Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged patriotism

Rss Feed Group items tagged

Paul Merrell

Information Warfare: Automated Propaganda and Social Media Bots | Global Research - 0 views

  • NATO has announced that it is launching an “information war” against Russia. The UK publicly announced a battalion of keyboard warriors to spread disinformation. It’s well-documented that the West has long used false propaganda to sway public opinion. Western military and intelligence services manipulate social media to counter criticism of Western policies. Such manipulation includes flooding social media with comments supporting the government and large corporations, using armies of sock puppets, i.e. fake social media identities. See this, this, this, this and this. In 2013, the American Congress repealed the formal ban against the deployment of propaganda against U.S. citizens living on American soil. So there’s even less to constrain propaganda than before.
  • Information warfare for propaganda purposes also includes: The Pentagon, Federal Reserve and other government entities using software to track discussion of political issues … to try to nip dissent in the bud before it goes viral “Controlling, infiltrating, manipulating and warping” online discourse Use of artificial intelligence programs to try to predict how people will react to propaganda
  • Some of the propaganda is spread by software programs. We pointed out 6 years ago that people were writing scripts to censor hard-hitting information from social media. One of America’s top cyber-propagandists – former high-level military information officer Joel Harding – wrote in December: I was in a discussion today about information being used in social media as a possible weapon.  The people I was talking with have a tool which scrapes social media sites, gauges their sentiment and gives the user the opportunity to automatically generate a persuasive response. Their tool is called a “Social Networking Influence Engine”. *** The implications seem to be profound for the information environment. *** The people who own this tool are in the civilian world and don’t even remotely touch the defense sector, so getting approval from the US Department of State might not even occur to them.
  • ...2 more annotations...
  • How Can This Real? Gizmodo reported in 2010: Software developer Nigel Leck got tired rehashing the same 140-character arguments against climate change deniers, so he programmed a bot that does the work for him. With citations! Leck’s bot, @AI_AGW, doesn’t just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source. As can be the case with these sorts of things, many of the deniers don’t know they’ve been targeted by a robot and engage AI_AGW in debate. The bot will continue to fire back canned responses that best fit the interlocutor’s line of debate—Leck says this goes on for days, in some cases—and the bot’s been outfitted with a number of responses on the topic of religion, where the arguments unsurprisingly often end up. Technology has come a long way in the past 5 years. So if a lone programmer could do this 5 years ago, imagine what he could do now. And the big players have a lot more resources at their disposal than a lone climate activist/software developer does.  For example, a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (and see this).  So if the lone programmer is doing it, it’s not unreasonable to assume that the big boys are widely doing it.
  • How Effective Are Automated Comments? Unfortunately, this is more effective than you might assume … Specifically, scientists have shown that name-calling and swearing breaks down people’s ability to think rationally … and intentionally sowing discord and posting junk comments to push down insightful comments  are common propaganda techniques. Indeed, an automated program need not even be that sophisticated … it can copy a couple of words from the main post or a comment, and then spew back one or more radioactive labels such as “terrorist”, “commie”, “Russia-lover”, “wimp”, “fascist”, “loser”, “traitor”, “conspiratard”, etc. Given that Harding and his compadres consider anyone who questions any U.S. policies as an enemy of the state  – as does the Obama administration (and see this) – many honest, patriotic writers and commenters may be targeted for automated propaganda comments.
Paul Merrell

Turkey to be offered €3bn to help curb influx of refugees to EU - RT News - 0 views

