Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged ice

Rss Feed Group items tagged

Paul Merrell

ICE has struck a deal to track license plates across the US - The Verge - 0 views

  • The Immigration and Customs Enforcement (ICE) agency has officially gained agency-wide access to a nationwide license plate recognition database, according to a contract finalized earlier this month. The system gives the agency access to billions of license plate records and new powers of real-time location tracking, raising significant concerns from civil libertarians. The source of the data is not named in the contract, but an ICE representative said the data came from Vigilant Solutions, the leading network for license plate recognition data. “Like most other law enforcement agencies, ICE uses information obtained from license plate readers as one tool in support of its investigations,” spokesperson Dani Bennett said in a statement. “ICE is not seeking to build a license plate reader database, and will not collect nor contribute any data to a national public or private database through this contract.”
  • While it collects few photos itself, Vigilant Solutions has amassed a database of more than 2 billion license plate photos by ingesting data from partners like vehicle repossession agencies and other private groups. Vigilant also partners with local law enforcement agencies, often collecting even more data from camera-equipped police cars. The result is a massive vehicle-tracking network generating as many as 100 million sightings per month, each tagged with a date, time, and GPS coordinates of the sighting.
  • ICE agents would be able to query that database in two ways. A historical search would turn up every place a given license plate has been spotted in the last five years, a detailed record of the target’s movements. That data could be used to find a given subject’s residence or even identify associates if a given car is regularly spotted in a specific parking lot. “Knowing the previous locations of a vehicle can help determine the whereabouts of subjects of criminal investigations or priority aliens to facilitate their interdiction and removal,” an official privacy assessment explains. “In some cases, when other leads have gone cold, the availability of commercial LPR data may be the only viable way to find a subject.” ICE agents can also receive instantaneous email alerts whenever a new record of a particular plate is found — a system known internally as a “hot list.” (The same alerts can also be funneled to the Vigilant’s iOS app.) According to the privacy assessment, as many as 2,500 license plates could be uploaded to the hot list in a single batch, although the assessment does not detail how often new batches can be added. With sightings flooding in from police dashcams and stationary readers on bridges and toll booths, it would be hard for anyone on the list to stay unnoticed for long. Those powers are particularly troubling given ICE’s recent move to expand deportations beyond criminal offenders, fueling concerns of politically motivated enforcement. In California, state officials have braced for rumored deportation sweeps targeted at sanctuary cities. In New York, community leaders say they’ve been specifically targeted for deportation as a result of their activism. With automated license plate recognition, that targeting would only grow more powerful. For civil liberties groups, the implications go far beyond immigration.
  • ...1 more annotation...
  • The new license plate reader contract comes after years of internal lobbying by the agency. ICE first tested Vigilant’s system in 2012, gauging how effective it was at locating undocumented immigrants. Two years later, the agency issued an open solicitation for the technology, sparking an outcry from civil liberties group. Homeland Security secretary Jeh Johnson canceled the solicitation shortly afterward, citing privacy concerns, although two field offices subsequently formed rogue contracts with Vigilant in apparent violation of Johnson’s policy. In 2015, Homeland Security issued another call for bids, although an ICE representative said no contract resulted from that solicitation. As a result, this new contract is the first agency-wide contract ICE has completed with the company, a fact that is reflected in accompanying documents. On December 27th, 2017, Homeland Security issued an updated privacy assessment of license plate reader technology, a move it explained was necessary because “ICE has now entered into a contract with a vendor.” The new system places some limits on ICE surveillance, but not enough to quiet privacy concerns. Unlike many agencies, ICE won’t upload new data to Vigilant’s system but simply scan through the data that’s already there. In practical terms, that means driving past a Vigilant-linked camera might flag a car to ICE, but driving past an ICE camera won’t flag a car to everyone else using the system. License plates on the hot list will also expire after one year, and the system retains extensive audit logs to help supervisors trace back any abuse of the system. Still, the biggest concern for critics is the sheer scale of Vigilant’s network, assembled almost entirely outside of public accountability. “If ICE were to propose a system that would do what Vigilant does, there would be a huge privacy uproar and I don’t think Congress would approve it,” Stanley says. “But because it’s a private contract, they can sidestep that process.”
Paul Merrell

ICE Investigation Targeting Drug Planes Plagued by Scandal, Court Records Show | the na... - 0 views

  • Was “Mayan Jaguar” a Corrupt Undercover Op or a CIA Cover? An Immigration and Customs Enforcement (ICE) undercover operation involving the sale and tracking of aircraft to drug organizations played out for nearly four years in Latin America, likely allowing tons of narcotics to be flown into the US, yet it failed to result in a single prosecution in the United States, according to federal court pleadings recently discovered by Narco News. The ICE undercover operation, dubbed Mayan Jaguar, came to a screeching halt when one of the aircraft in its sights, a Gulfstream II corporate jet, crashed on Sept. 24, 2007, in Mexico’s Yucatan Peninsula with nearly 4 tons of cocaine onboard. Also on that jet at the time, according to recently discovered pleadings filed in US District Court in Florida, was an ICE transponder, which was being used as a tracking device.
  • The court pleadings are part of a case currently pending against a Brazilian national named Joao Luiz Malago, who is facing narco-trafficking and money-laundering conspiracy charges related to an indictment filed originally in January 2012. The presence of the tracking device on the ill-fated Gulfstream II, the court records allege, alerted Mexican authorities to the fact that the cocaine jet was on some kind of US government-sponsored mission prior to its demise. Also pointing to that fact was the Gulfstream jet’s tail number, N987SA, which past press reports have linked to CIA use — several flights between 2003 and 2005 to Guantanamo Bay, home to the infamous “terrorist” prison camp.
  • The court pleadings also assert that Malago was, in fact, a US government informant, who operated an alleged ICE front company called Donna Blue Aircraft Inc., which was set up in March 2007 in Florida, some seven months before it was used to sell the Gulfstream II jet to a Florida duo: Clyde O’Connor and Gregory Smith. O’Connor and Smith purchased the jet, according to a bill of sale, a mere eight days before it crashed in Mexico with its cocaine payload onboard. Narco News reported on the Gulfstream II jet crash and its aftermath extensively and has uncovered documents and sources indicating that Gregory Smith worked as a contract pilot for the US government, including US Customs (later rolled into ICE, which is part of the Department of Homeland Security, or DHS), DEA, FBI and likely CIA.
  •  
    Shades of Operation Fast and Furious. 
Paul Merrell

