Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged blackmail

Rss Feed Group items tagged

Gary Edwards

As Natural News predicted: NSA has been blackmailing Supreme Court judges, members of C... - 0 views

  •  
    Blackmail! excerpt: "Ten days ago, I publicly stated my belief that the NSA had used its spy apparatus to gather dirt on Supreme Court Justice John Roberts, then used that leverage to force him to change his vote on Obamacare. See the original article here. Five days later, I also predicted the NSA was using its spy powers to surveil members of Congress and the U.S. Senate. In an article published on June 16, 2013, I wrote, "There could already be countless cases of the NSA using its god-like powers to blackmail people in key positions in the U.S. Senate (which is full of pedophiles and perverts), the House of Representatives, the State Department or even the US Supreme Court. There are virtually no limits to the abuses of this power." Suddenly, new revelations prove this to be true. Russ Tice, a Bush-era NSA analyst-turned-whistleblower has sounded the alarm on the true depth of the NSA's surveillance abuses. In an interview on the Boiling Frogs Podcast, Tice stated: They went after -- and I know this because I had my hands literally on the paperwork for these sort of things -- they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the -- and judicial... They went after lawyers and law firms. All kinds of -- heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House -- their own people.
Gary Edwards

NSA Spying On - and Blackmailing - Top Government Officials and Military Officers Alex ... - 1 views

  • During the raid, Binney attempted to report to FBI officials the crimes he had witnessed at NSA, in particular the NSA’s violation of the constitutional rights of all Americans.
  • Other NSA whistleblowers have also been subjected to armed raids and criminal prosecution.
  • Even the head of the CIA was targeted with extra-constitutional spying and driven out of office. 
  • ...3 more annotations...
  • Indeed, Binney makes it very clear that the government will use information gained from its all-pervasive spying program to frame anyone it doesn’t like.
  • In a speech on March 21, second-term Obama gave us a big clue regarding his concept of leadership – one that is marked primarily by political risk-avoidance and a penchant for “leading from behind”:
  • “Speaking as a politician, I can promise you this: political leaders will not take risks if the people do not demand that they do. You must create the change that you want to see.”
  •  
    A handful of NSA Whistleblowers continue to talk, pointing out that the NSA and CIA are using the global dragnet to BLACKMAIL the most powerful and influential people in the world.   That list would include Obama, Chief Justice John Roberts, General David Patraeus, members of the FiSA Court; so many people in fact that it would be easier to guess at the few who are not acting like they are being blackmailed.   Like Ted Cruz, Jim DeMint, and Ron Paul.  Right.  It's a very short list.  Oh wait, Senator DeMint resigned his position.  And so it goes. excerpt: "NSA whistleblower Russel Tice - a key source in the 2005 New York Times report that blew the lid off the Bush administration's use of warrantless wiretapping - told Peter B. Collins on Boiling Frogs Post (the website of FBI whistleblower Sibel Edmonds): Tice: Okay. They went after-and I know this because I had my hands literally on the paperwork for these sort of things-they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the-and judicial. But they went after other ones, too. They went after lawyers and law firms. All kinds of-heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Courtthat I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in theexecutive service that were part of the White House-their own people. They went after antiwar groups. They went after U.S. international-U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that-like the Red Cross, people like that that go overseas and do humanitarian work. They went after a few antiwar civi
Paul Merrell

How the U.S. Uses Surveillance and Scandal to Advance Its Global Control | Alternet - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.For well over a century, from the pacification of the Philippines in 1898 to trade negotiations with the European Union today, surveillance and its kissing cousins, scandal and scurrilous information, have been key weapons in Washington’s search for global dominion. Not surprisingly, in a post-9/11 bipartisan exercise of executive power, George W. Bush and Barack Obama have presided over building the NSA step by secret step into a digital panopticon designed to monitor the communications of every American and foreign leaders worldwide.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies.Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  •  
    Excellent, detailed, and heavily referenced with hyperlinks. A history of U.S. use of intelligence for blackmail purposes. The author makes the case that with the U.S. empire and economy waning, the U.S. has found an extremely inexpensive method to project power by blackmail.
Paul Merrell

NSA Whistleblower: Snowden Never Had Access to the "Juiciest" Intelligence Documents | ... - 0 views

  • NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping. Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:
  • He says the NSA started spying on President Obama when he was a candidate for Senate:
  • Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this. Washington’s Blog called Tice to find out more about what he saw when he was at NSA.
  • ...8 more annotations...
  • NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.] Does Snowden even have documents which contain the information which you’ve seen? RUSSELL TICE:  The answer is no. WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
  • RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden? Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing? They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.] Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” - Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way. I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.
  • Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS. And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance]. ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks. These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
  • It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency. When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up. There was no such thing beforehand. It was made up … to try to placate the American people. The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of. So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
  • Snowden’s Failure To Understand the Most Important Documents RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG. The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at. But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there. I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
  • Cheney Was Running the Show WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive]. Is that right … and if so, how do you know that? RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington. WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means? RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.
  • NSA Is Spying On CONTENT as Well as Metadata WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata? RUSSELL TICE: Of course it is. Of course. [Background. But see this.] NSA Spying On Journalists, Congress, Admirals, Lawyers … RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such. I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state. Or an Admiral and his wife, and his kids and his staffers …
  • The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else. These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.
  •  
    Whistleblower Russell Tice says that there are super-classified domestic surveillance records that Edward Snowden, Congressional oversight committees, and the NSA Inspector-General did not have access to. Must-read.
Paul Merrell

Is NSA spying really about blackmail? | This Can't Be Happening! - 0 views

  • A revealing page-one article in today’s New York Times (“Tap on Merkel Provides Peek a Vast Spy Net”) reports on how the NSA’s global spying program, dating back at least to early in the Bush/Cheney administration, was vacuuming up the phone conversations (and no doubt later the internet communications) of not just leaders like German Chancellor Angela Merkel, but opposition leader Merkel before her party took power in Germany. As the Times puts it, the phone monitoring, which actually dates back to the Cold War Era before 1990, “is hardly limited to the 35 leaders of countries like Germany, and also includes their top aides and the heads of opposing parties.” That’s pretty far-reaching, and the paper says that it has learned, primarily courtesy of revelations from the documents released by fugitive whistleblower Edward Snowden, that the spying went even beyond that, to target up-and-coming potential leaders of so-called “friendly states.”
  • What the Times does not ask in its entire report on this spying program on leaders and potential leaders is whether there could be another motive for this extraordinary spying campaign on leaders: blackmail.
  • How else to explain the remarkably tepid response from the leaders who are the victims of this spying by the NSA on their private communications? How else to explain Europe’s unwillingness to grant sanctuary to Snowden, who after all has allowed them to know about the perfidy of the US? How else to explain Europe’s supine acquiescence to the US in its criminal wars against Iraq and Afghanistan, and its unquestioning support of Israel?
  •  
    The author goes on to raise the question whether NSA surveillance is also being used to blackmail U.S. leaders. This is a question that has been on my mind too. Certainly, J. Edgar Hoover used the apparatus of the FBI to assemble dossiers on U.S. leaders; that was the key to his power, the knowledge that he had the ability to end the political careers of elected officials. Hoover and the FBI also played a key role in the COINTELPRO abusive surveillance, disruption, and sabotage efforts aimed at peace, environmental, and black activists and leaders, along with the NSA and CIA, that was thoroughly aired in the 1976 Church Committee hearings. See https://en.wikipedia.org/wiki/COINTELPRO  
Gary Edwards

