Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged private-guards

Rss Feed Group items tagged

Gary Edwards

The List: Unnecessarily Shut Down by Obama to Inflict Public Pain - 0 views

  •  
    "The media may or may not report on these individual occurrences, but what they will never do is provide the American people with the full context and scope of Obama's shrill pettiness. Below is a list of illogical, unnecessary, and shockingly spiteful moves our government is making in the name of essential and non-essential. This list will be regularly updated, and if you have something you feel should be added, please email me at jnolte@breitbart.com or tweet me @NolteNC.Please include a link to the news source. -- 1. Treatments for Children Suffering From Cancer - The GOP have agreed to a compromise by funding part of the government, including the National Institutes of Health, which offers children with cancer last-chance experimental treatment. Obama has threatened to veto this funding. 2. The World War II Memorial - The WWII memorial on the DC Mall is a 24/7 open-air memorial that is not regularly staffed. Although the White House must have known that WWII veterans in their eighties and nineties had already booked flights to visit this memorial, the White House still found the resources to spitefully barricade the attraction.  The Republican National Committee has offered to cover any costs required to keep the memorial open. The White House refused. Moreover, like the NIH, the GOP will pass a compromise bill that would fund America's national parks. Obama has threatened to veto that bill. 3. Furloughed Military Chaplains Not Allowed to Work for Free - Furloughed military chaplains willing to celebrate Mass and baptisms for free have been told they will be punished for doing so. 4. Business Stops In Florida Keys - Although the GOP have agreed to compromise in the ongoing budget stalemate and fund the parks, Obama has threatened to veto that funding. As a result, small businesses, hunters, and commercial fisherman can't practice their trade. While the feds have deemed the personnel necessary to keep this area open "non-essential," the "enforcement office
Paul Merrell

Portrait of an Assassin: Obama's Revenge - The Unz Review - 0 views

  • Trump sensing Obama’s resort to violent retaliation against Russia, and the likelihood he would turn the gun to ‘Putin’s accomplice’, the President-elect decided to take precautionary measures, he replaced Obama’s secret service by his private security guards.
  • Conclusion We live in extraordinarily dangerous times. A deranged violent President is in command of a willing media and an intelligence apparatus ready and willing to obey. There is little doubt that the murder of the Russian Ambassador will be the beginning of a cycle of violent assassinations. It is certain that Putin and Trump will take the appropriate defensive measures. With a psychotic, frustrated and failed President refusing to concede defeat, we enter the beginning and most sinister period prior to his exit.
  •  
    Author James Petras is a respected investigative journalist. This entire article is well worth reading. But I thought well worth highlighting his report that Trump doesn't trust the Secret Service and has hired private security guards.
Paul Merrell

Ex-Blackwater Guards Given Long Terms for Killing Iraqis - NYTimes.com - 0 views

  • One by one, four former Blackwater security contractors wearing blue jumpsuits and leg irons stood before a federal judge on Monday and spoke publicly for the first time since a deadly 2007 shooting in Iraq.The men had been among several private American security guards who fired into Baghdad’s crowded Nisour Square on Sept. 16, 2007, and last October they were convicted of killing 14 unarmed Iraqis in what prosecutors called a wartime atrocity. Yet on Monday, as they awaited sentences that they knew would send them to prison for most if not all of their lives, they defiantly asserted their innocence.
  • The judge, Royce C. Lamberth, strongly disagreed, sentencing Mr. Slatten to life in prison and handing 30-year sentences to the three others. A fifth former guard, Jeremy P. Ridgeway of California, had pleaded guilty to voluntary manslaughter and testified against his former colleagues. He has not been sentenced but testified that he hoped to avoid any prison time.The ruling ended a long investigation into the Nisour Square shooting, a signature, gruesome moment in the Iraq war that highlighted America’s reliance on private contractors to maintain security in combat zones.
  • No such company was more powerful than Blackwater, which won more than $1 billion in government contracts. Its employees, most of them military veterans, protected American diplomats overseas and became enmeshed in the Central Intelligence Agency’s clandestine counterterrorism operations. Its founder, Erik Prince, was a major donor to the Republican Party.
  • ...2 more annotations...
  • The Nisour Square shooting transformed Blackwater from America’s most prominent security contractor into a symbol of unchecked and privatized military power. The incident also became a notorious low point in the war, along with the massacre by Marines of 24 civilians at Haditha and the abuses at Abu Ghraib prison.
  • While the prosecution ends with the sentences, the legal case is sure to continue for years. The case raised many new legal issues, including whether State Department contractors are covered by American criminal law when operating overseas.The 30-year sentences, while significant, could have been much longer. For using machine guns to commit violent crimes, they faced mandatory minimum 30-year sentences under a law passed during the crack cocaine epidemic. Prosecutors had wanted the judge to hand down sentences of 50 years or more.
Paul Merrell

Blackwater Founder Remains Free and Rich While His Former Employees Go Down on Murder C... - 0 views

  • The incident for which the men were tried was the single largest known massacre of Iraqi civilians at the hands of private U.S. security contractors. Known as “Baghdad’s bloody Sunday,” operatives from Blackwater gunned down 17 Iraqi civilians at a crowded intersection at Nisour Square on September 16, 2007. The company, founded by secretive right-wing Christian supremacist Erik Prince, pictured above, had deep ties to the Bush Administration and served as a sort of neoconservative Praetorian Guard for a borderless war launched in the immediate aftermath of 9/11. While Barack Obama pledged to reign in mercenary forces when he was a senator, once he became president he continued to employ a massive shadow army of private contractors. Blackwater — despite numerous scandals, congressional investigations, FBI probes and documented killings of civilians in both Iraq and Afghanistan — remained a central part of the Obama administration’s global war machine throughout his first term in office.
  • Just as with the systematic torture at Abu Ghraib, it is only the low level foot-soldiers of Blackwater that are being held accountable. Prince and other top Blackwater executives continue to reap profits from the mercenary and private intelligence industries. Prince now has a new company, Frontier Services Group, which he founded with substantial investment from Chinese enterprises and which focuses on opportunities in Africa. Prince recently suggested that his forces at Blackwater could have confronted Ebola and ISIS. “If the administration cannot rally the political nerve or funding to send adequate active duty ground forces to answer the call, let the private sector finish the job,” he wrote. None of the U.S. officials from the Bush and Obama administrations who unleashed Blackwater and other mercenary forces across the globe are being forced to answer for their role in creating the conditions for the Nisour Square shootings and other deadly incidents involving private contractors. Just as the main architect of the CIA interrogation program, Jose Rodriguez, is on a book tour for his propagandistic love letter to torture, Hard Measures: How Aggressive CIA Actions After 9/11 Saved American Lives, so too is Erik Prince pushing his own revisionist memoir, Civilian Warriors: The Inside Story of Blackwater and the Unsung Heroes of the War on Terror.
  • While the Blackwater verdict is an important and rare moment of accountability in an overwhelmingly unaccountable private war industry, it does not erase the fact that those in power—the CEOs, the senior officials, the war profiteers—walk freely and will likely do so for the rest of their lives.
  • ...1 more annotation...
  • Filmmaker Richard Rowley and I produced a 30 minute documentary on the Nisour Square massacre and the story of Ali Kinani for Democracy Now! and The Nation magazine:
Gary Edwards

What Is or Should Be the Law? essay on Frederik Bastiat's "The Law" - 1 views

  •  
    Jeffrey Tucker at The Daily Reckoning wonders about all those Presidential Executive Orders that make Law while by-passing the Congressional process and making mockery of the USA Constitution.  He ends up referencing the great libertarian, Frederick Bastiat's seminal work, The Law - written in 1849.    
    excerpt: One party gets annoyed when the other party's president enacts laws without regard to any constitutional conventions.
    But what is the law, and what should it be? These are the bigger questions that are not part of public consciousness.
    The same was true in the time of Frédéric Bastiat (1801-50). At the very end of his life, he wrote an impassioned plea on the topic. He tried to get people to think hard about what was happening and how law had become an instrument of plunder, rather than a protector of property.
    He writes:
    ...... "It is not true that the function of law is to regulate our consciences, our ideas, our wills, our education, our opinions, our work, our trade, our talents or our pleasures. The function of law is to protect the free exercise of these rights, and to prevent any person from interfering with the free exercise of these same rights by any other person." .......
    This is from Bastiat's The Law, one of the great political essays to emerge from the whole Continental world of the 19th century. It vanished into obscurity in France, was resurrected in late 19th century English, and then disappeared again, only to reappear in the United States in the 1950s, thanks to the efforts of the Foundation of Economic Education.
    This essay asks fundamental questions that most people go through life never having thought about.
    The problem is that most people accept the law as a given, a fundamental fact. As a member of society, you obey or face the consequences. It is not safe to question why. This is because the enforcement arm of the law is the state, that peculiar agency with a unique power in society to
Paul Merrell

