Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged archives

Rss Feed Group items tagged

Paul Merrell

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
Gary Edwards

Understanding 9/11: A Television News Archive - 1 views

  •  
    Incredible video archive commemorating 9/11.  These are video clips that disappeared soon after that horrific event, archived for all time by some San Francisco dogooders.  It's meant to be a timeless resource for journalist, researchers, historians and writers as well as future generations of Americans who want to visually see the truth as it went down.  Now, if only we can get the Banksters behind this attack and hang them high. Sometimes we forget how dramatically those few days changed the course of history and how rapidly the desire to react was. And as you can see from the footage, it was not just the likes of Bill O'Reilly on Fox News (who declared that America should "bomb the Afghan infrastructure to rubble"). The archive is a way of digging into that reaction, which is itself a way of digging into where we are today. But sometimes it's just as important to remember the sheer confusion that took hold. The most grim moments come when comparing live coverage of the attacks themselves. For example on ABC, at 9:02 a.m., you hear the mangled yelps of staff in the studio as they (and you) watch the second plane strike the World Trade Center. At the same moment on CNN, meanwhile, they didn't even spot what had happened until a minute or two later. It's a brief interlude of innocence that nobody will ever have again. Understanding 9/11 is raw and unpalatable and terrifying. But what the Internet Archive has done is create an important and lasting monument to the events of a decade ago. It might not feel like a traditional tribute to those who died, but I think it is one that - for all of its difficulties - is utterly necessary.
Paul Merrell

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
Paul Merrell

OPERATION CONDOR: National Security Archive Presents Trove of Declassified Documentatio... - 0 views

  • Argentine Newspaper, Pagina 12, Highlights Evidence Presented by Archive Southern Cone Project Director Carlos Osorio Documents given to Court Reveal Condor Precedents; Secret Summary of Inaugural Condor Meeting Introduced into Court for First Time National Security Archive Electronic Briefing Book No. 514
  • The National Security Archive today posted key documents on Operation Condor, presented by its Southern Cone analyst, Carlos Osorio, at a historic trial in Buenos Aires of former military officers. During 10 hours on the witness stand recently, Osorio introduced one hundred documents into evidence for the court proceedings. His testimony was profiled on May 3 in a major feature article published in the Buenos Aires daily, Pagina 12. Operation Condor was an infamous secret alliance between South American dictatorships in the mid and late 1970s - a Southern Cone rendition and repression program - formed to track down and eliminate enemies of their military regimes. The Condor trial charges 25 high-ranking officers, originally including former Argentine presidents Jorge Videla (deceased) and Reynaldo Bignone (aged 87), with conspiracy to "kidnap, disappear, torture and kill" 171 opponents of the regimes that dominated the Southern Cone in the 1970s and 1980s. Among the victims were approximately 80 Uruguayans, 50 Argentines, 20 Chileans and a dozen others from Paraguay, Bolivia, Peru and Ecuador who were targeted by Condor operatives.
  • The tribunal requested Osorio’s testimony, which took place over two days on March 6 and 7, 2015, and included presentation of an Excel data base of 900 documents drawn mostly from U.S. government sources and from the Archive of Terror in Paraguay. Of these, Osorio focused on 100 declassified records selected for the tribunal, which was presided over by Judge Oscar Amirante, president of Federal Tribunal N° 1. The National Security Archive obtained the U.S. documents through the Freedom of Information Act (FOIA), primarily from the Central Intelligence Agency, Defense Intelligence Agency and the State Department. Other notable records originated from the Chilean former secret police, DINA. "We have been working on Operation Condor for years," Osorio said, "sifting through archives in many continents and building a body of knowledge and a trove of documents." The Pagina 12 feature entitled "The Evolution of Condor," described Osorio’s presentation of "dozens" of documents to the tribunal, and the contribution the documents made in educating the judges on the genesis and evolution of coordinated repression in the Southern Cone. Osorio’s testimony covered a range of topics including the breadth of Condor operations, U.S. knowledge of those operations and the authenticity of the records being introduced into evidence.
  • ...3 more annotations...
  • The article highlighted one document Osorio presented that revealed the bilateral precedent for what would become a multilateral system of regional repression: a secret accord between the Argentine and Paraguayan military intelligence services to "Collaborate in the struggle against subversion…" and the "… internment [of dissenters]…" " The agreement was dated September 12,1972, and signed by Paraguayan intelligence officer Col. Benito Guanes Serrano. Three years later, Guanes would also be one of the five original signatories of the secret Condor accords. Osorio discovered the document in the Archive of Terror in Paraguay. In September 1975, an assessment by a State Department intelligence analyst concluded that "The national security forces of the southern cone surpass the terrorists in cooperation at the international level…" Six weeks later, in Santiago, Chile, intelligence chiefs from Argentina, Bolivia, Chile, Paraguay and Uruguay signed an "Acta" officially establishing Operation Condor. Osorio introduced that pivotal document - provided to the Archive by a source in Chile - into evidence as well.
  • Two declassified U.S. documents presented to the tribunal underscored the contradictory response of high U.S. officials as they became aware of Condor operations in the summer of 1976. One well-known 13-page memorandum of conversation between Secretary of State Henry Kissinger and Argentine Foreign Minister Admiral Cesar Guzzetti dated June 10, 1976, revealed Kissinger’s endorsement of the regional collaboration to repress the left. After Guzzetti informed Kissinger that the Southern Cone regimes were engaged in "joint efforts" to fight "the terrorist problem," Kissinger essentially supported this approach: "If there are things that have to be done, you should do them quickly. But you should get back quickly to normal procedures," according to the declassified transcript Osorio provided to the court. "We want you to succeed. We do not want to harrass [sic] you," Kissinger concluded. "I will do what I can … "
  • After a CIA briefing to Kissinger’s top aides in late July 1976 on the Condor countries’ plans to send assassination teams around the world to eliminate opponents, the Secretary of State authorized a démarche to General Augusto Pinochet in Chile, General Jorge Videla in Argentina, and other military leaders in the region calling on them to cease and desist. "Government planned and directed assassinations within and outside the territory of Condor members has most serious implication which we must face squarely and rapidly," stated the secret August 13, 1976, cable to U.S. ambassadors in those nations. But the démarche was never delivered to any of the Condor regimes. After the U.S. ambassadors raised objections about presenting the démarche to the generals, on September 16, 1976, Kissinger rescinded it, and ordered "that no further action be taken on this matter." In addition to Osorio, the National Security Archive’s Chile Documentation Project director, Peter Kornbluh, testified in the Operation Condor trial for five hours in December 2014. Archive Advisory Board member, professor of journalism and author John Dinges presented evidence in April 2015. Read the Documents
Paul Merrell

Never trust a corporation to do a library's job - The Message - Medium - 0 views

  • Google wrote its mission statement in 1999, a year after launch, setting the course for the company’s next decade:“Google’s mission is to organize the world’s information and make it universally accessible and useful.”For years, Google’s mission included the preservation of the past.
  • In the last five years, starting around 2010, the shifting priorities of Google’s management left these archival projects in limbo, or abandoned entirely.After a series of redesigns, Google Groups is effectively dead for research purposes. The archives, while still online, have no means of searching by date.Google News Archives are dead, killed off in 2011, now directing searchers to just use Google.Google Books is still online, but curtailed their scanning efforts in recent years, likely discouraged by a decade of legal wrangling still in appeal. The official blog stopped updating in 2012 and the Twitter account’s been dormant since February 2013.
  • Even Google Search, their flagship product, stopped focusing on the history of the web. In 2011, Google removed the Timeline view letting users filter search results by date, while a series of major changes to their search ranking algorithm increasingly favored freshness over older pages from established sources. (To the detriment of some.)
  • ...2 more annotations...
  • Two months ago, Larry Page said the company’s outgrown its 14-year-old mission statement. Its ambitions have grown, and its priorities have shifted.Google in 2015 is focused on the present and future. Its social and mobile efforts, experiments with robotics and artificial intelligence, self-driving vehicles and fiberoptics.As it turns out, organizing the world’s information isn’t always profitable. Projects that preserve the past for the public good aren’t really a big profit center. Old Google knew that, but didn’t seem to care.
  • The desire to preserve the past died along with 20% time, Google Labs, and the spirit of haphazard experimentation.Google may have dropped the ball on the past, but fortunately, someone was there to pick it up.
  •  
    So here's my plan. In the same legislation that abolishes the NSA, grant its funding and deed the NSA's enormous data center in Utah to the Internet Archives.  Require that the NSA's internet archives be turned over to Internet Archive in good working order. Put thousands of librarians and digital archaeologists to work preserving and making the history of the online global populattion accessible to all. Also require that the remainder of the NSA be used as combustibles for the first annual NSA Bonfire Ball. BYOB. 
Paul Merrell

