Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged month

Rss Feed Group items tagged

Gary Edwards

Take A Break From The Snowden Drama For A Reminder Of What He's Revealed So Far - Forbes - 0 views

  • Here’s a recap of Snowden’s leaked documents published so far, in my own highly subjective order of importance.
  • The publication of Snowden’s leaks began with a top secret order from the Foreign Intelligence Surveillance Court (FISC) sent to Verizon on behalf of the NSA, demanding the cell phone records of all of Verizon Business Network Services’ American customers for the three month period ending in July. The order, obtained by the Guardian, sought only the metadata of those millions of users’ calls–who called whom when and from what locations–but specifically requested Americans’ records, disregarding foreigners despite the NSA’s legal restrictions that it may only surveil non-U.S. persons. Senators Saxby Chambliss and Diane Feinstein defended the program and said it was in fact a three-month renewal of surveillance practices that had gone for seven years.
  • A leaked executive order from President Obama shows the administration asked intelligence agencies to draw up a list of potential offensive cyberattack targets around the world. The order, which suggests targeting “systems, processes and infrastructure” states that such offensive hacking operations “can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.” The order followed repeated accusations by the U.S. government that China has engaged in state-sponsored hacking operations, and was timed just a day before President Obama’s summit with Chinese President Xi Jinping.
  • ...6 more annotations...
  • Another leaked slide deck revealed a software tool called Boundless Informant, which the NSA appears to use for tracking the origin of data it collects. The leaked materials included a map produced by the program showing the frequency of data collection in countries around the world. While Iran, Pakistan and Jordan appeared to be the most surveilled countries according to the map, it also pointed to significant data collection from the United States.
  • In a congressional hearing, NSA director Keith Alexander argued that the kind of surveillance of Americans’ data revealed in that Verizon order was necessary to for archiving purposes, but was rarely accessed and only with strict oversight from Foreign Intelligence Surveillance Court judges. But another secret document published by the Guardian revealed the NSA’s own rules for when it makes broad exceptions to its foreign vs. U.S. persons distinction, accessing Americans’ data and holding onto it indefinitely. Those exceptions include anytime Americans’ data is judged to be “significant foreign intelligence” information or information about a crime that has been or is about to be committed, any data “involved in the unauthorized disclosure of national security information,” or necessary to “assess a communications security vulnerability.” Any encrypted data that the NSA wants to crack can also be held indefinitely, regardless of whether its American or foreign origin.
  • Documents leaked to the Guardian revealed a five-year-old British intelligence scheme to tap transatlantic fiberoptic cables to gather data. A program known as Tempora, created by the U.K.’s NSA equivalent Government Communications Headquarters (GCHQ) has for the last 18 months been able to store huge amounts of that raw data for up to 30 days. Much of the data is shared with the NSA, which had assigned 250 analysts to sift through it as of May of last year.
  • Another GCHQ project revealed to the Guardian through leaked documents intercepted the communications of delegates to the G20 summit of world leaders in London in 2009. The scheme included monitoring the attendees’ phone calls and emails by accessing their Blackberrys, and even setting up fake Internet cafes that used keylogging software to surveil them.
  • Snowden showed the Hong Kong newspaper the South China Morning Post documents that it said outlined extensive hacking of Chinese and Hong Kong targets by the NSA since 2009, with 61,000 targets globally and “hundreds” in China. Other SCMP stories based on Snowden’s revelations stated that the NSA had gained access to the Chinese fiberoptic network operator Pacnet as well as Chinese mobile phone carriers, and had gathered large quantities of Chinese SMS messages.
  • The Guardian’s Glenn Greenwald has said that Snowden provided him “thousands” of documents, of which “dozens” are newsworthy. And Snowden himself has said he’d like to expose his trove of leaks to the global media so that each country’s reporters can decide whether “U.S. network operations against their people should be published.” So regardless of where Snowden ends up, expect more of his revelations to follow.
  •  
    Nice tight summary
Paul Merrell

Saudi Arabia in Search of a New Course | nsnbc international - 0 views

  • Saudi Arabia, one of the wealthiest countries in the world, is experiencing serious financial problems. The ongoing plummeting of oil prices is forcing the Saudis to be more careful with money. Tens of billions of dollars invested abroad are making a return to the kingdom. In July 2015, Saudi Arabia’s authorities, for the first time in 8 years, issued governmental bonds worth $4 bn.
  • Bloomberg reports that Saudi Arabia has already withdrawn $50-70 bn, which it had previously invested worldwide through management companies. It is noteworthy that the country has been withdrawing funds for the past six months. For example, Saudi Arabia’s SAMA Foreign Holdings reached its maximum in August 2014, having amounted to $737 bn. But since then, the fund has been shrinking because oil prices have dropped more than twice in this period. Saudi Arabia’s budget deficit is forecast to reach 20%; however, reduction of expenditures still remains a sensitive topic. In the context of the continuous fall in oil prices, Riyadh has worked out a plan to gradually reduce public spending to cope with a sharp decrease in budget revenues caused by the slumping oil prices. For example, Saudi Arabia’s Ministry of Finance has issued an order prescribing all state companies to temporary stop hiring new employees and launching new projects until the end of the fiscal year. In addition, the government procurement of new cars and furniture has also been put on hold as well as the signing and approval of new lease agreements for state institutions and enterprises. The expropriation of plots of land for the purpose of the subsequent extraction of oil has also been suspended throughout the country. The Ministry of Finance has, at the same time, demanded an acceleration in the collection procedure of oil revenues.
  • “To prove that the country indeed has a sound fiscal discipline, the government has to take steps to cut expenditures in the 4th quarter. Subsequently Saudi Arabia will be compelled to find new ways to reduce expenditures and boost efficiency in order to assure there will be no budget deficit in 2016,” John Sfakianakis, Director of the Middle East Division of the Ashmore Group, said in his interview to Bloomberg. It should be pointed out in that regard that oil revenues comprise about 90% of Saudi Arabia’s budget, and the landslide of oil prices of over 40% within the last 12 months adversely affected the country’s financial standing. And, although the kingdom’s debt burden remains one of the lowest in the world (less than 2% of the GDP), the kingdom’s international assets have been consistently shrinking for the last nine months and reached a two year minimum. This situation directly influences the policy of OPEC since Saudi Arabia (which extracts almost 30% of the OPEC’s oil, positions itself as an extremely influential raw material supplier, maintains powerful military forces, and has its own global ambitions, immense resources and substantial diplomatic experience) de facto plays the role of the shadow leader of this organization. At times siding with the US, and then pursuing its own interests, the kingdom has assumed such an influential position in the international community that other countries revere its opinion, and as for the last oil crisis, Saudi Arabia is seen as its key player.
  • ...3 more annotations...
  • And, based on the information provided by the international mass media, the Saudi leadership has split in their opinion on whether to continue funding Syria or to begin reducing their financial commitment. “Riyadh is facing a choice: to give more support to the moderate opposition or to look for a compromise,” an American expert on national security, James Farvell, wrote in The National Interest. The expert explained that if Saudis offer more support, that would trigger a confrontation with Russia, but if they side with Moscow, Russia’s regional influence might be reinforced and that might, in turn, challenge Saudi Arabia’s interests. Because of this dilemma, controversial information regarding Saudi’s decisions are appearing in the press. On the one hand, Saudi Arabia was one of the first to condemn Russia after the beginning of the Russian military operation in Syria on September 30. It accused Russia of bombing the troops of moderate opposition instead of ISIS. “These attacks resulted in the deaths of numerous innocent victims. We call for a stop it immediately,” demagogically and groundlessly said the representative of Saudi Arabia Abdallah al-Muallimi in the UN. Simultaneously 53 religious leaders signed an online appeal to support a jihad against the Syrian authorities as well as the presence of Russia and Iran in this country. They appealed to the countries of the Muslim world to render “moral, financial, military and political support to those who are called the ‘holy warriors of Syria’.” The authors of the appeal explicitly stated that if they fail, the other Sunni states in the region, and, first of all, Saudi Arabia will be the next victims.
  • With reference to a high-ranking Saudi official who wished to remain anonymous, the BBC stated that armed groups of the so-called moderate opposition would receive new, high-tech weapons, including tank destroyers. Jaish al-Fath, The Free Syrian Army and The Southern Front moderate opposition groups will also receive support. According to the source, it is quite likely that the “moderate opposition” in Syria will receive surface-to-air systems as well. Keeping in mind that Russia is carrying out air strikes across not only the facilities of ISIS, but also the above listed groups, a scenario when Saudis turn their weapon against Russian aviation is quite possible. On the other hand, a curious document, apparently a copy of the instructions issued for the embassies of Saudi Arabia in the Middle Eastern countries, has been uploaded to the Internet. The main idea of the documents is that all the diplomatic representative offices should gradually cease financial support of the armed Syrian opposition, apparently owing to the low efficiency of militants’ activities. The authenticity of the document raises certain doubts, as is always the case with such documents. However, specialists in the Arabic language concluded that the text was written by a native speaker, and that the document’s design conforms to the style adopted in Saudi Arabia. It shouldn’t be ruled out that the drying up of the source of funding, that militants used to receive from the Saudis, against the backdrop of a certain degree of success of the government troops as well as the increasing military and technical assistance to Syria on the part of Russia, have convinced many “oppositionists” to surrender and change masters. This process is expected to only accelerate in the future.
  • On Sunday, October 11, the Defense Minister, Mohammed bin Salman, visited Sochi. The search for common ground on the issues related to the situation in Syria was the main theme of the meeting held by the son of the Saudi king and Vladimir Putin. The parties also discussed the prospects of their economic cooperation. And, since Saudi Arabia is currently experiencing certain financial difficulties and is in the “clutches” of economic uncertainty, this topic was of a special interest. It was the second visit to the Russian Federation of the Saudi prince, who currently carries out sensitive missions related to the complex relations between the two countries. It should be noted that King of Saudi Arabia Salman bin Abdulaziz Al Saud has been admitted to hospital in a critical condition and is currently being kept in the intensive care unit of the King Faisal royal hospital in Riyadh.
Paul Merrell

