Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged matching

Rss Feed Group items tagged

Paul Merrell

Alternate Unemployment Charts - 0 views

  • Alternate Unemployment Charts The seasonally-adjusted SGS Alternate Unemployment Rate reflects current unemployment reporting methodology adjusted for SGS-estimated long-term discouraged workers, who were defined out of official existence in 1994. That estimate is added to the BLS estimate of U-6 unemployment, which includes short-term discouraged workers. The U-3 unemployment rate is the monthly headline number. The U-6 unemployment rate is the Bureau of Labor Statistics’ (BLS) broadest unemployment measure, including short-term discouraged and other marginally-attached workers as well as those forced to work part-time because they cannot find full-time employment. Unemployment Data Series   (Subscription required.)  View  Download Excel CSV File   Last Updated: April 3rd, 2015 The ShadowStats Alternate Unemployment Rate for January 2015 is 23.2%.
  •  
    Real unemployment in the U.S. now roughly matches that during the Great Depression, 23.2 per cent.
Paul Merrell

Running for Cover: A Sham Air Force Summit Can't Fix the Close Air Support Gap Created ... - 0 views

  • “I can’t wait to be relieved of the burdens of close air support,” Major General James Post, the vice commander of Air Combat Command (ACC), allegedly told a collection of officers at a training session in August 2014. As with his now notorious warning that service members would be committing treason if they communicated with Congress about the successes of the A-10, Major General Post seems to speak for the id of Air Force headquarters’ true hostility towards the close air support (CAS) mission. Air Force four-stars are working hard to deny this hostility to the public and Congress, but their abhorrence of the mission has been demonstrated through 70 years of Air Force headquarters’ budget decisions and combat actions that have consistently short-changed close air support. For the third year in a row (many have already forgotten the attempt to retire 102 jets in the Air Force’s FY 2013 proposal), the Air Force has proposed retiring some or all of the A-10s, ostensibly to save money in order to pay for “modernization.” After failing to convince Congress to implement their plan last year (except for a last minute partial capitulation by retiring Senate and House Armed Services Committee chairmen Senator Carl Levin (D-MI) and Representative Buck McKeon (R-CA)) and encountering uncompromising pushback this year, Air Force headquarters has renewed its campaign with more dirty tricks.
  • First, Air Force headquarters tried to fight back against congressional skepticism by releasing cherry-picked data purporting to show that the A-10 kills more friendlies and civilians than any other U.S. Air Force plane, even though it actually has one of the lowest fratricide and civilian casualty rates. With those cooked statistics debunked and rejected by Senate Armed Services Chairman Senator John McCain (R-AZ), Air Force headquarters hastily assembled a joint CAS “Summit” to try to justify dumping the A-10. Notes and documents from the Summit meetings, now widely available throughout the Air Force and shared with the Project On Government Oversight’s Center for Defense Information (CDI), reveal that the recommendations of the Summit working groups were altered by senior Air Force leaders to quash any joint service or congressional concerns about the coming gaps in CAS capabilities. Air Force headquarters needed this whitewash to pursue, yet again, its anti-A-10 crusade without congressional or internal-Pentagon opposition.
  • The current A-10 divestment campaign, led by Air Force Chief of Staff Mark Welsh, is only one in a long chain of Air Force headquarters’ attempts by bomber-minded Air Force generals to get rid of the A-10 and the CAS mission. The efforts goes as far back as when the A-10 concept was being designed in the Pentagon, following the unfortunate, bloody lessons learned from the Vietnam War. For example, there was a failed attempt in late-1980s to kill off the A-10 by proposing to replace it with a supposedly CAS-capable version of the F-16 (the A-16). Air Force headquarters tried to keep the A-10s out of the first Gulf War in 1990, except for contingencies. A token number was eventually brought in at the insistence of the theater commander, and the A-10 so vastly outperformed the A-16s that the entire A-16 effort was dismantled. As a reward for these A-10 combat successes, Air Force headquarters tried to starve the program by refusing to give the A-10 any funds for major modifications or programmed depot maintenance during the 1990s. After additional combat successes in the Iraq War, the Air Force then attempted to unload the A-10 fleet in 2004.
  • ...12 more annotations...
  • To ground troops and the pilots who perform the mission, the A-10 and the CAS mission are essential and crucial components of American airpower. The A-10 saves so many troop lives because it is the only platform with the unique capabilities necessary for effective CAS: highly maneuverable at low speeds, unmatched survivability under ground fire, a longer loiter time, able to fly more sorties per day that last longer, and more lethal cannon passes than any other fighter. These capabilities make the A-10 particularly superior in getting in close enough to support our troops fighting in narrow valleys, under bad weather, toe-to-toe with close-in enemies, and/or facing fast-moving targets. For these reasons, Army Chief of Staff General Ray Odierno has called the A-10 “the best close air support aircraft.” Other Air Force platforms can perform parts of the mission, though not as well; and none can do all of it. Senator Kelly Ayotte (R-NH) echoed the troops’ combat experience in a recent Senate Armed Services committee hearing: “It's ugly, it's loud, but when it comes in…it just makes a difference.”
  • In 2014, Congress was well on the way to roundly rejecting the Air Force headquarters’ efforts to retire the entire fleet of 350 A-10s. It was a strong, bipartisan demonstration of support for the CAS platform in all four of Congress’s annual defense bills. But in the final days of the 113th Congress, a “compromise” heavily pushed by the Air Force was tucked into the National Defense Authorization Act for FY 2015. The “compromise” allowed the Air Force to move A-10s into virtually retired “backup status” as long as the Cost Assessment and Program Evaluation (CAPE) office in DoD certified that the measure was the only option available to protect readiness. CAPE, now led by former Assistant Secretary of the Air Force for Financial Management and Comptroller Jamie Morin, duly issued that assessment—though in classified form, thus making it unavailable to the public. In one of his final acts as Secretary of Defense, Chuck Hagel then approved moving 18 A-10s to backup status.
  • The Air Force intends to replace the A-10 with the F-35. But despite spending nearly $100 billion and 14 years in development, the plane is still a minimum of six years away from being certified ready for any real—but still extremely limited—form of CAS combat. The A-10, on the other hand, is continuing to perform daily with striking effectiveness in Afghanistan, Iraq, and Syria—at the insistence of the CENTCOM commander and despite previous false claims from the Air Force that A-10s can’t be sent to Syria. A-10s have also recently been sent to Europe to be available for contingencies in Ukraine—at the insistence of the EUCOM Commander. These demands from active theaters are embarrassing and compelling counterarguments to the Air Force’s plea that the Warthog is no longer relevant or capable and needs to be unloaded to help pay for the new, expensive, more high-tech planes that Air Force headquarters vastly prefers even though the planes are underperforming.
  • So far, Congress has not been any more sympathetic to this year’s continuation of General Welsh’s campaign to retire the A-10. Chairman McCain rejected the Air Force’s contention that the F-35 was ready enough to be a real replacement for the A-10 and vowed to reverse the A-10 retirement process already underway. Senator Ayotte led a letter to Defense Secretary Ashton Carter with Senators Tom Cotton (R-AR), Lindsey Graham (R-SC), Thom Tillis (R-NC), Roger Wicker (R-MS), Mike Crapo (R-ID), Johnny Isakson (R-GA), and Richard Burr (R-NC) rebuking Hagel’s decision to place 18 A-10s in backup inventory. Specifically, the Senators called the decision a “back-door” divestment approved by a “disappointing rubber stamp” that guts “the readiness of our nation’s best close air support aircraft.” In the House, Representative Martha McSally (R-AZ) wrote to Secretary Carter stating that she knew from her own experience as a former A-10 pilot and 354th Fighter Squadron commander that the A-10 is uniquely capable for combat search and rescue missions, in addition to CAS, and that the retirement of the A-10 through a classified assessment violated the intent of Congress’s compromise with the Air Force:
  • Some in the press have been similarly skeptical of the Air Force’s intentions, saying that the plan “doesn’t add up,” and more colorfully, calling it “total bullshit and both the American taxpayer and those who bravely fight our wars on the ground should be furious.” Those reports similarly cite the Air Force’s longstanding antagonism to the CAS mission as the chief motive for the A-10’s retirement.
