Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged quotes

Rss Feed Group items tagged

Paul Merrell

Donald Trump Withdraws Proposal To Create Safe Zones In Syria | The Huffington Post - 0 views

  • President Donald Trump’s executive order freezing the United States’ refugee resettlement program, barring Syrian refugees indefinitely and temporarily restricting immigration from unnamed countries is already resulting in families being stopped at airports. But the order is also notable for its exclusion of a provision, which appeared in an earlier draft of the order, that would have created a process for establishing so-called safe zones in Syria. That clause would have instructed the secretary of defense to draft a plan within 90 days to create “safe zones to protect vulnerable Syrian populations,” according to a copy of the draft published by The Huffington Post on Wednesday. The decision to omit the safe zones proposal allows the Trump administration to avoid, at least temporarily, the complex questions that such a policy would raise. Creating and protecting safe zones could increase American military intervention in Syria, and pose a number of political and logistical problems regarding its implementation.
  • Both Republican and Democratic officials have at times advocated for implementing safe zones in Syria. Former Secretary of State Hillary Clinton made safe zones part of her foreign policy platform during her 2016 presidential campaign, and prominent GOP figures like Sens. Marco Rubio (Fla.), Lindsey Graham (S.C.) and John McCain (Ariz.) have all advocated for the policy. German Chancellor Angela Merkel also supported potential safe zones along the Turkey-Syria border, and has discussed the idea of havens for displaced Yazidis in northern Iraq. Turkey has previously backed the policy as well, and already controls a strip of land in Syria along its border that has become something of a de facto safe zone for internally displaced people.
  • Many politicians advocate safe zones as a middle ground between large-scale military intervention and inaction, while claiming they will mitigate the flow of refugees into other states. But experts say safe zones require large amounts of resources, military personnel and money to implement. Safe zones can also have unintended consequences that endanger the civilians they aim to protect.
  •  
    Safe zones for Al-Nusrah and ISIL won't be implemented, for now
Paul Merrell

British Spies Allowed to Access U.S. Data Without a Warrant - NationalJournal.com - 0 views

  • British authorities are capable of tapping into bulk communications data collected by other countries' intelligence services—including the National Security Agency—without a warrant, according to secret government documents released Tuesday. The agreement between the NSA and Britain's spy agency, known as Government Communications Headquarters or GCHQ, potentially puts the Internet and phone data of Americans in the hands of another country without legal oversight when obtaining a warrant is "not technically feasible."   The data, once obtained, can be kept for up to two years, according to internal policies disclosed by the British government. GCHQ was forced to reveal that it can request and receive vast quantities of raw, unanalyzed data collected from foreign governments it partners with during legal proceedings in a closed court hearing in a case brought by various international human-rights organizations, including Privacy International, Liberty U.K., and Amnesty International. The suit challenges certain aspects of GCHQ's surveillance practices.
  • It is well known that the NSA and GCHQ closely share intelligence data with one another, as part of a long-standing surveillance partnership. Some details of the agencies' spy pact were exposed by former NSA contractor Edward Snowden last year, including the existence of GCHQ's Tempora program, which taps into fiber-optic cables to scoop up online and telephone traffic across the Web for up to 30 days. But this is the first time the British government has disclosed that it does not require a warrant to access data collected and maintained by its American counterparts. The revelation appears to counter statements made by an oversight committee of the British Parliament in July of last year that "in each case where GCHQ sought information from the U.S., a warrant for interception, signed by a minister, was already in place."   It is unclear whether any restrictions on Britain's access to NSA surveillance data is imposed by the U.S. However, documents provided by Snowden to The Guardian last year reveal that the NSA shares raw intelligence data with Israel without removing information about U.S. citizens.
  • In a statement, the NSA said it works with a number of partner countries to further its "foreign intelligence mission." But it did not specify whether it was aware of or condoned Britain's apparent warrantless access of its data. "Whenever NSA shares intelligence information, we comply with all applicable rules, including rules designed to safeguard U.S. person information," the agency said. "NSA does not ask its foreign partners to undertake any intelligence activity that the U.S. government would be legally prohibited from undertaking itself." American privacy advocates quickly condemned any warrantless access of U.S. communications data by British authorities.   "The 'arrangement' disclosed today suggests that the two countries are circumventing even the very weak safeguards that have been put in place," Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said in a statement to National Journal. "It underscores both the inadequacy of existing oversight structures and the pressing need for [surveillance] reform."
  •  
    Note that this came out in a court case; it is not a Snowden leak. 
Paul Merrell

That 'Valuable Intel' From The Yemen Raid? It Was 10 Years Old : The Two-Way : NPR - 0 views

  • A terrorist video released on Friday by the Pentagon to show what it called intelligence gleaned by the recent raid in Yemen actually was made about 10 years ago, it acknowledged. Defense officials canceled a briefing they had called to discuss the value of the information recovered from Yemen and took the video off the website of the U.S. Central Command. They circulated clips from a video that showed how to prepare explosives without knowing it had already been public. However, Navy Capt. Jeff Davis, a Defense Department spokesman, stuck by the Pentagon's main argument: Al-Qaida in the Arabian Peninsula remains dangerous and wants to recruit and train people to attack the West.
  • "Even though the video is old, it shows their intent," he told reporters. But defense officials declined to release any other, newer intelligence they said was in computers recovered by the American and allied special operations troops who attacked the Yemeni town. The messaging kerfuffle turned an ongoing counterattack into a damp squib. Critics in Congress and within the national security establishment — speaking without identification in press reports — have called the Yemen raid botched. They accused the White House of hurrying troops into an operation with bad intelligence, or pressing commanders to go ahead with a raid after it lost its element of surprise. Spokesman Sean Spicer began to return fire on Thursday: The initial planning began in November, he said, and then the military and intelligence community worked to refine it in the succeeding months through the transition. With a strong case for action, Spicer said, the only thing needed was a moonless night in Yemen, which fell after President Trump's inauguration. Trump ultimately authorized it on Jan. 26. Article continues after sponsorship SEAL Team Six and its partners attacked the AQAP target early on Sunday, as NPR's Alice Fordham and Tom Bowman have detailed. The U.S. says some 14 terrorists were killed in the operation, which also claimed the life of an unknown number of civilians — including women and children — and Navy Chief Special Warfare Operator William Owens. An American MV-22 Osprey aircraft also crash-landed, injuring its crew, and U.S. troops went on to deliberately destroy it to keep it from being compromised.
Paul Merrell