FBI Source: Clinton Foundation Can Bring Down Entire Government » Alex Jones'... - 1 views

  •  
    "The Clinton Foundation is a "massive spider web of connections and money laundering implicating hundreds of high-level people," according to an anonymous insider who revealed why the FBI stopped short of indicting Hillary Clinton. Before FBI Director James Comey announced the FBI wouldn't recommend pressing charges against Clinton, an insider with "intimate knowledge of the inner workings of the Clinton case" hosted an little-publicized AMA session on 4Chan, and the statements he made on July 2 corroborate with later developments of the scandal. "There is enough for her and the entire government to be brought down," he revealed. "People do not realize how enormous this whole situation actually is." "Whether she will be [indicted] or not depends on how much info others involved gets out, and there are a lot of people involved." Since then, both the FBI and the DOJ declined to press charges against Clinton, and other sources revealed the Clinton Foundation is now under scrutiny. "The problem is with the Clinton Foundation as I mentioned, which you should just imagine as a massive spider web of connections and money laundering implicating hundreds of high-level people," the source said. "Though I do not have a high opinion of Hillary, she is just a piece - albeit a big piece - of this massive sh*tstorm." Those implicated extends to the Justice Dept. "The DOJ is most likely looking to save itself," he continued. "Find everyone involved in the Clinton Foundation, from its donors to its Board of Directors, and imagine they are all implicated." This would explain why Bill Clinton forced himself on Attorney General Loretta Lynch's plane at the Phoenix Sky Harbor International Airport last week; Clinton insider Larry Nichols said blackmail was likely involved. "Bill Clinton met with Lynch, and he was there to assure her that when Hillary gets to be president she'll be able to keep her job," said Nichols on the Alex Jones Sh
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

Yahoo webcam images from millions of users intercepted by GCHQ | World news | The Guardian - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy".
  • GCHQ does not have the technical means to make sure no images of UK or US citizens are collected and stored by the system, and there are no restrictions under UK law to prevent Americans' images being accessed by British analysts without an individual warrant.The documents also chronicle GCHQ's sustained struggle to keep the large store of sexually explicit imagery collected by Optic Nerve away from the eyes of its staff, though there is little discussion about the privacy implications of storing this material in the first place.
  • "Face detection has the potential to aid selection of useful images for 'mugshots' or even for face recognition by assessing the angle of the face," it reads. "The best images are ones where the person is facing the camera with their face upright."The agency did make efforts to limit analysts' ability to see webcam images, restricting bulk searches to metadata only.However, analysts were shown the faces of people with similar usernames to surveillance targets, potentially dragging in large numbers of innocent people. One document tells agency staff they were allowed to display "webcam images associated with similar Yahoo identifiers to your known target".Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
  • ...3 more annotations...
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs.Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds, partly to comply with human rights legislation, and also to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.One document even likened the program's "bulk access to Yahoo webcam images/events" to a massive digital police mugbook of previously arrested individuals.
  • Programs like Optic Nerve, which collect information in bulk from largely anonymous user IDs, are unable to filter out information from UK or US citizens. Unlike the NSA, GCHQ is not required by UK law to "minimize", or remove, domestic citizens' information from its databases. However, additional legal authorisations are required before analysts can search for the data of individuals likely to be in the British Isles at the time of the search.There are no such legal safeguards for searches on people believed to be in the US or the other allied "Five Eyes" nations – Australia, New Zealand and Canada.
  • The documents also show that GCHQ trialled automatic searches based on facial recognition technology, for people resembling existing GCHQ targets: "[I]f you search for similar IDs to your target, you will be able to request automatic comparison of the face in the similar IDs to those in your target's ID".
Gary Edwards

NSA Whistleblower: NSA Spying On - and Blackmailing - Top Government Officials and Mili... - 0 views

  •  
    Whistleblower Says Spy Agency Targeting Top American Leaders NSA whistleblower Russel Tice - a key source in the 2005 New York Times report that blew the lid off the Bush administration's use of warrantless wiretapping - told Peter B. Collins on Boiling Frogs Post (the website of FBI whistleblower Sibel Edmonds): Tice: Okay. They went after-and I know this because I had my hands literally on the paperwork for these sort of things-they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the-and judicial. But they went after other ones, too. They went after lawyers and law firms. All kinds of-heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House-their own people. They went after antiwar groups. They went after U.S. international-U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that-like the Red Cross, people like that that go overseas and do humanitarian work. They went after a few antiwar civil rights groups. So, you know, don't tell me that there's no abuse, because I've had this stuff in my hand and looked at it. And in some cases, I literally was involved in the technology that was going after this stuff. And you know, when I said to [former MSNBC show host Keith] Olbermann, I said, my particular thing is high tech and you know, what's going on is the other thing, which is the dragnet. The dragnet is what Mark Klein is talking about, the terrestrial dragnet. Well my specialty is outer sp
Paul Merrell

