Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged public-confidence

Rss Feed Group items tagged

Paul Merrell

Americans' Trust in Mass Media Sinks to New Low - 0 views

  • Americans' trust and confidence in the mass media "to report the news fully, accurately and fairly" has dropped to its lowest level in Gallup polling history, with 32% saying they have a great deal or fair amount of trust in the media. This is down eight percentage points from last year.
  • Gallup began asking this question in 1972, and on a yearly basis since 1997. Over the history of the entire trend, Americans' trust and confidence hit its highest point in 1976, at 72%, in the wake of widely lauded examples of investigative journalism regarding Vietnam and the Watergate scandal. After staying in the low to mid-50s through the late 1990s and into the early years of the new century, Americans' trust in the media has fallen slowly and steadily. It has consistently been below a majority level since 2007.
  • Democrats' and independents' trust in the media has declined only marginally, with 51% of Democrats (compared with 55% last year) and 30% of independents (versus 33% last year) expressing trust. Over the past 20 years, Democrats have generally expressed more trust than Republicans in the media, although in 2000, the two parties were most closely aligned, with 53% of Democrats and 47% of Republicans professing trust.
  • ...4 more annotations...
  • While it is clear Americans' trust in the media has been eroding over time, the election campaign may be the reason that it has fallen so sharply this year. With many Republican leaders and conservative pundits saying Hillary Clinton has received overly positive media attention, while Donald Trump has been receiving unfair or negative attention, this may be the prime reason their relatively low trust in the media has evaporated even more. It is also possible that Republicans think less of the media as a result of Trump's sharp criticisms of the press. Republicans who say they have trust in the media has plummeted to 14% from 32% a year ago. This is easily the lowest confidence among Republicans in 20 years.
  • Older Americans are more likely than younger Americans to say they trust the media, but trust has declined among both age groups this year. Currently, 26% of those aged 18 to 49 (down from 36% last year) and 38% of those aged 50 and older (down from 45%) say they have a great deal or fair amount of trust in the media.
  • In 2001, younger Americans (55%) were more likely than older Americans (50%) to express trust and confidence in mass media. This gap emerged again in 2005 when 53% of 18- to 49-year-olds had trust and 45% of those 50 and older expressed the same sentiment. Yet in the past decade, older Americans have mostly had more confidence than younger Americans, and this year, the gap between these age groups is 12 points. And 2016 marks the first time that confidence among older Americans has dropped below 40% in polling since 2001.
  • The divisive presidential election this year may be corroding Americans' trust and confidence in the media, particularly among Republicans who may believe the "mainstream media" are too hyperfocused on every controversial statement or policy proposal from Trump while devoting far less attention to controversies surrounding the Clinton campaign. However, the slide in media trust has been happening for the past decade. Before 2004, it was common for a majority of Americans to profess at least some trust in the mass media, but since then, less than half of Americans feel that way. Now, only about a third of the U.S. has any trust in the Fourth Estate, a stunning development for an institution designed to inform the public. With the explosion of the mass media in recent years, especially the prevalence of blogs, vlogs and social media, perhaps Americans decry lower standards for journalism. When opinion-driven writing becomes something like the norm, Americans may be wary of placing trust on the work of media institutions that have less rigorous reporting criteria than in the past. On the other hand, as blogs and social media "mature," they may improve in the American public's eyes. This could, in turn, elevate Americans' trust and confidence in the mass media as a whole.
  •  
    Personally, I suspect the fact that mainstream media's journalism standards have dropped as MSM ownership has been consolidated into 6 giant corporations might have far more to do with the decline. So declined too has been the relevance of editorial focus. In other words, MSM has only itself to blame for the public's loss of confidence. Fortunately, we've seen the rise of independent investigative journalism via the internet. Alternative media now offers far richer sources of information than MSM, once you learn to filter unreliable sources.
Paul Merrell

POLL: Public Confidence In Congress 'Has Sunk To A New Low' - Business Insider - 0 views

  • Just when it seemed like the public's perception of Congress couldn't get any worse, it did exactly that. In fact, the numbers show people have less confidence in Congress than any other American institution in the history of the Gallup poll.  According to new data from Gallup released Thursday, just 7% of Americans say they have "a great deal" or "quite a lot" of confidence in Congress — down from the previous low of 10% in 2013.
  • "Americans' current confidence in Congress is not only the lowest on record, but also the lowest Gallup has recorded for any institution in the 41-year trend. This is also the first time Gallup has ever measured confidence in a major U.S. institution in the single digits," the Gallup report noted.  An equal percentage of the public — 7% — told the pollster they have zero confidence in Congress while 36% said they have "some" confidence and 50% said they have "very little." View the full survey below.
Paul Merrell

In deal with police, former Netanyahu aide to hand over recordings of Netanyahu and wif... - 0 views

  • Nir Hefetz, Prime Minister Benjamin Netanyahu's "spin doctor" and confidant, will hand over recordings of Netanyahu and his wife Sara as part of a deal with police to turn state's evidence in the bribery case involving the Bezeq telecom giant and the Walla news site. Netanyahu, currently in the U.S. for AIPAC and a meeting with Trump, received the news at the Blair House, where he is a guest of the White House. In return for testifying against Netanyahu, Hefetz will not stand trial, face prison time or be fined. While he testifies, he will be housed at an isolated installation.
  • According to assessments regarding the deal, Hefetz will also give information regarding the other cases against the prime minister and his wife. Keep updated: Sign up to our newsletter Email* Please enter a valid email address Sign up Please wait… Thank you for signing up. We've got more newsletters we think you'll find interesting. Click here Oops. Something went wrong. Please try again later. Try again Thank you, The email address you have provided is already registered. Close Hefetz is the third Netanyahu confidant to turn against the prime minister in the ongoing corruption cases. Hefetz is suspected of receiving bribes and obstructing justice as part of what is called Case 4000. He is also a key figure in 1270, and is second fiddle in Case 2000. In Case 4000, Hefetz liaised between the Netanyahu couple and the Walla news website, owned by Bezeq. Hefetz arranged for flattering items on the couple and censorship of less flattering items, Haaretz's Gidi Weitz reported. In Case 1270, Hefetz allegedly served as the prime minister's confidant who sought to elucidate how Judge Hila Gerstl felt about closing a case against Sara Netanyahu. Allegedly a trial balloon was floated, hinting to Gerstl that she would be promoted to Israel's next attorney-general if she closed the case down. Hefetz claims that it all boiled down to idle chatter and hadn't been coordinated with the prime minister and his wife. In Case 2000, Hefetz had involvement on both sides of the coin. He was head of public relations for Netanyahu, before which he served as senior editor in the Yedioth Ahronoth group, owned by Arnon Mozes. In 2009, Mozes is suspected of agreeing to provide sweetheart coverage of Netanyahu, who in turn allegedly promised to get the rival (free) newspaper Israel Hayom to stop printing a weekend edition, which stood to hugely benefit Yedioth.
  • Channel 10 reports that Hefetz will be providing information on other cases – some of which the public hasn't even heard of yet.
  • ...1 more annotation...
  • At the heart of Case 4000 is the suspicion that Netanyahu acted to provide Bezeq and its former chairman, Shaul Elovitch, with financial breaks worth hundreds of millions of shekels in exchange for positive coverage in the telecommunications company’s popular Walla website. The prime minister has rejected the accusations and insisted that all his decisions “were made in businesslike fashion and based on professional factors, professional testimonies and legal counsel.” Hefetz testified in the case in December. Since his arrest two weeks ago, he has been questioned under caution not only in the telecom case but also for a suspected bribery offer to a former judge. So far he had refused to answer the investigator's questions. Hefetz, Haaretz has learned, will testify that he never received orders from Sara or Benjamin Netanyahu to make the offer to the judge, allegedly made through an intermediary. Hefetz will claim that the talks with Eli Kamir, the alleged conduit, were just "empty words." Two former Netanyahu confidants have already turned against him. One is former Chief of Staff Ari Harow who testified in cases 2000 and 1000 - which, respectively, relate to discussions of a quid-pro-quo deal with newspaper publisher Arnon Mozes and lavish gifts received from businessmen Arnon Milchan and James Packer. The other is Sholmo Filber, former director general of the Communications Ministry under Netanyahu, who is suspected of granting financial benefits to Shaul Elovitch, the controlling shareholder of Bezeq, Israel's largest telecom company, on behalf of the prime minister.
Paul Merrell

Government Assessment of the Syrian Government's Use of Chemical Weapons on August 21, ... - 0 views