Syria "Transition Plan" Lacks Legitimacy, Turkish Invasion Faces Quagmire | New Eastern... - 0 views

  • The Western media has now repeatedly reported on a so-called “transition plan” unveiled in London by what it calls the “High Negotiations Committee” (HNC) – a group Western media outlets refuse to identify, enumerate, or discuss behind their superficial headlines. The BBC in its article, “Syria conflict: Opposition unveils transition plan,” would claim: The umbrella group representing Syria’s political and armed opposition factions has set out a plan for a political transition to end five years of war.  The High Negotiations Committee (HNC) proposed holding six months of negotiations with President Bashar al-Assad, accompanied by a full ceasefire.  Mr Assad would then hand over power to a unity government that would run Syria for 18 months and organise elections. This lack of information regarding who the HNC actually is comprised of is not due to the fact that Western media outlets do not know, but precisely because they do know – and including this information in articles about their “transition plan” would undermine its legitimacy. The majority of the committee do not even reside in Syria and have little to no ties with actual militant groups fighting on the ground there. Those armed groups that do continue to fight, are now openly operating under the umbrella of US State Department designated foreign terrorist organization Jabhat Al-Nusra – Al Qaeda in Syria – and have done so since a failed offensive attempting to break the Syrian government’s encirclement of Aleppo last month. In essence, this is a “transition plan” proposed by a fictional opposition committee that has no power in Syria, and should Syria and its allies be irresponsible enough to accept such a plan, they would be negotiating with irrelevant players hiding abroad while failing to address the very realities on the ground in Syria itself. It is a recipe for compounding the conflict, not ending it. http://journal-neo.org/2016/09/10/syria-transition-plan-lacks-legitimacy-turkish-invasion-faces-quagmire/
Paul Merrell

How Strong Is ISIS In 2017? Islamic State Fighters Being Wiped Out From Mosul And Raqqa... - 0 views

  • The U.S-led coalition effort against the Islamic State group is wiping off its fighters at a faster pace than the group can replace them, said Maj. Gen. Rupert Jones, deputy commander for the Combined Joint Task Force coalition, the New York Times reported Tuesday. U.S.-backed Iraqi forces Tuesday fought their way to within the firing range of Mosul's main government buildings, a major target in the offensive to remove ISIS militants from their remaining stronghold in the western side of the city, Reuters reported. 
  • "We are killing Daesh at a rate that they simply can't sustain," Jones said, using an Arabic acronym for the militant group. "The enemy cannot sustain the attrition that they are suffering and therefore they lose terrain, they lose battles." 
  • Early last month, the top American commander in Iraq, Lt. Gen. Stephen Townsend, said that U.S.-backed forces will recapture ISIS' two major strongholds — the cities of Raqqa in Syria and Mosul in Iraq — within the next six months, the Associated Press reported.
  • ...1 more annotation...
  • Although the ISIS battle will not be over even with the group's fall in Mosul or Raqqa, it would be the beginning of the end, Jones said, according to the Times. "The inevitability of their destruction just becomes really a matter of time," he said, adding that the group's leadership was now focused on little more than survival.Despite news of ISIS losing out on its territories in Iraq and Syria, U.S. military leaders have warned that the militant group might turn into a more classic insurgency once it loses Raqqa and Mosul, which means that the broader fight could go on till years.
Paul Merrell

Israeli official says Netanyahu's top ministers haven't discussed Iran in months - Isra... - 0 views

  • Israel's top ministerial forum, comprised of Prime Minister Benjamin Netanyahu's top eight minister, had not held a serious discussion concerning the Iranian standoff since late last year, an unnamed Israeli official told the Reuters news agency on Thursday. "The octet hasn't held a proper discussion of Iran for months - since October, as far as I can recall," said the official, who had been briefed on the closed-door sessions.
  • "It's possible that, since then, Iran came up during other sessions, but I wouldn't count those as serious discussions. You can't make any concrete decisions or policy advances in an hour-long chat on the sidelines of a different agenda." In addition, the official said the octet remained split on the issue, while Israel's top military and intelligence echelon were "entirely against" launching a unilateral strike on distant and well-fortified Iranian targets that would pose an unprecedented challenge to their forces.
  •  
    Contrasting with all other coverage, one might strongly suspect from this article, if true, that high Israeli officials have been blowing nothing but hot air about an eminent Israeli military strike against Iran's nuclear facilities. But notice that it is sourced to an anonymous government official.  The Israeli Council of 8 is roughly equivalent to the U.S. Executive Branch's Cabinet Secretaries. Because an Israeli strike on Iran would almost certainly lead to Iranian missiles being launched against Israel, the chances are slim to none that the Council of 8 would not have been aggressively preparing for war if a strike were eminent. But what is true in this situation?
Paul Merrell

First Unitarian Church of Los Angeles v. NSA | Electronic Frontier Foundation - 0 views

  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The case challenges the mass telephone records collection that was confirmed by the FISA Order that was published on June 5, 2013 and confirmed by the Director of National Intelligence (DNI) on June 6, 2013. The DNI confirmed that the collection was “broad in scope” and conducted under the “business records” provision of the Foreign Intelligence Surveillance Act, also known as section 215 of the Patriot Act and 50 U.S.C. section 1861. The facts have long been part of EFF’s Jewel v. NSA case. The case does not include section 702 programs, which includes the recently made public and called the PRISM program or the fiber optic splitter program that is included (along with the telephone records program) in the Jewel v. NSA case. 
  • ...5 more annotations...
  • Our goal is to highlight one of the most important ways that the government collection of telephone records is unconstitutional: it violates the First Amendment right of association. When the government gets access to the phone records of political and activist organizations and their members, it knows who is talking to whom, when, and for how long. This so-called “metadata,” especially when collected in bulk and aggregated, tracks the associations of these organizations. After all, if the government knows that you call the Unitarian Church or Calguns or People for the American Way or Students for Sensible Drug Policy regularly, it has a very good indication that you are a member and it certainly knows that you associate regularly. The law has long recognized that government access to associations can create a chilling effect—people are less likely to associate with organizations when they know the government is watching and when the government can track their associations. 
  • Twenty-two organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by EFF. At the heart of First Unitarian Church of Los Angeles v. NSA is the bulk telephone records collection program that was confirmed by the publication of an order from the Foreign Intelligence Surveillance Court (FISC) in June of 2013. The Director of National Intelligence (DNI) further confirmed that this formerly secret document was authentic, and part of a broader program to collect all major telecommunications customers’ call history. The order demands wholesale collection of every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for every phone and call for all customers of Verizon for a period of three months. Government officials further confirmed that this was just one of series of orders issued on a rolling basis since at least 2006. First Unitarian v. NSA argues that this spying violates the First Amendment, which protects the freedom to associate and express political views as a group.
  • The First Amendment right of association is a well established doctrine that prevents the government “interfering with the right to peaceably assemble or prohibit the petition for a governmental redress of grievances.” The most famous case embracing it is a 1958 Supreme Court Case from the Civil Rights era called  NAACP v. Alabama. In that case the Supreme Court held that it would violate the First Amendment for the NAACP to have to turn over its membership lists in litigation. The right stems from the simple fact that the First Amendment protects the freedom to associate and express political views as a group. This constitutional protection is critical because, as the court noted “[e]ffective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association[.]” NAACP v. Alabama, 357 U.S. at 460. As another court noted: the Constitution protects freedom of association to encourage the “advancing ideas and airing grievances” Bates v. City of Little Rock, 361 U.S. 516, 522-23 (1960).
  • The collection and analysis of telephone records give the government a broad window into our associations. The First Amendment protects against this because, as the Supreme Court has recognized, “it may induce members to withdraw from the association and dissuade others from joining it because of fear of exposure of their beliefs shown through their associations and of the consequences of their exposure.” NAACP v. Alabama, 357 U.S. at 462-63. See also Bates, 361 U.S. at 523; Gibson v. Florida Legislative Investigation Comm., 372 U.S. 539 (1963).  Privacy in one’s associational ties is also closely linked to freedom of association: “Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs.” NAACP v. Alabama, 357 U.S. at 462. 
  • The Supreme Court has made clear that infringements on freedom of association may survive constitutional scrutiny only when they “serve compelling state interests, unrelated to the suppression of ideas, that cannot be achieved through means significantly less restrictive of associational freedoms.” Roberts v. United States Jaycees, 468 U.S. 609, 623 (1984); see also NAACP v. Button, 371 U.S. at 341; Knox v. SEIU, Local 1000, 132 S. Ct. 2277, 2291 (2012)  Here, the wholesale collection of telephone records of millions of innocent Americans’ communications records, and thereby collection of their associations, is massively overbroad, regardless of the government’s interest. Thus, the NSA spying program fails under the basic First Amendment tests that have been in place for over fifty years.
  •  
    This case is related to EFF's earlier pending case, Jewel v. NSA and has been assigned to Judge Whyte, the same judge who ruled earlier in Jewel that the State Secrets Privilege does not apply to NSA's call metadata "haystack." The plaintiffs are 22 different groups who would make strange bedfellows indeed, except in opposition to government surveillance and repression. 
Paul Merrell