http://www.quakerpi.org/news/letter.htm - 0 views

  • Amidst another week of deadly Israeli-Palestinian violence, fifteen faith leaders representing U.S. churches and faith organizations have called on Congress to condition U.S. military aid to Israel upon Israel’s “compliance with applicable U.S. laws and policies.” These leaders--representing Baptist, Lutheran, Catholic, Presbyterian, Methodist, Orthodox, Quaker and other major Christian groups--agree that unconditional U.S. military assistance to Israel has contributed to “sustaining the conflict and undermining the long-term security interests of both Israelis and Palestinians.”  [SEE LETTER BELOW]   As a Quaker peace lobby that has advocated for Israeli-Palestinian peace for decades in Washington, the Friends Committee on National Legislation (FCNL) is proud to be a partner in this effort.   These organizations draw upon their decades of experience in the region, during which they have collectively witnessed the horror of suicide bombing, rocket attacks, shootings of civilians, home demolitions, forced displacement, and other widespread human rights violations. These faith groups “recognize that each party — Israeli and Palestinian — bears responsibilities for its actions and we therefore continue to stand against all violence regardless of its source.”      Unconditional U.S. military aid has become one of those sources fueling violence and further entrenchment of Israel’s military occupation of the Palestinian territories. This statement highlights the United States’ responsibility to hold Israel accountable for “a troubling and consistent pattern of disregard by the government of Israel for U.S. policies that support a just and lasting peace.”
  • Congress must investigate possible violations of U.S. law The latest State Department human rights report on Israel and the Occupied Territories provides a devastating account of Israel’s human rights violations against civilians, many of which involve the misuse of U.S.-supplied weapons. This diverse religious coalition has called for “an immediate investigation into possible violations by Israel of the U.S. Foreign Assistance Act and the U.S. Arms Export Control Act,” and urges Congress to “ensure that our aid is not supporting actions by the government of Israel that undermine prospects for peace”.     The signers affirm that these are laws that “should be enforced in all instances regardless of location,” but that it is especially critical for Israel to comply with laws that regulate the use of U.S. supplied weapons, since Israel is the single largest recipient of U.S. foreign aid since World War II. Notably, the United States has initiated investigations of violations of these laws by other countries, and on four different occasions between 1978 and 1982, the Secretary of State notified Congress that Israel “may” have violated the provisions of the Arms Export Control Act.   The coalition has called for renewed investigations into human rights violations documented by the State Department’s report, including Israel’s escalation of home demolitions, forced displacement, suppression of dissent, and its use of prohibited weapons in densely populated areas during Israel’s military Operation Cast Lead in the Gaza Strip.  
  • Echoing urgent warnings from Israeli leader The letter also echoes the urgency for immediate action to secure a diplomatic settlement to the crisis that has been acknowledged by scores of Israeli and Palestinian leaders, including Ehud Barak, Israel’s current Defense Minister and former Prime Minister. In a historic speech delivered at the prestigious Herzliya National Security Conference in Israel in early 2010, Mr. Barak warned of Israel’s future in the absence of a political settlement, saying in stark terms:   “The reality is cruel but simple. Between the Jordan River...and the Mediterranean, 12 million people live, 7.5 million Israelis and 4.5 million Palestinians. And the simple truth is that as long as in this territory to the West of the Jordan River, there is one political entity which is called Israel[...]and if this bloc of Palestinians would not be able to vote, it’s going to be an apartheid state.”     Israeli, Palestinian, and U.S. interests require urgent efforts to avoid the nightmare that Israeli leader Ehud Barak has described as an apartheid state. A just and peaceful future for Israelis and Palestinians requires that all parties to a conflict are held accountable and that a comprehensive, inclusive diplomatic settlement be secured. An essential step for Congress to support Israeli-Palestinian peace efforts is to heed these warnings, and hold Israel accountable for how it uses U.S. military aid. (See full letter at:http://www.fcnl.org/middle_east
  • ...3 more annotations...
  • Dear Member of Congress,
  • Unfortunately, unconditional U.S. military assistance to Israel has contributed to this deterioration, sustaining the conflict and undermining the long-term security interests of both Israelis and Palestinians. This is made clear in the most recent 2011 State Department Country Report on Human Rights Practices covering Israel and the Occupied Territories (1), which details widespread Israeli human rights violations committed against Palestinian civilians, many of which involve the misuse of U.S.-supplied weapons. Accordingly, we urge an immediate investigation into possible violations by Israel of the U.S. Foreign Assistance Act and the U.S. Arms Export Control Act which respectively prohibit assistance to any country which engages in a consistent pattern of human rights violations and limit the use of U.S. weapons (2) to “internal security” or “legitimate self-defense.” (3) More broadly, we urge Congress to undertake careful scrutiny to ensure that our aid is not supporting actions by the government of Israel that undermine prospects for peace. We urge Congress to hold hearings to examine Israel’s compliance, and we request regular reporting on compliance and the withholding of military aid for non-compliance.
  • Sincerely, Rev. Gradye Parsons
Stated Clerk of the General Assembly
Presbyterian Church (USA) Mark S. Hanson
Presiding Bishop
Evangelical Lutheran Church in America Bishop Rosemarie Wenner
President, Council of Bishops
United Methodist Church Peg Birk
Transitional General Secretary
National Council of Churches USA   Shan Cretin
General Secretary
American Friends Service Committee J Ron Byler
Executive Director
Mennonite Central Committee U.S. Alexander Patico
North American Secretary
Orthodox Peace Fellowship Diane Randall
Executive Secretary
Friends Committee on National Legislation Dr. A. Roy Medley
General Secretary
American Baptist Churches, U.S.A. Rev. Geoffrey A. Black
General Minister and President
United Church of Christ Rev. Dr. Sharon E. Watkins
General Minister and President
Christian Church (Disciples of Christ) Rev. Julia Brown Karimu
President, Christian Church (Disciples of Christ), Division of Overseas Ministries
Co-Executive, Global Ministries (UCC and Disciples) Rev. Dr. James A. Moos
Executive Minister, United Church of Christ, Wider Church Ministries
Co-Executive, Global Ministries (UCC and Disciples) Kathy McKneely
Acting Director
Maryknoll Office for Global Concerns Eli S. McCarthy, PhD
Justice and Peace Director
Conference of Major Superiors of Men (CMSM)
  •  
    Maybe part of the solution is to stop propping up the apartheid state of Israel with U.S. weapons and war supplies?
Paul Merrell

Turkish Intelligence's Alleged Arms Trade Emerges with ISIL Investigation - 0 views

  • An alleged telephone conversation tape proving that Turkish National Intelligence Organization (MİT) involved in arms trading, emerged from the case file regarding ISIL attack in central Anatolian province Niğde.
  • An alleged telephone conversation tape proving that Turkish National Intelligence Organization (MİT) involved in arms trading, emerged from the case file regarding ISIL attack in central Anatolian province Niğde. Masum Gök According to the court file regarding the two suspects of ISIL's terrorist action in Niğde, Ayhan Orli and Kassuma code named terrorist Muzaffer Yılmaz had a phone conversation regarding arms trading. According to the tape obtained by Turkish Gendarmarie forces, Arms dealer Ayhan Orli said "Brother, the goods are not in their hands. Intelligence (MİT) is keeping the goods," adding that the Grad rockets are in Mersin province. Here's the full text of the alleged telephone conversation between Ayhan Orli and Muzaffer Yılmaz (Kassuma) in 29 July 2014:
  • Who is Ayhan Orli? The figures such as Ayhan Orli and Heysem Topalca who have a strong contact with terrorist groups in Syria, turned the civil war into a highly beneficial business. Ayhan Orli who lives in Yayladağı district of Hatay is a Syrian Turkmen. Orli moved to Syria to join the AKP backed terrorist groups after the beginning of civil war. His brother Adil Orli is one of the leaders of the Turkmen Batallion fighting against Syrian regime. One of the prisoners staying in a Syrian prison said in an interview that Ayhan Orli is cooperating with Turkish intelligence and there is an intense deal between them. Ayhan Orli receives million dollar worth commissions from the weapons provided to terrorist groups in Syria. He not only cooperates with intelligence organizations but also a number of international mafia organizations.
  • ...2 more annotations...
  • An alleged telephone conversation tape proving that Turkish National Intelligence Organization (MİT) involved in arms trading, emerged from the case file regarding ISIL attack in central Anatolian province Niğde. Masum Gök According to the court file regarding the two suspects of ISIL's terrorist action in Niğde, Ayhan Orli and Kassuma code named terrorist Muzaffer Yılmaz had a phone conversation regarding arms trading. According to the tape obtained by Turkish Gendarmarie forces, Arms dealer Ayhan Orli said "Brother, the goods are not in their hands. Intelligence (MİT) is keeping the goods," adding that the Grad rockets are in Mersin province. Here's the full text of the alleged telephone conversation between Ayhan Orli and Muzaffer Yılmaz (Kassuma) in 29 July 2014:
  • Muzaffer Yılmaz (Kassuma): Let's say you have 300 grads (rocket) ok? Ayhan Orli: Yes. Kassuma: Let's say there are 300 grads. Can someone from our side see them? Not from the other side. Either me or Abu Ala or you. Orli: Brother, they don't have the goods. The intelligence (MİT) is keeping them. They don't let them to be transferred. They (Agents) just prepare the goods and say take it from the border gate. Kassuma: Ok. What did Abu Ala said to you? Orli: Abu Ala said alright. He wants the money in cash. Kassuma: When we gonna pay the money? Orli: Today. Kassuma: I did not understand... Orli: Half of the grads are in Mersin. If you don't pay they will not let them to be transferred. If you don't show the draft, they will not bring the goods.
Paul Merrell

The FBI's Own Hostage Crisis - Newsweek - 0 views

  • By  Jeff Stein 0 Share Last Thursday, an urgent call went out from CIA headquarters to the spy agency's director, John Brennan, who was giving a speech to a graduating class at The Farm, the CIA's training facility near Williamsburg, Va. Brennan was warned that the Associated Press and The Washington Post were about to publish the results of a long investigation revealing that Robert Levinson, a retired FBI agent who had gone missing while "on private business" in Iran six years ago, had actually been working for the CIA. A handful of national security reporters in D.C. had known of Levinson's CIA connection for years but agreed to sit on it, accepting the CIA's rationale that publishing the information could endanger the life of Levinson, who was ostensibly pursuing an investigation of cigarette smuggling for a private client when he went missing on Iran's Kish Island in March 2007. Levinson was thought to be in Iranian hands. On Thursday morning, the entreaties of lower ranking CIA officials to the AP and Washington Post not to publish the story were rebuffed. Other high-ranking Obama administration officials, including White House chief of staff Denis McDonough and deputy national security advisor Ben Rhodes, as well as FBI Deputy Director Mark Giuliano, made the same argument to the reporters and their editors. By the time Brennan got his warning from headquarters, however, it was too late to for him to make an appeal. The story, by the AP's Matt Apuzzo and Adam Goldman, who had recently left AP to join The Washington Post, was online.
Paul Merrell

