Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged power-projection

Rss Feed Group items tagged

Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Gary Edwards

Possible Constitutional Amendments in the event of an Article V Convention of States - ... - 0 views

  • NUMBER ONE: "Section One:   The Constitution of the United States shall be read and interpreted literally.   No words or phrases shall be changed or substituted and no part of the Constitution shall be used to expand or increase Federal Power or Authority beyond that EXPRESSLY granted and enumerated in the Constitution.   The language of the Constitution shall be interpreted according to the definition of words at the time of their inclusion in the Constitution. Section Two:    Congress shall have, by two thirds vote of both the House of Representatives and the Senate, the power to override individual rulings of the Supreme Court of the United States and/or subordinate Federal Courts.   The President shall not have veto authority over Congressional overrides of Federal Court decisions."
  • NUMBER TWO: "Section One:    No person shall be elected to Congress more than once unless serving in Congress at the time of the ratification of this amendment, in which case members of Congress shall be eligible for re-election to their respective seats one time. Section Two:     In the event the Seventeenth Amendment to the Constitution of the United States is repealed members of the Senate of the United States shall serve at the pleasure and discretion of the Legislature of their respective State. Section Three:  Neither Congress, the President, nor any Federal Court shall make any law, rule, regulation, or order that does not apply equally to themselves and all citizens of the United States.   Nor shall Congress, the President, or any Federal Court cause or allow any law, rule, regulation, or order to be made by any agent or agency of the Federal Government that does not apply equally to themselves and all citizens of the United States.
  • Section Four:    Neither Congress nor the President shall receive any publically-funded retirement or benefit beyond appropriate pay not available to all citizens of the United States. Section Five:    Section Four shall not apply to members of Congress or Presidents, serving or retired, at the time of the ratification of this amendment. Section Six:      The President shall be subject to popular recall by his/her constituency.   Within 90 days of the ratification of this amendment Congress shall pass legislation governing the recall of the President.   In the event Congress fails to pass the required legislation within the required 90 days, the President shall be considered to have been recalled and a new election held within 60 days. Section Seven: Members of Congress shall be subject to popular recall by their respective constituencies, unless the Seventeenth Amendment to the Constitution of the United States is repealed, in which case only members of the House of Representatives shall be subject to popular recall.   Within 90 days of the ratification of this amendment each State shall pass legislation governing the recall of its Congressional Delegation.   In the event a State fails to pass the required legislation within the required 90 days, that State's Congressional Delegation shall be considered to have been recalled and new elections held within 60 days."
  • ...6 more annotations...
  • NUMBER THREE: "Congress shall make and the President shall sign a Balanced Federal Budget every year and before the beginning of the ensuing fiscal year.   In the event Congress and the President fail to make said Balanced Federal Budget before the beginning of the ensuing fiscal year, the last Constitutionally passed and signed Federal Budget shall go into effect and shall be the Federal Budget for the entirety of the ensuing fiscal year.   Balanced shall be defined as expenditures not to exceed revenues except in time of war as declared by Congress.   Revenues shall be defined as monies received; not monies predicted, anticipated, or forecasted.   Unfunded liabilities, obligations, and/or mandates shall be included in the calculation of the Balanced Federal Budget."
  • NUMBER FOUR: "The Fourteenth, Sixteenth, and Seventeenth Amendments to the Constitution of the United States are hereby repealed.   All Federal agencies, programs, laws, rules, regulations, and/or orders created, passed, or handed down as a direct or indirect result of the Fourteenth, Sixteenth, and/or Seventeenth Amendments are hereby stricken from Law, declared null and void, and have no force of effect."
  • NUMBER FIVE: "Section One:     Only persons born of two parents, both of whom are citizens of the United States at the time of the birth of the person, shall be citizens of the United States unless naturalized under the terms and conditions of the Constitution of the United States. Section Two:      Only United States Citizens shall enjoy or receive all rights, benefits, and privileges of United States Citizenship. Section Three:   Non-citizens shall not receive, directly or indirectly, Federal or Constitutional benefits, privileges, or protections."
  • NUMBER SIX:   "The several States are hereby empowered, individually or collectively, to enforce the Constitution of the United States and Federal Law, within their respective borders, regardless of Federal resistance or objections."
  • NUMBER SEVEN:   "Section One:   The Second Amendment to the Constitution of the United States shall be interpreted to mean the FUNDAMENTAL right of individual citizens and/or groups of citizens to keep and bear arms; in their homes and/or other properties, in public and private, and on their persons. Section Two:    Non-citizens and persons convicted of a violent felony by a jury of their peers do not have this right."
  • NUMBER EIGHT: "The First Amendment to the Constitution of the United States shall not be interpreted to prohibit or restrict the peaceful, free exercise or expression of religion, in public or private, or in or on public property."
  •  
    "Possible Constitutional Amendments in the event of an Article V Convention of States Posted by Oren Long on January 12, 2015 at 3:42am in Tea PartyView Discussions ARTICLE V CONVENTION OF STATES; ARE YOU WILLING TO CHANGE THE STATUS QUO IN D.C.?   One of our astute and true conservative members of this site has drafted suggested changes to the Constitution to be proposed in an Article V, Convention of States. I know many of you have seen his postings on here about this issue. Mr. Oren Long is very knowledgeable and well educated and has honorably served our country. He has put a tremendous amount of time and thought into ways to, in his words, "armor and reinforce" the Constitution and return it to its Original Intent, as envisioned by the Founders. Therefore, because I agree with every one of his suggested changes, I am publishing it for him, with his permission. I truly hope that we, as a group, as conservatives and as a people who believe that our country is heading toward disaster, because of the course we are on, I fully endorse his recommended suggestions. I believe that we must take any and every course of action we can to "stop the madness" It is quite long, so PLEASE take the time to read each and every one of them. I am sure that some or many, may have suggestions to this document and they are welcome and open to discussion. If you agree with this, please call your State elected officials and urge them to get on board with an Article V Convention of States. To review or obtain more information of this process, please visit one of these sites:    http://www.conventionofstates.com/           http://www.cosaction.com/              To Whom It May Concern, The following is neither sanctioned by nor proposed by the Article V Convention of States Project.   Rather, it is entirely my work as a volunteer for the Convention of States Project.   To give you an overview of the kinds of amendments that may or may not be consid
Paul Merrell

White House defends 'Cuban Twitter' to stir unrest - Yahoo News - 0 views

  • The Obama administration defended its creation of a Twitter-like Cuban communications network to undermine the communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval.
  • But two senior Democrats on congressional intelligence and judiciary committees said Thursday they had known nothing about the effort, which one of them described as "dumb, dumb, dumb." A showdown with that senator's panel is expected next week, and the Republican chairman of a House oversight subcommittee said that it, too, would look into the program.An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform.First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent.
  • Yet its users were neither aware it was created by a U.S. agency with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes.It is unclear whether the scheme was legal under U.S. law, which requires written authorization of covert action by the president as well as congressional notification. White House spokesman Jay Carney said he was not aware of individuals in the White House who had known about the program.
  • ...9 more annotations...
  • USAID's top official, Rajiv Shah, is scheduled to testify on Tuesday before the Senate Appropriations State Department and Foreign Operations Subcommittee, on the agency's budget. The subcommittee's chairman, Patrick Leahy, a Democrat, is the senator who called the project "dumb, dumb, dumb" during an appearance Thursday on MSNBC.The administration said early Thursday that it had disclosed the initiative to Congress — Carney said the program had been "debated in Congress" — but hours later the narrative had shifted to say that the administration had offered to discuss funding for it with the congressional committees that approve federal programs and budgets."We also offered to brief our appropriators and our authorizers," said State Department spokeswoman Marie Harf. She added that she was hearing on Capitol Hill that many people support these kinds of democracy promotion programs. And some lawmakers did speak up on that subject. But by late Thursday no members of Congress had acknowledged being aware of the Cuban Twitter program earlier than this week.
  • Harf described the program as "discreet" but said it was in no way classified or covert. Harf also said the project, dubbed ZunZuneo, did not rise to a level that required the secretary of state to be notified. Neither former Secretary of State Hillary Rodham Clinton nor John Kerry, the current occupant of the office, was aware of ZunZuneo, she said.In his prior position as chairman of the Senate Foreign Relations Committee, Kerry had asked congressional investigators to examine whether or not U.S. democracy promotion programs in Cuba were operated according to U.S. laws, among other issues. The resulting report, released by the Government Accountability Office in January 2013, does not examine whether or not the programs were covert. It does not say that any U.S. laws were broken.The GAO report does not specifically refer to ZunZuneo, but does note that USAID programs included "support for the development of independent social networking platforms."
  • "I know they said we were notified," Leahy told AP. "We were notified in the most oblique way, that nobody could understand it. I'm going to ask two basic questions: Why weren't we specifically told about this if you're asking us for money? And secondly, whose bright idea was this anyway?"The Republican chairman of a House oversight subcommittee said his panel will be looking into the project, too."That is not what USAID should be doing," said Rep. Jason Chaffetz, the Republican chairman of the House Oversight and Government Reform National Security Subcommittee. "USAID is flying the American flag and should be recognized around the globe as an honest broker of doing good. If they start participating in covert, subversive activities, the credibility of the United States is diminished."
  • At minimum, details uncovered by the AP appear to muddy the USAID's longstanding claims that it does not conduct covert actions, and the details could undermine the agency's mission to deliver aid to the world's poor and vulnerable — an effort that requires the trust and cooperation of foreign governments.Leahy and Rep. C.A. Dutch Ruppersberger, the top Democrat on the House Intelligence Committee, said they were unaware of ZunZuneo.
  • USAID and its contractors went to extensive lengths to conceal Washington's ties to the project, according to interviews and documents obtained by the AP. They set up front companies in Spain and the Cayman Islands to hide the money trail, and recruited CEOs without telling them they would be working on a U.S. taxpayer-funded project."There will be absolutely no mention of United States government involvement," according to a 2010 memo from Mobile Accord Inc., one of the project's creators. "This is absolutely crucial for the long-term success of the service and to ensure the success of the Mission."ZunZuneo was publicly launched shortly after the 2009 arrest in Cuba of American contractor Alan Gross. He was imprisoned after traveling repeatedly to the country on a separate, clandestine USAID mission to expand Internet access using sensitive technology that only governments use.The AP obtained more than 1,000 pages of documents about the ZunZuneo project's development. It independently verified the project's scope and details in the documents through publicly available databases, government sources and interviews with those involved.
  • The social media project began after Washington-based Creative Associates International obtained a half-million Cuban cellphone numbers. It was unclear to the AP how the numbers were obtained, although documents indicate they were done so illicitly from a key source inside the country's state-run provider. Project organizers used those numbers to start a subscriber base.ZunZuneo's organizers wanted the social network to grow slowly to avoid detection by the Cuban government. Eventually, documents and interviews reveal, they hoped the network would reach critical mass so that dissidents could organize "smart mobs" — mass gatherings called at a moment's notice — that could trigger political demonstrations, or "renegotiate the balance of power between the state and society."At a 2011 speech at George Washington University, Clinton said the U.S. helps people in "oppressive Internet environments get around filters." Noting Tunisia's role in the Arab Spring, she said people used technology to help "fuel a movement that led to revolutionary change."Suzanne Hall, then a State Department official working on Clinton's social media efforts, helped spearhead an attempt to get Twitter founder Jack Dorsey to take over the ZunZuneo project, documents indicate. Dorsey declined to comment.
  • The estimated $1.6 million spent on ZunZuneo was publicly earmarked for an unspecified project in Pakistan, public government data show, but those documents don't reveal where the funds were actually spent.ZunZuneo's organizers worked hard to create a network that looked like a legitimate business, including the creation of a companion website — and marketing campaign — so users could subscribe and send their own text messages to groups of their choice."Mock ad banners will give it the appearance of a commercial enterprise," one written proposal obtained by the AP said. Behind the scenes, ZunZuneo's computers were also storing and analyzing subscribers' messages and other demographic information, including gender, age, "receptiveness" and "political tendencies." USAID believed the demographics on dissent could help it target its other Cuba programs and "maximize our possibilities to extend our reach."
  • Executives set up a corporation in Spain and an operating company in the Cayman Islands — a well-known British offshore tax haven — to pay the company's bills so the "money trail will not trace back to America," a strategy memo said. Disclosure of that connection would have been a catastrophic blow, they concluded, because it would undermine the service's credibility with subscribers and get it shut down by the Cuban government.Similarly, subscribers' messages were funneled through two other countries — and never through American-based computer servers.Denver-based Mobile Accord considered at least a dozen candidates to head the European front company. One candidate, Francoise de Valera, told the AP she was told nothing about Cuba or U.S. involvement.
  • James Eberhard, Mobile Accord's CEO and a key player in the project's development, declined to comment. Creative Associates referred questions to USAID.For more than two years, ZunZuneo grew, reaching at least 40,000 subscribers. But documents reveal the team found evidence Cuban officials tried to trace the text messages and break into the ZunZuneo system. USAID told the AP that ZunZuneo stopped in September 2012 when a government grant ended.
  •  
    More coming related to this story.
Paul Merrell

