Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged glenn

Rss Feed Group items tagged

Paul Merrell

Glenn Greenwald: the explosive day we revealed Edward Snowden's identity to the world |... - 0 views

  • In the hours after his name became known, the entire world was searching for the NSA whistleblower, and it became vital that his whereabouts in Hong Kong remained secret. In an extract from a new book, No Place to Hide, Glenn Greenwald recalls the dramatic events surrounding the moment Snowden revealed himself in June 2013
  •  
    Excerpt from Greenwald's forthcoming book, No Place to Hide: Edward Snowden, the NSA and the Surveillance State
Paul Merrell

NSA router bugging: Glenn Greenwald - 0 views

  • An excerpt of investigative reporter Glenn Greenwald's new book No Place to Hide published today in The Guardian asserts that the National Security Agency "routinely" bugs computer network equipment made in the United States and sent to customers abroad: A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers, and other computer network devices being exported from the US before they are delivered to the international customers. Advertisement The agency then implants backdoor surveillance tools, repackages the devices with a factory seal, and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)". The excerpt doesn't say whether the bugging was done to entire shipments of equipment (as opposed to individual items ordered by specific surveillance targets).
Paul Merrell

Book Reveals Wider Net of U.S. Spying on Envoys - NYTimes.com - 0 views

  • In May 2010, when the United Nations Security Council was weighing sanctions against Iran over its nuclear program, several members were undecided about how they would vote. The American ambassador to the United Nations, Susan E. Rice, asked the National Security Agency for help “so that she could develop a strategy,” a leaked agency document shows.The N.S.A. swiftly went to work, developing the paperwork to obtain legal approval for spying on diplomats from four Security Council members — Bosnia, Gabon, Nigeria and Uganda — whose embassies and missions were not already under surveillance. The following month, 12 members of the 15-seat Security Council voted to approve new sanctions, with Lebanon abstaining and only Brazil and Turkey voting against. Continue reading the main story Related Coverage Books of The Times: ‘No Place to Hide,’ by Glenn GreenwaldMAY 12, 2014 Later that summer, Ms. Rice thanked the agency, saying its intelligence had helped her to know when diplomats from the other permanent representatives — China, England, France and Russia — “were telling the truth ... revealed their real position on sanctions ... gave us an upper hand in negotiations ... and provided information on various countries ‘red lines.’ ”
  • The two documents laying out that episode, both leaked by the former N.S.A. contractor Edward J. Snowden, are reproduced in a new book by Glenn Greenwald, “No Place to Hide: Edward Snowden, the N.S.A., and the U.S. Surveillance State.” The book is being published Tuesday.
Paul Merrell

Glenn Greenwald: how the NSA tampers with US-made internet routers | World news | The G... - 0 views

  • The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide
  • For years, the US government loudly warned the world that Chinese routers and other internet devices pose a "threat" because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA's documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.
  • The Rogers committee voiced fears that the two companies were enabling Chinese state surveillance, although it acknowledged that it had obtained no actual evidence that the firms had implanted their routers and other systems with surveillance devices. Nonetheless, it cited the failure of those companies to cooperate and urged US firms to avoid purchasing their products
  • ...3 more annotations...
  • The constant accusations became such a burden that Ren Zhengfei, the 69-year-old founder and CEO of Huawei, announced in November 2013 that the company was abandoning the US market. As Foreign Policy reported, Zhengfei told a French newspaper: "'If Huawei gets in the middle of US-China relations,' and causes problems, 'it's not worth it'."
  • But while American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organisations would have been well advised to beware of American-made ones. A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)".Eventually, the implanted device connects back to the NSA. The report continues: "In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network."
  • Warning the world about Chinese surveillance could have been one of the motives behind the US government's claims that Chinese devices cannot be trusted. But an equally important motive seems to have been preventing Chinese devices from supplanting American-made ones, which would have limited the NSA's own reach. In other words, Chinese routers and servers represent not only economic competition but also surveillance competition.
Paul Merrell

