Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged manufacturers

Rss Feed Group items tagged

Gary Edwards

Apple, America and a Squeezed Middle Class - NYTimes.com - 0 views

  •  
    Stunning story.  Looks like the marxist int eh White House is going after Apple and the Communist dictators in Beijing.  How did things get so upside down? excerpt: Today, few are. Almost all of the 70 million iPhones, 30 million iPads and 59 million other products Apple sold last year were manufactured overseas. Why can't that work come home? Mr. Obama asked. Mr. Jobs's reply was unambiguous. "Those jobs aren't coming back," he said, according to another dinner guest. The president's question touched upon a central conviction at Apple. It isn't just that workers are cheaper abroad. Rather, Apple's executives believe the vast scale of overseas factories as well as the flexibility, diligence and industrial skills of foreign workers have so outpaced their American counterparts that "Made in the U.S.A." is no longer a viable option for most Apple products.
Gary Edwards

Bain Capital's Staples vs Obama's Bankrupt Solyndra - 0 views

  •  
    Good article describing the success of Romney's Bain Capital. Does not mention that Obama is outsourcing NASA!!!! And to the Russians no less. Otherwise, great background info on Bain and Romney's role as innovative founder. Bain became the model for an entire industry. excerpt: Mr. Romney has attacked Mr. Obama's Solyndra investment in particular, but he hasn't linked it consistently to the President's failed model of government-led investing or contrasted it with the successful culture Mr. Romney built at Bain. Enlarge Image Associated Press What Bain did is what all successful organizations do: Seek to deliver products and services that are better, faster, cheaper. In some instances that means fewer employees, even if Mr. Obama still can't or won't grasp the concept that we live in a competitive world. How many readers of this editorial have jobs today because the founders of their companies figured out how to spend more money on a slower manufacturing process to create goods of lower quality? *** Overall, Bain capitalism means more successes than failures, and many more jobs. In March of this year, the managing directors of Bain Capital wrote to their investors and reported that, over the firm's 28 years, companies backed by Bain have grown their revenues more than twice as fast "as both the S&P and the U.S. economy." The managers went on to note that after Bain invested, companies have grown their revenues by more than $105 billion globally, including $80 billion in the United States. Bain-backed companies, they added, have opened more than 5,000 stores and facilities during their ownership. Mr. Romney may have thought that debating Bain was a distraction from focusing on the failed Obama economy. But with Mr. Obama using Bain as his main argument against Mr. Romney's record as a job creator, the Republican has no choice but to fight back or he'll lose the election. Americans will choose Bain capitalism over Solyndra crony capitalism,
Paul Merrell

The Power of War Propaganda on Iran, and How It Works « Antiwar.com Blog - 0 views

  • A new poll finds 80% of Americans think Iran has a nuclear weapons program and that it is a threat to the US and its NATO allies. The poll, commissioned by The Israel Project, asked likely voters and found “72% of Democrats, 81% of independents and 89% of Republicans were convinced the Iranians were building nuclear weapons.” This is a monumental success of war propaganda. And these results are largely consistent with other recent polls: one produced back in February by the Council on Foreign Relations and the Program on International Policy Attitudes found “An overwhelming majority of U.S. citizens believe that Iran is pursuing nuclear weapons and poses a serious threat to U.S. national security.”
  • Contrast these beliefs with the facts: The consensus in the whole of the intelligence community in the US (and Israel) is that Iran has no nuclear weapons program and has yet to demonstrate any intention of starting one anytime soon. But false beliefs persist even when there has been ample reassurances from elite sources in politics, the military, and the news media that Iran has no weapons program. A matter of months ago, the Obama administration marched out their minions, from Defense Secretary Leon Panetta to Director of National Intelligence James Clapper to Chairman of the Joint Chiefs of Staff Gen. Martin Dempsey, all of whom reiterated the fact that Iran has no nuclear weapons program, despite constant rhetoric to the contrary.
  • In February the New York Times ran a front page story entitled “U.S. Agencies See No Move by Iran to Build a Bomb.” It reported: “Recent assessments by American spy agencies are broadly consistent with a 2007 intelligence finding that concluded that Iran had abandoned its nuclear weapons program years earlier. The officials said that assessment was largely reaffirmed in a 2010 National Intelligence Estimate, and that it remains the consensus view of America’s 16 intelligence agencies.” Again in March, they reported “top administration officials have said that Iran still has not decided to pursue a weapon, reflecting the intelligence community’s secret analysis.” Another in the Los Angeles Times was similarly headlined, “U.S. does not believe Iran is trying to build nuclear bomb.”
  •  
    Manufacturing consent for war with Iran 
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Paul Merrell

Government let British company export nerve gas chemicals to Syria - UK Politics - UK -... - 0 views

