks, a spokesman for consular affairs at the State Department."We will communicate updates to affected travelers following the 90-day review," he said.Earlier news reports, citing a government attorney at a federal court hearing, put the figure at more than 100,000 visas.The government issued over 11 million immigrant and non-immigrant visas in fiscal year 2015, the State Department said.The immigration executive order signed by Trump a week ago temporarily halted the U.S. refugee program and imposed a 90-day suspension on people traveling from Iran, Iraq, Libya, Somalia, Sudan, Syria and Yemen. Trump said the measures would help protect Americans from terrorist attacks.
Gary Edwards

Character Matters and Mitt Romney has it - 1 views

The following eMail message is being forwarded around the Web and it does confirm my own personal experiences with then Governor Romney in 2005-2006. The issue then was the Massachusetts Open Gove...

Romney ODF Massachusetts-Lesson Massachusetts-RFi Microsoft OOXML

started by Gary Edwards on 17 Apr 12 no follow-up yet
Gary Edwards

WallBuilders - Issues and Articles - America's Most Biblically-Hostile U. S. President - 0 views

  •  
    Obama was born a Muslim, educated as a Muslim, and is actually listed in the California journal of assembly activity as having applied for and recieved a foreign exchange student grant for Occidental College.  The grant application has Barry Soetoro claiming he is a citizen of Indonesia.  The Occidental College transcripts confirm this as well as the fact that Barry declares himself a Muslim.   A muslim and a citizen of Indonesia.  So why does this collection of insults and hatred for Christians surprise us?  Because it's so extensive and loaded.  And here i thought the guy was all about golf and expensive exotic vacations at the taxpayers expense.  That and funneling billions of taxpayer funds to his friends and bundlers.  What a list.  excerpt: When one observes President Obama's unwillingness to accommodate America's four-century long religious conscience protection through his attempts to require Catholics to go against their own doctrines and beliefs, one is tempted to say that he is anti-Catholic. But that characterization would not be correct. Although he has recently singled out Catholics, he has equally targeted traditional Protestant beliefs over the past four years. So since he has attacked Catholics and Protestants, one is tempted to say that he is anti-Christian. But that, too, would be inaccurate. He has been equally disrespectful in his appalling treatment of religious Jews in general and Israel in particular. So perhaps the most accurate description of his antipathy toward Catholics, Protestants, religious Jews, and the Jewish nation would be to characterize him as anti-Biblical. And then when his hostility toward Biblical people of faith is contrasted with his preferential treatment of Muslims and Muslim nations, it further strengthens the accuracy of the anti-Biblical descriptor. In fact, there have been numerous clearly documented times when his pro-Islam positions have been the cause of his anti-Biblical actions. Listed below i
Paul Merrell

America's Lead Iran Negotiator Misrepresents U.S. Policy (and International L... - 0 views

