Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged book

Rss Feed Group items tagged

Paul Merrell

The fix is in: how banks allegedly rigged the US$5.3 trillion foreign exchange market |... - 0 views

  • Suppose you’re in the supermarket shopping for groceries. While you’re strolling the aisle with your cart, a shadowy figure looms over your shoulder and changes the prices on the items you want to buy before you get a chance to pick them up. As you reach for some vine tomatoes, you notice the price just jumped 20 cents. When you select some brie from among the cheeses, you witness the number on the sticker change right before your eyes. Ditto when you look for your favorite brand of granola.
  • This is the essence of what regulators learned might be happening in the foreign exchange market, where US$5.3 trillion of dollars, euros and yen are traded every day. In June 2013, Bloomberg reported that traders at some of the world’s biggest banks worked to manipulate key currency rates, racking up profits and costing investors – including your retirement fund – hundreds of millions of dollars globally. They are accused of placing their own transactions ahead of trades requested by clients – known as front-running – which was the reason prices kept changing as people tried to make their own trades, like in the shopping analogy above. They bought euros or dollars, driving up the rate, and then profited by selling to other investors at a higher level.
  • This week six of the currency-dealers being investigated – including JP Morgan, Citigroup and HSBC – agreed to pay a total of US$4.3 billion to regulators in the US, UK and Switzerland to resolve the allegations. The deal is likely only the first in a series of settlements and other penalties that will emerge from the ongoing investigations. The investors most concerned with the alleged manipulation are funds that invest internationally, such as hedge funds, the endowments of charitable or cultural institutions and insurance companies. But it also includes the mutual funds in which many of your 401K or IRA assets are likely invested.
  • ...3 more annotations...
  • When institutions like these need to buy or sell assets across borders, they call a dealer at one of the big banks, which provides what is basically a wholesale version of the cambio currency kiosks you see at the airport. The dealer quotes a buying price and a selling price, and the fund chooses whether to buy or sell. In addition to trading with customers, the dealers trade among themselves, sometimes to manage their inventory and sometimes hoping to make money by taking speculative positions for a few minutes or even seconds. And that’s how we arrive at the scandal. Every day at 4pm in London, the market sets special “fixing” exchange rates that are used to value the funds’ international investments. The fixing price is set in a simple way: it’s just the average of all prices paid among dealing banks during the 30 seconds before and after the clock strikes 4. Many international fund managers prefer to trade currencies at exactly the fixing price because it’s simpler and smarter to trade at the same price used to value your portfolio. To make these transactions happen, international funds often place large orders with dealers at major banks before the fix.
  • Suppose, for example, a pension fund with major investments in Europe knows it will receive a lot of new IRA money on November 30, when many US employees get paid. And suppose the fund plans to invest €100 million of that in European stocks. At 3:30pm that day the fund might instruct its bank to purchase €100 million at the fixing price. With this kind of advance order, the bank could book its own trades before the fund does, buying the euros it will later sell to the investor.
  • The banks – or more accurately, specific dealers at specific banks – are accused of manipulating the fixing prices based on their knowledge of advance customer orders. In a nutshell, the accusation is that dealers from different banks got together before the fix and compared notes in chat rooms. Most currency trading is handled by 10 or so mega banks, so if just a few of them compared notes, they would have a good sense of whether the exchange rate would rise or fall during the fixing interval that day. The shadowy figure looking over your shoulder at the supermarket to see what you’re going to buy next is like the banks comparing their customer orders before the fix. To finish the supermarket analogy, we need to know how and why the dealing banks could raise the fixing rate to the disadvantage of international pension and mutual funds. Suppose once again that many customers have placed big orders to buy euros at the fix, and the banks figure the euro-dollar exchange rate will rise during the window. This would give them an incentive to buy a lot of euros before it’s set (remember the golden rule of trading: buy low, sell high).
Paul Merrell

Investigation finds 50,000 'ghost' soldiers in Iraqi army, prime minister says - The Wa... - 0 views

  • The Iraqi army has been paying salaries to at least 50,000 soldiers who don’t exist, Iraqi Prime Minister Haider al-Abadi said Sunday, an indication of the level of corruption that permeates an institution that the United States has spent billions equipping and arming. A preliminary investigation into “ghost soldiers” — whose salaries are being drawn but who are not in military service — revealed the tens of thousands of false names on Defense Ministry rolls, Abadi told parliament Sunday. Follow-up investigations are expected to uncover “more and more,” he added.
  • Abadi, who took power in September, is under pressure to stamp out the graft that flourished in the armed forces under his predecessor, Nouri al-Maliki. Widespread corruption has been blamed for contributing to the collapse of four of the army’s 14 divisions in June in the face of an offensive by Islamic State extremists.
  • The United States is encouraging Abadi to create a leaner, more efficient military as the Pentagon requests $1.2 billion to train and equip the Iraqi army next year. The United States spent more than $20 billion on the force from the 2003 invasion until U.S. troops withdrew at the end of 2011. With entry-level soldiers in Iraq drawing salaries of about $600 a month, the practice of “ghost soldiers” is likely to be costing Iraq at least $380 million a year — though officials say that’s probably only a fraction of the true expense.
  • ...2 more annotations...
  • “It could be more than triple this number,” said Hamid ­al-Mutlaq, a member of the parliamentary defense and security committee, pointing out that more thorough on-the-ground investigations are planned. “The people who are responsible for this should be punished. Iraq’s safe has been emptied.” The corrupt practice is often perpetrated by officers who pretend to have more soldiers on their books in order to pocket their salaries, experts say.
  • The United States is focusing its efforts on three divisions in order to begin effective counteroffensive operations against the Islamic State, which controls around a third of the country’s territory. The Pentagon also has requested $24 million to train and equip tribal fighters and $354 million for Kurdish forces as part of its strategy to turn the tide against the Islamic State.
Paul Merrell

Argentina Prosecutor Who Accused Kirchner Had Steady Contact With US Embassy, Leaked Ca... - 0 views