  • The Government was accused of “breathtaking laxity” in its arms controls tonight after it emerged that officials authorised the export to Syria of two chemicals capable of being used to make a nerve agent such as sarin a year ago. The Business Secretary, Vince Cable, will on Monday be asked by MPs to explain why a British company was granted export licences for the dual-use substances for six months in 2012 while Syria’s civil war was raging and concern was rife that the regime could use chemical weapons on its own people. The disclosure of the licences for potassium fluoride and sodium fluoride, which can both be used as precursor chemicals in the manufacture of nerve gas, came as the US Secretary of State John Kerry said the United States had evidence that sarin  gas was used in last month’s atrocity in Damascus.
  • Mr Kerry announced that traces of the nerve agent, found in hair and blood samples taken from victims of the attack in the Syrian capital which claimed more than 1,400 lives, were part of a case being built by the Obama administration for military intervention.The Department for Business, Innovation and Skills insisted that although the licences were granted to an unnamed UK chemical company in January 2012, the substances were not sent to Syria before the permits were eventually revoked last July in response to tightened European Union sanctions.In a previously unpublicised letter to MPs last year, Mr Cable acknowledged that his officials had authorised the export of an unspecified quantity of the chemicals in the knowledge that they were listed on an international schedule of chemical weapon precursors.Critics of the Business Secretary, whose department said it had accepted assurances from the exporting company that the chemicals would be used in the manufacture of metal window frames and shower enclosures, said it appeared the substances had only stayed out of Syria by chance.
  • The Labour MP Thomas Docherty, a member of the Commons Arms Export Controls Committee, will today table parliamentary questions demanding to know why the licences were granted and to whom.
  •  
    Note particularly that neither the company that got the permit nor the intended recipient is identified. I.e., it was not necessarily the Syrian government. Legitimate use for other purposes?  A rebel front organization?
Paul Merrell

LAPD scopes out Israeli drones, 'Big Data' solutions | Nation | Jewish Journal - 0 views

  • For the first nine days of February, eight of the Los Angeles Police Department’s top brass were 7,500 miles away from home, being shuttled around Israel in a minibus.
  • LAPD Deputy Chief Jose Perez, a good-natured 30-year veteran of the department who oversees its central bureau, tweeted updates at nearly every stop. On Feb. 2, he shared a group photo of the Los Angeles delegation visiting the corporate headquarters of Nice Systems, an Israeli security and cyber intelligence company that can intercept and instantly analyze video, audio and text-based communications. (A seemingly tongue-in-cheek inspirational poster on the wall behind them reads: “Every voice deserves to be heard.”)
  • The group visited private security firms and drone manufacturers, as well as the terror-prone Ashdod Port, a museum in Sderot full of old rockets shot from nearby Gaza (the same one United States President Barack Obama visited on his 2008 campaign trip to Israel), and a “safe city” underground control center in the large suburb of Rishon LeZion, which receives live streams from more than 1,000 cameras with license plate recognition installed throughout the city.
  • ...8 more annotations...
  • Frank was joined by seven of his fellow command staff at the Big Data Intelligence Conference hosted by i-HLS in the beach town of Herzliya, Israel, on Feb. 6. “On behalf of my chief of police, Chief Charlie Beck, and the 13,000-plus sworn and non-sworn members of the Los Angeles Police Department, a very heartfelt thanks to all of you for having me here,” Frank said in an opening statement for the conference, which brought together some of Israel’s — and the world’s — top cyber security and intelligence experts.
  • Frank said he was especially impressed by what he saw while visiting Israeli companies Nice Systems (as tweeted by Perez) and Verint, one of the companies whose services the National Security Administration (NSA) reportedly used in the infamous United States wiretapping scandal. Both companies already count the LAPD as a client. But, Frank said, “we’re looking at some of their additional solutions … They have a lot of new technologies that we are very much interested in.” Nice System’s  president of security, Yaron Tchwella, spoke at the conference about the company’s ability to help government agencies capture and store the billions of calls, emails, messages and social media posts that their populations generate each day, then analyze it in real time to detect potential threats.
  • Perez said he hoped the LAPD, too, would eventually be able to “use technology to incorporate all the systems that we have. That’s the wave of the future. We’re definitely looking at the ability to get that information out to the officers on the beat with a handheld. Something happens, and you’re looking at the handheld — almost like ‘The Bourne Supremacy’ — here’s a picture of the guy you’re looking for.”
  • Also in Khan’s crosshairs is Special Order 1, an LAPD policy that allows officers to document any otherwise lawful activity that they, or other members of the community, deem suspicious. (Including, for example, the photographing of certain government sites.) And new LAPD intel collection methods or surveillance drones, said Khan, would only be “adding more to their toolbox of being highly militarized in counterinsurgency forces” against protesters and movements such as Occupy. “Yet it is wrapped in this whole language of community policing.” Two separate L.A. Weekly investigations in 2012 found that the LAPD uses expensive StingRay devices, which can locate cellphones (and their users) by acting like cellphone towers, and license-plate recognition cameras that track millions of drivers. Although both devices technically require a warrant to be used in a police investigation, there is little way to know whether police are always complying with the rules.
  • Surveillance drones manufactured by Israel Aerospace Industries (IAI) and Sky Sapience were also hot items on the LAPD tour. Both Frank and Perez lit up when talking about the HoverMast, a new tethered drone from Sky Sapience that was just released to the IDF late last year. “There are several things on the wish list, but we did like Sky Sapience — that was incredible,” Perez said. “For me personally, just for my command, which is five stations, and all the special events that I have, crowd control and being able to see everything would be some technology that is needed immediately.” However, Frank added, the HoverMast “has its challenges: from a political standpoint, convincing our political leaders, and from a community standpoint, convincing the community that it’s not Big Brother watching over you.”
  • A spokeswoman for Sky Sapience said the HoverMast can intercept wireless communications, and its cameras are capable of facial recognition. A spokeswoman for IAI said that while showing LAPD officers their drones, the company “wanted to emphasize the fact that drones can be very helpful in giving intelligence in urban scenarios… you need it now, you need it quick, you need to see what’s inside a window, and what’s behind this building.”
  • Many of the companies attracting LAPD interest have one thing in common: They were formed by veterans of the IDF’s elite, top-secret 8200 Unit, better known as Israel’s version of the NSA.
  • Perez emphasized that as a local police agency, the LAPD has much tighter legal constraints than federal agencies to adhere to when adopting army-born surveillance and “big data” technologies.
Paul Merrell

