Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged purpose

Rss Feed Group items tagged

Paul Merrell

A Zombie Bill Comes Back to Life: A Look at The Senate's Cybersecurity Information Shar... - 0 views

  • The Senate Intelligence Committee recently introduced the Cybersecurity Information Sharing Act of 2014. It’s the fourth time in four years that Congress has tried to pass "cybersecurity" legislation. Unfortunately, the newest Senate bill is one of the worst yet. Cybersecurity bills aim to facilitate information sharing between companies and the government, but they always seem to come with broad immunity clauses for companies, vague definitions, and aggressive spying powers. Given such calculated violence to users' privacy rights, it’s no surprise that these bills fail every year. What is a surprise is that the bills keep coming back from the dead. Last year, President Obama signed Executive Order 13636 (EO 13636) directing the Department of Homeland Security (DHS) to expand current information sharing programs that are far more privacy protective than anything seen in recent cybersecurity bills. Despite this, members of Congress like Rep. Mike Rogers and Senator Dianne Feinstein keep on introducing bills that would destroy these privacy protections and grant new spying powers to companies.
  • Aside from its redundancy, the Senate's bill grants two new authorities to companies. First, the bill authorizes companies to launch countermeasures for a "cybersecurity purpose" against a "cybersecurity threat." "Cybersecurity purpose" is so broadly defined that it means almost anything related to protecting (including physically protecting) an information system, which can be a computer or software. The same goes for a "cybersecurity threat," which includes anything that "may result" in an unauthorized effort to impact the availability of the information system. Combined, the two definitions could be read by companies to permit attacks on machines that unwittingly contribute to network congestion. The countermeasures clause will increasingly militarize the Internet—a prospect that may appeal to some "active defense" (aka offensive) cybersecurity companies, but does not favor the everyday user. Second, the bill adds a new authority for companies to monitor information systems to protect an entity's rights or property. Here again, the broad definitions could be used in conjunction with the monitoring clause to spy on users engaged in potentially innocuous activity. Once collected, companies can then share the information, which is also called “cyber threat indicators,” freely with government agencies like the NSA.
  • Such sharing will occur because under this bill, DHS would no longer be the lead agency making decisions about the cybersecurity information received, retained, or shared to companies or within the government. Its new role in the bill mandates DHS send information to agencies like the NSA—"in real-time and simultaneous[ly]." DHS is even barred from "delay[ing]" or "interfer[ing]" with the information, which ensures that DHS's current privacy protections won’t be applied to the information. The provision is ripe for improper and over-expansive information sharing. This leads to a question: What stops your sensitive personal information from being shared by companies to the government? Almost nothing. Companies must only remove personally identifiable information if the information is known to be US person information and not directly related to the threat. Such a willful blindness approach is inappropriate. Further, the bill does not even impose this weak minimization requirement on information shared by, and within, the government (including federal, state, local, and tribal governments) thereby allowing the government to share information containing personally identifiable information. The bill should require deletion of all information not directly related to a threat.
  • ...2 more annotations...
  • Once the information is sent to a government agency, it can use the information for reasons other than for cybersecurity purposes. One clause even allows the information to be used to prosecute violations of the Espionage Act—a World War I era law that was meant to prosecute spies but has been used in recent years primarily to go after journalists’ sources. The provisions grant the government far too much leeway in how to use the information for non-cybersecurity purposes. The public won’t even know what information is being collected, shared, or used because the bill will exempt all of it from disclosure under the Freedom of Information Act.
  • The bill also retains near-blanket immunity for companies to monitor information systems, to share information, and to use countermeasures. The high bar immunizes an incredible amount of activity, including negligent damage to property and may deprive private entities of legal recourse if a computer security contractor is at fault for destruction of property. Existing private rights of action for violations of the Wiretap Act, Stored Communications Act, and the Computer Fraud and Abuse Act would be precluded or at least sharply restricted by the clause. It remains to be seen why such immunity is needed when just a few months ago, the FTC and DOJ noted they would not prosecute companies for sharing such information. It's also unclear because we continue to see companies freely share information among each other and with the government both publicly via published reports and privately.
Gary Edwards

The Daily Bell - Richard Ebeling on Higher Interest Rates, Collectivism and the Coming ... - 0 views