  • Alberto Nisman, the prosecutor who accused Argentina's president of a cover-up plot over the 1994 bombing of a Jewish center before being found shot to death, met repeatedly with the US embassy in Buenos Aires during his investigation, leaked diplomatic cables show.Nisman gave US officials advanced notice on his procedural moves and was apparently coached by the embassy in "improving" his requests for arrest warrants for Iranians that Nisman suspected of carrying out the deadly attack against the Argentine Israeli Mutual Association, or AIMA, according to cables published by Wikileaks."Embassy can now more logically approach the [government of Argentina] about [its] anticipated next steps and ways we might be able to coordinate outreach to other governments [...] to bring attention to the warrants and pressure to bear on Iran and Hezbollah," says one US cable dated November 1, 2006, after a meeting with Nisman.The revelations are adding fodder to the entangled scandal over the AIMA center bombing, Nisman's mysterious death, and the reactions of President Cristina Fernandez de Kirchner and her government loyalists.The president and her supporters have piled doubt on Nisman's investigation, suggesting he didn't himself write the inquiry accusing Kirchner of a cover-up deal with Iran, and that he was influenced by foreign agents in his claims. Kirchner said this week that Nisman was manipulated and double-crossed by government spies plotting against her.
  • Nisman on January 16 told VICE News he had proof that Kirchner sought a back-channel deal with Iran — swapping Iranian oil for Argentine grain — in exchange for abandoning efforts to prosecute former Iranian diplomats in connection to the Jewish center bombing.Eight-five people were killed in the terror attack, which remains unsolved. Survivors and opposition forces are now blaming Kirchner's government for Nisman's death.
  • The prosecutor, who was found dead the night before making his blockbuster claim against Kirchner and her foreign minister in Argentina's Congress, is mentioned in 46 leaked US cables.In the cable from November 2006, Nisman informed US officials of the likelihood that a judge would follow his recommendations to seek charges against Iranian suspects for the bombing. American embassy officials discussed plans to inform "other governments" ahead of time, in an apparent push to make the case against the Iranians an international matter.Another cable, dated January 19, 2007, suggests the US embassy had a hand in shaping Nisman's warrant requests with Interpol, the international diplomatic police force. The cable shows US officials thought Nisman's work was shoddy and needed help.Before the Justice Department's Office of International Affairs intervened in the warrant applications, the cable says, Nisman's paperwork contained "statements that were presumptuous conclusions of guilt."Nisman took on the case of the AIMA center bombing in 2004, at the request of the then-President Nestor Kirchner, Cristina Fernandez's late husband. In his interview with VICE News — perhaps his last with a foreign news organization — Nisman denied connections with any foreign spy agencies.
  • ...4 more annotations...
  • "You won't find reports from the CIA, Mossad, or the MI5 in my files. I have no doubt that there is a link between them and the Argentine intelligence agency, but I never dealt with any foreign intelligence agencies," Nisman said, two days before he was found dead.The US embassy in Buenos Aires declined to discuss its officers' interactions with Nisman. "We will not comment on the contents of these alleged cables that purport to include classified information," an embassy spokesman told VICE News.
  • The relationship was apparently so involved that Nisman apologized for not letting then-ambassador Earl Anthony Wayne know that he would call for the arrest of former president Carlos Menem in relation to the case."AMIA Special Prosecutor Alberto Nisman called the Ambassador on May 23 to apologize for not giving the Embassy advance notice of his request for the arrest of former President Menem and other [government of Argentina] officials for their alleged roles in the cover up of the 'local connection' in the 1994 terrorist bombing of the AMIA Jewish community center," says a cable from May 2008.The prosecutor also apologized that the judicial order coincided with a visit to Argentina from the former deputy director of the FBI, John Pistole, adding it was "completely unintentional," the cable shows."He noted that he was very sorry and that he sincerely appreciates all of the [US government's] help and support and in no way meant to undermine that," the cable continues.
  • The cable also notes that US officials "have for the past two years recommended to Nisman that he focus on the perpetrators of the terrorist attack and not on the possible mishandling of the first investigation."Santiago O'Donnell, author of two books based on the cables released by Julian Assange, said in an interview that the leaked cables show the US influenced Nisman throughout his work on the AIMA bombing investigation."The embassy gave instructions to the prosecutor Nisman for him to follow the Iranian lead, and not follow other leads, like the Syrian lead, or the local connection, because that would detract from the terrorist image that the US was trying to impose on Iran," O'Donnell said.President Kirchner this week proposed in a nationally televised address to disband and reform the government's intelligence agency. In doing so, she said rogue government spies were responsible for Nisman's death. Opposition voices, meanwhile, said the reform plan for the Secretaría de Inteligencia, or SI, would further politicize the work of the embattled spy agency and make it more responsive to the president's political whims.
  • Alberto Nisman, the prosecutor who accused Argentina's president of a cover-up plot over the 1994 bombing of a Jewish center before being found shot to death, met repeatedly with the US embassy in Buenos Aires during his investigation, leaked diplomatic cables show.Nisman gave US officials advanced notice on his procedural moves and was apparently coached by the embassy in "improving" his requests for arrest warrants for Iranians that Nisman suspected of carrying out the deadly attack against the Argentine Israeli Mutual Association, or AIMA, according to cables published by Wikileaks."Embassy can now more logically approach the [government of Argentina] about [its] anticipated next steps and ways we might be able to coordinate outreach to other governments [...] to bring attention to the warrants and pressure to bear on Iran and Hezbollah," says one US cable dated November 1, 2006, after a meeting with Nisman.
  •  
    Well this is interesting. The U.S. was covertly working through an Argentinian prosecutor to topple Argentina's head of state. On the plan to reform the Argentine intelligence service, that service's subordination to the CIA was the prototype operation than led to Operation Condor, in which the CIA subverted most intelligence services in Latin America, leading to coups and the deaths and disappearnaces of hundreds of thousands Latin American citizens suspected of being left-leaning. The overthrow of the Allende government in Chile is perhaps the best known in the U.S. 
Paul Merrell

Blackwater Founder Remains Free and Rich While His Former Employees Go Down on Murder C... - 0 views

  • The incident for which the men were tried was the single largest known massacre of Iraqi civilians at the hands of private U.S. security contractors. Known as “Baghdad’s bloody Sunday,” operatives from Blackwater gunned down 17 Iraqi civilians at a crowded intersection at Nisour Square on September 16, 2007. The company, founded by secretive right-wing Christian supremacist Erik Prince, pictured above, had deep ties to the Bush Administration and served as a sort of neoconservative Praetorian Guard for a borderless war launched in the immediate aftermath of 9/11. While Barack Obama pledged to reign in mercenary forces when he was a senator, once he became president he continued to employ a massive shadow army of private contractors. Blackwater — despite numerous scandals, congressional investigations, FBI probes and documented killings of civilians in both Iraq and Afghanistan — remained a central part of the Obama administration’s global war machine throughout his first term in office.
  • Just as with the systematic torture at Abu Ghraib, it is only the low level foot-soldiers of Blackwater that are being held accountable. Prince and other top Blackwater executives continue to reap profits from the mercenary and private intelligence industries. Prince now has a new company, Frontier Services Group, which he founded with substantial investment from Chinese enterprises and which focuses on opportunities in Africa. Prince recently suggested that his forces at Blackwater could have confronted Ebola and ISIS. “If the administration cannot rally the political nerve or funding to send adequate active duty ground forces to answer the call, let the private sector finish the job,” he wrote. None of the U.S. officials from the Bush and Obama administrations who unleashed Blackwater and other mercenary forces across the globe are being forced to answer for their role in creating the conditions for the Nisour Square shootings and other deadly incidents involving private contractors. Just as the main architect of the CIA interrogation program, Jose Rodriguez, is on a book tour for his propagandistic love letter to torture, Hard Measures: How Aggressive CIA Actions After 9/11 Saved American Lives, so too is Erik Prince pushing his own revisionist memoir, Civilian Warriors: The Inside Story of Blackwater and the Unsung Heroes of the War on Terror.
  • While the Blackwater verdict is an important and rare moment of accountability in an overwhelmingly unaccountable private war industry, it does not erase the fact that those in power—the CEOs, the senior officials, the war profiteers—walk freely and will likely do so for the rest of their lives.
  • ...1 more annotation...
  • Filmmaker Richard Rowley and I produced a 30 minute documentary on the Nisour Square massacre and the story of Ali Kinani for Democracy Now! and The Nation magazine:
Paul Merrell