Tomgram: Engelhardt, Who Rules Washington? | TomDispatch - 0 views

  • As every schoolchild knows, there are three check-and-balance branches of the U.S. government: the executive, Congress, and the judiciary. That’s bedrock Americanism and the most basic high school civics material. Only one problem: it’s just not so. During the Cold War years and far more strikingly in the twenty-first century, the U.S. government has evolved.  It sprouted a fourth branch: the national security state, whose main characteristic may be an unquenchable urge to expand its power and reach.  Admittedly, it still lacks certain formal prerogatives of governmental power.  Nonetheless, at a time when Congress and the presidency are in a check-and-balance ballet of inactivity that would have been unimaginable to Americans of earlier eras, the Fourth Branch is an ever more unchecked and unbalanced power center in Washington.  Curtained off from accountability by a penumbra of secrecy, its leaders increasingly are making nitty-gritty policy decisions and largely doing what they want, a situation illuminated by a recent controversy over the possible release of a Senate report on CIA rendition and torture practices.
  • All of this is or should be obvious, but remains surprisingly unacknowledged in our American world. The rise of the Fourth Branch began at a moment of mobilization for a global conflict, World War II.  It gained heft and staying power in the Cold War of the second half of the twentieth century, when that other superpower, the Soviet Union, provided the excuse for expansion of every sort.  Its officials bided their time in the years after the fall of the Soviet Union, when “terrorism” had yet to claim the landscape and enemies were in short supply.  In the post-9/11 era, in a phony “wartime” atmosphere, fed by trillions of taxpayer dollars, and under the banner of American “safety,” it has grown to unparalleled size and power.  So much so that it sparked a building boom in and around the national capital (as well as elsewhere in the country).  In their 2010 Washington Post series “Top Secret America,” Dana Priest and William Arkin offered this thumbnail summary of the extent of that boom for the U.S. Intelligence Community: “In Washington and the surrounding area,” they wrote, “33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings -- about 17 million square feet of space.”  And in 2014, the expansion is ongoing.
  • In this century, a full-scale second “Defense Department,” the Department of Homeland Security, was created.  Around it has grown up a mini-version of the military-industrial complex, with the usual set of consultants, K Street lobbyists, political contributions, and power relations: just the sort of edifice that President Eisenhower warned Americans about in his famed farewell address  in 1961.  In the meantime, the original military-industrial complex has only gained strength and influence. Increasingly, post-9/11, under the rubric of “privatization,” though it should more accurately have been called “corporatization,” the Pentagon took a series of crony companies off to war with it.  In the process, it gave “capitalist war” a more literal meaning, thanks to its wholesale financial support of, and the shrugging off of previously military tasks onto, a series of warrior corporations. Meanwhile, the 17 members of the U.S. Intelligence Community -- yes, there are 17 major intelligence outfits in the national security state -- have been growing, some at prodigious rates.  A number of them have undergone their own versions of corporatization, outsourcing many of their operations to private contractors in staggering numbers, so that we now have “capitalist intelligence” as well.  With the fears from 9/11 injected into society and the wind of terrorism at their backs, the Intelligence Community has had a remarkably free hand to develop surveillance systems that are now essentially “watching” everyone -- including, it seems, other branches of the government.
  • ...4 more annotations...
  • From the Pentagon to the Department of Homeland Security to the labyrinthine world of intelligence, the rise to power of the national security state has been a spectacle of our time.  Whenever news of its secret operations begins to ooze out, threatening to unnerve the public, the White House and Congress discuss “reforms” which will, at best, modestly impede the expansive powers of that state within a state.  Generally speaking, its powers and prerogatives remain beyond constraint by that third branch of government, the non-secret judiciary.  It is deferred to with remarkable frequency by the executive branch and, with the rarest of exceptions, it has been supported handsomely with much obeisance and few doubts by Congress. And also keep in mind that, of the four branches of government, only two of them -- an activist Supreme Court and the national security state -- seem capable of functioning in a genuine policymaking capacity at the moment.
  • In that light, let’s turn to a set of intertwined events in Washington that have largely been dealt with in the media as your typical tempest in a teapot, a catfight among the vested and powerful.  I’m talking about the various charges and countercharges, anger, outrage, and irritation, as well as news of acts of seeming illegality now swirling around a 6,300-page CIA “torture report” produced but not yet made public by the Senate Intelligence Committee.  This ongoing controversy reveals a great deal about the nature of the checks and balances on the Fourth Branch of government in 2014.
  • Fourteen years into the twenty-first century, we’re so used to this sort of thing that we seldom think about what it means to let the CIA -- accused of a variety of crimes -- be the agency to decide what exactly can be known by the public, in conjunction with a deferential White House.  The Agency’s present director, it should be noted, has been a close confidant and friend of the president and was for years his key counterterrorism advisor.  To get a sense of what all this really means, you need perhaps to imagine that, in 2004, the 9/11 Commission was forced to turn its report over to Osama bin Laden for vetting and redaction before releasing it to the public.  Extreme as that may sound, the CIA is no less a self-interested party. And this interminable process has yet to end, although the White House is supposed to release something, possibly heavily redacted, as early as this coming week or perhaps in the dog days of August.
  • The fact is that, for the Fourth Branch, this remains the age of impunity.  Hidden in a veil of secrecy, bolstered by secret law and secret courts, surrounded by its chosen corporations and politicians, its power to define policy and act as it sees fit in the name of American safety is visibly on the rise.  No matter what setbacks it experiences along the way, its urge to expand and control seems, at the moment, beyond staunching.  In the context of the Senate’s torture report, the question at hand remains: Who rules Washington?
  •  
    The indefatigable and perceptive Tom Englehardt finds formally secret features of the Dark State revealed in the ongoing political jockeying involving the CIA's torture, black prisons, and extarordinary rendition program. 
Paul Merrell

How the U.S. Uses Surveillance and Scandal to Advance Its Global Control | Alternet - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.For well over a century, from the pacification of the Philippines in 1898 to trade negotiations with the European Union today, surveillance and its kissing cousins, scandal and scurrilous information, have been key weapons in Washington’s search for global dominion. Not surprisingly, in a post-9/11 bipartisan exercise of executive power, George W. Bush and Barack Obama have presided over building the NSA step by secret step into a digital panopticon designed to monitor the communications of every American and foreign leaders worldwide.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies.Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  •  
    Excellent, detailed, and heavily referenced with hyperlinks. A history of U.S. use of intelligence for blackmail purposes. The author makes the case that with the U.S. empire and economy waning, the U.S. has found an extremely inexpensive method to project power by blackmail.
Gary Edwards

Federal Loans Fund Big-Ticket Energy Projects At Firms Outside Of U.S. | Fox News - 0 views

  •  
    Solyndra II - The Spanish company, Abenoga has recieved a massive DOE taxpayer funded "investment".  Looks like another example of corrupt Obama crony socialism and blatant money laundering for the Socialist party, USA. According to the U.S. Energy Information Administration (EIA), such solar thermal power is far and away the most expensive option that it considered in projecting the cost of new electricity technologies over the next four years.Using a complex calculation known as "levelized cost," EIA says that solar thermal energy will weigh in at $311.60 per megawatt/hour, vs. $210.70 for more conventional solar paneling, and $113.90 for "advanced nuclear."Click here for the EIA cost estimatesCompared to more conventional energy sources, solar thermal is even pricier -- much pricier. The EIA says that natural gas-fueled energy plants, even using advanced techniques to remove carbon from their emissions, would cost $89.3 per megawatt/hour, while ordinary gas fueled natural gas generation would cost $66.10.A conventional coal-fired electrical plant -- anathema in green circles -- would provide energy at $94.80 per megawatt/hour, and one equipped with "clean" coal technology and sequestration of carbon emissions would provide electricity at a cost of $136.20 per megawatt/hour.The second-most pricey option on the EIA list, after solar thermal, is energy from wind turbines placed in the ocean, which comes in at $243.20 per megawatt/hour.In other words, even that difficult and costly-to-produce energy source is projected to cost only three-quarters as much. Read more: http://www.foxnews.com/politics/2011/09/22/federal-loans-fund-big-ticket-energy-projects-at-firms-outside-us/?intcmp=obinsite#ixzz1Zs0en100
Paul Merrell

Growing the Russia-China New Relationship | New Eastern Outlook - 0 views

  • Russia and China have agreed to build a 7,000-kilometer high-speed rail link from Beijing to Moscow, at a cost of $242 billion, almost a quarter trillion dollars, according to the Beijing city government. The journey from Beijing to Moscow would take two days on a route passing through Kazakhstan. It will take take eight to 10 years to build. The rail project is the most ambitious rail infrastructure project in the Eurasian history, even surpassing the Trans-Siberian Railway project across Russia. The new Beijing-Moscow highspeed rail corridor shown in yellow will transform the economic space of Eurasia In October, 2014, China and Russia signed an agreement to build the first leg of the Beijing-Moscow high-speed rail link. That specified that Chinese firms and their Russian partners will construct a 770-km high-speed line connecting Moscow and Kazan, an important metropolis on the Volga River, en route to Beiing. Then last November as US sanctions and the US-engineered oil price collapse added a new urgency to the project, Alexander Misharin, vice-president at state-owned OAO Russian Railways, said a section would cost $60 billion to reach Russia’s border, and would cut the Beijing-Moscow journey from five days to 30 hours. Misharin at the time compared the new transport network to the Suez Canal “in terms of scale and significance.” In reality, it has the potential to far exceed the Suez Canal as it serves to unify a high-speed transport network integration vast new markets across Eurasia from Beijing to Moscow that draw in some 4.4 billion of the world populationFirst appeared: http://journal-neo.org/2015/01/31/growing-the-russia-china-new-relationship/
  •  
    In related news, the U.S. Department of Defense Advanced Research Projects Agency has scheduled a meeting of prospective contractors on February 21 to gather expressions of interest in designing and building a nuclear-powered space station weapons platform capable of powering a directed beam energy weapon designed to melt hundreds of miles of railroad track on each orbit of the Earth.  http://www.example.com
Gary Edwards

