Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged plug

Rss Feed Group items tagged

ashkif as

Best Iridium spark plug Manufacturers in India - NGK Spark Plugs - 0 views

  •  
    Check out the best iridium spark plugs online at NGK spark plugs. We offer iridium spark plugs for cars and motorcycles with various advantages like excellent acceleration with increased mileage. For more info visit: https://www.ngkntk.in/iridium-plugs/Tweet$(document).ready(function() {var media = $('img[src*=\'oc-content/uploads/\']').attr('src'); if(media==undefined) { media = ''; $('.pinterest').remove(); } else { media = '&media='+escape(media); };$('.pinterest').find('a').attr('href','http...
Paul Merrell

Reuters Investigates - UNACCOUNTABLE: The Pentagon's bad bookkeeping - 0 views

  • MILES OF AISLES: At the Defense Logistics Agency's giant storage facility outside Harrisburg, Pennsylvania, lack of reliable information on what's there makes it hard to throw out excess inventory. REUTERS/TIM SHAFFER
  • Part 2: For two decades, the U.S. military has been unable to submit to an audit, flouting federal law and concealing waste and fraud totaling billions of dollars
  • At the DFAS offices that handle accounting for the Army, Navy, Air Force and other defense agencies, fudging the accounts with false entries is standard operating procedure, Reuters has found. And plugging isn’t confined to DFAS (pronounced DEE-fass). Former military service officials say record-keeping at the operational level throughout the services is rife with made-up numbers to cover lost or missing information.
  • ...2 more annotations...
  • Linda Woodford spent the last 15 years of her career inserting phony numbers in the U.S. Department of Defense’s accounts. Every month until she retired in 2011, she says, the day came when the Navy would start dumping numbers on the Cleveland, Ohio, office of the Defense Finance and Accounting Service, the Pentagon’s main accounting agency. Using the data they received, Woodford and her fellow DFAS accountants there set about preparing monthly reports to square the Navy’s books with the U.S. Treasury’s - a balancing-the-checkbook maneuver required of all the military services and other Pentagon agencies. And every month, they encountered the same problem. Numbers were missing. Numbers were clearly wrong. Numbers came with no explanation of how the money had been spent or which congressional appropriation it came from. “A lot of times there were issues of numbers being inaccurate,” Woodford says. “We didn’t have the detail … for a lot of it.”
  • The data flooded in just two days before deadline. As the clock ticked down, Woodford says, staff were able to resolve a lot of the false entries through hurried calls and emails to Navy personnel, but many mystery numbers remained. For those, Woodford and her colleagues were told by superiors to take “unsubstantiated change actions” - in other words, enter false numbers, commonly called “plugs,” to make the Navy’s totals match the Treasury’s. Jeff Yokel, who spent 17 years in senior positions in DFAS’s Cleveland office before retiring in 2009, says supervisors were required to approve every “plug” - thousands a month. “If the amounts didn’t balance, Treasury would hit it back to you,” he says.
  •  
    Nothing new here. Remember when Donald Rumsfeld announced the day before 9-11 that the Pentagon could not account for $2.3 trillion? https://www.youtube.com/watch?v=oj1rT4bszWg It was the same way in Viet Nam. During my entire 27 months there, we could not be issued socks. We had to write home to ask family or friends to buy socks and send them to us. They could buy them at military surplus stores in the U.S., regulation Army field socks with cushion soles, but we couldn't get them from the Army. "An army travels on its feet," but no socks. Socks were not the only supply chain failures, of course. If you can't manage to get socks to your soldiers because they've been declared surplus, maybe you'd have problems accounting for expenditures too, ya' think? 
Gary Edwards

U.S. Senate: Senators Home - 0 views

  •  
    Petition Time!  Last week, in a bipartisan action, the House of Representatives voted 267-159 to repeal the CLASS Act. excerpt from the Independent Woman's Voice call-to-action ; The CLASS Act is a microcosm of two of the primary problems that plague ObamaCare - it's unaffordable and completely unworkable. Indeed, that's why Department of Health & Human Services Secretary Kathleen Sebelius had to pull the plug on the CLASS Act back in October. Sebelius was required to certify that CLASS - the health care law's provision to provide for long-term insurance for assisted living - would remain affordable and fiscally solvent for the next 75 years. To the surprise of only those who believe the fairy tail that ObamaCare will never add to the national debt, Secretary Sebelius was compelled to finally cease defending CLASS and abandon it. If only that same standard could be applied to all of ObamaCare. Now, the repeal of the CLASS Act moves on to the Senate. It's high time the Patriots mobilize to put pressure on the Senate to follow the House in repealing CLASS and sending it on to President Obama's desk. Not surprisingly the President has indicated he wouldn't sign repeal of CLASS.  Nonetheless, he should feel the pressure from the American people to do so.
Gary Edwards