The Credit Card Gravy Train » CounterPunch: Tells the Facts, Names the Names - 0 views

  • You pay off your credit card balance every month, thinking you are taking advantage of the “interest-free grace period” and getting free credit. You may even use your credit card when you could have used cash, just to get the free frequent flier or cash-back rewards. But those popular features are misleading. Even when the balance is paid on time every month, credit card use imposes a huge hidden cost on users—hidden because the cost is deducted from what the merchant receives, then passed on to you in the form of higher prices. Visa and MasterCard charge merchants about 2% of the value of every credit card transaction, and American Express charges even more. That may not sound like much. But consider that for balances that are paid off monthly (meaning most of them), the banks make 2% or more on a loan averaging only about 25 days (depending on when in the month the charge was made and when in the grace period it was paid). Two percent interest for 25 days works out to a 33.5% return annually (1.02^(365/25) – 1), and that figure may be conservative. Merchant fees were originally designed as a way to avoid usury and Truth-in-Lending laws. Visa and MasterCard are independent entities, but they were set up by big Wall Street banks, and the card-issuing banks get about 80% of the fees. The annual returns not only fall in the usurious category, but they are returns on other people’s money – usually the borrower’s own money!  Here is how it works . . . .
Paul Merrell

NSA surveillance program reaches 'into the past' to retrieve, replay phone calls - The ... - 0 views

  • The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.
  • The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. The call buffer opens a door “into the past,” the summary says, enabling users to “retrieve audio of interest that was not tasked at the time of the original call.” Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage.At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.
  •  
    Let's also recall that former FBI counter-terrorism specialist Tim Clemente told CNN in the wake of the Boston bombing that all telephone calls in the U.S. are recorded and that "intelligence" people would be able to retrieve the call between Tamerlan Tsarnaev and his wife after the bombing. http://transcripts.cnn.com/TRANSCRIPTS/1305/01/ebo.01.html So is the mysterious nation whose calls are all being recorded the U.S.?
Gary Edwards

Larry Summers and the Secret "Bankster End Game" Memo : http://goo.gl/wDhDhL - 1 views

  •  
    Diigo is screwing up the URL AGAIN!!!!! WTF!!! The correct title is "Larry Summers and the Secret "End-Game" Memo :: http://goo.gl/wDhDhL From the marbux treasure trove of truth we have financial expert Greg Palast describing how the Banksters engineered the 2008 World Financial Collapse. Greg names names, sighting an important 1997 memo signed by then Deputy Treasury Secretary, Larry Summers. The memo describes the Banksters "end game", and authorizes pulling the trigger on a process of forcing the world's financial institutions to accept the game of derivative roulette where high risk financial schemes and casino bets had to be accepted as "financial assets". Good story and as from everything I know, the absolute truth. Read it carefully because these same Banksters control the Obama Administration and seek to continue the great shakedown. One item of note is the recent resignation of Larry Summers as Obama nominee to head the Federal Reserve Bankster Cartel. Summers is one of the architects of the 2008 financial collapse, but is seen be Wall Street as hesitant to continue with the current Bernake flooding of the money markets with $85 Billion per month in freshly minted paper. Even the hint of rolling back the Bankster bailout a bit is enough to do in Summers. alternative Fed Banster Czar Janette Yellin promises to up the $85 Billion monthly bailout, and Wall Street celebrated with a near doubling of trades. We're so screwed! We started the "Socialism and the End of the American Dream" Diigo group in September of 2008 as an effort to understand the financial collapse. In this short article, Greg Palast summarizes the story and places the important facts on the table for all to see. Pray with me for his health and safety. excerpt: "The year was 1997.  US Treasury Secretary Robert Rubin was pushing hard to de-regulate banks.  That required, first, repeal of the Glass-Steagall Act to dismantle the barrier between commercial ba
  •  
    Related link: Summers Withdraws From Consideration for Fed Chairmanship, http://www.bloomberg.com/news/2013-09-15/obama-said-he-accepted-summers-decision-to-withdraw-his-name.html
  •  
    From the marbux treasure trove of truth we have financial expert Greg Palast describing how the Banksters engineered the 2008 World Financial Collapse. Greg names names, sighting an important 1997 memo signed by then Deputy Treasury Secretary, Larry Summers. The memo describes the Banksters "end game", and authorizes pulling the trigger on a process of forcing the world's financial institutions to accept the game of derivative roulette where high risk financial schemes and casino bets had to be accepted as "financial assets". Good story and as from everything I know, the absolute truth. Read it carefully because these same Banksters control the Obama Administration and seek to continue the great shakedown. One item of note is the recent resignation of Larry Summers as Obama nominee to head the Federal Reserve Bankster Cartel. Summers is one of the architects of the 2008 financial collapse, but is seen be Wall Street as hesitant to continue with the current Bernake flooding of the money markets with $85 Billion per month in freshly minted paper. Even the hint of rolling back the Bankster bailout a bit is enough to do in Summers. alternative Fed Banster Czar Janette Yellin promises to up the $85 Billion monthly bailout, and Wall Street celebrated with a near doubling of trades. We're so screwed! We started the "Socialism and the End of the American Dream" Diigo group in September of 2008 as an effort to understand the financial collapse. In this short article, Greg Palast summarizes the story and places the important facts on the table for all to see. Pray with me for his health and safety. excerpt: "The year was 1997.  US Treasury Secretary Robert Rubin was pushing hard to de-regulate banks.  That required, first, repeal of the Glass-Steagall Act to dismantle the barrier between commercial banks and investment banks.  It was like replacing bank vaults with roulette wheels. Second, the banks wanted the right to play a new high-risk game:  "d
Gary Edwards

"War is a Racket" by General Smedly Butler - 1 views

  • by MAJOR GENERAL SMEDLEY D. BUTLER, USMC - Retired TWO-TIME Congressional Medal of Honor Recipient FULL TEXT ON LINE FREE
  • GET THE NEW PAPERBACK EDITION including two bonus titles.
  •  
    An accidental find, the full text online of USMC Maj. Gen. Smedley Butler's 1935 book, War Is a Racket. Butler served in the Marine Corps from 1899 to 1931 and at the time of his retirement was the most-decorated Marine in history, for both valor and accomplishments. Following his retirement, he became a vehement anti-war activist and public speaker.  This book is easily his most-cited and most-quoted published work. You can capture the flavor from an article he published in a magazine that included the following lines: "I spent 33 years and four months in active military service and during that period I spent most of my time as a high class muscle man for Big Business, for Wall Street and the bankers. In short, I was a racketeer, a gangster for capitalism. I helped make Mexico and especially Tampico safe for American oil interests in 1914. I helped make Haiti and Cuba a decent place for the National City Bank boys to collect revenues in. I helped in the raping of half a dozen Central American republics for the benefit of Wall Street. I helped purify Nicaragua for the International Banking House of Brown Brothers in 1902-1912. I brought light to the Dominican Republic for the American sugar interests in 1916. I helped make Honduras right for the American fruit companies in 1903. In China in 1927 I helped see to it that Standard Oil went on its way unmolested. Looking back on it, I might have given Al Capone a few hints. The best he could do was to operate his racket in three districts. I operated on three continents." http://en.wikipedia.org/wiki/Smedley_Butler#Lectures  I look forward to reading this book. The book was reprinted in 2003 and is available from the linked web site, together with two bonus titles. 
  •  
    "WAR IS A RACKET" - free online book CHAPTER ONE WAR is a racket. It always has been. It is possibly the oldest, easily the most profitable, surely the most vicious. It is the only one international in scope. It is the only one in which the profits are reckoned in dollars and the losses in lives. A racket is best described, I believe, as something that is not what it seems to the majority of the people. Only a small "inside" group knows what it is about. It is conducted for the benefit of the very few, at the expense of the very many. Out of war a few people make huge fortunes. In the World War [I] a mere handful garnered the profits of the conflict. At least 21,000 new millionaires and billionaires were made in the United States during the World War. That many admitted their huge blood gains in their income tax returns. How many other war millionaires falsified their tax returns no one knows. How many of these war millionaires shouldered a rifle? How many of them dug a trench? How many of them knew what it meant to go hungry in a rat-infested dug-out? How many of them spent sleepless, frightened nights, ducking shells and shrapnel and machine gun bullets? How many of them parried a bayonet thrust of an enemy? How many of them were wounded or killed in battle? Out of war nations acquire additional territory, if they are victorious. They just take it. This newly acquired territory promptly is exploited by the few - the selfsame few who wrung dollars out of blood in the war. The general public shoulders the bill. And what is this bill? This bill renders a horrible accounting. Newly placed gravestones. Mangled bodies. Shattered minds. Broken hearts and homes. Economic instability. Depression and all its attendant miseries. Back-breaking taxation for generations and generations. For a great many years, as a soldier, I had a suspicion that war was a racket; not until I retired to civil life did I fully realize it. Now that I see the international war clouds g
Paul Merrell