  • German Chancellor Angela Merkel and other EU leaders want to clinch a €3-billion deal with Ankara to curb the influx of asylum seekers coming to Europe from Africa and the Mideast. The EU wants Turkey to beef up its border patrols with Greece in return. The EU leaders have agreed to invite Turkish President Recep Tayyip Erdoğan to a special summit in Brussels to speed up an agreement that would see Turkey patrolling the EU’s southern border with Greece in an attempt to halt the flow of refugees.
  • The executive European Commission proposed to EU leaders, meeting in the Maltese capital of Valletta, that Ankara be offered a "refugee grant facility," worth up to €3 billion, to help Turkey accommodate over two million Syrians, Reuters reported. More than 650,000 of the 800,000 refugees who have reached EU countries by sea this year have left from Turkey, according to AFP.In return for its help, Ankara wants the EU to provide visa-free travel for Turkish nationals, and a resumption of negotiations on Turkey's long-stalled application to join the 28-nation bloc, AFP reported.
  • Of the €3 billion ($3.2bn), 500 million would come from the EU budget and the rest, under the Commission proposal, from the 28 member states according to their national incomes.No EU country has yet committed to paying its share of the €3-billion bill, except Britain, according to the Guardian. While in Valletta, Prime Minister David Cameron offered €400 million for the Turkey plan.The current refugee crisis, dubbed the worst since WWII, has already proved to be a real challenge for Europe. Germany (population 80 million) may receive 1.5 million asylum seekers this year alone. It has already accepted more asylum applications than any other European nation, with a number of critics pointing to a high number of uneducated and illiterate people coming to the country.
  • ...2 more annotations...
  • There has been a spike in hate crimes against refugees, with much far-right anger and criticism directed at Chancellor Angela Merkel’s decision to suspend the Dublin Regulation, which stipulates that migrants and refugees can only claim asylum at a German port of entry.
  • The migration crisis has given fresh impetus to the PEGIDA movement (Patriotic Europeans Against the Islamization of the Occident), whose activists staged a number of demos across Germany last month.Some EU member countries are introducing temporary border controls to halt the influx of refugees and to screen those trying to enter the country illegally.
Gary Edwards

There Are No Coincidences - 3 views

This commentary is currently making the rounds of the Bay Area Patriots circles: ITS ALL TRUE :: Any one of these 'coincidences' when taken singularly appear to not mean much, but when taken as a ...

Obama-coincidences Marxism Marxist-Muslim

started by Gary Edwards on 02 Jul 13 no follow-up yet
Gary Edwards

Will you choose liberty, or just a new boss? - Tea Party Command Center - 0 views

  • Let’s get our terms right first. “The establishment” is the network of special interests—politicians, crony capitalists, lobbyists and career bureaucrats—who feed at the public trough at the expense of the common good. Members of the establishment don’t like rocking the boat, because they have worked so hard to ensure that they are always the ones riding high and dry. “The establishment” is neither Democratic nor Republican, nor is it “liberal” or “conservative.” It’s not even “the rich” versus “the poor.” It is simply the cancer that can consume great nations when government gets too big, too involved, and too powerful.
  • Too much concentrated power in Washington always accrues to the benefit of the establishment, because they will always get to the table first.
  • Compromise is the currency, because that’s how everyone gets paid. Everyone wants something from someone. Everyone is looking for a play, wanting to cut a better deal.
  • ...1 more annotation...
  • The real alternative to the tyranny of the D.C. establishment has always been more liberty, not a better, more benevolent despot. America’s genius comes from each of us, working together in voluntary cooperation to solve problems, from the bottom, up. We need a leader who gets it. Someone who respects our Constitution’s essential role in limiting power. Someone who wants to rein in intrusive government, and all of the inside dealers who feed off of it. A president can never give you liberty, but we should all insist on one who respects it.
  •  
    "Socialist Bernie Sanders is beating Hillary Clinton over the head with his figurative Birkenstocks, and The Donald is plowing through the Republican presidential field like a giant, perfectly coiffed, Stay Puft Marshmallow Man. The establishment is freaking out, and it's about damn time. Their collective panic suggests that entrenched interests finally understand that their world is threatened; that the rules have changed, that insider power is waning, that we are onto their game. We now know what the establishment has been up to behind the cloistered marble walls of our government, and we are royally pissed. This is an opportunity of a lifetime, if we get it right. But you have to choose. Will you choose liberty, or just a new boss? Let's get our terms right first. "The establishment" is the network of special interests-politicians, crony capitalists, lobbyists and career bureaucrats-who feed at the public trough at the expense of the common good. Members of the establishment don't like rocking the boat, because they have worked so hard to ensure that they are always the ones riding high and dry. "The establishment" is neither Democratic nor Republican, nor is it "liberal" or "conservative." It's not even "the rich" versus "the poor." It is simply the cancer that can consume great nations when government gets too big, too involved, and too powerful. "Are you willing to hold your nose this time, cut the best deal you think you can, simply because you want to beat the establishment?" "The establishment" is the fortress of political inertia that makes it so difficult to reform Washington, or to stop "them" from spending money we don't have. They are just insiders with a seat at the table redirecting taxpayer resources to their benefit, and always resisting reformers and "outsiders" who might upset their apple cart."
Paul Merrell

