Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged foundation

Rss Feed Group items tagged

Paul Merrell

Non-Dollar Trading Is Killing the Petrodollar -- And the Foundation of U.S.-S... - 0 views

  • A profound transformation of the global monetary system is underway. It is being driven by a perfect storm: the need for Russia and Iran to escape Western sanctions, the low interest rate policy of the U.S. Federal Reserve to keep the American economy afloat and the increasing demand for Middle East oil by China.The implications of this transformation are immense for U.S. policy in the Middle East which, for 50 years, has been founded on a partnership with Saudi Arabia.
  • A profound transformation of the global monetary system is underway. It is being driven by a perfect storm: the need for Russia and Iran to escape Western sanctions, the low interest rate policy of the U.S. Federal Reserve to keep the American economy afloat and the increasing demand for Middle East oil by China.The implications of this transformation are immense for U.S. policy in the Middle East which, for 50 years, has been founded on a partnership with Saudi Arabia.
  • s economic sanctions are increasingly part of the West's arsenal, those non-Western countries that are the target -- or potential target -- of such sanctions are devising a counterpunch: non-dollar trading. It would, in effect, nullify the impact of sanctions. Whether in yuan or roubles, non-dollar trading -- which enables countries to bypass U.S. claims to legal jurisdiction -- will transform the prospects facing Iran and Syria, particularly in the field of energy reserves, and deeply affect Iraq which is situated between the two. President Putin has said (in the context of reducing Russia's economic vulnerabilities) that he views the dollar monopoly in energy trade as damaging to the Russian economy. Since hydrocarbon revenues form the most substantive part of Russia's revenues, Putin's desire to take action in this area is not surprising. In the face of sanctions, Putin is seeking to reduce its economic dependence on the West. Russia has signed two "holy grail" gas contracts with China and is in negotiations to offer the latter sophisticated weaponry. It is also in the process of finalizing significant trade deals with India and Iran. All of this will be to the benefit of Iran, too: the Russians recently announced a deal to build several new nuclear power plants there.
  •  
    Is this a trend? This is the second article I've read in MSM during the last two days that sounds the alarm that the petrodollar system is collapsing and that de-dollarization is in motion, along with noticing that U.S. fiscal and foreign policy is helping to accelerate de-dollarization. Perhaps the propagandameisters have decided that they can't squelch this information any longer because the alternative press has publicized it too widely?
Paul Merrell

Venezuelans Mobilize in Marches and Military Exercises in Defense of Sovereignty Agains... - 0 views

  • Over 100,000 Venezuelans mobilized throughout the country for a series of national military exercises in defense of their national sovereignty on Saturday.
  • The exercise featured the participation of 20,000 civilian volunteers who joined an additional 80,000 soldiers of the Bolivarian National Armed Forces in nationwide preparations for a potential U.S. aggression against the Bolivarian Republic.  Alongside active duty soldiers participated members of the Bolivarian Militia, which was expanded by over 35,000 members by President Chávez in 2010. The Bolivarian Militia represents the foundation of a popular “civic-military alliance” that has kept the Bolivarian Revolution in power amid repeated efforts to overthrow the government, including the reversed 2002 coup backed by the United States. 
  • Bolivarian soldiers and civilians additionally welcomed the participation of a contingent of Russian soldiers and naval craft, who assisted in exercises testing Venezuela’s air defense system, which included the launching of Russian-made BM-30 Smerch ground to air missiles.  The defensive preparations inaugurated on Saturday will continue over the course of ten days, encompassing approximately 30 exercises. 
  • ...2 more annotations...
  • Thousands of Venezuelans filled the streets of the capital on Sunday in support of a new constitutional enabling law that authorizes President Maduro to pass legislation in defense against U.S. threats to national sovereignty, which was approved in a special session of the National Assembly that very day. Waving banners that read “peace” and “Yankees go home,” the seemingly endless columns of demonstrators reached Miraflores Palace, where they were addressed by President of the Republic Nicolas Maduro. 
  • The last several days have seen large marches in solidarity with Venezuela staged in capitals throughout the world, including Argentina, Paraguay, Bolivia, Ecuador, Cuba, Nicaragua, Spain, China, and Russia. This mood of popular repudiation of U.S. aggression against Venezuela by international civil society was reflected at the regional level in a UNASUR statement rejecting U.S. interference and calling for dialogue. 
  •  
    Gunboat diplomacy by Russia?
Paul Merrell

A Zombie Bill Comes Back to Life: A Look at The Senate's Cybersecurity Information Shar... - 0 views

  • The Senate Intelligence Committee recently introduced the Cybersecurity Information Sharing Act of 2014. It’s the fourth time in four years that Congress has tried to pass "cybersecurity" legislation. Unfortunately, the newest Senate bill is one of the worst yet. Cybersecurity bills aim to facilitate information sharing between companies and the government, but they always seem to come with broad immunity clauses for companies, vague definitions, and aggressive spying powers. Given such calculated violence to users' privacy rights, it’s no surprise that these bills fail every year. What is a surprise is that the bills keep coming back from the dead. Last year, President Obama signed Executive Order 13636 (EO 13636) directing the Department of Homeland Security (DHS) to expand current information sharing programs that are far more privacy protective than anything seen in recent cybersecurity bills. Despite this, members of Congress like Rep. Mike Rogers and Senator Dianne Feinstein keep on introducing bills that would destroy these privacy protections and grant new spying powers to companies.
  • Aside from its redundancy, the Senate's bill grants two new authorities to companies. First, the bill authorizes companies to launch countermeasures for a "cybersecurity purpose" against a "cybersecurity threat." "Cybersecurity purpose" is so broadly defined that it means almost anything related to protecting (including physically protecting) an information system, which can be a computer or software. The same goes for a "cybersecurity threat," which includes anything that "may result" in an unauthorized effort to impact the availability of the information system. Combined, the two definitions could be read by companies to permit attacks on machines that unwittingly contribute to network congestion. The countermeasures clause will increasingly militarize the Internet—a prospect that may appeal to some "active defense" (aka offensive) cybersecurity companies, but does not favor the everyday user. Second, the bill adds a new authority for companies to monitor information systems to protect an entity's rights or property. Here again, the broad definitions could be used in conjunction with the monitoring clause to spy on users engaged in potentially innocuous activity. Once collected, companies can then share the information, which is also called “cyber threat indicators,” freely with government agencies like the NSA.
  • Such sharing will occur because under this bill, DHS would no longer be the lead agency making decisions about the cybersecurity information received, retained, or shared to companies or within the government. Its new role in the bill mandates DHS send information to agencies like the NSA—"in real-time and simultaneous[ly]." DHS is even barred from "delay[ing]" or "interfer[ing]" with the information, which ensures that DHS's current privacy protections won’t be applied to the information. The provision is ripe for improper and over-expansive information sharing. This leads to a question: What stops your sensitive personal information from being shared by companies to the government? Almost nothing. Companies must only remove personally identifiable information if the information is known to be US person information and not directly related to the threat. Such a willful blindness approach is inappropriate. Further, the bill does not even impose this weak minimization requirement on information shared by, and within, the government (including federal, state, local, and tribal governments) thereby allowing the government to share information containing personally identifiable information. The bill should require deletion of all information not directly related to a threat.
  • ...2 more annotations...
  • Once the information is sent to a government agency, it can use the information for reasons other than for cybersecurity purposes. One clause even allows the information to be used to prosecute violations of the Espionage Act—a World War I era law that was meant to prosecute spies but has been used in recent years primarily to go after journalists’ sources. The provisions grant the government far too much leeway in how to use the information for non-cybersecurity purposes. The public won’t even know what information is being collected, shared, or used because the bill will exempt all of it from disclosure under the Freedom of Information Act.
  • The bill also retains near-blanket immunity for companies to monitor information systems, to share information, and to use countermeasures. The high bar immunizes an incredible amount of activity, including negligent damage to property and may deprive private entities of legal recourse if a computer security contractor is at fault for destruction of property. Existing private rights of action for violations of the Wiretap Act, Stored Communications Act, and the Computer Fraud and Abuse Act would be precluded or at least sharply restricted by the clause. It remains to be seen why such immunity is needed when just a few months ago, the FTC and DOJ noted they would not prosecute companies for sharing such information. It's also unclear because we continue to see companies freely share information among each other and with the government both publicly via published reports and privately.
Gary Edwards