Yemen as Vietnam or Afghanistan | Consortiumnews - 0 views

  • Yemen as Vietnam or Afghanistan April 1, 2015 With U.S. intelligence help, Saudi Arabia has launched air strikes into Yemen and wants Egypt and Pakistan to invade, threatening to turn a long-simmering civil war into a regional conflict, a scenario that reminded retired U.S. diplomat William R. Polk of his work for President Kennedy on an earlier Yemeni war.By William R. PolkAs the events unfold with the Saudi and Egyptian engagement in Yemen, I was reminded of my discussion with Egypt’s President Gamal Abdel Nasser on “his” Yemen war, sometimes called the North Yemen Civil War that began in 1962, became a stalemate and finally ended in 1970. As Mark Twain may have said, “history doesn’t repeat but sometimes it rhymes.” The rhymes, at least, seem unmistakable.In the course of our first lengthy talk on Yemen, Nasser (rather angrily) replied to one of my comments, “you don’t think I will win the war, do you?”
  • “No, Mr. President,” I replied, “I don’t.”
  • “Well,” Nasser retorted, “you American’s think you know all about everything, and you don’t even have any of your people in Sanaa and none up in the north where the fighting is going on. You don’t know anything about Yemen.” Then, without thinking of the implication, I suppose, he said, ” You should go see.”“Mr. President,” I quickly said. “I regard that as an invitation.” Impolitely, I then stood up. He looked at me with narrow, angry eyes. He obviously had not meant what I had inferred.“All right, go see,” he said. “I will give instructions that you can go anywhere you want, talk to anyone you want, see everything..”“But, of course, I cannot even get there without your help,” I said.“You can have my plane.”Rather off-handedly and not warmly, we shook hands. I said goodbye and rushed back to our embassy and wrote an “eyes only” message to  President John Kennedy. I did not want it scattered around our government so I prevailed upon the CIA station chief to send it by his rather more restricted route. It was encrypted and sent in three batches. Before the second batch got sent, a reply came back: “go.”
  • ...2 more annotations...
  • s I was leaving, Nasser took me out to my car and even opened the car door for me. His guards were as astonished as I was, Apparently, he had never before done this. As we shook hands, he said, “Well, Bill, where are you off to this time?”“This time, Mr. President, I am not going to tell you!”He burst out laughing as did I. We did not meet again but our frankness and respect later enabled me to work out the 1970 ceasefire on Suez with him shortly before his death.
  • It is hard to believe that history now seems to be repeating with Egypt and Saudi Arabia again engaged in a counter-guerrilla war in Yemen! For Nasser, it was Egypt’s Vietnam. Will the new Yemen war be Egypt’s (and Saudi Arabia’s) Afghanistan? I think it is very likely. All of the signs point in that direction.And, as I have laid out in numerous essays on Afghanistan, Iraq, Syria, Somalia, Mali and Algeria, and in my little book Violent Politics, guerrilla wars are almost never “won” but usually drain the supposedly dominant power of its wealth, moral position and political unity.
Paul Merrell

These Are all the Countries Where the US Has a Military Presence | Global Research - Ce... - 0 views

  • On Mar. 24, US president Barack Obama announced that all 9,800 US troops currently stationed in Afghanistan will remain until the end of 2015. This generated a fair amount of criticism: it was, after all, Obama’s promise that the last American troop would leave the country in 2014. How have Obama’s plans for pulling out of Afghanistan fared so far? http://t.co/avoxwJzzQw pic.twitter.com/3S5FJ3lgho — FiveThirtyEight (@FiveThirtyEight) March 26, 2015
  • Those expecting the US to leave Afghanistan, however, should take a minute to consider this: the US still hasn’t left Germany. In fact, there are quite a few places the US hasn’t left, and while certainly most of them don’t pose a threat to American soldiers, they reveal a pattern about the US staying, rather than leaving. According to official information provided by the Department of Defense (DoD) and its Defense Manpower Data Center (DMDC) there are still about 40,000 US troops, and 179 US bases in Germany, over 50,000 troops in Japan (and 109 bases), and tens of thousands of troops, with hundreds of bases, all over Europe. Over 28,000 US troops are present in 85 bases in South Korea, and have been since 1957. Altogether, based on information contained in the DoD’s latest Base Structure Report (BSR), the US has bases in at least 74 countries and troops practically all over the world, ranging from thousands to just one in some countries (it could be a military attaché, for instance).
  • By comparison, France has bases in 10 countries, and the UK has bases in seven. Calculating the extent of the US military presence abroad is not an easy task. The data released by the Department of Defense is incomplete, and inconsistencies are found within documents. Quartz has requested clarification from the Department of Defense, but hasn’t received a response. In his forthcoming book Base Nation: How US Military Bases Abroad Harm America and the World, David Vine, associate professor of anthropology at American University details the difficulties of assessing the US military presence abroad. He writes: according to the most recent publicized count, the U.S. military currently still occupies 686 “base sites” outside the fifty states and Washington, DC. While 686 base sites is quite a figure in its own right, that tally strangely excludes many well-known U.S. bases, like those in Kosovo, Kuwait, and Qatar. Less surprisingly, the Pentagon’s count also excludes secret (or secretive) American bases, like those reported in Israel and Saudi Arabia. There are so many bases, the Pentagon itself doesn’t even know the true total. That is not the only issue—even a definitive count of bases would include a wide range of facilities. “Base” itself is an umbrella term that includes locations referred to as “post,” “station,” “camp,” or “fort” by different military bodies. Vine explains:
  • ...1 more annotation...
  • bases come in all sizes and shapes, from massive sites in Germany and Japan to small radar facilities in Peru and Puerto Rico. […] Even military resorts and recreation areas in places like Tuscany and Seoul are bases of a kind; worldwide, the military runs more than 170 golf courses. The map below represents US military bases abroad, according to the official BSR, and from independent research conducted by Vine (and Quartz) using verified news reports as well as cross-referencing information with Google Maps. This map does not take into account NATO bases, including a rumored base in Turkmenistan and a base in Algeria, reported by Wikileaks to be a suspected US base.
Paul Merrell

The CIA and Signals Intelligence - 0 views

  • The CIA and Signals Intelligence Formerly Top-Secret Multi-Volume History Details Spy Agency’s Conflicts with NSA and Military over SIGINT Role Additional Declassified Documents Describe CIA Domestic and Foreign SIGINT Activity CIA Role Often Put It in Direct Competition with NSA, but Recent Cooperation Made Possible Controversial Exploits Uncovered by Edward Snowden National Security Archive Electronic Briefing Book No. 506
Gary Edwards

Rumsfeldt's Missing Trillions, Stavridis and Unconventional War | nsnbc international - 0 views

  • One of these survivors is April Gallop. April Gallop would testify under oath in a two-hour-long, video-taped interview with Barbara Honegger who has conducted an in-depth investigation into the events at the Pentagon on September 11. April Gallop would state that a violent explosion near her desk in Wedge Two on Corridor Five, more than 100 ft north from the official narratives’ alleged plane impact point stopped her watch at 9:30.
  • Gallop would state the she saw fires coming out of computers. Barbara Honegger reports that other eyewitnesses, including Tracy Webb experienced such computer fires at the E Ring of Corridor Four.
  • The alleged plane impact happened at least eight minutes after massive explosions inside the Pentagon.
  • ...5 more annotations...
  • Another clock from the Pentagon that is kept at the Smithsonian as well as photographic evidence prove that other clocks stopped due to explosions before the alleged plane impact. Barbara Honegger’s research would show that “something” struck the Pentagon from the outside too. That object, however, was not a jetliner and struck some 150 meters from the alleged jetliner impact site.
  • Donald Rumsfeldt’s war on waste would turn into the Global War on Terror and lead to the invasions of Afghanistan and Iraq. Information about the missing 2.3 trillion dollar was destroyed on September 11.
  • The document states that the United States, for the foreseeable future, would primarily be engaged in unconventional warfare. The document contains a structured approach to the subversion of targeted nation States, beginning with an assessment of a feasible and cooperative opposition, the creation of events to polarize society, the establishment of armed groups and their development into a fighting force that is capable of fighting a civil war or unconventional war under U.S. supervision to achieve U.S. foreign policy goals.
  • The TC 18-01 contains a de-facto blueprint for the United States’ and NATO’s involvement in Libya and Syria under the command of NATO SACEUR Stavridis. The TC 18-01 also represents a precise blueprint of the ongoing war in Iraq and the “crisis” in Ukraine.
  • Arguably, 2.3 trillion dollar are a seizable start-up budget for wars which have to be waged “off the books”.
  •  
    "September 10, 2001. U.S. Secretary of Defense Donald Rumsfeldt stated that 2.3 trillion dollar from the Pentagon's annual budget could not be accounted for. September 11, 2001, the Pentagon's accounting office and the Naval Command Center were targeted, allegedly by a plane. Survivors would report about explosions inside the Pentagon prior to the alleged plane impact. During a 2012 Forestall Lecture , Admiral James G. Stavridis noted that he was working as a newly selected 1-star accounting officer at the Pentagon and that he was lucky to have survived. By 2009 Stavridis would have been promoted to the rank of Admiral and NATO's Supreme Allied Commander Europe. Responsible for NATO's 2011 military operations in Libya, Stavridis would describe NATO's intervention in Libya as "a teachable moment and model for future interventions". "
Paul Merrell