  • The "larger dysfunction," as you express it, arises out of a number of factors. The primary one, in my view, is a philosophical and psychological schizophrenia among the American people.
  • While many on "the left" ridicule the idea, there is a strong case for the idea of "American exceptionalism," meaning that the United States stands out as something unique, different and special among the nations of the world.
  • the American Founding Fathers constructed a political system in the United States based on a concept on which no other country was consciously founded:
  • ...95 more annotations...
  • But the American Revolution and the US Constitution hailed a different conception of man, society and government.
  • n the rest of the world, and for all of human history, the presumption has been that the individual was a slave or a subject to a higher authority. It might be the tribal chief; or the "divinely ordained" monarch who presumed to rule over and control people in the name of God; or, especially after the French Revolution and the rise of modern socialism, "the nation" or "the people" who laid claim to the life and work of the individual.
  • the idea of individual rights.
  • That is, as long as the individual did not violate the equal rights of others to their life, liberty and property, each person was free to shape and guide his own future, and give meaning and value to his own life as he considered best in the pursuit of that happiness that was considered the purpose and goal of each man during his sojourn on this Earth.
  • Governments did not exist to give or bestow "rights" or "privileges" at its own discretion.
  • Governments were to secure and protect each individual's rights, which he possessed by "the nature of things."
  • The individual was presumed to own himself. He was "sovereign."
  • The real and fundamental notion of "self-government" referred to the right of each individual to rule over himself.
  • Each individual, by his nature and his reason, had a right to his life, his liberty and his honestly acquired property.
  • during the first 150 years of America's history there was virtually no Welfare State and relatively few government regulations, controls and restrictions on the choices and actions of the free citizen.
  • But for more than a century, now, an opposing conception of man, society and government has increasingly gained a hold over the ideas and attitudes of people in the US.
  • It was "imported" from Europe in the form of modern collectivism.
  • The individual was expected to see himself as belonging to something "greater" than himself. He was to sacrifice for "great national causes."
  • He was told that if life had not provided all that he desired or hoped for, it was because others had "exploited" him in some economic or social manner, and that government would redress the "injustice" through redistribution of wealth or regulation of the marketplace.
  • If he had had financial and material success, the individual should feel guilty and embarrassed by it, because, surely, if some had noticeably more, it could only be because others had been forced to live with noticeably less.
  • left on its own, free competition tends to evolve into harmful monopolies and oligopolies, with the wealthy "few" benefiting at the expense of the "many."
  • They are the crises of the Interventionist-Welfare State: the attempt to impose reactionary collectivist policies of political paternalism and redistributive plunder on a society still possessing parts of its original individualist and rights-based roots.
  • it is in the form of communism's and socialism's critique of capitalism.
  • Unregulated capitalism leads to "unearned" and "excessive" profits; unbridled markets generate the business cycle and the hardships of recessions and depressions;
  • These two conflicting conceptions of man, society and government have been and are at war here in the United States.
  • And if it cannot be gotten and guaranteed through the redistributive mechanisms of the European Union and the euro, well, maybe we should return power to our own nation-states to provide the jobs, the social "safety nets" and the financial means to pay for it through, once again, printing our own national paper currencies.
  • This is the political-philosophical bankruptcy of the West and the dead ends of the collectivist promises of the last 100 years.
  • Ludwig von Mises's book, Socialism: An Economic and Sociological Analysis, originally published in 1922, demonstrated how and why a socialist, centrally planned system was inherently unworkable.
  • The nationalization of productive property, the abolition of markets and the prohibition of all competitive exchange among the members of society would prevent the emergence and operation of a price system, without which it is impossible to know people's demands for desired goods and the relative value they place on them.
  • It also prevents the emergence of prices for the factors of production (land, labor, capital) and makes it impossible to know their opportunity costs – the value of those factors of production in alternative competing uses among entrepreneurs desiring to employ them.
  • Without such a price system the central planners are flying blind, unable to rationally know or decide how best to utilize labor, capital and resources in productively efficient ways to make the goods and services most highly valued by the consuming public.
  • Thus, Mises concluded, comprehensive socialist central planning would lead to "planned chaos."
  • And, therefore, there is no guarantee that the amount of investments undertaken and their time horizons are compatible with the available resources not also being demanded and used for more immediate consumer goods production in the society.
  • As a consequence, financial markets do not work like real markets.
  • Thus, the interventionist state leads to waste, inefficiency and misuses of resources that lower the standards of living that we all, otherwise, could have enjoyed.
  • We cannot be sure what the amount of real savings may be in the society to support real and sustainable investment and capital formation.
  • Government intervention prevents prices from "telling the truth" about the real supply and demand conditions thus leading to imbalances and distortions in the market.
  • We cannot know what the "real cost" of borrowing should be, since interest rates are not determined by actual, private sector savings and investment decisions.
  • Government production regulations, controls, restrictions and prohibitions prevent entrepreneurs from using their knowledge, ability and capital in ways that most effectively produce the goods consumers actually want and at the most cost-competitive prices possible.
  • This is why countries around the world periodically experience booms and busts, inflations and recessions − not because of some inherent instabilities or "irrationalities" in financial markets, but because of monetary central planning through central banking that does not allow market-based financial intermediation to develop and work as it could and would in a real free-market setting.
  • But in the United States and especially in Europe, government "austerity" means merely temporarily reducing the rate of increase in government spending, slowing down the rate at which new debt is accumulating and significantly raising taxes in an attempt to close the deficit gap.
  • The fundamental problem is that over the decades, the size and scope of governments in the Western world have been growing far more than the rates at which their economies have been expanding, so that the "slice" of the national economic "pie" eaten by government has been growing larger and larger, even when the "pie" in absolute terms is bigger than it was, say, 30 or 40 years ago.
  • European governments, in general, take the view that "austerity" means squeezing the private sector more through taxes and other revenue sources to avoid any noticeable and significant cuts in what government does and spends.
  • So there is "austerity" for the private sector and a mad rush for financial "safety nets" for the government and those who live off the State.
  • In reality, of course, it is the burdens of government regulation, taxation and impediments to more flexible labor and related markets that have generated the high unemployment rates and the retarded recovery from the recession.
  • Instead, the "common market" ideal has been transformed into the goal of a European Union "Super-State" to which the individual countries and their citizens would be subservient and obedient.
  • Keynesian policies offer people and politicians what they want to hear. Claiming that any sluggish business or lost jobs are due to a lack of "aggregate demand," Keynes argued that full employment and profitable business could only be reestablished and maintained through "activist" government monetary and fiscal policy – print money and run budget deficits.
  • What Britain and Europe should have as its goal is the ideal of the classical liberal free traders of the 19th century – non-intervention by governments in people's lives, at home and abroad. That is, a de-politicization of society, so people may freely work, trade and travel as they peacefully wish, with government merely the protector of people's individual rights.
  • Take the benefits away and tell people they are free to come and work to support themselves and their families. Restore more flexibility and competitiveness to labor markets and reduce taxes and business regulations.
  • Then those who come to Britain's shores will be those wanting freedom and opportunity without being a burden upon others.
  • What was needed was a change in ideas from the statist mentality to one of individual freedom and unhampered free markets.
  • In an epoch of collectivist ideas, don't be surprised if governments regulate, control, intervene and redistribute wealth.
  • The tentacle of regulations, restrictions and politically-correct social controls are spreading out in every direction from Brussels and its European-wide manipulating and mismanaging bureaucracy.
  • In the name of assuring "national prosperity," politicians could spend money to buy the votes that get them elected and reelected to government offices.
  • And every special interest group could make the case that government-spending programs that benefitted them were all reasonable and necessary to assure a fully employed and growing economy.
  • Furthermore, the Keynesian rationale for government deficit spending enabled politicians to seem to be able to offer something for nothing. They could offer, say, $100 of government spending to voters and special interest groups but the tax burden imposed in the present might only be $75, since the remainder of the money to pay for that government spending was borrowed. And that borrowed money would not have to be repaid until some indefinite time in the future by unspecific taxpayers when that "tomorrow" finally arrived.
  • instability
  • Keynes argued that the market economy's inherent
  • arose from the
  • who were subject to irrational and unpredictable waves of "optimism" and "pessimism."
  • animal spirits" of businessmen
  • Mises argued that there was nothing inherent in the market economy to bring about these swings of economic booms followed by periods of depression and unemployment.
  • If markets got out of balance with the necessity of an eventual correction in the economy to, once again, set things right, the source of this instability was government monetary policy.
  • Central banks too often followed a policy of trying to create "good times" in the economy by expanding the money supply through the banking system.
  • With new, excess funds created by the central bank available for lending, banks lower rates of interest to attract borrowers.
  • But this throws savings and investment out of balance, since the rate of interest no longer serves as a reliable indicator and signal concerning the availability of real savings in the economy in relation to those wanting to borrow funds for various investment purposes.
  • The economic crisis comes when it is discovered that all the claims on resources, capital and labor for all the attempted consumption and investment activities in the economy are greater than the actual and available amounts of such scarce resources.
  • The recession period, in Mises's view, is the necessary "correction" period when in the post-boom era, people must adapt and adjust to the newly discovered "real" supply and demand conditions in the market.
  • Any interference with the "rebalancing" of the economy by government raising taxes, imposing more regulations, or new artificial government "stimulus" activities merely makes it more difficult and time-consuming for people in the private sector to get the economy back on an even keel.
  • Friedrich A. Hayek, once observed, unemployment is not "caused" by stopping an inflation, but rather inflation induces the artificial employments that cannot be sustained and which inevitably disappear once the inflation is reined in.
  • The recession of 2008-2009 was the result of several years of central bank stimulus.
  • From 2003 to 2008, the Federal Reserve increased the money supply by about 50 percent.
  • Interest rates for much of this time, when adjusted for inflation, were either zero or negative.
  • Awash in cash, banks extended loans to virtually anyone, with no serious and usual concern about the borrower's credit-worthiness.
  • This was most notably true in the housing market, where government agencies like Fannie May and Freddie Mac were pressuring banks to make mortgage loans by promising a guarantee that they would make good on any bad home loans.
  • Since 2008-2009, the Federal Reserve has, again, turned on the monetary spigot, increasing its own portfolio by almost $3 trillion, by buying US Treasuries, US mortgages and other assets.
  • So why has there not been a complementary explosion of price inflation?
  • In some areas there has been, most clearly in the stock market and the bond market, But the reason why all that newly created money has not brought about a higher price inflation is due to the fact that a large part of all newly created money is sitting as unlent reserves in banks.
  • This is because the Federal Reserve has been paying banks a rate of interest slightly above the market interest rates to induce banks not to lend.
  • (a) general "regime uncertainty," that is, no one knows what government policy will be tomorrow; will ObamaCare be fully implemented after January 2014?;
  • Among the reasons for the sluggish jobs growth in the US are:
  • (b) what will taxes be for the rest of the current president's term in the White House
  • (c) what will the regulatory environment be like for the next three years – in 2012, the government implemented around 80,000 pages of regulations as printed in the Federal Registry;
  • (d) how will the deficit and debt problems play out between Congress and the White House and will it threaten the general financial situation in the country; an
  • (e) what wars, if any, will the government find itself involved in, in places like the Middle East?
  • China
  • is still a controlled and commanded society, with a government that works hard to try to determine what people read, see and think.
  • All these building projects have been brought into existence by a government that not only controls the money supply and manipulates interest rates but also heavy-handedly tells banks whom to specifically loan to and for what investment activities.
  • Central planning is alive and well in China, with the motives being both power and profits for those inside and outside the Communist Party having the most influence and connections in "high" places.
  • In my opinion, China is heading for a great economic crisis, resulting from a highly imbalanced and distorted economic system still guided far more by politics than sound market decision-making.
  • global financial markets in any foreseeable future. It is a money that still primarily exists to serve the political purposes of those who sit in the "inner circles" of power in Beijing.
  • One hundred years ago, in 1913, how many could have predicted that a year later a European-wide war would break out that would lead to the destruction of great European empires and set the stage for the rise of totalitarian collectivism that resulted in an even worse global war two decades later?
  • Thus, whether, at the end of the day, freedom triumphs and the future is one of liberty and prosperity is partly on each one of us.
  • Near the end of his great book, Socialism, Ludwig von Mises said:
  • "Everyone carries a part of society on his shoulders; no one is relieved of his share of responsibility by others. And no one can find a safe way out for himself if society is sweeping towards destruction. Therefore, everyone, in his own interest, must thrust himself vigorously into the intellectual battle. None can stand aside with unconcern; the interests of everyone hang on the result. Whether he chooses or not, every man is drawn into the great historical struggle, the decisive battle into which our epoch has plunged us . . . Whether society shall continue to evolve or where it shall decay lies . . . in the hands of man."
  • In my view, the idea of a "soft landing" is an illusion based on the idea held by central bankers, themselves, that they have the wisdom and ability to know how to "micro-manage" the all the changes and adjustments resulting from their own manipulations of the monetary aggregates. They do not have this wisdom and ability. So hold on for what is most likely to be another rocky road.
  • It was Mises's clear vision that once society has broken the relationship between value and payment, sooner or later people would not know the price of anything.
  • At this point, investment ceases and business becomes furtive and transactional.
  • People cannot plan for the future because they do not understand the reality of the present.
  • Society begins to sink.
  •  
    Incredible.  A simple explanation that explains everything.  Rchard Ebeling's "Unified Theory of Everything" is something every American can understand.  If only they would take a break from "Dancing with the Stars" and pay attention to the future of their country and the world.  It's a future where either "individual freedom", as defined by our Constitution and Declaration of Independence, will win out; or, the forces of fascist socialism / marxism will continue to roll and rule.  Incredible read!!!!
Paul Merrell