N.S.A. Able to Foil Basic Safeguards of Privacy on Web - NYTimes.com - 1 views

  • The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
  • The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
  • The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
  • ...11 more annotations...
  • “For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
  • Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.
  • For at least three years, one document says, GCHQ, almost certainly in collaboration with the N.S.A., has been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document. (Google denied giving any government access and said it had no evidence its systems had been breached).
  • Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip. “And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.
  • The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus on GCHQ but include thousands from or about the N.S.A. Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.
  • The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June. “Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.
  • Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.
  • At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service.
  • Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method. Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology and later by the International Organization for Standardization, which has 163 countries as members. Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.” “Eventually, N.S.A. became the sole editor,” the memo says.
  • But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence. A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum.
  • Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”
  •  
    Lengthy article, lots of new information on NSA decryption capabilities, none of it good for those who value their data privacy.
  •  
    Thanks Paul - nice job cutting this monster down to size :)
Gary Edwards

The Beholden State by Steven Malanga, City Journal Spring 2010 - 1 views

  •  
    The video, "The Beholden State", has become a sensation among California taxpayer groups for its vivid depiction of the audacious power that public-sector unions wield in their state. The unions' political triumphs have molded a California in which government workers thrive at the expense of a struggling private sector. The state's public school teachers are the highest-paid in the nation. Its prison guards can easily earn six-figure salaries. State workers routinely retire at 55 with pensions higher than their base pay for most of their working life. Meanwhile, what was once the most prosperous state now suffers from an unemployment rate far steeper than the nation's and a flood of firms and jobs escaping high taxes and stifling regulations. This toxic combination-high public-sector employee costs and sagging economic fortunes-has produced recurring budget crises in Sacramento and in virtually every municipality in the state. How public employees became members of the elite class in a declining California offers a cautionary tale to the rest of the country, where the same process is happening in slower motion. The story starts half a century ago, when California public workers won bargaining rights and quickly learned how to elect their own bosses-that is, sympathetic politicians who would grant them outsize pay and benefits in exchange for their support. Over time, the unions have turned the state's politics completely in their favor. The result: unaffordable benefits for civil servants; fiscal chaos in Sacramento and in cities and towns across the state; and angry taxpayers finally confronting the unionized masters of California's unsustainable government.
Paul Merrell

Failed NATO Invasion of Moldova SITREP, by Scott | The Vineyard of the Saker - 0 views

  • It’s hard to overestimate the value of planning in advance, especially when it comes to getting reservations in popular restaurants and invading countries by military force. In the week of the May 9th Victory Day two significant failures took place  each one remarkable in its own way. Each event went completely unreported by the Western corporate and government media, but discussed on Social Media.
  • In the following three weeks after the incident with the USS Florida, while Russia was preparing for Victory Day celebrations and all eyes were on Moscow, attention of Ukrainians was fully concentrated on the visit of Victoria Nuland to Kiev on April 26th allegedly to discuss the implementation of the Minsk II Agreement and the future elections in Donetsk and Lugansk republics. Since the day when President Putin said that the republics can have their elections anytime they want, the question of these elections ceased to be a subject of blackmail toward the Kremlin.   It appeared that the true reason for Nuland’s visit could be located to the west of Kiev, rather than the east. Just recently, Robert D. Kaplan, a former Stratfor’s Chief Geopolitical Analyst, and currently a senior fellow at the Center for a New American Security (CNAS) has published a book “In Europe’s Shadow” where he lays out a plan to reunite Romania with “its lost province of Moldova.” Nuland visited Moldova back in January, with the task to coerce Moldova’s government and its oligarchs to change the country’s Constitution provision of neutrality. Before she left, she gave a short speech at the American Embassy in Bucharest after a private dinner with PM Ciolos and President Klaus. “We powerfully support the desire of the people in Moldova to have responsible leaders who can implement reforms. This is the best way to assure the future of Moldova. Romania and the United States, in conjunction with NATO, have support programs in place to assure the security of Moldova but the government has to work to implement these programs.”
  • Moldova is one of the poorest countries in Eastern Europe, and its economy heavily relies on Russia. According to the CIA Fact Book: Moldova’s annual remittances of about $1.12 billion comes from the roughly one million Moldovans working in Europe, Russia, and other former Soviet Bloc countries; Moldova imports almost all of its energy supplies from Russia and Ukraine; Moldova’s dependence on Russian energy is underscored by a more than $5 billion debt to Russian natural gas supplier Gazprom; Moldova signed an Association Agreement and a Deep and Comprehensive Free Trade Agreement with the EU during fall 2014, however its biggest trade partner remains Russia. Everyone understands that a NATO membership will cut all economic ties with Russia, including jobs, and it will turn Moldova into a failed state, or in the CIA doublespeak, the country would stop being vulnerable to “Russian pressure.” Apparently, the failure of Moldova as a state, and its disappearance as a nation is also what the EU wants. On January 6, the new Moldovan Ambassador to Germany was presenting his credentials when, out of the blue, the German president asked the new ambassador what the procedure was for Republic of Moldova to formally unite with Romania. On May 4th, the Katehon reported on Vladimir Plahotniuc’s (the infamous Moldavian oligarch and mafia boss) visit to the US and his meeting with Victoria Nuland there. As the Victory Day celebration was approaching, we all fully anticipated from the US to conduct terror acts, military excursions/drills, and political and legal attacks on Russia as the US and the EU always do to harass Russia during its major national and Church holidays.
  • ...6 more annotations...
  • Starting with April 21st,  we saw a flurry of “news” about Ukraine and Romania joining NATO Black Sea flotilla and the organization of Romanian-Ukrainian-Bulgarian brigade similar to that created by Poland. On April 26, Georgia (Gruzia) pitched in via the Georgia Today: “creation of NATO Black Sea Fleet Gains US Support” and praising Turkey, Bulgaria and Romania for calls to expand the Western military. All what Russia said to all this NATO generated noise was a brief statement of  Russia’s envoy to NATO Alexander Grushko. “NATO should be in a position to know that all necessary steps will be taken from our side to neutralize the emerging threats.” With all these  preparations for the war on Russia going on, NATO also planned military drills in neutral Moldova, chosen to start on May 2nd, the day of remembrance for the victims of the Odessa Massacre. Meanwhile, the patriots of Moldavia who worked together regardless of their political views, discovered something interesting and saved Moldova. NATO reported that for drills they would be entering Moldova in four formations, and that the total of motorized units will be 50+. However, the very first formation that made an attempt to enter the territory of Moldova contained 100+ unites. This was just one formation. And there was expected three more formations.
  • The plan of NATO was to enter the country with too large for this tiny country forces, to stage a bloody false flag attack during the Victory Day celebration in Moldova with the participation of Ukrainian Right Sector terrorists masquerading as “pro-Russia separatists.” This plot worked in Ukraine, so it should work in Moldova, right? That’s the true reason why Nuland was in Kiev two weeks prior. After this false flag attack, a Romanian fleet was planned to enter Ukrainian territorial waters “by invitation of the Ukrainian government” and arrive to Odessa in order to block Russian fleets from interfering and helping Transnistria. But… Coming back to the bizarre incident near Gibraltar, when one NATO member’s tiny 20 tone Costal Guards’ boat was attacked by another NATO member for interfering with the 18,000 tones behemoth of a submarine  of the third NATO member. The NATO plan apparently was to stealthy and quietly position the Ohio-class ballistic guided-missile submarine USS Florida (SSGN 728) in the Mediterranean or even in the Black Sea so it would be able to shoot into Moldova to overwhelm Moldovan minuscule defense forces. We have to remember that it was the USS Florida “that opened up the Libya intervention,” firing more than 90 cruise missiles to destroy Libya’s air defenses and clearing the way for NATO air strikes. “Never before in the history of the United States of America has one ship conducted that much land attack strikes, conventionally, in one short time period,” Rear Adm. Rick Breckenridge had said.
  • However, thanks to Spanish Costal Guards the submarine was discovered and talked about all around the world via social media and the press. The USS Florida had no other options but to retreat and return to home base. In fact, there were TWO incidents on the same April 16th  day involving the USS Florida. First, it was  the Spanish patrol boat belonged to the Servicio de Vigilancia Aduanera, at whom the British Navy opened  fire.  A bit later,  the Guardia Civil vessel Rio Cedeña tried to cut across the submarine’s bow and was photographed  by multiple witnesses.
  • According to V.V. Pyakin, a political analyst with the Concept Technologies Foundation, a think tank located in St. Petersburg, NATO was in a process of conducting a full-scale invasion of Moldova with the annexation of a Southern part of Ukraine including Odessa to construct a NATO Navy base there. Moldova was supposed to become a part of Romania automatically with the US military forces arriving to the capital and taking  over the government of Moldova. That’s why NATO needed all those military “drills” in the Black Sea region and in the Baltics simultaneously. When the patriotic forces of Moldavia discovered that NATO was about to enter the territory of Moldova in four formations, 100+ motorized units each, they protested loudly and blocked the entrance of NATO troops on the border. Meanwhile, the biggest political fraction in Moldova threatened with the impeachment of the president for treason, if  NATO troops would be allowed to enter the country. Reports from Moldova at the time disclosed that American troops stopped at the border crossing didn’t have proper ID and other papers. Moldovans came to greet them with the banners “Moldova is a neutral country” and “Stop bases of NATO,” “Stop NATO” and “NATO go home.” As the result, on April 28th only about 60 units and 200 servicemen the U.S. Army 2nd Cavalry Regimental Engineer Squadron were allowed to enter the country.
  • When a formation of American military crossed the Romanian-Moldova border allegedly to take part in  Dragon Pioneer 2016 NATO military drills, Moldavian opposition leaders expressed protests. Several members of the Parliament blocked the road.  They reported to Russian and international media and news outlets that the US troops didn’t have an international agreement signed by the defense ministers of Moldova and USA. They also lacked a legal government agreement on the entrance of the heavy military equipment and weaponry to the territory of the country. 60% of American servicemen didn’t have valid military IDs. According to a TASS report,  “To prevent collisions, officers from the Fulger (Lightning) police battalion of special purpose intervened, which were specially delivered from Chisinau. After checking the documents, a column of military vehicles followed the US to the place of temporary location at the site of Negresht,” said the inspectorate.” “The initiative to invite the US troops into the country and hold the exhibition of American technology belongs to the Minister of Defense of Moldova Anatol Șalaru, who is famous for the organization of the “Museum of Soviet occupation” in Chisinau, calls to repeal neutrality and make the country a member of NATO, and the fight against monuments of the Soviet era.” This move was harshly criticized by Igor Dodon, whose party has the largest faction in Parliament and controls a quarter of the seats.
  • He stated: “We believe military exercises involving US troops on Moldovan territory is a flagrant violation of the constitutional principle of neutrality of Moldova. In this regard, the deputies from the Party of socialists have already initiated a number of procedures. They will continue, and this will be one of the reasons for introducing in May the initiative to dismiss the government.” By Victory Day it became apparent that the Nuland-Kogan-NATO plan for invasion of Moldova was foiled. All Americans could do was   to “crush” a Victory Day parade in the center of Moldova’s capital by coming uninvited and bringing their motorized vehicles to it. And that’s where NATO troops and Moldovan patriots came face to face. Pindos lost their freaking mind:  An American Colonel demands from the citizen of Moldova to leave the central square ПИНДОСЫ ОХРЕНЕЛИ В КОНЕЦ! Американский полковник предлагает покинуть центральную площадь Кишинева гражданину РМ pic.twitter.com/FfECO3NBXi — Серж Высоцкий (@Albertich50) May 12, 2016 An American Colonel demands from the citizen of Moldova to leave the central square
Paul Merrell

