Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged hard-drives

Rss Feed Group items tagged

Paul Merrell

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
Paul Merrell

President Xi's speech to Davos in full | World Economic Forum - 0 views

  • “It was the best of times, it was the worst of times.” These are the words used by the English writer Charles Dickens to describe the world after the Industrial Revolution. Today, we also live in a world of contradictions. On the one hand, with growing material wealth and advances in science and technology, human civilization has developed as never before. On the other hand, frequent regional conflicts, global challenges like terrorism and refugees, as well as poverty, unemployment and widening income gap have all added to the uncertainties of the world. Many people feel bewildered and wonder: What has gone wrong with the world? To answer this question, one must first track the source of the problem. Some blame economic globalization for the chaos in the world. Economic globalization was once viewed as the treasure cave found by Ali Baba in The Arabian Nights, but it has now become the Pandora’s box in the eyes of many. The international community finds itself in a heated debate on economic globalization.
  • Today, I wish to address the global economy in the context of economic globalization. The point I want to make is that many of the problems troubling the world are not caused by economic globalization. For instance, the refugee waves from the Middle East and North Africa in recent years have become a global concern. Several million people have been displaced, and some small children lost their lives while crossing the rough sea. This is indeed heartbreaking. It is war, conflict and regional turbulence that have created this problem, and its solution lies in making peace, promoting reconciliation and restoring stability. The international financial crisis is another example. It is not an inevitable outcome of economic globalization; rather, it is the consequence of excessive chase of profit by financial capital and grave failure of financial regulation. Just blaming economic globalization for the world’s problems is inconsistent with reality, and it will not help solve the problems.
  • But we should also recognize that economic globalization is a double-edged sword. When the global economy is under downward pressure, it is hard to make the cake of global economy bigger. It may even shrink, which will strain the relations between growth and distribution, between capital and labor, and between efficiency and equity. Both developed and developing countries have felt the punch. Voices against globalization have laid bare pitfalls in the process of economic globalization that we need to take seriously. As a line in an old Chinese poem goes, “Honey melons hang on bitter vines; sweet dates grow on thistles and thorns.” In a philosophical sense, nothing is perfect in the world. One would fail to see the full picture if he claims something is perfect because of its merits, or if he views something as useless just because of its defects. It is true that economic globalization has created new problems, but this is no justification to write economic globalization off completely. Rather, we should adapt to and guide economic globalization, cushion its negative impact, and deliver its benefits to all countries and all nations.
  • ...15 more annotations...
  • Whether you like it or not, the global economy is the big ocean that you cannot escape from. Any attempt to cut off the flow of capital, technologies, products, industries and people between economies, and channel the waters in the ocean back into isolated lakes and creeks is simply not possible. Indeed, it runs counter to the historical trend.
  • First, lack of robust driving forces for global growth makes it difficult to sustain the steady growth of the global economy. The growth of the global economy is now at its slowest pace in seven years. Growth of global trade has been slower than global GDP growth. Short-term policy stimuli are ineffective. Fundamental structural reform is just unfolding. The global economy is now in a period of moving toward new growth drivers, and the role of traditional engines to drive growth has weakened. Despite the emergence of new technologies such as artificial intelligence and 3-D printing, new sources of growth are yet to emerge. A new path for the global economy remains elusive. Second, inadequate global economic governance makes it difficult to adapt to new developments in the global economy. Madame Christine Lagarde recently told me that emerging markets and developing countries already contribute to 80 percent of the growth of the global economy. The global economic landscape has changed profoundly in the past few decades. However, the global governance system has not embraced those new changes and is therefore inadequate in terms of representation and inclusiveness. The global industrial landscape is changing and new industrial chains, value chains and supply chains are taking shape. However, trade and investment rules have not kept pace with these developments, resulting in acute problems such as closed mechanisms and fragmentation of rules.
  • Third, uneven global development makes it difficult to meet people’s expectations for better lives. Dr. Schwab has observed in his book The Fourth Industrial Revolution that this round of industrial revolution will produce extensive and far-reaching impacts such as growing inequality, particularly the possible widening gap between return on capital and return on labor. The richest one percent of the world’s population own more wealth than the remaining 99 percent. Inequality in income distribution and uneven development space are worrying. Over 700 million people in the world are still living in extreme poverty. For many families, to have warm houses, enough food and secure jobs is still a distant dream. This is the biggest challenge facing the world today. It is also what is behind the social turmoil in some countries. All this shows that there are indeed problems with world economic growth, governance and development models, and they must be resolved. The founder of the Red Cross Henry Dunant once said, “Our real enemy is not the neighboring country; it is hunger, poverty, ignorance, superstition and prejudice.” We need to have the vision to dissect these problems; more importantly, we need to have the courage to take actions to address them.
  • First, we should develop a dynamic, innovation-driven growth model. The fundamental issue plaguing the global economy is the lack of driving force for growth.Innovation is the primary force guiding development. Unlike the previous industrial revolutions, the fourth industrial revolution is unfolding at an exponential rather than linear pace. We need to relentlessly pursue innovation. Only with the courage to innovate and reform can we remove bottlenecks blocking global growth and development. With this in mind, G-20 leaders reached an important consensus at the Hangzhou Summit, which is to take innovation as a key driver and foster new driving force of growth for both individual countries and the global economy. We should develop a new development philosophy and rise above the debate about whether there should be more fiscal stimulus or more monetary easing. We should adopt a multipronged approach to address both the symptoms and the underlying problems. We should adopt new policy instruments and advance structural reform to create more space for growth and sustain its momentum. We should develop new growth models and seize opportunities presented by the new round of industrial revolution and digital economy. We should meet the challenges of climate change and aging population. We should address the negative impact of IT application and automation on jobs. When cultivating new industries and new forms models of business models, we should create new jobs and restore confidence and hope to our peoples.
  • Second, we should pursue a well-coordinated and inter-connected approach to develop a model of open and win-win cooperation. Today, mankind has become a close-knit community of shared future. Countries have extensive converging interests and are mutually dependent. All countries enjoy the right to development. At the same time, they should view their own interests in a broader context and refrain from pursuing them at the expense of others. We should commit ourselves to growing an open global economy to share opportunities and interests through opening-up and achieve win-win outcomes. One should not just retreat to the harbor when encountering a storm, for this will never get us to the other shore of the ocean. We must redouble efforts to develop global connectivity to enable all countries to achieve inter-connected growth and share prosperity. We must remain committed to developing global free trade and investment, promote trade and investment liberalization and facilitation through opening-up and say no to protectionism. Pursuing protectionism is like locking oneself in a dark room. While wind and rain may be kept outside, that dark room will also block light and air. No one will emerge as a winner in a trade war.
  • Third, we should develop a model of fair and equitable governance in keeping with the trend of the times. As the Chinese saying goes, people with petty shrewdness attend to trivial matters, while people with vision attend to governance of institutions. There is a growing call from the international community for reforming the global economic governance system, which is a pressing task for us. Only when it adapts to new dynamics in the international economic architecture can the global governance system sustain global growth. Countries, big or small, strong or weak, rich or poor, are all equal members of the international community. As such, they are entitled to participate in decision-making, enjoy rights and fulfill obligations on an equal basis. Emerging markets and developing countries deserve greater representation and voice. The 2010 IMF quota reform has entered into force, and its momentum should be sustained. We should adhere to multilateralism to uphold the authority and efficacy of multilateral institutions. We should honor promises and abide by rules. One should not select or bend rules as he sees fit. The Paris Agreement is a hard-won achievement which is in keeping with the underlying trend of global development. All signatories should stick to it instead of walking away from it as this is a responsibility we must assume for future generations.
  • Fourth, we should develop a balanced, equitable and inclusive development model. As the Chinese saying goes, “A just cause should be pursued for common good.”Development is ultimately for the people. To achieve more balanced development and ensure that the people have equal access to opportunities and share in the benefits of development, it is crucial to have a sound development philosophy and model and make development equitable, effective and balanced.
  • We should foster a culture that values diligence, frugality and enterprise and respects the fruits of hard work of all. Priority should be given to addressing poverty, unemployment, the widening income gap and the concerns of the disadvantaged to promote social equity and justice. It is important to protect the environment while pursuing economic and social progress so as to achieve harmony between man and nature and between man and society. The 2030 Agenda for Sustainable Development should be implemented to realize balanced development across the world. A Chinese adage reads, “Victory is ensured when people pool their strength; success is secured when people put their heads together.” As long as we keep to the goal of building a community of shared future for mankind and work hand in hand to fulfill our responsibilities and overcome difficulties, we will be able to create a better world and deliver better lives for our peoples.
  • This is a path that puts people’s interests first. China follows a people-oriented development philosophy and is committed to bettering the lives of its people. Development is of the people, by the people and for the people. China pursues the goal of common prosperity. We have taken major steps to alleviate poverty and lifted over 700 million people out of poverty, and good progress is being made in our efforts to finish building a society of initial prosperity in all respects. This is a path of pursuing reform and innovation. China has tackled difficulties and met challenges on its way forward through reform. China has demonstrated its courage to take on difficult issues, navigate treacherous rapids and remove institutional hurdles standing in the way of development. These efforts have enabled us to unleash productivity and social vitality. Building on progress of 30-odd years of reform, we have introduced more than 1,200 reform measures over the past four years, injecting powerful impetus into China’s development.
  • This is a path of pursuing common development through opening-up. China is committed to a fundamental policy of opening-up and pursues a win-win opening-up strategy. China’s development is both domestic and external oriented; while developing itself, China also shares more of its development outcomes with other countries and peoples. China’s outstanding development achievements and the vastly improved living standards of the Chinese people are a blessing to both China and the world. Such achievements in development over the past decades owe themselves to the hard work and perseverance of the Chinese people, a quality that has defined the Chinese nation for several thousand years. We Chinese know only too well that there is no such thing as a free lunch in the world. For a big country with over 1.3 billion people, development can be achieved only with the dedication and tireless efforts of its own people. We cannot expect others to deliver development to China, and no one is in a position to do so. When assessing China’s development, one should not only see what benefits the Chinese people have gained, but also how much hard effort they have put in, not just what achievements China has made, but also what contribution China has made to the world. Then one will reach a balanced conclusion about China’s development.
  • Between 1950 and 2016, despite its modest level of development and living standard, China provided more than 400 billion yuan of foreign assistance, undertook over 5,000 foreign assistance projects, including nearly 3,000 complete projects, and held over 11,000 training workshops in China for over 260,000 personnel from other developing countries. Since it launched reform and opening-up, China has attracted over $1.7 trillion of foreign investment and made over $1.2 trillion of direct outbound investment, making huge contribution to global economic development. In the years following the outbreak of the international financial crisis, China contributed to over 30 percent of global growth every year on average. All these figures are among the highest in the world. The figures speak for themselves. China’s development is an opportunity for the world; China has not only benefited from economic globalization but also contributed to it. Rapid growth in China has been a sustained, powerful engine for global economic stability and expansion. The inter-connected development of China and a large number of other countries has made the world economy more balanced. China’s remarkable achievement in poverty reduction has contributed to more inclusive global growth. And China’s continuous progress in reform and opening-up has lent much momentum to an open world economy.
  • Despite a sluggish global economy, China’s economy is expected to grow by 6.7 percent in 2016, still one of the highest in the world. China’s economy is far bigger in size than in the past, and it now generates more output than it did with double-digit growth in the past. Household consumption and the services sector have become the main drivers of growth. In the first three quarters of 2016, added value of the tertiary industry took up 52.8 percent of the GDP and domestic consumption contributed to 71 percent of economic growth. Household income and employment have steadily risen, while per unit GDP energy consumption continues to drop. Our efforts to pursue green development are paying off. The Chinese economy faces downward pressure and many difficulties, including acute mismatch between excess capacity and an upgrading demand structure, lack of internal driving force for growth, accumulation of financial risks, and growing challenges in certain regions. We see these as temporary hardships that occur on the way forward. And the measures we have taken to address these problems are producing good results. We are firm in our resolve to forge ahead. China is the world’s largest developing country with over 1.3 billion people, and their living standards are not yet high. But this reality also means China has enormous potential and space for development. Guided by the vision of innovative, coordinated, green, open and shared development, we will adapt to the new normal, stay ahead of the curve, and make coordinated efforts to maintain steady growth, accelerate reform, adjust economic structure, improve people’s living standards and fend off risks. With these efforts, we aim to achieve medium-high rate of growth and upgrade the economy to higher end of the value chain.
  • — China will foster an enabling and orderly environment for investment. We will expand market access for foreign investors, build high-standard pilot free trade zones, strengthen protection of property rights, and level the playing field to make China’s market more transparent and better regulated. In the coming five years, China is expected to import $8 trillion of goods, attract $600 billion of foreign investment and make $750 billion of outbound investment. Chinese tourists will make 700 million overseas visits. All this will create a bigger market, more capital, more products and more business opportunities for other countries. China’s development will continue to offer opportunities to business communities in other countries. China will keep its door wide open and not close it. An open door allows both other countries to access the Chinese market and China itself to integrate with the world. And we hope that other countries will also keep their door open to Chinese investors and keep the playing field level for us.
  • — China will vigorously foster an external environment of opening-up for common development. We will advance the building of the Free Trade Area of the Asia Pacific and negotiations of the Regional Comprehensive Economic Partnership to form a global network of free trade arrangements. China stands for concluding open, transparent and win-win regional free trade arrangements and opposes forming exclusive groups that are fragmented in nature. China has no intention to boost its trade competitiveness by devaluing the RMB, still less will it launch a currency war. Over three years ago, I put forward the “Belt and Road” initiative. Since then, over 100 countries and international organizations have given warm responses and support to the initiative. More than 40 countries and international organizations have signed cooperation agreements with China, and our circle of friends along the “Belt and Road” is growing bigger. Chinese companies have made over $50 billion of investment and launched a number of major projects in the countries along the routes, spurring the economic development of these countries and creating many local jobs. The “Belt and Road” initiative originated in China, but it has delivered benefits well beyond its borders.
  • Ladies and Gentlemen,Dear Friends, World history shows that the road of human civilization has never been a smooth one, and that mankind has made progress by surmounting difficulties. No difficulty, however daunting, will stop mankind from advancing. When encountering difficulties, we should not complain about ourselves, blame others, lose confidence or run away from responsibilities. We should join hands and rise to the challenge. History is created by the brave. Let us boost confidence, take actions and march arm-in-arm toward a bright future.
  •  
    Very important speech. A must-read (I snipped only portions).
Gary Edwards

