Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged must--read

Rss Feed Group items tagged

Paul Merrell

Am. Express Co. v. Italian Colors Rest. :: Justia US Supreme Court Center - 0 views

  • Justia.com Opinion Summary: An agreement between American Express and merchants who accept American Express cards, requires that all of their disputes be resolved by arbitration and provides that there “shall be no right or authority for any Claims to be arbitrated on a class action basis.” The merchants filed a class action, claiming that American Express violated section 1 of the Sherman Act and seeking treble damages under section 4 of the Clayton Act. The district court dismissed. The Second Circuit reversed, holding that the class action waiver was unenforceable and that arbitration could not proceed because of prohibitive costs. The Circuit upheld its reversal on remand in light of a Supreme Court holding that a party may not be compelled to submit to class arbitration absent an agreement to do so. The Supreme Court reversed. The FAA reflects an overarching principle that arbitration is a matter of contract and does not permit courts to invalidate a contractual waiver of class arbitration on the ground that the plaintiff’s cost of individually arbitrating a federal statutory claim exceeds the potential recovery. Courts must rigorously enforce arbitration agreements even for claims alleging violation of a federal statute, unless the FAA mandate has been overridden by a contrary congressional command. No contrary congressional command requires rejection of this waiver. Federal antitrust laws do not guarantee an affordable procedural path to the vindication of every claim or indicate an intention to preclude waiver of class-action procedures. The fact that it is not worth the expense involved in proving a statutory remedy does not constitute the elimination of the right to pursue that remedy.
  •  
    Remarkable 5-3 Supreme Court decision in favor of the banksters, in effect overruling a line of prior decisions nearly 30 years old. At issue, whether a credit card monopolists' form contract with merchants containing a mandatory arbitration clause could lawfully bar judicial review under the antitrust laws when the arbitration clause barred class arbitration and the amount merchants could hope to recover was less than a tenth of the expense of litigating claims individually. (Antitrust cases are unusually expensive to prosecute.) For nearly three decades, the Court had implied an exception to the Federal Arbitration Act that allowed plaintiffs to litigate claims subject to arbitration clauses in court to vindicate rights under federal law when arbitration would not provide an effective remedy for the violation of federal law. No more. Upholding the "right" of American Express to insist on a 30 percent share of the price of each sale transacted with an American Express card. Read Justice Kagan's dissent, joined by two other justices, to learn what's wrong with the majority's decision. Her nushell version: "here is the nutshell version of today's opinion, admirably flaunted rather than camoflaged: Too darn bad." The majority did, however, leave it open for Congress to amend the Arbitration Act to resolve the issue. But with corporate and bankster influence in Congress, good luck with that. This decision, unfortunately, has major implications for software developers, as well as other merchants. For example, the current crop of "app store" restrictions on competition enforced by technical measures on app developers by monopolists such as Apple and Microsoft, insisting on a 30 per cent cut of each sale. One can rest assured that such contracts contain similar arbitration clauses
Gary Edwards

JB Williams -- Congress Must Immediately Impeach Entire Obama Administration - 0 views

  •  
    A well written list of particulars calling for the impeachment of the entire Obama administration.  The article ends with an appeal to restore the Constitution, identifying two groups in particular: US Patriots Union and the US Veterans "Defenders of America".  Outstanding stuff.  When you read this you will know you're in the presence of true Patriots. http://www.patriotsunion.org/DECLARATION-RESTORE-THE-CONSTITUTIONAL-REPUBLIC.pdf http://www.veterandefenders.org/ excerpt: The Obama Administration has intentionally and criminally bankrupted what was once the most productive, prosperous and powerful nation on earth. This is nothing compared to Obama's other first term achievements. Via their Federal "wealth redistribution" bailouts, the Obama Administration seized control of General Motors, screwed every individual who ever invested in the company and steered the company through managed bankruptcy so that it would emerge the property of labor unions, not the people who had invested in it for years. The Obama Administration has since seized control of Energy, Banking, Insurance, Health Care, Food production and distribution, manufacturing, water supply and outlawed free speech on public lands to protect elected servants from an increasingly angry society that currently gives Obama, Congress and the U.S. Supreme Court their lowest approval ratings in U.S. history. The Obama Administration designed and launched the so-called Arab Spring across the Middle East, attacking Jews and Christians alike and unseating leaders of sovereign nations and redistributing political power throughout the region to the Muslim Brotherhood, purposefully responsible for total civil unrest around the globe and rising gas prices at the pumps. Last Friday evening, Obama issued yet another Executive Order seizing unbridled power over every aspect of American life, all the way down to the water in your toilet bowl and the garden in your back yard, sharing that power with each mem
Gary Edwards

The Roberts Jizya and the Art of War - 0 views

  • he is violating his oath of office in doing so, and that is the only sensible explanation because the Constitution is fairly clear; the United States Constitution expressly grants all powers not specifically enumerated in the document to the states and the People, and nowhere is this particular tax authorized.
  • this is rather like Jizya, the Muslim concept of taxation on non-Muslims.
  • The purpose of the Islamic Jizya is to compel approved behavior, and as such has been a powerful tool used by Islamic societies to compel conversion to Islam
  • ...10 more annotations...
  • In this instance the United States government is using it to compel conversion to socialist medicine, forcing us to either buy expensive private insurance or go on the government plan.
  • In short, they are abridging our freedom of religion, a constitutionally protected category.
  • What is clear is that this is an abridgement of the Establishment clause, and of the First Amendment.
  • The argument that this saves us from a super-stretching of the Commerce Clause is immaterial; we have simply replaced it with a super-stretching of the power of taxation. In the end, dead is just as dead.
  • What is really needed is a Constitutional Amendment, and the individual states need to spearhead that.
  • We have allowed the United States to move from a representative democratic republic to an empire, a system dominated by a ruling elite, an oligarchy.
  • We must return to the Federalism that was at the core of the Republic.
  • He is a traitor to his oath, a Benedict Arnold in a black robe
  • He has placed his desire for self-aggrandizement over his duty, and so has affirmed the power of government and the ruling elite to do anything to the public they please.
  • It’s time we take this country back. That can only happen at the state level.
  •  
    Another well written article describing in full what that treasonous backstabbing bastard chief justice John Roberts has done to shred and destroy our Constitution.  Thanks to the Canadian Free Press and Timothy Birdnow. excerpt: So, why is this so important to our discussion of the ruling by the Roberts Court? Because many on our side seem to believe that John Roberts did us a favor in his decision upholding the Affordable Healthcare Act, or as it is known colloquially, Obamacare. The argument in conservative circles for a silver lining to this dark cloud of human bodily excretions is that this ends the debate over the right to use the Commerce Clause to justify any action of Congress and that it hangs this around Osama's neck, a huge tax increase, for the November elections. While a little soothing may be in order we are making a terrible mistake here, because, A.) an eggplant could see this is unconstitutional and, B.) it simply kicks the can down the road, forcing us to fight yet another unnecessary battle. We should have declared victory here. First, this is not a mere political move on Roberts part. He is Chief Justice of the Supreme Court, and as such is not going to tie his name to a partisan decision that will be read about in American textbooks. If he is to violate his oath it will be for personal reasons, such as upholding this law against all expectations. What will he gain personally from doing the right thing and striking it down? Upholding such a crazy law guarantees him a spot in the history books. But he is violating his oath of office in doing so, and that is the only sensible explanation because the Constitution is fairly clear; the United States Constitution expressly grants all powers not specifically enumerated in the document to the states and the People, and nowhere is this particular tax authorized. Furthermore, it violates the principle of equality under the law as only some of the public is actually paying a tax; the rest are buyin
Paul Merrell

