Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged research

Rss Feed Group items tagged

Paul Merrell

US looks at ways to prevent spying on its spying - 0 views

  • (AP) — The U.S. government is looking at ways to prevent anyone from spying on its own surveillance of Americans' phone records. As the Obama administration considers shifting the collection of those records from the National Security Agency to requiring that they be stored at phone companies or elsewhere, it's quietly funding research to prevent phone company employees or eavesdroppers from seeing whom the U.S. is spying on, The Associated Press has learned. The Office of the Director of National Intelligence has paid at least five research teams across the country to develop a system for high-volume, encrypted searches of electronic records kept outside the government's possession. The project is among several ideas that would allow the government to discontinue storing Americans' phone records, but still search them as needed.
  • Under the research, U.S. data mining would be shielded by secret coding that could conceal identifying details from outsiders and even the owners of the targeted databases, according to public documents obtained by The Associated Press and AP interviews with researchers, corporate executives and government officials.
  • Internal documents describing the Security and Privacy Assurance Research project do not cite the NSA or its phone surveillance program. But if the project were to prove successful, its encrypted search technology could pave the way for the government to shift storage of the records from NSA computers to either phone companies or a third-party organization. A DNI spokesman, Michael Birmingham, confirmed that the research was relevant to the NSA's phone records program. He cited "interest throughout the intelligence community" but cautioned that it may be some time before the technology is used. The intelligence director's office is by law exempt from disclosing detailed budget figures, so it's unclear how much money the government has spent on the SPAR project, which is overseen by the DNI's Intelligence Advanced Research Projects Activity office. Birmingham said the research is aimed for use in a "situation where a large sensitive data set is held by one party which another seeks to query, preserving privacy and enforcing access policies."
  • ...3 more annotations...
  • A Columbia University computer sciences expert who heads one of the DNI-funded teams, Steven M. Bellovin, estimates the government could start conducting encrypted searches within the next year or two. "If the NSA wanted to deploy something like this it would take one to two years to get the hardware and software in place to start collecting data this way either from phone companies or whatever other entity they decide on," said Bellovin, who is also a former chief technologist for the Federal Trade Commission.
  • An encrypted search system would permit the NSA to shift storage of phone records to either phone providers or a third party, and conduct secure searches remotely through their databases. The coding could shield both the extracted metadata and identities of those conducting the searches, Bellovin said. The government could use encrypted searches to ensure its analysts were not leaking information or abusing anyone's privacy during their data searches. And the technique could also be used by the NSA to securely search out and retrieve Internet metadata, such as emails and other electronic records. Some computer science experts are less sanguine about the prospects for encrypted search techniques. Searches could bog down because of the encryption computations needed, said Daniel Weitzner, principal research scientist at MIT's Computer Science and Artificial Intelligence Laboratory and former deputy U.S. chief technology officer for the Obama administration. "There's no silver bullet that guarantees the intelligence community will only have access to the records they're supposed to have access to," Weitzner said. "We also need oversight of the actual use of the data."
  • The encrypted search techniques could make it more difficult for hackers to access the phone records and could prevent phone companies from knowing which records the government was searching. "It would remove one of the big objections to having the phone companies hold the data," Bellovin said. Similar research is underway by researchers at University of California at Irvine; a group from the University of Wisconsin-Madison and the University of Texas at Austin; another group from MIT, Yale and Rensselaer Polytechnic Institute; and a fourth from Stealth Software Technologies, a Los Angeles-based technology company.
Gary Edwards

Startup turns carbon dioxide into fuels - 0 views

  • The research has received funding from the Air Force Office of Scientific Research (AFSOR), the National Science Foundation and the Department of Energy (DOE). The collaboration between Liquid Light and the University was supported by the DOE Small Business Innovation Research program and the AFOSR Small Business Technology Transfer program. Princeton's agreement with Liquid Light allowed the company to continue to collaborate with Bocarsly and his research team. Before long, new discoveries were emerging. "They started noticing interesting chemistry that we wouldn't have predicted," said Bocarsly.
  • The Princeton scientists did some additional studies, and made a surprising discovery: They could turn CO2, which contains only one carbon, into a compound with a carbon-carbon bond, which vastly increases the possibilities for creating commercial applications. This was radical because although the reaction is certainly possible, it is highly unlikely to happen because so many other competing reactions are occurring. "Everyone who electrochemically reduces CO2 today makes compounds with only one carbon," said Bocarsly. "Nobody makes things with carbon-carbon bonds." He paused. "But we can." "That was a very 'wow' moment," recalled Cole, "because we thought that our process could only make methanol. But now we were finding that we could make a variety of products, and that is what makes this technology commercially interesting." She said Liquid Light scientists can now make more than 20 different products from CO2.
  • One of the chemicals Liquid Light can make is isopropanol, commonly known as rubbing alcohol and an important industrial chemical. Another is butanol, which could be commercially important as a fuel. Liquid Light's technology offers the potential to make these chemicals at lower cost than today's methods, which involve starting with fossil fuels such as petroleum and natural gas.
  • ...3 more annotations...
  • Why does pyridinium work so well as a catalyst for the reaction? Based on its structure, the ring-shaped molecule is an unlikely catalyst for this reaction because it shuttles just one electron at a time. But to convert CO2 to methanol requires six electrons, and to make higher-carbon molecules takes even more electrons. Bocarsly and his team — in collaboration with Steven Bernasek, professor of chemistry — are doing studies to understand the steps in the chemical reaction, and they are making rapid progress. "There are clearly some intermediate products formed during the reaction that do not sit around for a long time and are not there in very high concentrations," said Bocarsly.
  • The Princeton team also is studying the factors that determine which products can be made from CO2. The researchers have found that very subtle changes in the electrode surface can lead to production of different chemicals. For example, CO2 plus a pyridinium catalyst and a platinum electrode make methanol. However, the same catalyst and a different electrode give a different product. The team published its findings on how the reaction is affected by catalyst concentration, temperature and pressure in the journal ChemSusChem last year.
  • Citing government statistics that the United States generates about 5.5 billion metric tons of CO2 per year, Teamey said it will not be hard to obtain the starting materials for this new industry. However, the CO2 needs to be relatively pure, a requirement that rules out gasoline tailpipes and coal-fired power plants. Instead, said Teamey, the CO2 could come from manufacturing facilities, such as fertilizer manufacturers and cement plants, which according to Teamey emit some 100 million tons of high-purity CO2 each year.
  •  
    "Today, carbon dioxide (CO2) is a hot topic. Scientists around the globe are searching for ways to store, dispose of, or prevent the formation of the greenhouse gas, which is a major driver of global climate change. Liquid Light hopes to take this concept one step further and harness waste CO2 as a source of carbon to make industrial chemicals and fuels. The technology behind the process is simple: Take CO2 and mix it in a water-filled chamber with an electrode and a catalyst. The ensuing chemical reaction converts CO2 into a new molecule, methanol, which can be used as a fuel, an industrial solvent or a starting material for the manufacture of other chemicals. Liquid Light's founders include Bocarsly and his former graduate student Emily Cole, who earned her Ph.D. from Princeton in 2009. Cole helped revive efforts in Bocarsly's lab to study the conversion of CO2 into usable fuels, which led to the launch of Liquid Light and an ongoing collaboration that Bocarsly said has been extremely positive for his research team at the University. "We've made some discoveries that wouldn't have been made in a university setting, and this has really accelerated the research," Bocarsly said. "It is a very productive relationship." Back in the 1990s, a former Ph.D. student of Bocarsly's named Chao Lin conducted some of the earliest experiments on turning CO2 into methanol. He used palladium metal as the electrode and pyridinium, an inexpensive ring-shaped molecule, as the catalyst. By plugging the electrode into an electrical outlet, he could drive an electrochemical reaction that converted CO2 into methanol. As Bocarsly recalled, Lin was quite excited about his success. However, said Bocarsly, "We published that finding in 1994 and there was approximately zero interest in it." The work languished until 2005 when Cole, then a new graduate student, told Bocarsly she wanted to work on a clean-energy project. She took up the challenge of reproducing Lin's results, but this time
Paul Merrell