Is someone pinching pennies at Guantánamo prison? | Miami Herald - 0 views

  • Could the people at the Most Expensive Prison on Earth be pinching pennies?
  • Attorneys for the last 114 captives at the U.S. Navy base at Guantánamo Bay, Cuba, say they have been increasingly providing their clients with everything from T-shirts and socks and shoes to shampoo and vitamins to fill a long-term, unexplained need at the war on terror prison.Lawyers who have visited the prison as recently as this month say the captives’ U.S. military issue uniforms are faded, torn or tattered and their shoes have holes. In other instances, detainees tell their lawyers, personal hygiene supplies are cheap and simply don’t do the job. A case-in-point: When attorney Ramzi Kassem met detainee Shaker Aamer to share the news that the long-held Saudi prisoner was approved for transfer to Britain after Oct. 24, the captive was brought to their meeting in prison-issue canvas shoes held together by duct tape.
  • “Stuff’s just not getting replaced,” said attorney George Clarke who in late September spent about $300 on slip-on canvas shoes, plastic sandals, T-shirts and towels for his two detainee clients — both approved for repatriation, if the political situation improves in Yemen. “They say the stuff they get is crap. Or they’re not getting it.”Recently, he said, the detention center staff has been more accepting of contributions from the attorneys, suggesting prison commanders are confronted with a cash crunch or have realized they can pass along costs of basics to the private sector.
  • ...7 more annotations...
  • At the prison, a spokesman declined to say whether the raggedy clothing reflected a new policy or budget cutbacks but dismissed a question on whether there was a supply issue. Detainee provisions “have not changed,” Navy Capt. Christopher Scholl said tersely by email. The prison would not provide a list of what constitutes basic issue prisoner provisions these days. Nor would Scholl address a question about whether the quality of prison-issue items had degraded.
  • The International Committee of the Red Cross would not say whether delegates have raised the issue in confidential talks with the prison commander. The Miami Herald spoke, separately, with 12 attorneys who have met captives in recent months and describe detainees showing up at legal meetings looking disheveled and needing replacement footwear or clothes. The attorneys say the appearance is noteworthy because through the years all but mentally ill captives have tried to tidy up for their legal meetings.“They’re looking pretty threadbare,” attorney Cori Crider of the nonprofit Reprieve legal defense group said from the U.S. Navy base Tuesday after she bought shampoo and socks for one prisoner. “It’s an escalating complaint that people are being left in rags.”The lawyers quote their clients as saying some supplies have disappeared entirely at the prison, which boasts Muslim sensitivity and humane treatment. Some just aren’t replaced frequently enough, they claim.
  • Into this vacuum attorneys who represent the detainees at no charge have for about nine months routinely spent hundreds of dollars on each trip to buy their clients basic provisions at the base commissary, the Navy Exchange, or NEX.In March, Chicago attorney Patricia Bronte, a solo practitioner, spent $136.25 on shoes and Gold Toe socks for her two Yemeni clients. She left them with a prison lawyer, who got them to the clients after she left the base — something she knows because she got thank-you notes via the prison’s legal mail system.
  • “I have noticed that sometimes the client appears at the meetings with shoes that look pretty beaten up. So I went to the NEX and I bought shoes and socks.” Also $6.12 in toothbrushes and toothpaste, according to her commissary receipt.“Understand, I’m not complaining. I don’t mind buying my clients shoes to improve their conditions,” she said. “It’s the gall of this country. To detain these guys for little or no reason for 14 years and not provide them with shoes is offensive.”
  • Prison officials had already stopped spending taxpayers’ money on books, videos and electronic games for the detainee diversion program, according to media visits in the past year, leaving it to the Red Cross and lawyers to donate to the Detainee Library. Kassem, the attorney, said his clients quoted guards and other prison staff as blaming budget cuts at the prison where the Pentagon maintains a 2,000-plus staff for 114 captives and has spent more than $5 billion. “Sometimes it’s a problem of poor toiletries — soap that doesn’t lather, toothpaste that doesn’t froth, deodorant that doesn’t prevent body odor,” said Kassem, a professor at the City University of New York School of Law whose legal clinic represents five Guantánamo detainees. Captives he sees in the prison’s iconic orange prison uniform are wearing old, torn and much less orange jumpsuits, he said.The prisoners are perplexed, Kassem said. “They’ve heard how much it costs per prisoner. They wonder, where’s all the money?”“Somebody’s pinching pennies, it seems,” he said, describing the prison-issue footwear on Aamer, the next detainee to be released, as “Oliver Twist tattered” despite repeated pleas for a replacement pair.
  • Over at the secret prison for former long-held CIA captives, Camp 7, the detainees are taking vitamin D furnished by defense attorneys Cheryl Bormann and Air Force Capt. Michael Schwartz.Walid bin Attash spent years without exposure to sunlight in a so-called CIA black site before he got to Camp 7 in 2006. Now, he’s told his lawyers, his medical record shows a severe vitamin D deficiency. He asked his defense team for a halal version of the supplement, which the prison doesn’t provide. One attorney, who asked not to be identified, quoted a prison medical officer as telling detainees “there’s no money for that.”So bin Attash’s lawyers ordered kosher vitamin D — no forbidden products in those gel caps — and gave it to the military staff attorney assigned to Camp 7. The prison’s medical officer has apparently doled them out to other former CIA black site captives because bin Attash needs a resupply sooner than a one-a-day distribution would require, Bormann said.“We’ve been having to purchase vitamin D for our client,” said Bormann, a criminal defense attorney with death-penalty experience. “It’s crazy.” At a civilian prison, she said, the lawyers wouldn’t have to buy and furnish it. They’d go to a federal or state judge, who would order the prison to provide it.
  • Lists of purchases provided by more than a dozen attorneys include toothbrushes, toothpaste, bar soap, shampoo, deodorant, slip-on sandals that double as slippers, white socks, white T-shirts, towels, no-lace sneakers, canvas slip-on shoes, pillows, books, individual DVD players, video games and audio tapes. Those reached the clients after a guard inspection — as did tahini, ginger, allspice, mint oil, mint tea, ginger tea, Nesquik, olive oil, ground cloves, henna and almonds, around Ramadan. Lawyers also said they have submitted other items that were rejected — notably black socks, hairbrushes, combs and aftershave (probably for its taboo alcohol content).
Paul Merrell

