Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged origins

Rss Feed Group items tagged

Gary Edwards

The American Spectator : Let's Get Original - New Originalism, Old Originalism, Judicia... - 0 views

  •  
    A "conservative" judge is not one who always votes to uphold conservative laws and to strike down liberal ones. Rather, when observers call a judge "conservative," they typically mean that he is to some degree an originalist. That is, he believes that laws have reasonably definite meanings, set by the words within them, and that these meanings do not change over time. Originalists do not believe that the Constitution is "living," and most originalists agree that judges should avoid looking beyond the text of enacted laws, except to learn the context and meaning of the laws themselves. Originalism has come a long way in a very short time. During a speech at an American Spectator dinner in late 2008, Justice Samuel Alito noted that there has been an explosion of judges' citing dictionary definitions from the eras when laws passed. This reflects a desire to understand what laws meant when the people, through their representatives, consented to them. Alito also noted that in Heller, both the majority opinion and the main dissent used originalist arguments. That is, the justices disagreed only on what the words of the Second Amendment meant to the generation of Americans that enacted it, and used a good deal of historical evidence in making their points. To understand originalism's rise, it helps to understand originalism's history. In the 18th century and most of the 19th, originalism was the only game in town. The Supreme Court almost never struck down the actions of the other branches of government. When the justices made decisions, the reasoning was typically grounded in the text of the Constitution, sometimes with extra evidence of the Founders' intentions from contemporary documents like the Federalist Papers.
Gary Edwards

Goldman Sachs mortgage-backed securities settlement - Business Insider - 0 views

  • “Goldman took $10 billion in TARP bailout funds knowing that it had fraudulently misrepresented to investors the quality of residential mortgages bundled into mortgage backed securities,” said Special Inspector General Christy Goldsmith Romero for TARP. 
  • “Many of these toxic securities were traded in a taxpayer funded bailout program that was designed to unlock frozen credit markets during the crisis.  While crisis investigations take time, SIGTARP is committed to working with our law enforcement partners to protect taxpayers and bring accountability and justice.”
  • $5 billion settlement with Goldman Sachs over the bank’s deceptive practices leading up to the financial crisis.
  • ...11 more annotations...
  • The settlement includes an agreed-upon statement of facts that describes how Goldman Sachs made multiple representations to RMBS investors about the quality of the mortgage loans it securitized and sold to investors, its process for screening out questionable loans, and its process for qualifying loan originators. 
  • Contrary to those representations, Goldman Sachs securitized and sold RMBS backed by large numbers of loans from originators whose mortgage loans contained material defects.
  • In the statement of facts, Goldman Sachs acknowledges that it securitized thousands of Alt-A, and subprime mortgage loans and sold the resulting residential mortgage-backed securities (“RMBS”) to investors for tens of billions of dollars. 
  • During the course of its due diligence process, Goldman Sachs received pertinent information indicating that significant percentages of the loans reviewed did not conform to the representations it made to investors.
  • Goldman also received and failed to disclose negative information that it obtained regarding the originators’ business practices.  Indeed, Goldman’s due diligence vendors provided Goldman with reports reflecting that the vendors had graded significant numbers and percentages of sampled loans as EV3s, i.e., not in compliance with originator underwriting guidelines. 
  • In certain circumstances, Goldman reevaluated loan grades and directed that such loans be waived into the pools to be purchased or securitized. 
  • In many cases, 80 percent or more of the loans in the loan pools Goldman purchased and securitized were not sampled for credit and compliance due diligence. 
  • Nevertheless, Goldman approved various offerings for securitization without requiring further due diligence to determine whether the remaining loans in the deal contained defects.  A Goldman employee overseeing due diligence for a particular loan pool noted that the pool included loans originated with “[e]xtremely aggressive underwriting” and “large program exceptions made without compensating factors.”  Despite this observation, Goldman did not review the remaining portion of the pool, and subsequently securitized thousands of loans from the pool. 
  • Goldman made statements to investors in offering documents and in certain other marketing materials regarding its process for reviewing and approving originators, yet it failed to disclose  to investors negative information it obtained about mortgage loan originators and its practice of securitizing loans from suspended originators. 
  • Attorney General Schneiderman was elected in 2010 and took office in 2011, when the five largest mortgage servicing banks, 49 state attorneys general, and the federal government were on the verge of agreeing to a settlement that would have released the banks – including Bank of America – from liability for virtually all misconduct related to the financial crisis.
  • Attorney General Schneiderman refused to agree to such sweeping immunity for the banks. As a result, Attorney General Schneiderman secured a settlement that preserved a wide range of claims for further investigation and prosecution.
  •  
    If this doesn't qualify as fraud, nothing does. "We now know more about the $5 billion settlement Goldman Sachs has agreed to pay related to residential mortgage-backed securities it sold between 2005 and 2007. Regulators announced details of the settlement on Monday. Goldman Sachs initially announced the settlement in January. That nearly wiped out fourth-quarter earnings for the firm. "Today's settlement is yet another acknowledgment by one of our leading financial institutions that it did not live up to the representations it made to investors about the products it was selling," said one regulator, U.S. Attorney Benjamin B. Wagner of the Eastern District of California, in a statement. Morgan Stanley announced a similar settlement in February. It agreed to pay $3.2 billion over charges that it misled investors on the quality of mortgage loans it sold. And on Friday, the Justice Department announced that Wells Fargo had agreed to pay $1.2 billion to settle "shoddy" mortgage-lending practices. Here's what we learned about the Goldman settlement on Monday:"
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
Gary Edwards