Can The ObamaCare Enrollment Numbers Be Believed? - Investors.com - 0 views

  • When the Obama administration announced on April 1 that an estimated 7.1 million had signed up for ObamaCare by the end of March, it seemed a nearly impossible achievement. In every month before, sign-ups lagged behind the administration's original forecast by wide margins and had fallen 1.4 million behind by the end of February. In mid-March, the AP said that it would take "close to a miracle" just to reach 6 million. And a Rand survey out this week puts enrollment by early March at less than 4 million. To reach 7.1 million, sign-ups had to rocket up by 67% in just one month. That's astounding enough, but an IBD review of existing ObamaCare enrollment data shows that the mathematical challenge of reaching 7.1 million sign-ups was even tougher.
Paul Merrell

Edward Snowden was targeted by Russian spies 6 years BEFORE he exposed US secrets - Mir... - 0 views

  • Ex-KGB Major Boris Karpichkov said spies from Russia’s SVR intelligence service posing as ­diplomats tricked Snowden into ­seeking asylum in Russia
  • Russian spies had whistleblower Edward Snowden in their sights SIX YEARS before he exposed US secrets, reports the Sunday People.Moscow believed the cyber wizard working for the CIA in Geneva was ripe for defection in 2007 and opened a file on him, says a KGB defector.But secret agents did not swoop until last year when Snowden, 30, fled to Hong Kong with 1.7 million top secret documents which he leaked to the media.Ex-KGB Major Boris Karpichkov said spies from Russia’s SVR intelligence service posing as ­diplomats tricked Snowden into ­seeking asylum in Russia.And when the turncoat went there the information was leaked to ­provoke the US into cancelling his passport , so restricting his movements, said Karpichkov.
  • “He wasn’t a Russian spy before he went to Moscow . But death threats have frightened him."These threats were a carefully planned operation by the Russian security services to make Snowden stay in Russia.“Snowden cannot leave Moscow even if he wanted as the Americans have cancelled his passport.”He was admitted to the country on a 12-month renewable visa.But Karpichkov said Snowden’s flight to Moscow was deliberately leaked by the Russians to provoke the Americans into just such an action.
  • ...1 more annotation...
  • Last week the Sunday People ­revealed how Snowden has given so much away about how our GCHQ eavesdroppers gather information on Islamist killers that officials have been forced to set up new procedures.This week it has emerged that GCHQ staff named by Snowden have made plans to rush their partners and kids to safety should they become targets for terrorists.A senior Whitehall source told us: “Parts of the radar have gone dark and that is very worrying. Snowden has committed the worst kind of treachery.”Karpichkov agreed.He said: “There is no doubt he has put Britain and America in grave danger.”
  •  
    To say I am dubious is a gross understatement. From the publication of his first leaked document, the western military intelligence/industrial complex has been attempting to kill the messenger rather than address the message. The meme that he defected to the Russians has been making the rounds for months, but without any supporting allegations, ignoring that his stay in Russia while in transit to Ecuador was the result of the U.S. pulling his passport. Now we have a story in a British yellow-journalism tabloid fairly infamous for publishing hoaxes that meets that criticism, Suddenly, we are told by a former KGB officer that Russian intelligence maneuvered the U.S. into pulling Snowden's passport while Snowden was on layover in Moscow during his travel from Hong Kong to South America.  But the public opinion polls have been moving in the civil libertarians' direction so an escalation in the quality of attacks on Snowden has been entirely predictable. And of course the article ends with an ad hominem "treachery attack on Snowden attributed to GCHQ and an anonymous "senior Whitehall source."  It will be interesting to see what Snowden and Glenn Greenwald have to say about this. If you're interested in the background of the ex-KBG officer, the following Google query will get you lots of information: +kgb +"boris karpichkov" -Snowden  
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

