Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged boxes

Rss Feed Group items tagged

Paul Merrell

World's Largest Barrier Reef to Disappear in 5 Years | News | teleSUR English - 0 views

  • .ng-hide:not(.ng-hide-animate){display:none !important}.shr-debug{font-weight:bolder;cursor:pointer;color:#008000}.shareaholic-canvas{clear:both}.shareaholic-ui button,.shareaholic-ui .shareaholic-ui-button{border:0;box-shadow:none;text-shadow:none;font-size:12px;padding:6px 10px !important;border-radius:3px;background:transparent;display:inline-block;margin:2px;border:1px solid transparent;line-height:16px;color:#555;cursor:pointer;height:initial;text-transform:initial;}.shareaholic-ui button:hover,.shareaholic-ui .shareaholic-ui-button:hover{color:#000;font-weight:inherit}.shareaholic-ui button.button-primary,.shareaholic-ui .shareaholic-ui-button.button-primary{background-color:#52a8e8;background-image:-webkit-linear-gradient(top,#52a8e8,#377ad0);border:1px solid #3f81ae;border-color:#3f81ae #2e68a1 #1f5496;box-shadow:inset 0 1px 0 0 #72baeb,0 1px 2px 0 #c3c3c3;color:#fff;font-weight:bold;text-shadow:0 -1px 1px #3275bb;-webkit-appearance:none}.shareaholic-ui button.ui-disabled,.shareaholic-ui .shareaholic-ui-button.ui-disabled{background-color:#ccc;background-image:none;border-color:#bbb;box-shadow:none;color:#999;cursor:default;opacity:.5;text-shadow:none}.shareaholic-ui button.icon-only,.shareaholic-ui .shareaholic-ui-button.icon-only{padding:0;}.shareaholic-ui button.icon-only.icon-16,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-16{padding:4px;}.shareaholic-ui button.icon-only.icon-16 i,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-16 i{height:16px;width:16px}.shareaholic-ui button.icon-only.icon-24,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-24{padding:0;}.shareaholic-ui button.icon-only.icon-24 i,.shareaholic-ui .shareaholic-ui-button.icon-only.icon-24 i{height:24px;width:24px}.s
  • According to the report published in the journal Estuarine, Coastal and Shelf Science, saving the reef will take a huge amount of work and money. Poor water quality was seen as the major threat as well as global warming which is causing significant coral bleaching. Chief researcher of the report, John Brodie, told the Guardian, “The current spending is totally inadequate ... You either do it properly or you give up on the reef. It’s that bad.”
Paul Merrell

Google Chrome Listening In To Your Room Shows The Importance Of Privacy Defense In Depth - 0 views

  • Yesterday, news broke that Google has been stealth downloading audio listeners onto every computer that runs Chrome, and transmits audio data back to Google. Effectively, this means that Google had taken itself the right to listen to every conversation in every room that runs Chrome somewhere, without any kind of consent from the people eavesdropped on. In official statements, Google shrugged off the practice with what amounts to “we can do that”.It looked like just another bug report. "When I start Chromium, it downloads something." Followed by strange status information that notably included the lines "Microphone: Yes" and "Audio Capture Allowed: Yes".
  • Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room.A brief explanation of the Open-source / Free-software philosophy is needed here. When you’re installing a version of GNU/Linux like Debian or Ubuntu onto a fresh computer, thousands of really smart people have analyzed every line of human-readable source code before that operating system was built into computer-executable binary code, to make it common and open knowledge what the machine actually does instead of trusting corporate statements on what it’s supposed to be doing. Therefore, you don’t install black boxes onto a Debian or Ubuntu system; you use software repositories that have gone through this source-code audit-then-build process. Maintainers of operating systems like Debian and Ubuntu use many so-called “upstreams” of source code to build the final product.Chromium, the open-source version of Google Chrome, had abused its position as trusted upstream to insert lines of source code that bypassed this audit-then-build process, and which downloaded and installed a black box of unverifiable executable code directly onto computers, essentially rendering them compromised. We don’t know and can’t know what this black box does. But we see reports that the microphone has been activated, and that Chromium considers audio capture permitted.
  • This was supposedly to enable the “Ok, Google” behavior – that when you say certain words, a search function is activated. Certainly a useful feature. Certainly something that enables eavesdropping of every conversation in the entire room, too.Obviously, your own computer isn’t the one to analyze the actual search command. Google’s servers do. Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by… an unknown and unverifiable set of conditions.Google had two responses to this. The first was to introduce a practically-undocumented switch to opt out of this behavior, which is not a fix: the default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement. But the second was more of an official statement following technical discussions on Hacker News and other places. That official statement amounted to three parts (paraphrased, of course):
  • ...4 more annotations...
  • 1) Yes, we’re downloading and installing a wiretapping black-box to your computer. But we’re not actually activating it. We did take advantage of our position as trusted upstream to stealth-insert code into open-source software that installed this black box onto millions of computers, but we would never abuse the same trust in the same way to insert code that activates the eavesdropping-blackbox we already downloaded and installed onto your computer without your consent or knowledge. You can look at the code as it looks right now to see that the code doesn’t do this right now.2) Yes, Chromium is bypassing the entire source code auditing process by downloading a pre-built black box onto people’s computers. But that’s not something we care about, really. We’re concerned with building Google Chrome, the product from Google. As part of that, we provide the source code for others to package if they like. Anybody who uses our code for their own purpose takes responsibility for it. When this happens in a Debian installation, it is not Google Chrome’s behavior, this is Debian Chromium’s behavior. It’s Debian’s responsibility entirely.3) Yes, we deliberately hid this listening module from the users, but that’s because we consider this behavior to be part of the basic Google Chrome experience. We don’t want to show all modules that we install ourselves.
  • If you think this is an excusable and responsible statement, raise your hand now.Now, it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.
  • Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.Perhaps it would be wise to not repeat that exact mistake. Nobody, and I really mean nobody, is to be trusted with a technical capability to listen to every room in the world, with listening profiles customizable at the identified-individual level, on the mere basis of “trust us”.
  • Privacy remains your own responsibility.
  •  
    And of course, Google would never succumb to a subpoena requiring it to turn over the audio stream to the NSA. The Tor Browser just keeps looking better and better. https://www.torproject.org/projects/torbrowser.html.en
Paul Merrell