Great Privacy Essay: Fourth Amendment Doctrine in the Era of Total Surveillance | CIO - 0 views

  •  
    "'Failing Expectations: Fourth Amendment Doctrine in the Era of Total Surveillance' is a thought-provoking essay written by a Fordham University law professor about how the reasonable expectation test for privacy is failing to protect us. Add into our networked world the third-party doctrine and we have little protection against unreasonable searches and seizures."
  •  
    It doesn't detract substantially from the essay's central thesis, but an important part of the learned professor's heartfelt desires were delivered in a Supreme Court decision just decided, after the essay was published, Reilly v. California, http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf The Court held in relevant part: "We also reject the United States' final suggestion that officers should always be able to search a phone's call log, as they did in Wurie's case. The Government relies on Smithv. Maryland, 442 U. S. 735 (1979), which held that no warrant was required to use a pen register at telephone company premises to identify numbers dialed by a particular caller. The Court in that case, however, concluded that the use of a pen register was not a "search" at all under the Fourth Amendment. See id., at 745-746. There is no dispute here that the officers engaged in a search of Wurie's cell phone. Moreover, call logs typically contain more than just phone numbers; they include any identifying information that an individual might add, such as the label "my house" in Wurie's case." The effect there was to confine Smith v. Maryland, the foundation of the third-party doctrine, to its particular facts. In other words, the third-party doctrine is now confined to connected telephone numbers, the connect time, and the duration of the call. If any other metadata is gathered, such as location data, the third-party doctrine no longer applies. When you read the rest of the Reilly decision, you see a unanimous Supreme Court shooting down one government defense after another that have been used in the NSA's defense to mass telecommunications surveillance. But most interestingly, the Court unmistakably has laid the groundwork for a later decision drastically cutting back on digital surveillance without a search warrant based on particularized probable cause to believe that evidence of a specific crime has occurred and that the requested sear
Paul Merrell

NSA Surveillance Chilling Effects: HRW and ACLU Gather More Evidence | Electronic Front... - 0 views

  • Human Rights Watch and the ACLU today published a terrific report documenting the chilling effect on journalists and lawyers from the NSA's surveillance programs entitled: "With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law and American Democracy." The report, which is chock full of evidence about the very real harms caused by the NSA's surveillance programs, is the result of interviews of 92 lawyers and journalists, plus several senior government officials.  This report adds to the growing body of evidence that the NSA's surveillance programs are causing real harm.  It also links these harms to key parts of both U.S. constitutional and international law, including the right to counsel, the right of access to information, the right of association and the free press. It is a welcome addition to the PEN report detailing the effects on authors, called Chilling Effects: How NSA Surveillance Drives US Writers to Self-Censor and the declarations of 22 of EFF's clients in our First Unitarian Church of Los Angeles v. NSA case. 
  • The HRW and ACLU report documents the increasing treatment of journalists and lawyers as legitimate surveillance targets and surveys how they are responding. Brian Ross of ABC says: There’s something about using elaborate evasion and security techniques that’s offensive to me—that I should have to operate as like a criminal, like a spy. The report also notes that the government increasingly likens journalists to criminals. As Scott Shane of the New York Times explains: To compare the exchange of information about sensitive programs between officials and the media, which has gone on for decades, to burglary seems to miss the point. Burglary is not part of a larger set of activities protected by the Constitution, and at the heart of our democracy. Unfortunately, that mindset is sort of the problem. Especially striking in the report is the disconnect between the real stories of chilling effects from reporters and lawyers and the skeptical, but undocumented, rejections from senior government officials.  The reporters explain difficulties in building trust with their sources and the attorneys echo that with stories about the difficulties building client trust.  The senior government officials, in contrast, just say that they don't believe the journalists and appear to have thought little, if at all about the issues facing lawyers.  
Paul Merrell

Ellen Brown ~ Did The Other Shoe Just Drop? Black Rock And PIMCO Sue Banks For $250 Bil... - 0 views

  • For years, homeowners have been battling Wall Street in an attempt to recover some portion of their massive losses from the housing Ponzi scheme. But progress has been slow, as they have been outgunned and out-spent by the banking titans. In June, however, the banks may have met their match, as some equally powerful titans strode onto the stage.  Investors led by BlackRock, the world’s largest asset manager, and PIMCO, the world’s largest bond-fund manager, have sued some of the world’s largest banks for breach of fiduciary duty as trustees of their investment funds. The investors are seeking damages for losses surpassing $250 billion. That is the equivalent of one million homeowners with $250,000 in damages suing at one time. The defendants are the so-called trust banks that oversee payments and enforce terms on more than $2 trillion in residential mortgage securities. They include units of Deutsche Bank AG, U.S. Bank, Wells Fargo, Citigroup, HSBC Holdings PLC, and Bank of New York Mellon Corp. Six nearly identical complaints charge the trust banks with breach of their duty to force lenders and sponsors of the mortgage-backed securities to repurchase defective loans.
  • Why the investors are only now suing is complicated, but it involves a recent court decision on the statute of limitations. Why the trust banks failed to sue the lenders evidently involves the cozy relationship between lenders and trustees. The trustees also securitized loans in pools where they were not trustees. If they had started filing suit demanding repurchases, they might wind up suedon other deals in retaliation. Better to ignore the repurchase provisions of the pooling and servicing agreements and let the investors take the losses—better, at least, until they sued. Beyond the legal issues are the implications for the solvency of the banking system itself. Can even the largest banks withstand a $250 billion iceberg? The sum is more than 40 times the $6 billion “London Whale” that shook JPMorganChase to its foundations.
Paul Merrell