Erdogan Blackmails NATO Allies - 0 views

  • You know the country has really gone to the dogs when Washington’s main allies in its war on Syria are the two biggest terrorist incubators on the planet. I’m talking about Saudi Arabia and Turkey, both of which are run by fanatical Islamic zealots devoted to spreading violent jihad to the four corners of the earth. Not that the US doesn’t have blood on its hands too. It does, but that’s beside the point.
  • Four and half years later, the place is a worse mess than Iraq.  Half the population is either dead or internally displaced, the civilian infrastructure is a shambles, and nothing has been achieved. Nothing.  Assad is safely tucked away in Damascus, the jihadi proxies are on the run, and everyone hates the US more than ever. Great plan, eh? Where’s the downside? The downside is that now Washington finds itself backed against the wall with precious  few options that don’t involve a direct confrontation with Moscow.
  • These developments have forced Washington into a fallback position that will likely entail air-support for Turkish ground forces who will be deployed to Northern Syria to take and hold area sufficient for a “safe zone”, which is an innocuous sounding moniker the media invokes to conceal the fact that Turkey plans to annex sovereign Syrian territory which, by the way, is an act of war. Now fast-forward to last week:
  • ...6 more annotations...
  • Some readers may have noticed disturbing headlines like this in the Wall Street Journal: “U.S. Urges Turkey to Seal Border” Or this Reuters piece that popped up on Monday:  “NATO allies act to strengthen Turkey’s air defenses” Why, you may ask, does Obama want Turkey to close the border now when the horse has already left the barn? What I mean is that the White House has known for over 3 years that the bulk of the jihadis were transiting Turkey on their way  to Syria, just like they knew that ISIS’s oil was being transported across Turkey.
  • So why is it so urgent to close the border now, after all, the damage is already done, right? Could it have something to do with the fact that Putin’s legions are moving north to seal the border? Could there be an alternate objective, for example, could the US and Turkey be setting the stage for an incursion into Syria that would secure the land needed for the glorious safe zone? That’s what most of the analysts seem to think, at least the ones that haven’t been coopted by the mainstream media. But why is NATO suddenly getting involved? What’s that all about? After all, Putin was reluctant to even commit his airforce to the Syrian conflict. It’s not like he’s planning to invade Turkey or something, right?
  • So, what’s really going on? For that, we turn to Moon of Alabama that provides this excellent summary in a recent post titled:  “The Real “Terrorist Sympathizers” Want To Wage War On Syria … And Russia”. Here’s an excerpt:  “Who initiated this sudden rush within major NATO governments to get parliamentary blank checks for waging a long war on Syria? Not only in the UK but also in France and Germany? The German government turned on a dime from “no military intervention in Syria ever” to “lets wage a war of terror on Syria” without any backing from the UN or international law. .. Who initiated this? A simple, medium size terror attack in Paris by some Belgians and French can not be the sole reason for this stampede. Did Obama call and demand support for his plans? What are these? I smell that a trap is being laid, likely via a treacherous Turkey, to somehow threaten Russia with, or involve it in, a wider war. This would include military attacks in east-Ukraine or Crimea as well as in Syria. Obama demanded European backing in case the issue gets out of hand. No other reason I have found explains the current panic. The terrorists the “west” supports in Syria are in trouble. The real terrorist sympathizers need to rush to their help. It is a start of all-out war on Syria and its Russian protectors.” (“Terrorist Sympathizers” Want To Wage War On Syria … And Russia“, Moon of Alabama)
  • Is that what’s going on? Has Turkish President Erdogan figured out how to hoodwink the NATO allies into a confrontation with Russia that will help him achieve his goal of toppling  Assad and stealing Syrian territory? It’s hard to say, but clearly something has changed,  after all, neither France, nor Germany nor the UK were nearly as gung-ho just a few weeks ago. Now they’re all hyped-up and ready for WW3. Why is that? Ahh, Grasshopper, that is the mystery, a mystery that was unraveled in an op-ed that appeared in the Tuesday edition of the Turkish newspaper Hurriyet Daily News. Here’s the excerpt: “The increase in military cooperation within NATO countries against ISIL and the piling up of NATO forces near Turkey’s border with Syria take place in parallel with the recent deal between Ankara and the Brussels over Syrian refugees and the re-activation of Turkey’s EU accession bid.” ….(“Western forces pile up on Turkey-Syria border“, Hurriyet)
  • Okay, so Erdogan worked out a deal with the other NATO countries. Why is that such a big deal? Well, check out this blurb from the Today’s Zaman:  “Erdogan’s advisor, Burhan Kuzu, summed it up even more succinctly saying: “The EU finally got Turkey’s message and opened its purse strings. What did we say? ‘We’ll open our borders and unleash all the Syrian refugees on you,’” Kuzu stated in his controversial tweet… ” (“EU bows to Turkey’s threat on refugees says Erdoğan advisor“, Today’s Zaman) Blackmail? Is that what we’re talking about, blackmail? It sure sounds like it. Let’s summarize: Erdogan intentionally releases tens of thousands of Syrian refugees into Europe to put pressure on EU politicians who quickly lose the support of their people and face the meteoric rise of right wing parties. And then, the next thing you know, Merkel, Hollande and every other EU leader is looking to cut a deal with Erdogan to keep the refugees in Turkey. Isn’t that how it all went down? Except we’re missing one important factoid here, because according to the first op-ed “The increase in military cooperation within NATO… and the piling up of NATO forces near Turkey’s border”…took  place in parallel with the deal between Ankara and the Brussels.”
  • Get it? So there was a quid pro quo that no one wants to talk about.  In other words, Germany, France and the UK agreed to support Erdogan’s loony plan to conduct military operations in Syria, risking a serious dust-up with Russia, in order to save their own miserable political careers. Boy, if that doesn’t take the cake, than I don’t know what does.
  •  
    A must-read. Mike Whitney usually gets things right, although I'm not certain he's called this one correctly. On the other hand, he's not alone among close watchers who are predicting imminent war against Russia in Syria. The neocons and neolibs in Congress are screaming for it to happen because they see the U.S. getting edged out the Mideast by Russia. And NATO is definitely moving its forces in a direction that would enable that war and a second one in Ukraine. So as I see it, it's either posturing or a serious plan to go to war with Russia outside Russian territory. Think along the lines of a Korean War scenario, with Russia taking the place of China.   
Paul Merrell

interfluidity » Tradeoffs - 0 views

  • I think it is not coincidental that support for the security state is highly correlated with seniority and influence, in both of our increasingly irrelevant political parties. The apparatus we are constructing, have constructed, creates incredible scope for digging up dirt on people and their spouses, their children, their parents. It doesn’t take much to manage the shape of the economy of influence. There are, how shall we say, network effects.
  • I’m going to excerpt a bit from a great, underdiscussed piece by Beverly Gage: [J. Edgar] Hoover exercised powerful forms of control over potential critics. If the FBI learned a particularly juicy tidbit about a congressman, for instance, agents might show up at his office to let him know that his secrets—scandalous as they might be—were safe with the bureau. This had the predictable effect: Throughout the postwar years, Washington swirled with rumors that the FBI had a detailed file on every federal politician. There was some truth to the accusation. The FBI compiled background information on members of Congress, with an eye to both past scandals and to political ideology. But the files were probably not as extensive or all-encompassing as people believed them to be. The point was that it didn’t matter: The belief alone was enough to keep most politicians in line, and to keep them voting yes on FBI appropriations. Today, James Bamford quotes a former senior CIA official, describing current spymaster Keith Alexander: We jokingly referred to him as Emperor Alexander — with good cause, because whatever Keith wants, Keith gets… We would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else. Bribery and blackmail go together, of course. The carrot and the stick.
  • This is not, ultimately, a story about evil individuals. The last thing I want to do with my time is get into an argument over the character of our President. I could care less. The problem we face here is social, institutional. Bribery, blackmail, influence peddling, flattery — these have always been and always will be part of any political landscape. Our challenge is to minimize the degree to which they corrupt the political process. “Make better humans” is not a strategy that is likely succeed. “Find better leaders” is just slightly less naive. Institutional problems require institutional solutions. We did manage to reduce the malign influence of the J. Edgar Hoover security state, by placing institutional checks on what law enforcement and intelligence agencies could do, and by placing those agencies under more public and intrusive supervision. I think that much of our task today is devising a sufficient surveillance architecture for our surveillance architecture. But as we are talking about all this, let’s remember what we are talking about. We are not talking about a tradeoff between “security” and “privacy”. That framing is a distraction. Our current path is to pay for (alleged) security by acquiescence to increasingly corrupt and corruptible governance. We ought to ask ourselves whether a very secure, very corrupt state is better than the alternatives, whether security for corruption is a tradeoff we are willing to make.
Gary Edwards

