Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged must--read

Rss Feed Group items tagged

14More

RealClearMarkets - Yes, IRS Harassment Blunted The Tea Party Ground Game - 0 views

  • We found that the effect was huge: the movement brought the Republican Party some 3-6 million additional votes in House races.
  • The bottom line is that the Tea Party movement, when properly activated, can generate a huge number of votes-more votes in 2010, in fact, than the vote advantage Obama held over Romney in 2012.
    • Gary Edwards
       
      Wow!  So the IRS re-elected Obama?  This is a bureaucratic coup.  We are living in a cleptocracy where the citizens treasury is being systematically looted by Federal bureacracies who are in position and powerfully corrupt enough to elect the representatives who enable them to loot at will. 
  • The data show that had the Tea Party groups continued to grow at the pace seen in 2009 and 2010,
  • ...8 more annotations...
  • and had their effect on the 2012 vote been similar to that seen in 2010, they would have brought the Republican Party as many as 5 - 8.5 million votes compared to Obama's victory margin of 5 million.
  • Unfortunately for Republicans, the IRS slowed Tea Party growth before the 2012 election.
  • In March 2010, the IRS decided to single Tea Party groups out for special treatment when applying for tax-exempt status by flagging organizations with names containing "Tea Party," "patriot," or "9/12."
  • For the next two years, the IRS approved the applications of only four such groups, delaying all others while subjecting the applicants to highly intrusive, intimidating requests for information regarding their activities, membership, contacts, Facebook posts, and private thoughts.
  • As a consequence, the founders, members, and donors of new Tea Party groups found themselves incapable of exercising their constitutional rights, and the Tea Party's impact was muted in the 2012 election cycle.
  • it doesn't take a conspiracy theorist to note that the president's team was competent enough to recognize the threat from the Tea Party and take it seriously.
  • The Obama campaign has made no secret of its efforts to revolutionize turnout models for the most recent campaign.
  • Its remarkable competence turning out its own voters has been widely discussed, and it seems quite plausible that efforts to suppress the Republican vote would have been equally sophisticated.
  •  
    excerpt: .................... The controversy over the IRS's harassment of conservative groups continues. President Obama's team continues to blame low-level bureaucrats. Some conservatives suspect a more sinister explanation: that the levers of government were used to attack an existential threat to the president's 2012 reelection. The president and his party dismiss this as a paranoid fantasy. The evidence, however, is enough to make one believe that targeting Tea Party groups would have been an effective campaign strategy going into the 2012 election cycle. It is a well-known fact that the Tea Party movement dealt the president his famous "shellacking" in the 2010 mid-term election. Less well-known is the actual number of votes this new movement delivered-and the continuing effects these votes could have had in 2012 had the movement not been de-mobilized by the IRS. In a new research paper, Andreas Madestam (from Stockholm University), Daniel Shoag and David Yanagizawa-Drott (both from the Harvard Kennedy School), and I set out to find out how much impact the Tea Party had on voter turnout in the 2010 election. We compared areas with high levels of Tea Party activity to otherwise similar areas with low levels of Tea Party activity, using data from the Census Bureau, the FEC, news reports, and a variety of other sources. We found that the effect was huge: the movement brought the Republican Party some 3-6 million additional votes in House races. That is an astonishing boost, given that all Republican House candidates combined received fewer than 45 million votes. It demonstrates conclusively how important the party's newly energized base was to its landslide victory in those elections, and how worried Democratic strategists must have been about the conservative movement's momentum. The Tea Party movement's huge success was not the result of a few days of work by an elected official or two, but involved activists all over the country who spent the year and a hal
  •  
    One interesting facet of this scandal is that the IRS in its own regulations rewrote a law passed by Congress in the early 50s to permit non-profit corporations to devote part of their resources to political issues. As passed by Congress, it says that the non-profits must be "exclusively" charitable in nature. But when the IRS wrote its implementing regulations, it substituted "primarily" for "exclusively," thus allowing the non-profits to engage in political political campaigns to an undefined extent and getting the IRS into the business of looking at political credentials rather than a simpler review of whether the given non-profit's purpose is purely charitable. Thus, a question of what should be done about this. Roughly, the choices are: [i] amend the statute to read "primarily;" or [ii] leave the statute alone and have someone litigate to correct the IRS regulations. The latter path, if followed, should result in ending *all* non-profits' participation in political campaigns. The advantage of the latter path is that it gets the IRS out of the business of picking whose politics they like. The disadvantage is that it gores a huge number of non-profits' oxen across the political spectrum, so a major lobbying effort to rewrite the statute to maintain the status quo is predictable. But with a court decision holding that the IRS got it wrong, that non-profits must be "exclusively" charitable, presumably it would be illegal for non-profits to do that campaigning themselves.
1More

Doug Casey: All Banks Are Bankrupt - Casey Research - 1 views

  •  
    This interview should be must reading for every citizen of this world.  Doug Casey lays it out, explaining in the simplest of terms the problem of corrupt governments and banksters.  Put this RSS feed right next to Sir Charles' Priced In Gold" blog as essential to start your day with reading. excerpt: "Anyone with any sense should withdraw whatever cash they have in European banks, whether in euros or any other currency, immediately. Cyprus demonstrated that governments are quite willing and able to confiscate money sitting in a bank account in order to preserve the banking system. We live in Bizarro World. L: Why would it spread? Cyprus was said to be particularly vulnerable because of its strong Greek connections; Cypriot banks had bought of lot Greek debt. Would people in Luxembourg be as exposed? Doug: All banks are in effect creatures of the state at this point. They all own a lot of government bonds, which are considered the most secure form of capital. Of course, that's the opposite of the truth; all these governments are bankrupt as well. The Greek government is just more overtly bankrupt than most. Actually, we should take a minute here to discuss what a properly run banking system looks like. Historically, banks offered two types of accounts: demand deposits and time deposits. Demand deposits are what we call checking accounts today, but the original idea was that you'd pay your bank to store your money securely, and you had the right to "demand" your deposit back immediately, and to transfer funds via check. The idea of time deposits, which became savings accounts, was that the bank would pay you interest when you deposited your money with them for a specific period of time. That's why it's called a "time" deposit; you lent the bank your money for a given time, as did other depositors, and the banks would always know how much money they could lend out - at higher interest rates. Furthermore, loans made against time deposits were always short term
2More

Fellow soldiers call Bowe Bergdahl a deserter, not a hero - CNN.com - 0 views

  • The sense of pride expressed by officials of the Obama administration at the release of Army Sgt. Bowe Bergdahl is not shared by many of those who served with him: veterans and soldiers who call him a deserter whose "selfish act" ended up costing the lives of better men.
  •  
    I've been disgusted with American mainstream media and our political class for a very long time. Every now and then I get super-disgusted.  I'll begin with the Obama Administration. They tried to make political hay with something that should not have been made public other than notifying the released American prisoners' parents before the prisoner had been debriefed. Moreover, while I have no problems with swapping Taliban prisoners to get the American prisoner back even if it meant not giving Congress the full 30-day notice required by statute, the Administration certainly could have done a better job of it, notifying key committee members earlier that the deal might be pulled off. Waiting until the Taliban prisoners were up to the steps of the airplane bound for the exchange was not the way this should have happened. Next up, we have the members of Congress who have done their level best to turn the situation into a partisan issue. Obama may have deserved criticism given that he tried to make political hay with the release. But prisoner swaps during wartime have been a feature of most U.S. wars. It is an ancient custom of war and procedures for doing so are even enshrined in the Geneva Conventions governing warfare. So far, I have not heard any war veteran member of Congress scream about releasing terrorists. During my 2+ years in a Viet Nam combat role, the thought of being captured was horrifying. Pilots shot down over North Viet Nam were the lucky ones. No American soldier captured in South Viet Nam was ever released. The enemy was fighting a guerrilla war in the South. They had no means to confine and care for prisoners. So captured American troops were questioned for intelligence and then killed.  Truth be told, American combat troops were prone to killing enemy who surrendered. War is a very ugly situation and feelings run high. It is perhaps a testament to the Taliban that they kept Sgt. Berdahl alive. Certainly that fact clashes irreconcilably with
18More