U.S. government reveals breadth of requests for Internet records | Reuters - 0 views

  • The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows.The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval.The filing made public Monday was the result of an 11-year-old legal battle waged by Nicholas Merrill, founder of Calyx Internet Access, a hosted service provider, who refused to comply with a national security letter (NSL) he received in 2004. Merrill told Reuters the release was significant “because the public deserves to know how the government is gathering information without warrants on Americans who are not even suspected of a crime.”
  • National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data.A federal court ruled earlier this year that the gag on Merrill’s NSL should be lifted. Merrill's challenge also disclosed that the FBI may use NSLs to gain IP addresses on everyone a suspect has corresponded with and cell-site location information. The FBI said in the court filings it no longer used NSLs for location information. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight or transparency.
  • Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests, or between 1,000 and 1,999. Twitter (TWTR.N) has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year, though the agency says it is unaware of the precise number. At one point that number eclipsed 50,000 letters annually. The FBI did not respond to a request for comment Monday.
Paul Merrell

Bulk Collection Under Section 215 Has Ended… What's Next? | Just Security - 0 views

  • The first (and thus far only) roll-back of post-9/11 surveillance authorities was implemented over the weekend: The National Security Agency shuttered its program for collecting and holding the metadata of Americans’ phone calls under Section 215 of the Patriot Act. While bulk collection under Section 215 has ended, the government can obtain access to this information under the procedures specified in the USA Freedom Act. Indeed, some experts have argued that the Agency likely has access to more metadata because its earlier dragnet didn’t cover cell phones or Internet calling. In addition, the metadata of calls made by an individual in the United States to someone overseas and vice versa can still be collected in bulk — this takes place abroad under Executive Order 12333. No doubt the NSA wishes that this was the end of the surveillance reform story and the Paris attacks initially gave them an opening. John Brennan, the Director of the CIA, implied that the attacks were somehow related to “hand wringing” about spying and Sen. Tom Cotton (R-Ark.) introduced a bill to delay the shut down of the 215 program. Opponents of encryption were quick to say: “I told you so.”
  • But the facts that have emerged thus far tell a different story. It appears that much of the planning took place IRL (that’s “in real life” for those of you who don’t have teenagers). The attackers, several of whom were on law enforcement’s radar, communicated openly over the Internet. If France ever has a 9/11 Commission-type inquiry, it could well conclude that the Paris attacks were a failure of the intelligence agencies rather than a failure of intelligence authorities. Despite the passage of the USA Freedom Act, US surveillance authorities have remained largely intact. Section 702 of the FISA Amendments Act — which is the basis of programs like PRISM and the NSA’s Upstream collection of information from Internet cables — sunsets in the summer of 2017. While it’s difficult to predict the political environment that far out, meaningful reform of Section 702 faces significant obstacles. Unlike the Section 215 program, which was clearly aimed at Americans, Section 702 is supposedly targeted at foreigners and only picks up information about Americans “incidentally.” The NSA has refused to provide an estimate of how many Americans’ information it collects under Section 702, despite repeated requests from lawmakers and most recently a large cohort of advocates. The Section 215 program was held illegal by two federal courts (here and here), but civil attempts to challenge Section 702 have run into standing barriers. Finally, while two review panels concluded that the Section 215 program provided little counterterrorism benefit (here and here), they found that the Section 702 program had been useful.
  • There is, nonetheless, some pressure to narrow the reach of Section 702. The recent decision by the European Court of Justice in the safe harbor case suggests that data flows between Europe and the US may be restricted unless the PRISM program is modified to protect the information of Europeans (see here, here, and here for discussion of the decision and reform options). Pressure from Internet companies whose business is suffering — estimates run to the tune of $35 to 180 billion — as a result of disclosures about NSA spying may also nudge lawmakers towards reform. One of the courts currently considering criminal cases which rely on evidence derived from Section 702 surveillance may hold the program unconstitutional either on the basis of the Fourth Amendment or Article III for the reasons set out in this Brennan Center report. A federal district court in Colorado recently rejected such a challenge, although as explained in Steve’s post, the decision did not seriously explore the issues. Further litigation in the European courts too could have an impact on the debate.
  • ...2 more annotations...