Is the Government's Aerial Smartphone Surveillance Program Legal? | TIME - 0 views

  • Still, is the Justice Department’s airborne dragnet program legal? The answer is “maybe.” Federal authorities have employed similar tools in the past. The Federal Bureau of Investigation is known to use a surveillance tool called a “stingray,” a portable transceiver that tricks cell phones within a certain area into relaying their locations, not unlike the equipment onboard the Marshals’ aircraft. A government vehicle with a stingray can net hundreds of nearby cell phones’ approximate locations just by driving through a typical neighborhood. The government has said it doesn’t need a probable cause warrant to use stingrays because investigators don’t collect the content of phone calls, just the locations of those phones. Government officials, meanwhile, have said they get court approval to use the devices. Much of the government’s warrantless use of stingray-style technology hinges on a 1979 Supreme Court decision titled Smith v. Maryland. Smith involved law enforcement’s use of a device called a pen register that, when attached to a suspect’s phone line, recorded the numbers of outgoing calls, but not the calls themselves. The Smith decision upheld the warrantless use of such devices because the suspect’s phone company would record the same data picked up by the pen register, and therefore the suspect had no reasonable expectation of privacy when it came to that information. Currently, the law requires a court to approve the use of a pen register, but investigators only have to show that the device’s use is “relevant to an ongoing criminal investigation,” a much weaker standard than a probable cause warrant requires.
  • However, to get back to the Smith decision, wireless carriers do store your location history for several months to several years, information they obtain by keeping a record of the cell towers to which your device connects as you move from place to place. That could mean Americans don’t have a reasonable expectation of privacy over their location data and the Smith precedent applies, making the DoJ’s aerial surveillance program legal. Still, that would be a matter for the courts to decide. “There are a lot of tricky questions whether a stingray or dirtbox operated by the government directly is a pen register, or the Fourth Amendment concerns dismissed by the Supreme Court 35 years ago in Smith v. Maryland are more applicable here,” Fakhoury said.
  • Hanni Fakhoury, an attorney at the pro-privacy Electronic Frontier Foundation, says the Department of Justice could use the Smith precedent as legal justification for the airborne dirtbox program. However, Fakhoury also highlighted a key problem with that argument: Location. Pen registers aren’t intended to pick up location data beyond an area code, whereas the airborne dirtboxes can track a person down to a single building. Many courts, he said, have expressed that location data deserves greater constitutional protection than is afforded to other kinds of information.
  • ...2 more annotations...
  • Civil rights groups are raising serious constitutional questions about the Justice Department’s use of dragnet technology onboard aircraft to collect data from suspects’ cell phones, as reported by the Wall Street Journal Thursday.
  • The Justice Department said it could not confirm or deny the existence of the program. But a department official said that all federal investigations are consistent with federal law and are subject to court approval. That official also said the Marshals Service does not maintain any databases of cell phone information — meaning the program could possibly only be used to track the whereabouts of suspects on a case-by-case basis and that it’s vastly different in nature from the kinds of sweeping government surveillance programs first revealed by Edward Snowden.
  •  
    Smith v. Maryland is a dead precedent for mass surveillance after the Supreme Court's ruling in Riley v. California. It awaits only the judicial coup de grace. 
Paul Merrell

SodaStream to close illegal settlement factory in response growing boycott campaign | B... - 0 views

  • Palestinian boycott, divestment and sanctions (BDS) activists have welcomed the news that SodaStream has announced it is to close its factory in the illegal Israeli settlement of Mishor Adumim following a high profile boycott campaign against the company. “SodaStream’s announcement today shows that the boycott, divestment and sanctions (BDS) movement is increasingly capable of holding corporate criminals to account for their participation in Israeli apartheid and colonialism,” said Rafeef Ziadah, a spokesperson for the Palestinian Boycott, Divestment and Sanctions National Committee (BNC), the broad coalition of Palestinian civil society organisations that leads and supports the BDS movement. “BDS campaign pressure has forced retailers across Europe and North America to drop SodaStream, and the company’s share price has tumbled in recent months as our movement has caused increasing reputational damage to the SodaStream brand,” she added. The news of this major success against a company famed for its role in illegal Israeli settlements broke amidst intensifying demonstrations against Israel’s policies of colonisation in Jerusalem. Grassroots boycott activism saw SodaStream dropped by major retailers across North America and Europe including Macy’s in the US and John Lewis in the UK.
  • SodaStream’s participation in Israel’s forced displacement of Palestinians gained international notoriety when A-list celebrity Scarlett Johansson signed up to be a brand ambassador for the company. Following an international campaign urging Oxfam end its relationship with Johansson for endorsing SodaStream, the actor decided to quit Oxfam. SodaStream has also come under fire for its treatment of Palestinian workers in its West Bank factory, as Ziadah explains: “Any suggestion that SodaStream is employing Palestinians in an illegal Israeli settlement on stolen Palestinian land out of the kindness of its heart is ludicrous.” “Palestinian workers are paid far less than their Israeli counterparts and SodaStream recently fired 60 Palestinians following a dispute over food for the breaking of the Ramadan fast. Workers have previously said they are treated ‘like slaves’”. “Palestinians are forced to work inside settlements in sub-standard conditions because of Israel’s deliberate destruction of the Palestinian economy. There’s an urgent need for the creation of decent and dignified jobs within the Palestinian economy.”
  • SodaStream was forced to close its flagship store in Brighton in the UK as a result of regular pickets of the store. Soros Fund Management, the family office of the billionaire investor George Soros, sold its stake in SodaStream following BDS pressure. SodaStream’s share price fell dramatically in recent months as sales dried up, particularly in North America. After reaching a high of $64 per share in October 2013, the stock fell to around $20 per share this month. SodaStream has estimated its third quarter revenue will be $125 million, down almost 14 percent from the same period last year. But Ziadah warned that SodaStream will still remain actively complicit in the displacement of Palestinians in the Naqab and will remain a focus of boycott campaigning. “Even if this announced closure goes ahead, SodaStream will remain implicated in the displacement of Palestinians. Its new Lehavim factory is close to Rahat, a planned township in the Naqab (Negev) desert, where Palestinian Bedouins are being forcefully transferred against their will. Sodastream, as a beneficiary of this plan, is complicit with this violation of human rights,” she said.
  • ...1 more annotation...
  • SodaStream have said all workers will be offered jobs at its new plant, although Israel’s apartheid wall and severe restrictions on movement will make the commute to the new plant difficult for its Palestinian workers. All of the main Palestinian trade unions have called for boycott and are members of the Palestinian BDS National Committee, the civil society coalition that leads the BDS movement and helped to initiate the campaign against SodaStream.
  •  
    The Palestine BDS Movement drew economic blood According to the NYT, SodaStream's revenues fell so far that its books needed red ink and the Israeli government chipped in $20 million to move SodaStream out of the Occupied Territories. 
Paul Merrell

Launching in 2015: A Certificate Authority to Encrypt the Entire Web | Electronic Front... - 0 views

  • Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, IdenTrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.Although the HTTP protocol has been hugely successful, it is inherently insecure. Whenever you use an HTTP website, you are always vulnerable to problems, including account hijacking and identity theft; surveillance and tracking by governments, companies, and both in concert; injection of malicious scripts into pages; and censorship that targets specific keywords or specific pages on sites. The HTTPS protocol, though it is not yet flawless, is a vast improvement on all of these fronts, and we need to move to a future where every website is HTTPS by default.With a launch scheduled for summer 2015, the Let’s Encrypt CA will automatically issue and manage free certificates for any website that needs them. Switching a webserver from HTTP to HTTPS with this CA will be as easy as issuing one command, or clicking one button.
  • The biggest obstacle to HTTPS deployment has been the complexity, bureaucracy, and cost of the certificates that HTTPS requires. We’re all familiar with the warnings and error messages produced by misconfigured certificates. These warnings are a hint that HTTPS (and other uses of TLS/SSL) is dependent on a horrifyingly complex and often structurally dysfunctional bureaucracy for authentication.
  • The need to obtain, install, and manage certificates from that bureaucracy is the largest reason that sites keep using HTTP instead of HTTPS. In our tests, it typically takes a web developer 1-3 hours to enable encryption for the first time. The Let’s Encrypt project is aiming to fix that by reducing setup time to 20-30 seconds. You can help test and hack on the developer preview of our Let's Encrypt agent software or watch a video of it in action here:
  • ...1 more annotation...
  • Let’s Encrypt will employ a number of new technologies to manage secure automated verification of domains and issuance of certificates. We will use a protocol we’re developing called ACME between web servers and the CA, which includes support for new and stronger forms of domain validation. We will also employ Internet-wide datasets of certificates, such as EFF’s own Decentralized SSL Observatory, the University of Michigan’s scans.io, and Google's Certificate Transparency logs, to make higher-security decisions about when a certificate is safe to issue.The Let’s Encrypt CA will be operated by a new non-profit organization called the Internet Security Research Group (ISRG). EFF helped to put together this initiative with Mozilla and the University of Michigan, and it has been joined for launch by partners including Cisco, Akamai, and Identrust.
Paul Merrell

EFF's Game Plan for Ending Global Mass Surveillance | Electronic Frontier Foundation - 0 views

  • We have a problem when it comes to stopping mass surveillance.  The entity that’s conducting the most extreme and far-reaching surveillance against most of the world’s communications—the National Security Agency—is bound by United States law.  That’s good news for Americans. U.S. law and the Constitution protect American citizens and legal residents from warrantless surveillance. That means we have a very strong legal case to challenge mass surveillance conducted domestically or that sweeps in Americans’ communications.  Similarly, the United States Congress is elected by American voters. That means Congressional representatives are beholden to the American people for their jobs, so public pressure from constituents can help influence future laws that might check some of the NSA’s most egregious practices. But what about everyone else? What about the 96% of the world’s population who are citizens of other countries, living outside U.S. borders. They don't get a vote in Congress. And current American legal protections generally only protect citizens, legal residents, or those physically located within the United States. So what can EFF do to protect the billions of people outside the United States who are victims of the NSA’s spying?
  • For years, we’ve been working on a strategy to end mass surveillance of digital communications of innocent people worldwide. Today we’re laying out the plan, so you can understand how all the pieces fit together—that is, how U.S. advocacy and policy efforts connect to the international fight and vice versa. Decide for yourself where you can get involved to make the biggest difference. This plan isn’t for the next two weeks or three months. It’s a multi-year battle that may need to be revised many times as we better understand the tools and authorities of entities engaged in mass surveillance and as more disclosures by whistleblowers help shine light on surveillance abuses.
Paul Merrell

Court upholds NSA snooping | TheHill - 0 views

  • A district court in California has issued a ruling in favor of the National Security Agency in a long-running case over the spy agency’s collection of Internet records.The challenge against the controversial Upstream program was tossed out because additional defense from the government would have required “impermissible disclosure of state secret information,” Judge Jeffrey White wrote in his decision.ADVERTISEMENTUnder the program — details of which were revealed through leaks from Edward Snowden and others — the NSA taps into the fiber cables that make up the backbone of the Internet and gathers information about people's online and phone communications. The agency then filters out communications of U.S. citizens, whose data is protected with legal defenses not extended to foreigners, and searches for “selectors” tied to a terrorist or other target.In 2008, the Electronic Frontier Foundation (EFF) sued the government over the program on behalf of five AT&T customers, who said that the collection violated the constitutional protections to privacy and free speech.
  • But “substantial details” about the program still remain classified, White, an appointee under former President George W. Bush, wrote in his decision. Moving forward with the merits of a trial would risk “exceptionally grave damage to national security,” he added. <A HREF="http://ws-na.amazon-adsystem.com/widgets/q?rt=tf_mfw&ServiceVersion=20070822&MarketPlace=US&ID=V20070822%2FUS%2Fthehill07-20%2F8001%2Fdffbe72d-f425-4b83-b07e-357ae9d405f6&Operation=NoScript">Amazon.com Widgets</A> The government has been “persuasive” in using its state secrets privilege, he continued, which allows it to withhold evidence from a case that could severely jeopardize national security.   In addition to saying that the program appeared constitutional, the judge also found that the AT&T customers did not even have the standing to sue the NSA over its data gathering.While they may be AT&T customers, White wrote that the evidence presented to the court was “insufficient to establish that the Upstream collection process operates in the manner” that they say it does, which makes it impossible to tell if their information was indeed collected in the NSA program.  The decision is a stinging rebuke to critics of the NSA, who have seen public interest in their cause slowly fade in the months since Snowden’s revelations.
  • The EFF on Tuesday evening said that it was considering next steps and noted that the court focused on just one program, not the totality of the NSA’s controversial operations.“It would be a travesty of justice if our clients are denied their day in court over the ‘secrecy’ of a program that has been front-page news for nearly a decade,” the group said in a statement.“We will continue to fight to end NSA mass surveillance.”The name of the case is Jewel v. NSA. 
  •  
    The article should have mentioned that the decision was on cross-motions for *partial* summary judgment. The Jewel case will proceed on other plaintiff claims. 
Paul Merrell

The Money Trail: How the US Fostered Yemen's Separatist Movement / Sputnik International - 0 views