Glenn Greenwald: Spying not about terror - Jose DelReal - POLITICO.com - 0 views

  • Journalist Glenn Greenwald is once again rejecting claims that he and National Security Agency leaker Edward Snowden are endangering American efforts to fight terrorism — and he’s using recent reports that the NSA might have spied on German Chancellor Angela Merkel to prove his point.“What we revealed is that this spying system is devoted not to terrorists, but is directed to innocent people around the world,” Greenwald told CNN’s Christiane Amanpour in an interview that aired Monday. “None of this has anything to do with terrorism. Is Angela Merkel a terrorist?”
  • “This is clearly about political power and economic espionage. And the claim that this is all about terrorism is seen around the world as what it is, which is pure deceit,” he added.
  • Greenwald insisted that his reporting and Snowden’s leaks are exposing the unnecessary expansiveness of the NSA spying program. “Every terrorist who is capable of tying their own shoes has long known that the U.S. government and the U.K. government are trying to monitor their communications in every way that they can,” Greenwald said. “That isn’t new. We didn’t reveal anything to terrorists that they didn’t already know.” Amanpour’s full interview with Greenwald will air Monday evening on CNN.
Paul Merrell

Fisa court oversight: a look inside a secret and empty process | Glenn Greenwald | Comm... - 0 views

  • Since we began began publishing stories about the NSA's massive domestic spying apparatus, various NSA defenders – beginning with President Obama - have sought to assure the public that this is all done under robust judicial oversight. "When it comes to telephone calls, nobody is listening to your telephone calls," he proclaimed on June 7 when responding to our story about the bulk collection of telephone records, adding that the program is "fully overseen" by "the Fisa court, a court specially put together to evaluate classified programs to make sure that the executive branch, or government generally, is not abusing them". Obama told Charlie Rose last night:"What I can say unequivocally is that if you are a US person, the NSA cannot listen to your telephone calls … by law and by rule, and unless they … go to a court, and obtain a warrant, and seek probable cause, the same way it's always been, the same way when we were growing up and we were watching movies, you want to go set up a wiretap, you got to go to a judge, show probable cause."The GOP chairman of the House Intelligence Committee, Mike Rogers, told CNN that the NSA "is not listening to Americans' phone calls. If it did, it is illegal. It is breaking the law." Talking points issued by the House GOP in defense of the NSA claimed that surveillance law only "allows the Government to acquire foreign intelligence information concerning non-U.S.-persons (foreign, non-Americans) located outside the United States."
  • The decisions about who has their emails and telephone calls intercepted by the NSA is made by the NSA itself, not by the Fisa court, except where the NSA itself concludes the person is a US citizen and/or the communication is exclusively domestic. But even in such cases, the NSA often ends up intercepting those communications of Americans without individualized warrants, and all of this is left to the discretion of the NSA analysts with no real judicial oversight.
  • The NSA's media defenders have similarly stressed that the NSA's eavesdropping and internet snooping requires warrants when it involves Americans. The Washington Post's Charles Lane told his readers: "the government needs a court-issued warrant, based on probable cause, to listen in on phone calls." The Post's David Ignatius told Post readers that NSA internet surveillance "is overseen by judges who sit on the Foreign Intelligence Surveillance Court" and is "lawful and controlled". Tom Friedman told New York Times readers that before NSA analysts can invade the content of calls and emails, they "have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress."This has become the most common theme for those defending NSA surveillance. But these claim are highly misleading, and in some cases outright false.
  • ...1 more annotation...
  • What is vital to recognize is that the NSA is collecting and storing staggering sums of communications every day. Back in 2010, the Washington Post reported that "every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." Documents published by the Guardian last week detail that, in March 2013, the NSA collected three billions of pieces of intelligence just from US communications networks alone.In sum, the NSA is vacuuming up enormous amounts of communications involving ordinary Americans and people around the world who are guilty of nothing. There are some legal constraints governing their power to examine the content of those communications, but there are no technical limits on the ability either of the agency or its analysts to do so. The fact that there is so little external oversight is what makes this sweeping, suspicion-less surveillance system so dangerous. It's also what makes the assurances from government officials and their media allies so dubious.
  •  
    Glenn Greenwald strikes again with hard proof from NSA documents, dissecting procedures used throughout the intelligence establishment from the NSA to the President to Congress, casting severe doubt on what we have been told by those defending the NSA surveillance program. I have highlighted only a few points from this lengthy article. As to Greenwald's discussion of the FISA Court's weaknesses, he omitted one that I believe is incredibly, the lack of an adversarial system with a lawyer opposing what the government asks the Court to authorize. True, search warrants are normally issued in the U.S. with only the government represented in the process. But there is a crucial difference: once someone is charged with a crime, the warrant must be disclosed to the defendant who can ask the court to suppress all evidence unlawfully obtained not only through the warrant but also the fruits of any unlawfully obtained evidence, meaning subsequently discovered evidence that would not have been found absent the unlawfully obtained evidence. The same result can happen if the warrant is found to be invalid for any of a variety of reasons, or the officers exceeded the scope of the search authorized.  So in the normal search warrant process, the participation of an adversary attorney is only delayed; it is not virtually eliminated as it is in the FISA Court. Thus far, only those ordered to disclose records to the NSA have been granted standing to oppose disclosure, not those who have been surveilled. The entire U.S. judicial system is built around the principle of an adversarial process. Judges are expected to be neutral arbiters between two or more sides to a dispute. We do not have an inquisitorial system, as is used for example in some European nations, where the judge is also the investigator. The FISA court is presently composed of 11 federal district court judges who also preside over normal cases in their individual districts. Steeped in the adversarial system and th
Gary Edwards

