Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged black-budget

Rss Feed Group items tagged

Gary Edwards

Rand Paul's Tea Party Response: Full Text - 0 views

  • With my five-year budget, millions of jobs would be created by cutting the corporate income tax in half, by creating a flat personal income tax of 17%, and by cutting the regulations that are strangling American businesses.
  • America has much greatness left in her. We will begin to thrive again when we begin to believe in ourselves again, when we regain our respect for our founding documents, when we balance our budget, when we understand that capitalism and free markets and free individuals are what creates our nation’s prosperity.
  •  
    Outstanding statement about what made America great, an dhow are government is destroying that greatness.  This is the full Text of Sen. Rand Paul's Tea Party Response to Obama's State of the Union Address: I speak to you tonight from Washington, D.C. The state of our economy is tenuous but our people remain the greatest example of freedom and prosperity the world has ever known. People say America is exceptional. I agree, but it's not the complexion of our skin or the twists in our DNA that make us unique. America is exceptional because we were founded upon the notion that everyone should be free to pursue life, liberty, and happiness. For the first time in history, men and women were guaranteed a chance to succeed based NOT on who your parents were but on your own initiative and desire to work. We are in danger, though, of forgetting what made us great. The President seems to think the country can continue to borrow $50,000 per second. The President believes that we should just squeeze more money out of those who are working. The path we are on is not sustainable, but few in Congress or in this Administration seem to recognize that their actions are endangering the prosperity of this great nation. Ronald Reagan said, government is not the answer to the problem, government is the problem. Tonight, the President told the nation he disagrees. President Obama believes government is the solution: More government, more taxes, more debt. What the President fails to grasp is that the American system that rewards hard work is what made America so prosperous. What America needs is not Robin Hood but Adam Smith. In the year we won our independence, Adam Smith described what creates the Wealth of Nations. He described a limited government that largely did not interfere with individuals and their pursuit of happiness. All that we are, all that we wish to be is now threatened by the notion that you can have something for nothing, that you can have your cake and ea
Paul Merrell

US Military Uses IMF and World Bank to Launder 85% of Its Black Budget | Global Researc... - 1 views

  • hough transparency was a cause he championed when campaigning for the presidency, President Obama has largely avoided making certain defense costs known to the public. However, when it comes to military appropriations for government spy agencies, we know from Freedom of Information Act requests that the so-called “black budget” is an increasingly massive expenditure subsidized by American taxpayers. The CIA and and NSA alone garnered $52.6 billion in funding in 2013 while the Department of Defense black ops budget for secret military projects exceeds this number. It is estimated to be $58.7 billion for the fiscal year 2015. What is the black budget? Officially, it is the military’s appropriations for “spy satellites, stealth bombers, next-missile-spotting radars, next-gen drones, and ultra-powerful eavesdropping gear.” However, of greater interest to some may be the clandestine nature and full scope of the black budget, which, according to analyst Catherine Austin Fitts, goes far beyond classified appropriations. Based on her research, some of which can be found in her piece “What’s Up With the Black Budget?,” Fitts concludes that the during the last decade, global financial elites have configured an elaborate system that makes most of the military budget unauditable. This is because the real black budget includes money acquired by intelligence groups via narcotics trafficking, predatory lending, and various kinds of other financial fraud.
  • The result of this vast, geopolitically-sanctioned money laundering scheme is that Housing and Urban Devopment and other agencies are used for drug trafficking and securities fraud. According to Fitts, the scheme allows for at least 85 percent of the U.S. federal budget to remain unaudited. Fitts has been researching this issue since 2001, when she began to believe that a financial coup d’etat was underway. Specifically, she suspected that the banks, corporations, and investors acting in each global region were part of a “global heist,” whereby capital was being sucked out of each country. She was right.
  • As Fitts asserts, “[She] served as Assistant Secretary of Housing at the US Department of Housing and Urban Development (HUD) in the United States where I oversaw billions of government investment in US communities…..I later found out that the government contractor leading the War on Drugs strategy for U.S. aid to Peru, Colombia and Bolivia was the same contractor in charge of knowledge management for HUD enforcement. This Washington-Wall Street game was a global game. The peasant women of Latin America were up against the same financial pirates and business model as the people in South Central Los Angeles, West Philadelphia, Baltimore and the South Bronx.” This is part of an even larger financial scheme. It is fairly well-established by now that international financial institutions like the World Trade Organization, the World Bank, and the International Monetary Fund operate primarily as instruments of corporate power and nation-controlling infrastructure investment mechanisms. For example, the primary purpose of the World Bank is to bully developing countries into borrowing money for infrastructure investments that will fleece trillions of dollars while permanently indebting these “debtor” nations to West. But how exactly does the World Bank go about doing this? John Perkins wrote about this paradigm in his book, Confessions of an Economic Hitman. During the 1970s, Perkins worked for the international engineering consulting firm, Chas T. Main, as an “economic hitman.” He says the operations of the World Bank are nothing less than “pure economic colonization on behalf of powerful corporations and banks that use the United States government as their tool.”
  • ...1 more annotation...
  • In his book, Perkins discusses Joseph Stiglitz, the Chief Economist for the World Bank from 1997-2000, at length. Stiglitz described the four-step plan for bamboozling developing countries into becoming debtor nations: Step One, according to Stiglitz, is to convince a nation to privatize its state industries. Step Two utilizes “capital market liberalization,” which refers to the sudden influx of speculative investment money that depletes national reserves and property values while triggering a large interest bump by the IMF. Step Three, Stiglitz says, is “Market-Based Pricing,” which means raising the prices on food, water and cooking gas. This leads to “Step Three and a Half: The IMF Riot.” Examples of this can be seen in Indonesia, Bolivia, Ecuador and many other countries where the IMF’s actions have caused financial turmoil and social strife. Step 4, of course, is “free trade,” where all barriers to the exploitation of local produce are eliminated. There is a connection between the U.S. black budget and the trillion dollar international investment fraud scheme. Our government and the banking cartels and corporatocracy running it have configured a complex screen to block our ability to audit their budget and the funds they use for various black op projects. However, they can not block our ability to uncover their actions and raise awareness.
Paul Merrell

'Black budget' summary details U.S. spy network's successes, failures and objectives - ... - 0 views