Clipper chip - Wikipedia, the free encyclopedia - 0 views

  • The Clipper chip was not embraced by consumers or manufacturers and the chip itself was no longer relevant by 1996. The U.S. government continued to press for key escrow by offering incentives to manufacturers, allowing more relaxed export controls if key escrow were part of cryptographic software that was exported. These attempts were largely made moot by the widespread use of strong cryptographic technologies, such as PGP, which were not under the control of the U.S. government.
  •  
    But were the government attempts actually mooted? Or did they come up with other bribes for the OEMs to add NSA backdoors to their hardware? An inquiring world wishes to know. See http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html (NSA backdoors in routers and hard drives). 
Paul Merrell

Inside TAO: The NSA's Shadow Network - SPIEGEL ONLINE - 0 views

  • The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of "covert" routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with "implants" that then allow the government hackers to control the computers remotely. (Click here to read a related article on the NSA's "implants".) In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person's computer. Of course, a cookie doesn't automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint.
  • Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID. This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer. The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: "Wait for client to initiate new connection," "Shoot!" and "Hope to beat server-to-client response." Like any competition, at times the covert network's surveillance tools are "too slow to win the race." Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document.
  • At the same time, it is in no way true to say that the NSA has its sights set exclusively on select individuals. Of even greater interest are entire networks and network providers, such as the fiber optic cables that direct a large share of global Internet traffic along the world's ocean floors. One document labeled "top secret" and "not for foreigners" describes the NSA's success in spying on the "SEA-ME-WE-4" cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle. The document proudly announces that, on Feb. 13, 2013, TAO "successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4)." With the help of a "website masquerade operation," the agency was able to "gain access to the consortium's management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network."
  • ...3 more annotations...
  • It appears the government hackers succeeded here once again using the QUANTUMINSERT method. The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure. But that was only the first step. "More operations are planned in the future to collect more information about this and other cable systems," it continues. But numerous internal announcements of successful attacks like the one against the undersea cable operator aren't the exclusive factors that make TAO stand out at the NSA. In contrast to most NSA operations, TAO's ventures often require physical access to their targets. After all, you might have to directly access a mobile network transmission station before you can begin tapping the digital information it provides.
  • To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour's work.
  • Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors. Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer. These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world."
  •  
    From page 3 of a 3-page article. The entire article is well worth reading. I chose this page to bookmark because of its disclosure that NSA is intercepting new computers before they are delivered and installing hardware and software backdoors, then reshipping them to their intended recipients. Although not mentioned, this implies the complicity of package shipment companies and conceivably government mail systems and original equipment manufacturers ("OEMs").  
Gary Edwards