Gallup CEO: Number of Full-Time Jobs as Percent of Population Is Lowest It's Ever Been ... - 0 views

  •     Gallup CEO and Chairman Jim Clifton doubled-down on his comments earlier in the week on the misleading Obama unemployment rate. Obama says the unemployment rate is 5.6% which is very misleading.
  • Clifton went on America’s Newsroom today to explain the misleading government numbers. “The number of full-time jobs, and that’s what everybody wants, as a percent of the total population, is the lowest it’s ever been… The other thing that is very misleading about that number is the more people that drop out, the better the number gets. In the recession we lost 13 million jobs. Only 3 million have come back. You don’t see that in that number. “
Paul Merrell

The Latest European Court of Human Rights Ruling on Accountability for Torture | Just S... - 0 views

  • In another important decision on European participation in the US war on terrorism, the European Court of Human Rights (ECtHR) issued a judgment late last month against Italy for its role in the extraordinary rendition of Egyptian cleric Osama Mustafa Hassan Nasr, better known as Abu Omar. (An English-language summary of ruling is here; the full decision, presently available only in French, is here.) The ruling not only represents a further contribution to the Strasbourg Court’s growing accountability jurisprudence, but also highlights the United States’ own failure to provide any redress to victims of the torture program that it primarily created and operated. The ECtHR’s decision in Nasr v. Italy concerns one of the most notorious instances of extraordinary rendition (i.e., the extrajudicial transfer of an individual to another country for purposes of abusive interrogation). In 2003, Nasr, who had been granted political asylum in Italy, was abducted in broad daylight from a street in Milan and taken to Aviano air base, which is operated by the US Air Force. Nasr was subsequently taken, by way of the US’s Ramstein air base in Germany, to Cairo where he was interrogated by Egyptian intelligence services. Egyptian authorities held Nasr in secret for more than a year and subjected him to repeated torture before releasing him in April 2004. Approximately 20 days after his release — and after submitting a statement to Milan’s public prosecutor describing his abuse — Nasr was rearrested and detained without charges. He was released in 2007, but prohibited from leaving Egypt.
  • The ECtHR ruling centers on Italy’s role in Nasr’s abduction in Milan, his rendition to Egypt where he faced a real risk of abuse, and its subsequent failure to conduct an effective domestic investigation or to provide any redress. The ECtHR found Italy liable for multiple violations of the European Convention on Human Rights (ECHR), including article 3 (the prohibition on inhuman or degrading treatment), article 5 (the right to liberty and security), and article 13 (the right to an adequate remedy). It ordered Italy to pay €70,000 to Nasr and €15,000 to his wife, Nabila Ghali, for the suffering and anguish caused by her husband’s enforced disappearance. The Milan public prosecutor had previously investigated and prosecuted 25 CIA officers, including the agency’s Milan station chief, Robert Seldon Lady, and seven Italian military intelligence officers, for aiding and abetting in Nasr’s abduction and rendition. The United States strenuously opposed the prosecution, warning that it would harm US-Italian relations, and the Italian government successfully challenged much of the evidence on the grounds it could jeopardize national security. The trial court convicted 22 CIA agents in absentia and gave them prison sentences of between six to nine years; a Milan appeals court upheld the convictions and overturned the acquittals of the other three US defendants. Italy’s highest court, however, overturned the conviction of five of the Italian military intelligence agents based on state secrecy grounds. The Italian government has refused to seek the extradition of the convicted US nationals. (For more details, Human Rights Watch has an excellent summary of the proceedings in Italy here.)
  • The ECtHR’s ruling in Nasr strengthens accountability by reinforcing state responsibility for participation in abuses committed during the war on terrorism. It builds on the Strasbourg Court’s prior decisions in El-Masri v. Macedonia and Al-Nashiri v. Poland/Husayn (Abu Zubaydah) v. Poland, which held Macedonia and Poland, respectively, liable for their role in CIA torture and rendition, including (in the case of Poland) for hosting a CIA black site. Nasr, together with El-Masri and al-Nashiri/Husayn, should help discourage a state’s future participation in cross-border counterterrorism operations conducted in flagrant violation of human rights guarantees. While the deterrent value of legal judgments may be uncertain, the recent line of Strasbourg Court decisions raises the costs of aiding and abetting illegal operations, even in the national security context.
  • ...2 more annotations...
  • Nasr also advances the jurisprudence surrounding a state’s duty to conduct an effective domestic investigation into torture. The Strasbourg Court noted that Italian courts had conducted a detailed investigation and that the evidence disregarded by Italy’s highest court on grounds of state secrecy had been sufficient to convict the five Italian military intelligence defendants. It further observed that because the evidence inculpating those defendants had been widely available in the press and on the Internet, the court’s invocation of state secrecy doctrine was not only unpersuasive, but designed to grant impunity to the defendants. Further, the Strasbourg Court noted that the Italian government had never sought the extradition of the convicted CIA agents. As result, the court ruled that despite the efforts of Italian investigators and judges, which had identified the responsible individuals and secured their convictions, the domestic proceedings failed to satisfy the procedural requirements of article 3 of the European Convention (prohibiting torture and other ill-treatment), due to the actions of the executive. This ruling is important because it imposes liability not only where a state takes no steps towards a genuine domestic investigation and prosecution (as in El-Masri and Al-Nashiri/Husayn), but also where efforts by a state’s judges and prosecutors are thwarted in the name of state secrecy.
  • The ECtHR’s rulings on the CIA torture program also highlight the continued absence of accountability in the United States. The US has failed both to conduct an effective criminal investigation of those most responsible for CIA torture and to provide any remedies to victims. In fact, the Obama administration has vigorously opposed the latter at every turn, invoking the same sweeping state secrecy doctrines the ECtHR rejected in El-Masri and Nasr. These rulings will likely catalyze future litigation before the Strasbourg Court and in European domestic courts as well. (Recent actions filed against Germany for its participation in US targeted killings through use of the Ramstein Air Base provide one example of such litigation.) While the ECtHR’s rulings may not spur further efforts in the United States, they reinforce the perception of the United States as an outlier on the important question of accountability for human rights violations.
Paul Merrell

Bigger than Libor? Forex probe hangs over banks - Nov. 20, 2013 - 0 views

  • Yet another dark cloud is looming over global banks as officials examine their behavior in the massive foreign exchange market, threatening to deal a new blow to earnings and reputations. Regulators in the U.S., Europe and Asia are in the early stages of investigating whether traders at the world's top banks manipulated foreign exchange benchmarks to profit at the expense of their clients. Goldman Sachs (GS, Fortune 500), Citigroup (C, Fortune 500), JP Morgan (JPM, Fortune 500), Deutsche Bank (DB), Barclays (BCS), Royal Bank of Scotland (RBS), UBS (UBS) and HSBC (HBCYF)are among the firms in their sights. Financial lawyers say the probe could have steep and uncertain consequences as the impact of currency market abuse would reverberate far beyond Wall Street.
  • It's unwelcome timing for an industry already fighting a raft of legal battles over foreclosure abuses, misleading investors over mortgages and payment protection insurance. And then there's the Libor scandal. A global investigation into the setting of the London interbank lending rate, and related global benchmarks, has so far yielded about $3.6 billion in fines. Penalties for some of the biggest players are still to come. Traders have also faced criminal charges. As the extent of damage caused by Libor-rigging is revealed, lawyers say the probe into fixing currency rates could unfold in a similar way, and rival its impact. London is the center of the loosely regulated foreign exchange market, the biggest in the world's financial system with average daily turnover of $5.3 trillion. Proven abuse in this market would have a significant ripple effect, exposing offending firms to a host of legal action.
  •  
    For more detail see http://money.cnn.com/2013/10/30/news/companies/global-forex-probe/ I'll get excited if and when major bankster executives face prison time. Until then, the "fines" against corporations are just a cost of doing business usually dwarfed by the unjust riches that one group of human beings fraudulently acquires from others. Reality check: corporations are an entirely imaginary legal fiction; it's actually people that are committing the misbehavior. Fines for corporations are as fictional as the corporations themselves; you must prosecute the people and send them to prison to deter bankster misbehavior.  And it is human beings working for another legal fiction, government, who are making the decisions to prosecute corporations rather than misbehaving people. 
Paul Merrell