  • U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary
  • Nearly 35,000 employees are listed under a category called the Consolidated Cryptologic Program, which includes the NSA as well as the surveillance and code-breaking components of the Air Force, Army, Navy and Marines.
  • The resources devoted to signals intercepts are extraordinary.Nearly 35,000 employees are listed under a category called the Consolidated Cryptologic Program, which includes the NSA as well as the surveillance and code-breaking components of the Air Force, Army, Navy and Marines.
Gary Edwards

The List: Unnecessarily Shut Down by Obama to Inflict Public Pain - 0 views

  •  
    "The media may or may not report on these individual occurrences, but what they will never do is provide the American people with the full context and scope of Obama's shrill pettiness. Below is a list of illogical, unnecessary, and shockingly spiteful moves our government is making in the name of essential and non-essential. This list will be regularly updated, and if you have something you feel should be added, please email me at jnolte@breitbart.com or tweet me @NolteNC.Please include a link to the news source. -- 1. Treatments for Children Suffering From Cancer - The GOP have agreed to a compromise by funding part of the government, including the National Institutes of Health, which offers children with cancer last-chance experimental treatment. Obama has threatened to veto this funding. 2. The World War II Memorial - The WWII memorial on the DC Mall is a 24/7 open-air memorial that is not regularly staffed. Although the White House must have known that WWII veterans in their eighties and nineties had already booked flights to visit this memorial, the White House still found the resources to spitefully barricade the attraction.  The Republican National Committee has offered to cover any costs required to keep the memorial open. The White House refused. Moreover, like the NIH, the GOP will pass a compromise bill that would fund America's national parks. Obama has threatened to veto that bill. 3. Furloughed Military Chaplains Not Allowed to Work for Free - Furloughed military chaplains willing to celebrate Mass and baptisms for free have been told they will be punished for doing so. 4. Business Stops In Florida Keys - Although the GOP have agreed to compromise in the ongoing budget stalemate and fund the parks, Obama has threatened to veto that funding. As a result, small businesses, hunters, and commercial fisherman can't practice their trade. While the feds have deemed the personnel necessary to keep this area open "non-essential," the "enforcement office
Paul Merrell

Speech Recognition is NSA's Best-Kept Open Secret - The Intercept - 0 views

  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition.
  • Siri can understand what you say. Google can take dictation. Even your new smart TV is taking verbal orders. So is there any doubt the National Security Agency has the ability to translate spoken words into text? But precisely when the NSA does it, with which calls, and how often, is a well-guarded secret. It’s not surprising that the NSA isn’t talking about it. But oddly enough, neither is anyone else: Over the years, there’s been almost no public discussion of the NSA’s use of automated speech recognition. One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.”
  • One minor exception was in 1999, when a young Australian cryptographer named Julian Assange stumbled across an NSA patent that mentioned “machine transcribed speech.” Assange, who went on to found WikiLeaks, said at the time: “This patent should worry people. Everyone’s overseas phone calls are or may soon be tapped, transcribed and archived in the bowels of an unaccountable foreign spy agency.” The most comprehensive post-Snowden descriptions of NSA’s surveillance programs are strangely silent when it comes to speech recognition. The report from the President’s Review Group on Intelligence and Communications Technologies doesn’t mention it, and neither does the October 2011 FISA Court ruling, or the detailed reports from the Privacy and Civil Liberties Oversight Board.
  • ...3 more annotations...
  • There is some mention of speech recognition in the “Black Budget” submitted to Congress each year. But there’s no clear sign that anybody on the Hill has ever really noticed. As The Intercept reported on Tuesday, items from the Snowden archive document the widespread use of automated speech recognition by the NSA. The strategic advantage, invasive potential and policy implications of being able to turn spoken words into text are not trivial: Suddenly, voice conversations, historically considered ephemeral and unsearchable, can be scanned, catalogued and archived — not perfectly, but well enough to dramatically increase the effective scope of eavesdropping. Former senior NSA executive turned whistleblower Thomas Drake, who’s seen NSA’s automated speech recognition at work, says the silence is telling.
  • “You’re seeing a black hole,” Drake told The Intercept. “That means there’s something there that’s really significant. You’re seeing some of the fuzzy contours of this whole other program.”
  • Senator Ron Wyden, D-Ore., arguably the foremost congressional critic of NSA overreach, wouldn’t comment directly on the question of speech recognition. But, he said through a spokesperson: “After 14 years on the Intelligence Committee, I’ve learned that senators must be constantly on the lookout for secret interpretations of the law and advances in surveillance that Congress isn’t aware of.” He added: “For centuries, individual privacy was protected in part by the limited resources of governments. It simply wasn’t possible for governments to secretly collect information on every single citizen without investing in massive networks of spies and informants. But in the 21st century mass surveillance is no longer difficult and expensive — it’s increasingly cheap and easy. The only privacy protections that will matter in the future are the ones that are written into law and defended by public demand for freedom and openness.”
  •  
    A "black hole" at the NSA? Voice-to-text is indeed an ultra-powerful intelligence tool, but only if you are gathering verbal conversations. As content, verbal conversations should be off-limits without a court order. But is NSA honoring that limitation? And is the FISA Court enforcing it?
Paul Merrell

Black Budget: US govt clueless about missing Pentagon $trillions - YouTube - 0 views

  • The Pentagon has secured a 630 billion dollar budget for next year, even though it's failed to even account for the money it's received since 1996. A whopping 8.5 trillion dollars of taxpayer cash have gone to defence programmes - none of which has been audited. This black budget has sparked concerns over potential fraud, as Gayane Chichakyan reports.
Gary Edwards

Data Points To A Powerful Romney Campaign - And Yet…He Lost. - The Ulsterman ... - 0 views

  •  
    This a brief summary of just how well Mitt Romney did in shifting voters toward him in 2012 versus what took place in 2008:  The data comes from an exit poll analysis provided by the Washington Post: http://goo.gl/Vy5VV excerpt:  .. Barack Obama netted FEWER Democrat votes in 2012 than were cast in 2008 by 3% points. .. Mitt Romney earned MORE Republican votes in 2012 than were cast in 2008 by 3% points. ... Barack Obama earned FEWER Black votes in 2012 than he did in 2008. ... Mitt Romney by the way, earned MORE Black votes in 2012 than there were cast for the Republican in 2008. ... Mitt Romney earned MORE votes from both married men and married woman than were cast for Republicans in 2008, while also improving support among non-married men and woman by 2% from 2008 as well. ... Mitt Romney earned MORE votes among liberals, moderates, and conservatives than were cast for the Republican candidate in 2008 - in fact, this improvement was by a full 7% over 2008 - a very significant improvement. ... Mitt Romney earned more votes from Protestants, Catholics, and Jews than the Republican nominee received in 2008, including a 9-point improvement among Jewish voters alone. ... The two top issues according to voters were the economy and the budget.  Mitt Romney earned A 38 POINT ADVANTAGE OVER .. ... BARACK OBAMA on the top two issues of the election - and yet Romney was somehow defeated. Lastly, regarding the following three personal trait issues - strong leader, shares my values, and has a vision for the future, Mitt Romney DOMINATED Barack Obama among 2012 voters by 45 points.  And lost the election. It is stunning, some might even say inconceivable, that a candidate improves in such categories as overall votes among Whites AND minorities, is ranked far ahead of their opponent in both the top two concerns among voters, as well as the three most important personal trait issues - and still loses the election.
Paul Merrell