Yemen crisis: What will Saudi Arabia do when - not if - things go wrong in their war wi... - 0 views

  • The depth of the sectarian war unleashed in Yemen shows itself in almost every Gulf Arab official statement and in the official press. The Saudis take it as read that Iranian forces are actually present in Yemen to assist the Shia Houthis. There are Hezbollah fighters from Lebanon with the Houthis. Iran is itself behind the Houthi uprising. One Kuwaiti journalist calls the Houthi rebels “rats”. As usual in Arab wars, real evidence has gone out of the window.
  • At a Syrian refugee conference in Kuwait this week, the Saudis were lauded for their generosity in pledging $60m for homeless and destitute Syrians out of a total of $3.8bn of promised aid world wide. No-one was ungenerous enough to mention that the Saudis bought $67bn worth of weapons from the US in 2011-12.
  • With that kind of money you might be able to buy up most of the protagonists in the Syrian war and get them to agree on a ceasefire. But this is the figure that makes sense of the Yemen war.That, and the fact that Pakistan is part of this extraordinary coalition. Pakistan is a nuclear power – “Saudi Arabia’s nuclear bomb outside Saudi Arabia”, as one conference delegate bleakly put it in Kuwait.There are 8,000 Pakistani troops based in the Saudi kingdom. And Pakistan is one of the most corrupt and unstable nations in South-west Asia. Bringing Pakistan – widely believed to have shipped second-hand weapons to anti-government rebels in Syria via Saudi Arabia – into the Yemen conflict is not adding oil to the fire. It’s adding fire to the oil.Iran has maintained a diplomatic silence. When Saudi foreign minister Saud al-Faisal accused Iran of supporting the destabilisation of Yemen, the Iranian deputy foreign minister, Hossein Amir-Abdollahian warned that the Saudi attack was a “strategic mistake”, a comparatively mild reaction.
  • ...3 more annotations...
  • Perhaps that is what you expected to hear when the Iranian minister’s nation was still trying to persuade the Americans to lift sanctions against Tehran. Or perhaps he actually meant what he said, which means that the Saudis may find it to have been easier starting a war in Yemen than ending one.
  • The leader of the Lebanese Shia Hezbollah movement, Hassan Nasrallah, scored a point in his own country when he asked why the Saudis were prepared to fight the Houthis with their huge forces but had never raised the sword to fight for the Palestinians.Saudis are being told to regard their country’s struggle as a decision even more important than Saudi Arabia’s appeal to the US to send troops to the land of the Two Holy Mosques in 1990 – a view Osama bin Laden might have disagreed with.What is less clear, however, is where Washington stands amid all this rhetorical froth in the Gulf and real dead bodies in Yemen. There have been reports in the Arab states that US drone attacks have been made as part of the coalition’s battle in Yemen, that American intelligence has been pin-pointing targets for the Saudis (with the usual civilian casualties). There was a time when America’s war in Yemen seemed to be just part of the whole War on Terror fandango throughout the Middle East. Not any more.
  • And what of Israel? In Kuwait, Arabs privately agreed that Saudi fears of Iran’s nuclear potential suited Israel very well – although there has been no evidence in the Gulf that Israel heartily supported the Saudis to the point of sending them a message of approval over the Yemen assault.But with the US an ally of both countries, this would be unnecessary. What we now have to learn is what the Saudis will do when – not if – things go wrong.Ask the Pakistanis to send part of their vast army into the cauldron? Or ask their Egyptian allies to earn their pocket money from Riyadh by sending their soldiers to the land which the greatest of all Egyptian presidents once retreated from with deep regret: a man called Gamel Abdul Nasser
  •  
    The Saudis did request that Pakistan send in ground troops. The Pakistan Parliament is in its fourth day of debating the issue, with very strong opposition to the Saudi request. Still, the Saudis have sent Parkistan so much financial aid that fears of not acceding to the request might prevail. But another factor is that Pakistan has its domestic unrest to fight along the Afghan border where U.S. drones keep the kettle aboil; it may be reluctant to dilute its strength to send sufficient troops to Yemen to do the job.   Although the Saudi Army is ridiculously well-armed, it has no experience in fighting wars. The Saudis have preferred to work through mercenaries instead. If forced to send in its own troops, Yemen could indeed become the House of Saud's Afghanisatan.   The Houthi are battle-hardened and well organized along Hezbollah guerrilla lines with a Hezbollah advisory force in attendance. The Houthis took Yemen and no one should forget that Hezbollah has repelled the best that Israel could throw at them in Lebanon at least twice. (Hezbollah was originally trained by Iranian Revolutionary Guard forces in the early 1990s.) There is also the enormous home court advantage for the Houthis, even more pronounced if the Saudis send in their own troops; the Houthis would then be fighting Salafists for their very survival as a culture.  
Paul Merrell

How Secret Partners Expand NSA's Surveillance Dragnet - The Intercept - 0 views

  • Huge volumes of private emails, phone calls, and internet chats are being intercepted by the National Security Agency with the secret cooperation of more foreign governments than previously known, according to newly disclosed documents from whistleblower Edward Snowden. The classified files, revealed today by the Danish newspaper Dagbladet Information in a reporting collaboration with The Intercept, shed light on how the NSA’s surveillance of global communications has expanded under a clandestine program, known as RAMPART-A, that depends on the participation of a growing network of intelligence agencies.
  • It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as “third-party partners,” are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables. The NSA documents state that under RAMPART-A, foreign partners “provide access to cables and host U.S. equipment.” This allows the agency to covertly tap into “congestion points around the world” where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.
  • The secret documents reveal that the NSA has set up at least 13 RAMPART-A sites, nine of which were active in 2013. Three of the largest – codenamed AZUREPHOENIX, SPINNERET and MOONLIGHTPATH – mine data from some 70 different cables or networks. The precise geographic locations of the sites and the countries cooperating with the program are among the most carefully guarded of the NSA’s secrets, and these details are not contained in the Snowden files. However, the documents point towards some of the countries involved – Denmark and Germany among them. An NSA memo prepared for a 2012 meeting between the then-NSA director, Gen. Keith Alexander, and his Danish counterpart noted that the NSA had a longstanding partnership with the country’s intelligence service on a special “cable access” program. Another document, dated from 2013 and first published by Der Spiegel on Wednesday, describes a German cable access point under a program that was operated by the NSA, the German intelligence service BND, and an unnamed third partner.
  • ...2 more annotations...
  • The program, which the secret files show cost U.S. taxpayers about $170 million between 2011 and 2013, sweeps up a vast amount of communications at lightning speed. According to the intelligence community’s classified “Black Budget” for 2013, RAMPART-A enables the NSA to tap into three terabits of data every second as the data flows across the compromised cables – the equivalent of being able to download about 5,400 uncompressed high-definition movies every minute. In an emailed statement, the NSA declined to comment on the RAMPART-A program. “The fact that the U.S. government works with other nations, under specific and regulated conditions, mutually strengthens the security of all,” said NSA spokeswoman Vanee’ Vines. “NSA’s efforts are focused on ensuring the protection of the national security of the United States, its citizens, and our allies through the pursuit of valid foreign intelligence targets only.”
  • The Danish and German operations appear to be associated with RAMPART-A because it is the only NSA cable-access initiative that depends on the cooperation of third-party partners. Other NSA operations tap cables without the consent or knowledge of the countries that host the cables, or are operated from within the United States with the assistance of American telecommunications companies that have international links. One secret NSA document notes that most of the RAMPART-A projects are operated by the partners “under the cover of an overt comsat effort,” suggesting that the tapping of the fiber-optic cables takes place at Cold War-era eavesdropping stations in the host countries, usually identifiable by their large white satellite dishes and radomes. A shortlist of other countries potentially involved in the RAMPART-A operation is contained in the Snowden archive. A classified presentation dated 2013, published recently in Intercept editor Glenn Greenwald’s book No Place To Hide, revealed that the NSA had top-secret spying agreements with 33 third-party countries, including Denmark, Germany, and 15 other European Union member states:
  •  
    Don't miss the slide with the names of the NSA-partner nations. Lots of E.U. member nations.
Paul Merrell