Dems discuss dropping Wasserman Schultz | TheHill - 0 views

  • Democrats on Capitol Hill are discussing whether Rep. Debbie Wasserman Schultz should step down as Democratic National Committee (DNC) chairwoman before the party’s national convention in July.Democrats backing likely presidential nominee Hillary ClintonHillary Rodham ClintonSanders: Clinton shouldn't pick VP from Wall Street McAfee on chances of Libertarian win: 'We're not that stupid' Libertarian candidate raps at party convention MORE worry Wasserman Schultz has become too divisive a figure to unify the party in 2016, which they say is crucial to defeating presumptive GOP nominee Donald TrumpDonald TrumpSanders: Primary isn't 'rigged,' just 'dumb' Trump University judge to unseal documents Dole: Gingrich should be Trump's running mate MORE in November.ADVERTISEMENTWasserman Schultz has had an increasingly acrimonious relationship with the party’s other presidential candidate, Bernie SandersBernie SandersSanders: Clinton shouldn't pick VP from Wall Street Sanders: Primary isn't 'rigged,' just 'dumb' Dick Van Dyke introduces Sanders at rally MORE, and his supporters, who argue she has tilted the scales in Clinton’s favor.“There have been a lot of meetings over the past 48 hours about what color plate do we deliver Debbie Wasserman Schultz’s head on,” said one pro-Clinton Democratic senator.
Paul Merrell

CIA Documents Expose the Failed Torture Methods Used on Guantanamo's Most Famous Detain... - 0 views

  • It is early on in Abu Zubaydah’s time at a CIA black site. He insists to his interrogators that he has no additional information on jihadist operations planned against the US, but his captor won’t stop slapping him. Eventually a hood is placed over Zubaydah's head and he is placed into a confinement box by unseen security officers. He is told this is his new home until he’s prepared to provide information on operations against the US.Several physically stressful hours in the confinement box fail to elicit any intelligence, so Zubaydah’s captors place him in an even smaller box. He makes painful groans and is forced to scoot out of the box on his hindquarters when he’s finally allowed out. He is immediately made to stand and backed up against a wall. Two interrogators begin to double-team him with rapid-fire questions. Zubaydah is told that if he does not cooperate, he will only bring more misery on himself. Again he denies having any additional knowledge, but this time, he isn’t slapped. Instead, Zubaydah is hooded and a water board is brought into the cell.Zubaydah is the first post-9/11 detainee to be waterboarded, and this is his first session. He coughs and vomits. The waterboarding lasts for over two hours, but he still insists he does not have any additional information beyond that which he already provided to the FBI. He is then put into the larger confinement box, where he spends the rest of the evening. The interrogation process resumes in the morning: more slapping, zero new information, and more time in the smaller box.This was a summary of CIA documents obtained by AlterNet’s Grayzone Project. The records were originally obtained by Zubaydah’s defense team through the discovery process and were provided to me by a source familiar with the case who considered their publication critical to the public’s understanding of Zubaydah’s treatment. The vast majority of the documents have not been available to the public prior to this story.
  • As clinically detailed as they are gut-wrenching, the documents comprise hundreds of pages on the interrogation of Zubaydah, perhaps Guantanamo Bay’s most famous detainee. The files revealed here have renewed significance as Zubaydah has decided to testify about conditions at Guantanamo Bay despite the likelihood that it will imperil his legal situation. The records also highlight the methods of psychologist James Mitchell, a top architect of the CIA’s “enhanced interrogation program.” Though Mitchell had previously worked as an Air Force psychologist, the Senate “Torture Report” noted that he had no prior experience as an interrogator. Mitchell’s private contracting company had received over $80 million from the CIA by the time their contract was terminated in 2009. The contract was terminated because, as the CIA Inspector General put it, there was no reason to believe Mitchell’s interrogation techniques were effective or even safe.Mitchell and the US government originally believed Zubaydah to be a top leader of Al Qaeda who had knowledge of imminent plots against the US; however, the government would later concede that Zubaydah was never an Al Qaeda leader but still contend that he poses a threat. According to the US government, Zubaydah "possibly" knew in advance about the bombing of the USS Cole in 2000 and attacks on American embassies in Africa in 1998.After his capture in Pakistan in 2002, Zubaydah was held in CIA black sites for four years where he was subjected to extended torture so intense he lost his left eye. Following his first waterboarding, he was subjected to the same form of torture 82 times. It is unclear the brutal methods applied to Zubaydah’s body elicited any valuable intelligence.
  •  
    In our name, they did this ...
Gary Edwards

The Ultimate Net Monitoring Tool: NARUS - 0 views

  •  
    Chilling stuff.  Note that Mark Klien is an important whistleblower whose testimony has helped expose the  Federal Government - NSA domestic dragnet that has violated the constitutional rights of hundreds of thousands of law abiding American citizens.  The question I have concerns cooperation between NSA NARUS spying and the IRS. We know that the IRS used key words such as "TEA PARTY", "PATRIOT", "Constitution", and "Tenth Amendment" to target American citizens.  Does the NSA NARUS target Americans in the same way?  Are there political enemy lists with background surveillance information now circulating through different government agencies based on this targeted and illegal spying? The first thing we need to do is protect whistle blowers who are risking it all to protect the constitutional rights of American citizens and save our country.   "The equipment that technician Mark Klein learned was installed in the National Security Agency's "secret room" inside AT&T's San Francisco switching office isn't some sinister Big Brother box designed solely to help governments eavesdrop on citizens' internet communications. Rather, it's a powerful commercial network-analysis product with all sorts of valuable uses for network operators. It just happens to be capable of doing things that make it one of the best internet spy tools around. "Anything that comes through (an internet protocol network), we can record," says Steve Bannerman, marketing vice president of Narus, a Mountain View, California, company. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on, we can reconstruct their (voice over internet protocol) calls."" Narus' product, the Semantic Traffic Analyzer, is a software application that runs on standard IBM or Dell servers using the Linux operating system. It's renowned within certain circles for its ability to inspect traffic in real time on high-bandwidth pipes, identifying packets of interest as they r
Paul Merrell

It Can Happen Here: The Confiscation Scheme Planned for US and UK Depositors | WEB OF D... - 0 views