  • Last month, while testifying to the Senate Foreign Relations Committee, Wendy Sherman—Undersecretary of State for Political Affairs and the senior U.S. representative in the P5+1 nuclear talks with Iran—said, with reference to Iranians, “We know that deception is part of the DNA.”  This statement goes beyond orientalist stereotyping; it is, in the most literal sense, racist.  And it evidently was not a mere “slip of the tongue”:  a former Obama administration senior official told us that Sherman has used such language before about Iranians. 
  • Putting aside Sherman’s glaring display of anti-Iranian racism, there was another egregious manifestation of prejudice-cum-lie in her testimony to the Senate Foreign Relations Committee that we want to explore more fully.  It came in a response to a question from Senator Marco Rubio (R-Florida) about whether states have a right to enrich under the Nuclear Non-Proliferation Treaty (NPT).  Here is the relevant passage in Sherman’s reply:  “It has always been the U.S. position that Article IV of the Nuclear Non-Proliferation Treaty does not speak about the right of enrichment at all [and] doesn’t speak to enrichment, period.  It simply says that you have the right to research and development.”  Sherman goes on to acknowledge that “many countries such as Japan and Germany have taken that [uranium enrichment] to be a right.”  But, she says, “the United States does not take that position.  We take the position that we look at each one of these [cases].”  Or, as she put it at the beginning of her response to Sen. Rubio, “It has always been the U.S. position that Article IV of the Nuclear Non-Proliferation Treaty does not speak about the right of enrichment at all” (emphasis added). 
  • Two points should be made here.  First, the claim that the NPT’s Article IV does not affirm the right of non-nuclear-weapons states to pursue indigenous development of fuel-cycle capabilities, including uranium enrichment, under international safeguards is flat-out false.  Article IV makes a blanket statement that “nothing in this Treaty shall be interpreted as affecting the inalienable right of all the Parties to the Treaty to develop research, production and use of nuclear energy for peaceful purposes without discrimination.”  And it’s not just “countries such as Japan and Germany”—both close U.S. allies—which affirm that this includes the right of non-weapons states to enrich uranium under safeguards.  The BRICS (Brazil, Russia, India, China, and South Africa) countries and the Non-Aligned Movement (whose 120 countries represent a large majority of UN members) have all clearly affirmed the right of non-nuclear-weapons states, including the Islamic Republic of Iran, to pursue indigenous safeguarded enrichment.  In fact, just four countries in the world hold that there is no right to safeguarded enrichment under the NPT:  the United States, Britain, France, and Israel (which isn’t even a NPT signatory).  That’s it.  Moreover, the right to indigenous technological development—including nuclear fuel-cycle capabilities, should a state choose to pursue them—is a sovereign right.  It is not conferred by the NPT; the NPT’s Article IV recognizes states’ “inalienable right” in this regard, while other provisions bind non-weapons states that join the Treaty to exercise this right under international safeguards.       
  • ...3 more annotations...
  • There have been many first-rate analyses demonstrating that the right to safeguarded enrichment under the NPT is crystal clear—from the Treaty itself, from its negotiating history, and from subsequent practice, with at least a dozen non-weapons states building fuel-cycle infrastructures potentially capable of supporting weapons programs.  Bill Beeman published a nice Op Ed in the Huffington Post on this question in response to Sherman’s Senate Foreign Relations Committee testimony, see here and, for a text including references, here.  For truly definitive legal analyses, see the work of Daniel Joyner, for example here and here.  The issue will also be dealt with in articles by Flynt Leverett and Dan Joyner in a forthcoming special issue of the Penn State Journal of Law and International Affairs, which should appear within the next few days.         From any objectively informed legal perspective, denying non-weapons states’ right of safeguarded enrichment amounts to nothing more than a shameless effort to rewrite the NPT unilaterally.  And this brings us to our second point about Sherman’s Senate Foreign Relations Committee testimony. 
  • Sherman claims that “It has always been the U.S. position that Article IV of the Nuclear Non-Proliferation Treaty does not speak about the right of enrichment at all [and] doesn’t speak to enrichment, period.”  But, in fact, the United States originally held that the right to peaceful use recognized in the NPT’s Article IV includes the indigenous development of safeguarded fuel-cycle capabilities.  In 1968, as America and the Soviet Union, the NPT’s sponsors, prepared to open it for signature, the founding Director of the U.S. Arms Control and Disarmament Agency, William Foster, told the Senate Foreign Relations Committee—the same committee to which Sherman untruthfully testified last month—that the Treaty permitted non-weapons states to pursue the fuel cycle.  We quote Foster on this point:   “Neither uranium enrichment nor the stockpiling of fissionable material in connection with a peaceful program would violate Article II so long as these activities were safeguarded under Article III.”  [Note:  In Article II of the NPT, non-weapons states commit not to build or acquire nuclear weapons; in Article III, they agree to accept safeguards on the nuclear activities, “as set forth in an agreement to be negotiated and concluded with the International Atomic Energy Agency.”] 
  • Thus, it is a bald-faced lie to say that the United States has “always” held that the NPT does not recognize a right to safeguarded enrichment.  As a matter of policy, the United States held that that the NPT recognized such a right even before it was opened for signature; this continued to be the U.S. position for more than a quarter century thereafter.  It was only after the Cold War ended that the United States—along with Britain, France, and Israel—decided that the NPT should be, in effect, unilaterally rewritten (by them) to constrain the diffusion of fuel-cycle capabilities to non-Western states.  And their main motive for trying to do so has been to maximize America’s freedom of unilateral military initiative and, in the Middle East, that of Israel.  This is the agenda for which Wendy Sherman tells falsehoods to a Congress that is all too happy to accept them.    
  •  
    What should be the reaction of Congress upon discovering that the U.S. lead negotiator with Iran in regard to its budding peaceful use of nuclear power lies to Congress about the Nuclear Non-Proliferation Treaty's applicability to Iran's actions? 
Paul Merrell

Chomsky to RT: All superpowers feel exceptional, inflate security myth for 'frightened ... - 0 views