Startup turns carbon dioxide into fuels - 0 views

  • The research has received funding from the Air Force Office of Scientific Research (AFSOR), the National Science Foundation and the Department of Energy (DOE). The collaboration between Liquid Light and the University was supported by the DOE Small Business Innovation Research program and the AFOSR Small Business Technology Transfer program. Princeton's agreement with Liquid Light allowed the company to continue to collaborate with Bocarsly and his research team. Before long, new discoveries were emerging. "They started noticing interesting chemistry that we wouldn't have predicted," said Bocarsly.
  • The Princeton scientists did some additional studies, and made a surprising discovery: They could turn CO2, which contains only one carbon, into a compound with a carbon-carbon bond, which vastly increases the possibilities for creating commercial applications. This was radical because although the reaction is certainly possible, it is highly unlikely to happen because so many other competing reactions are occurring. "Everyone who electrochemically reduces CO2 today makes compounds with only one carbon," said Bocarsly. "Nobody makes things with carbon-carbon bonds." He paused. "But we can." "That was a very 'wow' moment," recalled Cole, "because we thought that our process could only make methanol. But now we were finding that we could make a variety of products, and that is what makes this technology commercially interesting." She said Liquid Light scientists can now make more than 20 different products from CO2.
  • One of the chemicals Liquid Light can make is isopropanol, commonly known as rubbing alcohol and an important industrial chemical. Another is butanol, which could be commercially important as a fuel. Liquid Light's technology offers the potential to make these chemicals at lower cost than today's methods, which involve starting with fossil fuels such as petroleum and natural gas.
  • ...3 more annotations...
  • Why does pyridinium work so well as a catalyst for the reaction? Based on its structure, the ring-shaped molecule is an unlikely catalyst for this reaction because it shuttles just one electron at a time. But to convert CO2 to methanol requires six electrons, and to make higher-carbon molecules takes even more electrons. Bocarsly and his team — in collaboration with Steven Bernasek, professor of chemistry — are doing studies to understand the steps in the chemical reaction, and they are making rapid progress. "There are clearly some intermediate products formed during the reaction that do not sit around for a long time and are not there in very high concentrations," said Bocarsly.
  • The Princeton team also is studying the factors that determine which products can be made from CO2. The researchers have found that very subtle changes in the electrode surface can lead to production of different chemicals. For example, CO2 plus a pyridinium catalyst and a platinum electrode make methanol. However, the same catalyst and a different electrode give a different product. The team published its findings on how the reaction is affected by catalyst concentration, temperature and pressure in the journal ChemSusChem last year.
  • Citing government statistics that the United States generates about 5.5 billion metric tons of CO2 per year, Teamey said it will not be hard to obtain the starting materials for this new industry. However, the CO2 needs to be relatively pure, a requirement that rules out gasoline tailpipes and coal-fired power plants. Instead, said Teamey, the CO2 could come from manufacturing facilities, such as fertilizer manufacturers and cement plants, which according to Teamey emit some 100 million tons of high-purity CO2 each year.
  •  
    "Today, carbon dioxide (CO2) is a hot topic. Scientists around the globe are searching for ways to store, dispose of, or prevent the formation of the greenhouse gas, which is a major driver of global climate change. Liquid Light hopes to take this concept one step further and harness waste CO2 as a source of carbon to make industrial chemicals and fuels. The technology behind the process is simple: Take CO2 and mix it in a water-filled chamber with an electrode and a catalyst. The ensuing chemical reaction converts CO2 into a new molecule, methanol, which can be used as a fuel, an industrial solvent or a starting material for the manufacture of other chemicals. Liquid Light's founders include Bocarsly and his former graduate student Emily Cole, who earned her Ph.D. from Princeton in 2009. Cole helped revive efforts in Bocarsly's lab to study the conversion of CO2 into usable fuels, which led to the launch of Liquid Light and an ongoing collaboration that Bocarsly said has been extremely positive for his research team at the University. "We've made some discoveries that wouldn't have been made in a university setting, and this has really accelerated the research," Bocarsly said. "It is a very productive relationship." Back in the 1990s, a former Ph.D. student of Bocarsly's named Chao Lin conducted some of the earliest experiments on turning CO2 into methanol. He used palladium metal as the electrode and pyridinium, an inexpensive ring-shaped molecule, as the catalyst. By plugging the electrode into an electrical outlet, he could drive an electrochemical reaction that converted CO2 into methanol. As Bocarsly recalled, Lin was quite excited about his success. However, said Bocarsly, "We published that finding in 1994 and there was approximately zero interest in it." The work languished until 2005 when Cole, then a new graduate student, told Bocarsly she wanted to work on a clean-energy project. She took up the challenge of reproducing Lin's results, but this time
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

Fracking pushing U.S. oil production above Saudi Arabia's - Nature & Environment Israel... - 1 views

  • Fracking remains enormously controversial, but the report that the oil-extraction technique is about to lift the United States' oil production beyond that of mega-producer Saudi Arabia means it's probably here to stay. The practice, which involves injecting water into the ground in order to fracture the rock and allow oil and gas to escape, has been associated by critics with earthquakes and heightened pollution, to name just two problems. Just today, Thursday, Ohio authorities shut down a local fracking operation while geological detectives investigate whether it could be behind the 11 quakes recorded there in a few days.
  • But an indication of just how crucial fracking has become to the American economy comes from next-door Tennessee, where lawmakers voted down proposals to ban the practice (and mountaintop mining, while about it). As The Independent reported today, thanks to the practice, the United States is about to become a bigger oil producer than Saudi Arabia.
  • Proponents of the technique point mainly at economic benefits, not least achieving American independence from imported oil. Opponents bewail contamination of ground-water, depletion of fresh water supplies, and ground contamination from the rising hydrocarbons. More recently concerns have arisen that like mining, fracking can stabilize local geology and cause quakes. The United Kingdom had banned fracking but later lifted the prohibition, favoring regulation instead. In the United States, legislation on the matter depends on the state, and Germany frowns on the practice but hasn't outlawed it. France has, becoming one of the countries to adopt the position of opponents and ban fracking outright, in 2011. Just today a French court voided a drilling license held by the American energy company Hess for fear that it would frack.
  •  
    Related: The public comment period just closed on the State Department's environmental impact statement for the Keystone Pipeline. Environmental organizations filed the objections of over 2 million Americans just before the deadline, an amazing achievement in the annals of environmental activism. On the other hand, Big Oil almost invariably gets what it wants from the Feds, regardless of the environmental consequences. E.g., the BP oil disaster in the Gulf hadn't even been plugged before the Obama Administration resumed granting permits for deep ocean drilling, without any new required preventive measures.   
Gary Edwards