  • As Saudi Arabia and its allies have begun the bombing campaign against Yemen, in the south, a separatist movement calling for a "State of South Arabia" is emerging. Fostered by the US, it will leave the Houthis with two hostile states at their borders and locked access to the sea, if it succeeds.
  • Welcome to phase two of US regime change operations. After Yemen's 2011 revolution failed and Houthi militias overthrew President Hadi, forces trained and sponsored by the US government are being activated as a separatist movement. The Southern People's Committees (SPC), founded around 2007 although USAID has been conducting political workshops as part of a $695,000 project and actively grooming leadership in Yemen since 2005. (Also in 2007, weekly protests began, organized by women's organizations, fostered by the workshops.) The SPC were similar to many color revolution movements such as Serbia's Otpor in that they did not have a central leadership, but rather an autonomous cell-based organization. In addition, they were very capable in the use of social media technologies, text messaging and the circumventing the government's internet censorship to organize protests.
  • Meanwhile, the Yemen Center for Human Rights Studies, which received $193,000 from the EU and US-funded Foundation for the Future in 2009, conducted a poll in January 2010, which found that 70 percent of southern Yemenis favored secession. Another USAID-funded project, the $43 million Responsive Governance Project (RGP), launched in May 2010, conducted "New Social Media training for Youth leaders to equip Yemeni youth groups in the use of media to enhance their participation in formulating public issues." The project focuses on establishing contacts with the Yemeni government and providing "leadership and civic education training to youth NGOs."
  • ...5 more annotations...
  • At the same time, USAID funded a $3.58 million project called Promoting Youth for Civic Engagement (PYCE) to train Aden youth " in PACA [political activity training], first aid, self-defense, photography, calligraphy and various other topics," including "media skills," according to an evaluation report of the PYCE Project, conducted in 2012. The project was constrained to Aden and did not conduct workshops in the northern capital, Sanaa, after reportedly receiving threats.
  • The project is presented as a youth "sports program," and although it does include basketball, handball and chess, these were not the primary goal, as the report shows. At the same time, first aid, self-defense, photography and calligraphy (making protest signs) sound a lot more like protest tactics than sports. The program, initially planned to last for two years, did not make any progress reports after March 2012, when President Hadi assumed power. After the 2011 revolution, the SPC became more of a military outfit and took part in a fight against al-Qaeda in Yemen, which coincided with the CIA's expanded drone campaign in the area. This is also where the organization fades from public view when it comes to USAID expense reports, as the organization appeared to lose interest in developing democracy in the country. In a June 4, 2012 a field commander of the People's Committees gave an interview to the Yemen Times, in which he described the group's fight against the Ansar al-Sharia Islamists together with the government.
  • However, the group reappeared in public view on September 23 2014, two days after Houthis took control of Sanaa, and issued a statement in which they call on security forces to "undertake its historical role in providing security and maintaining people's property because it is in order to preserve the revolution, which is the most important accomplishment achieved by the Yemeni people." At the same time, in southern Yemen, the People's Committee has been very active on Facebook and Twitter since around October 2014. The Facebook and Twitter pages publish slick anti-Houthi propaganda and call for separatism and a "State of South Arabia," within the bounds of former South Yemen, and using South Yemen's flag
  • Since mid-March, the SPC have been fighting against Houthis and see Saudi Arabia as an ally of convenience, although some of their social media accounts, Saudi Arabia's King Salman and other royal family figures are glorified. However, the splitting of Yemen benefits Saudi Arabia, as it secludes the Houthis to a smaller Northern Yemen, which would be surrounded by two hostile states, with Saudi Arabia to the north and the new South Arabia to the south, which would also control access to the sea at the Gulf of Aden. The current situation has considerable parallels with Ukraine, which has led the Russian Foreign Minister Sergei Lavrov to call the situation one of "obvious double standards, but we clearly did not want neither what is happening in Ukraine, nor what is happening in Yemen."
  • Indeed, while Russia has been repeatedly accused of helping Donbas independence supporters, the US has openly fostered the south Yemen separatist movement. At the same time, while Ukraine's President Yanukovych was called illegitimate by the US after fleeing the country, Yemen's Hadi has remained "legitimate" and has even called for a Saudi Arabian military operation against the people who ousted him. The ongoing conflict in Yemen is currently at the second phase of US regime change operations, rebel conflict. The first stage, the color revolution, has failed, and now the last stop, foreign intervention and ground invasion remains. Saudi Arabia and its Gulf allies have already begun the airstrikes, and the South Arabia movement has begun its separatist campaign.
  •  
    Looks like Obama's drone attacks in Yemen were not enough to do the job.
  •  
    Turns out that the U.S. has been covertly rocking Yemen heavily at least since the Clinton Administration, including naval bombardment, drone strikes, cruise missiles, et cet.: Ongoing detailed compilations of U.S. covert and military actions in Yemen. (Publication dates are for first entry in compilations.) Methodology: http://www.thebureauinvestigates.com/2011/08/10/pakistan-drone-strikes-the-methodology2/ Drones Team, Yemen: reported US covert actions 2001-2011, The Bureau of Investigative Journalism (29 March 2012), http://www.thebureauinvestigates.com/2012/03/29/yemen-reported-us-covert-actions-since-2001/ (includes data through 2014). Jack Serle, Yemen: Reported US covert actions 2015, The Bureau of Investigative Journalism (26 January 2015),http://www.thebureauinvestigates.com/2015/01/26/yemen-reported-us-covert-actions-2015/
Gary Edwards