  • The United States has always adopted the principle of American exceptionalism, this goes back to the early colonists, but it’s not a uniquely American position. Every great power, at least every one I know of, has taken the same position. So France was unique in its civilizing mission, which was announced proudly as the Minister of War was calling for the extermination of the people of Algeria. Russia under Stalin was uniquely exceptional and magnificent while it was carrying out all kinds of crimes. Hitler pronounced German exceptionalism when he took over Czechoslovakia, it was done to end ethnic cleansing and put people under the broader German high culture and German technology. In fact I can’t think of an exception. Every great power that I know of has claimed to be exceptional, the United States among them: exceptional in its right to use force and violence. RT: Doesn’t the US take it a step further with exceptionalism? NC: Only because the US is more powerful. If you go back a hundred years British and French exceptionalism was far more powerful. The US had the same doctrine but what really mattered for the world was the major imperial powers. And in Russia’s domains it was Russia that was exceptional. Try to find an exception. So the exceptionalism is kind of interesting in that it seems to be without exception. Everybody accepts it, and of course it’s ludicrous in each case.
  •  
    The renowned libertarian socialist historian Noam Chomsky speaks to "American exceptionalism" ("of course it's ludicrous"). Claims of American exceptionalism fall particularly flat in my mind because the U.S. is "the melting pot of humanity." Descended from all breeds of immigrants, how could we be exceptional except in our diversity. But our diversity does not seem to be exceptional. Ask the Afro-American or Latino young man who has just been stopped by the police for driving while black or driving while Latino how they feel about America's respect for diversity. American exceptionalism is nothing but another propaganda theme used to justify unlawful activities. E.g., "we are the world's only superpower; therefore, we must act as the world's police force." But notice in that particular application of the theme, there are neither international law granting our military the power to invade other nations or international norms that make our unilateral invasions of other nations lawful under any circumstance other than responding defensively to another nation's military attack on our own nation. Of course there has been no such attack since the War of 1812 (at the outset of World War II, Hawaii was a mere possession, not a state).
Paul Merrell

US opposes Palestinian moves to statehood - Israel News, Ynetnews - 0 views

  • But in a surprise move Tuesday, s refusal to release the last of four groups of prisoners by the end of March, saying the release was conditioned on progress made in negotiations.
  • She said there are no shortcuts to statehood, and that any unilateral actions could be "tremendously destructive" to the peace process.
  • US Ambassador to the UN Samantha Power told a House panel on Wednesday that the United States opposes all unilateral actions that the Palestinians take to statehood.
  • ...7 more annotations...
  • US Ambassador to the UN Samantha Power told a House panel on Wednesday that the United States opposes all unilateral actions that the Palestinians take to statehood.
  • US Ambassador to the UN Samantha Power told a House panel on Wednesday that the United States opposes all unilateral actions that the Palestinians take to statehood.
  • Palestinian Authority President Mahmoud Abbas had promised at the beginning of the current round of negotiations to suspend Palestinian membership applications to United Nations agencies and international conventions. Israel, in turn, pledged to release 104 long-held Palestinian prisoners during the talks, which were to last until late April.
  • Palestinian Authority President Mahmoud Abbas had promised at the beginning of the current round of negotiations to suspend Palestinian membership applications to United Nations agencies and international conventions. Israel, in turn, pledged to release 104 long-held Palestinian prisoners during the talks, which were to last until late April.
  • But in a surprise move Tuesday, s refusal to release the last of four groups of prisoners by the end of March, saying the release was conditioned on progress made in negotiations.
  • In November 2012, the UN General Assembly overwhelmingly recognized a state of Palestine in the West Bank, Gaza and east Jerusalem as a non-member observer state. The vote came despite objections from the US and Israel, which portrayed it as an attempt to bypass negotiations.   Palestinian officials have said that recognition paved the way for the Palestinians joining 63 UN agencies, conventions and institutions, including the International Criminal Court.   Palestinian Foreign Minister Riad Malki on Wednesday handed the letters of accession signed by Abbas to the relevant parties, including a UN envoy, his office said.   Among other things, Abbas requested accession to the Geneva Conventions, which establish standards of conduct and treatment of civilians at times of conflict, and to various human rights treaties.
  • The International Criminal Court was not on the list. The ICC is seen by some as the Palestinians' "doomsday weapon" because it could theoretically open the way to war crimes charges against Israel over its settlement construction on war-won land.   Abbas' step came at a time when Kerry's mediation efforts already appeared in trouble. Kerry had set an April 29 deadline for the basic outlines of an Israeli-Palestinian deal, but in recent weeks was pushing both sides to extend the talks until the end of the year.   The Palestinians said they would not discuss an extension until the last group of veteran prisoners was released. Israel, in turn, was trying to make that group part of a new deal on extending the talks.
‹ Previous 21 - 40 of 180 Next › Last »
Showing 20 items per page