The Basic Library - Article V Project To Restore Liberty - 2 views

  •  
    "Free Google Book Search (360 B.C.) The Republic - Plato (46 B.C.) Cicero's Brutus - Cicero   (1517) Discourses on Livy - Machiavelli (1553) The Discourse of Voluntary Servitude - Étienne de La Boétie (1690) Two Treatises of Government - John Locke   (1698) Discourses Concerning Government - Algernon Sydney Sidney's Discourses and Locke's Second Treatise were recommended by Jefferson and Madison as containing the "general principles of liberty and the rights of man, in nature and society" (1748) The Spirit of Laws  - Montesquieu (1748) The Principles of Natural and Politic Law - Burlamaqui   (1755) Old Family Letters - John Adams (1758) The Law of Nations- Vattel   (1764-1769) The Writings of Samuel Adams (1765-1769) Blackstone's Commentaries on the Laws of England (1766) The Declaratory Act (1770) The Writings of John Adams V1-2              The Writings of John Adams V3-4              The Writings of John Adams V5-7              The Writings of John Adams V8-10   (1771-1788) The Autobiography of Benjamin Franklin (1772) The Votes and Proceedings of the Freeholders and other Inhabitants (1774) A Full Vindication of the Measures of Congress - Hamilton (1774) Novanglus - John Adams Principle Controversy between Great Britain and Her Colonies (1776) Common Sense- Thomas Paine One Incident which gave a stimulus to the pamphlet Common Sense was, that it happened to appear on the very day that the King of England's speech reached the United States, in which the Americans were denounced as rebels and traitors, and in which speech it was asserted to be the right of the legislature of England to bind the Colonies in all cases whatsoever. (1776-1783) The Crisis- Thomas Paine (1780) Journal of the Convention for Framing the Massachusetts Bay Constitution (1785) Remarks concerning the Government and Laws of the United States of America: in Four Letters addressed to Mr. Adams (1787) The Anti-Federalist (audio) (1787) The Federalist
Gary Edwards

"War is a Racket" by General Smedly Butler - 1 views

  • by MAJOR GENERAL SMEDLEY D. BUTLER, USMC - Retired TWO-TIME Congressional Medal of Honor Recipient FULL TEXT ON LINE FREE
  • GET THE NEW PAPERBACK EDITION including two bonus titles.
  •  
    An accidental find, the full text online of USMC Maj. Gen. Smedley Butler's 1935 book, War Is a Racket. Butler served in the Marine Corps from 1899 to 1931 and at the time of his retirement was the most-decorated Marine in history, for both valor and accomplishments. Following his retirement, he became a vehement anti-war activist and public speaker.  This book is easily his most-cited and most-quoted published work. You can capture the flavor from an article he published in a magazine that included the following lines: "I spent 33 years and four months in active military service and during that period I spent most of my time as a high class muscle man for Big Business, for Wall Street and the bankers. In short, I was a racketeer, a gangster for capitalism. I helped make Mexico and especially Tampico safe for American oil interests in 1914. I helped make Haiti and Cuba a decent place for the National City Bank boys to collect revenues in. I helped in the raping of half a dozen Central American republics for the benefit of Wall Street. I helped purify Nicaragua for the International Banking House of Brown Brothers in 1902-1912. I brought light to the Dominican Republic for the American sugar interests in 1916. I helped make Honduras right for the American fruit companies in 1903. In China in 1927 I helped see to it that Standard Oil went on its way unmolested. Looking back on it, I might have given Al Capone a few hints. The best he could do was to operate his racket in three districts. I operated on three continents." http://en.wikipedia.org/wiki/Smedley_Butler#Lectures  I look forward to reading this book. The book was reprinted in 2003 and is available from the linked web site, together with two bonus titles. 
  •  
    "WAR IS A RACKET" - free online book CHAPTER ONE WAR is a racket. It always has been. It is possibly the oldest, easily the most profitable, surely the most vicious. It is the only one international in scope. It is the only one in which the profits are reckoned in dollars and the losses in lives. A racket is best described, I believe, as something that is not what it seems to the majority of the people. Only a small "inside" group knows what it is about. It is conducted for the benefit of the very few, at the expense of the very many. Out of war a few people make huge fortunes. In the World War [I] a mere handful garnered the profits of the conflict. At least 21,000 new millionaires and billionaires were made in the United States during the World War. That many admitted their huge blood gains in their income tax returns. How many other war millionaires falsified their tax returns no one knows. How many of these war millionaires shouldered a rifle? How many of them dug a trench? How many of them knew what it meant to go hungry in a rat-infested dug-out? How many of them spent sleepless, frightened nights, ducking shells and shrapnel and machine gun bullets? How many of them parried a bayonet thrust of an enemy? How many of them were wounded or killed in battle? Out of war nations acquire additional territory, if they are victorious. They just take it. This newly acquired territory promptly is exploited by the few - the selfsame few who wrung dollars out of blood in the war. The general public shoulders the bill. And what is this bill? This bill renders a horrible accounting. Newly placed gravestones. Mangled bodies. Shattered minds. Broken hearts and homes. Economic instability. Depression and all its attendant miseries. Back-breaking taxation for generations and generations. For a great many years, as a soldier, I had a suspicion that war was a racket; not until I retired to civil life did I fully realize it. Now that I see the international war clouds g
Paul Merrell