CIA's Self-Authorization for Ice-Drowning Human Beings | emptywheel - 0 views

  • The WaPo has a story that repeats what I’ve been harping on for over a year (and in some cases, has been clear even longer): the Senate Torture Report shows that CIA repeatedly lied to Congress. There are, however, ugly new details about the torture (though it’s not clear whether they show up in the report): particularly regarding the treatment of Ammar al-Baluchi. If declassified, the report could reveal new information on the treatment of a high-value detainee named Ali Abdul Aziz Ali, the nephew of Khalid Sheik Mohammed, the self-proclaimed mastermind of the Sept. 11 attacks. The Pakistanis captured Ali, known more commonly as Ammar al-Baluchi, on April, 30, 2003, in Karachi and turned him over to the CIA about a week later. He was taken to a CIA black site called “Salt Pit” near Kabul. At the secret prison, Baluchi endured a regime that included being dunked in a tub filled with ice water. CIA interrogators forcibly kept his head under the water while he struggled to breathe and beat him repeatedly, hitting him with a truncheon-like object and smashing his head against a wall, officials said. As with Zubaida and even Nashiri, officials said, CIA interrogators continued the harsh treatment even after it appeared that Baluchi was cooperating. The report notes that two other prisoners — members of the Libyan Islamic Fighting Group — were subjected to similar treatment at the same time.
  • Two other terrorism suspects, from Libya — Mohammed al-Shoroeiya and Khalid al-Sharif — endured similar treatment at Salt Pit, according to Human Rights Watch. One of the men said CIA interrogators “would pour buckets of very cold water over his nose and mouth to the point that he felt he would suffocate. Icy cold water was also poured over his body. He said it happened over and over again,” the report says. CIA doctors monitored their body temperatures so they wouldn’t suffer hypothermia. Ultimately, CIA got DOJ to authorize “water dousing” — in the manner that CIA always got DOJ to approve mere shadows of what they actually did, and the approval more closely matches the description of the LIFG prisoners — in the Bradbury Techniques Memo (see page 10). But not before it got used over and over at the Salt Pit (the same place where water dousing had already contributed to Gul Rahman’s death). Which is, I’m quite certain, one thing that CIA was doing with the Legal Principles document, a set of legal guidelines the CIA wrote for itself (with John Yoo’s freelance help) as the CIA’s legal problems started to mount. As I’ve noted, the first draft of the memos got hand-carried to John Yoo on April 28, 2003, just as these detainees were in the Salt Pit. There were several more discussions internally at CIA in anticipation of litigation before they tried (unsuccessfully) to create a fait accompli with Pat Philbin on June 16, 2003. At that point, the document only generally approved techniques equivalent to those already approved. As CIA would later explain,
  • We rely on the applicable law and OLC guidance to assess the lawfulness of detention and interrogation techniques. For example, using the applicable law and relying on OLC’s guidance, we concluded that the abdominal slap previously discussed with OLC (and mentioned in the June 2003 summary points) is a permissible interrogation technique. Similarly, in addition to the sitting and kneeling stress positions discussed earlier with OLC, the Agency has added to its list of approved interrogation techniques two standing stress positions involving the detainee leaning against a wall. I guess, in similar fashion, John Yoo and his CIA buddies believe ice-drowning is equivalent, as another kind of simulated drowning, to waterboarding, which had been approved? Then the next year, when Scott Muller tried the same trick with Jack Goldsmith — trying to get him to sign off on the techniques CIA had freelanced its own legal opinion — he asked to include water dousing (and another water-based technique and one still-redacted technique) explicitly. Of course, the description of water dousing fell far short of what the CIA was actually doing — dunking men in ice-water repeatedly — though the outlines, especially the concern about detainees ingesting water and hypothermia — show the outlines of the torture such language was meant to gloss. To understand the CIA’s torture program, you have to understand what these bureaucratic maneuvers were meant to cover. Now we know they were intended to authorize controlled drowning of men in ice water.
Paul Merrell

IC ON THE RECORD - 0 views

  •  
    New Office of the Director of National Intelligence Tumblr web site that Obama ordered to be created, collecting information about the U.S. Intelligence Community, IC on the Record. Presumably "IC" stands for "Intelligence Community."  Content includes declassified documents, official statements, testimony, and other materials. I'll aim to mark any pages bookmarked from this site with an "ICR" tag. 
Paul Merrell

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
Joseph Skues

Arctic Ice in Death Spiral - Yahoo! News - 0 views

  • dangerously upsetting the energy balance of the entire planet,
  • the Arctic summer sea ice cover is in a death spiral. It's not going to recover," he said.
  • ecause
  • ...40 more annotations...
  • aid Vladimir Romanovsky of the University of Alaska in Fairbanks and a world expert on permafrost.
  • takes much longer to re-freeze
  • emits huge volumes of additional heat energy into the atmosphere
  • srupting the weather patterns of the northern hemisp
  • Paradoxically, a warmer Arctic means "future cold and snowy winters will be the rule rather than the exception
  • Overland told IPS.
  • average temperatures are now three to five degrees C warmer than they were 30 years ago
  • nderway is a rapid warming of the coastal regions of the Arcti
  • f the global average temperature increases from the present 0.8 C to two degrees C, as seems likely
  • possibly eight degrees due to a series of processes and feedbacks called Arctic amplification.
  • half of the world's permafrost will likely thaw,
  • depth of a few metres,
  • eleasing most of the carbon and methane accumulated ther
  • emendous amounts of extra heat are added every summer to the region as more than 2.5 million square kilometres of the Arctic Ocean have been opened up to the heat of the 24-hour summer sun
  • 25 times more potent than carbon dioxide (CO2).
  • Methane is
  • catastrophic for human civilisatio
  • spans 13 million square kilometres of the land in Alaska, Canada, Siberia and parts of Europe
  • Present pledges by governments to reduce emissions will still result in a global average temperature increase of 3.5 to 3.9 C by 2100,
  • hree times more carbon than all of the worlds' forests contain.
  • consistently across the entire region since the 1980s,
  • southernmost permafrost limit had retreated 130 kilometres over the past 50 years in Quebec’s James Bay region.
  • r by the undersea permafrost that acts as a cap over unknown quantities of methane hydrates (a type of frozen methane) along the Arctic Ocean shelf, he said.
  • eight million tonnes of methane emissions are bubbling to the surface from the shallow East Siberian Arctic shelf every year
  • If just one percent of the Arctic undersea methane reaches the atmosphere, it could quadruple the amount of methane currently in the atmosphere.
  • releasing huge amounts of global warming gases.
  • ould rapidly accelerate in a few decad
  • we could lose much of the permafros
  • because of rapid feedbacks.
  • contains at least twice as much carbon as is currently present in the atmosphere –
  • Arctic that's 10 to 16 degrees C warme
  • asing most of the permafrost carbon and methane and unknown quantities of methane hydrates.
  • climate scientists are calling for a rapid phaseout of fossil fuels
  • still a 50-percent probability of exceeding two degrees C
  • decline three per cent per year
  • the emissions peak is delayed until 2025
  • rctic will be eight to 10 degrees warmer and the world will lose most its permafrost.
  • emperatures will rise three degrees
  • has the potential to eliminate burning coal and oil to generate electric
  • governments have the political will to fully embrace green technologies.
Paul Merrell