"Agenda 21" The UN's diabolical plan for the world is explained on the "Glenn Beck Show... - 0 views

  •  
    In this video, Glen Beck walks us through Agenda 21, providing a quick and basic understanding of what the Globalist are u to- and how to recognize these insidious authoritarian central planners.  Key terms are "sustainable", "green" and "smart" growth. "AGENDA 21 - There are people that want to transform America and put our problems into the hands of the rest of the world. The best thing we can do is link arms together, neighbor to neighbor and reach out to our houses of worship and community centers and take care of each other like God and the Founders intended us to. But a growing number of people are latching on to the idea of globalism...groundwork is being laid right now for government control on a global level. These people have mastered the art of hiding it in plain sight and then just dismissing it as a joke...such is the case with Agenda 21. What is Agenda 21? Find out on this video. 6-15-11"
Paul Merrell

CIA Surveillance Leak: Guardian journalist Glenn Greenwald says 'dozens of stories' in ... - 0 views

  • You ain't seen nothing yet. That's the message from the Glenn Greenwald, the journalist who exposed classified US surveillance programs for Britain's Guardian newspaper, who has said much more is to come. Edward Snowden, who worked for the US National Security Agency and US Central Intelligence Agency, is Greenwalds's source and has admitted passing on top secret documents outlining the programmes. Greenwald said over the next few weeks and months is newspaper intends to print 'dozens of stories' that could further expose the NSA's conduct.
Gary Edwards

The Impact of NSA Domestic Spying - Business Insider - 0 views

  • NSA has collected cell records from all major mobile networks.
  • Thanks to AT&T whistleblower Mark Klein and NSA whistleblowers William Binney and Thomas Drake, we know that the NSA has been perpetually amassing not only phone records but virtually all electronic records and communications.
  • As an AT&T engineer, Klein discovered that a special NSA network actively "vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T," emphasizing that "much of the data sent through AT&T to the NSA was purely domestic."
  • ...6 more annotations...
  • Binney — one of the best mathematicians and code breakers in NSA history — worked for the Defense Department's foreign signals intelligence agency for 32 years before resigning in late 2001 because he "could not stay after the NSA began purposefully violating the Constitution."
  • He's detailed how, ever since 9/11, the NSA has run a top-secret surveillance program that amasses electronic data — phone calls, emails, banking and travel records, social media, entire government databases — and analyzes the information "to be able to monitor what people are doing" and who they are doing it with.
  • Thanks to AT&T whistleblower Mark Klein and NSA whistleblowers William Binney and Thomas Drake, we know that the NSA has been perpetually amassing not only phone records but virtually all electronic records and communications.
  • Binney would know — he built the original software (i.e. ThinThread) that identified, in real time, networks of connections between individuals based on their electronic communications.
  • "I can pull your entire life together from all those domains and map it out and show your entire life over time," Binney told documentarian Laura Poitras while she was investigating the NSA's $2 billion data storage facility in Bluffdale, Utah. "This is something the KGB, the Stasi or the Gestapo would have loved to have had."
  • Binney — one of the best mathematicians and code breakers in NSA history — worked for the Defense Department's foreign signals intelligence agency for 32 years before resigning in late 2001 because he "could not stay after the NSA began purposefully violating the Constitution." He's detailed how, ever since 9/11, the NSA has run a top-secret surveillance program that amasses electronic data — phone calls, GPS information, emails, social media, banking and travel records, entire government databases — and analyzes the information "to be able to monitor what people are doing" and who they are doing it with.
  •  
    Excellent coverage.  Follow the links, they are extraordinary. " Glenn Greenwald revealed that the National Security Agency (NSA) is using the so-called "business records" provision of the Patriot Act to secretly collect telephone records of millions of Americans. Although the revelation doesn't surprise privacy advocates, the fact that Greenwald obtained a top secret court order compelling Verizon to give the NSA information on all telephone calls in its systems is the first concrete piece of evidence exposing dragnet domestic surveillance. "
Gary Edwards