Is The US Finally Ready For Revolution? - Democratic Underground - 1 views

  •  
    Written in June of 2012, before the national elections, this commentary remains the ringing truth.  Maybe more Americans are ready to listen this fourth of July? ........................... "Is America Ready For Revolution? I have always strongly believed that it's not possible to be a good Christian without standing up against social injustice and government corruption in all its forms. As I take a look around me today I find a lot of things wrong with our country. In fact, I have been a proponent for radical change for several years now, and I have written and published 2 books on this very topic. Where shall I begin? In God-blessed America, the land of the free where everyone is an economic slave, our founding fathers' sacred idea of a government "of the people, by the people, for the people" has become but a cruel joke. Former president George W. Bush has notoriously called our Constitution - our supreme law of the land - "that (expletive) piece of paper". The federal government is currently spending at least $60 billion per month on military excursions in Afghanistan, the Middle East, and northern and western Africa - including operating between 800 and 1,000 foreign military bases all over the world. Our country's over-used flying drone aircraft kills hundreds daily overseas, many of whom are only innocent bystanders. Meanwhile here on the home front, one in seven people are on food stamps, and at any given time one in four American children are going hungry today. Our country spends more money incarcerating people than it does on education. What's up with that? Our political system is openly rigged against the best interests of the American people. A massive market mechanism is securely entrenched in our political system where political influence is openly bought and sold. Tens of thousands of highly-paid middlemen called "lobbyists" facilitate the legal transfer of billions between moneyed special interests and our so-called "representatives" i
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Gary Edwards