To beat ISIS, kick out US-led coalition | nsnbc international - 0 views

  • It’s been a bad time for foes of ISIS. Islamic State scored a neat hat-trick by invading strategic Ramadi in Iraq’s mainly Sunni Anbar province, occupying Syria’s historic gem Palmyra, and taking over Al-Tanf, the last remaining border crossing with Iraq. The multinational, American-led ‘Coalition’ launched last August to thwart Islamic State’s (IS, formerly ISIS) march across Syria and Iraq…did nothing.
  • The Iraqis have shot back. Key MP Hakim al-Zamili blames Ramadi’s collapse on the US’s failure to provide “good equipment, weapons and aerial support” to troops. Deputy Prime Minister Saleh Mutlaq, himself a Sunni from Anbar Province, concluded that the Americans were coming up short in all areas. “The Coalition airstrikes are not enough to eliminate IS.” Furthermore, the US policy of recruiting Sunni tribes for the fight, he added, was “too late” – it is “important but not enough.” If ever there was an understatement, this is it. Washington’s long-stated objective of rallying together a vetted Sunni fighting force – or its equivalent in the form of a National Guard – has always served as a placeholder to avoid facing realities.
  • One thing we have learned from IS gains in small and large Sunni towns alike, is that the extremist group prides itself on sleeper cells and alliances inside of these areas. Sunni tribes and families, both, are divided on their support of IS. And the militants ensure that everyone else falls in line through a brutal campaign of inflicting fear and pain indiscriminately. So the likelihood of a significant, anti-IS, well-trained and equipped Sunni fighting force emerging anytime soon is just about nil. So too is the idea of a US-led Coalition air force that can cripple Islamic State. Washington has run fewer sorties over Syria and Iraq in the nine months since inception of its air campaign, than Israel ran in its entire three-week Gaza blitz in 2008-09. Where were the American bombers when Ramadi and Palmyra were being taken? And why does the US Air Force only seem to engage in earnest when their Kurdish allies are being threatened – as in Kobani (Ain al-Arab), Syria, and Erbil in Iraq?
  • ...12 more annotations...
  • If actions speak louder than words, then Washington’s moves in the Mideast have been deafening. Forget talk of a ‘unified Iraq’ with a ‘strong central government’. And definitely forget loudly-proclaimed objectives of ‘training moderate forces’ to ‘fight off IS’ across the Jordanian and Turkish borders in Syria. That’s just talk. An objective look at US interests in the region paint an entirely different picture. The Americans seek to maintain absolute hegemony in the Mideast, even as they exit costly military occupations of Iraq and Afghanistan. Their primary interests are 1) access to low cost oil and gas, 2) propping up Israel, and more recently, 3) undermining Russian (and Chinese) influence in the region. Clinging on to hegemony would be a whole lot easier without the presence of a powerful, independent Islamic Republic of Iran, which continues to throw a wrench in many of Washington’s regional projects. So hegemony is somewhat dependent on weakening Iran – and its supportive alliances.
  • But why ignore Sunni groups who are unreservedly opposed to IS? Aren’t they America’s natural constituents inside Iraq? The Takfiri extremist groups serve a purpose for Washington. IS has had the ability – where competing Sunni factions, with their ever-growing lists of demands from Baghdad, have not – to transform the US’ ‘buffer’ project into a physical reality. And Washington has not needed to expend blood, treasure or manpower to get the job done.
  • You only have to look at recent US actions in Iraq to see this unspoken plan in action. Washington’s most intensive airstrikes to date were when Kurdish Erbil and its environs came under threat by ISIS.Washington’s most intensive airstrikes to date were when Kurdish Erbil and its environs came under threat by ISIS. Congress has breached all international norms by ushering through legislation to directly arm Sunni and Kurdish militias and bypass the central government in Baghdad. And despite endless promises and commitments, the Americans have failed at every hurdle to train and equip the Iraqi Army and security forces to do anything useful. A weak, divided Iraq can never become a regional powerhouse allied with Iran and the Resistance Axis. Likewise a weak, divided Syria. But without US control over these central governments, the only way to achieve this is 1) through the creation of sectarian and ethnic strife that could carve out pro-US buffers inside the ‘Resistance states’ and/or 2) through the creation of a hostile ‘Sunni buffer’ to break this line from Iran to Palestine.
  • General Walid Sukariyya, a Sunni, pro-resistance member of Lebanon’s parliament, agrees. “ISIS will be better for the US and Israel than having a strong Iran, Iraq and Syria…If they succeed at this, the Sunni state in Iraq will split the resistance from Palestine.” While Washington has long sought to create a buffer in Iraq on the Syrian border, it has literally spent years trying – and failing – to find, then mold, representative Sunni Iraqi leaders who will comfortably toe a pro-American line. An example of this is the Anbar delegation US General John Allen handpicked last December for a DC tour, which excluded representatives of the two most prominent Sunni tribes fighting IS in Iraq – the Albu Alwan and Albu Nimr. A spokesman for the tribes, speaking to Al-Jarida newspaper, objected at the time: “We are fighting ISIL and getting slaughtered, while suffering from a shortage of weapons. In the meantime, others are going to Washington to get funds and will later be assigned as our leaders.”
  • With the removal of Saddam Hussein in Iraq, the US inadvertently extended Iran’s arc of influence in a direct geographic line to Palestine, leaving the Israeli colonial project vulnerable. Former President George W. Bush immediately took on the task of destroying this Resistance Axis by attempting to neuter Iranian allies Hezbollah, Syria and Hamas – and failed. The Arab Spring presented a fresh opportunity to regroup: the US and its Turkish and Persian Gulf allies swung into action to create conditions for regime-change in Syria. The goal? To break this geographic line from Iran – through Iraq, Syria and Lebanon – to Palestine. When regime-change failed, the goalpost moved to the next best plan: dividing Syria into several competing chunks, which would weaken the central state and create a pro-US ‘buffer’ along the border with Israel. Weakening the central government in Iraq by dividing the state along Kurdish, Sunni and Shiite lines has also been a priority for the Americans.
  • The DIA brief makes clear that the escalation of conflict in Syria will create further sectarianism and radicalization, which will increase the likelihood of an ‘Islamic State’ on the Syrian-Iraqi border, one that would likely be manned by the Islamic State of Iraq (ISI). So what did Washington do when it received this information? It lied. Less than one month after the DIA report was published, US Secretary of State John Kerry told the Senate Foreign Relations Committee this about the Syrian opposition: “I just don’t agree that a majority are Al-Qaeda and the bad guys. That’s not true. There are about 70,000 to 100,000 oppositionists … Maybe 15 percent to 25 percent might be in one group or another who are what we would deem to be bad guys…There is a real moderate opposition that exists.” Using the fabricated storyline of ‘moderate rebels’ who need assistance to fight a ‘criminal Syrian regime’, the US government kept the Syrian conflict buzzing, knowing full well the outcome would mean the establishment of a Sunni extremist entity spanning the Syrian-Iraqi border…which could cripple, what the Americans call, “the strategic depth of the Shia expansion.”As US Council on Foreign Relations member and terrorism analyst Max Abrahms conceded on Twitter: “The August 5, 2012 DIA report confirms much of what Assad has been saying all along about his opponents both inside & outside Syria.”
  • Since last year, numerous Iraqi officials have complained about the US airdropping weapons to IS – whether deliberately or inadvertently remains disputed. Military sources, on the other hand, have made clear that the US-led Coalition ignores many of the Iraqi requests for air cover during ground operations. If the US isn’t willing to play ball in Iraq’s existential fight against IS, then why bother with the Americans at all? Iraqi Prime Minister Haider al-Abadi is viewed as a ‘weak’ head of state – a relatively pro-American official who will work diligently to keep a balance between US interests and those of Iraq’s powerful neighbor, Iran. But after the disastrous fall of Ramadi, and more bad news from inside Syria, Abadi has little choice but to mitigate these losses, and rapidly. The prime minister has now ordered the engagement of thousands of Hashd al-Shaabi (Shiite paramilitary groups, commonly known as the Popular Mobilization Forces) troops in the Anbar to wrest back control of Ramadi. And this – unusually – comes with the blessings of Anbar’s Sunni tribes who voted overwhelmingly to appeal to the Hashd for military assistance.
  • Joining the Hashd are a few thousand Sunni fighters, making this a politically palatable response. If the Ramadi operation goes well, this joint Sunni-Shiite effort (which also proved successful in Tikrit) could provide Iraq with a model to emulate far and wide. The recent losses in Syria and Iraq have galvanized IS’ opponents from Lebanon to Iran to Russia, with commitments pouring in for weapons, manpower and funds. If Ramadi is recovered, this grouping is unlikely to halt its march, and will make a push to the Syrian border through IS-heavy territory. There is good reason for this: the militants who took Ramadi came across the Syrian border – in full sight of US reconnaissance capabilities. A senior resistance state official told me earlier this year: “We will not allow the establishment of a big (extremist) demographic and geographic area between Syria and Iraq. We will work to push Syrian ISIS inside Syria and Iraqi ISIS inside Iraq.”
  • Right now, the key to pushing back Takfiri gains inside Syria’s eastern and northwestern theaters lies in the strengthening of the Iraqi military landscape. And an absolute priority will be in clearing the IS ‘buffer’ between the two states. Eighteen months ago, in an analysis about how to fight jihadist militants from the Levant to the Persian Gulf, I wrote that the solution for this battle will be found only within the region, specifically from within those states whose security is most compromised or under threat: Lebanon, Syria, Iraq and Iran. I argued that these four states would be forced to increase their military cooperation as the battles intensified, and that they would provide the only ‘boots on the ground’ in this fight. And they will. But air cover is a necessary component of successful offensive operations, even in situations of unconventional warfare. If the US and its flimsy Coalition are unable or unwilling to provide the required reconnaissance assistance and the desired aerial coverage, as guided by a central Iraqi military command, then Iraq should look elsewhere for help.
  • Iran and Russia come to mind – and we may yet get there. Iraq and Syria need to merge their military strategies more effectively – again, an area where the Iranians and Russians can provide valuable expertise. Both states have hit a dangerous wall in the past few weeks, and the motivation for immediate and decisive action is high today. Lebanese resistance group Hezbollah is coming into play increasingly as well – its Secretary-General Hassan Nasrallah has recently promised that Hezbollah will no longer limit itself geographically, and will go where necessary to thwart this Takfiri enemy. The non-state actors that make up the jihadist and Takfiri core cannot be beaten by conventional armies, which is why local militias accustomed to asymmetric warfare are best suited for these battles. Criticizing the US’s utterly nonexistent response to the Ramadi debacle yesterday, Iran’s elite Quds Force Commander Qassem Suleimani points out: “Today, there is nobody in confrontation with [IS] except the Islamic Republic of Iran, as well as nations who are next to Iran or supported by Iran.” The Iranians have become central figures in the fight against terror, and are right next door to it – as opposed to Washington, over 6,000 miles away.
  • If the US has any real commitment to the War on Terror, it should focus on non-combat priorities that are also essential to undermine extremism: 1) securing the Turkish and Jordanian borders to prevent any further infiltration of jihadists into Syria and Iraq, 2) sanctioning countries and individuals who fund and weaponize the Takfiris, most of whom are staunch US allies, now ironically part of the ‘Coalition’ to fight IS, and 3) sharing critical intelligence about jihadist movements with those countries engaged in the battle. It is time to cut these losses and bring some heavyweights into this battle against extremism. If the US-directed Coalition will not deliver airstrikes under the explicit command of sovereign states engaged at great risk in this fight, it may be time to clear Iraqi and Syrian airspace of coalition jets, and fill those skies with committed partners instead.
  • Related documentation: DIA Doc Syria and Iraq:_ Pg.-291-Pgs.-287-293-JW-v-DOD-and-State-14-812-DOD-Release-2015-04-10-final-version11.
  •  
    Woh! Things definitely coming to an inflexion point in Syria and Iraq. This is a reprint from RT.com, the Russian video and web page news service. The hint of direct and overt military action by Russia and Iran should not be ignored. The U.S. is sandbagging for ISIL and al Nusiryah. 
Paul Merrell

Court asked to kill off NSA's 'zombie dragnet' of Americans' bulk phone data | US news ... - 0 views

  • The leading civil liberties group in the United States has requested a federal court to stop the National Security Agency from collecting Americans’ phone data in bulk through the end of the year.
  • While the surveillance dragnet was phased out by Congress and Barack Obama last month, an American Civil Liberties Union suit seeks to end a twilight, zombie period of the same US phone records collection, slated under the new law to last six months. “Today the government is continuing – after a brief suspension – to collect Americans’ call records in bulk on the purported authority of precisely the same statutory language this court has already concluded does not permit it,” the ACLU writes in a motion filed on Tuesday before the second circuit court of appeals.
  • The venue is significant. On 7 May, as Congress debated ending the domestic phone-records collection, the second circuit ruled the collection was illegal. Yet it did not order Obama’s administration to cease the bulk collection, writing that a preferable option would be to stay out of the unfolding legislative battle over the future scope of US surveillance. That debate ended on 2 June with the passage of the USA Freedom Act, which reinstated expired provisions of the Patriot Act that the government had since 2006 relied upon – erroneously, in the second circuit’s view – for the bulk collection. Yet it ended the NSA’s bulk US phone records collection and created a new mechanism for the NSA to gather “call data records” from telecoms pursuant to a court order.
  • ...1 more annotation...
  • Within hours of signing the bill, Obama requested that the secret surveillance panel known as the Fisa court reinstate the dragnet, relying on a provision permitting a six-month “transition” period. Judge Michael Mosman granted the request on 29 June. The ACLU, which was the plaintiff in the case the second circuit decided, has indicated since the Fisa court began considering resumption of the dragnet that it would seek an injunction. Its major contention in support of the requested injunction is that despite the Freedom Act’s provision for a transition period, the underlying law authorizing the bulk surveillance remains the same Patriot Act provisions that the second circuit held do not justify the NSA phone-records collection. “There is no sound reason to accord this language a different meaning now than the court accorded it in May. [The Patriot Act] did not authorize bulk collection in May, and it does not authorize it now,” reads the ACLU brief.
Paul Merrell