Boston And More Government Lies : Personal Liberty Digest™ - 0 views

  •  
    "However, now we - at least those of us who pay attention - know, thanks to Glenn Beck, the Saudi person of interest is not just some innocent bystander after all. Just hours after the April 15 bombing, Abdul Rahman Ali Alharbi was put on a terror watch list and had an event file created that indicated he was armed and dangerous; and actions began that would lead to his deportation. Alharbi, who is related to a number of terrorists now residing in Gitmo and/or listed as part of al-Qaida, was admitted to the United States under a "special advisory opinion," indicating someone pulled some strings for him. His strings go a long way - all the way to the White House, where Alharbi was a frequent visitor (seven times since 2009). His file contained one prior event, indicating he was already in the terrorism watch list system. Yet even though he's marked as a terrorist, he was allowed in. Perhaps that explains Michelle Obama's hospital visit. Alharbi and the Obamas are friends. After news of his possible deportation leaked, government officials backtracked. Homeland Security Secretary Janet Napolitano refused to answer questions from a Congressman about Alharbi. An Immigration and Customs Enforcement official told Beck a different Saudi was in custody but not connected to the bombing. Someone altered Alharbi's file on April 17 in a way that disassociated him from the bombing, according to Beck, but an original had been printed out and saved. The change happened around the time that first Secretary of State John Kerry and then President Barack Obama met with the Saudi foreign minister - a meeting that wasn't on Obama's schedule. There are photographs on the Internet that purport to show Alharbi with two other Saudis near the bomb site. If the government will lie about who Alharbi is and whether his is a suspect, what else about the official narrative is a lie? Despite initial claims by the FBI that included a request to help identify the two men
Gary Edwards

Jon Christian Ryter -- What Do You Do? - 1 views

  •  
    A biblical primer for Christians and Jews on the importance of this election. excerpt: What do you do when the guy in the White House deliberately lies to the American people because he's afraid they won't vote for him if he tells them the truth that, because he spent four days in Charlotte bragging about how good he was for killing Osama bin Laden, he inflamed al Qaeda enough to retaliate against him on Sept. 11, 2012 by attacking the US Consulate in Benghazi, Libya and killing US Ambassador Chris Stevens, IT specialist Sean Smith and former Navy Seals Glenn Dhoherty and Tyrone Woods, and scaling the walls at the US Embassy in Cairo? What do you do when evidence clearly suggests that the envoys in both the US Embassy in Cairo and the Consultate in Benghazi received forewarning of protests and possible displays of anti-Americanism at their embassies on Sept. 11? And, what do you do when you learn the US Ambassador of Egypt jumped on a plane heading back to Washington on Sept. 10­after leaving orders for the US Martines guarding her embassy to unload their weapons? What do you do when you realize Muslim Brotherhood radical associated with al Qaeda stormed the walls of the US embassy, burned the American flag and hoisted an al Qaeda flag on American soil? (US embassies, by international law, are the sovereign territory of the country who occupies the embassy) .....................................
Paul Merrell

It's Time to Rewrite the Internet to Give Us Better Privacy, and Security - The Daily B... - 0 views