Sloppy Cyber Threat Sharing Is Surveillance by Another Name | Just Security - 0 views

  • Imagine you are the target of a phishing attack: Someone sends you an email attachment containing malware. Your email service provider shares the attachment with the government, so that others can configure their computer systems to spot similar attacks. The next day, your provider gets a call. It’s the Department of Homeland Security (DHS), and they’re curious. The malware appears to be from Turkey. Why, DHS wants to know, might someone in Turkey be interested in attacking you? So, would your email company please share all your emails with the government? Knowing more about you, investigators might better understand the attack. Normally, your email provider wouldn’t be allowed to give this information over without your consent or a search warrant. But that could soon change. The Senate may soon make another attempt at passing the Cybersecurity Information Sharing Act, a bill that would waive privacy laws in the name of cybersecurity. In April, the US House of Representatives passed by strong majorities two similar “cyber threat” information sharing bills. These bills grant companies immunity for giving DHS information about network attacks, attackers, and online crimes.
  • Sharing information about security vulnerabilities is a good idea. Shared vulnerability data empowers other system operators to check and see if they, too, have been attacked, and also to guard against being similarly attacked in the future. I’ve spent most of my career fighting for researchers’ rights to share this kind of information against threats from companies that didn’t want their customers to know their products were flawed. But, these bills gut legal protections against government fishing expeditions exactly at a time when individuals and Internet companies need privacy laws to get stronger, not weaker. 
  • Worse, the bills aren’t needed. Private companies share threat data with each other, and even with the government, all the time. The threat data that security professionals use to protect networks from future attacks is a far more narrow category of information than those included in the bills being considered by Congress, and will only rarely contain private information. And none of the recent cyberattacks — not Sony, not Target, and not the devastating grab of sensitive background check interviews on government employees at the Office of Personnel Management — would have been mitigated by these bills.
Paul Merrell

Israel's settlement law: Consolidating apartheid | Israel | Al Jazeera - 0 views

  • "Israel has just opened the 'floodgates', and crossed a 'very, very thick red line'." These were the words of Nickolay Mladenov, United Nations' Coordinator for the Middle East Peace Process, in response to the passing of a bill at the Israeli Knesset on February 7 that retroactively legalises thousands of illegal settler homes, built on stolen Palestinian land. Mladenov's job title has grown so irrelevant in recent years that it merely delineates a reference to a bygone era: a "peace process" that has ensured the further destruction of whatever remained of the Palestinian homeland. Israeli politicians' approval of the bill is indeed an end of an era. We have reached the point where we can openly declare that the so-called peace process was an illusion from the start, for Israel had no intentions of ever conceding the occupied West Bank and East Jerusalem to the Palestinians. In response to the passing of the bill, many news reports alluded to the fact that the arrival of Donald Trump in the White House, riding a wave of right-wing populism, was the inspiration needed by equally right-wing Israeli politicians to cross that "very, very thick red line". There is truth to that, of course. But it is hardly the whole story.
  • The political map of the world is vastly changing. Just weeks before Trump made his way to the Oval Office, the international community strongly condemned Israel's illegal settlements on Palestinian land occupied since 1967, including East Jerusalem.
  • That date, Trump's inauguration was the holy grail for Israel's right-wing politicians, who mobilised immediately after Trump's rise to power. Israel's intentions received additional impetus from Britain's Conservative Prime Minister, Theresa May. Despite her government vote to condemn Israeli settlements at the UN, she too ranted against the US for its censure of Israel.
  • ...4 more annotations...
  • With the UK duly pacified, and the US in full support of Israel, moving forward with annexing Palestinian land became an obvious choice for Israeli politicians. Bezalel Smotrich, a Knesset member of the extremist Jewish Home party, put it best. "We thank the American people for voting Trump into office, which was what gave us the opportunity for the bill to pass," he said shortly after the vote.
  • The so-called "Regulation Bill" will retroactively validate 4,000 illegal structures built on private Palestinian land. In the occupied Palestinian territories, all Jewish settlements are considered illegal under international law, as further indicated in UNSC Resolution 2334. There are also 97 illegal Jewish settlement outposts - a modest estimation - that are now set to be legalised and, naturally, expanded at the expense of Palestine. The price of these settlements has been paid mostly by US taxpayers' money, but also the blood and tears of Palestinians, generation after generation. It is important, though, that we realise that Israel's latest push to legalise illegal outposts and annex large swaths of the West Bank is the norm, not the exception.
  • But what is the Palestinian leadership doing about it? "I can't deny that the (bill) helps us to better explain our position. We couldn't have asked for anything more," a Palestinian Authority official told Al-Monitor on condition of anonymity, as quoted by Shlomi Elder. WATCH: 'The settlers and the guards harass us and our children' (2:35) Elder writes: "The bill, whether it goes through or is blocked by the Supreme Court, already proves that Israel is not interested in a diplomatic resolution of the conflict."
  • The greatest mistake that the Palestinian leadership has committed (aside from its disgraceful disunity) was entrusting the US, Israel's main enabler, with managing a "peace process" that has allowed Israel time and resources to finish its colonial projects, while devastating Palestinian rights and political aspirations. Returning to the same old channels, using the same language, seeking salvation at the altar of the same old "two-state solution" will achieve nothing, but to waste further time and energy. It is Israel's obstinacy that is now leaving Palestinians (and Israelis) with one option, and only one option: equal citizenship in one single state or a horrific apartheid. No other "solution" suffices. In fact, the Regulation Bill is further proof that the Israeli government has already made its decision: consolidating apartheid in Palestine. If Trump and May find the logic of Netanyahu's apartheid acceptable, the rest of the world shouldn't. In the words of former President Jimmy Carter, "Israel will never find peace until it ... permit(s) the Palestinians to exercise their basic human and political rights." That Israeli "permission" is yet to arrive, leaving the international community with the moral responsibility to exact it.
  •  
    Not mentioned in the article: the Knesset's Regulation Bill formally annexed territory inside the West Bank and holds that Israeli law, rather than military law, will now govern the annexed portions. That is the fact that establishes a clean break with the 2-state solution and flies in the face of international law including the Fourth Geneva Convention, which strictly prohibits annexation and requires the immediate withdrawal of invading military forces from occupied territories immediately upon cessation of hostilities, which occurred in 1967. The two-state solution is dead, although the Regulation Bill will likely be overturned by the Israeli Supreme Court. Trump gave Israel's ultra-right wing leaders way too much encouragement.
Paul Merrell

National Defense Authorization Act of 2014 Authorizes Cyber Warfare Against American Ci... - 0 views

  • In the midst of the holiday season Congress decided to pass the National Defense Authorization Act of 2014 or NDAA.  The bill was later signed into law by President Obama with little if any fanfare.
  •  The NDAA contains a number of highly questionable sections that run contrary to the principles articulated in the United States Constitution.  Specifically, language contained in the bill appears to authorize cyber warfare operations against the American people.
  • All of this is even more concerning when one considers that the NDAA also has a lot of new cyber warfare initiatives.  Section 931 through Section 942 contains a bunch of crazy stuff dealing with the world of cyber warfare..Section 932 authorizes the creation of a position known as The Principal Cyber Advisor which will be responsible for supervising offensive and defensive cyber warfare activities.  Obviously this position would not be created unless the federal government is intending upon involving itself in both offensive and defensive cyber warfare well into the future.  Section 933 instructs the Secretary of Defense to conduct a broad mission analysis of the government’s cyber warfare capabilities.  The required analysis will focus primarily on how they will manage, increase and enhance their personnel assigned to cyber warfare operations.  It even disallows the reduction of cyber warfare personnel assigned to the Air National Guard.
  • ...2 more annotations...
  • Section 936 requests the Secretary of Defense to strengthen outreach and threat awareness programs for small businesses.  This is allegedly to assist businesses that are awarded contracts by the Department of Defense to understand cyber threats, develop plans to protect intellectual property and networks of such businesses.  Realistically, this section appears to give the Department of Defense the authority to mandate all sorts of cyber security requirements on small businesses that they do transactions with.  The language of the section makes it sound as if they will be doing these small businesses a favor when the opposite appears to be the case.Section 940 authorizes the President to establish a process and policy to control the proliferation of cyber weapons through law enforcement activities, financial means, diplomatic engagement and pretty much any other means that the President considers appropriate.  This would also include potential private industry participation in the initiative.  The objective of the process is to suppress the trade of so-called cyber tools that could be used for criminal, terrorist or military activities.  The term cyber weapon is not explicitly defined in the section so this could be considered almost anything be it software or hardware that they declare could potentially be used for a nefarious purpose.  Even something like bit torrent and torrent related applications could be considered cyber weapons since copyrighted material is consistently transferred back and forth using these tools.  As a result, the use of these tools could potentially fall under the classification of criminal activity.  Once again we have the President being given expansive powers from Congress with its extremely broad use of language in the bill. 
  • Section 941 directs the president to establish an interagency policy to deter adversaries in cyberspace.  The word adversaries is yet again not specifically defined in the section so this could also mean almost anything.  With many American citizens not trusting the United States government this could mean a policy to deter or stifle anyone from political opponents to protesters who voice their disgust on the Internet.Overall, between the records collection initiative and the immense cyber warfare planning that is outlined in the NDAA it is becoming painfully clear that the United States government is turning the Internet into a battlefield.
Gary Edwards