Nunn-Lugar Revisited - 0 views

  • Washington, DC, November 22, 2013 – The final shipment of highly enriched uranium from former Soviet nuclear warheads to the U.S. on November 14, and President Obama's award of the Presidential Medal of Freedom to former Senator Richard Lugar on November 20, have brought new public attention to the underappreciated success story of the Nunn-Lugar initiative — the subject of a new research project by the National Security Archive, which organized the first "critical oral history" gathering this fall of U.S. and Russian veterans of Nunn-Lugar. The former Soviet Union in the 1990s achieved an unprecedented "proliferation in reverse" with the denuclearization of former republics and the consolidation of nuclear weapons and fissile material inside Russia. Notwithstanding the well-grounded fears of policymakers on both sides of the waning Cold War in 1990-1991, the dissolution of the Soviet Union did not result in a nuclear Yugoslavia spread over eleven time zones. Instead, the "doomsday clock" of the Bulletin of the Atomic Scientists marched backwards, in its largest leaps ever away from midnight. Key to this extraordinary accomplishment was the U.S.-Russian Cooperative Threat Reduction Program, colloquially known as Nunn-Lugar after its two leading sponsors in the U.S. Senate, Sam Nunn of Georgia and Richard Lugar of Indiana.
  • Unfortunately, this success did not get major publicity at the time, and remains largely unknown today outside the expert communities in both countries. This lack of appreciation culminated in 2012 with Russia's withdrawal from the program and assertion of independence from foreign aid. Yet below the radar the cooperation continued, for example with the February 2013 U.S.-Russian removal of enriched uranium from the Czech Republic, and the September 2013 agreement to work together to destroy Syrian chemical weapons — clear signals of the continuing relevance of the two-decade-long Nunn-Lugar experiment.
  • One week earlier, on November 14, the Washington Post reported from St. Petersburg, Russia: "Take a canister, fill it with down-blended uranium worth $2.5 million, secure it and 39 others to the deck of a container ship, send it off toward Baltimore, and you've just about completed a deal that provided commercial uses in the United States for the remains of 20,000 dismantled Russian nuclear bombs." The story, headlined "U.S.-Russia uranium deal sends its last shipment," by Will Englund, reported: "The program provided jobs to nuclear technicians at a time when Russia was in chaos; it sparked the development of a dilution process than enables bombs to become fuel for power plants; and it may have helped to keep poorly secured nuclear materials out of the wrong hands — at least that's what Americans say. Russians strongly deny that the materials were not secured."
  • ...2 more annotations...
  • To ground the Musgrove discussions in the primary sources, Archive staff prepared a 450-page conference briefing book containing 70 key documents, primarily on the early Nunn-Lugar years from 1991 through 1997, but also including the March 2013 summary of Nunn-Lugar success that is featured on The Lugar Center website. The documents range from telcons of President George H. W. Bush's conversations with then-Soviet leader Mikhail Gorbachev about safe dismantling of nuclear warheads in 1991, to the memcons of the Bush meetings with Russian President Boris Yeltsin in 1992 on nuclear weapons withdrawal from the former Soviet republics, to the State Department cables about negotiations with Ukraine over the Soviet-era nuclear weapons located there. Sources of the documents range from Freedom of Information Act requests to the Bush Presidential Library, to donations by veterans such as Ambassador James Goodby and experts such as David Hoffman, to files at the Archives of the Russian Federation in Moscow and at the Hoover Institution at Stanford.
  • Today's posting is the first in the Nunn-Lugar series of electronic briefing books in Russian and English that will make widely available the documents from all sides. The transcripts of the "critical oral history" conferences organized by the Archive will provide the foundation for one or more books analyzing the Nunn-Lugar experience, and will guide further research both by the Archive staff and by the conference participants. Maintaining this expert dialogue about the cooperative threat reduction experience will also make a significant contribution to the ongoing challenge of U.S.-Russia engagement.
  •  
    Nice graphic image on the linked web page breaking down accomplishments in  nuclear disarmament by former Soviet republics. The downside: all of those former Soviet warheads had their uranium diluted and exported to the U.S. for manufacturer of nuclear fuel rods, which means that the U.S. nuclear power industry was perpetuated and our legacy of radioactive wastes continues to grow, despite not even yet having a safe disposal site or method. All of those expended nuclear fuel rods still sitting on reactor sites around the nation, being water cooled, and posing the risk of Fukushima-like disasters. This is progress?  
Paul Merrell

Follow the money: How lobby interests are spinning Iran nuclear deal - RT Op-Edge - 0 views

  •  
    Pepe Escobar's initial take on de-spinning the Iran-P51 interim agreement: Follow the money.  One error in what he said: "And all the 20 percent enriched uranium that they have is going to be diluted, so it cannot be used later on for weapons-grade material." Iran gets to keep 20 per cent of of it for its research reactor in Tehran. But Iran has only 450 pounds and 80 percent has already been diluted in the manufacture of nuclear fuel rods. So Iran gave up nothing on this point other than the right to continue enriching beyond 5 per cent for the next 6 months.  
Paul Merrell

Egypt panel approves 'conditional military trials of civilians' - Politics - Egypt - Ah... - 0 views