Wyden Statement at Senate Intelligence Committee's Open Hearing | Press Releases | U.S.... - 0 views

  • U.S. Senator Ron Wyden (D-Ore.) delivered the following statement prior to questioning senior Intelligence Community officials during the Senate Intelligence Committee’s open hearing. Wyden is a senior member of the Intelligence committee. “The men and women of America’s intelligence agencies are overwhelmingly dedicated professionals and they deserve to have leadership that is trusted by the American people. Unfortunately, that trust has been seriously undermined by senior officials’ reckless reliance on secret interpretations of the law and battered by years of misleading and deceptive statements that senior officials made to the American people. These statements did not protect sources and methods that were useful in fighting terror. Instead they hid bad policy choices and violations of the liberties of the American people. For example, the director of the NSA said publicly that the NSA doesn’t hold data on U.S. citizens. That was obviously untrue.  Justice Department officials testified that section 215 of the Patriot Act is analogous to grand jury subpoena authority. And that deceptive statement was made on multiple occasions. Officials also suggested that the NSA doesn’t have the authority to read Americans’ emails without a warrant but the FISA court opinions declassified last August showed that wasn’t true either.
  • The statement and subsequent questions may be viewed below or here:
  •  
    Ron Wyden comes out swinging at a Senate hearing, giving 3 examples of lies about digital surveillance told to Congress by intelligence officials and DoJ. Then he presses DNI Clapper, CIA head Brennan, and FBI head Comey to provide by dates certain written public answers to a series of questions that he had previously asked in writing but never received answers on. All three said they would provide the answers, Clapper within 30 days and the other two within 7 days.  The questions themselves are extremely important, about the government's interpretation of legal authorities to conduct warrantless searches and in the case of the CIA, whether it is subject to the Computer Fraud and Abuse Act. That Act provides for criminal penalties and civil damages for accessing a "protected computer" (essentially any computer connected to the internet, whether in the U.S. or abroad) or activating any command or installing any malware on a protected computer. See generally, http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act That question suggests that Wyden and his staff are boring into issues involving the government breaking into computers to access private data. Another question asked whether the government claimed the authority to access private data stored in the cloud without a warrant.  This is a short video well worth the watching time.
Paul Merrell

Has the NSA Wiretapping Violated Attorney-Client Privilege? | The Nation - 0 views

  • The first time Adis Medunjanin tried to call Robert C. Gottlieb in mid-2009, Gottlieb was out of the office. Medunjanin was agitated. He had to speak to an attorney. Gottlieb’s assistant told him Gottlieb would be back soon. When Medunjanin spoke to the lawyer a little later, he was told he might need legal representation. He thought he might be under investigation. Over the next six months and in forty-two phone calls, Medunjanin sought legal advice from Gottlieb. When he was arrested in January 2010 on charges that he tried to bomb the New York subway, it was Gottlieb who defended him, receiving security clearance to review government documents pertinent to the case in the process. Gottlieb was preparing Medunjanin’s defense when a federal officer in charge of information distribution e-mailed him that there was new classified information he needed to review at the US Eastern District Court in Brooklyn. “I went over to the Brooklyn Federal courthouse, went up to the secured room, gained entry with the secret security codes, opened the file cabinet that is also secure and in the second drawer was a CD,” Gottlieb told me. On that CD were recordings of every single one of his forty-two phone calls with Medunjanin before he was taken into custody and indicted on January 7, 2010.
  • Such calls are normally sacrosanct under the principle of attorney-client privilege, the ability to speak confidentially with your lawyer. But a leak to The Guardian last summer of National Security Agency (NSA) procedures that are supposed to protect privileged calls showed that some attorney-client privileged calls are not subject to internal rules that detail the instances when a wiretap should be turned off. A later version of the procedures declassified by the NSA last August contains the same language. These “minimization” procedures, as they are known, are the rules and regulations for wiretaps under the Foreign Intelligence Surveillance Act (FISA). They tell NSA agents when they can listen, and when they have to turn the tap off, when they can record and when they should not be recording. There are rules for which kinds of communications can be monitored—for example, domestic communications are off limits, although communications from agents of foreign powers and suspected terrorists don’t count as domestic—and there is a section that provides for the protection of attorney-client calls.
  • Section four of the declassified 2011 guidelines is the part of that document that governs wiretapping attorney-client calls. At first glance, it seems quite clear: when the agent realizes that he or she is monitoring an attorney-client communication, “monitoring of that communication will cease and the communication will be identified as an attorney-client communication in a log maintained for that purpose.” But given a second reading, section four doesn’t apply to all attorney-client calls. It provides only for the minimization (and protection) of the calls of “a person who is known to be under criminal indictment in the United States”—someone who has already been charged under US law. This is because indicted persons have a Sixth Amendment right to counsel. People who aren’t indicted don’t have this right, and so their calls are not minimized. When I asked an NSA press officer, Vanee’ M. Vines, how attorney-client privilege was protected, she referred me to the Department of Justice. I left several messages, but the DOJ never contacted me back.
Paul Merrell

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
Paul Merrell

EU votes to support suspending U.S. data sharing agreements, including passenger flight... - 0 views