Jim Kunstler's 2014 Forecast - Burning Down The House | Zero Hedge - 0 views

  •  
    Incredible must read analysis. Take away: the world is going to go "medevil". It's the only way out of this mess. Since the zero hedge layout is so bad, i'm going to post as much of the article as Diigo will allow: Jim Kunstler's 2014 Forecast - Burning Down The House Submitted by Tyler Durden on 01/06/2014 19:36 -0500 Submitted by James H. Kunstler of Kunstler.com , Many of us in the Long Emergency crowd and like-minded brother-and-sisterhoods remain perplexed by the amazing stasis in our national life, despite the gathering tsunami of forces arrayed to rock our economy, our culture, and our politics. Nothing has yielded to these forces already in motion, so far. Nothing changes, nothing gives, yet. It's like being buried alive in Jell-O. It's embarrassing to appear so out-of-tune with the consensus, but we persevere like good soldiers in a just war. Paper and digital markets levitate, central banks pull out all the stops of their magical reality-tweaking machine to manipulate everything, accounting fraud pervades public and private enterprise, everything is mis-priced, all official statistics are lies of one kind or another, the regulating authorities sit on their hands, lost in raptures of online pornography (or dreams of future employment at Goldman Sachs), the news media sprinkles wishful-thinking propaganda about a mythical "recovery" and the "shale gas miracle" on a credulous public desperate to believe, the routine swindles of medicine get more cruel and blatant each month, a tiny cohort of financial vampire squids suck in all the nominal wealth of society, and everybody else is left whirling down the drain of posterity in a vortex of diminishing returns and scuttled expectations. Life in the USA is like living in a broken-down, cob-jobbed, vermin-infested house that needs to be gutted, disinfected, and rebuilt - with the hope that it might come out of the restoration process retaining the better qualities of our heritage.
Paul Merrell

The Money Trail: How the US Fostered Yemen's Separatist Movement / Sputnik International - 0 views

  • As Saudi Arabia and its allies have begun the bombing campaign against Yemen, in the south, a separatist movement calling for a "State of South Arabia" is emerging. Fostered by the US, it will leave the Houthis with two hostile states at their borders and locked access to the sea, if it succeeds.
  • Welcome to phase two of US regime change operations. After Yemen's 2011 revolution failed and Houthi militias overthrew President Hadi, forces trained and sponsored by the US government are being activated as a separatist movement. The Southern People's Committees (SPC), founded around 2007 although USAID has been conducting political workshops as part of a $695,000 project and actively grooming leadership in Yemen since 2005. (Also in 2007, weekly protests began, organized by women's organizations, fostered by the workshops.) The SPC were similar to many color revolution movements such as Serbia's Otpor in that they did not have a central leadership, but rather an autonomous cell-based organization. In addition, they were very capable in the use of social media technologies, text messaging and the circumventing the government's internet censorship to organize protests.
  • Meanwhile, the Yemen Center for Human Rights Studies, which received $193,000 from the EU and US-funded Foundation for the Future in 2009, conducted a poll in January 2010, which found that 70 percent of southern Yemenis favored secession. Another USAID-funded project, the $43 million Responsive Governance Project (RGP), launched in May 2010, conducted "New Social Media training for Youth leaders to equip Yemeni youth groups in the use of media to enhance their participation in formulating public issues." The project focuses on establishing contacts with the Yemeni government and providing "leadership and civic education training to youth NGOs."
  • ...5 more annotations...
  • At the same time, USAID funded a $3.58 million project called Promoting Youth for Civic Engagement (PYCE) to train Aden youth " in PACA [political activity training], first aid, self-defense, photography, calligraphy and various other topics," including "media skills," according to an evaluation report of the PYCE Project, conducted in 2012. The project was constrained to Aden and did not conduct workshops in the northern capital, Sanaa, after reportedly receiving threats.
  • The project is presented as a youth "sports program," and although it does include basketball, handball and chess, these were not the primary goal, as the report shows. At the same time, first aid, self-defense, photography and calligraphy (making protest signs) sound a lot more like protest tactics than sports. The program, initially planned to last for two years, did not make any progress reports after March 2012, when President Hadi assumed power. After the 2011 revolution, the SPC became more of a military outfit and took part in a fight against al-Qaeda in Yemen, which coincided with the CIA's expanded drone campaign in the area. This is also where the organization fades from public view when it comes to USAID expense reports, as the organization appeared to lose interest in developing democracy in the country. In a June 4, 2012 a field commander of the People's Committees gave an interview to the Yemen Times, in which he described the group's fight against the Ansar al-Sharia Islamists together with the government.
  • However, the group reappeared in public view on September 23 2014, two days after Houthis took control of Sanaa, and issued a statement in which they call on security forces to "undertake its historical role in providing security and maintaining people's property because it is in order to preserve the revolution, which is the most important accomplishment achieved by the Yemeni people." At the same time, in southern Yemen, the People's Committee has been very active on Facebook and Twitter since around October 2014. The Facebook and Twitter pages publish slick anti-Houthi propaganda and call for separatism and a "State of South Arabia," within the bounds of former South Yemen, and using South Yemen's flag
  • Since mid-March, the SPC have been fighting against Houthis and see Saudi Arabia as an ally of convenience, although some of their social media accounts, Saudi Arabia's King Salman and other royal family figures are glorified. However, the splitting of Yemen benefits Saudi Arabia, as it secludes the Houthis to a smaller Northern Yemen, which would be surrounded by two hostile states, with Saudi Arabia to the north and the new South Arabia to the south, which would also control access to the sea at the Gulf of Aden. The current situation has considerable parallels with Ukraine, which has led the Russian Foreign Minister Sergei Lavrov to call the situation one of "obvious double standards, but we clearly did not want neither what is happening in Ukraine, nor what is happening in Yemen."
  • Indeed, while Russia has been repeatedly accused of helping Donbas independence supporters, the US has openly fostered the south Yemen separatist movement. At the same time, while Ukraine's President Yanukovych was called illegitimate by the US after fleeing the country, Yemen's Hadi has remained "legitimate" and has even called for a Saudi Arabian military operation against the people who ousted him. The ongoing conflict in Yemen is currently at the second phase of US regime change operations, rebel conflict. The first stage, the color revolution, has failed, and now the last stop, foreign intervention and ground invasion remains. Saudi Arabia and its Gulf allies have already begun the airstrikes, and the South Arabia movement has begun its separatist campaign.
  •  
    Looks like Obama's drone attacks in Yemen were not enough to do the job.
  •  
    Turns out that the U.S. has been covertly rocking Yemen heavily at least since the Clinton Administration, including naval bombardment, drone strikes, cruise missiles, et cet.: Ongoing detailed compilations of U.S. covert and military actions in Yemen. (Publication dates are for first entry in compilations.) Methodology: http://www.thebureauinvestigates.com/2011/08/10/pakistan-drone-strikes-the-methodology2/ Drones Team, Yemen: reported US covert actions 2001-2011, The Bureau of Investigative Journalism (29 March 2012), http://www.thebureauinvestigates.com/2012/03/29/yemen-reported-us-covert-actions-since-2001/ (includes data through 2014). Jack Serle, Yemen: Reported US covert actions 2015, The Bureau of Investigative Journalism (26 January 2015),http://www.thebureauinvestigates.com/2015/01/26/yemen-reported-us-covert-actions-2015/
Paul Merrell

Trump's Infrastructure Boondoggle - 0 views

  • Donald Trump’s $1 trillion infrastructure plan is not an infrastructure plan and it won’t put $1 trillion of fiscal stimulus into the economy. It’s basically a scheme for handing over public assets to private corporations that will extract maximum profits via user fees and tolls. Because the plan is essentially a boondoggle, it will not lift the economy out of the doldrums, increase activity or boost growth.  Quite the contrary. When the details of how the program is going to be implemented are announced,  public confidence in the Trump administration is going to wither and stock prices are going to plunge.   This scenario cannot be avoided because the penny-pinching conservatives in the House and Senate have already said that they won’t support any plan that is not “revenue neutral” which means that any real $1 trillion spending package is a dead letter.  Thus, it’s only a matter of time before the Trump’s plan is exposed as a fraud and the sh** hits the fan.
  • Here are more of the details from an article at Slate: “Under Trump’s plan…the federal government would offer tax credits to private investors interested in funding large infrastructure projects, who would put down some of their own money up front, then borrow the rest on the private bond markets. They would eventually earn their profits on the back end from usage fees, such as highway and bridge tolls (if they built a highway or bridge) or higher water rates (if they fixed up some water mains). So instead of paying for their new roads at tax time, Americans would pay for them during their daily commute. And of course, all these private developers would earn a nice return at the end of the day.” (“Donald Trump’s Plan to Privatize America’s Roads and Bridges”, Slate) Normally, fiscal stimulus is financed by increasing the budget deficits, but Maestro Trump has something else up his sleeve.  He wants the big construction companies and private equity firms to stump up the seed money and start the work with the understanding that they’ll be able to impose user fees and tolls on roads and bridges when the work is completed.  For every dollar that corporations spend on rebuilding US infrastructure, they’ll get a dollar back via tax credits, which means that they’ll end up controlling valuable, revenue-generating assets for nothing. The whole thing is a flagrant ripoff that stinks to high heaven.   The corporations rake in hefty profits on sweetheart deals, while the American people get bupkis. Welcome to Trumpworld.  Here’s more background from Trump’s campaign website:
  • “American Energy and  Infrastructure Act Leverages public-private partnerships, and private investments through tax incentives, to spur $1 trillion in infrastructure investment over ten years. It is revenue neutral.” (Donald Trump’s Contract with the American Voter”) In practical terms, ‘revenue neutral’ means that every dollar of new spending has to be matched by cuts to other government programs.  So, if there are hidden costs to Trump’s plan, then they’ll have to be paid for by slashing funds for Medicare, Medicaid, Social Security, food stamps etc. But, keep in mind, these other programs are much more effective sources of stimulus since the money goes directly to the people who spend it immediately and help grow the economy. Trump’s infrastructure plan doesn’t work like that. A lot of the money will go towards management fees and operational costs leaving fewer dollars to trickle down to low-paid construction workers whose personal consumption drives the economy. Less money for workers means less spending, less activity and weaker growth.
  • ...3 more annotations...
  • Here’s more on the topic from the Washington Post: “Trump’s plan is not really an infrastructure plan. It’s a tax-cut plan for utility-industry and construction-sector investors, and a massive corporate welfare plan for contractors. The Trump plan doesn’t directly fund new roads, bridges, water systems or airports…. Instead, Trump’s plan provides tax breaks to private-sector investors who back profitable construction projects. … There’s no requirement that the tax breaks be used for … expanded construction efforts; they could all go just to fatten the pockets of investors in previously planned projects… Second, as a result of the above, Trump’s plan isn’t really a jobs plan, either. Because the plan subsidizes investors, not projects; because it funds tax breaks, not bridges; because there’s no requirement that the projects be otherwise unfunded, there is simply no guarantee that the plan will produce any net new hiring. … Buried inside the plan will be provisions to weaken prevailing wage protections on construction projects, undermining unions and ultimately eroding workers’ earnings. Environmental rules are almost certain to be gutted in the name of accelerating projects.” (Trump’s big infrastructure plan? It’s a trap. Washington Post) Let’s summarize:  “Trump’s plan” is “massive corporate welfare plan for contractors” and the “tax breaks”…”could all go just to fatten the pockets of investors in previously planned projects.”
  • What part of this plan looks like it will have a positive impact on the economy? None. If Trump was serious about raising GDP to 4 percent, (another one of his promises) he’d increase Social Security payments, beef up the food stamps program, or hire more government workers.  Any one of these would trigger an immediate uptick in activity spurring more growth and a stronger economy.  And while America’s ramshackle bridges and roads may be in dire need of a facelift,  infrastructure is actually a poor way to inject fiscal stimulus which can be more easily distributed  by simply hiring government agents to stand on streetcorners and hand out 100 dollar bills to passersby. That might not fill the pothole-strewn streets in downtown Duluth, but it would sure as hell would light a fire under GDP. So what’s the gameplan here? What’s Trump really up to? If his infrastructure plan isn’t going to work, then what’s the real objective? The objective is to allow wealthy corporations to buy public assets at firesale prices so they can turn them into profit-generating enterprises. That’s it in a nutshell. That’s why the emphasis is on “unconventional financing programs”, “public-private partnerships”, and “Build America Bonds” instead of plain-old fiscal stimulus, jobs programs and deficit spending. Trump is signaling to his pirate friends in Corporate America that he’ll use his power as executive to find new outlets for profitable investment so they have some place to stick their mountain of money. Of course, none of this has anything to do with rebuilding America’s dilapidated infrastructure or even revving up GDP. That’s just public relations bunkum. What’s really going on is a massive looting operation organized and executed under the watchful eye of Donald Trump, Robber Baron-in-Chief.
  • And Infrastructure is just the tip of the iceberg. Once these kleptomaniacs hit their stride, they’re going to cut through Washington like locusts through a corn field. Bet on it.
  •  
    Mike Whitney always tells it like it is.
Gary Edwards