Oklahoma House Passes Bill to Ban UN Agenda 21 - 0 views

  •  
    The State of Oklahoma looks to be well on its way towards joining Alabama, Kansas, and Tennessee as States passing laws to block any efforts to implement the insidious United Nations socialist initiative known as Agenda 21.   Excerpts: lawmakers on both sides of the aisle in Tennessee adopted a resolution blasting the dubious UN agenda as a radical "socialist" plot at odds with individual liberty, private-property rights, and the U.S. Constitution. Lawmakers in Kansas followed suit. Numerous other state governments, under heavy pressure from activists across the political spectrum, are also working to ban the "sustainable development" scheme in their jurisdictions. City and county governments, meanwhile, are taking action to protect residents, too.  "One of the goals of the United Nations Agenda 21 Initiative is to influence governments," Kern explained. "My constituents are concerned about that influence and about their property rights being infringed upon by government regulations that originated from Agenda 21. My legislation addresses those concerns by protecting individual property rights." "The Oklahoma bill passed by the House last week reads: "The state or any political subdivision of the state shall not adopt or implement policy recommendations that deliberately or inadvertently infringe upon or restrict private property rights without due process, as may be required by policy recommendations originating in, or traceable to United Nations Agenda 21/Sustainable Development." Also prohibited under the measure is state or local government participation in "any other international law or ancillary plan of action that contravenes the Constitution of the United States or the Oklahoma Constitution." The legislation also ensures that state and local governments are barred from working with UN-linked groups promoting the controversial agenda. "Since the United Nations has accredited or enlisted numerous nongovernmental and intergovernmen
Paul Merrell

Putin's decision to send troops to Ukraine, recall ambassador from US depends on develo... - 0 views

  • Putin to decide whether to send troops to Ukraine, recall ambassador from US depending on developments, Vladimir Putin's spokesperson Dmitry Peskov said. Russia’s Federation Council has unanimously approved President Vladimir Putin’s request to use Russian military forces in Ukraine. The move is aimed to settle the turmoil in the split country. President Vladimir Putin has not yet decided whethe to deploy Russian troops in Ukraine, his spokesman was quoted as saying on Saturday after the Federation Council upper house of parliament empowered him to do so.
  • The upper house of the Russian parliament has voted in favor of sending troops to the Autonomous Republic of Crimea, which would ensure peace and order in the region "until the socio-political situation in the country is stabilized." The Russian president will make the final decision on the strength of Russian troops to be used in the Ukraine in accordance with the decision of the Federation Council.The Federation Council’s decision to grant the Russian president the right to use Russian troops in the Crimea does not mean that it will be done in the nearest future, the Russian Foreign Ministry said.
  •  
    I've been following the situation closely in the Ukraine but haven't been posting many bookmarks on the topic. Ukraine was hit by a U.S.-instigated "color" protest, leading to the outster of the Ukainian Prime Minister and capture of the Ukraine government by U.S.-backed neo-Nazi groups.  The U.S. has admittedly spent $5 billion on the effort thus far.  Crimea was originally part of Russia (in fact the portion where ethnic Russians originated) until 1954, when the Ukrainian Nikita Khruschev transferred Crimea to the Ukraine. Crimea is majority ethnic Russian and its economy is hugely dependent on trade with Russia. Crimea is also home to Russia's only naval port accessible from the Mediterranean Sea, Sevastopol, on the Black Sea. As Pepe Escobar observed, a Crimea under the control of NATO is a neocon-wet dream, cutting the naval supply line between Russia and its Navy base in Syria and surrounding Russia on another edge with missile batteries. Russia will not give ground in Crimea. Putin now has the legal authorization from the Russian Parliament to use military force to protect all of the Ukraine, including Crimea, from western encroachment.  He's also been authorized to recall Russia's ambassador from the U.S. Another mess that could lead to war cooked up by neocons in the U.S. State Department and CIA.   The presence of neocons in U.S. government needs to be a major issue in our next Presidential election. But don't hold your breath waiting for that to happen.
Paul Merrell