  • Confiscating the customer deposits in Cyprus banks, it seems, was not a one-off, desperate idea of a few Eurozone “troika” officials scrambling to salvage their balance sheets. A joint paper by the US Federal Deposit Insurance Corporation and the Bank of England dated December 10, 2012, shows that these plans have been long in the making; that they originated with the G20 Financial Stability Board in Basel, Switzerland (discussed earlier here); and that the result will be to deliver clear title to the banks of depositor funds.  
  • Although few depositors realize it, legally the bank owns the depositor’s funds as soon as they are put in the bank. Our money becomes the bank’s, and we become unsecured creditors holding IOUs or promises to pay. (See here and here.) But until now the bank has been obligated to pay the money back on demand in the form of cash. Under the FDIC-BOE plan, our IOUs will be converted into “bank equity.”  The bank will get the money and we will get stock in the bank. With any luck we may be able to sell the stock to someone else, but when and at what price? Most people keep a deposit account so they can have ready cash to pay the bills.
  • No exception is indicated for “insured deposits” in the U.S., meaning those under $250,000, the deposits we thought were protected by FDIC insurance. This can hardly be an oversight, since it is the FDIC that is issuing the directive. The FDIC is an insurance company funded by premiums paid by private banks.  The directive is called a “resolution process,” defined elsewhere as a plan that “would be triggered in the event of the failure of an insurer . . . .”
  • ...7 more annotations...
  • The 15-page FDIC-BOE document is called “Resolving Globally Active, Systemically Important, Financial Institutions.”  It begins by explaining that the 2008 banking crisis has made it clear that some other way besides taxpayer bailouts is needed to maintain “financial stability.” Evidently anticipating that the next financial collapse will be on a grander scale than either the taxpayers or Congress is willing to underwrite, the authors state: An efficient path for returning the sound operations of the G-SIFI to the private sector would be provided by exchanging or converting a sufficient amount of the unsecured debt from the original creditors of the failed company [meaning the depositors] into equity [or stock]. In the U.S., the new equity would become capital in one or more newly formed operating entities. In the U.K., the same approach could be used, or the equity could be used to recapitalize the failing financial company itself—thus, the highest layer of surviving bailed-in creditors would become the owners of the resolved firm. In either country, the new equity holders would take on the corresponding risk of being shareholders in a financial institution.
  • If our IOUs are converted to bank stock, they will no longer be subject to insurance protection but will be “at risk” and vulnerable to being wiped out, just as the Lehman Brothers shareholders were in 2008.  That this dire scenario could actually materialize was underscored by Yves Smith in a March 19th post titled When You Weren’t Looking, Democrat Bank Stooges Launch Bills to Permit Bailouts, Deregulate Derivatives.  She writes: In the US, depositors have actually been put in a worse position than Cyprus deposit-holders, at least if they are at the big banks that play in the derivatives casino. The regulators have turned a blind eye as banks use their depositaries to fund derivatives exposures. And as bad as that is, the depositors, unlike their Cypriot confreres, aren’t even senior creditors. Remember Lehman? When the investment bank failed, unsecured creditors (and remember, depositors are unsecured creditors) got eight cents on the dollar. One big reason was that derivatives counterparties require collateral for any exposures, meaning they are secured creditors. The 2005 bankruptcy reforms made derivatives counterparties senior to unsecured lenders.
  • Smith writes: Lehman had only two itty bitty banking subsidiaries, and to my knowledge, was not gathering retail deposits. But as readers may recall, Bank of America moved most of its derivatives from its Merrill Lynch operation [to] its depositary in late 2011. Its “depositary” is the arm of the bank that takes deposits; and at B of A, that means lots and lots of deposits. The deposits are now subject to being wiped out by a major derivatives loss. How bad could that be? Smith quotes Bloomberg: . . . Bank of America’s holding company . . . held almost $75 trillion of derivatives at the end of June . . . . That compares with JPMorgan’s deposit-taking entity, JPMorgan Chase Bank NA, which contained 99 percent of the New York-based firm’s $79 trillion of notional derivatives, the OCC data show.
  • $75 trillion and $79 trillion in derivatives! These two mega-banks alone hold more in notional derivatives each than the entire global GDP (at $70 trillion).
  • Smith goes on: . . . Remember the effect of the 2005 bankruptcy law revisions: derivatives counterparties are first in line, they get to grab assets first and leave everyone else to scramble for crumbs. . . . Lehman failed over a weekend after JP Morgan grabbed collateral. But it’s even worse than that. During the savings & loan crisis, the FDIC did not have enough in deposit insurance receipts to pay for the Resolution Trust Corporation wind-down vehicle. It had to get more funding from Congress. This move paves the way for another TARP-style shakedown of taxpayers, this time to save depositors. Perhaps, but Congress has already been burned and is liable to balk a second time. Section 716 of the Dodd-Frank Act specifically prohibits public support for speculative derivatives activities.
  • An FDIC confiscation of deposits to recapitalize the banks is far different from a simple tax on taxpayers to pay government expenses. The government’s debt is at least arguably the people’s debt, since the government is there to provide services for the people. But when the banks get into trouble with their derivative schemes, they are not serving depositors, who are not getting a cut of the profits. Taking depositor funds is simply theft. What should be done is to raise FDIC insurance premiums and make the banks pay to keep their depositors whole, but premiums are already high; and the FDIC, like other government regulatory agencies, is subject to regulatory capture.  Deposit insurance has failed, and so has the private banking system that has depended on it for the trust that makes banking work.
  • The Cyprus haircut on depositors was called a “wealth tax” and was written off by commentators as “deserved,” because much of the money in Cypriot accounts belongs to foreign oligarchs, tax dodgers and money launderers. But if that template is applied in the US, it will be a tax on the poor and middle class. Wealthy Americans don’t keep most of their money in bank accounts.  They keep it in the stock market, in real estate, in over-the-counter derivatives, in gold and silver, and so forth. Are you safe, then, if your money is in gold and silver? Apparently not – if it’s stored in a safety deposit box in the bank.  Homeland Security has reportedly told banks that it has authority to seize the contents of safety deposit boxes without a warrant when it’s a matter of “national security,” which a major bank crisis no doubt will be.
  •  
    Time to get your money out of the bank and into gold or silver, kept somewhere other than in a bank safety deposit box. 
Gary Edwards