The obscure legal system that lets corporations sue countries | Claire Provost and Matt... - 0 views

  • Every year on 15 September, thousands of Salvadorans celebrate the date when much of Central America gained independence from Spain. Fireworks are set off and marching bands parade through villages across the country. But, last year, in the town of San Isidro, in Cabañas, the festivities had a markedly different tone. Hundreds had gathered to protest against the mine. Gold mines often use cyanide to separate gold from ore, and widespread concern over already severe water contamination in El Salvador has helped fuel a powerful movement determined to keep the country’s minerals in the ground. In the central square, colourful banners were strung up, calling on OceanaGold to drop its case against the country and leave the area. Many were adorned with the slogan, “No a la mineria, Si a la vida” (No to mining, Yes to life). On the same day, in Washington DC, Parada gathered his notes and shuffled into a suite of nondescript meeting rooms in the World Bank’s J building, across the street from its main headquarters on Pennsylvania Avenue. This is the International Centre for the Settlement of Investment Disputes (ICSID): the primary institution for handling the cases that companies file against sovereign states. (The ICSID is not the sole venue for such cases; there are similar forums in London, Paris, Hong Kong and the Hague, among others.) The date of the hearing was not a coincidence, Parada said. The case has been framed in El Salvador as a test of the country’s sovereignty in the 21st century, and he suggested that it should be heard on Independence Day. “The ultimate question in this case,” he said, “is whether a foreign investor can force a government to change its laws to please the investor as opposed to the investor complying with the laws they find in the country.”
  • Most international investment treaties and free-trade deals grant foreign investors the right to activate this system, known as investor-state dispute settlement (ISDS), if they want to challenge government decisions affecting their investments. In Europe, this system has become a sticking point in negotiations over the controversial Transatlantic Trade and Investment Partnership (TTIP) deal proposed between the European Union and the US, which would massively extend its scope and power and make it harder to challenge in the future. Both France and Germany have said that they want access to investor-state dispute settlement removed from the TTIP treaty currently under discussion. Investors have used this system not only to sue for compensation for alleged expropriation of land and factories, but also over a huge range of government measures, including environmental and social regulations, which they say infringe on their rights. Multinationals have sued to recover money they have already invested, but also for alleged lost profits and “expected future profits”. The number of suits filed against countries at the ICSID is now around 500 – and that figure is growing at an average rate of one case a week. The sums awarded in damages are so vast that investment funds have taken notice: corporations’ claims against states are now seen as assets that can be invested in or used as leverage to secure multimillion-dollar loans. Increasingly, companies are using the threat of a lawsuit at the ICSID to exert pressure on governments not to challenge investors’ actions.
  • “I had absolutely no idea this was coming,” Parada said. Sitting in a glass-walled meeting room in his offices, at the law firm Foley Hoag, he paused, searching for the right word to describe what has happened in his field. “Rogue,” he decided, finally. “I think the investor-state arbitration system was created with good intentions, but in practice it has gone completely rogue.”
  • ...13 more annotations...
  • The quiet village of Moorburg in Germany lies just across the river from Hamburg. Past the 16th-century church and meadows rich with wildflowers, two huge chimneys spew a steady stream of thick, grey smoke into the sky. This is Kraftwerk Moorburg, a new coal-fired power plant – the village’s controversial next-door neighbour. In 2009, it was the subject of a €1.4bn investor-state case filed by Vattenfall, the Swedish energy giant, against the Federal Republic of Germany. It is a prime example of how this powerful international legal system, built to protect foreign investors in developing countries, is now being used to challenge the actions of European governments as well. Since the 1980s, German investors have sued dozens of countries, including Ghana, Ukraine and the Philippines, at the World Bank’s Centre in Washington DC. But with the Vattenfall case, Germany found itself in the dock for the first time. The irony was not lost on those who considered Germany to be the grandfather of investor-state arbitration: it was a group of German businessmen, in the late 1950s, who first conceived of a way to protect their overseas investments as a wave of developing countries gained independence from European colonial powers. Led by Deutsche Bank chairman Hermann Abs, they called their proposal an “international magna carta” for private investors.
  • In the 1960s, the idea was taken up by the World Bank, which said that such a system could help the world’s poorer countries attract foreign capital. “I am convinced,” the World Bank president George Woods said at the time, “that those … who adopt as their national policy a welcome [environment] for international investment – and that means, to mince no words about it, giving foreign investors a fair opportunity to make attractive profits – will achieve their development objectives more rapidly than those who do not.” At the World Bank’s 1964 annual meeting in Tokyo, it approved a resolution to set up a mechanism for handling investor-state cases. The first line of the ICSID Convention’s preamble sets out its goal as “international cooperation for economic development”. There was sharp opposition to this system from its inception, with a bloc of developing countries warning that it would undermine their sovereignty. A group of 21 countries – almost every Latin American country, plus Iraq and the Philippines – voted against the proposal in Tokyo. But the World Bank moved ahead regardless. Andreas Lowenfeld, an American legal academic who was involved in some of these early discussions, later remarked: “I believe this was the first time that a major resolution of the World Bank had been pressed forward with so much opposition.”
  • now governments are discovering, too late, the true price of that confidence. The Kraftwerk Moorburg plant was controversial long before the case was filed. For years, local residents and environmental groups objected to its construction, amid growing concern over climate change and the impact the project would have on the Elbe river. In 2008, Vattenfall was granted a water permit for its Moorburg project, but, in response to local pressure, local authorities imposed strict environmental conditions to limit the utility’s water usage and its impact on fish. Vattenfall sued Hamburg in the local courts. But, as a foreign investor, it was also able to file a case at the ICSID. These environmental measures, it said, were so strict that they constituted a violation of its rights as guaranteed by the Energy Charter Treaty, a multilateral investment agreement signed by more than 50 countries, including Sweden and Germany. It claimed that the environmental conditions placed on its permit were so severe that they made the plant uneconomical and constituted acts of indirect expropriation.
  • With the rapid growth in these treaties – today there are more than 3,000 in force – a specialist industry has developed in advising companies how best to exploit treaties that give investors access to the dispute resolution system, and how to structure their businesses to benefit from the different protections on offer. It is a lucrative sector: legal fees alone average $8m per case, but they have exceeded $30m in some disputes; arbitrators’ fees at start at $3,000 per day, plus expenses.
  • Vattenfall v Germany ended in a settlement in 2011, after the company won its case in the local court and received a new water permit for its Moorburg plant – which significantly lowered the environmental standards that had originally been imposed, according to legal experts, allowing the plant to use more water from the river and weakening measures to protect fish. The European Commission has now stepped in, taking Germany to the EU Court of Justice, saying its authorisation of the Moorburg coal plant violated EU environmental law by not doing more to reduce the risk to protected fish species, including salmon, which pass near the plant while migrating from the North Sea. A year after the Moorburg case closed, Vattenfall filed another claim against Germany, this time over the federal government’s decision to phase out nuclear power. This second suit – for which very little information is available in the public domain, despite reports that the company is seeking €4.7bn from German taxpayers – is still ongoing. Roughly one third of all concluded cases filed at the ICSID are recorded as ending in “settlements”, which – as the Moorburg dispute shows – can be very profitable for investors, though their terms are rarely fully disclosed.
  • “It was a total surprise for us,” the local Green party leader Jens Kerstan laughed, in a meeting at his sunny office in Hamburg last year. “As far as I knew, there were some [treaties] to protect German companies in the [developing] world or in dictatorships, but that a European company can sue Germany, that was totally a surprise to me.”
  • While a tribunal cannot force a country to change its laws, or give a company a permit, the risk of massive damages may in some cases be enough to persuade a government to reconsider its actions. The possibility of arbitration proceedings can be used to encourage states to enter into meaningful settlement negotiations.
  • A small number of countries are now attempting to extricate themselves from the bonds of the investor-state dispute system. One of these is Bolivia, where thousands of people took to the streets of the country’s third-largest city, Cochabamba, in 2000, to protest against a dramatic hike in water rates by a private company owned by Bechtel, the US civil engineering firm. During the demonstrations, the Bolivian government stepped in and terminated the company’s concession. The company then filed a $50m suit against Bolivia at the ICSID. In 2006, following a campaign calling for the case to be thrown out, the company agreed to accept a token payment of less than $1. After this expensive case, Bolivia cancelled the international agreements it had signed with other states giving their investors access to these tribunals. But getting out of this system is not easily done. Most of these international agreements have sunset clauses, under which their provisions remain in force for a further 10 or even 20 years, even if the treaties themselves are cancelled.
  • There are now thousands of international investment agreements and free-trade acts, signed by states, which give foreign companies access to the investor-state dispute system, if they decide to challenge government decisions. Disputes are typically heard by panels of three arbitrators; one selected by each side, and the third agreed upon by both parties. Rulings are made by majority vote, and decisions are final and binding. There is no appeals process – only an annulment option that can be used on very limited grounds. If states do not pay up after the decision, their assets are subject to seizure in almost every country in the world (the company can apply to local courts for an enforcement order).
  • While there is no equivalent of legal aid for states trying to defend themselves against these suits, corporations have access to a growing group of third-party financiers who are willing to fund their cases against states, usually in exchange for a cut of any eventual award.
  • Increasingly, these suits are becoming valuable even before claims are settled. After Rurelec filed suit against Bolivia, it took its case to the market and secured a multimillion-dollar corporate loan, using its dispute with Bolivia as collateral, so that it could expand its business. Over the last 10 years, and particularly since the global financial crisis, a growing number of specialised investment funds have moved to raise money through these cases, treating companies’ multimillion-dollar claims against states as a new “asset class”.
  • El Salvador has already spent more than $12m defending itself against Pacific Rim, but even if it succeeds in beating the company’s $284m claim, it may never recover these costs. For years Salvadoran protest groups have been calling on the World Bank to initiate an open and public review of ICSID. To date, no such study has been carried out. In recent years, a number of ideas have been mooted to reform the international investor-state dispute system – to adopt a “loser pays” approach to costs, for example, or to increase transparency. The solution may lie in creating an appeals system, so that controversial judgments can be revisited.
  • Brazil has never signed up to this system – it has not entered into a single treaty with these investor-state dispute provisions – and yet it has had no trouble attracting foreign investment.
  •  
    "Luis Parada's office is just four blocks from the White House, in the heart of K Street, Washington's lobbying row - a stretch of steel and glass buildings once dubbed the "road to riches", when influence-peddling became an American growth industry. Parada, a soft-spoken 55-year-old from El Salvador, is one of a handful of lawyers in the world who specialise in defending sovereign states against lawsuits lodged by multinational corporations. He is the lawyer for the defence in an obscure but increasingly powerful field of international law - where foreign investors can sue governments in a network of tribunals for billions of dollars. Fifteen years ago, Parada's work was a minor niche even within the legal business. But since 2000, hundreds of foreign investors have sued more than half of the world's countries, claiming damages for a wide range of government actions that they say have threatened their profits. In 2006, Ecuador cancelled an oil-exploration contract with Houston-based Occidental Petroleum; in 2012, after Occidental filed a suit before an international investment tribunal, Ecuador was ordered to pay a record $1.8bn - roughly equal to the country's health budget for a year. (Ecuador has logged a request for the decision to be annulled.) Parada's first case was defending Argentina in the late 1990s against the French conglomerate Vivendi, which sued after the Argentine province of Tucuman stepped in to limit the price it charged people for water and wastewater services. Argentina eventually lost, and was ordered to pay the company more than $100m. Now, in his most high-profile case yet, Parada is part of the team defending El Salvador as it tries to fend off a multimillion-dollar suit lodged by a multinational mining company after the tiny Central American country refused to allow it to dig for gold."
Gary Edwards