Path cleared for judge to block NSA phone surveillance program - POLITICO - 0 views

  • A federal judge who seems keen on blocking the National Security Agency's phone records collection program has a clear path to doing so after a federal appeals court removed a potential obstacle Tuesday.The U.S. Court of Appeals for the D.C. Circuit formally ended an appeal in the case Tuesday, effectively returning control over the underlying lawsuit to U.S. District Court Judge Richard Leon.Leon could now act at any time to require the NSA to shut the program down, but such a move seems most likely after Thursday, when a hearing is scheduled on the suit filed by conservative activist Larry Klayman.
  • Nearly two years ago, Leon ruled that the NSA program--sometimes known as the Section 215 business records program--was likely unconstitutional and he ordered the program halted. That time he put his order on hold pending appeal, but at a hearing last month the judge sounded eager to issue a permanent injunction in the case before the program's scheduled end next month."The clock is running and there isn't much time between now and November 29," Leon told Klayman at the Sept. 2 session. "This court believes there are millions and millions of Americans whose constitutional rights have been and are being violated, but the window ... for action is very small ... It's time to move."
  • In May, the New York-based 2nd Circuit U.S. Court of Appeals ruled that the NSA phone metadata program was unlawful because the Patriot Act provision used to authorize it did not in fact provide authority for bulk collection of records largely unrelated to terrorism. The appeals court heard a new round of oral arguments on that case last month, focusing on the impact the law passed in June will have on the litigation.
  • ...1 more annotation...
  • In August, the D.C. Circuit overturned Leon's self-stayed injunction in the case. The three-judge panel didn't get into the substance of the legality of the NSA program, but focused on whether Klayman and his clients had enough facts to reasonably allege that they were subject to the program.Two judges said Klayman might be able to show standing. Leon appears to consider that issue resolved because Klayman recently added to the case a California law firm that used the only telecom provider which government lawyers concede took part in the program: Verizon Business Network Services.
Paul Merrell

U.S. surveillance architecture includes collection of revealing Internet, phone metadat... - 0 views

  • On March 12, 2004, acting attorney general James B. Comey and the Justice Department’s top leadership reached the brink of resignation over electronic surveillance orders that they believed to be illegal. President George W. Bush backed down, halting secret foreign-intelligence-gathering operations that had crossed into domestic terrain. That morning marked the beginning of the end of STELLARWIND, the cover name for a set of four surveillance programs that brought Americans and American territory within the domain of the National Security Agency for the first time in decades. It was also a prelude to new legal structures that allowed Bush and then President Obama to reproduce each of those programs and expand their reach.What exactly STELLARWIND did has never been disclosed in an unclassified form. Which parts of it did Comey approve? Which did he shut down? What became of the programs when the crisis passed and Comey, now Obama’s expected nominee for FBI director, returned to private life?Authoritative new answers to those questions, drawing upon a classified NSA history of STELLARWIND and interviews with high-ranking intelligence officials, offer the clearest map yet of the Bush-era programs and the NSA’s contemporary U.S. operations.STELLARWIND was succeeded by four major lines of intelligence collection in the territorial United States, together capable of spanning the full range of modern telecommunications, according to the interviews and documents.
  • Two of the four collection programs, one each for telephony and the Internet, process trillions of “metadata” records for storage and analysis in systems called MAINWAY and MARINA, respectively. Metadata includes highly revealing information about the times, places, devices and participants in electronic communication, but not its contents. The bulk collection of telephone call records from Verizon Business Services, disclosed this month by the British newspaper the Guardian, is one source of raw intelligence for MAINWAY.The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.For Internet content, the most important source collection is the PRISM project reported on June 6 by The Washington Post and the Guardian. It draws from data held by Google, Yahoo, Microsoft and other Silicon Valley giants, collectively the richest depositories of personal information in history.
  • The debate has focused on two of the four U.S.-based collection programs: PRISM, for Internet content, and the comprehensive collection of telephone call records, foreign and domestic, that the Guardian revealed by posting a classified order from the Foreign Intelligence Surveillance Court to Verizon Business Services.The Post has learned that similar orders have been renewed every three months for other large U.S. phone companies, including Bell South and AT&T, since May 24, 2006. On that day, the surveillance court made a fundamental shift in its approach to Section 215 of the Patriot Act, which permits the FBI to compel production of “business records” that are relevant to a particular terrorism investigation and to share those in some circumstances with the NSA. Henceforth, the court ruled, it would define the relevant business records as the entirety of a telephone company’s call database.The Bush administration, by then, had been taking “bulk metadata” from the phone companies under voluntary agreements for more than four years. The volume of information overwhelmed the MAINWAY database, according to a classified report from the NSA inspector general in 2009. The agency spent $146 million in supplemental counterterrorism funds to buy new hardware and contract support — and to make unspecified payments to the phone companies for “collaborative partnerships.”When the New York Times revealed the warrantless surveillance of voice calls, in December 2005, the telephone companies got nervous. One of them, unnamed in the report, approached the NSA with a request. Rather than volunteer the data, at a price, the “provider preferred to be compelled to do so by a court order,” the report said. Other companies followed suit. The surveillance court order that recast the meaning of business records “essentially gave NSA the same authority to collect bulk telephony metadata from business records that it had” under Bush’s asserted authority alone.
  • ...3 more annotations...
  • Telephone metadata was not the issue that sparked a rebellion at the Justice Department, first by Jack Goldsmith of the Office of Legal Counsel and then by Comey, who was acting attorney general because John D. Ashcroft was in intensive care with acute gallstone pancreatitis. It was Internet metadata.At Bush’s direction, in orders prepared by David Addington, the counsel to Vice President Richard B. Cheney, the NSA had been siphoning e-mail metadata and technical records of Skype calls from data links owned by AT&T, Sprint and MCI, which later merged with Verizon.For reasons unspecified in the report, Goldsmith and Comey became convinced that Bush had no lawful authority to do that.MARINA and the collection tools that feed it are probably the least known of the NSA’s domestic operations, even among experts who follow the subject closely. Yet they probably capture information about more American citizens than any other, because the volume of e-mail, chats and other Internet communications far exceeds the volume of standard telephone calls.The NSA calls Internet metadata “digital network information.” Sophisticated analysis of those records can reveal unknown associates of known terrorism suspects. Depending on the methods applied, it can also expose medical conditions, political or religious affiliations, confidential business negotiations and extramarital affairs.What permits the former and prevents the latter is a complex set of policies that the public is not permitted to see.
  • In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use “contact chaining” techniques to build what the NSA describes as network graphs of people who represented potential threats.The legal challenge for the NSA was that its practice of collecting high volumes of data from digital links did not seem to meet even the relatively low requirements of Bush’s authorization, which allowed collection of Internet metadata “for communications with at least one communicant outside the United States or for which no communicant was known to be a citizen of the United States,” the NSA inspector general’s report said.Lawyers for the agency came up with an interpretation that said the NSA did not “acquire” the communications, a term with formal meaning in surveillance law, until analysts ran searches against it. The NSA could “obtain” metadata in bulk, they argued, without meeting the required standards for acquisition.Goldsmith and Comey did not buy that argument, and a high-ranking U.S. intelligence official said the NSA does not rely on it today.As soon as surveillance data “touches us, we’ve got it, whatever verbs you choose to use,” the official said in an interview. “We’re not saying there’s a magic formula that lets us have it without having it.”
  • When Comey finally ordered a stop to the program, Bush signed an order renewing it anyway. Comey, Goldsmith, FBI Director Robert S. Mueller III and most of the senior Bush appointees in the Justice Department began drafting letters of resignation.Then-NSA Director Michael V. Hayden was not among them. According to the inspector general’s classified report, Cheney’s lawyer, Addington, placed a phone call and “General Hayden had to decide whether NSA would execute the Authorization without the Attorney General’s signature.” He decided to go along.The following morning, when Mueller told Bush that he and Comey intended to resign, the president reversed himself.Three months later, on July 15, the secret surveillance court allowed the NSA to resume bulk collection under the court’s own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as “pen register, trap and trace,” that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line.
  •  
    Note particularly the mention that the FISA Court decision to throw the doors open for government snooping was based on "pen register, trap and trace" law. As suspected, now we are into territory dealt with by the Supreme Court in the pre-internet days of 1979 In Smith v. Maryland, 442 U.S. 735 (1979), More about that next, in a bookmark also tagged with "pen-register".
Gary Edwards

The Daily Bell - Gerald Celente on Multinationalism, Breaking the Chains and Individual... - 0 views