The Newest Reforms on SIGINT Collection Still Leave Loopholes | Just Security - 0 views

  • Director of National Intelligence James Clapper this morning released a report detailing new rules aimed at reforming the way signals intelligence is collected and stored by certain members of the United States Intelligence Community (IC). The long-awaited changes follow up on an order announced by President Obama one year ago that laid out the White House’s principles governing the collection of signals intelligence. That order, commonly known as PPD-28, purports to place limits on the use of data collected in bulk and to increase privacy protections related to the data collected, regardless of nationality. Accordingly, most of the changes presented as “new” by Clapper’s office  (ODNI) stem directly from the guidance provided in PPD-28, and so aren’t truly new. And of the biggest changes outlined in the report, there are still large exceptions that appear to allow the government to escape the restrictions with relative ease. Here’s a quick rundown.
  • Retention policy for non-U.S. persons. The new rules say that the IC must now delete information about “non-U.S. persons” that’s been gathered via signals intelligence after five-years. However, there is a loophole that will let spies hold onto that information indefinitely whenever the Director of National Intelligence determines (after considering the views of the ODNI’s Civil Liberties Protection Officer) that retaining information is in the interest of national security. The new rules don’t say whether the exceptions will be directed at entire groups of people or individual surveillance targets.  Section 215 metadata. Updates to the rules concerning the use of data collected under Section 215 of the Patriot Act includes the requirement that the Foreign Intelligence Surveillance Court (rather than authorized NSA officials) must determine spies have “reasonable, articulable suspicion” prior to query Section 215 data, outside of emergency circumstances. What qualifies as an emergency for these purposes? We don’t know. Additionally, the IC is now limited to two “hops” in querying the database. This means that spies can only play two degrees of Kevin Bacon, instead of the previously allowed three degrees, with the contacts of anyone targeted under Section 215. The report doesn’t explain what would prevent the NSA (or other agency using the 215 databases) from getting around this limit by redesignating a phone number found in the first or second hop as a new “target,” thereby allowing the agency to continue the contact chain.
  • National security letters (NSLs). The report also states that the FBI’s gag orders related to NSLs expire three years after the opening of a full-blown investigation or three years after an investigation’s close, whichever is earlier. However, these expiration dates can be easily overridden by by an FBI Special Agent in Charge or a Deputy Assistant FBI Director who finds that the statutory standards for secrecy about the NSL continue to be satisfied (which at least one court has said isn’t a very high bar). This exception also doesn’t address concerns that NSL gag orders lack adequate due process protections, lack basic judicial oversight, and may violate the First Amendment.
  • ...1 more annotation...
  • The report also details the ODNI’s and IC’s plans for the future, including: (1) Working with Congress to reauthorize bulk collection under Section 215. (2) Updating agency guidelines under Executive Order 12333 “to protect the privacy and civil liberties of U.S. persons.” (3) Producing another annual report in January 2016 on the IC’s progress in implementing signals intelligence reforms. These plans raise more questions than they answer. Given the considerable doubts about Section 215’s effectiveness, why is the ODNI pushing for its reauthorization? And what will the ODNI consider appropriate privacy protections under Executive Order 12333?
Paul Merrell

The Surveillance State's Legalism Isn't About Morals, It's About Manipulating the Rules... - 0 views

  • Margo Schlanger has written a great article forthcoming in the Harvard National Security Journal about intelligence legalism, an ethical framework she sees underlying NSA surveillance. Margo makes the case that NSA and the executive branch haven’t been asking what the right surveillance practices should be, but rather what surveillance practices are allowed to be. She takes the concept of legalism from political theorist Judith Shklar: “the ethical attitude that holds moral conduct to be a matter of rule following, and moral relationships to consist of duties and rights determined by rules.” In the model of legalism that Margo sees the NSA following, any spying that is not legally prohibited is also right and good because ethics is synonymous with following the rules. Her critique of “intelligence legalism” is that the rules are the bare minimum, and merely following the rules doesn’t take civil liberties concerns seriously enough.
  • My question is whether legalism serves as a moral code for US Intelligence Community (IC) leadership, or only as a smokescreen. I believe the evidence shows that since 9/11,the IC, and specifically the NSA has not followed the rules. Rather, the agency has resorted to legalistic justifications in pursuit of other goals—namely whatever might be useful in countering terrorism. Before 9/11, the agency may have been focused on complying with FISA. But afterthat day, the NSA’s approach was that it “could circumvent federal statutes and the Constitution so long as there was some visceral connection to looking for terrorists.” In other words, since 9/11, the moral center of gravity in the surveillance world has focused on doing whatever is necessary for hunting terrorists, not following the rules. 
Paul Merrell