The Business Offensive: A Symmetrical Ruling Class - 0 views

  • Since the close of World War II, America has sought an integrated policy as the militarization of capitalism
  • In the intervening years, this was not always easy to achieve, as, depending on circumstances, one or the other, the corporate-financial order, and the military itself, asserted itself and made strong demands on government.
  • the Cold War itself providing a cover for the US globalization of power via market penetration, international financial and monetary architecture under US supervision, and the steady build-up of an Armaments State.
  • ...16 more annotations...
  • Yet, the dynamism of early modern capitalism, realized in part through grinding methods of labor suppression, notably, the privatization of force, helped on by a compliant government, meant that within capitalism itself there was tremendous jockeying for power requiring the imposition of Order if major railroads and industrial firms were to enjoy their secure monopoly status.
  • Here government was crucial to harmonious internal structural arrangements, anticompetitive in its policies for the promotion of monopolism sector-by-sector including banking (the House of Morgan, whose offshoots firmed up the organization of railroads and manufacturing) as the means to systemic consolidation—an end to internecine competition—which was achieved in the early 20th century under Theodore Roosevelt and Woodrow Wilson (themselves the Janus-faced construct of the Battleship Navy and supposed liberal internationalism) setting the stage for the present era.
  • In practice, we see the interpenetration of business and government as the integration of monopoly capitalism in its own right.
  • By the late 1940s one can say that the military remained a junior partner of a synthesized ruling group or class, given the overwhelming thrust of business and its ascendant banking wing in defining American capitalism.
  • American capitalism could no longer go it alone, the military increasingly supplying the muscle for continued expansion and profitability. Korea and Vietnam were important chapters in the reshaping of a capitalist polity, with numerous interventions beyond mention the underpinning for a coalescent framework of elites, all making for a structural process of shaking down to the bare essentials the capitalist and military components in search of equilibrium. For otherwise, America feared its decline and would do anything to prevent.
  • Granted, it is hard to conceive of capitalism as a perpetual war machine, especially in America, which labors under the fiction of being, or if it ever was, then remaining, a democracy.
  • But there it is, an arms budget dwarfing all else, military bases strategically gathered worldwide, death squads euphemistically termed Special Ops, presidential-directed drone assassinations, the list goes on—so much so that one almost forgets capitalism is centrally about business and profits, not murder and mayhem.
  • the Great Capitalist Synthesis
  • an accomplice to the more successful militarization of capitalism by holding its own as an integral part in the relationship. In sum, the desideratum of business as usual, as in fleecing the consumer and jeopardizing his/her safety, destroying the environment, and best of all, removing itself from the constitutional foundations of the rule of law.
  • Corporations and banks have become a law unto themselves, with all the organs of government stretching from the Executive, Congress, the Supreme Court, to myriad regulatory agencies some unbeknownst to the public, sitting as a chorus of admiring voices egging them on.
  • Corporate Rescindment of Legal Rights: Business Power Run Amuck,
  • Class-action law suits, frequently the only feasible action of the poor for seeking redress of grievances against the giant corporations, are all but prohibited, replaced in contracts by compulsory-arbitration clauses, intended in the first place to kill class actions, which compel the individual standing alone to face insurmountable odds in a process by which the corporation names the arbitrator, keeps the proceedings secret, and determines the rules of procedure.
  • Civil courts are thrown to the winds.
  • It is as though capitalism, in this one seemingly minor area touching primarily the normalization of everyday relationships, has gone on the offensive, not of course to re-establish its relation to the military, but specifically and directly to exercise its domination over the people.
  • The now-and-future business polity is the fulfillment of the fascist dream, an authoritarian power structure of corporate consolidation supported through governmental suppression of dissent at home and an aggressively waged foreign policy to capture world markets.
  • The small print of the contracts one signs, whether for car rentals or nursing homes, and thousands of transactions in between, emboldens capitalism to go its solipsistic way, to the destruction of freedom, the planet, and human dignity.
  •  
    "Since the close of World War II, America has sought an integrated policy as the militarization of capitalism. In the intervening years, this was not always easy to achieve, as, depending on circumstances, one or the other, the corporate-financial order, and the military itself, asserted itself and made strong demands on government. The result was never an intracompetitive mold because each needed and recognized the value of the other, but still there were periods of imbalance in their respective surges of governmental policy-emphasis. American capitalism had become a functional duopoly (C. Wright Mills' Power Elite was a good popular discussion of this general structure at an earlier point in our capitalist-development trajectory after the war), the Cold War itself providing a cover for the US globalization of power via market penetration, international financial and monetary architecture under US supervision, and the steady build-up of an Armaments State. There is nothing actually new here about the American historical pattern, except of course the more explicit and pronounced role to be assigned the military in the stabilization and expansion of American capitalism. The military was never at any point following the Civil War a negligible input in synthesizing the materials for an operational ruling class, but essentially, as in the late-19th century policy of the Open Door, business was sufficiently confident of its own power (the "imperialism of free trade") to carry forward the process of expansion largely on its own. Yet, the dynamism of early modern capitalism, realized in part through grinding methods of labor suppression, notably, the privatization of force, helped on by a compliant government, meant that within capitalism itself there was tremendous jockeying for power requiring the imposition of Order if major railroads and industrial firms were to enjoy their secure monopoly status."
Paul Merrell

Victory for Users: Librarian of Congress Renews and Expands Protections for Fair Uses |... - 0 views

  • The new rules for exemptions to copyright's DRM-circumvention laws were issued today, and the Librarian of Congress has granted much of what EFF asked for over the course of months of extensive briefs and hearings. The exemptions we requested—ripping DVDs and Blurays for making fair use remixes and analysis; preserving video games and running multiplayer servers after publishers have abandoned them; jailbreaking cell phones, tablets, and other portable computing devices to run third party software; and security research and modification and repairs on cars—have each been accepted, subject to some important caveats.
  • The exemptions are needed thanks to a fundamentally flawed law that forbids users from breaking DRM, even if the purpose is a clearly lawful fair use. As software has become ubiquitous, so has DRM.  Users often have to circumvent that DRM to make full use of their devices, from DVDs to games to smartphones and cars. The law allows users to request exemptions for such lawful uses—but it doesn’t make it easy. Exemptions are granted through an elaborate rulemaking process that takes place every three years and places a heavy burden on EFF and the many other requesters who take part. Every exemption must be argued anew, even if it was previously granted, and even if there is no opposition. The exemptions that emerge are limited in scope. What is worse, they only apply to end users—the people who are actually doing the ripping, tinkering, jailbreaking, or research—and not to the people who make the tools that facilitate those lawful activities. The section of the law that creates these restrictions—the Digital Millennium Copyright Act's Section 1201—is fundamentally flawed, has resulted in myriad unintended consequences, and is long past due for reform or removal altogether from the statute books. Still, as long as its rulemaking process exists, we're pleased to have secured the following exemptions.
  • The new rules are long and complicated, and we'll be posting more details about each as we get a chance to analyze them. In the meantime, we hope each of these exemptions enable more exciting fair uses that educate, entertain, improve the underlying technology, and keep us safer. A better long-terms solution, though, is to eliminate the need for this onerous rulemaking process. We encourage lawmakers to support efforts like the Unlocking Technology Act, which would limit the scope of Section 1201 to copyright infringements—not fair uses. And as the White House looks for the next Librarian of Congress, who is ultimately responsible for issuing the exemptions, we hope to get a candidate who acts—as a librarian should—in the interest of the public's access to information.
Paul Merrell

Lawmakers ask agencies to reveal use of phone surveillance technology | TheHill - 0 views

  • Lawmakers on the House Oversight Committee sent letters Monday to the heads of 24 federal agencies seeking answers about the use of a controversial surveillance technology.The devices, known by the brand name “StingRay,” simulate a cell phone tower and are able to collect information on mobile phones and their users. Lawmakers say they are trying to create a comprehensive record of how different federal agencies use the devices. The scrutiny comes after the Department of Justice and the Department of Homeland Security adopted new policies for how their employees may deploy the technology.ADVERTISEMENT“As it was with DOJ and DHS before those agencies issued department-wide policies governing use of the devices, the Committee is concerned that other federal agencies may be governed by a patchwork of policies,” the letters said. “Those policies may permit the use of cell-site simulators devices through a lower standard than a search warrant obtained after a showing probable cause."The letters, signed by Oversight Chairman Jason Chaffetz (R-Utah) and ranking member Elijah Cummings (D-Md.) as well as Rep. Will Hurd (R-Texas) and Rep. Robin Kelly (D-Ill.), were sent to 24 federal agencies in total, including many not traditionally viewed as having law enforcement functions, like the Social Security Administration and the National Science Foundation.Lawmakers have asked the agencies for documents and information related to their potential use of the devices.
Paul Merrell