The Perfect Storm: ObamaCare and DemoDebt - The Patriot Post - 0 views

  •  
    Good summary of where we're at in the ObamaCare - Massive Debt debate. excerpt: "The DemoDebt showdown on September 30 and the implementation deadline for the next major phase of Obama's UNaffordable Care Act on October 1 are combining to create the "perfect storm," a formula for extended economic stagnation and, consequently, the greatest domestic threat to American Liberty and free enterprise since Franklin Roosevelt's despotic administration. To summarize, in 2010, under Democrat majorities in the House and Senate, Barack Hussein Obama obtained one of the Left's most coveted political prizes - a plan to nationalize health care. This had long been the "crown jewel" of socialist governments, having also been proposed by Hillary Clinton during her husband's regime. The stated rationale for the so-called "Patient Protection and Affordable Care Act," now ubiquitously called "ObamaCare" (but perhaps more aptly called ObamaCareless"), was to "control health care costs" and "provide insurance coverage for the uninsured," approximately 15% of Americans with no medical coverage - which is not to say no medical care. Of course, the real rationale for ObamaCare is the implementation of a scheme that will ultimately give the central government authoritarian regulatory control over more than 20% of the U.S. economy. Obama and his NeoCom cadres of statists on the Left have effectively hijacked the once-noble Democrat Party and converted it into their own socialist party tool in their ongoing effort to pull the plug on our Constitution. Ultimately, the objective of ObamaCare is to implement a massive single-payer system, in effect, placing the management and rationing of health care services under the thumb of a bloated and inefficient central government, with the objective of using that "achievement" as a major political stepping stone to implement a much broader socialist agenda in the coming years. Our nation is about to take a great
Gary Edwards

Revealed: Obama's Immense Shadow Army & Its Shocking Takeover Plan - 1 views

  •  
    Is the ObamaCare train wreck a wreck by design? Another notch in the Bankster belt marking another step in the bankrupting of America? Revealed: Obama's Immense Shadow Army & Its Shocking Takeover Plan October 26, 2013  //  By: Eric Odom  //   The ObamaCare train wreck - it's awful, possibly purposeful, certainly useful for team Obama and its growing army of community activists and organizers. In a previous report, we explored the question, "What if the ObamaCare debacle is really a diversion, using a military term a "feint" - a tactical distraction to draw our attention, our focus and our fire away from the real point of attack on liberty?" Remember that horrible train wreck in Spain not long ago, captured on video? As tragic as it was, watching the crash and its gruesome aftermath was almost irresistible, wasn't it? Well, what if the disastrous rollout of the President's signature legislative achievement - what if this spectacular slow motion ObamaCare train wreck has been and is being allowed to happen so that what's going on around the bend from the fiery crash site gets little attention, from the public, from the media or from Congressional investigators? Think about it, friends. How could Barack Obama and his celebrated team of incredibly proficient, plugged in techies - the team that twice got him elected - be behind the utterly disastrous launch of the ObamaCare online storefront, healthcare.gov - arguably the biggest website failure in history? How could so much money have been spent to produce such a problem-plagued site that apparently was doomed in its developmental confusion? And how to fix this monumental mess, well, there doesn't seem to be any clear plan…other than hope. And now we learn that many, if not most, of the people actually signing up for ObamaCare through the website are enrolling in Medicaid, not signing up for private insurance policies they pay for, but adding their names onto government roll
  •  
    There is no doubt in my mind that corporations (and their Chamber of Commerce boot licking lackys) believe that employer provided healthcare benefits was a HUGE MISTAKE. The key feature of ObamaCare is that of ENDING the HMO-Employee Healthcare profit draining quagmire these corporations somehow stumbled into. (Hint: they traded healthcare benefits for wide open government assisted Globalization - the new world order Merchantilism). IMHO, the insurance companies know full well that the entire HMO-Employee Healthcare bandwagon is going to end. Not because of socialism; because of profit hungry out of control mercantilism. So they are trying to cut the best deal possible with the government. The merchantilist doesn't care that their employees are going to suffer. They only care that this cost and the blame for losing the benefit is moved from their books to the government. Nor does the merchantilist care about protecting our borders. They want cheap labor. Even if the social cost of that cheap labor lands on the government and destroys the nation. That's why the merchantilist and his Bankster financiers support Open Borders. The merchantilist could care less about the trade deficit and the massive transfer of American manufacturing jobs overseas. As long as they can sell their junk back into the USA market without a 33% import tax these bastardos are happy to destroy their country. I wonder whose army and navy will secure their investments when the USA no longer can? Are their private armies enough? Just wondering.
Gary Edwards