U.S. is Responsible for the Ebola Outbreak in West Africa: Liberian Scientist | Global ... - 0 views

  • Dr. Cyril Broderick, A Liberian scientist and a former professor of Plant Pathology at the University of Liberia’s College of Agriculture and Forestry says the West, particularly the U.S. is responsible for the Ebola outbreak in West Africa. Dr. Broderick claims the following in an exclusive article published in the Daily Observer based in Monrovia, Liberia. He wrote the following: The US Department of Defense (DoD) is funding Ebola trials on humans, trials which started just weeks before the Ebola outbreak in Guinea and Sierra Leone. The reports continue and state that the DoD gave a contract worth $140 million dollars to Tekmira, a Canadian pharmaceutical company, to conduct Ebola research. This research work involved injecting and infusing healthy humans with the deadly Ebola virus. Hence, the DoD is listed as a collaborator in a “First in Human” Ebola clinical trial (NCT02041715, which started in January 2014 shortly before an Ebola epidemic was declared in West Africa in March.
  • Is it possible that the United States Department of Defense (DOD) and other Western countries are directly responsible for infecting Africans with the Ebola virus? Dr. Broderick claims that the U.S. government has a research laboratory located in a town called Kenema in Sierra Leone that studies what he calls “viral fever bioterrorism”, It is also the town where he acknowledges that is the “epicentre of the Ebola outbreak in West Africa.” Is it a fact? Is Dr. Broderick a conspiracy theorist? He says that “there is urgent need for affirmative action in protecting the less affluent of poorer countries, especially African citizens, whose countries are not as scientifically and industrially endowed as the United States and most Western countries, sources of most viral or bacterial GMOs that are strategically designed as biological weapons.” He also asks an important question when he says “It is most disturbing that the U. S. Government has been operating a viral hemorrhagic fever bioterrorism research laboratory in Sierra Leone. Are there others?”
  • Dr. Broderick summarized what average people can do to prevent governments, especially those from the West from creating and exposing populations from diseases they experiment with in laboratories: The challenge is global, and we request assistance from everywhere, including China, Japan, Australia, India, Germany, Italy, and even kind-hearted people in the U.S., France, the U.K., Russia, Korea, Saudi Arabia, and anywhere else whose desire is to help. The situation is bleaker than we on the outside can imagine, and we must provide assistance however we can. To ensure a future that has less of this kind of drama, it is important that we now demand that our leaders and governments be honest, transparent, fair, and productively engaged. They must answer to the people. Please stand up to stop Ebola testing and the spread of this dastardly disease.
  • ...1 more annotation...
  • After Guatemala’s ordeal with the U.S. government who deliberately infected people with syphilis, West African nations should be extremely skeptical about the U.S. government’s actions combating Ebola. Professor Francis Boyle of the University of Illinois, College of Law questions the Obama administration’s actions in West Africa. RIA Novosti recently interviewed Boyle and he said the following: US government agencies have a long history of carrying out allegedly defensive biological warfare research at labs in Liberia and Sierra Leone. This includes the Centers for Disease Control and Prevention (CDC), which is now the point agency for managing the Ebola spill-over into the US,” Prof. Francis Boyle said. Why has the Obama administration dispatched troops to Liberia when they have no training to provide medical treatment to dying Africans? How did Zaire/Ebola get to West Africa from about 3,500km away from where it was first identified in 1976?” That’s a good question for Washington, but would the public get any answers? Not anytime soon, since it took more than 62 years for the  Guatemala syphilis experiments to be exposed to the public, not by the US government, by a medical historian.
  •  
    Many years ago, there was a fairly large leak of U.S. Army Chemical, Bological, and Radiological Warfare Command documents that I used to have copies of. They left no doubt that ebola was one of the biological warfare agents the Ft. Detrick boys were playing with. Supposedly, the U.S. has since ceased all experimentation with such agents for offensive purposes, but still continues such research for defensive purposes. So, while I'd like to see more confirmation, this report is not beyond credibility to me. 
Paul Merrell