  • The United States Government assesses with high confidence that the Syrian government carried out a chemical weapons attack in the Damascus suburbs on August 21, 2013. We further assess that the regime used a nerve agent in the attack. These all-source assessments are based on human, signals, and geospatial intelligence as well as a significant body of open source reporting.Our classified assessments have been shared with the U.S. Congress and key international partners. To protect sources and methods, we cannot publicly release all available intelligence – but what follows is an unclassified summary of the U.S. Intelligence Community’s analysis of what took place.
  • We assess with high confidence that the Syrian government carried out the chemical weapons attack against opposition elements in the Damascus suburbs on August 21. We assess that the scenario in which the opposition executed the attack on August 21 is highly unlikely. The body of information used to make this assessment includes intelligence pertaining to the regime’s preparations for this attack and its means of delivery, multiple streams of intelligence about the attack itself and its effect, our post-attack observations, and the differences between the capabilities of the regime and the opposition. Our high confidence assessment is the strongest position that the U.S. Intelligence Community can take short of confirmation. We will continue to seek additional information to close gaps in our understanding of what took place.
  • We assess with high confidence that the Syrian regime has used chemical weapons on a small scale against the opposition multiple times in the last year, including in the Damascus suburbs. This assessment is based on multiple streams of information including reporting of Syrian officials planning and executing chemical weapons attacks and laboratory analysis of physiological samples obtained from a number of individuals, which revealed exposure to sarin. We assess that the opposition has not used chemical weapons.
  • ...6 more annotations...
  • The Syrian regime has initiated an effort to rid the Damascus suburbs of opposition forces using the area as a base to stage attacks against regime targets in the capital. The regime has failed to clear dozens of Damascus neighborhoods of opposition elements, including neighborhoods targeted on August 21, despite employing nearly all of its conventional weapons systems. We assess that the regime’s frustration with its inability to secure large portions of Damascus may have contributed to its decision to use chemical weapons on August 21
  • On August 21, a Syrian regime element prepared for a chemical weapons attack in the Damascus area, including through the utilization of gas masks. Our intelligence sources in the Damascus area did not detect any indications in the days prior to the attack that opposition affiliates were planning to use chemical weapons.
  • Multiple streams of intelligence indicate that the regime executed a rocket and artillery attack against the Damascus suburbs in the early hours of August 21. Satellite detections corroborate that attacks from a regime-controlled area struck neighborhoods where the chemical attacks reportedly occurred – including Kafr Batna, Jawbar, ‘Ayn Tarma, Darayya, and Mu’addamiyah. This includes the detection of rocket launches from regime controlled territory early in the morning, approximately 90 minutes before the first report of a chemical attack appeared in social media. The lack of flight activity or missile launches also leads us to conclude that the regime used rockets in the attack.
  • Three hospitals in the Damascus area received approximately 3,600 patients displaying symptoms consistent with nerve agent exposure in less than three hours on the morning of August 21, according to a highly credible international humanitarian organization. The reported symptoms, and the epidemiological pattern of events – characterized by the massive influx of patients in a short period of time, the origin of the patients, and the contamination of medical and first aid workers – were consistent with mass exposure to a nerve agent. We also received reports from international and Syrian medical personnel on the ground.
  • We have identified one hundred videos attributed to the attack, many of which show large numbers of bodies exhibiting physical signs consistent with, but not unique to, nerve agent exposure. The reported symptoms of victims included unconsciousness, foaming from the nose and mouth, constricted pupils, rapid heartbeat, and difficulty breathing. Several of the videos show what appear to be numerous fatalities with no visible injuries, which is consistent with death from chemical weapons, and inconsistent with death from small-arms, high-explosive munitions or blister agents. At least 12 locations are portrayed in the publicly available videos, and a sampling of those videos confirmed that some were shot at the general times and locations described in the footage. We assess the Syrian opposition does not have the capability to fabricate all of the videos, physical symptoms verified by medical personnel and NGOs, and other information associated with this chemical attack. We have a body of information, including past Syrian practice, that leads us to conclude that regime officials were witting of and directed the attack on August 21. We intercepted communications involving a senior official intimately familiar with the offensive who confirmed that chemical weapons were used by the regime on August 21 and was concerned with the U.N. inspectors obtaining evidence. On the afternoon of August 21, we have intelligence that Syrian chemical weapons personnel were directed to cease operations.
  • To conclude, there is a substantial body of information that implicates the Syrian government’s responsibility in the chemical weapons attack that took place on August 21.As indicated, there is additional intelligence that remains classified because of sources and methods concerns that is being provided to Congress and international partners. Syria: Damascus Areas of Influence and Areas Reportedly Affected by 21 August Chemical Attack
  •  
    Well, here's what the public gets told, from a President and his intelligence community that have been caught in lie after lie in the NSA scandal this summer. And of course, to "protect sources and methods, we cannot publicly release all available intelligence." One thing is certain: The "high confidence" of the summary does not acknowledge the doubt about that confidence expressed by government officials speaking anonymously to the Associated Press before the report was released. http://bigstory.ap.org/article/ap-sources-intelligence-weapons-no-slam-dunk   I'll have more later. 
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

Article: Obama's War Against Russia Backfires | OpEdNews - 0 views

  • U.S. President Barack Obama's war against Russia isn't only causing Russia to cooperate more strongly with the other BRIC countries to break the U.S. dollar's reign as the global reserve currency, but it's also causing Russian President Vladimir Putin's job-approval rating in Russia to soar, and the confidence that the Russian people have in their own Government to soar likewise.
  • The latest of these signs came on 5 August 2014 in a report from Gallup Analytics (by subscription only) headlined "Russians' Confidence in Many Institutions Reaches All-Time High." Especially sharp has been the rise in "Confidence in national government," which was only 39% in 2013 prior to the overthrow by Obama in February 2014 of Ukraine's government which had been friendly to Russia, but which confidence-level stands now at 64% -- a gain of 64/39 or 1.64 times higher than it was a year ago. Confidence in the military has risen from 65% in 2013 to 78% now. Confidence in the "honesty of elections" has risen from a very low 23% in 2013 to 39% today (which is 39/23 or 1.70 times higher), as increasing numbers of Russians have come to conclude that their political system is producing better results for them than they had expected, perhaps better than in the longer-established "democratic" nations, such as the United States, whose President Barack Obama is far less highly regarded now by Russians, after his overthrowing Ukraine's Government, than he was prior to that. Remarkably, more Russians than ever before, 65%, answer "Yes" when asked "are you satisfied ... with your freedom to choose what you do with your life?" Last year, only 56% did, down 2% from the prior all-time high of 58% in 2006.
  • A Gallup poll issued on 18 July 2014 headlined "Russian Approval of Putin Soars to Highest Level in Years," and reported that "President Vladimir Putin's popularity in Russia is now at its highest level in years, likely propelled by a groundswell of national pride with the annexation of Crimea in March on the heels of the Sochi Olympic Games in February. The 83% of Russians saying they approve of Putin's leadership in late April/early June ties his previous high rating in 2008 when he left office the first time." Furthermore, "The 29-percentage-point increase in Putin's job approval between 2013 and 2014 suggests he has solidified his previously shaky support base. For the first time since 2008, a majority of Russians (73%) believe their country's leadership is leading them in the right direction." Pointedly, Gallup says: "At the same time that their faith in their own leadership has been renewed, Russians' approval of the leadership of the U.S. and the EU are at all-time lows. The single-digit approval of the leadership of the U.S. and EU at least partly reflects Russians' displeasure with the position each has taken on their country's ongoing involvement in Ukraine and its annexation of Crimea." Moreover, "Despite U.S. and European sanctions earlier this year over Moscow's intervention in Ukraine, more Russians see their economy getting better now than has been the case since 2008."
  • ...2 more annotations...
  • All of these changes are largely attributable to Obama's replacement of the democratic but corrupt government in Ukraine by a dictatorial but corrupt one (now elected only by voters in the areas of the country that the new regime isn't ethnically cleansing to get rid of the people who had voted into office the President -- Viktor Yanukovych -- whom Obama and the CIA overthrew in February 2014). Furthermore, there was no serious possibility of Crimea's rejoining Russia (of which Crimea had been a part between 1783 and 1954) until the new Ukrainian regime massacred hundreds of its opponents inside the Odessa Trade Unions Building on May 2nd, the event that caused Yanukovych's voters to fear for their lives. That massacre was co-masterminded by Ihor Kolomoysky, the billionaire gas oligarch who recently hired Joe Biden's son.
  • On 2 July 2014, I headlined "Gallup Poll Finds Ukraine Cannot Be One Country," and reported that, "The 500 people that were sampled in Crimea were asked 'Please tell me if you agree or disagree: The results of the referendum on Crimea's status [whether to rejoin Russia, which passed overwhelmingly] reflect the views of most people here.' 82.8% said 'Agree.' 6.7% said 'Disagree'." Moreover, "Additionally, in the Crimean region -- Ukraine's farthest southeast area, which our President, Barack Obama, says that Russia forcibly seized when the people there voted overwhelmingly on 16 March 2014 to become part of Russia again (as they had been until 1954) -- only 2.8% of the public there view the U.S. favorably; more than 97% of Crimeans do not." Moreover, Gallup surveyed Crimeans a few months before Obama's coup in Ukraine, and headlined "Public Opinion Survey: Residents of the Autonomous Republic of Crimea, May 16-30, 2013." They found that when asked "Regardless of your passport, what do you consider yourself?" 40% said "Russian," 25% said "Crimean," and only 15% said "Ukrainian." So: when the Autonomous Republic voted after Obama's coup, when even fewer Crimeans self-identified with the now-fascist-run Ukraine, it had to have been a foregone conclusion they'd choose Russia, because even prior to that, there was nearly a three-to-one preference of Russia over Ukraine. That same poll showed 68% favorability for Russia and 6% favorability for "USA." 53% wanted to be part of the Customs Union with Russia, Belarus and Kazakhstan, while only 17% wanted to be part of the EU. Obama lies through his teeth about Crimea. On 25 March 2014, the Los Angeles Times headlined "President Obama Says Russia Seized Crimea."
Paul Merrell

