Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged fallout

Rss Feed Group items tagged

Paul Merrell

Fallout from Obama's Russia Strategy Is Spreading through Europe - Yahoo Finance - 0 views

  • The Obama administration’s sanctions against Russia, reluctantly supported by the Europeans, bite more deeply every day. But it is also clearer with each daily news report that Russians are not going to suffer alone.
  • The Obama administration’s sanctions against Russia, reluctantly supported by the Europeans, bite more deeply every day. But it is also clearer with each daily news report that Russians are not going to suffer alone.
  • Russia’s immediate neighbors and the Europeans will, too. And—not to be missed—so will the trans-Atlantic alliance that has served as the backbone of Western policy since the postwar order was established 70 years ago next spring.This president is intent on making history. But does he distinguish between good history and the other kind?
  • ...5 more annotations...
  • It’ll be the other kind if the European Union swoons into another recession as a consequence of America’s geopolitical ambitions to Europe’s east. Emphatically it’ll be the other kind if Obama hastens a drift in Washington’s ties to the European capitals that have been faintly discernible, if papered over, for decades.     Let’s look at this from all angles.
  • On Friday the Polish zloty hit a 15-month low against the euro—straight-ahead fallout from Russia’s crisis. Among the CIS nations, Belarus just doubled interest rates, to 50 percent, and imposed a 30 percent tax on forex transactions.Kyrgyzstan is closing private currency exchanges, and Armenia is letting the dram, its currency, collapse—17 percent in the past month—in a policy it calls “hyper-devaluation.” Further afield, the Indian rupee, the South African rand, and the Turkish lira are among the emerging-market currencies taking hits from the ruble crisis.Flipping these eggs over, Switzerland just imposed negative interest rates to discourage a stampede of weak-currency holders from piling into the franc in search of a safe haven.
  • What happened as E.U. ministers and heads of state convened in Brussels last week can come as no surprise.On one hand, German Chancellor Angela Merkel and British Prime Minister David Cameron insisted that Europeans must “stay the course” on Russia. Just before the Brussels summit, the E.U. barred investments in Crimea—a gesture more than anything else, but one with clear intent. On the other hand, deep divisions are now on the surface. Italian Prime Minister Matteo Renzi declared “absolutely no” to more sanctions, and François Hollande seemed to say no to the sanctions already in place. Noting signs of progress on Ukraine, the French president said, “If gestures are sent by Russia, as we expect, there would be no reason to impose new sanctions, but on the contrary to look at how we could bring about a de-escalation from our side.”Danish Foreign Minister Martin Lidegaard asserted that the sanctions already in place may be hitting too hard. We want to modulate Russia’s behavior, he said in an especially astute distinction, not destroy Russia’s economy.
  • In short, two serious fissures are emerging as the hard line against Russia advances. One, the E.U. is plainly getting fractious. Reflecting the rainbow of political tendencies among their leaders, Europeans may have reached their limit in acquiescing in the Obama administration’s tough-and-getting-tougher policies. Note, in this context: Europe has nothing like the fiscal and monetary wherewithal it had six years ago to withstand another bout of financial and economic contagion. Two, Obama appears ever closer to overplaying America’s hand with the Europeans. Tensions between Washington and Europe have simmered just out of sight since the Cold War decades. There are significant signs now that Obama has let the Ukraine crisis worsen them to the point the tenor of trans-Atlantic ties is permanently modulated. If this goes any further it will be very big indeed. 
  • Question: Do President Obama’s big-think people at State and the Treasury know the magnitude of the game they’re playing? This is the issue the economic fallout of sanctions and the new shifts in Europe raise. Follow-on query, not pleasant to ask but it must be put: Does Obama have any big thinkers in either department? As the consequences of this administration’s Russia policy unfurl, they appear to travel on a wing and a prayer—“making it up as they go along,” as a friend and Foreign Service refugee said over lunch the other day.
Paul Merrell

First to Fall? Panama Papers Bring Down Iceland PM, Portending Future Fallout | Common ... - 0 views

