Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged mail

Rss Feed Group items tagged

6More

Judicial Watch: Benghazi Documents Point to White House on Misleading Talking Points - ... - 0 views

  • Judicial Watch announced today that on April 18, 2014, it obtained 41 new Benghazi-related State Department documents. They include a newly declassified email showing then-White House Deputy Strategic Communications Adviser Ben Rhodes and other Obama administration public relations officials attempting to orchestrate a campaign to “reinforce” President Obama and to portray the Benghazi consulate terrorist attack as being “rooted in an Internet video, and not a failure of policy.”  Other documents show that State Department officials initially described the incident as an “attack” and a possible kidnap attempt. The documents were released Friday as result of a June 21, 2013, Freedom of Information Act (FOIA) lawsuit filed against the Department of State (Judicial Watch v. U.S. Department of State (No. 1:13-cv-00951)) to gain access to documents about the controversial talking points used by then-UN Ambassador Susan Rice for a series of appearances on television Sunday news programs on September 16, 2012.  Judicial Watch had been seeking these documents since October 18, 2012. The Rhodes email was sent on sent on Friday, September 14, 2012, at 8:09 p.m. with the subject line:  “RE: PREP CALL with Susan, Saturday at 4:00 pm ET.”  The documents show that the “prep” was for Amb. Rice’s Sunday news show appearances to discuss the Benghazi attack.
  • The document lists as a “Goal”: “To underscore that these protests are rooted in and Internet video, and not a broader failure or policy.” Rhodes returns to the “Internet video” scenario later in the email, the first point in a section labeled “Top-lines”: [W]e’ve made our views on this video crystal clear. The United States government had nothing to do with it. We reject its message and its contents. We find it disgusting and reprehensible. But there is absolutely no justification at all for responding to this movie with violence. And we are working to make sure that people around the globe hear that message. Among the top administration PR personnel who received the Rhodes memo were White House Press Secretary Jay Carney, Deputy Press Secretary Joshua Earnest, then-White House Communications Director Dan Pfeiffer, then-White House Deputy Communications Director Jennifer Palmieri, then-National Security Council Director of Communications Erin Pelton, Special Assistant to the Press Secretary Howli Ledbetter, and then-White House Senior Advisor and political strategist David Plouffe. The Rhodes communications strategy email also instructs recipients to portray Obama as “steady and statesmanlike” throughout the crisis. Another of the “Goals” of the PR offensive, Rhodes says, is “[T]o reinforce the President and Administration’s strength and steadiness in dealing with difficult challenges.” He later includes as a PR “Top-line” talking point: I think that people have come to trust that President Obama provides leadership that is steady and statesmanlike. There are always going to be challenges that emerge around the world, and time and again, he has shown that we can meet them.
  • The documents Judicial Watch obtained also include a September 12, 2012, email from former Deputy Spokesman at U.S. Mission to the United Nations Payton Knopf to Susan Rice, noting that at a press briefing earlier that day, State Department spokesperson Victoria Nuland explicitly stated that the attack on the consulate had been well planned.  The email sent by Knopf to Rice at 5:42 pm said: Responding to a question about whether it was an organized terror attack, Toria said that she couldn’t speak to the identity of the perpetrators but that it was clearly a complex attack. In the days following the Knopf email, Rice appeared on ABC, CBS, NBC, Fox News and CNN still claiming the assaults occurred “spontaneously” in response to the “hateful video.” On Sunday, September 16 Rice told CBS’s “Face the Nation:” But based on the best information we have to date, what our assessment is as of the present is in fact what began spontaneously in Benghazi as a reaction to what had transpired some hours earlier in Cairo where, of course, as you know, there was a violent protest outside of our embassy–sparked by this hateful video. The Judicial Watch documents confirm that CIA talking points, that were prepared for Congress and may have been used by Rice on “Face the Nation” and four additional Sunday talk shows on September 16, had been heavily edited by then-CIA deputy director Mike Morell. According to one email: The first draft apparently seemed unsuitable….because they seemed to encourage the reader to infer incorrectly that the CIA had warned about a specific attack on our embassy.  On the SVTS, Morell noted that these points were not good and he had taken a heavy hand to editing them. He noted that he would be happy to work with [then deputy chief of staff to Hillary Clinton]] Jake Sullivan and Rhodes to develop appropriate talking points.
  • ...2 more annotations...
  • The documents obtained by Judicial Watch also contain numerous emails sent during the assault on the Benghazi diplomatic facility.  The contemporaneous and dramatic emails describe the assault as an “attack”:
  • “Now we know the Obama White House’s chief concern about the Benghazi attack was making sure that President Obama looked good,” said Judicial Watch President Tom Fitton. “And these documents undermine the Obama administration’s narrative that it thought the Benghazi attack had something to do with protests or an Internet video.  Given the explosive material in these documents, it is no surprise that we had to go to federal court to pry them loose from the Obama State Department.”
  •  
    Has there ever been a White House caught in so many lies as the Obama Administration? Maybe, in Nixon's Watergate years. But IMHO it would take a detailed study to determine the winner. It's close. 
3More

Edward Snowden doesn't deserve clemency: The NSA leaker hasn't proved he is a whistlebl... - 0 views

  • And yet I firmly disagree with the New York Times’ Jan. 1 editorial (“Edward Snowden, Whistle-Blower”), calling on President Obama to grant Snowden “some form of clemency” for the “great service” he has done for his country.
  • If that were all that Snowden had done, if his stolen trove of beyond-top-secret documents had dealt only with the NSA’s domestic surveillance, then some form of leniency might be worth discussing. But Snowden did much more than that. The documents that he gave the Washington Post’s Barton Gellman and the Guardian’s Glenn Greenwald have, so far, furnished stories about the NSA’s interception of email traffic, mobile phone calls, and radio transmissions of Taliban fighters in Pakistan’s northwest territories; about an operation to gauge the loyalties of CIA recruits in Pakistan; about NSA email intercepts to assist intelligence assessments of what’s going on inside Iran; about NSA surveillance of cellphone calls “worldwide,” an effort that (in the Post’s words) “allows it to look for unknown associates of known intelligence targets by tracking people whose movements intersect.” In his first interview with the South China Morning Post, Snowden revealed that the NSA routinely hacks into hundreds of computers in China and Hong Kong. These operations have nothing to do with domestic surveillance or even spying on allies. They are not illegal, improper, or (in the context of 21st-century international politics) immoral. Exposing such operations has nothing to do with “whistle-blowing.”
  •  
    Another "kill the messenger" piece on Edward Snowden, this one by a Council on Foreign Relations analyst. 
2More

MULLEN: Obama says Snowden no patriot. How would Ben Franklin's leak be treated today? ... - 1 views

  • President Obama declared Friday that NSA whistleblower Edward Snowden is not a patriot. Snowden has secured asylum in Russia after leaking widespread collection of phone, e-mail and web browsing data of millions of Americans by the NSA.Obama now claims that he had already instructed the intelligence community to “make public as much information about these programs as possible.” He says that those who do the spying to protect America and its allies are the patriots.
  • “They’re patriots. And I believe that those who have lawfully raised their voices on behalf of civil liberties are also patriots who love our country,” the president said.But not Edward Snowden.It is true that Edward Snowden likely broke the law in revealing “classified” information. But how would the Founding Father’s view it?
4More

Alt Thai News Network ATNN : Thailand: Next Anti-Regime Rally - January 13, 2014 - 0 views