Google, ACLU call to delay government hacking rule | TheHill - 0 views

  • A coalition of 26 organizations, including the American Civil Liberties Union (ACLU) and Google, signed a letter Monday asking lawmakers to delay a measure that would expand the government’s hacking authority. The letter asks Senate Majority Leader Mitch McConnellMitch McConnellTrump voices confidence on infrastructure plan GOP leaders to Obama: Leave Iran policy to Trump GOP debates going big on tax reform MORE (R-Ky.) and Minority Leader Harry ReidHarry ReidNevada can’t trust Trump to protect public lands Sanders, Warren face tough decision on Trump Google, ACLU call to delay government hacking rule MORE (D-Nev.), plus House Speaker Paul RyanPaul RyanTrump voices confidence on infrastructure plan GOP leaders to Obama: Leave Iran policy to Trump GOP debates going big on tax reform MORE (R-Wis.), and House Minority Leader Nancy Pelosi (D-Calif.) to further review proposed changes to Rule 41 and delay its implementation until July 1, 2017. ADVERTISEMENTThe Department of Justice’s alterations to the rule would allow law enforcement to use a single warrant to hack multiple devices beyond the jurisdiction that the warrant was issued in. The FBI used such a tactic to apprehend users of the child pornography dark website, Playpen. It took control of the dark website for two weeks and after securing two warrants, installed malware on Playpen users computers to acquire their identities. But the signatories of the letter — which include advocacy groups, companies and trade associations — are raising questions about the effects of the change. 
  •  
    ".. no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." Fourth Amendment. The changes to Rule 41 ignore the particularity requirement by allowing the government to search computers that are not particularly identified in multiple locations not particularly identifed, in other words, a general warrant that is precisely the reason the particularity requirement was adopted to outlaw.
Paul Merrell

Former Church Committee Members See Need for New Group to Investigate NSA | Threatpost ... - 0 views

  • In a letter sent to President Obama and members of Congress, former members and staff of the Church Committee on intelligence said that the revelations of the NSA activities have caused “a crisis of public confidence” and encouraged the formation of a new committee to undertake “significant and public reexamination of intelligence community practices”. Although it may seem like the NSA’s activities have only recently come under public scrutiny, the agency first was dragged into the light in 1975 when reports surfaced that for decades it had had secret agreements with telegram companies to get copies of Americans’ international communications. The Church committee, formally known as the Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, was formed to investigate the NSA’s methods and produced a report that took the agency to task for overstepping its bounds and expanding programs well beyond their initial scope.
  • “We have seen a consistent pattern in which programs initiated with limited goals, such as preventing criminal violence or identifying foreign spies, were expanded to what witnesses characterized as ‘vacuum cleaners,’ weeping in information about lawful activities of American citizens. The tendency of intelligence activities to expand beyond their initial scope is a theme, which runs through every aspect of our investigative findings,” the committee’s final report said. In the letter sent Monday to Obama and Congress, several former advisers to and members of the Church committee, including the former chief counsel, said that the current situation involving the NSA bears striking resemblances to the one in 1975 and that the scope of what the NSA is doing today is orders of magnitude larger than what was happening nearly 40 years ago.
  • “The need for another thorough, independent, and public congressional investigation of intelligence activity practices that affect the rights of Americans is apparent. There is a crisis of public confidence. Misleading statements by agency officials to Congress, the courts, and the public have undermined public trust in the intelligence community and in the capacity for the branches of government to provide meaningful oversight,” the letter says. “The scale of domestic communications surveillance the NSA engages in today dwarfs the programs revealed by the Church Committee. Indeed, 30 years ago, the NSA’s surveillance practices raised similar concerns as those today.” Signed by 15 former advisers and members of the committee, including Frederick A.O. Schwarz Jr., the lead counsel for the committee, the letter is addressed to Obama, Congress and the American public.
Gary Edwards

The Project To Restore America - 0 views

  •  
    Yes, it's a confusing proposal - but not when compared to what we have now; a financial industry run by "To-Big-To-Fail Banks" able to loot the public treasury at will.  Never to Big to Bail, and taxpayers voted for four more years of looting.  Limited Purpose Banking is based on equity.  Which is quite different from the fractional-reserve-lending model used by the To-Big-Fail Banksters. "The history of banking is a long and sorry record of promises that can't be kept - promises that were either overly optimistic or outright fraudulent. Since banks are leveraged, failing to deliver on their promises leads them to collapse. But unlike standard bankruptcies, bank failures produce enormous economic fallout.   There's a reason. Banks not only market financial products. They also make financial markets. Markets, be they for apples or loans, constitute critical public goods whose provision should not be jeopardized.     Making a market -- getting buyers and sellers to meet at the same time and place always represents a feat of coordination. The main purpose of banks is to effect financial coordination - to bring together borrowers and lenders and investors and savers.     When banks fail, particularly large ones, this coordination breaks down. Moreover, bank failures can be contagious. Any given bank's failure raises the prospect that fraud or very poor judgment was at fault and that other banks are engaged in the same practice. This leads to runs on, actually away from, banks in general. In addition, since banks borrow and lend to one another, the failure of bank A can bring bank B down if A owes money to B.     Worst of all, financial collapse, even by a few major financial players can coordinate non-financial companies as well as households on the belief that times are bad. And when millions of separate firms and tens of millions of households start expecting bad times, they take actions to make bad times happen. Thus, the state of confidence, what Key
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