  • Gerald Celente: As I said, they're in a trap and it's a tapering trap, the quantitative easing trap. They can't keep printing more money because it's going to devalue the currency. And by the way, this is complicated, because it's not only the United States that's doing it; most of the central banks are doing it. China, the Europeans – they're all pumping money into their systems to keep them afloat. They're all in a trap. A time comes when you just can't keep doing it anymore. You can only take heroin so much before it kills you. This is monetary methadone and it's not going to cure the problem so they're going to have to stop. When it stops, that's when we go back into a recession and/or a depression.
  • Is it a depression? Is it a depression if you live in Greece or Spain or Portugal? Is it a depression if you're among the over 12% unemployed in Italy? When you look at John Williams's ShadowStats, in the US we're looking at about 22% unemployment. So yes, it's a depression for a lot of people. And then again, median household income in the US, accounting for inflation, is 10% below 1999 levels. That's a fact. So if you're earning 10 percent less for your family than you were in 1999 and the costs have skyrocketed since then, particularly in healthcare, food, rent, property, gas and other costs, do you think you're living in a depression? Daily Bell: Is central banking an art, a science or just a fraud?
  • Gerald Celente: Neither. It's a criminal operation. Throughout the 1800s, one of the major issues of every presidential election was whether or not to have a central bank. They fought it successfully not to have one until 1913. These are private banks that are running our country and many others. This goes back to the scriptures; it's Christ chasing the moneychangers out of the temple. The moneychangers have just got new names – Deutsche Bank, Societe Generale, Goldman Sachs, JPMorgan Chase, and, of course, JPMorgan Chase got that name because you're going to have to chase them to get your money because they just put a limit on how much you can withdraw or deposit each month in certain accounts, with a limit of $50,000.
  • ...21 more annotations...
  • Daily Bell: It seems like people don't believe in central banking anymore so why does it continue? What holds it up in a so-called democracy where people have a vote? Gerald Celente: Most people don't even know what a central bank is and they still believe the lie that the Federal Reserve is a quasi-government institution when it's not. It's a totally private bank. Most people don't even know that. So most people are uninformed and like in all countries, they follow their leaders. Very few people rebel. There was an incident that happened in late October in the States. Hillary Clinton was speaking in Buffalo, delivering her model for what is required to solve complex problems. There was a heckler in the crowd who she admonished by saying, "... which doesn't include yelling. It includes sitting down and talking." What patronizing bullshit. You know what happened? The audience of 6,500 stood up and gave her a standing ovation that extended on and on. So it's the people. The people can blame the politicians all they want, but as I see it, it's the people's responsibility for the state of their nation.
  • Daily Bell: What's the employment picture like going forward in the US?
  • Gerald Celente: Lower paying jobs, less benefits, more temporary jobs and I think the question at the end is rather than going forward in the US it should be what's going forward in Slavelandia, because that's what it's become. You get out of college and you're an indentured servant. For the rest of your life you have to pay off your debt for your degree in worthlessness, for the most part. There are degrees that are worth something but not a lot of them. Where are you going to work? Name the company – Macy's? Starbucks? You can become a barista. Are they going to start teaching Shipping & Handling 101 in college? What are they going to do? Who are you going to work for? What are you going to do – stock shelves? This is better than slavery because when they had the plantation you had to take care of the slaves. Now you can just use them up and send them home. It's kind of like Bangladesh right here in the good 'ol USA.
  • Daily Bell: How about the rest of the world? Give us a global summary.
  • Gerald Celente: The global summary is this: Everybody can see what happened when the Federal Reserve talked about tapering several months ago. All of a sudden you saw the emerging markets start to crash; they dropped about 11% in a year before the Fed reversed its policy because all the hot, low-interest rate money that was leaving the US was flowing into the emerging markets, where you could borrow the money cheaply. So when they started to talk about tapering the hot money started flowing out of these countries, such as India, Brazil. They were really suffering from it and so were their stock markets. So without the cheap money flowing from the central banks, the entire global economy goes on stall and then it turns negative. You can see what's going on in China now; they're facing a banking crisis. Real estate prices in cities like Shanghai and Beijing have gone up over 20% in a year and no matter how the government tries to deflate it, the housing bubble keeps growing. The banks also have a lot of bad loans they're carrying. Now the Chinese government is trying to restrain that free-flow of cheap money, and what happens to their stock market when they do? It dives and the contagion spreads to other Asian equity markets. They all start dropping. It's all tied to cheap money and when the cheap money spigot begins to tighten up the global economy goes down. As I've made very clear, when the interest rates go up the economies go down – it's as simple as that. They've run out of this game. Compare this with the Great Depression, when it began essentially in 1930. This recession begin in 2008. It's now 2013 – we're only in 1935.
  • Daily Bell: China and the BRICS seem to be making noises about setting up their own monetary infrastructure without the dollar. Will that happen?
  • Gerald Celente: Yes, they are making noise, but reality is another issue, and the currency issue is complicated. The dollar goes down but where are you going to go, the euro? We were talking briefly about what's going on in Europe. There's financial market propaganda boasting that the worst of the eurozone crisis is over. They're bragging that The GDP of Spain was just reported to have gone up 0.1% and they made a big deal out of it. "The recession's over" is the B.S. message. No, the recession is not over! They're cooking the numbers to make a rotten situation look less rotten. In countries like Greece and Spain, youth unemployment is running above 50% and overall unemployment around 30%. The recession continues unabated, and there's absolutely no way out of this and they can't print their way out. Portugal, Italy, Greece, Spain, Ireland are doing terrible – what would anyone substitute euros for dollars? And what other currency choices are there, the yuan? As I mentioned, China has plenty of its own problems. They've been dumping a lot of cash into that society to keep it going. You know what China's greatest fear is? It's not the Spratly Islands or the South and China Sea territorial problems that are going on between them, the Philippines, Vietnam or the Japanese. China's greatest fear is its people. They've got 1.2 billion of them and if they're hungry or not happy there's going to be a lot of problems.
  • Again, what do you substitute the dollar for, Brazil's real or the Indian rupee? Remember, we saw what happened when the hot money started leaving the emerging market countries. The South African rand is also under pressure. The BRIC nations can speak as much as they want and they may have the greatest intention to create another reserve currency, but the fact is their economies are not robust or independent enough to create one at this time. As I said, talk is one thing, facts are another and although the world is less dependent on the dollar it is still by far the major reserve currency of the world and I don't see that rapidly changing unless there's a catastrophe that would cause it to happen. However, over the years, I do expect a new reserve model to develop.
  • Daily Bell: Let's talk about military action, particularly in Syria where Al Qaeda types have been fighting on the side of the US and NATO. Why does the US want to destabilize Syria and what country will be next – Iran? Russia?
  • Gerald Celente: We wrote about this in the Trends Journal going back to 2011. After Libya fell, Syria was the only port that the Chinese and the Russians had in the Mediterranean – the Port of Tartus. And also, Syria's only real ally in that area is Iran and, of course, Hezbollah in Lebanon. So with Syria out of the way there's nothing in the Middle East other than Iran to stop the continued spread of US influence and control in that area. It's really more about that than anything we see – again, having more control over that area for the US to do as it wants, with Iran really being the main target.
  • When President Obama backed off his red line threat and didn't attack Syria that was a tipping point. And, as important, the vast majority of Americans opposed the attack plan. That was a significant statement. The country said it was tired of war – and so are a lot of other nations.
  • Gerald Celente: Again, talk about morality and the recent Amnesty International report that said the United States was breaking international law in its use of drones to kill people that were convicted of nothing in addition to innocent people. How much more immoral could you get?
  • I can tell you how much immoral. How about starting wars in Afghanistan and Iraq – in Iraq with the proof that a war was started that killed at least a half a million people that was started under fake reasons; lies that Saddam Hussein had weapons of mass destruction and ties to al Qaeda. An Afghan war that's the longest war in American history, the war in Libya that they called a time-limed, scope-limited kinetic action that's destroyed the entire nation. You want to talk about immorality? How about the "too big to fail"? The government mandated immoral act of stealing money from the American people to give it to the banks, financiers and favored corporations? They say the fish rots from the head down and that's it; the fish has rotted in America for a long time. It didn't start with Obama. It goes back to Bush, Clinton, and keeps going back. Society gets the message from the top and, as I see it, they're simply following their leaders. For example, if their leader can start wars, rob people, take their money, why shouldn't I? Why should I operate on a moral level when immorality is condoned at the top?
  • Most recently, the United States government, in virtually every fashion of behavior, has been fascist. I don't say that by throwing the word out loosely. It's called the merger of corporate state and powers. It goes back to "too big to fail." Under capitalism there's no such thing. You're not too big to fail; you fail. Big, small, medium, you fail – it's capitalism.
  • Not anymore. You have your money taken from you by government order and it's transferred to the people who are the most favored by those in power. That's the only reason why the stock market keeps going up and why the multinationals are doing so well. That's where the $85 billion a month that the Federal Reserve is using in their quantitative easing is going. Then when you look at the other levels of immorality, as I mentioned, why shouldn't people feel as though they can do anything the government is doing? That's why it just keeps getting worse and worse. It's reflected in the music, the politics, every element of culture – both pop culture and political culture.
  • Under the dictates of the eurozone and globalization, the love of one's culture and pride of nation is denounced as "populism."
  • Daily Bell: Let's talk hard money. Can you give us an update on the price action of gold and silver? How about equity? Where is the stock market headed? We think the big boys are trying to rev it up and go for one last killing. Your thoughts?
  • Gerald Celente: The stock market will continue to rise as long as interest rates stay low. That's the best estimate you could give. They keep all of this quantitative easing that, for example, benefits the big private equity firms. Look what's going on in the United States with Blackstone Group. They own 40,000 homes. Where are they getting the money? Deutsche Bank is loaning them tons of money because they're getting money with overnight rates near zero, and they in turn loan it to the "bigs" really cheaply so it is just another example of what's keeping the whole stock market scam going.
  • As long as the money stays cheap the stock market keeps going up. As the money stays cheap gold and silver go up, and you're seeing gold making a bit of a rebound lately because of, again going back to the employment numbers in the States – there is no recovery, the jobs stink, they're not creating enough jobs. The tapering keeps going on, which is a devaluation of the currency, and quantitative easing continues. As long as money stays cheap gold goes up. Now, gold may go down when quantitative easing and tapering slow down. However, that's only going to be temporary because when that happens the bond market's going to explode, when interest rates go up, there's going to be another financial crisis. My best analysis at this time is the second quarter of 2014. The 'experts' are saying the stock market is booming. It has gone from a 14,000 high in 2007 to mid-15,000 now. Accounting for inflation, the stock market has to be about 15,750 just to be back at the 2007 level.
  • Daily Bell: There are other trends, of course, ones you often mention. You spoke to us last time about the New Millennium Renaissance.
  • Gerald Celente: Back to the renaissance... To me, that's the only thing that's going to change the future. We need a cultural, artistic and moral redevelopment, a restoration. Every issue that we've been talking about so far is based on human behavior and the human spirit – morality or immorality. Until morality is restored and the human spirit rises, nothing's going to change. As I was mentioning before, the fish rots from the head down. If you see the people at the head acting immorally, and from the head all the way down, why shouldn't you or I act immorally? What license do they have to steal that we don't? What license do they have to kill that we shouldn't?
Paul Merrell