Most Agencies Falling Short on Mandate for Online Records - 0 views

  • Nearly 20 years after Congress passed the Electronic Freedom of Information Act Amendments (E-FOIA), only 40 percent of agencies have followed the law's instruction for systematic posting of records released through FOIA in their electronic reading rooms, according to a new FOIA Audit released today by the National Security Archive at www.nsarchive.org to mark Sunshine Week. The Archive team audited all federal agencies with Chief FOIA Officers as well as agency components that handle more than 500 FOIA requests a year — 165 federal offices in all — and found only 67 with online libraries populated with significant numbers of released FOIA documents and regularly updated.
  • Congress called on agencies to embrace disclosure and the digital era nearly two decades ago, with the passage of the 1996 "E-FOIA" amendments. The law mandated that agencies post key sets of records online, provide citizens with detailed guidance on making FOIA requests, and use new information technology to post online proactively records of significant public interest, including those already processed in response to FOIA requests and "likely to become the subject of subsequent requests." Congress believed then, and openness advocates know now, that this kind of proactive disclosure, publishing online the results of FOIA requests as well as agency records that might be requested in the future, is the only tenable solution to FOIA backlogs and delays. Thus the National Security Archive chose to focus on the e-reading rooms of agencies in its latest audit. Even though the majority of federal agencies have not yet embraced proactive disclosure of their FOIA releases, the Archive E-FOIA Audit did find that some real "E-Stars" exist within the federal government, serving as examples to lagging agencies that technology can be harnessed to create state-of-the art FOIA platforms. Unfortunately, our audit also found "E-Delinquents" whose abysmal web performance recalls the teletype era.
  • E-Delinquents include the Office of Science and Technology Policy at the White House, which, despite being mandated to advise the President on technology policy, does not embrace 21st century practices by posting any frequently requested records online. Another E-Delinquent, the Drug Enforcement Administration, insults its website's viewers by claiming that it "does not maintain records appropriate for FOIA Library at this time."
  • ...9 more annotations...
  • "The presumption of openness requires the presumption of posting," said Archive director Tom Blanton. "For the new generation, if it's not online, it does not exist." The National Security Archive has conducted fourteen FOIA Audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  • The federal government has made some progress moving into the digital era. The National Security Archive's last E-FOIA Audit in 2007, " File Not Found," reported that only one in five federal agencies had put online all of the specific requirements mentioned in the E-FOIA amendments, such as guidance on making requests, contact information, and processing regulations. The new E-FOIA Audit finds the number of agencies that have checked those boxes is now much higher — 100 out of 165 — though many (66 in 165) have posted just the bare minimum, especially when posting FOIA responses. An additional 33 agencies even now do not post these types of records at all, clearly thwarting the law's intent.
  • The FOIAonline Members (Department of Commerce, Environmental Protection Agency, Federal Labor Relations Authority, Merit Systems Protection Board, National Archives and Records Administration, Pension Benefit Guaranty Corporation, Department of the Navy, General Services Administration, Small Business Administration, U.S. Citizenship and Immigration Services, and Federal Communications Commission) won their "E-Star" by making past requests and releases searchable via FOIAonline. FOIAonline also allows users to submit their FOIA requests digitally.
  • THE E-DELINQUENTS: WORST OVERALL AGENCIES In alphabetical order
  • Key Findings
  • Excuses Agencies Give for Poor E-Performance
  • Justice Department guidance undermines the statute. Currently, the FOIA stipulates that documents "likely to become the subject of subsequent requests" must be posted by agencies somewhere in their electronic reading rooms. The Department of Justice's Office of Information Policy defines these records as "frequently requested records… or those which have been released three or more times to FOIA requesters." Of course, it is time-consuming for agencies to develop a system that keeps track of how often a record has been released, which is in part why agencies rarely do so and are often in breach of the law. Troublingly, both the current House and Senate FOIA bills include language that codifies the instructions from the Department of Justice. The National Security Archive believes the addition of this "three or more times" language actually harms the intent of the Freedom of Information Act as it will give agencies an easy excuse ("not requested three times yet!") not to proactively post documents that agency FOIA offices have already spent time, money, and energy processing. We have formally suggested alternate language requiring that agencies generally post "all records, regardless of form or format that have been released in response to a FOIA request."
  • Disabilities Compliance. Despite the E-FOIA Act, many government agencies do not embrace the idea of posting their FOIA responses online. The most common reason agencies give is that it is difficult to post documents in a format that complies with the Americans with Disabilities Act, also referred to as being "508 compliant," and the 1998 Amendments to the Rehabilitation Act that require federal agencies "to make their electronic and information technology (EIT) accessible to people with disabilities." E-Star agencies, however, have proven that 508 compliance is no barrier when the agency has a will to post. All documents posted on FOIAonline are 508 compliant, as are the documents posted by the Department of Defense and the Department of State. In fact, every document created electronically by the US government after 1998 should already be 508 compliant. Even old paper records that are scanned to be processed through FOIA can be made 508 compliant with just a few clicks in Adobe Acrobat, according to this Department of Homeland Security guide (essentially OCRing the text, and including information about where non-textual fields appear). Even if agencies are insistent it is too difficult to OCR older documents that were scanned from paper, they cannot use that excuse with digital records.
  • Privacy. Another commonly articulated concern about posting FOIA releases online is that doing so could inadvertently disclose private information from "first person" FOIA requests. This is a valid concern, and this subset of FOIA requests should not be posted online. (The Justice Department identified "first party" requester rights in 1989. Essentially agencies cannot use the b(6) privacy exemption to redact information if a person requests it for him or herself. An example of a "first person" FOIA would be a person's request for his own immigration file.) Cost and Waste of Resources. There is also a belief that there is little public interest in the majority of FOIA requests processed, and hence it is a waste of resources to post them. This thinking runs counter to the governing principle of the Freedom of Information Act: that government information belongs to US citizens, not US agencies. As such, the reason that a person requests information is immaterial as the agency processes the request; the "interest factor" of a document should also be immaterial when an agency is required to post it online. Some think that posting FOIA releases online is not cost effective. In fact, the opposite is true. It's not cost effective to spend tens (or hundreds) of person hours to search for, review, and redact FOIA requests only to mail it to the requester and have them slip it into their desk drawer and forget about it. That is a waste of resources. The released document should be posted online for any interested party to utilize. This will only become easier as FOIA processing systems evolve to automatically post the documents they track. The State Department earned its "E-Star" status demonstrating this very principle, and spent no new funds and did not hire contractors to build its Electronic Reading Room, instead it built a self-sustaining platform that will save the agency time and money going forward.
Gary Edwards