Arnold Ahlert: Russia Would Love a Third Obama Term - The Patriot Post - 0 views

  • New York Post columnist John Crudele obliterates the despicable word-parsing. “Clinton was so careless when using her BlackBerry that the Russians stole her password,” he writes. “All Russian President Vladimir Putin’s gang had to do was log into Clinton’s account and read whatever they wanted.” When it comes to the DNC hack, “The Russians did it” is the theme-du-jour. Clinton campaign manager, Robby Mook stated Sunday that “experts are telling us that Russian state actors broke into the DNC, stole these emails, [and are] releasing these emails for the purpose of helping Donald Trump.” The campaign itself echoed that assertion. “This is further evidence the Russian government is trying to influence the outcome of the election.”
  • The reliably leftist Politico — so far left that reporter Ken Vogel remains employed there despite sending a story to the DNC before he sent it to his own editor — is quite comfortable advancing that agenda, using it as a vehicle to buff up Clinton’s tenure as secretary of state. “Former U.S. officials who worked on Russia policy with Clinton say that Putin was personally stung by Clinton’s December 2011 condemnation of Russia’s parliamentary elections, and had his anger communicated directly to President Barack Obama,” Politico reports. “They say Putin and his advisers are also keenly aware that, even as she executed Obama’s ‘reset’ policy with Russia, Clinton took a harder line toward Moscow than others in the administration. And they say Putin sees Clinton as a forceful proponent of ‘regime change’ policies that the Russian leader considers a grave threat to his own survival.” Yet even Politico is forced to admit the payback angle is “speculation,” and that some experts remain “unconvinced that Putin’s government engineered the DNC email hack or that it was meant to influence the election in Trump’s favor as opposed to embarrassing DNC officials for any number of reasons.”
  • Americans would also be wise to remain highly skeptical of this claim for any number of reasons. WikiLeaks founder Julian Assange asserts there is “there is no proof whatsoever” Russia is behind the hack and that “this is a diversion that’s being pushed by the Hillary Clinton campaign.” To be fair, Assange is a Russian sympathizer, and leftists aren’t the only ones attributing the hack to the Russians. The same FBI that gave Clinton a pass will be investigating the DNC hack, and at some point the bureau will reach a conclusion. In the meantime, it might be worth considering that this smacks of a carefully orchestrated disinformation campaign similar to the one Clinton and several other Obama administration officials engineered with regard to Benghazi. While Clinton was never held personally or legally accountable for the deaths of four Americans, it is beyond dispute that she lied unabashedly about a video causing the attack, while sending her daughter a damning email at 11:12 p.m. on Sept. 11, 2012, admitting the administration knew “the attack had nothing to do with the film. It was a planned attack, not a protest.” The theme of this coordinated narrative? Clinton campaign chair John Podesta referred Monday night to “a kind of bromance going on” between Putin and Trump. Clinton campaign manager Robby Mook echoed that assertion, insisting the email dump comes on the heels of “changes to the Republican platform to make it more pro-Russian.”
  • ...3 more annotations...
  • The Leftmedia were equally obliging. “The theory that Moscow orchestrated the leaks to help Trump … is fast gaining currency within the Obama administration because of the timing of the leaks and Trump’s own connections to the Russian government,” reports the Daily Beast. Other Leftmedia examples abound. “Until Friday, that charge, with its eerie suggestion of a Kremlin conspiracy to aid Donald J. Trump, has been only whispered,” shouted the New York Times. “Because the leaks are widely suspected of being the result of a Russian hacking operation, they can be used to reinforce the narrative that Russian President Vladimir Putin is rooting for Trump and that Trump, in turn, would be too accommodating to Moscow,” adds the Los Angeles Times. “Why would Russian President Vladimir Putin want to help Donald Trump win the White House?” asks NPR. “If you want to indulge in a bit of conspiracy theory, remember that Russian President Vladimir Putin has praised candidate Trump as recently as June,” states the Burlington Free Press.
  • Ultimately, here’s the question: If the Russians could access the DNC server, they could certainly access Clinton’s unsecure server. And if they could access Clinton’s server, including the 33,000 emails she deleted (maybe some were about how the Clintons profited from selling American uranium to Russia), ask yourself who they’d rather have in the Oval Office: Donald Trump, who professed admiration for Putin but remains a highly unpredictable individual — or Hillary Clinton, who could be subjected to blackmail for as long as eight years? Russia’s clear objective would be to have the weakest American leadership they can get. Blackmail aside, what would be weaker than an extension of Obama’s presidency?
  • Moreover, it is just as likely a number of the so-called “experts” as well as Clinton’s useful idiot media apparatchiks have considered the blackmail possibility and are trying to divert attention from it with a phony Trump connection story. Democrats can theorize, complain and blame to their hearts' content, but none of it obscures the reality that the DNC — and by extension Hillary Clinton and the entire Democrat Party — are a conglomeration of morally bereft, utterly incompetent individuals wholly ill-equipped to handle internal security, much less national security. And they are aided and abetted by an equally corrupt media, more than willing to abide that potentially catastrophic reality as long as it gets a Democrat in the Oval Office. WikiLeaks has promised additional dumps with be forthcoming. How much deeper Democrats sink is anyone’s guess.
  •  
    "If one lives by the vulnerable server, one dies by the vulnerable server. As the week unfolds, America is witnessing the ultimate unmasking of the Democrat Party, an entity whose self-aggrandizing claims of unity, fairness and intellectual honesty have been revealed as utterly fraudulent by a flood of DNC emails released by WikiLeaks. Moreover, a stunning level of hypocrisy attends the entire exposure, as DNC Chairwoman Debbie Wasserman Schultz is sent packing for this breach of confidential party information, while Hillary Clinton, whose equally accessible private server contained far more critical top-secret information, officially became the party's standard-bearer. But not to worry, assured FBI Director James Comey, who insisted there was no direct evidence that Clinton's server had been hacked by hostile actors - before adding it was possible that hostile actors "gained access" to Clinton's accounts. Clinton was equally adept at making semantical distinctions. "If you go by the evidence, there is no evidence that the system was breached or hacked successfully," Clinton said. "And I think that what's important here is follow the evidence. And there is no evidence. And that can't be said about a lot of other systems, including government systems.""
Paul Merrell