The Daily Bell - The Economist Hoists Its Battle Balloon? - 1 views

  •  
    "The first world war... Look back with angst ... Thanks to its military, economic and soft power, America is still indispensable, particularly in dealing with threats like climate change and terror, which cross borders. But unless America behaves as a leader and the guarantor of the world order, it will be inviting regional powers to test their strength by bullying neighbouring countries. The chances are that none of the world's present dangers will lead to anything that compares to the horrors of 1914. Madness, whether motivated by race, religion or tribe, usually gives ground to rational self-interest. But when it triumphs, it leads to carnage, so to assume that reason will prevail is to be culpably complacent. That is the lesson of a century ago. - Economist Magazine Dominant Social Theme: Beware the coming wars ... Free-Market Analysis: You can't make this stuff up. The top men in the globalist community have been hard at work building wars and potential wars, and now it's time to let 'er rip. This is one dominant social theme we saw coming miles away. We've been writing about its imminence for years, and predicting war and more war as internationalists try to blunt the effect of the Internet Reformation. After the Gutenberg press blew up the Middle Ages and the Roman Catholic Church besides, the globalists of the era used economic chaos, war and the invention of copyright to fight back. We predicted they would use the same tools this time around and have no reason to revise our predictions thus far. The only thing we've consistently pointed out that has not yet been addressed is the inability of the top men to launch a full-out world war because that would involve nuclear weapons. And lacking a full-out war, we have questioned how successful the strategy can be. Obviously, the top elites see something we don't. Or perhaps they are willing to risk an all-out war anyway - as they retreat into reported fully-stocked, underground "cities." Here's more fro
Paul Merrell

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • ...5 more annotations...
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
Paul Merrell

From Energy War to Currency War: America's Attack on the Russian Ruble | Global Research - 0 views

  • Putin announced that Russia has cancelled the South Stream project on December 1, 2014. Instead the South Stream pipeline project has been replaced by a natural gas pipeline that goes across the Black Sea to Turkey from the Russian Federation’s South Federal District. This alternative pipeline has been popularly billed the «Turk Stream» and partners Russian energy giant Gazprom with Turkey’s Botas. Moreover, Gazprom will start giving Turkey discounts in the purchase of Russian natural gas that will increase with the intensification of Russo-Turkish cooperation. The natural gas deal between Ankara and Moscow creates a win-win situation for both the Turkish and Russian sides. Not only will Ankara get a discount on energy supplies, but Turk Stream gives the Turkish government what it has wanted and desired for years. The Turk Stream pipeline will make Turkey an important energy corridor and transit point, complete with transit revenues. In this case Turkey becomes the corridor between energy supplier Russia and European Union and non-EU energy customers in southeastern Europe. Ankara will gain some leverage over the European Union and have an extra negotiating card with the EU too, because the EU will have to deal with it as an energy broker.
  • For its part, Russia has reduced the risks that it faced in building the South Stream by cancelling the project. Moscow could have wasted resources and time building the South Stream to see the project sanctioned or obstructed in the Balkans by Washington and Brussels. If the European Union really wants Russian natural gas then the Turk Stream pipeline can be expanded from Turkey to Greece, the former Yugoslav Republic (FYR) of Macedonia, Serbia, Hungary, Slovenia, Italy, Austria, and other European countries that want to be integrated into the energy project. The cancellation of South Stream also means that there will be one less alternative energy corridor from Russia to the European Union for some time. This has positive implications for a settlement in Ukraine, which is an important transit route for Russian natural gas to the European Union. As a means of securing the flow of natural gas across Ukrainian territory from Russia, the European Union will be more prone to push the authorities in Kiev to end the conflict in East Ukraine.
  • From the perspective of Russian Presidential Advisor Sergey Glazyev, the US is waging its multi-spectrum war against Russia to ultimately challenge Moscow’s Chinese partners. In an insightful interview, Glazyev explained the following points to the Ukrainian journalist Alyona Berezovskaya — working for a Rossiya Segodnya subsidiary focusing on information involving Ukraine — about the basis for US hostility towards Russia: the bankruptcy of the US, its decline in competitiveness on global markets, and Washington’s inability to ultimately save its financial system by servicing its foreign debt or getting enough investments to establish some sort of innovative economic breakthrough are the reasons why Washington has been going after the Russian Federation. [13] In Glazyev’s own words, the US wants «a new world war». [14] The US needs conflict and confrontation, in other words. This is what the crisis in Ukraine is nurturing in Europe. Sergey Glazyev reiterates the same points months down the road on September 23, 2014 in an article he authors for the magazine Russia in Global Affairs, which is sponsored by the Russian International Affairs Council — a think-tank founded by the Russian Foreign Ministry and Russian Ministry of Education 2010 — and the US journal Foreign Affairs — which is the magazine published by the Council on Foreign Relation in the US. In his article, Glazyev adds that the war Washington is inciting against Russia in Europe may ultimately benefit the Chinese, because the struggle being waged will weaken the US, Russia, and the European Union to the advantage of China. [15] The point of explaining all this is to explain that Russia wants a balanced strategic partnership with China. Glazyev himself even told Berezovskaya in their interview that Russia wants a mutually beneficial relationship with China that does reduce it to becoming a subordinate to Beijing. [16]
  • ...9 more annotations...
  • It is because of the importance of Irano-Turkish and Russo-Turkish trade and energy ties that Ankara has had an understanding with both Russia and Iran not to let politics and their differences over the Syrian crisis get in the way of their economic ties and business relationships while Washington has tried to disrupt Irano-Turkish and Russo-Turkish trade and energy ties like it has disrupted trade ties between Russia and the EU. [9] Ankara, however, realizes that if it lets politics disrupt its economic ties with Iran and Russia that Turkey itself will become weakened and lose whatever independence it enjoys Masterfully announcing the Russian move while in Ankara, Putin also took the opportunity to ensure that there would be heated conversation inside the EU. Some would call this rubbing salt on the wounds. Knowing that profit and opportunity costs would create internal debate within Bulgaria and the EU, Putin rhetorically asked if Bulgaria was going to be economically compensated by the European Commission for the loss.
  • It is clear that Russian business and trade ties have been redirected to the People’s Republic of China and East Asia. On the occasion of the Sino-Russian mega natural gas deal, this author pointed out that this was not as much a Russian countermove to US economic pressure as it was really a long-term Russian strategy that seeks an increase in trade and ties with East Asia. [10] Vladimir Putin himself also corroborated this standpoint during the December 18 press conference mentioned earlier when he dismissed — like this author — the notion that the so-called «Russian turn to the East» was mainly the result of the crisis in Ukraine. In President Putin’s own words, the process of increasing business ties with the Chinese and East Asia «stems from the global economic processes, because the East – that is, the Asia-Pacific Region – shows faster growth than the rest of the world». [11] If this is not convincing enough that the turn towards East Asia was already in the works for Russia, then Putin makes it categorically clear as he proceeds talking at the December 18 press conference. In reference to the Sino-Russian gas deal and other Russian projects in East Asia, Putin explained the following: «The projects we are working on were planned long ago, even before the most recent problems occurred in the global or Russian economy. We are simply implementing our long-time plans». [12]
  • According to Presidential Advisor Sergey Glazyev, Washington is «trying to destroy and weaken Russia, causing it to fragment, as they need this territory and want to establish control over this entire space». [18] «We have offered cooperation from Lisbon to Vladivostok, whereas they need control to maintain their geopolitical leadership in a competition with China,» he has explained, pointing out that the US wants lordship and is not interested in cooperation. [19] Alluding to former US top diplomat Madeline Albright’s sentiments that Russia was unfairly endowed with vast territory and resources, Putin also spoke along similar lines at his December 18 press conference, explaining how the US wanted to divide Russia and control the abundant natural resources in Russian territory. It is of little wonder that in 2014 a record number of Russian citizens have negative attitudes about relations between their country and the United States. A survey conducted by the Russian Public Opinion Research Center has shown that of 39% of Russian respondents viewed relations with the US as «mostly bad» and 27% as «very bad». [20] This means 66% of Russian respondents have negative views about relations with Washington. This is an inference of the entire Russian population’s views. Moreover, this is the highest rise in negative perceptions about the US since 2008 when the US supported Georgian President Mikheil Saakashvili in Tbilisi’s war against Russia and the breakaway republic of South Ossetia; 40% viewed them as «mostly bad» and 25% of Russians viewed relations as «very bad» and at the time. [21]
  • In more ways than one the Turk Stream pipeline can be viewed as a reconfigured of the failed Nabucco natural gas pipeline. Not only will Turk Stream court Turkey and give Moscow leverage against the European Union, instead of reducing Russian influence as Nabucco was originally intended to do, the new pipeline to Turkey also coaxes Ankara to align its economic and strategic interests with those of Russian interests. This is why, when addressing Nabucco and the rivalries for establishing alternate energy corridors, this author pointed out in 2007 that «the creation of these energy corridors and networks is like a two-edged sword. These geo-strategic fulcrums or energy pivots can also switch their directions of leverage. The integration of infrastructure also leads towards economic integration». [8] The creation of Turk Stream and the strengthening of Russo-Turkish ties may even help placate the gory conflict in Syria. If Iranian natural gas is integrated into the mainframe of Turk Stream through another energy corridor entering Anatolia from Iranian territory, then Turkish interests would be even more tightly aligned with both Moscow and Tehran. Turkey will save itself from the defeats of its neo-Ottoman policies and be able to withdraw from the Syrian crisis. This will allow Ankara to politically realign itself with two of its most important trading partners, Iran and Russia.
  • Whatever Washington’s intentions are, every step that the US takes to target Russia economically will eventually hurt the US economy too. It is also highly unlikely that the policy mandarins in Beijing are unaware of what the US may try to be doing. The Chinese are aware that ultimately it is China and not Russia that is the target of the United States.
  • The United States is waging a fully fledged economic war against the Russian Federations and its national economy. Ultimately, all Russians are collectively the target. The economic sanctions are nothing more than economic warfare. If the crisis in Ukraine did not happen, another pretext would have been found for assaulting Russia. Both US Assistant-Secretary of State Victoria Nuland and US Assistant-Secretary of the Treasury Daniel Glaser even told the Foreign Affairs Committee of the US House of Representatives in May 2014 that the ultimate objectives of the US economic sanctions against Russia are to make the Russian population so miserable and desperate that they would eventually demand that the Kremlin surrender to the US and bring about «political change». «Political change» can mean many things, but what it most probably implies here is regime change in Moscow. In fact, the aims of the US do not even appear to be geared at coercing the Russian government to change its foreign policy, but to incite regime change in Moscow and to cripple the Russian Federation entirely through the instigation of internal divisions. This is why maps of a divided Russia are being circulated by Radio Free Europe. [17]
  • Without question, the US wants to disrupt the strategic partnership between Beijing and Moscow. Moscow’s strategic long-term planning and Sino-Russian cooperation has provided the Russia Federation with an important degree of economic and strategic insulation from the economic warfare being waged against the Russian national economy. Washington, however, may also be trying to entice the Chinese to overplay their hand as Russia is economically attacked. In this context, the price drops in the energy market may also be geared at creating friction between Beijing and Moscow. In part, the manipulation of the energy market and the price drops could seek to weaken and erode Sino-Russian relations by coaxing the Chinese into taking steps that would tarnish their excellent ties with their Russian partners. The currency war against the Russian ruble may also be geared towards this too. In other words, Washington may be hoping that China becomes greedy and shortsighted enough to make an attempt to take advantage of the price drop in energy prices in the devaluation of the Russian ruble.
  • Russia can address the economic warfare being directed against its national economy and society as a form of «economic terrorism». If Russia’s banks and financial institutions are weakened with the aim of creating financial collapse in the Russian Federation, Moscow can introduce fiscal measures to help its banks and financial sector that could create economic shockwaves in the European Union and North America. Speaking in hypothetical terms, Russia has lots of options for a financial defensive or counter-offensive that can be compared to its scorched earth policies against Western European invaders during the Napoleonic Wars, the First World War, and the Second World War. If Russian banks and institutions default and do not pay or delay payment of their derivative debts and justify it on the basis of the economic warfare and economic terrorism, there would be a financial shock and tsunami that would vertebrate from the European Union to North America. This scenario has some parallels to the steps that Argentina is taken to sidestep the vulture funds.
  • The currency war eventually will rebound on Washington and Wall Street. The energy war will also reverse directions. Already, the Kremlin has made it clear that it and a coalition of other countries will de-claw the US in the currency market through a response that will neutralize US financial manipulation and the petro-dollar. In the words of Sergey Glazyev, Moscow is thinking of a «systemic and comprehensive» response «aimed at exposing and ending US political domination, and, most importantly, at undermining US military-political power based on the printing of dollars as a global currency». [22] His solution includes the creation of «a coalition of sound forces advocating stability — in essence, a global anti-war coalition with a positive plan for rearranging the international financial and economic architecture on the principles of mutual benefit, fairness, and respect for national sovereignty». [23] The coming century will not be the «American Century» as the neo-conservatives in Washington think. It will be a «Eurasian Century». Washington has taken on more than it can handle, this may be why the US government has announced an end to its sanctions regime against Cuba and why the US is trying to rekindle trade ties with Iran. Despite this, the architecture of the post-Second World War or post-1945 global order is now in its death bed and finished. This is what the Kremlin and Putin’s presidential spokesman and press secretary Dmitry Peskov mean when they impart—as Peskov stated to Rossiya-24 in a December 17, 2014 interview — that the year 2014 has finally led to «a paradigm shift in the international system».
Paul Merrell