How the NSA Converts Spoken Words Into Searchable Text - The Intercept - 0 views

  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former NSA contractor Edward Snowden show the National Security Agency can now automatically recognize the content within phone calls by creating rough transcripts and phonetic representations that can be easily searched and stored. The documents show NSA analysts celebrating the development of what they called “Google for Voice” nearly a decade ago.
  • Though perfect transcription of natural conversation apparently remains the Intelligence Community’s “holy grail,” the Snowden documents describe extensive use of keyword searching as well as computer programs designed to analyze and “extract” the content of voice conversations, and even use sophisticated algorithms to flag conversations of interest. The documents include vivid examples of the use of speech recognition in war zones like Iraq and Afghanistan, as well as in Latin America. But they leave unclear exactly how widely the spy agency uses this ability, particularly in programs that pick up considerable amounts of conversations that include people who live in or are citizens of the United States.
  • ...9 more annotations...
  • The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s. What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds. In a brief interview, Dan Kaufman, director of DARPA’s Information Innovation Office, indicated that the government’s ability to automate transcription is still limited. Kaufman says that automated transcription of phone conversation is “super hard,” because “there’s a lot of noise on the signal” and “it’s informal as hell.”
  • A 2008 document from the Snowden archive shows that  transcribing news broadcasts was already working well seven years ago, using a program called Enhanced Video Text and Audio Processing: (U//FOUO) EViTAP is a fully-automated news monitoring tool. The key feature of this Intelink-SBU-hosted tool is that it analyzes news in six languages, including Arabic, Mandarin Chinese, Russian, Spanish, English, and Farsi/Persian. “How does it work?” you may ask. It integrates Automatic Speech Recognition (ASR) which provides transcripts of the spoken audio. Next, machine translation of the ASR transcript translates the native language transcript to English. Voila! Technology is amazing. A version of the system the NSA uses is now even available commercially.
  • But even then, a newer, more sophisticated product was already being rolled out by the NSA’s Human Language Technology (HLT) program office. The new system, called VoiceRT, was first introduced in Baghdad, and “designed to index and tag 1 million cuts per day.” The goal, according to another 2006 memo, was to use voice processing technology to be able “index, tag and graph,” all intercepted communications. “Using HLT services, a single analyst will be able to sort through millions of cuts per day and focus on only the small percentage that is relevant,” the memo states. A 2009 memo from the NSA’s British partner, GCHQ, describes how “NSA have had the BBN speech-to-text system Byblos running at Fort Meade for at least 10 years. (Initially they also had Dragon.) During this period they have invested heavily in producing their own corpora of transcribed Sigint in both American English and an increasing range of other languages.” (GCHQ also noted that it had its own small corpora of transcribed voice communications, most of which happened to be “Northern Irish accented speech.”)
  • According to a 2011 memo, “How is Human Language Technology (HLT) Progressing?“, NSA that year deployed “HLT Labs” to Afghanistan, NSA facilities in Texas and Georgia, and listening posts in Latin America run by the Special Collection Service, a joint NSA/CIA unit that operates out of embassies and other locations. “Spanish is the most mature of our speech-to-text analytics,” the memo says, noting that the NSA and its Special Collections Service sites in Latin America, have had “great success searching for Spanish keywords.”
  • The Snowden archive, as searched and analyzed by The Intercept, documents extensive use of speech-to-text by the NSA to search through international voice intercepts — particularly in Iraq and Afghanistan, as well as Mexico and Latin America. For example, speech-to-text was a key but previously unheralded element of the sophisticated analytical program known as the Real Time Regional Gateway (RTRG), which started in 2005 when newly appointed NSA chief Keith B. Alexander, according to the Washington Post, “wanted everything: Every Iraqi text message, phone call and e-mail that could be vacuumed up by the agency’s powerful computers.” The Real Time Regional Gateway was credited with playing a role in “breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from improvised explosive devices.” The indexing and searching of “voice cuts” was deployed to Iraq in 2006. By 2008, RTRG was operational in Afghanistan as well.
  • VoiceRT, in turn, was surpassed a few years after its launch. According to the intelligence community’s “Black Budget” for fiscal year 2013, VoiceRT was decommissioned and replaced in 2011 and 2012, so that by 2013, NSA could operationalize a new system. This system, apparently called SPIRITFIRE, could handle more data, faster. SPIRITFIRE would be “a more robust voice processing capability based on speech-to-text keyword search and paired dialogue transcription.”
  • What’s less clear from the archive is how extensively this capability is used to transcribe or otherwise index and search voice conversations that primarily involve what the NSA terms “U.S. persons.” The NSA did not answer a series of detailed questions about automated speech recognition, even though an NSA “classification guide” that is part of the Snowden archive explicitly states that “The fact that NSA/CSS has created HLT models” for speech-to-text processing as well as gender, language and voice recognition, is “UNCLASSIFIED.”
  • Also unclassified: The fact that the processing can sort and prioritize audio files for human linguists, and that the statistical models are regularly being improved and updated based on actual intercepts. By contrast, because they’ve been tuned using actual intercepts, the specific parameters of the systems are highly classified.
  • The presidentially appointed but independent Privacy and Civil Liberties Oversight Board (PCLOB) didn’t mention speech-to-text technology in its public reports. “I’m not going to get into whether any program does or does not have that capability,” PCLOB chairman David Medine told The Intercept. His board’s reports, he said, contained only information that the intelligence community agreed could be declassified.
Paul Merrell