Spy chief trashes leaks, assures Trump of loyalty - POLITICO - 0 views

  • The outgoing U.S. director of national intelligence has extended an olive branch of sorts to Donald Trump — denouncing media leaks, casting skepticism on a report that Russia has damaging material on the president-elect, and assuring Trump that America's spies stand ready to serve him. In an unusual statement, James Clapper said he had spoken Wednesday evening with Trump, five days after the spy chief and some of his counterparts met with the incoming president to discuss U.S. intelligence assessments that Russia tried to interfere in the 2016 election, possibly to help him win.Story Continued Below The assessment has badly aggravated existing tensions between the intelligence community and Trump. On Tuesday, CNN, BuzzFeed and other media outlets reported that, during Friday’s briefing, the intelligence officials told Trump about an unsubstantiated private report that detailed how Russia's government allegedly had salacious information about him. In addition, BuzzFeed published the apparent dossier, which Trump has since denounced as “fake news.” "I expressed my profound dismay at the leaks that have been appearing in the press, and we both agreed that they are extremely corrosive and damaging to our national security," Clapper said of the information that has come out since last week's intelligence briefing.
  • Clapper’s statement represented a dramatic turn of events only 24 hours after initial leaks about the intelligence leaders having told Trump of the dossier. And while Clapper’s statement indirectly confirmed the media reports of the briefing, it also could be viewed as a concession of sorts from an intelligence community that has come under repeated, direct fire from the president-elect. Trump had compared the leak from his briefing to “Nazi Germany” on Twitter on Wednesday morning, writing, “Intelligence agencies should never have allowed this fake news to "leak" into the public. One last shot at me. Are we living in Nazi Germany?” In a news conference, also held Wednesday, Trump defended the comparison and elaborated further, saying, “A thing like that should have never been written, it should never have been had, and it certainly should never have been released.” Clapper, however, said he did not believe the leaks to the press came from the intelligence community. At the same time, he indicated that the intelligence community decided to share the material with Trump because its mere existence was important for the incoming president to know about.
  • As far as the "private security company document," Clapper said, "I emphasized that this document is not a U.S. Intelligence Community product and that I do not believe the leaks came from within the IC. The IC has not made any judgment that the information in this document is reliable, and we did not rely upon it in any way for our conclusions."
  • ...1 more annotation...
  • "Part of our obligation is to ensure that policymakers are provided with the fullest possible picture of any matters that might affect national security," Clapper added. Clapper's statement comes amid extraordinary strains between the spy world and Trump, who takes office next week. The president-elect has been resistant to U.S. intelligence assessments that Russia intervened in the election, although during a press conference Wednesday morning Trump admitted that Moscow likely did do some hacking. Steven Hall, a former head of Russian operations at the CIA, said Clapper’s statement didn’t appear to be an all-out apology, but that it was possible the spy chief wants to try to patch up the tensions between Trump and the intelligence world before he himself steps down in just a few days. “He just might very well be like, wow, this really has kind of gotten out of control,” said Hall, who described Clapper as an “old-school, principled” kind of guy. “This might be his parting attempt to say, look at the very least after more than a 50-year career in intelligence, I don’t want this to be what I’m remembered by.”
Gary Edwards

J.P. Morgan Chase's Ugly Family Secrets Revealed | Matt Taibbi | Rolling Stone - 0 views

  •  
    Socialist blogger and Rolling Stone Magazine journalist Matt Taibi has made a career out of exposing Banksters and their criminal activities causing the 2008 collapse of the global financial industry.  Here he sights a story in American Banker that fully demonstrates the depths of depravity and criminal activities that continues to characterize big Banksters. The mortgage-foreclosure-robo signing scandal is just the tip of the ice berg.  Matt recounts the story of Linda Almonte, a JP Morgan Chase employee in charge of Credit Card debt bundling.  It's horrific. Money shot: The financial crash wouldn't have happened if even a slim plurality of financial executives had done what Linda Almonte did, i.e. simply refuse to sign off on a bogus transaction. If companies had merely upheld their own stated policies and stayed within the ballpark of the law, none of these messes could have accumulated: fraudulent mortgages wouldn't have been sold, families wouldn't have been foreclosed upon based on robo-signed documentation, investors wouldn't have been duped into buying huge packets of "misrepresented assets." ............. excerpt: In a story that should be getting lots of attention, American Banker has released an excellent and disturbing exposé of J.P. Morgan Chase's credit card services division, relying on multiple current and former Chase employees. One of them, Linda Almonte, is a whistleblower whom I've known since last September; I'm working on a recount of her story for my next book. One of the things we were promised by the lawmakers who passed the Dodd-Frank reform bill a few years back is that this would be a new era for whistleblowers who come forward to tell the world about problems in our financial infrastructure. This story now looms as a test case for that proposition. American Banker reporter Jeff Horwitz did an outstanding job in this story detailing the sweeping irregularities in-house at Chase, but his very thoroughness means the news may have ram
Paul Merrell

ICE license-plate tracking plan withdrawn amid outcry about privacy - CNN.com - 0 views

  • Homeland security officials on Wednesday abruptly shelved a proposal to build a national database of license-plate scans after criticism from privacy advocates. The proposal, which had been posted online last week by the office of Immigration and Customs Enforcement, sought a contractor who could establish a searchable database of license plates, with the times and locations where they were spotted by traffic cameras and other sources.
  • It was unclear whether the proposal was dead or was merely withdrawn for revisions.
Gary Edwards