Trump's Infrastructure Boondoggle - 0 views

  • Donald Trump’s $1 trillion infrastructure plan is not an infrastructure plan and it won’t put $1 trillion of fiscal stimulus into the economy. It’s basically a scheme for handing over public assets to private corporations that will extract maximum profits via user fees and tolls. Because the plan is essentially a boondoggle, it will not lift the economy out of the doldrums, increase activity or boost growth.  Quite the contrary. When the details of how the program is going to be implemented are announced,  public confidence in the Trump administration is going to wither and stock prices are going to plunge.   This scenario cannot be avoided because the penny-pinching conservatives in the House and Senate have already said that they won’t support any plan that is not “revenue neutral” which means that any real $1 trillion spending package is a dead letter.  Thus, it’s only a matter of time before the Trump’s plan is exposed as a fraud and the sh** hits the fan.
  • Here are more of the details from an article at Slate: “Under Trump’s plan…the federal government would offer tax credits to private investors interested in funding large infrastructure projects, who would put down some of their own money up front, then borrow the rest on the private bond markets. They would eventually earn their profits on the back end from usage fees, such as highway and bridge tolls (if they built a highway or bridge) or higher water rates (if they fixed up some water mains). So instead of paying for their new roads at tax time, Americans would pay for them during their daily commute. And of course, all these private developers would earn a nice return at the end of the day.” (“Donald Trump’s Plan to Privatize America’s Roads and Bridges”, Slate) Normally, fiscal stimulus is financed by increasing the budget deficits, but Maestro Trump has something else up his sleeve.  He wants the big construction companies and private equity firms to stump up the seed money and start the work with the understanding that they’ll be able to impose user fees and tolls on roads and bridges when the work is completed.  For every dollar that corporations spend on rebuilding US infrastructure, they’ll get a dollar back via tax credits, which means that they’ll end up controlling valuable, revenue-generating assets for nothing. The whole thing is a flagrant ripoff that stinks to high heaven.   The corporations rake in hefty profits on sweetheart deals, while the American people get bupkis. Welcome to Trumpworld.  Here’s more background from Trump’s campaign website:
  • “American Energy and  Infrastructure Act Leverages public-private partnerships, and private investments through tax incentives, to spur $1 trillion in infrastructure investment over ten years. It is revenue neutral.” (Donald Trump’s Contract with the American Voter”) In practical terms, ‘revenue neutral’ means that every dollar of new spending has to be matched by cuts to other government programs.  So, if there are hidden costs to Trump’s plan, then they’ll have to be paid for by slashing funds for Medicare, Medicaid, Social Security, food stamps etc. But, keep in mind, these other programs are much more effective sources of stimulus since the money goes directly to the people who spend it immediately and help grow the economy. Trump’s infrastructure plan doesn’t work like that. A lot of the money will go towards management fees and operational costs leaving fewer dollars to trickle down to low-paid construction workers whose personal consumption drives the economy. Less money for workers means less spending, less activity and weaker growth.
  • ...3 more annotations...
  • Here’s more on the topic from the Washington Post: “Trump’s plan is not really an infrastructure plan. It’s a tax-cut plan for utility-industry and construction-sector investors, and a massive corporate welfare plan for contractors. The Trump plan doesn’t directly fund new roads, bridges, water systems or airports…. Instead, Trump’s plan provides tax breaks to private-sector investors who back profitable construction projects. … There’s no requirement that the tax breaks be used for … expanded construction efforts; they could all go just to fatten the pockets of investors in previously planned projects… Second, as a result of the above, Trump’s plan isn’t really a jobs plan, either. Because the plan subsidizes investors, not projects; because it funds tax breaks, not bridges; because there’s no requirement that the projects be otherwise unfunded, there is simply no guarantee that the plan will produce any net new hiring. … Buried inside the plan will be provisions to weaken prevailing wage protections on construction projects, undermining unions and ultimately eroding workers’ earnings. Environmental rules are almost certain to be gutted in the name of accelerating projects.” (Trump’s big infrastructure plan? It’s a trap. Washington Post) Let’s summarize:  “Trump’s plan” is “massive corporate welfare plan for contractors” and the “tax breaks”…”could all go just to fatten the pockets of investors in previously planned projects.”
  • What part of this plan looks like it will have a positive impact on the economy? None. If Trump was serious about raising GDP to 4 percent, (another one of his promises) he’d increase Social Security payments, beef up the food stamps program, or hire more government workers.  Any one of these would trigger an immediate uptick in activity spurring more growth and a stronger economy.  And while America’s ramshackle bridges and roads may be in dire need of a facelift,  infrastructure is actually a poor way to inject fiscal stimulus which can be more easily distributed  by simply hiring government agents to stand on streetcorners and hand out 100 dollar bills to passersby. That might not fill the pothole-strewn streets in downtown Duluth, but it would sure as hell would light a fire under GDP. So what’s the gameplan here? What’s Trump really up to? If his infrastructure plan isn’t going to work, then what’s the real objective? The objective is to allow wealthy corporations to buy public assets at firesale prices so they can turn them into profit-generating enterprises. That’s it in a nutshell. That’s why the emphasis is on “unconventional financing programs”, “public-private partnerships”, and “Build America Bonds” instead of plain-old fiscal stimulus, jobs programs and deficit spending. Trump is signaling to his pirate friends in Corporate America that he’ll use his power as executive to find new outlets for profitable investment so they have some place to stick their mountain of money. Of course, none of this has anything to do with rebuilding America’s dilapidated infrastructure or even revving up GDP. That’s just public relations bunkum. What’s really going on is a massive looting operation organized and executed under the watchful eye of Donald Trump, Robber Baron-in-Chief.
  • And Infrastructure is just the tip of the iceberg. Once these kleptomaniacs hit their stride, they’re going to cut through Washington like locusts through a corn field. Bet on it.
  •  
    Mike Whitney always tells it like it is.
Paul Merrell

Obama concedes NSA bulk collection of phone data may be unnecessary | World news | theg... - 0 views

  • President Barack Obama has conceded that mass collection of private data by the US government may be unnecessary and said there were different ways of “skinning the cat”, which could allow intelligence agencies to keep the country safe without compromising privacy. In an apparent endorsement of a recommendation by a review panel to shift responsibility for the bulk collection of telephone records away from the National Security Agency and on to the phone companies, the president said change was necessary to restore public confidence. “In light of the disclosures, it is clear that whatever benefits the configuration of this particular programme may have, may be outweighed by the concerns that people have on its potential abuse,” Obama told an end-of-year White House press conference. “If it that’s the case, there may be a better way of skinning the cat.”
  • Though insisting he will not make a final decision until January, this is the furthest the president has gone in backing calls to dismantle the programme to collect telephone data, a practice the NSA claims has legal foundation under section 215 of the Patriot Act. This week, a federal judge said the program “very likely” violates the US constitution. “There are ways we can do this potentially that give people greater assurance that there are checks and balances, sufficient oversight and transparency,” Obama added. “Programmes like 215 could be redesigned in ways that give you the same information when you need it without creating these potentials for abuse. That’s exactly what we should be doing: to evaluate things in a very clear specific way and moving forward on changes. And that’s what I intend to do.”
  • The president would not comment on a suggestion last weekend by Richard Ledgett, the NSA official investigating the Snowden leaks, that an amnesty might be appropriate in exchange for the return of the data Snowden took from the agency. Obama said he could not comment specifically because Snowden was “under indictment”, something not previously disclosed. While the Justice Department filed a criminal complaint against Snowden on espionage-related charges in June, there has been no public subsequent indictment, although it is possible one exists under gag order. The Justice Department referred comment on a Snowden indictment to the White House. Caitlin Hayden, the chief spokeswoman for the White House National Security Council, clarified that Obama was referring to the criminal complaint against Snowden. It remains unclear if there is an indictment under seal. 
  • ...4 more annotations...
  • The president also went further than his review panel in suggesting the US needed to rein in its overseas surveillance activities. “We have got to provide more confidence to the international community. In a virtual world, some of these boundaries don’t matter any more,” he said. “The values that we have got as Americans are ones that we have to be willing to apply beyond our borders, perhaps more systematically than we have done in the past.”
  • Conspicuously, Obama declined to rebut one assessment from his surveillance review group – that the bulk collection of US call data was not essential to stopping a terrorist attack. Instead, he contended that there had been “no abuse” of the bulk phone data collection. But in 2009, a judge on the secret surveillance court prevented the NSA from searching through its databases of US phone information after discovering “daily violations” resulting from NSA searches of Americans’ phone records without reasonable suspicion of connections to terrorism. That data was inaccessible to the NSA for almost all of 2009, before the Fisa court was convinced the NSA had sufficient safeguards in place for preventing similar violations
  • In another indication of the shifting landscape on surveillance, the telecoms giant AT&T announced on Friday that it will begin publishing a semi-annual report about its complicity with government surveillance requests. AT&T followed its competitor Verizon, which announced a similar move on Thursday.
  • The first such report is expected for early 2014, Watts said. While technology firms like Yahoo and Google have pushed for greater transparency about providing their customer data to the government, the telecommunications firms – which have cooperated with the NSA since the agency’s 1952 inception – did not join them before the events of the past week.
  •  
    Movement on the NSA. Obama hints that the NSA's section 215 metadata collection will end, fesses up that Snowden has been criminally indicted, but declines to discuss whether Snowden might be pardoned in exchange for turning over his NSA document collection, notably not ruling it out. And finally, two of the giant telcos, AT&T and Verizon, have announced intent to do semi-annual public reports on their collaboration with government spy agencies. Amazing what a federal court decision can do, particularly when immediately followed by the president's own blue-ribbon panel report, both holding that the section 215 program has resulted in no terrorist attacks being prevented and that the program in unconstitutional. Obama finally reaches his tipping point. A good week for civil libertarians.   
Gary Edwards

NY Times Admits: Al-Qaeda Terror Threat Used to "Divert Attention" from NSA Uproar | A ... - 1 views