ObamaCare suckers needed, inquire within | RedState - 0 views

  • The exchanges need roughly 2.7 million healthy 18-t0-35-year-olds to sign up to be solvent.
  • The majority of that group is nonwhite and male, according to Simas’ data, and a third are located in just three states: California, Texas and Florida.
  • If too few choose to enroll because they don’t know about the law, don’t like it, or feel they don’t need insurance, the exchanges will fail. And so will the law.
  • ...20 more annotations...
  • In other words, ObamaCare needs an army of young dupes to pay through the nose, in order to make this ridiculous program appear solvent while it showers other people with benefits.  
  • It’s a wonder young folks are lining up around the block to pay those 50 to 150 percent increases in their health insurance premiums.
  • he latest Government Accountability Office report says ObamaCare implementation remains months behind schedule, even though the insurance exchanges are supposed to go live in just four months.
  • Under Obamacare, insurance companies can no longer turn away people with preexisting conditions.
  • And so a crucial aspect of implementation is getting enough young, healthy people to enroll to offset the cost of insuring older, less-healthy enrollees.
  • The Congressional Budget Office expects some 7 million people to sign up when the exchanges open on Oct. 1, eventually reaching 22 million.
  •  The embarrassing degeneration of ObamaCare into a wealth transfer program that feeds off healthy people is a perfect inversion of the insurance concept.
  • Normally, the young and hearty folks would pay a low fee for health insurance, because providers would make the reasonable actuarial gamble that most of those customers would not be filing expensive claims.
  • The notion of selling “insurance” to someone with an pre-existing condition, guaranteed to make big claims, would be absurd.  
  •  Older people with higher risks pay more.
  • Instead, we’ve got another corrupt, inefficient redistribution system powered by the liquefied assets of chumps.
  • It’s starting to visibly panic over not being able to pump enough chumps to fill its gas tank.
  • And I do mean corrupt, because it’s not as if most of this money is going to doctors or medical supplies.
  •  Betsy McCaughey, former lieutenant governor of New York, describes the billion dollars flowing into the California health insurance exchange as tax money laundered into Democratic party-building funds:
  • The Obama administration granted a whopping $910 million to California to set up its insurance exchange. That money is not for bandages, surgery, nurses and doctors to care for the sick. Nor is it for insurance plans, though $910 million could buy generous coverage for at least 113,000 people!
  • Shockingly, the $910 million is slated for bureaucracy, including rich compensation packages for exchange employees ($360,000 a year for the executive director) and contracts for computer equipment, public relations and “outreach. “
  • Outreach is the largest expenditure and where the real monkey business occurs.
  • Amazingly, California legislators passed a law that the exchange could keep secret for a year who received the contracts and indefinitely how much they were paid. California’s open-records laws would otherwise prohibit such secrecy.
  • McCaughey describes six- and seven-figure grants to the California NAACP, the Service Employees International Union, the AFL-CIO, and Community Health Councils, “a California organization with a long history of political activism against fracking, for-profit hospitals, state budget cuts and oil exploration.”
  • I can’t imagine why young people are reluctant to plow their money into a racket like this!
  •  
    Excellent summary of where ObamaCare sits today.  Obama has to convince millions of young, healthy "chumps" to pay massive amounts of their income into ObamaCare Exchanges if the greatest socialist redistribution plan ever conceived is to continue. "At the White House, health care implementation has become an obsession. Chief of Staff Denis McDonough spends two hours a day on Obamacare implementation, staffers said, and senior aides like Simas and Tara McGuinness, who joined the White House in April as a senior communications adviser, work on the issue nearly full-time. Hardly a week goes by without Obama finding some way to plug the effort as well. The reason: the law is increasingly unpopular. According to an NBC News-Wall Street Journal poll released earlier this month, 49% of Americans now believe the law is a bad idea, the highest percentage recorded, with only 37% saying it is a good thing. Many states have already opted out of key provisions to expand Medicaid. In Washington, Republicans continue to lay siege to the law; they have voted to repeal it 37 times in the U.S. House."
Paul Merrell

U.S. Solar Is Producing 50 Percent More Electricity Than We Thought - Plugged In - Scie... - 0 views

  • Actual solar electricity production in the United States is 50% higher than previous estimates, according to new analysis by the Solar Energy Industries Association (SEIA) and kWh Analytics. All told, analysts found that solar energy systems in the U.S. generated 30.4 million megawatt-hours (MWh) of electricity in the 12 months ending in March 2015. Three states - California, Arizona, and Hawaii – can now say that solar provides more than 5% of their total annual electricity demand. The new estimate includes generation from behind-the-meter solar systems, which is not included in estimates produced by the Energy Information Administration (EIA). The EIA uses solar power generation information collected with their Form 923 survey, which only applies to utility-scale power plants that have more than 1,000 kW in solar generation capacity (i.e. are larger than 1,000 kWac). Given that the average solar PV system that you will find on the rooftops of houses in the U.S. has just 5 kWac of generation capacity, the electricity that they produce is not captured in EIA statistics. 
  • As a result, the EIA estimated that solar power produced 20.2 million MWh of electricity over the 12 months ending in March 2015 compared to the 30.4 million MWh published in the analysis from SEIA and kWh Analytics. 
Gary Edwards

We The Stupid - Ann Barnhardt on the National Debt Ceiling SCAM - 0 views

  •  
    If your angry over the National Debt Ceiling Scam, you're not alone. Ann Barnhardt is fist pounding furious. And with good reason. This is going to be a long battle. One thing i do disagree with her on though is where Obama will borrow the money to fund the $2.4 Trillion debt increase. She's right that no country in the world has $2.4 Trillion to lend us. But the Banksters have plenty! Two weeks ago the GAO released the results of the first time ever inventory of the Federal Reserve Bankster Cartel. They found that the FRBC had created $16.1 Trillion of our money between 2009 and 2010, and passed that money to member Banksters, international Bankster associates, and too-big-to-fail Wall Street gamblers; at near zero percent interest. Combined with the the US TARP bailout, and the AiG - Fannie Mae - Freddie Mac bailouts, the total cost of converting Bankster debt to USA Taxpayer debt tops out at over $23.4 Trillion. The Banksters are flush with dollars, but what are they going to invest in? It's said that the Federal Reserve owns somewhere between 70%- 80% of the US Treasury issued debt. The way this happens however is that the Federal Reserve first "lends" (at near 0%) created dollars to member Banksters. Then the Banksters purchase the Treasuries at 3.25% and up depending on the payout period per note. In effect, American Taxpayers get to borrow back their own money while paying the Banksters a hefty, risk free handling fee of at least 3.25%. So, with $16.1 Trillion sloshing around, and not much too invest in, the Banksters really need Obama to borrow $2.4 Trillion, and spend a whole lot more. At some point this ponzi scheme will collapse, but not today. Least ways not until the Banksters can launder that $16.1 Trillion freebi. My guess is that the Banksters would like to turn the $16.1 Trill into 3.25% bonds, and then into land, indentured tax obligations (inter-generational), and investments in debt free third world countries - where the
  •  
    "- where the game of new world order begins anew. Jaded, cynical, but very much awake and aware...... ~ge~" Sorry, Diigo truncated the comment but only for the Group "End of the American Dream" post. My bookmark actually has the entire comment. Very strange, and i think it's something that might be reported to Maggie. What i have found out is that if you use the diigo plug-in, your comments will be unexpectedly truncated. I've lost losts of stuff over the years. Then i switched to the Chrome plug-in "Share This". There is no truncation, except in the Group view of a post!!! So, the question for Maggie is, "Why are the Group comments to a bookmark unexpectedly truncated?"
Paul Merrell