Information Awareness Office - Wikipedia, the free encyclopedia - 0 views

  • The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security, by achieving Total Information Awareness (TIA). This would be achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.[1] This information would then be analyzed to look for suspicious activities, connections between individuals, and "threats".[2] Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.[2] Following public criticism that the development and deployment of this technology could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded, and merely run under different names.[3][4][5][6]
  • The IAO was established after Admiral John Poindexter, former United States National Security Advisor to President Ronald Reagan, and SAIC executive Brian Hicks approached the US Department of Defense with the idea for an information awareness program after the attacks of September 11, 2001.[5] Poindexter and Hicks had previously worked together on intelligence-technology programs for the Defense Advanced Research Projects Agency. DARPA agreed to host the program and appointed Poindexter to run it in 2002. The IAO began funding research and development of the Total Information Awareness (TIA) Program in February 2003 but renamed the program the Terrorism Information Awareness Program in May that year after an adverse media reaction to the program's implications for public surveillance. Although TIA was only one of several IAO projects, many critics and news reports conflated TIA with other related research projects of the IAO, with the result that TIA came in popular usage to stand for an entire subset of IAO programs. The TIA program itself was the "systems-level" program of the IAO that intended to integrate information technologies into a prototype system to provide tools to better detect, classify, and identify potential foreign terrorists with the goal to increase the probability that authorized agencies of the United States could preempt adverse actions. As a systems-level program of programs, TIA's goal was the creation of a "counterterrorism information architecture" that integrated technologies from other IAO programs (and elsewhere, as appropriate). The TIA program was researching, developing, and integrating technologies to virtually aggregate data, to follow subject-oriented link analysis, to develop descriptive and predictive models through data mining or human hypothesis, and to apply such models to additional datasets to identify terrorists and terrorist groups.
  • Among the other IAO programs that were intended to provide TIA with component data aggregation and automated analysis technologies were the Genisys, Genisys Privacy Protection, Evidence Extraction and Link Discovery, and Scalable Social Network Analysis programs. On August 2, 2002, Dr. Poindexter gave a speech at DARPAtech 2002 entitled "Overview of the Information Awareness Office"[7] in which he described the TIA program. In addition to the program itself, the involvement of Poindexter as director of the IAO also raised concerns among some, since he had been earlier convicted of lying to Congress and altering and destroying documents pertaining to the Iran-Contra Affair, although those convictions were later overturned on the grounds that the testimony used against him was protected.
  • ...1 more annotation...
  • On January 16, 2003, Senator Russ Feingold introduced legislation to suspend the activity of the IAO and the Total Information Awareness program pending a Congressional review of privacy issues involved.[8] A similar measure introduced by Senator Ron Wyden would have prohibited the IAO from operating within the United States unless specifically authorized to do so by Congress, and would have shut the IAO down entirely 60 days after passage unless either the Pentagon prepared a report to Congress assessing the impact of IAO activities on individual privacy and civil liberties or the President certified the program's research as vital to national security interests. In February 2003, Congress passed legislation suspending activities of the IAO pending a Congressional report of the office's activities (Consolidated Appropriations Resolution, 2003, No.108–7, Division M, §111(b) [signed Feb. 20, 2003]). In response to this legislation, DARPA provided Congress on May 20, 2003 with a report on its activities.[9] In this report, IAO changed the name of the program to the Terrorism Information Awareness Program and emphasized that the program was not designed to compile dossiers on US citizens, but rather to research and develop the tools that would allow authorized agencies to gather information on terrorist networks. Despite the name change and these assurances, the critics continued to see the system as prone to potential misuse or abuse. As a result House and Senate negotiators moved to prohibit further funding for the TIA program by adding provisions to the Department of Defense Appropriations Act, 2004[10] (signed into law by President Bush on October 1, 2003). Further, the Joint Explanatory Statement included in the conference committee report specifically directed that the IAO as program manager for TIA be terminated immediately.[11]
  •  
    What became today's NSA programs of public concern were the brain child of Admiral John Poindexter and a private sector compadre. U.S. v. Poindexter, 951 F.2d 369, 390 (D.C. Cir. 1991). Poindexter had previously been convicted on five criminal counts involving lying to Congress and destruction and alteration of evidence.  His convictions were overturned on appeal on grounds that some of the testimony against him had been immunized from use in prosecution by Congress. There was no claim on appeal that any such evidence had been false.  86 U.S. v. Poindexter, 951 F.2d 369, 390 (D.C. Cir. 1991), . For far more detail of the evidence against Poindexter, see the August 4, 1993 final report by independent prosecutor Lawrence Walsh, Vol 1, Part 4 section 3, .  So one might say that today's controversial NSA activities were the idea of and conceived by a government official more than willing to lie to Congress and  to destroy and alter evidence. 
Gary Edwards

WW3 - What is the New World Order (NWO)? - 0 views

  •  
    So, i'm researching Albert Pike and his 1871 Luciferian dream wher a plan for three world wars set the stage for the rule of a New World Order is laid out and described.  And i find this incredible piece of research.  This is actually page 3 in a series of Web articles that begins with "The Conspiracy", leads to Albert Pike and how the Illuminati Luciferians infiltrated many gorups and organizations, clipping off the leadership and subsuming those select individuals into a super secret Luciferian order.  Incredible.  This page describes "The New World Order".  Chilling. excerpt: Introduction The following article is extracted from an excellent analysis of the New World Order by author Ken Adachi which can be found at educate-yourself.org . The term New World Order (NWO) has been used by numerous politicians through the ages , and is a generic term used to refer to a worldwide conspiracy being orchestrated by an extremely powerful and influential group of genetically-related individuals (at least at the highest echelons) which include many of the world's wealthiest people, top political leaders, and corporate elite, as well as members of the so-called Black Nobility of Europe (dominated by the British Crown) whose goal is to create a One World (fascist) Government, stripped of nationalistic and regional boundaries, that is obedient to their agenda. Listen to the Zionist* banker, Paul Warburg: "We will have a world government whether you like it or not. The only question is whether that government will be achieved by conquest or consent." (February 17, 1950, as he testified before the US Senate). Their intention is to effect complete and total control over every human being on the planet and to dramatically reduce the world's population by two thirds. While the name New World Order is the term most frequently used today to loosely refer to anyone involved in this conspiracy, the study of exactly who makes up this group is a complex and intricate
Gary Edwards