  • In the first instance of a prominent politician taken down by the 11.5 million documents leaked in the Panama Papers, Iceland Prime Minister Sigmundur Davíð Gunnlaugsson resigned on Tuesday after fully 10 percent of Iceland's population rallied in protest of his wife's secret, offshore shell company holding millions. Gunnlaugsson was asked about the account on the day the leak was announced in a television interview, and he walked out rather than answer the question:
  • The next day, "an estimated 22,000 Icelanders slung eggs and protested outside the Parliament building" demanding his resignation, as Common Dreams reported. Gunnlaugsson initially refused to bow to the public pressure, but eventually announced his resignation on Tuesday evening.
  • News editor of the Reykjavík Grapevine Paul Fontaine said Tuesday, "While the Prime Minister's particular role in the Panama Papers leak is huge, and I don't want to downplay it, I also don't want to downplay the involvement other Icelanders—and the countless others around the world—also had in this." "This extends beyond the prime minister; it reaches parliament, it reaches Reykjavík City Hall, and it reportedly reaches hundreds of as yet unnamed Icelandic businesspeople," Fontaine pointed out. "The greater crime, which the Panama Papers illustrate comprehensively, is that we have a secret economy connected to and even supporting some of the worst aspects of the global capitalist system."
  • ...5 more annotations...
  • Meanwhile, Ukraine's president faces possible impeachment proceedings for his offshore holdings in the British Virgin Islands, and the Chilean head of anti-corruption group Transparency International resigned Tuesday after the Panama Papers revealed his own use of secret shell companies.
  • Relatively few Americans have been named in the leak thus far, perhaps pointing to the country's status as one of the foremost locales for creating shell corporations like those documented in the Panama Papers. "Americans can form shell companies right in Wyoming, Delaware or Nevada," said Shima Baradaran Baughman, a law professor at the University of Utah, in an interview with Fusion. "They have no need to go to Panama to form a shell company to use for illicit activities."
  • David Dayen explored in depth the paltry U.S. regulations around onshore shell companies in Salon: "While we force foreign financial institutions to give up information on accounts held by U.S. taxpayers through the Foreign Account Tax Compliance Act of 2010, we don’t reciprocate by complying with international disclosure requirements standardized by the Organization for Economic Co-Operation and Development (OECD) and agreed to by 97 other nations. As a result, the U.S. is becoming one of the world’s foremost tax havens."
  • President Barack Obama addressed the Panama Papers leak for the first time on Tuesday, condemning the laws that make offshore tax havens legal. But those words rang hollow to many observers who recalled that the Obama Administration was behind the very trade deal, Panama TPA, that enshrined the rights of firms such as Mossack Fonseca to funnel millions into untraceable offshore shell companies. As Common Dreams noted, "Much of [Mossack Fonseca's] activities were not necessarily illegal—thanks to agreements such as the Panama TPA." It is worth noting that Bernie Sanders advocated against the deal.
  • Reform also seems unlikely should Hillary Clinton become the Democratic party's nominee, considering that she and her husband own a shell corporation such as the ones documented in the Panama Papers, as the Associated Press reported last year. Unnamed officials told the AP that "the entity was a 'pass-through' company designed to channel payments to the former president." Thanks to the nature of the laws surrounding such corporations, Clinton is not required to disclose the company's existence or earnings in her campaign finance reports. Still, observers are hopeful that this record-shattering leak will drum up enough public pressure to not only topple prominent politicians, but to also propel the efforts of groups seeking real legislative reform. "The Panama Papers are a boost to the global movement to stop tax-haven abuse and recapture trillions of the hidden wealth of nations," wrote author Chuck Collins in The Nation. "This story isn’t going away anytime soon."
Gary Edwards

The Project To Restore America - 0 views

  •  
    Yes, it's a confusing proposal - but not when compared to what we have now; a financial industry run by "To-Big-To-Fail Banks" able to loot the public treasury at will.  Never to Big to Bail, and taxpayers voted for four more years of looting.  Limited Purpose Banking is based on equity.  Which is quite different from the fractional-reserve-lending model used by the To-Big-Fail Banksters. "The history of banking is a long and sorry record of promises that can't be kept - promises that were either overly optimistic or outright fraudulent. Since banks are leveraged, failing to deliver on their promises leads them to collapse. But unlike standard bankruptcies, bank failures produce enormous economic fallout.   There's a reason. Banks not only market financial products. They also make financial markets. Markets, be they for apples or loans, constitute critical public goods whose provision should not be jeopardized.     Making a market -- getting buyers and sellers to meet at the same time and place always represents a feat of coordination. The main purpose of banks is to effect financial coordination - to bring together borrowers and lenders and investors and savers.     When banks fail, particularly large ones, this coordination breaks down. Moreover, bank failures can be contagious. Any given bank's failure raises the prospect that fraud or very poor judgment was at fault and that other banks are engaged in the same practice. This leads to runs on, actually away from, banks in general. In addition, since banks borrow and lend to one another, the failure of bank A can bring bank B down if A owes money to B.     Worst of all, financial collapse, even by a few major financial players can coordinate non-financial companies as well as households on the belief that times are bad. And when millions of separate firms and tens of millions of households start expecting bad times, they take actions to make bad times happen. Thus, the state of confidence, what Key
Paul Merrell