Edward Snowden: A 'Nation' Interview | The Nation - 0 views

  • Snowden: That’s the key—to maintain the garden of liberty, right? This is a generational thing that we must all do continuously. We only have the rights that we protect. It doesn’t matter what we say or think we have. It’s not enough to believe in something; it matters what we actually defend. So when we think in the context of the last decade’s infringements upon personal liberty and the last year’s revelations, it’s not about surveillance. It’s about liberty. When people say, “I have nothing to hide,” what they’re saying is, “My rights don’t matter.” Because you don’t need to justify your rights as a citizen—that inverts the model of responsibility. The government must justify its intrusion into your rights. If you stop defending your rights by saying, “I don’t need them in this context” or “I can’t understand this,” they are no longer rights. You have ceded the concept of your own rights. You’ve converted them into something you get as a revocable privilege from the government, something that can be abrogated at its convenience. And that has diminished the measure of liberty within a society.
  • From the very beginning, I said there are two tracks of reform: there’s the political and the technical. I don’t believe the political will be successful, for exactly the reasons you underlined. The issue is too abstract for average people, who have too many things going on in their lives. And we do not live in a revolutionary time. People are not prepared to contest power. We have a system of education that is really a sort of euphemism for indoctrination. It’s not designed to create critical thinkers. We have a media that goes along with the government by parroting phrases intended to provoke a certain emotional response—for example, “national security.” Everyone says “national security” to the point that we now must use the term “national security.” But it is not national security that they’re concerned with; it is state security. And that’s a key distinction. We don’t like to use the phrase “state security” in the United States because it reminds us of all the bad regimes. But it’s a key concept, because when these officials are out on TV, they’re not talking about what’s good for you. They’re not talking about what’s good for business. They’re not talking about what’s good for society. They’re talking about the protection and perpetuation of a national state system. I’m not an anarchist. I’m not saying, “Burn it to the ground.” But I’m saying we need to be aware of it, and we need to be able to distinguish when political developments are occurring that are contrary to the public interest. And that cannot happen if we do not question the premises on which they’re founded. And that’s why I don’t think political reform is likely to succeed. [Senators] Udall and Wyden, on the intelligence committee, have been sounding the alarm, but they are a minority.
  • The Nation: Every president—and this seems to be confirmed by history—will seek to maximize his or her power, and will see modern-day surveillance as part of that power. Who is going to restrain presidential power in this regard? Snowden: That’s why we have separate and co-equal branches. Maybe it will be Congress, maybe not. Might be the courts, might not. But the idea is that, over time, one of these will get the courage to do so. One of the saddest and most damaging legacies of the Bush administration is the increased assertion of the “state secrets” privilege, which kept organizations like the ACLU—which had cases of people who had actually been tortured and held in indefinite detention—from getting their day in court. The courts were afraid to challenge executive declarations of what would happen. Now, over the last year, we have seen—in almost every single court that has had this sort of national-security case—that they have become markedly more skeptical. People at civil-liberties organizations say it’s a sea change, and that it’s very clear judges have begun to question more critically assertions made by the executive. Even though it seems so obvious now, it is extraordinary in the context of the last decade, because courts had simply said they were not the best branch to adjudicate these claims—which is completely wrong, because they are the only nonpolitical branch. They are the branch that is specifically charged with deciding issues that cannot be impartially decided by politicians. The power of the presidency is important, but it is not determinative. Presidents should not be exempted from the same standards of reason and evidence and justification that any other citizen or civil movement should be held to.
  • ...14 more annotations...
  • The Nation: Explain the technical reform you mentioned. Snowden: We already see this happening. The issue I brought forward most clearly was that of mass surveillance, not of surveillance in general. It’s OK if we wiretap Osama bin Laden. I want to know what he’s planning—obviously not him nowadays, but that kind of thing. I don’t care if it’s a pope or a bin Laden. As long as investigators must go to a judge—an independent judge, a real judge, not a secret judge—and make a showing that there’s probable cause to issue a warrant, then they can do that. And that’s how it should be done. The problem is when they monitor all of us, en masse, all of the time, without any specific justification for intercepting in the first place, without any specific judicial showing that there’s a probable cause for that infringement of our rights.
  • Since the revelations, we have seen a massive sea change in the technological basis and makeup of the Internet. One story revealed that the NSA was unlawfully collecting data from the data centers of Google and Yahoo. They were intercepting the transactions of data centers of American companies, which should not be allowed in the first place because American companies are considered US persons, sort of, under our surveillance authorities. They say, “Well, we were doing it overseas,” but that falls under a different Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn’t even authorized by law. It’s just an old-ass piece of paper with Reagan’s signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers—sending hundreds of millions of people’s communications back and forth every day—were completely unprotected, electronically naked. GCHQ, the British spy agency, was listening in, and the NSA was getting the data and everything like that, because they could dodge the encryption that was typically used. Basically, the way it worked technically, you go from your phone to Facebook.com, let’s say—that link is encrypted. So if the NSA is trying to watch it here, they can’t understand it. But what these agencies discovered was, the Facebook site that your phone is connected to is just the front end of a larger corporate network—that’s not actually where the data comes from. When you ask for your Facebook page, you hit this part and it’s protected, but it has to go on this long bounce around the world to actually get what you’re asking for and go back. So what they did was just get out of the protected part and they went onto the back network. They went into the private network of these companies.
  • The Nation: The companies knew this? Snowden: Companies did not know it. They said, “Well, we gave the NSA the front door; we gave you the PRISM program. You could get anything you wanted from our companies anyway—all you had to do was ask us and we’re gonna give it to you.” So the companies couldn’t have imagined that the intelligence communities would break in the back door, too—but they did, because they didn’t have to deal with the same legal process as when they went through the front door. When this was published by Barton Gellman in The Washington Post and the companies were exposed, Gellman printed a great anecdote: he showed two Google engineers a slide that showed how the NSA was doing this, and the engineers “exploded in profanity.” Another example—one document I revealed was the classified inspector general’s report on a Bush surveillance operation, Stellar Wind, which basically showed that the authorities knew it was unlawful at the time. There was no statutory basis; it was happening basically on the president’s say-so and a secret authorization that no one was allowed to see. When the DOJ said, “We’re not gonna reauthorize this because it is not lawful,” Cheney—or one of Cheney’s advisers—went to Michael Hayden, director of the NSA, and said, “There is no lawful basis for this program. DOJ is not going to reauthorize it, and we don’t know what we’re going to do. Will you continue it anyway on the president’s say-so?” Hayden said yes, even though he knew it was unlawful and the DOJ was against it. Nobody has read this document because it’s like twenty-eight pages long, even though it’s incredibly important.
  • The big tech companies understood that the government had not only damaged American principles, it had hurt their businesses. They thought, “No one trusts our products anymore.” So they decided to fix these security flaws to secure their phones. The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone—if a hacker or something images your phone—they can’t read what’s on the phone itself, they can’t look at your pictures, they can’t see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example. It does not stop law enforcement from requesting copies of your texts from the providers via warrant. It does not stop them from accessing copies of your pictures or whatever that are uploaded to, for example, Apple’s cloud service, which are still legally accessible because those are not encrypted. It only protects what’s physically on the phone. This is purely a security feature that protects against the kind of abuse that can happen with all these things being out there undetected. In response, the attorney general and the FBI director jumped on a soap box and said, “You are putting our children at risk.”
  • The Nation: Is there a potential conflict between massive encryption and the lawful investigation of crimes? Snowden: This is the controversy that the attorney general and the FBI director were trying to create. They were suggesting, “We have to be able to have lawful access to these devices with a warrant, but that is technically not possible on a secure device. The only way that is possible is if you compromise the security of the device by leaving a back door.” We’ve known that these back doors are not secure. I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI. And even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it. Anyway, it’s not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