Edward Snowden asks for asylum in Ecuador: live updates | World news | guardian.co.uk - 0 views

  • The NSA whistleblower left Hong Kong on an Aeroflot flight to Moscow, two days after the US charged him with espionage, before applying for asylum in Ecuador
  • WikiLeaks has released a statement claiming that Snowden is "bound for Ecuador" and is awaiting the processing of his application for asylum:  Mr Edward Snowden, the American whistleblower who exposed evidence of a global surveillance regime conducted by US and UK intelligence agencies, has left Hong Kong legally. He is bound for the Republic of Ecuador via a safe route for the purposes of asylum, and is being escorted by diplomats and legal advisors from WikiLeaks. Mr Snowden requested that WikiLeaks use its legal expertise and experience to secure his safety. Once Mr Snowden arrives in Ecuador his request will be formally processed. Former Spanish Judge Mr Baltasar Garzon, legal director of Wikileaks and lawyer for Julian Assange has made the following statement: "The WikiLeaks legal team and I are interested in preserving Mr Snowden’s rights and protecting him as a person. What is being done to Mr Snowden and to Mr Julian Assange - for making or facilitating disclosures in the public interest - is an assault against the people".
  • It’s past midnight in Hong Kong and late evening in Moscow, so time for a summary of the events so far on a day of extraordinary drama: • Edward Snowden, the NSA contractor whose revelations to the Guardian about the scale and scope of US spying and hacking activities has prompted global headlines, has fled Hong Kong and is now in Moscow. • His plane arrived in Russia shortly after 5pm local time. Snowden is not believed to have a Russian visa and is thought to be staying overnight at a capsule hotel inside Moscow's Sheremetyevo airport after reportedly being met on the tarmac by diplomatic cars.
  • ...2 more annotations...
  • • Snowden was allowed to leave despite the US having filed a request for Hong Kong to arrest him. Hong Kong’s government said the documents sent by Washington did not fully meet legal requirements, the statement added, so Snowden was allowed to leave. It has since been reported that the US revoked Snowden’s passport on Saturday. It is not clear how he was allowed to leave Hong Kong if this happened. • Snowden is reportedly booked on a flight on Monday from Moscow to Havana, after which he is believed to be heading for another Latin American destination, reported variously as Venezuela or Ecuador. • The Ecuadorean ambassador to Russia is at the airport but said he had not met Snowden and was not entirely sure where he is.  • WikiLeaks has claimed in tweets it "assisted Mr Snowden's political asylum in a democratic country" and that its "legal advisers" are with him, including Sarah Harrison, a WikiLeaks staffer.
  • • There has been an angry reaction in the US to news of Snowden’s departure. Keith Alexander, head of the NSA, called Snowden “an individual who is not acting, in my opinion, with noble intent". • Snowden's departure came on the same day the South China Morning Post carried detailed reports of claims from him about US actions against China, including allegations of the hacking of phone text messages. China has said it is “gravely concerned” about the revelations. The country’s Xinhua news agency called the US “the biggest villain in our age" when it comes to hacking.
  •  
    My favorite part so far, NSA head Gen. Keith Alexander called Snowden "an individual who is not acting, in my opinion, with noble intent". Let's consider for a moment that as a U.S. Army officer, Gen. Alexander, initially and upon each promotion, was required to "solemnly swear (or affirm) that I will support and defend the Constitution of the United States against all enemies, foreign and domestic, that I will bear true faith and allegiance to the same; that I take this obligation freely, without any mental reservations or purpose of evasion; and that I will well and faithfully discharge the duties of the office upon which I am about to enter; So help me God."  http://www.army.mil/values/officers.html So what part of "support and defend the Constitution of the United States" is it that he didn't catch? U.S. military officers are required by law to disobey illegal commands. Can this man seriously believe that his mission does not violate the U.S. Constitution?  The Fourth and Fifth Amendments were direct reactions to the British Army's practice of invading Colonist's homes at will. destroying their privacy and seizing anything in sight including its residents, their papers, their personal effects, and their property without judicial warrant or due process and just compensation. But that is just what Gen. Alexander assists in. He is a usurper of our Constitution. But let's compare the courage of Edward Snowden and Keith Alexander: "Common experience shows how much rarer is moral courage than physical bravery.  A thousand men will march to the mouth of the cannon where one man will dare espouse an unpopular cause." - Clarence Darrow   "Few are willing to brave the disapproval of their fellows, the censure of the colleagues, the wrath of their society. Moral courage is a rarer commodity than bravery in battle or great intelligence. Yet it is the one essential, vital quality for those who seek to change a world that yields most painfully to change." -
Gary Edwards

Chris Hedges: The Real Purpose of the U.S. Government's Report on Alleged Hacking by Ru... - 0 views

  •  
    "Some thoughts on "Russia's Influence Campaign Targeting the 2016 US Presidential Election," the newly released declassified report from the Office of the Director of National Intelligence. 1. The primary purpose of the declassified report, which offers no evidence to support its assertions that Russia hacked the U.S. presidential election campaign, is to discredit Donald Trump. I am not saying there was no Russian hack of John Podesta's emails. I am saying we have yet to see any tangible proof to back up the accusation. This charge-Sen. John McCain has likened the alleged effort by Russia to an act of war-is the first salvo in what will be a relentless campaign by the Republican and Democratic establishment, along with its corporatist allies and the mass media, to destroy the credibility of the president-elect and prepare the way for impeachment. The allegations in the report, amplified in breathtaking pronouncements by a compliant corporate media that operates in a non-fact-based universe every bit as pernicious as that inhabited by Trump, are designed to make Trump look like Vladimir Putin's useful idiot. An orchestrated and sustained campaign of innuendo and character assassination will be directed against Trump. When impeachment is finally proposed, Trump will have little public support and few allies and will have become a figure of open ridicule in the corporate media. 2. The second task of the report is to bolster the McCarthyist smear campaign against independent media, including Truthdig, as witting or unwitting agents of the Russian government. The demise of the English programming of Al-Jazeera and TeleSur, along with the collapse of the nation's public broadcasting, designed to give a voice to those not beholden to corporate or party interests, leaves RT America and Amy Goodman's Democracy Now! as the only two electronic outlets with a national reach that are willing to give a platform to critics of corporate power and imperialism s
Paul Merrell