A Hidden History of Evil by Claire Berlinski, City Journal Spring 2010 - 0 views

  •  
    The originals of most of Stroilov's documents remain in the Kremlin archives, where, like most of the Soviet Union's top-secret documents from the post-Stalin era, they remain classified. They include, Stroilov says, transcripts of nearly every conversation between Gorbachev and his foreign counterparts-hundreds of them, a near-complete diplomatic record of the era, available nowhere else. There are notes from the Politburo taken by Georgy Shakhnazarov, an aide of Gorbachev's, and by Politburo member Vadim Medvedev. There is the diary of Anatoly Chernyaev-Gorbachev's principal aide and deputy chief of the body formerly known as the Comintern-which dates from 1972 to the collapse of the regime. There are reports, dating from the 1960s, by Vadim Zagladin, deputy chief of the Central Committee's International Department until 1987 and then Gorbachev's advisor until 1991. Zagladin was both envoy and spy, charged with gathering secrets, spreading disinformation, and advancing Soviet influence. When Gorbachev and his aides were ousted from the Kremlin, they took unauthorized copies of these documents with them. The documents were scanned and stored in the archives of the Gorbachev Foundation, one of the first independent think tanks in modern Russia, where a handful of friendly and vetted researchers were given limited access to them. Then, in 1999, the foundation opened a small part of the archive to independent researchers, including Stroilov. The key parts of the collection remained restricted; documents could be copied only with the written permission of the author, and Gorbachev refused to authorize any copies whatsoever. But there was a flaw in the foundation's security, Stroilov explained to me. When things went wrong with the computers, as often they did, he was able to watch the network administrator typing the password that gave access to the foundation's network. Slowly and secretly, Stroilov copied the archive and sent it to secure locat
Gary Edwards

Comey has Long History of Cases Ending Favorable to Clintons - Tea Party News - 0 views

  • Messages found stored on Clinton’s private email server show that Berger – a convicted thief of classified documents – had been advising Clinton while she served as secretary of state and had access to emails containing classified information. For example, in an email dated Sept. 22, 2009, Berger advised Clinton advised how she could leverage information to make Israeli Prime Minister Benjamin Netanyahu more cooperative in discussions with the Obama administration over a settlement freeze.
  • Law firm ties Berger, Lynch, Mills Berger worked as a partner in the Washington law firm Hogan & Hartson from 1973 to 1977, before taking a position as the deputy director of policy planning at the State Department in the Carter administration. When Carter lost his re-election bid, Berger returned to Hogan & Hartson, where he worked until he took leave in 1988 to act as foreign policy adviser in Gov. Michael Dukakis’ presidential campaign. When Dukakis was defeated, Berger returned to Hogan & Hartson until he became foreign policy adviser for Bill Clinton’s presidential campaign in 1992. On March 28, WND reported Lynch was a litigation partner for eight years at Hogan & Hartson, from March 2002 through April 2010. Mills also worked at Hogan & Hartson, for two years, starting in 1990, before she joined then President-elect Bill Clinton’s transition team, on her way to securing a position as White House deputy counsel in the Clinton administration. According to documents Hillary Clinton’s first presidential campaign made public in 2008, Hogan & Hartson’s New York-based partner Howard Topaz was the tax lawyer who filed income tax returns for Bill and Hillary Clinton beginning in 2004. In addition, Hogan & Hartson in Virginia filed a patent trademark request on May 19, 2004, for Denver-based MX Logic Inc., the computer software firm that developed the email encryption system used to manage Clinton’s private email server beginning in July 2013. A tech expert has observed that employees of MX Logic could have had access to all the emails that went through her account.
  • In 1999, President Bill Clinton nominated Lynch for the first of her two terms as U.S. attorney for the Eastern District of New York, a position she held until she joined Hogan & Hartson in March 2002 to become a partner in the firm’s Litigation Practice Group. She left Hogan & Hartson in 2010, after being nominated by President Obama for her second term as U.S. attorney for the Eastern District of New York, a position she held until Obama nominated her to serve in her current position as attorney general. A report published April 8, 2008, by The American Lawyer noted Hogan & Hartson was among Hillary Clinton’s biggest financial supporters in the legal industry during her first presidential campaign. “Firm lawyers and staff have donated nearly $123,400 to her campaign so far, according to campaign contribution data from the Center for Responsive Politics,” Nate Raymond observed in The American Lawyer article. “Christine Varney, a partner in Hogan’s Washington, D.C., office, served as chief counsel to the Clinton-Gore Campaign in 1992.” While there is no evidence that Lynch played a direct role either in the tax work done by the firm for the Clintons or in linking Hillary’s private email server to MX Logic, the ethics of the legal profession hold all partners jointly liable for the actions of other partners in a business. “If Hogan and Hartson previously represented the Clintons on tax matters, it is incumbent upon U.S. Attorney General Loretta Lynch to [disclose] what, if any, role she had in such tax matters,” said Tom Fitton, president of Washington-based Judicial Watch.
  • ...4 more annotations...
  • HSBC link When Lynch’s nomination as attorney general was considered by the Senate one year ago, as WND reported, the Senate Judiciary Committee examined her role in the Obama administration’s decision not to prosecute the banking giant HSBC for laundering funds for Mexican drug cartels and Middle Eastern terrorists. WND was first to report in a series of articles beginning in 2012 money-laundering charges brought by John Cruz, a former HSBC vice president and relationship manager, based on his more than 1,000 pages of evidence and secret audio recordings. The staff of the Senate Judiciary Committee focused on Cruz’s allegations that Lynch, acting then in her capacity as the U.S. attorney for the Eastern District of New York, engaged in a Department of Justice cover-up. Obama’s attorney general nominee allowed HSBC in December 2011 to enter into a “deferred prosecution” settlement in which the bank agreed to pay a $1.9 billion fine and admit “willful criminal conduct” in exchange for dropping criminal investigations and prosecutions of HSBC directors or employees. Cruz called the $1.92 billion fine the U.S. government imposed on HSBC “a joke” and filed a $10 million lawsuit for “retaliation and wrongful termination.” From 2002 to 2003, Comey held the position of U.S. Attorney for the Southern District of New York, the same position held by Lynch. On March 4, 2013, he joined the HSBC board of directors, agreeing to serve as an independent non-executive director and a member of the bank’s Financial System Vulnerabilities Committee, positions he held until he resigned on Aug. 3, 2013, to become head of the FBI.
  • Comey, Fitzgerald and Valerie Plame On Jan. 1, 2004, the Washington Post reported that after Attorney General John Aschroft recused himself and his staff from any involvement in the investigation of who leaked the name of CIA employee Valerie Plame after journalist Robert Novak named her in print as a CIA operative, Comey assumed the role of acting attorney general for the purposes of the investigation. Comey appointed Patrick J. Fitzgerald, a U.S. attorney in Chicago, to act as special counsel in conducting the inquiry into what became known as “Plamegate.” At the time Comey made the appointment, Fitzgerald was already godfather to one of Comey’s children. On April 13, 2015, co-authoring a USA Today op-ed piece, Plame and her husband, retired ambassador Joseph Wilson, made public their support for Hillary Clinton’s 2016 presidential campaign, openly acknowledging their political closeness to both Hillary and Bill Clinton. The first two paragraphs of the editorial read: We have known Hillary Clinton both professionally and personally for close to 20 years, dating back to before President Bill Clinton’s first trip to Africa in 1998 — a trip that they both acknowledge changed their lives, and gave considerable meaning to their post-White House years and to the activities of the Clinton Foundation. Joe, serving as the National Security Council Senior Director for African Affairs, was instrumental in arranging that historic visit. Our history became entwined with Hillary further after Valerie’s identity as a CIA officer was deliberately exposed. That criminal act was taken in retribution for Joe’s article in The New York Times in which he explained he had discovered no basis for the Bush administration’s justification for the Iraq War that Saddam Hussein was seeking yellowcake uranium to develop a nuclear weapon.
  • In January 2016, Chuck Ross in the Daily Caller reported that Hillary Clinton emails made public made clear that one of her “most frequent favor-seekers when she was secretary of state was former Ambassador Joseph Wilson, a longtime Clinton friend, an endorser of Clinton’s 2008 presidential campaign, and an Africa expert with deep business ties on the continent.” Ross noted that Wilson emailed Clinton on Dec. 22, 2009, seeking help for Symbion Power, an American engineering contractor for whom Wilson consulted, in the company’s bid to pursue a U.S. Agency of International Development contract for work in Afghanistan. In the case of the Afghanistan project, Ross noted, Clinton vouched for Wilson and Symbion as she forwarded the request to Jack Lew, who served then as deputy secretary of state for management and resources. Ross further reported Wilson’s request might also have been discussed with President Obama, as one email indicates. In 2005, Fitzgerald prosecuted Libby, a prominent adviser to then Vice President Dick Cheney, in the Plame investigation, charging him with two counts of perjury, two counts of making false statements to federal prosecutors and one count of obstruction of justice. On March 6, 2007, Libby was convicted of four of the five counts, and on June 5, 2007, was sentenced by U.S. District Judge Reggie B. Walton to two and a half years in federal prison. On April 6, 2015, the Wall Street Journal reported the publication of New York Times reporter Judith Miller’s memoir “The Story: A Reporter’s Journey” exposed “unscrupulous conduct” by Fitzgerald in the 2007 trial of Libby.
  • WSJ reporter Peter Berkowitz noted Miller “writes that Mr. Fitzgerald induced her to give what she now realizes was false testimony.” “By withholding critical information and manipulating her memory as he prepared her to testify, Ms. Miller relates, Mr. Fitzgerald ‘steered’ her ‘in the wrong direction.’” http://www.wnd.com/2016/07/comey-has-long-history-of-clinton-related-cases/
  •  
    Bend over and grab your ankles. The rats nest of Clinton operatives in Washington DC is far deeper than anyone ever imagined. "FBI Director James Comey has a long history of involvement in Department of Justice actions that arguably ended up favorable to the Clintons. In 2004, Comey, then serving as a deputy attorney general in the Justice Department, apparently limited the scope of the criminal investigation of Sandy Berger, which left out former Clinton administration officials who may have coordinated with Berger in his removal and destruction of classified records from the National Archives. The documents were relevant to accusations that the Clinton administration was negligent in the build-up to the 9/11 terrorist attack. On Tuesday, Comey announced that despite evidence of "extreme negligence by Hillary Clinton and her top aides regarding the handling of classified information through a private email server, the FBI would not refer criminal charges to Attorney General Loretta Lynch and the Justice Department. Curiously, Berger, Lynch and Cheryl Mills all worked as partners in the Washington law firm Hogan & Hartson, which prepared tax returns for the Clintons and did patent work for a software firm that played a role in the private email server Hillary Clinton used when she was secretary of state. Lynch and Comey both served as U.S. attorney for the Southern District of New York. They crossed paths in the investigation of HSBC bank, which avoided criminal charges in a massive money-laundering scandal for which the bank paid a $1.9 billion fine. After Attorney General John Aschroft recused himself in the Valerie Plame affair in 2004, Comey appointed as special counsel Patrick J. Fitzgerald, who ended up convicting "Scooter" Libby, a top aide to then Vice President Dick Cheney, of perjury and obstruction of justice. The charge affirmed the accusations of Plame and her former ambassador husband, Joe Wilson - both partisan supporters of Bill and
  •  
    The "ethical" situation is far worse than described. Attorney disciplinary rules require that a lawyer, including all lawyers in the same firm, owe a lifetime duty of loyalty to a client, a duty that does not end with representation in a particular matter. Accordingly, Lynch had what the disciplinary rules refer to as an "actual conflict of interest" between her duties of loyalty to both Hillary and the U.S. government that required her withdrawal from representing either in the decision whether to prosecute Hillary. Saying that she would rubber stamp what Comey recommended was not the required withdrawal. Comey is an investigator, not a prosecutor. This was a situation for appointment of a special counsel to represent the Department of Justice in the decision whether to prosecute, not satisfied by rubber stamping Comey's recomendation,.
Paul Merrell