  • The Nation: Some years ago, The Nation did a special issue on patriotism. We asked about a hundred people how they define it. How do you define patriotism? And related to that, you’re probably the world’s most famous whistleblower, though you don’t like that term. What characterization of your role do you prefer? Snowden: What defines patriotism, for me, is the idea that one rises to act on behalf of one’s country. As I said before, that’s distinct from acting to benefit the government—a distinction that’s increasingly lost today. You’re not patriotic just because you back whoever’s in power today or their policies. You’re patriotic when you work to improve the lives of the people of your country, your community and your family. Sometimes that means making hard choices, choices that go against your personal interest. People sometimes say I broke an oath of secrecy—one of the early charges leveled against me. But it’s a fundamental misunderstanding, because there is no oath of secrecy for people who work in the intelligence community. You are asked to sign a civil agreement, called a Standard Form 312, which basically says if you disclose classified information, they can sue you; they can do this, that and the other. And you risk going to jail. But you are also asked to take an oath, and that’s the oath of service. The oath of service is not to secrecy, but to the Constitution—to protect it against all enemies, foreign and domestic. That’s the oath that I kept, that James Clapper and former NSA director Keith Alexander did not. You raise your hand and you take the oath in your class when you are on board. All government officials are made to do it who work for the intelligence agencies—at least, that’s where I took the oath.
  • The Nation: Creating a new system may be your transition, but it’s also a political act. Snowden: In case you haven’t noticed, I have a somewhat sneaky way of effecting political change. I don’t want to directly confront great powers, which we cannot defeat on their terms. They have more money, more clout, more airtime. We cannot be effective without a mass movement, and the American people today are too comfortable to adapt to a mass movement. But as inequality grows, the basic bonds of social fraternity are fraying—as we discussed in regard to Occupy Wall Street. As tensions increase, people will become more willing to engage in protest. But that moment is not now.
  • The Nation: You really think that if you could go home tomorrow with complete immunity, there wouldn’t be irresistible pressure on you to become a spokesperson, even an activist, on behalf of our rights and liberties? Indeed, wouldn’t that now be your duty? Snowden: But the idea for me now—because I’m not a politician, and I do not think I am as effective in this way as people who actually prepare for it—is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what “digital rights” should be. What values should we be protecting, and how do we assert them? What I can do—because I am a technologist, and because I actually understand how this stuff works under the hood—is to help create the new systems that reflect our values. Of course I want to see political reform in the United States. But we could pass the best surveillance reforms, the best privacy protections in the history of the world, in the United States, and it would have zero impact internationally. Zero impact in China and in every other country, because of their national laws—they won’t recognize our reforms; they’ll continue doing their own thing. But if someone creates a reformed technical system today—technical standards must be identical around the world for them to function together.
  • As for labeling someone a whistleblower, I think it does them—it does all of us—a disservice, because it “otherizes” us. Using the language of heroism, calling Daniel Ellsberg a hero, and calling the other people who made great sacrifices heroes—even though what they have done is heroic—is to distinguish them from the civic duty they performed, and excuses the rest of us from the same civic duty to speak out when we see something wrong, when we witness our government engaging in serious crimes, abusing power, engaging in massive historic violations of the Constitution of the United States. We have to speak out or we are party to that bad action.
  • The Nation: Considering your personal experience—the risks you took, and now your fate here in Moscow—do you think other young men or women will be inspired or discouraged from doing what you did? Snowden: Chelsea Manning got thirty-five years in prison, while I’m still free. I talk to people in the ACLU office in New York all the time. I’m able to participate in the debate and to campaign for reform. I’m just the first to come forward in the manner that I did and succeed. When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense. The charges they brought against me, for example, explicitly denied my ability to make a public-interest defense. There were no whistleblower protections that would’ve protected me—and that’s known to everybody in the intelligence community. There are no proper channels for making this information available when the system fails comprehensively.
  • The government would assert that individuals who are aware of serious wrongdoing in the intelligence community should bring their concerns to the people most responsible for that wrongdoing, and rely on those people to correct the problems that those people themselves authorized. Going all the way back to Daniel Ellsberg, it is clear that the government is not concerned with damage to national security, because in none of these cases was there damage. At the trial of Chelsea Manning, the government could point to no case of specific damage that had been caused by the massive revelation of classified information. The charges are a reaction to the government’s embarrassment more than genuine concern about these activities, or they would substantiate what harms were done. We’re now more than a year since my NSA revelations, and despite numerous hours of testimony before Congress, despite tons of off-the-record quotes from anonymous officials who have an ax to grind, not a single US official, not a single representative of the United States government, has ever pointed to a single case of individualized harm caused by these revelations. This, despite the fact that former NSA director Keith Alexander said this would cause grave and irrevocable harm to the nation. Some months after he made that statement, the new director of the NSA, Michael Rogers, said that, in fact, he doesn’t see the sky falling. It’s not so serious after all.
  • The Nation: You also remind us of [Manhattan Project physicist] Robert Oppenheimer—what he created and then worried about. Snowden: Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people. It is interesting that so many people who become disenchanted, who protest against their own organizations, are people who contributed something to them and then saw how it was misused. When I was working in Japan, I created a system for ensuring that intelligence data was globally recoverable in the event of a disaster. I was not aware of the scope of mass surveillance. I came across some legal questions when I was creating it. My superiors pushed back and were like, “Well, how are we going to deal with this data?” And I was like, “I didn’t even know it existed.” Later, when I found out that we were collecting more information on American communications than we were on Russian communications, for example, I was like, “Holy shit.” Being confronted with the realization that work you intended to benefit people is being used against them has a radicalizing effect.
  • The Nation: We have a sense, or certainly the hope, we’ll be seeing you in America soon—perhaps sometime after this Ukrainian crisis ends. Snowden: I would love to think that, but we’ve gone all the way up the chain at all the levels, and things like that. A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they’re really sore—the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment—they’re the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don’t like that at all. The Obama administration almost appears as though it is afraid of the intelligence community. They’re afraid of death by a thousand cuts—you know, leaks and things like that.
  • The Nation: You’ve given us a lot of time, and we are very grateful, as will be The Nation’s and other readers. But before we end, any more thoughts about your future? Snowden: If I had to guess what the future’s going to look like for me—assuming it’s not an orange jumpsuit in a hole—I think I’m going to alternate between tech and policy. I think we need that. I think that’s actually what’s missing from government, for the most part. We’ve got a lot of policy people, but we have no technologists, even though technology is such a big part of our lives. It’s just amazing, because even these big Silicon Valley companies, the masters of the universe or whatever, haven’t engaged with Washington until recently. They’re still playing catch-up. As for my personal politics, some people seem to think I’m some kind of archlibertarian, a hyper-conservative. But when it comes to social policies, I believe women have the right to make their own choices, and inequality is a really important issue. As a technologist, I see the trends, and I see that automation inevitably is going to mean fewer and fewer jobs. And if we do not find a way to provide a basic income for people who have no work, or no meaningful work, we’re going to have social unrest that could get people killed. When we have increasing production—year after year after year—some of that needs to be reinvested in society. It doesn’t need to be consistently concentrated in these venture-capital funds and things like that. I’m not a communist, a socialist or a radical. But these issues have to be 
addressed.
  •  
    Remarkable interview. Snowden finally gets asked some questions about politics. 
4More