  • By announcing that pilots who spoke to Congress about the A-10 were “committing treason,” ACC Vice Commander Major General James Post sparked an Inspector General investigation and calls for his resignation from POGO and other whistleblower and taxpayer groups. That public relations debacle made it clear that the Air Force needed a new campaign strategy to support its faltering A-10 divestment campaign. On the orders of Air Force Chief of Staff General Mark Welsh, General Herbert “Hawk” Carlisle—the head of Air Combat Command—promptly announced a joint CAS Summit, allegedly to determine the future of CAS. It was not the first CAS Summit to be held (the most recent previous Summit was held in 2009), but it was the first to receive so much fanfare. As advertised, the purpose of the Summit was to determine and then mitigate any upcoming risks and gaps in CAS mission capabilities. But notes, documents, and annotated briefing slides reviewed by CDI reveal that what the Air Force publicly released from the Summit is nothing more than a white-washed assessment of the true and substantial operational risks of retiring the A-10.
  • Just prior to the Summit, a working group of approximately 40 people, including CAS-experienced Air Force service members, met for three days at Davis-Monthan Air Force Base to identify potential risks and shortfalls in CAS capabilities. But Air Force headquarters gave them two highly restrictive ground rules: first, assume the A-10s are completely divested, with no partial divestments to be considered; and second, assume the F-35 is fully CAS capable by 2021 (an ambitious assumption at best). The working groups included A-10 pilots, F-16 pilots, and Joint Terminal Attack Controllers (JTACs), all with combat-based knowledge of the CAS platforms and their shortfalls and risks. They summarized their findings with slides stating that the divestment would “cause significant CAS capability and capacity gaps for 10 to 12 years,” create training shortfalls, increase costs per flying hour, and sideline over 200 CAS-experienced pilots due to lack of cockpits for them. Additionally, they found that after the retirement of the A-10 there would be “very limited” CAS capability at low altitudes and in poor weather, “very limited” armor killing capability, and “very limited” ability to operate in the GPS-denied environment that most experts expect when fighting technically competent enemies with jamming technology, an environment that deprives the non-A-10 platforms of their most important CAS-guided munition. They also concluded that even the best mitigation plans they were recommending would not be sufficient to overcome these problems and that significant life-threatening shortfalls would remain.
  • General Carlisle was briefed at Davis-Monthan on these incurable risks and gaps that A-10 divestment would cause. Workshop attendees noted that he understood gaps in capability created by retiring the A-10 could not be solved with the options currently in place. General Carlisle was also briefed on the results of the second task to develop a list of requirements and capabilities for a new A-X CAS aircraft that could succeed the A-10. “These requirements look a lot like the A-10, what are we doing here?” he asked. The slides describing the new A-X requirements disappeared from subsequent Pentagon Summit presentations and were never mentioned in any of the press releases describing the summit.
  • At the four-day Pentagon Summit the next week, the Commander of the 355th Fighter Wing, Davis-Monthan Air Force Base, Col. James P. Meger, briefed lower level joint representatives from the Army and the Marine Corps about the risks identified by the group at Davis-Monthan. Included in the briefing was the prediction that divestment of the A-10 would result in “significant capability and capacity gaps for the next ten to twelve years” that would require maintaining legacy aircraft until the F-35A was fully operational. After the presentation, an Army civilian representative became concerned. The slides, he told Col. Meger, suggested that the operational dangers of divestment of the A-10 were much greater than had been previously portrayed by the Air Force. Col. Meger attempted to reassure the civilian that the mitigation plan would eliminate the risks. Following the briefing, Col. Meger met with Lt. Gen. Tod D. Wolters, the Deputy Chief of Staff for Operations for Air Force Headquarters. Notably, the Summit Slide presentation for general officers the next day stripped away any mention of A-10 divestment creating significant capability gaps. Any mention of the need to maintain legacy aircraft, including the A-10, until the F-35A reached full operating capability (FOC) was also removed from the presentation.
  • The next day, Col. Meger delivered the new, sanitized presentation to the Air Force Chief of Staff. There was only muted mention of the risks presented by divestment. There was no mention of the 10- to 12-year estimated capability gap, nor was there any mention whatsoever of the need to maintain legacy aircraft—such as the A-10 or less capable alternatives like the F-16 or F-15E—until the F-35A reached FOC. Other important areas of concern to working group members, but impossible to adequately address within the three days at Davis-Monthan, were the additional costs to convert squadrons from the A-10 to another platform, inevitable training shortfalls that would be created, and how the deployment tempos of ongoing operations would further exacerbate near-term gaps in CAS capability. To our knowledge, none of these concerns surfaced during any part of the Pentagon summit.
  • Inevitably, the Air Force generals leading the ongoing CAS Summit media blitz will point congressional Armed Services and Appropriations committees to the whitewashed results of their sham summit. When they do, Senators and Representatives who care about the lives of American troops in combat need to ask the generals the following questions: Why wasn’t this summit held before the Air Force decided to get rid of A-10s? Why doesn’t the Air Force’s joint CAS summit include any statement of needs from soldiers or Marines who have actually required close air support in combat? What is the Air Force’s contingency plan for minimizing casualties among our troops in combat in the years after 2019, if the F-35 is several years late in achieving its full CAS capabilities? When and how does the Air Force propose to test whether the F-35 can deliver close support at least as combat-effective as the A-10’s present capability? How can that test take place without A-10s? Congress cannot and should not endorse Air Force leadership’s Summit by divesting the A-10s. Instead, the Senate and House Armed Services Committees need to hold hearings that consider the real and looming problems of inadequate close support, the very problems that Air Force headquarters prevented their Summit from addressing. These hearings need to include a close analysis of CAPE’s assessment and whether the decision to classify its report was necessary and appropriate. Most importantly, those hearings must include combat-experienced receivers and providers of close support who have seen the best and worst of that support, not witnesses cherry-picked by Air Force leadership—and the witnesses invited must be free to tell it the way they saw it.
  • If Congress is persuaded by the significant CAS capability risks and gaps originally identified by the Summit’s working groups, they should write and enforce legislation to constrain the Air Force from further eroding the nation’s close air support forces. Finally, if Congress believes that officers have purposely misled them about the true nature of these risks, or attempted to constrain service members’ communications with Congress about those risks, they should hold the officers accountable and remove them from positions of leadership. Congress owes nothing less to the troops they send to fight our wars.
  •  
     Though not touched on in the article, the real problem is that the A10 has no proponents at the higher ranks of the Air Force because it is already bought and paid for; there's nothing in the A10 for the big Air Force aircraft manufacturing defense contractors. The F35, on the other hand is, is a defense contractor wet dream. It's all pie in the sky and big contracts just to get the first one in the air, let alone outfit it with the gear and programming needed to use it to inflict harm. It's been one cost-overrun after another and delay after delay. It's a national disgrace that has grown to become the most expensive military purchase in history. And it will never match the A10 for the close air support role. It's minimum airspeed is too high and its close-in maneuverability will be horrible. The generals, of course, don't want to poison the well for their post-military careers working for the defense contractors by putting a halt to the boondobble. Their answer: eliminate the close air support mission for at least 10-12 years and then attempt it with the F35.   As a former ground troop, that's grounds for the Air Force generals' court-martial and dishonorable discharge. I would not be alive today were it not for close air support. And there are tens of thousands of veterans who can say that in all truth. The A10 wasn't available back in my day, but by all reports its the best close air support weapons platform ever developed. It's a tank killer and is heavily armored, with redundant systems for pilot and aircraft survivability. The A10 is literally built around a 30 mm rotary cannon that fires at 3,900 rounds per minute. It also carries air to ground rockets and is the only close air support aircraft still in the U.S. arsenal. Fortunately, John McCain "get it" on the close air support mission and has managed to mostly protect the A10 from the generals. If you want to learn  more about the F35 scandal, try this Wikipedia article section; although it's enoug
Paul Merrell