The Thorium Powered Car - EPautos - 0 views

  • An internal combustion can burn gas and CNG (or propane). All that was necessary to allow the switch from one fuel to another was some additional plumbing and calibration of the car’s ECU (the computer that makes air-fuel ratio adjustments and so on). So, no worries about running empty – and no waiting for hours to refuel. Three, CNG was (is) cheap and burns very cleanly and is massively abundant right here in the U.S.  At a stroke, the three major charges leveled against the pure-gasoline-burning car are vacated. The CNG car hardly pollutes and it greatly reduces and potentially eliminates dependence on “foreign” oil. Also, the cost of the CNG car itself was within reason because no uber-elaborate technology was necessary (unlike electric cars and hybrid electric cars). Just some modifications to an existing car. Sure, there were some issues to be sorted out – the big one being making it easy (and safe) for the average person to refill the CNG tanks. But the technology of the car itself worked – and was economic.
  • So why wasn’t it developed? Perhaps precisely because it did work – and was economic. People could drive big – and powerful cars. At a reasonable cost. Well, they could have.
  • Here’s another, more recent one: The thorium-turbine powered car. Heat energy from the thorium – a weakly radioactive element (named after the Norse god Thor) that is estimated to be 3-4 times more naturally abundant than uranium and which contains 20 million times the energy as an equivalent lump of coal – is used to generate steam, which is then used to power a small turbine, which provides the motive force. The beauty of the system is that – like a nuclear submarine – the fuel lasts almost forever. Well, longer than you will last, probably. How’s 100 years sound? No more stopping for “gas”… ever. This alone would make current IC cars seem as wasteful of time (and energy) as current IC cars make electric cars look wasteful of time and energy. But wait, there’s more.
  • ...2 more annotations...
  • Well, less. No emissions at all. Because nothing’s being burned, there’s no exhaust. Water to steam, expansion and contraction – and back again. Closed (and clean) loop. The Algoreans ought to be ecstatic. Yet there is dead silence. You can hear the crickets chirping. Is it because thorium is radioactive? The word is third rail to scientifically illiterate homo Americanus – who fears it in the same way a savage fears the voices coming out of the Talk Box (radio). The mere mention of the word is sufficient to incite a panic. It’s why the nuclear power grid is dead in the water; or rather, as old as a Betamax copy of Saturday Night Fever. But it’s not even the same thing. Thorium is mildly radioactive. Dr. Charles Stevens, CEO of Laser Power Systems – which is developing the technology, or at least, trying to – says: “The radiation can be shielded by a single sheet of aluminum foil.” 
  • Bear in mind that gasoline is a highly volatile, highly explosive liquid fuel. But most of us do not sweat having 15 or so gallons of the stuff sloshing around in our cars, because we’re used to it. Because we know the gas tank is well-protected and not likely to burst into flames. It could happen, sure. But the individual risk is very small – just as the individual risk posed by a thorium-turbine car’s low-level radioactivity is small. Well, would be. If such cars were to be produced. But, it doesn’t look like they will be. Stevens told Mashable that “the automakers don’t want to buy them” – so his company is focusing on other applications of the technology, including an air conditioner-size unit that could power an entire restaurant or hotel, eliminating the need for grid electricity. This ought to please the Algoreans, too – since the electric grid is powered mostly by coal and oil-fired utility plants. But, again, crickets. It kind of makes you wonder, doesn’t it?
  •  
    "Why is it that alternative technologies that clearly do not work -  which are so gimped by functional and economic problems as to be not-viable on the market absent huge subsidies and even then, it's hard to give them away - continue to receive seemingly endless financial and political support … while technologies that actually might work better than current internal combustion engine technology can't seem to get any traction at all? Electric cars are hopeless. For more than a century now, generations of engineers have tried - and, so far, failed - to develop a battery that will endow an electric car with the range and reasonable recharge times necessary for everyday-driver viability… at a cost (not subsidized) that would make such a car a better choice, economically speaking, than an otherwise comparable gasoline (or diesel) powered car. Billions of dollars, probably, have been thrown at the electric car and - so far - no major technological improvement over a 1906 Baker Landolet. Meanwhile, whatever happened to the natural gas-burning car? Back in the mid-'90s, both Ford and GM built - and actually sold - natural-gas (CNG) fueled cars. Several things about them were interesting. One, they were big cars. Ford sold a CNG version of its six-passenger/full-size Crown Vic; GM sold a CNG version of the Vic's primary competition - the Chevy Caprice. Part of the reason for going with the big car as the platform was the need for a big trunk to house the CNG tank (and still have some trunk space left for people's things). But the take-home point was that you got a nice big family car - with a V8 engine - rather than a scrunched up subcompact. Two, they were practical. No range issue, because you had plenty (150-plus) on the CNG and the distance you could drive was not affected by the outside temperature or greatly reduced if you ran accessories like the AC and headlights, as it is in electric cars. And besides, when the C
Gary Edwards

Our Economic Future: From Best to Worst Case - Casey Research - 0 views

  •  
    This article was sent to me marked URGENT: MUST READ.  Usually that's a hint to delete.  This time however the message was true.  Nicely written article presenting in a historical context three possible futures for the world.   And, a basic plan for anyone trying to guess which future will land on our heads.  Excellent read.  Well written too. excerpt: There is a great deal of uncertainty among investors about what the future of the U.S. economy may look like - so I decided to take a stab at what's likely to happen over the next 20 years. That's enough time for a child to grow up and mature, and it's long enough for major trends to develop and make themselves felt. I'll confine myself to areas that are, as the benighted Rumsfeld might have observed, "known unknowns." I don't want to deal with possibilities of the deus ex machina sort. So we'll rule out natural events like a super-volcano eruption, an asteroid strike, a new ice age, global warming, and the like. Although all these things absolutely will occur sometime in the future, the timing is very uncertain - at least from the perspective of one human lifespan. It's pointless dealing with geological time and astronomical probability here. And, more important, there's absolutely nothing we can do about such things. So let's limit ourselves to the possibilities presented by human action. They're plenty weird and scary, and unpredictable enough.............
Paul Merrell

Profiting from Your Thirst as Global Elite Rush to Control Water Worldwide :: The Marke... - 0 views