Dreams From My Real Father (Full Movie) | Before It's News - 0 views

  •  
    Incredible!!  I saw the interview Alex Jones of InfoWars had with Joel Gilbert about his research into the real Barack Housain Davis-Obama.   this is the movies Joel made based on those years of research. Note that Joel's research indicates that Obama's real father is the Marxist Frank Marshall Davis.  Which means he is a natural born citizen.  Albeit one that changed his citizenship when his mother married Sotero, the Indonesian.  Obama never reinstated his lost citizenship, failing to register for the draft at 18 yrs of age.  He also attended  aprivate school in Hawaii and Occidental on a foreign exchange student scholarship. excerpt: Published on Jul 6, 2012 by Rickvsnewworldorder What are the true origins of Obama's life and politics? At age 18, Barack Obama admittedly arrived at Occidental College a committed revolutionary Marxist. What was the source of Obama's foundation in Marxism? Throughout his 2008 Presidential campaign and term in office, questions have been raised regarding Barack Obama's family background, economic philosophy, and fundamental political ideology. Dreams from My Real Father is the alternative Barack Obama "autobiography," offering a divergent theory of what may have shaped our 44th President's life and politics. In Dreams from My Real Father, Barack Obama is portrayed by a voiceover actor who chronicles Barack Obama's life journey in socialism, from birth through his election to the Presidency. The film begins by presenting the case that Barack Obama's real father was Frank Marshall Davis, a Communist Party USA propagandist who likely shaped Obama's world view during his formative years. Barack Obama sold himself to America as the multi-cultural ideal, a man who stood above politics. Was the goat herding Kenyan father only a fairy tale to obscure a Marxist agenda, irreconcilable with American values? This fascinating narrative is based in part on 2 years of research, interviews, newly unearthed footage and photos, and the wr
Paul Merrell

Researcher who joked about hacking a jet plane barred from United flight | Ars Technica - 0 views

  • A researcher who specializes in the security of commercial airplanes was barred from a United Airlines flight Saturday, three days after he tweeted a poorly advised joke mid-flight about hacking a key communications system of the plane he was in. Chris Roberts was detained by FBI agents on Wednesday as he was deplaning his United flight, which had just flown from Denver to Syracuse, New York. While on board the flight, he tweeted a joke about taking control of the plane's engine-indicating and crew-alerting system, which provides flight crews with information in real-time about an aircraft's functions, including temperatures of various equipment, fuel flow and quantity, and oil pressure. In the tweet, Roberts jested: "Find myself on a 737/800, lets see Box-IFE-ICE-SATCOM, ? Shall we start playing with EICAS messages? 'PASS OXYGEN ON' Anyone ? :)" FBI agents questioned Roberts for four hours and confiscated his iPad, MacBook Pro, and storage devices.
  •  
    Bruce Schneier's take on this: "But to me, the fascinating part of this story is that a computer was monitoring the Twitter feed and understood the obscure references, alerted a person who figured out who wrote them, researched what flight he was on, and sent an FBI team to the Syracuse airport within a couple of hours. There's some serious surveillance going on. Now, it is possible that Roberts was being specifically monitored. He is already known as a security researcher who is working on avionics hacking. But still..." Some serious surveillance, indeed. And does the FBI have its own social media monitoring program or is this the result of a tip from the NSA, which assuredly does have a social media surveillance capability?  Consider the short time between the post and interception by FBI agents at the airport and all of the steps it takes to accomplish that feat. I come up with a system that is directly harvesting tweets as they are transmitted, not a web crawler. A huge amount of automation to identify the tweet as a potential threat and get it to someone with the vocabulary to understand the message. And another round of automation to get the import of the post to an FBI dispatcher who sends the agents to the airport armed with the information needed to question the tweeter for four hours on an esoteric subject. That's astounding to me.  
Paul Merrell

After Criticism, Washington Post Disavows 'Russian Propaganda' Blacklist Of Indie Media - 0 views

  • AUSTIN, Texas — Amid a wave of widespread criticism and legal threats, the Washington Post has added a lengthy editor’s note to an article which alleged that a host of independent media websites were spreading Russian propaganda. Washington Post added editor's note to top of "Russian propaganda" story after being called out for shoddy reportinghttps://t.co/dWKbZJGS9a pic.twitter.com/skGiZUX2Ls — Ben Norton (@BenjaminNorton) December 7, 2016 The article, written by Craig Timberg and published on Nov. 24, relied largely on information compiled by PropOrNot, an anonymous group that claims to be comprised of media analysts and researchers. At the time the Post story was published, the group’s homepage featured a list of 200 websites, including MintPress News and many other well-established independent media outlets, which the organization alleges are either deliberately or inadvertently spreading Russian propaganda. Among other criticisms levied against the group, PropOrNot’s research depends on overly broad criteria. According to its own stated methodology, criticism of the ”US, Obama, Hillary Clinton, the EU, Angela Merkel, NATO, Ukraine, Jewish people, US allies, the ‘mainstream media,’ and democrats, the center-right or center-left, and moderates of all stripes,” would be grounds for inclusion on “The List.” The Post added an editor’s note to the article on Wednesday in an apparent attempt to distance the newspaper from the controversy. “The Washington Post on Nov. 24 published a story on the work of four sets of researchers who have examined what they say are Russian propaganda efforts to undermine American democracy and interests,” the note begins.
  • While Timberg’s article does refer to the work of multiple researchers, the bulk of the report relied on allegations made by PropOrNot. The Washington Post continued: “One of them was PropOrNot, a group that insists on public anonymity, which issued a report identifying more than 200 websites that, in its view, wittingly or unwittingly published or echoed Russian propaganda. A number of those sites have objected to being included on PropOrNot’s list, and some of the sites, as well as others not on the list, have publicly challenged the group’s methodology and conclusions. The Post, which did not name any of the sites, does not itself vouch for the validity of PropOrNot’s findings regarding any individual media outlet, nor did the article purport to do so.” Numerous websites, including MintPress, have objected to their inclusion on “The List.” On Tuesday, James Moody, the lawyer representing the publisher of the website Naked Capitalism, demanded a formal retraction and public apology on Tuesday. Moody wrote: “You did not provide even a single example of ‘fake news’ allegedly distributed or promoted by Naked Capitalism or indeed any of the 200 sites on the PropOrNot blacklist. You provided no discussion or assessment of the credentials or backgrounds of these so-called ‘researchers’ (Clint Watts, Andrew Weisburd, and J.M. Berger and the “team” at PropOrNot), and no discussion or analysis of the methodology, protocol or algorithms such ‘researchers’ may or may not have followed.” Backlash against both PropOrNot and the Post’s story hasn’t just come from media outlets included on “The List,” though.
  • “The group promoted by the Post … embodies the toxic essence of Joseph McCarthy, but without the courage to attach individual names to the blacklist,” wrote Ben Norton and Glenn Greenwald in The Intercept, which was not featured on the PropOrNot list, on Nov. 26. The Post’s editor’s note concludes: “Since publication of The Post’s story, PropOrNot has removed some sites from its list.” However, MintPress and Naked Capitalism remain on “The List,” as do respected alternative and independent media sites Antiwar.com, Black Agenda Report, Truthout, and Truthdig. Overall, the Post’s new position seemed poorly received by many of the media analysts who have criticized the story. On Wednesday evening, Adam Johnson, a reporter who writes for Fairness and Accuracy in Reporting, tweeted that the Post editors who refuse to retract the story are “a bunch of cowards.” what a bunch of cowards. "This blacklist that served as the entire news basis of our piece is bullshit but we wont retract the story" https://t.co/V5ZSwSMgTg — Adam H. Johnson (@adamjohnsonNYC) December 7, 2016 Timberg’s article appeared amid widespread outcry over the apparent threat of “fake news” against American democracy. Kevin Gosztola, managing editor of Shadowproof, told MintPress editor-in-chief Mnar Muhawesh that the rush to create “blacklists” of media outlets undermines the freedom of the press.
  • ...1 more annotation...
  • “When you start to put people on lists you’re actually diminishing speech,” Gosztola said in an interview with Muhawesh for “Behind the Headline.”
  •  
    The Washington Post backpedals from its "fake news" story.
Paul Merrell

Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People - Rebecca J... - 0 views

  • In defending the NSA's telephony metadata collection efforts, government officials have repeatedly resorted to one seemingly significant detail: This is just metadata—numbers dialed, lengths of calls. "There are no names, there’s no content in that database," President Barack Obama told Charlie Rose in June. No names; just metadata. New research from Stanford demonstrates the silliness of that distinction. Armed with very sparse metadata, Jonathan Mayer and Patrick Mutchler found it easy—trivially so—to figure out the identity of a caller. <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drebecca-j-rosen%26title%3Dstanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people%26pos%3Din-article&sz=300x185&c=387748957&tile=3" title=""><img src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drebecca-j-rosen%26title%3Dstanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people%26pos%3Din-article&sz=300x185&c=387748957&tile=3" alt="" /></a></div> Mayer and Mutchler are running an experiment which works with volunteers who agree to use an Android app, MetaPhone, that allows the researchers access to their metadata. Now, using that data, Mayer and Mutchler say that it was hardly any trouble at all to figure out who the phone numbers belonged to, and they did it in just a few hours.
  • They write: We randomly sampled 5,000 numbers from our crowdsourced MetaPhone dataset and queried the Yelp, Google Places, and Facebook directories. With little marginal effort and just those three sources—all free and public—we matched 1,356 (27.1%) of the numbers. Specifically, there were 378 hits (7.6%) on Yelp, 684 (13.7%) on Google Places, and 618 (12.3%) on Facebook. What about if an organization were willing to put in some manpower? To conservatively approximate human analysis, we randomly sampled 100 numbers from our dataset, then ran Google searches on each. In under an hour, we were able to associate an individual or a business with 60 of the 100 numbers. When we added in our three initial sources, we were up to 73. How about if money were no object? We don’t have the budget or credentials to access a premium data aggregator, so we ran our 100 numbers with Intelius, a cheap consumer-oriented service. 74 matched.1 Between Intelius, Google search, and our three initial sources, we associated a name with 91 of the 100 numbers.
  • Their results weren't perfect (and they note that the Intelius data was particularly spotty), but they didn't even try all that hard. "If a few academic researchers can get this far this quickly, it’s difficult to believe the NSA would have any trouble identifying the overwhelming majority of American phone numbers," they conclude. It's also difficult to believe they wouldn't try. As federal district judge Richard Leon wrote in his decision last week, "There is also nothing stopping the Government from skipping the [National Security Letter] step altogether and using public databases or any of its other vast resources to match phone numbers with subscribers."
  •  
    Another Obama/NSA lie exposed. 
Paul Merrell

iSpy: The CIA Campaign to Steal Apple's Secrets - 0 views

  • ESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.
  • The CIA declined to comment for this story. The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store. The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode. Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”
  • Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows. The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies. “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”
Gary Edwards

75 Economic Numbers From 2012 That Are Almost Too Crazy To Believe - 0 views

  •  
    Thanks to Marbux we have this extraordinary collection of facts and figures describing the economic catastrophe that has hit the USA.  excerpt: "What a year 2012 has been!  The mainstream media continues to tell us what a "great job" the Obama administration and the Federal Reserve are doing of managing the economy, but meanwhile things just continue to get even worse for the poor and the middle class.  It is imperative that we educate the American people about the true condition of our economy and about why all of this is happening.  If nothing is done, our debt problems will continue to get worse, millions of jobs will continue to leave the country, small businesses will continue to be suffocated, the middle class will continue to collapse, and poverty in the United States will continue to explode.  Just "tweaking" things slightly is not going to fix our economy.  We need a fundamental change in direction.  Right now we are living in a bubble of debt-fueled false prosperity that allows us to continue to consume far more wealth than we produce, but when that bubble bursts we are going to experience the most painful economic "adjustment" that America has ever gone through.  We need to be able to explain to our fellow Americans what is coming, why it is coming and what needs to be done.  Hopefully the crazy economic numbers that I have included in this article will be shocking enough to wake some people up. The end of the year is a time when people tend to gather with family and friends more than they do during the rest of the year.  Hopefully many of you will use the list below as a tool to help start some conversations about the coming economic collapse with your loved ones.  Sadly, most Americans still tend to doubt that we are heading into economic oblivion.  So if you have someone among your family and friends that believes that everything is going to be "just fine", just show them these numbers.  They are a good summary of the problems that the U
Gary Edwards