Why Obama is bombing the Caliph - RT Op-Edge - 0 views

  • This is the way the multi-trillion dollar Global War on Terror (GWOT) ends: not with a bang, but with a bigger bang. The GWOT, since its conceptualization 13 years ago, in the aftermath of 9/11, is the gift that keeps on giving. And no gift is bigger than a Transformer Al-Qaeda on steroids – bigger, brasher, and wealthier than anything Osama Bin Laden and Ayman al-Zawahiri had ever dreamt of; the IS (Islamic State, formerly known as ISIS) of Caliph Ibrahim, former Abu Bakr al-Baghdadi. US President Barack Obama, before deploying his golf holidays in Martha’s Vineyard, casually dropped that bombing the Caliph’s goons in Iraq will take months. One may interpret it as another layer of the Obama administration’s self-avowed “Don't Do Stupid Stuff” foreign policy doctrine, not so subtly mocked by prospective presidential candidate Hillary Clinton. Shock and Awe in 2003 destroyed the whole of Baghdad’s infrastructure in only a few hours. Obama also confirmed the US was showering Iraq again with humanitarian bombing “to protect American interests” (first and foremost) and, as an afterthought, “human rights in Iraq.” One could not possibly expect Obama to declare the US would now bomb “our” allies the House of Saud, who have supported/financed/weaponized IS, in Syria and Iraq. The same erstwhile ISIS that thoroughly enjoyed the marvels of US military training in a secret base in Jordan.
  • Obama also could not possibly explain why the US always supported ISIS in Syria and now decides to bomb them in Iraq. Oh, the perils of ‘Don’t Do Stupid Stuff’. So a quick translation applies.
  • Obama’s bombing of the Caliph’s goons has absolutely nothing to do with US ambassador to the UN Samantha Power’s much beloved R2P (‘responsibility to protect’) doctrine – as in the responsibility to protect up to 150,000 Yazidis, not to mention Kurds and remaining Christians, from a ‘potential’ genocide carried out by the Caliph’s goons. The whole fighter jets + drones bombing exercise, lasting ‘months’, has to do with the Benghazi syndrome. The Caliph’s goons were dead set on conquering Irbil - the capital of Iraqi Kurdistan. The Kurdistan Regional Government (KRG) is led by the wily Massoud Barzani – a long-time US client/vassal. The US maintains a consulate in Irbil. Crammed with CIA types. Or, as the New York Times so lovingly puts it, “thousands of Americans.” Enter Benghazi. This is an electoral year. Obama is absolutely terrified of another Benghazi – which Republicans have been trying non-stop to blame on his administration’s incompetence. The last thing Obama needs is the Caliph’s goons killing ‘diplomats’ in Erbil. That would certainly raise a tsunami of questions all over again about the shady CIA weapon-smuggling racket – as in arming Syrian ‘rebels’ with weapons from Libya - at the time Benghazi took place. As secretary of state, Hillary Clinton, of course, also knew about it all. But then, and especially now, no one should know that the CIA was weaponizing the bulk of the future Caliph’s forces.
  • ...4 more annotations...
  • Obama said this humanitarian bombing adventure could last “months,” but in fact it could last only days. The price is cheap: regime change. As in former Iraqi Prime Minister Nouri al-Maliki blocked from having a third term. That explains why all hell broke loose in Baghdad, as Iraqi parliamentarians clearly saw which way the wind is blowing. Haider al-Abadi was chosen by new President Fuad Masoum, a Kurd, as the new prime minister – hours after Maliki positioned Special Forces in strategic sites in and around the Green Zone and may (or may not) have tried to stage a coup. Maliki maintains that Masoum violated the Iraqi constitution by not selecting him to form a new cabinet; after all, his State of Law bloc got the most votes in last April’s parliamentary elections.
  • Obama, predictably, was delighted. But whatever happens next, Maliki won’t go down quietly – to say the least. Even as the predominant narrative among Sunnis, a substantial number of Kurds and even some Shiite political blocs is that Maliki antagonized Sunnis all-out; and that’s what drove them to support the Caliph en masse (although now many are having second thoughts.) As for the KRG and Barzani, in the Obama administration scheme of things, what matters is that they should not declare independence. As long as Barzani promises to Obama that Kurdistan stays inside Iraq, the KRG will get more bombs and drones and the ‘humanitarian’ operation will speed up. US Special Forces are already deployed all over the huge area where the Caliphate borders the KRG, in so-called desert forward operating positions. And the US for all practical purposes is now the Iraqi Air Force against the Caliph. Watch ‘the Hillarator’ This Obama administration warped R2P – protection for Americans first, refugees second – will accomplish nothing for a key reason; no bombing – ‘humanitarian’ or otherwise - exterminates a political/religious movement, even one as demented as IS. The Caliphate prospers, somewhat, and expands, because unlike that pathetic Free Syrian Army (FSA) it’s winning territory, desert and urban, in both Syria and Iraq; an area bigger than Great Britain already, holding at least 6 million people.
  • As for the much-peddled Washington myth of ‘good’ and ‘bad’ jihadists, the Caliphate also exploded it. Virtually every jihadi Washington - and Riyadh – weaponized and trained in Jordan and in the Turkey-Syria border is now among the Caliph’s goons, wallowing in cash raised from oil smuggling, hardcore blackmail and ‘donations’, and weaponized to their teeth after looting four Iraqi divisions and a Syrian brigade. As for the GWOT gift, it will keep on giving in a bigger and bigger bang because of the dream narrative now displayed for every aspiring multinational jihadi; we are now defending our Caliphate from the mighty Crusader Air Force, no less. The US lost the war in Iraq, miserably, only nine days after the fall of Baghdad, in April 2003. No ‘humanitarian’ bombing will turn it into a victory. And no ‘humanitarian’ bombing will finish the Caliphate off. As for prospective presidential candidate Hillary Clinton, she’s taking no prisoners. She insists the US should have bombed Syria in the first place; then there would be no Caliphate. But now she worries the Caliph will attack Europe and even the US (“I’m thinking a lot about containment, deterrence and defeat”). Predictably positioning herself, Clinton could not but totally dismiss Obama’s foreign policy doctrine, a.k.a. ‘Don’t do stupid stuff’: “‘Don’t do stupid stuff’ is not an organizing principle.” So the world will have to wait until 2017, when she’s finally able to implement her own doctrine/organizing principle: “We came, we saw, he died.”
  • This is the way the multi-trillion dollar Global War on Terror (GWOT) ends: not with a bang, but with a bigger bang. The GWOT, since its conceptualization 13 years ago, in the aftermath of 9/11, is the gift that keeps on giving. And no gift is bigger than a Transformer Al-Qaeda on steroids – bigger, brasher, and wealthier than anything Osama Bin Laden and Ayman al-Zawahiri had ever dreamt of; the IS (Islamic State, formerly known as ISIS) of Caliph Ibrahim, former Abu Bakr al-Baghdadi. US President Barack Obama, before deploying his golf holidays in Martha’s Vineyard, casually dropped that bombing the Caliph’s goons in Iraq will take months. One may interpret it as another layer of the Obama administration’s self-avowed “Don't Do Stupid Stuff” foreign policy doctrine, not so subtly mocked by prospective presidential candidate Hillary Clinton. Shock and Awe in 2003 destroyed the whole of Baghdad’s infrastructure in only a few hours. Obama also confirmed the US was showering Iraq again with humanitarian bombing “to protect American interests” (first and foremost) and, as an afterthought, “human rights in Iraq.”
  •  
    "Enter Benghazi. This is an electoral year. Obama is absolutely terrified of another Benghazi - which Republicans have been trying non-stop to blame on his administration's incompetence. The last thing Obama needs is the Caliph's goons killing 'diplomats' in Erbil. "That would certainly raise a tsunami of questions all over again about the shady CIA weapon-smuggling racket - as in arming Syrian 'rebels' with weapons from Libya - at the time Benghazi took place. As secretary of state, Hillary Clinton, of course, also knew about it all. But then, and especially now, no one should know that the CIA was weaponizing the bulk of the future Caliph's forces." Yup. It's the same reason that the House investigation of the Benghazi incident will never punch through to the truth. The War Party doesn't want its Benghazi CIA ratline for Libyan weapons to Turkey being exposed because that leads directly to the fact that ISIS is a U.S.-Saudi creation. Remember Wayne Madsen's article on why Obama backed down from his planned missile and bombing attack on Syria after the Ghouta false flag Sarin attack in August 2013: ""Some within the Pentagon ranks are so displeased with Obama's policies on Syria, they have let certain members of Congress of both parties know that «smoking gun» proof exists that Obama and CIA director John O. Brennan personally authorized the transfer of arms and personnel from Al-Qaeda-linked Ansar al Sharia Islamist rebels in Libya to Syria's Jabhat al Nusra rebels, who are also linked to Al Qaeda, in what amounts to an illegal «Iran-contra»-like scandal." http://www.strategic-culture.org/news/2013/09/04/american-generals-stand-between-war-and-peace.html And the detailed confirmation that events had actually transpired in accordance with that plan by Yossef Bodansky - Director of the Congressional Task Force on Terrorism and Unconventional Warfare of the US House of Representatives from 1988 to 2004 and the center of an enormous global
Paul Merrell