BDS SOUTH AFRICA: ISRAEL INCHES CLOSER TO 'TIPPING POINT' OF SOUTH AFRICA-STYLE BOYCOTT... - 0 views

  • Analogies with apartheid regime in the wake of Mandela’s death could accelerate efforts to ostracize Israel. This has happened in recent days: The Dutch water company Vitens severed its ties with Israeli counterpart Mekorot; Canada’s largest Protestant church decided to boycott three Israeli companies; the Romanian government refused to send any more construction workers; and American Studies Association academics are voting on a measure to sever links with Israeli universities. Coming so shortly after the Israeli government effectively succumbed to a boycott of settlements in order to be eligible for the EU’s Horizon 2020 scientific cooperation agreement, it is hard to avoid the conclusion that the BDS (Boycott, Divestment and Sanctions) movement is picking up speed. And the writing on the wall, if anyone missed it, only got clearer and sharper in the wake of the death of Nelson Mandela.
  • When the United Nations passed its first non-binding resolution calling for a boycott of South Africa in 1962, it was staunchly opposed by a bloc of Western countries, led by Britain and the United States. But the grassroots campaign that had started with academic boycotts in the late 1950s gradually moved on to sports and entertainment and went on from there to institutional boycotts and divestment. Along the way, the anti-apartheid movement swept up larger and larger swaths of Western public opinion, eventually forcing even the most reluctant of governments, including Israel and the U.S., to join the international sanctions regime. 
  • We’re really great at knowing where thresholds are after we fall off the cliff, but that’s not very helpful,” as lake ecologist and “tipping point” researcher Stephen Carpenter told USA today in 2009.  Israel could very well be approaching such a threshold. Among the many developments that could be creating the required critical mass one can cite the passage of time since the Twin Towers attacks in September 2001, which placed Israel in the same camp as the U.S. and the West in the War on Terror; Israel’s isolation in the campaign against Iran’s nuclear programs; the disappearance of repelling archenemies such as Osama bin Laden, Muammar Gadhafi, Mahmoud Ahmadinejad and, to a lesser degree, Yasser Arafat; the relative security and lack of terror inside Israel coupled with its own persistent settlement drive; and the negative publicity generated by revelations of racism in Israeli society, the image of its rulers as increasingly rigid and right wing and the government’s own confrontations with illegal African immigrants and Israeli Bedouin, widely perceived as being tinged with bias and prejudice.  In recent days, American statesmen seem to be more alarmed about the looming danger of delegitimization than Israelis are. In remarks to both the Saban Forum and the American Joint Distribution Committee this week, Secretary of State John Kerry described delegitimization as “an existential danger." Vice President Joe Biden, speaking to the same JDC forum, went one step further: “The wholesale effort to delegitimize Israel is the most concentrated that I have seen in the 40 years I have served. It is the most serious threat in my view to Israel’s long-term security and viability.” 
  • ...1 more annotation...
  • One must always take into account the possibility of unforeseen developments that will turn things completely around. Barring that, the only thing that may be keeping Israel from crossing the threshold and “going over the cliff” in the international arena is Kerry’s much-maligned peace process, which is holding public opinion and foreign governments at bay and preventing a “tipping point” that would dramatically escalate the anti-Israeli boycott campaign.  Which only strengthens Jeffrey Goldberg’s argument in a Bloomberg article on Wednesday that Kerry is “Israel’s best friend." It also highlights, once again, how narrow-minded, shortsighted and dangerously delusional Kerry’s critics, peace process opponents and settlement champions really are (though you can rest assured that if and when the peace process collapses and Israel is plunged into South African isolation, they will be pointing their fingers in every direction but themselves.
  •  
    Note that this article's original is behind a paywall in Haaretz, one of Israel's market-leading newspapers.  There can be no questioning of the facts that: [i] the Palestinian Boycott, Divesment, and Sanctions ("BDS") movement is rapidly gaining strength globally; and [ii] that factor weighs heavily in the negotiations between Israel and Palestine for a two-state solution. Although not bluntly stated, the BSD movement's path runs directly to a single-state solution that would sweep Israel's present right-wing government from power and result in a secular state rather than a "Jewish state." And the E.U., Israel's largest export market, has promised to go even farther in sanctioning Israel than the considerable distance it has already gone if the negotiations do not result in a two state solution. Labeling all products produced wholly or in part in Israel-occupied Palestine territory is among the mildest of sanctions under discussion, a measure already adopted in two E.U. nations. The BSD Movement's success has also been marked by Israel attaining the pariah state status previously experienced by South Africa. Only the U.S., Canada, and a half-dozen or so tiny island nations closely aligned with the U.S. still vote in favor of Israel at the U.N. For example, the vote on granting Palestine U.N. observer state status was 138-9, with 41 abstentions.  The prospect of an end to the non-secular Jewish state has enormous ramifications for U.S. foreign policy, not the least of which is the influence of the Israel lobby in the U.S. that has thus far led the U.S. to three Treasury-draining wars in Southwest Asia and Northern Africa and host of minor military actions in other area nations, as well as a near-war in Syria, averted mainly via Russian diplomacy that outfoxed Secretary of State John Kerry. Time will tell whether the diplomatic outreach by Iran will succeed in averting war with the greatest military power remaining in the Mideast after Israel itself. "Protectin
Gary Edwards

Whistleblowers & NSA - Shows - Coast to Coast AM - 0 views

  •  
    Interview Date: 07-27-13 :: 3 hours on mp3 Host: John B. Wells Guests: William E. Binney This amazing interview covers 3 hours with William Edward Binney; the former highly placed intelligence official with the United States National Security Agency (NSA) turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency. He joined John B. Wells to discuss living his life as a whistleblower, the NSA scandal and related topics. "The NSA was chartered to do foreign intelligence only, not domestic intelligence," he said. Prior to the Bush Administration, if the NSA happened to randomly intercept a U.S. citizen's communications, the database was purged of the collection and records erased, Binney revealed. After 9/11 and per a "secret interpretation" of the Patriot Act, the NSA decided it could build a register of every phone in the country, he explained, noting that they now keep records on who every U.S. Citizen calls, how often and for how long. A person has the right to free association with others only as long as the NSA knows about it, he admonished. According to Binney, there is substantial danger that data collected from phone and internet communications as well as financial records will be used to target particular Americans, a scenario recently played out when the IRS was caught harassing tea party members, he pointed out. Because the threat is real and the spy organization's reach well beyond its original charter, Binney said he has signed an affidavit for the Electronic Frontier Foundation's lawsuit challenging the NSA's constitutional authority to collect this kind of information. Another peril to U.S. citizens are FISA Courts (Foreign Intelligence Surveillance Court) which can order the transfer of domestic intelligence data but have no way of validating the intelligence being given to them, he continued. Binney called for the defunding of FISA Courts since they, like the NSA, are in violation of their original charter. He
Gary Edwards