  • Egypt's 50-member constitution committee has approved an article allowing civilians to be tried by military courts. At Wednesday's session, 30 members voted in favour of the article, seven against, with two abstentions. The remaining 11 were absent. The article was approved after it was amended and presented by the panel's military representative. The text of the article refers to direct attacks on military premises, camps, properties and factories; attacks on military zones and border areas, and attacks on military vehicles or personnel while they are carrying out their duties. Crimes related to military documents, secrets or funds are also included in the article.
  • Several political parties and movements have condemned the article. April 6 Youth Movement founder Ahmed Maher said via Facebook: "No to a constitution that allows military trials of civilians. Have we forgotten the 12,000 civilians that had military trials [during military rule after the January 2011 uprising], including children who are still in jail?" April 6 coordinator Amr Salah said the movement would campaign against the constitution if the article is not removed. Human rights organisations have been calling for a complete ban on trials of civilians by military courts.
  •  
    Ain't it wonderful that Egypt is our No. 2 recipient of military weapons and materiel sales to U.S. manufacturers disguised as U.S. foreign financial aid? But Egypt mans the southern blockade of the Gaza Strip. If Egypt did not do so all those Palestinians might actually engage in international commerce and go to sleep with full bellies. So in reality we have no choice but to play along with military tribunals trying civilians. After all, the U.S. is now doing that too. Why not Egypt?
Paul Merrell

World must act to stop Syria's chemical weapons use, Cameron says - CNN.com - 0 views

  • (CNN) -- [Breaking news alert, 5:23 p.m. ET] A closed-door meeting of the U.N. Security Council ended Thursday with no agreement on a resolution to address the crisis in Syria, a Western diplomat told CNN's Nick Paton Walsh on condition of anonymity. "It was clear there was no meeting of minds, and no agreement on the text. It is clear that our approaches are very different and we are taking stock (of the next steps)," the diplomat said. The members of the Security Council expect U.N. weapons inspectors to brief Secretary-General Ban Ki-moon shortly after they depart Syria on Saturday. Ban, in turn, will swiftly brief the Security Council on the findings, the diplomat said.
  • Obama and his top advisers are holding extensive talks with American allies as they ponder their options. But the president is facing doubts at home as well: More than 160 members of Congress, including 63 Democrats, have now signed letters calling for either a vote or at least a "full debate" before any U.S. action.
  •  
    The drive for a US/UK military strike on Syria is beginning to bog down. The UN Security Council could not reach agreement on a resolution to authorize the strike; resistance in Congress is rising with a call for full debate before launching such a strike, and I just watched the UK House of Commons forbid UK participation in the strike. ("Heated moments in the UK debate" video is on the linked page.) Unsurprising in the U.S. because last weekend's Reuters/Ipsos poll showed that public resistance to U.S. military action against Syria is actually stiffening, with only 9 percent supporting military action. Obama has scheduled a telephone conference with key members of Congress to encourage them not to interfere, but reportedly the phone conference will use non-secure connections so classified information will not be discussed.  Personally, I want the raw intelligence data on the alleged use of sarin by the Syrian government to be publicly released, including audio recordings, so that it can be subjected to debate by the public. Based on my monitoring of news on the Syrian conflict for more than a year, it seems clear that the Syrian foreign "rebels" have the ability to manufacture Sarin and have used it repeatedly in Syria. And the Syrian government has very strong incentives not to use Sarin, particularly at the moment the gas attack occurred. A UN team had just arrived, at Syria invitation, to investigate prior incidents involving alleged gas attacks in which both sides blamed the other. Not a good time for the Syrian government to launch such an attack but a great time for the rebels to stage a false flag attack, blaming the Syrian government.  So I want to see the evidence Obama claims to be relying upon. Supposedly, it is an intercept of a panicked conversation between a Syrian commander and a lower officer in the field. But that too could have been staged. Making it public would go a long way toward resolving the authenticity issue and determining whether it w
Paul Merrell