Storie di censure, petizioni, Elmetti bianchi e "catene di affetti" - SIBIALIRIA - 0 views

  • Much is due to the fame of the White Helmets Syrians, if they're coming in a few days than 1.5 million signatures the petition on Avaaz  Protect Aleppo's children, now! Asking for no-fly zone (a successful workhorse for Avaaz also to time of Libya, on the basis of false information). And award-winning source doc The White Helmets or white helmets, autodefinitisi Syria Civil Defense, active in areas controlled Syrian armed opposition, have recently received the Right Livelihood Award , or "alternative Nobel", normally assigned since 1990 to people who have really helped mankind - the first to receive it were an Egyptian architect of the poor and organization solutions for the vegetable against world hunger. In the words of the founder, " the award is intended to help the North find a wisdom to match the science he possesses, and the South to find a science to match the ancient wisdom that has ." Good intentions. The White Helmets Syrians are the "source" credited with many of the news coming from Aleppo East - for example on the use of "barrel bomb" or the "deliberate shelling of hospitals" - days ago in a twitter have put together the two crimes talking about a cowardly "attack on a hospital with bomb barrels." To be believed on bombs and hospital nature of the affected buildings, the helmets do not need proof, just a few photos of rubble. Of course, what they fail to tell the same International Red Cross admitted to our question (we preserve their email): the 'hospitals' in opposition areas are in no way signaled, rather they are well hidden.
  • Those who support them and what they really do, they know a few. censored The White Helmets spread video in which always appear in the rubble with babies in their arms (parents, where are they?). But, nevertheless, their deeds are other videos that are real autodenunce, but that the world has chosen to ignore, or to censor. It 'just been cleared from the site of Change the petition that the anti-war activists network Syria Solidarity Movement had addressed to the organizers of the Nobel Prize (which have already been received from: Obama, Kissinger, pears, European Union ...). The petition was titled very clearly , " Do not give the Nobel Prize in 2016 to the Syrian White Helmets ". But a few days, if you try to type on the search engine, you will see this inscription: " The petition is not available ." The authors denounce the removal, stating : " He had collected 2,800 signatures and thousands of comments. This is a clear case of censorship . " So we summarize the news on the White Helmets contained in the aforesaid petition, supported with a video (more pictures can be found at the link above). Activists wrote: " Please watch the video of Steve Ezzedine Al Qaeda with a facelift  . The White Helmets will say neutral, independent, self-financed, exclusively civilian. It does not. Have received more than $ 40 million from USAID and the British Foreign Office, entities directly involved in the conflict in Syria. I am not helpless: there are photographs and films of the group members who support Al Nusra Front / Al Qaeda. More photos and video showing their 'activists' while attending the execution of civilians or while cheering on the bodies of dead soldiers. The White Helmets work only in areas controlled by armed extremist groups. Fomenting sectarianism in Syria, asking for example to set fire Kafarya and Foua two Shiite villages besieged by five years in the area of Idlib. They have repeatedly called for the no-fly zone in Libya, whose results are seen. " Added: the White Helmets or Syria Civil Defense are the highlight of the stated Maydayrescue , organization "humanitarian" founded by former British Colonel James Le Mesurier based in Dubai and Amsterdam, and training centers in Turkey and Jordan.
  • How did you do? One explanation for this world enchantment for a group to say the least objectionable? And 'the effect' chain of suffering. " In April their leader Raed Saleh had been invited to the United States to pick up a humanitarian award assigned by InterAction, a platform of 180 non-governmental organizations with development projects in all countries of the world "The voice united for global change with lay and religious members, small and large, engaged with the most vulnerable populations. " (For a mixup in communication, Saleh had been dismissed as a suspect of terrorism immigration Use on arrival. Then the US State Department had the face to say that this was not about the White Helmets). Interaction between members of perhaps counted on the fingers of one hand those that have to do with the Syrian armed opposition. There is, for example, the Syrian American Medical Association, specializes in the complaints of hospitals bombed. But all the other organizations that Syria do not know and do not mind (because maybe riforestano the Sahel, or dealing with the blind, or fair trade in Asia, Latin America or build latrines) they trust their sisters' informed ». And so, in one stroke, 180 NGOs all over the world take the White Helmets as heroes, they spread the word ...
Paul Merrell

Is the U.S. Actively Trying to Prolong the Syrian Civil War? | Mother Jones - 0 views

  • Why is President Obama escalating U.S. involvement in the Syrian civil war? Dan Drezner offers this take, which he's been murmuring about occasionally for the past year: [Obama's goal] is to ensnare Iran and Hezbollah into a protracted, resource-draining civil war, with as minimal costs as possible. This is exactly what the last two years have accomplished.... at an appalling toll in lives lost. This policy doesn't require any course correction... so long as rebels are holding their own or winning. A faltering Assad simply forces Iran et al into doubling down and committing even more resources....For the low, low price of aiding and arming the rebels, the U.S. preoccupies all of its adversaries in the Middle East.
  • ....Now let's be clear: to describe this as "morally questionable" would be an understatement. It's a policy that makes me very uncomfortable... until one considers the alternatives. What it's not, however, is a return to liberal hawkery. In a nutshell, the idea here is that we want both sides to be evenly matched so the fighting continues as long as possible. That will weaken pretty much everyone we hate: Assad, Hezbollah, Iran, and the Al Qaeda groups among the rebels. As long as these folks continue killing each other, we're happy. Is it a sign of terminal naiveté that I find myself unable to believe that this is conscious Obama administration policy? Or has Drezner simply been watching too much Game of Thrones?
  •  
    This perceptive read on the situation in Syria is very much in line with long-term Israeli foreign policy: the destabilization and balkanization of its Islamic neighbors whilst Israel builds power and empire to become the reigning superpower in the Mideast. 
Paul Merrell

Asia Times Online :: Orwell does America - 0 views

  • Welcome to the sweet abyss of an Orwellian vortex. 2013 increasingly looks like 1984. In two previous articles, for RT RT and for Asia Times Online I have looked into the superimposed levels of blowback implied by the Boston bombing. With still so many unanswered questions regarding what took place on the ground in Boston after the bombing, it's time to look at an extra, possible Top Ten list of lingering absurdities. And this without sidestepping other unanswered crucial questions, such as why a bomb drill - organized by Craft - was going on during the marathon at which the bombing took place; and why it was <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> vehemently denied that a bomb drill was going on. For this current set of questions, I'm grateful for the help of Asia Times Online's Bostonian readers.
  • 2. Since 9/11, the preferred FBI modus operandi is to use informants to lure ''potential'' terra-rists to act. See for example the Fast and Furious<-style Iran cum Mexican cartel plot. There's a strong possibility the Tsarnaev brothers were set up. In this case, is there anyone anywhere among the vast US intel apparatus investigating the FBI investigators?
  • 4. A Saudi student, injured at the bombing, who was in the US via a legal student visa, is suddenly deported on ''national security grounds'', even as investigators found ''unusual burns'' on his hand inconsistent with the injuries of other victims. He may have been a member of a Saudi clan notorious for its al-Qaeda connections. The FBI ''investigation'' is suddenly dropped shortly after the Saudi ambassador in the US held an unscheduled meeting with President Barack Obama. Add to it that even before the smoke had cleared, the Israel Lobby and the notorious disinformation website DEBKA were pointing their fingers at ''domestic terrorists with Middle East connections''.
  • ...3 more annotations...
  • 5. The description of the car hijacked by the brothers, a Mercedes E350 SUV, matches the description of their car left at a service station in Cambridge for two weeks prior to the bombing. A mechanic in Cambridge said Dzhokhar, Tamerlan's brother, picked up his "black Mercedes SUV" on Tuesday, the day after the marathon. The two cars may be one and the same; that blows up the whole official ''carjacking'' narrative. 6. Additionally, there's a media blackout on the owner of the allegedly hijacked Mercedes, who in theory managed to escape and call the police, who maintains that the brothers went to three ATMs and withdrew US$800 from his account - not before telling him they were the ''marathon bombers and had killed an MIT police''. The driver said he was let off at a gas station on Memorial Drive in Cambridge. But some witnesses saw Dzhokhar at the station's convenience store - without any driver. Then the narrative of the brothers robbing a convenience store was revealed to be false. Police scanners referred to a "black top" person. Still, the official narrative is that the Tsarnaev brothers were at the same place and the same time of the robbery.
  • 9. The whole law enforcement apparatus insisted that there was a heavy exchange of gunfire with Dzokhar while he was hiding in a boat, before his arrest. That is false. He was unarmed, barely moving and the hail of bullets towards the boat came from the police.
  • Do the martial dance What the day-long delay in Dzhokhar's arrest indeed made possible was to turn Watertown into a monster dry run for urban martial law - euphemized as ''lockdown'' - in a very near future. As total militarization of civilian life goes - featuring, for instance, Homeland Security running amok with hundreds of armored vehicles - this was a major success. Meanwhile, on the ''legal'' front, the White House and the Justice Department are firmly on track to finally suppress the Miranda warning; that went into effect already two years ago, when an Obama secret executive order ruled the Miranda warning would not apply to suspected terrorists. Dzhokhar is a ''suspected'' terrorist - now charged with using and conspiring to use a weapon of mass destruction, yet already convicted by corporate media. Welcome to Police State USA - where at least everyone still has the right to go out shopping. For now.
Gary Edwards

The Ruling Class Consensus On Domestic Spying | Online Library of Law and Liberty - 0 views

  • This means that the US government’s vast apparatus is almost completely useless against serious terrorists or criminals, and useful primarily to do whatever the government might choose to innocent persons.
    • Gary Edwards
       