M of A - "Dramatic Rescue! Man With Kid Runs Towards Camera!" - 44 Staged Pictures - 0 views

  • A man with a kid in arm runs towards the camera. The kid's face is heavily colored, but it looks otherwise fine. On the lower left we see the back of a man with a "White Helmets" logo on his vest. Dust in the background. Always dust or smoke. A bunch of men looking very busy but are they actually doing anything? That would be a lucky by-chance photo shot for any normal photographer. Even in country where rubble from a fresh bombing may be around some near corner. But this is a typical "White Helmets rescue kid" propaganda picture. The photo above is, except for maybe the old rubble, likely completely staged. There the 43 similar pictures below the fold to demonstrate that. Just ask yourself: Could all these very similar by-chance pics, taken within about a year, be real? Really?
  • The pictures above all look astonishingly similar: rubble, dust or rather haze from a smoke grenade in the background, dusted/greasepaint bloody kids who have no visible trauma, the rescuer with the kid moving towards the camera. Dramatic, high quality scenes which do get distributed by news agencies and published again and again by major "western" media. Isn't it an amazing fortune that so many kids get rescued alive by the "White Helmets", without any serious wounds visible, just moments after bomb impacts? This week after week? With all the same attributes in each picture? No photo editor at any of the big media ever wondered about that? These staged photos are part of the war propaganda against the Syrian people and their government. The "White Helmets" take and distribute these photos. They also distribute lots of "kids rescued from rubble" videos. We wrote about those a month ago: Other typical features of these movies, see this one, are smoke (grenades) in the streets, dramatic but small open fires nearby, dust or some red color on the children's face or arms. The camera is often used in a hectic, intentionally amateurish first person view, a style extensively developed in the 1999 horror clip Blair Witch Project. Sometimes sounds of additional "bomb impact" bangs or screaming/wailing women are added. The "White Helmets" are part of the (anti-)Syria Campaign. "Kid rescued from rubble" is their standard shtick. They are financed with some $60+ million from your taxes by the U.S., the UK and other governments. Such money will buy a lot of good cameras and props and will pay for many actors and extras.
  • The Syria Campaign was created by Purpose Campaigns LLC. The company fabricates and runs for you any world-wide "grass root" movement you would like. With Purpose LLC or other such companies involved, big dollars will buy you big effects. How about an automated Twitter campaign to spread anti-Shia sectarianism? Someone paid for it and here it is. The "White Helmets" campaign demonstrates the amazing manipulation potential such companies and their high paying customers have.
  •  
    A U.S.-U.K. propaganda front operating behind ISIL and al-Nusrah lines. See also: http://www.moonofalabama.org/2016/06/gallery-dramatic-rescue-man-with-kid-runs-towards-camera-43-staged-pictures.html#c6a00d8341c640e53ef01b8d1fb87c3970c amd https://www.youtube.com/watch?v=5k6hSS6xBTw&feature=youtu.be The U.S. State Department admits to providing $23 million to this group operating behind al-Nusrah and ISIL lines. 
Gary Edwards

Obama To Americans: You Don't Deserve To Be Free - Forbes - 1 views

  • President Obama’s Kansas speech is a remarkable document. In calling for more government controls, more taxation, more collectivism, he has two paragraphs that give the show away. Take a look at them. there is a certain crowd in Washington who, for the last few decades, have said, let’s respond to this economic challenge with the same old tune. “The market will take care of everything,” they tell us. If we just cut more regulations and cut more taxes–especially for the wealthy–our economy will grow stronger. Sure, they say, there will be winners and losers. But if the winners do really well, then jobs and prosperity will eventually trickle down to everybody else. And, they argue, even if prosperity doesn’t trickle down, well, that’s the price of liberty. Now, it’s a simple theory. And we have to admit, it’s one that speaks to our rugged individualism and our healthy skepticism of too much government. That’s in America’s DNA. And that theory fits well on a bumper sticker. (Laughter.) But here’s the problem: It doesn’t work. It has never worked. (Applause.) It didn’t work when it was tried in the decade before the Great Depression. It’s not what led to the incredible postwar booms of the ’50s and ’60s. And it didn’t work when we tried it during the last decade. (Applause.) I mean, understand, it’s not as if we haven’t tried this theory.
  • Though not in Washington, I’m in that “certain crowd” that has been saying for decades that the market will take care of everything. It’s not really a crowd, it’s a tiny group of radicals–radicals for capitalism, in Ayn Rand’s well-turned phrase. The only thing that the market doesn’t take care of is anti-market acts: acts that initiate physical force. That’s why we need government: to wield retaliatory force to defend individual rights. Radicals for capitalism would, as the Declaration of Independence says, use government only “to secure these rights”–the rights to life, liberty, property, and the pursuit of happiness. (Yes, I added “property” in there–property rights are inseparable from the other three.) That’s the political philosophy on which Obama is trying to hang the blame for the recent financial crisis and every other social ill. But ask yourself, are we few radical capitalists in charge? Have radical capitalists been in charge at any time in the last, oh, say 100 years?
  • I pick 100 years deliberately, because it was exactly 100 years ago that a gigantic anti-capitalist measure was put into effect: the Federal Reserve System. For 100 years, government, not the free market, has controlled money and banking. How’s that worked out? How’s the value of the dollar held up since 1913? Is it worth one-fiftieth of its value then or only one-one-hundredth? You be the judge. How did the dollar hold up over the 100 years before this government take-over of money and banking? It actually gained slightly in value.
  • ...5 more annotations...
  • Laissez-faire hasn’t existed since the Sherman Antitrust Act of 1890. That was the first of a plethora of government crimes against the free market.
  • The typical Republican would never, ever say “the market will take care of everything.” He’d say, “the market will take care of most things, and for the other things, we need the regulatory-welfare state.” They are for individualism–except when they are against it. They are against free markets and individualism not only when they agree with the Left that we must have antitrust laws and the Federal Reserve, but also when they demand immigration controls, government schools, regulatory agencies, Medicare, laws prohibiting abortion, Social Security, “public works” projects, the “social safety net,” laws against insider trading, banking regulation, and the whole system of fiat money.
  • Even you, dear reader, are probably wondering how on earth anyone could challenge things like Social Security, government schools, and the FDA. But that’s not the point. The point is: these statist, anti-capitalist programs exist and have existed for about a century. The point is: Obama is pretending that the Progressive PGR -2.02% Era, the New Deal, and the Great Society were repealed, so that he can blame the financial crisis on capitalism. He’s pretending that George Bush was George Washington.
  • What Obama is indeed responsible for is the injustice of robbing some to (allegedly) benefit others. To the extent that cronyism, not the free market, sets income, that is an injustice to be laid at the statists’ door.
  • There is no such problem as “unemployment” under capitalism. Prices fall to clear the market. Twice the work force could be employed if average wages dropped in half. But that’s nominal wages; with a constant money supply, prices would also fall in half–or slightly more than that. This isn’t just theory. America’s workforce has grown steadily decade after decade, yet the standard of living has risen at the same time. I grant you that the rise has slowed as statist intervention has grown. Think of the phenomenal progress between, say 1900 and 1920 as compared to the minor progress from 1993 to 2013. Most of the progress in the last 20 years has come in the freest area of the economy: electronics and computing.
  •  
    Harry Binswanger defends laissez-faire capitalism, using Ayn Rand Objectivism.
  •  
    The major problem with Ayn Rand Objectivism is that it's an "ism." The Utopian ideal it is based on has never existed in reality and likely never will; its principles have never been tested. Moreover, I will argue that Binswanger is incorrect in arguing that the anti-capitalist phenomenon in America began with creation of the Federal Reserve; it dates much farther back. The economic basis for the Revolutionary War was largely the Crown-granted monopolies granted to the first great British "companies" (corporations), which had the effect of forcing North American colonists to pay monopoly rents for common goods and kept American ship owners from importing those goods from elsewhere to sell at a lower price. The Founding Fathers were strongly against privately-owned corporations and government-granted monopolies, with only two exceptions, copyrights for literary works and patents for inventions. The Constitution's prohibition against government-granted monopolies is implicit in its allowance for only two narrowly-defined types. The Founding Fathers' writings explicitly discussed the difference between "natural" monopolies and those created by government or anti-competitive conduct. During the early years of the nation corporations were permitted by the States, but only for public purposes, usually for public works such as bridges or roads for which there was a need to amass capital. These early American corporations were usually chartered only for the time required to complete the public work and to recover the invesment and a small profit, e.g., from tolls for using a bridge or road. Many of the early state constitutions explicitly limited the lifetime of corporations. However, such early opposition to corporations gradually eroded; corporate purposes were expanded, corporations were granted perpetual life, and the corporate form of doing business became much more widespread. Here, it is important to recognize that corporations are market artificialities c
Paul Merrell