Lawmaker Says There More To NSA Spying - Business Insider - 0 views

  • A House Democrat said information revealed about the National Security Agency's secret surveillance programs are "the tip of the iceberg," Daniel Strauss of The Hill reports. "I think it's just broader than most people even realize, and I think that's, in one way, what astounded most of us, too," Rep. Loretta Sanchez (D-Calif.) told C-SPAN's "Washington Journal" after a classified briefing with national security officials. Rep. Joe Barton (R-Texas), who also attended the meeting, said that the NSA "violated the spirit of the law when it started collecting data from everyone in the country just because technology now makes that possible.” Barton added that "in America ... You don’t target everyone and violate their 4th Amendment rights just because of a handful of threats. But that is exactly what is happening at the NSA ... it is wrong and it needs to stop now.” More from Sanchez: "I don't know if there are other leaks, if there's more information somewhere, if somebody else is going to step up, but I will tell you that I believe it's the tip of the iceberg."
  • A House Democrat said information revealed about the National Security Agency's secret surveillance programs are "the tip of the iceberg," Daniel Strauss of The Hill reports. "I think it's just broader than most people even realize, and I think that's, in one way, what astounded most of us, too," Rep. Loretta Sanchez (D-Calif.) told C-SPAN's "Washington Journal" after a classified briefing with national security officials. Rep. Joe Barton (R-Texas), who also attended the meeting, said that the NSA "violated the spirit of the law when it started collecting data from everyone in the country just because technology now makes that possible.” Barton added that "in America ... You don’t target everyone and violate their 4th Amendment rights just because of a handful of threats. But that is exactly what is happening at the NSA ... it is wrong and it needs to stop now.”
  • Glenn Greenwald of the Guardian, who has served as a conduit for Snowden's leaks, recently said that there will me many more "significant revelations that have not yet been heard." Greenwald told The New York Times that he received “thousands” of classified documents — “dozens” of which are newsworthy — from the the 29-year-old ex-Booz Allen employee who was contracted by the NSA. Sanchez said that what lawmakers learned "is significantly more than what is out in the media today," which is interesting when considering previous reports by journalists and whistleblowers.
  • ...2 more annotations...
  • Here's a rundown of the reports and the allegations: In 2006 NSA insiders told Leslie Cauley of USA Today that the NSA has been collecting almost all U.S. phone records since shortly after 9/11. In 2010 Dana Priest and William Arkin of The Washington Post reported that "collection systems at the [NSA] intercept and store 1.7 billion emails, phone calls, and other types of communications" every day. According to a 2007 lawsuit, Verizon built a fiber optic cable to give the "access to all communications flowing through the carrier’s operations center." In April 2012 Wired's James Bamford reported how the U.S. government hired two secretive Israeli companies to wiretap AT&T. AT&T engineer Mark Klein discovered the "secret room" at AT&T central office in San Francisco, through which the NSA actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T" through the wiretapping rooms, emphasizing that "much of the data sent through AT&T to the NSA was purely domestic." Former NSA executive and whistleblower Thomas Drake testified that the NSA is using Israeli-made hardware to "seize and save all personal electronic communications."
  • A classified program called Prism, leaked by Snowden, appears to acquire information from the servers of nine of the biggest internet companies. The Washington Post reported that the government's orders "serve as one-time blanket approvals for data acquisition and surveillance on selected foreign targets for periods of as long as a year." NSA Whistleblower William Binney that the NSA began using the program he built (i.e. ThinThread) to use communications data for creating, in real time, profiles of nearly all Americans so that the government is "able to monitor what people are doing" and who they are doing it with. In July the Foreign Intelligence Surveillance Court (FISC), established to "hear applications for and grant orders approving electronic surveillance," found that the NSA violated the Fourth Amendment's restriction against unreasonable searches and seizures "on at least one occasion." BONUS: In March CIA Chief Technology Officer Ira "Gus" Hunt said: "It is really very nearly within our grasp to be able to compute on all human generated information." If there is "significantly more" to the NSA's domestic snooping, then we're all ears and eyes.
Paul Merrell

T h e L i b e r t a r i a n: Is US public opinion on Israel shifting? - 0 views

  • A recent public opinion poll asked Americans which of two options they would favour if a two-state solution to the Israel-Palestine conflict was no longer on the table. (It is in the rhetoric of leaders and diplomats but not in reality.) The two options were: The continuation of Israel’s Jewish majority [presumably this assumes permanent Israeli occupation of the West Bank and continuing ethnic cleansing of it by stealth] even if it means that Palestinians will not have citizenship and full rights. One democratic state for all in which Jews and Arabs would be equal.   Only 24 per cent supported the continuation of things as they are.
  •  According to the poll,  65 per cent of those asked for their opinion preferred the one-state option. What explains this? Is it that an apparent majority of Americans are at last understanding and supporting the need and rights of the Palestinians for justice, or is it something else – an indication that while they are not much concerned about the rights of the Palestinians, an apparent majority of Americans are fed up with an Israel they rightly perceive to be the obstacle to peace?
  • Whatever the reason for it – empathy with the Palestinian claim for justice or not – a significant shift in American public opinion really does seem to be underway. Staying with Gideon Levy’s analogy, this might explain why President Obama felt free enough to suggest to occupation addict Netanyahu that he and Israel should consider rehab.
  • ...5 more annotations...
  • We do not know whether or not Obama had the balls to say this to Netanyahu face to face, but even if he didn’t, Netanyahu would still have got the message. Akiva Eldar’s interpretation of Obama’s message to Netanyahu via Goldberg was that he, the president, “is sick and tired of fighting on Netanyahu’s behalf vis-a-vis the Europeans and automatically vetoing (in the UN Security Council) their proposals condemning the settlements”.
  • And he explained what he meant with these words. “If Israel sees no peace deal and continued aggressive settlement construction,” and “if Palestinians come to believe that the possibility of a contiguous sovereign Palestinian state is no longer within reach, then our ability to manage the international fallout is going to be limited.”
  • Obama did so in an interview with Jeffrey Goldberg for “Bloomberg View“ shortly before he received Netanyahu in the White House. Obama’s message to Netanyahu via Goldberg included the statement that “There is a limit to the power of the man who bears the title leader of the free world.”
  •  But there was more to Obama’s message than that. He was effectively saying that if Israel continues to be opposed to peace on terms the Palestinians can accept, no occupant of the White House will be able to protect Israel from the tightening noose of isolation and sanctions.
  • Note In a most remarkable article for Haaretz on 7 March (“If I were an American Jew, I’d worry about Israel’s racist cancer”), Daniel Blatman, a history professor at the Hebrew University of Jerusalem, called on American Jews to end their silence “and cooperate with the shrinking groups of Israelis who have not yet lost hope that it’s possible to stop this downslide towards the abyss.”
Paul Merrell