Victory for Users: Librarian of Congress Renews and Expands Protections for Fair Uses |... - 0 views

  • The new rules for exemptions to copyright's DRM-circumvention laws were issued today, and the Librarian of Congress has granted much of what EFF asked for over the course of months of extensive briefs and hearings. The exemptions we requested—ripping DVDs and Blurays for making fair use remixes and analysis; preserving video games and running multiplayer servers after publishers have abandoned them; jailbreaking cell phones, tablets, and other portable computing devices to run third party software; and security research and modification and repairs on cars—have each been accepted, subject to some important caveats.
  • The exemptions are needed thanks to a fundamentally flawed law that forbids users from breaking DRM, even if the purpose is a clearly lawful fair use. As software has become ubiquitous, so has DRM.  Users often have to circumvent that DRM to make full use of their devices, from DVDs to games to smartphones and cars. The law allows users to request exemptions for such lawful uses—but it doesn’t make it easy. Exemptions are granted through an elaborate rulemaking process that takes place every three years and places a heavy burden on EFF and the many other requesters who take part. Every exemption must be argued anew, even if it was previously granted, and even if there is no opposition. The exemptions that emerge are limited in scope. What is worse, they only apply to end users—the people who are actually doing the ripping, tinkering, jailbreaking, or research—and not to the people who make the tools that facilitate those lawful activities. The section of the law that creates these restrictions—the Digital Millennium Copyright Act's Section 1201—is fundamentally flawed, has resulted in myriad unintended consequences, and is long past due for reform or removal altogether from the statute books. Still, as long as its rulemaking process exists, we're pleased to have secured the following exemptions.
  • The new rules are long and complicated, and we'll be posting more details about each as we get a chance to analyze them. In the meantime, we hope each of these exemptions enable more exciting fair uses that educate, entertain, improve the underlying technology, and keep us safer. A better long-terms solution, though, is to eliminate the need for this onerous rulemaking process. We encourage lawmakers to support efforts like the Unlocking Technology Act, which would limit the scope of Section 1201 to copyright infringements—not fair uses. And as the White House looks for the next Librarian of Congress, who is ultimately responsible for issuing the exemptions, we hope to get a candidate who acts—as a librarian should—in the interest of the public's access to information.
Paul Merrell

Secret program at secret Guantánamo prison hears everything | Miami Herald - 0 views

  • A secret Defense Department program provides unfettered eavesdropping on the accused terrorists imprisoned at Guantánamo’s clandestine Camp 7 lockup, recently released war court documents show.Army Col. James L. Pohl, the judge in 9/11 trial, discovered the existence of the secret surveillance program during a recent war court hearing. Little is publicly known about the program, not even its unclassified two-word nickname.
  • The disclosure of pervasive eavesdropping at Guantánamo’s lockup for 14 former CIA prisoners comes in before-and-after documents released by the court from the recent Oct. 19-30 pretrial hearings in the death-penalty case of five men accused of orchestrating the hijackings that killed nearly 3,000 people on Sept. 11, 2001.At issue was accused 9/11 plotter Walid bin Attash’s request for guidance on how he could function as his own attorney. Bin Attash is a Yemeni in his mid-30s who is accused of training some of the hijackers. “You must assume anything you say in Camp 7 is not confidential and will be disclosed to the U.S. Government,” warns an Oct. 23 draft of the advisory, crafted after the judge was informed of the covert program. “Only when you are in Echo 2 will anything you say be covered by the attorney-client privilege.”An Oct. 20 draft of the advisory omits those lines.
  • This is not the first time in the proceedings that a surveillance program caught Pohl by surprise. In January 2013, he ordered the CIA to unplug a button that allowed an unseen observer to cut the court’s audio feed to the public. Perhaps ironically, the lone site the judge considers safe for consultative trial preparation — the Camp Echo compound of wooden huts, each containing a cell — at one time had covert recording devices that looked like smoke detectors. The judge ordered them disabled in February 2013.Attorney Dror Ladin of the American Civil Liberties Union, who was an observer at the Guantánamo hearings last month, said the apparent disclosure of “pervasive surveillance at Camp 7” is the latest issue to challenge the possibility of a fair trial.“It is shocking that for years neither defense counsel nor the judge were made aware that the government was capturing everything said aloud by the detainees there,” he said Thursday. It also adds to mounting questions of “how these military commissions can produce a fair result,” said Ladin, especially if one of the men represents himself. “These are detainees who really can’t see the evidence against them and simultaneously have been provided no rehabilitation services for the torture they suffered for years. It would be astonishing if any of them could craft a fair defense for capital charges.”
  • ...3 more annotations...
  • A defense attorney in another case said the prosecution wants to use a surreptitiously recorded conversation between two Camp 7 captives against an alleged al-Qaida commander. And in 2012 the journalist Daniel Klaidman wrote in his book “Kill or Capture” that the U.S. government had recordings made in a Guantánamo prison recreation yard of the alleged Sept. 11 mastermind Khalid Sheik Mohammed talking about evidence that could be used against him.The latest disclosure comes at a time of decreasing transparency at the war court.On Oct. 29, the judge held a 13-minute secret session without advanced notice to the public. A day later the judge wrote in a three-page ruling that he closed the court at the request of “the Government” — war-court-speak for the prosecution — to protect state secrets whose disclosure “could result in grave danger to national security.”Pohl also ordered the court to issue a censored transcript of the parts the excluded public and accused would be allowed to see. No transcript has been released.Then the next day, Oct. 30, the judge held a daylong, open hearing on a restraining order he issued forbidding female guards from touching the 9/11 accused when they are being taken to court or legal meetings. The judge’s order has outraged members of Congress and the Pentagon brass.
  • In that public court hearing, soldiers called as witnesses from the prison discussed staffing patterns at Camp 7. Normally the Pentagon releases transcripts of open hearings the same day. Unusually, the court has not yet released the Oct. 30 transcript. A Pentagon spokesman suggested Thursday — 13 days after the open court hearing — that somebody was scrubbing the transcript of information already made public. “The security review of the Oct. 30 transcript remains ongoing,” said Navy Cmdr. Gary Ross. “We will provide an update once additional information becomes available.”Much of the October session focused on bin Attash’s question about how he’d act as his own lawyer in a system that does not let the accused terrorist see classified information in the case. The judge and attorneys devoted days to designing a script Pohl would read to any accused 9/11 terrorist who tries to take charge of his defense — and spent a full afternoon huddling in a closed meeting on the secret program.
  • In it, Pohl made clear that he never intended to let bin Attash dismiss his Pentagon-paid defense attorneys — Chicago criminal defense attorney Cheryl Bormann and Air Force Maj. Michael Schwartz. Instead, the script shows Pohl planned to appoint Bormann and Schwartz as “standby counsel” the judge could activate to carry out cross-examination of certain witnesses who might have “particular sensitivities” to being questioned by the alleged terrorist.“If you are represented by lawyers, then it is the lawyers, and not you, who will conduct the defense,” the warning says. “Correspondingly, if you represent yourself, you will be able to perform the lawyer’s core functions, but you will not necessarily be allowed to direct special appearances by counsel when it is convenient to you.”The language suggests a far more limited role by the American lawyers than those carried out in an aborted attempt to hold the Sept. 11 trial during the Bush administration. In those proceedings, alleged 9/11 terrorists serving as their own lawyer regularly had standby counsel write and argue motions in court.The script also envisions a scenario in which an accused 9/11 plotter serving as his own lawyer becomes unruly, disruptive or disobedient rather than respect “the dignity of the courtroom.” In such a case, the judge said he could deal with “obstructionist misconduct” by putting “physical restraints” on bin Attash or ejecting him from the court.Bin Attash, for his part, has not been noticeably disruptive across years of pretrial proceedings. An amputee, he was brought to his May 5, 2012 arraignment in a Guantánamo prison restraint chair routinely used for forced-feeding of hunger strikers — with guards carrying his prosthetic leg separately.
  •  
    It's long past time to recognize that the military cannot provide a fair trial for GITMOI detainees, transfer them to the U.S., and try them in a civilian Article II court. If this kind of crap were going down before an Article II judge, those conducting the surveillance would be sitting in jail. 
Paul Merrell