Feinstein promotes bill to strengthen NSA's hand on warrantless searches | World news |... - 0 views

  • A Senate bill promoted as a surveillance reform would codify the ability of the National Security Agency to search its troves of foreign phone and email communications for Americans’ information, and permit law enforcement agencies to search the vast databases as well. The Fisa Improvements Act, promoted by Dianne Feinstein, the California Democrat who chairs the Senate intelligence committee, would both make permanent a loophole permitting the NSA to search for Americans’ identifying information without a warrant – and, civil libertarians fear, contains an ambiguity that might allow the FBI, the DEA and other law enforcement agencies to do the same thing. “For the first time, the statute would explicitly allow the government to proactively search through the NSA data troves of information without a warrant,” said Michelle Richardson, the surveillance lobbyist for the ACLU.
  • “It may also expand current practices by allowing law enforcement to directly access US person information that was nominally collected for foreign intelligence purposes. This fourth amendment back door needs to be closed, not written into stone.” Feinstein’s bill passed the committee on an 11 to 4 vote on 31 October. An expanded report on its provisions released by the committee this week added details about the ability of both intelligence and law enforcement to sift through foreign communications databases that it accumulates under section 702 of the Fisa Amendments Act of 2008. Section 6 of Feinstein’s bill blesses what her committee colleague Ron Wyden, the Oregon Democrat and civil libertarian, has called the “backdoor search provision,” which the Guardian revealed thanks to a leak by Edward Snowden.  The section permits intelligence agencies to search “the contents of communications” collected primarily overseas for identifying information on US citizens, resident aliens and people inside the US, provided that the “purpose of the query is to obtain foreign intelligence information or information necessary to understand foreign intelligence information or to assess its importance.”
  • Section 6 bills itself as a “restriction,” but it would not stop the NSA from performing the warrantless search, merely requiring intelligence agencies to log their queries and make them “available for review” to Congress, the Fisa court, the Justice Department and inspectors general inside the executive branch. Additionally, the report on Section 6 explicitly states that the provision “does not limit the authority of law enforcement agencies to conduct queries of data acquired pursuant to Section 702 of Fisa for law enforcement purposes.” There is ambiguity surrounding whether the FBI can currently search through the NSA’s foreign communications databases, or is reliant on the NSA to pass on information from the databases relevant to the bureau. A declassified Fisa court document from 2011 refers to “FBI minimization procedures,” but it is unclear what those procedures are. A copy of the FBI minimization procedures from 2009, acquired by the ACLU under the Freedom of Information Act is almost completely redacted. So is the section in the government’s most recent report on its Section 702 collection dealing with the FBI’s role, though it contains references to how the FBI “receive[s] … unminimized Section 70 acquired communications” from the NSA. 
  • ...1 more annotation...
  • Feinstein’s bill “seems to imply there is currently some authority for law enforcement to query the database, which [intelligence community] officials have not mentioned in any of their remarks on Section 702,” said Alan Butler, an attorney with the Electronic Privacy Information Center. The provision is also unclear about whether law enforcement agencies can search through the foreign communications databases for information on US persons. Feinstein’s office did not respond to a request for clarification by deadline. The ambiguity concerns civil libertarians, as it opens a door for law enforcement agencies to sidestep warrant requirements. “If Senator Feinstein or other congressional supporters of this bill believe that it would in fact expand law enforcement access to the database, that would be an unjustified expansion of surveillance over Americans,” Butler said.
Paul Merrell

The U.S. Has REPEATEDLY Defaulted | Washington's Blog - 2 views

  • It’s a Myth that the U.S. Has Never Defaulted On Its Debt Some people argue that countries can’t default.  But that’s false. It is widely stated that the U.S. government has never defaulted.  However, that is also a myth.
  •  
    Excellent article Paul! But it left me in tears. The bastardos are destroying the currency. Quick Count of The U.S. defaulting on its debt obligations: ... Continental Currency in 1779 ... Domestic debt between 1782 through 1790 ... Greenbacks in 1862 ... Liberty Bonds in 1934 ... 1933 Dollar to GOLD devaluation (1/35 th per ounce) ... 1971 Nixon ends GOLD backing of dollar, violating the terms of the Bretton Woods Agreement ... 1979 Treasury defaults, refusing to redeem maturing treasury bonds The only thing keeping the American Economy going is the massive rush to convert the fiat currency the Federal Reserve is churning out into hard assets; like land and corporate stock. In 2008 the Federal Reserve Bankster Cartel pumped $29 Trillion into the world banking system. They continue to pump $85 Billion per month into Bankster financial markets, buying up bad mortgage paper and backstopping the many insured derivatives scams now unwinding. The Banksters were bust in 2008, but are now flush with more dollars than anyone knows what to do with. Instead of "loaning" this money out, and investing in traditional business productivity, they use the freshly minted dollars to purchase hard assets. Business loans would provide profit based on interest - a gambit that requires confidence in the value of the dollar since the dollar is the measure of the economic reward. The purchase of hard assets is different. The "value" is not in the profitability of the investment, as measured in fiat currency. The value is in hard asset and any future economic power that asset holds through the expected currency crash. The only mystery here is that of military might. How do the banksters and global elites protect their assets in the future collapse they have made certain? Oh wait - private security companies capable of waging war. It's no accident that the early geopolitical energy wars of the 21st century saw a massive buildup of private corporate military and i
Gary Edwards

The Project To Restore America - 0 views

  • One hundred years ago this month, on December 23, 1913, the Congress passed the Federal Reserve Act, establishing a national central-banking system in the United States. The governing board of the Federal Reserve was organized on August 12, 1914, and the Federal Reserve banks opened for operation on November 16, 1914.   On the surface, the preamble to the Act, which summarized the purpose of the new government-created institution, seemed fairly innocuous:   “An Act to provide for the establishment of Federal reserve banks, to furnish an elastic currency, to afford means of rediscounting commercial paper, to establish a more effective supervision of banking in the United States, and for other purposes.”
  • The Powers of the Federal Reserve   But what this meant was the start of the monopolization of monetary matters in the hands of a single politically appointed authority within the boundaries of the United States.   Those innocuously sounding functions listed in the Act’s preamble, however, gave the Federal Reserve the power to:   (a) Control the quantity of money and credit supplied in the United States.   (b) Influence the value, or purchasing power, of the monetary unit that is used by the citizenry of the country in all their transactions.   (c) Indirectly manipulate the rates of interest at which borrowers and lenders transfer savings for investment and other purposes, including the funding of government budget deficits.
  • A Century of Central Bank Mismanagement   The 100-year record of the Federal Reserve has been a roller coaster of inflations and recessions, including the disaster of the Great Depression of the 1930s, the “excessive exuberance” of the late 1990s that resulted in the “Dot.Com” bubble that burst in the early 2000s, and the recent boom-bust cycle of the last decade from which the U.S. economy is still slowly recovering.   The crucial and fundamental problem with the power and authority of the Federal Reserve is that it represents monetary central planning. In a world that has, for the most part, turned its back on the theoretical error and practical disaster of believing that governments have the wisdom and ability to centrally plan the economic affairs of a society, central banking remains one of the major remaining forms of socialism practiced around the globe.   Government control and planning of the monetary system has resulted in extensive political power over virtually every aspect of our economic life. In 1942 Gustav Stolper, a German free-market economist then in exile in America from war-torn Europe, published a book titled “This Age of Fables.” He pointed out:
  • ...1 more annotation...
  • “Hardly ever do the advocates of free capitalism realize how utterly their ideal was frustrated at the moment the state assumed control of the monetary system . . . A ‘free’ capitalism with government responsibility for money and credit has lost its innocence. From that point on it is no longer a matter of principle but one of expediency how far one wishes or permits government interference to go. Money control is the supreme and most comprehensive of all governmental controls short of expropriation.”
  •  
    Interesting two part summary of the Federal Reserve that emphasis' the essential relationship between central banking and socialism.  The author, Richard Ebeling, goes as far as to say that not only is central banking essential to socialism but also that free market - individual liberty capitalism cannot coexist with central banking. IIRC, there is a clause int he Federal Reserve Act of 1913 where the US Treasury can purchase back control of the money supply at a cost of $144 Million dollars.  Not sure where I read that, but the cancellation of near two thirds of the interest due on our national debt would work wonders for the dollar.
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
Gary Edwards