  • Almost 15 years ago, as I was just finishing a book about the relationship between the Net (we called it “cyberspace” then) and civil liberties, a few ideas seemed so obvious as to be banal: First, life would move to the Net. Second, the Net would change as it did so. Gone would be simple privacy, the relatively anonymous default infrastructure for unmonitored communication; in its place would be a perpetually monitored, perfectly traceable system supporting both commerce and the government. That, at least, was the future that then seemed most likely, as business raced to make commerce possible and government scrambled to protect us (or our kids) from pornographers, and then pirates, and now terrorists. But another future was also possible, and this was my third, and only important point: Recognizing these obvious trends, we just might get smart about how code (my shorthand for the technology of the Internet) regulates us, and just possibly might begin thinking smartly about how we could embed in that code the protections that the Constitution guarantees us. Because—and here was the punchline, the single slogan that all 724 people who read that book remember—code is law. And if code is law, then we need to be as smart about how code regulates us as we are about how the law does so.
  • There is, after all, something hopeful about a future that was smart about encoding our civil liberties. It could, in theory at least, be better. Better at protecting us from future Nixons, better at securing privacy, and better at identifying those keen to commit crime.
  • But what astonishes me is that today, more than a decade into the 21st century, the world has remained mostly oblivious to these obvious points about the relationship between law and code. That’s the bit in the Edward Snowden interview that is, to me, the most shocking. As he explained to Glenn Greenwald: The NSA specially targets the communications of everyone. It ingests them by default. It collects them in its system, and it filters them and it analyzes them and it measures them and it stores them for periods of time simply because that’s the easiest and the most efficient and most valuable way to achieve these ends ... Not all analysts have the ability to target everything. But I sitting at my desk certainly had the authority to wiretap anyone—from you [the reporter, Glenn Greenwald], to your accountant, to a federal judge, to even the president if I had a personal email. We don’t know yet whether Snowden is telling the truth. Lots of people have denied specifics, and though his interview is compelling, just now, we literally don’t know. But what we do know are the questions that ought to be asked in response to his claims. And specifically, this: Is it really the case that the government has entrusted our privacy to the good judgment of private analysts? Are there really no code-based controls for assuring that specific surveillance is specifically justified? And what is the technology for assuring that rogues paid by our government can’t use data collected by our government for purposes that none within our government would openly and publicly defend?
  • ...1 more annotation...
  • Because the fact is that there is technology that could be deployed that would give many the confidence that none of us now have. “Trust us” does not compute. But trust and verify, with high-quality encryption, could. And there are companies, such as Palantir, developing technologies that could give us, and more importantly, reviewing courts, a very high level of confidence that data collected or surveilled was not collected or used in an improper way. Think of it as a massive audit log, recording how and who used what data for what purpose. We could code the Net in a string of obvious ways to give us even better privacy, while also enabling better security. But we don’t, or haven’t, obviously. Maybe because of stupidity. How many congressmen could even describe how encryption works? Maybe because of cupidity. Who within our system can resist large and lucrative contracts to private companies, especially when bundled with generous campaign funding packages? Or maybe because the “permanent war” that Obama told us we were not in has actually convinced all within government that old ideas are dead and we just need to “get over it”—ideas like privacy, and due process, and fundamental proportionality. These ideas may be dead, for now. And they will stay dead, in the future. At least until we finally learn how liberty can live in the digital age. And here’s the hint: not through law alone, but through law that demands code that even the Electronic Frontier Foundation could trust.
  •  
    As the most prominent among law professors concerned with online civil liberties and now specializing in government corruption, if Lawrence Lessig says there are technical solutions for protecting us from online government snooping, I'm all years. He directs attention to technology being developed by Palantir, http://www.palantir.com/
Gary Edwards