George Bush: The Unauthorized Biography « TARPLEY.net - 0 views

  • By Webster Griffin Tarpley and Anton Chaitkin Table of Contents Introduction — American Caligula Chapter 1 – The House of Bush: Born in a Bank Chapter 2 – The Hitler Project Chapter 3 – Race Hygiene: Three Bush Family Alliances Chapter 4 – The Center of Power is in Washington Chapter 5 – Poppy and Mommy Chapter 6 – Bush in World War II Chapter 7 – Skull and Bones: The Racist Nightmare at Yale Chapter 8 – The Permian Basin Gang Chapter 8b – The Bay of Pigs and The Kennedy Assassination Chapter 9 – Bush Challenges Yarborough for The Senate Chapter 10 – Rubbers Goes to Congress Chapter 11 – United Nations Ambassador, Kissinger Clone Chapter 12 – Chairman George in Watergate Chapter 13 – Bush Attempts The Vice Presidency, 1974 Chapter 14 – Bush in Beijing Chapter 15 – CIA Director Chapter 16 – Campaign 1980 Chapter 17 – The Attempted Coup D’Etat of March 30, 1981 Chapter 18 – Iran-Contra Chapter 19 – The Leveraged Buyout Mob Chapter 20 – The Phony War On Drugs Chapter 21 – Omaha Chapter 22 – Bush Takes The Presidency Chapter 23 – The End of History Chapter 24 – The New World Order Chapter 25 – Thyroid Storm
  • Chapter 1 – The House of Bush: Born in a Bank Chapter 2 – The Hitler Project Chapter 3 – Race Hygiene: Three Bush Family Alliances Chapter 4 – The Center of Power is in Washington Chapter 5 – Poppy and Mommy Chapter 6 – Bush in World War II Chapter 7 – Skull and Bones: The Racist Nightmare at Yale Chapter 8 – The Permian Basin Gang Chapter 8b – The Bay of Pigs and The Kennedy Assassination Chapter 9 – Bush Challenges Yarborough for The Senate Chapter 10 – Rubbers Goes to Congress Chapter 11 – United Nations Ambassador, Kissinger Clone Chapter 12 – Chairman George in Watergate Chapter 13 – Bush Attempts The Vice Presidency, 1974 Chapter 14 – Bush in Beijing Chapter 15 – CIA Director Chapter 16 – Campaign 1980 Chapter 17 – The Attempted Coup D’Etat of March 30, 1981 Chapter 18 – Iran-Contra Chapter 19 – The Leveraged Buyout Mob Chapter 20 – The Phony War On Drugs Chapter 21 – Omaha Chapter 22 – Bush Takes The Presidency Chapter 23 – The End of History Chapter 24 – The New World Order Chapter 25 – Thyroid Storm
Gary Edwards

There Are No Coincidences - 3 views

This commentary is currently making the rounds of the Bay Area Patriots circles: ITS ALL TRUE :: Any one of these 'coincidences' when taken singularly appear to not mean much, but when taken as a ...

Obama-coincidences Marxism Marxist-Muslim

started by Gary Edwards on 02 Jul 13 no follow-up yet
Gary Edwards

A Crisis Worse than ISIS? Bail-Ins Begin - nsnbc international | nsnbc international - 0 views

  • Propping Up the Derivatives Scheme Dodd-Frank states in its preamble that it will “protect the American taxpayer by ending bailouts.” But it does this under Title II by imposing the losses of insolvent financial companies on their common and preferred stockholders, debtholders, and other unsecured creditors. That includes depositors, the largest class of unsecured creditor of any bank.
  • Title II is aimed at “ensuring that payout to claimants is at least as much as the claimants would have received under bankruptcy liquidation.” But here’s the catch: under both the Dodd Frank Act and the 2005 Bankruptcy Act, derivative claims have super-priority over all other claims, secured and unsecured, insured and uninsured.
  • The over-the-counter (OTC) derivative market (the largest market for derivatives) is made up of banks and other highly sophisticated players such as hedge funds. OTC derivatives are the bets of these financial players against each other. Derivative claims are considered “secured” because collateral is posted by the parties. For some inexplicable reason, the hard-earned money you deposit in the bank is not considered “security” or “collateral.” It is just a loan to the bank, and you must stand in line along with the other creditors in hopes of getting it back. State and local governments must also stand in line, although their deposits are considered “secured,” since they remain junior to the derivative claims with “super-priority.”
  • ...12 more annotations...
  • Under the old liquidation rules, an insolvent bank was actually “liquidated” – its assets were sold off to repay depositors and creditors. Under an “orderly resolution,” the accounts of depositors and creditors are emptied to keep the insolvent bank in business.
  • The point of an “orderly resolution” is not to make depositors and creditors whole but to prevent another system-wide “disorderly resolution” of the sort that followed the collapse of Lehman Brothers in 2008.
  • The concern is that pulling a few of the dominoes from the fragile edifice that is our derivatives-laden global banking system will collapse the entire scheme. The sufferings of depositors and investors are just the sacrifices to be borne to maintain this highly lucrative edifice.
  • At first glance, the “bail-in” resembles the normal capitalist process of liabilities restructuring that should occur when a bank becomes insolvent. . . . The difference with the “bail-in” is that the order of creditor seniority is changed. In the end, it amounts to the cronies (other banks and government) and non-cronies. The cronies get 100% or more; the non-cronies, including non-interest-bearing depositors who should be super-senior, get a kick in the guts instead. . . . In principle, depositors are the most senior creditors in a bank. However, that was changed in the 2005 bankruptcy law, which made derivatives liabilities most senior. Considering the extreme levels of derivatives liabilities that many large banks have, and the opportunity to stuff any bank with derivatives liabilities in the last moment, other creditors could easily find there is nothing left for them at all.
  • A study involving the cost to taxpayers of the Dodd-Frank rollback slipped by Citibank into the “cromnibus” spending bill last December found that the rule reversal allowed banks to keep $10 trillion in swaps trades on their books. This is money that taxpayers could be on the hook for in another bailout; and since Dodd-Frank replaces bailouts with bail-ins, it is money that creditors and depositors could now be on the hook for.
  • As of September 2014, US derivatives had a notional value of nearly $280 trillion
  •  Citibank is particularly vulnerable to swaps on the price of oil. Brent crude dropped from a high of $114 per barrel in June 2014 to a low of $36 in December 2015.
  • What about FDIC insurance? It covers deposits up to $250,000, but the FDIC fund had only $67.6 billion in it as of June 30, 2015, insuring about $6.35 trillion in deposits. The FDIC has a credit line with the Treasury, but even that only goes to $500 billion; and who would pay that massive loan back? The FDIC fund, too, must stand in line behind the bottomless black hole of derivatives liabilities
  • You can move your money into one of the credit unions with their own deposit insurance protection; but credit unions and their insurance plans are also under attack.
  • In short, the goal of the bail-in scheme is to place losses on private creditors. Alternatives that allow them to escape could soon be blocked.
  • The Dodd Frank Act and the Bankruptcy Reform Act both need a radical overhaul, and the Glass-Steagall Act (which put a fire wall between risky investments and bank deposits) needs to be reinstated.
  • Meanwhile, local legislators would do well to set up some publicly-owned banks on the model of the state-owned Bank of North Dakota – banks that do not gamble in derivatives and are safe places to store our public and private funds.
  •  
    Excellent analysis of the coming banking crisis anw how our politicians have put the citizens on the hook for risky bank derivative gambling.  Thanks Marbux! Ellen H. Brown (nsnbc) : While the mainstream media focus on ISIS extremists, a threat that has gone virtually unreported is that your life savings could be wiped out in a massive derivatives collapse. Bank bail-ins have begun in Europe, and the infrastructure is in place in the US.  Poverty also kills.
Paul Merrell