Obama's Moralizing Tone May Not Wear Well - WSJ.com Dorothy Rabinowitz - 0 views

  • It's impossible to know what kind of history Mr. Obama has been reading but this much at least is true -- the generation he describes knew the importance of sturdy alliances all right. There was that one, for instance, between the American leader, Franklin Roosevelt, and the British, Winston Churchill. Both of them, along with their countrymen, were driven by one enduring conviction -- that fascism should be eradicated from the face of the earth and a total war of destruction waged on Imperial Japan and Nazi Germany until their surrender. It would be hard to find, in their pursuit of that purpose, any hint of that tempering quality of humility and restraint. Not that it isn't entertaining to imagine Roosevelt extending the hand of friendship and conciliation to Hirohito, or Churchill proposing to raise a glass and talk things over with Hitler.
  • political constituency whose chief enterprise has been these many years to portray the war on terror as an illicit enterprise, conducted by agents of government bent on robbing innocent Americans of their constitutional rights and instilling baseless fears -- and that has succeeded, with the invaluable aid of a like-minded quarter of the media, in presenting a picture of Guantanamo as a hell on earth akin to Auschwitz.
  •  
    The generation of Americans who had faced down fascism and communism understood, Mr. Obama further explained on Inauguration Day, that power alone could not protect us. They understood that our security came not just from missiles and tanks but from "sturdy alliances" and "enduring convictions" -- it emanated from "the tempering quality of humility and restraint." It's impossible to know what kind of history Mr. Obama has been reading but this much at least is true -- the generation he describes knew the importance of sturdy alliances all right. There was that one, for instance, between the American leader, Franklin Roosevelt, and the British, Winston Churchill. Both of them, along with their countrymen, were driven by one enduring conviction -- that fascism should be eradicated from the face of the earth and a total war of destruction waged on Imperial Japan and Nazi Germany until their surrender. It would be hard to find, in their pursuit of that purpose, any hint of that tempering quality of humility and restraint. Not that it isn't entertaining to imagine Roosevelt extending the hand of friendship and conciliation to Hirohito, or Churchill proposing to raise a glass and talk things over with Hitler.
Paul Merrell

U.S. to China: We Hacked Your Internet Gear We Told You Not to Hack | Wired Enterprise ... - 0 views

  • The headline news is that the NSA has surreptitiously “burrowed its way into nearly all the security architecture” sold by the world’s largest computer networking companies, including everyone from U.S. mainstays Cisco and Juniper to Chinese giant Huawei. But beneath this bombshell of a story from Der Spiegel, you’ll find a rather healthy bit of irony. After all, the United States government has spent years complaining that Chinese intelligence operations could find ways of poking holes in Huawei networking gear, urging both American businesses and foreign allies to sidestep the company’s hardware. The complaints grew so loud that, at one point, Huawei indicated it may abandon the U.S. networking market all together. And, yet, Der Speigel now tells us that U.S. intelligence operations have been poking holes in Huawei networking gear — not to mention hardware sold by countless other vendors in both the States and abroad. “We read the media reports, and we’ve noted the references to Huawei and our peers,” says William Plummer, a Huawei vice president and the company’s point person in Washington, D.C. “As we have said, over and over again — and as now seems to be validated — threats to networks and data integrity can come from any and many sources.”
  • Plummer and Huawei have long complained that when the U.S. House Intelligence Committee released a report in October 2012 condemning the use of Huawei gear in telephone and data networks, it failed to provide any evidence that the Chinese government had compromised the company’s hardware. Adam Segal, a senior fellow for China Studies at the Center for Foreign Relations, makes the same point. And now we have evidence — Der Spiegel cites leaked NSA documents — that the U.S. government has compromised gear on a massive scale. “Do I see the irony? Certainly the Chinese will,” Segal says, noting that the Chinese government and the Chinese press have complained of U.S hypocrisy ever since former government contractor Edward Snowden first started to reveal NSA surveillance practices last summer. “The Chinese government has been hammering home what they call the U.S.’s ulterior motives for criticizing China, and there’s been a steady drumbeat of stories in the Chinese press about backdoors in the products of U.S. companies. They’ve been going after Cisco in particular.”
  • To be sure, the exploits discussed by Der Spiegel are a little different from the sort of attacks Congress envisioned during its long campaign against Huawei and ZTE, another Chinese manufacturer. As Segal and others note, Congress mostly complained that the Chinese government could collaborate with people inside the two companies to plant backdoors in their gear, with lawmakers pointing out that Huawei’s CEO was once an officer in China’s People’s Liberation Army, or PLA, the military arm of the country’s Communist party. Der Spiegel, by contrast, says the NSA is exploiting hardware without help from anyone inside the Ciscos and the Huaweis, focusing instead on compromising network gear with clever hacks or intercepting the hardware as it’s shipped to customers. “For the most part, the article discusses typical malware exploits used by hackers everywhere,” says JR Rivers, an engineer who has built networking hardware for Cisco as well as Google and now runs the networking startup Cumulus Networks. “It’s just pointing out that the NSA is engaged in the practice and has resources that are not available to most people.” But in the end, the two types of attack have the same result: Networking gear controlled by government spies. And over the last six months, Snowden’s revelations have indicated that the NSA is not only hacking into networks but also collaborating with large American companies in its hunt for data.
  • ...2 more annotations...
  • Jim Lewis, a director and senior fellow with the Center for Strategic and International Studies, adds that the Chinese view state-sponsored espionage a little differently than the U.S. does. Both countries believe in espionage for national security purposes, but the Chinese argue that such spying might include the theft of commercial secrets. “The Chinese will tell you that stealing technology and business secrets is a way of building their economy, and that this is important for national security,” says Lewis, who has helped oversee meetings between the U.S. and the Chinese, including officers in the PLA. “I’ve been in the room when they’ve said that. The last time was when a PLA colonel said: ‘In the U.S., military espionage is heroic and economic espionage is a crime. In China, the line is not that clear.’” But here in the United States, we now know, the NSA may blur other lines in the name of national security. Segal says that although he, as an American, believes the U.S. government is on stronger ethical ground than the Chinese, other nations are beginning to question its motives. “The U.S has to convince other countries that our type of intelligence gathering is different,” he says. “I don’t think that the Brazils and the Indias and the Indonesias and the South Africas are convinced. That’s a big problem for us.”
  • The thing to realize, as the revelations of NSA snooping continue to pour out, is that everyone deserves scrutiny — the U.S government and its allies, as well as the Chinese and others you may be more likely to view with skepticism. “All big countries,” Lewis says, “are going to try and do this.”
  •  
    Of course, we now know that the U.S. conducts electronic surveillance for a multitude of purposes, including economic. Check this group's notes tagged "NSA-targets" and/or "NSA-goals".
Paul Merrell