  •  
    Wag the Dog? Obama using terror threats to divert public attention from NSA illegal spying? No surprise here except for the admission to the NYT. excerpt: "Some analysts and Congressional officials suggested Friday that emphasizing a terrorist threat now was a good way to divert attention from the uproar over the N.S.A.'s data-collection programs, and that if it showed the intercepts had uncovered a possible plot, even better. - NY Times article from August 2, 2013: Qaeda Messages Prompt U.S. Terror Warning Nothing about the above quote should surprise any of my readers, we all know the sick, twisted mindset of those involved in the Military-Industrial-Wall Street complex. What's more shocking is the fact that these folks so openly admit it to the New York Times, albeit in a typical anonymous and cowardly fashion. Let's not forget what Robert Shapiro, former Clinton official and Obama supporter told the FT in July 2010: The bottom line here is that Americans don't believe in President Obama's leadership. He has to find some way between now and November of demonstrating that he is a leader who can command confidence and, short of a 9/11 event or an Oklahoma City bombing, I can't think of how he could do that. I discussed the above quote and related topics in my 2010 piece: The Dangers of a Failed Presidency. Well, if Mr. Shapiro thinks President Obama didn't have credibility in 2010, one can only imagine what he thinks today. That is precisely what makes the current moment so extraordinarily dangerous. From the New York Times: WASHINGTON - The United States intercepted electronic communications this week among senior operatives of Al Qaeda, in which the terrorists discussed attacks against American interests in the Middle East and North Africa, American officials said Friday. It is unusual for the United States to come across discussions among senior Qaeda operatives about operational planning - through informants, intercepted e-mails o
Paul Merrell

FindLaw | Cases and Codes - 0 views

  • SMITH v. MARYLAND, 442 U.S. 735 (1979)
  • The telephone company, at police request, installed at its central offices a pen register to record the numbers dialed from the telephone at petitioner's home. Prior to his robbery trial, petitioner moved to suppress "all fruits derived from" the pen register. The Maryland trial court denied this motion, holding that the warrantless installation of the pen register did not violate the Fourth Amendment. Petitioner was convicted, and the Maryland Court of Appeals affirmed. Held: The installation and use of the pen register was not a "search" within the meaning of the Fourth Amendment, and hence no warrant was required. Pp. 739-746. (a) Application of the Fourth Amendment depends on whether the person invoking its protection can claim a "legitimate expectation of privacy" that has been invaded by government action. This inquiry normally embraces two questions: first, whether the individual has exhibited an actual (subjective) expectation of privacy; and second, whether his expectation is one that society is prepared to recognize as "reasonable." Katz v. United States, 389 U.S. 347 . Pp. 739-741.
  • (b) Petitioner in all probability entertained no actual expectation of privacy in the phone numbers he dialed, and even if he did, his expectation was not "legitimate." First, it is doubtful that telephone users in general have any expectation of privacy regarding the numbers they dial, since they typically know that they must convey phone numbers to the telephone company and that the company has facilities for recording this information and does in fact record it for various legitimate business purposes. And petitioner did not demonstrate an expectation of privacy merely by using his home phone rather than some other phone, since his conduct, although perhaps calculated to keep the contents of his conversation private, was not calculated to preserve the privacy of the number he dialed. Second, even if petitioner did harbor some subjective expectation of privacy, this expectation was not one that society is prepared to recognize as "reasonable." When petitioner voluntarily conveyed numerical information to the phone company and "exposed" that information to its equipment in the normal course of business, he assumed the risk that the company would reveal the information [442 U.S. 735, 736]   to the police, cf. United States v. Miller, 425 U.S. 435 . Pp. 741-746. 283 Md. 156, 389 A. 2d 858, affirmed.
  •  
    The Washington Post has reported that "on July 15 [2001], the secret surveillance court allowed the NSA to resume bulk collection under the court's own authority. The opinion, which remains highly classified, was based on a provision of electronic surveillance law, known as "pen register, trap and trace," that was written to allow law enforcement officers to obtain the phone numbers of incoming and outgoing calls from a single telephone line." .  The seminal case on pen registers is the Supreme Court's 1979 Smith v. Maryland decision, bookmarked here and the Clerk's syllabus highlighted, with the Court's discussion on the same web page. We will be hearing a lot about this case decision in the weeks and months to come.  Let it suffice for now to record a few points of what my antenna are telling me:  -- Both technology and the law have moved on since then. We are 34 years down the line from the Smith decision. Its pronouncements have been sliced and diced by subsequent decisions. Not a single Justice who sat on the Smith case is still on the High Bench.   -- In Smith, a single pen register was used to obtain calling information from a single telephone number by law enforcement officials. In the present circumstance, we face an Orwellian situation of a secret intelligence agency with no law enforcement authority forbidden by law from conducting domestic surveillance perusing and all digital communications of the entire citizenry. -- The NSA has been gathering not only information analogous to pen register results but also the communications of American citizens themselves. The communications themselves --- the contents --- are subject to the 4th Amendment warrant requirement. Consider the circuitous route of the records ordered to be disclosed in the Verizon FISA order. Verizon was ordered to disclose them to the FBI, not to the NSA. But then the FBI apparently forwards the records to the NSA, who has both the "pen register
Paul Merrell

Tomgram: Engelhardt, Who Rules Washington? | TomDispatch - 0 views

  • As every schoolchild knows, there are three check-and-balance branches of the U.S. government: the executive, Congress, and the judiciary. That’s bedrock Americanism and the most basic high school civics material. Only one problem: it’s just not so. During the Cold War years and far more strikingly in the twenty-first century, the U.S. government has evolved.  It sprouted a fourth branch: the national security state, whose main characteristic may be an unquenchable urge to expand its power and reach.  Admittedly, it still lacks certain formal prerogatives of governmental power.  Nonetheless, at a time when Congress and the presidency are in a check-and-balance ballet of inactivity that would have been unimaginable to Americans of earlier eras, the Fourth Branch is an ever more unchecked and unbalanced power center in Washington.  Curtained off from accountability by a penumbra of secrecy, its leaders increasingly are making nitty-gritty policy decisions and largely doing what they want, a situation illuminated by a recent controversy over the possible release of a Senate report on CIA rendition and torture practices.
  • All of this is or should be obvious, but remains surprisingly unacknowledged in our American world. The rise of the Fourth Branch began at a moment of mobilization for a global conflict, World War II.  It gained heft and staying power in the Cold War of the second half of the twentieth century, when that other superpower, the Soviet Union, provided the excuse for expansion of every sort.  Its officials bided their time in the years after the fall of the Soviet Union, when “terrorism” had yet to claim the landscape and enemies were in short supply.  In the post-9/11 era, in a phony “wartime” atmosphere, fed by trillions of taxpayer dollars, and under the banner of American “safety,” it has grown to unparalleled size and power.  So much so that it sparked a building boom in and around the national capital (as well as elsewhere in the country).  In their 2010 Washington Post series “Top Secret America,” Dana Priest and William Arkin offered this thumbnail summary of the extent of that boom for the U.S. Intelligence Community: “In Washington and the surrounding area,” they wrote, “33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings -- about 17 million square feet of space.”  And in 2014, the expansion is ongoing.
  • In this century, a full-scale second “Defense Department,” the Department of Homeland Security, was created.  Around it has grown up a mini-version of the military-industrial complex, with the usual set of consultants, K Street lobbyists, political contributions, and power relations: just the sort of edifice that President Eisenhower warned Americans about in his famed farewell address  in 1961.  In the meantime, the original military-industrial complex has only gained strength and influence. Increasingly, post-9/11, under the rubric of “privatization,” though it should more accurately have been called “corporatization,” the Pentagon took a series of crony companies off to war with it.  In the process, it gave “capitalist war” a more literal meaning, thanks to its wholesale financial support of, and the shrugging off of previously military tasks onto, a series of warrior corporations. Meanwhile, the 17 members of the U.S. Intelligence Community -- yes, there are 17 major intelligence outfits in the national security state -- have been growing, some at prodigious rates.  A number of them have undergone their own versions of corporatization, outsourcing many of their operations to private contractors in staggering numbers, so that we now have “capitalist intelligence” as well.  With the fears from 9/11 injected into society and the wind of terrorism at their backs, the Intelligence Community has had a remarkably free hand to develop surveillance systems that are now essentially “watching” everyone -- including, it seems, other branches of the government.
  • ...4 more annotations...
  • From the Pentagon to the Department of Homeland Security to the labyrinthine world of intelligence, the rise to power of the national security state has been a spectacle of our time.  Whenever news of its secret operations begins to ooze out, threatening to unnerve the public, the White House and Congress discuss “reforms” which will, at best, modestly impede the expansive powers of that state within a state.  Generally speaking, its powers and prerogatives remain beyond constraint by that third branch of government, the non-secret judiciary.  It is deferred to with remarkable frequency by the executive branch and, with the rarest of exceptions, it has been supported handsomely with much obeisance and few doubts by Congress. And also keep in mind that, of the four branches of government, only two of them -- an activist Supreme Court and the national security state -- seem capable of functioning in a genuine policymaking capacity at the moment.
  • In that light, let’s turn to a set of intertwined events in Washington that have largely been dealt with in the media as your typical tempest in a teapot, a catfight among the vested and powerful.  I’m talking about the various charges and countercharges, anger, outrage, and irritation, as well as news of acts of seeming illegality now swirling around a 6,300-page CIA “torture report” produced but not yet made public by the Senate Intelligence Committee.  This ongoing controversy reveals a great deal about the nature of the checks and balances on the Fourth Branch of government in 2014.
  • Fourteen years into the twenty-first century, we’re so used to this sort of thing that we seldom think about what it means to let the CIA -- accused of a variety of crimes -- be the agency to decide what exactly can be known by the public, in conjunction with a deferential White House.  The Agency’s present director, it should be noted, has been a close confidant and friend of the president and was for years his key counterterrorism advisor.  To get a sense of what all this really means, you need perhaps to imagine that, in 2004, the 9/11 Commission was forced to turn its report over to Osama bin Laden for vetting and redaction before releasing it to the public.  Extreme as that may sound, the CIA is no less a self-interested party. And this interminable process has yet to end, although the White House is supposed to release something, possibly heavily redacted, as early as this coming week or perhaps in the dog days of August.
  • The fact is that, for the Fourth Branch, this remains the age of impunity.  Hidden in a veil of secrecy, bolstered by secret law and secret courts, surrounded by its chosen corporations and politicians, its power to define policy and act as it sees fit in the name of American safety is visibly on the rise.  No matter what setbacks it experiences along the way, its urge to expand and control seems, at the moment, beyond staunching.  In the context of the Senate’s torture report, the question at hand remains: Who rules Washington?
  •  
    The indefatigable and perceptive Tom Englehardt finds formally secret features of the Dark State revealed in the ongoing political jockeying involving the CIA's torture, black prisons, and extarordinary rendition program. 
Paul Merrell

