Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged public-trust

Rss Feed Group items tagged

Paul Merrell

'Citizenfour' Producers Sued Over Edward Snowden Leaks (Exclusive) - The Hollywood Repo... - 0 views

  • The U.S. government still wants to get its hands on Edward Snowden, the former CIA officer who has detailed the extent to which the NSA spies on citizens. Here's a timely question: Would the federal government ever do anything about Citizenfour, the Oscar-contending documentary that features Snowden?
  • So far, the Barack Obama administration has given the film a pass, but on Friday, one former government official decided that enough was enough.
  • Horace Edwards, who identifies himself as a retired naval officer and the former secretary of the Kansas Department of Transportation, has filed a lawsuit in Kansas federal court that seeks a constructive trust over monies derived from the distribution of Citizenfour. Edwards, who says he has "Q" security clearance and was the chief executive of the ARCO Pipeline Company, seeks to hold Snowden, director Laura Poitras, The Weinstein Co., Participant Media and others responsible for "obligations owed to the American people" and "misuse purloined information disclosed to foreign enemies."
  •  
    The complaint is appended to this article. To say that the complaint is laughable gives it too much credit. This is a case for publicity, not for a court victory. 
Paul Merrell

Federal Chief Information Officers (CIO) Council Wins Rosemary Award - 0 views

  • Hillary Clinton E-Mail Controversy Illuminates Government-Wide Failure National Security Archive Lawsuit Established E-Mails as Records in 1993 CIO Council Repeats as Rosemary "Winner" for Doubling Down On "Lifetime Failure" Only White House Saves Its E-Mail Electronically, Agencies No Deadline Until 2016
  • The Federal Chief Information Officers (CIO) Council has won the infamous Rosemary Award for worst open government performance of 2014, according to the citation published today by the National Security Archive at www.nsarchive.org. The National Security Archive had hoped that awarding the 2010 Rosemary Award to the Federal Chief Information Officers Council for never addressing the government's "lifetime failure" of saving its e-mail electronically would serve as a government-wide wakeup call that saving e-mails was a priority. Fallout from the Hillary Clinton e-mail debacle shows, however, that rather than "waking up," the top officials have opted to hit the "snooze" button. The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Justice Department, and Director of National Intelligence James Clapper.
  • Chief Information Officer of the United States Tony Scott was appointed to lead the Federal CIO Council on February 5, 2015, and his brief tenure has already seen more references in the news media to the importance of maintaining electronic government records, including e-mail, and the requirements of the Federal Records Act, than the past five years. Hopefully Mr. Scott, along with Office of Management & Budget Deputy Director for Management Ms. Beth Cobert will embrace the challenge of their Council being named a repeat Rosemary Award winner and use it as a baton to spur change rather than a cross to bear.
  • ...9 more annotations...
  • Many on the Federal CIO Council could use some motivation, including the beleaguered State Department CIO, Steven Taylor. In office since April 3, 2013, Mr. Taylor is in charge of the Department's information resources and IT initiatives and services. He "is directly responsible for the Information Resource Management (IRM) Bureau's budget of $750 million, and oversees State's total IT/ knowledge management budget of approximately one billion dollars." Prior to his current position, Taylor served as Acting CIO from August 1, 2012, as the Department's Deputy Chief Information Officer (DCIO) and Chief Technology Officer of Operations from June 2011, and was the Program Director for the State Messaging and Archival Retrieval Toolset (SMART). While Hillary Clinton repeatedly claimed that because she sent her official e-mail to "government officials on their State or other .gov accounts ... the emails were immediately captured and preserved," a recent State Department Office of Inspector General report contradicts claims that DOS' e-mail archiving system, ironically named SMART, did so.
  • The report found that State Department "employees have not received adequate training or guidance on their responsibilities for using those systems to preserve 'record emails.'" In 2011, while Taylor was State's Chief Technology Officer of Operations, State Department employees only created 61,156 record e-mails out of more than a billion e-mails sent. In other words, roughly .006% of DOS e-mails were captured electronically. And in 2013, while Taylor was State's CIO, a paltry seven e-mails were preserved from the Office of the Secretary, compared to the 4,922 preserved by the Lagos Consulate in Nigeria. Even though the report notes that its assessments "do not apply to the system used by the Department's high-level principals, the Secretary, the Deputy Secretaries, the Under Secretaries, and their immediate staffs, which maintain separate systems," the State Department has not provided any estimation of the number of Clinton's e-mails that were preserved by recipients through the Department's anachronistic "print and file" system, or any other procedure.
  • The unfortunate silver lining of Hillary Clinton inappropriately appropriating public records as her own is that she likely preserved her records much more comprehensively than her State Department colleagues, most of whose e-mails have probably been lost under Taylor's IT leadership. 2008 reports by CREW, right, and the GAO, left, highlighted problems preserving e-mails. Click to enlarge. The bigger issue is that Federal IT gurus have known about this problem for years, and the State Department is not alone in not having done anything to fix it. A 2008 survey by Citizens for Responsibility and Ethics in Washington (CREW) and OpenTheGovernment.org did not find a single federal agency policy that mandates an electronic record keeping system agency-wide. Congressional testimony in 2008 by the Government Accountability Office indicted the standard "print and file" approach by pointing out:
  • 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).
  • Troublingly, current Office of Management and Budget guidance does not require federal agencies to manage "all email records in an electronic format" until December 31, 2016. The only part of the federal government that seems to be facing up to the e-mail preservation challenge with any kind of "best practice" is the White House, where the Obama administration installed on day one an e-mail archiving system that preserves and manages even the President's own Blackberry messages. The National Security Archive brought the original White House e-mail lawsuit against President Reagan in early 1989, and continued the litigation against Presidents George H.W. Bush and Bill Clinton, until court orders compelled the White House to install the "ARMS" system to archive e-mail. The Archive sued the George W. Bush administration in 2007 after discovering that the Bush White House had junked the Clinton system without replacing its systematic archiving functions. CREW subsequently joined this suit and with the Archive negotiated a settlement with the Obama administration that included the recovery of as many as 22 million e-mails that were previously missing or misfiled.
  • s a result of two decades of the Archive's White House e-mail litigation, several hundred thousand e-mails survive from the Reagan White House, nearly a half million from the George H.W. Bush White House, 32 million from the Clinton White House, and an estimated 220 million from the George W. Bush White House. Previous recipients of the Rosemary Award include: 2013 - Director of National Intelligence James Clapper (for his "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?") 2012 - the Justice Department (in a repeat performance, for failing to update FOIA regulations to comply with the law, undermining congressional intent, and hyping its open government statistics)
  • Rogue Band of Federal E-mail Users and Abusers Compounds Systemic Problems Former Secretary of State Hillary Clinton and other federal officials who skirt or even violate federal laws designed to preserve electronic federal records compound e-mail management problems. Top government officials who use personal e-mail for official business include: Clinton; former U.S. Ambassador to Kenya Scott Gration; chairman of the U.S. Chemical Safety Board Rafael Moure-Eraso; and former Secretary of State Colin Powell, who told ABC's This Week "I don't have any to turn over. I did not keep a cache of them. I did not print them off. I do not have thousands of pages somewhere in my personal files." Others who did not properly save electronic federal records include Environmental Protection Agency former administrator Lisa Jackson who used the pseudonym Richard Windsor to receive email; current EPA administrator Gina McCarthy, who improperly deleted thousands of text messages (which also are federal records) from her official agency cell phone; and former Internal Revenue Service official Lois Lerner, whose emails regarding Obama's political opponents "went missing or became destroyed."
  • "agencies recognize that devoting significant resources to creating paper records from electronic sources is not a viable long-term strategy;" yet GAO concluded even the "print and file" system was failing to capture historic records "for about half of the senior officials."
  • The destruction of other federal records was even more blatant. Jose Rodriguez, the former CIA official in charge of the agency's defunct torture program ordered the destruction of key videos documenting it in 2005, claiming that "the heat from destroying [the torture videos] is nothing compared to what it would be if the tapes ever got into the public domain;" Admiral William McRaven, ordered the immediate destruction of any emails about Operation Neptune Spear, including any photos of the death of Osama bin Laden ("destroy them immediately"), telling subordinates that any photos should have already been turned over to the CIA — presumably so they could be placed in operational files out of reach of the FOIA. These rogues make it harder — if not impossible — for agencies to streamline their records management, and for FOIA requesters and others to obtain official records, especially those not exchanged with other government employees. The US National Archives currently trusts agencies to determine and preserve e-mails which agencies have "deemed appropriate for preservation" on their own, often by employing a "print and file" physical archiving process for digital records. Any future reforms to e-mail management must address the problems of outdated preservation technology, Federal Records Act violators, and the scary fact that only one per cent of government e-mail addresses are saved digitally by the National Archive's recently-initiated "Capstone" program.
  •  
    Complete with photos, names, titles, of the 41 federal department and independent agency CIOs. The March 2015 Insopector General report linked from the article belies Hillary Clinton's claim that all emails she sent to State Department staff had been preserved by the Department.   
Paul Merrell

The Feds & Media: How the FBI Destroyed Journalism | nsnbc international - 0 views