GOP-led Benghazi report purposely buried in news cycle, Democrat says | TheHill - 0 views

  • A GOP-led investigation that debunked theories about the 2012 Benghazi attack was purposely released on the Friday before Thanksgiving to evade exposure, Rep. Adam Schiff (D-Calif.) said Sunday. On CNN’s “State of the Union,” Schiff questioned the decision behind the timing of the release of the House Intelligence Committee’s report. “Why is this report being released on the Friday before Thanksgiving?” Schiff asked.Schiff said if a panel spends two years compiling an important report, it wouldn’t make much sense to conceal it.ADVERTISEMENT“You want to trumpet it to the high heavens, you don’t want to bury it on the Friday before Thanksgiving,” he said.
  • The House Intelligence panel released the report Friday evening, and it found there was no intelligence failure surrounding the attack, no delay in the rescue of U.S. personnel and no political cover-up by Obama administration officials.Schiff, a member of the committee, said he wouldn’t be surprised if Republicans employed a similar tactic when the House Select Committee on Benghazi releases its own report on the attack. “If the select committee comes up with a similar conclusion, it’ll release a similar report on Christmas Eve,” he said. Schiff rejected Sen. Lindsey Graham’s (R-S.C.) earlier claims that the report is “full of crap” and a “bunch of garbage.”Republicans and Democrats on the Intelligence committee supported the report’s findings, Schiff said, adding that it exonerates the Obama administration.
  • Schiff said talk about Benghazi would have died down by now if it weren’t for the former secretary of State possibly running for president.“If Hillary Clinton weren’t a likely candidate for president,” he said, “I think this investigation would have been over with a long time ago.”
  •  
    Too hot to handle. An honest investigation would have revealed Hillary and the CIA's involvement in running the CIA/State Dept. "ratline" of weapons from Libya to jihadis in Syria via Turkey. Republicans have no love for Hillary, but the fact that the U.S. was supplying weapons to the jihadis long before the Syrian government was falsely accused of using Sarin chemical warfare would interfere too much with the current "ISIL" narrative. Can't force that kind of dirt out into mainstream media because it might hinder U.S. war industry profits.
Paul Merrell

U.S. "Humanitarian" Bombing of Iraq: A Redundant Presidential Ritual - The Intercept - 0 views

  • There are several brief points worth noting about all of this: (1) For those who ask “what should be done?,” has the hideous aftermath of the NATO intervention in Libya – hailed as a grand success for “humanitarian interventions” – not taught the crucial lessons that (a) bombing for ostensibly “humanitarian” ends virtually never fulfills the claimed goals but rather almost always makes the situation worse; (b) the U.S. military is not designed, and is not deployed, for “humanitarian” purposes?; and (c) the U.S. military is not always capable of “doing something” positive about every humanitarian crisis even if that were really the goal of U.S. officials? The suffering in Iraq is real, as is the brutality of ISIS, and the desire to fix it is understandable. There may be some ideal world in which a superpower is both able and eager to bomb for humanitarian purposes. But that is not this world. Just note how completely the welfare of Libya was ignored by most intervention advocates the minute the fun, glorious, exciting part – “We came, we saw, he died,” chuckled Hillary Clinton – was over.
  • (2) It is simply mystifying how anyone can look at U.S. actions in the Middle East and still believe that the goal of its military deployments is humanitarianism. The U.S. government does not oppose tyranny and violent oppression in the Middle East. To the contrary, it is and long has been American policy to do everything possible to subjugate the populations of that region with brutal force – as conclusively demonstrated by stalwart U.S. support for the region’s worst oppressors. Or, as Hillary Clinton so memorably put it in 2009: “I really consider President and Mrs. Mubarak to be friends of my family.” How can anyone believe that a government whose overt, explicit policy is “regime continuity” for Saudi Arabia, and who continues to lend all sorts of support to the military dictators of Egypt, is simultaneously driven by humanitarian missions in the region? (3) “Humanitarianism” is the pretty packaging in which all wars – even the most blatantly aggressive ones – are wrapped, but it is almost never the actual purpose. There are often numerous steps the U.S. could take to advance actually humanitarian goals, but those take persistence and resources, and entail little means of control, and are thus usually ignored in favor of blowing things and people up with Freedom Bombs.
  • (4) Note how even the pretenses of constitutional democracy are now dispensed with: there is a reasonable legal debate over legality, but in essence: the President has the power to order bombing of Iraq because he decides it should happen. (5) Perhaps having Israel and the U.S. simultaneously bombing Arabs in different countries – yet again – will create some extremely negative consequences?
  • ...2 more annotations...
  • (6) This above-documented parade of “Saddam-is-worse-than-Hitler” campaigns was surrounded by stints of U.S. arming and funding of the very same Saddam (the same, of course, was true of the Taliban precursors, Gadhaffi, Iran, Manuel Noriega, and virtually every other Latest Villain who needed to be bombed; the US was roughly allied with ISIS allies in Syria and American allies fund ISIS itself). The propaganda has gone from “pulling babies from incubators: as bad as Hitler” to “rape rooms: worse than Hitler” to the new slogan: “worse than al-Qaeda!” What’s left? For quite some time, it was Mahmoud Ahmadinejad – the democratically elected president of Iran who left office peacefully at the end of his term and who never actually invaded anybody – who was The New Hitler. As all of this demonstrates, there certainly are some heinous, violent people in the world: often including America’s closest allies and the ones who unleash the violence documented here, as well as those at whom that violence is directed. But perhaps some perspective and serious skepticism is warranted the next time we’re relentlessly bombarded with messaging about The New Greatest Villainous Threat in History – and especially manipulative accusations that opposition to U.S. military attack is indicative of support for those New Villains – as a means to secure acquiescence to the next bombing campaign.
  • (7) Maybe this and this, rather than humanitarianism, is a more significant influence in this new bombing campaign? Targeted strikes against ISIS is obviously not remotely the same as a full-scale invasion of Iraq, but whatever else is true, and whatever one’s opinions are on this latest bombing, it is self-evidently significant that, as the NYT’s Peter Baker wrote today, “Mr. Obama became the fourth president in a row to order military action in that graveyard of American ambition” known as Iraq.
Paul Merrell

Obama to propose legislation to protect firms that share cyberthreat data - The Washing... - 0 views

