Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged mac

Rss Feed Group items tagged

Paul Merrell

Three House panels to investigate whether ISIS intelligence was cooked | TheHill - 0 views

  • Three House committees will jointly investigate allegations U.S. Central Command altered intelligence reports, their chairmen announced Friday.“Today, the House Armed Services Committee, the House Permanent Select Committee on Intelligence and the House Appropriations Committee established a Joint Task Force to investigate allegations that senior U.S. Central Command (CENTCOM) officials manipulated intelligence products,” Reps. David Nunes (R-Calif.), Mac Thornberry (R-Texas) and Rodney Frelinghuysen (R-N.J.) said in a joint statement.Analysts at Centcom have alleged that senior officials altered their reports to paint a rosier picture of the fight against the Islamic State in Iraq and Syria (ISIS).The Pentagon’s inspector general is already conducting an investigation into the allegations.Magazine Foreign Policy reported last month that the task force would be formed.
  • In their statement, Nunes, Thornberry and Frelinghuysen said the task force would look into the specific allegations, as well as whether there are “systemic problems across the intelligence enterprise in CENTCOM or any other pertinent intelligence organizations.”Reps. Ken Calvert (R-Calif.), Mike Pompeo (R-Kan.) and Brad Wenstrup (R-Ohio) will lead the investigation.“Any accusation of intelligence being altered to fit a political narrative must be fully investigated and those responsible held accountable,” Pompeo said in a written statement. “This matters both to those who gather the intelligence, often at great risk to their personal safety, and to the policymakers who use this intelligence to make what are often life threatening decisions.”In an interview on Fox News, Thornberry said the issue was too important to wait to investigate until after the inspector general.
  • Democrats are participating, too, he said in the interview.  “They are participating in the investigation,” he said. “Their staff had been involved in the discussions we have had with a variety of folks from Centcom and elsewhere. So again we want to be careful and do it right, but it's important.” The task force expects to have preliminary results early next year, according to the chairmen’s statement.
Paul Merrell

Pentagon may send more U.S. troops to Syria - 0 views

  • The Pentagon will consider deploying more special operations troops to fight Islamic State militants if its pilot project in Syria shows signs of progress, a senior Defense official told USA TODAY on Monday.The Pentagon last month announced that 50 commandos would be sent to northern Syria to advise forces battling the Islamic State, also known as ISIL or ISIS. Sending that initial force amounts to "breaking the seal" on inserting special operations forces in Syria and could lead to further deployments, said the official, who was not authorized to speak publicly about planning. The Pentagon will not comment on whether those commandos have arrived in Syria.The trigger for sending more special operations forces, the official said, is the ability of local forces to take ground from ISIL in Syria and hold it. Adding more forces on the ground in Syria would represent a significant deepening of the U.S. commitment to the counter-ISIL effort, potentially requiring additional forces to support them. There are about 3,400 American forces in Iraq.
  • The Pentagon's counter-ISIL strategy will be the focus of a hearing Tuesday before the House Armed Services Committee; Defense Secretary Ash Carter is scheduled to testify.Rep. Mac Thornberry, the Texas Republican who chairs the committee, said in an interview that he would support a greater commitment of U.S. ground forces to Syria and Iraq, including spotters for airstrikes, if they are part of more robust strategy to confront the Islamic State."The issue is OK, What would it take to really degrade and ultimately destroy ISIS?" Thornberry said. "Send however many guys or assemble whatever coalition is necessary to accomplish that goal."Thornberry dismissed the deployment of 50 commandos as a half measure that won't work."Fifty guys to be deployed is not going to turn the tide of this battle," he said.
Gary Edwards

The Daily Bell - Richard Ebeling on Higher Interest Rates, Collectivism and the Coming ... - 0 views