Three House panels to investigate whether ISIS intelligence was cooked | TheHill - 0 views

  • Three House committees will jointly investigate allegations U.S. Central Command altered intelligence reports, their chairmen announced Friday.“Today, the House Armed Services Committee, the House Permanent Select Committee on Intelligence and the House Appropriations Committee established a Joint Task Force to investigate allegations that senior U.S. Central Command (CENTCOM) officials manipulated intelligence products,” Reps. David Nunes (R-Calif.), Mac Thornberry (R-Texas) and Rodney Frelinghuysen (R-N.J.) said in a joint statement.Analysts at Centcom have alleged that senior officials altered their reports to paint a rosier picture of the fight against the Islamic State in Iraq and Syria (ISIS).The Pentagon’s inspector general is already conducting an investigation into the allegations.Magazine Foreign Policy reported last month that the task force would be formed.
  • In their statement, Nunes, Thornberry and Frelinghuysen said the task force would look into the specific allegations, as well as whether there are “systemic problems across the intelligence enterprise in CENTCOM or any other pertinent intelligence organizations.”Reps. Ken Calvert (R-Calif.), Mike Pompeo (R-Kan.) and Brad Wenstrup (R-Ohio) will lead the investigation.“Any accusation of intelligence being altered to fit a political narrative must be fully investigated and those responsible held accountable,” Pompeo said in a written statement. “This matters both to those who gather the intelligence, often at great risk to their personal safety, and to the policymakers who use this intelligence to make what are often life threatening decisions.”In an interview on Fox News, Thornberry said the issue was too important to wait to investigate until after the inspector general.
  • Democrats are participating, too, he said in the interview.  “They are participating in the investigation,” he said. “Their staff had been involved in the discussions we have had with a variety of folks from Centcom and elsewhere. So again we want to be careful and do it right, but it's important.” The task force expects to have preliminary results early next year, according to the chairmen’s statement.
Paul Merrell

Brazil's Epic Scandal Takes Down a Banker - Bloomberg Business - 0 views

  • Brazilians have become inured to seeing politicians and businessmen marched off to prison for corruption. But the mug shot of banker André Esteves—unshaven and frowning—that flashed across TV screens in early December was a shock. Part of a cadre of mavericks who got astonishingly rich from Brazil’s transformation into one of the world’s top 10 economies in the 2000s, Esteves helped turn Grupo BTG Pactual into Latin America’s biggest standalone investment bank. Supremely confident, Esteves—who was a billionaire by his mid-30s—liked to quip that the initials in his company’s name stood for “Better than Goldman.”Around dawn on Nov. 25, Esteves’s fortunes soured in an instant. Police showed up at his apartment, which faces Rio de Janeiro’s legendary Ipanema beach, and hauled him away on allegations of obstructing a federal investigation into a massive pay-to-play scheme centered on Brazil’s state-run oil giant, Petrobras. Now Esteves, 47, resides in a cell block with concrete beds and communal toilets at Bangu, a high-security prison in Rio better known for housing drug traffickers and murderers.
  • Having its founder, chief executive officer, and chairman behind bars has pushed BTG Pactual to the brink of insolvency as clients pull their money out. Within days of his arrest, Esteves had relinquished his controlling stake in the firm, and his partners had begun a wholesale selloff of assets. To avert disaster, Brazil’s central bank helped engineer a $1.6 billion rescue line from the country’s privately funded deposit guarantee fund. Still, the bank’s shares have lost half their value since Esteves’s arrest. On Dec. 7, prosecutors formally accused the banker of obstruction of justice. Antônio Carlos de Almeida Castro, Esteves’s lawyer, says his client has done nothing wrong.The metastatic graft scandal that sent Esteves to jail threatens more than the survival of BTG. So many legislators are implicated, Congress has been unable to pass legislation to contain an exploding budget deficit. President Dilma Rousseff has grown so unpopular that lawmakers are maneuvering to impeach her for allegedly cooking the government’s books. Meanwhile, the economy is sliding into what Goldman Sachs calls a full-blown depression.
  • BTG’s collapse won’t cause Brazil’s capital markets to seize up as Lehman Brothers’ failure did in the U.S. in 2008. Yet having one of the country’s most prominent financiers behind bars is a body blow to the confidence of investors at a time when Brazil needs their cash. “It very much gives you the impression that the corruption scheme is so widespread that it induces a kind of counterparty risk,” says Monica de Bolle, a former International Monetary Fund economist. “You enter into transactions with people in Brazil without knowing whether or not they might be implicated in something.” The result: “Nothing gets done. There’s no business,” she says.
Paul Merrell

This might be the most controversial theory for what's behind the rise of ISIS - The Wa... - 0 views