The Basic Library - Article V Project To Restore Liberty - 2 views

  •  
    "Free Google Book Search (360 B.C.) The Republic - Plato (46 B.C.) Cicero's Brutus - Cicero   (1517) Discourses on Livy - Machiavelli (1553) The Discourse of Voluntary Servitude - Étienne de La Boétie (1690) Two Treatises of Government - John Locke   (1698) Discourses Concerning Government - Algernon Sydney Sidney's Discourses and Locke's Second Treatise were recommended by Jefferson and Madison as containing the "general principles of liberty and the rights of man, in nature and society" (1748) The Spirit of Laws  - Montesquieu (1748) The Principles of Natural and Politic Law - Burlamaqui   (1755) Old Family Letters - John Adams (1758) The Law of Nations- Vattel   (1764-1769) The Writings of Samuel Adams (1765-1769) Blackstone's Commentaries on the Laws of England (1766) The Declaratory Act (1770) The Writings of John Adams V1-2              The Writings of John Adams V3-4              The Writings of John Adams V5-7              The Writings of John Adams V8-10   (1771-1788) The Autobiography of Benjamin Franklin (1772) The Votes and Proceedings of the Freeholders and other Inhabitants (1774) A Full Vindication of the Measures of Congress - Hamilton (1774) Novanglus - John Adams Principle Controversy between Great Britain and Her Colonies (1776) Common Sense- Thomas Paine One Incident which gave a stimulus to the pamphlet Common Sense was, that it happened to appear on the very day that the King of England's speech reached the United States, in which the Americans were denounced as rebels and traitors, and in which speech it was asserted to be the right of the legislature of England to bind the Colonies in all cases whatsoever. (1776-1783) The Crisis- Thomas Paine (1780) Journal of the Convention for Framing the Massachusetts Bay Constitution (1785) Remarks concerning the Government and Laws of the United States of America: in Four Letters addressed to Mr. Adams (1787) The Anti-Federalist (audio) (1787) The Federalist
Gary Edwards

Who owns the Bank of England? |Dark Politricks - 0 views

  •  
    "Who owns the Bank of England? A brief history of World Banksters By Dark Politricks First a few historical comments by people who helped create two of the worlds most famous central banks, the Bank of England and the Federal Reserve. "I am a most unhappy man. I have unwittingly ruined my country. A great industrial nation is controlled by its system of credit. Our system of credit is concentrated. The growth of the nation, therefore, and all our activities are in the hands of a few men. We have come to be one of the worst ruled, one of the most completely controlled and dominated Governments in the civilized world no longer a Government by free opinion, no longer a Government by conviction and the vote of the majority, but a Government by the opinion and duress of a small group of dominant men." - Woodrow Wilson, after signing the Federal Reserve into existence The Bank of England was created in 1694 by a Scotsman William Paterson who famously said: The bank hath benefit of interest on all moneys which it creates out of nothing. - William Paterson The history of the Bank of England and how it was taken over by one powerful family hundreds of years ago. Up until 1946 when it was nationalised the Bank of England was a private run bank that lent money it created out of nothing to the English government and was paid back with interest. A very famous story relates to the Bank of England and the infamous Rothschilds, that all powerful banking family. This story was re-told recently in a BBC documentary about the creation of money and the Bank of England. It revolves around the Battle of Waterloo in which Nathan Rothschild used his inside knowledge of the outcome and his faster horses and couriers to play the market by getting the result of the battle before anyone else knew the outcome. He quickly sold his English bonds and gave all the traders who looked to him for guidance the impression that the French had won at Waterloo. The other traders all rus
Paul Merrell

Whatever It Takes - Hillary Clinton's Record of Support for War and Other Depravities: ... - 0 views

  • This is a record of Hillary Clinton’s support for war and other depravities.  It contains original work, quotations, and references with citations or links.  When crimes apply to multiple categories, explanations for individual applications are given. In anticipation of the 2016 election, a principle reason for creating this record is to provide a clear illustration of what is put forth as the “left”, supposedly the anti-war option, in US politics, and the consequences this has engendered for the international community thanks to Clinton and people like her.  (This is, of course, not to imply that the "right" is an anti-war option.  This record also documents violent crimes perpetrated by "right wing" officials.)  
Paul Merrell

Emails to Hillary contradict French tale on Libya war - Al-Monitor: the Pulse of the Mi... - 0 views