Startup turns carbon dioxide into fuels - 0 views

  • The research has received funding from the Air Force Office of Scientific Research (AFSOR), the National Science Foundation and the Department of Energy (DOE). The collaboration between Liquid Light and the University was supported by the DOE Small Business Innovation Research program and the AFOSR Small Business Technology Transfer program. Princeton's agreement with Liquid Light allowed the company to continue to collaborate with Bocarsly and his research team. Before long, new discoveries were emerging. "They started noticing interesting chemistry that we wouldn't have predicted," said Bocarsly.
  • The Princeton scientists did some additional studies, and made a surprising discovery: They could turn CO2, which contains only one carbon, into a compound with a carbon-carbon bond, which vastly increases the possibilities for creating commercial applications. This was radical because although the reaction is certainly possible, it is highly unlikely to happen because so many other competing reactions are occurring. "Everyone who electrochemically reduces CO2 today makes compounds with only one carbon," said Bocarsly. "Nobody makes things with carbon-carbon bonds." He paused. "But we can." "That was a very 'wow' moment," recalled Cole, "because we thought that our process could only make methanol. But now we were finding that we could make a variety of products, and that is what makes this technology commercially interesting." She said Liquid Light scientists can now make more than 20 different products from CO2.
  • One of the chemicals Liquid Light can make is isopropanol, commonly known as rubbing alcohol and an important industrial chemical. Another is butanol, which could be commercially important as a fuel. Liquid Light's technology offers the potential to make these chemicals at lower cost than today's methods, which involve starting with fossil fuels such as petroleum and natural gas.
  • ...3 more annotations...
  • Why does pyridinium work so well as a catalyst for the reaction? Based on its structure, the ring-shaped molecule is an unlikely catalyst for this reaction because it shuttles just one electron at a time. But to convert CO2 to methanol requires six electrons, and to make higher-carbon molecules takes even more electrons. Bocarsly and his team — in collaboration with Steven Bernasek, professor of chemistry — are doing studies to understand the steps in the chemical reaction, and they are making rapid progress. "There are clearly some intermediate products formed during the reaction that do not sit around for a long time and are not there in very high concentrations," said Bocarsly.
  • The Princeton team also is studying the factors that determine which products can be made from CO2. The researchers have found that very subtle changes in the electrode surface can lead to production of different chemicals. For example, CO2 plus a pyridinium catalyst and a platinum electrode make methanol. However, the same catalyst and a different electrode give a different product. The team published its findings on how the reaction is affected by catalyst concentration, temperature and pressure in the journal ChemSusChem last year.
  • Citing government statistics that the United States generates about 5.5 billion metric tons of CO2 per year, Teamey said it will not be hard to obtain the starting materials for this new industry. However, the CO2 needs to be relatively pure, a requirement that rules out gasoline tailpipes and coal-fired power plants. Instead, said Teamey, the CO2 could come from manufacturing facilities, such as fertilizer manufacturers and cement plants, which according to Teamey emit some 100 million tons of high-purity CO2 each year.
  •  
    "Today, carbon dioxide (CO2) is a hot topic. Scientists around the globe are searching for ways to store, dispose of, or prevent the formation of the greenhouse gas, which is a major driver of global climate change. Liquid Light hopes to take this concept one step further and harness waste CO2 as a source of carbon to make industrial chemicals and fuels. The technology behind the process is simple: Take CO2 and mix it in a water-filled chamber with an electrode and a catalyst. The ensuing chemical reaction converts CO2 into a new molecule, methanol, which can be used as a fuel, an industrial solvent or a starting material for the manufacture of other chemicals. Liquid Light's founders include Bocarsly and his former graduate student Emily Cole, who earned her Ph.D. from Princeton in 2009. Cole helped revive efforts in Bocarsly's lab to study the conversion of CO2 into usable fuels, which led to the launch of Liquid Light and an ongoing collaboration that Bocarsly said has been extremely positive for his research team at the University. "We've made some discoveries that wouldn't have been made in a university setting, and this has really accelerated the research," Bocarsly said. "It is a very productive relationship." Back in the 1990s, a former Ph.D. student of Bocarsly's named Chao Lin conducted some of the earliest experiments on turning CO2 into methanol. He used palladium metal as the electrode and pyridinium, an inexpensive ring-shaped molecule, as the catalyst. By plugging the electrode into an electrical outlet, he could drive an electrochemical reaction that converted CO2 into methanol. As Bocarsly recalled, Lin was quite excited about his success. However, said Bocarsly, "We published that finding in 1994 and there was approximately zero interest in it." The work languished until 2005 when Cole, then a new graduate student, told Bocarsly she wanted to work on a clean-energy project. She took up the challenge of reproducing Lin's results, but this time
Gary Edwards

Is The US Using Prism To Engage In Commercial Espionage Against Germany And Others? | T... - 1 views

  •  
    Meanwhile, illegal NSA spying is expected to cost USA Cloud Computing companies $35 Billion in lost sales and services. "whistleblower Edward Snowden worked for the CIA, rather than the NSA. Here's the original text in the Guardian: By 2007, the CIA stationed him with diplomatic cover in Geneva, Switzerland. His responsibility for maintaining computer network security meant he had clearance to access a wide array of classified documents. That access, along with the almost three years he spent around CIA officers, led him to begin seriously questioning the rightness of what he saw. He described as formative an incident in which he claimed CIA operatives were attempting to recruit a Swiss banker to obtain secret banking information. Snowden said they achieved this by purposely getting the banker drunk and encouraging him to drive home in his car. When the banker was arrested for drunk driving, the undercover agent seeking to befriend him offered to help, and a bond was formed that led to successful recruitment. In that quotation, there's the nugget of information that the CIA was not targeting terrorists on this occasion, at least not directly, but "attempting to recruit a Swiss banker to obtain secret banking information". That raises an interesting possibility for the heightened interest in Germany, as revealed by Boundless Informant. Given that the NSA is gathering information on a large scale -- even though we don't know exactly how large -- it's inevitable that some of that data will include sensitive information about business activities in foreign countries. That could be very handy for US companies seeking to gain a competitive advantage, and it's not hard to imagine the NSA passing it on in a suitably discreet way. Germany is known as the industrial and economic powerhouse of Europe, so it would make sense to keep a particularly close eye on what people are doing there -- especially if those people happen to work in companies that compete with US firms.
  •  
    Closely related: see http://www.theguardian.com/business/2013/aug/02/telecoms-bt-vodafone-cables-gchq (,) an article on British telecom's collaboration with wiretapping by the UK's counterpart to the NSA, GCHQ. According to an inside source: "The source said analysts used four criteria for determining what was examined: security, terror, organised crime and Britain's economic wellbeing." I also recall that years ago during the furor over the Echelon system, an EU Parliament investigation had concluded that there were concrete instances of commercial intelligence being passed on by NSA to American companies. Specifically, I recall a finding that during development of the AirBus, details of its design had been intercepted by NSA and passed on to Boeing. There was testimony received that more generically discussed the types of economic surveillance conducted. http://cryptome.org/echelon-nh.htm (page search for "economic"). The same researcher stressed that in public statements: "Those targets like terrorism and weapons transport are used as a cover for the traditional areas of spying, the predominant areas of spying, which are political, diplomatic, economic and military."
Paul Merrell

"Washington's Determination to Drive the World to War": Will Putin Realize That Russia ... - 0 views

  • By Russia’s low key and unthreatening response to Washington’s aggression, thereby giving the West the mistaken signal that Russia is weak and fearful, the Russian government has encouraged Washington’s drive to war.
  • The amazing thing about Russia finding herself on the defensive about sanctions is that Russia, not Washington or the impotent EU, holds all the cards.  Putin can bring down the economies of Europe and throw all of Europe into political and economic chaos simply by turning off the energy supply. Putin would not have to turn off the energy supply for very long before Europe tells Washington good-bye and comes to terms with Russia. The longer Putin waits, the longer Europe has to prepare against Russia’s best weapon that can be used to peacefully resolve the conflict that Washington has orchestrated. Washington’s aggressive moves against Russia will not stop until Putin realizes that he, not Washington, holds the cards, and plays them. The world has had enough of Washington, its constant lies, its constant wars, and its bullying.  Putin would do well to spend a few hours with Belisarius, Justinian the Great’s great general.
  • “When I treat with my enemies,” Belisarius said, “I am more accustomed to give than to receive counsel; but I hold in one hand inevitable ruin, in the other peace and freedom.” That is precisely the position that Vladimir Putin is in with regard to Europe.  In one hand he holds the ruin of Europe.  In the other peace and freedom in the relations between Russia and Europe. He needs to call up the dumbshit European “leaders” and tell them. If Putin does not put his foot down hard and make clear to the Europeans what the stakes are, Washington will succeed in its determination to drive the world to war, and “exceptional and indispensable” Americans will die along with all the rest.
  •  
    Paul Craig Roberts thinks he has spotted Europe's jugular vein in the sanctions war over Ukraine. I'll need some time to think about this. Roberts is correct on the location of the jugular vein. But how might the Empire of Chaos with its capitol in Washington, D.C. respond? We've got rabid neocons in control of the Dark State.
Gary Edwards