  • James Comey, director of the Federal Bureau of Investigations (FBI) defended the use of an FBI agent posing as an Associated Press journalist in order to install spyware into the computer of a teenager from Lacy, Washington State.
  • Comey said in an open letter published in mainstream media that the FBI did not “overstep its bounds” while using deceptive tactics during their investigation into the teen who was in communication “online with the” FBI agent.” According to Comey: “An F.B.I. agent communicated online with the anonymous suspect. Relying on an agency behavioral assessment that the anonymous suspect was a narcissist, the online undercover officer portrayed himself as an employee of The Associated Press, and asked if the suspect would be willing to review a draft article about the threats and attacks, to be sure that the anonymous suspect was portrayed fairly.” To entrap the student, the FBI produced a fake news report provided by the FBI agent to the Associated Press regarding a “technology savvy student holds Timberline High School hostage.”
  • The Reporters Committee for Freedom of the Press (RCFP) wrote a letter to Holder and Comey explaining : “The warrant for such action apparently did not mention that the tracker was delivered as an AP article, with an AP byline “and therefore impersonated a news media organization.” Concerned that the FBI not only failed to follow its own guidelines for such activity, but also did not make clear to the judge who signed the warrant or FBI counsel that the software ‘impersonated a media organization or that there were First Amendment concerns at stake’.”
  • ...2 more annotations...
  • The FBI agent made sure the teen saw the article which facilitated the downloading of spyware into the boy’s computer in order to track the child’s online whereabouts. Kathy Best, executive editor of the Seattle Times commented : “The FBI, in placing the name of The Associated Press on a phony story sent to a criminal suspect, crossed a line and undermined the credibility of journalists everywhere – including at The Times.” The FBI maintains that “the operation was aimed at preventing tragedy. We were fortunate that information provided by the public gave us the opportunity to step into a potentially dangerous situation before it was too late.” Kathleen Carroll, executive editor of AP said : “This latest revelation of how the FBI misappropriated the trusted name of the Associated Press doubles our concern and outrage, expressed earlier to Attorney General Eric Holder, about how the agency’s unacceptable tactics undermine AP and the vital distinction between the government and the press.”
  • The RCFP continued in their letter: “The utilization of news media as a cover for delivery of electronic surveillance software is unacceptable. This practice endangers the media’s credibility and creates the appearance that it is not independent of the government. It undermines media organizations’ ability to independently report on law enforcement.” Ironically, the FBI have a program targeting teenagers called, “The FBI Teen Reporter’s Workshop” where “selected” high school students in New York are brought to the FBI field office to “learn about how the FBI interacts with the media. In addition to hearing about the overall mission of the FBI and the mission of the Office of Public Affairs, the teens have the opportunity to meet members of the media and to take photos with FBI equipment.”
Gary Edwards

Does 2nd Amendment Confer an Individual Right to Bear Arms? - Tea Party Command Center - 0 views

  • 1. Barron v Baltimore (1833): held that the Bill of Rights applies directly to the federal government—not to state governments. In effect, the court ruled that states could infringe on the Bill of Rights since the Bill of Rights restrained only the federal government. (Don’t ask. I didn’t delve deeply into the reasoning behind this decision.)
    • Gary Edwards
       
      Nonsense!  The No Religious Test Clause of the United States Constitution is found in Article VI, paragraph 3, and states that: "The Senators and Representatives before mentioned, and the Members of the several State Legislatures, and all executive and judicial Officers, both of the United States and of the several States, shall be bound by Oath or Affirmation, to support this Constitution; but no religious test shall ever be required as a qualification to any office or public trust under the United States." Furthermore, all federal, state, and local officials must take an oath to support the Constitution. This means that state governments and officials cannot take actions or pass laws that interfere with the Constitution, laws passed by Congress, or treaties.
  • 2. Nunn v State of Georgia (1846): held that “the right of the people to keep and bear arms shall not be infringed” and that “the right of the whole people, old and young, men, women and boys, and not militia only, to keep and bear arms of every description, and not such merely as are used by the militia, shall not be infringed, curtailed or broken in upon in the smallest degree.”
  • 11. District of Columbia v Heller (2008): the court ruled that the Cruikshank decision failed to properly weigh 14th Amendment protections and that “the inherent right of self-defense has been central to the Second Amendment right.”
  • ...3 more annotations...
  • McDonald v City of Chicago ensured that the full force of the 2nd Amendment extended to all localities as well.
  • But, what’s behind the McDonald challenge? In short, the Illinois state constitution states that “Subject only to the police power, the right of the individual citizen to keep and bear arms shall not be infringed.”
  • no discussion of the 2nd Amendment can be properly wrapped up without this incisive quote from Thomas Jefferson: “False is the idea of utility that sacrifices a thousand real advantages for one imaginary of trifling inconvenience; that would take fire from men because it burns, and water because one may drown in it; that has no remedy for evil, except destruction. The laws that forbid the carrying of arms are laws of such nature…Such laws make things worse for the assaulted and better for the assailants; they serve rather to encourage than prevent homicides, for an unarmed man may be attacked with greater confidence than an armed man…”
Paul Merrell

Matt Taibbi Talks Ratings Agencies With Chris Hayes | Matt Taibbi | Rolling Stone - 0 views

  • "Standard & Poor's has long had strict policies to reinforce the independence of our analytical processes. . . . We make our methodology transparent to the market." That was among the responses of a spokesperson for the ratings agency Standard & Poor's when I contacted him a few weeks ago in advance of a new Rolling Stone feature, "The Last Mystery of the Financial Crisis," which describes the role the ratings agencies played in causing the 2008 crash. The company was genuinely miffed that anyone would impugn its honesty. In one relatively brief e-mail, the spokesperson used variables of terms like "independent," "integrity" and "transparent," upwards of nine times. Hold that thought. "The Last Mystery of the Financial Crisis" makes great use of documents uncovered in years of painstaking research by attorneys at Robbins Geller Rudman & Dowd, a San Diego-based firm that was at the forefront of major lawsuits against the industry. The material those lawyers found leaves virtually no doubt that the great ratings agencies like Moody's and S&P essentially put their analysis up for sale in the years leading up to the crash.
  • Moreover, the Court said, plaintiffs could not make a claim based on a public statement by S&P touting its "credibility and reliability," or another saying, "[S&P] has a longstanding commitment to ensuring that any potential conflicts of interest do not compromise its analytical independence." Why, you might ask, could one not make a fraud claim based upon those statements? Because, the Second Circuit ruled, those statements were transparently not meant to be taken seriously.
  • I point this out because the ratings agencies' responses to the questions we posed for the piece were almost as revealing as the extremely damaging emails and internal documents the Robbins Geller lawyers uncovered. It wasn't just that there was apparently an entire generation of internal email correspondence that had been taken out of context (apparently, the context was taken out of context). More interesting was another line of defense. Not long before I contacted them, S&P had made, in a very graphic and comical manner, a very strange argument in court. In an attempt to dismiss a federal Justice Department lawsuit pending against S&P, the company had, in a court motion, cited a Florida court case, Boca Raton Firefighters and Police Pension Fund v. Bahash. In that case, the Second Circuit ruled that the plaintiffs suing S&P could not make a fraud claim based upon the company's reassurances in its Code of Conduct of its "objectivity, integrity and independence."
  • ...1 more annotation...
  • Anyway, if you want the full lowdown on what actually goes on internally at these companies, check out the piece, which is full of the devastating material dug up by those San Diego lawyers. Also, thanks so much to the excellent Chris Hayes at MSNBC, who had me on last night to discuss the issue. It was a very fun talk.
  •  
    The Rolling Stone's Mat Taiibi strikes again. 
Paul Merrell

US-Saudi Plan: Let 9,000 ISIS Fighters Walk Free from Mosul - to Fight in Syria - 0 views