By "Punishing" France, The US Just Accelerated The Demise Of The Dollar | Zero Hedge - 0 views

  • Not even we anticipated this particular "unintended consequence" as a result of the US multi-billion dollar fine on BNP (which France took very much to heart). Moments ago, in a lengthy interview given to French magazine Investir, none other than the governor of the French National Bank Christian Noyer and member of the ECB's governing board, said this stunner at the very end, via Bloomberg: NOYER: BNP CASE WILL ENCOURAGE ‘DIVERSIFICATION’ FROM DOLLAR Here is the full google translated segment:
  • Q. Doesn't the role of the dollar as an international currency create systemic risk?   Noyer: Beyond [the BNP] case, increased legal risks from the application of U.S. rules to all dollar transactions around the world will encourage a diversification from the dollar. BNP Paribas was the occasion for many observers to remember that there has been a number of sanctions and that there would certainly be others in the future. A movement to diversify the currencies used in international trade is inevitable. Trade between Europe and China does not need to use the dollar and may be read and fully paid in euros or renminbi. Walking towards a multipolar world is the natural monetary policy, since there are several major economic and monetary powerful ensembles. China has decided to develop the renminbi as a settlement currency. The Bank of France was behind the popular ECB-PBOC swap and we have just concluded a memorandum on the creation of a system of offshore renminbi clearing in Paris. We have very strong cooperation with the PBOC in this field. But these changes take time. We must not forget that it took decades after the United States became the world's largest economy for the dollar to replace the British pound as the first international currency. But the phenomenon of U.S. rules expanding to all USD-denominated transactions around the world can have an accelerating effect. In other words, the head of the French central bank, and ECB member, Christian Noyer, just issued a direct threat to the world's reserve currency (for now), the US Dollar.
  • Putting this whole episode in context: in an attempt to punish France for proceeding with the delivery of the Mistral amphibious warship to Russia, the US "punishes" BNP with a failed attempt at blackmail (recall that as Putin revealed, the BNP penalty was a used as a carrot to disincenticize France from concluding the Mistral transaction: had Hollande scrapped the deal, BNP would likely be slammed with a far lower fine, if any). Said blackmail attempt backfires horribly when as a result, the head of the French central bank makes it clear that not only is the US Dollar's reserve currency status not sacrosanct, but "the world" will now actively seek to avoid USD-transactions in order to escape the tentacle of global "pax Americana." And, the biggest irony of all is that in "punishing" France for dealing with Russia, that core country of the Eurasian alliance of Russia and China, the US merely accelerated the gravitation of France (and all of Europe) precisely toward Eurasia, toward a multi-polar (sorry fanatic believers in a one world SDR-based currency) and away from the greenback.
Paul Merrell

Ecuador breaks US trade pact to thwart 'blackmail' over Snowden asylum | World news | g... - 0 views

  • Ecuador has ramped up its defiance of the US over Edward Snowden by waiving preferential trade rights with Washington even as the whistleblower's prospect of reaching Quito dimmed.President Rafael Correa's government said on Thursday it was renouncing the Andean Trade Preference Act to thwart US "blackmail" of Ecuador in the former NSA contractor's asylum request.Officials, speaking at an early morning press conference, also offered a $23m donation for human rights training in the US, a brash riposte to recent US criticism of Ecuador's own human rights record.Betty Tola, the minister of political coordination, said the asylum request had not been processed because Snowden, who is believed to be at Moscow airport, was neither in Ecuador nor at an Ecuadorean embassy or consulate. "The petitioner is not in Ecuadorean territory as the law requires."
  • The renunciation underlined divisions within Ecuador's government between leftists who have embraced Snowden as an anti-imperialist symbol and centrists who fear diplomatic and economic damage.Some in the government are believed to be annoyed that Julian Assange, the WikiLeaks founder who has sheltered at Ecuador's London embassy to avoid extradition, has seized the limelight in the Snowden saga. Assange caught Quito by surprise last week when he announced Snowden had been given a safe conduct pass. Quito replaced its ambassador to London earlier this month in hope of better managing its famous guest.The waiving of preferential trade rights followed threats from members of the US congress to drop the ATPA in July, when it is due for renewal, unless Ecuador toed the line on Snowden."Ecuador does not accept pressure or threats from anyone, nor does it trade with principles or submit them to mercantile interests, however important those may be," said Fernando Alvarado, the communications secretary. "Ecuador gives up, unilaterally and irrevocably, the said customs benefits."
Paul Merrell