Leaked Emails ot Save the Children confirms Pakistan full of CIA agents!! - 0 views

  • Here are the emails. An article written by Umar Cheema is also on the Web, will post link once I am on my laptop. http://cirp.pk/e-mail.htm (edit: although some names have been blacked out, you can still view them by taking mouse over the links! e.g. First email is by Hassan Noor.. to Mike Novell, tkrift (??), Amanullah Khan.. CC is Afnan Aleem) These basically proves that everyone in the Abbotabad commission (except Mr Ashraf Qazi), including a very senior judge and general, were working under the influence of Save The Children NGO Retired General Nadeem was directly working under them! Afridi was NOT tortured by ISI. He did give ISI some false statements which the ISI didn't dig deeper because it suited them! (Example he was working for CIA since 2008, not 2009 as ISI was led to believe) Edit: Here is the article: http://www.thenews.com.pk/Todays-Ne...s-Abbottabad-Commission-was-penetrated-by-CIA -- All these NGOs should be banned and thrashed! ISI should publically hang foreign agents! (Even if they are Generals)
  • The NGO has neither denied the email record and the contents it carried (when shown by The News for seeking version) nor offered specific comments but that: “Our assistance to the Abbottabad Commission and its members including Gen Nadeem was within the legal parameters and Abbottabad Commission mandate to find facts.” Nadeem was not available for comments, however, his close aide termed the allegations as utterly “rubbish and non-sense” when comments were sought after showing the email record A transcript of internal wrangling: Muhammad Hassan Noor Saadi, deputy country director of Save the Children, met Gen (R) Nadeem on November 20, 2012 that followed his email to four senior colleagues. The report was primarily compiled by ‘our friend’, his email reads, and was endorsed by the Chairman but one of the members, Ashraf Qazi, was not in agreement with them. He wrote a dissenting note criticising Chairman Justice (R) Javed Iqbal and Gen (R) Nadeem ‘for being soft on certain institutions (including Save the Children).’
  • Another member, Abbas Khan, was neither willing to sign the report in its current shape, discloses email record, nor wanted to put a dissenting note hence decided to prolong his stay in the US where he went on the ‘pretext of medical ground’. More alarmingly, the NGO was granted access to the Commission’s report well before it was sent to the prime minister. Save the Children had uninterrupted access to the four drafts prepared in June 2012 by the members including the chairman, email record available with The News indicates. All favours granted to Save the Children on behalf of the Commission were in clear breach of public trust raising question marks about the integrity of the members. The chairman of the NGO, Save the Children, was contacted by The News. He initially agreed to meet but later stopped taking calls and did not respond to messages sent to him.Nadeem also felt confident, the email record shows, that he would be able to convince the panel with the answers given by the NGO and urge his colleagues to go by the facts presented by Save the Children instead of believing on the contents of Afridi’s statement. Gen (R) Nadeem also advised the NGO, an email of the country director reads, to fight the expulsion of our expatriate as otherwise the ISI would move quickly to close down the country programme before the Commission report comes out.
  • ...3 more annotations...
  • Record shows Abbottabad Commission was penetrated by CIA​ Umar Cheema Friday, August 02, 2013 From Print Edition ISLAMABAD: A mind-blowing detail has emerged from the internal correspondence of NGO Save the Children disclosing its infiltration into the Abbottabad Commission to save its skin following allegations of the CIA’s penetration into the NGO in a hunt for Osama bin Laden through Dr Shakil Afridi, now under arrest in Peshawar. “Some of us suspected that the khakis had access to the record and receive daily updates but never realised an NGO had infiltrated too,” said an official privy to the Commission’s working. The leaked communication indicates that Lt Gen (retd) Nadeem Ahmed, an unofficial representative of the Army and ISI in the Commission, was allegedly cultivated by Save the Children who would offer him ‘how-to-do’ bailout advice, even sharing details about the internal politics of the Commission and classified record, something in radical contradiction to his reputation as a thorough professional and a man of integrity. He briefed the deputy country director of Save the Children, according to the email, about the views of different members, staunch opposition from a panel colleague, Ashraf Jehangir Qazi, resulting in his dissenting note on the NGO and other institutions, and Gen (retd) Nadeem’s plan to effectively counter this note in collaboration with Justice (R) Javed Iqbal, the Chairman.
  • The Commission could not issue the report with that note and therefore now they are working on developing counter arguments on the note, read the email. The Commission needs to have a lot of comments removed from the note before it is in a shape that allows the report to be shared, the email continues, otherwise it can jeopardize the integrity of the members of the Commission. Justice (R) Javed Iqbal and Gen (R) Nadeem ‘have to work extra hard to factually prove a lot of things wrong that this third member is referring to,’ read the email of deputy country director. The email then explained the position of the fourth member, Abbas Ali Khan, absent from discussion. He is not willing to sign the report in the current shape, reads Hassan’s email, but also does not want to put in a note of dissent and therefore continues to prolong his stay in the US where he went on the pretext of treatment. As a way forward, the email continues, the two members will work with the third member (Ashraf Qazi) and try to come to a point where the note is significantly reduced and numbers of comments are taken out of the report. Gen (R) Nadeem’s advisory role of the NGO: The email also brings to light his role as adviser to the NGO. To a question that what Save the Children should do, Nadeem advised the deputy country director to build relationship and confidence with the Ministry of Interior and Economic Affairs Division. “It would take few months for you to be back to complete normalcy,” Gen (R) Nadeem advised.
  • In another email generated on August 29, 2012, David Wright, the country director, wrote that ‘on my instructions Hassan asked Gen (R) Nadeem to give an honest assessment as to what he thinks our chances are of surviving this.’ Gen (R) Nadeem replied that he felt confident regarding the answers we (NGO) will give to the questions proposed, ‘he could convince the other commission members to go with the fact rather than the content of Afridi’s statement.’ Gen (R) Nadeem also advised to fight the expulsion of our expatriates, Wrights email continued. “He felt if we did not do this and the expats left, the ISI would then move quickly to close down the country programme before the Commission report comes out.” Report draft shared with the NGO: Wright’s another email indicates that the draft was shared more than once with the NGO. Referring to a meeting of two senior officers of Save the Children with Gen (R) Nadeem, the country director said they were shown the report written by the Chairman of the Commission. The email said there were four versions of the report in June 2012 and these were reduced to two in August that year. However, they have reservations about the latest version shared in August as ‘the report which was originally thought to be our saviour, will be the tool for this expulsion.’ We will do our best, the email reads, to work ‘with our friends and try and get our responses in before the report is finalised.’ SOURCE: THE NEWS Record shows Abbottabad Commission was penetrated by CIA - thenews.com.pk
Paul Merrell

Clinton to drop Israel from 'public events,' put it back in with donors --Email - 0 views