Benghazi report: Trinkets of treason - 1 views

  •  
    The truth is dribbling out, thn=anks to Douglas J. Hagmann and Canada Free Press .....................  We've been aligned and hostage to the Saudi Royal Family ever since FDR met with King Ibn Saud, Feb 14th, 1945 near the end of WWII.  It was at this meeting that FDR promised protection for the Saudi family in exchange for the right to develop Saudi oil and sell that oil exclusively in dollars.  Hence the "petro dollar" - backed by Saudi oil instead of GOLD. That agreement, and our subsequent history of our military and state departments acting to further Saudi interests has dominated America.  Our troops and military resources ae mercenaries fighting for Saudi dominance of the Globalist ruling elites.  Our politicians are bought and paid for by the Saudi Globalist Alliance.  They have sold their souls for power and money, with the destruction of the USA Constitution the only thing standing between the Globalist and their quest to rule the world. excerpt: We are witnessing one of the biggest government cover-ups since Watergate. A cover-up that involves murder, arms trafficking, and lies by high ranking officials under oath. It involves the murderous attacks in Benghazi, and congressional investigators just released a 46-page interim progress report that at least exposes Hillary Rodham Clinton and the White House lying under oath. Where's the accountability? Where's the outrage? Where's the media? A 46-page interim progress report of an ongoing investigation across five House Committees by the U.S. House of Representatives was released on Tuesday, April 23, 2013. The executive summary states that former Secretary of State Hillary Rodham Clinton signed off on a reduction of diplomatic security forces suggesting that this reduction of security was, in large part, to blame for the attack in Benghazi on September 11, 2012.  The report emphasizes that this is "inconsistent" with her sworn testimony of January 23, 2013. Simply stated, Hillary Rod
Paul Merrell

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
Paul Merrell

The NSA Archive | American Civil Liberties Union - 0 views

  • The ACLU and others have long suspected that the National Security Agency has gone far beyond its mandate of gathering information for counterterrorism and foreign intelligence purposes, implementing a massive spying system to conduct bulk surveillance of hundreds of millions of innocent Americans. Those suspicions were confirmed when, on June 5, 2013, The Guardian released the first in a series of documents provided by Edward Snowden detailing the NSA's unlawful spying activities. All of the documents released since that day -- both by the media and the government -- are housed in this database. Together, they have triggered a remarkable and long-overdue public debate about the legality and propriety of the government's surveillance practices. You can search the text of the documents using the Keyword box to the right, and you can filter the documents using the tags below that box.
  • The ACLU and others have long suspected that the National Security Agency has gone far beyond its mandate of gathering information for counterterrorism and foreign intelligence purposes, implementing a massive spying system to conduct bulk surveillance of hundreds of millions of innocent Americans. Those suspicions were confirmed when, on June 5, 2013, The Guardian released the first in a series of documents provided by Edward Snowden detailing the NSA's unlawful spying activities. All of the documents released since that day -- both by the media and the government -- are housed in this database. Together, they have triggered a remarkable and long-overdue public debate about the legality and propriety of the government's surveillance practices. You can search the text of the documents using the Keyword box to the right, and you can filter the documents using the tags below that box.
Paul Merrell

Loopholes, Filing Failures, and Lax Enforcement: How the Foreign Agents Registration Ac... - 0 views