4Chan Claims To Have Fabricated Anti-Trump Report As A Hoax | Zero Hedge - 0 views

  • In a story that is getting more surreal by the minute, a post on 4Chan now claims that the infamous "golden showers" scene in the unverified 35-page dossier, allegedly compiled by a British intelligence officer, was a hoax and fabricated by a member of the chatboard as "fanfiction", then sent to Rick Wilson, who proceeded to send it to the CIA, which then put it in their official classified intelligence report on the election. Here is 4Chan's explanation of how the story came to light: >/pol/acks mailed fanfiction to anti-trump pundit Rick Wilson about trump making people piss on a bed obama slept in >he thought it was real and gave it to the CIA >the central intelligence agency of the united states of america put this in their official classified intelligence report on russian involvement in the election >donald trump and obama have both read this pol/acks fanfiction >the cia has concluded that the russian plans to blackmail trump with this story we made up just let that sink in what we have become.
  • nd a summary posted on pastebin: On january 10, Buzzfeed posted a story under the byline of Ken Bensinger, Mark Schoofs and Miriam elder titled “these reports Allege Trump Has Deep Ties To Russia” and posted a link to a document alleging, among other things, that russia has been cultivating trump for 5+ years, that trump has been in constant contact with the kremlin for information on his opponents, and perhaps most inflammatory, that there are many recorded instances of blackmail of trump in sexual misconduct. A prominent claim is that trump rented the presidential suite of the Ritz Carlton Hotel in moscow, where he knew that the Obamas had slept in; he them hired a number of prostitutes to perform a 'golden shower' (pissplay) on the bed and in the room. https://www.buzzfeed.com/kenbensinger/these-reports-allege-trump-has-dee...https://assets.documentcloud.org/documents/3259984/Trump-Intelligence-Al...   Noted #nevertrump voice Rick Wilson later commented on twitter, stating that the report “gave a new meaning to Wikileaks” (https://twitter.com/TheRickWilson/status/818982395202379777) and that the report was the reason everybody was fighting so hard against the election of Trump. (https://twitter.com/TheRickWilson/status/818983514335047680)   The remarkable thing? It's all fake. And not only fake; it's a prank perpetuated by 4chan, on Rick Wilson himself. A post on 4chan on october 26 stated “mfw managed to convince CTR and certain (((journalists))) on Twitter there'll be an October surprise on Trump this Friday” along with a picture of a smug face with a hash name. http://archive.4plebs.org/pol/thread/94704894/#94705224   on november 1, a person without a picture but is assumed to be the same person posted “So they took what I told Rick Wilson and added a Russian spy angle to it. They still believe it. Guys, they're truly fucking desperate - there's no remaining Trump scandal that's credible.” https://archive.4plebs.org/pol/thread/95568919/#95571329  
  • al media, a person with the same smug grin face, and the same hash title for the picture, stated “I didn't think they'd take it so far.” http://boards.4chan.org/pol/thread/106514445#p106520376   This story has taken on something of a life of it's own. Going through Rick Wilson's twitter, you can find many different stories from the time that he had shown the story to a wide number of anti-trump news sources, trying to find a news organization that would actually publish the story. During that time period, he referred to it often as 'the thing', and often playing coy with followers on the content with the story with anybody who was not also a #Nevertrumper. Unconfirmed sources has people as high up as John McCain giving the story to FBI Director James Comey to attempt to verify the story. Given that Rick Wilson runs in Establishment circles, it is not an impossible scenario that long-serving senators are falling for what amounts to a 4chan troll trump supporter creating an ironic October Surprise out of wholecloth to punk a GOPe pundit who derogatorily referred to them as single men who masturbate to anime. While this entire incident is laughable, and even more so if the 4Chan account is accurate, what makes it quite tragic, is that it is no longer possible to dismiss the "fake news" angle to an intelligence report. And if the CIA is compromised, what is left for "news outlets" like CNN and BuzzFeed, which were all too eager to run with the story without any attempt at verification?
  •  
    It's must read.
12More

DOJ's Motion to Dismiss in Smith v. Obama, the case challenging the legality of the war... - 0 views