      Bold statement, but then how did the Fort Hood massacre and Boston Marathon massacre occur?  Plenty of email and phone call evidence in both cases.  Yet the government was caught totally unaware.  I guess it really depends on who the watchers are watching.  Proof is slowly being gathered that the watchers are watching those whom the government elites seek to destroy through blackmail, intimidation (IRS anyone?), and breach of Constitutional rights (take your pick of any three letter government agency acronym you like).
  • Ever since the 1970s, the art of code-making has surpassed the art of code-breaking – period.
  • Hence, on the high end, anyone can purchase voice and internet communications software that are beyond the capacity of anyone to access without an electronic key.
  • ...13 more annotations...
  • If collection is universal, the collectors don’t have to explain to others (or even to themselves) why they are targeting this person or group and not another. Possessing the data in secret, they can then decide in secret who they are really interested in.
  • That flight from responsibility is also why, in 1978, the intelligence agencies pressed Congress to pass the Foreign Intelligence Surveillance Act (FISA), under which the agencies submit their requests for detailed targeting, in secret, to a court that decides ex parte and in secret.
  • the FISA court. But that court acts not just in secret, but ex parte – hearing only one side.
  • The relevant question about the uses of the NSA programs, then, is simply “against whom, in the broad American public, is the US government likely to turn its animus?
  • Alas, the ruling class has shown itself all too able to treat domestic opponents as public enemies. But that is another story.
  • Another, PRISM, gives access to all records of email, chat, photos, videos and file transfers from the servers of leading US internet companies.
  • From Barack Obama to Karl Rove, the ruling class is in unison: The NSA’s collection of data on virtually all Americans is essential to preventing you from “being blown to smithereens on your morning commute”
  • Project Constant Informant, which tracks essentially all American phone calls, allows matching the account holder’s identity with each call’s precise location in time and place.
  • Here are the facts.
  • These programs stand between Americans and terrorists. Worries that they will be misused are misplaced or downright kooky.
  • In the words of General Keith Alexander, director of NSA, this surveillance has “helped to prevent” “dozens of terrorist events.”
  • anyone who has followed telecommunication technology and intelligence during the past three decades can only scoff at the claim that universal collection of telephone externals and access to internet traffic can thwart serious criminals or terrorists.
  • In fact, the expansion of the US government’s capacity to intrude on innocent communications happened just as technology enabled competent persons who intend to hide their communications to do so without fail.
Paul Merrell

Asia Times Online :: Our man in Quito - 0 views

  • HONG KONG - So it's going to be Our Man in Quito. The narrative may not be as elegant as Graham Greene's, but the plot certainly beats the Bourne trilogy - because it's happening live, in real time, right in front of our eyes. It takes a former CIA asset to beat US "intelligence" - more like intel deprivation. The story of Edward Snowden's escape from Hong Kong is textbook. This correspondent, at dim sum on Sunday, was alerted by a source; "Get ready for something big; he's leaving soon." That was about 12:30 pm Hong Kong time. In fact Snowden had already flown from Chek Lap Kok on SU 213 <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> bound for Moscow at 11:00 am. But nobody knew it yet. Hong Kong was still digesting the front page of the South China Morning Post displaying yet more devastating evidence of US cyber-spying of China.
  • Asia Times Online had also learned from another source close to Snowden's tight circle that a short stint in Hong Kong was always part of Plan A; he never intended to ask for political asylum in either Hong Kong or China. He was already focused on a "third country". What he did was to use Hong Kong as an ideal platform to unveil the inner workings of the Orwellian/Panopticon US surveillance state. First a set of general revelations to The Guardian. Then he went underground to prepare his escape - as he knew Washington would come after him with all guns (drones?) blazing. And then, a final set of revelations to the South China Morning Post closely focused on Asia and China. When Washington woke up to it, he was already out of the building. Jason Bourne, eat your heart out. Snowden was not "allowed to slip away". It all revolved around a meticulously timed operation involving Snowden, the Hong Kong government and WikiLeaks mediation.
  • So the US government thought it could simply intimate to Hong Kong to do it "our way or the highway" - while at the same time news of US serial hacking of Hong Kong and China was front-page news. Once again, five hours into Snowden's flight to Moscow, US corporate media was still parroting the official narrative - stressed by Obama's National Security Adviser Tom Donilon - that the noose was tightening around his neck. Whether Beijing had a subtly indirect input on the Hong Kong government's decision is open to a South China Sea of speculation. The fact is, not only was this a perfect solution for Hong Kong - which would be facing relentless pressure from the US government to extradite him - but also for Beijing, which maintains its upper-hand, furiously demanding a lot of explanations about the NSA targeting Chinese phone companies, the Asia-Pacific fiber-optic network and even Beijing's Tsinghua University.
  • ...2 more annotations...
  • The predictable fury across Capitol Hill, with plenty of "hostile nations" rhetoric coupled with the inevitable demonizing of Russian President Vladimir Putin, not to mention NSA spy chief General Keith Alexander, among the usual platitudes about "defending this nation from a terrorist attack", depicting Snowden as an " individual who is not acting, in my opinion, with noble intent" - this all reads like lazily written lines in a cheap spy thriller. For the Empire, getting a bloody eye is not taken lightly. Washington is left with wishful thinking that Moscow might detain Snowden. Rubbish. Foreign Minister Sergey Lavrov had even advanced that Russia would consider granting political asylum if Snowden asked for it. And what about this priceless quote from Dmitry Peskov, Putin's spokesman? "I know nothing." Xinhua, for its part, predictably had a field day with it; "Washington should come clean about its record first. The United States, which has long been trying to play innocent as a victim of cyber attacks, has turned out to be the biggest villain in our age."
  • Among all the excitement provoked by this thriller, one should not lose focus; the most crucial aspect of the story is Obama and spy supremo Keith Alexander swearing that the Orwellian privatized intelligence-corporate-industrial complex is essential to prevent terrorism. It is not. This is a monumental lie - and Obama is complicit. Former ambassador Joe Wilson and his wife Valerie Plame Wilson - outed by Dick Cheney's gang - certainly don't lose their focus in this timely piece. Now to Quito. Danger still looms. But once he's there, it's game, set, match - as I said in this interview. And then HBO should start casting the movie, fast. With Ryan Gosling in the lead. Snowden, of course, should write the screenplay.
  •  
    Pepe Escobar foresees a movie about what Edward Snowden has done to rival the Jason Bourne thrillers. And provides the international political context behind Snowden's escape from pursuing Feds out to punish him for blowing the whistle on their creation of an Orwellian surveillance state. The entire article is recommended reading; Pepe has an unusual talent for coming up with the information other reporters miss and telling the story in a fascinating way.    
Paul Merrell

5 Biggest Revelations from Latest Podesta Emails - 0 views

  • Wikileaks’ releases of the now infamous “Podesta Emails” have become such a regular occurrence, it’s becoming difficult to keep up. 11 “batches” have been released so far, bringing the total to 17,510 with an estimated 32,000 left to go before the US election takes place on November 8th. Though True Activist covered many of the earlier leaks, including the transcripts of Clinton’s private speeches and Clinton’s admission that the Saudis are funding ISIS, many other potentially damning revelations have since come to light. Here are the top 5 newest revelations from the last 3 email releases (#9 to 11).
  • 4. Wall Street Handpicked Obama’s Entire 2008 Cabinet Though most of the leaks thus far have been focused largely on Clinton and her campaign, some of the released emails have shed light on corruption within the Obama administration. In 2008, at the height of the financial crisis, an executive from CitiGroup emailed John Podesta one month before Podesta was named chairman of Obama’s 2008 transition team. CitiGroup, at the time, was the largest company and bank in the world by assets. The email from CitiGroup executive Michael Froman is titled “Lists.” The lists within, naming prospective candidates for cabinet positions, matches Obama’s 2008 Cabinet almost exactly. They also suggest choosing candidates of various ethnic minorities as a political tactic (see #3 above). The email proposed: Robert Gates as secretary of Defense; Eric Holder as attorney general; Janet Napolitano as secretary of Homeland Security; Rahm Emanuel as White House chief of staff; Susan Rice as United Nations ambassador; Arne Duncan as secretary of Education; Kathleen Sebelius as secretary of Health and Human Services; Peter Orszag as head of the Office of Management and Budget; Eric Shinseki as secretary of Veterans Affairs; and Melody Barnes as chief of the Domestic Policy Council. Froman offered Podesta with three possibilities for the position of Secretary of the Treasury: Robert Rubin and his close disciples Lawrence Summers and Timothy Geithner. Obama ultimately chose Geithner, who was then president of the Federal Reserve Bank of New York. Geithner, along with Bush Treasury Secretary and former Goldman Sachs CEO Henry Paulson and then-Fed Chairman Ben Bernanke, were those chiefly responsible for organizing the Wall Street bailout.
  •  
    Citibank chose Obama's 2008 cabinet. Why am I not surprised?
Paul Merrell