  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Executive Summary The Foreign Agents Registration Act (FARA) requires that all American citizens working to influence U.S. policy on behalf of foreign governments register with the Department of Justice and to disclose information on any and all political activity in which they engaged for foreign clients. This includes filing, within 48 hours, any informational materials disseminated to two or more people.
  • ...7 more annotations...
  • Table of Contents Executive SummaryIntroductionBackgroundWhat the Foreign Influence Database ShowsEgypt: A Case Study Of Foreign InfluenceSame-Day ContributionsSystemic Foreign InfluenceQuid Pro Quo or Coincidence?Foreign Money and the LawLax Compliance with and Enforcement of FARAEnforcementConclusionRecommendationsEndnotes
  • The law requires lobbyists for foreign interests to plainly and conspicuously identify themselves as such in any materials distributed in the course of their lobbying—for example, emails, other correspondence, or publications. We found that many documents filed with the Justice Department lack this identification statement; furthermore, many lobbyists admitted that they did not comply with this requirement. More than half (51 percent) of the registrants we examined in a sample from 2010 checked a box on a the semi-annual Justice Department questionnaire saying they had filed informational materials, and checked another box saying they had not met the legal requirement that they identify themselves in those materials as working on behalf of foreign interests. Toby Moffett, a former Member of Congress from Connecticut who is now Chairman of the Moffett Group and one of its registered lobbyists, told POGO that “Around the edges there’s a lot of loosey-goosey stuff going on. People representing foreign interests and not reporting.”[4] But even when lobbyists do report to the Justice Department, the information they provide is not easily accessible to the public. Astonishingly, informational materials are not available online, despite the fact that the Justice Department has an electronic filing system. Instead, these documents are kept in an office at the Justice Department that is only open for four hours each weekday. Hard copies of the documents are kept in folders that are often disorganized and susceptible to misfiling. This archaic system undermines the intended transparency of the law.
  • The Project On Government Oversight examined thousands of these materials spanning four years, as well as additional public records related to the Justice Department’s oversight of lobbyists for foreign interests. We found that lobbyists for foreign interests have routinely failed to comply with the law—a failure that prevents journalists and watchdogs from scrutinizing the lobbying activities while foreign interests are trying to influence U.S. policy. We found a pattern of lax enforcement of FARA requirements by the Justice Department. We found that the Justice Department office responsible for administering the law is a record-keeping mess. And we found loopholes in the law that often makes it difficult if not impossible for the government to police compliance or to discipline lobbyists who fail to comply. Here are some highlights of our investigation:
  • Though federal law bars foreign money from U.S. political campaigns, there appears to be a gray area in the law that can let in such money indirectly. POGO found many instances in which members of lobbying firms made political contributions to Members of Congress on the same day that those firms were lobbying the Members of Congress or their legislative staffs on behalf of foreign clients.[1] Lobbyists who fail to comply with certain FARA requirements may have little to fear from the Justice Department. “The cornerstone of the Registration Unit’s enforcement efforts is encouraging voluntary compliance,” a Justice Department website says.[2] When lobbyists do not voluntarily comply, the Justice Department rarely uses one of the key tools at its disposal to enforce the law—seeking a court injunction. A representative of the Department’s FARA unit told POGO: “While the FARA statute and regulations authorize the pursuit of formal legal proceedings, such as injunctive remedy options, the FARA Unit [has] not pursued injunctive remedy options recently and has instead utilized other mechanisms to achieve compliance.”[3] It appears that some registered foreign agents have been distributing materials but not filing them with the Justice Department. It’s unclear the extent to which that illustrates a lack of compliance with the law or loopholes in the law. In the process of researching this report, POGO noticed that many more lobbyists were registering as foreign agents than had filed informational materials that we could locate at the FARA office. To determine what was happening, we looked at a sampling of questionnaires that the Justice Department requires registered agents to complete every six months. Some checked one box indicating they had distributed materials and another box stating they did not file them with the FARA office.
  • We set out to determine the extent to which lobbyists for foreign interests were filing lobbying materials at the Justice Department within the required time frame. Based on a review of filings made in 2012, in those instances where it was possible to answer the question, POGO estimates that almost half—46 percent—were filed late. Fifteen percent were filed more than 30 business days after they were distributed, and 12 percent were filed more than 100 business days after they were distributed. In many instances, the Justice Department would be hard pressed to enforce the filing deadline. Based on the records the Department maintains to enforce the law, we found that in more than a quarter (26 percent) of the 2012 filings, it was impossible to determine whether the lobbyists complied. For example, in many cases, the records did not show when the lobbyists disseminated the materials to the targets of their lobbying. In a glaring omission, the law does not require lobbyists to provide that information. Without it, there may be no way for the government or the public to know whether lobbying materials were filed on time.
  • When lobbyists for foreign interests do not follow the law, when the U.S. government fails to enforce it, and when the Justice Department makes it difficult for the American people to access records to which they are legally entitled, the public is left in the dark. To bring more transparency to this opaque realm, POGO has made four years of informational materials available for the first time online with our Foreign Influence Database, allowing the public to see how lobbyists attempt to influence American policies on behalf of their foreign clients.
  • With the release of the Foreign Influence Database, the Project On Government Oversight (POGO) is making years of documents from this key set of FARA filings electronically available for the first time. The materials were previously only available in hard copy at the FARA Registration Unit in Washington, DC, which is only open to the public from 11am to 3pm on weekdays.[12] In this digital age it is surprising that these materials could not be read online and are instead stored in file folders, where they are disorganized and susceptible to misfiling. Even those that were electronically filed by the registrants are not available to the public in an electronic format. POGO’s database includes informational materials filed in 2009, 2010, 2011, and 2012.[13]
  •  
    POGO does thorough work and doesn't let up until it gets results. Forcing DoJ to puts its foreign agents registration materials online should be a fairly trivial battle. The real war, though, will be forcing better enforcement. The new database is at http://www.pogo.org/tools-and-data/foreign-influence-database/ I punched up the word "Israel" and came up with 113 documents in the search results. Each search hit lists the name of the nation involved that the lobbying was done for. Of those 113 document hits, only two were for the nation of Israel, both for its Ministry of Tourism. The rest were by other nations who had mentioned Israel in their lobbying materials.  Now that is fairly incredible, given that Israel outright controls Congress when it comes to Middle East policy.  The last administration to attempt to do something about Israeli lobbyists not registering was the the Kennedy Administration. The result was that the major Israeli lobbying group disbanded and was promptly reformed under a new corporate charter and name. That was the very last attempt at enforcing the Foreign Agents Registration Act against Israel's lobbyists in the U.S., despite the fact that the reformed group, AIPAC, has even been caught more than once being passed highly classified U.S. documents by double agents working inside the U.S. military establishment. The leakers went to prison but the AIPACers were never prosecuted. AIPAC rules.  
Paul Merrell

In deal with police, former Netanyahu aide to hand over recordings of Netanyahu and wif... - 0 views

  • Nir Hefetz, Prime Minister Benjamin Netanyahu's "spin doctor" and confidant, will hand over recordings of Netanyahu and his wife Sara as part of a deal with police to turn state's evidence in the bribery case involving the Bezeq telecom giant and the Walla news site. Netanyahu, currently in the U.S. for AIPAC and a meeting with Trump, received the news at the Blair House, where he is a guest of the White House. In return for testifying against Netanyahu, Hefetz will not stand trial, face prison time or be fined. While he testifies, he will be housed at an isolated installation.
  • According to assessments regarding the deal, Hefetz will also give information regarding the other cases against the prime minister and his wife. Keep updated: Sign up to our newsletter Email* Please enter a valid email address Sign up Please wait… Thank you for signing up. We've got more newsletters we think you'll find interesting. Click here Oops. Something went wrong. Please try again later. Try again Thank you, The email address you have provided is already registered. Close Hefetz is the third Netanyahu confidant to turn against the prime minister in the ongoing corruption cases. Hefetz is suspected of receiving bribes and obstructing justice as part of what is called Case 4000. He is also a key figure in 1270, and is second fiddle in Case 2000. In Case 4000, Hefetz liaised between the Netanyahu couple and the Walla news website, owned by Bezeq. Hefetz arranged for flattering items on the couple and censorship of less flattering items, Haaretz's Gidi Weitz reported. In Case 1270, Hefetz allegedly served as the prime minister's confidant who sought to elucidate how Judge Hila Gerstl felt about closing a case against Sara Netanyahu. Allegedly a trial balloon was floated, hinting to Gerstl that she would be promoted to Israel's next attorney-general if she closed the case down. Hefetz claims that it all boiled down to idle chatter and hadn't been coordinated with the prime minister and his wife. In Case 2000, Hefetz had involvement on both sides of the coin. He was head of public relations for Netanyahu, before which he served as senior editor in the Yedioth Ahronoth group, owned by Arnon Mozes. In 2009, Mozes is suspected of agreeing to provide sweetheart coverage of Netanyahu, who in turn allegedly promised to get the rival (free) newspaper Israel Hayom to stop printing a weekend edition, which stood to hugely benefit Yedioth.
  • Channel 10 reports that Hefetz will be providing information on other cases – some of which the public hasn't even heard of yet.
  • ...1 more annotation...
  • At the heart of Case 4000 is the suspicion that Netanyahu acted to provide Bezeq and its former chairman, Shaul Elovitch, with financial breaks worth hundreds of millions of shekels in exchange for positive coverage in the telecommunications company’s popular Walla website. The prime minister has rejected the accusations and insisted that all his decisions “were made in businesslike fashion and based on professional factors, professional testimonies and legal counsel.” Hefetz testified in the case in December. Since his arrest two weeks ago, he has been questioned under caution not only in the telecom case but also for a suspected bribery offer to a former judge. So far he had refused to answer the investigator's questions. Hefetz, Haaretz has learned, will testify that he never received orders from Sara or Benjamin Netanyahu to make the offer to the judge, allegedly made through an intermediary. Hefetz will claim that the talks with Eli Kamir, the alleged conduit, were just "empty words." Two former Netanyahu confidants have already turned against him. One is former Chief of Staff Ari Harow who testified in cases 2000 and 1000 - which, respectively, relate to discussions of a quid-pro-quo deal with newspaper publisher Arnon Mozes and lavish gifts received from businessmen Arnon Milchan and James Packer. The other is Sholmo Filber, former director general of the Communications Ministry under Netanyahu, who is suspected of granting financial benefits to Shaul Elovitch, the controlling shareholder of Bezeq, Israel's largest telecom company, on behalf of the prime minister.
Paul Merrell