John McCain, Conductor of the "Arab Spring" and the Caliph , by Thierry Meyssan - 0 views

  • Everyone has noticed the contradiction of those who recently characterized the Islamic Emirate as "freedom fighters" in Syria and who are indignant today faced with its abuses in Iraq. But if that speech is incoherent in itself, it makes perfect sense in the strategic plan: the same individuals were to be presented as allies yesterday and must be as enemies today, even if they are still on orders from Washington. Thierry Meyssan reveals below US policy through the particular case of Senator John McCain, conductor of the "Arab Spring" and longtime partner of Caliph Ibrahim.
  • ohn McCain is known as the leader of the Republicans and unhappy 2008 US presidential candidate. This is, we will see, only the real part of his biography, which serves as a cover to conduct covert actions on behalf of his government. When I was in Libya during the "Western"attack, I was able to view a report of the foreign intelligence services. It stated that, on February 4, 2011 in Cairo, NATO organized a meeting to launch the "Arab Spring" in Libya and Syria. According to this document, the meeting was chaired by John McCain. The report detailed the list of Libyan participants, whose delegation was led by the No. 2 man of the government of the day, Mahmoud Jibril, who abruptly switched sides at the entrance of the meeting to become the opposition leader in exile. I remember that, among the French delegates present, the report quoted Bernard-Henry Lévy, although officially he had never exercised functions within the French government. Many other personalities attended the symposium, including a large delegation of Syrians living abroad.
  • Emerging from the meeting, the mysterious Syrian Revolution 2011 Facebook account called for demonstrations outside the People’s Council (National Assembly) in Damascus on February 11. Although this Facebook account at the time claimed to have more than 40,000 followers, only a dozen people responded to its call before the flashes of photographers and hundreds of police. The demonstration dispersed peacefully and clashes only began more than a month later in Deraa. [1] On February 16, 2011, a demonstration underway in Benghazi, in memory of members of the Islamic Fighting Group in Libya [2] massacred in 1996 in the Abu Selim prison, degenerated into shooting. The next day, a second event, this time in memory of those who died by attacking the Danish consulate during the Muhammad cartoons affair, also degenerated into shooting. At the same time, members of the Islamic Fighting Group in Libya ,coming from Egypt and coordinated by unidentified, hooded individuals, simultaneously attacked four military bases in four different cities. After three days of fighting and atrocities, the rebels launched the uprising of Cyrenaica against Tripolitania [3]; a terrorist attack that the western press falsely presented as a "democratic revolution" against "the regime" of Muammar el-Qaddafi.
  • ...16 more annotations...
  • On February 22nd, John McCain was in Lebanon. He met members of the Future Movement (the party of Saad Hariri) whom he charged to oversee the transfer of arms to Syria around the MP Okab Sakr [4]. Then, leaving Beirut, he inspected the Syrian border and the selected villages including Ersal, which were used as a basis to back mercenaries in the war to come. The meetings chaired by John McCain were clearly the trigger point for a long-prepared Washington plan; the plan that would have the UK and France attack Libya and Syria simultaneously, following the doctrine of "leadership from behind" and the annex of the Treaty of Lancaster House of November 2010. [5]
  • In May 2013, Senator John McCain made his way illegally to near Idleb in Syria via Turkey to meet with leaders of the "armed opposition". His trip was not made public until his return to Washington. [6] This movement was organized by the Syrian Emergency Task Force, which, contrary to its title, is a Zionist Organization led by a Palestinian employee of AIPAC [7]
  • John McCain in Syria. In the foreground at right is the director of the Syrian Emergency Task Force. In the doorway, center, Mohammad Nour.
  • In photographs released at that time, one noticed the presence of Mohammad Nour, a spokesman for the Northern Storm Brigade (of the Al-Nosra Front, that is to say, al-Qaeda in Syria), who kidnapped and held 11 Lebanese Shiite pilgrims in Azaz. [8] Asked about his proximity to al-Qaeda kidnappers, the Senator claimed not to know Mohammad Nour who would have invited himself into this photo. The affair made a great noise and the families of the abducted pilgrims lodged a complaint before the Lebanese judiciary against Senator McCain for complicity in kidnapping. Ultimately, an agreement was reached and the pilgrims were released. Let’s suppose that Senator McCain had told the truth and that he was abused by Mohammad Nour. The object of his illegal trip to Syria was to meet the chiefs of staff of the Free Syrian Army. According to him, the organization was composed "exclusively of Syrians" fighting for "their freedom" against the "Alouite dictatorship” (sic). The tour organizers published this photograph to attest to the meeting.
  • John McCain and the heads of the Free Syrian Army. In the left foreground, Ibrahim al-Badri, with which the Senator is talking. Next, Brigadier General Salim Idris (with glasses).
  • If we can see Brigadier General Idriss Salem, head of the Free Syrian Army, one can also see Ibrahim al-Badri (foreground on the left) with whom the senator is talking. Back from the surprise trip, John McCain claimed that all those responsible for the Free Syrian Army were "moderates who can be trusted" (sic).
  • However, since October 4, 2011, Ibrahim al-Badri (also known as Abu Du’a) was on the list of the five terrorists most wanted by the United States (Rewards for Justice). A premium of up to $ 10 million was offered to anyone who would assist in his capture. [9] The next day, October 5, 2011, Ibrahim al-Badri was included in the list of the Sanctions Committee of the UN as a member of Al Qaeda. [10] In addition, a month before receiving Senator McCain, Ibrahim al-Badri, known under his nom de guerre as Abu Bakr al-Baghdadi, created the Islamic State in Iraq and the Levant (ÉIIL) – all the while still belonging to the staff of the very "moderate" Free Syrian Army. He claimed as his own the attack on the Taj and Abu Ghraib prisons in Iraq, from which he helped between 500 and 1,000 jihadists escape who then joined his organization. This attack was coordinated with other almost simultaneous operations in eight other countries. Each time, the escapees joined the jihadist organizations fighting in Syria. This case is so strange that Interpol issued a note and requested the assistance of the 190 member countries. [11]
  • For my part, I have always said that there was no difference on the ground between the Free Syrian Army, Al-Nosra Front, the Islamic Emirate etc ... All these organizations are composed of the same individuals who continuously change flag. When they pose as the Free Syrian Army, they fly the flag of French colonization and speak only of overthrowing the "dog Bashar." When they say they belong to Al-Nosra Front, they carry the flag of al Qaeda and declare their intention to spread Islam in the world. Finally when they say they are the Islamic Emirate, they brandish the flag of the Caliphate and announce that they will clean the area of all infidels. But whatever the label, they proceed to the same abuses: rape, torture, beheadings, crucifixions. Yet neither Senator McCain nor his companions of the Syrian Emergency Task Force provided the information in their possession on Ibrahim al-Badri to the State Department, nor have they asked for the reward. Nor have they informed the anti-terrorism Committee of the UN.
  • But John McCain is not just the leader of the political opposition to President Obama, he is also one of his senior officials! He is in fact President of the International Republican Institute (IRI), the republican branch of NED / CIA [12], since January 1993. This so-called "NGO" was officially established by President Ronald Reagan to extend certain activities of the CIA, in connection with the British, Canadian and Australian secret services. Contrary to its claims, it is indeed an inter-governmental agency. Its budget is approved by Congress in a budget line dependent of the Secretary of State. It is also because it is a joint agency of the Anglo-Saxon secret services that several states in the world prohibit it from any activity on their territory.
  • he list of interventions by John McCain on behalf of the State Department is impressive. He participated in all the color revolutions of the last twenty years.
  • And an agent that has the best coverage imaginable: he is the official opponent of Barack Obama. As such, he can travel anywhere in the world (he is the most traveled US senator) and meet whoever he wants without fear. If his interlocutors approve Washington policy, he promised them to continue it, if they fight it, he hands over the responsibility to President Obama.
  • In 2003, France’s opposition was not enough to offset the influence of the Committee for the Liberation of Iraq. The United States attacked the country again and this time overthrew President Hussein. Of course, John McCain was a major contributor to the Committee. After handing to a private company the care of plundering the country for a year [17], they tried to partition Iraq into three separate states, but had to give it up due to the resistance of the population. They tried again in 2007, around the Biden-Brownback resolution, but again failed. [18] Hence the current strategy that attempts to achieve this by means of a non-state actor: the Islamic Emirate.
  • The operation was planned well in advance, even before the meeting between John McCain and Ibrahim al-Badri. For example, internal correspondence from the Qatari Ministry of Foreign Affairs, published by my friends James and Joanne Moriarty [19], shows that 5,000 jihadis were trained at the expense of Qatar in NATO’s Libya in 2012, and 2,5 million dollars was paid at the same time to the future Caliph. In January of 2014, the Congress of the United States held a secret meeting at which it voted, in violation of international law, to approve funding for the Al-Nosra Front (Al-Qaeda) and the Islamic emirate in Iraq and the Levant until September 2014. [20] Although it is unclear precisely what was really agreed to during this meeting revealed by the British Reuters news agency [21], and no media US media dared bypass censorship, it is highly probable that the law includes a section on arming and training jihadists.
  • Proud of this US funding, Saudi Arabia has claimed on its public television channel, Al-Arabiya, that the Islamic Emirate was headed by Prince Abdul Rahman al-Faisal, brother of Prince Saud al Faisal (Foreign Minister) and Prince Turki al-Faisal (Saudi ambassador to the United States and the United Kingdom) [22]. The Islamic Emirate represents a new step in the world of mercenaries. Unlike jihadi groups who fought in Afghanistan, Bosnia-Herzegovina and Chechnya around Osama bin Laden, it does not constitute a residual force but actually an army in itself. Unlike previous groups in Iraq, Libya and Syria, around Prince Bandar bin Sultan, they have sophisticated communication services at their disposal for recruitment and civilian officials trained in large western schools capable of instantly taking over the administration of a territory.
  • Brand new Ukrainian weapons were purchased by Saudi Arabia and conveyed by the Turkish secret services who gave them to the Islamic Emirate. Final details were coordinated with the Barzani family at a meeting of jihadist groups in Amman on 1 June 2014. [23] The joint attack on Iraq by the Islamic Emirate and the Kurdistan Regional Government began four days later. The Islamic Emirate seized the Sunni part of the country, while the Kurdistan Regional Government increased its territory by over 40%. Fleeing the atrocities of jihadists, religious minorities left the Sunni area, paving the way for the three-way partition of the country. Violating the Iraqi-US Defense agreement, the Pentagon did not intervene and allowed the Islamic Emirate to continue its conquest and massacres. A month later, while the Kurdish Peshmerga Regional Government had retreated without a fight, and when the emotions of world public opinion became too strong, President Obama gave the order to bomb some positions of the Islamic Emirate. However, according to General William Mayville, director of operations at the headquarters, "These bombings are unlikely to affect the overall capacity of the Islamic Emirate and its activities in other areas of Iraq or Syria ". [24] Obviously, they are not meant to destroy the jihadist army, but only to ensure that each player does not overlap the territory that has been assigned. Moreover, for the moment, they are symbolic and have destroyed only a handful of vehicles. It was ultimately the intervention of the Kurds of the Turkish and Syrian Kurdish PKK which halted the progress of the Islamic Emirate and opened a corridor to allow civilians to escape the massacre.
  • In the latest issue of its magazine, the Islamic Emirate devoted two pages to denounce Senator John McCain as "the enemy" and "double-crosser", recalling his support for the US invasion of Iraq. Lest this accusation remain unknown in the United States, Senator immediately issued a statement calling the Emirate the "most dangerous Islamist terrorist group in the world" [26]. This controversy is there only to distract the gallery. One would like to believe it ... if it were’t for this photograph from May 2013.
  •  
    Thierry Meysann makes the case that Sen. John McCain, working with  was the guiding force behind the Arab Spring, the overthrow of Qadaffi in Libya, and the invasion of Syria by mercenary Islamists, working with a Zionist but deliberately misnomered front group. Thierry goes on to show that McCain played a key role in the creation and deployment of ISIL.  
Paul Merrell