The NSA's Rent Is Too Damn High | Cato @ Liberty - 0 views

  • For months, the American public has received a steady stream of new information detailing the massive scale and scope of the United States’ spying activities. Of course, maintaining a surveillance state powerful enough to reach into the inboxes of world leaders, friend and foe, is not cheap. Indeed, as the Washington Post revealed when it released portions of the so-called Black Budget, this year’s price tag on America’s spook infrastructure comes out to a whopping $52.6 billion. This is, of course, a tremendous sum – more than double the size of the Department of Agriculture, more than triple the size of NASA; the list goes on… But, what really puts this number into perspective is its average cost to each American taxpayer, or what I would call the NSA and associated agencies’ “rent.” Yes, the NSA’s rent, charged to every taxpayer living under its web of surveillance, comes out to an exorbitant $574 per year. If this is the price the federal government is charging American taxpayers to have their own privacy invaded, then I say the NSA’s rent is too damn high. Normally, at the end of one of these blogs, I would ask a rhetorical question like: “Washington, are you listening?” But, in this case, we know Washington is listening, and now we know how much we’re being charged for it.
Paul Merrell

Is someone pinching pennies at Guantánamo prison? | Miami Herald - 0 views

  • Could the people at the Most Expensive Prison on Earth be pinching pennies?
  • Attorneys for the last 114 captives at the U.S. Navy base at Guantánamo Bay, Cuba, say they have been increasingly providing their clients with everything from T-shirts and socks and shoes to shampoo and vitamins to fill a long-term, unexplained need at the war on terror prison.Lawyers who have visited the prison as recently as this month say the captives’ U.S. military issue uniforms are faded, torn or tattered and their shoes have holes. In other instances, detainees tell their lawyers, personal hygiene supplies are cheap and simply don’t do the job. A case-in-point: When attorney Ramzi Kassem met detainee Shaker Aamer to share the news that the long-held Saudi prisoner was approved for transfer to Britain after Oct. 24, the captive was brought to their meeting in prison-issue canvas shoes held together by duct tape.
  • “Stuff’s just not getting replaced,” said attorney George Clarke who in late September spent about $300 on slip-on canvas shoes, plastic sandals, T-shirts and towels for his two detainee clients — both approved for repatriation, if the political situation improves in Yemen. “They say the stuff they get is crap. Or they’re not getting it.”Recently, he said, the detention center staff has been more accepting of contributions from the attorneys, suggesting prison commanders are confronted with a cash crunch or have realized they can pass along costs of basics to the private sector.
  • ...7 more annotations...
  • At the prison, a spokesman declined to say whether the raggedy clothing reflected a new policy or budget cutbacks but dismissed a question on whether there was a supply issue. Detainee provisions “have not changed,” Navy Capt. Christopher Scholl said tersely by email. The prison would not provide a list of what constitutes basic issue prisoner provisions these days. Nor would Scholl address a question about whether the quality of prison-issue items had degraded.
  • The International Committee of the Red Cross would not say whether delegates have raised the issue in confidential talks with the prison commander. The Miami Herald spoke, separately, with 12 attorneys who have met captives in recent months and describe detainees showing up at legal meetings looking disheveled and needing replacement footwear or clothes. The attorneys say the appearance is noteworthy because through the years all but mentally ill captives have tried to tidy up for their legal meetings.“They’re looking pretty threadbare,” attorney Cori Crider of the nonprofit Reprieve legal defense group said from the U.S. Navy base Tuesday after she bought shampoo and socks for one prisoner. “It’s an escalating complaint that people are being left in rags.”The lawyers quote their clients as saying some supplies have disappeared entirely at the prison, which boasts Muslim sensitivity and humane treatment. Some just aren’t replaced frequently enough, they claim.
  • Into this vacuum attorneys who represent the detainees at no charge have for about nine months routinely spent hundreds of dollars on each trip to buy their clients basic provisions at the base commissary, the Navy Exchange, or NEX.In March, Chicago attorney Patricia Bronte, a solo practitioner, spent $136.25 on shoes and Gold Toe socks for her two Yemeni clients. She left them with a prison lawyer, who got them to the clients after she left the base — something she knows because she got thank-you notes via the prison’s legal mail system.
  • “I have noticed that sometimes the client appears at the meetings with shoes that look pretty beaten up. So I went to the NEX and I bought shoes and socks.” Also $6.12 in toothbrushes and toothpaste, according to her commissary receipt.“Understand, I’m not complaining. I don’t mind buying my clients shoes to improve their conditions,” she said. “It’s the gall of this country. To detain these guys for little or no reason for 14 years and not provide them with shoes is offensive.”
  • Prison officials had already stopped spending taxpayers’ money on books, videos and electronic games for the detainee diversion program, according to media visits in the past year, leaving it to the Red Cross and lawyers to donate to the Detainee Library. Kassem, the attorney, said his clients quoted guards and other prison staff as blaming budget cuts at the prison where the Pentagon maintains a 2,000-plus staff for 114 captives and has spent more than $5 billion. “Sometimes it’s a problem of poor toiletries — soap that doesn’t lather, toothpaste that doesn’t froth, deodorant that doesn’t prevent body odor,” said Kassem, a professor at the City University of New York School of Law whose legal clinic represents five Guantánamo detainees. Captives he sees in the prison’s iconic orange prison uniform are wearing old, torn and much less orange jumpsuits, he said.The prisoners are perplexed, Kassem said. “They’ve heard how much it costs per prisoner. They wonder, where’s all the money?”“Somebody’s pinching pennies, it seems,” he said, describing the prison-issue footwear on Aamer, the next detainee to be released, as “Oliver Twist tattered” despite repeated pleas for a replacement pair.
  • Over at the secret prison for former long-held CIA captives, Camp 7, the detainees are taking vitamin D furnished by defense attorneys Cheryl Bormann and Air Force Capt. Michael Schwartz.Walid bin Attash spent years without exposure to sunlight in a so-called CIA black site before he got to Camp 7 in 2006. Now, he’s told his lawyers, his medical record shows a severe vitamin D deficiency. He asked his defense team for a halal version of the supplement, which the prison doesn’t provide. One attorney, who asked not to be identified, quoted a prison medical officer as telling detainees “there’s no money for that.”So bin Attash’s lawyers ordered kosher vitamin D — no forbidden products in those gel caps — and gave it to the military staff attorney assigned to Camp 7. The prison’s medical officer has apparently doled them out to other former CIA black site captives because bin Attash needs a resupply sooner than a one-a-day distribution would require, Bormann said.“We’ve been having to purchase vitamin D for our client,” said Bormann, a criminal defense attorney with death-penalty experience. “It’s crazy.” At a civilian prison, she said, the lawyers wouldn’t have to buy and furnish it. They’d go to a federal or state judge, who would order the prison to provide it.
  • Lists of purchases provided by more than a dozen attorneys include toothbrushes, toothpaste, bar soap, shampoo, deodorant, slip-on sandals that double as slippers, white socks, white T-shirts, towels, no-lace sneakers, canvas slip-on shoes, pillows, books, individual DVD players, video games and audio tapes. Those reached the clients after a guard inspection — as did tahini, ginger, allspice, mint oil, mint tea, ginger tea, Nesquik, olive oil, ground cloves, henna and almonds, around Ramadan. Lawyers also said they have submitted other items that were rejected — notably black socks, hairbrushes, combs and aftershave (probably for its taboo alcohol content).
Paul Merrell