9/11 judge 'pulls plug' on trial over Pentagon order | Miami Herald Miami Herald - 0 views

  • The 9/11 trial judge on Wednesday froze pretrial hearings in a death-penalty case over a controversial Pentagon order requiring the judges to move permanently to this remote outpost until their cases are over.In a 10-page order, Army Col. James L. Pohl abated the prosecution of alleged 9/11 mastermind Khalid Sheik Mohammed and four accused accomplices until the Pentagon rescinds its move-in order.He ruled that the circumstances surrounding the controversial Jan. 7 relocation order “raise the issue of Unlawful Influence by creating the appearance of improper pressure on the military judge to adjust the pace of the litigation.”Defense lawyers in both the Sept. 11 and USS Cole death-penalty cases have alleged the move is an attempt to illegally rush justice, describing it as a pressure play designed to exile the military judges to Cuba, cut short pretrial hearings and move straight to trial. Unlawful Command Influence, or commanders meddling in the judicial function, is a crime in the U.S. military.
  • Prosecutors have defended the order, designed by a retired Marine general functioning as a war court overseer, as part of an effort to improve resourcing at the crude compound here called Camp Justice.Deputy Secretary of Defense Robert Work signed it within a month of getting a recommendation from the overseer, retired Marine Maj. Gen. Vaughn A. Ary. It stripped military judges hearing Guantánamo cases of their other duties, including presiding at U.S. service members’ courts martial, without consultation with the top lawyers of the Army, Navy and Air Force.So far none of the judges has obeyed it pending clarifications from their overall commanders, called The Judge Advocates General.
  • One 9/11 defense attorney, Jay Connell, said that Pohl “was right to pull the plug on the case” — and recited what he saw as a pattern of government interference.“The FBI has infiltrated a defense team, a former CIA contractor became a defense interpreter, and the Deputy Secretary of Defense has unlawfully attempted to influence the military judge,” said Connell, the death-penalty defender of Mohammed’s nephew, Ammar al Baluchi.
  • ...1 more annotation...
  • The development came as defense lawyers for the alleged USS Cole bombing mastermind, Abd al Rahim al Nashiri, a Saudi, were questioning the war court overseer, Ary, on what he meant when he proposed the rule change Dec. 9, saying “the status quo does not support the pace of litigation necessary to bring these cases to their just conclusion.”Ary, testifying from his Pentagon headquarters, said that he believed the order to move the war court judges to Guantánamo and strip them of their court martial duties was “influence neutral.”He said he didn’t anticipate the order sidelining progress in the hearings. “Knowing what I knew then, I didn’t believe that it would have this effect, no,” he said, adding, “I stand by that recommendation.”
  •  
    Nice. The judge ordered the proceedings be halted until the order for the judges to move to GITMO is rescinded. If not rescinded promptly, the judge will cosider other relief, i.e., dismissing the charges. 
Paul Merrell