2013 mass surveillance disclosures - Wikipedia, the free encyclopedia - 0 views

  • 1 Historical context 1.1 Origins of clandestine surveillance in the United States (1919–78) 1.2 Mass surveillance in a global context (1988-2000) 1.3 9/11 and its implications on mass surveillance (2001–2009) 1.4 Acceleration of media leaks (2010–present) 2 Summary of NSA surveillance 2.1 Purposes 2.2 Targets 2.3 International cooperation 3 2013 Disclosures by category 3.1 Court Orders, Memos and Policy Documents 3.2 Reports 3.3 Collection and Analysis Programs or Hardware 3.4 Relationships with Corporate Partners 3.5 NSA Databases 3.6 Signals Intelligence Directorates (SIDs) 3.7 Technical Directorates 3.8 Names associated with specific targets 3.9 Uncategorized or insufficiently described codenames. 3.10 GCHQ Operations 3.11 NSA Operations 3.12 NSA Relationships with Foreign Intelligence services 3.13 Unrelated to Edward Snowden 4 Media reports 4.1 Chronology 4.2 Disclosures 4.3 Violation of civil liberties and international law 5 Fallout 5.1 Counter-terrorism and national security 5.2 Impact on foreign relations 5.3 Amash/Conyers Amendment 5.4 Public reaction 5.4.1 Petitions 5.4.2 Protests 6 Media related to the disclosures 7 See also 8 References 9 Further reading
  •  
    Wikipedia begins pulling its act together on coverage of the NSA scandal. This article is, at least for the time being, a major NSA scandal research resource. But wait to see how soon NSA sock puppets bowdlerize it. The occasional snapshot downloaded or stored in e.g., Zotero, is advisable.   
  •  
    Wow. Diigo handled the markup just fine in My Library but decided to display the raw HTML here. That's got to be a bug. Click through to Wikipedia and look at the table of contents. That's what buried in the markup above.
Paul Merrell

Internet Giants Erect Barriers to Spy Agencies - NYTimes.com - 0 views

  • As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps.
  • After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. Google, for example, is laying its own fiber optic cable under the world’s oceans, a project that began as an effort to cut costs and extend its influence, but now has an added purpose: to assure that the company will have more control over the movement of its customer data.
  • A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant.
  • ...8 more annotations...
  • Eric Grosse, Google’s security chief, suggested in an interview that the N.S.A.'s own behavior invited the new arms race.“I am willing to help on the purely defensive side of things,” he said, referring to Washington’s efforts to enlist Silicon Valley in cybersecurity efforts. “But signals intercept is totally off the table,” he said, referring to national intelligence gathering.“No hard feelings, but my job is to make their job hard,” he added.
  • Hardware firms like Cisco, which makes routers and switches, have found their products a frequent subject of Mr. Snowden’s disclosures, and their business has declined steadily in places like Asia, Brazil and Europe over the last year. The company is still struggling to convince foreign customers that their networks are safe from hackers — and free of “back doors” installed by the N.S.A. The frustration, companies here say, is that it is nearly impossible to prove that their systems are N.S.A.-proof.
  • Many point to an episode in 2012, when Russian security researchers uncovered a state espionage tool, Flame, on Iranian computers. Flame, like the Stuxnet worm, is believed to have been produced at least in part by American intelligence agencies. It was created by exploiting a previously unknown flaw in Microsoft’s operating systems. Companies argue that others could have later taken advantage of this defect.Worried that such an episode undercuts confidence in its wares, Microsoft is now fully encrypting all its products, including Hotmail and Outlook.com, by the end of this year with 2,048-bit encryption, a stronger protection that would take a government far longer to crack. The software is protected by encryption both when it is in data centers and when data is being sent over the Internet, said Bradford L. Smith, the company’s general counsel.
  • Mr. Smith also said the company was setting up “transparency centers” abroad so that technical experts of foreign governments could come in and inspect Microsoft’s proprietary source code. That will allow foreign governments to check to make sure there are no “back doors” that would permit snooping by United States intelligence agencies. The first such center is being set up in Brussels.Microsoft has also pushed back harder in court. In a Seattle case, the government issued a “national security letter” to compel Microsoft to turn over data about a customer, along with a gag order to prevent Microsoft from telling the customer it had been compelled to provide its communications to government officials. Microsoft challenged the gag order as violating the First Amendment. The government backed down.
  • In Washington, officials acknowledge that covert programs are now far harder to execute because American technology companies, fearful of losing international business, are hardening their networks and saying no to requests for the kind of help they once quietly provided.Continue reading the main story Robert S. Litt, the general counsel of the Office of the Director of National Intelligence, which oversees all 17 American spy agencies, said on Wednesday that it was “an unquestionable loss for our nation that companies are losing the willingness to cooperate legally and voluntarily” with American spy agencies.
  • In one slide from the disclosures, N.S.A. analysts pointed to a sweet spot inside Google’s data centers, where they could catch traffic in unencrypted form. Next to a quickly drawn smiley face, an N.S.A. analyst, referring to an acronym for a common layer of protection, had noted, “SSL added and removed here!”
  • Facebook and Yahoo have also been encrypting traffic among their internal servers. And Facebook, Google and Microsoft have been moving to more strongly encrypt consumer traffic with so-called Perfect Forward Secrecy, specifically devised to make it more labor intensive for the N.S.A. or anyone to read stored encrypted communications.One of the biggest indirect consequences from the Snowden revelations, technology executives say, has been the surge in demands from foreign governments that saw what kind of access to user information the N.S.A. received — voluntarily or surreptitiously. Now they want the same.
  • The latest move in the war between intelligence agencies and technology companies arrived this week, in the form of a new Google encryption tool. The company released a user-friendly, email encryption method to replace the clunky and often mistake-prone encryption schemes the N.S.A. has readily exploited.But the best part of the tool was buried in Google’s code, which included a jab at the N.S.A.'s smiley-face slide. The code included the phrase: “ssl-added-and-removed-here-; - )”
Paul Merrell

Revealed: NSA pushed 9/11 as key 'sound bite' to justify surveillance | Al Jazeera America - 0 views