4Chan Claims To Have Fabricated Anti-Trump Report As A Hoax | Zero Hedge - 0 views

  • In a story that is getting more surreal by the minute, a post on 4Chan now claims that the infamous "golden showers" scene in the unverified 35-page dossier, allegedly compiled by a British intelligence officer, was a hoax and fabricated by a member of the chatboard as "fanfiction", then sent to Rick Wilson, who proceeded to send it to the CIA, which then put it in their official classified intelligence report on the election. Here is 4Chan's explanation of how the story came to light: >/pol/acks mailed fanfiction to anti-trump pundit Rick Wilson about trump making people piss on a bed obama slept in >he thought it was real and gave it to the CIA >the central intelligence agency of the united states of america put this in their official classified intelligence report on russian involvement in the election >donald trump and obama have both read this pol/acks fanfiction >the cia has concluded that the russian plans to blackmail trump with this story we made up just let that sink in what we have become.
  • nd a summary posted on pastebin: On january 10, Buzzfeed posted a story under the byline of Ken Bensinger, Mark Schoofs and Miriam elder titled “these reports Allege Trump Has Deep Ties To Russia” and posted a link to a document alleging, among other things, that russia has been cultivating trump for 5+ years, that trump has been in constant contact with the kremlin for information on his opponents, and perhaps most inflammatory, that there are many recorded instances of blackmail of trump in sexual misconduct. A prominent claim is that trump rented the presidential suite of the Ritz Carlton Hotel in moscow, where he knew that the Obamas had slept in; he them hired a number of prostitutes to perform a 'golden shower' (pissplay) on the bed and in the room. https://www.buzzfeed.com/kenbensinger/these-reports-allege-trump-has-dee...https://assets.documentcloud.org/documents/3259984/Trump-Intelligence-Al...   Noted #nevertrump voice Rick Wilson later commented on twitter, stating that the report “gave a new meaning to Wikileaks” (https://twitter.com/TheRickWilson/status/818982395202379777) and that the report was the reason everybody was fighting so hard against the election of Trump. (https://twitter.com/TheRickWilson/status/818983514335047680)   The remarkable thing? It's all fake. And not only fake; it's a prank perpetuated by 4chan, on Rick Wilson himself. A post on 4chan on october 26 stated “mfw managed to convince CTR and certain (((journalists))) on Twitter there'll be an October surprise on Trump this Friday” along with a picture of a smug face with a hash name. http://archive.4plebs.org/pol/thread/94704894/#94705224   on november 1, a person without a picture but is assumed to be the same person posted “So they took what I told Rick Wilson and added a Russian spy angle to it. They still believe it. Guys, they're truly fucking desperate - there's no remaining Trump scandal that's credible.” https://archive.4plebs.org/pol/thread/95568919/#95571329  
  • al media, a person with the same smug grin face, and the same hash title for the picture, stated “I didn't think they'd take it so far.” http://boards.4chan.org/pol/thread/106514445#p106520376   This story has taken on something of a life of it's own. Going through Rick Wilson's twitter, you can find many different stories from the time that he had shown the story to a wide number of anti-trump news sources, trying to find a news organization that would actually publish the story. During that time period, he referred to it often as 'the thing', and often playing coy with followers on the content with the story with anybody who was not also a #Nevertrumper. Unconfirmed sources has people as high up as John McCain giving the story to FBI Director James Comey to attempt to verify the story. Given that Rick Wilson runs in Establishment circles, it is not an impossible scenario that long-serving senators are falling for what amounts to a 4chan troll trump supporter creating an ironic October Surprise out of wholecloth to punk a GOPe pundit who derogatorily referred to them as single men who masturbate to anime. While this entire incident is laughable, and even more so if the 4Chan account is accurate, what makes it quite tragic, is that it is no longer possible to dismiss the "fake news" angle to an intelligence report. And if the CIA is compromised, what is left for "news outlets" like CNN and BuzzFeed, which were all too eager to run with the story without any attempt at verification?
  •  
    It's must read.
Paul Merrell

Bush Lets U.S. Spy on Callers Without Courts - New York Times - 0 views

  • Months after the Sept. 11 attacks, President Bush secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without the court-approved warrants ordinarily required for domestic spying, according to government officials. Under a presidential order signed in 2002, the intelligence agency has monitored the international telephone calls and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without warrants over the past three years in an effort to track possible "dirty numbers" linked to Al Qaeda, the officials said. The agency, they said, still seeks warrants to monitor entirely domestic communications. The previously undisclosed decision to permit some eavesdropping inside the country without court approval was a major shift in American intelligence-gathering practices, particularly for the National Security Agency, whose mission is to spy on communications abroad. As a result, some officials familiar with the continuing operation have questioned whether the surveillance has stretched, if not crossed, constitutional limits on legal searches.
  •  
    This is the 2005 article that alerted the nation to the fact that the Bush II Administration had, shortly after 9-11-2001, authorized the NSA to conduct warrantless electronic eavesdropping on Americans. It would later emerge that veteran NSA intelligence analyst Russell Tice, the first NSA whistleblower, was a key source for the article. http://en.wikipedia.org/wiki/Russ_Tice Post-Snowden disclosures, Tice went public with even more detail, disclosing that the NSA has also wiretapped top officials in all three branches of government, as well as non-government targets in the U.S. http://www.washingtonsblog.com/2013/06/nsa-whistleblower-nsa-spying-on-and-blackmailing-high-level-government-officials-and-military-officers.html (for the quoted portions, begin listening at about 44 minutes into the podcast). The third from last paragraph in the article discusses a 2002 Justice Department brief in which DoJ argued that "the Constitution vests in the President inherent authority to conduct warrantless intelligence surveillance (electronic or otherwise) of foreign powers or their agents, and Congress cannot by statute extinguish that constitutional authority." That brief is archived at the FAS web site. https://www.fas.org/irp/agency/doj/fisa/092502sup.html (it's an amazingly arrogant document). 
Gary Edwards

About the Reuters article | Glenn Greenwald | Comment is free | guardian.co.uk - 0 views