Secret to Prism program: Even bigger data seizure - 0 views

  • The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe. But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort. Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet's backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.
  • Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information. The fact that it is productive is not surprising; documents show it is one of the major sources for what ends up in the president's daily briefing. Prism makes sense of the cacophony of the Internet's raw feed. It provides the government with names, addresses, conversation histories and entire archives of email inboxes.
  • The NSA is prohibited from spying on Americans or anyone inside the United States. That's the FBI's job and it requires a warrant. Despite that prohibition, shortly after the Sept. 11 terrorist attacks, President George W. Bush secretly authorized the NSA to plug into the fiber optic cables that enter and leave the United States, knowing it would give the government unprecedented, warrantless access to Americans' private conversations. Tapping into those cables allows the NSA access to monitor emails, telephone calls, video chats, websites, bank transactions and more. It takes powerful computers to decrypt, store and analyze all this information, but the information is all there, zipping by at the speed of light. "You have to assume everything is being collected," said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades. The New York Times disclosed the existence of this effort in 2005. In 2006, former AT&T technician Mark Klein revealed that the company had allowed the NSA to install a computer at its San Francisco switching center, a key hub for fiber optic cables.
  • ...11 more annotations...
  • Many of the people interviewed for this report insisted on anonymity because they were not authorized to publicly discuss a classified, continuing effort. But those interviews, along with public statements and the few public documents available, show there are two vital components to Prism's success. The first is how the government works closely with the companies that keep people perpetually connected to each other and the world. That story line has attracted the most attention so far. The second and far murkier one is how Prism fits into a larger U.S. wiretapping program in place for years.
  • The government has said it minimizes all conversations and emails involving Americans. Exactly what that means remains classified. But former U.S. officials familiar with the process say it allows the government to keep the information as long as it is labeled as belonging to an American and stored in a special, restricted part of a computer. That means Americans' personal emails can live in government computers, but analysts can't access, read or listen to them unless the emails become relevant to a national security investigation. The government doesn't automatically delete the data, officials said, because an email or phone conversation that seems innocuous today might be significant a year from now. What's unclear to the public is how long the government keeps the data. That is significant because the U.S. someday will have a new enemy. Two decades from now, the government could have a trove of American emails and phone records it can tap to investigative whatever Congress declares a threat to national security.
  • The Bush administration shut down its warrantless wiretapping program in 2007 but endorsed a new law, the Protect America Act, which allowed the wiretapping to continue with changes: The NSA generally would have to explain its techniques and targets to a secret court in Washington, but individual warrants would not be required. Congress approved it, with Sen. Barack Obama, D-Ill., in the midst of a campaign for president, voting against it.
  • That's one example of how emails belonging to Americans can become swept up in the hunt. In that way, Prism helps justify specific, potentially personal searches. But it's the broader operation on the Internet fiber optics cables that actually captures the data, experts agree. "I'm much more frightened and concerned about real-time monitoring on the Internet backbone," said Wolf Ruzicka, CEO of EastBanc Technologies, a Washington software company. "I cannot think of anything, outside of a face-to-face conversation, that they could not have access to."
  • When the Protect America Act made warrantless wiretapping legal, lawyers and executives at major technology companies knew what was about to happen.
  • For years, the companies had been handling requests from the FBI. Now Congress had given the NSA the authority to take information without warrants. Though the companies didn't know it, the passage of the Protect America Act gave birth to a top-secret NSA program, officially called US-98XN. It was known as Prism. Though many details are still unknown, it worked like this:
  • Facebook said it received between 9,000 and 10,000 requests for data from all government agencies in the second half of last year. The social media company said fewer than 19,000 users were targeted.
  • Every company involved denied the most sensational assertion in the Prism documents: that the NSA pulled data "directly from the servers" of Microsoft, Yahoo, Google, Facebook, AOL and more. Technology experts and a former government official say that phrasing, taken from a PowerPoint slide describing the program, was likely meant to differentiate Prism's neatly organized, company-provided data from the unstructured information snatched out of the Internet's major pipelines. In slide made public by the newspapers, NSA analysts were encouraged to use data coming from both Prism and from the fiber-optic cables. Prism, as its name suggests, helps narrow and focus the stream. If eavesdroppers spot a suspicious email among the torrent of data pouring into the United States, analysts can use information from Internet companies to pinpoint the user. With Prism, the government gets a user's entire email inbox. Every email, including contacts with American citizens, becomes government property. Once the NSA has an inbox, it can search its huge archives for information about everyone with whom the target communicated. All those people can be investigated, too.
  • What followed was the most significant debate over domestic surveillance since the 1975 Church Committee, a special Senate committee led by Sen. Frank Church, D-Idaho, reined in the CIA and FBI for spying on Americans. Unlike the recent debate over Prism, however, there were no visual aids, no easy-to-follow charts explaining that the government was sweeping up millions of emails and listening to phone calls of people accused of no wrongdoing.
  • A few months after Obama took office in 2009, the surveillance debate reignited in Congress because the NSA had crossed the line. Eavesdroppers, it turned out, had been using their warrantless wiretap authority to intercept far more emails and phone calls of Americans than they were supposed to. Obama, no longer opposed to the wiretapping, made unspecified changes to the process. The government said the problems were fixed.
  • Schneier, the author and security expert, said it doesn't really matter how Prism works, technically. Just assume the government collects everything, he said. He said it doesn't matter what the government and the companies say, either. It's spycraft, after all. "Everyone is playing word games," he said. "No one is telling the truth."
  •  
    Associated Press is now doing its job with a masterful overview of NSA capabilities, discussing how NSA scoops up all "backbone" telecommunications, then uses PRISM to narrow down the specific communications they decide to look at. This one is a "must read" article if you're interested in the NSA scandal. It ties a lot of the pieces together.  
Paul Merrell

NSA Data Will Soon Be Used By Domestic Law Enforcement - 0 views

  • If you’re reading this, then I’m willing to bet that you’ve been called many different names throughout your life. If I were to hazard a guess, I would say they were names like kook, paranoid, conspiracy theorist, alarmist, insane, or gullible. And after this week, you can go by a new name: Vindicated. I’m of course talking about recent revelations from the NSA. Long before Edward Snowden came along, it was no secret that the NSA was spying on everyone without good cause. Anyone who believed that fact was called a conspiracy theorist, but their fears were eventually validated. These same people also understood that the NSA’s surveillance powers would never be used exclusively against terrorists and hostile governments. The power they have is just too tempting for any government. If various government agencies weren’t using the NSA’s surveillance apparatus to solve domestic crimes, it was only a matter of time before it was used for just that.
  • And again, they called us conspiracy theorists for believing that. And again, we were right all long. A while back, we noted a report showing that the “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains why this is important: What does this rule change mean for you? In short, domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. FBI agents don’t need to have any “national security” related reason to plug your name, email address, phone number, or other “selector” into the NSA’s gargantuan data trove. They can simply poke around in your private information in the course of totally routine investigations. And if they find something that suggests, say, involvement in illegal drug activity, they can send that information to local or state police. That means information the NSA collects for purposes of so-called “national security” will be used by police to lock up ordinary Americans for routine crimes.
  • Anybody who knows anything about how governments work, should not surprised. You can’t give them any kind of power, and expect them to use it responsibly. You can’t give them any stipulations. Eventually they’ll find a legal loophole to work around any limitations that have been placed on them. In other news, the Pentagon admitted this week that they’ve been deploying military drones over the United States for domestic surveillance purposes. Much like the NSA’s surveillance apparatus, we were assured that drones were for terrorists in faraway lands. Nothing so Orwellian would ever be used against ordinary American citizens at home. Yet here we are, with more to come.
  •  
    The Privacy Act, 5 U.S.C. 552a, provides in relevant part: "(a)(4) the term "record" means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph[.] ... "(b) Conditions of Disclosure.-No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be- ... "(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought[.]" So a separate written request for each "portion" of any individual record that describes the "law enforcement activity for which the record is sought[.]" That doesn't sound like the contemplated unfettered access to bulk raw data. And it gets even better, with a right to sue for any violation, attorney fees and expenses, and a statutory minimum of $1,000 damages per violation just for winning the case.  
Paul Merrell