Intel Contractors Give Millions to Lawmakers Overseeing Government Surveillance | MapLi... - 0 views

  • In response to documents leaked by former National Security Agency contractor Edward J. Snowden, the congressional committees in charge of overseeing the government's intelligence operations have come to the defense of the surveillance and data collection programs, and the agencies that administer them. The House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence have rejected attempts to reform the programs while advancing legislation to bolster their legal status and providing a funding boost to the National Security Agency (NSA) to protect their secrecy. The U.S. intelligence budget for 2013 is $52.6 billion. According to the Washington Post, "top secret spending" is divided into four main spending categories: data collection, data analysis, management, facilities and support, and data processing and exploitation. Seventy percent of the intelligence budget is used to pay private contractors. Several of the companies receiving intelligence contracts are major donors to members of the intelligence committees, including L-3 Communications, General Dynamics, Lockheed Martin, Northrop Grumman, and Honeywell International. Data: MapLight analysis of campaign contributions from political action committees (PACs) and individuals from the top 20 intelligence services contractors working with the Department of Defense, ranked by total value of contracts received, to members of the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence. Data source: Federal Election Commission from January 1, 2005 - October 4, 2013. Department of Defense intelligence services contracts source: USASpending (contract totals as of September 26, 2013)
  • In total, members of the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence have received $3.7 million from top intelligence services contractors since January 1, 2005. Members of the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence from Maryland -- home of NSA headquarters -- led the committees in money received from top intelligence contractors. Representative C.A. "Dutch" Ruppersberger, D-Md., is the largest recipient, having received $363,600 since January 1, 2005. Senator Barbara Mikulski, D-Md., is the second largest recipient, having received $210,150. Republican members of House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence have received $1.86 million since January 1, 2005, while Democrat members have received $1.82 million over the same time period. Members of the House Permanent Select Committee on Intelligence have received $2.2 million since January 1, 2005 from top intelligence services contractors, while members of the Senate Select Committee on Intelligence have received $1.5 million. Lockheed Martin has given $798,910 to members the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence since January 1, 2005, more than any of the other top 20 intelligence service contractors. Northrop Grumman has given $753,101, the second highest amount, and Honeywell has given $714,913, the third highest amount.
  • TOP 20 INTELLIGENCE SERVICES CONTRACTORS CONTRIBUTIONS TO CONGRESSIONAL INTELLIGENCE COMMITTEES
Paul Merrell

NSA contracted French cyber-firm for hacking help - RT USA - 0 views

  • The latest revelation regarding the National Security Agency doesn't come courtesy of Edward Snowden. A Freedom of Information Act request has confirmed the NSA contracted a French company that makes its money by hacking into computers. It's no secret that the United States government relies on an arsenal of tactics to gather intelligence and wage operations against its adversaries, but a FOIA request filed by Muckrock's Heather Akers-Healy has confirmed that the list of Uncle Sam's business partners include Vupen, a French-based security company that specializes in selling secret codes used to crack into computers. Documents responsive to my request to #NSA for contracts with VUPEN, include 12/month exploit subscription https://t.co/x3qJbqSUpa — Heather Akers-Healy (@abbynormative) September 16, 2013 Muckrock published on Monday a copy of a contract between the NSA and Vupen in which the US government is shown to have ordered a one-year subscription to the firm's “binary analysis and exploits service” last September.
  • That service, according to the Vupen website, is sold only to government entities, law enforcement agencies and computer response teams in select countries, and provides clients with access to so-called zero-day exploits: newly-discovered security vulnerabilities that the products' manufacturers have yet to discover and, therefore, have had zero days to patch-up. “Major software vendors such as Microsoft and Adobe usually take 6 to 9 months to release a security patch for a critical vulnerability affecting their products, and this long delay between the discovery of a vulnerability and the release of a patch creates a window of exposure during which criminals can rediscover a previously reported but unpatched vulnerability, and target any organization running the vulnerable software,” Vupen says elsewhere on their website. Last year, Vupen researchers successfully cracked Google's Chrome browser, but declined to show developers how they did so — even for an impressive cash bounty. “We wouldn’t share this with Google for even $1 million,” Vupen CEO Chaouki Bekrar told Forbes' Andy Greenberg of the Chrome hack in 2012. “We don’t want to give them any knowledge that can help them in fixing this exploit or other similar exploits. We want to keep this for our customers.”
  • And why the NSA and other clients may benefit from being privy to these vulnerabilities, knowing how to exploit security holes in adversarial systems is a crucial component to any government's offensive cyber-operations. Last month, the Washington Post published excerpts from the previously secretive “black budget,” a closely guarded ledger listing the funding requests made by America's intelligence community provided by NSA leaker Edward Snowden. According to that document, a substantial goal of the US in fiscal year 2013 was to use a portion of $52.6 billion in secretive funding towards improving offensive cyber-operations.
  • ...1 more annotation...
  • The portion of the contract obtained by Muckrock where the cost of the subscription is listed has been redacted, but a Vupen hacker who spoke to Greenberg last year said deals in the five-figures wasn't uncommon. "People seem surprised to discover that major government agencies are acquiring Vupen's vulnerability intelligence," Bekrar wrote in an email to Information Week's Matthew Schwartz after the NSA contract with his signature was published. "There is no news here, governments need to leverage the most detailed and advanced vulnerability research to protect their infrastructures and citizens against adversaries." Critics of Vupen and its competitors see government-waged cyber-operations in a different light, however. Christopher Soghoian of the American Civil Liberties Union's Speech, Privacy and Technology Project has spoken outright against companies that sell exploits and have equated the computer codes being sold for big money as a new sort of underground arms trade fueling an international, online battle. To Greenberg last year, Soghoian described Vupen as  a “modern-day merchant of death” selling “the bullets for cyberwar," and upon publishing of the NSA contract called the company a “cyber weapon merchant.” The NSA is a customer of French 0-day cyber weapon merchant VUPEN, FOIA docs reveal: (via @ramdac & @MuckRockNews) https://t.co/OPJ82miK3c — Christopher Soghoian (@csoghoian) September 16, 2013
Paul Merrell