Duterte's Departure from Philippines' US-Compliance Opens Pandora's Box - nsnbc interna... - 0 views

  • During his visit to China the Philippines’ President Rodrigo Duterte calmly announced that his administration would say good-bye to American military and economic and social hegemony. The statement opened a Pandora’s box filled with surprises and at times wild speculations, allegations, denunciations, misrepresentations.
  • Speaking at an investment conference in the Great Hall of the People in the Chinese capital Beijing, China on Thursday, the Philippines’ President Rodrigo Duterte – no stranger to controversy – suggested that the Philippines were to leave the United States “sphere of influence” which the country became a part of since its independence in 1946. The country was drawn into this sphere within the context of the emerging global cold war headed by the Permanent UN Security Council (UNSC) members who more often than not used their UNSC mandate and veto right to carve the world’s smaller or less powerful nations up into hegemonic zones. Duterte didn’t mince words when he affirmed his and his administration’s separation from the United States military, social and economic hegemony. Duterte pointed out that there was no need for US troops in the Philippines and that there was no need for joint Philippine – US military exercises either. Defense Secretary Delfin Lorenzana declined to comment. However, National Security Adviser Hermogenes Esperon Jr. told the press that President Rodrigo (Rody) Duterte meant what he said.
  • The Philippines has a mutual defense treaty with the US which has been in force since 1951 where both countries pledge to come to each other’s defense in the event of an armed attack. The abrogation of this military treaty requires the action of the Philippine Senate. Duterte implied that this treaty also ties that the Philippines to the US as a NATO appendage. He suggested that the Philippines have no need for being in that position and that his goodbye to the US’s military hegemony also means a departure from this indirect NATO membership and the associated obligations and risks; Including the risk that the country will again be drawn into a war that turns it into the battlefield of powers and alliances of global reach. Duterte’s departure from US-hegemony has widely been interpreted as the basis for an alliance with China. However, an objective analysis of the Duterte administration’s policy doesn’t indicate that the goal is to exchange one hegemon with another one. It does, however, suggest a non-aligned policy based on good neighborly relations with those who respect the Philippines sovereignty and independence.
Paul Merrell

Trump Has to Decide: 50,000 Troops to Afghanistan? - Bloomberg - 0 views

  • A new Afghanistan war strategy approved last month by President Donald Trump's top military and national security advisers would require at least 50,000 U.S. forces to stop the advance of the Taliban and save the government in Kabul, according to a classified U.S. intelligence community assessment.U.S. intelligence and national security officials familiar with the assessment tell me that it was drafted in April, and that it provided estimates of necessary troop strengths for various strategic options. But it found that if an ambitious war plan approved by the National Security Council's principals committee got a green light from the president -- a big if -- more than 50,000 U.S. troops would be needed.That proposed strategy, which I wrote about earlier this month, would place the U.S. on a new war footing and in a deeper partnership with the Afghan government in its current campaign against the Taliban. It would also remove arbitrary timelines for withdrawal set by President Barack Obama. The new estimate from the intelligence community envisions significantly more U.S. forces in Afghanistan than the current levels of around 8,400 U.S. troops currently fighting there. It is also more than the modest troop increase for Afghanistan of around 5,000 that was reported last week.  
  •  
    Brilliant! Even more of what hasn't worked in the past.
Paul Merrell

Soleimani Says Iran Is Ready to Back Palestinian Forces - Bloomberg - 0 views

  • Iranian Revolutionary Guards commander Qassem Soleimani says his nation is ready to support Palestinian forces in the Gaza Strip, days after the U.S. recognized Jerusalem as Israel’s capital.Soleimani, commander of the Al Quds force, made the offer in a phone call late Monday with leaders of groups in Gaza, according to the Revolutionary Guard Corps’ website, Sepah News, which didn’t give details of the assistance proffered. Other forces in the region are ready to defend the Al-Aqsa mosque in Jerusalem, Soleimani also told the Gaza faction leaders, without identifying them. The mosque is Islam’s third-holiest shrine and a frequent flashpoint for tensions between Israel and the Palestinians.Palestinians claim Jerusalem’s eastern sector, where the mosque stands, as the capital of a future state, and they oppose the U.S. move. Hamas has called for another uprising against Israel in response, though so far protests have been limited. Soleimani spoke a day after the head of Lebanon’s Hezbollah movement, Hassan Nasrallah, called on all “resistance” groups in the region to come up with a unified strategy to take back Jerusalem. Iran’s Quds force operates beyond the country’s borders and has fought Islamic State in Iraq and backed President Bashar al-Assad in Syria. Iran also supports proxies such as Hezbollah and Hamas that have warred with Israel.
Paul Merrell

It Can Happen Here: The Confiscation Scheme Planned for US and UK Depositors - 0 views