  • The US intelligence community’s broadest surveillance authorities are enshrined in Executive Order 12333, which primarily covers the interception of electronic communications overseas. The Order authorizes the collection, retention, and dissemination of “foreign intelligence” information, which includes information “relating to the capabilities, intentions or activities of foreign powers, organizations or persons.” In other words, so long as they are operating outside the US, intelligence agencies are authorized to collect information about any foreign person — and, of course, any Americans with whom they communicate. The NSA has conceded that EO 12333 is the basis of most of its surveillance. While public information about these programs is limited, a few highlights give a sense of the breadth of EO 12333 operations: The NSA gathers information about every cell phone call made to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan, and possibly other countries. A joint US-UK program tapped into the cables connecting internal Yahoo and Google networks to gather e-mail address books and contact lists from their customers. Another US-UK collaboration collected images from video chats among Yahoo users and possibly other webcam services. The NSA collects both the content and metadata of hundreds of millions of text messages from around the world. By tapping into the cables that connect global networks, the NSA has created a database of the location of hundreds of millions of mobile phones outside the US.
  • Given its scope, EO 12333 is clearly critical to those seeking serious surveillance reform. The path to reform is, however, less clear. There is no sunset provision that requires action by Congress and creates an opportunity for exposing privacy risks. Even in the unlikely event that Congress was inclined to intervene, it would have to address questions about the extent of its constitutional authority to regulate overseas surveillance. To the best of my knowledge, there is no litigation challenging EO 12333 and the government doesn’t give notice to criminal defendants when it uses evidence derived from surveillance under the order, so the likelihood of a court ruling is slim. The Privacy and Civil Liberties Oversight Board is currently reviewing two programs under EO 12333, but it is anticipated that much of its report will be classified (although it has promised a less detailed unclassified version as well). While the short-term outlook for additional surveillance reform is challenging, from a longer-term perspective, the distinctions that our law makes between Americans and non-Americans and between domestic and foreign collection cannot stand indefinitely. If the Fourth Amendment is to meaningfully protect Americans’ privacy, the courts and Congress must come to grips with this reality.
Paul Merrell

Turkish MP faces treason charges after telling RT ISIS used Turkey for transiting sarin... - 0 views

  • A treason investigation has been launched against a Turkish MP who alleged in an exclusive interview with RT that Islamic State jihadists delivered deadly sarin gas to Syria through Turkey. Ankara’s Chief Prosecutor's Office opened the case against Istanbul MP Eren Erdem of Republican People's Party (CHP) after his interview about sarin was aired on RT on Monday. "Chemical weapon materials were brought to Turkey and put together in ISIS camps in Syria, which was known as the Iraqi Al-Qaeda at that time." 
  • Erdem noted that the chemicals used for the production of weapons did not originate from Turkey. “All basic materials are purchased from Europe. Western institutions should question themselves about these relations. Western sources know very well who carried out the sarin gas attack in Syria,” Erdem told RT.
  • As Turkish media reported Wednesday, the prosecutor’s office is planning to send a summary of proceedings to the Ministry of Justice on Thursday. Following that, the summary may be forwarded to the Turkish parliament, which could vote to strip Erdem of his parliamentary immunity.Once Turkish mass-media reported the criminal investigation had been opened against Erdem, the hashtags #ErenErdemYalnızDeğildir - #ErenErdemYouAreNotAlone began to circulate in Turkish social networks.On Tuesday, MP Erdem issued a written statement in his defense, saying he had become the target of a smear campaign because of his statements made in parliament.He claimed he had received death threats over social media following the publication of his interview with RT, revealing the Turkish paramilitary organization Ottoman Hearths had published his home address on Twitter to enable an attack on his house.“I am being targeted with death threats because I am patriotically opposed to something that tramples on my country's prestige,” said the MP.As for his accusations about Turkish businessmen being involved in supplying Islamic State (IS, formerly ISIS/ISIL) with the poisonous gas sarin and other reactants needed for chemical warfare, Erdem maintained this statement was made based on the results of a Turkish court investigation in 2013.Erdem revealed that five Turkish citizens had been arrested by the Adana Chief Prosecutor's Office as a result of an investigation coded 2013/139. A Syrian national was prosecuted in Turkey for procuring chemical agents for Islamist groups in Syria. At the same time, Erdem noted all the persons arrested within the framework of the 2013/139 investigation were released a week later.
Paul Merrell