The Thorium Powered Car - EPautos - 0 views

  • An internal combustion can burn gas and CNG (or propane). All that was necessary to allow the switch from one fuel to another was some additional plumbing and calibration of the car’s ECU (the computer that makes air-fuel ratio adjustments and so on). So, no worries about running empty – and no waiting for hours to refuel. Three, CNG was (is) cheap and burns very cleanly and is massively abundant right here in the U.S.  At a stroke, the three major charges leveled against the pure-gasoline-burning car are vacated. The CNG car hardly pollutes and it greatly reduces and potentially eliminates dependence on “foreign” oil. Also, the cost of the CNG car itself was within reason because no uber-elaborate technology was necessary (unlike electric cars and hybrid electric cars). Just some modifications to an existing car. Sure, there were some issues to be sorted out – the big one being making it easy (and safe) for the average person to refill the CNG tanks. But the technology of the car itself worked – and was economic.
  • So why wasn’t it developed? Perhaps precisely because it did work – and was economic. People could drive big – and powerful cars. At a reasonable cost. Well, they could have.
  • Here’s another, more recent one: The thorium-turbine powered car. Heat energy from the thorium – a weakly radioactive element (named after the Norse god Thor) that is estimated to be 3-4 times more naturally abundant than uranium and which contains 20 million times the energy as an equivalent lump of coal – is used to generate steam, which is then used to power a small turbine, which provides the motive force. The beauty of the system is that – like a nuclear submarine – the fuel lasts almost forever. Well, longer than you will last, probably. How’s 100 years sound? No more stopping for “gas”… ever. This alone would make current IC cars seem as wasteful of time (and energy) as current IC cars make electric cars look wasteful of time and energy. But wait, there’s more.
  • ...2 more annotations...
  • Well, less. No emissions at all. Because nothing’s being burned, there’s no exhaust. Water to steam, expansion and contraction – and back again. Closed (and clean) loop. The Algoreans ought to be ecstatic. Yet there is dead silence. You can hear the crickets chirping. Is it because thorium is radioactive? The word is third rail to scientifically illiterate homo Americanus – who fears it in the same way a savage fears the voices coming out of the Talk Box (radio). The mere mention of the word is sufficient to incite a panic. It’s why the nuclear power grid is dead in the water; or rather, as old as a Betamax copy of Saturday Night Fever. But it’s not even the same thing. Thorium is mildly radioactive. Dr. Charles Stevens, CEO of Laser Power Systems – which is developing the technology, or at least, trying to – says: “The radiation can be shielded by a single sheet of aluminum foil.” 
  • Bear in mind that gasoline is a highly volatile, highly explosive liquid fuel. But most of us do not sweat having 15 or so gallons of the stuff sloshing around in our cars, because we’re used to it. Because we know the gas tank is well-protected and not likely to burst into flames. It could happen, sure. But the individual risk is very small – just as the individual risk posed by a thorium-turbine car’s low-level radioactivity is small. Well, would be. If such cars were to be produced. But, it doesn’t look like they will be. Stevens told Mashable that “the automakers don’t want to buy them” – so his company is focusing on other applications of the technology, including an air conditioner-size unit that could power an entire restaurant or hotel, eliminating the need for grid electricity. This ought to please the Algoreans, too – since the electric grid is powered mostly by coal and oil-fired utility plants. But, again, crickets. It kind of makes you wonder, doesn’t it?
  •  
    "Why is it that alternative technologies that clearly do not work -  which are so gimped by functional and economic problems as to be not-viable on the market absent huge subsidies and even then, it's hard to give them away - continue to receive seemingly endless financial and political support … while technologies that actually might work better than current internal combustion engine technology can't seem to get any traction at all? Electric cars are hopeless. For more than a century now, generations of engineers have tried - and, so far, failed - to develop a battery that will endow an electric car with the range and reasonable recharge times necessary for everyday-driver viability… at a cost (not subsidized) that would make such a car a better choice, economically speaking, than an otherwise comparable gasoline (or diesel) powered car. Billions of dollars, probably, have been thrown at the electric car and - so far - no major technological improvement over a 1906 Baker Landolet. Meanwhile, whatever happened to the natural gas-burning car? Back in the mid-'90s, both Ford and GM built - and actually sold - natural-gas (CNG) fueled cars. Several things about them were interesting. One, they were big cars. Ford sold a CNG version of its six-passenger/full-size Crown Vic; GM sold a CNG version of the Vic's primary competition - the Chevy Caprice. Part of the reason for going with the big car as the platform was the need for a big trunk to house the CNG tank (and still have some trunk space left for people's things). But the take-home point was that you got a nice big family car - with a V8 engine - rather than a scrunched up subcompact. Two, they were practical. No range issue, because you had plenty (150-plus) on the CNG and the distance you could drive was not affected by the outside temperature or greatly reduced if you ran accessories like the AC and headlights, as it is in electric cars. And besides, when the C
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Gary Edwards

Tea Party Primary prior to RINO Primary - Tea Party Command Center - 0 views

  •  
    Reply by Gary Edwards to the question:   "Should the TEA Party select their slate of candidates prior to the establishment RiNO primaries?" This question really surprised me.  Of course the Tea Party should enter the establishment RiNO primary with a full slate of previously selected candidates for all levels of elected office. The reasons are obvious.  The establishment RiNOS consistently win by flooding the primary, encouraging multiple conservative and libertarian candidates; all the while knowing exactly who they have hand picked and expect the party to coalesce around. It's divide and conqueror.  The incredible thing is how routinely and with ease the RiNOS can rope-a-dope Rush Limbaugh and the entire cadre of conservative leadership.  And do it year after year. The rope-a-dope maneuver only requires that conservatives and libertarians wait for the establishment primary process to begin before they can begin the drawn out process needed to coalesce and vote as a block. As a block, the Tea Party wins easily.  And, they would actually get candidates ready to stand and fight for the Constitution. Once the game of electoral money ball starts though, it's impossible to select and coalesce based on principles.  Money drives the game.  And that plays right into the hands of the establishment. Think of it this way.  The Tea Party has the "votes" and the "ground game".  The establishment has the "money", and position to make the "rules". The current system of selecting candidates in the establishment primary ALWAYS results in "money" and "rule making" dominating and determining the winners.  The Tea Parties numerical and ground game advantages are quickly diluted, dispersed and split by multiple candidates vying for the same vote.  The RiNO slate wins through the fractional split of their Tea Party opponents, which they encourage and expect, and, the hardball application of their money and rules advantages.  The result is that less than a third of
Paul Merrell

Clipper chip - Wikipedia, the free encyclopedia - 0 views

  • The Clipper chip was not embraced by consumers or manufacturers and the chip itself was no longer relevant by 1996. The U.S. government continued to press for key escrow by offering incentives to manufacturers, allowing more relaxed export controls if key escrow were part of cryptographic software that was exported. These attempts were largely made moot by the widespread use of strong cryptographic technologies, such as PGP, which were not under the control of the U.S. government.
  •  
    But were the government attempts actually mooted? Or did they come up with other bribes for the OEMs to add NSA backdoors to their hardware? An inquiring world wishes to know. See http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html (NSA backdoors in routers and hard drives). 
Paul Merrell

Glenn Greenwald: The NSA Can "Literally Watch Every Keystroke You Make" - 0 views

  • On Sunday, the German publication Der Spiegel revealed new details about secretive hacking—a secretive hacking unit inside the NSA called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Still with us, Jameel Jaffer, deputy legal director of the ACLU, director of the ACLU’s Center for Democracy, and Glenn Greenwald, the journalist who first broke the story about Edward Snowden. Glenn, can you just talk about the revelations in Der Spiegel?
  • And one of the ways that they’re doing it is that they intercept products in transit, such as if you order a laptop or other forms of Internet routers or servers and the like, they intercept it in transit, open the box, implant the malware, factory-seal it and then send it back to the user. They also exploit weaknesses in Google and YouTube and Yahoo and other services, as well, in order to implant these devices. It’s unclear to what extent, if at all, the companies even know about it, let alone cooperate in it. But what is clear is that they’ve been able to compromise the physical machines themselves, so that it makes no difference what precautions you take in terms of safeguarding the sanctity of your online activity.
  • But we’ve actually been working, ourselves, on certain stories that should be published soon regarding similar interdiction efforts. And one of the things that I think is so amazing about this, Amy, is that the U.S. government has spent the last three or four years shrilly, vehemently warning the world that Chinese technology companies are unsafe to purchase products from, because they claim the Chinese government interdicts these products and installs surveillance, backdoors and other forms of malware onto the machinery so that when you get them, immediately your privacy is compromised. And they’ve actually driven Chinese firms out of the U.S. market and elsewhere with these kinds of accusations. Congress has convened committees to issue reports making these kind of accusations about Chinese companies. And yet, at the same time, the NSA is doing exactly that which they accuse these Chinese companies of doing. And there’s a real question, which is: Are these warnings designed to steer people away from purchasing Chinese products into the arms of the American industry so that the NSA’s ability to implant these devices becomes even greater, since now everybody is buying American products out of fear that they can no longer buy Chinese products because this will happen to them?
  • ...1 more annotation...
  • And the final thing I want to say is, you know, all this talk about amnesty for Edward Snowden, and it’s so important that the rule of law be applied to him, it’s really quite amazing. Here’s Michael Hayden. He oversaw the illegal warrantless eavesdropping program implemented under the Bush administration. He oversaw torture and rendition as the head of the CIA. James Clapper lied to the face of Congress. These are felonies at least as bad, and I would say much worse, than anything Edward Snowden is accused of doing, and yet they’re not prosecuted. They’re free to appear on television programs. The United States government in Washington constantly gives amnesty to its highest officials, even when they commit the most egregious crimes. And yet the idea of amnesty for a whistleblower is considered radical and extreme. And that’s why a hardened felon like Michael Hayden is free to walk around on the street and is treated on American media outlets as though he’s some learned, wisdom-drenched elder statesman, rather than what he is, which is a chronic criminal.
  •  
    Greenwald asks a very good question about the U.S. government accusing the Chinese government of cyber-espionage and the government's finding that Chinese-manufactured ware pose a security risk. Was that intended to drive people to purchase hardware that comes equipped with NSA backdoors? The flip side, of course, is whether the world should be beating feet to purchase their hardware from the Chinese in order to escape the NSA backdoors. Then there is the question of how those backdoors might have made their way into the hardware devices without the acquiescence of their manufacturers, who surely would have realized that their businesses might take enormous financial hits if knowledge of the backdoors became public? Bribing key staff? The manufacturers named in the Der Spiegel article surely are going to face some hard questions and they may face some very unhappy shareholders if their stock prices take a dive. It would be fun to see a shareholder's derivative class action against one of these companies for having acquiesced to NSA implantation of backdoors, leading to the disclosure and the fall in stock price. Caption the case as Wall Street, Inc. v. National Security Agency, dba Seagate Technology, PLC, then watch the feathers and blood fly.  "Seagate is the company the world trusts to store our lives - our files and photos, our libraries and histories, our science and progress."   Yes, and your stockholders trusted you not to endanger their investment by adding NSA backdoors in your products.
Paul Merrell