  • I’ve been on the road for days, and a few more Clinton emails have thudded down from the Wikileaks heavens revealing deliberations about Israel inside the Clinton braintrust. Some day we will put together a leatherbound edition with morocco covers of Clinton’s Israel emails, but for now we’re just trying to chase the latest. And these three are stunners because they baldly expose the importance of Israel to donors and the party establishment. First, there was this amazing email thread among top strategists from May 2015 about revising Clinton’s talking points in her speeches at rallies and fundraisers in the weeks before she officially launched her candidacy. You just gotta read these comments as they fall. The conversation started out on a bunch of different talking points, but everyone quickly turned to Israel, and the public and private messaging.
  • Jake Sullivan, foreign policy aide: “Would add a sentence on standing up for our allies and our values, including Israel and other fellow democracies, and confronting terrorists and dictators with strength and cunning.” Mandy Grunwald, media advisor: “I thought this was largely for her TP [talking points] with public events not fundraisers. Do we need Israel etc for that?” Sullivan: “We def need the etc. I think good to have Israel too.” Joel Benenson, pollster and chief strategist: “Why would we call out Israel in public events now? The only voters elevating FP at all are Republican primary voters.” Robby Mook, campaign manager: “I’m w Joel. We shouldn’t have Israel at public events. Especially dem activists.” Sullivan: “I won’t fall on sword over Israel but we need more than climate in that paragraph.” Dan Schwerin, speechwriter: “What about this as a base, and then she can drop in Israel when she’s with donors: “Fourth and finally, we have to protect our country from the global threats that we see, from terrorists to dictators to diseases – and the ones that are still over the horizon. We have to assert confident American leadership to shape global events rather than be shaped by them. That includes taking on global warming and those who continue to deny that it exists. And it means always standing up for our allies and our values, especially our fellow democracies.” Mook: “I’m fine with that.” Benenson: “Good.”
  • That’s a smoking gun email. It says just what Stephanie Schriock of Emily’s List and J.J. Goldberg said at J Street earlier this year, the role of Jewish donors on the Democratic side is “gigantic” and “shocking.” And those Jewish donors are seen as pro-Israel all the time, by folks who study politics. But meantime, Robby Mook says just what we’ve been saying here for a couple of years: the lobby has lost the Democratic base on Israel. Young Dems, people of color, women — they’re more sympathetic to Palestinians than Israelis. Don’t mention Israel with dem activists. So the system really is rigged. They don’t want to hear from the people on this.
  • ...4 more annotations...
  • One other thing: Chief strategist Benenson shows how pathetic the Bernie Sanders campaign was on this issue. He says that the only voters who care about foreign policy are Republicans. It would be a year before Bernie made Israel a wedge issue, in the New York primary debate, when he dared to say that Benjamin Netanyahu is not right all the time, and Clinton had no response. That moment was brave, reluctant, and spasmodic. Had Bernie worked the Israel issue, there was political capital to be made. And everyone in the Clinton braintrust knew it. Don’t mention Israel with dem activists. Bernie followed the same script, pretty much.
  • Gotta keep going here. Here’s another leaked email to campaign chair John Podesta from his daughter Megan Rouse in May 2015, headlined “Israel”: I’ve heard a concern from some folks who care deeply about Israel that Hillary will be the president “most unfriendly to Israel in our history, worse than Obama.” Thoughts on how I might respond in conversation? Podesta wrote back: That’s a bit crazy. Obama developed a real feud with Bibi, but she has been a staunch defender of Israel since her Senate days. Probably her very best supporters are Haim Saban, and Danny Abraham who would not be with her if she wasn’t totally committed to Israeli security. Eli Clifton offers the moral of this story: “Podesta’s acknowledgement that two of Hillary Clinton’s key donors condition their support on her support of Israel’s security is a striking moment of candor from Podesta, but a statement which is consistent with her previous actions to placate the concerns of her biggest financial backers.”
  • This is also fantastic. When “Bibi” — no one calls him Benjamin Netanyahu in Dem circles– won reelection in the Israeli elections in March 2015, Clinton campaign chair John Podesta asked Paul Begala for his take on Netanyahu’s victory. Wow is Begala a whiz. He worked for Yitzhak Herzog, who lost; and he wrote back in part: Just as patterns of immigration are moving the US left, patterns of immigration are moving Israel right. I have never seen anything like Bibi’s furious surge to the right in the last 4 days. Nothing like it in America. He had robo-calls calling the President “Hussein Obama, the Muslim,” he had ads saying the Arabs will vote in droves. He accused Herzog of wanting to divide Jerusalem. Bibi did not win because of Iran. He won because of race. He cannibalized the smaller parties on the right: Bennett’s Jewish Home lost 4 seats, Shas lost 4 seats, Lieberman’s party lost 5 seats, United Torah lost 1. That is a 14 seat decline on the right. Bibi gained 10… All the smart guys in Tel Aviv thought Bibi was having a nervous breakdown. In the US you could never get away with those kind of racist appeals. But, man, did it work.
  • There’s really only one thing to say about this email. Begala is on television all the time slashing Donald Trump. Has he ever told American audiences that Benjamin Netanyahu is a racist in a way that no American politician could be? Not even Trump? And Israel is a place of creeping fascism (as Moshe Ya’alon and Yair Golan have explained)? Begala doesn’t say that because of emails 1 and 2 in this post; “Bibi” is necessary for the maintenance of the American establishment as it now stands. And President Clinton has promised: “I would also invite the Israeli prime minister to the White House in my first month in office.” Another leaked email says that Clinton says reaching out to Netanyahu, I mean Bibi, is “near the top” of her list of priorities. I wonder why.
  •  
    Not news in the sense that it's been clear for more than a year that Hillary will be even more pro-Israeli right-wing leadership than Obama has been. But now her Israeli policy conflict with the majority of voters who elect Democratic presidents has been outed.
Paul Merrell

Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks an... - 0 views

  • Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution. The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous. One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
  • Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
  • In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.” “News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.” Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name. The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
  • ...2 more annotations...
  • The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges. In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens. The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)
  • It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”
  •  
    "... the Obama administration urged foreign allies to file criminal charges against Assange over the group's publication of the Afghanistan war logs." Sweden promptly launches an alleged rape investigation and Assange is forced by the UK courts to take refuge in the London embassy of Ecuador. Because of urging by the Obama administration aimed at chilling the the First Amendment rights of journalists. That should be grounds for impeachment.  
Paul Merrell

Time for the Nuclear Option: Raining Money on Main Street | WEB OF DEBT BLOG - 0 views