  • (just incidentally, the notion that a government that has spent the last decade invading, bombing, torturing, rendering, kidnapping, imprisoning without charges, droning, partnering with the worst dictators and murderers, and targeting its own citizens for assassination would be above such conduct is charmingly quaint
  • three points in this La Nacion interview, all of which are true and none of which has anything remotely to do with threats:
  • 1) The oft-repeated claim that Snowden's intent is to harm the US is completely negated by the reality that he has all sorts of documents that could quickly and seriously harm the US if disclosed, yet he has published none of those.
  • ...12 more annotations...
  • The overwhelming majority of his disclosures were to blow the whistle on US government deceit and radical, hidden domestic surveillance.
  • If his intent were to harm the US, he could have sold all the documents he had for a great deal of money, or indiscriminately published them, or passed them to a foreign adversary. He did none of that.
  • 2) The US government has acted with wild irrationality. The current criticism of Snowden is that he's in Russia. But the reason he's in Russia isn't that he chose to be there. It's because the US blocked him from leaving: first by revoking his passport (with no due process or trial), then by pressuring its allies to deny airspace rights to any plane they thought might be carrying him to asylum (even one carrying the democratically elected president of a sovereign state), then by bullying small countries out of letting him land for re-fueling.
  • Given the extraordinary amount of documents he has and their sensitivity, I pointed out in the interview that it is incredibly foolish for the US government to force him to remain in Russia.
  • As a result of the documents he has, I said in the interview, the US government should be praying for his safety, not threatening or harming it.
  • 3) I was asked whether I thought the US government would take physical action against him if he tried to go to Latin America or even force his plane down. That's when I said that doing so would be completely counter-productive given that - as has been reported before - such an attack could easily result in far more disclosures than allowing us as journalists to vet and responsibly report them, as we've doing.
  • Compare the attention paid to Snowden's asylum drama and alleged personality traits to the attention paid to the disclosures about mass, indiscriminate NSA spying. Or compare the media calls that Snowden (and others who worked to expose mass NSA surveillance) be treated like a criminal to the virtually non-existent calls that Director of National Intelligence James Clapper be treated like a criminal for lying to Congress.
  • This "threat" fiction is just today's concoction to focus on anything but the revelations about US government lying to Congress and constitutionally and legally dubious NSA spying.
  • this only happens in the US: everywhere else, the media attention and political focus is on NSA surveillance, while US media figures are singularly obsessed with focusing on everything but that.
  • Yesterday, it was something else, and tomorrow it will be something else again.
  • There are all sorts of ways that Snowden could have chosen to make these documents be public. He chose the most responsible way possible: coming to media outlets and journalists he trusted and asking that they be reported on responsibly.
  • The effort to depict him as some sort of malicious traitor is completely negated by the facts. That was the point of the interview.
  •  
    Excellent explanation by Glenn Greenwald. intro: Like everything in the matter of these NSA leaks, this interview is being wildly distorted to attract attention away from the revelations themselves. It's particularly being seized on to attack Edward Snowden and, secondarily, me, for supposedly "blackmailing" and "threatening" the US government. That is just absurd. That Snowden has created some sort of "dead man's switch" - whereby documents get released in the event that he is killed by the US government - was previously reported weeks ago, and Snowden himself has strongly implied much the same thing. That doesn't mean he thinks the US government is attempting to kill him - he doesn't - just that he's taken precautions against all eventualities, including that one (just incidentally, the notion that a government that has spent the last decade invading, bombing, torturing, rendering, kidnapping, imprisoning without charges, droning, partnering with the worst dictators and murderers, and targeting its own citizens for assassination would be above such conduct is charmingly quaint).
Gary Edwards

E-mail's Big Privacy Problem: Q&A With Silent Circle Co-Founder Phil Zimmerma... - 1 views

  • Customers of Silent Circle’s encrypted mail service got an unfortunate surprise on Friday: all their messages had been deleted. The management  of Silent Circle, an encryption firm that specializes in smartphone communication, abruptly shut down their e-mail service yesterday, saying they were pre-empting the U.S. government from forcing them to hand over customer data. While they were confident they could protect text messages, voice calls and video calls, e-mail had always been less secure because it relied on standard Internet protocols. Yesterday’s catalyst was a competitor, Lavabit, whose founder announced he was shutting his email-hosting company down due to an apparent government investigation, and told Forbes on Friday: “If you knew what I knew about e-mail, you might not use it.” Edward Snowden had been a Lavabit user.
  • Phil Zimmermann, the inventor of popular email encryption service Pretty Good Privacy (PGP) and co-founder of Silent Circle, told us even he was using e-mail less and less, and relying more heavily on mobile messaging services in the quest for privacy. He also explained the gnawing problem of Silent Circle’s e-mail service and why the company was now planning to put servers in Switzerland. Read the full Q&A with Zimmermann below, and you can read Kashmir Hill’s interview with Lavabit’s founder here.
  •  
    Good interview with Phil Zimmerman, the inventor of PGP, and founder of Silent Circle eMail Service.  Which is being shut down because of the what the Feds did to LavaBit. What concerns me most about this illegal and systematic invasion of privacy is the massive potential for blackmail and extortion.  Think of what the IRS illegally did to tens of millions of Americans, targeting them because of their religious and political views, and seeking volumes of highly personal information far beyond reasonable requirements.   What happens when the politicians in power start using the IRS and NSA for political purposes - like what we just saw in the 2012 elections? When I was working on the wiki-Word and SurDoc projects, we were very concerned about having our documents and designs hosted or passing through competitor (Microsoft and Google) servers and email systems.  At the time I thought I was just being paranoid.  Now we know differently.  We had every reason to be concerned.
Gary Edwards

You Won't BELIEVE What's Going On with Government Spying on Americans - BlackListedNews... - 1 views

  •  
    "New Revelations Are Breaking Every Day" This web page is very well sourced and filled with links where you will get lost for hours. Excellent reference document ............................ Revelations about the breathtaking scope of government spying are coming so fast that it's time for an updated roundup: - Just weeks after NSA boss Alexander said that a review of NSA spying found not even one violation, the Washington Post published an internal NSA audit showing that the agency has broken its own rules thousands of times each year - 2 Senators on the intelligence committee said the violations revealed in the Post article were just the "tip of the iceberg" - Glenn Greenwald notes:  "One key to the WashPost story: the reports are internal, NSA audits, which means high likelihood of both under-counting & white-washing".(Even so, the White House tried to do damage control by retroactively changing on-the-record quotes) - The government is spying on essentially everything we do. It is not just "metadata" … although that is enough to destroy your privacy - The government has adopted a secret interpretation of the Patriot Act which allows it to pretend that "everything" is relevant … so it spies on everyone - NSA whistleblowers say that the NSA collects all of our conversations word-for-word - It's not just the NSA … Many other agencies, like the FBI and IRS - concerned only with domesticissues - spy on Americans as well - The information gained through spying is shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes.  The agencies are instructed to intentionally "launder" the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges - Top counter-terror experts say that the government's mass spying doesn't keep us
1 - 20 of 50 Next › Last »
Showing 20 items per page