  • Judging by both the words, and deeds of the Obama White House and its political ‘diplomatic’ appointees led by perfidious John Kerry and caustic Samantha Power – all evidence to date points to the US wanting to escalate its war on Syria – while happily baiting a military confrontation, and ‘World War‘ scenario with Russia and its allies in the process.  If this latest leak is indeed true – and time will certainly tell whether or not it is, it would constitute one of the most egregious violations of both US and international law – by the United States government and its theocratic dictator partner in Saudi Arabia. Washington’s own anti-terror legislation expressly forbids colluding to provide logistical or material support for terrorist groups, and this US-Saudi venture would be the latest in a long list of violations…
  • Here’s what makes this a potential shocker: the operation allows for safe passage for 9,000 ISIS fighters on the proviso that they are transferred from Iraq to eastern Syria in order to help US plans for “regime change” there.  “At the time of the assault, coalition aircraft would strike only on a pre-agreed detached buildings in the city, which are empty, the source said.” “According to him [the source], the plan of Washington and Riyadh also provides that the rebels move from Mosul to Syria for the attack on the government-controlled town of troops.” Essentially, Washington and Saudi Arabia, will allow 9,000 ISIS (Islamic State) fighter FREE passage into Syria if they agree to join Washington’s “regime change” operations there. This could also include, “… eastern regions of Syria to follow a major offensive operation, which involves the capture of Deir ez-Zor and Palmyra,” the source added. Before you write this story off as some ornate Russian psychological operation, consider the long trend arch. The US along with its generous Gulf sidekicks, have already established a solid track record of aiding and abetting ISIS – not just in Syria, but in Iraq too. The record shows that the US is guilty on a number of counts…
  • If the Mosul leak is true, then it wouldn’t be the first time that the US has provided cover in the military pantomime the world has come to know as “the fight against ISIS.” When large ISIS convoys crossed the Syrian desert to invade and occupy the ancient Syrian city of Palmyra in May 2015, the US ‘Coalition’ airforce did nothing, and allowed ISIS to take and destroy part of the world’s great historic cultural heritage, along with the murder of scores of innocent civilians. Professor Tim Anderson from Sydney University states: “U.S. weapons with Israeli ammunition were used by Islamic State group when taking over Palmyra. The extremists also had U.S. military rations.” “The U.S., which since 2014 claimed to be conducting a war against ISIS in Iraq and Syria, and which had air power and sophisticated surveillance of the region, did nothing to stop the huge ISIS advance on Palmyra.” The US isn’t even shy about its laissez-faire policy with ISIS in the field, with the New York Times openly boasting, “Any airstrikes against Islamic State militants in and around Palmyra would probably benefit the forces of President Bashar al-Assad. So far, United States-led airstrikes in Syria have largely focused on areas far outside government control, to avoid the perception of aiding a leader whose ouster President Obama has called for.”
  • ...4 more annotations...
  • More importantly however, is what kind of message an US statement like that sends to ISIS, as well as Al Nusra and other terrorist brigades inside Syria, which is basically, “we do not need to worry about US air strikes, only Syrian Army and Russian strikes.” This situation really sums up the utter fraud and contempt of the US deception in Syria, and it’s no surprise that the Russian Foreign Ministry are reticent to extend themselves any more where the US is concerned. Then, in March 2016, when ISIS fled Palmyra, back across the desert towards Deir ez-Zor and Raqqa – the great and powerful US ‘Coalition’ airforce actually helped ISIS in a number of ways, including allowing them free passage once more. In late August, we were told that the Turkish Army, alongside “allied Syrian rebels” (terrorist group Faylaq al-Sham) backed by the US air cover, invaded Syria in order to capture the “ISIS-held” town of Jarabulus, Syria, this supposedly to cut off ISIS’s last open route into Turkey. But what happened to ISIS? The NYT even admitted that, “… it appeared that most of the militants had fled without a fight.” Here, ISIS appears to have been given advanced warning – by either US or Turkish intelligence, as they left the contested town of Jarabulus quietly, but in droves. In reality, Turkey twisted this operation in order to attack and degrade Kurdish militias including the US-backed artificial construct called the Syrian Democratic Forces (SDF), and pro-Kurdish People’s Protection Units (YPG) and Kurdish Democratic Union Party (PYD), the Syrian affiliate of the militant Kurdistan Workers’ Party (PKK) in Iraq and Turkey – all of whom are meant to be fighting ISIS. Instead, they are now busy dodging Turkish artillery rounds. Confusing, yes, but true nonetheless.
  • It’s also common knowledge now, that top of the line US weaponry is being used by ISIS, both in Iraq, in Afghanistan and in Syria as well. In fact, if not for US weapons and supplies (along with US air intervention, or noninterventions), ISIS would have struggled to maintain many of the strategic positions it enjoys today. For the last 3 years, US officials have been dodging this issue, and when they do admit this is true, their patronizing party line is that, “this must be a mistake, if they do have US weapons, we didn’t mean it.” As if the world was born yesterday. Perhaps the most flagrant violation by the US-led forces in aiding and abetting ISIS took place on Sept 17, 2016, when the US-led Coalition bombed Syrian Army positions outside of Deir ez-Zor near al-Tharda Mountain, killing some 80 soldiers and injuring 100 more.  As if by design, an ISIS offensive began immediately following the US massacre of Syrian soldiers. Clearly, this bold move by the Pentagon paved the way for a major ISIS advance. To any normal observer, the US attack was a belligerent act of war that effective destroyed an already fragile bilateral ceasefire agreement, and yet the US response was to somehow blame Russia for calling an emergency UNSC meeting to discuss the incident. Judging by this response, it’s pretty clear that US wants to see the Syrian Conflict carry on for a while, and it will need groups like ISIS to make that happen.
  • The other problem with Washington’s hollow righteousness in the Middle East is that there are key members of the US-led “Coalition” who are financing ISIS, Al Nusra Front, Nour al Din Zinki, and Arar al Sham (all ‘moderate’ terrorists we’re told) militants in Syria, Iraq and beyond. This fact was recently admitted by former US Secretary of State and Democratic candidate Hillary Clinton, as revealed in this week’s batch of Wikileaks emails. Clinton writes: “While this military/para-military operation is moving forward, we need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region.”  Add to that the multiple exposures over the last 3 years of the US CIA illegally trafficking lethal arms to Al Nusra and other terrorists through covert operations like Timber Sycamore. Still, US and NATO member state officials and their media gatekeepers continue to deny it and play dumb, rather than come clean that the United States and its ‘partners’ in the region are helping, not hindering ISIS terrorism. Some might ask: why would they do a thing like that? By now, the answer should be simple, but threefold:
  • ISIS is still one of Washington’s best hope for continuing instability, and “regime change” in Syria. The existence of ISIS in Syria and Iraq guarantees that Washington can invite itself to the party.  The ISIS brand has been a boon for the global military industrial complex and all of its bottom-feeder businesses and ‘security’ contract firms. What’s so comical yet even more tragic, is how prominent the topic of “ISIS” factors into all of the vapid ‘national security’ debates and media panels in this year’s US Presidential election, and in the dumbed-down ‘coverage’ of the delusional US mainstream media, led by Pentagon surrogate CNN, and hopeless FOX News. Judging by their prosaic ‘coverage’, neither the networks, nor Hillary Clinton or Donald Trump have the slightest clue of what the reality on the ground is. Instead we here, “My ISIS plan is better than yours!” The US political conversation has gone beyond ridiculousness. The corps of US military and CIA media spokesman aren’t much better. The sad part is some of them do know what is really happening, but would rather lie to the American public. With so much double dealing, who can you trust? Certainly not anyone in Washington. More on the White House’s latest dangerous proposition….
Paul Merrell

Congress Votes to Give Jihadists Anti-Aircraft Missiles | Global Research - Centre for ... - 0 views

  • On Thursday, the Senate passed a bill that puts every American who travels by plane at risk.  It is among the stupidest pieces of legislation ever written and it explains– to a great extent– why the US Congress has a public approval rating of 13 percent and is among the most loathed institutions in America. The 2017 National Defense Authorization Act (NDAA) passed the House last Friday in a 375-34 vote. On Thursday, it cleared the senate with a 92 to 7 margin.  The bill will now be sent to Obama where it is expected to be signed into law. According to an article on SOFREP titled  “Congress authorizes anti-aircraft missiles for Syrian opposition”: Congress for the first time authorized the Department of Defense to provide vetted-Syrian rebels with anti-aircraft missiles. The provision is contained within the $619 billion Fiscal Year 2017 National Defense Authorization Act, which passed the Senate on Dec. 8 and the House on Dec. 2. Under the bill, the Secretaries of Defense and State must submit a report to Congress explaining why they determined Syrian groups need man-portable air defense systems (MANPADS). (SOFREP: Trusted News and Intelligence From Spec Ops Veterans, “Congress authorizes anti-aircraft missiles for Syrian opposition”)
  • You read that right, Congress just passed a bill that will provide shoulder-launched ground-to-air missiles to lunatic jihadists who will undoubtedly use them to take down American or Israeli jetliners. The argument that these Islamic militants are fully vetted is complete nonsense as both the New York Times and the Wall Street Journal have repeatedly shown. According to a recent article in the New York Times, rebel groups supported by the USG  “have entered into battlefield alliances with the affiliate of al Qaida in Syria formerly known as al Nusra.”  The Wall Street Journal reports that rebel groups are “doubling-down on their alliance with al Qaida. This alliance has rendered the phrase ‘moderate rebels’ meaningless.” Everyone who has followed developments on the ground in Syria knows that the distinction between the “good” terrorists and the “bad” terrorists is pure bunkum. The various militias are merely the many heads of the same homicidal anti-government hydra that has killed over 400,000 Syrians and decimated a large part of the country. The CIA should not be assisting any of these madmen let alone providing them with lethal state-of the-art weapons that will inevitably be used to take down US aircraft.  Here’s more from the same article: The inclusion of the provision represents a departure from previous versions of the NDAA. The original House bill specifically prohibited the transfer of MANPADS to “any entity” in Syria, while the Senate bill did not address it. So, the original bill forbid “the transfer of MANPADS” to Syrian militants because it was considered too dangerous. But now that Obama’s proxy-army is getting pulverized in Aleppo,  Congress has taken off the gloves and gone into full-revenge mode.  Isn’t that what’s really going on?
  • And it looks like Obama has already given this crazy policy a big thumbs up. Check out this “Presidential Determination and Waiver ….on the Arms Export Control Act to Support U.S. Special Operations to Combat Terrorism in Syria” that the White House issued late Thursday: By the authority vested in me as President by the Constitution and the laws of the United States, including section 2249a of title 10, United States Code, sections 40 and 40A of the Arms Export Control Act (AECA) (22 U.S.C. 2780 and 2781), and section 301 of title 3, United States Code, I hereby: determine that the transaction, encompassing the provision of defense articles and services to foreign forces, irregular forces, groups, or individuals engaged in supporting or facilitating ongoing U.S. military operations to counter terrorism in Syria, is essential to the national security interests of the United States.(Presidential Determination and Waiver) It looks to me like our Nobel prize-winning president just gave Congress’s idiot plan his ringing endorsement.
  •  
    Mike Whitney eloquently expresses my anger.
Paul Merrell