ExposeFacts - For Whistleblowers, Journalism and Democracy - 0 views

  • Launched by the Institute for Public Accuracy in June 2014, ExposeFacts.org represents a new approach for encouraging whistleblowers to disclose information that citizens need to make truly informed decisions in a democracy. From the outset, our message is clear: “Whistleblowers Welcome at ExposeFacts.org.” ExposeFacts aims to shed light on concealed activities that are relevant to human rights, corporate malfeasance, the environment, civil liberties and war. At a time when key provisions of the First, Fourth and Fifth Amendments are under assault, we are standing up for a free press, privacy, transparency and due process as we seek to reveal official information—whether governmental or corporate—that the public has a right to know. While no software can provide an ironclad guarantee of confidentiality, ExposeFacts—assisted by the Freedom of the Press Foundation and its “SecureDrop” whistleblower submission system—is utilizing the latest technology on behalf of anonymity for anyone submitting materials via the ExposeFacts.org website. As journalists we are committed to the goal of protecting the identity of every source who wishes to remain anonymous.
  • The seasoned editorial board of ExposeFacts will be assessing all the submitted material and, when deemed appropriate, will arrange for journalistic release of information. In exercising its judgment, the editorial board is able to call on the expertise of the ExposeFacts advisory board, which includes more than 40 journalists, whistleblowers, former U.S. government officials and others with wide-ranging expertise. We are proud that Pentagon Papers whistleblower Daniel Ellsberg was the first person to become a member of the ExposeFacts advisory board. The icon below links to a SecureDrop implementation for ExposeFacts overseen by the Freedom of the Press Foundation and is only accessible using the Tor browser. As the Freedom of the Press Foundation notes, no one can guarantee 100 percent security, but this provides a “significantly more secure environment for sources to get information than exists through normal digital channels, but there are always risks.” ExposeFacts follows all guidelines as recommended by Freedom of the Press Foundation, and whistleblowers should too; the SecureDrop onion URL should only be accessed with the Tor browser — and, for added security, be running the Tails operating system. Whistleblowers should not log-in to SecureDrop from a home or office Internet connection, but rather from public wifi, preferably one you do not frequent. Whistleblowers should keep to a minimum interacting with whistleblowing-related websites unless they are using such secure software.
    • Gary Edwards
       
      Thanks Paul! Great article and I agree with you about switching. Rather than a USB, I would rather look into a SSD and try to isolate performance to an ISP bandwidth issue. FYI, I read your Diigo posts daily at this Web site: https://groups.diigo.com/group/socialism-and-the-end-of-the-american-dream/content/user/marbux Seems to be the best visual presentation of your research. I do however think Diigo could improve their hosting of this research by enabling more extensive comments. Notice that your comments are often clipped :( Still, I really do appreciate your sharing both your research and your commentary. Priceless stuff! Many thanks! ~ge~
  •  
    A new resource site for whistle-blowers. somewhat in the tradition of Wikileaks, but designed for encrypted communications between whistleblowers and journalists.  This one has an impressive board of advisors that includes several names I know and tend to trust, among them former whistle-blowers Daniel Ellsberg, Ray McGovern, Thomas Drake, William Binney, and Ann Wright. Leaked records can only be dropped from a web browser running the Tor anonymizer software and uses the SecureDrop system originally developed by Aaron Schwartz. They strongly recommend using the Tails secure operating system that can be installed to a thumb drive and leaves no tracks on the host machine. https://tails.boum.org/index.en.html Curious, I downloaded Tails and installed it to a virtual machine. It's a heavily customized version of Debian. It has a very nice Gnome desktop and blocks any attempt to connect to an external network by means other than installed software that demands encrypted communications. For example, web sites can only be viewed via the Tor anonymizing proxy network. It does take longer for web pages to load because they are moving over a chain of proxies, but even so it's faster than pages loaded in the dial-up modem days, even for web pages that are loaded with graphics, javascript, and other cruft. E.g., about 2 seconds for New York Times pages. All cookies are treated by default as session cookies so disappear when you close the page or the browser. I love my Linux Mint desktop, but I am thinking hard about switching that box to Tails. I've been looking for methods to send a lot more encrypted stuff down the pipe for NSA to store. Tails looks to make that not only easy, but unavoidable. From what I've gathered so far, if you want to install more software on Tails, it takes about an hour to create a customized version and then update your Tails installation from a new ISO file. Tails has a wonderful odor of having been designed for secure computing. Current
Paul Merrell

Warrantless airport seizure of laptop "cannot be justified," judge rules | Ars Technica - 0 views

  • The US government's prosecution of a South Korean businessman accused of illegally selling technology used in aircraft and missiles to Iran was dealt a devastating blow by a federal judge. The judge ruled Friday that the authorities illegally seized the businessman's computer at Los Angeles International Airport as he was to board a flight home. The authorities who were investigating Jae Shik Kim exercised the border exception rule that allows the authorities to seize and search goods and people—without court warrants—along the border and at airport international terminals. US District Court judge Amy Berman Jackson of the District of Columbia noted that the Supreme Court has never directly addressed the issue of warrantless computer searches at an international border crossing, but she ruled (PDF) the government used Kim's flight home as an illegal pretext to seize his computer. Authorities then shipped it 150 miles south to San Diego where the hard drive was copied and examined for weeks, but the judge said the initial seizure "surely cannot be justified." After considering all of the facts and authorities set forth above, then, the Court finds, under the totality of the unique circumstances of this case, that the imaging and search of the entire contents of Kim’s laptop, aided by specialized forensic software, for a period of unlimited duration and an examination of unlimited scope, for the purpose of gathering evidence in a pre-existing investigation, was supported by so little suspicion of ongoing or imminent criminal activity, and was so invasive of Kim’s privacy and so disconnected from not only the considerations underlying the breadth of the government’s authority to search at the border, but also the border itself, that it was unreasonable.
  • "The government points to its plenary authority to conduct warrantless searches at the border. It posits that a laptop computer is simply a 'container' that was examined pursuant to this authority, and it submits that the government’s unfettered right to search cargo at the border to protect the homeland is the beginning and end of the matter," the judge wrote. Evidence discovered on his computer of his alleged involvement in the conspiracy that won an indictment is now suppressed, and it cannot be used against him according to the ruling. The authorities took the man's computer in 2012 for national security reasons but allowed him to board his flight home. The government did not comment on the decision. Judge Berman Jackson questioned whether the border search exception should apply to laptops because they carry much more private information than, say, a briefcase. Judge Jackson cited last year's Supreme Court case, known as Riley, in which the justices ruled unanimously that the authorities generally may not search the mobile phones of those they arrest unless they have a court warrant.
  • The Supreme Court said that "Modern cell phones, as a category, implicate privacy concerns far beyond those implicated by the search of a cigarette pack, a wallet, or a purse. A conclusion that inspecting the contents of an arrestee’s pockets works no substantial additional intrusion on privacy beyond the arrest itself may make sense as applied to physical items, but any extension of that reasoning to digital data has to rest on its own bottom." Seizing on that high court opinion, Judge Berman Jackson wrote: Applying the Riley framework, the national security concerns that underlie the enforcement of export control regulations at the border must be balanced against the degree to which Kim’s privacy was invaded in this instance. And as was set forth above, while the immediate national security concerns were somewhat attenuated, the invasion of privacy was substantial: the agents created an identical image of Kim’s entire computer hard drive and gave themselves unlimited time to search the tens of thousands of documents, images, and emails it contained, using an extensive list of search terms, and with the assistance of two forensic software programs that organized, expedited, and facilitated the task. Based upon the testimony of both Special Agent Hamako and Special Agent Marshall, the Court concludes that wherever the Supreme Court or the Court of Appeals eventually draws the precise boundary of a routine border search, or however either Court ultimately defines a forensic – as opposed to a conventional – computer search, this search was qualitatively and quantitatively different from a routine border examination, and therefore, it was unreasonable given the paucity of grounds to suspect that criminal activity was in progress.
  •  
    The court's decision indicates that the Feds can still do a border search of a laptop but that they cross the line when they seize the computer for later forensic examination without a warrant. In this case, the government conducted the forensic examination before obtaining a warrant.
Gary Edwards