  • The "larger dysfunction," as you express it, arises out of a number of factors. The primary one, in my view, is a philosophical and psychological schizophrenia among the American people.
  • While many on "the left" ridicule the idea, there is a strong case for the idea of "American exceptionalism," meaning that the United States stands out as something unique, different and special among the nations of the world.
  • the American Founding Fathers constructed a political system in the United States based on a concept on which no other country was consciously founded:
  • ...95 more annotations...
  • But the American Revolution and the US Constitution hailed a different conception of man, society and government.
  • n the rest of the world, and for all of human history, the presumption has been that the individual was a slave or a subject to a higher authority. It might be the tribal chief; or the "divinely ordained" monarch who presumed to rule over and control people in the name of God; or, especially after the French Revolution and the rise of modern socialism, "the nation" or "the people" who laid claim to the life and work of the individual.
  • the idea of individual rights.
  • That is, as long as the individual did not violate the equal rights of others to their life, liberty and property, each person was free to shape and guide his own future, and give meaning and value to his own life as he considered best in the pursuit of that happiness that was considered the purpose and goal of each man during his sojourn on this Earth.
  • Governments did not exist to give or bestow "rights" or "privileges" at its own discretion.
  • Governments were to secure and protect each individual's rights, which he possessed by "the nature of things."
  • The individual was presumed to own himself. He was "sovereign."
  • The real and fundamental notion of "self-government" referred to the right of each individual to rule over himself.
  • Each individual, by his nature and his reason, had a right to his life, his liberty and his honestly acquired property.
  • during the first 150 years of America's history there was virtually no Welfare State and relatively few government regulations, controls and restrictions on the choices and actions of the free citizen.
  • But for more than a century, now, an opposing conception of man, society and government has increasingly gained a hold over the ideas and attitudes of people in the US.
  • It was "imported" from Europe in the form of modern collectivism.
  • The individual was expected to see himself as belonging to something "greater" than himself. He was to sacrifice for "great national causes."
  • He was told that if life had not provided all that he desired or hoped for, it was because others had "exploited" him in some economic or social manner, and that government would redress the "injustice" through redistribution of wealth or regulation of the marketplace.
  • If he had had financial and material success, the individual should feel guilty and embarrassed by it, because, surely, if some had noticeably more, it could only be because others had been forced to live with noticeably less.
  • left on its own, free competition tends to evolve into harmful monopolies and oligopolies, with the wealthy "few" benefiting at the expense of the "many."
  • They are the crises of the Interventionist-Welfare State: the attempt to impose reactionary collectivist policies of political paternalism and redistributive plunder on a society still possessing parts of its original individualist and rights-based roots.
  • it is in the form of communism's and socialism's critique of capitalism.
  • Unregulated capitalism leads to "unearned" and "excessive" profits; unbridled markets generate the business cycle and the hardships of recessions and depressions;
  • These two conflicting conceptions of man, society and government have been and are at war here in the United States.
  • And if it cannot be gotten and guaranteed through the redistributive mechanisms of the European Union and the euro, well, maybe we should return power to our own nation-states to provide the jobs, the social "safety nets" and the financial means to pay for it through, once again, printing our own national paper currencies.
  • This is the political-philosophical bankruptcy of the West and the dead ends of the collectivist promises of the last 100 years.
  • Ludwig von Mises's book, Socialism: An Economic and Sociological Analysis, originally published in 1922, demonstrated how and why a socialist, centrally planned system was inherently unworkable.
  • The nationalization of productive property, the abolition of markets and the prohibition of all competitive exchange among the members of society would prevent the emergence and operation of a price system, without which it is impossible to know people's demands for desired goods and the relative value they place on them.
  • It also prevents the emergence of prices for the factors of production (land, labor, capital) and makes it impossible to know their opportunity costs – the value of those factors of production in alternative competing uses among entrepreneurs desiring to employ them.
  • Without such a price system the central planners are flying blind, unable to rationally know or decide how best to utilize labor, capital and resources in productively efficient ways to make the goods and services most highly valued by the consuming public.
  • Thus, Mises concluded, comprehensive socialist central planning would lead to "planned chaos."
  • And, therefore, there is no guarantee that the amount of investments undertaken and their time horizons are compatible with the available resources not also being demanded and used for more immediate consumer goods production in the society.
  • As a consequence, financial markets do not work like real markets.
  • Thus, the interventionist state leads to waste, inefficiency and misuses of resources that lower the standards of living that we all, otherwise, could have enjoyed.
  • We cannot be sure what the amount of real savings may be in the society to support real and sustainable investment and capital formation.
  • Government intervention prevents prices from "telling the truth" about the real supply and demand conditions thus leading to imbalances and distortions in the market.
  • We cannot know what the "real cost" of borrowing should be, since interest rates are not determined by actual, private sector savings and investment decisions.
  • Government production regulations, controls, restrictions and prohibitions prevent entrepreneurs from using their knowledge, ability and capital in ways that most effectively produce the goods consumers actually want and at the most cost-competitive prices possible.
  • This is why countries around the world periodically experience booms and busts, inflations and recessions − not because of some inherent instabilities or "irrationalities" in financial markets, but because of monetary central planning through central banking that does not allow market-based financial intermediation to develop and work as it could and would in a real free-market setting.
  • But in the United States and especially in Europe, government "austerity" means merely temporarily reducing the rate of increase in government spending, slowing down the rate at which new debt is accumulating and significantly raising taxes in an attempt to close the deficit gap.
  • The fundamental problem is that over the decades, the size and scope of governments in the Western world have been growing far more than the rates at which their economies have been expanding, so that the "slice" of the national economic "pie" eaten by government has been growing larger and larger, even when the "pie" in absolute terms is bigger than it was, say, 30 or 40 years ago.
  • European governments, in general, take the view that "austerity" means squeezing the private sector more through taxes and other revenue sources to avoid any noticeable and significant cuts in what government does and spends.
  • So there is "austerity" for the private sector and a mad rush for financial "safety nets" for the government and those who live off the State.
  • In reality, of course, it is the burdens of government regulation, taxation and impediments to more flexible labor and related markets that have generated the high unemployment rates and the retarded recovery from the recession.
  • Instead, the "common market" ideal has been transformed into the goal of a European Union "Super-State" to which the individual countries and their citizens would be subservient and obedient.
  • Keynesian policies offer people and politicians what they want to hear. Claiming that any sluggish business or lost jobs are due to a lack of "aggregate demand," Keynes argued that full employment and profitable business could only be reestablished and maintained through "activist" government monetary and fiscal policy – print money and run budget deficits.
  • What Britain and Europe should have as its goal is the ideal of the classical liberal free traders of the 19th century – non-intervention by governments in people's lives, at home and abroad. That is, a de-politicization of society, so people may freely work, trade and travel as they peacefully wish, with government merely the protector of people's individual rights.
  • Take the benefits away and tell people they are free to come and work to support themselves and their families. Restore more flexibility and competitiveness to labor markets and reduce taxes and business regulations.
  • Then those who come to Britain's shores will be those wanting freedom and opportunity without being a burden upon others.
  • What was needed was a change in ideas from the statist mentality to one of individual freedom and unhampered free markets.
  • In an epoch of collectivist ideas, don't be surprised if governments regulate, control, intervene and redistribute wealth.
  • The tentacle of regulations, restrictions and politically-correct social controls are spreading out in every direction from Brussels and its European-wide manipulating and mismanaging bureaucracy.
  • In the name of assuring "national prosperity," politicians could spend money to buy the votes that get them elected and reelected to government offices.
  • And every special interest group could make the case that government-spending programs that benefitted them were all reasonable and necessary to assure a fully employed and growing economy.
  • Furthermore, the Keynesian rationale for government deficit spending enabled politicians to seem to be able to offer something for nothing. They could offer, say, $100 of government spending to voters and special interest groups but the tax burden imposed in the present might only be $75, since the remainder of the money to pay for that government spending was borrowed. And that borrowed money would not have to be repaid until some indefinite time in the future by unspecific taxpayers when that "tomorrow" finally arrived.
  • instability
  • Keynes argued that the market economy's inherent
  • arose from the
  • who were subject to irrational and unpredictable waves of "optimism" and "pessimism."
  • animal spirits" of businessmen
  • Mises argued that there was nothing inherent in the market economy to bring about these swings of economic booms followed by periods of depression and unemployment.
  • If markets got out of balance with the necessity of an eventual correction in the economy to, once again, set things right, the source of this instability was government monetary policy.
  • Central banks too often followed a policy of trying to create "good times" in the economy by expanding the money supply through the banking system.
  • With new, excess funds created by the central bank available for lending, banks lower rates of interest to attract borrowers.
  • But this throws savings and investment out of balance, since the rate of interest no longer serves as a reliable indicator and signal concerning the availability of real savings in the economy in relation to those wanting to borrow funds for various investment purposes.
  • The economic crisis comes when it is discovered that all the claims on resources, capital and labor for all the attempted consumption and investment activities in the economy are greater than the actual and available amounts of such scarce resources.
  • The recession period, in Mises's view, is the necessary "correction" period when in the post-boom era, people must adapt and adjust to the newly discovered "real" supply and demand conditions in the market.
  • Any interference with the "rebalancing" of the economy by government raising taxes, imposing more regulations, or new artificial government "stimulus" activities merely makes it more difficult and time-consuming for people in the private sector to get the economy back on an even keel.
  • Friedrich A. Hayek, once observed, unemployment is not "caused" by stopping an inflation, but rather inflation induces the artificial employments that cannot be sustained and which inevitably disappear once the inflation is reined in.
  • The recession of 2008-2009 was the result of several years of central bank stimulus.
  • From 2003 to 2008, the Federal Reserve increased the money supply by about 50 percent.
  • Interest rates for much of this time, when adjusted for inflation, were either zero or negative.
  • Awash in cash, banks extended loans to virtually anyone, with no serious and usual concern about the borrower's credit-worthiness.
  • This was most notably true in the housing market, where government agencies like Fannie May and Freddie Mac were pressuring banks to make mortgage loans by promising a guarantee that they would make good on any bad home loans.
  • Since 2008-2009, the Federal Reserve has, again, turned on the monetary spigot, increasing its own portfolio by almost $3 trillion, by buying US Treasuries, US mortgages and other assets.
  • So why has there not been a complementary explosion of price inflation?
  • In some areas there has been, most clearly in the stock market and the bond market, But the reason why all that newly created money has not brought about a higher price inflation is due to the fact that a large part of all newly created money is sitting as unlent reserves in banks.
  • This is because the Federal Reserve has been paying banks a rate of interest slightly above the market interest rates to induce banks not to lend.
  • (a) general "regime uncertainty," that is, no one knows what government policy will be tomorrow; will ObamaCare be fully implemented after January 2014?;
  • Among the reasons for the sluggish jobs growth in the US are:
  • (b) what will taxes be for the rest of the current president's term in the White House
  • (c) what will the regulatory environment be like for the next three years – in 2012, the government implemented around 80,000 pages of regulations as printed in the Federal Registry;
  • (d) how will the deficit and debt problems play out between Congress and the White House and will it threaten the general financial situation in the country; an
  • (e) what wars, if any, will the government find itself involved in, in places like the Middle East?
  • China
  • is still a controlled and commanded society, with a government that works hard to try to determine what people read, see and think.
  • All these building projects have been brought into existence by a government that not only controls the money supply and manipulates interest rates but also heavy-handedly tells banks whom to specifically loan to and for what investment activities.
  • Central planning is alive and well in China, with the motives being both power and profits for those inside and outside the Communist Party having the most influence and connections in "high" places.
  • In my opinion, China is heading for a great economic crisis, resulting from a highly imbalanced and distorted economic system still guided far more by politics than sound market decision-making.
  • global financial markets in any foreseeable future. It is a money that still primarily exists to serve the political purposes of those who sit in the "inner circles" of power in Beijing.
  • One hundred years ago, in 1913, how many could have predicted that a year later a European-wide war would break out that would lead to the destruction of great European empires and set the stage for the rise of totalitarian collectivism that resulted in an even worse global war two decades later?
  • Thus, whether, at the end of the day, freedom triumphs and the future is one of liberty and prosperity is partly on each one of us.
  • Near the end of his great book, Socialism, Ludwig von Mises said:
  • "Everyone carries a part of society on his shoulders; no one is relieved of his share of responsibility by others. And no one can find a safe way out for himself if society is sweeping towards destruction. Therefore, everyone, in his own interest, must thrust himself vigorously into the intellectual battle. None can stand aside with unconcern; the interests of everyone hang on the result. Whether he chooses or not, every man is drawn into the great historical struggle, the decisive battle into which our epoch has plunged us . . . Whether society shall continue to evolve or where it shall decay lies . . . in the hands of man."
  • In my view, the idea of a "soft landing" is an illusion based on the idea held by central bankers, themselves, that they have the wisdom and ability to know how to "micro-manage" the all the changes and adjustments resulting from their own manipulations of the monetary aggregates. They do not have this wisdom and ability. So hold on for what is most likely to be another rocky road.
  • It was Mises's clear vision that once society has broken the relationship between value and payment, sooner or later people would not know the price of anything.
  • At this point, investment ceases and business becomes furtive and transactional.
  • People cannot plan for the future because they do not understand the reality of the present.
  • Society begins to sink.
  •  
    Incredible.  A simple explanation that explains everything.  Rchard Ebeling's "Unified Theory of Everything" is something every American can understand.  If only they would take a break from "Dancing with the Stars" and pay attention to the future of their country and the world.  It's a future where either "individual freedom", as defined by our Constitution and Declaration of Independence, will win out; or, the forces of fascist socialism / marxism will continue to roll and rule.  Incredible read!!!!
Paul Merrell