  • The European Parliament on Thursday adopted a joint, cross-party resolution to begin investigations into widespread surveillance of Europeans by the U.S. National Security Agency (NSA). Read this EU to vote to suspend U.S. data sharing agreements, passenger records amid NSA spying scandal Read more In the vote, 483 voted for the resolution, 98 against, and 65 abstained on a vote that called on the U.S. to suspend and review any laws and surveillance programs that "violate the fundamental right of EU citizens to privacy and data protection," as well as Europe's "sovereignty and jurisdiction." The vote also gave backing to the suspension of data sharing deals between the two continents, should the European Commission take action against its U.S. ally.
  • The U.S. government faces continued criticism and pressure from its international allies following news that its intelligence agencies spied on foreign nationals under its so-called PRISM program. The U.K. government was also embroiled in the NSA spying saga, after its signals intelligence intercepting station GCHQ tapped submarine fiber optic cables under its own secret program, code named Tempora. Reuters reported on Wednesday that the Commission is examining whether the U.K. broke EU law, which could lead to fines imposed by the highest court in Europe.
  • Should the Commission decide it necessary to suspend the data sharing agreement of passenger details — including personal and sensitive individual data — it could ultimately lead to the grounding of flights between the EU and the U.S. Dutch MEP Sophie in 't Veld said in a statement after the vote: "We must consider now if the PNR and SWIFT agreements are still tenable in the circumstances." Critics say PNR data has never helped catch a suspected criminal or terrorist before. SWIFT data sharing, which provides U.S. authorities with secure banking details in a bid to crack down on terrorist financing, could also be suspended. A spokesperson for the D66 delegation in Brussels confirmed by email that the English version of the joint motion is "the right one and is leading," despite claims that there were "translation error[s]" between the different versions of the joint resolution.
  • ...3 more annotations...
  • Members of the European Parliament (MEPs) in a plenary session in Strasbourg voted in favor of a section of the resolution that called on the Commission to "give consideration to all the instruments at their disposal in discussions and negotiations with the U.S. [...] including the possible suspension of the passenger name record (PNR) and terrorist finance tracking program (TFTP) agreements."
  • An EU source familiar with proceedings confirmed that the Commission now has the authority from the Parliament to suspend PNR and TFTP, but it falls at the Commission's discretion. Resolutions passed by the Parliament are not legally binding, but give backing to the Commission should the executive body wish to enact measures against a foreign power or entity. A Commission spokesperson confirmed that there are "no deadlines" on deciding whether it will follow up on the Parliament's resolution.
  • The Parliament's Civil Liberties, Justice and Home Affairs committee was given the authority by Thursday's vote to set up an inquiry to gather evidence from both U.S. and EU sources to assess the impact of the surveillance activities on EU citizens' fundamental right to privacy and data protection.
Paul Merrell

OpEdNews - Article: Al-Qaeda's Air Force Still On Stand-By - 1 views

  • It was 12 years ago today. Historians will register that, according to the official narrative, 19 Arabs armed with box cutters and minimal flying skills pledged to a transnational Terror Inc turned jets into missiles to attack the US homeland, fooling the most elaborate defense system on Earth.  Fast forward to 2013. Here's a 15-second version of the President of the United States (POTUS) address on Syria, one day before the 12th anniversary of 9/11: "Our ideals and principles, as well as our national security, are at stake. The United States is 'the anchor of global security.' Although the United States military 'doesn't do pin pricks,' we still carry the burden to punish regimes that would flout long-held conventions banning the use of biological, chemical and nuclear weapons.  "That's why I have decided to pursue an unlimited, targeted military strike against Washington DC." For countless global citizens, this alternative version predictably sounds as far-fetched as the official version of what happened 12 years ago. The fog of war obscures in mysterious ways. But the fact remains that the current, "reluctant" (farcical) Emperor continues to stake his -- and his nation's -- "credibility" on a "limited," "kinetic" operation to reinforce his self-defined red line against chemical weapons. 
  • In theory, the Russian plan of having Damascus surrender its chemical weapons arsenal works because of its inbuilt Chinese wisdom; nobody loses face -- from Obama and the US Congress to the European Union, the UN and the even more farcical "Arab" League, which is essentially a Saudi Arabian colony.  Although Obama is on a media blitzkrieg stealing the credit for it, Asia Times Online has confirmed that the plan was elaborated by Damascus, Tehran and Moscow last week -- after a visit to Damascus by the head of the national security committee of the Iranian Majlis (parliament), Alaeddin Boroujerdi. US Secretary of State John Kerry's now famous "slip" provided the opening.  So, essentially, it's this "axis" -- Damascus, Tehran and Moscow -- that is helping Obama to crawl out of his self-inflicted abyss. Needless to say, that is absolutely unbearable for the plutocrats in charge of unleashing the new Syria (lethal) production. A brand new propaganda/manufactured hysteria campaign must be unfurled to justify war. And that's exactly what the Anglo-French-American axis is working on.  No wonder the French proposal for a new UN Security Council resolution falls under the UN's Chapter 7 -- which would explicitly allow the use of force against Damascus in case of non-compliance. As it is, this resolution will inevitably be vetoed by Russia and China. And that will be the new pretext for war. The (farcical) emperor may easily invoke plausible deniability, stress he made "every effort" to avoid a military conflict, and then convince skeptics in the US Congress this is the only way to go. 
  • At least there is a counter-power. Asia Times Online has confirmed that an outstanding meeting will take place later this week in Kyrgyzstan, during the annual summit of the Shanghai Cooperation Organization (SCO). Picture Chinese President Xi Jinping, Russian President Vladimir Putin and new Iranian President Hassan Rouhani together, in the same room, discussing their common position on Syria. Iran is an SCO observer -- and may soon be admitted as a full member. This is what the Anglo-French-American axis is up against.  And that brings us back to 12 years ago -- and the myth that aluminum jets are able to penetrate the thick steel perimeters of the Twin Towers and kerosene is capable of instantaneously melting steel perimeters and steel cores into fluffy steel dust. Check this out and draw the necessary conclusions.  As for that "evil," transnational Terror Inc, it didn't even have a name when Jihad International hopefuls were being recruited in the early 1980s by assorted Islamic charities, and then trained and funded by the CIA and Saudi Arabia. One day the database was finally named -- by the US -- as "al-Qaeda." Or, more appropriately, "al-CIAeda." They were elevated to Ultimate Evil status. They did 9/11. They reproduced like rabbits from Mali to Indonesia. Now the CIA works side-by-side with them -- as it did in Libya. And eagerly they await the US Air Force to clear their road to Damascus. Hey, it's just (war) business. Allahu Akbar. 
  •  
    Note to self: Never read Pepe Escobar articles when I have work that needs to be done. Escobar does it again, with his endearing literary style, masterfully weaving sarcasm with the "facts," the facts, and right-on-the-money political analysis. Here, he commemorates 9/11 by pointing to its parallels with Obama's "humanitarian" Pipelinestan war plans against Syria. Watch out for that link related to 9/11. It takes you to a masterful video some 45 minutes long that you can't stop watching once you begin. And there went another hour and 15 minutes of my workday.
Paul Merrell