  • French spies secretly organized and funded the Libyan rebels who defeated Moammar Gadhafi, according to confidential emails to Hillary Clinton that were made public on June 22.
  • “In return for their assistance,” the memo states, “the DGSE officers indicated that they expected the new government of Libya to favor French firms and national interests, particularly regarding the oil industry in Libya.” The email goes on to state that Jalil and Younis “accepted this offer” and “have maintained contact with the DGSE officers in Cairo.” The memo is titled, “How the French created the National Libyan Council, ou l’argent parle.” Another memo dated May 5 asserts that individuals close to the council stated “in strictest confidence” that as early as mid-April 2011 French humanitarian flights also included “executives from the French company TOTAL, the large construction from VINCI and the European Aeronautic Defence and Space Company N.V. (EADS).” Subsequent flights have allegedly carried representatives “from the conglomerate THALYS and other large French firms, all with close ties to [Sarkozy].” “After meeting with the [council] these French business executives leave discreetly by road, via Tobruk to Egypt,” the memo states. “These convoys are organized and protected by para-military officers [from the DGSE].” The memo adds that Levy himself came up with the idea and obtained the council’s signature on an agreement to give French firms “favorable consideration” in business matters. He is said to have used “his status as a journalist to provide cover for his activities.”
  • The memos from Clinton adviser Sidney Blumenthal contradict the popular French narrative about its intervention in Libya, raising fresh questions about a war that toppled a dictator but left chaos and radicalism in his stead. They were allegedly written by retired CIA operative Tyler Drumheller and released by a special congressional panel investigating the 2012 attack on the US mission in Benghazi. The oft-repeated media tale in France holds that then-President Nicolas Sarkozy was outraged by Gadhafi’s crackdown on protesters in February 2011 but had no clear idea who to support. Enter a swash-buckling “intellectual,” Bernard-Henri Levy, who met with Transitional National Council leader Mustafa Abdul Jalil on March 4, immediately called Sarkozy, and had the French president invite Jalil to the Elysee Palace — and recognize the council as the country’s official government by March 10. The emails to Clinton tell a distinctly less heroic story. According to one entry from March 22, 2011, “officers” with the General Directorate for External Security — the French intelligence service — “began a series of secret meetings” with Jalil and Gen. Abdul Fatah Younis in Benghazi in late February and gave them “money and guidance” to set up the council, whose formation was announced Feb. 27. The officers, “speaking under orders from [Sarkozy] promised that as soon as the [council] was organized France would recognize [it] as the new government of Libya.”
  • ...2 more annotations...
  • A later memo, from September 2011, asserts that Sarkozy urged the Libyans to reserve 35% of their oil industry for French firms — Total in particular — when he traveled to Tripoli that month. In the end, however, Italy’s Eni came out ahead with Russian and Chinese firms biding their time, even as the Libyan oil production plummeted because of the civil war. The veracity of the memos’ content is difficult if not impossible to ascertain. While Levy has long been a controversial figure in France, the council was riven by internal rivalries. Younis himself was assassinated in July 2011 — at Jalil’s urging according to an Aug. 8 memo to Clinton. And Drumheller himself has courted controversy for his role in the run-up to the 2003 Iraq war, with liberals celebrating him as a truth-teller and conservatives saying he helped concoct some of the false information he later debunked.
  • French spymasters’ role in Libya has been alluded to before, most notably in the 2012 book “The Truth About our War in Libya” by French historian Jean-Christophe Notin. That book said Henry-Levy’s role in the French decision to go to war had been overblown. “All has not been said about this war, because it has only had one narrator: Bernard-Henri Levy,” Notin told L’Express magazine. “Yes, he was one of the Libyans’ interlocutors. But his telling glosses over not only the coalition’s military exploits, but also the underground work of diplomatic and military officials on the ground, sometimes for quite some time, in Libya.” Other memos released June 22 give credence to the notion that Sarkozy was determined from the start of the uprising to get rid of Gadhafi, despite earlier efforts to court him after he abandoned his weapons program and sought closer ties with the West. A March 20 memo, for instance, states that Sarkozy “plans to have France lead the attacks on [Gadhafi] over an extended period of time” and “sees this situation as an opportunity for France to reassert itself as a military power.”
Paul Merrell

Asia Times Online :: Central Asian News and current affairs, Russia, Afghanistan, Uzbek... - 0 views

  • By Pepe Escobar The North Atlantic Treaty Organization is desperate; it is itching for a war in battlefield Ukraine at any cost.
  • That took some effort as he was presented with the spectacle of Ukrainian President Petro Poroshenko - a certified oligarch dogged by dodgy practices - trying hard to evict the Maidan originals from the square in the center of Kiev; these are the people who late last year started the protests that were later hijacked by the Banderastan (as in Saudi Prince Bandar bin Sultan)/Right Sector neo-Nazis, the US neo-con masters. The original Maidan protests - a sort of Occupy Kiev - were against monstrous corruption and for the end of the perennial Ukrainian oligarch dance. What the protesters got was even more corruption; the usual oligarch dance; a failed state under civil war and avowed ethnic cleansing of at least 8 million citizens; and on top of it a failed state on its way to further impoverishment under International Monetary Fund "structural adjustment". No wonder they won't leave Maidan. So Maidan - the remix - has already started even before the arrival of General Winter. Chocolate King Poroshenko must evict them as fast as he can because renewed Kiev protests simply don't fit the hysterical Western corporate media narrative that "it's all Putin's fault". Most of all, corruption is even nastier than before - now with plenty of neo-Nazi overtones.
  •  
    Pepe Escobar's take on NATO's thirst for war against Russia in the Ukraine. He adds the highlighted bit about the original Maidan protesters now back again protesting against the U.S. backed coup government. 
Paul Merrell

What is Khamenei thinking on removing sanctions? - Al-Monitor: the Pulse of the Middle ... - 0 views

  • The issue of removing international sanctions on Iran is one of the most important aspects of the nuclear negotiations between Iran and the five permanent members of the UN Security Council plus Germany (P5+1). While the nuclear talks are confidential, there have been conflicting reports about how the sanctions can and should be removed in return for Iran reducing their nuclear program. During his March 21 Iranian New Year's speech, Ayatollah Ali Khamenei, the supreme leader who has final say on the nuclear program, discussed his positions on the nuclear talks and sanctions removal.
  • “What the Americans repeat, ‘We’ll sign the contract with Iran, then we’ll see if they act upon the contract, then we’ll remove the sanctions’ — this is wrong and unacceptable," Khamenei said. "The removal of sanctions is part of the negotiations, not the result of negotiations. Those people involved [in the talks] know well the difference between the two. “The removal of sanctions should happen without any distance [delays] when an agreement is made.” Sa’adollah Zaeri, an Iranian analyst whose work is published on the supreme leader’s website and in the hard-line Kayhan newspaper, spoke to Tasnim News Agency about the issue. “One of the important statements of the supreme leader is that the removal of the sanctions be in the text of the negotiations.” Zaeri said, “However, the last few months, the West tried with cleverness to avoid its commitments and introduce the sanctions as an issue of time and connected to Iran’s commitments.” Zaeri said that the West tried to make sanction removal a “marginal issue” and that they had proposed “Iran reduce the nuclear program for 10 years and afterward if the West gives Iran a passing grade, then the sanctions will be removed.” There have also been reports that there could be a multistep removal of sanctions, which Khamenei has rejected in the past. Given that there are numerous UN, US and European Union sanctions against Iran, the nuclear negotiators have to at least to include specific language on the removal of sanctions in a final nuclear agreement.
  • During his Nowruz speech, Khamenei also rejected the possibility of cooperation between Iran and the United States in the Middle East. The idea that both countries have a common interest in fighting the terrorist group the Islamic State and can cooperate on this issues has been floated by some in Washington and even by members of President Hassan Rouhani’s administration. On this, Khamenei said: “The negotiations with America are about the nuclear program and nothing else, everyone should know this. We will not negotiate with America over regional matters. The goals of the Americans on regional matters are exactly the opposite of our goals. We want security and calm in the region … the policy of the US in the region creates instability. “We definitely do not speak or negotiate with the Americans on regional, domestic or weapons matters. The negotiations are merely on nuclear matters and how we can reach a conclusion on the nuclear negotiations through diplomacy.” 
Joe La Fleur