  • Confiscating the customer deposits in Cyprus banks, it seems, was not a one-off, desperate idea of a few Eurozone “troika” officials scrambling to salvage their balance sheets. A joint paper by the US Federal Deposit Insurance Corporation and the Bank of England dated December 10, 2012, shows that these plans have been long in the making; that they originated with the G20 Financial Stability Board in Basel, Switzerland (discussed earlier here); and that the result will be to deliver clear title to the banks of depositor funds.  
  • Although few depositors realize it, legally the bank owns the depositor’s funds as soon as they are put in the bank. Our money becomes the bank’s, and we become unsecured creditors holding IOUs or promises to pay. (See here and here.) But until now the bank has been obligated to pay the money back on demand in the form of cash. Under the FDIC-BOE plan, our IOUs will be converted into “bank equity.”  The bank will get the money and we will get stock in the bank. With any luck we may be able to sell the stock to someone else, but when and at what price? Most people keep a deposit account so they can have ready cash to pay the bills.
  • The 15-page FDIC-BOE document is called “Resolving Globally Active, Systemically Important, Financial Institutions.”  It begins by explaining that the 2008 banking crisis has made it clear that some other way besides taxpayer bailouts is needed to maintain “financial stability.” Evidently anticipating that the next financial collapse will be on a grander scale than either the taxpayers or Congress is willing to underwrite, the authors state: An efficient path for returning the sound operations of the G-SIFI to the private sector would be provided by exchanging or converting a sufficient amount of the unsecured debt from the original creditors of the failed company [meaning the depositors] into equity [or stock]. In the U.S., the new equity would become capital in one or more newly formed operating entities. In the U.K., the same approach could be used, or the equity could be used to recapitalize the failing financial company itself—thus, the highest layer of surviving bailed-in creditors would become the owners of the resolved firm. In either country, the new equity holders would take on the corresponding risk of being shareholders in a financial institution.
  • ...7 more annotations...
  • No exception is indicated for “insured deposits” in the U.S., meaning those under $250,000, the deposits we thought were protected by FDIC insurance. This can hardly be an oversight, since it is the FDIC that is issuing the directive. The FDIC is an insurance company funded by premiums paid by private banks.
  • If our IOUs are converted to bank stock, they will no longer be subject to insurance protection but will be “at risk” and vulnerable to being wiped out, just as the Lehman Brothers shareholders were in 2008.  That this dire scenario could actually materialize was underscored by Yves Smith in a March 19th post titled When You Weren’t Looking, Democrat Bank Stooges Launch Bills to Permit Bailouts, Deregulate Derivatives.  She writes: In the US, depositors have actually been put in a worse position than Cyprus deposit-holders, at least if they are at the big banks that play in the derivatives casino. The regulators have turned a blind eye as banks use their depositaries to fund derivatives exposures. And as bad as that is, the depositors, unlike their Cypriot confreres, aren’t even senior creditors. Remember Lehman? When the investment bank failed, unsecured creditors (and remember, depositors are unsecured creditors) got eight cents on the dollar. One big reason was that derivatives counterparties require collateral for any exposures, meaning they are secured creditors. The 2005 bankruptcy reforms made derivatives counterparties senior to unsecured lenders.
  • One might wonder why the posting of collateral by a derivative counterparty, at some percentage of full exposure, makes the creditor “secured,” while the depositor who puts up 100 cents on the dollar is “unsecured.” But moving on – Smith writes: Lehman had only two itty bitty banking subsidiaries, and to my knowledge, was not gathering retail deposits. But as readers may recall, Bank of America moved most of its derivatives from its Merrill Lynch operation [to] its depositary in late 2011. Its “depositary” is the arm of the bank that takes deposits; and at B of A, that means lots and lots of deposits. The deposits are now subject to being wiped out by a major derivatives loss. How bad could that be? Smith quotes Bloomberg:
  • . . . Bank of America’s holding company . . . held almost $75 trillion of derivatives at the end of June . . . . That compares with JPMorgan’s deposit-taking entity, JPMorgan Chase Bank NA, which contained 99 percent of the New York-based firm’s $79 trillion of notional derivatives, the OCC data show. $75 trillion and $79 trillion in derivatives! These two mega-banks alone hold more in notional derivatives each than the entire global GDP (at $70 trillion).
  • Are you safe, then, if your money is in gold and silver? Apparently not – if it’s stored in a safety deposit box in the bank.  Homeland Security has reportedly told banks that it has authority to seize the contents of safety deposit boxes without a warrant when it’s a matter of “national security,” which a major bank crisis no doubt will be.
  • Another alternative was considered but rejected by President Obama in 2009: nationalize mega-banks that fail. In a February 2009 article titled “Are Uninsured Bank Depositors in Danger?“, Felix Salmon discussed a newsletter by Asia-based investment strategist Christopher Wood, in which Wood wrote: It is . . . amazing that Obama does not understand the political appeal of the nationalization option. . . . [D]espite this latest setback nationalization of the banks is coming sooner or later because the realities of the situation will demand it. The result will be shareholders wiped out and bondholders forced to take debt-for-equity swaps, if not hopefully depositors.
  • President Obama acknowledged that bank nationalization had worked in Sweden, and that the course pursued by the US Fed had not worked in Japan, which wound up instead in a “lost decade.”  But Obama opted for the Japanese approach because, according to Ed Harrison, “Americans will not tolerate nationalization.” But that was four years ago. When Americans realize that the alternative is to have their ready cash transformed into “bank stock” of questionable marketability, moving failed mega-banks into the public sector may start to have more appeal.
Paul Merrell