IMF's Lagarde guilty of 'negligence' but avoids sentence over 2008 payout - France 24 - 0 views

  • A French court on Monday convicted International Monetary Fund chief Christine Lagarde of "negligence" for her role in a controversial €400 million payout to a French tycoon in 2008 while she was finance minister. The Court of Justice did not hand down a sentence, a decision welcomed by her lawyer, Patrick Maisonneuve, as a "partial" victory. “We wanted a complete acquittal, instead we got a partial one,” said Maisonneuve. “The court has decided to not to penalise her – in fact, the court even decided this should not go on Madame Lagarde’s criminal record.” Lagarde, 60, was accused of approving a controversial €400 million ($425 million) payout to businessman Bernard Tapie in an out-of-court settlement when she was finance minister under former president Nicolas Sarkozy.
  • An arbitration panel ordered the payout to Tapie in connection with his sale of sportswear company Adidas. The panel upheld Tapie's claim that the Crédit Lyonnais bank had defrauded him by intentionally undervaluing Adidas at the time of the sale and that the state – as the bank's principal shareholder – should compensate him. It was Lagarde who, in her role as French finance minister, ordered the case to be heard by an arbitration panel instead of proceeding through the regular courts. Critics say that Lagarde ensured Tapie received preferential treatment by referring the matter to arbitration as a quid pro quo for his financial support for Sarkozy during his 2007 presidential bid. They also argue that the state should not have paid compensation to a convicted criminal who was bankrupt at the time and would not have been able to pursue the case in court. Tapie spent six months in prison in 1997 for match-fixing during his time as president of popular French football club, Olympique Marseille.
  • Tapie was placed under formal investigation for committing fraud in late June of 2013. He was ordered to pay back the money starting in December of last year. The "Tapie affair" has entangled several other high-profile figures, including Sarkozy’s ex-chief of staff Claude Guéant and Stéphane Richard, Lagarde’s former chief of staff at the finance ministry and now chief executive of Orange. Lagarde was appointed managing director of the IMF in July 2011. Lagarde served as French finance minister from June 2007 and also served as minister of foreign trade for two years. Before entering politics she worked as an anti-trust and labour lawyer, and was a partner with the international law firm of Baker & McKenzie.
Paul Merrell

Head of the IMF Christine Lagarde in court charged with embezzlement and fraud | World ... - 0 views

  • The head of the International Monetary Fund arrived in the dock of a Paris courtroom today as she braced herself to be formally charged with embezzlement and fraud.Christine Lagarde’s humiliation is not only a massive personal blow which could lead to her resignation, but one which will plunge the world’s banking system into further ignominy.
  • Lagarde faces a maximum sentence of 10 years in jail if found guilty of the very serious charges.It was when she was President Nicolas Sarkozy’s finance minister that she is said to have authorised a 270 million pounds payout to one of his prominent supporters, so abusing her government position.The money went to Bernard Tapie, a convicted football match fixer and tax dodger who supported Lagarde and Sarkozy’s UMP party.
Paul Merrell

Afghan government 'has lost territory to the insurgency' | FDD's Long War Journal - 0 views

  • The Afghan government “has lost territory to the insurgency” and “district control continues to decline,” the Special Inspector General for Afghanistan Reconstruction (SIGAR) said in its most recent quarterly report to United States Congress. An estimated 15 percent of Afghanistan’s districts have slipped from the government’s control over that time period. The picture is more bleak than what the Obama administration and top military commanders have let on when looked at from a longer distance. According to SIGAR, the Afghan government controls or influences just 52 percent of the nation’s districts today compared to 72 percent in Nov. 2015. “SIGAR’s analysis of the most recent data provided by US Forces in Afghanistan (USFOR-A) suggests that the security situation in Afghanistan has not improved this quarter,” the watchdog group noted in its most recent assessment of the country. “The numbers of the Afghan security forces are decreasing, while both casualties and the number of districts under insurgent control or influence are increasing.”
  • “[T]he ANDSF [Afghan National Defense and Security Forces] has not yet been capable of securing all of Afghanistan and has lost territory to the insurgency,” since the last reporting period. The Afghan government has lost control of more than six percent of Afghanistan’s 407 districts since SIGAR issued its last report, on Oct. 30. According to SIGAR, the insurgency, which is overwhelmingly made up of the Taliban, now controls nine districts and influences another 32, while 133 districts are “contested.” USFOR-A defines contested districts as “having ‘negligible meaningful impact from insurgents,’ contending that neither the insurgency nor the Afghan government maintains significant control over these areas.” The names of the Taliban controlled and influenced districts, as well as those that are contested, were not disclosed by USFOR-A or SIGAR.
  • The US military justified the loss of territory by claiming the Afghan government’s “new Sustainable Security Strategy” calls for abandoning districts that are “not important.” “USFOR-A attributes the loss of government control or influence over territory to the ANDSF’s strategic approach to security prioritization, identifying the most important areas that the ANDSF must hold to prevent defeat, and focusing less on areas with less strategic importance,” SIGAR reported. “Under its new Sustainable Security Strategy, the ANDSF targets ‘disrupt’ districts for clearance operations when the opportunity arises, but will give first priority to protecting ‘hold’ and ‘fight’ districts under its control.” This strategy neglects the fact that the Taliban views rural districts or those “with less strategic importance” as critical to its insurgency. The Taliban uses theses districts to raise funds, recruit and train fighters, and launch attacks on population centers. Additionally, Taliban allies such as al Qaeda run training camps and operate bases in areas under Taliban control. This strategy was explained by Mullah Aminullah Yousuf, the Taliban’s shadow governor for Uruzgan, in April 2016. The Taliban has utilized its control of the rural districts to directly threaten major population centers. Last year, the Taliban was able to threaten five of Afghanistan’s 34 provincial capitals. The government lost control of Kunduz for more than a week last fall.
  • ...1 more annotation...
  • FDD’s Long War Journal has maintained that the US military’s assessment of the state of play in Afghanistan’s districts is flawed. Our study estimates the Taliban controls 42 Afghan districts and contests (or influences) another 55. [Note: USFOR-A’s definition of “influence” matches our definition of “contested.” The term “influenced/contested” will be used for clarity to describe these districts. LWJ does not assess districts that are defined by USFOR-A as “contested,” which means neither the Taliban or Afghan government hold sway.] The number of Taliban controlled and influenced/contested districts has risen from 70 in October 2015 to 97 this month. Districts under Taliban command are typically being administered by the group, or the group controls the district center. Additionally, districts where the district center frequently changes hands are considered Taliban-controlled. In influenced/contested districts, the Taliban dominates all of the areas of a district except the administrative center.
Paul Merrell

Putin meets his defence chiefs, Russia prepares response to US Syrian missile strike - 0 views

  • Yesterday, within hours of the US missile attack on Syria’s Sharyat air base, President Putin met with Russia’s Security Council to discuss the US attack.
  • There has been some speculation in the West that the US missile strike on Syria will lead to a reappraisal of Russian policy and will give the US more leverage in negotiations over Syria with the Russians. The Kremlin’s summary of the discussion at Russia’s Security Council suggests that nothing could be further from the truth.  Not only do the Russians qualify the US attack as “aggression and a violation of international law”.  The words “the meeting also considered various issues related to the Russian Aerospace Forces’ continuing operation to support counterterrorism operations by the Syrian armed forces” suggest that far from planning a pull-back the Russians are intent on escalation.  The very first step the Russians took after the Security Council meeting – and which was undoubtedly ordered by it – the closure of the hotline between the US and Russian militaries in Syria – suggests the same thing. The reason for that decision by the way is that the Russians almost certainly feel that the US used information provided by the Russians through the hotline to determine where Russian military personnel are posted in Syria.  In that way the US was able to strike at Sharyat air base knowing there were either no or very few Russian personnel there.  The Russians would see no reason to ‘help’ the US carry out more air or missile strikes on Syria by providing them with that sort of information in future, and they have now taken the necessary steps to ensure that that information is no longer provided.
  • Another decision which we know that the Security Council took was to take measures to beef up Syria’s air defence forces.  The Russian military has already announced that this is what is going to happen, and over the next few weeks steps to that effect will start to be taken. The fundamental mistake Western pundits who press for military escalation by the West in Syria repeatedly make is that they consistently underestimate the other side’s resolve.  Ever since the start of the Syrian conflict every move the Western powers and their Gulf and Turkish allies have made in their campaign to overthrow President Assad’s government has been at least matched by an equivalent and often stronger counter-move, whether taken by the Syrians or by the Syrians’ Russian and Iranian allies.  Those who know the history of the Vietnam war will be familiar with this pattern, and with the Western blindness which leads to it.  In the decades since the Vietnam war ended nothing in that respect seems to have changed.
Paul Merrell