US air war against jihadists in Syria begins - The Long War Journal - 0 views

  • The United States and "partner nation forces" have expanded airstrikes against the Islamic State into Syria, broadening the war with the jihadist group beyond Iraq. Additionally, the US targeted the Khorasan Group, a coordinating council made up of al Qaeda leaders in Syria. US military officials involved in the operation told The Long War Journal that the strike package includes US B-1 bombers, carrier-based F/A-18 fighters and ground-based F-15s and F-16s, remotely piloted drones, and Tomahawk cruise missiles launched from warships. Airstrikes targeted Islamic State command and control centers in Raqqah, the jihadist group's de facto capital in Raqqah province in eastern Syria, as well as arms caches, supply depots, and ground units near the Iraqi border. Rear Admiral James Kirby, the Pentagon's spokesman, confirmed that airstrikes have begun. "I can confirm that US military and partner nation forces are undertaking military action against ISIL [Islamic State] terrorists in Syria using a mix of fighter, bomber and Tomahawk Land Attack Missiles," Kirby said in a statement obtained by The Long War Journal. In the early morning of Sept. 23, US Central Command, or CENTCOM, which is directing the operations in Iraq and Syria, provided further details of the attack.
  • Fourteen strikes against the Islamic State were executed using by "a mix of fighters, bombers, remotely piloted aircraft and Tomahawk Land Attack Missiles," according to a statement by CENTCOM. Forty-seven cruise missiles were "launched from the USS Arleigh Burke and USS Philippine Sea, which were operating from international waters in the Red Sea and North Arabian Gulf." "The strikes destroyed or damaged multiple ISIL targets in the vicinity of the towns of Raqqah in north central Syria, Dier al Zour, and Abu Kamal in eastern Syria and Hasakah in northeastern Syria," the statement says. "The targets included ISIL fighters, training compounds, headquarters and command and control facilities, storage facilities, a finance center, supply trucks and armed vehicles." According to the Syrian Observator for Human Rights, more than 70 Islamic State fighters were killed in the strikes and and over 300 were wounded. Other countries that participated in the operation include Bahrain, Jordan, Saudi Arabia, Qatar and the United Arab Emirates. Additionally, the US launched eight airstrikes against "a network of seasoned al Qaeda veterans - sometimes referred to as the Khorasan Group - who have established a safe haven in Syria to develop external attacks, construct and test improvised explosive devices and recruit Westerners to conduct operations." The strikes targeted "training camps, an explosives and munitions production facility, a communication building and command and control facilities" as part of an effort "to disrupt the imminent attack plotting against the United States and Western interests."
  • CENTCOM did not provide details on the names or numbers of Islamic State and al Qaeda fighters killed. The Syrian Observatory for Human Rights reported that "no less than 50 fighters from Jabhat al-Nusra (most of them were Syrian fighters), were killed by air strikes by the warplanes of the international coalition." In addition, eight civilians, including three children and a women, are reported to have been killed. CENTCOM was clear that only the US targeted al Qaeda's network in Syria. The Khorasan Group is closely tied to the Al Nusrah Front and other jihadist groups in Syria, which are at odds with the Islamic State. These groups are poised to gain from any setbacks to the rival Islamic State. President Barrack Obama stated 13 days ago that the US air campaign against the Islamic State, which began in northern Iraq on Aug. 7, would be expanded into Syria. US and French warplanes are now operating over Irbil, Sinjar, Kirkuk, the Mosul and Haditha dams, southwest of Baghdad (likely in Jurf al Sakhar in northern Babil), and somewhere on the Euphrates River. According to CENTCOM, the US has launched 194 airstrikes in Iraq since Aug. 7. The Islamic State has threatened to retaliate against the US and other Western countries that participate in military action against the jihadist group. Just yesterday, Abu Muhammad al Adnani, the spokesman for the Islamic State, called for Muslims in Western countries to wage jihad. [See Threat Matrix report, Islamic State spokesman again threatens West in new speech.]
Paul Merrell