  • In protest of unelected dictator Thaksin Shinawatra and his proxy regime led by his own nepotist-appointed sister Yingluck Shinawatra, anti-regime protesters plan to shut down Thailand's capital of Bangkok starting on Monday, January 13, 2014.  The necessity of continued mass mobilizations is due in part to the current regime's immense foreign backing - including across the West's mass media who continue to claim Thaksin Shinawatra's rule is legitimate despite him being a convicted criminal hiding abroad and openly running the country through a series of nepotist proxies which have included both his brother-in-law and now sister. While unthinkable and unacceptable in any other country, news fronts such as the BBC, New York Times, CNN, Reuters, AP, AFP and others insist that this cartoonish, criminal arrangement is somehow representative of "democracy" in Thailand.  The New York Times, despite defending what is by all measures an absurd abuse of the principles of representative governance, would even report in its article titled, "In Thailand, Power Comes With Help From Skype," that:  For the past year and a half, by the party’s own admission, the most important political decisions in this country of 65 million people have been made from abroad, by a former prime minister who has been in self-imposed exile since 2008 to escape corruption charges. 
  • The country’s most famous fugitive,Thaksin Shinawatra, circles the globe in his private jet, chatting with ministers over his dozen cellphones, texting over various social media platforms and reading government documents e-mailed to him from civil servants, party officials say.  It might be described as rule by Skype. Or governance by instant messenger, a way for Mr. Thaksin to help run the country without having to face the warrant for his arrest in a case that many believe is politically motivated. There is no question that an accused mass murderer and convicted criminal hiding abroad from a 2 year jail sentence, multiple arrest warrants, and a long list of pending court cases, is illegally running Thailand by proxy.  Of course, just as a convicted criminal running America or England via Skype would be a laughable prospect entirely unacceptable by Americans or English, likewise, it is unacceptable in Thailand. The sham elections the regime is planning for February 2, 2014 which have Thaksin Shinawatra's sister and brother-in-law once again at the top of the candidate list, have already been boycotted by all opposition parties, leaving the regime alone posting campaign posters along Thailand's roads, reminiscent of scenes of sham elections carried out in North Korea. 
  • Who is Thaksin Shinawatra and Why do People Detest Him?
  •  
    Long list of crimes and sins committed further down in the article. The Thai protest demonstrations have been massive of late. A group of U.S.-based banksters and other corporate interests have been plucking the Thai economy down to bare skin. 
3More

Venice votes to split from Italy as 89% of the city's residents opt to form a new indep... - 0 views

  • Venetians have voted overwhelmingly for their own sovereign state in a ‘referendum’ on independence from Italy. Inspired by Scotland’s separatist ambitions, 89 per cent of the residents of the lagoon city and its surrounding area, opted to break away from Italy in an unofficial ballot.The proposed ‘Repubblica Veneta’ would include the five million inhabitants of the Veneto region and could later expand to include parts of Lombardy, Trentino and Friuli-Venezia Giulia.
  • The floating city has only been part of Italy for 150 years. The 1000 year–old democratic Serenissima Repubblica di Venezia, was quashed by Napoleon and was subsumed into Italy in 1866. Wealthy Venetians, under mounting financial pressure in the economic crisis, have rallied in their thousands, after growing tired of supporting Italy’s poor and crime ridden Mezzogiorno south, through high taxation.
  • Campaigners say that the Rome government receives around 71 billion euros  each year in tax from Venice - some 21 billion euros less than it gets back in investment and services.Organisers said that 2.36million, 73 per cent, of those eligible to take part voted in the poll, which is not recognised by the Rome government. The ballot also appointed a committee of ten who immediately declared independence from Italy. Venice may now start withholding taxes from Rome. 
8More

Judge Rules: Obama Social Security Card Fraud May Finally Get Answers | - 1 views

  • The reason for the judge’s amendment seems to be a procedural one. Taitz filed suit with the court prior to receiving word back from her Freedom of Information Act request, which she did receive on July 29, 2013 from Dawn S. Wiggins, a Fredom of Information Officer. Wiggins replied to Taitz: I have enclosed a copy of the SS-5s for Mr. Tsarnaev and Ms. Dunham. . . . We were unable to find any information for Mr. Bounel based on the information you provided to us. Mr. Bounel may not have applied for a Social Security number (SSN) or may have given different information on the application for a number.
  • The controversy over Barack Hussein Obama and his past, along with fraudulent documents continues to make headlines. Yet, the items needed to actually verify who Obama is continue to be kept from the public eye. Well, that all may be about to change. Attorney Orly Taitz may have just found a chink in the federal government’s armor in protecting Barack Obama from scrutiny, following a judge’s ruling over her Freedom of Information Act request from the Social Security Administration. Taitz has claimed that Obama uses the Social Security number of Harry Bounel and has submitted several Freedom of Information Act requests for the information from the Social Security Administration. Each time, she has been met with stonewalling by the Social Security Administration. However, Judge Ellen Lipton Hollander has ruled to give Taitz “an opportunity to file a second amended complaint and add allegations of SSA not doing a proper search and withholding records.”
  • Additionally, there is an increased tampering with the web site of Orly Taitz and with her ability to send mass -emails. It seems her private server is somehow affected and Taitz is unable to send mass e-mails on two different programs.
  • ...4 more annotations...
  • From Taitz’s Press Release: Judge Hollander in Maryland gives Attorney Orly Taitz 21 days to file a second amended complaint and add allegations in regards to an improper withholding by the Social Security Administration of records of Harry Bounel, whose Social security number is being illegally used by Barack Obama. When Taitz filed the complaint, SSA did not respond at all. After the law suit was filed, SSA responded by fraudulently claiming that the records were not found. Taitz responded that this is a fraudulent assertion, since the records were found before and denied to another petitioner due to privacy concerns, however Social Security has no right to claim privacy as according to their own 120 year rule they have a duty to release the records. The judge stated that the plaintiff Taitz might be correct, however at this time she cannot rule in her favor as her original complaint was filed before SSA responded, so the judge gave Taitz an opportunity to refile a second amended complaint and add new allegations, stating the SSA responded but improperly hidden the records . This is a great development. This all but assures that the judge will order the SSA to release the SS-5, Social Security application of resident of CT, Harrison (Harry) Bounel, whose CT SSN 042-68-4425 was stolen by Obama and used in Obama’s 2009 tax returns, which initially were posted on WhiteHouse.gov without proper redaction, without flattening of the file. Taitz will be very careful not to be Breitbarted or Fuddied in the next 21 days.
  • It’s interesting that Taitz points out that she will be “careful not to be Breitbarted or Fuddied,” indicating that she believes that both Andrew Breitbart and Andrew Breitbart and Loretta Fuddy were targeted by Obama for assassination.” Breitbart died on the very day that he said he would begin vetting Obama for the 2012 elections, which raised suspicions. Fuddy, best remembered as being instrumental in issuing the Hawaii long-form birth certificate, was the only person to die aboard a small plane that crashed off the coast of Hawaii last week. Already, there are questions surrounding the narrative of her death.
  • Taitz alleged that Mr. Bounel was born in 1890, and therefore, under the “’120 Year Rule’ implemented by the SSA in 2010,” pertaining to “‘extremely aged individuals,’” Bounel’s “Social Security applications have to be released under FOIA without proof of [his] death . . . .”
  • It appears that once the amendment is submitted, this may force the Social Security Administration to explain exactly what is going on with Barack Obama’s Social Security number. We should know something about the case by the second week in January 2014.
  •  
    @ One passage in the article: "It appears that once the amendment is submitted, this may force the Social Security Administration to explain exactly what is going on with Barack Obama's Social Security number." That's far too optimistic, probably reflecting a lack of understanding of Freedom of Information Act and the processing of a FOIA complaint in federal court. I read the judge's opinion. After the amended complaint is filed, the government gets another shot at summary judgment, submitting a new affidavit about the scope of the search that meets the judge's criticism. (The judge did not rule that the search was inadequate, merely that it was inadequately described and might have been inadequate.) That shifts the burden to the plaintiff to prove that the search was inadequate. If she meets that burden, which isn't easy, the government has to do a new search, file a new motion for summary judgment with a new affidavit, rinse, lather, and repeat. So long as someone is willing to sign an affidavit describing the search and stating that nothing was found, the plaintiff will eventually be unable to prove that the search was inadequate and will lose the case. On the other hand, a new search may find the requested record and result in disclosure. But I'm not confident that this case will go very far. From the description of the complaint that the judge ruled on, it was fatally defective anyway, suggesting that the plaintiff doesn't know much about FOIA litigation. The complaint sought an order that the government be required to respond to her FOIA request letter. But once a FOIA request goes unanswered for 20 business days, the request is deemed denied and the plaintiff can file suit to compel disclosure of the records. The FOIA does not provide for lawsuits to compel the agency to answer a FOIA request. So the plaintiff apparenttly obviously does not understand the FOIA, probably making her easy pickings for an Assistant U.S. District Attorney whose specialty
1More