The Stunning Hypocrisy of the U.S. Government - BlackListedNews.com - 1 views

  • Please read this rather good summary in this morning’s New York Times of the worldwide debate Snowden has enabled – how these disclosures have “set off a national debate over the proper limits of government surveillance” and “opened an unprecedented window on the details of surveillance by the NSA, including its compilation of logs of virtually all telephone calls in the United States and its collection of e-mails of foreigners from the major American Internet companies, including Google, Yahoo, Microsoft, Apple and Skype” – and ask yourself: has Snowden actually does anything to bring “injury to the United States”, or has he performed an immense public service?
  • The irony is obvious: the same people who are building a ubiquitous surveillance system to spy on everyone in the world, including their own citizens, are now accusing the person who exposed it of “espionage”.
  • It seems clear that the people who are actually bringing “injury to the United States” are those who are waging war on basic tenets of transparency and secretly constructing a mass and often illegal and unconstitutional surveillance apparatus aimed at American citizens – and those who are lying to the American people and its Congress about what they’re doing – rather than those who are devoted to informing the American people that this is being done.
  • ...13 more annotations...
  • The Obama administration leaks classified information continuously. They do it to glorify the President, or manipulate public opinion, or even to help produce a pre-election propaganda film about the Osama bin Laden raid.
  • The Obama administration does not hate unauthorized leaks of classified information. They are more responsible for such leaks than anyone.
  • What they hate are leaks that embarrass them or expose their wrongdoing.
  • The “enemy” they’re seeking to keep ignorant with selective and excessive leak prosecutions are not The Terrorists or The Chinese Communists.
  • It’s the American people.
  • The people who have learned things they didn’t already know are American citizens who have no connection to terrorism or foreign intelligence, as well as hundreds of millions of citizens around the world about whom the same is true.
  • What they have learned is that the vast bulk of this surveillance apparatus is directed not at the Chinese or Russian governments or the Terrorists, but at them.
  • And that is precisely why the US government is so furious and will bring its full weight to bear against these disclosures.
  • What has been “harmed” is not the national security of the US but the ability of its political leaders to work against their own citizens and citizens around the world in the dark, with zero transparency or real accountability.
  • If anything is a crime, it’s that secret, unaccountable and deceitful behavior: not the shining of light on it.
  • At a press conference to discuss the accusations, an N.S.A. spokesman surprised observers by announcing the spying charges against Mr. Snowden with a totally straight face. “These charges send a clear message,” the spokesman said. “In the United States, you can’t spy on people.”
  • “The American people have the right to assume that their private documents will remain private and won’t be collected by someone in the government for his own purposes.”
  • “Only by bringing Mr. Snowden to justice can we safeguard the most precious of American rights: privacy,” added the spokesman, apparently serious.
  •  
    Extremely well linked story from "Washington's Blog" excerpt: "The Government's Hypocrisy Is the Core Problem Congress has exempted itself from the prohibition against trading on inside information … the law that got Martha Stewart and many other people thrown in jail. There are many other ways in which the hypocrisy of the politicians in D.C. are hurting our country. Washington politicians say we have to slash basic services, and yet waste hundreds of billions of dollars on counter-productive boondoggles.  If the politicos just stopped throwing money at corporate welfare queens, military and security boondoggles and pork, harmful quantitative easing, unnecessary nuclear subsidies,  the failed war on drugs, and other wasted and counter-productive expenses, we wouldn't need to impose austerity on the people. The D.C. politicians said that the giant failed banks couldn't be nationalized, because that would be socialism.  Instead of temporarily nationalizing them and then spinning them off to the private sector - or breaking them up - the politicians have bailed them out to the tune of many tens of billions of dollars each year, and created a system where all of the profits are privatized, and all of the losses socialized. Obama and Congress promised help for struggling homeowners, and passed numerous bills that they claimed would rescue the little guy.  But every single one of these bills actually bails out the banks … and doesn't really help the homeowner. The D.C. regulators pretend that they are being tough on the big banks, but are actually doing everything they can to help cover up their sins. Many have pointed out Obama's hypocrisy in slamming Bush's spying programs … and then expanding them  (millions more). And in slamming China's cyber-warfare … while doing the same thing. And - while the Obama administration is spying on everyone in the country - it is at the same time the most secretive administration ever (ba
Paul Merrell