CT Soldier Demands Apology From Karl Rove; Rove Says No Apology Needed For Iraq War - H... - 0 views

  • yan Henowitz says he was 20 years old and a medic with the 2nd Battalion of the 7th Infantry Regiment when he saw his friends “torn apart and Iraqi children screaming for their parents as indiscriminate shrapnel scarred them and us in ways that we will never know,” he told Karl Rove Tuesday at the University of Connecticut in Storrs. “Take responsibility and apologize for your decision in sending a generation to lose their humanity” and “apologize to the millions of fathers and mothers who lost their children on both sides” of the war, Henowitz demanded. WATCH: Karl Rove Calls Sen. Elizabeth Warren 'Pocahontas' Karl Rove calls Sen. Elizabeth Warren “Pocahontas” during an event on UConn's Storrs campus Tuesday evening. Karl Rove calls Sen. Elizabeth Warren “Pocahontas” during an event on UConn's Storrs campus Tuesday evening. See more videos Rove, former deputy chief of staff and senior adviser to President George W. Bush, who was in Storrs at the invitation of UConn College Republicans, thanked Henowitz for his service and said he was sorry for “what you went through,” but said he would not apologize for the war.
  • “It was right to remove Saddam Hussein from power. ... We should be proud of what we were able to do in Iraq and we should be sorry that we left them alone, because when we left them, things deteriorated,” Rove said.
  •  
    Over a million killed in Iraq and that country is in worse turmoil than ever, but Karl Rove is still unrepentant, says that removing Saddam from power was worth it. That war was a highly illegal war of aggression even by the Bush II Administration's own justifications. "Regime change" is not a lawful casus belli. 
Paul Merrell

CISA Security Bill: An F for Security But an A+ for Spying | WIRED - 0 views

  • When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.
  • On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.” The central concern of that letter was how the same data sharing meant to bolster cybersecurity for companies and the government opens massive surveillance loopholes. The bill, as worded, lets a private company share with the Department of Homeland Security any information construed as a cybersecurity threat “notwithstanding any other provision of law.” That means CISA trumps privacy laws like the Electronic Communication Privacy Act of 1986 and the Privacy Act of 1974, which restrict eavesdropping and sharing of users’ communications. And once the DHS obtains the information, it would automatically be shared with the NSA, the Department of Defense (including Cyber Command), and the Office of the Director of National Intelligence.
  • In a statement posted to his website yesterday, Senator Burr wrote that “Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes.” But in fact, the bill’s data sharing isn’t limited to cybersecurity “threat indicators”—warnings of incoming hacker attacks, which is the central data CISA is meant to disseminate among companies and three-letter agencies. OTI’s Greene says it also gives companies a mandate to share with the government any data related to imminent terrorist attacks, weapons of mass destruction, or even other information related to violent crimes like robbery and carjacking. 
  • ...2 more annotations...
  • The latest update to the bill tacks on yet another kind of information, anything related to impending “serious economic harm.” All of those vague terms, Greene argues, widen the pipe of data that companies can send the government, expanding CISA into a surveillance system for the intelligence community and domestic law enforcement. If information-sharing legislation does not include adequate privacy protections, then...It’s a surveillance bill by another name. Senator Ron Wyden
  • “CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”
  •  
    I read the legislation. It's as bad for privacy as described in the aritcle. And its drafting is incredibly sloppy.
Paul Merrell

Hillary Clinton and the Syrian Bloodbath - 0 views

  • In the Milwaukee debate, Hillary Clinton took pride in her role in a recent UN Security Council resolution on a Syrian ceasefire: But I would add this. You know, the Security Council finally got around to adopting a resolution. At the core of that resolution is an agreement I negotiated in June of 2012 in Geneva, which set forth a cease-fire and moving toward a political resolution, trying to bring the parties at stake in Syria together. This is the kind of compulsive misrepresentation that makes Clinton unfit to be President. Clinton's role in Syria has been to help instigate and prolong the Syrian bloodbath, not to bring it to a close.
  •  
    Nice editorial laying out Hillary Clinton's sordid history as a psychopathic criminal warmonger. https://en.wikipedia.org/wiki/Psychopathy
Paul Merrell

FBI Director: Sony's 'Sloppy' North Korean Hackers Revealed Their IP Addresses | WIRED - 0 views