Venezuela: Government Reveals Assassination Plot - The Argentina Independent ... - 0 views

  • Yesterday the Venezuelan government unveiled a series of emails which appear to show opposition figures plotting an assassination attempt against President Nicolás Maduro, seemingly with financial backing from the US. At the press conference, mayor of Caracas, Jorge Rodríguez, showed an email written on 23rd March by right-wing former deputy María Corina Machado and sent to Gustavo Tarre, a lawyer who is under investigation by the Public Ministry, orchestrating “violent actions” and the assassination plot. Other mails showed communication between Machado, former governor Henrique Salas Römer, Diego Arria, and US officials talking of financial backing for the opposition from the US, as well as economic support by the fugitive Venezuelan banker Eligio Cedeño, currently residing in the US. Rodríguez said that at least one US State Department official was involved in the plot.
1More

Bundesbank, PBOC Sign Accord to Make Frankfurt Yuan Hub - Bloomberg - 0 views

  • Germany’s Bundesbank and the People’s Bank of China agreed to cooperate in the clearing and settling of payments in renminbi, paving the way for Frankfurt to corner a share of the offshore market. The central banks signed a memorandum of understanding in Berlin today, when Chinese President Xi Jinping met German Chancellor Angela Merkel, the Frankfurt-based Bundesbank said in an e-mailed statement. Germany’s financial capital prevailed over Paris and Luxembourg in a euro-area race to win trade in renminbi, which overtook the euro to become the second-most used currency in global trade finance in October, according to the Society for Worldwide Interbank Financial Telecommunication. The U.K. Treasury said on March 26 that the Bank of England would sign an initial agreement with the PBOC on March 31 to clear and settle yuan transactions in London.
8More

UN Report Finds Mass Surveillance Violates International Treaties and Privacy Rights - ... - 0 views

  • The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded. Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”
  • Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.” In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty. Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
  • The report’s key conclusion is that this core right is impinged by mass surveillance programs: “Bulk access technology is indiscriminately corrosive of online privacy and impinges on the very essence of the right guaranteed by article 17. In the absence of a formal derogation from States’ obligations under the Covenant, these programs pose a direct and ongoing challenge to an established norm of international law.” The report recognized that protecting citizens from terrorism attacks is a vital duty of every state, and that the right of privacy is not absolute, as it can be compromised when doing so is “necessary” to serve “compelling” purposes. It noted: “There may be a compelling counter-terrorism justification for the radical re-evaluation of Internet privacy rights that these practices necessitate. ” But the report was adamant that no such justifications have ever been demonstrated by any member state using mass surveillance: “The States engaging in mass surveillance have so far failed to provide a detailed and evidence-based public justification for its necessity, and almost no States have enacted explicit domestic legislation to authorize its use.”
  • ...5 more annotations...
  • Instead, explained the Rapporteur, states have relied on vague claims whose validity cannot be assessed because of the secrecy behind which these programs are hidden: “The arguments in favor of a complete abrogation of the right to privacy on the Internet have not been made publicly by the States concerned or subjected to informed scrutiny and debate.” About the ongoing secrecy surrounding the programs, the report explained that “states deploying this technology retain a monopoly of information about its impact,” which is “a form of conceptual censorship … that precludes informed debate.” A June report from the High Commissioner for Human Rights similarly noted “the disturbing lack of governmental transparency associated with surveillance policies, laws and practices, which hinders any effort to assess their coherence with international human rights law and to ensure accountability.” The rejection of the “terrorism” justification for mass surveillance as devoid of evidence echoes virtually every other formal investigation into these programs. A federal judge last December found that the U.S. Government was unable to “cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack.” Later that month, President Obama’s own Review Group on Intelligence and Communications Technologies concluded that mass surveillance “was not essential to preventing attacks” and information used to detect plots “could readily have been obtained in a timely manner using conventional [court] orders.”
  • Three Democratic Senators on the Senate Intelligence Committee wrote in The New York Times that “the usefulness of the bulk collection program has been greatly exaggerated” and “we have yet to see any proof that it provides real, unique value in protecting national security.” A study by the centrist New America Foundation found that mass metadata collection “has had no discernible impact on preventing acts of terrorism” and, where plots were disrupted, “traditional law enforcement and investigative methods provided the tip or evidence to initiate the case.” It labeled the NSA’s claims to the contrary as “overblown and even misleading.” While worthless in counter-terrorism policies, the UN report warned that allowing mass surveillance to persist with no transparency creates “an ever present danger of ‘purpose creep,’ by which measures justified on counter-terrorism grounds are made available for use by public authorities for much less weighty public interest purposes.” Citing the UK as one example, the report warned that, already, “a wide range of public bodies have access to communications data, for a wide variety of purposes, often without judicial authorization or meaningful independent oversight.”
  • The report was most scathing in its rejection of a key argument often made by American defenders of the NSA: that mass surveillance is justified because Americans are given special protections (the requirement of a FISA court order for targeted surveillance) which non-Americans (95% of the world) do not enjoy. Not only does this scheme fail to render mass surveillance legal, but it itself constitutes a separate violation of international treaties (emphasis added): The Special Rapporteur concurs with the High Commissioner for Human Rights that where States penetrate infrastructure located outside their territorial jurisdiction, they remain bound by their obligations under the Covenant. Moreover, article 26 of the Covenant prohibits discrimination on grounds of, inter alia, nationality and citizenship. The Special Rapporteur thus considers that States are legally obliged to afford the same privacy protection for nationals and non-nationals and for those within and outside their jurisdiction. Asymmetrical privacy protection regimes are a clear violation of the requirements of the Covenant.
  • That principle — that the right of internet privacy belongs to all individuals, not just Americans — was invoked by NSA whistleblower Edward Snowden when he explained in a June, 2013 interview at The Guardian why he disclosed documents showing global surveillance rather than just the surveillance of Americans: “More fundamentally, the ‘US Persons’ protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it’s only victimizing 95% of the world instead of 100%.” The U.N. Rapporteur was clear that these systematic privacy violations are the result of a union between governments and tech corporations: “States increasingly rely on the private sector to facilitate digital surveillance. This is not confined to the enactment of mandatory data retention legislation. Corporates [sic] have also been directly complicit in operationalizing bulk access technology through the design of communications infrastructure that facilitates mass surveillance. ”
  • The latest finding adds to the growing number of international formal rulings that the mass surveillance programs of the U.S. and its partners are illegal. In January, the European parliament’s civil liberties committee condemned such programs in “the strongest possible terms.” In April, the European Court of Justice ruled that European legislation on data retention contravened EU privacy rights. A top secret memo from the GCHQ, published last year by The Guardian, explicitly stated that one key reason for concealing these programs was fear of a “damaging public debate” and specifically “legal challenges against the current regime.” The report ended with a call for far greater transparency along with new protections for privacy in the digital age. Continuation of the status quo, it warned, imposes “a risk that systematic interference with the security of digital communications will continue to proliferate without any serious consideration being given to the implications of the wholesale abandonment of the right to online privacy.” The urgency of these reforms is underscored, explained the Rapporteur, by a conclusion of the United States Privacy and Civil Liberties Oversight Board that “permitting the government to routinely collect the calling records of the entire nation fundamentally shifts the balance of power between the state and its citizens.”
6More