  • The National Security Agency advised its officials to cite the 9/11 attacks as justification for its mass surveillance activities, according to a master list of NSA talking points. The document, obtained by Al Jazeera through a Freedom of Information Act request, contains talking points and suggested statements for NSA officials (PDF) responding to the fallout from media revelations that originated with former NSA contractor Edward Snowden. Invoking the events of 9/11 to justify the controversial NSA programs, which have caused major diplomatic fallout around the world, was the top item on the talking points that agency officials were encouraged to use. Under the subheading “Sound Bites That Resonate,” the document suggests the statement “I much prefer to be here today explaining these programs, than explaining another 9/11 event that we were not able to prevent.”
  • NSA head Gen. Keith Alexander used a slightly different version of that statement when he testified before Congress on June 18 in defense of the agency’s surveillance programs. Asked to comment on the document, NSA media representative Vanee M. Vines pointed Al Jazeera to Alexander’s congressional testimony on Tuesday, and said the agency had no further comment. In keeping with the themes listed in the talking points, the NSA head told legislators that “it is much more important for this country that we defend this nation and take the beatings than it is to give up a program that would result in this nation being attacked.” Critics have long noted the tendency of senior U.S. politicians and security officials to use the fear of attacks like the one that killed almost 3,000 Americans to justify policies ranging from increased defense spending to the invasion of Iraq.
  • Al Jazeera obtained the 27 pages of talking points from the NSA this week in response to a FOIA request filed June 13. The statements had been prepared for agency officials facing questions from Congress or the media over the revelations contained in classified documents that Snowden leaked to journalists Glenn Greenwald, Barton Gellman and others. A letter accompanying the documents notes that the talking points “are prepared and approved for a speaker to use and do not necessarily represent what the speaker actually said at the event.” The NSA has not yet turned over to Al Jazeera the documents the agency used to prepare the talking points, saying those materials require additional review before they can be released.  The attacks on the World Trade Center and the Pentagon also appear at the top of another talking-points document titled “Media Leaks One Card,” which contains 13 bullet points to explain the rationale behind the surveillance programs. Those points include “First responsibility is to defend the nation” and “NSA and its partners must make sure we connect the dots so that the nation is never attacked again like it was on 9/11.”
  • ...2 more annotations...
  • The master talking points list goes on to explain, under a subheading titled “We Needed to Connect the Dots,” that “post-9/11 we made several changes and added a number of capabilities to enable us to connect the dots.” Continuing revelations from the Snowden documents reveal surveillance on a scale that appears to go far beyond the scope of monitoring potential attackers, however. The agency’s “head of state collection” program, for example, reportedly included the monitoring of German Chancellor Angela Merkel’s mobile phone. The talking points document advises officials to emphasize the word “lawful” when discussing NSA surveillance programs, and to state that “our allies have benefited … just as we have.” “We believe that over 100 nations are capable of collecting signals intelligence or operating a lawful intercept capability that enable them to monitor communications,” the document continued.
  • Critics have called into question the veracity of the claim that NSA surveillance has thwarted more than 50 “potential” attacks. They claim evidence to support such assertions is lacking. NSA officials are advised to respond to questions about any potential civil liberties violations by citing talking points that say there have not been any “willful violations” and that the NSA is committed to “upholding the privacy and civil liberties of the American people.”
  •  
    27 pages of talking points appended to the article, plus a two-page cover letter. It's the scripts for just about everything official that's been coming out of NSA and the Administration. Interesting reading; they cover some things that haven't yet come up.   
Gary Edwards

How the Money Vanished - The Bear Stearns "House of Cards" story by William Cohan - 0 views

  • At 2:00 a.m. on Friday -- Mr. Cohan tells us -- Mr. Geithner called Donald Kohn, the vice chairman of the Federal Reserve, and told him that he "wasn't confident that the fallout from the bankruptcy of Bear Stearns could be contained." Taxpayers reading this fascinating tale may wonder whether the fallout from the government's intervention can be contained and, if so, at what cost.
  •  
    Meeting the characters in "House of Cards," it's not easy to conceive of people less deserving of federal assistance. In 1997, Bear Stearns helped pioneer the subprime mortgage-backed security by serving as co-underwriter on a $385 million offering. By the mid-2000s, Bear was the leading issuer of such securities and a leader in collateralized debt obligations, which offered even less transparency to investors. Bear was a vertically integrated manufacturer of mortgage chaos, making individual loans to home buyers, servicing the loans, bundling them into pools for investors, marketing the securities and also borrowing huge sums to finance internal hedge funds that held onto these dodgy assets. House of Cards By William D. Cohan (Doubleday, 468 pages, $27.95) Mr. Cohan describes the succession of government policies that encouraged Bear and others to invest so heavily in mortgage finance, from the Fed's easy money to Clinton-era changes to the Community Reinvestment Act requiring more loans to low-income borrowers. But the firm itself deserves the lion's share of the blame for its own collapse. Suggestions to sell some of its risky mortgage assets, or to raise capital, or to consider merger partners were brushed aside in the years and months leading up to the debacle. Paul Friedman, chief operating officer of Bear's fixed-income division, tells Mr. Cohan that "we did this to ourselves. . . . It's our fault for allowing it to get this far, and for not taking any steps to do anything about it."
Paul Merrell

EU Wants U.S. Firms to Help Mitigate Data-Protection Concerns - WSJ - 0 views

  • American businesses could be required to report requests by U.S. intelligence services for data on European online users under a trans-Atlantic data-transfer pact now being negotiated, according to the European Union’s justice commissioner.
  •  
    Fallout from the Court of Justice's Safe Harbor decision?
Paul Merrell