US, Britain planned to deny Mideast oil wells to Soviet invaders - 0 views

  • British Plans Envisioned Using Nuclear Weapons as an Option in Iran and Iraq, According to Declassified Documents Regional Allies Were Apparently Never Informed Out of Concern for “Unfavorable” Consequences, Though Some U.S. Officials Thought Host Countries Would Approve the Plugging of Oil Wells Secret Oil Denial Policy Lasted at Least until the Kennedy Administration
Gary Edwards

Character Matters and Mitt Romney has it - 1 views

The following eMail message is being forwarded around the Web and it does confirm my own personal experiences with then Governor Romney in 2005-2006. The issue then was the Massachusetts Open Gove...

Romney ODF Massachusetts-Lesson Massachusetts-RFi Microsoft OOXML

started by Gary Edwards on 17 Apr 12 no follow-up yet
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Paul Merrell

Asia Times Online :: Central Asian News and current affairs, Russia, Afghanistan, Uzbek... - 0 views

  • Here's the US's exceptionalist promotion of "democracy" in action; Washington has recognized a coup d'etat in Ukraine that regime-changed a - for all its glaring faults - democratically elected government. And here is Russian President Vladimir Putin, already last year, talking about how Russia and China decided to trade in roubles and yuan, and stressing how Russia needs to quit the "excessive monopoly" of the US dollar. He had to be aware the Empire would strike back. Now there's more; Russian presidential adviser Sergey Glazyev <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> told RIA Novosti, "Russia will abandon the US dollar as a reserve currency if the United States initiates sanctions against the Russian Federation." So the Empire struck back by giving "a little help" to regime change in the Ukraine. And Moscow counter-punched by taking control of Crimea in less than a day without firing a shot - with or without crack Spetsnaz brigades (UK-based think tanks say they are; Putin says they are not).
  • Putin's assessment of what happened in Ukraine is factually correct; "an anti-constitutional takeover and armed seizure of power". It's open to endless, mostly nasty debate whether the Kremlin overreacted or not. Considering the record of outright demonization of both Russia and Putin going on for years - and now reaching fever pitch - the Kremlin's swift reaction was quite measured. Putin applied Sun Tzu to the letter, and now plays the US against the EU. He has made it clear Moscow does not need to "invade" Ukraine. The 1997 Ukraine-Russia partition treaty specifically allows Russian troops in Crimea. And Russia after all is an active proponent of state sovereignty; it's under this principle that Moscow refuses a Western "intervention" in Syria. What he left the door open for is - oh cosmic irony of ironies - an American invention/intervention (and that, predictably, was undetectable by Western corporate media); the UN's R2P - "responsibility to protect" - in case the Western-aligned fascists and neo-nazis in Ukraine threaten Russians or Russian-speaking civilians with armed conflict. Samantha Power should be proud of herself.
  • The "West" once again has learned you don't mess with Russian intelligence, which in a nutshell preempted in Crimea a replica of the coup in Kiev, largely precipitated by UNA-UNSO - a shady, ultra-rightwing, crack paramilitary NATO-linked force using Ukraine as base, as exposed by William Engdahl. And Crimea was an even murkier operation, because those neo-nazis from Western Ukraine were in tandem with Tatar jihadis (the House of Saud will be heavily tempted to finance them from now on). The Kremlin is factually correct when pointing out that the coup was essentially conducted by fascists and ultra-right "nationalists" - Western code for neo-nazis. Svoboda ("Freedom") party political council member Yury Noyevy even admitted openly that using EU integration as a pretext "is a means to break our ties with Russia." Western corporate media always conveniently forgets that Svoboda - as well as the Right Sector fascists - follow in the steps of Galician fascist/terrorist Stepan Bandera, a notorious asset of a basket of "Western" intel agencies. Now Svoboda has managed to insert no less than six bigwigs as part of the new regime in Kiev.
  • ...5 more annotations...
  • And even as 66% of Russian gas exported to the EU transits through Ukraine, the country is fast losing its importance as a transit hub. Both the Nord Stream and South Stream pipelines - Russia not on-the-ground but under-seas - bypass Ukraine. The Nord Stream, finished in 2011, links Russia with Germany beneath the Baltic Sea. South Stream, beneath the Black Sea, will be ready before the end of 2015. Geoeconomically, the Empire needs Ukraine to be out of the Eurasian economic union promoted by the Kremlin - which also includes Kazakhstan and Belarus. And geopolitically, when NATO Secretary General, the vain puppet Anders Fogh Rasmussen, said that an IMF-EU package for the Ukraine would be "a major boost for Euro-Atlantic security", this is what clinched it; the only thing that matters in this whole game is NATO "annexing" Ukraine, as I examined earlier. It has always been about the Empire of Bases - just like the encirclement of Iran; just like the "pivot" to Asia translating into encirclement of China; just like encircling Russia with bases and "missile defense". Over the Kremlin's collective dead body, of course.
  • Then there are the new regional governors appointed to the mostly Russophone east and south of Ukraine. They are - who else - oligarchs, such as billionaires Sergei Taruta posted to Donetsk and Ihor Kolomoysky posted in Dnipropetrovsk. People in Maidan in Kiev were protesting mostly against - who else - kleptocrat oligarchs. Once again, Western corporate media - which tirelessly plugged a "popular" uprising against kleptocracy - hasn't noticed it.
  • Ukraine's foreign currency reserves, only in the past four weeks, plunged from US$17.8 billion to $15 billion. Wanna buy some hryvnia? Well, not really; the national currency, is on a cosmic dive against the US dollar. This is jolly good news only for disaster capitalism vultures. And right on cue, the International Monetary Fund is sending a "fact-finding mission" to Ukraine this week. Ukrainians of all persuasions may run but they won't hide from "structural adjustment". They could always try to scrape enough for a ticket with their worthless hryvnia (being eligible for visa on arrival in Thailand certainly helps). European banks - who according to the Bank for International Settlements (BIS) hold more than $23 billion in outstanding loans - could lose big in Ukraine. Italian banks, for instance, have loaned nearly $6 billion. On the Pipelineistan front, Ukraine heavily depends on Russia; 58% of its gas supply. It cannot exactly diversify and start buying from Qatar tomorrow - with delivery via what, Qatar Airways?
  • US Secretary of State John Kerry accusing Russia of "invading Ukraine", in "violation of international law", and "back to the 19th century", is so spectacularly pathetic in its hypocrisy - once again, look at the US's record - it does not warrant comment from any informed observer. Incidentally, this is as pathetic as his offer of a paltry $1 billion in "loan guarantees" - which would barely pay Ukraine's bills for two weeks. The Obama administration - especially the neo-cons of the "F**k the EU" kind - has lost is power play. And for Moscow, it has no interlocutor in Kiev because it considers the regime-changers illegal. Moscow also regards "Europe" as a bunch of pampered whining losers - with no common foreign policy to boot. So any mediation now hinges on Germany. Berlin has no time for "sanctions" - the sacrosanct American exceptionalist mantra; Russia is a plush market for German industry. And for all the vociferations at the Economist and the Financial Times, the City of London also does not want sanctions; the financial center feeds on lavish Russian politico/oligarch funds. As for the West's "punishment" for Russia by threatening to expel it from the Group of Eight, that is a joke. The G-8, which excludes China, does not decide anything relevant anymore; the G-20 does.
  • If a wide-ranging poll were to be conducted today, it would reveal that the majority of Ukrainians don't want to be part of the EU - as much as the majority of Europeans don't want the Ukraine in the EU. What's left for millions of Ukrainians is the bloodsucking IMF, to be duly welcomed by "Yats" (as Prime Minister Yatsenyuk is treated by Vic "F**k the EU" Nuland). Ukraine is slouching towards federalization. The Kiev regime-changers will have no say on autonomous Crimea - which most certainly will remain part of Ukraine (and Russia by the way will save $90 million in annual rent for the Sevastopol base, which until now was payable to Kiev.) The endgame is all but written; Moscow controls an autonomous Crimea for free, and the US/EU "control", or try to plunder, disaster capitalism-style, a back of beyond western Ukraine wasteland "managed" by a bunch of Western puppets and oligarchs, with a smatter of neo-nazis. So what is the Obama/Kerry strategic master duo to do? Start a nuclear war?
Paul Merrell