Gold Price "Manipulated For A Decade", Repeatedly Slammed Lower, Bloomberg Reports | Ze... - 0 views

  •  
    "While the FT promptly retracted an article on precisely the topic of gold manipulation from earlier this week (recorded for posterity here), Bloomberg appears to not have had the same "editorial" concerns and pressures, and today released an article once again slamming the final conspiracy theory that while every other asset class is manipulated, gold is in a pristine class of its own, untouched by close-banging, price fixing traders or central bankers, and reports that "the London gold fix, the benchmark used by miners, jewelers and central banks to value the metal, may have been manipulated for a decade by the banks setting it, researchers say." Of course, over the past 5 years we have reported time and again how official gold manipulation started in earnest some time in the 1960s (who can forget the "reshuffle club") but we will start with a decade. Here is what BBG finds: Unusual trading patterns around 3 p.m. in London, when the so-called afternoon fix is set on a private conference call between five of the biggest gold dealers, are a sign of collusive behavior and should be investigated, New York University's Stern School of Business Professor Rosa Abrantes-Metz and Albert Metz, a managing director at Moody's Investors Service, wrote in a draft research paper.   "The structure of the benchmark is certainly conducive to collusion and manipulation, and the empirical data are consistent with price artificiality," they say in the report, which hasn't yet been submitted for publication. "It is likely that co-operation between participants may be occurring."   The paper is the first to raise the possibility that the five banks overseeing the century-old rate -- Barclays Plc, Deutsche Bank AG, Bank of Nova Scotia, HSBC Holdings Plc and Societe Generale SA -- may have been actively working together to manipulate the benchmark. It also adds to pressure on the firms to overhaul the way the rate is calculated. Authorities around the world, already inv
Paul Merrell

Researchers Connect 91% of Numbers With Names In Metadata Probe - Slashdot - 0 views

  • "One of the key tenets of the argument that the National Security Agency and some lawmakers have constructed to justify the agency's collection of phone metadata is that the information it's collecting, such as phone numbers and length of call, can't be tied to the callers' names. However, some quick investigation by some researchers at Stanford University who have been collecting information voluntarily from Android users found that they could correlate numbers to names with very little effort. The Stanford researchers recently started a program called Metaphone that gathers data from volunteers with Android phones. They collect data such as recent phone calls and text messages and social network information. The goal of the project, which is the work of the Stanford Security Lab, is to draw some lines connecting metadata and surveillance. As part of the project, the researchers decided to select a random set of 5,000 numbers from their data and see whether they could connect any of them to subscriber names using just freely available Web tools. The result: They found names for 27 percent of the numbers using just Google, Yelp, Facebook and Google Places. Using some other online tools, they connected 91 of 100 numbers with names."
Paul Merrell

Secrecy News - from the FAS Project on Government Secrecy - 0 views

  • New or newly updated reports from the Congressional Research Service that Congress has withheld from online public distribution include the following.
  • Cybersecurity: Authoritative Reports and Resources, October 25, 2013
  • “The President… recognizes that U.S. citizens and institutions should have a reasonable expectation of privacy from foreign or domestic intercept when using the public telephone system,” according to National Security Decision Memorandum 338 of September 1, 1976 (document 180).
  • ...2 more annotations...
  • The Central Intelligence Agency today asked a court to allow more time to declassify its response to the Senate Select Committee on Intelligence report on CIA rendition, detention and interrogation (RDI) activities, which itself is undergoing a time-consuming declassification review. “This complex process requires the careful review of over 500 pages of highly classified material. In addition, sufficient time must be allowed not only for coordination with other agencies, but — after completion of declassification review — for implementation of security measures to ensure the safety of U.S. personnel and facilities overseas,” according to a May 15 motion filed by the government in a FOIA lawsuit brought by the ACLU. “Due to the fluid nature of this process, aspects of which are beyond the CIA’s control, the Agency does not yet have a firm date by which it can complete the processing of the CIA Response [to the SSCI report] and the so-called Panetta Report, although it hopes the declassification review and accompanying processing of those documents can be completed this summer.” The CIA therefore requested an extension of time to respond, to which the ACLU plaintiffs did not consent.
  • With respect to the Senate Intelligence Committee report itself, the government promised an “expeditious” declassification review of the executive summary, findings, and conclusions. “While all declassification decisions are guided by the need to protect national security interests, the President has expressed a clear intent to declassify as much of the executive summary, findings, and conclusions of the SSCI Report as possible, and intends the declassification process to be expeditious,” the government motion said. According to an April 18 letter from then-White House counsel Katherine Ruemmler, appended to the new motion, “The President supports making public the Committee’s important review of the historical RDI program, as he believes that public scrutiny and debate will help to inform the public understanding of the program and to ensure that such a program will not be contemplated by a future administration.
  •  
    Congress in its wisdom does not publish all Congressional Research Service reports online. The Federation of American Scientists Project on Government Secrecy fills that gap. The report linked in this bookmark is an amazing compendium of research resources on the topic of cybersecurity, with a heavy emphasis on cloud computing. 
Paul Merrell

MoA - Scientists Raise Alarm Over U.S. Bio-Weapon Programs - 0 views

  • Recent evidence about deadly tests of biological substances in Tbilisi, Georgia raised alarm about U.S. biological weapon research in foreign countries. European scientist are extremely concerned about a dubious research program, financed by the Pentagon, that seems designed to spread diseases to crops, animals and people abroad. The creation of such weapons and of special ways to distribute them is prohibited under national and international law. The U.S. is running biological weapon research across the globe: Bio warfare scientists using diplomatic cover test man-made viruses at Pentagon bio laboratories in 25 countries across the world. These US bio-laboratories are funded by the Defense Threat Reduction Agency (DTRA) under a $ 2.1 billion military program– Cooperative Biological Engagement Program (CBEP), and are located in former Soviet Union countries such as Georgia and Ukraine, the Middle East, South East Asia and Africa. Until the mid nineteen-seventies the U.S. military tested biological warfare weapons on U.S. people, sometimes over large areas and on specific races. After a Congress investigation revealed the wide ranging program such testing was moved abroad. Private companies use U.S. government controlled laboratories in foreign countries for secret biological research under contract of the U.S. military, the CIA and the Department of Homeland Security. Last month the Bulgarian journalist Dilyana Gaytandzhieva reported of one of these U.S. controlled bio-laboratories: The US Embassy to Tbilisi transports frozen human blood and pathogens as diplomatic cargo for a secret US military program. Internal documents, implicating US diplomats in the transportation of and experimenting on pathogens under diplomatic cover were leaked to me by Georgian insiders. According to these documents, Pentagon scientists have been deployed to the Republic of Georgia and have been given diplomatic immunity to research deadly diseases and biting insects at the Lugar Center – the Pentagon biolaboratory in Georgia’s capital Tbilisi. Al Mayadeen TV broadcasted a video reportage about the laboratory and its deadly effects on Georgian 'patients'.
Paul Merrell