M of A - Russia "Violated" Turkish Airspace Because Turkey "Moved" Its Border - 0 views

  • Russian planes in Syria "violated Turkish air space" the news agency currently tell us. But an earlier report shows that this claim may well be wrong and that the U.S. pushes Turkey to release such propaganda. Reuters (Mon Oct 5, 2015 7:54am BST): Turkey says Russian warplane violated its airspace A Russian warplane violated Turkish airspace near the Syrian border on Saturday, prompting the Air Force to scramble two F-16 jets to intercept it, the Foreign Ministry said on Monday. The Foreign Ministry summoned Moscow's ambassador to protest the violation, according to an e-mailed statement. Turkey urged Russia to avoid repeating such a violation, or it would be held "responsible for any undesired incident that may occur." AFP (10:20am · 5 Oct 2015): Turkey 'intercepts' Russian jet violating its air space Turkey said on Monday its F-16 jets had at the weekend intercepted a Russian fighter plane which violated Turkish air space near the Syrian border, forcing the aircraft to turn back. ... Turkey said on Monday its F-16 jets had at the weekend intercepted a Russian fighter plane which violated Turkish air space near the Syrian border, forcing the aircraft to turn back.
  • Here now what McClatchy reported on these air space violations in a longer piece several hours before Reuters and AFP reported the Turkish claim: ISTANBUL - A Russian warplane on a bombing run in Syria flew within five miles of the Turkish border and may have crossed into Turkey’s air space, Turkish and U.S. officials said Sunday. ... A Turkish security official said Turkish radar locked onto the Russian aircraft as it was bombing early Friday in al Yamdiyyah, a Syrian village directly on the Turkish border. He said Turkish fighter jets would have attacked had it crossed into Turkish airspace. But a U.S. military official suggested the incident had come close to sparking an armed confrontation. Reading from a report, he said the Russian aircraft had violated Turkish air space by five miles and that Turkish jets had scrambled, but that the Russian aircraft had returned to Syrian airspace before they could respond. The Turkish security official said he could not confirm that account.
  • So it is the U.S., not Turkey, which was first pushing the claims of air space violation and of scrambling fighters. The Turkish source would not confirm that. But how could it be a real air space violation when Russian planes "flew within five miles of the Turkish border and may have crossed into Turkey’s air space". The Russian planes were flying in Syrian airspace. They "may have crossed" is like saying that the earth "may be flat". Well maybe it is, right? Fact is the Russians fly ery near to the border and bomb position of some anti-Syrian fighters Turkey supports. They have good reasons to do so: The town, in a mountainous region of northern Latakia province, has been a prime route for smuggling people and goods between Turkey and Syria and reportedly has functioned as a key entry for weapons shipped to Syrian rebels by the U.S.-led Friends of Syria group of Western and Middle Eastern countries.
  • ...2 more annotations...
  • One Russian plane may even indeed have slightly crossed the border while maneuvering. But the real reason why the U.S. military official and Turkey claim the above "violations" is because Turkey unilaterally "moved" the Turkish-Syrian border five miles south: Turkey has maintained a buffer zone five miles inside Syria since June 2012, when a Syrian air defense missile shot down a Turkish fighter plane that had strayed into Syrian airspace. Under revised rules of engagement put in effect then, the Turkish air force would evaluate any target coming within five miles of the Turkish border as an enemy and act accordingly. If Syrian rules of engagement would "move" its northern border up to the Black Sea would any plane in eastern Turkey be in violation of Syrian air space? No one would accept such nonsense and that is why no one should accept the U.S.-Turkish bullshit here. Russian planes should not respect the "new" Turkish defined border but only the legitimate one.
  • It would also be no good reason to start a NATO-Russia war just because such a plane might at times slightly intrude on the Turkish side due to an emergency or other accidental circumstances. Do we have to mention that the U.S., France, Britain and Jordan regularly violate Syrian airspace for their pretended ISIS bombing? That Turkey is bombing the PKK in north Iraq without the permission of the Iraqi government? What about Israels regular air space violations over Lebanon? But what is this all really about? Germany, the Netherlands and the U.S. stationed some Patriot air defense systems in Turkey to defend Turkey and its Islamist storm troops in north-Syria. These systems were announced to leave or have already left. Are these claims about air-space violation now an attempt to get these systems back into Turkey? For what real purpose?
Paul Merrell