The Daily Bell - The Economist Hoists Its Battle Balloon? - 1 views

  •  
    "The first world war... Look back with angst ... Thanks to its military, economic and soft power, America is still indispensable, particularly in dealing with threats like climate change and terror, which cross borders. But unless America behaves as a leader and the guarantor of the world order, it will be inviting regional powers to test their strength by bullying neighbouring countries. The chances are that none of the world's present dangers will lead to anything that compares to the horrors of 1914. Madness, whether motivated by race, religion or tribe, usually gives ground to rational self-interest. But when it triumphs, it leads to carnage, so to assume that reason will prevail is to be culpably complacent. That is the lesson of a century ago. - Economist Magazine Dominant Social Theme: Beware the coming wars ... Free-Market Analysis: You can't make this stuff up. The top men in the globalist community have been hard at work building wars and potential wars, and now it's time to let 'er rip. This is one dominant social theme we saw coming miles away. We've been writing about its imminence for years, and predicting war and more war as internationalists try to blunt the effect of the Internet Reformation. After the Gutenberg press blew up the Middle Ages and the Roman Catholic Church besides, the globalists of the era used economic chaos, war and the invention of copyright to fight back. We predicted they would use the same tools this time around and have no reason to revise our predictions thus far. The only thing we've consistently pointed out that has not yet been addressed is the inability of the top men to launch a full-out world war because that would involve nuclear weapons. And lacking a full-out war, we have questioned how successful the strategy can be. Obviously, the top elites see something we don't. Or perhaps they are willing to risk an all-out war anyway - as they retreat into reported fully-stocked, underground "cities." Here's more fro
Paul Merrell

BDS SOUTH AFRICA: ISRAEL INCHES CLOSER TO 'TIPPING POINT' OF SOUTH AFRICA-STYLE BOYCOTT... - 0 views

  • Analogies with apartheid regime in the wake of Mandela’s death could accelerate efforts to ostracize Israel. This has happened in recent days: The Dutch water company Vitens severed its ties with Israeli counterpart Mekorot; Canada’s largest Protestant church decided to boycott three Israeli companies; the Romanian government refused to send any more construction workers; and American Studies Association academics are voting on a measure to sever links with Israeli universities. Coming so shortly after the Israeli government effectively succumbed to a boycott of settlements in order to be eligible for the EU’s Horizon 2020 scientific cooperation agreement, it is hard to avoid the conclusion that the BDS (Boycott, Divestment and Sanctions) movement is picking up speed. And the writing on the wall, if anyone missed it, only got clearer and sharper in the wake of the death of Nelson Mandela.
  • When the United Nations passed its first non-binding resolution calling for a boycott of South Africa in 1962, it was staunchly opposed by a bloc of Western countries, led by Britain and the United States. But the grassroots campaign that had started with academic boycotts in the late 1950s gradually moved on to sports and entertainment and went on from there to institutional boycotts and divestment. Along the way, the anti-apartheid movement swept up larger and larger swaths of Western public opinion, eventually forcing even the most reluctant of governments, including Israel and the U.S., to join the international sanctions regime. 
  • We’re really great at knowing where thresholds are after we fall off the cliff, but that’s not very helpful,” as lake ecologist and “tipping point” researcher Stephen Carpenter told USA today in 2009.  Israel could very well be approaching such a threshold. Among the many developments that could be creating the required critical mass one can cite the passage of time since the Twin Towers attacks in September 2001, which placed Israel in the same camp as the U.S. and the West in the War on Terror; Israel’s isolation in the campaign against Iran’s nuclear programs; the disappearance of repelling archenemies such as Osama bin Laden, Muammar Gadhafi, Mahmoud Ahmadinejad and, to a lesser degree, Yasser Arafat; the relative security and lack of terror inside Israel coupled with its own persistent settlement drive; and the negative publicity generated by revelations of racism in Israeli society, the image of its rulers as increasingly rigid and right wing and the government’s own confrontations with illegal African immigrants and Israeli Bedouin, widely perceived as being tinged with bias and prejudice.  In recent days, American statesmen seem to be more alarmed about the looming danger of delegitimization than Israelis are. In remarks to both the Saban Forum and the American Joint Distribution Committee this week, Secretary of State John Kerry described delegitimization as “an existential danger." Vice President Joe Biden, speaking to the same JDC forum, went one step further: “The wholesale effort to delegitimize Israel is the most concentrated that I have seen in the 40 years I have served. It is the most serious threat in my view to Israel’s long-term security and viability.” 
  • ...1 more annotation...
  • One must always take into account the possibility of unforeseen developments that will turn things completely around. Barring that, the only thing that may be keeping Israel from crossing the threshold and “going over the cliff” in the international arena is Kerry’s much-maligned peace process, which is holding public opinion and foreign governments at bay and preventing a “tipping point” that would dramatically escalate the anti-Israeli boycott campaign.  Which only strengthens Jeffrey Goldberg’s argument in a Bloomberg article on Wednesday that Kerry is “Israel’s best friend." It also highlights, once again, how narrow-minded, shortsighted and dangerously delusional Kerry’s critics, peace process opponents and settlement champions really are (though you can rest assured that if and when the peace process collapses and Israel is plunged into South African isolation, they will be pointing their fingers in every direction but themselves.
  •  
    Note that this article's original is behind a paywall in Haaretz, one of Israel's market-leading newspapers.  There can be no questioning of the facts that: [i] the Palestinian Boycott, Divesment, and Sanctions ("BDS") movement is rapidly gaining strength globally; and [ii] that factor weighs heavily in the negotiations between Israel and Palestine for a two-state solution. Although not bluntly stated, the BSD movement's path runs directly to a single-state solution that would sweep Israel's present right-wing government from power and result in a secular state rather than a "Jewish state." And the E.U., Israel's largest export market, has promised to go even farther in sanctioning Israel than the considerable distance it has already gone if the negotiations do not result in a two state solution. Labeling all products produced wholly or in part in Israel-occupied Palestine territory is among the mildest of sanctions under discussion, a measure already adopted in two E.U. nations. The BSD Movement's success has also been marked by Israel attaining the pariah state status previously experienced by South Africa. Only the U.S., Canada, and a half-dozen or so tiny island nations closely aligned with the U.S. still vote in favor of Israel at the U.N. For example, the vote on granting Palestine U.N. observer state status was 138-9, with 41 abstentions.  The prospect of an end to the non-secular Jewish state has enormous ramifications for U.S. foreign policy, not the least of which is the influence of the Israel lobby in the U.S. that has thus far led the U.S. to three Treasury-draining wars in Southwest Asia and Northern Africa and host of minor military actions in other area nations, as well as a near-war in Syria, averted mainly via Russian diplomacy that outfoxed Secretary of State John Kerry. Time will tell whether the diplomatic outreach by Iran will succeed in averting war with the greatest military power remaining in the Mideast after Israel itself. "Protectin
Paul Merrell

Big Media's Contra-Cocaine Cover-up - Consortiumnews - 0 views

  • Special Report: Twelve years ago, a campaign of character assassination by the major U.S. newspapers drove an honest journalist to suicide. Now those papers claim to be paragons of truth-telling, says Robert Parry. By Robert Parry Amid the mainstream U.S. media’s current self-righteous frenzy against “fake news,” it’s worth recalling how the big newspapers destroyed Gary Webb, an honest journalist who exposed some hard truths about the Reagan administration’s collaboration with Nicaraguan Contra cocaine traffickers. Webb’s reward for reviving that important scandal in 1996 – and getting the CIA’s inspector general to issue what amounted to an institutional confession in 1998 – was to have The New York Times, The Washington Post and Los Angeles Times lobby for, essentially, his banishment from journalism.
  • The major media pile-on was so intense and so effective that Webb lost his job at the San Jose Mercury-News and could never find regular work in his profession again. Betrayed by his journalistic colleagues, his money gone, his family broken and his life seemingly hopeless, Webb committed suicide on Dec. 9, 2004. Even then, the Los Angeles Times wrote up his obituary as if the paper were telling the life story of an organized-crime boss, not a heroic journalist. The Times obit was then republished by The Washington Post. In other words, on one of the most significant scandals of the Reagan era, major newspapers, which now want to serve as the arbiters of truth for  the Internet, demonstrated how disdainful they actually are toward truth when it puts the U.S. government in a harsh light.
  • Indeed, if it had been up to the big newspapers, this important chapter of modern history would never have been known. A decade earlier, in 1985, Brian Barger and I first exposed the Contra-cocaine connection for The Associated Press – and we watched as the big papers turned their backs on the scandal then, too. The main point that Webb added to the story was how some of the Contra cocaine fed into the production of crack-cocaine that had such a devastating effect on America’s black communities in particular. Webb’s disclosure of the crack connection infuriated many African-Americans and the big papers acted as if it was their civic duty to calm down those inner-city folks by assuring them that the U.S. government would never do such a thing. So, instead of doing their jobs as journalists, the major newspapers acted as the last line of defense against the people learning the truth.
  •  
    Big media's drive to discredit alternative news sites is setting off a raft of coverage in the alternative news scene about big media false reporting and cover-ups.
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Explainer: why the Greek election is so important - 0 views