  • A disturbing trend in the water sector is accelerating worldwide. The new “water barons” --- the Wall Street banks and elitist multibillionaires --- are buying up water all over the world at unprecedented pace. Familiar mega-banks and investing powerhouses such as Goldman Sachs, JP Morgan Chase, Citigroup, UBS, Deutsche Bank, Credit Suisse, Macquarie Bank, Barclays Bank, the Blackstone Group, Allianz, and HSBC Bank, among others, are consolidating their control over water. Wealthy tycoons such as T. Boone Pickens, former President George H.W. Bush and his family, Hong Kong’s Li Ka-shing, Philippines’ Manuel V. Pangilinan and other Filipino billionaires, and others are also buying thousands of acres of land with aquifers, lakes, water rights, water utilities, and shares in water engineering and technology companies all over the world. The second disturbing trend is that while the new water barons are buying up water all over the world, governments are moving fast to limit citizens’ ability to become water self-sufficient (as evidenced by the well-publicized Gary Harrington’s case in Oregon, in which the state criminalized the collection of rainwater in three ponds located on his private land, by convicting him on nine counts and sentencing him for 30 days in jail). Let’s put this criminalization in perspective:
  • Billionaire T. Boone Pickens owned more water rights than any other individuals in America, with rights over enough of the Ogallala Aquifer to drain approximately 200,000 acre-feet (or 65 billion gallons of water) a year. But ordinary citizen Gary Harrington cannot collect rainwater runoff on 170 acres of his private land. It’s a strange New World Order in which multibillionaires and elitist banks can own aquifers and lakes, but ordinary citizens cannot even collect rainwater and snow runoff in their own backyards and private lands.
  • In 2008, Goldman Sachs called water “the petroleum for the next century” and those investors who know how to play the infrastructure boom will reap huge rewards, during its annual “Top Five Risks” conference. Water is a U.S.$425 billion industry, and a calamitous water shortage could be a more serious threat to humanity in the 21st century than food and energy shortages, according to Goldman Sachs’s conference panel. Goldman Sachs has convened numerous conferences and also published lengthy, insightful analyses of water and other critical sectors (food, energy). Goldman Sachs is positioning itself to gobble up water utilities, water engineering companies, and water resources worldwide. Since 2006, Goldman Sachs has become one of the largest infrastructure investment fund managers and has amassed a $10 billion capital for infrastructure, including water.
  • ...7 more annotations...
  • Citigroup’s top economist Willem Buitler said in 2011 that the water market will soon be hotter the oil market (for example, see this and this): “Water as an asset class will, in my view, become eventually the single most important physical-commodity based asset class, dwarfing oil, copper, agricultural commodities and precious metals.” In its recent 2012 Water Investment Conference, Citigroup has identified top 10 trends in the water sector, as follows:
  • Specifically, a lucrative opportunity in water is in hydraulic fracturing (or fracking), as it generates massive demand for water and water services. Each oil well developed requires 3 to 5 million gallons of water, and 80% of this water cannot be reused because it’s three to 10 times saltier than seawater. Citigroup recommends water-rights owners sell water to fracking companies instead of to farmers because water for fracking can be sold for as much as $3,000 per acre-foot instead of only $50 per acre/foot to farmers.
  • One of the world’s largest banks, JPMorgan Chase has aggressively pursued water and infrastructure worldwide. In October 2007, it beat out rivals Morgan Stanley and Goldman Sachs to buy U.K.’s water utility Southern Water with partners Swiss-based UBS and Australia’s Challenger Infrastructure Fund. This banking empire is controlled by the Rockefeller family; the family patriarch David Rockefeller is a member of the elite and secretive Bilderberg Group, Council on Foreign Relations, and Trilateral Commission.
  • Barclays PLC is a U.K.-based major global financial services provider operating in all over the world with roots in London since 1690; it operates through its subsidiary Barclays Bank PLC and its investment bank called Barclays Capital. Barclays Bank’s unit Barclays Global Investors manages an exchange-traded fund (ETF) called iShares S&P Global Water, which is listed on the London Stock Exchanges and can be purchased like any ordinary share through a broker. Touting the iShares S&P Global Water as offering “a broad based exposure to shares of the world’s largest water companies, including water utilities and water equipment stocks” of water companies around the world, this fund as of March 31, 2007 was valued at U.S.$33.8 million.
  • Deutsche Bank is one of the major players in the water sector worldwide. Its Deutsche Bank Advisors have identified water as a part of the climate investment strategies. In its presentation, “Global Warming: Implications for Investors,” they have identified the four following major areas for water investment: § Distribution and management: (1) Supply and recycling, (2) water distribution and sewage, (3) water management and engineering. § Water purification: (1) Sewage purification, (2) disinfection, (3) desalination, (4) monitoring. § Water efficiency (demand): (1) Home installation, (2) gray-water recycling, (3) water meters. § Water and nutrition: (1) Irrigation, (2) bottled water.
  • Moreover, Deutsche Bank has channeled €6 billion (U.S.$8.55 billion) into climate change funds, which will target companies with products that cut greenhouse gases or help people adapt to a warmer world, in sectors from agriculture to power and construction (Reuters, October 18, 2007). In addition to SCM, Deutsche Bank also has the RREEF Infrastructure, part of RREEF Alternative Investments, headquartered in New York with main hubs in Sydney, Singapore, and London. RREEF Infrastructure has more than €6.7 billion in assets under management. One of its main targets is utilities, including electricity networks, water-treatment or distribution operations, and natural-gas networks. In October 2007, RREEF partnered with Goldman Sachs, GE, Prudential, and Babcok & Brown Ltd. to bid unsuccessfully for U.K.’s water utility Southern Water. § Crediting the boom in European infrastructure investment, the RREEF fund by August 2007 had raised €2 billion (U.S.$2.8 billion); Europe’s infrastructure market is valued at between U.S.$4 trillion to U.S.$6 trillion (DowJones Financial News Online, August 7, 2007). § Bulgaria --- Deutsche Bank Bulgaria is planning to participate in large infrastructure projects, including public-private partnership projects in water and sewage worth up to €1 billion (Sofia Echo Media, February 26, 2008). § Middle East --- Along with Ithmaar Bank B.S.C. (an private-equity investment bank in Bahrain), Deutsche Bank co-managed a U.S.$2 billion Shari'a-compliant Infrastructure and Growth Capital Fund and plans to target U.S.$630 billion in regional infrastructure.
  • In my 2008 article, I overlooked the astonishingly large land purchases (298,840 acres, to be exact) by the Bush family in 2005 and 2006. In 2006, while on a trip to Paraguay for the United Nation’s children’s group UNICEF, Jenna Bush (daughter of former President George W. Bush and granddaughter of former President George H.W. Bush) reportedly bought 98,840 acres of land in Chaco, Paraguay, near the Triple Frontier (Bolivia, Brazil, and Paraguay). This land is said to be near the 200,000 acres purchased by her grandfather, George H.W. Bush, in 2005. The lands purchased by the Bush family sit over not only South America’s largest aquifer --- but the world’s as well --- Acuifero Guaraní, which runs beneath Argentina, Brazil, Paraguay, and Uruguay. This aquifer is larger than Texas and California combined. Online political magazine Counterpunch quoted Argentinean pacifist Adolfo Perez Esquivel, the winner of 1981 Nobel Peace Prize, who “warned that the real war will be fought not for oil, but for water, and recalled that Acuifero Guaraní is one of the largest underground water reserves in South America….”
  •  
     Like the land rush for Arctic lands soon to be bared of ice by global warming, banksters are also moving to capitalize on looming water shortages, aided by IMF privatization loan conditions the the dwindling of potable water supplies globally via pollution, deforestation, and aquifer depletion. All trace to the common problem over human overpopulation of the planet.  
Paul Merrell

Venezuela Continues to be Chavista, According to New Poll | venezuelanalysis.com - 0 views