US v. Warshak, 631 F. 3d 266 - Court of Appeals, 6th Circuit 2010 - Google Scholar - 0 views

  • While a letter is in the mail, the police may not intercept it and examine its contents unless they first obtain a warrant based on probable cause. Ibid. This is true despite the fact that sealed letters are handed over to perhaps dozens of mail carriers, any one of whom could tear open the thin paper envelopes that separate the private words from the world outside. Put another way, trusting a letter to an intermediary does not necessarily defeat a reasonable expectation that the letter will remain private. See Katz, 389 U.S. at 351, 88 S.Ct. 507 ("[W]hat [a person] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."). Given the fundamental similarities between email and traditional forms of communication, it would defy common sense 286*286 to afford emails lesser Fourth Amendment protection. See Patricia L. Bellia & Susan Freiwald, Fourth Amendment Protection for Stored E-Mail, 2008 U. Chi. Legal F. 121, 135 (2008) (recognizing the need to "eliminate the strangely disparate treatment of mailed and telephonic communications on the one hand and electronic communications on the other"); City of Ontario v. Quon, ___ U.S. ___, 130 S.Ct. 2619, 2631, 177 L.Ed.2d 216 (2010) (implying that "a search of [an individual's] personal e-mail account" would be just as intrusive as "a wiretap on his home phone line"); United States v. Forrester, 512 F.3d 500, 511 (9th Cir.2008) (holding that "[t]he privacy interests in [mail and email] are identical"). Email is the technological scion of tangible mail, and it plays an indispensable part in the Information Age.
  • Over the last decade, email has become "so pervasive that some persons may consider [it] to be [an] essential means or necessary instrument[] for self-expression, even self-identification." Quon, 130 S.Ct. at 2630. It follows that email requires strong protection under the Fourth Amendment; otherwise, the Fourth Amendment would prove an ineffective guardian of private communication, an essential purpose it has long been recognized to serve. See U.S. Dist. Court, 407 U.S. at 313, 92 S.Ct. 2125; United States v. Waller, 581 F.2d 585, 587 (6th Cir.1978) (noting the Fourth Amendment's role in protecting "private communications"). As some forms of communication begin to diminish, the Fourth Amendment must recognize and protect nascent ones that arise. See Warshak I, 490 F.3d at 473 ("It goes without saying that like the telephone earlier in our history, e-mail is an ever-increasing mode of private communication, and protecting shared communications through this medium is as important to Fourth Amendment principles today as protecting telephone conversations has been in the past.").
  • If we accept that an email is analogous to a letter or a phone call, it is manifest that agents of the government cannot compel a commercial ISP to turn over the contents of an email without triggering the Fourth Amendment. An ISP is the intermediary that makes email communication possible. Emails must pass through an ISP's servers to reach their intended recipient. Thus, the ISP is the functional equivalent of a post office or a telephone company. As we have discussed above, the police may not storm the post office and intercept a letter, and they are likewise forbidden from using the phone system to make a clandestine recording of a telephone call—unless they get a warrant, that is. See Jacobsen, 466 U.S. at 114, 104 S.Ct. 1652; Katz, 389 U.S. at 353, 88 S.Ct. 507. It only stands to reason that, if government agents compel an ISP to surrender the contents of a subscriber's emails, those agents have thereby conducted a Fourth Amendment search, which necessitates compliance with the warrant requirement absent some exception. In Warshak I, the government argued that this conclusion was improper, pointing to the fact that NuVox contractually reserved the right to access Warshak's emails for certain purposes. While we acknowledge that a subscriber agreement might, in some cases, be sweeping enough to defeat a reasonable expectation of privacy in the contents of an email account, see Warshak I, 490 F.3d at 473; Warshak II, 532 F.3d at 526-27, we doubt that will be the case in most situations, and it is certainly not the case here.
  • ...1 more annotation...
  • Accordingly, we hold that a subscriber enjoys a reasonable expectation of privacy in the contents of emails "that are stored with, or sent or received through, a commercial ISP." Warshak I, 490 F.3d at 473; see Forrester, 512 F.3d at 511 (suggesting that "[t]he contents [of email messages] may deserve Fourth Amendment protection"). The government may not compel a commercial ISP to turn over the contents of a subscriber's emails without first obtaining a warrant based on probable cause. Therefore, because they did not obtain a warrant, the government agents violated the Fourth Amendment when they obtained the contents of Warshak's emails. Moreover, to the extent that the SCA purports to permit the government to obtain such emails warrantlessly, the SCA is unconstitutional.
  •  
    A 2010 decision by the U.S. 6th Circuit Court of Appeals that I had missed up to now. It finds the Stored Communications Act's section that excuses email in the possession of an ISP for more than 180 days from the 4th Amendment's judicial warrant clause. There may yet be hope for cloud computing in the U.S. 
Paul Merrell

Big Oil's "Sore Losers" Lead the Drive to War » CounterPunch: Tells the Facts... - 0 views

  • Following a 13 year rampage that has reduced large swathes of Central Asia and the Middle East to anarchy and ruin, the US military juggernaut has finally met its match on a small peninsula in southeastern Ukraine that serves as the primary operating base for Russia’s Black Sea Fleet. Crimea is the door through which Washington must pass if it intends to extend its forward-operating bases throughout Eurasia, seize control of vital pipeline corridors and resources, and establish itself as the dominant military/economic power-player in the new century. Unfortunately, for Washington, Moscow has no intention of withdrawing from the Crimea or relinquishing control of its critical military outpost in Sevastopol. That means that the Crimea–which has been invaded by the Cimmerians, Bulgars, Greeks, Scythians, Goths, Huns, Khazars, Ottomans, Turks, Mongols, and Germans–could see another conflagration in the months ahead, perhaps, triggering a Third World War, the collapse of the existing global security structure, and a new world order, albeit quite different from the one imagined by the fantasists at the Council on Foreign Relations and the other far-right think tanks that guide US foreign policy and who are responsible for the present crisis.
  • How Washington conducts itself in this new conflict will tell us whether the authors of the War on Terror–that public relations hoax that concealed the goals of eviscerated civil liberties and one world government–were really serious about actualizing their NWO vision or if it was merely the collective pipedream of corporate CEOs and bored bankers with too much time on their hands. In the Crimea, the empire faces a real adversary, not a disparate group of Kalashinov-waving jihadis in flip-flops. This is the Russian Army; they know how to defend themselves and they are prepared to do so. That puts the ball in Obama’s court. It’s up to him and his crackpot “Grand Chessboard” advisors to decide how far they want to push this. Do they want to intensify the rhetoric and ratchet up the sanctions until blows are exchanged, or pick up their chips and walk away before things get out of hand? Do they want to risk it all on one daredevil roll of the dice or move on to Plan B? That’s the question. Whatever US policymakers decide, one thing is certain, Moscow is not going to budge. Their back is already against the wall. Besides, they know that a lunatic with a knife is on the loose, and they’re ready to do whatever is required to protect their people. If Washington decides to cross that line and provoke a fight, then there’s going to trouble. It’s as simple as that. Perma-hawk, John McCain thinks that Obama should take off the gloves and show Putin who’s boss. In an interview with TIME magazine McCain said “This is a chess match reminiscent of the Cold War and we need to realize that and act accordingly…We need to take certain measures that would convince Putin that there is a very high cost to actions that he is taking now.” “High cost” says McCain, but high cost for who?
  • What McCain fails to realize is that this is not Afghanistan and Obama is not in a spitting match with puppet Karzai. Leveling sanctions against Moscow will have significant consequences, the likes of which could cause real harm to US interests. Did we mention that “ExxonMobil’s biggest non-US oil project is a collaboration with Russia’s Rosneft in the Arctic, where it has billions of dollars of investments at stake.” What if Putin decides that it’s no longer in Moscow’s interest to honor contracts that were made with US corporations? What do you think the reaction of shareholders will be to that news? And that’s just one example. There are many more. Any confrontation with Russia will result in asymmetrical attacks on the dollar, the bond market, and oil supplies. Maybe the US could defeat Russian forces in the Crimea. Maybe they could sink the fleet and rout the troops, but there’ll be a heavy price to pay and no one will be happy with the outcome.
  • ...4 more annotations...
  • Here’s a clip from an article at Testosterone Pit that sums it up nicely: “Sergei Glazyev, the most hardline of Putin’s advisors, sketched the retaliation strategy: Drop the dollar, sell US Treasuries, encourage Russian companies to default on their dollar-denominated debts, and create an alternative currency system with the BRICS and hydrocarbon producers like Venezuela and Iran… Putin’s ally and trusted friend, Rosneft president Igor Sechin…suggested that it was “advisable to create an international stock-exchange for the participating countries, where transactions could be registered with the use of regional currencies.” (From Now On, No Compromises Are Possible For Russia, Testosterone Pit)
  • As the US continues to abuse its power, these changes become more and more necessary. Foreign governments must form new alliances in order to abandon the present system–the “dollar system”–and establish greater parity between nation-states, the very nation-states that Washington is destroying one-by-one to establish its ghoulish vision of global corporate utopia. The only way to derail that project is by exposing the glaring weakness in the system itself, which is the use of an international currency that is backed by $15 trillion in government debt, $4 trillion in Federal Reserve debt, and trillions more in unpaid and unpayable federal obligations. Whatever steps Moscow takes to abort the current system and replace the world’s reserve currency with money that represents a fair store of value, should be applauded. Washington’s reckless and homicidal behavior around the world make it particularly unsuitable as the de facto steward of the global financial system or to enjoy seigniorage, which allows the US to play banker to the rest of the world. The dollar is the foundation upon which rests the three pillars of imperial strength; political, economic and military. Remove that foundation and the entire edifice comes crashing to earth. Having abused that power, by killing and maiming millions of people across the planet; the world needs to transition to another, more benign way of consummating its business transactions, preferably a currency that is not backed by the blood and misery of innocent victims.
  • Paul Volcker summed up the feelings of many dollar-critics in 2010 when he had this to say: “The growing sense around much of the world is that we have lost both relative economic strength and more important, we have lost a coherent successful governing model to be emulated by the rest of the world. Instead, we’re faced with broken financial markets, underperformance of our economy and a fractious political climate.” America is irreparably broken and Washington is a moral swamp. The world needs regime change; new leaders, new direction and a different system.
  • In our last article, we tried to draw attention to the role of big oil in the present crisis. Author Nafeez Ahmed expands on that theme in a “must read” article in Monday’s Guardian. Check out this brief excerpt from Ahmed’s piece titled “Ukraine crisis is about Great Power oil, gas pipeline rivalry”: “Ukraine is increasingly perceived to be critically situated in the emerging battle to dominate energy transport corridors linking the oil and natural gas reserves of the Caspian basin to European markets… Considerable competition has already emerged over the construction of pipelines. Whether Ukraine will provide alternative routes helping to diversify access, as the West would prefer, or ‘find itself forced to play the role of a Russian subsidiary,’ remains to be seen.” (Guardian) The western oil giants have been playing “catch up” for more than a decade with Putin checkmating them at every turn. As it happens, the wily KGB alum has turned out to be a better businessman than any of his competitors, essentially whooping them at their own game, using the free market to extend his network of pipelines across Central Asia and into Europe. That’s what the current crisis is all about.
Gary Edwards