2014 Press Release - NSA Announces New Civil Liberties and Privacy Officer" - 0 views

  • GEN Keith Alexander - Commander, U.S. Cyber Command/Director, NSA/Chief, CSS - announced today that well-known privacy expert Rebecca Richards will serve as the National Security Agency's new Civil Liberties and Privacy Officer. She most recently worked as the Senior Director for Privacy Compliance at the Department of Homeland Security.
  • Selected to lead the new NSA Civil Liberties and Privacy Office at the agency's Fort Meade headquarters, Ms. Richards' primary job will be to provide expert advice to the Director and oversight of NSA's civil liberties and privacy related activities. She will also develop measures to further strengthen NSA's privacy protections.
  •  
    Softball Interview here. . I wasn't really expecting Obama to reach out to the ACLU and EFF for a good civil liberties lawyer recommendation, but this appointment is lame, the former Director of Privacy for Dept. of Homeland Security, those wonderful folk who keep the homeland safe from terra-ists. The airport gropers, secret no-fly listers, and masters of border protection, where all Constitutional privacy rights do not apply, per the Supreme Court., the coordinators of our glorious "fusion centers," the provisioners of funding for armored cars and surveillance equipment for local police, etc. A sample from her interview linked above that I transcribed (omitting all the umhs and ahs): "When you think about NSA, privacy there for them was privacy of its employees, about contractors, about the average person walking down the street - it was not as concentrated on, this is the big collection that we're getting through these means, and so what this job does is that it brings it up under direct reports to the director of NSA and it is just as a focal point, to bring all of those and -- I walked in the building and people were already asking questions so ..." Heaven help us; has this lassie's brain yet matured to the point of completing her first sentence? This is the lady who is going to keep Admiral Rogers on the straight and narrow path of respecting our civil liberties? I suspect not.  I may return to this inarticulate and non-assertive young lady in later posts. Let it suffice for now to observe that the Dept. of Homeland Security, whose raison d'etre is a virtually non-existent terrorist threat manufactured by the politics of fear, has not exactly been a champion of the People's civil liberties. Moreover, I've had recent occasion to dig rather deeply into exactly what it is that Privacy Officers do and don't do. Telling heads of agencies that they cannot lawfully do what they want to do is no
Paul Merrell

NATO's Terror Hordes in Iraq a Pretext for Syria Invasion | New Eastern Outlook - 0 views

  • All roads lead to Baghdad and the Islamic State in Iraq and Syria (ISIS) is following them all, north from Syria and Turkey to south. Reading Western headlines, two fact-deficient narratives have begun gaining traction. The first is that this constitutes a “failure” of US policy in the Middle East, an alibi as to how the US and its NATO partners should in no way be seen as complicit in the current coordinated, massive, immensely funded and heavily armed terror blitzkrieg toward Baghdad. The second is how ISIS appears to have “sprung” from the sand dunes and date trees as a nearly professional military traveling in convoys of matching Toyota trucks without explanation. In actuality, ISIS is the product of a joint NATO-GCC conspiracy stretching back as far as 2007 where US-Saudi policymakers sought to ignite a region-wide sectarian war to purge the Middle East of Iran’s arch of influence stretching from its borders, across Syria and Iraq, and as far west as Lebanon and the coast of the Mediterranean. ISIS has been harbored, trained, armed, and extensively funded by a coalition of NATO and Persian Gulf states within Turkey’s (NATO territory) borders and has launched invasions into northern Syria with, at times, both Turkish artillery and air cover.
  • The alleged territorial holdings of ISIS cross over both Syrian and Iraqi borders meaning that any campaign to eradicate them from Iraqi territory can easily spill over into Syria’s borders. And that is exactly the point. With ISIS having ravaged Mosul, Iraq near the Turkish border and moving south in a terror blitzkrieg now threatening the Iraqi capital of Baghdad itself, the Iraqi government is allegedly considering calling for US and/or NATO assistance to break the terror wave. Adding to the pretext, ISIS, defying any sound tactical or strategic thinking, has seized a Turkish consulate in Mosul, taking over 80 Turkish hostages - serendipitous giving Turkey not only a new pretext to invade northern Iraq as it has done many times in pursuit of alleged Kurdish militants, but to invade Syrian territory where ISIS is also based.
  •  
    Tony Cartalucci blows the top off the manufactured excuse for Turkey -- a NATO nation already caught making plans to initiate a false flag attack on itself posing as Syrian government forces -- to invade both Iraq and Syria. Heavily referenced with lots of links. An in-depth study of the players and plays in motion in Iraq. A must read.
Paul Merrell

4. FBI Agents Responsible for Majority of Terrorist Plots in the United States - The To... - 0 views

  • The Federal Bureau of Investigation has embarked on an unusual approach to ensure that the United States is secure from future terrorist attacks. The agency has developed a network of nearly 15,000 spies to infiltrate various communities in an attempt to uncover terrorist plots. However, these moles are actually assisting and encouraging people to commit crimes. Many informants receive cash rewards of up to $100,000 per case.
  • Trevor Aronson, “The Informants,” Mother Jones, September/October 2011, http://www.motherjones.com/politics/2011/08/fbi-terrorist-informants. “FBI Organizes Almost All Terror Plots in the US,” RT.com, August 23, 2011, http://rt.com/usa/news/fbi-terror-report-plot-365-899/print. http://www.mediafreedominternational.org/2011/12/05/fbi-agents-responsible-for-majority-of-terrorist-plots-in-the-united-states/
  •  
    What to do when you've been given a huge budget to root out terrorists in the U.S. but can't find any? Easy, you pay rewards to those who manufacture them to specifications. The same reason there are still so many people rotting in Guantanamo Bay. The U.S. offered rewards for those who turned in "terrorists" in Iraq and Afghanistan. What better way to get rid of that pesky neighbor or that lover who jilted you and get paid for it too? 
Paul Merrell

Venezuela Strengthens Ties with China, Iran, and the Caribbean | venezuelanalysis.com - 0 views