Exclusive: Dozens of Clinton emails were classified from the start, U.S. rules suggest ... - 0 views

  • For months, the U.S. State Department has stood behind its former boss Hillary Clinton as she has repeatedly said she did not send or receive classified information on her unsecured, private email account, a practice the government forbids.While the department is now stamping a few dozen of the publicly released emails as "Classified," it stresses this is not evidence of rule-breaking. Those stamps are new, it says, and do not mean the information was classified when Clinton, the Democratic frontrunner in the 2016 presidential election, first sent or received it.But the details included in those "Classified" stamps — which include a string of dates, letters and numbers describing the nature of the classification — appear to undermine this account, a Reuters examination of the emails and the relevant regulations has found.The new stamps indicate that some of Clinton's emails from her time as the nation's most senior diplomat are filled with a type of information the U.S. government and the department's own regulations automatically deems classified from the get-go — regardless of whether it is already marked that way or not.In the small fraction of emails made public so far, Reuters has found at least 30 email threads from 2009, representing scores of individual emails, that include what the State Department's own "Classified" stamps now identify as so-called 'foreign government information.' The U.S. government defines this as any information, written or spoken, provided in confidence to U.S. officials by their foreign counterparts.
  • This sort of information, which the department says Clinton both sent and received in her emails, is the only kind that must be "presumed" classified, in part to protect national security and the integrity of diplomatic interactions, according to U.S. regulations examined by Reuters."It's born classified," said J. William Leonard, a former director of the U.S. government's Information Security Oversight Office (ISOO). Leonard was director of ISOO, part of the White House's National Archives and Records Administration, from 2002 until 2008, and worked for both the Bill Clinton and George W. Bush administrations."If a foreign minister just told the secretary of state something in confidence, by U.S. rules that is classified at the moment it's in U.S. channels and U.S. possession," he said in a telephone interview, adding that for the State Department to say otherwise was "blowing smoke."
  • Although it appears to be true for Clinton to say none of her emails included classification markings, a point she and her staff have emphasized, the government's standard nondisclosure agreement warns people authorized to handle classified information that it may not be marked that way and that it may come in oral form.The State Department disputed Reuters' analysis but declined requests to explain how it was incorrect.
  • ...5 more annotations...
  • Clinton and her senior staff routinely sent foreign government information among themselves on unsecured networks several times a month, if the State Department's markings are correct. Within the 30 email threads reviewed by Reuters, Clinton herself sent at least 17 emails that contained this sort of information. In at least one case it was to a friend, Sidney Blumenthal, not in government. The information appears to include privately shared comments by a prime minister, several foreign ministers and a foreign spy chief, unredacted bits of the emails show. Typically, Clinton and her staff first learned the information in private meetings, telephone calls or, less often, in email exchanges with the foreign officials.
  • The findings of the Reuters review are separate from the recent analysis by the inspector general for U.S. intelligence agencies, who said last month that his office found four emails that contained classified government secrets at the time they were sent in a sample of 40 emails not yet made public.The State Department has said it does not know whether the inspector general is correct.
  • The Reuters review also found that the declassification dates the department has been marking on these emails suggest the department might believe the information was classified all along. Gerlach said this was incorrect.
  • A series of presidential executive orders has governed how officials should handle the ceaseless incoming stream of raw, usually unmarked information they acquire in their work. Since at least 2003, they have emphasized that information shared by a foreign government with an expectation or agreement of confidentiality is the only kind that is "presumed" classified.The State Department's own regulations, as laid out in the Foreign Affairs Manual, have been unequivocal since at least 1999: all department employees "must ... safeguard foreign government and NATO RESTRICTED information as U.S. Government Confidential" or higher, according to the version in force in 2009, when these particular emails were sent.
  • A spokeswoman for one of the foreign governments whose information appears in Clinton's emails said, on condition of anonymity to protect diplomatic relations, that the information was shared confidentially in 2009 with Clinton and her senior staff.If so, it appears this information should have been classified at the time and not handled on a private unsecured email network, according to government regulations.The foreign government expects all private exchanges with U.S. officials to be treated that way, the spokeswoman for the foreign government said.Leonard, the former ISOO director, said this sort of information was improperly shared by officials through insecure channels more frequently than the public may realize, although more typically within the unsecured .gov email network than on private email accounts.With few exceptions, officials are forbidden from sending classified information even via the .gov email network and must use a dedicated secure network instead. The difference in Clinton's case, Leonard said, is that so-called "spillages" of classified information within the .gov network are easier to track and contain.
Paul Merrell

Exclusive: at ICC Palestine seeks 23 counts against Israel, 7 war crimes - 0 views

  • Palestinian leaders seek to charge Israel at the International Criminal Court in The Hague with the crime of “Apartheid” and 22 other criminal counts, including seven war crimes. A thick set of documents containing evidence and arguments was ceremoniously handed over to the ICC today at its headquarters, according to Shawan Jabarin, the director of the Palestinian human rights group Al Haq. Jabarin said he had seen the documents in Ramallah and that the case file covers three areas of Israeli violations under international law: the summer war in Gaza in 2014, settlements in East Jerusalem and the West Bank, and issues relating to Palestinian prisoners. Most of the pages are of “legal analysis and legal arguments” he said, in which Palestinians gave technical explanations to the court for how Israel broke specific regulations.
  • The dossier is organized into sections, one for each of the 23 counts against Israel. Aside from asserting that Israel has violated the United Nations definition of “Apartheid,” Jabarin said the report also names specific crimes such as the “targeting of civilians” in Gaza, and violations of rights to due process for Palestinian detainees held in Israeli prisons who are then prosecuted under Israeli military code. Military courts boast a 99.9% conviction rate and trials last an average of five minutes. Palestinians rights groups say these courts violate their fundamental rights to a fair trial. Additionally, Israel transfers Palestinians from the occupied territory to a number of prisons inside Israel in what the Palestinian brief argues is a violation of the Fourth Geneva Convention.   The evidence used to support each of the Palestinian claims is sourced from field investigations by the Palestinian government, and reports published by the human rights groups Al Haq, Human Rights Watch and Amnesty International. Surprisingly Jabarin indicated the United Nations Human Rights Council’s (UNHRC) report published Sunday outlining “possible war crimes” committed by Israel and Hamas was not included, despite Palestinian leaders stating repeatedly over the past few months that they would courier a copy to the ICC. Even so, the court has the ability to solicit their own research materials including ordering the UN report.
  • Last winter after Palestine joined the ICC, its leaders sought to compel the ICC to look into war crimes committed by Israel. However, Palestinian President Mahmoud Abbas was barred at that time from calling for a criminal investigation. His hands were tied by a four-month waiting period for new members to the court. All the same, Palestinian officials exploited a loophole in the ICC rules to initiate a “preliminary inquiry” against Israel within their first months of joining the ICC. Now that freeze against filing charges against Israel has elapsed, Palestinian officials hope that their documents turned over to the court today will upgrade the inquiry into a full investigation, giving the court the power to summons Israeli officials for a trial. Yet there is no guarantee that the court will charge Israel, and Israel can still take actions that would immobilize The Hague. 
  • ...1 more annotation...
  • The ICC can only move to charge Israel once its internal war crimes investigations closes. The ICC does not prosecute countries or leaders who are sanctioned by their own legal systems. Right now, Israel still has a handful of cases open that could lead to indictments. On the other hand, prosecution in the ICC could be nearing for Hamas for the alleged war crimes it committed during the war, including the targeting of civilians by rocket fire and the killings of so-called collaborators. The UN Human Rights Council report revealed the Islamic movement that rules Gaza does not have any system of internal review, which is the only mechanism that could outright block the ICC from opening charges. As a result, Hamas is currently more exposed to the long arm of the ICC than Israel.
« First ‹ Previous 61 - 80 of 1261 Next › Last »
Showing 20 items per page