About the Reuters article | Glenn Greenwald | Comment is free | guardian.co.uk - 0 views

  • (just incidentally, the notion that a government that has spent the last decade invading, bombing, torturing, rendering, kidnapping, imprisoning without charges, droning, partnering with the worst dictators and murderers, and targeting its own citizens for assassination would be above such conduct is charmingly quaint
  • three points in this La Nacion interview, all of which are true and none of which has anything remotely to do with threats:
  • 1) The oft-repeated claim that Snowden's intent is to harm the US is completely negated by the reality that he has all sorts of documents that could quickly and seriously harm the US if disclosed, yet he has published none of those.
  • ...12 more annotations...
  • The overwhelming majority of his disclosures were to blow the whistle on US government deceit and radical, hidden domestic surveillance.
  • If his intent were to harm the US, he could have sold all the documents he had for a great deal of money, or indiscriminately published them, or passed them to a foreign adversary. He did none of that.
  • 2) The US government has acted with wild irrationality. The current criticism of Snowden is that he's in Russia. But the reason he's in Russia isn't that he chose to be there. It's because the US blocked him from leaving: first by revoking his passport (with no due process or trial), then by pressuring its allies to deny airspace rights to any plane they thought might be carrying him to asylum (even one carrying the democratically elected president of a sovereign state), then by bullying small countries out of letting him land for re-fueling.
  • Given the extraordinary amount of documents he has and their sensitivity, I pointed out in the interview that it is incredibly foolish for the US government to force him to remain in Russia.
  • As a result of the documents he has, I said in the interview, the US government should be praying for his safety, not threatening or harming it.
  • 3) I was asked whether I thought the US government would take physical action against him if he tried to go to Latin America or even force his plane down. That's when I said that doing so would be completely counter-productive given that - as has been reported before - such an attack could easily result in far more disclosures than allowing us as journalists to vet and responsibly report them, as we've doing.
  • Compare the attention paid to Snowden's asylum drama and alleged personality traits to the attention paid to the disclosures about mass, indiscriminate NSA spying. Or compare the media calls that Snowden (and others who worked to expose mass NSA surveillance) be treated like a criminal to the virtually non-existent calls that Director of National Intelligence James Clapper be treated like a criminal for lying to Congress.
  • This "threat" fiction is just today's concoction to focus on anything but the revelations about US government lying to Congress and constitutionally and legally dubious NSA spying.
  • this only happens in the US: everywhere else, the media attention and political focus is on NSA surveillance, while US media figures are singularly obsessed with focusing on everything but that.
  • Yesterday, it was something else, and tomorrow it will be something else again.
  • There are all sorts of ways that Snowden could have chosen to make these documents be public. He chose the most responsible way possible: coming to media outlets and journalists he trusted and asking that they be reported on responsibly.
  • The effort to depict him as some sort of malicious traitor is completely negated by the facts. That was the point of the interview.
  •  
    Excellent explanation by Glenn Greenwald. intro: Like everything in the matter of these NSA leaks, this interview is being wildly distorted to attract attention away from the revelations themselves. It's particularly being seized on to attack Edward Snowden and, secondarily, me, for supposedly "blackmailing" and "threatening" the US government. That is just absurd. That Snowden has created some sort of "dead man's switch" - whereby documents get released in the event that he is killed by the US government - was previously reported weeks ago, and Snowden himself has strongly implied much the same thing. That doesn't mean he thinks the US government is attempting to kill him - he doesn't - just that he's taken precautions against all eventualities, including that one (just incidentally, the notion that a government that has spent the last decade invading, bombing, torturing, rendering, kidnapping, imprisoning without charges, droning, partnering with the worst dictators and murderers, and targeting its own citizens for assassination would be above such conduct is charmingly quaint).
Gary Edwards

The progressive endgame, and how to prevent it | protein wisdom - 2 views

  • Social Security Administration employees are being instructed to tell people who ask that if the debt ceiling is not raised, their social security benefits could be in danger. In an email sent Friday, obtained by The Daily Caller, employees are instructed: “If a member of the public asks whether their Social Security payment will be affected if the federal debt ceiling is not raised, you may give the following response: ‘Unlike a federal shutdown which has no impact on the payment of Social Security benefits, failure to raise the debt ceiling puts Social Security benefits at risk.’ “Direct all program–related and technical questions to your supervisor.”
  • This was done before in 2011 also and the answer is the same as it was then. Social Security holds $2.6 trillion in special-issue Treasury securities. Those bonds are part of the $14.3 trillion debt amassed by the U.S. government, and benefits are paid out of those securities. So, the theory goes, if Treasury redeemed the needed Social Security bonds, and issued new marketable Treasury bonds to make good on the Social Security bonds, it would be a one for one swap and the debt ceiling would not be increased. There is a technical wrinkle involving the fact that payroll taxes that are collected are supposed to be immediately turned into Treasury securities, but there could be ways around that, such as putting the monies in a noninterest bearing account, as during the 1985 debt crisis. [...] “I’m now 99.9 percent positive that Treasury has legal authority to pay Social Security benefits in both cases of a government shutdown and hitting the debt limit, since the payment of benefits shouldn’t affect the debt limit because it reduces the trust funds to the exact extent that it increase publicly-held debt,” Fichtner said. “What I don’t know is whether Treasury has to pay benefits if it chooses not to.” Dean Baker, co-director of the Center for Economic and Policy Research who has derided “the phony crisis” of Social Security, also believes the checks could keep flowing. “I would think that they could legally pay Social Security by reducing the obligations of the fund,” he said. “It no doubt would be a huge political issue.”
  •  
    Incredible theory, which, if true, would indeed end our Constitutional Republic.
  •  
    Diigo is having problems, I see. Correct link to the article quoted is http://proteinwisdom.com/?p=51354
Paul Merrell

Exclusive: Secret contract tied NSA and security industry pioneer | Reuters - 0 views

  • (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
  • The earlier disclosures of RSA's entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.
  • The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.
  • ...2 more annotations...
  • The NSA came under attack this week in a landmark report from a White House panel appointed to review U.S. surveillance policy. The panel noted that "encryption is an essential basis for trust on the Internet," and called for a halt to any NSA efforts to undermine it.
  • From RSA's earliest days, the U.S. intelligence establishment worried it would not be able to crack well-engineered public key cryptography. Martin Hellman, a former Stanford researcher who led the team that first invented the technique, said NSA experts tried to talk him and others into believing that the keys did not have to be as large as they planned.
  •  
    Reuters gives the NSA's history of introducing backdoors in encryption standards a deep look, focusing on RSA's acceptance of a $10 million NSA bribe post-9/11 to implement the NSA-created Dual Elliptic Curve standard for generating "random" numbers, which had what Bruce Schneier described as a "back door." A tip of the hat to Miro for alerting me to this article.
Paul Merrell

The US/NATO Enlargement Project » CounterPunch: Tells the Facts, Names the Names - 0 views