An Original Western Journalism Production: - 1 views

  •  
    BIG BIG GOVERNMENT
Gary Edwards

The Constitution, Vattel, and "Natural Born Citizen": What Our Framers Knew - 1 views

  •  
    Publius Huldah walks us through the original intent and meaning of the Constitution. She describes how the founding fathers relied on Emer Vattel's classic "Law of Nations" to define their words and concepts. Her arguments are so well researched as to be the final word on the subject of our Constitution, and the "natural born citizen" requirement. Awesome, tour-de-force sledge hammer of an argument. Need more stuff from Publius. she rocks.
Paul Merrell

Inside TAO: The NSA's Shadow Network - SPIEGEL ONLINE - 0 views

  • The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of "covert" routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with "implants" that then allow the government hackers to control the computers remotely. (Click here to read a related article on the NSA's "implants".) In this way, the intelligence service seeks to identify and track its targets based on their digital footprints. These identifiers could include certain email addresses or website cookies set on a person's computer. Of course, a cookie doesn't automatically identify a person, but it can if it includes additional information like an email address. In that case, a cookie becomes something like the web equivalent of a fingerprint.
  • Once TAO teams have gathered sufficient data on their targets' habits, they can shift into attack mode, programming the QUANTUM systems to perform this work in a largely automated way. If a data packet featuring the email address or cookie of a target passes through a cable or router monitored by the NSA, the system sounds the alarm. It determines what website the target person is trying to access and then activates one of the intelligence service's covert servers, known by the codename FOXACID. This NSA server coerces the user into connecting to NSA covert systems rather than the intended sites. In the case of Belgacom engineers, instead of reaching the LinkedIn page they were actually trying to visit, they were also directed to FOXACID servers housed on NSA networks. Undetected by the user, the manipulated page transferred malware already custom tailored to match security holes on the target person's computer. The technique can literally be a race between servers, one that is described in internal intelligence agency jargon with phrases like: "Wait for client to initiate new connection," "Shoot!" and "Hope to beat server-to-client response." Like any competition, at times the covert network's surveillance tools are "too slow to win the race." Often enough, though, they are effective. Implants with QUANTUMINSERT, especially when used in conjunction with LinkedIn, now have a success rate of over 50 percent, according to one internal document.
  • At the same time, it is in no way true to say that the NSA has its sights set exclusively on select individuals. Of even greater interest are entire networks and network providers, such as the fiber optic cables that direct a large share of global Internet traffic along the world's ocean floors. One document labeled "top secret" and "not for foreigners" describes the NSA's success in spying on the "SEA-ME-WE-4" cable system. This massive underwater cable bundle connects Europe with North Africa and the Gulf states and then continues on through Pakistan and India, all the way to Malaysia and Thailand. The cable system originates in southern France, near Marseille. Among the companies that hold ownership stakes in it are France Telecom, now known as Orange and still partly government-owned, and Telecom Italia Sparkle. The document proudly announces that, on Feb. 13, 2013, TAO "successfully collected network management information for the SEA-Me-We Undersea Cable Systems (SMW-4)." With the help of a "website masquerade operation," the agency was able to "gain access to the consortium's management website and collected Layer 2 network information that shows the circuit mapping for significant portions of the network."
  • ...3 more annotations...
  • It appears the government hackers succeeded here once again using the QUANTUMINSERT method. The document states that the TAO team hacked an internal website of the operator consortium and copied documents stored there pertaining to technical infrastructure. But that was only the first step. "More operations are planned in the future to collect more information about this and other cable systems," it continues. But numerous internal announcements of successful attacks like the one against the undersea cable operator aren't the exclusive factors that make TAO stand out at the NSA. In contrast to most NSA operations, TAO's ventures often require physical access to their targets. After all, you might have to directly access a mobile network transmission station before you can begin tapping the digital information it provides.
  • To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour's work.
  • Sometimes it appears that the world's most modern spies are just as reliant on conventional methods of reconnaissance as their predecessors. Take, for example, when they intercept shipping deliveries. If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer. These minor disruptions in the parcel shipping business rank among the "most productive operations" conducted by the NSA hackers, one top secret document relates in enthusiastic terms. This method, the presentation continues, allows TAO to obtain access to networks "around the world."
  •  
    From page 3 of a 3-page article. The entire article is well worth reading. I chose this page to bookmark because of its disclosure that NSA is intercepting new computers before they are delivered and installing hardware and software backdoors, then reshipping them to their intended recipients. Although not mentioned, this implies the complicity of package shipment companies and conceivably government mail systems and original equipment manufacturers ("OEMs").  
Gary Edwards