  • According to a new poll released by International Consulting Services (ICS), approximately 57% of Venezuelans have confidence that the Venezuelan government of President Nicolas Maduro will improve the economy. The poll also featured several results which suggest that Chavismo continues to be the preferred political option for the country's citizens.  In the midst of an economic crisis triggered by crashing oil prices and economic war in which basic goods remain scarce, only one fourth of Venezuelans regard scarcities as the country's biggest problem. This finding contradicts the image of widespread hunger and desperation among Venezuelans projected by the international media.  Moreover, in the face of an inflation rate fast approaching 70%, only 1 in 10 Venezuelans consider inflation as the nation's principal issue. Rather, insecurity, a perennial problem in Venezuela, remains the top concern for half of the country's citizens. 
  • The study also contained some unexpected findings regarding upcoming parliamentary elections. Contrary to international predictions of a landslide victory for the opposition, 43.6% of Venezuelans said they would vote for the United Socialist Party of Venezuela (PSUV) and its allied parties if elections were held today.  This figure means that even in the midst of acute economic difficulties, the PSUV retains a strong lead over the opposition, which was the preference of less than 32% of poll respondents.  Additionally, the poll found that on the eve of the second anniversary of the death of Hugo Rafael Chávez Frías, around 62% of Venezuelans consider themselves chavistas, or "partisans... of the ideals" of the late Venezuelan leader. This result attests to the ongoing majoritarian popularity of the Bolivarian project initiated by Chávez, even despite his physical absence. 
  • The poll was conducted between February 10 and February 20 and included a sample of 1300 respondents drawn from every state in the country. The figures were reported with a confidence level of 95%. 
Paul Merrell

Island puts its EU Bid on Ice | nsnbc international - 0 views

  • Foreign Minister Sveinsson issued a formal statement, saying that he had informed the current Latvian EU President as well as the European Commission about Island’s decision to withdraw its EU membership application.
  • The application was submitted to the EU six years ago. Gunnar Bragi Sveinsson explained: “The EU and Iceland have discussed the country’s position on the status of its bid to join the European Union. … The government doesn’t intend to resume preparing for EU membership”. The decision didn’t come without forewarning. In January Island’s Prime Minister Sigmundur Davið Gunnlaugsson went on the record about the possible withdrawal of Island’s EU membership application, saying: “Participation in EU talks is not really valid any more. .. Both due to changes in the European Union and because it’s not in line with the policies of the ruling government to accept everything that the last government was willing to accept. Because of that we are back to square one”. The announcement about Island’s withdrawal of its application for EU membership comes as EU-skeptic parties in the Scandinavian neighbor country Denmark complain that their parties are denied access to documents which other parties receive. That is, documents pertaining an upcoming decision about whether Denmark should abolish its reservations about the coordination of Danish and EU law.
  • One of the primary drivers behind Island’s reservations with regard to an EU membership are EU fishing quota which, according to Icelandic fishery experts would be devastating for the Atlantic  island nation’s fishery and related industries. Island is a member of the European Economic Area (EEA), the European Free Trade Association (EFTA) and a member of the Schengen areas. Reservations about a full EU membership are also driven by an increasing EU interference in national sovereignty with regard to legislation, the development of a military column within the EU, lack of transparency, money spent on influencing EU election outcomes by infiltrating social media, corruption and interference into domestic economic and monetary policies such as in Greece.
  • ...1 more annotation...
  • Foreign Minister Sveinsson noted that any future decision about Island’s EU membership would have to be based on the outcome of a referendum. So far, Island is content with its EEA and EFFTA membership.
  •  
    Make that Iceland rather than Island. Why buy a ticket to travel on a sinking ship?
Paul Merrell

Yellowstone Oil Spills Expose Threat to Pipelines Under Rivers Nationwide | Inside Clim... - 0 views

  • At the time the Poplar pipeline ruptured, about 110 feet of it was completely uncovered along the bottom of the Yellowstone River, exposing it to damage.
  • Bridger Pipeline LLC was so sure its Poplar oil line was safely buried below the Yellowstone River that it planned to wait five years to recheck it. But last month, 3.5 years later, the Poplar wasn't eight feet under the river anymore. It was substantially exposed on the river bottom—and leaking more than 30,000 gallons of oil upstream from Glendive, Montana. An ExxonMobil pipeline wasn't buried deeply enough for the Yellowstone River, either. High floodwaters in 2011 uncovered the Silvertip pipe, leaving it defenseless against the fast-moving current and traveling debris. It broke apart in July, and sent 63,000 gallons of oil into the river near Laurel, Montana.
  • Both companies underestimated the river's power and its penchant for scouring away the earth that's covering and protecting their pipelines. That miscalculation led to the Exxon Silvertip spill and it's likely to be declared a significant factor, at a minimum, in the Poplar spill. Such misjudgments have potentially troubling implications nationwide, since pipelines carrying crude oil and petroleum products pass beneath rivers and other bodies of water in more than 18,000 places across America. Many of them are buried only a few feet below the water. "There were a lot of people who wanted to think that the last pipeline spill in the Yellowstone River in 2011 was a freak accident that would never happen again. After this most recent spill, no one believes that anymore," said Scott Bosse, Northern Rockies director for American Rivers. "The truth is, there are probably hundreds of pipelines across the country that are at considerable risk of rupturing under our rivers."
  • ...4 more annotations...
  • While corrosion is the No. 1 cause of pipeline spills, a sizable number of pipelines at water crossings have ruptured or been endangered by river scour. Among them: ► The Poplar (Jan. 2015) and Silvertip (July 2011) pipeline failures on the Yellowstone River. ► More than 20 pipeline river crossings in Montana were found to be "dangerously close to exposure" during inspections of nearly 90 pipeline crossings in 2011, according to one report. Many of them have since been reburied significantly deeper. The Poplar pipeline was not among the crossings tagged as being close to exposure. ► Nearly half of the 55 oil and gas pipelines that cross the Missouri River were found to have sections buried 10 feet or less below the riverbed, according to the Wall Street Journal. A study by the U.S. Geological Survey, meanwhile, found that the Missouri riverbed had deepened by nine to 41 feet in 27 places because of severe scouring during the 2011 floods. ► An Enterprise Products Partners LLP pipeline that was uncovered by river scouring and ruptured in August 2011. The line spilled more than 28,350 gallons of a gasoline additive into the Missouri River in Iowa. ► A June 2012 spill in Alberta, Canada, where an oil pipeline owned by Plains Midstream Canada failed along the Red Deer River and released more than 122,000 gallons of light crude. Investigators concluded that the pipe was uncovered by scour during high flood waters and subjected to vibrations from the river flow that led a weld to fail.
  • Three Enbridge Corp. crude oil pipelines crossing Minnesota's Tamarac River were exposed by floodwater erosion years ago, and were still exposed in mid-2014. None of the pipes had failed at that point, but one was being propped up by steel legs, according to an MPR News account. Federal regulations aren't much help. The only rule that addresses pipe burial at major river crossings requires petroleum pipelines to be laid at least four feet below the riverbed at the time of construction. Once a pipeline's installed, there are no requirements regarding burial depth. There is no rule requiring exposed pipelines to be reburied, though a spill under those conditions would invite regulatory penalties for leaving the line exposed to hazards. What's more, federal rules put the pipeline companies in charge of identifying all threats that could cause a spill in highly populated or environmentally sensitive areas, and the companies get wide latitude in deciding what to do about them, according to Rebecca Craven, program manager at the Pipeline Safety Trust, a nonprofit group that tracks pipeline risks and regulations.
  • Indeed, the required four-foot minimum initial burial depth for pipelines can be completely eliminated by natural erosion over time or by a single flood event. Active free-flowing rivers can carve with enough ferocity to lower their riverbeds by 20 feet or shift the waterway onto an entirely new path, which can add new stresses to the pipeline or put the river over pipe that has less cover or lacks reinforcement or protective cement casings. The hotly debated Keystone XL oil pipeline project would cross nearly 2,000 rivers, streams and reservoirs in Montana, South Dakota and Nebraska, according to one estimate. The route takes the pipe across the Missouri and Yellowstone rivers, where owner TransCanada has pledged to install the pipeline 35 feet below the riverbeds.
  • See Also: Ruptured Yellowstone Oil Pipeline Was Built With Faulty Welding in 1950sIce Hinders Cleanup of Yellowstone Oil Pipeline SpillExxon Overlooked, Masked Safety Threats in Years Before Pegasus Pipeline BurstDilbit in Exxon's Pegasus May Have Contributed to Pipeline's Rupture
  •  
    One of the hidden costs of oil dependence. 
Paul Merrell