CIA SUCCESSFULLY CONCEALS BAY OF PIGS HISTORY - 0 views

  • May 21, 2014 – The U.S. Court of Appeals for the D.C. Circuit yesterday joined the CIA's cover-up of its Bay of Pigs disaster in 1961 by ruling that a 30-year-old volume of the CIA's draft "official history" could be withheld from the public under the "deliberative process" privilege, even though four of the five volumes have previously been released with no harm either to national security or any government deliberation. "The D.C. Circuit's decision throws a burqa over the bureaucracy," said Tom Blanton, director of the National Security Archive (www.nsarchive.org), the plaintiff in the case. "Presidents only get 12 years after they leave office to withhold their deliberations," commented Blanton, "and the Federal Reserve Board releases its verbatim transcripts after five years. But here the D.C. Circuit has given the CIA's historical office immortality for its drafts, because, as the CIA argues, those drafts might 'confuse the public.'" "Applied to the contents of the National Archives of the United States, this decision would withdraw from the shelves more than half of what's there," Blanton concluded.
  • The 2-1 decision, authored by Judge Brett Kavanaugh (a George W. Bush appointee and co-author of the Kenneth Starr report that published extensive details of the Monica Lewinsky affair), agreed with Justice Department and CIA lawyers that because the history volume was a "pre-decisional and deliberative" draft, its release would "expose an agency's decision making process in such a way as to discourage candid discussion within the agency and thereby undermine the agency's ability to perform its functions." This language refers to the fifth exemption (known as b-5) in the Freedom of Information Act. The Kavanaugh opinion received its second and majority vote from Reagan appointee Stephen F. Williams, who has senior status on the court.
  • On the 50th anniversary of the Bay of Pigs invasion in 2011, the National Security Archive's Cuba project director, Peter Kornbluh, requested, through the FOIA, the complete release of "The Official History of the Bay of Pigs Operation" — a massive, five-volume study compiled by a CIA staff historian, Jack Pfeiffer, in the 1970s and early 1980s. Volume III had already been released under the Kennedy Assassination Records Act; and a censored version of Volume IV had been declassified years earlier pursuant to a request by Pfeiffer himself. The Archive's FOIA request pried loose Volumes I and II of the draft history, along with a less-redacted version of Volume IV, but the CIA refused to release Volume V, so the Archive filed suit under FOIA in 2012, represented by the expert FOIA litigator, David Sobel. In May 2012, U.S. District Judge Gladys Kessler held that Volume V was covered by the deliberative process privilege, and refused to order any segregation of "non-deliberative" material, as required by FOIA.
  • ...2 more annotations...
  • The Archive appealed the lower court's decision, and with representation from the distinguished firm of Skadden Arps Meagher Slate & Flom, brought the case to the D.C. Circuit, with oral argument in December 2013. The National Coalition for History, including the American Historical Association and other historical and archival professional organizations, joined the case with an amicus curiae brief authored by the Jones Day law firm arguing for release of the volume. Titled "CIA's Internal Investigation of the Bay of Pigs Operation," Volume V apparently contains Pfeiffer's aggressive defense of the CIA against a hard-hitting 1961 internal review, written by the agency's own Inspector General, which held the CIA singularly responsible for the poor assumptions, faulty planning and incompetence that led to the quick defeat of the paramilitary exile brigade by Fidel Castro's military at the Bahia de Cochinos between April 17 and April 20, 1961. The Archive obtained under FOIA and published the IG Report in 1998. The CIA has admitted in court papers that the Pfeiffer study contains "a polemic of recriminations against CIA officers who later criticized the operation," as well as against other Kennedy administration officials who Pfeiffer contended were responsible for this foreign policy disaster. In the dissenting opinion from the D.C. Circuit's 2-1 decision yesterday, Judge Judith Rogers (appointed by Bill Clinton) identified multiple contradictions in the CIA's legal arguments. Judge Rogers pointed out that the CIA had failed to justify why release of Volume V would "lead to public confusion" when CIA had already released Volumes I-IV. She noted that neither the CIA nor the majority court opinion had explained "why release of the draft of Volume V 'would expose an agency's decision making process,'" and discourage future internal deliberations within the CIA's historical office any more than release of the previous four volumes had done.
  • Prior to yesterday's decision, the Obama administration had bragged that reducing the government's invocation of the b-5 exemption was proof of the impact of the President's Day One commitment to a "presumption of disclosure." Instead, the bureaucracy has actually increased in the last two years its use of the b-5 exemption, which current White House counselor John Podesta once characterized as the "withhold if you want to" exemption. The majority opinion also left two openings for transparency advocates. It invites Congress to set a time limit for applying the b-5 exemption, as Congress has done in the Presidential Records Act. Second, it concludes that any "factual material" contained in the draft should be reachable through Freedom of Information requests.
  •  
    "Causing public confusion" is a weak grounds for withholding government records because the agency has the option of issuing clarifying statements. Indeed, much of what government does causes public confusion. Hopefully, the Archive will pursue en banc reconsideration and/or seek Supreme Court review. 
Paul Merrell

Judicial Watch: Benghazi Documents Point to White House on Misleading Talking Points - ... - 0 views

  • Judicial Watch announced today that on April 18, 2014, it obtained 41 new Benghazi-related State Department documents. They include a newly declassified email showing then-White House Deputy Strategic Communications Adviser Ben Rhodes and other Obama administration public relations officials attempting to orchestrate a campaign to “reinforce” President Obama and to portray the Benghazi consulate terrorist attack as being “rooted in an Internet video, and not a failure of policy.”  Other documents show that State Department officials initially described the incident as an “attack” and a possible kidnap attempt. The documents were released Friday as result of a June 21, 2013, Freedom of Information Act (FOIA) lawsuit filed against the Department of State (Judicial Watch v. U.S. Department of State (No. 1:13-cv-00951)) to gain access to documents about the controversial talking points used by then-UN Ambassador Susan Rice for a series of appearances on television Sunday news programs on September 16, 2012.  Judicial Watch had been seeking these documents since October 18, 2012. The Rhodes email was sent on sent on Friday, September 14, 2012, at 8:09 p.m. with the subject line:  “RE: PREP CALL with Susan, Saturday at 4:00 pm ET.”  The documents show that the “prep” was for Amb. Rice’s Sunday news show appearances to discuss the Benghazi attack.
  • The document lists as a “Goal”: “To underscore that these protests are rooted in and Internet video, and not a broader failure or policy.” Rhodes returns to the “Internet video” scenario later in the email, the first point in a section labeled “Top-lines”: [W]e’ve made our views on this video crystal clear. The United States government had nothing to do with it. We reject its message and its contents. We find it disgusting and reprehensible. But there is absolutely no justification at all for responding to this movie with violence. And we are working to make sure that people around the globe hear that message. Among the top administration PR personnel who received the Rhodes memo were White House Press Secretary Jay Carney, Deputy Press Secretary Joshua Earnest, then-White House Communications Director Dan Pfeiffer, then-White House Deputy Communications Director Jennifer Palmieri, then-National Security Council Director of Communications Erin Pelton, Special Assistant to the Press Secretary Howli Ledbetter, and then-White House Senior Advisor and political strategist David Plouffe. The Rhodes communications strategy email also instructs recipients to portray Obama as “steady and statesmanlike” throughout the crisis. Another of the “Goals” of the PR offensive, Rhodes says, is “[T]o reinforce the President and Administration’s strength and steadiness in dealing with difficult challenges.” He later includes as a PR “Top-line” talking point: I think that people have come to trust that President Obama provides leadership that is steady and statesmanlike. There are always going to be challenges that emerge around the world, and time and again, he has shown that we can meet them.
  • The documents Judicial Watch obtained also include a September 12, 2012, email from former Deputy Spokesman at U.S. Mission to the United Nations Payton Knopf to Susan Rice, noting that at a press briefing earlier that day, State Department spokesperson Victoria Nuland explicitly stated that the attack on the consulate had been well planned.  The email sent by Knopf to Rice at 5:42 pm said: Responding to a question about whether it was an organized terror attack, Toria said that she couldn’t speak to the identity of the perpetrators but that it was clearly a complex attack. In the days following the Knopf email, Rice appeared on ABC, CBS, NBC, Fox News and CNN still claiming the assaults occurred “spontaneously” in response to the “hateful video.” On Sunday, September 16 Rice told CBS’s “Face the Nation:” But based on the best information we have to date, what our assessment is as of the present is in fact what began spontaneously in Benghazi as a reaction to what had transpired some hours earlier in Cairo where, of course, as you know, there was a violent protest outside of our embassy–sparked by this hateful video. The Judicial Watch documents confirm that CIA talking points, that were prepared for Congress and may have been used by Rice on “Face the Nation” and four additional Sunday talk shows on September 16, had been heavily edited by then-CIA deputy director Mike Morell. According to one email: The first draft apparently seemed unsuitable….because they seemed to encourage the reader to infer incorrectly that the CIA had warned about a specific attack on our embassy.  On the SVTS, Morell noted that these points were not good and he had taken a heavy hand to editing them. He noted that he would be happy to work with [then deputy chief of staff to Hillary Clinton]] Jake Sullivan and Rhodes to develop appropriate talking points.
  • ...2 more annotations...
  • The documents obtained by Judicial Watch also contain numerous emails sent during the assault on the Benghazi diplomatic facility.  The contemporaneous and dramatic emails describe the assault as an “attack”:
  • “Now we know the Obama White House’s chief concern about the Benghazi attack was making sure that President Obama looked good,” said Judicial Watch President Tom Fitton. “And these documents undermine the Obama administration’s narrative that it thought the Benghazi attack had something to do with protests or an Internet video.  Given the explosive material in these documents, it is no surprise that we had to go to federal court to pry them loose from the Obama State Department.”
  •  
    Has there ever been a White House caught in so many lies as the Obama Administration? Maybe, in Nixon's Watergate years. But IMHO it would take a detailed study to determine the winner. It's close. 
Paul Merrell