55% Of Americans Want Independent To Run Against Trump, Clinton - 1 views

  • It’s happening! According to a new poll, Americans have finally maxed out their tolerance for “lesser evils” in presidential politics. The survey, published by independent research firm, Data Targeting, found a majority of Americans now want an independent candidate to take on Hillary Clinton and Donald Trump — two of the most disliked candidates in recent history. Researchers for the poll, conducted among 997 registered voters via both home and mobile phones this month, reported that “58% of respondents are dissatisfied with the current group of Republican and Democratic candidates for President” — and that 55 percent believe there should be an independent ticket (it is unclear why 3 percent apparently dislike the current candidates but puzzlingly do not think there should be another option). In perhaps the most extreme finding of the analysis, “a shocking 91% of voters under the age of 29 favor having an independent candidate on the ballot.” Considering younger generations’ lack of party allegiance and disillusionment with the status quo, their disapproval of Clinton and Trump seems predictable — but 91 percent constitutes near-total rejection. Tellingly, over 68 percent of participants in the poll were over the age of 50. Older generations are more likely to be attached to party identity, making their acceptance of other options a telling indicator of the populace’s distaste for their current options.
  • The United States has notoriously clung to the narrow two-party duopoly for most of its history — even as the crafters of the Constitution, for all their staggering shortcomings, cautioned of the dangers of such myopic political representation and party allegiance. But considering the unpopularity of Trump and Clinton — the former has a 55 percent unfavorability liking, the latter 56 percent — Americans appear to be turning a corner on their perception of who deserves power in politics. In fact, 65 percent of poll respondents said they would be “at least somewhat, pretty or very willing to support a candidate for President who is not Donald Trump or Hillary Clinton” — a stark difference from 2012, when Americans resisted deviation from the norm. A Gallup poll from that year highlighted the nation’s two-party rigidity. “U.S. registered voters show limited support for third-party candidates…with the vast majority preferring Barack Obama or Mitt Romney,” analysts reported just a few months before the 2012 general election. They concluded about 5% of Americans would vote for a third-party candidate that year. Just four years later, however, that figure has exploded. As the Data Testing report explains: “In a ballot test against Clinton and Trump, a truly independent candidate starts off with 21% of the vote,” already far greater than 2012’s 5%. “But this number increases to 29% in the ‘Big Sky’ region, 30% in ‘New England’ and 28% in the ‘West’ region.”
  • Independents were even more willing to break away from the options they’ve been given. “Among voters with an unfavorable opinion of both Trump and Clinton, the independent actually wins the ballot test,” researchers reported, noting that of the three options, 7 percent of respondents chose Clinton, 11 percent chose Trump, and a staggering 56 percent chose the unspecified third-party candidate. Though these ballot test findings are lower than the statistic that 65 percent would be open to breaking away from Clinton and Trump, the increase of third-party interest from 2012 remains palpably significant. It should be noted that Data Targeting is a GOP-affiliated political research firm, however, the results indicate little room for bias. In fact, they are paramount in an election where, as the analysis notes, Clinton and Trump provoke more animosity than enthusiasm. Perhaps highlighting lingering attachments to two-party thinking, Clinton’s highest unfavorability rating (78 percent) came from Republicans, while Trump’s highest unfavorability rating (71 percent) came from Democrats. Regardless, it is undeniable Americans are fed up with the system at large. According to another recent poll, just over half believe elections are rigged. Interest in third-party options, like the Libertarian and Green parties, is also steadily growing. As Ron Paul, the outspoken former presidential candidate, whose 2012 campaign wasundermined by the media and Republican establishment, recently said, “I’ve never bought into this idea that the lesser of two evils is a good idea” — and Americans increasingly agree. According to a Gallup poll released last year, 43 percent of Americans identify as independent — the highest number in the history of the poll.
  • ...1 more annotation...
  • Meanwhile, faith in mainstream media is also dwindling — and it tends to dip even lower in election years, as Americans observe the perpetual circus acts performed by corporate outlets. With contentious power struggles raging both within the major parties and between them, Americans appear to be sobering up to the realities of party dominance and loyalty as they evolve beyond their crumbling political past.
  •  
    Of course the 55% would never agree on a single candidate, so let's not get our hopes up.
Paul Merrell

Iraq war claimed half a million lives, study finds | Al Jazeera America - 0 views

  • The number of deaths caused by the Iraq war has been a source of intense controversy, as politics, inexact science and a clamor for public awareness have intersected in a heated debate of conflicting interests. The latest and perhaps most rigorous survey, released Tuesday, puts the figure at close to 500,000. The study, — a collaboration of researchers in the U.S., Canada and Iraq appearing in the journal PLoS Medicine — included a survey of 2,000 Iraqi households in 100 geographic regions in Iraq. Researchers used two surveys, one involving the household and another asking residents about their siblings, in an attempt to demonstrate the accuracy of the data they were collecting. Using data from these surveys, researchers estimated 405,000 deaths, with another 55,800 projected deaths from the extensive migration in and emigration from Iraq occurring as a result of the war. The researchers estimated that 60 percent of the deaths were violent, with the remaining 40 percent occurring because of the health-infrastructure issues that arose as a result of the invasion — a point they emphasized in discussing their research, since the figure is higher than those found in previous studies.
  • Spagat said the public should be largely aware of the death toll from the Iraq war by now, but it’s not clear that that is the case. While even the most conservative estimates of mortality in Iraq — including the Iraq Body Count — have reached six figures, polling in the U.S. (PDF) and U.K. (PDF) have shown public perception to be that the civilian death toll from the war is in the neighborhood of 10,000.
Paul Merrell