Koch-funded climate change skeptic reverses course - latimes.com - 0 views

  • The verdict is in: Global warming is occurring and emissions of greenhouse gases caused by human activity are the main cause. This, according to Richard A. Muller, professor of physics at UC Berkeley, MacArthur Fellow and co-founder of the Berkeley Earth Surface Temperature project. Never mind that the United Nations Intergovernmental Panel on Climate Change and hundreds of other climatologists around the world came to such conclusions years ago. The difference now is the source: Muller is a long-standing, colorful critic of prevailing climate science, and the Berkeley project was heavily funded by the Charles Koch Charitable Foundation, which, along with its libertarian petrochemical billionaire founder Charles G. Koch, has a considerable history of backing groups that deny climate change. 
  • In an opinion piece in Saturday’s New York Times titled “The Conversion of a Climate-Change Skeptic,” Muller writes: “Three years ago I identified problems in previous climate studies that, in my mind, threw doubt on the very existence of global warming. Last year, following an intensive research effort involving a dozen scientists, I concluded that global warming was real and that the prior estimates of the rate of warming were correct. I’m now going a step further: Humans are almost entirely the cause.”
  • Muller’s New York Times commentary follows research he did last year that confirmed the work of scientists who found the Earth’s temperature was rising. In the past, Muller had criticized which global temperatures were used in such research, contending that some monitoring stations provided inaccurate data.  Now, Berkeley’s research has weighed in on the causes of the temperature rise, testing arguments climate contrarians have used. “What has caused the gradual but systematic rise of two and a half degrees?” Muller writes. “We tried fitting the shape to simple math functions (exponentials, polynomials), to solar activity and even to rising functions like world population. By far the best match was to the record of atmospheric carbon dioxide, measured from atmospheric samples and air trapped in polar ice.”
Paul Merrell

How Many Americans Does The N.S.A. Spy On? A Lot of Them : The New Yorker - 0 views

  • but reading the new documents, which include a secret FISA court order that amounts to a gift certificate for one year of warrant-free spying, it becomes clear that many more “United States persons” have their communications monitored, and on much vaguer grounds, than the Obama Administration has acknowledged. “What I can say unequivocally is that, if you are a U.S. person, the N.S.A. cannot listen to your telephone calls, and the N.S.A. cannot target your e-mails,” the President said earlier this week. A 2009 memorandum signed by Eric Holder establishes a broader criteria, referring to people “reasonably believed” to be located abroad. That reasonable belief, as it turns out, can be quite shaky. Among the information that the N.S.A. is told to use includes having had a phone or e-mail connection with a person “associated with a foreign power or foreign territory,” or being in the “‘buddy list’ or address book” of such a person. It won’t be lost on anyone that Americans whose families include recent immigrants will be disproportionately vulnerable to such intrusions. (So, incidentally, will journalists.) The defaults in the analysis are telling: a person
  • whose location is unknown, will not be treated as a United States person unless such person can be positively identified as such, or the nature or circumstances of the person’s give rise to a reasonable belief that such person is a United States person. (The extent to which the N.S.A. can spy on a wide range of foreigners is its own, important discussion.) The criteria also show the interaction of various N.S.A. programs: the Administration has defended the collection of telephony metadata by saying that if it ever produces an interesting match, investigators would have to go to court to get a proper warrant to look more closely. But metadata is mentioned in these documents as a basis for picking a target for the surveillance under what appears to be a blanket FISA order—not an individualized one.
  • And what happens when the N.S.A. realizes that it is reading and listening to an American’s communications? It is supposed to stop, at least until it gets a different kind of FISA order—which, based on what it has already heard, may be all the easier. And if it finds something that is interesting in any one of a half-dozen ways, it can analyze the communications further, and hold on to them for five years. Maybe an American’s e-mails contain “significant foreign intelligence information”; or maybe they don’t, but are “reasonably believed” to contain evidence of a crime. There are a lot of crimes on the books, and the N.S.A. is also allowed to count one it thinks might be “about to be committed.” It can also “disseminate” the information to other agencies, and find out more about the American if it seems that the person might have access to secrets, or be a target of foreigners, or just do business with them. This includes communications between someone under indictment and his or her lawyer—the words can’t be used in a prosecution, but can be to gather intelligence. And what the N.S.A. happens to see can also be used in leak investigations. Does this still seem too narrow, not enough to keep us all safe? The documents note that the private data of Americans that the N.S.A. can hold on to “include electronic communications acquired because of limitations on NSA’S ability to filter communications.” In other words, if it fails to fine-tune its targeting, it can keep what it sweeps up anyway. Also, if the N.S.A. decides on its own that there is an “immediate threat,” it can temporarily put all these minimization procedures aside and figure it out later.
  • ...1 more annotation...
  • These documents were classified: they shouldn’t have been. The N.S.A. can look for certain secrets and keep them. But Americans shouldn’t have to listen to the President with an ear for what words like “targeted” really mean. (Even by that standard, the Administration has not been forthright.) We get to know what the rules are—so we, and not just a secret court, can tell when they are being broken.
Paul Merrell

Glassholes: A Mini NSA on Your Face, Recorded by the Spy Agency | Global Research - 0 views

  • eOnline reports: A new app will allow total strangers to ID you and pull up all your information, just by looking at you and scanning your face with their Google Glass. The app is called NameTag and it sounds CREEPY. The “real-time facial recognition” software “can detect a face using the Google Glass camera, send it wirelessly to a server, compare it to millions of records, and in seconds return a match complete with a name, additional photos and social media profiles.” The information listed could include your name, occupation, any social media profiles you have set up and whether or not you have a criminal record (“CRIMINAL HISTORY FOUND” pops up in bright red letters according to the demo).
  • Since the NSA is tapping into all of our digital communications, it is not unreasonable to assume that all of the info from your digital glasses – yup, everything – may be recorded by the spy agency. Are we going to have millions of mini NSAs walking around recording everything … glassholes? It doesn’t help inspire confidence that America’s largest police force and Taser are beta-testing Google Glasses. Postscript: I love gadgets and tech, and previously discussed the exciting possibilities of Google Glasses. But the NSA is ruining the fun, just like it’s harming U.S. Internet business.
  •  
    Thankfully, there's buddying technology to block computer facial-recognition algorithms. http://tinyurl.com/mzfyfra On the other hand, used Hallowe'en masks can usually be purchased inexpensively from some nearby school kids at this time of year. Now if I could just put together a few near-infrared LEDs to fry a license plate-scanner's view ...  
Paul Merrell

John McCain Says We Are All Ukrainians, Takes On Putin | TIME.com - 0 views

  • In response to reports of a Russian takeover in parts of Crimea, Arizona Senator John McCain said on Friday, “We are all Ukrainians,” before calling for swift U.S. economic aid to Ukraine, condemnation of Russia at the United Nations, sanctions against Russian officials and the installation of U.S. missiles in the nearby Czech Republic. Russian President Vladimir Putin believes “this is a chess match reminiscent of the Cold War and we need to realize that and act accordingly,” McCain said, in an exclusive interview with TIME. “That does not mean I envision a conflict with Russia, but we need to take certain measures that would convince Putin that there is a very high cost to actions that he is taking now.”
  • McCain made his declaration in response to a question from TIME about his famous 2008 statement, “We are all Georgians,” issued when he was a Republican presidential candidate after Russia invaded Georgia. Asked whether he feels the same way about the plight of Ukraine six years later, he agreed. “We are all Ukrainians in the respect that we have a sovereign nation that is again with international boundaries… that is again being taken in as part of Russia,” he said in an interview in his Senate office. “That is not acceptable to an America that stands up for the rights of human beings. We are Georgians. And we are Ukrainians.” Leaders of the newly formed Ukrainian government say Russian forces moved into Crimea’s two airports and parts of the province’s capital of Simferopol early Friday, though the troops wore no insignia. The Russia has an historic military presence in the province. The incursion comes after pro-Russian Ukrainian President Viktor Yanukovych fled to Russia in fear of his life after pro-European opposition groups in parliament voted to oust him. Ukraine has been torn part by violent protests since Yanukovych walked away from a trade pact with Europe in November and sought a bail out from Putin.
Paul Merrell