ICREACH: How the NSA Built Its Own Secret Google -The Intercept - 0 views

  • The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. Planning documents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants. ICREACH contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy.
  • ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. A planning document from 2007 lists the DEA, FBI, Central Intelligence Agency, and the Defense Intelligence Agency as core members. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs. The creation of ICREACH represented a landmark moment in the history of classified U.S. government surveillance, according to the NSA documents.
  • Documents published with this article: CIA Colleagues Enthusiastically Welcome NSA Training Sharing Communications Metadata Across the U.S. Intelligence Community CRISSCROSS/PROTON Point Paper Decision Memorandum for the DNI on ICREACH Metadata Sharing Memorandum Sharing SIGINT metadata on ICREACH Metadata Policy Conference ICREACH Wholesale Sharing Black Budget Extracts
  •  
     The most important Snowden disclosure yet. It's a long, detailed article, but it's a must read. I couldn't highlight any more without highlighting the entire article. Read the whole thing soon or you're going to be late for the mob with pitchforks.  This is beyond outrageous. The integrity of our entire system of government is now at issue. 
Paul Merrell

5 Biggest Revelations from Latest Podesta Emails - 0 views

  • Wikileaks’ releases of the now infamous “Podesta Emails” have become such a regular occurrence, it’s becoming difficult to keep up. 11 “batches” have been released so far, bringing the total to 17,510 with an estimated 32,000 left to go before the US election takes place on November 8th. Though True Activist covered many of the earlier leaks, including the transcripts of Clinton’s private speeches and Clinton’s admission that the Saudis are funding ISIS, many other potentially damning revelations have since come to light. Here are the top 5 newest revelations from the last 3 email releases (#9 to 11).
  • 4. Wall Street Handpicked Obama’s Entire 2008 Cabinet Though most of the leaks thus far have been focused largely on Clinton and her campaign, some of the released emails have shed light on corruption within the Obama administration. In 2008, at the height of the financial crisis, an executive from CitiGroup emailed John Podesta one month before Podesta was named chairman of Obama’s 2008 transition team. CitiGroup, at the time, was the largest company and bank in the world by assets. The email from CitiGroup executive Michael Froman is titled “Lists.” The lists within, naming prospective candidates for cabinet positions, matches Obama’s 2008 Cabinet almost exactly. They also suggest choosing candidates of various ethnic minorities as a political tactic (see #3 above). The email proposed: Robert Gates as secretary of Defense; Eric Holder as attorney general; Janet Napolitano as secretary of Homeland Security; Rahm Emanuel as White House chief of staff; Susan Rice as United Nations ambassador; Arne Duncan as secretary of Education; Kathleen Sebelius as secretary of Health and Human Services; Peter Orszag as head of the Office of Management and Budget; Eric Shinseki as secretary of Veterans Affairs; and Melody Barnes as chief of the Domestic Policy Council. Froman offered Podesta with three possibilities for the position of Secretary of the Treasury: Robert Rubin and his close disciples Lawrence Summers and Timothy Geithner. Obama ultimately chose Geithner, who was then president of the Federal Reserve Bank of New York. Geithner, along with Bush Treasury Secretary and former Goldman Sachs CEO Henry Paulson and then-Fed Chairman Ben Bernanke, were those chiefly responsible for organizing the Wall Street bailout.
  •  
    Citibank chose Obama's 2008 cabinet. Why am I not surprised?
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Crimean leaders blame Kiev for selling Ukraine off for IMF loans - News - World - The V... - 0 views

  • Crimea's deputy prime minister, Olga Kovitidi, described as predatory the terms of an agreement Kiev is ready to accept from the International Monetary Fund. The tentative agreement with the IMF which the Ukrainian authorities signed with the IMF on March 2, says that the country's entire gas pipeline system will be handed over for free in the American company Chevron's ownership the moment the basic agreement is signed, while the owners of the Mariupol, Zaporizhzhya and Dnipropetrovsk steel mills will be obliged to surrender their 50% stakes to Germany's Ruhr.
  • The Donbass coal industry will be handed over to Ruhr's subsidiary in Finland, she told Interfax on Sunday, citing media reports. It emerged recently that Kyiv has pledged to make territory available near Kharkiv to host US missile defense systems and a wing of American fighter jets to provide cover for the missile defense installations, she also said. Ukraine's interim prime minister Arseniy Yatsenyuk has assured the West that Kiev will fulfill all of the IMF's terms in order to secure a loan, Kovitidi said. The Crimean leaders have also learned that Kyiv promised the West to take a package of unpopular measures in order to fill gaps in the Ukrainian budget, she said. Gas prices for municipal companies will have to be increased by 50% and for private will double.
  • Electricity tariffs will be raised by 40%, housing utility tariffs will be raised, too, gasoline excises will go up 60% and transportation tariffs 50%, while state support for childbirth will be cancelled, the free distribution of textbooks will be annulled at schools and the VAT relief will be scrapped in rural regions, she said. Concurrently, VAT will be introduced on medications, which will push up prices and bring citizens' living standards down," Kovitidi said. "The planned annulment of the moratorium on the sale of farmland looks appalling. The selloff of Ukraine's black soil zone, including to foreign countries, may have disastrous economic and social consequences," she said. Kovitidi said that the Crimean legislature's decision to hold a referendum on March 16 was correct. "The recent developments in Ukraine and the decisions being made have a direct bearing on the people of Crimea, who must know the truth and decide their own and their children's future in a referendum," she said.
  •  
    Cute. The Ukrainian government needs $17 billion to service its debt to the banksters. The IMF agrees to hand over another $3 billion loan, while Obama promises another $1 billion, not nearly what is needed (Russia had offered $15 billion, an offer withdrawn in light of the coup instigated by the U.S. Now the austerity measures and privatization that always accompanies IMF loans begin. One of the first announced was to cut pensioners' monthly checks in half. Meanwhile, Iceland's economy continues to rebound after having refused to bail out its banksters and putting them in prison instead.
Paul Merrell