GOP immigration plan devised by Communist Party - 0 views

  • Republican support
  • But why would Republicans get behind such a plan? Some astute political observers advise that when politicians appear to be promoting agendas against their own interest, follow the money.
  • t’s no surprise that the Republicans supporting this thing are the ones with ties to the Chamber of Commerce, not ordinary voters.”
  • ...8 more annotations...
  • But even if big business benefits, the cheap labor advantages are only temporary. Once illegal aliens are fully legalized, businesses will be required to provide just as much in pay and benefits as they pay American workers.
  • In the meantime, however, it is widely assumed those workers will take jobs from American citizens, depress wages and increase unemployment. Moreover, in many key swing states, projected amnesties will swamp the rolls of the unemployed (see table)
  • So, illegal aliens would be granted legal status immediately, but five years down the road, if the fence still isn’t built and e-verify still isn’t being used, then their legal status would be revoked. Given that the Department of Homeland Security is already allegedly ignoring border security –with immigration and customs agents suing their own agency for failing to enforce the law – many voters place little confidence in political promises of future enforcement.
  • In the meantime, Senate and House opponents have been painstakingly highlighting what they consider to be glaring flaws in these proposals: Every single border security provision in the Senate bill, including the hire of 20,000 Border Patrol agents, denying amnesty to criminals, building fences and installing surveillance devices, can be waived by the Homeland Security secretary. Both the House and Senate proposals emphasize the path to citizenship – the centerpiece of communist efforts – while making border security both vague and secondary. Both bills provide a $5,000 incentive for companies to hire the newly legalized illegal aliens instead of Americans, since the aliens would not be subject to the Obamacare coverage mandate.
  • Although politicians and the media have settled on the claim that there are 11 million illegal aliens, the actual number may well be closer to 20 million to 30 million. There were 10 million in 1996, a mere 10 years after Reagan’s amnesty, and it is doubtful only one million more have been added in the ensuing 17 years. Since 1990, Border agents have apprehended on average more than 1 million illegal aliens per year, almost all from Mexico.
  • When the Reagan amnesty became law, the intention was to naturalize only 1.2 million people, but the actual figure turned out to be 2.7 million. Statistics on illegal immigration have longed tended to be underestimated, sometimes vastly so.
  • Thus, current proposals provide a path to citizenship for as many as 20 to 30 million illegal aliens here now, plus relatives who will be brought in through chain migration and at least 75 percent of those who will come in the future – virtually endless amnesty – while efforts to secure the border are almost certain to be insufficient.
  • With polls showing more than two-thirds of Americans don’t believe “immigration laws would be enforced in the future if illegal aliens were given amnesty,” it is clear that passage of the current Republican-backed bill may indeed fulfill the agenda of its communist originators – the creation of a permanent Democrat voting majority, guaranteeing permanent control of the United States government by leftist progressives.
  •  
    Wow.  Documentation up the ying yang .......... "The U.S. Senate's "Gang of Eight" immigration-reform plan, as well as a strikingly similar plan now being backed by Rep. Paul Ryan, R-Wis., and a bi-partisan House "Gang," both offer the "roadmap to citizenship" originally conceived and carefully developed by members of the Communist Party USA working within the Democratic Party and the radical left activist network for the purpose of using amnestied illegals to build a "permanent progressive majority." That is the inescapable conclusion readers will draw after reading the forthcoming book by acclaimed researcher and blogger Trevor Loudon, titled "The Enemies Within: Communists, Socialists and Progressives in the U.S. Congress." Although not yet published, Loudon agreed to allow WND readers to preview one chapter, titled "Latino Immigrants: Tools to Ensure a 'Governing Coalition' for the Left." Ads by Google Marriage Visa Lawyer $195 Get Your Fiance/Spouse to the USA. Free Consultation. (888) 902-9285 EasyFianceVisa.com/SpousalVisa Canadian Rockies By Train Experience the Rockies By Train. Luxury Mountain Travel By Rail TravelAlberta.us/Train In the book, Loudon exhaustively documents the Left's longtime agenda regarding illegal aliens and how its activists have gone about implementing it. He provides irrefutable proof that the entire immigration-reform movement was the brainchild of American communists and that their goal has long been to establish unchallengeable political supremacy. According to Loudon, the Communist Party USA has influenced U.S. policy toward illegals since at least the 1960s. He traces the history, showing how communists and communist-founded organizations slowly built the movement from the ground up. While other groups certainly joined the effort, the communists were always at the center. For example, he tells the story of CPUSA member Bert Corona, the "Communist Father of the 'Immigrants Rights' move
Paul Merrell

US drug agency gets intel from NSA, then lies about its origins to build cases | Ars Te... - 0 views

  • On Monday, Reuters reported on previously undisclosed documents showing that a secret Drug Enforcement Administration (DEA) unit uses information collected by intelligence agencies—including the National Security Agency (NSA)—to build evidence for criminal cases. The true origin of this information is usually concealed from defense lawyers—and sometimes even prosecutors and judges—to seemingly do an end-run around the normal court procedures for a criminal defendant’s right to discovery.
  • “There’s nothing that allows lying to judges about the source of information in a criminal case,” Jennifer Granick, an attorney and the director of Civil Liberties at Stanford University’s Center for Internet and Society, told Ars. Similarly, others have already started to speak out against the practice. The American Civil Liberties Union (ACLU) issued a statement. "When law enforcement agents and prosecutors conceal the role of intelligence surveillance in criminal investigations, they violate the constitutional rights of the accused and insulate controversial intelligence programs from judicial review," wrote ACLU Deputy Legal Director Jameel Jaffer. "Effectively, these intelligence programs are placed beyond the reach of the Constitution, where they develop and expand without any court ever weighing in on their lawfulness. This is inappropriate, dangerous, and contrary to the rule of law."
Paul Merrell