US, Afghan security deal at risk as Karzai calls for delay in signing | Fox News - 0 views

  • The tentative security deal reached between Secretary of State John Kerry and Afghan President Hamid Karzai could be at risk after Karzai told a gathering of elders that the signing should be put off until after next year's Afghan presidential election -- and signed only if it is approved by the council and the parliament. 
  • A delay in the signing would be problematic for the U.S. government, which wants an agreement as soon as possible to allow American planners to prepare for a military presence after 2014, when the majority of foreign combat forces will have left Afghanistan.  Despite the decision to defer signing the agreement until after the scheduled April 5 election, Karzai spoke in support of the deal on the first day of the meeting of the 2,500-member national consultative council of Afghan elders known as the Loya Jirga Thursday in Kabul.  At one point, Karzai acknowledged there was little trust between his government and Washington. He was quoted by Reuters as saying "My trust with America is not good. I don't trust them and they don't trust me. During the past 10 years I have fought with them and they have made propaganda against me.'' 
  • Karzai did not address one of the biggest points of contention in the proposed deal, the U.S. request for jurisdiction over its own troops. Lack of agreement over that issue helped scuttle a similar agreement with Iraq and prompted Washington to order most troops out of that country in 2011.  The Loya Jirga retains the right to revise or reject any clause of the deal. If the deal is approved by the council, whatever version of the pact that is extant must also be approved by the Afghan parliament. 
  •  
    Here's hoping that the Jirga or Afghan Parliament will nix the deal as Iraq did, by refusing to grant U.S. troops and contractors immunity from Afghan criminal law. I read the leaked U.S. markup version of the deal two days ago. It would extend the U.S. Afghan War until 2024 or beyond. Kerry and Obama might be upset; both announced that Kerry had signed the deal this morning. According to Kerry, U.S. involvement will gradually wind down to about 15K troops plus who-knows-how-many contractors and subcontractors. Number of U.S. troops in Afghanistan when Obama took office: 26,607. Number of U.S. troops there as of October, 2013: roughly 51,000. Our Nobel Peace Prize Prez who jokes to his staff about how many people he kills. Ha, ha. Funny. Not.  Let's remember that as recently as June, Obama said that the U.S. could have all troops out before the present deal expires in 2014 if there's no new agreement. I can hope.
Paul Merrell

Testosterone Pit - Home - NSA Revelations Kill IBM Hardware Sales in China - 0 views

  • The first shot was fired on Monday. Teradata, which sells analytics tools for Big Data, warned that quarterly revenues plunged 21% in Asia and 19% in the Middle East and Africa. Wednesday evening, it was IBM’s turn to confess that its hardware sales in China had simply collapsed. Every word was colored by Edward Snowden’s revelations about the NSA’s hand-in-glove collaboration with American tech companies, from startups to mastodons like IBM.
  • The explanation is more obvious. In mid-August, an anonymous source told the Shanghai Securities News, a branch of the state-owned Xinhua News Agency, which reports directly to the Propaganda and Public Information Departments of the Communist Party, that IBM, along with Oracle and EMC, have become targets of the Ministry of Public Security and the cabinet-level Development Research Centre due to the Snowden revelations. “At present, thanks to their technological superiority, many of our core information technology systems are basically dominated by foreign hardware and software firms, but the Prism scandal implies security problems,” the source said, according to Reuters. So the government would launch an investigation into these security problems, the source said. Absolute stonewalling ensued. IBM told Reuters that it was unable to comment. Oracle and EMC weren’t available for comment. The Ministry of Public Security refused to comment. The Development Research Centre knew nothing of any such investigation. The Ministry of Industry and Information Technology “could not confirm anything because of the matter’s sensitivity.”
  • I’d warned about its impact at the time [read.... US Tech Companies Raked Over The Coals In China]. Snowden’s revelations started hitting in May. Not much later, the Chinese security apparatus must have alerted IT buyers in government agencies, state-owned enterprises, and major independent corporations to turn off the order pipeline for sensitive products until this is sorted out. As Mr. Loughridge’s efforts have shown, it’s hard to explain any other way that hardware sales suddenly collapsed by “40%, 50%” in China, where they’d boomed until then. This is the first quantitative indication of the price Corporate America has to pay for gorging at the big trough of the US Intelligence Community, and particularly the NSA with its endlessly ballooning budget. For once, there is a price to be paid, if only temporarily, for helping build a perfect, seamless, borderless surveillance society. The companies will deny it. At the same time, they’ll be looking for solutions. China, Russia, and Brazil are too important to just get kicked out of – and other countries might follow suit. In September, IBM announced that it would throw another billion at Linux, the open-source operating system, to run its Power System servers – the same that China had stopped buying. It seems IBM was trying to make hay of the NSA revelations that had tangled up American operating system makers. Linux, free of NSA influence, would be a huge competitive advantage for IBM. Or so it would seem. Read.... The Other Reason Why IBM Throws A Billion At Linux (With NSA- Designed Backdoor)
  • ...1 more annotation...
  • The first shot was fired on Monday. Teradata, which sells analytics tools for Big Data, warned that quarterly revenues plunged 21% in Asia and 19% in the Middle East and Africa. Wednesday evening, it was IBM’s turn to confess that its hardware sales in China had simply collapsed. Every word was colored by Edward Snowden’s revelations about the NSA’s hand-in-glove collaboration with American tech companies, from startups to mastodons like IBM.
  •  
    It's starting to look as though the price of NSA collaboration is bankruptcy. Look for Big Blue to attempt to recover the loss from the U.S. government via some juicy deal.
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

Anne-Marie Slaughter on how US intervention in the Syrian civil war would alter Vladimi... - 0 views