  • President Obama plans to announce legislation Tuesday that would shield companies from lawsuits for sharing computer threat data with the government in an effort to prevent cyber­attacks. On the heels of a destructive attack at Sony Pictures Entertainment and major breaches at JPMorgan Chase and retail chains, Obama is intent on capitalizing on the heightened sense of urgency to improve the security of the nation’s networks, officials said. “He’s been doing everything he can within his executive authority to move the ball on this,” said a senior administration official who spoke on the condition of anonymity to discuss legislation that has not yet been released. “We’ve got to get something in place that allows both industry and government to work more closely together.”
  • The legislation is part of a broader package, to be sent to Capitol Hill on Tuesday, that includes measures to help protect consumers and students against ­cyberattacks and to give law enforcement greater authority to combat cybercrime. The provision’s goal is to “enshrine in law liability protection for the private sector for them to share specific information — cyberthreat indicators — with the government,” the official said. Some analysts questioned the need for such legislation, saying there are adequate measures in place to enable sharing between companies and the government and among companies.
  • “We think the current information-sharing regime is adequate,” said Mark Jaycox, legislative analyst at the Electronic Frontier Foundation, a privacy group. “More companies need to use it, but the idea of broad legal immunity isn’t needed right now.” The administration official disagreed. The lack of such immunity is what prevents many companies from greater sharing of data with the government, the official said. “We have heard that time and time again,” the official said. The proposal, which builds on a 2011 administration bill, grants liability protection to companies that provide indicators of cyberattacks and threats to the Department of Homeland Security.
  • ...5 more annotations...
  • But in a provision likely to raise concerns from privacy advocates, the administration wants to require DHS to share that information “in as near real time as possible” with other government agencies that have a cybersecurity mission, the official said. Those include the National Security Agency, the Pentagon’s ­Cyber Command, the FBI and the Secret Service. “DHS needs to take an active lead role in ensuring that unnecessary personal information is not shared with intelligence authorities,” Jaycox said. The debates over government surveillance prompted by disclosures from former NSA contractor Edward Snowden have shown that “the agencies already have a tremendous amount of unnecessary information,” he said.
  • The administration official stressed that the legislation will require companies to remove unnecessary personal information before furnishing it to the government in order to qualify for liability protection. It also will impose limits on the use of the data for cybersecurity crimes and instances in which there is a threat of death or bodily harm, such as kidnapping, the official said. And it will require DHS and the attorney general to develop guidelines for the federal government’s use and retention of the data. It will not authorize a company to take offensive cyber-measures to defend itself, such as “hacking back” into a server or computer outside its own network to track a breach. The bill also will provide liability protection to companies that share data with private-sector-developed organizations set up specifically for that purpose. Called information sharing and analysis organizations, these groups often are set up by particular industries, such as banking, to facilitate the exchange of data and best practices.
  • Efforts to pass information-sharing legislation have stalled in the past five years, blocked primarily by privacy concerns. The package also contains provisions that would allow prosecution for the sale of botnets or access to armies of compromised computers that can be used to spread malware, would criminalize the overseas sale of stolen U.S. credit card and bank account numbers, would expand federal law enforcement authority to deter the sale of spyware used to stalk people or commit identity theft, and would give courts the authority to shut down botnets being used for criminal activity, such as denial-of-service attacks.
  • It would reaffirm that federal racketeering law applies to cybercrimes and amends the Computer Fraud and Abuse Act by ensuring that “insignificant conduct” does not fall within the scope of the statute. A third element of the package is legislation Obama proposed Monday to help protect consumers and students against cyberattacks. The theft of personal financial information “is a direct threat to the economic security of American families, and we’ve got to stop it,” Obama said. The plan, unveiled in a speech at the Federal Trade Commission, would require companies to notify customers within 30 days after the theft of personal information is discovered. Right now, data breaches are handled under a patchwork of state laws that the president said are confusing and costly to enforce. Obama’s plan would streamline those into one clear federal standard and bolster requirements for companies to notify customers. Obama is proposing closing loopholes to make it easier to track down cybercriminals overseas who steal and sell identities. “The more we do to protect consumer information and privacy, the harder it is for hackers to damage our businesses and hurt our economy,” he said.
  • In October, Obama signed an order to protect consumers from identity theft by strengthening security features in credit cards and the terminals that process them. Marc Rotenberg, executive director of the Electronic Privacy Information Center, said there is concern that a federal standard would “preempt stronger state laws” about how and when companies have to notify consumers. The Student Digital Privacy Act would ensure that data entered would be used only for educational purposes. It would prohibit companies from selling student data to third-party companies for purposes other than education. Obama also plans to introduce a Consumer Privacy Bill of Rights. And the White House will host a summit on cybersecurity and consumer protection on Feb. 13 at Stanford University.
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance |... - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the Court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the Court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
Gary Edwards

Ace of Spades HQ :: The Unmitigated Disaster Known As Project ORCA - 1 views

  •  
    Wondering why the Republicans failed so miserably to get out the vote in the six states where it mattered most?  The Ace of Spades explains his own mis adventures with Romney's new technology plan to get  out the vote: "Project ORCA" This story is beyond sad.  Idiot Republican consultants and advisors cost us this election.  Romney may have struggled with conservatism, but he would have been an awesome CEO - President.  Maybe the best equipped, most successful, and most experienced executive ever to run for the Presidency.  Yet, the buffoonery of Project ORCA falls on him and him alone. excerpt: What is Project Orca? Well, this is what they told us: Project ORCA is a massive undertaking - the Republican Party's newest, unprecedented and most technologically advanced plan to win the 2012 presidential election. Pretty much everything in that sentence is false. The "massive undertaking" is true, however. It would take a lot of planning, training and coordination to be done successfully (oh, we'll get to that in a second). This wasn't really the GOP's effort, it was Team Romney's. And perhaps "unprecedented" would fit if we're discussing failure. The entire purpose of this project was to digitize the decades-old practice of strike lists. The old way was to sit with your paper and mark off people that have voted and every hour or so, someone from the campaign would come get your list and take it back to local headquarters. Then, they'd begin contacting people that hadn't voted yet and encourage them to head to the polls. It's worked for years. From the very start there were warning signs. After signing up, you were invited to take part in nightly conference calls. The calls were more of the slick marketing speech type than helpful training sessions. There was a lot of "rah-rahs" and lofty talk about how this would change the ballgame."
Gary Edwards

What You Can Do About Vote Fraud | Fellowship of the Minds - 0 views

  •  
    "What You Can Do About Vote Fraud Posted on November 17, 2012 by Dr. Eowyn | 2 Comments excerpt: There is now massive compelling evidence that Democrats committed vote fraud in the 2012 presidential election, especially in the four battleground states of Colorado, Florida, Ohio, and Virginia. See FOTM's posts chronicling the extensive pervasive fraud by going to our "2012 Election" page below our FOTM masthead, and click on those post links colored neon green. But the Republican Party won't do anything about the fraud, because it is legally constrained by an agreement the Republican National Committee (RNC) made with the Democratic National Committee (DNC) in 1982, to settle a lawsuit. The agreement or Consent Decree, which is national in scope, limits the RNC's ability to engage or assist in voter fraud prevention unless the RNC obtains the court's approval in advance. Nor can the RNC engage in "ballot security activities" - defined as "ballot integrity, ballot security or other efforts to prevent or remedy vote fraud." Read more about the agreement HERE. Simply put, the GOP is neutered. But we ordinary Americans can do something about vote fraud, in our separate states. FOTM's Hardnox has been urging us to contact our state's attorney general. Here's how." Dr. Eowyn provides a list of all 50 State Attorneys Generals for the purposes of direct mail.  Mailing addresses and phone numbers!  Get writing Patriots.  It's now or never.
Gary Edwards

Gun Control: WWJD? | RedState - 0 views

  •  
    Excellent discussion of the 2nd Amendment and the gun control arguments of the socialists.  The article centers on the well trod socialist argument, "What would Jesus do?".  The author, Ben Howe, demolishes this argument and then moves on to the core issue of why the 2nd Amendment is important.  Includes a must see youtube capture of the idiot Piers Morgan interview with Ben Shapiro of Breitbart Magazine.  Awesome job Ben!! Great closing quote: "Without the 2nd Amendment, the Constitution is just a wishlist". excerpt: "As the gun control debate rages in America following the abominable events in Newtown, eventually, perhaps inevitably, the media will ask itself, "What would Jesus do?" They've done it for years as it relates to wealth redistribution and Obamacare. Obama gave an entire speech about taxes in which he used Jesus for his justification. I'd wager that the tactic is designed to hit God fearing southerners where, in keeping with the caricature that the media has created of them, they are most likely to submit without question and accept the answer given to them by their betters. Of course this vastly underestimates the target, but putting that aside, is there any truth to the idea that Jesus would deplore a concealed carry license or a mom defending her children from an intruder? After all, Jesus has some pretty radically pacifist quotes that need only be lifted from the Bible without context to sound convincing. Such has been the case on Twitter where I've already more than once been the victim of "well meaning" gun control advocates who simply want me to be as "peaceful as Jesus." Virtually without fail, they point to Matthew 5:39: But I say to you, do not resist an evil person; but whoever slaps you on your right cheek, turn the other to him also. If anyone wants to sue you and take your shirt, let him have your coat also. Whoever forces you to go one mile, go with him two. Give to him who asks of you, and do not turn away fr
‹ Previous 21 - 40 of 424 Next › Last »
Showing 20 items per page