Nato's action plan in Ukraine is right out of Dr Strangelove | John Pilger | Comment is... - 0 views

  • In 1964, the year Dr Strangelove was made, "the missile gap" was the false flag. To build more and bigger nuclear weapons and pursue an undeclared policy of domination, President John F Kennedy approved the CIA's propaganda that the Soviet Union was well ahead of the US in the production of intercontinental ballistic missiles. This filled front pages as the "Russian threat". In fact, the Americans were so far ahead in production of the missiles, the Russians never approached them. The cold war was based largely on this lie.
  • Since the collapse of the Soviet Union, the US has ringed Russia with military bases, nuclear warplanes and missiles as part of its Nato enlargement project. Reneging on the Reagan administration's promise to the Soviet president Mikhail Gorbachev in 1990 that Nato would not expand "one inch to the east", Nato has all but taken over eastern Europe. In the former Soviet Caucasus, Nato's military build-up is the most extensive since the second world war.In February, the US mounted one of its proxy "colour" coups against the elected government of Ukraine; the shock troops were fascists. For the first time since 1945, a pro-Nazi, openly antisemitic party controls key areas of state power in a European capital. No western European leader has condemned this revival of fascism on the border of Russia. Some 30 million Russians died in the invasion of their country by Hitler's Nazis, who were supported by the infamous Ukrainian Insurgent Army (the UPA) which was responsible for numerous Jewish and Polish massacres. The Organisation of Ukrainian Nationalists, of which the UPA was the military wing, inspires today's Svoboda party.Since Washington's putsch in Kiev – and Moscow's inevitable response in Russian Crimea to protect its Black Sea fleet – the provocation and isolation of Russia have been inverted in the news to the "Russian threat". This is fossilised propaganda. The US air force general who runs Nato forces in Europe – General Philip Breedlove, no less – claimed more than two weeks ago to have pictures showing 40,000 Russian troops "massing" on the border with Ukraine. So did Colin Powell claim to have pictures proving there were weapons of mass destruction in Iraq. What is certain is that Barack Obama's rapacious, reckless coup in Ukraine has ignited a civil war and Vladimir Putin is being lured into a trap.
  • Following a 13-year rampage that began in stricken Afghanistan well after Osama bin Laden had fled, then destroyed Iraq beneath a false flag, invented a "nuclear rogue" in Iran, dispatched Libya to a Hobbesian anarchy and backed jihadists in Syria, the US finally has a new cold war to supplement its worldwide campaign of murder and terror by drone.A Nato membership action plan – straight from the war room of Dr Strangelove – is General Breedlove's gift to the new dictatorship in Ukraine. "Rapid Trident" will put US troops on Ukraine's Russian border and "Sea Breeze" will put US warships within sight of Russian ports. At the same time, Nato war games in eastern Europe are designed to intimidate Russia. Imagine the response if this madness was reversed and happened on the US's borders. Cue General Turgidson.And there is China. On 23 April, Obama will begin a tour of Asia to promote his "pivot" to China. The aim is to convince his "allies" in the region, principally Japan, to rearm and prepare for the possibility of war with China. By 2020, almost two-thirds of all US naval forces in the world will be transferred to the Asia-Pacific area. This is the greatest military concentration in that vast region since the second world war.
  • ...1 more annotation...
  • In an arc extending from Australia to Japan, China will face US missiles and nuclear-armed bombers. A strategic naval base is being built on the Korean island of Jeju, less than 400 miles from Shanghai and the industrial heartland of the only country whose economic power is likely to surpass that of the US. Obama's "pivot" is designed to undermine China's influence in its region. It is as if a world war has begun by other means.This is not a Dr Strangelove fantasy. Obama's defence secretary, Charles "Chuck" Hagel, was in Beijing last week to deliver a warning that China, like Russia, could face isolation and war if it did not bow to US demands. He compared the annexation of Crimea to China's complex territorial dispute with Japan over uninhabited islands in the East China Sea. "You cannot go around the world," said Hagel with a straight face, "and violate the sovereignty of nations by force, coercion or intimidation." As for America's massive movement of naval forces and nuclear weapons to Asia, that is "a sign of the humanitarian assistance the US military can provide".Obama is seeking a bigger budget for nuclear weapons than the historical peak during the cold war, the era of Dr Strangelove. The US is pursuing its longstanding ambition to dominate the Eurasian landmass, stretching from China to Europe: a "manifest destiny" made right by might.
  •  
    Until the late 1940s, the U.S. had a "War Department." But in 1949, having just completed the largest foreign war in U.S. history, the War Department ironically was renamed as the "Defense Department." Ever since, the U.S. has waged nothing but foreign wars, none that could literally be characterized as necessary to defend the U.S. As John Pilger eloquently encapsulates in this article, perhaps it's past time to return the Department to the "Department of Wars of Aggression."  
Paul Merrell