Exclusive: Cornered but unbound by nuclear pact, Israel reconsiders military action aga... - 0 views

  • Historic negotiations with Iran will reach an inflection point on Monday, as world powers seek to clinch a comprehensive deal that will, to their satisfaction, end concerns over the nature of its vast, decade-old nuclear program.But reflecting on the deal under discussion with The Jerusalem Post on the eve of the deadline, Israel has issued a stark, public warning to its allies with a clear argument: Current proposals guarantee the perpetuation of a crisis, backing Israel into a corner from which military force against Iran provides the only logical exit.
  • Historic negotiations with Iran will reach an inflection point on Monday, as world powers seek to clinch a comprehensive deal that will, to their satisfaction, end concerns over the nature of its vast, decade-old nuclear program.But reflecting on the deal under discussion with The Jerusalem Post on the eve of the deadline, Israel has issued a stark, public warning to its allies with a clear argument: Current proposals guarantee the perpetuation of a crisis, backing Israel into a corner from which military force against Iran provides the only logical exit.
  • World powers have presented Iran with an accord that would restrict its nuclear program for roughly ten years and cap its ability to produce fissile material for a weapon during that time to a minimum nine-month additional period, from the current three months.Should Tehran agree, the deal may rely on Russia to convert Iran's current uranium stockpile into fuel rods for peaceful use. The proposal would also include an inspection regime that would attempt to follow the program's entire supply chain, from the mining of raw material to the syphoning of that material to various nuclear facilities across Iran.Israel's leaders believe the best of a worst-case scenario, should that deal be reached, is for inspections to go perfectly and for Iran to choose to abide by the deal for the entire decade-long period.
  • ...3 more annotations...
  • On Saturday afternoon, reports from Vienna suggested the P5+1 – the US, United Kingdom, France, Russia, China and Germany – are willing to stop short of demanding full disclosure of any secret weapon work by Tehran.Speaking to the Post, a senior US official rejected concern over limited surveillance capabilities, during or after a deal."If we can conclude a comprehensive agreement, we will have significantly more ability to detect covert facilities – even after its duration is over – than we do today," the senior US official said. "After the duration of the agreement, the most intrusive inspections will continue: the Additional Protocol – which encompasses very intrusive transparency, and which Iran has already said it will implement – will continue."
  • Officials in the Netanyahu government are satisfied that their ideas and concerns have been given a fair hearing by their American counterparts. They praise the US for granting Israel unprecedented visibility into the process. But while those discussions may have affected the talks at the margins, large gaps – on whether to grant Iran the right to enrich uranium, or allow it to keep much of its infrastructure – have remained largely unaddressed.
  • Yet, more than any single enforcement standard or cap included in the deal, Israel believes the Achilles' heel of the proposed agreement is its definitive end date – the sunset clause."You've not dismantled the infrastructure, you've basically tried to put limits that you think are going to be monitored by inspectors and intelligence," said the official, "and then after this period of time, Iran is basically free to do whatever it wants."The Obama administration also rejects this claim. By e-mail, the senior US administration official said that, "'following successful implementation of the final step of the comprehensive solution for its duration, the Iranian nuclear program will be treated in the same manner as that of any non-nuclear weapon state party to the NPT – with an emphasis on non-nuclear weapon."
6More

American Surveillance Now Threatens American Business - The Atlantic - 0 views

  • What does it look like when a society loses its sense of privacy? <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" title=""><img style="border:none;" src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" alt="" /></a></div>In the almost 18 months since the Snowden files first received coverage, writers and critics have had to guess at the answer. Does a certain trend, consumer complaint, or popular product epitomize some larger shift? Is trust in tech companies eroding—or is a subset just especially vocal about it? Polling would make those answers clear, but polling so far has been… confused. A new study, conducted by the Pew Internet Project last January and released last week, helps make the average American’s view of his or her privacy a little clearer. And their confidence in their own privacy is ... low. The study's findings—and the statistics it reports—stagger. Vast majorities of Americans are uncomfortable with how the government uses their data, how private companies use and distribute their data, and what the government does to regulate those companies. No summary can equal a recounting of the findings. Americans are displeased with government surveillance en masse:   
  • A new study finds that a vast majority of Americans trust neither the government nor tech companies with their personal data.
  • What does it look like when a society loses its sense of privacy? <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" title=""><img style="border:none;" src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" alt="" /></a></div>In the almost 18 months since the Snowden files first received coverage, writers and critics have had to guess at the answer. Does a certain trend, consumer complaint, or popular product epitomize some larger shift? Is trust in tech companies eroding—or is a subset just especially vocal about it? Polling would make those answers clear, but polling so far has been… confused. A new study, conducted by the Pew Internet Project last January and released last week, helps make the average American’s view of his or her privacy a little clearer. And their confidence in their own privacy is ... low. The study's findings—and the statistics it reports—stagger. Vast majorities of Americans are uncomfortable with how the government uses their data, how private companies use and distribute their data, and what the government does to regulate those companies. No summary can equal a recounting of the findings. Americans are displeased with government surveillance en masse:   
  • ...3 more annotations...
  • “It’s clear the global community of Internet users doesn’t like to be caught up in the American surveillance dragnet,” Senator Ron Wyden said last month. At the same event, Google chairman Eric Schmidt agreed with him. “What occurred was a loss of trust between America and other countries,” he said, according to the Los Angeles Times. “It's making it very difficult for American firms to do business.” But never mind the world. Americans don’t trust American social networks. More than half of the poll’s respondents said that social networks were “not at all secure. Only 40 percent of Americans believe email or texting is at least “somewhat” secure. Indeed, Americans trusted most of all communication technologies where some protections has been enshrined into the law (though the report didn’t ask about snail mail). That is: Talking on the telephone, whether on a landline or cell phone, is the only kind of communication that a majority of adults believe to be “very secure” or “somewhat secure.”
  • According to the study, 70 percent of Americans are “at least somewhat concerned” with the government secretly obtaining information they post to social networking sites. Eighty percent of respondents agreed that “Americans should be concerned” with government surveillance of telephones and the web. They are also uncomfortable with how private corporations use their data: Ninety-one percent of Americans believe that “consumers have lost control over how personal information is collected and used by companies,” according to the study. Eighty percent of Americans who use social networks “say they are concerned about third parties like advertisers or businesses accessing the data they share on these sites.” And even though they’re squeamish about the government’s use of data, they want it to regulate tech companies and data brokers more strictly: 64 percent wanted the government to do more to regulate private data collection. Since June 2013, American politicians and corporate leaders have fretted over how much the leaks would cost U.S. businesses abroad.
  • (That may seem a bit incongruous, because making a telephone call is one area where you can be almost sure you are being surveilled: The government has requisitioned mass call records from phone companies since 2001. But Americans appear, when discussing security, to differentiate between the contents of the call and data about it.) Last month, Ramsey Homsany, the general counsel of Dropbox, said that one big thing could take down the California tech scene. “We have built this incredible economic engine in this region of the country,” said Homsany in the Los Angeles Times, “and [mistrust] is the one thing that starts to rot it from the inside out.” According to this poll, the mistrust has already begun corroding—and is already, in fact, well advanced. We’ve always assumed that the great hurt to American business will come globally—that citizens of other nations will stop using tech companies’s services. But the new Pew data shows that Americans suspect American businesses just as much. And while, unlike citizens of other nations, they may not have other places to turn, they may stop putting sensitive or delicate information online.
12More