Inside TAO: The NSA's Shadow Network - SPIEGEL ONLINE - 0 views

  • The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of "covert" routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with "implants" that then allow the government hackers to control the computers remotely. (Click here to read a related article on the NSA's "implants".) In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person's computer. Of course, a cookie doesn't automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint.
  • Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID. This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer. The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: "Wait for client to initiate new connection," "Shoot!" and "Hope to beat server-to-client response." Like any competition, at times the covert network's surveillance tools are "too slow to win the race." Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document.
  • At the same time, it is in no way true to say that the NSA has its sights set exclusively on select individuals. Of even greater interest are entire networks and network providers, such as the fiber optic cables that direct a large share of global Internet traffic along the world's ocean floors. One document labeled "top secret" and "not for foreigners" describes the NSA's success in spying on the "SEA-ME-WE-4" cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle. The document proudly announces that, on Feb. 13, 2013, TAO "successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4)." With the help of a "website masquerade operation," the agency was able to "gain access to the consortium's management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network."
  • ...3 more annotations...
  • It appears the government hackers succeeded here once again using the QUANTUMINSERT method. The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure. But that was only the first step. "More operations are planned in the future to collect more information about this and other cable systems," it continues. But numerous internal announcements of successful attacks like the one against the undersea cable operator aren't the exclusive factors that make TAO stand out at the NSA. In contrast to most NSA operations, TAO's ventures often require physical access to their targets. After all, you might have to directly access a mobile network transmission station before you can begin tapping the digital information it provides.
  • To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour's work.
  • Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors. Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer. These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world."
  •  
    From page 3 of a 3-page article. The entire article is well worth reading. I chose this page to bookmark because of its disclosure that NSA is intercepting new computers before they are delivered and installing hardware and software backdoors, then reshipping them to their intended recipients. Although not mentioned, this implies the complicity of package shipment companies and conceivably government mail systems and original equipment manufacturers ("OEMs").  
Paul Merrell

Americans on Wrong Side of Income Gap Run Out of Means to Cope - 0 views

  • “We’ve exhausted our coping mechanisms,” said Alan Krueger, an economics professor at Princeton University in New Jersey and former chairman of President Barack Obama’s Council of Economic Advisers. “They weren’t sustainable.” The result has been a downsizing of expectations. By almost two to one — 64 percent to 33 percent — Americans say the U.S. no longer offers everyone an equal chance to get ahead, according to the latest Bloomberg National Poll. The lack of faith is especially pronounced among those making less than $50,000 a year, with close to three-quarters in the Dec. 6-9 survey saying the economy is unfair.
  • The diminished expectations have implications for the economy. Workers are clinging to their jobs as prospects fade for higher-paying employment. Households are socking away more money and charging less on credit cards. And young adults are living with their parents longer rather than venturing out on their own. In the meantime, record-high stock prices are enriching wealthier Americans, exacerbating polarization and bringing income inequality to the political forefront. Even independent government agencies like the Securities and Exchange Commission and the Federal Reserve have been dragged into the debate.
  • “The basic bargain at the heart of our economy has frayed,” Obama said in a Dec. 4 speech in Washington. “This is the defining challenge of our time: Making sure our economy works for every working American.” Democratic lawmakers also intend to press next year for a higher minimum wage to tackle the yawning gap between rich and poor, Durbin said. Republicans aren’t ceding the issue. “The American dream is certainly more in doubt than in decades,” House Speaker John Boehner of Ohio said in response to Obama’s speech. “But after more than five years in office, the president has no one to blame but himself.”
  • ...11 more annotations...
  • Income inequality has been rising more or less steadily since the mid-1970s. The Gini coefficient, a broad-based measure of inequality, stood at a record high last year, according to Census Bureau data dating back 46 years.
  • Women who became unemployed during the recession and its aftermath have been slower to find new positions. Among women losing jobs they’d held for at least three years between January 2009 and the end of 2011, 50 percent were re-employed by the start of 2012, while the share for men was 61 percent, according to a Bureau of Labor Statistics report released in February. Households turned to stepped-up borrowing to help make ends meet, until that avenue was shut off by the collapse of house prices. About 10.8 million homeowners still owed more money on their mortgages than their properties were worth in the third quarter, according to Seattle-based Zillow Inc. The fallout has made many Americans less inclined to take risks. The quits rate — the proportion of Americans in the workforce who voluntarily left their jobs — stood at 1.7 percent in October. While that’s up from 1.5 percent a year earlier, it’s below the 2.2 percent average for 2006, the year house prices started falling, government data show.
  • “The middle has really collapsed,” said Lawrence Katz, an economics professor at Harvard University in Cambridge, Massachusetts, and a former chief economist at the Labor Department in Washington. Even those with college degrees are having trouble keeping up, he said. While they earn more than those with less schooling, they’ve seen no real wage growth in recent years. The median income of men 25 years of age and older with a bachelor’s degree was $56,656 last year, 10 percent less than in 2007 after taking account of inflation, according to Census data.
  • It’s the richest of the rich who are reaping the most benefit as an increasingly interconnected and technologically sophisticated world puts a premium on those perceived to have the highest skills — a phenomenon dubbed “winner take all” by Cornell University Professor Robert Frank. Government policies also play a role. The Treasury Department, for instance, taxes capital gains racked up by the wealthy on the sale of shares, bonds and other assets at about half the rate of ordinary income. The top 1 percent captured 95 percent of the gains in incomes in the first three years of the recovery, based on analysis of tax returns by Saez. Those less well-off, meanwhile, are running out of ways to cope. The percentage of working-age women who are in the labor force steadily climbed from a post-World War II low of 32 percent to a peak of 60.3 percent in April 2000, fueling a jump in dual-income households and helping Americans deal with slow wage growth for a while. Since the recession ended, the workforce participation rate for women has been in decline, echoing a longer-running trend among men. November data showed 57 percent of women in the labor force and 69.4 percent of men.
  • The disparity has widened since the recovery began in mid-2009. The richest 10 percent of Americans earned a larger share of income last year than at any time since 1917, according to Emmanuel Saez, an economist at the University of California at Berkeley. Those in the top one-tenth of income distribution made at least $146,000 in 2012, almost 12 times what those in the bottom tenth made, Census Bureau data show. Economists have posited a variety of explanations for the growing differences in incomes. Manufacturing companies moved once high-paying jobs abroad, to China and elsewhere. Technological advances led to the loss of clerical and office work, especially relating to routine tasks. The decline of unions — 11.3 percent of workers were represented in 2012 compared with 20.1 percent in 1983 — has advantaged bosses at the expense of their employees.
  • Millennials — adults aged 18 to 32 — are still slow to set out on their own more than four years after the recession ended, according to an Oct. 18 report by the Pew Research Center in Washington. Just over one in three head their own households, close to a 38-year low set in 2010. Obama has proposed a raft of policies to attack the widening wage gap — from simplifying the tax code and increasing exports to enhancing worker training and boosting pre-kindergarten education. Yet in a divided Washington he hasn’t made much progress pushing them through. The president’s renewed focus on income inequality has more to do with politics than policy, said Douglas Holtz-Eakin, president of the American Action Forum, a self-described center- right institute in Washington.
  • “It’s great politics to demagogue income distribution and complain about the rich getting ahead and the poor falling behind,” said Holtz-Eakin, a former Congressional Budget Office director. “The substance of what he’s actually done doesn’t match the enormity of the problem as he’s portrayed it.”
  • The wage-gap debate has reverberated to other parts of Washington, as the SEC published a rule Sept. 18 that would compel public companies to reveal pay ratios between chief executives and their employees. While businesses have decried the requirement as overreach, some investors welcome the data as a way to help assess a company’s health.
  • Across companies in the S&P 500, the average multiple of CEO compensation to that of rank-and-file workers is 204, up 20 percent since 2009, according to data compiled by Bloomberg in April. The Fed also has been caught up in the debate over growing income disparities. Lawmakers from both parties have questioned whether its bond-buying policy, called quantitative easing, has benefited the rich at the expense of those less well-off by boosting prices of stocks and other assets.
  • The S&P 500 stock index has risen 29 percent in 2013. The richest third of U.S. households account for 89 percent of all equities ownership, according to the Center for Retirement Research at Boston College.
  • Janet Yellen, nominated to take over as Fed chairman next year, defended the central bank’s actions at a Senate Banking Committee hearing on Nov. 14. “The policies we’ve undertaken have been meant to generate a robust recovery,” Yellen told the committee. The growing calls for action to reduce income inequality have translated into a national push for a higher minimum wage. Fast-food workers in 100 cities took to the streets Dec. 5 to demand a $15 hourly salary.
  •  
    Monetary policy of, by, and for banksters continues in the U.S. One irony is that banksters press for transition to an all digital currency so that savers can be penalized, a blatant "trickle-up"economic policy, whilst also pressing for more bank bailouts, wielding the thoroughly-discredited "trickle down" economic theory. But "trickle down" theory, in the context of bank bailouts, has not successfully trickled down and the only beneficiaries have been the few Americans who can still invest in the stock market, paying the highest dividends to the wealthiest among us. Has their ever been a time when the stock market's behavior has been so divorced from the well-being of the middle and lower economic classes? I doubt there has been at least in the last 50 years. Where would we be if the bank bail-out trillions had instead been mailed as checks to the middle and lower economic classes? "Trickle up" works and that is what built the American economy to its peak in inflation-adjusted dollars -- an affluent middle class. But do not expect leadership from Washington, D.C. in correcting income inquequality; only political rhetoric and a fight over extension of unemployment benefits, now lapsed. "According to the World Bank, the GINI coefficient "measures the extent to which the distribution of income or consumption expenditure among individuals households within an economy deviates from a perfectly equal distribution." Therefore it is used as an indication of income inequality within countries. ... In the late 2000s, Chile had the highest GINI coefficient, after taxes and transfers, among OECD member countries. The United States, Turkey and Mexico came right before it. At the other end of the scale, Slovenia, Denmark and Norway led the ranking with the lowest levels of income inequality." http://www.gfmag.com/tools/global-database/economic-data/11944-wealth-distribution-income-inequality.html#ixzz2pGpv4xGZ Higher minimum wages? How about instead abolishing the Feder
Paul Merrell