Edward Snowden: A 'Nation' Interview | The Nation - 0 views

  • Snowden: That’s the key—to maintain the garden of liberty, right? This is a generational thing that we must all do continuously. We only have the rights that we protect. It doesn’t matter what we say or think we have. It’s not enough to believe in something; it matters what we actually defend. So when we think in the context of the last decade’s infringements upon personal liberty and the last year’s revelations, it’s not about surveillance. It’s about liberty. When people say, “I have nothing to hide,” what they’re saying is, “My rights don’t matter.” Because you don’t need to justify your rights as a citizen—that inverts the model of responsibility. The government must justify its intrusion into your rights. If you stop defending your rights by saying, “I don’t need them in this context” or “I can’t understand this,” they are no longer rights. You have ceded the concept of your own rights. You’ve converted them into something you get as a revocable privilege from the government, something that can be abrogated at its convenience. And that has diminished the measure of liberty within a society.
  • From the very beginning, I said there are two tracks of reform: there’s the political and the technical. I don’t believe the political will be successful, for exactly the reasons you underlined. The issue is too abstract for average people, who have too many things going on in their lives. And we do not live in a revolutionary time. People are not prepared to contest power. We have a system of education that is really a sort of euphemism for indoctrination. It’s not designed to create critical thinkers. We have a media that goes along with the government by parroting phrases intended to provoke a certain emotional response—for example, “national security.” Everyone says “national security” to the point that we now must use the term “national security.” But it is not national security that they’re concerned with; it is state security. And that’s a key distinction. We don’t like to use the phrase “state security” in the United States because it reminds us of all the bad regimes. But it’s a key concept, because when these officials are out on TV, they’re not talking about what’s good for you. They’re not talking about what’s good for business. They’re not talking about what’s good for society. They’re talking about the protection and perpetuation of a national state system. I’m not an anarchist. I’m not saying, “Burn it to the ground.” But I’m saying we need to be aware of it, and we need to be able to distinguish when political developments are occurring that are contrary to the public interest. And that cannot happen if we do not question the premises on which they’re founded. And that’s why I don’t think political reform is likely to succeed. [Senators] Udall and Wyden, on the intelligence committee, have been sounding the alarm, but they are a minority.
  • The Nation: Every president—and this seems to be confirmed by history—will seek to maximize his or her power, and will see modern-day surveillance as part of that power. Who is going to restrain presidential power in this regard? Snowden: That’s why we have separate and co-equal branches. Maybe it will be Congress, maybe not. Might be the courts, might not. But the idea is that, over time, one of these will get the courage to do so. One of the saddest and most damaging legacies of the Bush administration is the increased assertion of the “state secrets” privilege, which kept organizations like the ACLU—which had cases of people who had actually been tortured and held in indefinite detention—from getting their day in court. The courts were afraid to challenge executive declarations of what would happen. Now, over the last year, we have seen—in almost every single court that has had this sort of national-security case—that they have become markedly more skeptical. People at civil-liberties organizations say it’s a sea change, and that it’s very clear judges have begun to question more critically assertions made by the executive. Even though it seems so obvious now, it is extraordinary in the context of the last decade, because courts had simply said they were not the best branch to adjudicate these claims—which is completely wrong, because they are the only nonpolitical branch. They are the branch that is specifically charged with deciding issues that cannot be impartially decided by politicians. The power of the presidency is important, but it is not determinative. Presidents should not be exempted from the same standards of reason and evidence and justification that any other citizen or civil movement should be held to.
  • ...14 more annotations...
  • The Nation: Explain the technical reform you mentioned. Snowden: We already see this happening. The issue I brought forward most clearly was that of mass surveillance, not of surveillance in general. It’s OK if we wiretap Osama bin Laden. I want to know what he’s planning—obviously not him nowadays, but that kind of thing. I don’t care if it’s a pope or a bin Laden. As long as investigators must go to a judge—an independent judge, a real judge, not a secret judge—and make a showing that there’s probable cause to issue a warrant, then they can do that. And that’s how it should be done. The problem is when they monitor all of us, en masse, all of the time, without any specific justification for intercepting in the first place, without any specific judicial showing that there’s a probable cause for that infringement of our rights.
  • Since the revelations, we have seen a massive sea change in the technological basis and makeup of the Internet. One story revealed that the NSA was unlawfully collecting data from the data centers of Google and Yahoo. They were intercepting the transactions of data centers of American companies, which should not be allowed in the first place because American companies are considered US persons, sort of, under our surveillance authorities. They say, “Well, we were doing it overseas,” but that falls under a different Reagan-era authority: EO 12333, an executive order for foreign-intelligence collection, as opposed to the ones we now use domestically. So this one isn’t even authorized by law. It’s just an old-ass piece of paper with Reagan’s signature on it, which has been updated a couple times since then. So what happened was that all of a sudden these massive, behemoth companies realized their data centers—sending hundreds of millions of people’s communications back and forth every day—were completely unprotected, electronically naked. GCHQ, the British spy agency, was listening in, and the NSA was getting the data and everything like that, because they could dodge the encryption that was typically used. Basically, the way it worked technically, you go from your phone to Facebook.com, let’s say—that link is encrypted. So if the NSA is trying to watch it here, they can’t understand it. But what these agencies discovered was, the Facebook site that your phone is connected to is just the front end of a larger corporate network—that’s not actually where the data comes from. When you ask for your Facebook page, you hit this part and it’s protected, but it has to go on this long bounce around the world to actually get what you’re asking for and go back. So what they did was just get out of the protected part and they went onto the back network. They went into the private network of these companies.
  • The Nation: The companies knew this? Snowden: Companies did not know it. They said, “Well, we gave the NSA the front door; we gave you the PRISM program. You could get anything you wanted from our companies anyway—all you had to do was ask us and we’re gonna give it to you.” So the companies couldn’t have imagined that the intelligence communities would break in the back door, too—but they did, because they didn’t have to deal with the same legal process as when they went through the front door. When this was published by Barton Gellman in The Washington Post and the companies were exposed, Gellman printed a great anecdote: he showed two Google engineers a slide that showed how the NSA was doing this, and the engineers “exploded in profanity.” Another example—one document I revealed was the classified inspector general’s report on a Bush surveillance operation, Stellar Wind, which basically showed that the authorities knew it was unlawful at the time. There was no statutory basis; it was happening basically on the president’s say-so and a secret authorization that no one was allowed to see. When the DOJ said, “We’re not gonna reauthorize this because it is not lawful,” Cheney—or one of Cheney’s advisers—went to Michael Hayden, director of the NSA, and said, “There is no lawful basis for this program. DOJ is not going to reauthorize it, and we don’t know what we’re going to do. Will you continue it anyway on the president’s say-so?” Hayden said yes, even though he knew it was unlawful and the DOJ was against it. Nobody has read this document because it’s like twenty-eight pages long, even though it’s incredibly important.
  • The big tech companies understood that the government had not only damaged American principles, it had hurt their businesses. They thought, “No one trusts our products anymore.” So they decided to fix these security flaws to secure their phones. The new iPhone has encryption that protects the contents of the phone. This means if someone steals your phone—if a hacker or something images your phone—they can’t read what’s on the phone itself, they can’t look at your pictures, they can’t see the text messages you send, and so forth. But it does not stop law enforcement from tracking your movements via geolocation on the phone if they think you are involved in a kidnapping case, for example. It does not stop law enforcement from requesting copies of your texts from the providers via warrant. It does not stop them from accessing copies of your pictures or whatever that are uploaded to, for example, Apple’s cloud service, which are still legally accessible because those are not encrypted. It only protects what’s physically on the phone. This is purely a security feature that protects against the kind of abuse that can happen with all these things being out there undetected. In response, the attorney general and the FBI director jumped on a soap box and said, “You are putting our children at risk.”
  • The Nation: Is there a potential conflict between massive encryption and the lawful investigation of crimes? Snowden: This is the controversy that the attorney general and the FBI director were trying to create. They were suggesting, “We have to be able to have lawful access to these devices with a warrant, but that is technically not possible on a secure device. The only way that is possible is if you compromise the security of the device by leaving a back door.” We’ve known that these back doors are not secure. I talk to cryptographers, some of the leading technologists in the world, all the time about how we can deal with these issues. It is not possible to create a back door that is only accessible, for example, to the FBI. And even if it were, you run into the same problem with international commerce: if you create a device that is famous for compromised security and it has an American back door, nobody is gonna buy it. Anyway, it’s not true that the authorities cannot access the content of the phone even if there is no back door. When I was at the NSA, we did this every single day, even on Sundays. I believe that encryption is a civic responsibility, a civic duty.
  • The Nation: Some years ago, The Nation did a special issue on patriotism. We asked about a hundred people how they define it. How do you define patriotism? And related to that, you’re probably the world’s most famous whistleblower, though you don’t like that term. What characterization of your role do you prefer? Snowden: What defines patriotism, for me, is the idea that one rises to act on behalf of one’s country. As I said before, that’s distinct from acting to benefit the government—a distinction that’s increasingly lost today. You’re not patriotic just because you back whoever’s in power today or their policies. You’re patriotic when you work to improve the lives of the people of your country, your community and your family. Sometimes that means making hard choices, choices that go against your personal interest. People sometimes say I broke an oath of secrecy—one of the early charges leveled against me. But it’s a fundamental misunderstanding, because there is no oath of secrecy for people who work in the intelligence community. You are asked to sign a civil agreement, called a Standard Form 312, which basically says if you disclose classified information, they can sue you; they can do this, that and the other. And you risk going to jail. But you are also asked to take an oath, and that’s the oath of service. The oath of service is not to secrecy, but to the Constitution—to protect it against all enemies, foreign and domestic. That’s the oath that I kept, that James Clapper and former NSA director Keith Alexander did not. You raise your hand and you take the oath in your class when you are on board. All government officials are made to do it who work for the intelligence agencies—at least, that’s where I took the oath.