McCain, Thornberry: Trump's Proposed Defense Spending Hike Not Enough | Military.com - 0 views

  • The Republican chairmen of the Senate and House armed services committees said Monday that President Donald Trump's proposal to boost defense spending by $54 billion for fiscal year 2018 is not enough. Sen. John McCain, R-Ariz., and Rep. Mac Thornberry, R-Texas, are pushing for a $640-billion base defense budget and said the $603-billion proposal unveiled by the White House will not reverse the decline in recent years in spending and military readiness.
  •  
    Of course, why didn't I realize that ... So with 100 million Amercians living in povery, we need more to shove more dollars into the pockets of defense contractors to bring us monstroties like the F-35 program? Of course, why didn't I realize that ...?
Joe La Fleur

John McCain And Bill Clinton - Democrats Blocked Regulation Of Fannie Mae And Freddie M... - 0 views

  •  
    DEMOCRATS CAUSED THE BANK FAILURES AND THE RECESSION
Paul Merrell

'Massive fraud' at center of trial against BofA over U.S. mortgages | Reuters - 0 views

  • Bank of America Corp's Countrywide unit placed profits over quality in a "massive fraud" selling shoddy mortgages to Fannie Mae and Freddie Mac, a U.S. government lawyer said on Tuesday. The claim came at the start of the first case by the government to go to trial against a major bank over defective mortgage practices leading up to the 2008 financial crisis.
  • The lawsuit is brought under the Financial Institutions Reform, Recovery, and Enforcement Act. The law, passed in the wake of the 1980s savings-and-loan scandals, covers fraud affecting federally insured financial institutions.The Justice Department estimates Fannie and Freddie has a gross loss of $848.2 million on the Countrywide HSSL loans, though their net loss on loans it says were materially defective was $131.2 million.
Paul Merrell

Documents: FBI Spyware Has Been Snaring Extortionists, Hackers for Years | Threat Level... - 0 views