Tony Blair, "Infanticide Endorser" is Rewarded by "Save The Children" | Global Research - 0 views

  • When the Orwellian “Middle East Peace Envoy” Tony Blair was named “Philanthropist of the Year” by GQ Magazine in September for “his tireless charitable work” (tell that to the dismembered, dispossessed, traumatized of Iraq, Afghanistan) there was widespread disbelief.
  • When the Orwellian “Middle East Peace Envoy” Tony Blair was named “Philanthropist of the Year” by GQ Magazine in September for “his tireless charitable work” (tell that to the dismembered, dispossessed, traumatized of Iraq, Afghanistan) there was widespread disbelief.
  • On 19th November, though, the Butcher of Baghdad, Dodgy Dossier Master, Sanctions Endorser of an embargo which condemned to death an average of 6,000 children a month according to the UN, was awarded Save The Children’s Global Legacy Award at a Gala Charity at The Plaza in New York.
  • ...8 more annotations...
  • In both roles he emphatically endorsed the Iraq embargo, thus the silent monthly infanticide. Madeleine Albright in trousers. Iraq’s new born and under fives for her were: “ … a price worth it.” Then came the 2003 dodgy Downing Street dossier used by Colin Powell at the UN for the invasion’s justification, the subsequent perhaps one and a half million deaths in a country where near half the population were children – the rest is holocaustal history. Between Madeleine Albright’s admission (12th May 1996) that “over half a million children had died” and Blair’s tenure between 1997 to the invasion, six years later, a further near half a million children died (do the maths.) Yet Save The Children – whose commitment “No Child Born to Die” is at the top of each page of the charity’s website – honour this tyrant.
  • It has to be hoped that this shameful lauding of a man who should be answering to a Nuremberg model Tribunal and on whom the Chilcot Inquiry is still to release it’s findings, has nothing to do with the fact that the Chief Executive of Save the Children, Justin Forsyth was in 2004: “ … recruited to No 10 (Downing Street) by Tony Blair …” and later became Blair’s successor: “ Gordon Brown’s Strategic Communications and Campaigns Director …” (6)
  • Another Save The Children executive, Chief Financial Officer Sam Aharpe: “worked for nearly 30 years with the UK Government development programme” including under Tony Blair, according to their website – whilst Fergus Drake, Director of Global Programmes since 2009: “Prior to this … worked for the Office of Tony Blair in Rwanda advising President Kagame …” The day after Blair’s Gala Award, Save The Children, with UNICEF and other aid agencies released a statement: “On the 25th anniversary of the Convention on The Rights of the Child – Stepping up the global effort to advance the rights of every child.” The enshrined commitments were: “ … not only to some children, but to all children … not only to advance some of their rights, but all their rights – including their right to survive and to thrive, to grow and to learn, to have their voices heard and heeded, and to be protected from discrimination and violence in all its manifestations.” (7) Irony, chutzpah, hypocrisy eat your hearts out.
  • Of course, as Gaza was decimated again in July and August, defenceless, with no army, navy or air force, resulting in over 2,000 deaths, including nearly 500 children, the Middle East “Peace Envoy” fled his posh pad in Jerusalem and gave a two month early “surprise birthday party” for his wife in one of his seven UK mansions, safely out of the firing line – and said nothing about saving the children, or indeed anyone else. He has subsequently been silent about Gaza’s 475,000 souls living in emergency conditions, 17,200 destroyed homes and 244 damaged schools (8.) Incidentally, if you are considering donating to Save the Children or buying their Christmas cards, give generously. Mr Forsyth and his colleagues struggle along on about 160 thousand pounds a year and the Chief Executive makes do on 234 pounds annually (9.)
  • Children saving seems to be somewhat selective at this agency which operates in “more than 120 countries.” For example, in November 2003, the Guardian reported that: “Senior figures at Save the Children US . . . demanded the withdrawal of the criticism and an effective veto on any future statements blaming the invasion for the plight of Iraqi civilians’ suffering malnourishment and shortages of medical supplies.” Fast forward to the run up to another US extrajudicial assassination of the man purported to be Osama bin Laden in May 2011 in Abbottabad, Pakistan. Save The Children: “had been under suspicion from authorities ever since a doctor accused of assisting the CIA in its search for the al-Qaida leader claimed that Save the Children had introduced him to US intelligence officers.” (11.) Dr Shakil Afridi, currently serving 33 years in jail was: “accused of setting up a bogus hepatitis B vaccination campaign in the Abbottabad area to try to pinpoint Bin Laden’s exact location”, via DNA samples which: “were to be tested by the CIA for genetic matches to Bin Laden.”
  • Whilst: “Afridi never succeeded in persuading (people) to give blood, his collaboration with a foreign intelligence service is regarded as an act of treason by Pakistan’s security establishment.” Save The Children which emphatically denied employing or paying Dr Afridi or indeed having a vaccination programme in Abbottabad were nevertheless expelled from Pakistan in September 2012. In spite of denials, internal mails on the dispute obtained by the Center for Investigative Reporting in Pakistan (12) which can be read in full (13) make interesting reading.
  • A relatively recent Save The Children initiative has been to appoint Samantha Cameron, wife of current UK Prime Minister David Cameron as their “Ambassador” for Syria. Since the organization cannot work in Syria, she has brought stories of “innocent childhoods being smashed to pieces” from neighbouring countries. Of course Britain under Cameron is arming and training the Syrian insurgents. (14.) Cameron is a Blair admirer, on record as taking his advice. “Peace Envoy” Blair is on record as enthusiast for another illegal overthrow in Syria with “no regrets” over Iraq.
  • As the fury mounts over Blair’s Award and Christmas approaches, Denis Halliday, former UN Coordinator in Iraq who resigned over the embargo during Blair’s premiership stating that it was “genocide”, reminded me of Christmas 1998 when Blair stood in front of his Christmas tree outside 10 Downing Street and declared that the UK and US were again (illegally of course) bombing Iraq. During this further blitz, Halliday’s successor, Hans von Sponeck, who was also to resign in disgust, was sleeping on the floor in the UN building in Baghdad, with his staff and families, the building was further out of town and seemed safer for those who took rescue. So as Save The Children lauds Blair and trumpets the Rights of the Child, perhaps they should reflect the horror he has wrought. In Iraq one in four surviving children now has stunted physical or intellectual development due to malnutrition. There are an estimated 35,000 infant deaths annually, over a quarter of Iraqi children, three million, suffer post traumatic stress disorder. (War Child: “Mission Unaccomplished”, 2013.)
  •  
    Another "charity" to cross-out from your charitable contributions list of candidates.
5More

Breaking Up is Hard to Do: Goldman Sachs Wants JPMorgan in 4 Pieces | nsnbc international - 0 views