IPS - Lavrov Reveals Amended Draft Circulated at "Last Moment" | Inter Press Service - 0 views

  • Nov 15 2013 (IPS) - Russian Foreign Minister Sergey Lavrov revealed a crucial detail Thursday about last week’s nuclear talks with Iran in Geneva that explains much more clearly than previous reports why the meeting broke up without agreement. Lavrov said the United States circulated a draft that had been amended in response to French demands to other members of the six-power P5+1 for approval “literally at the last moment, when we were about to leave Geneva.” Lavrov’s revelation, which has thus far been ignored by major news outlets, came in a news conference in Cairo Thursday that was largely devoted to Egypt and Syria. Lavrov provided the first real details about the circumstances under which Iran left Geneva without agreeing to the draft presented by the P5+1.
  • The full quote from Lavrov’s press conference is available thanks to the report from Voice of Russia correspondent Ksenya Melnikova. Lavrov noted that unlike previous meetings involving the P5+1 and Iran, “This time, the P5+1 group did not formulate any joint document.” Instead, he said, “There was an American-proposed draft, which eventually received Iran’s consent.” Lavrov thus confirmed the fact that the United States and Iran had reached informal agreement on a negotiating text. He further confirmed that Russia had been consulted, along with the four other powers in the negotiations with Iran (China, France, Germany and the UK), about that draft earlier in the talks –- apparently Thursday night, from other published information. “We vigorously supported this draft,” Lavrov said. “If this document had been supported by all [members of the P5+1], it would have already been adopted. We would probably already be in the initial stages of implementing the agreements that were offered by it.”
  • Then Lavrov revealed for the first time that the U.S. delegation had made changes in the negotiating text that had already been worked out with Iran at the insistence of France without having consulted Russia. “But amendments to [the negotiating draft] suddenly surfaced,” Lavrov said. “We did not see them. And the amended version was circulated literally at the last moment, when we were about to leave Geneva.” Lavrov implies that the Russian delegation, forced to make a quick up or down decision on the amended draft, did not realise the degree to which it was likely to cause the talks to fail. “At first sight, the Russian delegation did not notice any significant problems in the proposed amendments,” Lavrov said. He made it clear, however, that he now considers the U.S. maneuvre in getting the six powers on board a draft that had been amended with tougher language – even if softened by U.S. drafters — without any prior consultation with Iran to have been a diplomatic blunder.
  • ...3 more annotations...
  • “[N]aturally, the language of these ideas should be acceptable for all the participants in this process – both the P5+1 group and Iran,” Lavrov said. The crucial details provided by Lavrov on the timing of the amended draft shed new light on Secretary of State John Kerry’s claim in a press conference in Abu Dhabi on Monday of unity among the six powers on the that draft. “We were unified on Saturday when we presented a proposal to the Iranians.” Kerry said, adding that “everybody agreed it was a fair proposal.” Kerry gave no indication of when on Saturday that proposal had been approved by the other five powers, nor did he acknowledge explicitly that it was a draft that departed from the earlier draft agreed upon with Iran. Lavrov’s remarks make it clear that the other members of the group had little or no time to study or discuss the changes before deciding whether to go along with it.
  • Although the nature of the changes in the amended draft remain a secret, Iranian Foreign Minister Mohammad Javad Zarif has charged that they were quite far-reaching and that they affected far more of the draft agreement that had been worked out between the United States and Iran than had been acknowledged by any of the participants. In tweets on Tuesday, Zarif, responding to Kerry’s remarks in Abu Dhabi, wrote, “Mr. Secretary, was it Iran that gutted over half of US draft Thursday night?” Zarif’s comments indicated that changes of wording had nullified the previous understanding that had been reached between the United States and Iran on multiple issues.
  • Zarif’s tweet, combined with remarks by President Hassan Rouhani to the national assembly Sunday warning that Iran’s rights to enrichment are “red lines” that could not be crossed, suggests further that the language of the original draft agreement dealing with the “end game” of the negotiating process was also changed on Saturday. Kerry himself alluded to the issue in his remarks in Abu Dhabi, using the curious formulation that no nation has an “existing right to enrich.” One of the language changes in the agreement evidently related to that issue, and it was aimed at satisfying a demand of Israeli origin at the expense of Iran’s support for the draft. Now the Obama administration will face a decision whether to press Iran to go along with those changes or to go back to the original compromise when political directors of the six powers and Iran reconvene Nov. 20. That choice will provide the key indicator of how strongly committed Obama is to reaching an agreement with Iran.
  •  
    The article adds more detail than quoted. The picture that emerges is that John Kerry and French foreign minister Laurent Fabius carried water for the Israelis and Saudis to blow up the negotiation at the last moment, after all sides had preliminarily agreed to a text, by substituting a new and very substantially different text without consulting the other P-5+1 members or Iran. That is a down and dirty negotiation tactic; no wonder the negotiation failed. It should be kept in mind that the Israeli and Saudi governments' real goal is not halting Iran's development of a nuclear industry but is instead to persuade or trick the U.S. into bombing Iran back into the Stone Age, as the U.S. did to Iraq in the early 1990s under Emperor Bush 1 with a repeat performance by Emperor Bush II a decade later.  As to Kerry's preposterous claim that no nation has a right to enrich uranium, in reality every nation has that right jus cogens, with the only limitations being on nations that are members of the Non-Proliferation Treaty, which nations still retain the right to enrich up to 20 percent as Iran has been doing. Claims to the contrary are either misinformed or mere false propaganda. See http://armscontrollaw.com/2013/11/07/scope-meaning-and-juridical-implication-of-the-npt-article-iv1-inalienable-right/
1 - 20 of 397 Next › Last »
Showing 20 items per page