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
Paul Merrell

Petrodollar Alert: Putin Prepares To Announce "Holy Grail" Gas Deal With China | Zero H... - 0 views

  • While Europe is furiously scrambling to find alternative sources of energy should Gazprom pull the plug on natgas exports to Germany and Europe (the imminent surge in Ukraine gas prices by 40% is probably the best indication of what the outcome would be), Russia is preparing the announcement of the "Holy Grail" energy deal with none other than China, a move which would send geopolitical shockwaves around the world and bind the two nations in a commodity-backed axis. One which, as some especially on these pages, have suggested would lay the groundwork for a new joint, commodity-backed reserve currency that bypasses the dollar, something which Russia implied moments ago when its finance minister Siluanov said that Russia may refrain from foreign borrowing this year. Translated: bypass western purchases of Russian debt, funded by Chinese purchases of US Treasurys, and go straight to the source. Here is what will likely happen next, as explained by Reuters:
  • Igor Sechin gathered media in Tokyo the next day to warn Western governments that more sanctions over Moscow's seizure of the Black Sea peninsula from Ukraine would be counter-productive.   The underlying message from the head of Russia's biggest oil company, Rosneft, was clear: If Europe and the United States isolate Russia, Moscow will look East for new business, energy deals, military contracts and political alliances.    The Holy Grail for Moscow is a natural gas supply deal with China that is apparently now close after years of negotiations. If it can be signed when Putin visits China in May, he will be able to hold it up to show that global power has shifted eastwards and he does not need the West. More details on the revelation of said "Holy Grail": State-owned Russian gas firm Gazprom hopes to pump 38 billion cubic meters (bcm) of natural gas per year to China from 2018 via the first pipeline between the world's largest producer of conventional gas to the largest consumer.   "May is in our plans," a Gazprom spokesman said, when asked about the timing of an agreement. A company source said: "It would be logical to expect the deal during Putin's visit to China."
  • Summarizing what should be and is painfully obvious to all, but apparently to the White House, which keeps prodding at Russia, is the following: "The worse Russia's relations are with the West, the closer Russia will want to be to China. If China supports you, no one can say you're isolated," said Vasily Kashin, a China expert at the Analysis of Strategies and Technologies (CAST) think thank. Bingo. And now add bilateral trade denominated in either Rubles or Renminbi (or gold), add Iran, Iraq, India, and soon the Saudis (China's largest foreign source of crude, whose crown prince also happened to meet president Xi Jinping last week to expand trade further) and wave goodbye to the petrodollar.
  •  
    The follies of an empire in decline that still imagines itself the master of the planet. 
1 - 20 of 33 Next ›
Showing 20 items per page