  • JPMorgan Chase & Co (JPM) is paying out a $100 million settlement to keep details about an antitrust lawsuit filed 2 years ago out of the court system and public record.
  • JPM is one of 12 mega-banks named in the suit while they were particularly named for the price manipulation on foreign exchanges markets using digital communications and social media. Several investors including hedge funds, public pension funds, the Philadelphia city and other market investors filed a complaint accusing 12 banks of manipulating WM/Reuters rates through chat rooms, e-mail and instant messaging since Jan 2003. • JPMorgan  • Bank of America  • Goldman Sachs  • Morgan Stanley  • Citigroup  • UBS  • Credit Suisse  • HSBC • Barclays  • The Royal Bank of Scotland  • BNP  • Deutsche Bank.
  • According to court documents, “the banks’ manipulation of WM/Reuters rates impacted the value of financial transactions in the U.S., including foreign exchange trade. Further, the plaintiffs claimed that these also negatively affected the pension and savings accounts that are dependent on global foreign exchange rates.”
  • ...2 more annotations...
  • Goldman Sachs released a report citing that JPM should be broken up into 4 parts, each culminating in an increase of 25% worth over the total corporate assets. The report stated: “The biggest of the pieces would include the bank’s branch network, which could be worth over $100 billion on its own. JPMorgan’s investment bank would be nearly as large, followed by its commercial bank and an asset management company.” Richard Ramsden, analyst for Goldman Sachs and author of the report explained: “even splitting JPMorgan in two—dividing the investment bank from the traditional bank, returning the company roughly to what was allowed before the Glass Steagall Act was repealed in the early 2000s—would boost the overall value of the current bank by 16%. Our analysis indicates that even accounting for lost synergies, a JPM breakup would be accretive to shareholders in most scenarios.” Sandy Weill, former CEO of Citigroup commented: “[JPM] became the first of the nation’s modern mega-banks. Breaking up the large banks makes sense.” Ramsden asserts “the new capital requirements for big banks proposed by the Federal Reserve in early December make now a good time to consider such a split.”
  • The Federal Reserve Bank (FRB) opened the door for banks to securitize risky derivatives with the announcement to “extend the deadline for banks to sell off stakes in hedge funds and private- equity funds” until 2017. Journalist David Weidner explained: “Now, the ‘push-out’ rule is gone, so we’re in the same position again. And the Fed has delayed a potential roadblock to a taxpayer bailout. In essence, the Federal Deposit Insurance Corp. and the Fed are implicitly suggesting that losses from hedge funds and private equity won’t hold up government support.” Weidner continued: “Ultimately, let’s be honest, the delay isn’t just a delay, it’s to buy time so the bank lobby can eliminate the Volcker Rule altogether. These investments produced risky, but potentially big, returns. Why is it that the bankers are the only ones with good memories?” This was part of the official delay of the Volker Rule, which would ban risky betting with derivatives by banks, approved in 2010. Because of this announcement, Ramsden said: “A break up makes more sense for JPMorgan because, unlike some of its rivals, its individual businesses are strong enough to stand on their own. The bank is partly a victim of its own success.”
8More

Torture Report Revives Rogue Image the CIA Has Sought to Erase - Bloomberg - 0 views

  • This week’s Senate report on the CIA’s use of harsh interrogation methods is neither the first nor the worst time the agency has run afoul of its congressional overseers. Four decades ago, a series of hearings on Capitol Hill helped reveal that the CIA-run Phoenix Program in South Vietnam, working in concert with the U.S. and South Vietnamese militaries, had “neutralized” -- killed, detained or recruited -- as many as 80,000 people suspected of being members of the Communist Vietcong and used gang rape, beatings and electric shock as well as waterboarding to interrogate prisoners. Then in 1975 and 1976, a Senate panel took a broader look into the dark side of the Central Intelligence Agency and found that the nation’s spies seemed to have few limits, with covert activities that included plotting to assassinate foreign leaders, domestic spying and LSD experiments on unwitting subjects.
  • The Church committee, the investigative panel named for Democratic chairman Frank Church of Idaho, published 14 reports on CIA activities, including efforts to kill leaders in Cuba, Chile, the Democratic Republic of the Congo, the Dominican Republic and Vietnam; a secret program to open Americans’ mail; and a mind-control program called MKULTRA
  • It led to creation of the current congressional intelligence committees to guard against CIA abuses and resulted in an executive order by Republican President Gerald Ford banning assassinations of foreign leaders.
  • ...5 more annotations...
  • Nevertheless, the new findings are a blow to the agency Brennan leads. “The Senate intel report is right up there with the Church committee in the scathing criticism of the agency,” said Thomas Blanton, director of the National Security Archive at George Washington University in Washington.
  • Obama has defended CIA Director John Brennan, who this week said that the agency’s methods produced “intelligence that helped thwart attack plans, capture terrorists and save lives.” Brennan said the report was wrong to suggest the CIA “systematically and intentionally misled” Congress and the White House.
  • This image of the CIA supposedly having run amok and having done all this torture stuff on its own will stick with a large part of the American public,” said Paul Pillar, a former senior CIA analyst who had a 28-year career in the intelligence community. “The idea that the CIA has been lying to the president, lying to the Justice Department, lying to the Congress, and even lying to itself about how effective these programs were -- that’s the real show-stopper in the Senate intel report,” Blanton said. “That’s really the most remarkable piece of it.” The Church committee, despite the breadth of its review, “did not produce this kind of damning indictment using the CIA’s own words and own evidence,” Blanton said.
  • Pillar said the reaction to the CIA’s interrogation methods reflects a public mood change from the “fears and emotions” immediately after the Sept. 11 attacks. Similarly, Americans at first accepted the internment of Japanese-Americans after the attack on Pearl Harbor, a policy since considered a black mark in American history, he said. “The CIA is where the people who are on the bottom end of the political process happen to work, but this was a much bigger process where the bigger story was how the American mood, as expressed by the public and our political leaders, has changed significantly since the first year or two after 9/11, when there was much more willingness to compromise long-held values in the name of American security,” Pillar said.
  • In 1984, Senate Intelligence Committee chairman Barry Goldwater, an Arizona Republican, wrote an angry “Dear Bill” letter to CIA Director William Casey amid reports that the CIA was covertly involved in mining Nicaraguan harbors. “I’m pissed off,” Goldwater wrote, complaining that Casey had misled the committee on an action that amounted to an act of war. The panel’s Democratic vice chairman, Daniel Patrick Moynihan of New York, quit the committee as the “most emphatic way to protest” the Reagan administration’s failure to inform lawmakers.
5More

Verizon's New, Encrypted Calling App Plays Nice With the NSA - Businessweek - 0 views