Obama administration under pressure as US senators demand end to secrecy | World news |... - 0 views

  • The fallout from the affair continued to have international ramifications. German government spokesman Steffen Seibert told reporters on Monday that the chancellor, Angela Merkel, would question Obama about the NSA program when he visits Berlin on 18 June. The issue could tarnish a visit that both sides had hoped would reaffirm strong German-American ties.In a heated debate in the European parliament on Tuesday, lawmakers complained that for a decade they had yielded to US demands for access to European financial and travel data and said it was time to re-examine the deals and to limit data access.
  • "We need to step back here and say clearly: mass surveillance is not what we want," said Jan Philipp Albrecht, a German Green lawmaker in charge of overhauling the EU's outdated data protection laws.Lawmakers said the EU privacy overhaul and existing transatlantic data-sharing deals – the Swift agreement on sharing financial transaction data and an agreement on airline passenger name records – were in jeopardy. "It is time we grasped the nettle here and put our minds to ending the program," said Martin Ehrenhauser, an Austrian independent member of the European parliament.
Paul Merrell

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
Paul Merrell

The academic paper that predicted the NSA scandal | War of Ideas - 0 views

  • If you've been following the fallout from last week's NSA surveillance revelations, you may have seen repeated reference to a certain "recent MIT study." "Unique in the Crowd: The Privacy Bounds of Human Mobility," published in Nature's Scientific Reports last year, has been cited by multiple media sources, including this one, as evidence for why -- contra Dianne Feinstein -- your metadata matters. Indeed, re-examined in light of the current headlines, the concerns raised by the study seem quite prescient. The paper's authors, Yves-Alexandre de Montjoye, César A. Hidalgo, Michel Verleysen, and Vincent D. Blondel of MIT and the Universite Catholique de Louvain, examined a dataset of 15 months of anonymous cell-phone data from 1.5 million people in a "small European country." (They're a bit coy about how they obtained the data.) There were no names, addresses, or phone numbers in the data, yet they argue that "if individual's patterns are unique enough, outside information can be used to link the data back to an individual." In fact, just four points of observation -- time of the call and the nearest cell-phone tower -- were enough to identify 95 percent of individuals in the database.
Paul Merrell

Turkey finds sarin gas in homes of suspected Syrian Islamists - reports - RT News - 0 views

  • Turkish security forces found a 2kg cylinder with sarin gas after searching the homes of Syrian militants from the Al-Qaeda linked Al-Nusra Front who were previously detained, Turkish media reports. The gas was reportedly going to be used in a bomb.
  • In March, the Syrian government invited the United Nations to investigate possible chemical weapons use in the Khan al-Assal area of rural Aleppo. Military experts and officials said a chemical agent, most likely sarin, was used in the attack which killed 26 people, including government forces. Damascus claimed Al-Qaeda linked fighters were behind the attack, further alleging Turkey had a hand in the incident. “The rocket came from a placed controlled by the terrorist and which is located close to the Turkish territory. One can assume that the weapon came from Turkey,” Zoabi said in an interview with Interfax news agency.
  • US President Barack Obama has warned any confirmed use of chemical weapons by Damascus would cross a "red line" which would prompt further action. Both Washington and London claimed there was growing evidence that such chemical agents had been used. Less clear perhaps is whether a similar red line would apply to Syrian opposition groups such as Al-Nusra by the US and NATO allies.
  • ...2 more annotations...
  • This case being similar to an earlier one, with the findings of UN chemical weapons expert Carla Del Ponte  - who had found evidence of their use by the rebels – some think the fallout will be what it was then as well. Journalist and RT contributor, Afshin Rattansi believes that the same fate will befall this story, as far as media coverage goes. All possible doubts will either be hushed or directed elsewhere, as they were toward Del Ponte’s findings. “Carla Del Ponte – one of the greatest experts on this from the United Nations – did do an in-depth investigation only a few weeks ago, and of course, the mainstream media tried their best to ignore it and to character-assassinate Del Ponte… she did masses of work on this, and [found] It was the rebels and not the government.”
  • A day before the Reyhanlı bombing, Erdogan released a statement claiming he had evidence the Syrian government had had used chemical weapons, crossing the red line set by President Obama.The accusation contradicted a statement made at the time by a leading UN investigator.Carla Del Ponte, who heads The Independent International Commission of Inquiry on Syria, said there were “concrete suspicions but not yet incontrovertible proof of the use of sarin gas” in Syria. "This was use on the part of the opposition, the rebels, not by the government authorities," Del Ponte continued.
Paul Merrell

GCHQ taps fibre-optic cables for secret access to world's communications | UK news | gu... - 0 views

  • Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
  • GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called "the largest programme of suspicionless surveillance in human history"."It's not just a US problem. The UK has a huge dog in this fight," Snowden told the Guardian. "They [GCHQ] are worse than the US."
  • However, on Friday a source with knowledge of intelligence argued that the data was collected legally under a system of safeguards, and had provided material that had led to significant breakthroughs in detecting and preventing serious crime.Britain's technical capacity to tap into the cables that carry the world's communications – referred to in the documents as special source exploitation – has made GCHQ an intelligence superpower.By 2010, two years after the project was first trialled, it was able to boast it had the "biggest internet access" of any member of the Five Eyes electronic eavesdropping alliance, comprising the US, UK, Canada, Australia and New Zealand.UK officials could also claim GCHQ "produces larger amounts of metadata than NSA". (Metadata describes basic information on who has been contacting whom, without detailing the content.)By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: "We have a light oversight regime compared with the US".
  • ...8 more annotations...
  • When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was "your call".The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
  • For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.This was done under secret agreements with commercial companies, described in one document as "intercept partners".The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned "sensitive relationship teams" and staff were urged in one internal guidance paper to disguise the origin of "special source" material in their reports for fear that the role of the companies as intercept partners would cause "high-level political fallout".
  • The GCHQ documents that the Guardian has seen illustrate a constant effort to build up storage capacity at the stations at Cheltenham, Bude and at one overseas location, as well a search for ways to maintain the agency's comparative advantage as the world's leading communications companies increasingly route their cables through Asia to cut costs. Meanwhile, technical work is ongoing to expand GCHQ's capacity to ingest data from new super cables carrying data at 100 gigabits a second. As one training slide told new users: "You are in an enviable position – have fun and make the most of it."
  • The categories of material have included fraud, drug trafficking and terrorism, but the criteria at any one time are secret and are not subject to any public debate. GCHQ's compliance with the certificates is audited by the agency itself, but the results of those audits are also secret.An indication of how broad the dragnet can be was laid bare in advice from GCHQ's lawyers, who said it would be impossible to list the total number of people targeted because "this would be an infinite list which we couldn't manage".There is an investigatory powers tribunal to look into complaints that the data gathered by GCHQ has been improperly used, but the agency reassured NSA analysts in the early days of the programme, in 2009: "So far they have always found in our favour".
  • Historically, the spy agencies have intercepted international communications by focusing on microwave towers and satellites. The NSA's intercept station at Menwith Hill in North Yorkshire played a leading role in this. One internal document quotes the head of the NSA, Lieutenant General Keith Alexander, on a visit to Menwith Hill in June 2008, asking: "Why can't we collect all the signals all the time? Sounds like a good summer project for Menwith."By then, however, satellite interception accounted for only a small part of the network traffic. Most of it now travels on fibre-optic cables, and the UK's position on the western edge of Europe gave it natural access to cables emerging from the Atlantic.
  • The processing centres apply a series of sophisticated computer programmes in order to filter the material through what is known as MVR – massive volume reduction. The first filter immediately rejects high-volume, low-value traffic, such as peer-to-peer downloads, which reduces the volume by about 30%. Others pull out packets of information relating to "selectors" – search terms including subjects, phone numbers and email addresses of interest. Some 40,000 of these were chosen by GCHQ and 31,000 by the NSA. Most of the information extracted is "content", such as recordings of phone calls or the substance of email messages. The rest is metadata.
  • "The criteria are security, terror, organised crime. And economic well-being. There's an auditing process to go back through the logs and see if it was justified or not. The vast majority of the data is discarded without being looked at … we simply don't have the resources."However, the legitimacy of the operation is in doubt. According to GCHQ's legal advice, it was given the go-ahead by applying old law to new technology. The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary.However, an obscure clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad. But the nature of modern fibre-optic communications means that a proportion of internal UK traffic is relayed abroad and then returns through the cables.
  • British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
  •  
    Note particularly that the Brit criteria adds economic data to the list of categories categories the NSA trawls for and shares its data with the U.S. NSA. Both agencies claim to be targeting foreigners, so now we're into the "we surveil your citizens; you surveil our citizens, then we'll share the results" scenario that leaves both sides of the pond with a superficial excuse to say "we don't surveil our own citizens, just foreigners." But it's just ring-around-the-rosy. 850,000 NSA employees and U.S. private contractors with access to GCHQ surveillance databases.  Lots more in the article that I didn't highlight.
Paul Merrell

With Powerful Videos, 9/11 Families Push Congress on JASTA | 28Pages.org - 0 views

  • As the fifteenth anniversary of the 9/11 attacks draws closer, family members of those lost in the attacks are making an emotional appeal to Congress to clear the way for their lawsuit against the Kingdom of Saudi Arabia for its alleged financial and logistical support of the hijackers. In an effort led by the September 11th Advocates—five women who lost loved ones in the attacks—surviving family members and other concerned members of the public are posting videos to a Facebook page and a YouTube channel in which they urge the House of Representatives to promptly pass the Justice Against Sponsors of Terrorism Act (JASTA) when they return from summer recess on Tuesday, September 6.
  • The bill, which would modify U.S. sovereign immunity law to allow suits against foreign government sponsors of terrorism, passed the Senate by unanimous voice vote. Now, the September 11th Advocates are pressing Speaker of the House Paul Ryan and House Majority Leader Kevin McCarthy to schedule a vote on the measure before the 15th anniversary of the attacks.
  • Though the measure passed the Senate unanimously, Breitweiser says JASTA faces formidable opposition down the stretch. Saudi Arabia has warned Congress and the White House that it may be compelled to divest upwards of a $750 billion dollars in U.S. assets if the measure passes, and President Obama has expressed reluctance to sign the bill if it advances to his desk.
Paul Merrell

US Spy Chief Presents Third-Party Debates as Proof RT Is Anti-US - Antiwar.com Blog - 0 views