U.S. to Keep Warplanes in Jordan, Pressing Syria - NYTimes.com - 0 views

  • Ratcheting up the pressure on President Bashar al-Assad of Syria, the United States will keep American warplanes and antimissile batteries in Jordan, officials said Saturday.
  • The decision, which came at the request of Jordan, means that a detachment of American F-16 warplanes and Patriot missile-defense systems would remain in Jordan after a military exercise there concludes next week. The move followed President Obama’s decision last week to send arms to Syrian rebels and came as efforts were being made on multiple fronts on Saturday to increase the pressure on the government.
  • In Washington, Secretary of State John Kerry renewed his efforts to persuade Iraq to curtail Iranian air shipments of arms to Syria.
  • ...2 more annotations...
  • The Central Intelligence Agency has been training rebels in Jordan under a covert program, and weapons that are to be sent to the opposition by the United States are expected to be funneled through Jordan, both of which might heighten the risk of Syrian retaliation, including against possible training areas.
  • Benjamin J. Rhodes, the deputy national security adviser, highlighted the challenges in imposing a no-fly zone in Syria in a conference call with reporters on Thursday, and made it clear that the White House was not eager to take on such an open-ended commitment. But the Patriots and F-16s would have some utility if the United States decided to support the establishment of a buffer zone between Syria and Jordan. Contingency plans for such a zone, which would be enforced by Jordanian troops on the Syrian side of the border and supported politically by the United States, have already been developed.
  •  
    A U.S.-backed invasion of Syria by Jordan to establish a "buffer zone", enforced by U.S. Patriot missiles and F16 fighters? Not to mention the U.S. carrier/missile fleet in the Mediterranean. This would still be an war of aggression, invasion of another nation's sovereignty. A "buffer zone" in context is in effect just a smaller no-fly zone. It still needs Security Council approval unless Obama is willing to risk launching WWW III without the Security Council's blessing.  The steady escalation of military force positioning around Syria continues. But it's a tinder box situation. One mistake by either side and it could be Hell on Earth. 
Gary Edwards

The End Of The Obama World Order - 0 views

  •  
    "For the past eight years, Barack Obama has been using the power of the U.S. presidency to impose his vision of a progressive world order on the entire globe.  As a result, much of the planet will greatly celebrate once the Obama era officially ends on Friday.  The Obama years brought us the Arab Spring, Benghazi, ISIS, civil war in Syria, civil war in Ukraine and the Iran nuclear deal.  On the home front, we have had to deal with Obamacare, "Fast and Furious", IRS targeting of conservative groups, Solyndra, the VA scandal, NSA spying and the worst "economic recovery" since the end of World War II.  And right at the end of his presidency, Barack Obama has committed the greatest betrayal of Israel in U.S. history and has brought us dangerously close to war with Russia. So is the end of the Obama world order worth celebrating? You better believe it is. Of course Obama and his minions are in a great deal of distress that much of their hard work over the past eight years is about to be undone by Donald Trump.  On Wednesday, Vice President Joe Biden warned the elitists gathered at the World Economic Forum in Davos that their "liberal world order" is in danger of collapsing…     Vice President Joe Biden delivered an epic final speech Wednesday to the elites at the World Economic Forum in Davos, Switzerland.   The gist of his speech was simple: At a time of "uncertainty" we must double down on the values that made Western democracies great, and not allow the "liberal world order" to be torn apart by destructive forces. And without a doubt, we definitely want it to collapse. During his time in the White House, Barack Obama has used the full diplomatic power of the government to promote "abortion rights", "gay rights" and other "liberal values" to the farthest corners of the globe.  Here at home, the appointment of two new Supreme Court justices under Obama paved the way for the Supreme Court decision that forced all 50 state
Paul Merrell

Obama DOJ's New Abuse of State-Secrets Privilege Revealed - The Intercept - 0 views

  • For nine years, the U.S. government refused to let a Stanford PhD student named Rahinah Ibrahim back in the country after putting her on the no-fly list for no apparent reason. For eight years, U.S. government lawyers fought Ibrahim’s request that she be told why. Last April, despite his promise in 2009 to do so only in only the most extreme cases, Attorney General Eric Holder tried to block Ibrahim’s case by asserting the state secrets privilege, declaring under penalty of perjury that the information she wanted “could reasonably be expected to cause significant harm to national security.” Last week, a federal judge publicly revealed the government’s explanation for Ibrahim’s long ordeal: an FBI agent had “checked the wrong box,” resulting in her falling under suspicion as a terrorist. Even when the government found and corrected the error years later, they still refused to allow Ibrahim to return to the country or learn on what grounds she had been banned in the first place.
  • Holder, in his April declaration, restated his own new state secrets policy, that “[t]he Department will not defend an invocation of the privilege in order to: (i) conceal violations of the law, inefficiency, or administrative error; (ii) prevent embarrassment to a person, organization, or agency of the United States Government”. Then he did exactly what he had said he wouldn’t do. The bogus national security claims invoked were even more outrageous because they were used to continue the persecution of someone the government knew to be innocent.
Gary Edwards

Boxworks 2013: New Box Preview Converts Documents Into HTML5 - 1 views

  •  
    "Who Killed JFK?" is a new book from investigative reporter, Jerome Corsi. This first interview with Corsi was outstanding! (There are three mp3's available on request). The Dallas assacination was the third attempt to kill JFK, and Corsi insists that JFK was aware of the first two attempts. JFK knew the risk of going to Dallas. The first attempt was in Chicago, followed by one in Tampa Bay in August. The coupe was carried out by the CIA and primary planners included the Dulles brothers, Lyndon Johnson, Herbert Hoover, General Curtis Lemay as well as key mafia figures. The plan itself was a copy of a 1957 CIA coupe in Ecuador, hatched by E Howard Hunt. And yes, both Nixon and Poppy Bush were in Dallas that fateful weekend. Date: 09-17-13 excerpt: As we prepare for the 50th anniversary of the JFK assassination, author and columnist Jerome Corsi discussed his extensive research into the killing of Kennedy. The ballistics evidence proves that more than one shooter was involved, and that the lone gunman theory is false, he said. When Kennedy was brought into the Parkland Hospital after the shooting, the doctors recorded an entrance wound in the front of the head. But in examining frames from the end of the Zapruder film, when the car was about to go under the underpass, you can see the back of JFK's head is blown out. Lee Harvey Oswald, shooting supposedly from the Book Depository, was positioned behind Kennedy, and therefore couldn't have been the only shooter, Corsi stated. "A shot from the front means there was two shooters at least." One reason for JFK's assassination was that he wouldn't go along with an arranged New World Order, and refused to use the US military to support business interests, and he planned to dismantle the CIA, Corsi outlined. He named Allen Dulles, the former head of the CIA, as one of the planners of the JFK assassination and detailed how that in addition to Dallas, there were 2 other attempts to kill the President in November 1963
  •  
    Wrong link and title here, Gary.
1 - 20 of 98 Next › Last »
Showing 20 items per page