  • Verizon is the latest big company to enter the post-Snowden market for secure communication, and it's doing so with an encryption standard that comes with a way for law enforcement to access ostensibly secure phone conversations.Verizon Voice Cypher, the product introduced on Thursday with the encryption company Cellcrypt, offers business and government customers end-to-end encryption for voice calls on iOS, Android, or BlackBerry devices equipped with a special app. The encryption software provides secure communications for people speaking on devices with the app, regardless of their wireless carrier, and it can also connect to an organization's secure phone system. Cellcrypt and Verizon both say that law enforcement agencies will be able to access communications that take place over Voice Cypher, so long as they're able to prove that there's a legitimate law enforcement reason for doing so. Seth Polansky, Cellcrypt's vice president for North America, disputes the idea that building technology to allow wiretapping is a security risk. "It's only creating a weakness for government agencies," he says. "Just because a government access option exists, it doesn't mean other companies can access it." 
  • Phone carriers like Verizon are required by U.S. law to build networks that can be wiretapped. But the legislation known as the Communications Assistance for Law Enforcement Act requires phone carriers to decrypt communications for the government only if they have designed their technology to make it possible to do so. If Verizon and Cellcrypt had structured their encryption so that neither company had the information necessary to decrypt the calls, they would not have been breaking the law.
  • Other companies have designed their encryption in this way, including AT&T, which offers encrypted phone service for business customers. Apple and Android recently began protecting content stored on users's phones in a way that would keep the tech companies from being able to comply with requests from law enforcement. The move drew public criticism from FBI Director James Comey, and some security experts expect that a renewed effort to stir passage of legislation banning such encryption will accompany Silicon Valley's increased interest in developing these services. Verizon believes major demand for its new encryption service will come from governmental agencies conveying sensitive but unclassified information over the phone, says Tim Petsky, a senior product manager for Verizon Wireless. Corporate customers who are concerned about corporate espionage are also itching for answers. "You read about breaches in security almost every week in the press," says Petsky. "Enterprise customers have been asking about ways to secure their communications and up until this point, we didn't have a solution." 
  • ...2 more annotations...
  • There has been increased interest in encryption from individual consumers, too, largely thanks to the NSA revelations leaked by Edward Snowden. Yahoo and Google began offering end-to-end encrypted e-mail services this year. Silent Circle, a startup catering to consumer and enterprise clients, has been developing end-to-end voice encryption for phones calls. Verizon's service, with a monthly price of $45 per device, isn't targeting individual buyers and won't be offered to average consumers in the near future.But Verizon's partner, Cellcrypt, looks upon selling to large organizations as the first step toward bringing down the price before eventually offering a consumer-level encryption service. "At the end of the day, we'd love to have this be a line item on your Verizon bill," says Polansky.
  • Many people in the security industry believe that a designed access point creates a vulnerability for criminals or spies to exploit. Last year reports surfaced that the FBI was pushing legislation that would require many forms of Internet communication to be wiretap-ready. A group of prominent security experts responded strongly: "Requiring software vendors to build intercept functionality into their products is unwise and will be ineffective, with the result being serious consequences (PDF) for the economic well-being and national security of the United States," they wrote in a report issued in May. 
5More

Jamie Dimon's $13 Billion Secret | The Nation - 0 views

  • In the end, the abject fear of Ben Wagner got Jamie Dimon to cave.For much of 2013, Dimon, the chairman and chief executive of the formidable JPMorgan Chase & Company, was telling anyone who would listen that it was unfair and unjust for federal and state prosecutors to blame him and his bank for the manufacture and sale of mortgage-backed securities that occurred at Bear Stearns & Company and at Washington Mutual in the years leading up to the financial crisis. When JPMorgan Chase bought those two failing firms in 2008, Dimon argued, he was just doing what Ben Bernanke, Hank Paulson and Timothy Geithner had asked him to do. Why should his bank be held financially accountable for the bad behavior at Bear and WaMu?It was a clever argument—and wrong. Dimon's relentless effort to spin his patriotic story soon collided with the fact that Wagner, the US Attorney for the Eastern District of California, had uncovered evidence that JPMorgan itself was guilty of many of the same greedy and irresponsible behaviors. Piles of subpoenaed documents and e-mails revealed that JPMorgan bankers and traders had underwritten billions of dollars' worth of questionable mortgage-backed securities that Dimon had been telling everyone had originated at Bear Stearns and WaMu. Worse, the bad behavior had occurred on Dimon's watch.
  • The likelihood that the Justice Department would file Wagner's civil complaint last fall—exposing publicly for the first time the litany of wrongdoing at JPMorgan and threatening to push it off the perch that Dimon had so artfully constructed for it over the years—ultimately brought Dimon to the table. On September 26, just weeks after the Justice Department shared a draft copy of Wagner's complaint with Dimon, the two sides arranged for a summit meeting between Dimon and Attorney General Eric Holder. By mid-November, the bank had agreed to pay $13 billion in a comprehensive settlement of mortgage-related securities claims with various branches of the federal government and a group of states, led by the attorneys general of New York, California, Illinois, Massachusetts and Delaware.It was the largest financial settlement of all time, and it kept Wagner's complaint away from the prying eyes of the public. One thing is clear: Dimon's claim that his own bankers and traders had done nothing wrong in the years leading up to the financial crisis wasn't true. "The investigators and the lawyers were uncovering very viable evidence," explains Associate Attorney General Tony West, who headed up the settlement negotiations on behalf of the Justice Department. "I think there was recognition that we had enough evidence there that would support the complaint and would support a robust lawsuit."
  • [A disclosure of my own: after JPMorgan Chase fired me as a managing director in January 2004, I brought—and lost—a wrongful-dismissal arbitration against the bank. Separately, I remain in litigation with the bank as the result of a soured investment I made in 1999.]
  • ...1 more annotation...
  • Dimon was more circumspect. In a conference call the day the settlement was announced, he mostly kept quiet while Marianne Lake, the firm's CFO, led financial analysts through the details, including how $7 billion of the $13 billion fine would be tax-deductible.
  •  
    In a Matt Taibbi-quality lengthy report, William Cohan takes the reader inside the lengthy negotiations of JPMorgan's $13 billion settlement with state and federal prosecutors. JPMorgan admitted to criminal wrongdoing, and the settlement does not include immunity from criminal prosecution for anybody. But the author notes that there is not even a hint that anyone is working on criminal charges. There's a lot of discussion of dissension within the ranks of different state and federal attorneys involved. The article paints Ben Wagner, the US Attorney for the Eastern District of California, as the hero.  In my book, no one involved deserves hero status because no criminal charges have been filed against any JPMorgan managers or board members, hence there is still no incentive for any of the fraudsters who brought down the economy in 2008 to behave differently in the future. JPMorgan emains not too big to fail but too politically connected for its principals to be jailed. According to the article, the government lawyers had iron-clad proof that a group of JPMorgan managing directors had been informed that pools of mortages they were planning to buy were toxic but "buy two of the loan pools anyway, including those with the squirrelly mortgages. JPMorgan then proceeded to bundle "hundreds of millions of dollars of loans from those pools into one security." Wagner found that between the start of 2006 and the middle of 2007-when the mortgage securitization frenzy was at its peak-JPMorgan packaged and sold securities containing thousands of mortgages that were rated by a third-party evaluator to be of extremely low quality, meeting few, if any, of the bank's underwriting standards." If true, that is very serious fraud deserving of the directors' prosecution for criminal fraud and lengthy prison sentences.   The article touches on A.G. Holder's too big to jail argument but that argument, in my opinion, deserves no credibility before antitrust actions are filed to c
1More

Israel Hayom | British special forces land in Iraq to fight ISIS - 0 views

  • Troops from the Royal British Army's elite SAS unit and Special Reconnaissance Regiment have landed in Iraq and are pursuing Islamic State fighters, particularly the U.K. citizen known as "Jihadi John" who beheaded the American journalist James Foley on camera last week. The Sunday Mail reported that the British commandos were employing advanced technologies to find the killer. "It is possible to identify British jihadis on the battlefield by intercepting their radio messages. When they're captured by the Iraqis or Kurds we'll take a close interest in their questioning," an SAS member told the weekly paper. It already appears that the U.S. and U.K. are close to identifying the British-accented terrorist who killed Foley. "We're not in a position to say exactly who this is, but I think we are close," British Ambassador to the U.S. Sir Peter Westmacott told NBC's "Meet the Press."
8More

U.S. Says It Spied on 89,000 Targets Last Year, But the Number Is Deceptive | Threat Le... - 0 views