  • Venezuela and China drafted a 10-year plan for strategic cooperation yesterday as part of the China-Venezuela High-Level Joint Commission that is meeting in Caracas through Wednesday. The plan aims to advance development in both nations by deepening partnerships in diverse sectors, including manufacturing, infrastructure, telecommunications, and oil. “We are going to address the issue of ports and airports throughout the country as well as the question of electric infrastructure,” stated Venezuelan Vice-President for Planning Ricardo Menendez. “We are going to be working on the topic of telecommunications," he added, outlining plans for technological exchange in diverse areas, including providing students with digital tablets, building related factories, and constructing undersea cables to connect Venezuela with Caribbean nations. Also on the agenda are plans to expand joint oil projects as well as initiatives to kickstart Venezuela’s domestic production, particularly in the areas of cement, iron, aluminum, and paper.
  • Over the last decade, Venezuela under Chavez and Maduro has sought to strategically reorient its economy towards China, signing over 400 cooperation agreements encompassing a wide array of sectors, including energy, education, health, trade, housing, agriculture, manufacturing, infrastructure, sports, research, and cultural exchange. Since 2007, China has provided Venezuela with $45 billion in loans reportedly to finance development. In return, Venezuela exports over 600,000 barrels of oil a day to the rising economic giant. Relations between Venezuela and China were elevated to a comprehensive strategic partnership last July during a special visit by Chinese President Xi Jinping.
  •  
    So much for the Monroe Doctrine.
Gary Edwards

How the Money Vanished - The Bear Stearns "House of Cards" story by William Cohan - 0 views

  • At 2:00 a.m. on Friday -- Mr. Cohan tells us -- Mr. Geithner called Donald Kohn, the vice chairman of the Federal Reserve, and told him that he "wasn't confident that the fallout from the bankruptcy of Bear Stearns could be contained." Taxpayers reading this fascinating tale may wonder whether the fallout from the government's intervention can be contained and, if so, at what cost.
  •  
    Meeting the characters in "House of Cards," it's not easy to conceive of people less deserving of federal assistance. In 1997, Bear Stearns helped pioneer the subprime mortgage-backed security by serving as co-underwriter on a $385 million offering. By the mid-2000s, Bear was the leading issuer of such securities and a leader in collateralized debt obligations, which offered even less transparency to investors. Bear was a vertically integrated manufacturer of mortgage chaos, making individual loans to home buyers, servicing the loans, bundling them into pools for investors, marketing the securities and also borrowing huge sums to finance internal hedge funds that held onto these dodgy assets. House of Cards By William D. Cohan (Doubleday, 468 pages, $27.95) Mr. Cohan describes the succession of government policies that encouraged Bear and others to invest so heavily in mortgage finance, from the Fed's easy money to Clinton-era changes to the Community Reinvestment Act requiring more loans to low-income borrowers. But the firm itself deserves the lion's share of the blame for its own collapse. Suggestions to sell some of its risky mortgage assets, or to raise capital, or to consider merger partners were brushed aside in the years and months leading up to the debacle. Paul Friedman, chief operating officer of Bear's fixed-income division, tells Mr. Cohan that "we did this to ourselves. . . . It's our fault for allowing it to get this far, and for not taking any steps to do anything about it."
Gary Edwards

U.S. reverses stance on treaty to regulate arms trade | Reuters - 0 views

  •  
    This article is more than 2-1/2 months old yet this is the first I've heard of it.  Pretty frightening "end-run" the administration is trying. Obama Finds Legal Way Around The 2nd. Amendment and Uses It. http://www.reuters.com/article/politicsNews/idUSTRE59E0Q920091015 On Wednesday the Obama administration took its first major step in a plan to ban all firearms in the United States . The Obama administration intends to force gun control and a complete ban on all weapons for US citizens through the signing of international treaties with foreign nations. By signing international treaties on gun control, the Obama administration can use the US State Department to bypass the normal legislative process in Congress. Once the US Government signs these international treaties, all US citizens will be subject to those gun laws created by foreign governments. These are laws that have been developed and promoted by organizations such as the United Nations and individuals such as George Soros and Michael Bloomberg. The laws are designed and intended to lead to the complete ban and confiscation of all firearms.  The Obama administration is attempting to use tactics and methods of gun control that will inflict major damage to our 2nd Amendment before US citizens even understand what has happened. Obama can appear before the public and tell them that he does not intend to pursue any legislation (in the United States) that will lead to new gun control laws, while cloaked in secrecy, his Secretary of State, Hillary Clinton is committing the US to international treaties and foreign gun control laws. Does that mean Obama is telling the truth? What it means is that there will be no publicized gun control debates in the media or votes in Congress. We will wake up one morning and find that the United States has signed a treaty that prohibits firearm and ammunition manufacturers from selling to the public. We will wake up another morning and find that the US has signed a treaty that pro
« First ‹ Previous 41 - 60 of 196 Next › Last »
Showing 20 items per page