  • Predictions are that we will soon be seeing the “nuclear option” — central bank-created money injected directly into the real economy. All other options having failed, governments will be reduced to issuing money outright to cover budget deficits. So warns a September 18 article on ZeroHedge titled “It Begins: Australia’s Largest Investment Bank Just Said ‘Helicopter Money’ Is 12-18 Months Away.” Money reformers will say it’s about time. Virtually all money today is created as bank debt, but people can no longer take on more debt. The money supply has shrunk along with people’s ability to borrow new money into existence. Quantitative easing (QE) attempts to re-inflate the money supply by giving money to banks to create more debt, but that policy has failed. It’s time to try dropping some debt-free money on Main Street. The Zerohedge prediction is based on a release from Macqurie, Australia’s largest investment bank. It notes that GDP is contracting, deflationary pressures are accelerating, public and private sectors are not driving the velocity of money higher, and central bank injections of liquidity are losing their effectiveness. Current policies are not working. As a result:
  • There are several policies that could be and probably would be considered over the next 12-18 months. If private sector lacks confidence and visibility to raise velocity of money, then (arguably) public sector could. In other words, instead of acting via bond markets and banking sector, why shouldn’t public sector bypass markets altogether and inject stimulus directly into the ‘blood stream’? Whilst it might or might not be called QE, it would have a much stronger impact and unlike the last seven years, the recovery could actually mimic a conventional business cycle and investors would soon start discussing multiplier effects and positioning in areas of greatest investment.  Willem Buiter, chief global economist at Citigroup, is also recommending “helicopter money drops” to avoid an imminent global recession, stating: A global recession starting in 2016 led by China is now our Global Economics team’s main scenario. Uncertainty remains, but the likelihood of a timely and effective policy response seems to be diminishing. . . . Helicopter money drops in China, the euro area, the UK, and the U.S. and debt restructuring . . . can mitigate and, if implemented immediately, prevent a recession during the next two years without raising the risk of a deeper and longer recession later.
  • In the UK, something akin to a helicopter money drop was just put on the table by Jeremy Corbyn, the newly-elected Labor leader. He proposes to give the Bank of England a new mandate to upgrade the economy to invest in new large scale housing, energy, transport and digital projects. He calls it “quantitative easing for people instead of banks” (PQE). The investments would be made through a National Investment Bank set up to invest in new infrastructure and in the hi-tech innovative industries of the future. Australian blogger Prof. Bill Mitchell agrees that PQE is economically sound. But he says it should not be called “quantitative easing.” QE is just an asset swap – cash for federal securities or mortgage-backed securities on bank balance sheets. What Corbyn is proposing is actually Overt Money Financing (OMF) – injecting money directly into the economy. Mitchell acknowledges that OMF is a taboo concept in mainstream economics. Allegedly, this is because it would lead to hyperinflation. But the real reasons, he says, are that: It cuts out the private sector bond traders from their dose of corporate welfare which unlike other forms of welfare like sickness and unemployment benefits etc. has made the recipients rich in the extreme. . . . It takes away the ‘debt monkey’ that is used to clobber governments that seek to run larger fiscal deficits.
  • ...4 more annotations...
  • Tim Worstall, writing in the UK Register, objects to Corbyn’s PQE (or OMF) on the ground that it cannot be “sterilized” the way QE can. When inflation hits, the process cannot be reversed. If the money is spent on infrastructure, it will be out there circulating in the economy and will not be retrievable. Worstall writes: QE is designed to be temporary, . . . because once people’s spending rates recover we need a way of taking all that extra money out of the economy. So we do it by using printed money to buy bonds, which injects the money into the economy, and then sell those bonds back once we need to withdraw the money from the economy, and simply destroy the money we’ve raised. . . . If we don’t have any bonds to sell, it’s not clear how we can reduce [the money supply] if large-scale inflation hits.
  • The problem today, however, is not inflation but deflation of the money supply. Some consumer prices may be up, but this can happen although the money supply is shrinking. Food prices, for example, are up; but it’s because of increased costs, including drought in California, climate change, and mergers and acquisitions by big corporations that eliminate competition. Adding money to the economy will not drive up prices until demand is saturated and production has hit full capacity; and we’re a long way from full capacity now. Before that, increasing “demand” will increase “supply.” Producers will create more goods and services. Supply and demand will rise together and prices will remain stable. In the US, the output gap – the difference between actual output and potential output – is estimated at about $1 trillion annually. That means the money supply could be increased by at least $1 trillion annually without driving up prices.
  • If PQE does go beyond full productive capacity, the government does not need to rely on the central bank to pull the money back. It can do this with taxes. Just as loans increase the money supply and repaying them shrinks it again, so taxes and other payments to the government will shrink a money supply augmented with money issued by the government. Using 2012 figures (drawing from an earlier article by this author), the velocity of M1 (the coins, dollar bills and demand deposits spent by ordinary consumers) was then 7. That means M1 changed hands seven times during 2012 – from housewife to grocer to farmer, etc. Since each recipient owed taxes on this money, increasing M1 by one dollar increased the tax base by seven dollars. Total tax revenue as a percentage of GDP in 2012 was 24.3%. Extrapolating from those figures, $1.00 changing hands seven times could increase tax revenue by $7.00 x 24.3% = $1.70. That means the government could, in theory, get more back in taxes than it paid out. Even with some leakage in those figures and deductions for costs, all or most of the new money spent into the economy might be taxed back to the government. New money could be pumped out every year and the money supply would increase little if at all.
  • Besides taxes, other ways to get money back into the Treasury include closing tax loopholes, taxing the $21 trillion or more hidden in offshore tax havens, and setting up a system of public banks that would return the interest on loans to the government. Net interest collected by U.S. banks in 2014 was $423 billion. At its high in 2007, it was $725 billion. Thus there are many ways to recycle an issue of new money back to the government. The same money could be spent and collected back year after year, without creating price inflation or hyperinflating the money supply. This not only could be done; it needs to be done. Conventional monetary policy has failed. Central banks have exhausted their existing toolboxes and need to explore some innovative alternatives.
  •  
    Debt having failed as a method of money creation leads us back to the printing press method. But on whom are those helicopters to drop their new money? And how to we ensure that the banksters are not among them?
Paul Merrell

Exclusive: Dozens of Clinton emails were classified from the start, U.S. rules suggest ... - 0 views

  • For months, the U.S. State Department has stood behind its former boss Hillary Clinton as she has repeatedly said she did not send or receive classified information on her unsecured, private email account, a practice the government forbids.While the department is now stamping a few dozen of the publicly released emails as "Classified," it stresses this is not evidence of rule-breaking. Those stamps are new, it says, and do not mean the information was classified when Clinton, the Democratic frontrunner in the 2016 presidential election, first sent or received it.But the details included in those "Classified" stamps — which include a string of dates, letters and numbers describing the nature of the classification — appear to undermine this account, a Reuters examination of the emails and the relevant regulations has found.The new stamps indicate that some of Clinton's emails from her time as the nation's most senior diplomat are filled with a type of information the U.S. government and the department's own regulations automatically deems classified from the get-go — regardless of whether it is already marked that way or not.In the small fraction of emails made public so far, Reuters has found at least 30 email threads from 2009, representing scores of individual emails, that include what the State Department's own "Classified" stamps now identify as so-called 'foreign government information.' The U.S. government defines this as any information, written or spoken, provided in confidence to U.S. officials by their foreign counterparts.
  • This sort of information, which the department says Clinton both sent and received in her emails, is the only kind that must be "presumed" classified, in part to protect national security and the integrity of diplomatic interactions, according to U.S. regulations examined by Reuters."It's born classified," said J. William Leonard, a former director of the U.S. government's Information Security Oversight Office (ISOO). Leonard was director of ISOO, part of the White House's National Archives and Records Administration, from 2002 until 2008, and worked for both the Bill Clinton and George W. Bush administrations."If a foreign minister just told the secretary of state something in confidence, by U.S. rules that is classified at the moment it's in U.S. channels and U.S. possession," he said in a telephone interview, adding that for the State Department to say otherwise was "blowing smoke."
  • Although it appears to be true for Clinton to say none of her emails included classification markings, a point she and her staff have emphasized, the government's standard nondisclosure agreement warns people authorized to handle classified information that it may not be marked that way and that it may come in oral form.The State Department disputed Reuters' analysis but declined requests to explain how it was incorrect.
  • ...5 more annotations...
  • Clinton and her senior staff routinely sent foreign government information among themselves on unsecured networks several times a month, if the State Department's markings are correct. Within the 30 email threads reviewed by Reuters, Clinton herself sent at least 17 emails that contained this sort of information. In at least one case it was to a friend, Sidney Blumenthal, not in government. The information appears to include privately shared comments by a prime minister, several foreign ministers and a foreign spy chief, unredacted bits of the emails show. Typically, Clinton and her staff first learned the information in private meetings, telephone calls or, less often, in email exchanges with the foreign officials.
  • The findings of the Reuters review are separate from the recent analysis by the inspector general for U.S. intelligence agencies, who said last month that his office found four emails that contained classified government secrets at the time they were sent in a sample of 40 emails not yet made public.The State Department has said it does not know whether the inspector general is correct.
  • The Reuters review also found that the declassification dates the department has been marking on these emails suggest the department might believe the information was classified all along. Gerlach said this was incorrect.
  • A series of presidential executive orders has governed how officials should handle the ceaseless incoming stream of raw, usually unmarked information they acquire in their work. Since at least 2003, they have emphasized that information shared by a foreign government with an expectation or agreement of confidentiality is the only kind that is "presumed" classified.The State Department's own regulations, as laid out in the Foreign Affairs Manual, have been unequivocal since at least 1999: all department employees "must ... safeguard foreign government and NATO RESTRICTED information as U.S. Government Confidential" or higher, according to the version in force in 2009, when these particular emails were sent.
  • A spokeswoman for one of the foreign governments whose information appears in Clinton's emails said, on condition of anonymity to protect diplomatic relations, that the information was shared confidentially in 2009 with Clinton and her senior staff.If so, it appears this information should have been classified at the time and not handled on a private unsecured email network, according to government regulations.The foreign government expects all private exchanges with U.S. officials to be treated that way, the spokeswoman for the foreign government said.Leonard, the former ISOO director, said this sort of information was improperly shared by officials through insecure channels more frequently than the public may realize, although more typically within the unsecured .gov email network than on private email accounts.With few exceptions, officials are forbidden from sending classified information even via the .gov email network and must use a dedicated secure network instead. The difference in Clinton's case, Leonard said, is that so-called "spillages" of classified information within the .gov network are easier to track and contain.
1 - 20 of 98 Next › Last »
Showing 20 items per page