Julian Assange on Twitter: "Two IC officials close to Pence stated privately this month... - 0 views

  • Julian Assange‏ @JulianAssange Mar 14 Follow Following Unfollow Blocked Unblock Pending Cancel More Share via Direct Message Copy link to Tweet Embed Tweet Mute @JulianAssange Unmute @JulianAssange Mute this conversation Unmute this conversation Block @JulianAssange Unblock @JulianAssange Report Tweet Add to other Moment Add to new Moment Two IC officials close to Pence stated privately this month that they are planning on a Pence takeover. Did not state if Pence agrees.
Paul Merrell

PressTV - US planning for a post-Israel Middle East - 0 views

  • So what is all the fuss about? It’s a paper entitled: Preparing for a Post-Israel Middle East, an 82-page analysis that concludes that the American national interest in fundamentally at odds with that of Zionist Israel. The authors conclude that Israel is currently the greatest threat to US national interests because its nature and actions prevent normal US relations with Arab and Muslim countries and, to a growing degree, the wider international community. The study was commissioned by the US Intelligence Community comprising 16 American intelligence agencies with an annual budget in excess of $ 70 billion. The IC includes the departments of the Navy, Army, Air Force, Marine Corps, Coast Guard, Defense Intelligence Agency, Departments of Energy, Homeland Security, State, Treasury, Drug Enforcement Agency, Federal Bureau of Investigation, National Security Agency, National Geospatial Intelligence Agency, National Reconnaissance Agency and the Central Intelligence Agency commissioned the study.
  • srael, given its current brutal occupation and belligerence cannot be salvaged any more than apartheid South Africa could be when as late as 1987 Israel was the only “Western” nation that upheld diplomatic ties with South Africa and was the last country to join the international boycott campaign before the regime collapsed;
  • Simultaneous with, but predating, rapidly expanding Arab and Muslim power in the region as evidenced by the Arab Spring, Islamic Awakening and the ascendancy of Iran, as American power and influence recedes, the US commitment to belligerent oppressive Israel is becoming impossible to defend or execute consistent given paramount US national interests which include normalizing relations with the 57 Islamic countries; · Gross Israeli interference in the internal affairs of the United States through spying and illegal US arms transfers. This includes supporting more than 60 ‘front organizations’ and approximately 7,500 US officials who do Israel’s bidding and seek to dominate and intimidate the media and agencies of the US government which should no longer be condoned;
  • ...2 more annotations...
  • The international opposition to the increasingly apartheid regime can no longer be synchronized with American claimed humanitarian values or US expectations in its bilateral relations with the 193 member United Nations. The Draft ends with language about the need to avoid entangling alliances that alienate much of the World and condemn American citizens to endure the consequences.
  • Franklin Lamb, former Assistant Counsel, US House Judiciary Committee and Professor of International Law at Northwestern College of Law in Oregon, earned his Law Degree at Boston University and his LLM, M.Phil., and PhD degrees at the London School of Economics. Following three years at the International Court of Justice in The Hague, Lamb was visiting fellow at the Harvard Law School’s East Asian Legal Studies Center.
Gary Edwards

An Inconvenient Truth: Liberal Climate Inquisition Can't Explain Past Temperature Changes - 0 views

  • For instance, the chart above shows reconstructed average world temperature data for the past 500,000 years. Depending on the magnification and size of your monitor, each pencil dot would span something on the order of 1,000 years. The myriad 10-degree Celsius temperature flips all happened before man-made carbon dioxide could have had any impact—the final temperature spike started at the end of the last ice age.
  • Now see if you can follow this: The “science thought police” insist that even though none of the temperature variations for the first 499,950 years had anything to do with human activity, virtually none of the temperature increases of the past 50 years had anything to do with nature. Got it?
  •  
    "In the week prior to the administration signing what should constitute an international climate treaty, one think tank, the Competitive Enterprise Institute, was subpoenaed for casting doubt on the agreement's associated science of climate catastrophe. As disturbing as such thuggery from state attorneys general would be in any case, the premise of the subpoena is faulty. The Competitive Enterprise Institute did not cast doubt on the dubious climate science. The actual data cast the doubt. The think tank and others have simply pointed out what the data show. It looks like thoughtcrime has now moved from George Orwell's novel "1984" to the twisted reality of our judicial system. Pointing out facts should never be a real crime. The Heritage Foundation's new Paris-bubble-popping science summary is also a case of letting the numbers tell a story. A story many never hear in the media-hyped spectacle that is international climate policy."
1 - 20 of 42 Next › Last »
Showing 20 items per page