  • A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, newly declassified documents show. As first reported by Wired.com, the software, called a "computer and internet protocol address verifier," or CIPAV, is designed to infiltrate a target’s computer and gather a wide range of information, which it secretly sends to an FBI server in eastern Virginia. The FBI’s use of the spyware surfaced in 2007 when the bureau used it to track e-mailed bomb threats against a Washington state high school to a 15-year-old student. But the documents released Thursday under the Freedom of Information Act show the FBI has quietly obtained court authorization to deploy the CIPAV in a wide variety of cases, ranging from major hacker investigations, to someone posing as an FBI agent online. Shortly after its launch, the program became so popular with federal law enforcement that Justice Department lawyers in Washington warned that overuse of the novel technique could result in its electronic evidence being thrown out of court in some cases. "While the technique is of indisputable value in certain kinds of cases, we are seeing indications that it is being used needlessly by some agencies, unnecessarily raising difficult legal questions (and a risk of suppression) without any countervailing benefit," reads a formerly-classified March 7, 2002 memo from the Justice Department’s Computer Crime and Intellectual Property Section.
  • The documents, which are heavily redacted, do not detail the CIPAV’s capabilities, but an FBI affidavit in the 2007 case indicate it gathers and reports a computer’s IP address; MAC address; open ports; a list of running programs; the operating system type, version and serial number; preferred internet browser and version; the computer’s registered owner and registered company name; the current logged-in user name and the last-visited URL. After sending the information to the FBI, the CIPAV settles into a silent "pen register" mode, in which it lurks on the target computer and monitors its internet use, logging the IP address of every server to which the machine connects. The documents shed some light on how the FBI sneaks the CIPAV onto a target’s machine, hinting that the bureau may be using one or more web browser vulnerabilities. In several of the cases outlined, the FBI hosted the CIPAV on a website, and tricked the target into clicking on a link. That’s what happened in the Washington case, according to a formerly-secret planning document for the 2007 operation. "The CIPAV will be deployed via a Uniform Resource Locator (URL) address posted to the subject’s private chat room on MySpace.com."
  • The software’s primary utility appears to be in tracking down suspects that use proxy servers or anonymizing websites to cover their tracks.
  • ...1 more annotation...
  • The documents appear to settle one of the questions the FBI declined to answer in 2007: whether the bureau obtains search warrants before using the CIPAV, or if it sometimes relies on weaker "pen register" orders that don’t require a showing of probable cause that a crime has been committed. In all the criminal cases described in the documents, the FBI sought search warrants. The records also indicate that the FBI obtained court orders from the Foreign Intelligence Surveillance Court, which covers foreign espionage and terrorism investigations, but the details are redacted. The FBI released 152 heavily-redacted pages in response to Threat Level’s FOIA request, and withheld another 623.
  •  
    The article summarizes many cases in which the CIPAV exploit was used by the FBI. But the article's closing observation that the released documents "whether the bureau obtains search warrants before using the CIPAV" stretches the evidence a bit too far, methinks. If they exist, the FBI very likely would not have produced records of incidents in which it used CIPAV without court authorization. 
Paul Merrell

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com - 0 views

  • It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords, briefly locking out the FBI until it gained back control. The new details emerged in local press reports from a Thursday bail hearing in Dublin, Ireland, where Marques, 28, is fighting extradition to America on charges that Freedom Hosting facilitated child pornography on a massive scale. He was denied bail today for the second time since his arrest in July. Freedom Hosting was a provider of turnkey “Tor hidden service” sites — special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network. Tor hidden services are used by sites that need to evade surveillance or protect users’ privacy to an extraordinary degree – including human rights groups and journalists. But they also appeal to serious criminal elements, child-pornography traders among them.
  • The apparent FBI-malware attack was first noticed on August 4, when all of the hidden service sites hosted by Freedom Hosting began displaying a “Down for Maintenance” message. That included at least some lawful websites, such as the secure email provider TorMail. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address. By midday, the code was being circulated and dissected all over the net. Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. Though many older revisions of Firefox were vulnerable to that bug, the malware only targeted Firefox 17 ESR, the version of Firefox that forms the basis of the Tor Browser Bundle – the easiest, most user-friendly package for using the Tor anonymity network. That made it clear early on that the attack was focused specifically on de-anonymizing Tor users. Tor Browser Bundle users who installed or manually updated after June 26 were safe from the exploit, according to the Tor Project’s security advisory on the hack.
  • On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the Tor Browser Bundle, reporting back to a mysterious server in Northern Virginia. The FBI was the obvious suspect, but declined to comment on the incident. The FBI also didn’t respond to inquiries from WIRED today. But FBI Supervisory Special Agent J. Brooke Donahue was more forthcoming when he appeared in the Irish court yesterday to bolster the case for keeping Marques behind bars, according to local press reports. Among the many arguments Donahue and an Irish police inspector offered was that Marques might reestablish contact with co-conspirators, and further complicate the FBI probe. In addition to the wrestling match over Freedom Hosting’s servers, Marques allegedly dove for his laptop when the police raided him, in an effort to shut it down.
  • ...2 more annotations...
  • Perhaps the strongest evidence that the attack was a law enforcement or intelligence operation was the limited functionality of the malware. The heart of the malicious Javascript was a tiny Windows executable hidden in a variable named “Magneto.” A traditional virus would use that executable to download and install a full-featured backdoor, so the hacker could come in later and steal passwords, enlist the computer in a DDoS botnet, and generally do all the other nasty things that happen to a hacked Windows box. But the Magneto code didn’t download anything. It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
  • The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway. The code’s behavior, and the command-and-control server’s Virginia placement, is also consistent with what’s known about the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007. Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor. Prior to the Freedom Hosting attack, the code had been used sparingly, which kept it from leaking out and being analyzed.
  •  
    Taking down the entire Freedom Hosting service because some content was kiddie porn is reminiscent of the U.S. government's proxy take-down of Mega-Upload in New Zealand. Such actions that disable legitimate users or deny access to their data are in my opinion violative of the 1st and 4th Amendments.  It suppresses the Freedom of Speech and seizes more than the 4th Amendment allows.  That our own government would use malware for surveillance purposes under any circumstance is just plain chilling.
Paul Merrell

Scientist-developed malware prototype covertly jumps air gaps using inaudible sound | A... - 0 views