  • The Office of the Director of National Intelligence’s latest report on the alleged “election hacking” by Russia includes a substantial section focused around the idea that Russian government-funded channel RT is overtly anti-American. This is a common enough accusation, but when set out in a multi-page report format, a lot of the charges fall remarkable short. Nowhere was this more apparent, however, than on the first page of the Annex on RT, which presented the fact that RT America hosted US presidential debates which included third-party candidates. There has of course been long-standing annoyance among many in the US that the “mainstream” US media’s debates consistently exclude all but the Democratic and Republican candidates. US spy agencies, however, see this exclusion as such a core aspect of US democracy that they are presenting more inclusive debates as inherently anti-American. In 2012 RT hosted a third-party candidates debate which included Libertarian Party candidate Gary Johnson and Green Party candidate Jill Stein. In 2016 RT ran a pair of primary debates for the same two parties focusing on foreign policy as well as electoral reform. Beyond giving third parties an avenue of debate, the Annex also accuses RT of myriad other “misdeeds” of a similarly dubious nature, complaining RT introduced the show “Breaking the Set” in 2012 with an eye toward “the promotion of radical discontent,” and ran stories critical of the environmental fallout of fracking.
  • While anti-fracking news is common across a lot of media outlets, the report concluded that the only reason RT could possibly be concerned with the practice was that they were trying to protect the profits of major Russian natural gas giant OAO Gazprom. The report also notes RT coverage of police brutality in the US, its sympathy for the Occupy Wall Street movement, and criticism of mass surveillance as signs they were trying to “undermine viewers’ trust in US democratic procedures.”
  •  
    Note to DNI James Clapper: You've mistakenly conflated the message and the messenger. Millions of Americans were upset by those issues long before RT piled on; have you granted them all Russian citizenship?
Paul Merrell

Democratic National Committee CEO, CFO, & Head Of Communications All Resign Following D... - 0 views

  • The chief executive of the Democratic National Committee has resigned in the wake of an email hack that embarrassed the party on the eve of its presidential nominating convention. That’s according to three Democratic strategists familiar with Amy Dacey’s decision to leave her job. The people spoke on condition of anonymity, because they were not authorized to discuss it publicly. The Democrats say other personnel moves at the party are also expected on Tuesday.
  • Dacey’s resignation is just the latest fallout from the hacked emails, which exposed an apparent lack of neutrality in the primary race between Hillary Clinton and Bernie Sanders, with party officials disparaging Sanders. Earlier, party chairwoman Debbie Wasserman Schultz resigned her position. After being booed at a pre-convention appearance last week in Philadelphia, Wasserman Schultz chose not to speak from the convention stage. Longtime Democratic operative Donna Brazile is serving as the party’s interim chair.
Paul Merrell

NSA 'not interested in' Americans, privacy officer claims | TheHill - 0 views

  • The National Security Agency’s internal civil liberties watchdog insisted on Thursday that the agency has no interest in spying on Americans under its controversial spying tools. “Our employees are trained to not look for U.S. persons,” NSA privacy and civil liberties officer Rebecca Richards said on Thursday.
  • “We’re not interested in those U.S. persons. We’re trying to look away from those,” she added. “Instead, we’re looking for where are our targets?”Richards’s comments came up during a Capitol Hill panel discussion about a new report on U.S. spying from the Brennan Center for Justice.The analysis looks at aspects of a presidential order that dates back to Ronald Reagan and was updated by then-President George W. Bush, called Executive Order 12333.
  • Programs under the order, which is meant to guide foreign surveillance, “have implications for Americans’ privacy that could well be greater than those of their domestic counterparts,” the organization wrote in its analysis. “The vast majority of Americans — whether wittingly or not — engage in communication that is transmitted or stored overseas.”“This reality of the digital age renders Americans’ communications and data highly vulnerable to NSA surveillance abroad.”
  • ...2 more annotations...
  • NSA surveillance under Executive Order 12333 is separate from the agency’s higher profile bulk collection of Americans’ phone records, which ended last year. It also occurs under separate legal powers than a controversial provision of the 2008 update to the Foreign Intelligence Surveillance Act, which comes up for renewal at the end of 2017.The executive order targets foreigners, but can “incidentally” pick up data about Americans if their activity on the Internet crosses international borders, Richards acknowledged.“Our procedures are designed to say: There are occasions when you are going to get U.S. persons,” she said, “and when you get those U.S. persons, here’s the rules.”
  • Richards is the agency’s first ever civil liberties officer. She was hired in early 2014, on the heels of fallout from Edward Snowden’s leaks about the spy agency. 
  •  
    Not interested. Apparently that's why NSA was turning over raw search results to Israel without filtering out "U.S. persons" data. And why they just decided to give other agencies including law enforcement access to raw search results. And why Gen. Keith Alexander personally put together a program to ruin people's reputations including a "U.S. person." And why Russell Tice said that he personally had Obama's NSA dossier in his hands when Obama was running for the U.S. Senate. And why Tice says NSA had similar dossiers on members of Congress and the justices of the U.S. Supreme Court and targeted "lots of lawyers." On and on.  Ms. Richards appears to have become a quick study in NSA's hallmark skill of lying to the public. 
Paul Merrell

Icelandic Justice and Criminal Bankers - nsnbc international | nsnbc international - 0 views

  • On September 15, 2008, a former Goldman Sachs chairman, US Treasury Secretary Henry Paulsen, deliberately triggered a predictable global financial meltdown when he decided to break precedent and let Lehman Bros, the fourth-largest Wall Street investment bank, go bankrupt. The reasons for his decision are for another time. The fallout from that traumatic financial crisis remains very much with the world financial system to this day, more than seven years later. One of the little-noticed casualties of that Lehman Bros. debacle was the worst banking crisis in the history of one of the world’s smallest countries, Iceland. How that country of 323,000 citizens chose to deal with the crisis is a model for the rest of the world. Instead of beatifying the criminal bankers responsible for worst world financial crisis in history, the people of Iceland did something quite different.
  •  
    F. William Engdahl does a great job of summing up the bankster and economic situation in Iceland. 
1 - 20 of 64 Next › Last »
Showing 20 items per page