  • A year after his 700-page opus "Capital in the Twenty-First Century" stormed to the top of America's best-seller lists, Thomas Piketty is out with a new argument about income inequality. It may prove more controversial than his book, which continues to generate debate in political and economic circles. The new argument, which Piketty spelled out recently in the French newspaper Le Monde, is this: Inequality is a major driver of Middle Eastern terrorism, including the Islamic State attacks on Paris earlier this month — and Western nations have themselves largely to blame for that inequality. Piketty writes that the Middle East's political and social system has been made fragile by the high concentration of oil wealth into a few countries with relatively little population. If you look at the region between Egypt and Iran — which includes Syria — you find several oil monarchies controlling between 60 and 70 percent of wealth, while housing just a bit more than 10 percent of the 300 million people living in that area. (Piketty does not specify which countries he's talking about, but judging from a study he co-authored last year on Middle East inequality, it appears he means Qatar, the United Arab Emirates, Kuwait, Saudia Arabia, Bahrain and Oman. By his numbers, they accounted for 16 percent of the region's population in 2012 and almost 60 percent of its gross domestic product.)
  • This concentration of so much wealth in countries with so small a share of the population, he says, makes the region "the most unequal on the planet." Within those monarchies, he continues, a small slice of people controls most of the wealth, while a large — including women and refugees — are kept in a state of "semi-slavery." Those economic conditions, he says, have become justifications for jihadists, along with the casualties of a series of wars in the region perpetuated by Western powers. His list starts with the first Gulf War, which he says resulted in allied forces returning oil "to the emirs." Though he does not spend much space connecting those ideas, the clear implication is that economic deprivation and the horrors of wars that benefited only a select few of the region's residents have, mixed together, become what he calls a "powder keg" for terrorism across the region.
  • Piketty is particularly scathing when he blames the inequality of the region, and the persistence of oil monarchies that perpetuate it, on the West: "These are the regimes that are militarily and politically supported by Western powers, all too happy to get some crumbs to fund their [soccer] clubs or sell some weapons. No wonder our lessons in social justice and democracy find little welcome among Middle Eastern youth." Terrorism that is rooted in inequality, Piketty continues, is best combated economically. To gain credibility with those who do not share in the region's wealth, Western countries should demonstrate that they are more concerned with the social development of the region than they are with their own financial interests and relationships with ruling families. The way to do this, he says, is to ensure that Middle eastern oil money funds "regional development," including far more education.
  • ...2 more annotations...
  • He concludes by looking inward, at France, decrying its discrimination in the hiring of immigrants and the high unemployment levels among those populations. He says Europe must turn away from "austerity" and reinvigorate its model of integration and job creation, and notes that the continent accepted a net 1 million immigrants per year before the financial crisis. The argument has not gained much notice in the United States thus far. It rests on some controversial principles, not the least of which is the question of how unequal the Middle East is compared to the rest of the world — a problem rooted in the region's poor quality of economic statistics. In his paper last year, Piketty and a co-author concluded inequality was in fact quite high. "Under plausible assumptions," the paper states in its abstract, "the top 10% income share (for the Middle East) could be well over 60%, and the top 1% share might exceed 25% (vs. 20% in the United States, 11% in Western Europe, and 17% in South Africa)."
  • Those would, indeed, be jarring levels. They are the high end of the scenarios Piketty lays out in the paper. Whether they are a root cause of the Islamic State is a debate that is very likely just beginning.
Paul Merrell

Bulk Collection Under Section 215 Has Ended… What's Next? | Just Security - 0 views

  • The first (and thus far only) roll-back of post-9/11 surveillance authorities was implemented over the weekend: The National Security Agency shuttered its program for collecting and holding the metadata of Americans’ phone calls under Section 215 of the Patriot Act. While bulk collection under Section 215 has ended, the government can obtain access to this information under the procedures specified in the USA Freedom Act. Indeed, some experts have argued that the Agency likely has access to more metadata because its earlier dragnet didn’t cover cell phones or Internet calling. In addition, the metadata of calls made by an individual in the United States to someone overseas and vice versa can still be collected in bulk — this takes place abroad under Executive Order 12333. No doubt the NSA wishes that this was the end of the surveillance reform story and the Paris attacks initially gave them an opening. John Brennan, the Director of the CIA, implied that the attacks were somehow related to “hand wringing” about spying and Sen. Tom Cotton (R-Ark.) introduced a bill to delay the shut down of the 215 program. Opponents of encryption were quick to say: “I told you so.”
  • But the facts that have emerged thus far tell a different story. It appears that much of the planning took place IRL (that’s “in real life” for those of you who don’t have teenagers). The attackers, several of whom were on law enforcement’s radar, communicated openly over the Internet. If France ever has a 9/11 Commission-type inquiry, it could well conclude that the Paris attacks were a failure of the intelligence agencies rather than a failure of intelligence authorities. Despite the passage of the USA Freedom Act, US surveillance authorities have remained largely intact. Section 702 of the FISA Amendments Act — which is the basis of programs like PRISM and the NSA’s Upstream collection of information from Internet cables — sunsets in the summer of 2017. While it’s difficult to predict the political environment that far out, meaningful reform of Section 702 faces significant obstacles. Unlike the Section 215 program, which was clearly aimed at Americans, Section 702 is supposedly targeted at foreigners and only picks up information about Americans “incidentally.” The NSA has refused to provide an estimate of how many Americans’ information it collects under Section 702, despite repeated requests from lawmakers and most recently a large cohort of advocates. The Section 215 program was held illegal by two federal courts (here and here), but civil attempts to challenge Section 702 have run into standing barriers. Finally, while two review panels concluded that the Section 215 program provided little counterterrorism benefit (here and here), they found that the Section 702 program had been useful.
  • There is, nonetheless, some pressure to narrow the reach of Section 702. The recent decision by the European Court of Justice in the safe harbor case suggests that data flows between Europe and the US may be restricted unless the PRISM program is modified to protect the information of Europeans (see here, here, and here for discussion of the decision and reform options). Pressure from Internet companies whose business is suffering — estimates run to the tune of $35 to 180 billion — as a result of disclosures about NSA spying may also nudge lawmakers towards reform. One of the courts currently considering criminal cases which rely on evidence derived from Section 702 surveillance may hold the program unconstitutional either on the basis of the Fourth Amendment or Article III for the reasons set out in this Brennan Center report. A federal district court in Colorado recently rejected such a challenge, although as explained in Steve’s post, the decision did not seriously explore the issues. Further litigation in the European courts too could have an impact on the debate.
  • ...2 more annotations...
  • The US intelligence community’s broadest surveillance authorities are enshrined in Executive Order 12333, which primarily covers the interception of electronic communications overseas. The Order authorizes the collection, retention, and dissemination of “foreign intelligence” information, which includes information “relating to the capabilities, intentions or activities of foreign powers, organizations or persons.” In other words, so long as they are operating outside the US, intelligence agencies are authorized to collect information about any foreign person — and, of course, any Americans with whom they communicate. The NSA has conceded that EO 12333 is the basis of most of its surveillance. While public information about these programs is limited, a few highlights give a sense of the breadth of EO 12333 operations: The NSA gathers information about every cell phone call made to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan, and possibly other countries. A joint US-UK program tapped into the cables connecting internal Yahoo and Google networks to gather e-mail address books and contact lists from their customers. Another US-UK collaboration collected images from video chats among Yahoo users and possibly other webcam services. The NSA collects both the content and metadata of hundreds of millions of text messages from around the world. By tapping into the cables that connect global networks, the NSA has created a database of the location of hundreds of millions of mobile phones outside the US.
  • Given its scope, EO 12333 is clearly critical to those seeking serious surveillance reform. The path to reform is, however, less clear. There is no sunset provision that requires action by Congress and creates an opportunity for exposing privacy risks. Even in the unlikely event that Congress was inclined to intervene, it would have to address questions about the extent of its constitutional authority to regulate overseas surveillance. To the best of my knowledge, there is no litigation challenging EO 12333 and the government doesn’t give notice to criminal defendants when it uses evidence derived from surveillance under the order, so the likelihood of a court ruling is slim. The Privacy and Civil Liberties Oversight Board is currently reviewing two programs under EO 12333, but it is anticipated that much of its report will be classified (although it has promised a less detailed unclassified version as well). While the short-term outlook for additional surveillance reform is challenging, from a longer-term perspective, the distinctions that our law makes between Americans and non-Americans and between domestic and foreign collection cannot stand indefinitely. If the Fourth Amendment is to meaningfully protect Americans’ privacy, the courts and Congress must come to grips with this reality.
Paul Merrell