The Conservative Case Against Gina Haspel | The American Conservative - 0 views

  • Editor’s note: The author is a former CIA agent who was the first to confirm the agency’s secret waterboarding program and publicly describe it as “torture.” The government responded by charging him with leaking classified information to a reporter after which he was convicted and spent 30 months in a high-security federal prison from 2013 to 2015.
  • That brings us back to Gina Haspel. I have no doubt that she considers herself to be a patriot, as her supporters do. But that’s not the issue here. The issue is respect for the rule of law. Since the end of World War II, we have had laws in this country that specifically ban exactly those torture techniques implemented and overseen by Gina Haspel at a secret prison overseas. And the United States is a signatory to the United Nations Convention Against Torture. Indeed, we were the primary drafters of that measure, which, having been ratified by the Senate, has the force of law in the United States. If Gina Haspel had any doubts about her “orders” from the CIA hierarchy, she had only to look at recent history. Just after the end of World War II, the United States executed Japanese soldiers who had waterboarded American prisoners of war. Similarly, in January 1968, the Washington Post published a front-page photo of an American soldier waterboarding a North Vietnamese prisoner. Secretary of Defense Robert McNamara ordered an investigation. The soldier was arrested, charged with torture, convicted, and sentenced to 20 years at Leavenworth. Torture was illegal in 1946. It was illegal in 1968. And it was illegal in 2002, no matter what Bush Justice Department officials John Yoo and Jay Bybee said. The law was clear.
Paul Merrell

Dennis Kucinich: New WikiLeaks reveal proof we are sliding down the slippery slope towa... - 0 views

  • The U.S. government must get a grip on the massive opening that the CIA, through its misfeasance, nonfeasance and malfeasance, has created. If Tuesday’s WikiLeaks document dump is authentic, as it appears to be, then the agency left open electronic gateways that make all Americans vulnerable to spying, eavesdropping and technological manipulation that could bring genuine harm. That the CIA has reached into the lives of all Americans through its wholesale gathering of the nation’s “haystack” of information has already been reported. It is bad enough that the government spies on its own people. It is equally bad that the CIA, through its incompetence, has opened the cyberdoor to anyone with the technological skills and connections to spy on anyone else. The constant erosion of privacy at the hands of the government and corporations has annihilated the concept of a “right to privacy,” which is embedded in the rationale of the First, Third, Fourth, Ninth and Fourteenth Amendments to the U.S. Constitution. It is becoming increasingly clear that we are sliding down the slippery slope toward totalitarianism, where private lives do not exist.
  • We have entered a condition of constitutional crisis that requires a full-throated response from the American people. I have repeatedly warned about the dangers of the Patriot Act and its successive iterations, the execrable national security letters that turn every FBI agent into a star chamberlain, the dangers of fear-based security policies eroding our republic. We have crossed the threshold of a cowardly new world, and it’s time we tell the government and the corporations who have intruded to stop it. 
Paul Merrell