In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots - 0 views

  • Donald Trump, for reasons I’ve repeatedly pointed out, is an extremist, despicable, and dangerous candidate, and his almost-certain humiliating defeat is less than a month away. So I realize there is little appetite in certain circles for critiques of any of the tawdry and sometimes fraudulent journalistic claims and tactics being deployed to further that goal. In the face of an abusive, misogynistic, bigoted, scary, lawless authoritarian, what’s a little journalistic fraud or constant fearmongering about subversive Kremlin agents between friends if it helps to stop him? But come January, Democrats will continue to be the dominant political faction in the U.S. — more so than ever — and the tactics they are now embracing will endure past the election, making them worthy of scrutiny. Those tactics now most prominently include dismissing away any facts or documents that reflect negatively on their leaders as fake, and strongly insinuating that anyone who questions or opposes those leaders is a stooge or agent of the Kremlin, tasked with a subversive and dangerously un-American mission on behalf of hostile actors in Moscow. To see how extreme and damaging this behavior has become, let’s just quickly examine two utterly false claims that Democrats over the past four days — led by party-loyal journalists — have disseminated and induced thousands of people, if not more, to believe. On Friday, WikiLeaks published its first installment of emails obtained from the account of Clinton campaign chair John Podesta. Despite WikiLeaks’ perfect, long-standing record of only publishing authentic documents, MSNBC’s favorite ex-intelligence official, Malcolm Nance, within hours of the archive’s release, posted a tweet claiming — with zero evidence and without citation to a single document in the WikiLeaks archive — that it was compromised with fakes:
  • As you can see, more than 4,000 people have re-tweeted this “Official Warning.” That includes not only random Clinton fans but also high-profile Clinton-supporting journalists, who by spreading it around gave this claim their stamp of approval, intentionally leading huge numbers of people to assume the WikiLeaks archive must be full of fakes, and its contents should therefore simply be ignored. Clinton’s campaign officials spent the day fueling these insinuations, strongly implying that the documents were unreliable and should thus be ignored. Poof: Just like that, unpleasant facts about Hillary Clinton disappeared, like a fairy protecting frightened children by waving her magic wand and sprinkling her dust over a demon, causing it to scatter away. Except the only fraud here was Nance’s claim, not any of the documents published by WikiLeaks. Those were all real. Indeed, at Sunday night’s debate, when asked directly about the excerpts of her Wall Street speeches found in the release, Clinton herself confirmed their authenticity. And news outlets such as the New York Times and AP reported — and continue to report — on their contents without any caveat that they may be frauds. No real print journalists or actual newsrooms (as opposed to campaign operatives masquerading as journalists) fell for this scam, so this tactic did not prevent reporting from being done.
  •  
    Glenn Greenwald chastises Dems for claiming leaked Clintone emails are forgeries.
Paul Merrell

The Guardian's Summary of Julian Assange's Interview Went Viral and Was Completely False - 0 views

  • Julian Assange is a deeply polarizing figure. Many admire him and many despise him (into which category one falls in any given year typically depends on one’s feelings about the subject of his most recent publication of leaked documents). But one’s views of Assange are completely irrelevant to this article, which is not about Assange. This article, instead, is about a report published this week by The Guardian that recklessly attributed to Assange comments that he did not make. This article is about how those false claims — fabrications, really — were spread all over the internet by journalists, causing hundreds of thousands of people (if not millions) to consume false news. The purpose of this article is to underscore, yet again, that those who most flamboyantly denounce Fake News, and want Facebook and other tech giants to suppress content in the name of combating it, are often the most aggressive and self-serving perpetrators of it.
  •  
    Glenn Greenwald takes down The Guardian for publishing some seriously fake news. (Let's recall that Greenwald used to work for The Guardian.)
Paul Merrell

New Political Earthquake in Brazil: Is It Now Time for Media Outlets to Call This a "Co... - 0 views