4Chan Claims To Have Fabricated Anti-Trump Report As A Hoax | Zero Hedge - 0 views

  • In a story that is getting more surreal by the minute, a post on 4Chan now claims that the infamous "golden showers" scene in the unverified 35-page dossier, allegedly compiled by a British intelligence officer, was a hoax and fabricated by a member of the chatboard as "fanfiction", then sent to Rick Wilson, who proceeded to send it to the CIA, which then put it in their official classified intelligence report on the election. Here is 4Chan's explanation of how the story came to light: >/pol/acks mailed fanfiction to anti-trump pundit Rick Wilson about trump making people piss on a bed obama slept in >he thought it was real and gave it to the CIA >the central intelligence agency of the united states of america put this in their official classified intelligence report on russian involvement in the election >donald trump and obama have both read this pol/acks fanfiction >the cia has concluded that the russian plans to blackmail trump with this story we made up just let that sink in what we have become.
  • nd a summary posted on pastebin: On january 10, Buzzfeed posted a story under the byline of Ken Bensinger, Mark Schoofs and Miriam elder titled “these reports Allege Trump Has Deep Ties To Russia” and posted a link to a document alleging, among other things, that russia has been cultivating trump for 5+ years, that trump has been in constant contact with the kremlin for information on his opponents, and perhaps most inflammatory, that there are many recorded instances of blackmail of trump in sexual misconduct. A prominent claim is that trump rented the presidential suite of the Ritz Carlton Hotel in moscow, where he knew that the Obamas had slept in; he them hired a number of prostitutes to perform a 'golden shower' (pissplay) on the bed and in the room. https://www.buzzfeed.com/kenbensinger/these-reports-allege-trump-has-dee...https://assets.documentcloud.org/documents/3259984/Trump-Intelligence-Al...   Noted #nevertrump voice Rick Wilson later commented on twitter, stating that the report “gave a new meaning to Wikileaks” (https://twitter.com/TheRickWilson/status/818982395202379777) and that the report was the reason everybody was fighting so hard against the election of Trump. (https://twitter.com/TheRickWilson/status/818983514335047680)   The remarkable thing? It's all fake. And not only fake; it's a prank perpetuated by 4chan, on Rick Wilson himself. A post on 4chan on october 26 stated “mfw managed to convince CTR and certain (((journalists))) on Twitter there'll be an October surprise on Trump this Friday” along with a picture of a smug face with a hash name. http://archive.4plebs.org/pol/thread/94704894/#94705224   on november 1, a person without a picture but is assumed to be the same person posted “So they took what I told Rick Wilson and added a Russian spy angle to it. They still believe it. Guys, they're truly fucking desperate - there's no remaining Trump scandal that's credible.” https://archive.4plebs.org/pol/thread/95568919/#95571329  
  • al media, a person with the same smug grin face, and the same hash title for the picture, stated “I didn't think they'd take it so far.” http://boards.4chan.org/pol/thread/106514445#p106520376   This story has taken on something of a life of it's own. Going through Rick Wilson's twitter, you can find many different stories from the time that he had shown the story to a wide number of anti-trump news sources, trying to find a news organization that would actually publish the story. During that time period, he referred to it often as 'the thing', and often playing coy with followers on the content with the story with anybody who was not also a #Nevertrumper. Unconfirmed sources has people as high up as John McCain giving the story to FBI Director James Comey to attempt to verify the story. Given that Rick Wilson runs in Establishment circles, it is not an impossible scenario that long-serving senators are falling for what amounts to a 4chan troll trump supporter creating an ironic October Surprise out of wholecloth to punk a GOPe pundit who derogatorily referred to them as single men who masturbate to anime. While this entire incident is laughable, and even more so if the 4Chan account is accurate, what makes it quite tragic, is that it is no longer possible to dismiss the "fake news" angle to an intelligence report. And if the CIA is compromised, what is left for "news outlets" like CNN and BuzzFeed, which were all too eager to run with the story without any attempt at verification?
  •  
    It's must read.
Paul Merrell

Obama Promises Disappear from Web - Sunlight Foundation Blog - 1 views

  • Change.gov, the website created by the Obama transition team in 2008, has effectively disappeared sometime over the last month. While the front splash page for Change.gov has linked to the main White House website for years, until recently, you could still continue on to see the materials and agenda laid out by the administration. This was a particularly helpful resource for those looking to compare Obama's performance in office against his vision for reform, laid out in detail on Change.gov. According to the Internet Archive, the last time that content (beyond the splash page) was available was June 8th -- last month.
  • Here's one possibility, from the administration's ethics agenda: Protect Whistleblowers: Often the best source of information about waste, fraud, and abuse in government is an existing government employee committed to public integrity and willing to speak out. Such acts of courage and patriotism, which can sometimes save lives and often save taxpayer dollars, should be encouraged rather than stifled. We need to empower federal employees as watchdogs of wrongdoing and partners in performance. Barack Obama will strengthen whistleblower laws to protect federal workers who expose waste, fraud, and abuse of authority in government. Obama will ensure that federal agencies expedite the process for reviewing whistleblower claims and whistleblowers have full access to courts and due process.
Paul Merrell

How the NSA Converts Spoken Words Into Searchable Text - The Intercept - 0 views

  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest. The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
  • ...9 more annotations...
  • The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s. What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds. In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited. Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
  • A 2008 document from the Snowden archive shows that  transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing: (U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing. A version of the system the NSA uses is now even available commercially.
  • But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.” The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states. A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
  • According to a 2011 memo, “How is Human Language Technology (HLT) Progressing?“, NSA that year deployed “HLT Labs” to Afghanistan, NSA facilities in Texas and Georgia, and listening posts in Latin America run by the Special Collection Service, a joint NSA/CIA unit that operates out of embassies and other locations. “Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
  • The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America. For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.” The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
  • VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
  • What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.” The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
  • Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
  • The presidentially appointed but independent Privacy and Civil Liberties Oversight Board (PCLOB) didn’t mention speech-to-text technology in its public reports. “I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept. His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