  • The Greek election on January 25 will be the most important in recent memory. If the pollsters are proven correct, Syriza is poised to win by a large margin and this victory will end four decades of two-party rule in Greece. Since 2010 – and as a result of austerity measures – the country has seen its GDP shrink by nearly a quarter, its unemployment reach a third of the labour force and nearly half of its population fall below the poverty line. With the slogan “hope is coming” Syriza, a party that prior to 2012 polled around 4.5% of the vote, seems to have achieved the impossible: creating a broad coalition that, at least rhetorically, rejects the TINA argument (There Is No Alternative) that previous Greek administrations have accepted. In its place, Syriza advocates a post-austerity vision, both for Greece and Europe, with re-structuring of sovereign debt at its centre. How significant is this victory for Europe and the rest of the world? Comments range from grave concerns about the impact on the euro and the global economy to jubilant support for the renewal of the European left. For sure, Syriza is at the centre of political attention in Europe.
  •  
    Economic havoc looks to be about to break Greece's two-party political system as a third party, Syriza rises to take control of government. Might a similar event happen in the U.S. if the economy gets much worse, as seems about to happen because of the collapse of the petro-dollar? If so, what might the new coalition look like in the U.S.? This article points out that in Greece, Syriza is uniting demographic elements viewed as leftist. But the what is regarded as the left in the U.S., progressives, liberals, socialists, and communists, historically has been incapable of organizing in a way to assert political power for decades because they invariably fall for the choice of two evils argument and vote Democratic in general elections. It seems to be much the same story on the right in the U.S. For example, the Tea Party was co-opted by the Republican Party in general elections from the Tea Party's inception. What has been particularly troubling to me is that the American left and right actually agree on very many issues, but the divide-and-conquer strategy of the corporate/globalist/war machine of the oligarchy has so instilled hatred between the right and the left that it's been impossible to form a third-party that pushes an agenda driven by majority public opinion. To me, a new party that focuses on areas of broad agreement and avoids areas of disagreement seems to be the most likely candidate to break the the rule of our present usurpers of democracy. But if we are to create a new Majority Party (I like that name) based on majority opinion, how do we get past the hatred, particularly given that the usurpers will do their level best to fan the fire of hatred even more as the Majority Party gains numbers? And what to do about majority opinions that are formed by false usurper propaganda, e.g., the current propaganda campaigns that drive the pro-war agenda? They've been able to create majorities, e.g., for renentry of the U.S. military into Iraq to fight ISIL,
Paul Merrell

Responding to Failure: Reorganizing U.S. Policies in the Middle East | Middle East Poli... - 0 views