  • As I noted in an earlier post, Nathan Smith, a U.S. Army captain deployed to Kuwait as part of the campaign against ISIL, Operation Inherent Resolve, has sued the President, seeking a declaration that Congress has not authorized the hostilities in Iraq and Syria and that therefore the War Powers Resolution requires the President to remove U.S. forces from hostilities in those nations. On Tuesday, the Department of Justice filed a motion to dismiss the case. Its brief in support of the motion includes one argument that I think is correct (albeit not for all the reasons the government offers) — namely, that Smith lacks standing to sue. That ought to be sufficient to have the case dismissed. The brief also includes an argument on the merits (albeit not designated as such) that is very interesting and potentially important — an account of how Congress has allegedly authorized Inherent Resolve in three ways: (i) in the 2001 AUMF; (ii) in the 2002 AUMF; and (iii) in current appropriations statutes. The heart of the brief, however, is devoted to a third argument — that Judge Koller-Kotelly must dismiss the case on the basis of the political question doctrine — that is not only wrong, but that simply ignores the Supreme Court’s recent (and repeated) repudiation of that very argument.
  • On page 39 of its 45-page brief, the government finally gets around to the reason why the court should dismiss the complaint: Smith lacks standing. Importantly, Smith’s theory of standing is not that he — an Army captain deployed to perform intelligence services in Kuwait — is more likely to be injured or killed by virtue of the President’s decision to deploy troops into hostilities in Iraq and Syria. It is, instead, that the President’s alleged failure to comply with the War Powers Act results in Captain Smith’s own violation of his officer’s oath to “support and defend” the Constitution “against all enemies, foreign and domestic,” and to “bear true faith and allegiance” to the Constitution.
  • The government’s standing argument begins (p. 35) by suggesting that “[p]laintiff’s claim that he is being forced to betray his oath is insufficient to establish standing because the violation of an oath, by itself, is not an injury in fact.” The cases the government cites for that proposition, however, do not say that a forced oath violation would not be an injury in fact — and that’s not a question the judge needs to resolve. What the cases establish, instead, is the point the government finally argues at page 39 — namely, that a government officer does not violate his oath by complying with superiors’ orders, even if it turns out that the law prohibits the military operation in which those orders are issued. Indeed, Smith would not violate his oath of office even if his superiors’ orders themselves were unauthorized, or if the intelligence activities he is ordered to performed were unauthorized. But he does not allege even those things (as I discuss below, he does not, for instance, alleged that he is being ordered to do anything unlawful). Instead, he merely argues that because President Obama should have withdrawn troops from Syria and Iraq 60 days after their deployment, Smith himself is violating his oath to “bear true faith and allegiance to the Constitution.” This is a non sequitur: Even if Smith is right that the continuation of Operation Inherent Resolve is unlawful, that would not mean that he is acting in violation of his oath. (Much more on this in my earlier post.) And that simple fact is reason enough for Judge Koller-Kotelly to dismiss the case.
  • ...8 more annotations...
  • One of Smith’s counsel, Professor Bruce Ackerman, argues that this reason for rejecting the oath-based theory of standing ignores the Supreme Court’s 1804 decision in Little v. Barreme. Little, however, is not on point. In that case, Navy Captain Little was sued by the owners of a Danish ship for damages caused when Little seized that neutral ship. The Court held that Little could be liable, notwithstanding the fact that he was following orders, because the capture violated a implicit statutory prohibition on the military’s seizure of ships sailing from France to the United States. In this case, however, Captain Smith has not argued — nor could he — that he has been ordered to do anything unlawful (in violation of a statute), let alone that he has been ordered to do something that would subject him to possible liability for damages. He is, instead, arguing that President Obama violated a statute. That is not enough to establish Smith’s standing to sue.
  • The government’s main argument, to which it devotes far too many pages, is that the judge must dismiss the case because it raises a “political question” that courts cannot answer. This is flatly wrong — and it ignores several controlling precedents, including the Supreme Court’s recent 8-1 rejection of virtually the same government argument in Zivotofsky v. Clinton.
  • The most interesting thing about the government’s brief — and by far the most important aspect of it, for public purposes apart from the lawsuit itself — is that, in the section ostensibly arguing that the case is nonjusticiable (see pp. 25-30, and also pp. 4-14), DOJ actually offers the Executive branch’s most detailed defense yet about why Operation Inherent Resolve is congressionally authorized. As some of us predicted, the government relies on three arguable authorizations, any one of which would be sufficient to defeat Smith’s WPR claim if the courts were to reach the merits. In this post I’m not going to assess the merits of the three arguments. For now, my purpose is only to describe them, and to raise one issue with respect to the third. i. First, the government argues that the 2001 AUMF authorizes the operation against ISIL.
  • Second, the government argues that the 2002 AUMF also authorizes Operation Inherent Resolve, just as it authorized operations in Iraq against AQI (which became ISIL) from 2003 to 2011, after the Hussain regime fell.
  • Finally, and most interestingly (in part because the government has not previously made this argument), DOJ argues that a recent “unbroken stream” of appropriations statutes not only confirm the authorities allegedly conferred by the 2001 and 2002 AUMFs, but also offer their own, independent congressional authorization.
  • Two things are fairly clear from this: The members of Congress approve of Operation Inherent Resolve — indeed, there’s virtually no opposition. And Congress has (most likely) appropriated funds to pay for it. The operative question, however, is whether Congress’s appropriations also serve as an authorization that would supersede the requirement of WPR section 5(b). The government brief alludes to one important argument that the plaintiff will undoubtedly raise: Section 8(a)(1) of the WPR provides that, for purposes of tolling the 60-day clock of section 5(b), “[a]uthority to introduce United States Armed Forces into hostilities or into situations wherein involvement in hostilities is clearly indicated by the circumstances shall not be inferred (1) from any provision of law . . . including any provision contained in any appropriations Act, unless such provision specifically authorizes the introduction of United States Armed Forces into hostilities or into such situations and states that it is intended to constitute specific statutory authorization within the meaning of this chapter.” Obviously, the 2016 Act does not satisfy that requirement. Is that fatal to the appropriations-as-authorization argument?
  • As the Office of Legal Counsel 50 U.S.C. 1542 and 1543). These provisions might be read simply to convey that the executive must continue to comply with the consultation and reporting requirements of WPR sections 3 and 4, even after the 2016 Act authorizes the introduction of troops into hostilities in Iraq and Syria. Or they might alternatively be construed to also specify that the Act is not providing the authority that section 5(b) of the WPR calls for.
  • Not surprisingly, DOJ argues for the former view (pp. 27-28 of the brief): “[I]n the few provisions in which Congress did reference the War Powers Resolution, to clarify that no funds made available for Operation Inherent Resolve are to be used ‘in contravention’ of the Resolution, Congress signaled its agreement that the President’s counter-ISIL military actions were authorized by simultaneously funding Operation Inherent Resolve. If Congress believed that the United States had been conducting airstrikes and other counter-ISIL military activities ‘in contravention of the War Powers Resolution,’ it would have made no sense for Congress to use the ‘in contravention’ proviso in the same laws that make funds available for the express purpose of continuing those military activities.” That’s not a bad argument, at least at first glance; but it’s not a slam-dunk, either, in part because appropriations provisions do not necessarily establish authorizations. It’ll be interesting to see how Captain Smith’s lawyers respond to this particular aspect of the merits argument. I doubt Judge Koller-Kotelly will reach it, however, because she is likely to dismiss the case for want of standing.
  •  
    I've read the brief. I don't think the implied partial repeal of the War Powers Resolution argument should fly. The relevant provision establishes a rule of interpretation of later statutes and the appropriations bills neither reject the rule of interpretation nor specifically provide authorization for use of military force. They just authorize funding. On the standing issue, I think the DoJ position is correct; the oath of office applies only to senior officers who make the decision to initiate a war. But DoJ may have opened the door to a more compelling standing argument by arguing that the war does not constitute a war crime, a crime against peace, or a crime against humanity under international law. DoJ did not need to make that argument because Smith had not alleged in his complaint that he was being ordered to commit such crimes, but by doing so DoJ waives any argument that such issues are beyond the scope of Smith's standing and the evidence that the Iraq and Syrian wars are illegal under international law is, to say the least, strong.
3More

Congressional oversight of the NSA is a joke. I should know, I'm in Congress | Alan Gra... - 0 views

  • Despite being a member of Congress possessing security clearance, I've learned far more about government spying on me and my fellow citizens from reading media reports than I have from "intelligence" briefings. If the vote on the Amash-Conyers amendment is any indication, my colleagues feel the same way. In fact, one long-serving conservative Republican told me that he doesn't attend such briefings anymore, because, "they always lie".Many of us worry that Congressional Intelligence Committees are more loyal to the "intelligence community" that they are tasked with policing, than to the Constitution. And the House Intelligence Committee isn't doing anything to assuage our concerns.
  • And why do Generals Alexander and Clapper remain in office, when all the evidence points to them committing the felony of lying to Congress and the American people?
  •  
    Congressman Alan Grayson speaks out on the illusion of Congressional oversight of the U.S. intelligence community. A must-read
3More

NATO's Terror Hordes in Iraq a Pretext for Syria Invasion | New Eastern Outlook - 0 views