  • About 89,000 foreigners or organizations were targeted for spying under a U.S. surveillance order last year, according to a new transparency report. The report was released for the first time Friday by the Office of the Director of Intelligence, upon order of the president, in the wake of surveillance leaks by NSA whistleblower Edward Snowden. But the report, which covers only surveillance orders issued in 2013, doesn’t tell the whole story about how many individuals the spying targeted or how many Americans were caught in the surveillance that targeted foreigners. Civil liberties groups say the real number is likely “orders of magnitude” larger than this. “Even if it was an honest definition of ‘target’—that is, an individual instead of a group—that also is not encompassing those who are ancillary to a target and are caught up in the dragnet,” says Kurt Opsahl, deputy general counsel of the Electronic Frontier Foundation.
  • In its report, the government indicated that the 423 selectors involved just 248 “known or presumed” Americans whose information was collected by the agency in the database. But Opsahl says that both of these numbers are deceptive given what we know about the database and how it’s been used. “We know it’s affecting millions of people,” he points out. But “then we have estimated numbers of affected people [that are just] in the three digits. That requires some effort [on the government's part] to find a way to do the definition of the number [in such a way] to make it as small as possible.”
  • “If you’re actually trying to get a sense of the number of human beings affected or the number of Americans affected, the number of people affected is vastly, vastly larger,” says Julian Sanchez, senior fellow at the Cato Institute. “And how many of those are Americans is impossible to say. But [although] you may not think you are routinely communicating with foreign persons, [this] is not any kind of assurance that your communications are not part of the traffic subject to interception.” Sanchez points out that each individual targeted is likely communicating with dozens or hundred of others, whose communications will be picked up in the surveillance. “And probably a lot of these targets are not individuals but entire web sites or companies. While [a company like the Chinese firm] Huawei might be a target, thousands of emails used by thousands of employees will be swept up.” How many of those employees might be American or communicating with Americans is unknown.
  • ...5 more annotations...
  • Also revealed in today’s report is the number of times the government has queried the controversial phone records database it created by collecting the phone records of every subscriber from U.S. providers. According to the report, the government used 423 “selectors” to search its massive phone records database, which includes records going back to at least 2006 when the program began. A search involves querying a specific phone number or device ID that appears in the database. The government has long maintained that its collection of phone records isn’t a violation of its authority, since it only views the records of specific individuals targeted in an investigation. But such searches, even if targeted at phone numbers used by foreigners, would include calls made to and from Americans as well as calls exchanged with people two or three hops out from the targeted number.
  • The report, remarkably, shows that the government obtained just one order last year under Section 702 of FISA—which allows for bulk collection of data on foreigners—and that this one order covered 89,138 targets. But, as the report notes, “target” can refer to “an individual person, a group, an organization composed of multiple individuals or a foreign power that possesses or is likely to communicate foreign intelligence information.” Furthermore, Section 702 orders are actually certificates issued by the FISA Court that can cover surveillance of an entire facility. And since, as the government points out in its report, the government cannot know how many people use a facility, the figure only “reflects an estimate of the number of known users of particular facilities (sometimes referred to as selectors) subject to intelligence collection under those Certifications,” the report notes.
  • One additional figure today’s report covers is the number of National Security Letters the government issued last year to businesses to obtain data on accountholders and users—19,212. NSLs are written demands from the FBI that compel internet service providers, credit companies, financial institutions and others to hand over confidential records about their customers, such as subscriber information, phone numbers and e-mail addresses, websites visited, and more. These letters are a powerful tool because they do not require court approval, and they come with a built-in gag order, preventing recipients from disclosing to anyone that they have received an NSL. An FBI agent looking into a possible anti-terrorism case can self-issue an NSL to a credit bureau, ISP, or phone company with only the sign-off of the Special Agent in Charge of their office. The FBI has merely to assert that the information is “relevant” to an investigation into international terrorism or clandestine intelligence activities.
  • The FBI has issued hundreds of thousands of NSLs over the years and has been reprimanded for abusing them. Last year a federal judge ruled that the use of NSLs is unconstitutional, due to the gag order that accompanies them, and ordered the government to stop using them. Her ruling, however, was stayed pending the government’s appeal.
  • According to the government’s report today, the 19,000 NSLs issued last year involved more than 38,000 requests for information.
4More

Google Says Website Encryption Will Now Influence Search Rankings - 0 views

  • Google will begin using website encryption, or HTTPS, as a ranking signal – a move which should prompt website developers who have dragged their heels on increased security measures, or who debated whether their website was “important” enough to require encryption, to make a change. Initially, HTTPS will only be a lightweight signal, affecting fewer than 1% of global queries, says Google. That means that the new signal won’t carry as much weight as other factors, including the quality of the content, the search giant noted, as Google means to give webmasters time to make the switch to HTTPS. Over time, however, encryption’s effect on search ranking make strengthen, as the company places more importance on website security. Google also promises to publish a series of best practices around TLS (HTTPS, is also known as HTTP over TLS, or Transport Layer Security) so website developers can better understand what they need to do in order to implement the technology and what mistakes they should avoid. These tips will include things like what certificate type is needed, how to use relative URLs for resources on the same secure domain, best practices around allowing for site indexing, and more.
  • In addition, website developers can test their current HTTPS-enabled website using the Qualys Lab tool, says Google, and can direct further questions to Google’s Webmaster Help Forums where the company is already in active discussions with the broader community. The announcement has drawn a lot of feedback from website developers and those in the SEO industry – for instance, Google’s own blog post on the matter, shared in the early morning hours on Thursday, is already nearing 1,000 comments. For the most part, the community seems to support the change, or at least acknowledge that they felt that something like this was in the works and are not surprised. Google itself has been making moves to better securing its own traffic in recent months, which have included encrypting traffic between its own servers. Gmail now always uses an encrypted HTTPS connection which keeps mail from being snooped on as it moves from a consumer’s machine to Google’s data centers.
  • While HTTPS and site encryption have been a best practice in the security community for years, the revelation that the NSA has been tapping the cables, so to speak, to mine user information directly has prompted many technology companies to consider increasing their own security measures, too. Yahoo, for example, also announced in November its plans to encrypt its data center traffic. Now Google is helping to push the rest of the web to do the same.
  •  
    The Internet continues to harden in the wake of the NSA revelations. This is a nice nudge by Google.
4More

'American forces are on the ground here': Kurds say US commandos are fighting ISIS with... - 0 views

  • President Obama said a week ago that no US 'combat troops' would be fighting in IraqBut Special Forces that looked like Americans were witnessed entering a combat zone near the Iraqi town of ZumarKurdish intelligence and military sources told the Daily Beast that German and American forces were on the ground fighting with themObama's careful word-parsing could mean that Special Forces are 'painting targets' with lasers for airborne missiles 
  • 'American combat troops will not be returning to fight in Iraq,' Barack Obama said a week ago during a speech in Charlotte, North Carolina to the American Legion
  • A Daily Beast freelance reporter wrote Tuesday that he saw 'what appeared to be bearded Western Special Operations Forces' in a caravan of armored vehicles near the Iraqi town of Zumar.The battle-scarred location, 30 miles from Mosul and a bit further from Erbil, had been the site of fierce fighting between Kurdish Peshmerga forces and ISIS militants.'They didn't wear any identifying insignia,' the reporter added, 'but they were visibly Western and appeared to match all the visual characteristics of American special operations soldiers.'This particular freelancer should know: He's a 27-year-old former U.S. Army Ranger who served three tours in Iraq and two in Afghanistan.
  •  
    More confirmation on this particular Obama lie.
« First ‹ Previous 161 - 180 of 205 Next › Last »
Showing 20 items per page