  • I want to speak with you today about the Middle East. This is the region where Africa, Asia, and Europe come together. It is also the part of the world where we have been most compellingly reminded that some struggles cannot be won, but there are no struggles that cannot be lost. It is often said that human beings learn little useful from success but can learn a great deal from defeat. If so, the Middle East now offers a remarkably rich menu of foreign-policy failures for Americans to study. • Our four-decade-long diplomatic effort to bring peace to the Holy Land sputtered to an ignominious conclusion a year ago. • Our unconditional political, economic, and military backing of Israel has earned us the enmity of Israel’s enemies even as it has enabled egregiously contemptuous expressions of ingratitude and disrespect for us from Israel itself.
  • • Our attempts to contain the Iranian revolution have instead empowered it. • Our military campaigns to pacify the region have destabilized it, dismantled its states, and ignited ferocious wars of religion among its peoples. • Our efforts to democratize Arab societies have helped to produce anarchy, terrorism, dictatorship, or an indecisive juxtaposition of all three. • In Iraq, Libya, and Syria we have shown that war does not decide who’s right so much as determine who’s left. • Our campaign against terrorism with global reach has multiplied our enemies and continuously expanded their areas of operation. • Our opposition to nuclear proliferation did not prevent Israel from clandestinely developing nuclear weapons and related delivery systems and may not preclude Iran and others from following suit.
  • • At the global level, our policies in the Middle East have damaged our prestige, weakened our alliances, and gained us a reputation for militaristic fecklessness in the conduct of our foreign affairs. They have also distracted us from challenges elsewhere of equal or greater importance to our national interests. That’s quite a record.
  • ...12 more annotations...
  • One can only measure success or failure by reference to what one is trying achieve. So, in practice, what have U.S. objectives been? Are these objectives still valid? If we’ve failed to advance them, what went wrong? What must we do now to have a better chance of success? Our objectives in the Middle East have not changed much over the course of the past half century or more. We have sought to 1. Gain acceptance and security for a Jewish homeland from the other states and peoples of the region; 2. Ensure the uninterrupted availability of the region’s energy supplies to sustain global and U.S. security and prosperity; 3. Preserve our ability to transit the region so as to be able to project power around the world; 4. Prevent the rise of a regional hegemon or the deployment of weapons of mass destruction that might threaten any or all of these first three objectives; 5. Maximize profitable commerce; and 6. Promote stability while enhancing respect for human rights and progress toward constitutional democracy. Let’s briefly review what’s happened with respect to each of these objectives. I will not mince words.
  • Israel has come to enjoy military supremacy but it remains excluded from most participation in its region’s political, economic, and cultural life. In the 67 years since the Jewish state was proclaimed, Israel has not made a single friend in the Middle East, where it continues to be regarded as an illegitimate legacy of Western imperialism engaged in racist removal of the indigenous population. International support for Israel is down to the United States and a few of the former colonial powers that originally imposed the Zionist project on the Arabs under Sykes-Picot and the related Balfour Declaration. The two-state solution has expired as a physical or political possibility. There is no longer any peace process to distract global attention from Israel’s maltreatment of its captive Arab populations. After years of deference to American diplomacy, the Palestinians are about to challenge the legality of Israel’s cruelties to them in the International Criminal Court and other venues in which Americans have no veto, are not present, or cannot protect the Jewish state from the consequences of its own behavior as we have always been able to do in the past. Israel’s ongoing occupation of the West Bank and siege of Gaza are fueling a drive to boycott its products, disinvest in its companies, and sanction its political and cultural elite. These trends are the very opposite of what the United States has attempted to achieve for Israel.
  • In a stunning demonstration of his country’s most famous renewable resource — chutzpah — Israel’s Prime Minister chose this very moment to make America the main issue in his reelection campaign while simultaneously transforming Israel into a partisan issue in the United States. This is the very opposite of a sound survival strategy for Israel. Uncertainties about their country’s future are leading many Israelis to emigrate, not just to America but to Europe. This should disturb not just Israelis but Americans, if only because of the enormous investment we have made in attempts to gain a secure place for Israel in its region and the world. The Palestinians have been silent about Mr. Netanyahu’s recent political maneuvers. Evidently, they recall Napoleon’s adage that one should never interrupt an enemy when he is making a mistake. This brings me to an awkward but transcendently important issue. Israel was established as a haven from anti-Semitism — Jew hatred — in Europe, a disease of nationalism and Christian culture that culminated in the Holocaust. Israel’s creation was a relief for European Jews but a disaster for the Arabs of Palestine, who were either ethnically cleansed by European Jewish settlers or subjugated, or both.  But the birth of Israel also proved tragic for Jews throughout the Middle East — the Mizrahim. In a nasty irony, the implementation of Zionism in the Holy Land led to the introduction of European-style anti-Semitism — including its classic Christian libels on Jews — to the region, dividing Arab Jews from their Muslim neighbors as never before and compelling them to join European Jews in taking refuge in Israel amidst outrage over the dispossession of Palestinians from their homeland. Now, in a further irony, Israel’s pogroms and other injustices to the Muslim and Christian Arabs over whom it rules are leading not just to a rebirth of anti-Semitism in Europe but to its globalization.
  • The late King `Abdullah of Saudi Arabia engineered a reversal of decades of Arab rejectionism at Beirut in 2002. He brought all Arab countries and later all 57 Muslim countries to agree to normalize relations with Israel if it did a deal — any deal — with the Palestinians that the latter could accept. Israel spurned the offer. Its working assumption seems to be that it does not need peace with its neighbors as long as it can bomb and strafe them. Proceeding on this basis is not just a bad bet, it is one that is dividing Israel from the world, including Jews outside Israel. This does not look like a story with a happy ending. It’s hard to avoid the thought that Zionism is turning out to be bad for the Jews. If so, given the American investment in it, it will also have turned out to be bad for America. The political costs to America of support for Israel are steadily rising. We must find a way to divert Israel from the largely self-engineered isolation into which it is driving itself, while repairing our own increasing international ostracism on issues related to Israel.  
  • Despite Mr. Netanyahu’s recent public hysteria about Iran and his efforts to demonize it, Israel has traditionally seen Iran’s rivalry with the Arabs as a strategic asset. It had a very cooperative relationship with the Shah. Neither Israelis nor Arabs have forgotten the strategic logic that produced Israel's entente with Iran. Israel is very much on Daesh’s list of targets, as is Iran. For now, however, Israel’s main concern is the possible loss of its nuclear monopoly in the Middle East. Many years ago, Israel actually did what it now accuses Iran of planning to do. It clandestinely developed nuclear weapons while denying to us and others that it was doing so. Unlike Iran, Israel has not adhered to the Nuclear Non-Proliferation Treaty or subjected its nuclear facilities to international inspection. It has expressed no interest in proposals for a nuclear-free zone in the Middle East. It sees its ability to bring on nuclear Armageddon as the ultimate guarantee of its existence.
  • To many, Israel now seems to have acquired the obnoxious habit of biting the American hand that has fed it for so long. The Palestinians have despaired of American support for their self-determination. They are reaching out to the international community in ways that deliberately bypass the United States. Random acts of violence herald mayhem in the Holy Land. Daesh has proclaimed the objective of erasing the Sykes-Picot borders and the states within them. It has already expunged the border between Iraq and Syria. It is at work in Lebanon and has set its sights on Jordan, Palestine, and Israel. Lebanon, under Saudi influence, has turned to France rather than America for support. Hezbollah has intervened militarily in Iraq and Syria, both of whose governments are close to Iran. Egypt and Turkey have distanced themselves from the United States as well as from each other. Russia is back as a regional actor and arms supplier. The Gulf Arabs, Egypt, and Turkey now separately intervene in Libya, Syria, and Iraq without reference to American policy or views. Iran is the dominant influence in Iraq, Syria, parts of Lebanon, and now Yemen. It has boots on the ground in Iraq. And now Saudi Arabia seems to be organizing a coalition that will manage its own nuclear deterrence and military balancing of Ir
  • To describe this as out of control is hardly adequate. What are we to do about it? Perhaps we should start by recalling the first law of holes — “when stuck in one, stop digging.” It appears that “don’t just sit there, bomb something” isn’t much of a strategy. When he was asked last summer what our strategy for dealing with Daesh was, President Obama replied, “We don’t yet have one.” He was widely derided for that. He should have been praised for making the novel suggestion that before Washington acts, it should first think through what it hopes to accomplish and how best to do it. Sunzi once observed that “tactics without strategy is the noise before defeat." America’s noisy but strategy-free approach to the Middle East has proven him right. Again the starting point must be what we are trying to accomplish. Strategy is "the discipline of achieving desired ends through the most efficient use of available means" [John Lewis Gaddis].Our desired ends with respect to the Middle East are not in doubt. They have been and remain to gain an accepted and therefore secure place for Israel there; to keep the region's oil and gas coming at reasonable prices; to be able to pass through the area at will; to head off challenges to these interests; to do profitable business in the markets of the Middle East; and to promote stability amidst the expansion of liberty in its countries. Judging by results, we have been doing a lot wrong. Two related problems in our overall approach need correction. They are “enablement” and the creation of “moral hazard.” Both are fall-out from  relationships of codependency.
  • Enablement occurs when one party to a relationship indulges or supports and thereby enables another party’s dysfunctional behavior. A familiar example from ordinary life is giving money to a drunk or a drug addict or ignoring, explaining away, or defending their subsequent self-destructive behavior.  Moral hazard is the condition that obtains when one party is emboldened to take risks it would not otherwise take because it knows another party will shoulder the consequences and bear the costs of failure. The U.S.-Israel relationship has evolved to exemplify codependency. It now embodies both enablement and moral hazard. U.S. support for Israel is unconditional.  Israel has therefore had no need to cultivate relations with others in the Middle East, to declare its borders, or to choose peace over continued expansion into formerly Arab lands. Confidence in U.S. backing enables Israel to do whatever it likes to the Palestinians and its neighbors without having to worry about the consequences. Israel is now a rich country, but the United States continues to subsidize it with cash transfers and other fiscal privileges. The Jewish state is the most powerful country in the Middle East. It can launch attacks on its neighbors, confident that it will be resupplied by the United States. Its use of U.S. weapons in ways that violate both U.S. and international law goes unrebuked. 41 American vetoes in the United Nations Security Council have exempted Israel from censure and international law. We enable it to defy the expressed will of the international community, including, ironically, our own.
  • We Americans are facilitating Israel's indulgence in denial and avoidance of the choices it must make if it is not to jeopardize its long-term existence as a state in the Middle East. The biggest contribution we could now make to Israel's longevity would be to ration our support for it, so as to cause it to rethink and reform its often self-destructive behavior. Such peace as Israel now enjoys with Egypt, Jordan, and the Palestinians is the direct result of tough love of this kind by earlier American administrations. We Americans cannot save Israel from itself, but we can avoid killing it with uncritical kindness. We should support Israel when it makes sense to do so and it needs our support on specific issues, but not otherwise. Israel is placing itself and American interests in jeopardy. We need to discuss how to reverse this dynamic.
  • Moral hazard has also been a major problem in our relationship with our Arab partners. Why should they play an active role in countering the threat to them they perceive from Iran, if they can get America to do this for them? Similarly, why should any Muslim country rearrange its priorities to deal with Muslim renegades like Daesh when it can count on America to act for it? If America thinks it must lead, why not let it do so? But responsible foreign and defense policies begin with self-help, not outsourcing of military risks. The United States has the power-projection and war-fighting capabilities to back a Saudi-led coalition effort against Daesh. The Saudis have the religious and political credibility, leadership credentials, and diplomatic connections to organize such an effort. We do not. Since this century began, America has administered multiple disappointments to its allies and friends in the Middle East, while empowering their and our adversaries. Unlike the Gulf Arabs, Egypt, and Turkey, Washington does not have diplomatic relations with Tehran. Given our non-Muslim identity, solidarity with Israel, and recent history in the Fertile Crescent, the United States cannot hope to unite the region’s Muslims against Daesh.  Daesh is an insurgency that claims to exemplify Islam as well as a governing structure and an armed force. A coalition led by inhibited foreign forces, built on papered-over differences, and embodying hedged commitments will not defeat such an insurgency with or without boots on the ground.
  • When elections have yielded governments whose policies we oppose, we have not hesitated to conspire with their opponents to overthrow them. But the results of our efforts to coerce political change in the Middle East are not just failures but catastrophic failures. Our policies have nowhere produced democracy. They have instead contrived the destabilization of societies, the kindling of religious warfare, and the installation of dictatorships contemptuous of the rights of religious and ethnic minorities. Frankly, we have done a lot better at selling things, including armaments, to the region than we have at transplanting the ideals of the Atlantic Enlightenment there. The region’s autocrats cooperate with us to secure our protection, and they get it. When they are nonetheless overthrown, the result is not democracy or the rule of law but socio-political collapse and the emergence of  a Hobbesian state of nature in which religious and ethnic communities, families, and individuals are able to feel safe only when they are armed and have the drop on each other. Where we have engineered or attempted to engineer regime change, violent politics, partition, and ethno-religious cleansing have everywhere succeeded unjust but tranquil order. One result of our bungled interventions in Iraq and Syria is the rise of Daesh. This is yet another illustration that, in our efforts to do good in the Middle East, we have violated the principle that one should first do no harm.
  • Americans used to believe that we could best lead by example. We and those in the Middle East seeking nonviolent change would all be better off if America returned to that tradition and forswore ideologically motivated hectoring and intervention. No one willingly follows a wagging finger. Despite our unparalleled ability to use force against foreigners, the best way to inspire them to emulate us remains showing them that we have our act together. At the moment, we do not. In the end, to cure the dysfunction in our policies toward the Middle East, it comes down to this. We must cure the dysfunction and venality of our politics. If we cannot, we have no business trying to use an 8,000-mile-long screwdriver to fix things one-third of the way around the world. That doesn’t work well under the best of circumstances. But when the country wielding the screwdriver has very little idea what it’s doing, it really screws things up.
  •  
    Chas Freeman served as US ambassador to Saudi Arabia during the war to liberate Kuwait and as Assistant Secretary of Defense from 1993-94. He was the editor of the Encyclopedia Britannica entry on "diplomacy" and is the author of five books, including "America's Misadventures in the Middle East" and "Interesting Times: China, America, and the Shifting Balance of Prestige."  I have largely omitted highlighting portions of the speech dealing with Muslim nations because Freeman has apparently lost touch with the actual U.S., Saudi, UAE, Kuwait, and Turish roles in creating and expanding ISIL. But his analysis of Israel's situation and recommendations for curing it seem quite valid, as well as his overall Mideast recommendation to heed the First Law of Holes: "when stuck in one, stop digging."   I recommend reading the entire speech notwithstanding his misunderstanding of ISIL. There is a lot of very important history there ably summarized.
1 - 20 of 53 Next › Last »
Showing 20 items per page