  • All roads lead to Baghdad and the Islamic State in Iraq and Syria (ISIS) is following them all, north from Syria and Turkey to south. Reading Western headlines, two fact-deficient narratives have begun gaining traction. The first is that this constitutes a “failure” of US policy in the Middle East, an alibi as to how the US and its NATO partners should in no way be seen as complicit in the current coordinated, massive, immensely funded and heavily armed terror blitzkrieg toward Baghdad. The second is how ISIS appears to have “sprung” from the sand dunes and date trees as a nearly professional military traveling in convoys of matching Toyota trucks without explanation. In actuality, ISIS is the product of a joint NATO-GCC conspiracy stretching back as far as 2007 where US-Saudi policymakers sought to ignite a region-wide sectarian war to purge the Middle East of Iran’s arch of influence stretching from its borders, across Syria and Iraq, and as far west as Lebanon and the coast of the Mediterranean. ISIS has been harbored, trained, armed, and extensively funded by a coalition of NATO and Persian Gulf states within Turkey’s (NATO territory) borders and has launched invasions into northern Syria with, at times, both Turkish artillery and air cover.
  • The alleged territorial holdings of ISIS cross over both Syrian and Iraqi borders meaning that any campaign to eradicate them from Iraqi territory can easily spill over into Syria’s borders. And that is exactly the point. With ISIS having ravaged Mosul, Iraq near the Turkish border and moving south in a terror blitzkrieg now threatening the Iraqi capital of Baghdad itself, the Iraqi government is allegedly considering calling for US and/or NATO assistance to break the terror wave. Adding to the pretext, ISIS, defying any sound tactical or strategic thinking, has seized a Turkish consulate in Mosul, taking over 80 Turkish hostages - serendipitous giving Turkey not only a new pretext to invade northern Iraq as it has done many times in pursuit of alleged Kurdish militants, but to invade Syrian territory where ISIS is also based.
  •  
    Tony Cartalucci blows the top off the manufactured excuse for Turkey -- a NATO nation already caught making plans to initiate a false flag attack on itself posing as Syrian government forces -- to invade both Iraq and Syria. Heavily referenced with lots of links. An in-depth study of the players and plays in motion in Iraq. A must read.
5More

OPEC, Russia and the New World Order Emerging | New Eastern Outlook - 0 views

  • By the day it’s becoming clearer that what I have recently been saying in my writings is coming to be. The OPEC oil-producing states of the Middle East, including Iran, through the skillful mediation of Russia, are carefully laying the foundations for a truly new world order. The first step in testing this will be if they collectively succeed in eliminating the threat to Syria of the Islamic State, and prepare the basis for serious, non-manipulated elections there.
  • In the political, more accurately geo-political sphere, we are now witnessing huge tectonic motion, and destructive it is not. It involves a new attractive force drawing the Middle East OPEC countries, including Saudi Arabia and Iran and other Arab OPEC countries, into what will soon become obvious as a strategic partnership with the Russian Federation. It transcends the huge religious divides today between Sunni Wahhabism, Sufi, Shi’ism, Orthodox Christianity. That tectonic motion will soon cause a political earthquake that well might save the planet from extinction by the endless wars the Pentagon and their string pullers on Wall Street and the military industrial complex and the loveless oligarchs who own them seem to have as their only strategy today.
  • In an interview with the London Financial Times, Russia’s most important oilman, Igor Sechin, CEO of the state-owned Rosneft, confirmed rumors that Saudi Arabia’s monarchy is seeking a formal market-share agreement with Russia, even going so far as offering Russia membership in OPEC, to stabilize world oil markets. In the interview, Sechin, considered one of President Vladimir Putin’s closest allies, confirmed the Saudi offer. The Financial Times (FT) is an influential media owned until this past July by the Pearson Group an asset tied to the Rothschild family who historically also dominate Royal Dutch Shell. The London paper chose to emphasize Sechin’s rejection of the Saudi offer. However, most instructive is to read between the lines of what he said. He told a Singapore commodities conference organized by the FT, “It needs to be recognised that Opec’s ‘golden age’ in the oil market has been lost. They fail to observe their own quotas [for Opec oil output]. If quotas had been observed, global oil markets would have been rebalanced by now.”
  • ...1 more annotation...
  • Sechin well knows the background to the Saudi oil price war and the fact it was triggered by a meeting between US State Department’s John Kerry and the late Saudi King Abdullah in the desert Kingdom in September 2014, where Kerry reportedly urged the Saudis to crash oil prices. For Kerry the aim was to put unbearable pressure on Russia, then hit by US and EU financial sanctions. For the Saudis, it was a golden opportunity to eliminate the biggest disturbing factor in the OPEC domination of world oil markets–the booming production of US unconventional shale oil that had made the USA the world’s largest oil producer in 2014. Ironically, as Sechin told the FT, the US-Saudi deal and the US financial sanctions have backfired on the US strategists. The Russian ruble lost more than 50% of its dollar value by January 2015. Oil prices similarly fell from $103 a barrel in September 2014 to less than $50 today. But Russian oil production costs are calculated in rubles, not dollars. So, as Sechin states, the dollar cost of Rosneft oil production has dropped dramatically today from $5 a barrel before the sanctions to only $3 a barrel, a level similar to that of Arab OPEC producers like Saudi Arabia. Rosneft is not hurting despite sanctions. USA shale oil by contrast is unconventional and vastly more costly. Industry estimates depending on the shale field and the company, put costs of shale in a range of $60-80 a barrel just to break even. The current ongoing shakeout in the US shale industry and prospects of rising US interest rates dictate the demise of shale oil from the US for years if not decades to come as Wall Street lenders and shale company junk bond investors suffer huge losses.
  •  
    A must-read.
3More

Tomgram: Pepe Escobar, The Tao of Containing China | TomDispatch - 0 views

  • Sun Tzu, the ancient author of The Art of War, must be throwing a rice wine party in his heavenly tomb in the wake of the shirtsleeves California love-in between President Obama and President Xi Jinping. "Know your enemy" was, it seems, the theme of the meeting. Beijing was very much aware of -- and had furiously protested -- Washington’s deep plunge into China’s computer networks over the past 15 years via a secretive NSA unit, the Office of Tailored Access Operations (with the apt acronym TAO). Yet Xi merrily allowed Obama to pontificate on hacking and cyber-theft as if China were alone on such a stage. Enter -- with perfect timing -- Edward Snowden, the spy who came in from Hawaii and who has been holed up in Hong Kong since May 20th. And cut to the wickedly straight-faced, no-commentary-needed take on Obama’s hacker army by Xinhua, the Chinese Communist Party’s official press service. With America’s dark-side-of-the-moon surveillance programs like Prism suddenly in the global spotlight, the Chinese, long blistered by Washington’s charges about hacking American corporate and military websites, were polite enough. They didn’t even bother to mention that Prism was just another node in the Pentagon’s Joint Vision 2020 dream of “full spectrum dominance.” By revealing the existence of Prism (and other related surveillance programs), Snowden handed Beijing a roast duck banquet of a motive for sticking with cyber-surveillance. Especially after Snowden, a few days later, doubled down by unveiling what Xi, of course, already knew -- that the National Security Agency had for years been relentlessly hacking both Hong Kong and mainland Chinese computer networks.
  • But the ultimate shark fin’s soup on China’s recent banquet card was an editorial in the Communist Party-controlled Global Times.  “Snowden,” it acknowledged, “is a ‘card’ that China never expected,” adding that “China is neither adept at nor used to playing it.” Its recommendation: use the recent leaks “as evidence to negotiate with the U.S.” It also offered a warning that “public opinion will turn against China’s central government and the Hong Kong SAR [Special Administrative Region] government if they choose to send [Snowden] back.” With a set of cyber-campaigns -- from cyber-enabled economic theft and espionage to the possibility of future state-sanctioned cyber-attacks -- evolving in the shadows, it’s hard to spin the sunny “new type of great power relationship” President Xi suggested for the U.S. and China at the recent summit. It’s the (State) Economy, Stupid The unfolding Snowden cyber-saga effectively drowned out the Obama administration’s interest in learning more about Xi’s immensely ambitious plans for reconfiguring the Chinese economy -- and how to capture a piece of that future economic pie for American business. Essential to those plans is an astonishing investment of $6.4 trillion by China’s leadership in a drive to “urbanize” the economy yet further by 2020.
  •  
    Lengthy political analysis by the sterling Pepe Escobar on China/U.S. relations and Chinese President Xi Jinping's goals for the future of China during his period of national leadership. He leads with the impact of the NSA scandal, but goes on to paint a far more detailed picture of China's role in international policy, economic progress, and economic plans being executed. This is a must-read for China-watchers. As always, Pepe provides a lively read.
2More