  • The Obama administration has been tightlipped about its controversial naming of the North Korean government as the definitive source of the hack that eviscerated Sony Pictures Entertainment late last year. But FBI director James Comey is standing by the bureau’s conclusion, and has offered up a few tiny breadcrumbs of the evidence that led to it. Those crumbs include the claim that Sony hackers sometimes failed to use the proxy servers that masked the origin of their attack, revealing IP addresses that the FBI says were used exclusively by North Korea. Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has “very high confidence” in the FBI’s attribution of the attack to North Korea. And he named several of the sources of his evidence, including a “behavioral analysis unit” of FBI experts trained to psychologically analyze foes based on their writings and actions. He also said that the FBI compared the Sony attack with their own “red team” simulations to determine how the attack could have occurred. And perhaps most importantly, Comey now says that the hackers in the attack failed on multiple occasions to use the proxy servers that bounce their Internet connection through an obfuscating computer somewhere else in the world, revealing IP addresses that tied them to North Koreans.
  • “In nearly every case, [the Sony hackers known as the Guardians of Peace] used proxy servers to disguise where they were coming from in sending these emails and posting these statements. But several times they got sloppy,” Comey said. “Several times, either because they forgot or because of a technical problem, they connected directly and we could see that the IPs they were using…were exclusively used by the North Koreans.” “They shut it off very quickly once they saw the mistake,” he added. “But not before we saw where it was coming from.” Comey’s brief and cryptic remarks—with no opportunity for followup questions from reporters—respond to skepticism and calls for more evidence from cybersecurity experts unsatisfied with the FBI’s vague statements tying the hack to North Korean government. In a previous public announcement the FBI had said only that it found “similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” as well as IP addresses that matched prior attacks it knows to have originated in North Korea. At that time, the FBI also said it had further evidence matching the tools used in the attack to a North Korean hacking attack that hit South Korean banks and media outlets.
  • Following those elliptical statements, the cybersecurity community demanded more information be released to prove North Korea’s involvement. Some have even signed a petition on the White House website calling for more transparency in the investigation. Well-known security blogger and author Bruce Schneier has compared the FBI’s “trust us” mentality to the claims of the Bush administration about Saddam Hussein’s nonexistent weapons of mass destruction in the run-up to the Iraq War. Without more information, security experts themselves have remained deeply divided in their conclusions about who hacked Sony.
  • ...1 more annotation...
  • That pseudo-explanation will likely do little to quell the security community’s doubts. Even if the hackers appeared to fail to use proxies on some occasions, it could still be very difficult to be sure those “real” IP addresses weren’t proxies themselves designed to serve as further misdirection. And a nagging loose thread remains that the Guardians of Peace hackers in their initial statements to Sony tried to extort money from the company before making any political demands. Sony’s Kim Jong-un assassination comedy “The Interview,” the suppression of which is believed by many to be the North Korean government’s motive in the hack, wasn’t even mentioned by the hackers until long after the intrusion was underway. Comey didn’t address that plot hole in the North Korean explanation in his speech.
Paul Merrell

Edward Snowden: NSA whistleblower answers reader questions | World news | guardian.co.uk - 0 views

  • The 29-year-old former NSA contractor and source of the Guardian's NSA files coverage will – with the help of Glenn Greenwald – take your questions today on why he revealed the NSA's top-secret surveillance of US citizens, the international storm that has ensued, and the uncertain future he now faces. Ask him anything.
  • I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the "consent of the governed" is meaningless.
  • I was debriefed by Glenn and his peers over a number of days, and not all of those conversations were recorded. The statement I made about earnings was that $200,000 was my "career high" salary. I had to take pay cuts in the course of pursuing specific work. Booz was not the most I've been paid.
  • ...17 more annotations...
  • 1) More detail on how direct NSA's accesses are is coming, but in general, the reality is this: if an NSA, FBI, CIA, DIA, etc analyst has access to query raw SIGINT databases, they can enter and get results for anything they want. Phone number, email, user id, cell phone handset id (IMEI), and so on - it's all the same. The restrictions against this are policy based, not technically based, and can change at any time. Additionally, audits are cursory, incomplete, and easily fooled by fake justifications. For at least GCHQ, the number of audited queries is only 5% of those performed.
  • Obama's campaign promises and election gave me faith that he would lead us toward fixing the problems he outlined in his quest for votes. Many Americans felt similarly. Unfortunately, shortly after assuming power, he closed the door on investigating systemic violations of law, deepened and expanded several abusive programs, and refused to spend the political capital to end the kind of human rights violations like we see in Guantanamo, where men still sit without charge.
  • All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped
  • NSA likes to use "domestic" as a weasel word here for a number of reasons. The reality is that due to the FISA Amendments Act and its section 702 authorities, Americans’ communications are collected and viewed on a daily basis on the certification of an analyst rather than a warrant. They excuse this as "incidental" collection, but at the end of the day, someone at NSA still has the content of your communications. Even in the event of "warranted" intercept, it's important to understand the intelligence community doesn't always deal with what you would consider a "real" warrant like a Police department would have to, the "warrant" is more of a templated form they fill out and send to a reliable judge with a rubber stamp.
  • Glenn Greenwald follow up: When you say "someone at NSA still has the content of your communications" - what do you mean? Do you mean they have a record of it, or the actual content? Both. If I target for example an email address, for example under FAA 702, and that email address sent something to you, Joe America, the analyst gets it. All of it. IPs, raw data, content, headers, attachments, everything. And it gets saved for a very long time - and can be extended further with waivers rather than warrants.
  • What are your thoughts on Google's and Facebook's denials? Do you think that they're honestly in the dark about PRISM, or do you think they're compelled to lie? Perhaps this is a better question to a lawyer like Greenwald, but: If you're presented with a secret order that you're forbidding to reveal the existence of, what will they actually do if you simply refuse to comply (without revealing the order)? Answer: Their denials went through several revisions as it become more and more clear they were misleading and included identical, specific language across companies. As a result of these disclosures and the clout of these companies, we're finally beginning to see more transparency and better details about these programs for the first time since their inception. They are legally compelled to comply and maintain their silence in regard to specifics of the program, but that does not comply them from ethical obligation. If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?
  • Some skepticism exists about certain of your claims, including this: I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email. Do you stand by that, and if so, could you elaborate? Answer: Yes, I stand by it. US Persons do enjoy limited policy protections (and again, it's important to understand that policy protection is no protection - policy is a one-way ratchet that only loosens) and one very weak technical protection - a near-the-front-end filter at our ingestion points. The filter is constantly out of date, is set at what is euphemistically referred to as the "widest allowable aperture," and can be stripped out at any time. Even with the filter, US comms get ingested, and even more so as soon as they leave the border. Your protected communications shouldn't stop being protected communications just because of the IP they're tagged with. More fundamentally, the "US Persons" protection in general is a distraction from the power and danger of this system. Suspicionless surveillance does not become okay simply because it's only victimizing 95% of the world instead of 100%. Our founders did not write that "We hold these Truths to be self-evident, that all US Persons are created equal."
  • Edward, there is rampant speculation, outpacing facts, that you have or will provide classified US information to the Chinese or other governments in exchange for asylum. Have/will you? Answer: This is a predictable smear that I anticipated before going public, as the US media has a knee-jerk "RED CHINA!" reaction to anything involving HK or the PRC, and is intended to distract from the issue of US government misconduct. Ask yourself: if I were a Chinese spy, why wouldn't I have flown directly into Beijing? I could be living in a palace petting a phoenix by now.
  • US officials say this every time there's a public discussion that could limit their authority. US officials also provide misleading or directly false assertions about the value of these programs, as they did just recently with the Zazi case, which court documents clearly show was not unveiled by PRISM. Journalists should ask a specific question: since these programs began operation shortly after September 11th, how many terrorist attacks were prevented SOLELY by information derived from this suspicionless surveillance that could not be gained via any other source? Then ask how many individual communications were ingested to acheive that, and ask yourself if it was worth it. Bathtub falls and police officers kill more Americans than terrorism, yet we've been asked to sacrifice our most sacred rights for fear of falling victim to it. Further, it's important to bear in mind I'm being called a traitor by men like former Vice President Dick Cheney. This is a man who gave us the warrantless wiretapping scheme as a kind of atrocity warm-up on the way to deceitfully engineering a conflict that has killed over 4,400 and maimed nearly 32,000 Americans, as well as leaving over 100,000 Iraqis dead. Being called a traitor by Dick Cheney is the highest honor you can give an American, and the more panicked talk we hear from people like him, Feinstein, and King, the better off we all are. If they had taught a class on how to be the kind of citizen Dick Cheney worries about, I would have finished high school.
  • Is encrypting my email any good at defeating the NSA survelielance? Id my data protected by standard encryption? Answer: Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it. 
  • Binney, Drake, Kiriakou, and Manning are all examples of how overly-harsh responses to public-interest whistle-blowing only escalate the scale, scope, and skill involved in future disclosures. Citizens with a conscience are not going to ignore wrong-doing simply because they'll be destroyed for it: the conscience forbids it. Instead, these draconian responses simply build better whistleblowers. If the Obama administration responds with an even harsher hand against me, they can be assured that they'll soon find themselves facing an equally harsh public response. This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. 
  • What would you say to others who are in a position to leak classified information that could improve public understanding of the intelligence apparatus of the USA and its effect on civil liberties?
  • This country is worth dying for.
  • My question: given the enormity of what you are facing now in terms of repercussions, can you describe the exact moment when you knew you absolutely were going to do this, no matter the fallout, and what it now feels like to be living in a post-revelation world? Or was it a series of moments that culminated in action? I think it might help other people contemplating becoming whistleblowers if they knew what the ah-ha moment was like. Again, thanks for your courage and heroism. Answer: I imagine everyone's experience is different, but for me, there was no single moment. It was seeing a continuing litany of lies from senior officials to Congress - and therefore the American people - and the realization that that Congress, specifically the Gang of Eight, wholly supported the lies that compelled me to act. Seeing someone in the position of James Clapper - the Director of National Intelligence - baldly lying to the public without repercussion is the evidence of a subverted democracy. The consent of the governed is not consent if it is not informed.
  • Regarding whether you have secretly given classified information to the Chinese government, some are saying you didn't answer clearly - can you give a flat no? Answer: No. I have had no contact with the Chinese government. Just like with the Guardian and the Washington Post, I only work with journalists.
  • So far are things going the way you thought they would regarding a public debate? – tikkamasala Answer: Initially I was very encouraged. Unfortunately, the mainstream media now seems far more interested in what I said when I was 17 or what my girlfriend looks like rather than, say, the largest program of suspicionless surveillance in human history.
  • Thanks to everyone for their support, and remember that just because you are not the target of a surveillance program does not make it okay. The US Person / foreigner distinction is not a reasonable substitute for individualized suspicion, and is only applied to improve support for the program. This is the precise reason that NSA provides Congress with a special immunity to its surveillance.
  •  
    I particularly liked this Snowden observation as an idea for a constitutional amendment: "This disclosure provides Obama an opportunity to appeal for a return to sanity, constitutional policy, and the rule of law rather than men. He still has plenty of time to go down in history as the President who looked into the abyss and stepped back, rather than leaping forward into it. I would advise he personally call for a special committee to review these interception programs, repudiate the dangerous "State Secrets" privilege, and, upon preparing to leave office, begin a tradition for all Presidents forthwith to demonstrate their respect for the law by appointing a special investigator to review the policies of their years in office for any wrongdoing. There can be no faith in government if our highest offices are excused from scrutiny - they should be setting the example of transparency. " Repeal of the State Secrets privilege would require a constitutional amendment because the Supreme Court decided back when that it is inherent in the President's power as commander in chief of the military forces. In other words, neither Congress nor the courts can second-guess such claims, a huge contributing factor in the over-classification of government records when the real reason is to protect bureaucrats from embarrassment, civil rights suits, and criminal prosecution. It is no accident that we have an Executive Branch that is out-of-control, waging dictatorial powers under the protection of the State Secrets privilege. 
Paul Merrell