18 Signs That The Global Economic Crisis Is Accelerating As We Enter The Last Half Of 2014 - 0 views

  • #1 The Bank for International Settlements has issued a new report which warns that "dangerous new asset bubbles" are forming which could potentially lead to another major financial crisis.  Do the central bankers know something that we don't, or are they just trying to place the blame on someone else for the giant mess that they have created? #2 Argentina has missed a $539 million debt payment and is on the verge of its second major debt default in 13 years. #3 Bulgaria is desperately trying to calm down a massive run on the banks that threatens of spiral out of control. #4 Last month, household loans in the eurozone declined at the fastest rate ever recorded.  Why are European banks holding on to their money so tightly right now? #5 The number of unemployed jobseekers in France has just soared to another brand new record high.
  • #6 Economies all over Europe are either showing no growth or are shrinking.  Just check out what a recent Forbes article had to say about the matter... Italy’s economy shrank by 0.1% in the first three months of 2014, matching the average of the three previous quarters. After expanding 0.6% in Q2 2013, France recorded zero growth. Portugal shrank 0.7%, following positive numbers in the preceding nine months. While figures weren’t available for Greece and Ireland in Q1, neither country is showing progress. Greek GDP dropped 2.5% in the final three months of last year, and Ireland limped ahead at 0.2%. #7 A few days ago it was reported that consumer prices in Japan are rising at the fastest pace in 32 years.
  • #8 Household expenditures in Japan are down 8 percent compared to one year ago. #9 U.S. companies are drowning in massive amounts of debt, but the corporate debt bubble in China is so bad that the amount of corporate debt in China has actually now surpassed the amount of corporate debt in the United States. #10 One Chinese auditor is warning that up to 80 billion dollars worth of loans in China are backed by falsified gold transactions.  What will that do to the price of gold and the stability of Chinese financial markets as that mess unwinds? #11 The unemployment rate in Greece is currently sitting at 26.7 percent and the youth unemployment rate is 56.8 percent.
  • ...2 more annotations...
  • #12 67.5 percent of the people that are unemployed in Greece have been unemployed for over a year. #13 The unemployment rate in the eurozone as a whole is 11.8 percent - just a little bit shy of the all-time record of 12.0 percent. #14 The European Central Bank is so desperate to get money moving through the system that it has actually introduced negative interest rates. #15 The IMF is projecting that there is a 25 percent chance that the eurozone will slip into deflation by the end of next year. #16 The World Bank is warning that "now is the time to prepare" for the next crisis. #17 The economic conflict between the United States and Russia continues to deepen.  This has caused Russia to make a series of moves away from the U.S. dollar and toward other major currencies.  This will have serious ramifications for the global financial system as time rolls along.
  • #18 Of course the U.S. economy is struggling right now as well.  It shrank at a 2.9 percent annual rate during the first quarter of 2014, which was much worse than anyone had anticipated.
Paul Merrell

Taliban assault Camp Bastion, storm foreign guest house in Kabul - The Long War Journal - 0 views

  • Fighting between Afghan forces and the Taliban inside Camp Bastion, the large military complex in Helmand province that was evacuated by US and British troops just one month ago, continues for the third day. Meanwhile, in the capital of Kabul, the jihadist group overran a guest house used by foreigners and may have taken hostages. The Taliban initially launched their attack on Camp Bastion on Nov. 27, and Afghan officials quickly claimed the assault was defeated and the jihadists did not penetrate the perimeter of the base. But the attack continued as the Taliban attacked Camp Bastion from two sides, according to Pajhwok Afghan News. An Afghan Army general who commands a regiment in Helmand said that heavily armed fighters with assault weapons and suicide vests are still fighting Afghan forces inside the base.
  • British and US forces handed over Camp Bastion, which served as the British headquarters in the country, to Afghan forces on Oct. 26. The base, along with neighboring Camp Leatherneck, which was the US Marine headquarters in the south, were the main hubs of counterinsurgency and air operations against the Taliban in Helmand, Nimroz, and Farah provinces. Leatherneck was also turned over to Afghan control on Oct. 26. The Taliban have successfully breached security at Camp Bastion once in the past. On Sept. 14, 2012, a 15-man Taliban team penetrated the perimeter at the airbase, destroyed six USMC Harriers and damaged two more, and killed the US squadron commander and a sergeant. Fourteen of the 15 members of the assault team were killed, while the last was wounded and captured. Coalition forces captured one of the leaders of the operation days later, while the Taliban released a video that highlighted the attack.
  • Also today, Taliban fighters assaulted a "foreign guesthouse" just 200 meters from the Afghan parliament building in the capital, according to Pajhwok Afghan News. It is unclear which organization runs the guesthouse. The Taliban claimed it was run by "a Christian organization seeking to convert Muslims," Reuters reported. According to eyewitnesses, "three gunmen in military uniforms" opened fire on the guesthouse, while others stormed the compound and engaged security guards inside. Two fighters wearing suicide vests are said to have entered the compound. Afghan officials said there may be hostages. Today's attack in Kabul is the fourth major assault against Western targets in the capital this week.
  • ...1 more annotation...
  • The recent attacks in the capital are likely executed by what the International Security Assistance Force and US military officials have previously called the Kabul Attack Network. This network is made up of fighters from the Taliban, the Haqqani Network, and Hizb-i-Islami Gulbuddin, and pools resources and cooperates with terror groups such as the Lashkar-e-Taiba and al Qaeda. Top Afghan intelligence officials have linked the Kabul Attack Network to Pakistan's Inter-Services Intelligence Directorate as well. The network's contacts extend outward from Kabul into the surrounding provinces of Logar, Wardak, Nangarhar, Kapisa, Kunar, Ghazni, and Zabul.
  •  
    I haven't been posting bookmarks for action inside Afghanistan for some time because the trend has been stable, with attacks by the Taliban and other Muslim groups on the U.S. trained and supplied Afghan Army continuing. Even Kabul's Green Zone has seen plenty of action. Prognosis: Taliban retakes control of Afghanistan soon after the last NATO troops withdraw. Obama's prolonging of U.S. troops stationed in Afghanistan only postpones the inevitable. But that has been the prognosis for many years now.  
Paul Merrell

A Clinton Fan Manufactured Fake News That MSNBC Personalities Spread to Discredit WikiL... - 0 views