BBC News - Australia sites hacked amid spying row with Indonesia - 0 views

  • A member of Anonymous Indonesia said the group carried out the cyber attacks Continue reading the main story Spy leaks How intelligence is gathered History of spying NSA secrets failure 'Five eyes' club Hackers have attacked the websites of the Australian police and Reserve Bank amid an ongoing row over reports Canberra spied on Jakarta officials. The row has heightened diplomatic tensions between the allies and sparked protests in Indonesia. Indonesia has suspended military co-operation with Australia and recalled its ambassador over the allegations. A top Australian adviser has also come under fire for several tweets critical of Indonesia's handling of the row. Reports of the spying allegations came out in Australian media from documents leaked by whistleblower Edward Snowden.
  • The leaked documents showed that Australian spy agencies named Indonesian President Susilo Bambang Yudhoyono, the first lady, the vice-president and other senior ministers as targets for telephone monitoring, Australian media said. The alleged spying took place in 2009, under the previous Australian government. "It is not possible that we can continue our co-operation when we are still uncertain that there is no spying towards us," Mr Yudhoyono said on Wednesday. He added he would also write to Australian Prime Minister Tony Abbott to seek an official explanation over spying allegations. Mr Abbot has said he regretted the embarrassment the media reports have caused. However, he also said that he does not believe Australia "should be expected to apologise for reasonable intelligence-gathering operations"
  • The Australian Federal Police (AFP) and Australia's Reserve Bank confirmed that their sites were victims of a cyber attack on Wednesday night.
  • ...2 more annotations...
  • The Reserve Bank also said its website was "the subject of a denial of service attack". "The bank has protections for its website, so the bank website remains secure," a spokesman added. Australian media identified a Twitter user who described herself as a member of Anonymous Indonesia and appeared to claim responsibility for the attack. The user wrote: "I am ready for this war!" and said she would conduct further attacks unless there was an apology from the Australian government for the alleged spying. Twitter outburst
  • Meanwhile, Mark Textor, a campaign strategist who advised Australian Prime Minister Tony Abbott's Liberal Party came under fire for a series of provocative tweets that criticised Indonesia's handling of the spying row. Mr Textor wrote in a Twitter post: "Apology demanded from Australia by a bloke who looks like a 1970's Pilipino [sic] porn star and has ethics to match". The tweet has since been deleted. Australian media widely reported that he was referring to Indonesian Foreign Minister Marty Natalegawa, who has called for an apology from Australia over the spying claims.
  •  
    Edward Snowden's leak continues to roil international relations.
Paul Merrell

FBI Admits It Controlled Tor Servers Behind Mass Malware Attack | Threat Level | Wired.com - 0 views

  • It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors. Freedom Hosting’s operator, Eric Eoin Marques, had rented the servers from an unnamed commercial hosting provider in France, and paid for them from a bank account in Las Vegas. It’s not clear how the FBI took over the servers in late July, but the bureau was temporarily thwarted when Marques somehow regained access and changed the passwords, briefly locking out the FBI until it gained back control. The new details emerged in local press reports from a Thursday bail hearing in Dublin, Ireland, where Marques, 28, is fighting extradition to America on charges that Freedom Hosting facilitated child pornography on a massive scale. He was denied bail today for the second time since his arrest in July. Freedom Hosting was a provider of turnkey “Tor hidden service” sites — special sites, with addresses ending in .onion, that hide their geographic location behind layers of routing, and can be reached only over the Tor anonymity network. Tor hidden services are used by sites that need to evade surveillance or protect users’ privacy to an extraordinary degree – including human rights groups and journalists. But they also appeal to serious criminal elements, child-pornography traders among them.
  • On August 4, all the sites hosted by Freedom Hosting — some with no connection to child porn — began serving an error message with hidden code embedded in the page. Security researchers dissected the code and found it exploited a security hole in Firefox to identify users of the Tor Browser Bundle, reporting back to a mysterious server in Northern Virginia. The FBI was the obvious suspect, but declined to comment on the incident. The FBI also didn’t respond to inquiries from WIRED today. But FBI Supervisory Special Agent J. Brooke Donahue was more forthcoming when he appeared in the Irish court yesterday to bolster the case for keeping Marques behind bars, according to local press reports. Among the many arguments Donahue and an Irish police inspector offered was that Marques might reestablish contact with co-conspirators, and further complicate the FBI probe. In addition to the wrestling match over Freedom Hosting’s servers, Marques allegedly dove for his laptop when the police raided him, in an effort to shut it down.
  • The apparent FBI-malware attack was first noticed on August 4, when all of the hidden service sites hosted by Freedom Hosting began displaying a “Down for Maintenance” message. That included at least some lawful websites, such as the secure email provider TorMail. Some visitors looking at the source code of the maintenance page realized that it included a hidden iframe tag that loaded a mysterious clump of Javascript code from a Verizon Business internet address. By midday, the code was being circulated and dissected all over the net. Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. Though many older revisions of Firefox were vulnerable to that bug, the malware only targeted Firefox 17 ESR, the version of Firefox that forms the basis of the Tor Browser Bundle – the easiest, most user-friendly package for using the Tor anonymity network. That made it clear early on that the attack was focused specifically on de-anonymizing Tor users. Tor Browser Bundle users who installed or manually updated after June 26 were safe from the exploit, according to the Tor Project’s security advisory on the hack.
  • ...2 more annotations...
  • Perhaps the strongest evidence that the attack was a law enforcement or intelligence operation was the limited functionality of the malware. The heart of the malicious Javascript was a tiny Windows executable hidden in a variable named “Magneto.” A traditional virus would use that executable to download and install a full-featured backdoor, so the hacker could come in later and steal passwords, enlist the computer in a DDoS botnet, and generally do all the other nasty things that happen to a hacked Windows box. But the Magneto code didn’t download anything. It looked up the victim’s MAC address — a unique hardware identifier for the computer’s network or Wi-Fi card — and the victim’s Windows hostname. Then it sent it to a server in Northern Virginia server, bypassing Tor, to expose the user’s real IP address, coding the transmission as a standard HTTP web request.
  • The official IP allocation records maintained by the American Registry for Internet Numbers show the two Magneto-related IP addresses were part of a ghost block of eight addresses that have no organization listed. Those addresses trace no further than the Verizon Business data center in Ashburn, Virginia, 20 miles northwest of the Capital Beltway. The code’s behavior, and the command-and-control server’s Virginia placement, is also consistent with what’s known about the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007. Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor. Prior to the Freedom Hosting attack, the code had been used sparingly, which kept it from leaking out and being analyzed.
  •  
    Taking down the entire Freedom Hosting service because some content was kiddie porn is reminiscent of the U.S. government's proxy take-down of Mega-Upload in New Zealand. Such actions that disable legitimate users or deny access to their data are in my opinion violative of the 1st and 4th Amendments.  It suppresses the Freedom of Speech and seizes more than the 4th Amendment allows.  That our own government would use malware for surveillance purposes under any circumstance is just plain chilling.
‹ Previous 21 - 40 of 87 Next › Last »
Showing 20 items per page