  • Anne-Marie Slaughter, a former director of policy planning in the US State Department (2009-2011), is President and CEO of the New America Foundation and Professor Emerita of Politics and International Affairs at Princeton University.
  • The solution to the crisis in Ukraine lies in part in Syria. It is time for US President Barack Obama to demonstrate that he can order the offensive use of force in circumstances other than secret drone attacks or covert operations. The result will change the strategic calculus not only in Damascus, but also in Moscow, not to mention Beijing and Tokyo.CommentsView/Create comment on this paragraphMany argue that Obama’s climb-down from his threatened missile strikes against Syria last August emboldened Russian President Vladimir Putin to annex Crimea. But it is more likely that Putin acted for domestic reasons – to distract Russians’ attention from their country’s failing economy and to salve the humiliation of watching pro-European demonstrators oust the Ukrainian government he backed.CommentsView/Create comment on this paragraphRegardless of Putin’s initial motivations, he is now operating in an environment in which he is quite certain of the parameters of play. He is weighing the value of further dismemberment of Ukraine, with some pieces either joining Russia or becoming Russian vassal states, against the pain of much stronger and more comprehensive economic sanctions. Western use of force, other than to send arms to a fairly hapless Ukrainian army, is not part of the equation.CommentsView/Create comment on this paragraphThat is a problem. In the case of Syria, the US, the world’s largest and most flexible military power, has chosen to negotiate with its hands tied behind its back for more than three years. This is no less of a mistake in the case of Russia, with a leader like Putin who measures himself and his fellow leaders in terms of crude machismo.
  • It is time to change Putin’s calculations, and Syria is the place to do it. Through a combination of mortars that shatter entire city quarters, starvation, hypothermia, and now barrel bombs that spray nails and shrapnel indiscriminately, President Bashar al-Assad’s forces have seized the advantage. Slowly but surely, the government is reclaiming rebel-held territory.CommentsView/Create comment on this paragraph“Realist” foreign policy analysts openly describe Assad as the lesser evil compared to the Al Qaeda-affiliated members of the opposition; others see an advantage in letting all sides fight it out, tying one another down for years. Moreover, the Syrian government does appear to be slowly giving up its chemical weapons, as it agreed last September to do.CommentsView/Create comment on this paragraphThe problem is that if Assad continues to believe that he can do anything to his people except kill them with chemicals, he will exterminate his opponents, slaughtering everyone he captures and punishing entire communities, just as his father, Hafez al-Assad, massacred the residents of Hama in 1982. He has demonstrated repeatedly that he is cut from the same ruthless cloth.CommentsView/Create comment on this paragraphSince the beginning of the Syrian conflict, Assad has fanned fears of what Sunni opposition forces might do to the Alawites, Druze, Christians and other minorities if they won. But we need not speculate about Assad’s behavior. We have seen enough.
  • ...3 more annotations...
  • A US strike against the Syrian government now would change the entire dynamic. It would either force the regime back to the negotiating table with a genuine intention of reaching a settlement, or at least make it clear that Assad will not have a free hand in re-establishing his rule.CommentsView/Create comment on this paragraphIt is impossible to strike Syria legally so long as Russia sits on the United Nations Security Council, given its ability to veto any resolution authorizing the use of force. But even Russia agreed in February to Resolution 2139, designed to compel the Syrian government to increase flows of humanitarian aid to starving and wounded civilians. Among other things, Resolution 2139 requires that “all parties immediately cease all attacks against civilians, as well as the indiscriminate employment of weapons in populated areas, including shelling and aerial bombardment, such as the use of barrel bombs….”CommentsView/Create comment on this paragraphThe US, together with as many countries as will cooperate, could use force to eliminate Syria’s fixed-wing aircraft as a first step toward enforcing Resolution 2139. “Aerial bombardment” would still likely continue via helicopter, but such a strike would announce immediately that the game has changed. After the strike, the US, France, and Britain should ask for the Security Council’s approval of the action taken, as they did after NATO’s intervention in Kosovo in 1999.
  • Equally important, shots fired by the US in Syria will echo loudly in Russia. The great irony is that Putin is now seeking to do in Ukraine exactly what Assad has done so successfully: portray a legitimate political opposition as a gang of thugs and terrorists, while relying on provocations and lies to turn non-violent protest into violent attacks that then justify an armed response.CommentsView/Create comment on this paragraphRecall that the Syrian opposition marched peacefully under fire for six months before the first units of the Free Syrian Army tentatively began to form. In Ukraine, Putin would be happy to turn a peaceful opposition’s ouster of a corrupt government into a civil war.CommentsView/Create comment on this paragraphPutin may believe, as Western powers have repeatedly told their own citizens, that NATO forces will never risk the possibility of nuclear war by deploying in Ukraine. Perhaps not. But the Russian forces destabilizing eastern Ukraine wear no insignia. Mystery soldiers can fight on both sides.CommentsView/Create comment on this paragraphPutting force on the table in resolving the Ukraine crisis, even force used in Syria, is particularly important because economic pressure on Russia, as critical as it is in the Western portfolio of responses, can create a perverse incentive for Putin. As the Russian ruble falls and foreign investment dries up, the Russian population will become restive, giving him even more reason to distract them with patriotic spectacles welcoming still more “Russians” back to the motherland.
  • Obama took office with the aim of ending wars, not starting them. But if the US meets bullets with words, tyrants will draw their own conclusions. So will allies; Japan, for example, is now wondering how the US will respond should China manufacture a crisis over the disputed Senkaku Islands.CommentsView/Create comment on this paragraphTo lead effectively, in both the national and the global interest, the US must demonstrate its readiness to shoulder the full responsibilities of power. Striking Syria might not end the civil war there, but it could prevent the eruption of a new one in Ukraine.
  •  
    The author was Hillary Clinton's director of policy planning at the State Dept. She still serves on State's foreign policy advisory board and is well-positioned at the very center of the U.S. War Party. https://en.wikipedia.org/wiki/Anne-Marie_Slaughter#Other_policy.2C_public.2C_and_corporate_activities It's a given that she would likely be back in government should Hillary win Auction 2016. To say that the lady is a hawk after reading this article would be a gross understatement. 
Paul Merrell

Vladimir Putin must be called to account on surveillance just like Obama | Edward Snowd... - 0 views

  • On Thursday, I questioned Russia's involvement in mass surveillance on live television. I asked Russia's president, Vladimir Putin, a question that cannot credibly be answered in the negative by any leader who runs a modern, intrusive surveillance program: "Does [your country] intercept, analyse or store millions of individuals' communications?"I went on to challenge whether, even if such a mass surveillance program were effective and technically legal, it could ever be morally justified.The question was intended to mirror the now infamous exchange in US Senate intelligence committee hearings between senator Ron Wyden and the director of national intelligence, James Clapper, about whether the NSA collected records on millions of Americans, and to invite either an important concession or a clear evasion. (See a side-by-side comparison of Wyden's question and mine here.)
  • Clapper's lie – to the Senate and to the public – was a major motivating force behind my decision to go public, and a historic example of the importance of official accountability. In his response, Putin denied the first part of the question and dodged on the latter. There are serious inconsistencies in his denial – and we'll get to them soon – but it was not the president's suspiciously narrow answer that was criticised by many pundits. It was that I had chosen to ask a question at all.I was surprised that people who witnessed me risk my life to expose the surveillance practices of my own country could not believe that I might also criticise the surveillance policies of Russia, a country to which I have sworn no allegiance, without ulterior motive. I regret that my question could be misinterpreted, and that it enabled many to ignore the substance of the question – and Putin's evasive response – in order to speculate, wildly and incorrectly, about my motives for asking it.
  •  
    Article by Edward Snowden, includes video of the questions by Snowden and answers by Putin. Well worth the read. 
Paul Merrell