Britain has passed the 'most extreme surveillance law ever passed in a democracy' | ZDNet - 0 views

  • It's 2016 going on 1984. The UK has just passed a massive expansion in surveillance powers, which critics have called "terrifying" and "dangerous".
  • The new law, dubbed the "snoopers' charter", was introduced by then-home secretary Theresa May in 2012, and took two attempts to get passed into law following breakdowns in the previous coalition government. Four years and a general election later -- May is now prime minister -- the bill was finalized and passed on Wednesday by both parliamentary houses. But civil liberties groups have long criticized the bill, with some arguing that the law will let the UK government "document everything we do online". It's no wonder, because it basically does. The law will force internet providers to record every internet customer's top-level web history in real-time for up to a year, which can be accessed by numerous government departments; force companies to decrypt data on demand -- though the government has never been that clear on exactly how it forces foreign firms to do that that; and even disclose any new security features in products before they launch.
  • Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens (known as equipment interference), although some protected professions -- such as journalists and medical staff -- are layered with marginally better protections. In other words, it's the "most extreme surveillance law ever passed in a democracy," according to Jim Killock, director of the Open Rights Group. The bill was opposed by representatives of the United Nations, all major UK and many leading global privacy and rights groups, and a host of Silicon Valley tech companies alike. Even the parliamentary committee tasked with scrutinizing the bill called some of its provisions "vague".
  • ...1 more annotation...
  • And that doesn't even account for the three-quarters of people who think privacy, which this law almost entirely erodes, is a human right. There are some safeguards, however, such as a "double lock" system so that the secretary of state and an independent judicial commissioner must agree on a decision to carry out search warrants (though one member of the House of Lords disputed that claim). A new investigatory powers commissioner will also oversee the use of the powers. Despite the uproar, the government's opposition failed to scrutinize any significant amendments and abstained from the final vote. Killock said recently that the opposition Labour party spent its time "simply failing to hold the government to account". But the government has downplayed much of the controversy surrounding the bill. The government has consistently argued that the bill isn't drastically new, but instead reworks the old and outdated Regulation of Investigatory Powers Act (RIPA). This was brought into law in 2000, to "legitimize" new powers that were conducted or ruled on in secret, like collecting data in bulk and hacking into networks, which was revealed during the Edward Snowden affair. Much of those activities were only possible thanks to litigation by one advocacy group, Privacy International, which helped push these secret practices into the public domain while forcing the government to scramble to explain why these practices were legal. The law will be ratified by royal assent in the coming weeks.
Paul Merrell