The Still-Missing Evidence of Russia-gate - Consortiumnews - 0 views

  • A changing-places moment brought about by Russia-gate is that liberals who are usually more skeptical of U.S. intelligence agencies, especially their evidence-free claims, now question the patriotism of Americans who insist that the intelligence community supply proof to support the dangerous claims about Russian ‘hacking” of Democratic emails especially when some  veteran U.S. government experts say the data would be easily available if the Russians indeed were guilty. One of those experts is William Binney, a former high-level National Security Agency intelligence official who, after his 2001 retirement, blew the whistle on the extraordinary breadth of NSA surveillance programs. His outspoken criticism of the NSA during the George W. Bush administration made him the subject of FBI investigations that included a raid on his home in 2007. Even before Edward Snowden’s NSA whistleblowing, Binney publicly revealed that NSA had access to telecommunications companies’ domestic and international billing records, and that since 9/11 the agency has intercepted some 15 trillion to 20 trillion communications. Snowden has said: “I have tremendous respect for Binney, who did everything he could according to the rules.”
  • I spoke to Binney on Dec. 28 about Russia-gate and a host of topics having to do with spying and America’s expanding national security state.
  • Bernstein: Your expertise was in the Soviet Union and so you must know a lot about bugging.  Do you believe that Russia hacked and undermined our last election?  Can Trump thank Russia for the result? Binney:  We at Veteran Intelligence Professionals for Sanity (VIPS) published an article on this in July.  First of all, if any of the data went anywhere across the fiber optic world, the NSA would know.  Just inside the United States, the NSA has over a hundred tap points on the fiber lines, taking in everything.    Mark Klein exposed some of this at the AT&T facility in San Francisco. This is not for foreigners, by the way, this is for targeting US citizens.  If they wanted only foreigners, all they would have to do was look at the transatlantic cables where they surface on the coast of the United States.  But they are not there, they are distributed among the US population. Bernstein: So if, in fact, the Russians were tapping into DNC headquarters, the NSA would absolutely know about it. Binney: Yes, and they would also have trace routes on where they went specifically, in Russia or anywhere else.  If you remember, about three or four years ago, the Chinese hacked into somewhere in the United States and our government came out and confirmed that it was the Chinese who did it, and it came from a specific military facility in Shanghai.  The NSA had these trace route programs embedded by the hundreds across the US and all around the world.
  • ...3 more annotations...
  • The other data that came out from Guccifer 2.0, a download from the DNC, has been a charade.  It was a download and not a transfer across the Web.  The Web won’t manage such a high speed.  It could not have gotten across the Atlantic at that high speed.  You would have to have high capacity lines dedicated to that in order to do it. They have been playing games with us.  There is no factual evidence to back up any charge of hacking here. Bernstein: So was this a leak by somebody at Democratic headquarters? Binney: We don’t know that for sure, either.  All we know was that it was a local download.  We can likely attribute it to a USB device that was physically passed along.
  • Right now, our government is violating the first, fourth and fifth amendments in various ways.  Mueller did it, Comey did it, they were all involved in violating the Constitution.
  • Bernstein:  There seems to be a new McCarthyite operation around the Russia-gate investigation.  It appears that it is an attempt to justify the idea that Clinton lost because the Russians undermined the election. Binney: I have seen no evidence at all from anybody, including the intelligence community.  If you look at the Intelligence Community Assessment (ICA) report, they state on the first page that “We have high confidence that the Russians did this.”  But when you get toward the end of the report, they basically confess that “our judgment does not imply that we have evidence to back it up.” Bernstein:  It was initially put out that seventeen intelligence agencies found compelling evidence that the Russians hacked into our election.  You’re saying it was actually selected individuals from just three agencies.  Is there anything to the revelations that FBI agents talked about taking action to prevent Trump from becoming president? Binney: It certainly does seem that it is leaning that way, that is was all a frame-up.  It is a sad time in our history, to see the government working against itself internally. Bernstein:  I take it you are not a big supporter of Trump. Binney:  Well, I voted for him.  I couldn’t vote for a warmonger like Clinton.  She wanted to see our planes shooting down Russian planes in Syria.  She advocated for destabilizing Libya, for getting rid of Assad in Syria, she was a strong backer of the war in Iraq.
« First ‹ Previous 281 - 291 of 291
Showing 20 items per page