  • The phrase “Fake News” has exploded in usage since the election, but the term is similar to other malleable political labels such as “terrorism” and “hate speech”; because the phrase lacks any clear definition, it is essentially useless except as an instrument of propaganda and censorship. The most important fact to realize about this new term: those who most loudly denounce Fake News are typically those most aggressively disseminating it. One of the most egregious examples was the recent Washington Post article hyping a new anonymous group and its disgusting blacklist of supposedly pro-Russia news outlets – a shameful article mindlessly spread by countless journalists who love to decry Fake News, despite the Post article itself being centrally based on Fake News. (The Post this week finally added a lame editor’s note acknowledging these critiques; the Post editors absurdly claimed that they did not mean to “vouch for the validity” of the blacklist even though the article’s key claims were based on doing exactly that). Now we have an even more compelling example. Back in October, when WikiLeaks was releasing emails from the John Podesta archive, Clinton campaign officials and their media spokespeople adopted a strategy of outright lying to the public, claiming – with no basis whatsoever – that the emails were doctored or fabricated and thus should be ignored. That lie – and that is what it was: a claim made with knowledge of its falsity or reckless disregard for its truth – was most aggressively amplified by MSNBC personalities such as Joy Ann Reid and Malcolm Nance, The Atlantic’s David Frum, and Newsweek’s Kurt Eichenwald.
  • The phrase “Fake News” has exploded in usage since the election, but the term is similar to other malleable political labels such as “terrorism” and “hate speech”; because the phrase lacks any clear definition, it is essentially useless except as an instrument of propaganda and censorship. The most important fact to realize about this new term: Those who most loudly denounce Fake News are typically those most aggressively disseminating it. One of the most egregious examples was the recent Washington Post article hyping a new anonymous group and its disgusting blacklist of supposedly pro-Russia news outlets — a shameful article mindlessly spread by countless journalists who love to decry Fake News, despite the Post article itself being centrally based on Fake News. (The Post this week finally added a lame editor’s note acknowledging these critiques; the Post editors absurdly claimed that they did not mean to “vouch for the validity” of the blacklist even though the article’s key claims were based on doing exactly that). Now we have an even more compelling example. Back in October, when WikiLeaks was releasing emails from the John Podesta archive, Clinton campaign officials and their media spokespeople adopted a strategy of outright lying to the public, claiming — with no basis whatsoever — that the emails were doctored or fabricated and thus should be ignored. That lie — and that is what it was: a claim made with knowledge of its falsity or reckless disregard for its truth — was most aggressively amplified by MSNBC personalities such as Joy Ann Reid and Malcolm Nance, The Atlantic’s David Frum, and Newsweek’s Kurt Eichenwald.
  • That the emails in the Wikileaks archive were doctored or faked — and thus should be disregarded — was classic Fake News, spread not by Macedonian teenagers or Kremlin operatives but by established news outlets such as MSNBC, The Atlantic, and Newsweek. And, by design, this Fake News spread like wildfire all over the internet, hungrily clicked and shared by tens of thousands of people eager to believe it was true. As a result of this deliberate disinformation campaign, anyone reporting on the contents of the emails was instantly met with claims that the documents in the archive had been proven fake. The most damaging such claim came from MSNBC’s intelligence analyst Malcolm Nance. As I documented on October 11, he tweeted what he — for some bizarre reason — labeled an “Official Warning.” It decreed: “#PodestaEmails are already proving to be riddled with obvious forgeries & #blackpropaganda not even professionally done.” That tweet was re-tweeted by more than 4,000 people. It was vested with added credibility by Clinton-supporting journalists like Reid and Frum (“expert to take seriously”).
  • ...3 more annotations...
  • All of that, in turn, led to an article in something called the “Daily News Bin” with the headline: “MSNBC intelligence expert: WikiLeaks is releasing falsified emails not really from Hillary Clinton.” This classic fake news product — citing Nance and Reid among others — was shared more than 40,000 times on Facebook alone.
  • From the start, it was obvious that it was this accusation from Clinton supporters — not the WikiLeaks documents — that was a complete fraud, perpetrated on the public as deliberate disinformation. With regard to the claim about the Podesta emails, now we know exactly who created it in the first instance: a hard-core Clinton fanatic.
  • Sadly for Chacon, however, the people who ended up getting fooled by his Fake News items were the nation’s most prominent Clinton supporters, including supposed experts and journalists from MSNBC who used his obvious fakes to try to convince the world that the WikiLeaks archive had been compromised and thus should be ignored.
Paul Merrell

Afghan government 'has lost territory to the insurgency' | FDD's Long War Journal - 0 views

  • The Afghan government “has lost territory to the insurgency” and “district control continues to decline,” the Special Inspector General for Afghanistan Reconstruction (SIGAR) said in its most recent quarterly report to United States Congress. An estimated 15 percent of Afghanistan’s districts have slipped from the government’s control over that time period. The picture is more bleak than what the Obama administration and top military commanders have let on when looked at from a longer distance. According to SIGAR, the Afghan government controls or influences just 52 percent of the nation’s districts today compared to 72 percent in Nov. 2015. “SIGAR’s analysis of the most recent data provided by US Forces in Afghanistan (USFOR-A) suggests that the security situation in Afghanistan has not improved this quarter,” the watchdog group noted in its most recent assessment of the country. “The numbers of the Afghan security forces are decreasing, while both casualties and the number of districts under insurgent control or influence are increasing.”
  • “[T]he ANDSF [Afghan National Defense and Security Forces] has not yet been capable of securing all of Afghanistan and has lost territory to the insurgency,” since the last reporting period. The Afghan government has lost control of more than six percent of Afghanistan’s 407 districts since SIGAR issued its last report, on Oct. 30. According to SIGAR, the insurgency, which is overwhelmingly made up of the Taliban, now controls nine districts and influences another 32, while 133 districts are “contested.” USFOR-A defines contested districts as “having ‘negligible meaningful impact from insurgents,’ contending that neither the insurgency nor the Afghan government maintains significant control over these areas.” The names of the Taliban controlled and influenced districts, as well as those that are contested, were not disclosed by USFOR-A or SIGAR.
  • The US military justified the loss of territory by claiming the Afghan government’s “new Sustainable Security Strategy” calls for abandoning districts that are “not important.” “USFOR-A attributes the loss of government control or influence over territory to the ANDSF’s strategic approach to security prioritization, identifying the most important areas that the ANDSF must hold to prevent defeat, and focusing less on areas with less strategic importance,” SIGAR reported. “Under its new Sustainable Security Strategy, the ANDSF targets ‘disrupt’ districts for clearance operations when the opportunity arises, but will give first priority to protecting ‘hold’ and ‘fight’ districts under its control.” This strategy neglects the fact that the Taliban views rural districts or those “with less strategic importance” as critical to its insurgency. The Taliban uses theses districts to raise funds, recruit and train fighters, and launch attacks on population centers. Additionally, Taliban allies such as al Qaeda run training camps and operate bases in areas under Taliban control. This strategy was explained by Mullah Aminullah Yousuf, the Taliban’s shadow governor for Uruzgan, in April 2016. The Taliban has utilized its control of the rural districts to directly threaten major population centers. Last year, the Taliban was able to threaten five of Afghanistan’s 34 provincial capitals. The government lost control of Kunduz for more than a week last fall.
  • ...1 more annotation...
  • FDD’s Long War Journal has maintained that the US military’s assessment of the state of play in Afghanistan’s districts is flawed. Our study estimates the Taliban controls 42 Afghan districts and contests (or influences) another 55. [Note: USFOR-A’s definition of “influence” matches our definition of “contested.” The term “influenced/contested” will be used for clarity to describe these districts. LWJ does not assess districts that are defined by USFOR-A as “contested,” which means neither the Taliban or Afghan government hold sway.] The number of Taliban controlled and influenced/contested districts has risen from 70 in October 2015 to 97 this month. Districts under Taliban command are typically being administered by the group, or the group controls the district center. Additionally, districts where the district center frequently changes hands are considered Taliban-controlled. In influenced/contested districts, the Taliban dominates all of the areas of a district except the administrative center.
Paul Merrell

"Disreputable if Not Outright Illegal": The National Security Agency versus Martin Luth... - 0 views

  • Washington, D.C., September 25, 2013 – During the height of the Vietnam War protest movements in the late 1960s and early 1970s, the National Security Agency tapped the overseas communications of selected prominent Americans, most of whom were critics of the war, according to a recently declassified NSA history. For years those names on the NSA's watch list were secret, but thanks to the decision of an interagency panel, in response to an appeal by the National Security Archive, the NSA has released them for the first time. The names of the NSA's targets are eye-popping. Civil rights leaders Dr. Martin Luther King and Whitney Young were on the watch list, as were the boxer Muhammad Ali, New York Times journalist Tom Wicker, and veteran Washington Post humor columnist Art Buchwald. Also startling is that the NSA was tasked with monitoring the overseas telephone calls and cable traffic of two prominent members of Congress, Senators Frank Church (D-Idaho) and Howard Baker (R-Tennessee). The NSA history, American Cryptology during the Cold War, is a multi-volume study that covers the intersection of secret communications intelligence with Cold War history. The National Security Archive filed the initial mandatory declassification review request for the histories in 2006. The next year, when the NSA denied significant information from the histories the Archive filed an appeal. The Agency declassified more information in 2008 and the Archive posted the first three volumes on its Web site in 2008, with commentary by Matthew Aid. The NSA had denied so much, however, that the Archive filed a final appeal with the Interagency Security Classification Appeals Panel (ISCAP) that same year. Book I remains under appeal. Five years after the Archive's appeal, the ISCAP has compelled the NSA to release more information from Books II and III.
  •  
    Much more on the linked site, including the declassified documents themselves. 
1 - 20 of 344 Next › Last »
Showing 20 items per page