  • Computer scientists have proposed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection. The proof-of-concept software—or malicious trojans that adopt the same high-frequency communication methods—could prove especially adept in penetrating highly sensitive environments that routinely place an "air gap" between computers and the outside world. Using nothing more than the built-in microphones and speakers of standard computers, the researchers were able to transmit passwords and other small amounts of data from distances of almost 65 feet. The software can transfer data at much greater distances by employing an acoustical mesh network made up of attacker-controlled devices that repeat the audio signals. The researchers, from Germany's Fraunhofer Institute for Communication, Information Processing, and Ergonomics, recently disclosed their findings in a paper published in the Journal of Communications. It came a few weeks after a security researcher said his computers were infected with a mysterious piece of malware that used high-frequency transmissions to jump air gaps. The new research neither confirms nor disproves Dragos Ruiu's claims of the so-called badBIOS infections, but it does show that high-frequency networking is easily within the grasp of today's malware.
  •  
    Not event the Sneaker Net is secure. Note to self: surgically remove all microphones and video cams from all systems (just the laptop, I think, but check). 
Paul Merrell

DOJ Seeks Removal Of Restrictions On Computer Search Warrants - 0 views

  • The Justice Department recently submitted proposed new rules on the procedures and practices of the department’s agencies and bureaus. Among the suggested changes is a modification of the Federal Rules of Criminal Procedure Rule 41(b), which empowers a federal court to issue a warrant allowing the federal government to conduct a search of a computer or computer network involved in a criminal investigation. Under current regulations, a warrant issued by a federal court is only valid in that court’s district. As there are 94 federal judicial districts, investigating a widespread attack may require either petitioning dozens of district courts or acting extrajudicially by not seeking a warrant. An extrajudicial investigation, however, cannot be used if criminal convictions are sought, as evidence gathered in this manner is not typically admissible in court. The Justice Department is seeking to make remote access warrants to search, seize and copy electronic information valid for all federal districts.
  • The Justice Department argues that due to the sophistication of cyber-criminals, an offending computer or computer cluster can sit in a district separate from the district where the hackers that infected the target computer anonymously are and separate from the investigators’ district. “Criminals are using multiple computers in many districts simultaneously as part of complex criminal schemes, and effectively investigating and disrupting these schemes often requires remote access to Internet-connected computers in many different districts,” wrote then-acting Assistant Attorney General Mythili Raman in a September letter to the Advisory Committee on the Criminal Rules. “Botnets are a significant threat to the public: they are used to conduct large-scale denial of service attacks, steal personal and financial data, and distribute malware designed to invade the privacy of users of the host computers,” Raman continued. In the letter, Raman cited an investigation of a child porn site that uses The Onion Router Network, or Tor, to anonymize its traffic. The Justice Department argues that it knows the site’s hosting server location, but without a warrant local to the server, the department is prevented from retrieving the server’s user records — including IP and MAC addresses. In most cases, however, law enforcement do not know the physical location of the site’s server, making it impossible to request a specific warrant.
  • In these cases, the Justice Department could request a blanket warrant. This would allow the department to set up a “zero-day” attack on the server — an attack exploiting a manufacturer-unknown or -permitted security flaw, allowing access to the system’s operating software. However, a Texas judge denied the FBI access to such a warrant, saying the Justice Department’s use of “zero-day” attacks in its investigation exposes the public and the target to unknown risks. One typical type of a “zero-day” attack is an infected email that could affect a large number of innocent people if the target used a public computer to access his email. The FBI planned to install a Remote Administration Tool, or RAT, which would distribute such emails in a partially-targeted spam mail distribution. Last year, Federal Magistrate Judge Stephen Smith of the Houston Division of the Southern District of Texas ruled that this was a gross overreach of investigatory intrusion, blocking the plan temporarily. A “zero-day” attack has the potential to activate and control the targeted computer’s peripherals, such as webcams and microphones.
  • ...2 more annotations...
  • Following this ruling, based on the assumptions that federal law enforcement fundamentally act in good faith and that there may be a legitimate need for remote exploitation of computer data, the Justice Department sought to introduce changes to the rules that would overcome Smith’s objections. The proposed change to Rule 41(b) would allow magistrate judges “… to issue a warrant to use remote access to search electronic storage media and to seize electronically stored information located within or outside that district.” The Justice Department has indicated that it wants warrants permitting multiple computers to be searched at the same time, as well as permission to search all of the email and social media accounts accessible from a single computer. Such access would constitute a violation of the Electronic Communications Privacy Act, as the government, under the act, must make demonstrate probable cause to each targeted service provider and obtain and serve a warrant for each service provider. A warrant to search every account active on a computer would be actively bypassing the act’s numerous safeguards.
  • Privacy advocates fear that this rule change would allow prosecutors and the Justice Department to seek out magistrates likely to give them their requested warrants, creating a situation in which the federal government could have a “warrant shop” with just one judge for the whole of the nation. In light of allegations of federal government over-policing — including revelations of aggressive domestic and international electronic spying by the FBI and the National Security Agency — many advocates argue that an examination of the federal government’s commitment to the Fourth Amendment is needed. “The proposed amendment would significantly expand the government’s authority to conduct remote searches of electronic storage media,” the American Civil Liberties Union wrote in a memorandum early last month. “It would also expand the government’s power to engage in computer hacking in the course of criminal investigations, including through the use of malware and other techniques that pose a risk to internet security and that raise Fourth Amendment and policy concerns. “In light of these concerns, the ACLU recommends that the Advisory Committee exercise extreme caution before granting the government new authority to remotely search individuals’ electronic data.” The rules are scheduled to be discussed at the meeting of the Judiciary’s Committee on Rules of Practice and Procedure later this month.
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. ("Oh, Goody! Let's start shopping around for the judges we like instead of the ones we are now required to persuade. What? The Mississippi judge refused to sign the warrant? Oh well, let's try it with that other judge we like, the one in Gnome, Alaska.") In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted in the warrant's bottom margin, no doubt
  •  
    The proposed rule change is at pp. 499-501 here. http://www.uscourts.gov/uscourts/RulesAndPolicies/rules/Agenda%20Books/Standing/ST2014-05.pdf#page499 (very large PDF).  This is not just about the government being granted permission to exploit vulnerabilities unknown to the computer owner; the issue arose in a case where the government sought judicial permission to implant a Trojan Horse in a suspect's computer. Moreover, the proposed rule goes far beyond the confines of that case, purporting to authorize the government to skip merrily along searching computers not specified in the warrant, along the purported botnet. To put the icing on the cake, the government wants to be relieved from the requirement that they apply for a warrant in the district in which the computer to be searched is located. In other words, what the government seeks is authority for "general warrants," the very evil that the 4th Amendment was designed to outlaw. Even more outrageously, the proposed rule provides in part: "For a warrant to use remote access to search electronic storage media and seize or copy electronically stored information, the officer must make reasonable efforts to serve a copy of the warrant on the person whose property *was* searched or whose information *was* seized or copied. Service may be accomplished by any means, including electronic means, reasonably calculated to reach that person." Not the use of the past tense "was." So after they have drained your computer of all its data, they may permissibly install a batch file that will display a copy of the warrant on your monitor the next time you boot your computer. With a big red lipstick imprint of a kiss imprinted at the bottom.  To be continued after this is intially posted to Diigo so the content isn't cut off.   
Paul Merrell