PoppyLeaks, Part 1 - WhoWhatWhy - 0 views

  • The Story of Bush 41 the Establishment Won’t Publish
  • A particular memo caught his eye, and he leaned in for a closer look. Practically jumping off the screen was a memorandum from FBI director J. Edgar Hoover, dated November 29, 1963. Under the subject heading “Assassination of President John F. Kennedy,” Hoover reported that, on the day after JFK’s murder, the bureau had provided two individuals with briefings. One was “Captain William Edwards of the Defense Intelligence Agency.” The other: “Mr. George Bush of the Central Intelligence Agency.”
  • McBride shook his head. George H.W. Bush? In the CIA in 1963? Dealing with Cubans and the JFK assassination? Could this be the same man who was now vice president of the United States? Even when Bush was named CIA director in 1976 amid much agency-bashing, his primary asset had been the fact that he was not a part of the agency during the coups, attempted coups, and murder plots in Iran, Cuba, Chile, and other hot spots about which embarrassing information was being disclosed every day in Senate hearings.
  • ...3 more annotations...
  • Bush served at the CIA for one year, from early 1976 to early 1977. He worked quietly to reverse the Watergate-era reforms of CIA practices, moving as many operations as possible offshore and beyond accountability. Although a short stint, it nevertheless created an image problem in 1980 when Bush ran unsuccessfully for the Republican presidential nomination against former California governor Ronald Reagan. Some critics warned of the dangerous precedent in elevating someone who had led the CIA, with its legacy of dark secrets and covert plots, blackmail and murder, to preside over the United States government.
  •  George H.W. Bush: Spy from the age of 18 Almost a decade would pass between Bush’s election in 1988 and the declassification and release in 1996 of another government document that shed further light on the matter. This declassified document would help to answer some of the questions raised by the ’63 Hoover memo — questions such as, “If George Herbert Walker Bush was already connected with the CIA in 1963, how far back did the relationship go?”But yet another decade would pass before this second document would be found, read, and revealed to the public. Fast-forward to December 2006, on a day when JFK researcher Jerry Shinley sat, as he did on so many days, glued to his computer, browsing through the digitized database of documents on the Web site of the Mary Ferrell Foundation.On that December day, Shinley came upon an internal CIA memo that mentioned George H.W. Bush [the Bush designated Director of Central Intelligence (DCI)]. Dated November 29, 1975, it reported, in typically spare terms, the revelation that the man who was about to become the head of the CIA actually had prior ties to the agency. And the connection discussed here, unlike that unearthed by McBride, went back not to 1963, but to 1953 — a full decade earlier. Writing to the chief of the spy section of the analysis and espionage agency, the chief of the “cover and commercial staff” noted:
  • Through Mr. Gale Allen … I learned that Mr. George Bush, DCI designate has prior knowledge of the now terminated project WUBRINY/LPDICTUM which was involved in proprietary commercial operations in Europe. He became aware of this project through Mr. Thomas J. Devine, a former CIA Staff Employee and later, oil-wildcatting associate with Mr. Bush. Their joint activities culminated in the establishment of Zapata Oil [sic] [in 1953] which they eventually sold. After the sale of Zapata Oil, Mr. Bush went into politics, and Mr. Devine became a member of the investment firm of Train, Cabot and Associates, New York … The attached memorandum describes the close relationship between Messrs. Devine and Bush in 1967-1968 which, according to Mr. Allen, continued while Mr. Bush was our ambassador to the United Nations.In typical fashion for the highly compartmentalized and secretive intelligence organization, the memo did not make clear how Bush knew Devine, or whether Devine was simply dropping out of the spy business to become a true entrepreneur. For Devine, who would have been about twenty-seven years old at the time, to “resign” at such a young age, so soon after the CIA had spent a great deal of time and money training him was, at minimum, highly unusual. It would turn out, however, that Devine had a special relationship allowing him to come and go from the agency, enabling him to do other things without really leaving its employ. In fact, CIA history is littered with instances where CIA officers have tendered their “resignation” as a means of creating deniability while continuing to work closely with the agency …
Gary Edwards

There Are No Coincidences - 3 views

This commentary is currently making the rounds of the Bay Area Patriots circles: ITS ALL TRUE :: Any one of these 'coincidences' when taken singularly appear to not mean much, but when taken as a ...

Obama-coincidences Marxism Marxist-Muslim

started by Gary Edwards on 02 Jul 13 no follow-up yet
Paul Merrell

Mahdi Darius Nazemroaya - Turkish-ISIL Oil Trade: Iraq, Iran, Syria, and Russia All Acc... - 0 views

  • Because of the Turkish government’s role in the multi-spectrum US-led war against the Syrian Arab Republic, a war of words has ignited between Ankara and Moscow. Russia, however, is not alone in accusing Turkey of being involved in the theft of Syrian and Iraqi oil. Turkish opposition politicians, Turkish media, and various governments in the Middle East have also raised their voices about the role of Turkish officials in smuggling from the conflict zones in Syria and Iraq.
  •  
    This is the first of a must-read, in-depth, four-part series of articles on the ISIL/Kurd oil smuggling from Syria and Iraq via Turkey to world markets. The series details the involvement of western banksters (including Goldman Sachs) in setting up the capitalization of a new company created to plunder the natural resources of Iraq, Syria, and other nations targeted by the U.S. for destabilization. The second article, Turkish-ISIL Oil Trade: Did the Turkish Military Enter Mosul to Protect its Oil Trade? (II), is here. http://www.strategic-culture.org/news/2015/12/18/turkish-isil-oil-trade-did-turkish-military-enter-mosul-protect-oil-trade-ii.html The third article, Turkish-ISIL Oil Trade: The Roles of the Kurdistan Regional Government, Britain, and Israel (III), is here. http://www.strategic-culture.org/news/2015/12/19/turkish-isil-oil-trade-did-turkish-military-enter-mosul-protect-oil-trade-iii.html The final article, Turkish-ISIL Oil Trade: US and NATO Culpability (IV), is here. http://www.strategic-culture.org/news/2015/12/20/turkish-isil-oil-trade-us-and-nato-culpability-iv.html   
Paul Merrell

Saudi Arabia is on the Brink of Regime Change - nsnbc international | nsnbc international - 0 views