The Anti-Empire Report #126 - March 7th, 2014 - William Blum - 0 views

  • Since the end of the Cold War the United States has been surrounding Russia, building one base after another, ceaselessly looking for new ones, including in Ukraine; one missile site after another, with Moscow in range; NATO has grabbed one former Soviet Republic after another. The White House, and the unquestioning American mainstream media, have assured us that such operations have nothing to do with Russia. And Russia has been told the same, much to Moscow’s continuous skepticism. “Look,” said Russian president Vladimir Putin about NATO some years ago, “is this is a military organization? Yes, it’s military. … Is it moving towards our border? It’s moving towards our border. Why?” The Holy Triumvirate would love to rip Ukraine from the Moscow bosom, evict the Russian Black Sea Fleet, and establish a US military and/or NATO presence on Russia’s border. (In case you were wondering what prompted the Russian military action.) Kiev’s membership in the EU would then not be far off; after which the country could embrace the joys of neo-conservatism, receiving the benefits of the standard privatization-deregulation-austerity package and join Portugal, Ireland, Greece, and Spain as an impoverished orphan of the family; but no price is too great to pay to for being part of glorious Europe and the West!
  • The Ukrainian insurgents and their Western-power supporters didn’t care who their Ukrainian allies were in carrying out their coup against President Viktor Yanukovych last month … thugs who set policemen on fire head to toe … all manner of extreme right-wingers, including Chechnyan Islamic militants … a deputy of the ultra-right Svoboda Party, part of the new government, who threatens to rebuild Ukraine’s nukes in three to six months. … the snipers firing on the protestors who apparently were not what they appeared to be – A bugged phone conversation between Urmas Paet, the Estonian foreign minister, and EU foreign policy chief Catherine Ashton, reveals Paet saying: “There is now stronger and stronger understanding that behind the snipers it was not Yanukovych, but it was somebody from the new coalition.” … neo-Nazi protestors in Kiev who have openly denounced Jews, hoisting a banner honoring Stepan Bandera, the infamous Ukrainian nationalist who collaborated with the German Nazis during World War II and whose militias participated in atrocities against Jews and Poles. The Israeli newspaper Haaretz reported on February 24 that Ukrainian Rabbi Moshe Reuven Azman advised “Kiev’s Jews to leave the city and even the country.” Edward Dolinsky, head of an umbrella organization of Ukrainian Jews, described the situation for Ukrainian Jews as “dire” and requested Israel’s help. All in all a questionable gang of allies for a dubious cause; reminiscent of the Kosovo Liberation Army thugs Washington put into power for an earlier regime change, and has kept in power since 1999.
  • The now-famous recorded phone conversation between top US State Department official Victoria Nuland and the US ambassador to the Ukraine, wherein they discuss which Ukrainians would be to Washington’s liking in a new government, and which not, is an example of this regime-change mentality. Nuland’s choice, Arseniy Yatseniuk, emerged as interim prime minister. The National Endowment for Democracy, an agency created by the Reagan administration in 1983 to promote political action and psychological warfare against states not in love with US foreign policy, is Washington’s foremost non-military tool for effecting regime change. The NED website lists 65 projects that it has supported financially in recent years in Ukraine. The descriptions NED gives to the projects don’t reveal the fact that generally their programs impart the basic philosophy that working people and other citizens are best served under a system of free enterprise, class cooperation, collective bargaining, minimal government intervention in the economy, and opposition to socialism in any shape or form. A free-market economy is equated with democracy, reform, and growth; and the merits of foreign investment in their economy are emphasized. The idea was that the NED would do somewhat overtly what the CIA had been doing covertly for decades, and thus, hopefully, eliminate the stigma associated with CIA covert activities. Allen Weinstein, who helped draft the legislation establishing NED, declared in 1991: “A lot of what we do today was done covertly 25 years ago by the CIA.”
  • ...2 more annotations...
  • NED, receives virtually all its financing from the US government ($5 billion in total since 1991 ), but it likes to refer to itself as an NGO (Non-governmental organization) because this helps to maintain a certain credibility abroad that an official US government agency might not have. But NGO is the wrong category. NED is a GO. Its long-time intervention in Ukraine is as supra-legal as the Russian military deployment there. Journalist Robert Parry has observed: For NED and American neocons, Yanukovych’s electoral legitimacy lasted only as long as he accepted European demands for new “trade agreements” and stern economic “reforms” required by the International Monetary Fund. When Yanukovych was negotiating those pacts, he won praise, but when he judged the price too high for Ukraine and opted for a more generous deal from Russia, he immediately became a target for “regime change.” Thus, we have to ask, as Mr. Putin asked – “Why?” Why has NED been funding 65 projects in one foreign country? Why were Washington officials grooming a replacement for President Yanukovych, legally and democratically elected in 2010, who, in the face of protests, moved elections up so he could have been voted out of office – not thrown out by a mob? Yanukovych made repeated important concessions, including amnesty for those arrested and offering, on January 25, to make two of his adversaries prime minister and deputy prime minister; all to no avail; key elements of the protestors, and those behind them, wanted their putsch.
  • Carl Gershman, president of NED, wrote last September that “Ukraine is the biggest prize”. The man knows whereof he speaks. He has presided over NED since its beginning, overseeing the Rose Revolution in Georgia (2003), the Orange Revolution in Ukraine (2004), the Cedar Revolution in Lebanon (2005), the Tulip Revolution in Kyrgyzstan (2005), the Green Revolution in Iran (2009), and now Ukraine once again. It’s as if the Cold War never ended. The current unbridled animosity of the American media toward Putin also reflects an old practice. The United States is so accustomed to world leaders holding their tongue and not voicing criticism of Washington’s policies appropriate to the criminality of those policies, that when a Vladimir Putin comes along and expresses even a relatively mild condemnation he is labeled Public Enemy Number One and his words are accordingly ridiculed or ignored. On March 2 US Secretary of State John Kerry condemned Russia’s “incredible act of aggression” in Ukraine (Crimea) and threatened economic sanctions. “You just don’t in the 21st century behave in 19th century fashion by invading another country on completely trumped up pre-text.” Iraq was in the 21st century. Senator John Kerry voted for it. Hypocrisy of this magnitude has to be respected.
Gary Edwards

Articles by Mark Dice - 0 views

  •  
    Libertarian writer and researcher, Mark Dice, has provided a list of articles he has written.  Mark's literary works include: ... "The Illuminati: Facts & Fiction" ...... separates and analyzes the various claims and evidence about the Illuminati, their history, beliefs, members, organizations, and activities. This is a supplement for Mark's previous book - ..... "The Resistance Manifesto",  which focuses more on the New World Order, the 9/11 attacks, Big Brother, and how the political agendas of the elite are fulfilling Bible prophecy.   .... "The New World Order" ....   His website, markdice.com has high light summary of his work that's quite interesting: A detailed analysis of the September 11th attacks and evidence they were aided by elements within U.S. and foreign intelligence agencies to be used as a reason to jumpstart the "War on Terror" and the erosion of privacy and personal liberties outlined in the constitution. The Knights Templar, the real Holy Grail, and the role the Templars played in the formation of the Illuminati mafia. Quotes from the original writings of the Illuminati founders and how the organization drew up plans over 200 years ago to take over every major institution of power and influence in the world through deception and criminal activity. An expose on the Bohemian Grove resort including quotes from President Richard Nixon, senator John Decamp, and information from Chris Jones who worked at the club and became an informant on the activities within the compound. The secrets of Freemasonry and a history of the organization and their influence on society and quotes from the bible of Freemasonry on how the organization knowingly deceives lower level members and nonmembers as to the true secrets and goals of the fraternity. The history and meaning of the mysterious Georgia Guidestones monument and why the elite want to reduce world population to 500 million by killing billions of people through wars and plagues. A history of
Paul Merrell

Gates Foundation Sells Stake in U.K. Prison Operator G4S - Bloomberg - 0 views

  • The Gates Foundation Asset Trust, the entity that manages the investments for the $40.2 billion Bill & Melinda Gates Foundation, has liquidated its entire stake in G4S Plc (GFS), the world’s biggest security-services provider. “Like other large foundations, the foundation trust evaluates its holdings regularly, both for performance and fit,” John Pinette, a spokesman for the Gates family, said in a statement. “As a result of this, the foundation trust no longer holds an investment in G4S.” The Crawley, England-based company has attracted criticism for its contracts with the Israel prison system. The U.K.’s Guardian newspaper said in an editorial on June 4 that G4S should “end the corporation’s participation in Israel’s brutal occupation” in the West Bank. Since 2011, G4S has conducted a series of reviews in relation to its business in Israel, according to the company’s website. Its latest investigation concluded there was “no plausible case against G4S on the ground of alleged war crimes commited by Israel.”
  • The Gates Foundation Asset Trust, the entity that manages the investments for the $40.2 billion Bill & Melinda Gates Foundation, has liquidated its entire stake in G4S Plc (GFS), the world’s biggest security-services provider. “Like other large foundations, the foundation trust evaluates its holdings regularly, both for performance and fit,” John Pinette, a spokesman for the Gates family, said in a statement. “As a result of this, the foundation trust no longer holds an investment in G4S.” The Crawley, England-based company has attracted criticism for its contracts with the Israel prison system. The U.K.’s Guardian newspaper said in an editorial on June 4 that G4S should “end the corporation’s participation in Israel’s brutal occupation” in the West Bank. Since 2011, G4S has conducted a series of reviews in relation to its business in Israel, according to the company’s website. Its latest investigation concluded there was “no plausible case against G4S on the ground of alleged war crimes commited by Israel.”
  •  
    A very high profile win for the Palestinian Boycott, Divestment, and Sanctions ("BSD") movement as the Gates Foundation divests.  Despite the bravado in this article, G4S announced today that it will not renew any of its contracts to provide security services not only in Palestine but also in Israel. http://electronicintifada.net/blogs/ali-abunimah/g4s-end-israel-prison-contracts-pressure-mounts-over-torture-complicity After the Gates Foundation announced its divestment, the UK government announced that it was launching an investigation of G4S activities in Israel.  The BSD movement, modeled on the BSD campaign that brought down the apartheid government of South Africa, has been racking up more and more wins lately, in each week.  BSD activists are in guarded optimism mode because, they say, G4S has previously lied about its plans in regard to Palestine. In addition to providing prison security services, G4S also operates a series of border checkpoints between Israel, Israel settlements in Palestine, and areas of Palestine still occupied by indigenous Palestinians, including checkpoints along the border of the largest open air prison in the world, the Gaza Strip. The BSD movement has also targeted American companies that profit from Israel's illegal occupation and colonization of Palestine, including Caterpillar Corp. The ultra-high profile divestment by the Gates Foundation just might have been a watershed moment that unleashes a torrent of related actions by other investors around the world.   
Brett Tatman

The Culmination of Liberal Incrementalism - 0 views

  •  
    The opening words of H.R. 3200, Mr. Obama s solution to the manufactured health care quot;crisis quot; in the United States reads: quot;A Bill to provide affordable, quality health care for all Americans and reduce the growth in health care spending, and for other purposes. quot; I haven t yet heard comment by the president or by the leaders of C
1 - 20 of 426 Next › Last »
Showing 20 items per page