  • In February, 1990, US Secretary of State James Baker (1989-1992), representing President George HW Bush, traveled to Moscow to meet with Russian President Mikhail Gorbachev regarding the possible reunification of Germany and the removal of 300,000 Soviet troops. There is little serious dispute that as the Berlin Wall teetered, Baker promised Gorbachev “there would be no extension of NATO’s jurisdiction for forces of NATO one inch to the east.” Gorbachev is reported to have taken the US at its word and responded “any extension of the zone of NATO is unacceptable.” “I agree,” replied Baker.” Unfortunately, Gorbachev never got it in writing and most historians, at the time, agreed that NATO expansion was “ill conceived, ill-timed, and above all ill-suited to the realities of the post-Cold War world.”
  • President Bush’s National Security Advisor Brent Scowcroft and Bill Clinton’s Defense Secretary were also in agreement. But by 1994, that verbal contract had not deterred the concerted efforts of a handful of State Department policy professionals to subdue the overwhelming bureaucratic opposition according to James Goldgeier in his classic “Not Whether but When: The US Decision to Enlarge NATO.” By 1997, the Gorbachev-Baker-Bush agreement was a forgotten policy trinket as Hungary, Poland and the Czech Republic were accepted into NATO. In 2004, former Soviet satellite countries Lithuania, Latvia and Estonia were admitted and in 2009, Croatia and Albania joined NATO. Currently, the former Soviet republics of Ukraine, Georgia, Moldova, Kazakhstan, Armenia, and Azerbaijan are pending membership and all five former Soviet republics in Central Asia (Kyrgyzstan, Tajikistan, Turkmenistan, Kazakhstan, and Uzbekistan) provide NATO with logistical support for the US war in Afghanistan. As the US-led NATO alliance tightens its grip on the Caucasus countries, the American public has not been informed about the Ukrainian Parliament’s approval for a series of NATO military exercises that would put US troops on Russia’s border, even though the Ukraine is not yet a member of NATO. Rapid Trident is a 12-nation military ‘interoperability’ exercise led by the US who will commit the majority of participating troops and Sea Breeze is a naval exercise that will take place on the Black Sea adjacent to Russian ports. The NATO buildup includes joint ground operations with Moldova and Romania.
  • Most recently, NATO Secretary General Anders Fogh Rasmussen announced that the military alliance has cut Russia off from civilian and military cooperation and that there would be the deployment and reinforcement of military assets including increased air patrols over the Baltic Sea and AWACS surveillance flights over Poland and Romania. It goes without saying that the NATO build up is in addition to the deployment of US troops and F-16 warplanes to Poland, F-15C warplanes to Lithuania and aircraft carriers to the Black and Mediterranean Seas. All this raises the question about whether a promise and handshake in the world of international diplomacy is a real commitment and what is a 1991 international promise made by a Republican Administration worth in 1994 to a Democratic Administration? Apparently zilch.
  • ...1 more annotation...
  • What all this means is that, behind the diplomatic landscape of verbal jujitsu and summit meetings, there had been a concerted effort at the US State Department with the creation of a NATO Enlargement Office to establish what has become a Russian Wall – an impenetrable US – defined barrier of estrangement along the Russian border meant to cut the country off from land and sea access – as NATO, itching for war, continues to bait Russia with isolation and threats.
Paul Merrell

White House defends 'Cuban Twitter' to stir unrest - Yahoo News - 0 views

  • The Obama administration defended its creation of a Twitter-like Cuban communications network to undermine the communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval.
  • But two senior Democrats on congressional intelligence and judiciary committees said Thursday they had known nothing about the effort, which one of them described as "dumb, dumb, dumb." A showdown with that senator's panel is expected next week, and the Republican chairman of a House oversight subcommittee said that it, too, would look into the program.An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform.First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent.
  • Yet its users were neither aware it was created by a U.S. agency with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes.It is unclear whether the scheme was legal under U.S. law, which requires written authorization of covert action by the president as well as congressional notification. White House spokesman Jay Carney said he was not aware of individuals in the White House who had known about the program.
  • ...9 more annotations...
  • USAID's top official, Rajiv Shah, is scheduled to testify on Tuesday before the Senate Appropriations State Department and Foreign Operations Subcommittee, on the agency's budget. The subcommittee's chairman, Patrick Leahy, a Democrat, is the senator who called the project "dumb, dumb, dumb" during an appearance Thursday on MSNBC.The administration said early Thursday that it had disclosed the initiative to Congress — Carney said the program had been "debated in Congress" — but hours later the narrative had shifted to say that the administration had offered to discuss funding for it with the congressional committees that approve federal programs and budgets."We also offered to brief our appropriators and our authorizers," said State Department spokeswoman Marie Harf. She added that she was hearing on Capitol Hill that many people support these kinds of democracy promotion programs. And some lawmakers did speak up on that subject. But by late Thursday no members of Congress had acknowledged being aware of the Cuban Twitter program earlier than this week.
  • Harf described the program as "discreet" but said it was in no way classified or covert. Harf also said the project, dubbed ZunZuneo, did not rise to a level that required the secretary of state to be notified. Neither former Secretary of State Hillary Rodham Clinton nor John Kerry, the current occupant of the office, was aware of ZunZuneo, she said.In his prior position as chairman of the Senate Foreign Relations Committee, Kerry had asked congressional investigators to examine whether or not U.S. democracy promotion programs in Cuba were operated according to U.S. laws, among other issues. The resulting report, released by the Government Accountability Office in January 2013, does not examine whether or not the programs were covert. It does not say that any U.S. laws were broken.The GAO report does not specifically refer to ZunZuneo, but does note that USAID programs included "support for the development of independent social networking platforms."
  • "I know they said we were notified," Leahy told AP. "We were notified in the most oblique way, that nobody could understand it. I'm going to ask two basic questions: Why weren't we specifically told about this if you're asking us for money? And secondly, whose bright idea was this anyway?"The Republican chairman of a House oversight subcommittee said his panel will be looking into the project, too."That is not what USAID should be doing," said Rep. Jason Chaffetz, the Republican chairman of the House Oversight and Government Reform National Security Subcommittee. "USAID is flying the American flag and should be recognized around the globe as an honest broker of doing good. If they start participating in covert, subversive activities, the credibility of the United States is diminished."
  • At minimum, details uncovered by the AP appear to muddy the USAID's longstanding claims that it does not conduct covert actions, and the details could undermine the agency's mission to deliver aid to the world's poor and vulnerable — an effort that requires the trust and cooperation of foreign governments.Leahy and Rep. C.A. Dutch Ruppersberger, the top Democrat on the House Intelligence Committee, said they were unaware of ZunZuneo.
  • USAID and its contractors went to extensive lengths to conceal Washington's ties to the project, according to interviews and documents obtained by the AP. They set up front companies in Spain and the Cayman Islands to hide the money trail, and recruited CEOs without telling them they would be working on a U.S. taxpayer-funded project."There will be absolutely no mention of United States government involvement," according to a 2010 memo from Mobile Accord Inc., one of the project's creators. "This is absolutely crucial for the long-term success of the service and to ensure the success of the Mission."ZunZuneo was publicly launched shortly after the 2009 arrest in Cuba of American contractor Alan Gross. He was imprisoned after traveling repeatedly to the country on a separate, clandestine USAID mission to expand Internet access using sensitive technology that only governments use.The AP obtained more than 1,000 pages of documents about the ZunZuneo project's development. It independently verified the project's scope and details in the documents through publicly available databases, government sources and interviews with those involved.
  • The social media project began after Washington-based Creative Associates International obtained a half-million Cuban cellphone numbers. It was unclear to the AP how the numbers were obtained, although documents indicate they were done so illicitly from a key source inside the country's state-run provider. Project organizers used those numbers to start a subscriber base.ZunZuneo's organizers wanted the social network to grow slowly to avoid detection by the Cuban government. Eventually, documents and interviews reveal, they hoped the network would reach critical mass so that dissidents could organize "smart mobs" — mass gatherings called at a moment's notice — that could trigger political demonstrations, or "renegotiate the balance of power between the state and society."At a 2011 speech at George Washington University, Clinton said the U.S. helps people in "oppressive Internet environments get around filters." Noting Tunisia's role in the Arab Spring, she said people used technology to help "fuel a movement that led to revolutionary change."Suzanne Hall, then a State Department official working on Clinton's social media efforts, helped spearhead an attempt to get Twitter founder Jack Dorsey to take over the ZunZuneo project, documents indicate. Dorsey declined to comment.
  • The estimated $1.6 million spent on ZunZuneo was publicly earmarked for an unspecified project in Pakistan, public government data show, but those documents don't reveal where the funds were actually spent.ZunZuneo's organizers worked hard to create a network that looked like a legitimate business, including the creation of a companion website — and marketing campaign — so users could subscribe and send their own text messages to groups of their choice."Mock ad banners will give it the appearance of a commercial enterprise," one written proposal obtained by the AP said. Behind the scenes, ZunZuneo's computers were also storing and analyzing subscribers' messages and other demographic information, including gender, age, "receptiveness" and "political tendencies." USAID believed the demographics on dissent could help it target its other Cuba programs and "maximize our possibilities to extend our reach."
  • Executives set up a corporation in Spain and an operating company in the Cayman Islands — a well-known British offshore tax haven — to pay the company's bills so the "money trail will not trace back to America," a strategy memo said. Disclosure of that connection would have been a catastrophic blow, they concluded, because it would undermine the service's credibility with subscribers and get it shut down by the Cuban government.Similarly, subscribers' messages were funneled through two other countries — and never through American-based computer servers.Denver-based Mobile Accord considered at least a dozen candidates to head the European front company. One candidate, Francoise de Valera, told the AP she was told nothing about Cuba or U.S. involvement.
  • James Eberhard, Mobile Accord's CEO and a key player in the project's development, declined to comment. Creative Associates referred questions to USAID.For more than two years, ZunZuneo grew, reaching at least 40,000 subscribers. But documents reveal the team found evidence Cuban officials tried to trace the text messages and break into the ZunZuneo system. USAID told the AP that ZunZuneo stopped in September 2012 when a government grant ended.
  •  
    More coming related to this story.
Paul Merrell