The Collapse of Order in the Middle East - 0 views

  • Will Rogers once observed that “when you get into trouble 5,000 miles from home, you’ve got to have been looking for it.”  It’s a good deal more than 5.000 miles to Baghdad or Damascus from here.  And, boy, have we gotten into trouble! We are trying to cope with the cumulative consequences of multiple failures.  Just about every American project in the Middle East has now come a cropper.  There is a new velcro-backed military campaign morale patch commemorating this.  It is available through Amazon.com for $7.45.  The patch bears an escutcheon with a logo that, in the interest of decorum, I will not read out.  It sounds like Operation Enduring FlusterCluck. If you’re a Middle East groupie, which your presence here suggests you may be, you need one of these patches for your jacket.  It describes what is now the characteristic within-the-Beltway approach to problem solving.  If at first we don’t succeed, we do the same thing again harder, with better technology, and at greater expense.  The patch provides a cogent – if uncouth – summary of the results of this approach so far this century.
  •  
    There is more sense in this essay by a former U.S. Ambassador than I've seen coming out of the Obama Administration, the War Party, and mainstream media. Ambassador Freeman offers not only identificaiton of key mistakes but also a plan for going forward that does not echo past mistakes. It's a must-read.
5More

EU Showdown: Greece Takes on the Vampire Squid | nsnbc international - 0 views

  • Greece and the troika (the International Monetary Fund, the EU, and the European Central Bank) are in a dangerous game of chicken. The Greeks have been threatened with a “Cyprus-Style prolonged bank holiday” if they “vote wrong.” But they have been bullied for too long and are saying “no more.”
  • A return to the polls was triggered in December, when the Parliament rejected Prime Minister Antonis Samaras’ pro-austerity candidate for president. In a general election, now set for January 25th, the EU-skeptic, anti-austerity, leftist Syriza party is likely to prevail. Syriza captured a 3% lead in the polls following mass public discontent over the harsh austerity measures Athens was forced to accept in return for a €240 billion bailout. Austerity has plunged the economy into conditions worse than in the Great Depression. As Professor Bill Black observes, the question is not why the Greek people are rising up to reject the barbarous measures but what took them so long. Ireland was similarly forced into an EU bailout with painful austerity measures attached. A series of letters has recently come to light showing that the Irish government was effectively blackmailed into it, with the threat that the ECB would otherwise cut off liquidity funding to Ireland’s banks. The same sort of threat has been leveled at the Greeks, but this time they are not taking the bait.
  • The veiled threat to the Greek Parliament was in a December memo from investment bank Goldman Sachs – the same bank that was earlier blamed for inducing the Greek crisis. Rolling Stone journalist Matt Taibbi wrote colorfully of it: The first thing you need to know about Goldman Sachs is that it’s everywhere. The world’s most powerful investment bank is a great vampire squid wrapped around the face of humanity, relentlessly jamming its blood funnel into anything that smells like money. In fact, the history of the recent financial crisis, which doubles as a history of the rapid decline and fall of the suddenly swindled dry American empire, reads like a Who’s Who of Goldman Sachs graduates.
  • ...1 more annotation...
  • Goodbye Euro? Greece can regain its sovereignty by defaulting on its debt, abandoning the ECB and the euro, and issuing its own national currency (the drachma) through its own central bank. But that would destabilize the eurozone and might end in its breakup. Will the troika take that risk? 2015 is shaping up to be an interesting year. Ellen H. Brown, Web of Debt
  •  
    Fun! Greece looks to be about to have an Icelandic moment, defaulting on its debt and leaving the Eurozone. The Syriza party is riding a rising trend in popularity running on a sovereignty and anti-foreign bankster platform. That pleasant odor you're sniffing is the return of the drachma. This one is a must-read.    
2More

Udall Urged to Disclose Full Torture Report | Consortiumnews - 0 views

  • Sen. Mark Udall has called for the full release of the Senate Intelligence Committee’s report on torture. However, as a still-sitting member of Congress, he has a constitutional protection to read most of the still-secret report on the Senate floor — and a group of intelligence veterans urges him to do just that.MEMORANDUM FOR: Senator Mark UdallFROM: Veteran Intelligence Professionals for Sanity (VIPS)SUBJECT: Stopping TortureWe, the undersigned are veteran intelligence officers with a combined total of over 300 years of experience in intelligence work. We send you this open letter at what seems to be the last minute simply because we had been hoping we would not have to.
  •  
    This is a must-read. Extremely plain talk from VIPS directed to Sen. Mark Udall. 
2More

China's Global Political Shift | New Eastern Outlook - 0 views

  • I have been to China over the years more than a dozen times. I have spoken with people at all levels of policy-making, and one thing I have come to realize is that when Beijing makes a major policy change, they make it carefully and with great deliberation. And when they arrive at a new consensus, they execute it with remarkable effect on all levels. That is the secret to their thirty-year economic miracle. Now China’s top leadership has made such a policy decision. It will transform our world over the next decade. On November 29, 2014, a little-noted but highly significant meeting took place in Beijing as Washington was absorbed with its various attempts to cripple and ultimately destabilize Putin’s Russia. They held what was termed The Central Conference on Work Relating to Foreign Affairs. Xi Jinping, Chinese President and Chairman of the Central Military Commission, delivered what was called “An Important Address” there. Careful reading of the official Foreign Ministry statement on the meeting confirms it was indeed “important.” The central leadership of China has now made official a strategic global shift in geopolitical priorities in Chinese foreign policy. No longer does China regard its relationship with the United Sates or even the EU as of highest priority. Rather they have defined a new grouping of priority countries in their carefully-deliberated geopolitical map. It includes Russia, as well as the entire BRICS rapidly-developing economies; it includes China’s Asian neighbors as well as Africa and other developing countriesFirst appeared: http://journal-neo.org/2015/01/10/china-s-global-political-shift/
  •  
    A must-read. For some reason, Diigo is refusing to allow me to highlight more than one block of text on this page. 
8More

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
1More

A Primer for Rich Donors Who Got Taken to the Cleaners by Republican Consultants | RedS... - 0 views

  •  
    Red State Erick Erickson explains the nuts and bolts of "data" and how to use it to run a successful political campaign.  "Data" is not quite what most of us think.  Erick breaks it down, explaining how "voter data" is determined, and then cast against an overlay of consumer data.  You gotta love his explanation of the critical and absolutely essential base line "dead dog" election number that must be established in each voting precinct. Great lesson in how campaign consultants can make or break an election.  Erick sites the "Gravity" program used by Conservative SuperPac groups like "Ending Spending", "FreedomWorks", "Heritage Action for America", "American Majority" and the "Madison Project".   Erick fully explains "Gravity", and mentions the Democrat program called "Catalyst".  Sadly, the big time consultants working for most of the SuperPacs and the Repubican Party did not use "Gravity".  Instead, they tried to kill it.  Erick explains all in this must read primer for political elections.  Awesome.
1More