  • The Nation: Creating a new system may be your transition, but it’s also a political act. Snowden: In case you haven’t noticed, I have a somewhat sneaky way of effecting political change. I don’t want to directly confront great powers, which we cannot defeat on their terms. They have more money, more clout, more airtime. We cannot be effective without a mass movement, and the American people today are too comfortable to adapt to a mass movement. But as inequality grows, the basic bonds of social fraternity are fraying—as we discussed in regard to Occupy Wall Street. As tensions increase, people will become more willing to engage in protest. But that moment is not now.
  • The Nation: You really think that if you could go home tomorrow with complete immunity, there wouldn’t be irresistible pressure on you to become a spokesperson, even an activist, on behalf of our rights and liberties? Indeed, wouldn’t that now be your duty? Snowden: But the idea for me now—because I’m not a politician, and I do not think I am as effective in this way as people who actually prepare for it—is to focus on technical reform, because I speak the language of technology. I spoke with Tim Berners-Lee, the guy who invented the World Wide Web. We agree on the necessity for this generation to create what he calls the Magna Carta for the Internet. We want to say what “digital rights” should be. What values should we be protecting, and how do we assert them? What I can do—because I am a technologist, and because I actually understand how this stuff works under the hood—is to help create the new systems that reflect our values. Of course I want to see political reform in the United States. But we could pass the best surveillance reforms, the best privacy protections in the history of the world, in the United States, and it would have zero impact internationally. Zero impact in China and in every other country, because of their national laws—they won’t recognize our reforms; they’ll continue doing their own thing. But if someone creates a reformed technical system today—technical standards must be identical around the world for them to function together.
  • As for labeling someone a whistleblower, I think it does them—it does all of us—a disservice, because it “otherizes” us. Using the language of heroism, calling Daniel Ellsberg a hero, and calling the other people who made great sacrifices heroes—even though what they have done is heroic—is to distinguish them from the civic duty they performed, and excuses the rest of us from the same civic duty to speak out when we see something wrong, when we witness our government engaging in serious crimes, abusing power, engaging in massive historic violations of the Constitution of the United States. We have to speak out or we are party to that bad action.
  • The Nation: Considering your personal experience—the risks you took, and now your fate here in Moscow—do you think other young men or women will be inspired or discouraged from doing what you did? Snowden: Chelsea Manning got thirty-five years in prison, while I’m still free. I talk to people in the ACLU office in New York all the time. I’m able to participate in the debate and to campaign for reform. I’m just the first to come forward in the manner that I did and succeed. When governments go too far to punish people for actions that are dissent rather than a real threat to the nation, they risk delegitimizing not just their systems of justice, but the legitimacy of the government itself. Because when they bring political charges against people for acts that were clearly at least intended to work in the public interest, they deny them the opportunity to mount a public-interest defense. The charges they brought against me, for example, explicitly denied my ability to make a public-interest defense. There were no whistleblower protections that would’ve protected me—and that’s known to everybody in the intelligence community. There are no proper channels for making this information available when the system fails comprehensively.
  • The government would assert that individuals who are aware of serious wrongdoing in the intelligence community should bring their concerns to the people most responsible for that wrongdoing, and rely on those people to correct the problems that those people themselves authorized. Going all the way back to Daniel Ellsberg, it is clear that the government is not concerned with damage to national security, because in none of these cases was there damage. At the trial of Chelsea Manning, the government could point to no case of specific damage that had been caused by the massive revelation of classified information. The charges are a reaction to the government’s embarrassment more than genuine concern about these activities, or they would substantiate what harms were done. We’re now more than a year since my NSA revelations, and despite numerous hours of testimony before Congress, despite tons of off-the-record quotes from anonymous officials who have an ax to grind, not a single US official, not a single representative of the United States government, has ever pointed to a single case of individualized harm caused by these revelations. This, despite the fact that former NSA director Keith Alexander said this would cause grave and irrevocable harm to the nation. Some months after he made that statement, the new director of the NSA, Michael Rogers, said that, in fact, he doesn’t see the sky falling. It’s not so serious after all.
  • The Nation: You also remind us of [Manhattan Project physicist] Robert Oppenheimer—what he created and then worried about. Snowden: Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people. It is interesting that so many people who become disenchanted, who protest against their own organizations, are people who contributed something to them and then saw how it was misused. When I was working in Japan, I created a system for ensuring that intelligence data was globally recoverable in the event of a disaster. I was not aware of the scope of mass surveillance. I came across some legal questions when I was creating it. My superiors pushed back and were like, “Well, how are we going to deal with this data?” And I was like, “I didn’t even know it existed.” Later, when I found out that we were collecting more information on American communications than we were on Russian communications, for example, I was like, “Holy shit.” Being confronted with the realization that work you intended to benefit people is being used against them has a radicalizing effect.
  • The Nation: We have a sense, or certainly the hope, we’ll be seeing you in America soon—perhaps sometime after this Ukrainian crisis ends. Snowden: I would love to think that, but we’ve gone all the way up the chain at all the levels, and things like that. A political decision has been made not to irritate the intelligence community. The spy agencies are really embarrassed, they’re really sore—the revelations really hurt their mystique. The last ten years, they were getting the Zero Dark Thirty treatment—they’re the heroes. The surveillance revelations bring them back to Big Brother kind of narratives, and they don’t like that at all. The Obama administration almost appears as though it is afraid of the intelligence community. They’re afraid of death by a thousand cuts—you know, leaks and things like that.
  • The Nation: You’ve given us a lot of time, and we are very grateful, as will be The Nation’s and other readers. But before we end, any more thoughts about your future? Snowden: If I had to guess what the future’s going to look like for me—assuming it’s not an orange jumpsuit in a hole—I think I’m going to alternate between tech and policy. I think we need that. I think that’s actually what’s missing from government, for the most part. We’ve got a lot of policy people, but we have no technologists, even though technology is such a big part of our lives. It’s just amazing, because even these big Silicon Valley companies, the masters of the universe or whatever, haven’t engaged with Washington until recently. They’re still playing catch-up. As for my personal politics, some people seem to think I’m some kind of archlibertarian, a hyper-conservative. But when it comes to social policies, I believe women have the right to make their own choices, and inequality is a really important issue. As a technologist, I see the trends, and I see that automation inevitably is going to mean fewer and fewer jobs. And if we do not find a way to provide a basic income for people who have no work, or no meaningful work, we’re going to have social unrest that could get people killed. When we have increasing production—year after year after year—some of that needs to be reinvested in society. It doesn’t need to be consistently concentrated in these venture-capital funds and things like that. I’m not a communist, a socialist or a radical. But these issues have to be 
addressed.
  •  
    Remarkable interview. Snowden finally gets asked some questions about politics. 
Gary Edwards

Unite or Perish: How to become a force multiplier 2.0 - 0 views

  •  
    73 screen Slide Show Presentation detailing how the socialist built their coalition, and how conservatives should respond with their own.  The meat starts on slide 56, with the Saul Alinsky power tactics.  This is folllowed by the Andrew Breitbart strategy.   The key for conservatives is "Precinct Activism".  Starts on slide 65, and outlines exactly how Precincts work, and why activism at this level will work..  Highlightes:   "Taking Back Your Government:  The Neighborhood Precinct Committman Statregy eBook"  http://goo.gl/SjdEG The Precinct Project Blog:  http://goo.gl/F071w The Concord Project | Resources:  http://goo.gl/svTpb GOTV Project ::  Get Out The Vote GOTV Campaign + Precinct Activists + Recruitment
Paul Merrell

George Bush: The Unauthorized Biography « TARPLEY.net - 0 views

  • By Webster Griffin Tarpley and Anton Chaitkin Table of Contents Introduction — American Caligula Chapter 1 – The House of Bush: Born in a Bank Chapter 2 – The Hitler Project Chapter 3 – Race Hygiene: Three Bush Family Alliances Chapter 4 – The Center of Power is in Washington Chapter 5 – Poppy and Mommy Chapter 6 – Bush in World War II Chapter 7 – Skull and Bones: The Racist Nightmare at Yale Chapter 8 – The Permian Basin Gang Chapter 8b – The Bay of Pigs and The Kennedy Assassination Chapter 9 – Bush Challenges Yarborough for The Senate Chapter 10 – Rubbers Goes to Congress Chapter 11 – United Nations Ambassador, Kissinger Clone Chapter 12 – Chairman George in Watergate Chapter 13 – Bush Attempts The Vice Presidency, 1974 Chapter 14 – Bush in Beijing Chapter 15 – CIA Director Chapter 16 – Campaign 1980 Chapter 17 – The Attempted Coup D’Etat of March 30, 1981 Chapter 18 – Iran-Contra Chapter 19 – The Leveraged Buyout Mob Chapter 20 – The Phony War On Drugs Chapter 21 – Omaha Chapter 22 – Bush Takes The Presidency Chapter 23 – The End of History Chapter 24 – The New World Order Chapter 25 – Thyroid Storm
  • Chapter 1 – The House of Bush: Born in a Bank Chapter 2 – The Hitler Project Chapter 3 – Race Hygiene: Three Bush Family Alliances Chapter 4 – The Center of Power is in Washington Chapter 5 – Poppy and Mommy Chapter 6 – Bush in World War II Chapter 7 – Skull and Bones: The Racist Nightmare at Yale Chapter 8 – The Permian Basin Gang Chapter 8b – The Bay of Pigs and The Kennedy Assassination Chapter 9 – Bush Challenges Yarborough for The Senate Chapter 10 – Rubbers Goes to Congress Chapter 11 – United Nations Ambassador, Kissinger Clone Chapter 12 – Chairman George in Watergate Chapter 13 – Bush Attempts The Vice Presidency, 1974 Chapter 14 – Bush in Beijing Chapter 15 – CIA Director Chapter 16 – Campaign 1980 Chapter 17 – The Attempted Coup D’Etat of March 30, 1981 Chapter 18 – Iran-Contra Chapter 19 – The Leveraged Buyout Mob Chapter 20 – The Phony War On Drugs Chapter 21 – Omaha Chapter 22 – Bush Takes The Presidency Chapter 23 – The End of History Chapter 24 – The New World Order Chapter 25 – Thyroid Storm
Paul Merrell