  • It seems that Saudi Arabia has started to undergo the transformation various experts predicted. Those became obvious when the sitting king Salman bin Abdulaziz Al Saud replaced his deceased elder brother Abdullah bin Abdulaziz Al Saud in January 2015, and made a number of quite unusual arrangements within the ruling elite, appointing the head of the Ministry of Interior Muhammad bin Nayef from Abdullah’s clan the Crown Prince, while his 33-year-old son Mohammad bin Salman Al Saudfrom the Sudairy clan received the appointment of Deputy Crown Prince.
  • Now it seems that the wheels of the political machine are moving again. Last week reports from Riyadh indicated that his disease is taking a toll on the king and he wants to renounce his reign in favor of the Crown Prince. But then neighboring states, especially Qatar and the United Arab Emirates, started hinting that the members of the Saudi royal family along with the sheikhs of the strongest tribes, which are the foundation of Al Saud’s rule, are extremely dissatisfied with the sharp deterioration of the economic and social situation in the country, leading to a major drop in their personal incomes. It is no secret that Riyadh increased the volume of oil production to weaken the positions of its main competitors – Russia, Iran and Venezuela. But the kingdom had to take a punch as well, it was forced to unseal its reserve fund and cut the funding of numerous social programs.
  • Now the highly respected Institute for Gulf Affairs is stating that the king of Saudi Arabia Salman bin Abdulaziz Al Saud is preparing to renounce the throne in favor of his son Mohammad bin Salman Al Saud, and has since brought his country to the brink of a disaster. It means that the 80-year-old Salman is trying desperately hard to persuade his brothers on the succession board to allow him to change the principle of succession of the Saudi throne, since he’s ready to leave, but not so ready for his nephew Mohammad bin Salman Al Saud to rule the country. What the king has been doing is allegedly done “only for the sake of the stability of the kingdom.” Although the reality of the situation is clear – should Salman retain his position, the disintegration of the kingdom is imminent, with certain Shia areas breaking away, while the regions on the border with Yemen which are mostly populated by Yemeni tribes, more than happy to return home. Moreover, the Minister of Interior used to be a habitual cocaine user, so he was only able to “produce” two daughters, and now he’s somewhat incapable of producing more children. Should the king manage to carry out the above described scheme, he will become the first Saudi monarch to leave the throne to his son.
  • ...3 more annotations...
  • And the fact that there’s a growing crisis in Saudi Arabia was evident from the cuts in subsidies and bonuses that king Salman started at the beginning of this year to reduce the country’s total dependence on oil. After decades of extensive use of oil revenues to subsidize companies’ payment of generous salaries and providing enormous social benefits, falling oil prices struck Saudi Arabia at its heart. It’s enough to say that revenues from oil exports in 2015 alone dropped by half. Ultimately it’s hard to say which country suffers the most from these oil wars – Russia or Saudi Arabia, since the latter has virtually no other sectors to support the economy. Saudi economist Turki Fadaak believes that Saudi Arabia is exiting the policy of “universal welfare”, so there’s an ongoing psychological shift in the minds of the ruling elite of the state. Fadaak is convinced that the ultimate aim of king Salman’s measures is to eliminate the Saudi dependency on oil. But is it really? According to leading international experts – the answer is a resounding “no”, with all the arguments to the contrary nothing more than fantasy.
  • Although initially it seemed that Salman, who came to power after the death of his brother, King Abdullah, will continue his course, after assuming the throne Salman generously spent over 30 billion dollars from the budget on bonuses for civil servants, military personnel, and students. Additionally, prices for basic goods and services, including fuel, electricity and water prices were kept at extremely low levels due to government subsidies from oil revenues. However, due to falling oil prices, under the pressure of such costs the budget started to rupture. The most important thing now for the kingdom is to execute the transition from the extremely lavish social security system to a productive economy, but then the subjects of the king will be forced to cut their costs, and it looks that they do not agree with this notion. And accusations in the imminent economic collapse will go Salman’s way, so it is better for him to leave now, before protests even start.
  • It is curious that Saudi Arabia has been rather realistic about its budget for the year 2016, since it was based on the average price of oil keeping at the level 29 dollars per barrel. Last year, the Saudi budget deficit amounted to almost 98 billion dollars and the costs were considerably higher than it was originally planed due to bonuses for civil servants, military personnel and retirees. In 2016 the authorities decided to put up to 49 billion dollars into a special fund to provide funding for the most important projects in case oil prices drop even further. But it was Saudi Arabia back in 2014 that proposed new tactics for OPEC, that implied that there would be no cuts in the level of production, the tactics that drove oil prices to today’s levels. So we are to learn pretty soon should Riyadh choose the path of the utter and complete collapse of the kingdom, or the path of giving power to the young and pragmatic technocrats who are going to pursue a comprehensive oil policy. Either way, Saudi Arabia will be forced to put an end to the costly military adventures in Syria and Yemen as well as its confrontations with Russia and Iran.
Paul Merrell

EFF Pries More Information on Zero Days from the Government's Grasp | Electronic Fronti... - 0 views

  • Until just last week, the U.S. government kept up the charade that its use of a stockpile of security vulnerabilities for hacking was a closely held secret.1 In fact, in response to EFF’s FOIA suit to get access to the official U.S. policy on zero days, the government redacted every single reference to “offensive” use of vulnerabilities. To add insult to injury, the government’s claim was that even admitting to offensive use would cause damage to national security. Now, in the face of EFF’s brief marshaling overwhelming evidence to the contrary, the charade is over. In response to EFF’s motion for summary judgment, the government has disclosed a new version of the Vulnerabilities Equities Process, minus many of the worst redactions. First and foremost, it now admits that the “discovery of vulnerabilities in commercial information technology may present competing ‘equities’ for the [government’s] offensive and defensive mission.” That might seem painfully obvious—a flaw or backdoor in a Juniper router is dangerous for anyone running a network, whether that network is in the U.S. or Iran. But the government’s failure to adequately weigh these “competing equities” was so severe that in 2013 a group of experts appointed by President Obama recommended that the policy favor disclosure “in almost all instances for widely used code.” [.pdf].
  • The newly disclosed version of the Vulnerabilities Equities Process (VEP) also officially confirms what everyone already knew: the use of zero days isn’t confined to the spies. Rather, the policy states that the “law enforcement community may want to use information pertaining to a vulnerability for similar offensive or defensive purposes but for the ultimate end of law enforcement.” Similarly it explains that “counterintelligence equities can be defensive, offensive, and/or law enforcement-related” and may “also have prosecutorial responsibilities.” Given that the government is currently prosecuting users for committing crimes over Tor hidden services, and that it identified these individuals using vulnerabilities called a “Network Investigative Technique”, this too doesn’t exactly come as a shocker. Just a few weeks ago, the government swore that even acknowledging the mere fact that it uses vulnerabilities offensively “could be expected to cause serious damage to the national security.” That’s a standard move in FOIA cases involving classified information, even though the government unnecessarily classifies documents at an astounding rate. In this case, the government relented only after nearly a year and a half of litigation by EFF. The government would be well advised to stop relying on such weak secrecy claims—it only risks undermining its own credibility.
  • The new version of the VEP also reveals significantly more information about the general process the government follows when a vulnerability is identified. In a nutshell, an agency that discovers a zero day is responsible for invoking the VEP, which then provides for centralized coordination and weighing of equities among all affected agencies. Along with a declaration from an official at the Office of the Director of National Intelligence, this new information provides more background on the reasons why the government decided to develop an overarching zero day policy in the first place: it “recognized that not all organizations see the entire picture of vulnerabilities, and each organization may have its own equities and concerns regarding the prioritization of patches and fixes, as well as its own distinct mission obligations.” We now know the VEP was finalized in February 2010, but the government apparently failed to implement it in any substantial way, prompting the presidential review group’s recommendation to prioritize disclosure over offensive hacking. We’re glad to have forced a little more transparency on this important issue, but the government is still foolishly holding on to a few last redactions, including refusing to name which agencies participate in the VEP. That’s just not supportable, and we’ll be in court next month to argue that the names of these agencies must be disclosed. 
« First ‹ Previous 261 - 280 of 300 Next ›
Showing 20 items per page