California Government Hides Billions From Taxpayers « REALITY BLOG - 0 views

  •  
    This must read post from Clint Richardson is a Bay Area Patriots catch.  Stunning stuff.  Clint walks us through the CAFR - Comprehensive Annual Rinancial Report - for the State of California.  Governor Moonbeam is claiming that the State has a $16 Trillion dollar debt, and he's threatening to shut down public education unless California citizens agree to massive tax hikes.  Clint rips through the entire annual report discovering that Gov Moonbeam is not only lying, but that there is an official "debt increase" methodology in place to deceive citizens into voting for government seizure of their property and prosperity.  Note also that this local-state-federal "debt bomb" methodology involves conversion of tax dollars into hard assets.  Like property and productive assets.  Awful, reprehensible stuff.  Brace yourselves. excerpt: the Government is lying to you.  It promotes debt and hides assets. This should not be construed as the only hidden wealth in the California State government… just the wealth we have uncovered today. And you must understand that this is only the State government's CAFR. Each County, city, district, and other local governments and pension funds have their own CAFR's with their own funds and hidden wealth - hidden in plain sight. Totals for Los Angeles, San Francisco, and other counties and municipalities in California will, when combined together, dwarf the investment wealth of the State government alone. They will tell you that some of these investments are restricted and not able to be used for taxpayer services. And as a taxpayer, that should really piss you off! They will also tell you that laws are in place that don't allow these funds to be transferred for other purposes other than what they are designated for. And yet Obama and State legislators continuously speak of raiding the pension funds for their own benefit. In their opinion, it's government's money after all, not the employees or the taxpayers. But of
1More

The List: Unnecessarily Shut Down by Obama to Inflict Public Pain - 0 views

  •  
    "The media may or may not report on these individual occurrences, but what they will never do is provide the American people with the full context and scope of Obama's shrill pettiness. Below is a list of illogical, unnecessary, and shockingly spiteful moves our government is making in the name of essential and non-essential. This list will be regularly updated, and if you have something you feel should be added, please email me at jnolte@breitbart.com or tweet me @NolteNC.Please include a link to the news source. -- 1. Treatments for Children Suffering From Cancer - The GOP have agreed to a compromise by funding part of the government, including the National Institutes of Health, which offers children with cancer last-chance experimental treatment. Obama has threatened to veto this funding. 2. The World War II Memorial - The WWII memorial on the DC Mall is a 24/7 open-air memorial that is not regularly staffed. Although the White House must have known that WWII veterans in their eighties and nineties had already booked flights to visit this memorial, the White House still found the resources to spitefully barricade the attraction.  The Republican National Committee has offered to cover any costs required to keep the memorial open. The White House refused. Moreover, like the NIH, the GOP will pass a compromise bill that would fund America's national parks. Obama has threatened to veto that bill. 3. Furloughed Military Chaplains Not Allowed to Work for Free - Furloughed military chaplains willing to celebrate Mass and baptisms for free have been told they will be punished for doing so. 4. Business Stops In Florida Keys - Although the GOP have agreed to compromise in the ongoing budget stalemate and fund the parks, Obama has threatened to veto that funding. As a result, small businesses, hunters, and commercial fisherman can't practice their trade. While the feds have deemed the personnel necessary to keep this area open "non-essential," the "enforcement office
2More

American Thinker: Obama's Ides-of-March Moment is Near - 0 views

  • If Bernanke stops QE, he fulfills his role as an independent central banker. Presumably, that action stops the decline in the dollar and reduces the risk of future inflation. It was the course that Paul Volcker chose in the late 1970s. Volcker's action was bold, highly controversial, and highly criticized. Volcker's action had the support of President Reagan, who was willing to face short-term unpopularity to fix the economy. Bernanke's task is harder than Volcker's. Volcker stopped the economy dead in its tracks. If Bernanke ends QE, he will stop both the economy and the federal government dead in their tracks.Without QE, the government will be unable to honor its obligations. Non-payment of Social Security or Medicare or federal payroll or welfare checks or retirement checks, or military payroll, etc., etc., would show up almost immediately. That would jeopardize foreign (and domestic) purchases of additional federal debt, exacerbating the problem. Bernanke's second option enables the government to continue operating irresponsibly until market forces eventually stop the profligate behavior. Market discipline would likely be imposed in the form of a collapse of the dollar or raging inflation (or both). Under either scenario, the Obama presidency is destroyed.
  •  
    Incredible must read for all Americans. excerpt: By the end of March, Barack Obama's administration will face its destiny, its Brutus a pawn of the fates. In Jimmy Carter's presidency, the Wall Street Journal editorialized about "Ratcheting to Ruin." The title derived from the fact that each cycle high in unemployment was higher than previous ones, and each cycle high in inflation was also. "Stagflation" was the neologism coined to describe what up until then was believed to be impossible in the Keynesian world. This period ushered in a new era in both politics and economics. Carter was replaced by Reagan, and Keynes was replaced by Friedman. Thirty years later, Keynes is back in vogue, Obama has ascended to the White House, and times are reminiscent of the Carter era. The economy is awful. Fear and dissatisfaction prevail. Politicians are held in contempt. There is one major difference -- Carter did not face an "ides of March" event. ..... The problem is bigger than the numbers above might suggest. Budget forecasts show that the problem increases over time. In addition, 40% of existing debt matures in the next year. That means $2.8 trillion of debt has to be refinanced. The Treasury must sell on average $90 billion of debt a week! In five weeks, we need to sell $450 billion. That is equal to the largest full-year deficit in history, at least until Obama's first year. There are no plans to curb spending or cut deficits. President Obama just increased the debt ceiling by $1.9 trillion. To outsiders, we appear like a banana republic with ICBMs. Does anyone seriously believe that funding based on "the kindness of strangers" is workable much longer? ..... If Bernanke stops QE, he fulfills his role as an independent central banker. Presumably, that action stops the decline in the dollar and reduces the risk of future inflation. It was the course that Paul Volcker chose in the late 1970s. Volcker's action was bold, highly controversial, and highly criticized. Vol
1More

How Tax Day Became Payday | The Foundry: Conservative Policy News. - 0 views

  •  
    Ok, this goes into the must read category. I don't however agree with the proposed solution. There's no mention that governments must stop spending money they don't have. Stop the borrowing. Cut the spending. Cut payroll, pension and healthcare spending. Privatize. Return Federal assets to the States, and let them handle the leasing and privatization. Flatten the tax code. Eliminate corporate and unearned (investment) income taxes.  When this country came out of WWII, there was great apprehension that the great depression would simply pick up where it left off. These concerns led to a break with the Hoover-Roosevelt big and bigger government - tax and spend approach. Congress moved to cut taxes and level the margins. Depression over.  excerpt:  Today the Federal government is carrying an even bigger debt per GDP than the cost of WWII had left us with! The out of control spending has to stop. For just over half of all Americans today is Tax Day. But for the other half it is just another day on the calendar. That's because they pay no federal income taxes. The old saying goes "you can't get something for nothing." But these "non-payers" receive government services and benefits without chipping in.
‹ Previous 21 - 40 of 250 Next › Last »
Showing 20 items per page