Living in the small spaces around the State | RedState - 1 views

  • That’s why socialists despise federalism.
    • Gary Edwards
       
      Socialist despise federalism?  I disagree.  Socialist love big big and bigger government.  To the socialist, "the needs of society trump the rights and liberty of the individual".  That's why the HATE the Constitution!  The founding documents mark the first time in mankind's recorded history that God given inalienable individual rights and freedoms are the central force and moral imperative driving the institution of government.  To the founders, government only exists to protect the inalienable rights and freedoms of the individual.  The need for an "ordered society" is exactly to protect individual liberty! The socialist rejects this moral imperative and the ordered society created by the founding documents.  They reject the Constitution because it protects and champions individual liberty. 
    • Gary Edwards
       
      Perhaps there is a difference between what the founding fathers meant by Federalism, and what a Socialist means.  The founders thought of Federalism as a system of government where governance is balanced and divided three ways:  federal government, State government, and individual citizens. The powers and authorities of both federal and State governments were carefully enumerated and limited to only those emumerations.  Incredibly, the States voted to ratify the Constitution, thereby creating the Federal government.  Including full recognition of the Supremacy Clause and, the 9th and 10th Amendments.   And then, they embedded the Constitution in their own State Constitutions. I know of no socialist who accepts the concept of individual liberty trumping or even being equal to either State or Federal government authority.  The "Federalism" they accept does not include individual rights and authorities.  They also see State government as a subset of Federal government - and not the independent, sovereign governments consenting to the exact, enumerated authorities and powers granted the Federal government through the Constitution.  A grant that came from the people, and the States themselves.
  • Only centralized, inescapable power will do.  Otherwise, citizens can escape from oppressive socialist schemes by moving to a different community, which is relatively easy to do in 21st-century America.
  •  The Founders were very big on the importance of free people granting, and by extension withdrawing, consent from government.
  • ...14 more annotations...
  •  Moving away is the simplest method of withdrawing consent.  The ability to walk away from any deal, public or private, is the essential fuel of competition.  That’s why we are always on guard against monopolistic business practices.  Who cares whether a captive audience applauds or not?
  • But the Left insists on monopoly in the case of government power.  Elections are to be followed by obedience.  And this sphere of inescapable power grows relentlessly.
  • The one thing we are not allowed to vote on, ever, is reducing the size of government, and therefore increasing the sphere of liberty.
  • To the Left, that kind of talk is seditious.  Elections are about nudging the government into applying one trillion-dollar solution or other to society’s problems, but there must be a trillion-dollar solution.  Those who would prefer the government to do nothing are considered cruel or selfish… but the government “doing nothing” is the very definition of liberty.
  • So everything is now a matter of government interest, which means politics is all-consuming.  It’s amusing to listen to someone complain that they don’t like politics – a very common sentiment – while also declaring themselves comfortable with gigantic maternal government.
  • If you want the State to control, provide, tax, and limit everything, you had bloody well better learn to love politics.  They will be everywhere; they must be.
  • And because one person’s votes and opinions matter very little against the power of a mighty central government that controls the lives of hundreds of millions of people, you had better be prepared to get organized.  Your interests will only be protected if you belong to a large, aggressive political collective that can command the attention of politicians.
  • You must be aggressive in asserting those interests against others.  The State-run economy is a zero-sum game, a very limited pie, sliced with extremely sharp knives.  You either take, or you give.
  • The last energy of federalism will be drained away when the basket-case blue states begin imploding, and everyone else is taxed to bail them out.  It won’t matter that your state government was managed responsibly, or that your governor provided a growth-oriented business-friendly environment.  Your reward for that will be a bigger share of the bailout for the left-wing lunatics in Illinois and California.
  • Big Government is fundamentally incompatible with social harmony, although its acolytes are always trying to argue the reverse.
  • If you seek a more genteel society with less political strife, you want states to compete with each other for citizens.  
  • You want a federal government that will make America a magnet for investment, instead of building regulatory fences to keep it from fleeing overseas.  You want a system that spends less time telling people what they’re allowed to work for, and obliged to settle for.  
  • You want people to cooperate voluntarily, rather than using force to impose their demands on each other.  Life in such a society is not always placid, but at least the discord tends to be more productive.
  • Government is force.  Big government means more force.  Release cannot be tolerated, or else force dissipates.  Look at the current idiocy of the Washington, D.C. city council’s efforts to arrange a special $12.50 “living wage” that will only apply to Wal-Mart, which wanted to build a few stores in poverty-stricken, high-unemployment communities.  Wal-Mart said no thanks, and escaped.  The living wage crowd is very angry about this.  They won’t be happy until escape is impossible.
Paul Merrell

Surveillance scandal rips through hacker community | Security & Privacy - CNET News - 0 views

  • One security start-up that had an encounter with the FBI was Wickr, a privacy-forward text messaging app for the iPhone with an Android version in private beta. Wickr's co-founder Nico Sell told CNET at Defcon, "Wickr has been approached by the FBI and asked for a backdoor. We said, 'No.'" The mistrust runs deep. "Even if [the NSA] stood up tomorrow and said that [they] have eliminated these programs," said Marlinspike, "How could we believe them? How can we believe that anything they say is true?" Where does security innovation go next? The immediate future of information security innovation most likely lies in software that provides an existing service but with heightened privacy protections, such as webmail that doesn't mine you for personal data.
  • Wickr's Sell thinks that her company has hit upon a privacy innovation that a few others are also doing, but many will soon follow: the company itself doesn't store user data. "[The FBI] would have to force us to build a new app. With the current app there's no way," she said, that they could incorporate backdoor access to Wickr users' texts or metadata. "Even if you trust the NSA 100 percent that they're going to use [your data] correctly," Sell said, "Do you trust that they're going to be able to keep it safe from hackers? What if somebody gets that database and posts it online?" To that end, she said, people will start seeing privacy innovation for services that don't currently provide it. Calling it "social networks 2.0," she said that social network competitors will arise that do a better job of protecting their customer's privacy and predicted that some that succeed will do so because of their emphasis on privacy. Abine's recent MaskMe browser add-on and mobile app for creating disposable e-mail addresses, phone numbers, and credit cards is another example of a service that doesn't have access to its own users' data.
  • Stamos predicted changes in services that companies with cloud storage offer, including offering customers the ability to store their data outside of the U.S. "If they want to stay competitive, they're going to have to," he said. But, he cautioned, "It's impossible to do a cloud-based ad supported service." Soghoian added, "The only way to keep a service running is to pay them money." This, he said, is going to give rise to a new wave of ad-free, privacy protective subscription services.
  • ...2 more annotations...
  • The issue with balancing privacy and surveillance is that the wireless carriers are not interested in privacy, he said. "They've been providing wiretapping for 100 years. Apple may in the next year protect voice calls," he said, and said that the best hope for ending widespread government surveillance will be the makers of mobile operating systems like Apple and Google. Not all upcoming security innovation will be focused on that kind of privacy protection. Security researcher Brandon Wiley showed off at Defcon a protocol he calls Dust that can obfuscate different kinds of network traffic, with the end goal of preventing censorship. "I only make products about letting you say what you want to say anywhere in the world," such as content critical of governments, he said. Encryption can hide the specifics of the traffic, but some governments have figured out that they can simply block all encrypted traffic, he said. The Dust protocol would change that, he said, making it hard to tell the difference between encrypted and unencrypted traffic. It's hard to build encryption into pre-existing products, Wiley said. "I think people are going to make easy-to-use, encrypted apps, and that's going to be the future."
  • Companies could face severe consequences from their security experts, said Stamos, if the in-house experts find out that they've been lied to about providing government access to customer data. You could see "lots of resignations and maybe publicly," he said. "It wouldn't hurt their reputations to go out in a blaze of glory." Perhaps not surprisingly, Marlinspike sounded a hopeful call for non-destructive activism on Defcon's 21st anniversary. "As hackers, we don't have a lot of influence on policy. I hope that's something that we can focus our energy on," he said.
  •  
    NSA as the cause of the next major disruption in the social networking service industry?  Grief ahead for Google? Note the point made that: "It's impossible to do a cloud-based ad supported service" where the encryption/decryption takes place on the client side. 
Gary Edwards