BBC News - Google and Facebook can be legally intercepted, says UK spy boss - 0 views

  • UK intelligence service GCHQ can legally snoop on British use of Google, Facebook and web-based email without specific warrants because the firms are based abroad, the government has said. Classed as "external communications", such activity can be covered by a broad warrant and intercepted without extra clearance, spy boss Charles Farr said. The policy was revealed as part of a legal battle with campaign group Privacy International (PI). PI labelled the policy "patronising".
  • Charles Farr, director general of the Office for Security and Counter-Terrorism, told PI that Facebook, Twitter, YouTube and web searches on Google - as well as webmail services such as Hotmail and Yahoo - were classified as "external communications", which meant they could be intercepted without the need for additional legal clearance. Internal communications between citizens can only be intercepted when a targeted warrant is issued. Warrants must be signed by a minister and can only be issued when there is suspicion of illegal activity. But when someone searches for something on Google or posts on Facebook they are sending information overseas - constituting an act of external communication that could be collected under a broader warrant which does not need to be signed by a minister, explained Mr Farr in a 48-page written statement.
  • However, he said data collected in this way "cannot be read, looked at or listened to" except in strictly limited circumstances. Mr Farr said there was a "significant distinction" between intercepting material and a person actually reading, looking at or listening it.
  •  
    Well, that should ratchet up the controversy scale in the UK a bit. :-) 
Paul Merrell

Espionage Act Case Was "Overcharged," Defense Says | Federation Of American Scientists - 0 views

  • In 2012, former Navy linguist James F. Hitselberger was indicted on two felony counts under the Espionage Act statutes after several classified documents were found in his possession. In 2013, a superseding indictment charged him with another four felony counts. But in the end, Mr. Hitselberger pleaded guilty this year to a single misdemeanor charge of removing classified documents without authorization. Now both the defense and the prosecution are endorsing Hitselberger’s request that any jail penalty be limited to the time he has already served, including two months in DC jail and eight months of home confinement. The sentencing hearing is scheduled for July 17. Despite the stark disparity between the multiple felony counts with which Hitselberger was charged, and the single misdemeanor of which he was convicted, the prosecution said that it had no second thoughts about the way the matter was handled.
  • “It is important to note that the government’s case against Mr. Hitselberger did not collapse,” prosecutors said in a June 27 sentencing memorandum. To the contrary, prosecutors wrote, “in several ways, the government’s case became stronger than what it had been when the charges were first obtained.” Defense attorneys disputed that assertion and said the government had overreached. “At a minimum, the evidence demonstrates that the government significantly overcharged the case, and the guilty plea to a misdemeanor not only was the appropriate result, but also demonstrates how the offense should have been charged from the beginning,” the defense wrote in a June 27 reply. The mountain of Espionage Act charges that yielded a molehill of a misdemeanor in this case recalls a similar progression in the prosecution of former NSA official Thomas Drake, where ten felony counts gave way to a technical misdemeanor. This recurring pattern may indicate that overcharging is a standard prosecutorial approach to such cases, or that the judicial process is effectively winnowing out excessive felony charges, or perhaps both.
  • A June 26 sentencing memorandum submitted by the defense presented its own account of the facts of the case, along with several moving testimonials from Hitselberger’s friends and relatives as to his character. In another pending Espionage Act case, the Obama Administration must decide if it will pursue a subpoena against New York Times reporter James Risen. For a current update, see Reporter’s Case Poses Dilemma for Justice Dept. by Jonathan Mahler, New York Times, June 27.
  •  
    Charged with 6 Espionage Act felonies, plea-bargained down to a single misdemeanor and recommended sentence of time served. Reading the linked court documents, it was a case that should have resulted in a verbal reprimand by the military commander. 
Paul Merrell

More Phantom Jobs Created-All In The Wrong Places - 0 views

  • Education is not the answer By Paul Craig Roberts June 07, 2014 "ICH" -  Last April I saw a report that 83% of May’s college graduates did not have a job. I remarked that in my day most of us had 2 or 3 job or graduate school offers before we graduated. The latest payroll jobs report issued on June 6 proves that the April report was true. My opinion, schooled in part by John Williams’ very precise reports on Shadowstats.com, is that on average about half of the new jobs each month are phantom jobs created by the birth-death model and inappropriate seasonal adjustments. So, I figured that the 217,000 jobs claimed for May are more like 108,000. Then I read John Williams’ report on the May jobs number: “Monthly payroll gains overstated by 200,000 plus jobs” In other words, there were zero new jobs in May.
  • Just as the US government can turn an inconsequential Iraq, Afghanistan, Libya, and Syria into dangerous threats against “the world’s only superpower,” the US government can turn zero jobs growth into 217,000 jobs. It is easy when you have a prostitute media and a gullible public, both of which Washington most certainly has. But let’s take the government data at face value. First, consider the news report that finally as of May 2014 as many Americans had jobs as had jobs in January 2008. That might seem like good news until you take into account that since January 2008 the US has experienced 6.5 years of population growth. Economists seem to have settled on population growth adding 129,000 people to the work force each month. That comes to 10,000,000 people. Where are their jobs? The “jobs recovery” doesn’t provide for the 10 millions who have come of working age since January 2008. We can conclude from this that the official 6.3 percent unemployment rate is nonsense. The unemployment rate is in the neighborhood of 23 percent as John Williams has established.
  • Just as the US government claims, falsely, that Russia invaded Ukraine and annexed Crimea, that Saddam Hussein had weapons of mass destruction, that Assad used chemical weapons on Syrians, and so forth and so on, the 6.3 percent unemployment rate is just another government lie. Second, consider where the claimed 217,000 May jobs are. Hardly any of these claimed jobs are jobs in which university graduates begin their careers. The jobs are in wholesale trade, retail clerks, transportation and warehousing, employment services and temporary help, waitresses and bartenders, and health care and social assistance. In the later category, ambulatory health care services and social assistance account for the majority of jobs. If college graduates have jobs, they are not the jobs for which they studied. On March 31, CNN Money reported that 260,000 college graduates were employed at or below the federal minimum wage of $7.25 per hour.
  • ...2 more annotations...
  • For the many years that I have been reporting on the jobs statistics, there has been scant sign of any jobs for college graduates. Considering that there are at least 3,100 colleges and universities in the US, the May graduating class must number in the hundreds of thousands. Looking at the May jobs statistics, those graduating from law school face a dismal situation as employment of lawyers dropped by 700. There were jobs for only 4,100 accountants and bookkeepers. There were 4,500 jobs for architects and engineers, a number that includes secretaries and office managers. There were 1,800 management jobs. State government education jobs declined by 5,300 and local government education jobs declined by 6,600 jobs. So where did the education majors find employment? How is the second quarter going to come roaring back, as the financial media assures us it will, when the jobs report is so discouraging? How much longer will Washington be able to hide the fact that the US economy is sinking?
  • If you read all the bullshit that the American media and educational establishment puts out, “education is the answer.” Apparently not. Education is the way to become deeply in debt and work for $7.25 per hour, if you are lucky to escape unemployment. America is a Great Big Lie. There is no truth in what we are told. The entire country, along with that part of the world under Washington’s thumb, is run for about six private interest groups. The rest of us are being fleeced.
Gary Edwards