How Government and the Media Equate Political Dissent with "Conspiracy Theories" and "H... - 0 views

  • In this age of propaganda and disinformation when mainstream media outlets act as presstitutes for the corporatized federal government, there has been an overt movement in recent years to label dissenters, patriots, government critics and even returning US soldiers from the warfronts as potential homegrown terrorists. For decades the government and co-opted mainstream media’s onetime favorite tactic heavy-handedly used to customarily dismiss their critics was to simply label those exposing government deception as “conspiracy theorists.” However, with distrust mounting amongst Americans toward both their leaders (86% distrust government) and the media (over 60% little or no trust toward media), this strategy is no longer working because so many conspiracies have been proven to be real. With a fascist state worried that its authority is fast slipping away amongst its populace, today the stakes have never been higher. Slander, character assassination and guilt by association are increasingly utilized nowadays as favorite tools to systematically destroy, discredit and demonize those citizens courageous enough to speak the truth exposing government lies, deception, theft and destruction.
  • Raising the stakes from the relative benign label “conspiracy theorist” to “homegrown terrorist” reflects a parallel process the US government has historically employed in manufacturing convenient enemies as needed – Russia and China’s expanding Communism from the 1950’s cold war through the 1980’s, to al Qaeda’s expanding terrorism in the twenty-first century and now back to Russia and China’s expanding imperialism all over again. The vicious cycle locked by design in a forever do-loop as the same subversive strategy remains unchanged throughout the years, only the names and dates change as the government self-servingly sees fit. As long as there are enemy targets to conveniently blame designed to induce fear and elicit support from a dumbed down, brainwashed and powerless American public, war and the military security complex will continue to flourish on a perpetual permanency basis, of course at the expense of humanity both domestically and globally.
Paul Merrell

Keith Alexander Unplugged: on Bush/Obama, 1.7 million stolen documents and other matter... - 0 views

  • The just-retired long-time NSA chief, Gen. Keith Alexander, recently traveled to Australia to give a remarkably long and wide-ranging interview with an extremely sycophantic “interviewer” with The Australian Financial Review. The resulting 17,000-word transcript and accompanying article form a model of uncritical stenography journalism, but Alexander clearly chose to do this because he is angry, resentful, and feeling unfairly treated, and the result is a pile of quotes that are worth examining, only a few of which are noted below:
  • How Edward Snowden managed to steal an alleged 1.7 million documents from the NSA. Sunday: http://t.co/gbrIu5yMcc — 60 Minutes (@60Minutes) December 13, 2013 Mike McConnell, the vice chairman of Booz Allen and former Director of National Intelligence in the Bush administration, then claimed that ”Snowden absconded with 1.7 million to 1.8 million documents.” Ever since then, that Snowden “stole” 1.7 or 1.8 million documents from the NSA has been repeated over and over again by US media outlets as verified fact. The Washington Post‘s Walter Pincus, citing an anonymous official source, purported to tell readers that “among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports”. Reuters frequently includes in its reports the unchallenged assertion that “Snowden was believed to have taken 1.7 million computerized documents.” Just this week, the global news agency told its readers that “Snowden was believed to have taken 1.7 million computerized documents.”
  • AFR: Can you now quantify the number of documents [Snowden] stole? Gen. Alexander: Well, I don’t think anybody really knows what he actually took with him, because the way he did it, we don’t have an accurate way of counting. What we do have an accurate way of counting is what he touched, what he may have downloaded, and that was more than a million documents. It’s hard to recall a better and clearer example of how mindless and uncritical the American media is when it comes to the unproven pronouncements of the U.S. Government. Back in December, 60 Minutes broadcast a now-notorious segment of pure access journalism in which they gullibly disseminated one false NSA claim after the next in exchange for being given exclusive(!) access to a few Secret and Exciting Rooms inside the agency’s headquarters. The program claimed that Snowden “is believed to still have access to 1.5 million classified documents he has not leaked”. On its Twitter account, 60 Minutes made this claim to promote its show:
  • ...2 more annotations...
  • In fact, that number is and always has been a pure fabrication, as even Keith Alexander admits. The claimed number has changed more times than one can count: always magically morphing into randomly chosen higher and scarier numbers. The reality, in the words of the General, is that the US Government ”really [doesn't] know[] what he actually took with him” and they ”don’t have an accurate way of counting”. All they know is how many documents he accessed in his entire career at NSA, which is a radically different question from how many documents he took. But that hasn’t stopped American media outlets from repeatedly affirming the inflammatory evidence-free claim that Snowden took 1.7 million documents. As usual, even the most blatantly unreliable claims from National Security State officials are treated as infallible papal pronouncements by our Adversarial Watchdog Press. There’s an equally vital point made by Alexander’s admission. The primary defense of the NSA and its defenders is that one need not worry about the staggering sums of data they collect because they have implemented very rigorous oversight mechanisms and controls that prevent abuse. Yet Edward Snowden spent months downloading a large amount of highly sensitive documents right under their noses. And not only did they have no idea that he was doing it, but now – even after spending large sums of money to find out – they are still completely incapable of learning which documents he took or even how many he took. Does that at all sound like a well-managed, tightly controlled system that you can trust to safeguard your most personal data and to detect and prevent abuse of this system by the tens of thousands of people who have access to it?
  • The release date for my book on the NSA, privacy, and our reporting of the surveillance story, No Place to Hide, is next Tuesday, May 13, at which time all of the previously unpublished NSA documents that are reported on in the book will be placed online, with free access, at the book’s website.
Paul Merrell

As Europe erupts over US spying, NSA chief says government must stop media | Glenn Gree... - 0 views

  • is there any doubt at all that the US government repeatedly tried to mislead the world when insisting that this system of suspicionless surveillance was motivated by an attempt to protect Americans from The Terrorists™? Our reporting has revealed spying on conferences designed to negotiate economic agreements, the Organization of American States, oil companies, ministries that oversee mines and energy resources, the democratically elected leaders of allied states, and entire populations in those states.Can even President Obama and his most devoted loyalists continue to maintain, with a straight face, that this is all about Terrorism? That is what this superb new Foreign Affairs essay by Henry Farrell and Martha Finnemore means when it argues that the Manning and Snowden leaks are putting an end to the ability of the US to use hypocrisy as a key weapon in its soft power.Speaking of an inability to maintain claims with a straight face, how are American and British officials, in light of their conduct in all of this, going to maintain the pretense that they are defenders of press freedoms and are in a position to lecture and condemn others for violations? In what might be the most explicit hostility to such freedoms yet – as well as the most unmistakable evidence of rampant panic – the NSA's director, General Keith Alexander, actually demanded Thursday that the reporting being done by newspapers around the world on this secret surveillance system be halted (Techdirt has the full video here):
  • The head of the embattled National Security Agency, Gen Keith Alexander, is accusing journalists of "selling" his agency's documents and is calling for an end to the steady stream of public disclosures of secrets snatched by former contractor Edward Snowden."I think it's wrong that that newspaper reporters have all these documents, the 50,000 – whatever they have and are selling them and giving them out as if these – you know it just doesn't make sense," Alexander said in an interview with the Defense Department's "Armed With Science" blog."We ought to come up with a way of stopping it. I don't know how to do that. That's more of the courts and the policy-makers but, from my perspective, it's wrong to allow this to go on," the NSA director declared. [My italics]There are 25,000 employees of the NSA (and many tens of thousands more who work for private contracts assigned to the agency). Maybe one of them can tell The General about this thing called "the first amendment".I'd love to know what ways, specifically, General Alexander has in mind for empowering the US government to "come up with a way of stopping" the journalism on this story. Whatever ways those might be, they are deeply hostile to the US constitution – obviously. What kind of person wants the government to forcibly shut down reporting by the press?Whatever kind of person that is, he is not someone to be trusted in instituting and developing a massive bulk-spying system that operates in the dark. For that matter, nobody is.
  •  
    Alexander's call for censorship starts at about 21:00 of the video at http://www.politico.com/blogs/under-the-radar/2013/10/nsa-chief-stop-reporters-selling-spy-documents-175896.html Dear General Alexander: "... we cannot defend freedom abroad by deserting it at home." E- Edward R. Murrow, See It Now (9 March 1954), http://tinyurl.com/kzlpm4a
Gary Edwards

Nate Jackson: Does Seeking to Jail Political Opponents Count as a 'Smidgen of Corruptio... - 0 views