  • Brazil today awoke to stunning news of secret, genuinely shocking conversations involving a key minister in Brazil’s newly installed government, which shine a bright light on the actual motives and participants driving the impeachment of the country’s democratically elected president, Dilma Rousseff. The transcripts were published by the country’s largest newspaper, Folha de São Paulo, and reveal secret conversations that took place in March, just weeks before the impeachment vote in the lower house was held. They show explicit plotting between the new planning minister (then-senator), Romero Jucá, and former oil executive Sergio Machado — both of whom are formal targets of the “Car Wash” corruption investigation — as they agree that removing Dilma is the only means for ending the corruption investigation. The conversations also include discussions of the important role played in Dilma’s removal by the most powerful national institutions, including — most importantly — Brazil’s military leaders. The transcripts are filled with profoundly incriminating statements about the real goals of impeachment and who was behind it. The crux of this plot is what Jucá calls “a national pact” — involving all of Brazil’s most powerful institutions — to leave Michel Temer in place as president (notwithstanding his multiple corruption scandals) and to kill the corruption investigation once Dilma is removed. In the words of Folha, Jucá made clear that impeachment will “end the pressure from the media and other sectors to continue the Car Wash investigation.” Jucá is the leader of Temer’s PMDB party and one of the “interim president’s” three closest confidants.
  • It is unclear who is responsible for recording and leaking the 75-minute conversation, but Folha reports that the files are currently in the hand of the prosecutor general. The next few hours and days will likely see new revelations that will shed additional light on the implications and meaning of these transcripts. The transcripts contain two extraordinary revelations that should lead all media outlets to seriously consider whether they should call what took place in Brazil a “coup”: a term Dilma and her supporters have used for months. When discussing the plot to remove Dilma as a means of ending the Car Wash investigation, Jucá said the Brazilian military is supporting the plot: “I am talking to the generals, the military commanders. They are fine with this, they said they will guarantee it.” He also said the military is “monitoring the Landless Workers Movement” (Movimento dos Trabalhadores Rurais Sem Terra, or MST), the social movement of rural workers that supports PT’s efforts of land reform and inequality reduction and has led the protests against impeachment.
  • The second blockbuster revelation — perhaps even more significant — is Jucá’s statement that he spoke with and secured the involvement of numerous justices on Brazil’s Supreme Court, the institution that impeachment defenders have repeatedly pointed to as vesting the process with legitimacy in order to deny that Dilma’s removal is a coup. Jucá claimed that “there are only a small number” of Court justices to whom he had not obtained access (the only justice he said he ultimately could not get to is Teori Zavascki, who was appointed by Dilma and who — notably — Jucá viewed as incorruptible in obtaining his help to kill the investigation (a central irony of impeachment is that Dilma has protected the Car Wash investigation from interference by those who want to impeach her)). The transcripts also show him saying that “the press wants to take her [Dilma] out,” so “this shit will never stop” — meaning the corruption investigations — until she’s gone. The transcripts provide proof for virtually every suspicion and accusation impeachment opponents have long expressed about those plotting to remove Dilma from office. For months, supporters of Brazil’s democracy have made two arguments about the attempt to remove the country’s democratically elected president: (1) the core purpose of Dilma’s impeachment is not to stop corruption or punish lawbreaking, but rather the exact opposite: to protect the actual thieves by empowering them with Dilma’s exit, thus enabling them to kill the Car Wash investigation; and (2) the impeachment advocates (led by the country’s oligarchical media) have zero interest in clean government, but only in seizing power that they could never obtain democratically, in order to impose a right-wing, oligarch-serving agenda that the Brazilian population would never accept.
  •  
    Gutsy. Glenn Greenwald and his partner live in Brazil. 
Gary Edwards

Obama Stimulus Dollars Funded Soros Empire | The Soros Files - 1 views

  •  
    excerpt: Newly recently released tax documents reveal how billionaire "philanthropist" George Soros expanded his U.S.-based empire by using funds from the American Recovery and Reinvestment Act of 2009, also known as the Obama stimulus. Soros and Obama worked hand-in-glove through the stimulus, which has been called the largest single partisan wealth transfer in American history. In 2010, tax records show that Soros, a convicted inside trader with extensive knowledge of the American financial system and government policies under Obama, deployed grantees from his Open Society Foundations1 to lobby for and acquire federal contracts for job training, green energy, and community redevelopment programs.  By gaining control over those resources, Soros advanced his agenda for "green economics," open borders, and increased government handouts. In short, he grew his empire, which includes much of the "progressive" movement in the U.S., as the federal government and Obama's political constituencies grew in power and influence. This report analyzes George Soros's grants to organizations in 2010.  The records show massive coordination of non-profit networks in the states and nationally.  Four powerful organizations and coalitions - The STAR Coalition, The Gamaliel Foundation, the Apollo Alliance, and Green for All - are given detailed scrutiny in this regard, with the involvement of Van Jones getting special mention. Jones is the former Obama "Green Jobs Czar" fired after information about his communist past surfaced through the work of anti-communist blogger Trevor Loudon and then-Fox News personality Glenn Beck.  The lobbying power of such efforts ensured that stimulus funds flowed from taxpayers into union coffers and into the hands of other activists who had been instrumental in putting President Obama into office. This report, "Obama Stimulus Dollars Funded Soros Empire," includes an analysis of how Soros-funded organizations and networks
Gary Edwards

Obama - The US Constitution Is Not Relevant Today !!! - YouTube - 1 views

  •  
    Glenn Beck presentation juxta-positioning the swearing in "pledge to Uphold and Defend the Constitution" of Obama Socialist Democrats, and their statements in defiance of that same Constitution.  Sickening liars!
‹ Previous 21 - 40 of 125 Next › Last »
Showing 20 items per page