Covington & Burling Gets Eric Holder Back After 6-Year Stopover - 0 views

  • After failing to criminally prosecute any of the financial firms responsible for the market collapse in 2008, former Attorney General Eric Holder is returning to Covington & Burling, a corporate law firm known for serving Wall Street clients. The move completes one of the more troubling trips through the revolving door for a cabinet secretary. Holder worked at Covington from 2001 right up to being sworn in as attorney general in Feburary 2009. And Covington literally kept an office empty for him, awaiting his return. The Covington & Burling client list has included four of the largest banks, including Bank of America, Citigroup, JPMorgan Chase and Wells Fargo. Lobbying records show that Wells Fargo is still a client of Covington. Covington recently represented Citigroup over a civil lawsuit relating to the bank’s role in Libor manipulation.
  • Covington was also deeply involved with a company known as MERS, which was later responsible for falsifying mortgage documents on an industrial scale. “Court records show that Covington, in the late 1990s, provided legal opinion letters needed to create MERS on behalf of Fannie Mae, Freddie Mac, Bank of America, JPMorgan Chase and several other large banks,” according to an investigation by Reuters. The Department of Justice under Holder not only failed to pursue criminal prosecutions of the banks responsible for the mortage meltdown, but in fact de-prioritized investigations of mortgage fraud, making it the “lowest-ranked criminal threat,” according to an inspector general report. For insiders, the Holder decision to return to Covington was never a mystery. Timothy Hester, the chairman of Covington, told the National Law Journal that Holder’s return to the firm had been “a project” of his ever since Holder left to the join the administration in 2009. When the firm moved to a new building last year, it kept an 11th-story corner office reserved for Holder.
  • Holder’s critics charge that he made a career out of institutionalizing “Too Big to Prosecute” rules within the department. In 1999, as a deputy attorney general, Holder authored a memo arguing that officials should consider the “collateral consequences” when prosecuting corporate crimes. In 2012, Holder’s enforcement chief, Lanny Breuer, admitted during a speech to the New York City Bar Association that the department may go easy on certain corporate criminals if they believe prosecutions may disrupt financial markets or cause layoffs. “In some cases, the health of an industry or the markets are a real factor,” Breuer said. Rather than face accountability for their failures, the incentive structure of modern Washington is designed to reward both men. Breuer left the department in 2013 to rejoin Covington. Holder is set to become among the highest-earning partners at the firm, with compensation in the seven or eight figures.
Gary Edwards

Speculators, Politicians, and Financial Disasters : A history of Banking and Socialism - 0 views

  • As the sorry tale of the S&L crisis suggests, the road to financial hell is sometimes paved with good intentions. There was nothing malign in attempting to keep these institutions solvent and profitable; they were of long standing, and it seemed a noble exercise to preserve them. Perhaps even more noble, and with consequences that have already proved much more threatening, was the philosophy that would eventually lead the United States into its latest financial crisis—a crisis that begins, and ends, with mortgages. A mortgage used to stay on the books of the issuing bank until it was paid off, often twenty or thirty years later. This greatly limited the number of mortgages a bank could initiate. In 1938, as part of the New Deal, the federal government established the Federal National Mortgage Association, nicknamed Fannie Mae, to help provide liquidity to the mortgage market.
  • it was, ironically, the New Deal that institutionalized discrimination against blacks seeking mortgages. In 1935 the Federal Housing Administration (FHA), established in 1934 to insure home mortgages, asked the Home Owner’s Loan Corporation—another New Deal agency, this one created to help prevent foreclosures—to draw up maps of residential areas according to the risk of lending in them. Affluent suburbs were outlined in blue, less desirable areas in yellow, and the least desirable in red. The FHA used the maps to decide whether or not to insure a mortgage, which in turn caused banks to avoid the redlined neighborhoods. These tended to be in the inner city and to comprise largely black populations. As most blacks at this time were unable to buy in white neighborhoods, the effect of redlining was largely to exclude even affluent blacks from the mortgage market.
  • In 1977, responding to political pressure to abolish the practice, Congress finally passed the Community Reinvestment Act, requiring banks to offer credit throughout their marketing areas and rating them on their compliance. This effectively outlawed redlining.
  • ...4 more annotations...
  • in 1995, regulations adopted by the Clinton administration took the Community Reinvestment Act to a new level. Instead of forbidding banks to discriminate against blacks and black neighborhoods, the new regulations positively forced banks to seek out such customers and areas. Without saying so, the revised law established quotas for loans to specific neighborhoods, specific income classes, and specific races. It also encouraged community groups to monitor compliance and allowed them to receive fees for marketing loans to target groups.
  • the Clinton changes in 1995. As part of them, Fannie and Freddie were now permitted to invest up to 40 times their capital in mortgages; banks, by contrast, were limited to only ten times their capital. Put briefly, in order to increase the number of mortgages Fannie and Freddie could underwrite, the federal government allowed them to become grossly undercapitalized—that is, grossly to reduce their one source of insurance against failure. The risk of a mammoth failure was then greatly augmented by the sheer number of mortgages given out in the country.
    • Gary Edwards
       
      wow, there's that "40 to 1" lending to asset ratio that took down the big five investment banks in October of 2008!
  • Since banks knew they could offload these sub-prime mortgages to Fannie and Freddie, they had no reason to be careful about issuing them. As for the firms that bought the mortgage-based securities issued by Fannie and Freddie, they thought they could rely on the government’s implicit guarantee. AIG, the world’s largest insurance firm, was happy to insure vast quantities of these securities against default; it must have seemed like insuring against the sun rising in the West.
  • remaining at the heart of the financial beast now abroad in the world are Fannie Mae and Freddie Mac and the mortgages they bought and turned into securities. Protected by their political patrons, they were allowed to pile up colossal debt on an inadequate capital base and to escape much of the regulatory oversight and rules to which other financial institutions are subject. Had they been treated as the potential risks to financial stability they were from the beginning, the housing bubble could not have grown so large and the pain that is now accompanying its end would not have hurt so much.
  •  
    Fueled by easy credit, the real-estate market had been rising swiftly for some years. Members of Congress were determined to assure the continuation of that easy credit. Suddenly, the party came to a devastating halt. Defaults multiplied, banks began to fail. Soon the economic troubles spread beyond real estate. Depression stalked the land. The year was 1836.
Gary Edwards