Birth of an Internet independence movement | CIO - 0 views

  • The arrogance and utter incongruity of declaring Internet and telephone networks equivalent has led a group of friends, all of them reluctant activists, to convene an effort to restore Internet independence. So far, the group of “Tech Innovators” includes John Perry Barlow, Mark Cuban, Tim Draper, Tom Evslin, Dave Farber, Charlie Giancarlo, George Gilder, John Gilmore, Brian Martin, Bob Metcalfe, Ray Ozzie, Jeff Pulver, Michael Robertson, Scott McNealy and Les Vadasz. Through this civic initiative, we hope to defend the remarkable success of the Internet and lead a conversation toward the future — not the past, where laws enacted under FDR must inevitably lead us. The open Internet rules from the FCC end the “permissionless innovation” they purport to protect by inviting the commission to regulate computer networks for the first time. The uncertain benefits and certain unintended consequences of the policy reversal expose the communicating public to unnecessary risk and threaten to upend the success of the past 20 years. The Tech Innovators believe that by recognizing “Internet Independence Day,” Congress can help initiate and advance bipartisan legislation to restore the private-sector framework responsible for of the success of the Internet.
  • Americans today enjoy a thousand-fold improvement from the 56Kbps dial-up modems that 15 million Internet early adopters relied on in the ’90s. The Internet now reaches 3 billion people, and a proliferation of services push communication options far beyond the long-distance phone call of 1995. The FCC plan to impose public utility Title II provisions ends the policies responsible for these accomplishments. Domains subject to telephone-style regulations suffer stagnation without exception. A routine 10Mbps connection available as a nonregulated information service prior to the Open Internet Order would have cost $10,000 per month as a Title II data service in 1995. The insertion of fiat regulatory powers will prove fatal to the entrepreneurial energies responsible for building what FCC Chairman Wheeler calls “the most powerful network in the history of mankind” — a network built beyond the reach of FCC regulatory jurisdiction.
  • The Open Internet Order invents artificial distinctions between content companies, Internet providers and end users for the purposes of regulation. This will lead to the same types of regulatory arbitrage and innovation-deadening consequences as prior distinctions such as “long distance” or “intra-lata.” History demonstrates that asserting artificial market distinctions for purposes of regulation always invites arbitrage and unintended consequences. Resources White Paper 802.11ac: Wireless The Easy Way White Paper Web Application Acceleration: Practical Implementations See All Go The commission obtains jurisdiction by changing the definition of “public switched network” to include networks with IP addresses. The complete transformation of a policy landscape represents a decision the Constitution grants exclusively to Congress.
  • ...1 more annotation...
  • The coming litigation leaves the Internet ecosystem in jeopardy without regard to the outcome. The preference for a congressional action addressing current conditions and issues relative to the prospects of an 80-year-old regulatory framework should not be controversial. The privatization of the Internet represented an experiment. Restoring Internet independence merely recognizes the remarkable success of the commercial Internet.
  •  
    "The 20th anniversary of the privatization of the Internet deserves recognition by the U.S. Congress and celebration by all Americans as "Internet Independence Day." Two decades ago, on April 30, 1995, the Internet was privatized with the decommissioning of the NSFNET backbone. State of the CIO 2015 More than 500 top IT leaders responded to our online survey to help us gauge the state of the READ NOW The past two decades of Internet-driven success were set in motion with the passage of the High Performance Computing Act of 1991, championed by Sen. Al Gore and signed into law by President George H.W. Bush. That decision of the U.S. government to step back and privatize the Internet led to a thriving and open Internet that provides a remarkable platform for innovation. Ironically, the Federal Communication Commission's recently announced Open Internet Order reasserts government control over the Internet by the means of repurposing Depression-era industrial policy meant to address a monopoly in voice-transmission technology. The FCC went down the dangerous and uncertain legal path of reverting to traditional, utility-style regulation under Title II of the Communications Act of 1934."
Paul Merrell

Revealed: NSA pushed 9/11 as key 'sound bite' to justify surveillance | Al Jazeera America - 0 views