How Secret Partners Expand NSA's Surveillance Dragnet - The Intercept - 0 views

  • Huge volumes of private emails, phone calls, and internet chats are being intercepted by the National Security Agency with the secret cooperation of more foreign governments than previously known, according to newly disclosed documents from whistleblower Edward Snowden. The classified files, revealed today by the Danish newspaper Dagbladet Information in a reporting collaboration with The Intercept, shed light on how the NSA’s surveillance of global communications has expanded under a clandestine program, known as RAMPART-A, that depends on the participation of a growing network of intelligence agencies.
  • It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as “third-party partners,” are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables. The NSA documents state that under RAMPART-A, foreign partners “provide access to cables and host U.S. equipment.” This allows the agency to covertly tap into “congestion points around the world” where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.
  • The secret documents reveal that the NSA has set up at least 13 RAMPART-A sites, nine of which were active in 2013. Three of the largest – codenamed AZUREPHOENIX, SPINNERET and MOONLIGHTPATH – mine data from some 70 different cables or networks. The precise geographic locations of the sites and the countries cooperating with the program are among the most carefully guarded of the NSA’s secrets, and these details are not contained in the Snowden files. However, the documents point towards some of the countries involved – Denmark and Germany among them. An NSA memo prepared for a 2012 meeting between the then-NSA director, Gen. Keith Alexander, and his Danish counterpart noted that the NSA had a longstanding partnership with the country’s intelligence service on a special “cable access” program. Another document, dated from 2013 and first published by Der Spiegel on Wednesday, describes a German cable access point under a program that was operated by the NSA, the German intelligence service BND, and an unnamed third partner.
  • ...2 more annotations...
  • The program, which the secret files show cost U.S. taxpayers about $170 million between 2011 and 2013, sweeps up a vast amount of communications at lightning speed. According to the intelligence community’s classified “Black Budget” for 2013, RAMPART-A enables the NSA to tap into three terabits of data every second as the data flows across the compromised cables – the equivalent of being able to download about 5,400 uncompressed high-definition movies every minute. In an emailed statement, the NSA declined to comment on the RAMPART-A program. “The fact that the U.S. government works with other nations, under specific and regulated conditions, mutually strengthens the security of all,” said NSA spokeswoman Vanee’ Vines. “NSA’s efforts are focused on ensuring the protection of the national security of the United States, its citizens, and our allies through the pursuit of valid foreign intelligence targets only.”
  • The Danish and German operations appear to be associated with RAMPART-A because it is the only NSA cable-access initiative that depends on the cooperation of third-party partners. Other NSA operations tap cables without the consent or knowledge of the countries that host the cables, or are operated from within the United States with the assistance of American telecommunications companies that have international links. One secret NSA document notes that most of the RAMPART-A projects are operated by the partners “under the cover of an overt comsat effort,” suggesting that the tapping of the fiber-optic cables takes place at Cold War-era eavesdropping stations in the host countries, usually identifiable by their large white satellite dishes and radomes. A shortlist of other countries potentially involved in the RAMPART-A operation is contained in the Snowden archive. A classified presentation dated 2013, published recently in Intercept editor Glenn Greenwald’s book No Place To Hide, revealed that the NSA had top-secret spying agreements with 33 third-party countries, including Denmark, Germany, and 15 other European Union member states:
  •  
    Don't miss the slide with the names of the NSA-partner nations. Lots of E.U. member nations.
Paul Merrell

NASA's Secret Relationships with U.S. Defense and Intelligence Agencies - 0 views

  • Declassified Records Trace the Many Hidden Interactions Between the U.S. Civilian and National Security Space Programs Secret Cooperation Punctuated by Disputes over Budgets, Encryption of Scientific Data, and Fallout from the Challenger Tragedy National Security Archive Electronic Briefing Book No. 509
  • Furnishing cover stories for covert operations, monitoring Soviet missile tests, and supplying weather data to the U.S. military have been part of the secret side of the National Aeronautics and Space Administration (NASA) since its inception in 1958, according to declassified documents posted for the first time today by the National Security Archive at The George Washington University (www.nsarchive.org). James E. David, a curator in NASA's Division of Space History, obtained the documents in the course of researching his critically praised book, Spies and Shuttles: NASA's Secret Relationships with the DoD and CIA (University Press of Florida, 2015). David has compiled, edited and introduced more than 50 of these records for today's posting. Even though Congress's intention in forming NASA was to establish a purely civilian space agency, according to David a combination of circumstances led the agency to commingle its activities with black programs operated by the U.S. military and Intelligence Community. This often tight cooperation did not, however, keep disputes from bubbling over on issues such as cost sharing, access to classified information, encryption of data originally intended for civilian use, and delays to military satellite launches caused by the Challenger disaster. Over the years, classification restrictions have kept most of the story of NASA's secret activities out of the public eye. Today's posting brings to light previously unpublished primary source material that underpins Spies and Shuttles and other important literature on the subject. The records were acquired through agency declassification review procedures, specific declassification requests, and archival research.
  • The documents presented here were obtained in the research and writing of Spies and Shuttles: NASA's Secret Relationships with the DoD and CIA. Most were declassified by agencies under the automatic/systematic declassification review program or acquired through declassification requests. They are grouped into the following categories: NASA as a consumer of intelligence NASA's assistance to analyzing intelligence on foreign aeronautical and space programs NASA's participation in cover stories NASA's acquisition and use of classified technologies in its lunar exploration program Restrictions on NASA's remote sensing programs NASA's application satellites and national security requirements Space Shuttle
  •  
    For some reason, proponents of space exploration have a tendency to frame their arguments as an issue of moral necessity for human species preservation, often because self-extinction is likely. It's a weak argument. One can more forcefully argue that homo sapiens has no moral right to migrate outside the planet until such time as it learns to not destroy its own life support systems on Earth; in the meantime, the incredible funding devoted to space exploration would be better spent learning that lesson. But evidence of NASA ties to the Dark State, which has often come to mind when reading such drivel, has been wanting. Now we learn that it does exist but had been concealed. In light of these disclosures, we can discuss the moral issues with more clarity. But still missing: the obvious overlap of NASA's mission with the development of ICBMs and deployment of orbiting weapons platforms.   
Paul Merrell

Edward Snowden doesn't deserve clemency: The NSA leaker hasn't proved he is a whistlebl... - 0 views

  • And yet I firmly disagree with the New York Times’ Jan. 1 editorial (“Edward Snowden, Whistle-Blower”), calling on President Obama to grant Snowden “some form of clemency” for the “great service” he has done for his country.
  • If that were all that Snowden had done, if his stolen trove of beyond-top-secret documents had dealt only with the NSA’s domestic surveillance, then some form of leniency might be worth discussing. But Snowden did much more than that. The documents that he gave the Washington Post’s Barton Gellman and the Guardian’s Glenn Greenwald have, so far, furnished stories about the NSA’s interception of email traffic, mobile phone calls, and radio transmissions of Taliban fighters in Pakistan’s northwest territories; about an operation to gauge the loyalties of CIA recruits in Pakistan; about NSA email intercepts to assist intelligence assessments of what’s going on inside Iran; about NSA surveillance of cellphone calls “worldwide,” an effort that (in the Post’s words) “allows it to look for unknown associates of known intelligence targets by tracking people whose movements intersect.” In his first interview with the South China Morning Post, Snowden revealed that the NSA routinely hacks into hundreds of computers in China and Hong Kong. These operations have nothing to do with domestic surveillance or even spying on allies. They are not illegal, improper, or (in the context of 21st-century international politics) immoral. Exposing such operations has nothing to do with “whistle-blowing.”
  •  
    Another "kill the messenger" piece on Edward Snowden, this one by a Council on Foreign Relations analyst. 
1 - 20 of 21 Next ›
Showing 20 items per page