American Thinker: Wrecks, Lies and Barney Frank - 0 views

  • But then a caller challenged Frank's continued insistence that the meltdown was brought on by Republican deregulation, citing the 1999 NY Times article concerning Clinton Administration efforts to force Fannie to ease mortgage standards in order to provide more minority and lower-income lending. The caller reminded Barney of his own words as ranking member from a 2003 Times piece reporting Bush's initiative to reign in Fannie and Freddie by creating new oversight under the Treasury Department:
  • "The recklessness of government is a primary culprit here. For years, Congress has been pushing banks to make risky, subprime loans. Using the authority of the Community Reinvestment Act, the big push for subprime mortgages began in earnest during the Clinton years. Banks that didn't play ball were subject to serious fines and lawsuits, and regulatory obstacles were placed in their way. While expanding access to the American Dream is a worthy goal, by blindly pursuing that goal and allowing the end to justify any means, we put millions of Americans at financial risk."
  • In truth, the Bill that would have likely averted the Fannie/Freddy failure -- the Federal Housing Enterprise Regulatory Reform Act of 2005 (S. 190) -- was Republican legislation introduced by Sen. Charles Hagel [R-NE] in January of 2005. 
  • ...2 more annotations...
  • What's more, the "regulation" Frank now takes credit for was not his (H.R.1427 passed the House last year but never escaped Senate committee) but rather Nancy Pelosi's (H.R. 3221 - The Housing and Economic Recovery Act of 2008). And Pelosi's version, not surprisingly and unlike its Republican predecessors, was signed marked up with over 66 pages of Liberal wealth redistribution wish-fulfillment under the guise of assuring "affordable housing."  While it did establish (and way too late, Barney) the Federal Housing Finance Agency, with regulatory authority over Fannie Mae, Freddie Mac, the Federal Home Loan Banks, and the Office of Finance, it's bogged down with tons of pork-fat. This oinker even increased the national debt limit from $9.82 trillion to $10.62 trillion, and commissioned a boatload of programs for low income families to spend it on.
  • Frank did, however, introduce legislation of his own in October of last year. Would you believe that H.R. 3838 was actually an attempt to temporarily increase the caps on Fannie/Freddie portfolios and to mandate the "use of 85% of such increase for refinancing subprime mortgages at risk of foreclosure?
  •  
    But then a caller challenged Frank's continued insistence that the meltdown was brought on by Republican deregulation, citing the 1999 NY Times article concerning Clinton Administration efforts to force Fannie to ease mortgage standards in order to provide more minority and lower-income lending. The caller reminded Barney of his own words as ranking member from a 2003 Times piece reporting Bush's initiative to reign in Fannie and Freddie by creating new oversight under the Treasury Department:
Gary Edwards

Goldman Sachs: Don't Blame Us - BusinessWeek - 0 views

  • The AIG-related charges against Goldman go further. Critics such as AIG's former chief executive, Maurice R. "Hank" Greenberg, have contended that Goldman caused AIG's demise and that Goldman should have known, as basic due diligence, that AIG was in way over its head.
    • Gary Edwards
       
      It's often been said that what Goldman did was tthe equivalence of taking out vast volumes of insurance on someone else's property, then burning these homes down, and collecting the insurance.  AIG was the hapless insurance company Goldman played. The thing is, thanks to Goldman operatives at the USA Treasury and Federal Reserve, it was the taxpayers who stepped in and paid off the trillions of dollars in claims. AIG, Fannie Mae and Freddie Mac were all nationalized.
Gary Edwards

AEI - The Error at the Heart of the Dodd-Frank Act - 0 views

  • The underlying assumption of the Dodd-Frank Act (DFA) is that the 2008 financial crisis was caused by the disorderly bankruptcy of Lehman Brothers.
  • This is evident in the statements of officials and the principal elements of the act, which would tighten the regulation of large financial institutions to prevent their failing, and establish an "orderly resolution" system outside of bankruptcy if they do.
  • The financial crisis, however, was caused by the mortgage meltdown, a sudden and sharp decline in housing and mortgage values as a massive housing bubble collapsed in 2007. This scenario is known to scholars as a "common shock"—a sudden decline in the
  • ...6 more annotations...
  • 27 million loans—were subprime or otherwise weak and risky loans.
  • The reason for this was the US government's housing policy, which—in the early 1990s—began to require that government agencies and others regulated or controlled by government reduce their mortgage underwriting standards so borrowers who had not previously had access to mortgage credit would be able to buy homes. The government-sponsored enterprises Fannie Mae and Freddie Mac, the Federal Housing Administration, and banks and savings and loan associations (S&Ls) subject to the Community Reinvestment Act were all required to increase their acquisition of loans to homebuyers at or below the median income in their communities. Often, government policies required Fannie, Freddie, and the others to acquire loans to borrowers at or below 80 percent, and in some cases 60 percent, of median income.
  • Sometimes it is argued that the Troubled Asset Relief Program (TARP) prevented more failures. That seems highly unlikely. The first funds were made available under TARP on October 28, 2008, about six weeks after the panic following Lehman's failure. By that time, any firm that had been mortally wounded by Lehman's collapse would have collapsed itself. Moreover, most of the TARP funds were quickly repaid by the largest institutions, and many of the smaller ones, only eight months later, in mid-June 2009. This is strong ¬evidence that the funds were not needed to cover losses coming from the Lehman bankruptcy. If there were such losses, they would still have been embedded in the balance sheets of those institutions. If the funds were needed at all—and many of the institutions took them reluctantly and under government pressure—it was to restore investor confidence that the recipients were not so badly affected by the common shock of the decline in housing and mortgage values that they could not fund orderly withdrawals, if necessary. However, even if we assume that TARP funds prevented the failure of some large financial institutions, it seems clear that the underlying cause of each firm's weakness was the decline in the value of its MBS holdings, and not any losses suffered as a result of Lehman's bankruptcy.
  • This analysis leads to the following conclusion. Without a common shock, the failure of a single Lehman-like firm is highly unlikely to cause a financial crisis. This conclusion is buttressed by the fact that in 1990 the securities firm Drexel Burnham Lambert—then, like Lehman, the fourth largest securities firm in the United States—was allowed to declare bankruptcy without any adverse consequences for the market in general. At the time, other financial institutions were generally healthy, and Drexel was not brought down by the failure of a widely held class of assets. On the other hand, in the presence of a common shock, the orderly resolution of one or a few Lehman-like financial institutions will not prevent a financial crisis precipitated by a severe common shock.
  • In effect, by giving the government the power to resolve any financial firm it believes to be failing, the act has added a whole new policy objective for the resolution of failing firms. Before Dodd-Frank, insolvency law embodied two basic policies—retain the going concern value of the firm and provide a mechanism by which creditors could realize on the assets of an insolvent firm that cannot be saved.
  • DFA will have important adverse effects on ¬insolvency law.
  •  
    The underlying assumption of the Dodd-Frank Act (DFA) is that the 2008 financial crisis was caused by the disorderly bankruptcy of Lehman Brothers. This is evident in the statements of officials and the principal elements of the act, which would tighten the regulation of large financial institutions to prevent their failing, and establish an "orderly resolution" system outside of bankruptcy if they do. The financial crisis, however, was caused by the mortgage meltdown, a sudden and sharp decline in housing and mortgage values as a massive housing bubble collapsed in 2007. This scenario is known to scholars as a "common shock"-a sudden decline in the value of a widely held asset-which causes instability or insolvency among many financial institutions. In this light, the principal elements of Dodd-Frank turn out to be useless as a defense against a future crisis. Lehman's bankruptcy shows that in the absence of a common shock that weakens all or most financial institutions, the bankruptcy of one or a few firms would not cause a crisis; on the other hand, given a similarly severe common shock in the future, subjecting a few financial institutions to the act's orderly resolution process will not prevent a crisis. Apart from its likely ineffectiveness, moreover, the orderly resolution process in the act impairs the current insolvency system and will raise the cost of credit for all financial institutions. 
Paul Merrell