A Secret Catalogue of Government Gear for Spying on Your Cellphone - 0 views

  • HE INTERCEPT HAS OBTAINED a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and local police inside the United States. The catalogue includes details on the Stingray, a well-known brand of surveillance gear, as well as Boeing “dirt boxes” and dozens of more obscure devices that can be mounted on vehicles, drones, and piloted aircraft. Some are designed to be used at static locations, while others can be discreetly carried by an individual. They have names like Cyberhawk, Yellowstone, Blackfin, Maximus, Cyclone, and Spartacus. Within the catalogue, the NSA is listed as the vendor of one device, while another was developed for use by the CIA, and another was developed for a special forces requirement. Nearly a third of the entries focus on equipment that seems to have never been described in public before.
  • The Intercept obtained the catalogue from a source within the intelligence community concerned about the militarization of domestic law enforcement. (The original is here.) A few of the devices can house a “target list” of as many as 10,000 unique phone identifiers. Most can be used to geolocate people, but the documents indicate that some have more advanced capabilities, like eavesdropping on calls and spying on SMS messages. Two systems, apparently designed for use on captured phones, are touted as having the ability to extract media files, address books, and notes, and one can retrieve deleted text messages. Above all, the catalogue represents a trove of details on surveillance devices developed for military and intelligence purposes but increasingly used by law enforcement agencies to spy on people and convict them of crimes. The mass shooting earlier this month in San Bernardino, California, which President Barack Obama has called “an act of terrorism,” prompted calls for state and local police forces to beef up their counterterrorism capabilities, a process that has historically involved adapting military technologies to civilian use. Meanwhile, civil liberties advocates and others are increasingly alarmed about how cellphone surveillance devices are used domestically and have called for a more open and informed debate about the trade-off between security and privacy — despite a virtual blackout by the federal government on any information about the specific capabilities of the gear.
  • ANY OF THE DEVICES in the catalogue, including the Stingrays and dirt boxes, are cell-site simulators, which operate by mimicking the towers of major telecom companies like Verizon, AT&T, and T-Mobile. When someone’s phone connects to the spoofed network, it transmits a unique identification code and, through the characteristics of its radio signals when they reach the receiver, information about the phone’s location. There are also indications that cell-site simulators may be able to monitor calls and text messages. In the catalogue, each device is listed with guidelines about how its use must be approved; the answer is usually via the “Ground Force Commander” or under one of two titles in the U.S. code governing military and intelligence operations, including covert action.
  • ...2 more annotations...
  • “We’ve seen a trend in the years since 9/11 to bring sophisticated surveillance technologies that were originally designed for military use — like Stingrays or drones or biometrics — back home to the United States,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation, which has waged a legal battle challenging the use of cellphone surveillance devices domestically. “But using these technologies for domestic law enforcement purposes raises a host of issues that are different from a military context.”
  • But domestically the devices have been used in a way that violates the constitutional rights of citizens, including the Fourth Amendment prohibition on illegal search and seizure, critics like Lynch say. They have regularly been used without warrants, or with warrants that critics call overly broad. Judges and civil liberties groups alike have complained that the devices are used without full disclosure of how they work, even within court proceedings.
Paul Merrell

Neocons Launch 2016 Manifesto « LobeLog - 0 views

  • A mostly neoconservative group of national-security analysts have published perhaps the first comprehensive outline of what they believe a Republican foreign policy should look like as of Inauguration Day 2017. It’s titled “Choosing to Lead: American Foreign Policy for a Disordered World.” Although it concedes that “there are limitations on American power,” according to the book’s “Forward” by former George W. Bush speechwriter, Peter Wehner, all of the contributors …understand, too, that with the right leadership and policies in place, the United States can once again be a guarantor of global order and peace, a champion of human rights, and a beacon of economic growth and human flourishing. There is no reason the 21st century cannot be the next American Century. …Choosing to Lead offers perspectives and recommendations on how to make the next American Century happen. In doing so, we believe it will serve the world as well as the United States of America.[Emphasis added.] If you sense a rebirth of the Project for the New American Century (PNAC), you’re probably not far off, although Bob Kagan and Bill Kristol, who co-founded PNAC, are not among the large number of contributors. PNAC published two volumes, Present Dangers and Rebuilding American Defenses, that together formed a neocon manifesto for the Republican presidential candidate in the 2000 election in which the organization initially backed John McCain.
  • The new compilation is the product of the John Hay Initiative, named after Theodore Roosevelt’s chief diplomat, and brings together many of the foreign-policy advisers to Mitt Romney’s 2012 presidential campaign. The Initiative is co-chaired by Eliot Cohen (a charter member of PNAC), former Romney adviser Brian Hook, and Eric Edelman (who succeeded Doug Feith as undersecretary of defense under George W. Bush and has since served as co-founder and director—with Kagan and Kristol—of PNAC’s lineal descendant, the Foreign Policy Initiative). The 200 “experts” connected to the Initiative have reportedly advised almost all of the 2016 Republican presidential candidates. The Initiative has made no secret of its hope that a successful Republican presidential candidate will appoint many of its members to senior policy-making positions (much as PNAC’s charter members, such as Dick Cheney, Donald Rumsfeld, Paul Wolfowitz, and Elliott Abrams, were all rewarded with senior posts under George W. Bush. Cohen positioned himself for an appointment in that administration by writing the perfectly timed book, Supreme Command, in the run-up to the Iraq invasion about how the best wartime presidents ignored the more cautious advice of their generals. A faithful signer of PNAC’s letters, Cohen was named counsel to Condoleezza Rice in Bush’s second term.
Paul Merrell

Manipulation of the Gold Market: China has Imported 2400 Tons of Gold and the... - 0 views

  • We will no doubt look back upon the current era as the “crime of the century” for so many different reasons. Actually, current times represent the worst financial crimes of ALL TIME! The various crimes and how they are operated are too numerous to list and would probably fill a three volume set of books, let’s concentrate on just one. Central to everything is the U.S. issuing the global reserve currency by fiat knowing full well it truly means “non payment”. The absolute cornerstone to the dollar retaining confidence and thus value has been the suppression of the price of gold. Before getting to specifically what I’d like to point out, let’s look at a couple common sense points which beg questions. How is it China has been importing 2,400 tons of gold over the past two and a half years without any upward push to the gold price? This amount equals almost EXACTLY the TOTAL amount of gold mined annually around the world! How is it possible that ALL production has been purchased by China and yet the price goes down? The answer of course is quite simple unless you purposely close your eyes or disingenuously “apologize”.
  • The argument from the apologists is that “traders” on COMEX and LBMA believe gold will go lower so they are sellers and this is where the downward pressure has come from. You as a reader already know that much of the “selling” is done at midnight (or off hours) in the U.S. which is the lunch break in Asia, China specifically. The massive selling (as much as total global production in less than two trading days) has usually taken place during off hours when the volume is lightest and price moves the most, especially with any significant volume. The result has been gold now trades at or very near the cost of production and silver well below production costs. None of this is new, only a refresher. The reaction in the actual physical markets is backwardation, premiums over spot prices and actual shortages. Put simply, low price has brought out additional physical demand. To the point, the following is a snapshot of inventory movement (or the lack of) within the COMEX gold vaults this month:
  • Yes, yes, the open interest ALWAYS collapses and delivery “always gets made”. But doesn’t it seem strange to you that a market with less than $200 million worth of inventory is the pricing to a $5 trillion monetary asset? In comparison, a single ranch in Texas just got sold for nearly 4 times the size of what COMEX claims they have available for delivery. It used to be the tail was wagging the dog. Now, COMEX inventory has been bled down so far it can be said just a few hairs on the tail is wagging the dog! Surely I will receive comments like “this will go on forever” or “don’t worry, nothing ever comes of these delivery months”. It should be pointed out, as it stands right now a single trade of 1,820 contracts represents the entire deliverable inventory and we have seen on multiple occasions where 3,000-6,000 contracts have been sold (in one trade) to collapse the price. I ask, how does COMEX keep this in the box when something very “REAL” happens? “Real” meaning a mere push of our financial system by China? Or a military shove by Russia? Or something as simple as a “truth bomb” being released on the American public? Can an inventory of less than $200 million fiat dollars make good and keep hidden the core crime to the crime of the century? Is this why China is moving toward a physical exchange? Once they “take it out …they will take it up”!
« First ‹ Previous 341 - 360 of 372 Next ›
Showing 20 items per page