Washington Misses Bigger Picture of New Chinese Bank « LobeLog - 0 views

  • Bibi Netanyahu’s election, persistent violence through much of the Middle East and North Africa, and intensified efforts to forge a nuclear deal between the P5+1 and Iran topped the news here in Washington this week. But a much bigger story in terms of the future order of global politics was taking place in Europe and Beijing. The story was simply this: virtually all of the closest European allies of the United States, beginning with Britain, defied pressure from Washington by deciding to apply for founding membership in the Asian Infrastructure Investment Bank (AIIB). This Chinese initiative could quickly rival the World Bank and the Asia Development Bank as a major source of funding for big development projects across Eurasia. The new bank, which offers a serious multilateral alternative to the Western-dominated international financial institutions (IFIs) established in the post-World War II order, is expected to attract about three dozen initial members, including all of China’s Asian neighbors (with the possible exception of Japan). Australia, Russia, Saudi Arabia, and other Gulf states are also likely to join by the March 31 deadline set by Beijing for prospective co-founders to apply. Its $50 billion in initial capital is expected to double with the addition of new members, and that amount could quickly grow given China’s $3 trillion in foreign-exchange reserves. More details about the bank can be found in a helpful Q&A here at the Council on Foreign Relations website.
  • Along with the so-called BRICS bank—whose membership so far is limited to Brazil, Russia, India, China and South Africa—the AIIB poses a real “challenge to the existing global economic order,” which, of course, Western nations have dominated since the establishment of the International Monetary Fund (IMF) and the World Bank in the final days of World War II. As one unnamed European official told The New York Times, “We have moved from the world of 1945.” That Washington’s closest Western allies are now racing to join the AIIB over U.S. objections offers yet more evidence that the “unipolar moment” celebrated by neoconservatives and aggressive nationalists 25 years ago and then reaffirmed by the same forces after the 2003 Iraq invasion is well and truly. And yet, these same neoconservatives continue to insist that—but for Obama’s weakness and defeatism—the United States remains so powerful that it really doesn’t have to take account of anyone’s interests outside its borders except, maybe, Israel’s. (That Washington’s closest Western allies are now racing to join the new bank over U.S. objections could also presage a greater willingness to abandon the international sanctions regime against Iran if Washington is seen as responsible for the collapse of the P5+1 nuclear negotiations with Tehran. Granted, Iran’s economy—and its potential as a source of investment capital—is itsy-bitsy compared to China.)
  • Indeed, commentators are depicting US allies’ decision to join the AIIB (see here, here, and here as examples) as a debacle for U.S. diplomacy. The Wall Street Journal editorial board has predictably blamed Obama for defeat, calling it a “case study in declining American influence” (although it also defended Washington’s decision against joining and accused Britain of “appeasing China for commercial purposes.”) What the Journal predictably didn’t mention was a key reason why the administration did not seek membership in the new bank: there was virtually no chance that a Republican-dominated Congress would approve it. Indeed, one reason Beijing launched its initiative and so many of our allies in both Asia and Europe have decided to join is their frustration with Republicans in Congress who have refused to ratify a major reform package designed to give developing countries, including China, a little more voting power on the Western-dominated governing boards of the IMF and the World Bank. The Group of 20 (G20) biggest economic powers actually proposed this reform in 2010, and it doesn’t even reduce Washington’s voting power, which gives it an effective veto over major policy changes in both institutions. As a result of this intransigence, the United States is the only G-20 member that has failed to ratify the reforms, effectively blocking their implementation.
  •  
    U.S. global hegemony is rapidly disintegrating as former puppet states in Europe jump from the dwindling dollar economy to the rising remnimbi/ruble BRICS economies. And many of the "stans" south of Russia threatened by U.S. mercenaries provided by the Gulf Coast States are jumping in that direction too, along with Turkey, a NATO member. The Stans involved are oil and natural gas rich; combined with Russian oil and gas, they have enough oil and gas reserves to rival the Gulf Coast States.  The most interesting part to me is the debate now under way in the EU over dropping out of NATO and creating a replacement European mutual defense force that excludes the U.S. I'm beginning to hit some chatter about inviting Russia into that hypoethesized treaty. That makes sense for the EU because it would give Europe the benefit of Russian nuclear deterrence, both in land and submarine-based ICBMs. I'm not convinced that Russia would sign on. Russia is already running joint military exercises with China, which is playing the role of Russia's economic savior at this point. So China might have the final say on that scenario. A pan-Eurasian mutual defense treaty? What would be left of the U.S. Empire without NATO, particularly given that the dollar would surely collapse before such a treaty were signed? The War Party in Congress has only one tool to work with, war, and when all you have is a hammer, all problems look like nails. Current U.S. military power is built around the capacity to wage two major wars concurrently, but is very heavily dependent on NATO to do so. I'm not sure at all that the War Party has what it takes to cope with a peaceful group boycott by other NATO members. 
Paul Merrell

Failure of the US coup d'État in Macedonia , by Thierry Meyssan - 0 views

  • Macedonia has just neutralised an armed group whose sponsors had been under surveillance for at least eight months. By doing so, it has prevented a new attempt at a coup d’État, planned by Washington for the 17th of May. The aim was to spread the chaos already infecting Ukraine into Macedonia in order to stall the passage of a Russian gas pipeline to the European Union.
  • n the 9th of May, 2015, the Macedonian police launched a dawn operation to arrest an armed group which had infiltrated the country and which was suspected of preparing a number of attacks. The police evacuated the civilian population before launching the assault.
  • The suspects opened fire, which led to a bitter firefight, leaving 14 terrorists and 8 members of the police forces dead. 30 people were taken prisoner. There were a large number of wounded
  • ...7 more annotations...
  • The Macedonian police were clearly well-informed before they launched their operation. According to the Minister for the Interior, Ivo Kotevski, the group was preparing a very important operation for the 17th May (the date of the demonstration organised by the Albanophone opposition in Skopje). The identification of the suspects has made it possible to determine that they were almost all ex-members of the UÇK (Kosovo Liberation Army) [1].
  • Among them were : • Sami Ukshini, known as « Commandant Sokoli », whose family played a historic rôle in the UÇK. • Rijai Bey, ex-bodyguard of Ramush Haradinaj (himself a drug trafficker, military head of the UÇK, then Prime Minister of Kosovo. He was twice condemned for war crimes by the International Penal Tribunal for ex-Yugoslavia, but was acquitted because 9 crucial witnesses were murdered during the trial). • Dem Shehu, currently bodyguard for the Albanophone leader and founder of the BDI party, Ali Ahmeti. • Mirsad Ndrecaj, known as the « NATO Commandant », grandson of Malic Ndrecaj, who is commander of the 132nd Brigade of the UÇK. The principal leaders of this operation, including Fadil Fejzullahu (killed during the assault), are close to the United States ambassador in Skopje, Paul Wohlers.
  • To eliminate any doubt about the identity of the operation’s sponsors, the General Secretary of NATO, Jens Stoltenberg, intervened even before the assault was over - not to declare his condemnation of terrorism and his support for the constitutional government of Macedonia, but to paint a picture of the terrorist group as a legitimate ethnic opposition : « I am following the events in Kumanovo with deep concern. I would like to express my sympathy to the families of those who were killed or wounded. It is important that all polititcal and community leaders work together to restore order and begin a transparent investigation in order to find out what happened. I am calling for everyone to show reserve and avoid any new escalation of violence, in the intersts of the nation and also the whole region. » You would have to be blind not to understand.
  • In January 2015, Macedonia foiled an attempted coup d’état organised for the head of the opposition, the social-democrat Zoran Zaev. Four peole were arrested, and Mr. Zaev had his passport confiscated, while the Atlantist press began its denunciation of an « authoritarian drift by the régime » (sic). Zoran Zaev is publicly supported by the embassies of the United States, the United Kingdom, Germany and Holland. But the only trace left of this attempted coup d’état indicates the repsponsibility of the US. On the 17th May, Zoran Zaev’s social-democrat party (SDSM) [2] was supposed to organise a demonstration. It intended to distribute 2,000 masks in order to prevent the police from identifying the terrorists taking part in the march. During the demonstration, the armed group, concealed behind their masks, were supposed to attack several institutions and launch a pseudo-« revolution » comparable to the events in Maidan Square, Kiev.
  • This coup d’État was coordinated by Mile Zechevich, an ex-employee of one of George Soros’ foundations. In order to understand Washington’s urgency to overthrow the Macedonian government, we have to go back and look at the gas pipeline war. Because international politics is a huge chess-board on which every move by any piece causes consequences for all the others.
  • The United States have been attempting to sever communications between Russia and the European Union since 2007. They managed to sabotage the projet South Stream by obliging Bulgaria to cancel its participation, but on the 1st December 2014, to everyone’s surprise, Russian President Vladimir Putin launched a new project when he succeeded in convincing his Turkish opposite number, Recep Tayyip Erdoğan, to sign an agreement with him, despite the fact that Turkey is a member of NATO [3]. It was agreed that Moscow would deliver gas to Ankara, and that in return, Ankara would deliver gas to the European Union, thus bypassing the anti-Russian embargo by Brussels. On the 18th of April 2015, the new Greek Prime Minister, Alexis Tsípras, gave his agreement that the pipeline could cross his country [4] . As for Macedonian Prime Minister Nikola Gruevski, he had already conluded discrete negotiations last March [5]. Finally, Serbia, which had been a partner in the South Stream project, indicated to the Russian Minister for Energy Aleksandar Novak, during his reception in Belgrade in April, that Serbia was ready to switch to the Turkish Stream project [6].
  • To halt the Russian project, Washington has multiplied its initiatives :  in Turkey, it is supporting the CHP against President Erdoğan, hoping this will cause him to lose the elections;  in Greece, on the 8th May, it sent Amos Hochstein, Directeur of the Bureau of Energy Ressources, to demand that the Tsípras government give up its agreement with Gazprom;  it plans – just in case – to block the route of the pipeline by placing one of its puppets in power in Macedonia;  and in Serbia, it has restarted the project for the secession of the small piece of territory - Voïvodine - which allows the junction with Hungary [7]. Last comment, but not the least: Turkish Stream will also supply Hungary and Austria, thus ending the alternative project negotiated by the United States with President Hassan Rohani (against the advice of the Revolutionary Guards) for supplying them with Iranian gas [8].
1 - 20 of 153 Next › Last »
Showing 20 items per page