  • And they wonder why people don’t trust the NSA’s mass metadata collection. The conversations that began at least in 2010 continued for three years. In fact, two days before Lerner “apologized” and outed the whole conspiracy, she wrote an email to the acting IRS commissioner’s chief of staff detailing ongoing discussions with DOJ officials. “These new documents show that the Obama IRS scandal is also an Obama DOJ and FBI scandal,” said Judicial Watch President Tom Fitton. “The FBI and Justice Department worked with Lois Lerner and the IRS to concoct some reason to put President Obama’s opponents in jail before his reelection. And this abuse resulted in the FBI’s illegally obtaining confidential taxpayer information. How can the Justice Department and FBI investigate the very scandal in which they are implicated?”
  • The answer to that last, albeit rhetorical, question is that they can’t and they aren’t. Any “investigation” by the DOJ or FBI will no doubt exonerate anyone of importance in the Obama administration. If any guilt is unavoidable, it will be hung around the necks of those rascals in Cincinnati or some other unfortunate scapegoat. All while Lerner continues to enjoy her comfortable retirement, and Obama himself remains untouched. On top of the serious breach of law and abuse of power in targeting Obama’s political opponents, the agencies' carefully crafted stonewall blocked the timely release of information. As with Hillary Clinton’s emails and the Benghazi cover-up, the slow bleed of information leaves the public tired of hearing “old news” and makes it all the more certain the perpetrators won’t face real accountability, much less justice.
  • Finally, we’re reminded of a commencement speech Obama delivered in 2009 at Arizona State University, after university officials declined to give Obama an honorary doctorate. Obama “joked” that “[university president Michael] Crowe and the Board of Regents will soon learn all about being audited by the IRS.” Clearly, that wasn’t much of a joke.
  •  
    "There was "not even a smidgen of corruption" at the IRS, Barack Obama told us in February 2014, though he conceded "there were some bone-headed decisions." That was a bald-faced lie at the time, and new information only reinforces that conclusion. While the mainstream media turns a blind eye and deaf ear, Judicial Watch has continued digging for information regarding IRS targeting of Tea Party and Patriot groups leading up to (and almost surely aiding in) Obama's re-election in 2012. And they discovered some serious collusion that sounds more like something out of Soviet Russia or Red China than here in the U.S. "Judicial Watch … released new Department of Justice (DOJ) and Internal Revenue Service (IRS) documents that include an official 'DOJ Recap' report detailing an October 2010 meeting between Lois Lerner, DOJ officials and the FBI to plan for the possible criminal prosecution of targeted nonprofit organizations for alleged illegal political activity." In other words, imprisoning political opponents. Remember when the IRS initially blamed the whole fiasco on a couple of low-level employees in Cincinnati? Good times. The documents reveal numerous conversations between the three agencies, including Lois Lerner, about creative ways to charge and jail conservatives for the "crime" of political activity opposing Obama. To do so, the DOJ and FBI needed to illegally obtain taxpayer information from the IRS. So the IRS sent the FBI more than one million pages of taxpayer information on 113,000 non-profit groups."
Paul Merrell

Judicial Watch: Benghazi Documents Point to White House on Misleading Talking Points - ... - 0 views

  • Judicial Watch announced today that on April 18, 2014, it obtained 41 new Benghazi-related State Department documents. They include a newly declassified email showing then-White House Deputy Strategic Communications Adviser Ben Rhodes and other Obama administration public relations officials attempting to orchestrate a campaign to “reinforce” President Obama and to portray the Benghazi consulate terrorist attack as being “rooted in an Internet video, and not a failure of policy.”  Other documents show that State Department officials initially described the incident as an “attack” and a possible kidnap attempt. The documents were released Friday as result of a June 21, 2013, Freedom of Information Act (FOIA) lawsuit filed against the Department of State (Judicial Watch v. U.S. Department of State (No. 1:13-cv-00951)) to gain access to documents about the controversial talking points used by then-UN Ambassador Susan Rice for a series of appearances on television Sunday news programs on September 16, 2012.  Judicial Watch had been seeking these documents since October 18, 2012. The Rhodes email was sent on sent on Friday, September 14, 2012, at 8:09 p.m. with the subject line:  “RE: PREP CALL with Susan, Saturday at 4:00 pm ET.”  The documents show that the “prep” was for Amb. Rice’s Sunday news show appearances to discuss the Benghazi attack.
  • The document lists as a “Goal”: “To underscore that these protests are rooted in and Internet video, and not a broader failure or policy.” Rhodes returns to the “Internet video” scenario later in the email, the first point in a section labeled “Top-lines”: [W]e’ve made our views on this video crystal clear. The United States government had nothing to do with it. We reject its message and its contents. We find it disgusting and reprehensible. But there is absolutely no justification at all for responding to this movie with violence. And we are working to make sure that people around the globe hear that message. Among the top administration PR personnel who received the Rhodes memo were White House Press Secretary Jay Carney, Deputy Press Secretary Joshua Earnest, then-White House Communications Director Dan Pfeiffer, then-White House Deputy Communications Director Jennifer Palmieri, then-National Security Council Director of Communications Erin Pelton, Special Assistant to the Press Secretary Howli Ledbetter, and then-White House Senior Advisor and political strategist David Plouffe. The Rhodes communications strategy email also instructs recipients to portray Obama as “steady and statesmanlike” throughout the crisis. Another of the “Goals” of the PR offensive, Rhodes says, is “[T]o reinforce the President and Administration’s strength and steadiness in dealing with difficult challenges.” He later includes as a PR “Top-line” talking point: I think that people have come to trust that President Obama provides leadership that is steady and statesmanlike. There are always going to be challenges that emerge around the world, and time and again, he has shown that we can meet them.
  • The documents Judicial Watch obtained also include a September 12, 2012, email from former Deputy Spokesman at U.S. Mission to the United Nations Payton Knopf to Susan Rice, noting that at a press briefing earlier that day, State Department spokesperson Victoria Nuland explicitly stated that the attack on the consulate had been well planned.  The email sent by Knopf to Rice at 5:42 pm said: Responding to a question about whether it was an organized terror attack, Toria said that she couldn’t speak to the identity of the perpetrators but that it was clearly a complex attack. In the days following the Knopf email, Rice appeared on ABC, CBS, NBC, Fox News and CNN still claiming the assaults occurred “spontaneously” in response to the “hateful video.” On Sunday, September 16 Rice told CBS’s “Face the Nation:” But based on the best information we have to date, what our assessment is as of the present is in fact what began spontaneously in Benghazi as a reaction to what had transpired some hours earlier in Cairo where, of course, as you know, there was a violent protest outside of our embassy–sparked by this hateful video. The Judicial Watch documents confirm that CIA talking points, that were prepared for Congress and may have been used by Rice on “Face the Nation” and four additional Sunday talk shows on September 16, had been heavily edited by then-CIA deputy director Mike Morell. According to one email: The first draft apparently seemed unsuitable….because they seemed to encourage the reader to infer incorrectly that the CIA had warned about a specific attack on our embassy.  On the SVTS, Morell noted that these points were not good and he had taken a heavy hand to editing them. He noted that he would be happy to work with [then deputy chief of staff to Hillary Clinton]] Jake Sullivan and Rhodes to develop appropriate talking points.
  • ...2 more annotations...
  • The documents obtained by Judicial Watch also contain numerous emails sent during the assault on the Benghazi diplomatic facility.  The contemporaneous and dramatic emails describe the assault as an “attack”:
  • “Now we know the Obama White House’s chief concern about the Benghazi attack was making sure that President Obama looked good,” said Judicial Watch President Tom Fitton. “And these documents undermine the Obama administration’s narrative that it thought the Benghazi attack had something to do with protests or an Internet video.  Given the explosive material in these documents, it is no surprise that we had to go to federal court to pry them loose from the Obama State Department.”
  •  
    Has there ever been a White House caught in so many lies as the Obama Administration? Maybe, in Nixon's Watergate years. But IMHO it would take a detailed study to determine the winner. It's close. 
Gary Edwards

Who Gave Warren Buffett The Authority To Discuss Billionaire Guilt? - 1 views

  • Stop coddling the super-rich he says.
    • Gary Edwards
       
      Disclosure here:  I actually met Buffett back in the 70's while workign at the Millyard Restaurant in Manchester NH.  Buffett purchased the old Amoskeag Mills "Berkshire Hathaway" shirt manufacturing building just across the Merrimack River.  Nice guy, very friendly, polite and considerate.  Of course, that was years before he made it big investing in the worldwide, McDonald's led USA franchise explosion of the late 80"s.  For sure he made a great call predicting that President Reagan would succeed in ending the Cold War, collapsing the walls, and unleashing the capitalist forces of both free and merchantilist trade.  And that the USA Franchise system was extremely well prepared to launch worldwide as soon as the barriers fell.  He made billions off this call.  Knowing Paul Volker does pay off.
  •  
    What is it with billionaires these days? Buffett suggesting we need to tax him more? Stop coddling the super-rich he says.  In other words, he's saying "I've done such a fine job with my money, now I want to give more to a government that hasn't."  Mr. Buffett, has someone changed your suppositions? It seems counter intuitive to your "invest in great management" philosophy.  Shouldn't you really be telling the government to cut costs? Just like you demanded of your Netjets, Clayton Homes, and Helzberg Diamond Shops executives.
« First ‹ Previous 81 - 100 of 117 Next ›
Showing 20 items per page