Welcome to Post-Constitution America - Peter Van Buren - 0 views

  • On July 30, 1778, the Continental Congress created the first whistleblower protection law, stating “that it is the duty of all persons in the service of the United States to give the earliest information to Congress or other proper authority of any misconduct, frauds, or misdemeanors committed by any officers or persons in the service of these states.”
  • Two hundred thirty-five years later, on July 30, 2013, Bradley Manning was found guilty on 20 of the 22 charges for which he was prosecuted, specifically for “espionage” and for videos of war atrocities he released, but not for “aiding the enemy.”
  • Days after the verdict, with sentencing hearings in which Manning could receive 136 years of prison time ongoing, the pundits have had their say. The problem is that they missed the most chilling aspect of the Manning case: the way it ushered us, almost unnoticed, into post-Constitutional America.
  • ...22 more annotations...
  • As at Guantanamo, rules of evidence reaching back to early
  • During the months of the trial, the U.S. military refused to release official transcripts of the proceedings. Even a private courtroom sketch artist was barred from the room. Independent journalist and activist Alexa O’Brien then took it upon herself to attend the trial daily, defy the Army, and make an unofficial record of the proceedings by hand. Later in the trial, armed military police were stationed behind reporters listening to testimony. Above all, the feeling that Manning’s fate was predetermined could hardly be avoided. After all, President Obama, the former Constitutional law professor, essentially proclaimed him guilty back in 2011 and the Department of Defense didn’t hesitate to state more generally that “leaking is tantamount to aiding the enemies of the United States.”
  • And so to Bradley Manning. As the weaponry and technology of war came home, so did a new, increasingly Guantanamo-ized definition of justice. This is one thing the Manning case has made clear. As a start, Manning was treated no differently than America’s war-on-terror prisoners at Guantanamo and the black sites that the Bush administration set up around the world. Picked up on the “battlefield,” Manning was first kept incommunicado in a cage in Kuwait for two months with no access to a lawyer. Then, despite being an active duty member of the Army, he was handed over to the Marines, who also guard Guantanamo, to be held in a military prison in Quantico, Virginia. What followed were three years of cruel detainment, where, as might well have happened at Gitmo, Manning, kept in isolation, was deprived of clothing, communications, legal advice, and sleep. The sleep deprivation regime imposed on him certainly met any standard, other than Washington’s and possibly Pyongyang’s, for torture. In return for such abuse, even after a judge had formally ruled that he was subjected to excessively harsh treatment, Manning will only get a 112-day reduction in his eventual sentence. Eventually the Obama administration decided Manning was to be tried as a soldier before a military court. In the courtroom, itself inside a military facility that also houses NSA headquarters, there was a strikingly gulag-like atmosphere.  His trial was built around secret witnesses and secret evidence; severe restrictions were put on the press -- the Army denied press passes to 270 of the 350 media organizations that applied; and there was a clear appearance of injustice. Among other things, the judge ruled against nearly every defense motion.
  • “What constitutes due process in this case is a due process in war.”
  • Given all this, it is small comfort to know that Manning, nailed on the Espionage Act after multiple failures in other cases by the Obama administration, was not convicted of the extreme charge of “aiding the enemy.”
  • Obama administration lawyers went on to claim the legal right to execute U.S. citizens without trial or due process and have admitted to killing four Americans. Attorney General Eric Holder declared that “United States citizenship alone does not make such individuals immune from being targeted.”
  • As if competing for an Orwellian prize, an unnamed Obama administration official told the Washington Post,
  • English common law were turned upside down. In Manning’s case, he was convicted of espionage, even though the prosecution did not have to prove either his intent to help another government or that harm was caused; a civilian court had already paved the way for such a ruling in another whistleblower case. In addition, the government was allowed to label Manning a “traitor” and an “anarchist” in open court, though he was on trial for neither treason nor anarchy.
  • Similarly, full-spectrum spying is not considered to violate the Fourth Amendment and does not even require probable cause.
  • Justice can be twisted and tangled into an almost unrecognizable form and then used to send a young man to prison for decades.
  • Government officials concerned over possible wrongdoing in their departments or agencies who “go through proper channels” are fired or prosecuted.
  • Government whistleblowers are commanded to return to face justice, while law-breakers in the service of the government are allowed to flee justice. CIA officers who destroy evidence of torture go free, while a CIA agent who blew the whistle on torture is locked up.
  • Thanks to the PATRIOT Act, citizens, even librarians, can be served by the FBI with a National Security Letter (not requiring a court order) demanding records and other information, and gagging them from revealing to anyone that such information has been demanded or such a letter delivered.
  • Citizens may be held without trial, and denied their Constitutional rights as soon as they are designated “terrorists.” Lawyers and habeas corpus are available only when the government allows.
  • The war on whistleblowers is metastasizing into a war on the First Amendment.
  • People may now be convicted based on secret testimony by unnamed persons.
  • Military courts and jails can replace civilian ones.
  • An Obama administration Insider Threat Program requires federal employees (including the Peace Corps) to report on the suspicious behavior of coworkers.
  • Claiming its actions lawful while shielding the “legal” opinions cited, often even from Congress, the government can send its drones to assassinate its own citizens.
  • One by one, the tools and attitudes of the war on terror, of a world in which the “gloves” are eternally off, have come home.
  • The comic strip character Pogo’s classic warning -- “We have met the enemy and he is us” -- seems ever less like a metaphor.
  • According to the government, increasingly we are now indeed their enemy.
  •  
    Well written and researched article describing what it means to live in a post-Constitutional America.  Chilling facts with a cold but obvious conclusion.
Paul Merrell

Why Turkey wanted to provoke war with a 'false flag' terrorist attack on Syria - Stop t... - 0 views

  • A leaked talk by high-ranking Turkish officials reveals them talking about how easy it would be to create a false flag incident, and how they could use that to justify a wide military intervention inside Syria.
  • It was stunning to hear the highest-ranking Turks causally discussing how to provoke a false flag incident that would justify a large military intervention in Syria. This is a big deal because Turkish troops in Syria opens the door to NATO troops in Syria, which drastically expands the conflict. As someone who has spent a number of years living and working in the Middle East, and having been to Syria multiple times, I was encouraged by my colleagues at Casey Research to share my perspective on this.
  • Turkey owns a very small piece of territory inside of Syria that dates back to the Ottoman Empire. This small piece of land is the tomb of Suleyman Shah, a relative of one of the founding Ottomans. It’s guarded by 24 Turkish troops and is considered sovereign Turkish territory. Having Turkish troops in this area is not controversial, as the Syrian government has long agreed to it. The region where this tomb is located has totally fallen out of the Syrian government’s control for many months. And now, the hardcore ISIL group controls the surrounding area. It has threatened the Turkish soldiers and told them to leave. The Turks refused, and that’s why the Turkish government is getting skittish. This is where the leaked tape comes in.
  • ...3 more annotations...
  • The conversation started out with the Turks talking about how they can protect this tomb from ISIL. This is not controversial. I don’t believe the Syrian government would care about the Turks intervening to protect the tomb, since this is an area where it has lost control anyways. Plus, I’d bet the Syrian government would be happy to see the Turks bogged down fighting ISIL militants who’d otherwise be fighting them. However, that was not the end of the conversation. The really sinister part comes when the high-ranking Turks talk about how easy it would be to create a false flag incident involving the tomb, and how they could use that to justify a much wider military intervention inside Syria. Such an incident would be a sort of foot in the door to further military activities inside Syria and would allow the Turks to help their favored rebel groups, which have seen serious setbacks lately.
  • That step would clearly cause them to go to war with the Syrian government and drastically expand the conflict. And once Turkey is involved inside Syria, that opens the door for NATO to be involved. The Erdogan government has staked a huge amount of domestic political capital by supporting the Syrian rebels. They gambled that their favored rebel groups would quickly win and as a result, Turkey would have more geopolitical influence in a post-Assad Syria. It was a losing bet. Turkey’s favored rebels have seriously faltered, and a growing number of Turkish voters have become skeptical of their government’s intervention and the blowback it’s causing. A false flag incident with the tomb would be a way for Erdogan to double down in a desperate attempt to turn things around in Syria. Whoever leaked this conversation clearly timed it to take the wind out the sails of such a strategy.
  • There are only a few people with the capability and motivation to do this. As an ally of the Syrian government, Russian intelligence is at the top of that list. They have leaked similarly shocking private conversations in Ukraine recently. Members of the Turkish military opposed to Erdogan could have also done it. Instead of coming up with a classy way of saying “touché,” the Turkish government responded by throwing a childish fit, futilely trying to block YouTube and Twitter. In this digital age, restricting Internet access, seizing and spying on digital data, and otherwise tampering with an individual’s digital presence have become new tools in the traditional toolbox of desperate governments.
Paul Merrell