Risky Business » CounterPunch: Tells the Facts, Names the Names - 0 views

  • Last week, the country’s biggest mortgage lenders scored a couple of key victories that will allow them to ease lending standards, crank out more toxic assets, and inflate another housing bubble.  Here’s what’s going on. On Monday,  the head of the Federal Housing Finance Agency (FHFA), Mel Watt, announced that Fannie and Freddie would slash the minimum down-payment requirement on mortgages from 5 percent to 3 percent while making loans more available to people with spotty credit. If this all sounds hauntingly familiar, it should. It was less than 7 years ago that shoddy lending practices blew up the financial system precipitating the deepest slump since the Great Depression. Now Watt wants to repeat that catastrophe by pumping up another credit bubble.
  • Here’s the story from the Washington Post: “When it comes to taking out a mortgage, two factors can stand in the way: the price of the mortgage,…and the borrower’s credit profile.” On Monday, the head of the agency that oversees the mortgage giants Fannie Mae and Freddie Mac outlined … how he plans to make it easier for borrowers on both fronts. Mel Watt, director of the Federal Housing Finance Agency, did not give exact timing on the initiatives. But most of them are designed to encourage the industry to extend mortgages to a broader swath of borrowers.
  • Here’s what Watt said about his plans in a speech at the Mortgage Bankers Association annual convention in Las Vegas: Saving enough money for a downpayment is often cited as the toughest hurdle for first-time buyers in particular. Watt said that Fannie and Freddie are working to develop “sensible and responsible” guidelines that will allow them to buy mortgages with down payments as low as 3 percent, instead of the 5 percent minimum that both institutions currently require.”
  • ...1 more annotation...
  • It might be worth noting at this point that Watt’s political history casts doubt on his real objectives.   According to Open Secrets, among the Top 20 contributors to Watt’s 2009-2010 campaign were Goldman Sachs, Bank of America, Citigroup Inc., Bank of New York Mellon, American bankers Association, US Bancorp, and The National Association of Realtors. (“Top 20 Contributors, 2009-2010“, Open Secrets)
Paul Merrell

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
Paul Merrell

India to buy Russian S-400 systems despite Washington's warnings - report - RT World News - 0 views

  • ndia decided to proceed with the long-anticipated $5.5 bln deal to purchase Russia’s S-400 surface-to-air missile units despite  the US saying the purchase may affect the relations between Washington and New Dehli. According to the Hindustan Times, India’s Defense Ministry is to ask the apex Cabinet Committee to approve the purchase of the five S-400 Triumf systems, thus  finalizing the agreement.The deal is set to go through despite the fact that the Trump administration warning New Delhi of the possible ramifications of India’s intention to cultivate military ties with Russia, that would imminently jeopardise its relations with the US.Chairman of the U.S. Arms Service Committee Mac Thornberry has said that “the acquisition of this technology will limit, the degree with which the United States will feel comfortable in bringing additional technology into whatever country we are talking about.”In case the purchase officially goes through, the Trump administration's reaction might go as far as punishing India for violating the sanctions imposed against Russia.
  • India’s decision to rely on the Russian-made S-400 systems that have drawn a lot of interest from international buyers, could jeopardize sales of US-built Predator drones and Patriot missile defense systems. Though the US has been talking up the effectiveness of Patriots, the missile has reportedly been less than effective when used recently by Saudi Arabia.According to NATO classification, S-400 Triumf is Russia's most advanced air defense hardware, boasting unique and unparalleled capabilities. Capable of firing three types of missiles create a layered defense, the S-400 integrates a multifunction radar, autonomous detection and targeting systems, missile launchers and command posts. It can bring down aircrafts as well as missiles at the range of up to 400km.
  • India is not the only country that has been experiencing tough pressuring from Washington. The US has been very explicit in its criticism of its "strategic partner", Turkey and its deal with Russia to purchase the S-400 systems.According to State Department spokesperson Heather Nauert, Washington is seriously concerned about the fact Turkey as a NATO member would choose to purchase weapons not made in the US. In a bid to pressure Ankara, Assistant US Secretary Wess Mitchell said that unless Turkey backed out, the purchase "could lead to sanctions.”Testifying before the House Foreign Relations committee last week, Secretary of State Mike Pompeo said the US was making efforts to “keep the Turks in a place where they will never acquire the S-400.”Moreover, US lawmakers introduced a bill which would virtually ban F-35 deliveries to Turkey to punish it for its increased "hostility.” The US has also criticized Ankara over the announcement it would look elsewhere in case Washington failed to deliver the F-35s.
‹ Previous 21 - 39 of 39
Showing 20 items per page