  • The National Security Agency advised its officials to cite the 9/11 attacks as justification for its mass surveillance activities, according to a master list of NSA talking points. The document, obtained by Al Jazeera through a Freedom of Information Act request, contains talking points and suggested statements for NSA officials (PDF) responding to the fallout from media revelations that originated with former NSA contractor Edward Snowden. Invoking the events of 9/11 to justify the controversial NSA programs, which have caused major diplomatic fallout around the world, was the top item on the talking points that agency officials were encouraged to use. Under the subheading “Sound Bites That Resonate,” the document suggests the statement “I much prefer to be here today explaining these programs, than explaining another 9/11 event that we were not able to prevent.”
  • NSA head Gen. Keith Alexander used a slightly different version of that statement when he testified before Congress on June 18 in defense of the agency’s surveillance programs. Asked to comment on the document, NSA media representative Vanee M. Vines pointed Al Jazeera to Alexander’s congressional testimony on Tuesday, and said the agency had no further comment. In keeping with the themes listed in the talking points, the NSA head told legislators that “it is much more important for this country that we defend this nation and take the beatings than it is to give up a program that would result in this nation being attacked.” Critics have long noted the tendency of senior U.S. politicians and security officials to use the fear of attacks like the one that killed almost 3,000 Americans to justify policies ranging from increased defense spending to the invasion of Iraq.
  • Al Jazeera obtained the 27 pages of talking points from the NSA this week in response to a FOIA request filed June 13. The statements had been prepared for agency officials facing questions from Congress or the media over the revelations contained in classified documents that Snowden leaked to journalists Glenn Greenwald, Barton Gellman and others. A letter accompanying the documents notes that the talking points “are prepared and approved for a speaker to use and do not necessarily represent what the speaker actually said at the event.” The NSA has not yet turned over to Al Jazeera the documents the agency used to prepare the talking points, saying those materials require additional review before they can be released.  The attacks on the World Trade Center and the Pentagon also appear at the top of another talking-points document titled “Media Leaks One Card,” which contains 13 bullet points to explain the rationale behind the surveillance programs. Those points include “First responsibility is to defend the nation” and “NSA and its partners must make sure we connect the dots so that the nation is never attacked again like it was on 9/11.”
  • ...2 more annotations...
  • The master talking points list goes on to explain, under a subheading titled “We Needed to Connect the Dots,” that “post-9/11 we made several changes and added a number of capabilities to enable us to connect the dots.” Continuing revelations from the Snowden documents reveal surveillance on a scale that appears to go far beyond the scope of monitoring potential attackers, however. The agency’s “head of state collection” program, for example, reportedly included the monitoring of German Chancellor Angela Merkel’s mobile phone. The talking points document advises officials to emphasize the word “lawful” when discussing NSA surveillance programs, and to state that “our allies have benefited … just as we have.” “We believe that over 100 nations are capable of collecting signals intelligence or operating a lawful intercept capability that enable them to monitor communications,” the document continued.
  • Critics have called into question the veracity of the claim that NSA surveillance has thwarted more than 50 “potential” attacks. They claim evidence to support such assertions is lacking. NSA officials are advised to respond to questions about any potential civil liberties violations by citing talking points that say there have not been any “willful violations” and that the NSA is committed to “upholding the privacy and civil liberties of the American people.”
  •  
    27 pages of talking points appended to the article, plus a two-page cover letter. It's the scripts for just about everything official that's been coming out of NSA and the Administration. Interesting reading; they cover some things that haven't yet come up.   
Gary Edwards

Obama Socialism vs. The Constitution, The Bill of Rights, and The Declaration of Indepe... - 0 views

  • the Supreme Court never entered into the issues of redistribution of wealth, and sort of more basic issues of political and economic justice in this society.
  • It didn’t break free from the essential constraints that were placed by the Founding Fathers in the Constitution
  • the Constitution is a charter of negative liberties: [It] says what the states can’t do to you, says what the federal government can’t do to you, but it doesn’t say what the federal government or the state government must do on your behalf.
  • ...5 more annotations...
  • major redistributive change
  • We all know what political and economic justice means, because Barack Obama has already made it crystal clear a second earlier: It means redistribution of wealth.
  • The United States of America — five percent of the world’s population — leads the world economically, militarily, scientifically, and culturally — and by a spectacular margin. Any one of these achievements, taken alone, would be cause for enormous pride. To dominate as we do in all four arenas has no historical precedent. That we have achieved so much in so many areas is due — due entirely — to the structure of our society as outlined in the Constitution of the United States.
  • The entire purpose of the Constitution was to limit government. That limitation of powers is what has unlocked in America the vast human potential available in any population.
  • we have never, ever in our 232-year history, elected a president who so completely and openly opposed the idea of limited government, the absolute cornerstone of makes the United States of America unique and exceptional.
  •  
    Speaking on a call-in radio show in 2001, you can hear Senator Obama say things that should profoundly shock any American - or at least those who have not taken the time to dig deeply enough into this man's beliefs and affiliations. Read the text or Hear it for yourself!
Paul Merrell

LEAKED: Secret Negotiations to Let Big Brother Go Global | Wolf Street - 0 views

  • Much has been written, at least in the alternative media, about the Trans Pacific Partnership (TPP) and the Transatlantic Trade and Investment Partnership (TTIP), two multilateral trade treaties being negotiated between the representatives of dozens of national governments and armies of corporate lawyers and lobbyists (on which you can read more here, here and here). However, much less is known about the decidedly more secretive Trade in Services Act (TiSA), which involves more countries than either of the other two. At least until now, that is. Thanks to a leaked document jointly published by the Associated Whistleblowing Press and Filtrala, the potential ramifications of the treaty being hashed out behind hermetically sealed doors in Geneva are finally seeping out into the public arena.
  • If signed, the treaty would affect all services ranging from electronic transactions and data flow, to veterinary and architecture services. It would almost certainly open the floodgates to the final wave of privatization of public services, including the provision of healthcare, education and water. Meanwhile, already privatized companies would be prevented from a re-transfer to the public sector by a so-called barring “ratchet clause” – even if the privatization failed. More worrisome still, the proposal stipulates that no participating state can stop the use, storage and exchange of personal data relating to their territorial base. Here’s more from Rosa Pavanelli, general secretary of Public Services International (PSI):
  • The leaked documents confirm our worst fears that TiSA is being used to further the interests of some of the largest corporations on earth (…) Negotiation of unrestricted data movement, internet neutrality and how electronic signatures can be used strike at the heart of individuals’ rights. Governments must come clean about what they are negotiating in these secret trade deals. Fat chance of that, especially in light of the fact that the text is designed to be almost impossible to repeal, and is to be “considered confidential” for five years after being signed. What that effectively means is that the U.S. approach to data protection (read: virtually non-existent) could very soon become the norm across 50 countries spanning the breadth and depth of the industrial world.
  • ...1 more annotation...
  • The main players in the top-secret negotiations are the United States and all 28 members of the European Union. However, the broad scope of the treaty also includes Australia, Canada, Chile, Colombia, Costa Rica, Hong Kong, Iceland, Israel, Japan, Liechtenstein, Mexico, New Zealand, Norway, Pakistan, Panama, Paraguay, Peru, South Korea, Switzerland, Taiwan and Turkey. Combined they represent almost 70 percent of all trade in services worldwide. An explicit goal of the TiSA negotiations is to overcome the exceptions in GATS that protect certain non-tariff trade barriers, such as data protection. For example, the draft Financial Services Annex of TiSA, published by Wikileaks in June 2014, would allow financial institutions, such as banks, the free transfer of data, including personal data, from one country to another. As Ralf Bendrath, a senior policy advisor to the MEP Jan Philipp Albrecht, writes in State Watch, this would constitute a radical carve-out from current European data protection rules:
« First ‹ Previous 161 - 180 of 250 Next › Last »
Showing 20 items per page