Core Secrets: NSA Saboteurs in China and Germany - The Intercept - 0 views

  • The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA.
  • with vast amounts of customer data, including phone records and email traffic. But documents published today by The Intercept suggest that even as the agency uses secret operatives to penetrate them, companies have also cooperated more broadly to undermine the physical infrastructure of the internet than has been previously confirmed. In addition to so-called “close access” operations, the NSA’s “core secrets” include the fact that the agency works with U.S. and foreign companies to weaken their encryption systems; the fact that the NSA spends “hundreds of millions of dollars” on technology to defeat commercial encryption; and the fact that the agency works with U.S. and foreign companies to penetrate computer networks, possibly without the knowledge of the host countries. Many of the NSA’s core secrets concern its relationships to domestic and foreign corporations.
  • Sentry Eagle includes six programs: Sentry Hawk (for activities involving computer network exploitation, or spying), Sentry Falcon (computer network defense), Sentry Osprey (cooperation with the CIA and other intelligence agencies), Sentry Raven (breaking encryption systems), Sentry Condor (computer network operations and attacks), and Sentry Owl (collaborations with private companies). Though marked as a draft from 2004, it refers to the various programs in language indicating that they were ongoing at the time, and later documents in the Snowden archive confirm that some of the activities were going on as recently as 2012.
  • ...3 more annotations...
  • The agency’s core secrets are outlined in a 13-page “brief sheet” about Sentry Eagle, an umbrella term that the NSA used to encompass its most sensitive programs “to protect America’s cyberspace.” “You are being indoctrinated on Sentry Eagle,” the 2004 document begins, before going on to list the most highly classified aspects of its various programs. It warns that the details of the Sentry Eagle programs are to be shared with only a “limited number” of people, and even then only with the approval of one of a handful of senior intelligence officials, including the NSA director. “The facts contained in this program constitute a combination of the greatest number of highly sensitive facts related to NSA/CSS’s overall cryptologic mission,” the briefing document states. “Unauthorized disclosure…will cause exceptionally grave damage to U.S. national security. The loss of this information could critically compromise highly sensitive cryptologic U.S. and foreign relationships, multi-year past and future NSA investments, and the ability to exploit foreign adversary cyberspace while protecting U.S. cyberspace.”
  • The most controversial revelation in Sentry Eagle might be a fleeting reference to the NSA infiltrating clandestine agents into “commercial entities.” The briefing document states that among Sentry Eagle’s most closely guarded components are “facts related to NSA personnel (under cover), operational meetings, specific operations, specific technology, specific locations and covert communications related to SIGINT enabling with specific commercial entities (A/B/C).” It is not clear whether these “commercial entities” are American or foreign or both. Generally the placeholder “(A/B/C)” is used in the briefing document to refer to American companies, though on one occasion it refers to both American and foreign companies. Foreign companies are referred to with the placeholder “(M/N/O).” The NSA refused to provide any clarification to The Intercept.
  • Documents: Sentry Eagle Brief Sheet (13 pages) TAREX Classification Guide (7 pages) Exceptionally Controlled Information Listing (6 pages) ECI WHIPGENIE Classification Guide (7 pages) ECI Pawleys Classification Guide (4 pages) ECI Compartments (4 pages) CNO Core Secrets Slide Slices (10 pages) CNO Core Secrets Security Structure (3 pages) Computer Network Exploitation Classification Guide (8 pages) CNO Core Secrets (7 pages)
Paul Merrell

An Israeli takeover of the Palestine Authority…? - Alan Hart - 0 views

  • On the face of it that’s a silly question and the speculation it represents – that Palestinian “President” Abbas could replaced by an Israeli agent or asset – is not worthy of discussion. But before dismissing it readers might do what I did and consider two things. The first is that Mohammed Dahlan, formerly one of the most powerful Fatah leaders and almost certainly the one who administered for Israel the polonium that killed Arafat, is now putting a big effort into getting rid of Abbas by one means or another and replacing him with – guess who? – himself. In passing it is interesting to note that according to a recent report in the Israeli newspaper Ma’ariv, Netanyahu’s special envoy, Yitzhak Molcho, is in a secret dialogue with Dahlan who spends his time shuttling between Cairo and the U.A.E. where he currently lives. One assumption has to be that Netanyahu is hoping that if Dahlan became “President” of the PA he would go much further than collaborator Abbas in delivering for Israel. (Also worth noting is that Dahlan speaks fluent Hebrew. He learned to do so during his 11 spells in Israeli jails between 1981 and 1986).
  • The second consideration is Israel’s track record in successfully placing its agents inside Arab institutions and organizations at very high levels.
  • My speculation (repeat speculation) is that if Mohammed Dahlan became the “President”, he would be prepared to use force as necessary to impose Israel’s terms for peace on the Palestinians. Dahlan demonstrated his enthusiasm for doing Israeli and American dirty work when, at the request of the Bush administration, he agreed to lead a military campaign to destroy Hamas after its election victory in 2006. The Bush administration provided Dahlan with money and arms and trained his Fatah fighters in a number of Arab countries. But it all went badly wrong for Dahlan and his sponsors. Hamas got wind of what Dahlan (fronting for the Bush administration and Israel) was intending and launched an Israeli-like pre-emptive strike. It destroyed Fatah’s security forces based in the Gaza Strip (which had been Dahlan’s base) and put Fatah politically out of business there. Commenting on what had happened in the Gaza Strip, Hani al-Hassan, for many years Arafat’s crisis manager and one of his two most trusted advisers, said it was “not a war between Fatah and Hamas but between Hamas and Fatah collaborators who served the Americans and the Israelis.”
  • ...3 more annotations...
  • Subsequently the Bush administration exerted heavy pressure on Abbas (which he resisted) to appoint Dahlan as his deputy. And some Palestinian officials said that the U.S. and a number of European countries had made it clear that they would like Dahlan to succeed Abbas as head of the P.A. They presumably believed then, as Netanyahu might well do today, that Dahlan as “President” would use whatever means were necessary to compel the Palestinians to make peace on Israel’s terms. Shortly after his forces were expelled from the Gaza Strip, Dahlan re-established himself in the West Bank. And thereafter tensions between his Fatah supporters and opponents grew and grew. In June 2011 he was expelled from Fatah because of the assumption that he had delivered for Israel whatever it was that poisoned Arafat. Three months later Abbas ordered a raid on Dahlan’s house and the arrest of his private armed guards. Today in exile, and consulting with his allies in Sisi’s Egypt and some Arab Gulf states as well as Israel and America, Dahlan is plotting his comeback to replace Abbas by one means or another.
  • The Ma’ariv article I mentioned above said that Dahlan has claimed that he and not Abbas can be counted on to bring peace, and that in 2010 he reportedly sent a letter to the Obama administration in which he said, “There is no choice but to replace Abbas with someone who can deliver results.” Because Dahlan must know that Israel’s leaders are not remotely interested in peace on terms the Palestinians could accept, I think it is reasonable to assume that the result he has in mind is peace imposed on Israel’s terms – effectively a Palestinian surrender to Zionism’s will. Is a Dahlan/Israeli takeover of the PA really possible? An indication that Abbas seems to think it cannot be ruled out was his request to President Obama that he press Israel to include Marwan Barghouti in the fourth and final batch of Palestinian prisoners due to be released at the end of this month. (Prisoner release was one of the inducements to secure Abbas’s green light for Secretary of State Kerry to launch his “peace process”. But today Netanyahu is under mounting pressure from the neo-fascist tendency to the right of him to say “No” to any further prisoner releases).
  • Barghouti is by far the most popular Palestinian leader and would easily win an election to replace Abbas as “President”. And that, of course, is precisely why Israel won’t release him. So if Abbas can be bullied and bribed by Israel and the U.S. into lifting the ban on Dahlan’s return from exile to the occupied West Bank, he, Dahlan, could be in with a chance. In my view a victory for him would be the final betrayal of the Palestinian cause.
1 - 20 of 22 Next ›
Showing 20 items per page