Pentagon preparing for mass civil breakdown | Nafeez Ahmed | Environment | theguardian.com - 0 views

  • A US Department of Defense (DoD) research programme is funding universities to model the dynamics, risks and tipping points for large-scale civil unrest across the world, under the supervision of various US military agencies. The multi-million dollar programme is designed to develop immediate and long-term "warfighter-relevant insights" for senior officials and decision makers in "the defense policy community," and to inform policy implemented by "combatant commands." Launched in 2008 – the year of the global banking crisis – the DoD 'Minerva Research Initiative' partners with universities "to improve DoD's basic understanding of the social, cultural, behavioral, and political forces that shape regions of the world of strategic importance to the US."
  • Twitter posts and conversations will be examined "to identify individuals mobilised in a social contagion and when they become mobilised."
  • Last year, the DoD's Minerva Initiative funded a project to determine 'Who Does Not Become a Terrorist, and Why?' which, however, conflates peaceful activists with "supporters of political violence" who are different from terrorists only in that they do not embark on "armed militancy" themselves. The project explicitly sets out to study non-violent activists
  • ...3 more annotations...
  • According to Prof David Price, a cultural anthropologist at St Martin's University in Washington DC and author of Weaponizing Anthropology: Social Science in Service of the Militarized State, "when you looked at the individual bits of many of these projects they sort of looked like normal social science, textual analysis, historical research, and so on, but when you added these bits up they all shared themes of legibility with all the distortions of over-simplification. Minerva is farming out the piece-work of empire in ways that can allow individuals to disassociate their individual contributions from the larger project."Prof Price has previously exposed how the Pentagon's Human Terrain Systems (HTS) programme - designed to embed social scientists in military field operations - routinely conducted training scenarios set in regions "within the United States." Citing a summary critique of the programme sent to HTS directors by a former employee, Price reported that the HTS training scenarios "adapted COIN [counterinsurgency] for Afghanistan/Iraq" to domestic situations "in the USA where the local population was seen from the military perspective as threatening the established balance of power and influence, and challenging law and order."
  • One war-game, said Price, involved environmental activists protesting pollution from a coal-fired plant near Missouri, some of whom were members of the well-known environmental NGO Sierra Club. Participants were tasked to "identify those who were 'problem-solvers' and those who were 'problem-causers,' and the rest of the population whom would be the target of the information operations to move their Center of Gravity toward that set of viewpoints and values which was the 'desired end-state' of the military's strategy."Such war-games are consistent with a raft of Pentagon planning documents which suggest that National Security Agency (NSA) mass surveillance is partially motivated to prepare for the destabilising impact of coming environmental, energy and economic shocks.
  • Minerva is a prime example of the deeply narrow-minded and self-defeating nature of military ideology. Worse still, the unwillingness of DoD officials to answer the most basic questions is symptomatic of a simple fact – in their unswerving mission to defend an increasingly unpopular global system serving the interests of a tiny minority, security agencies have no qualms about painting the rest of us as potential terrorists.
Gary Edwards

Google: Applied Research Associates - Directed Energy and 911 - 0 views

  •  
    Forensic engineer and scientis Dr Judy Wood argues that the evidence of the 911 building collapse points to a directed energy source capable of turning the buildings to dust. Not thermal or heat. Not a thermal explosive style controlled demolition. Nor was it a structural collapse from the impact of the planes. Dr Wood rules out the official story and let's the facts speak for themselves and the facts point directly at Applied Research Associates, and Directed Energy Weapons having been used on 911 to bring down several buildings. What an incredible story. There is an interview of Dr Judy Wood on CoasttoCoastAM.com. If you want to listen, leave me a note and I will send the link. If you have note heard this woman speak, or read her book, "What happened to the Buildings on 911?", you are in for one special, eye opening treat.
Paul Merrell

US Military Uses IMF and World Bank to Launder 85% of Its Black Budget | Global Researc... - 1 views

  • hough transparency was a cause he championed when campaigning for the presidency, President Obama has largely avoided making certain defense costs known to the public. However, when it comes to military appropriations for government spy agencies, we know from Freedom of Information Act requests that the so-called “black budget” is an increasingly massive expenditure subsidized by American taxpayers. The CIA and and NSA alone garnered $52.6 billion in funding in 2013 while the Department of Defense black ops budget for secret military projects exceeds this number. It is estimated to be $58.7 billion for the fiscal year 2015. What is the black budget? Officially, it is the military’s appropriations for “spy satellites, stealth bombers, next-missile-spotting radars, next-gen drones, and ultra-powerful eavesdropping gear.” However, of greater interest to some may be the clandestine nature and full scope of the black budget, which, according to analyst Catherine Austin Fitts, goes far beyond classified appropriations. Based on her research, some of which can be found in her piece “What’s Up With the Black Budget?,” Fitts concludes that the during the last decade, global financial elites have configured an elaborate system that makes most of the military budget unauditable. This is because the real black budget includes money acquired by intelligence groups via narcotics trafficking, predatory lending, and various kinds of other financial fraud.
  • The result of this vast, geopolitically-sanctioned money laundering scheme is that Housing and Urban Devopment and other agencies are used for drug trafficking and securities fraud. According to Fitts, the scheme allows for at least 85 percent of the U.S. federal budget to remain unaudited. Fitts has been researching this issue since 2001, when she began to believe that a financial coup d’etat was underway. Specifically, she suspected that the banks, corporations, and investors acting in each global region were part of a “global heist,” whereby capital was being sucked out of each country. She was right.
  • As Fitts asserts, “[She] served as Assistant Secretary of Housing at the US Department of Housing and Urban Development (HUD) in the United States where I oversaw billions of government investment in US communities…..I later found out that the government contractor leading the War on Drugs strategy for U.S. aid to Peru, Colombia and Bolivia was the same contractor in charge of knowledge management for HUD enforcement. This Washington-Wall Street game was a global game. The peasant women of Latin America were up against the same financial pirates and business model as the people in South Central Los Angeles, West Philadelphia, Baltimore and the South Bronx.” This is part of an even larger financial scheme. It is fairly well-established by now that international financial institutions like the World Trade Organization, the World Bank, and the International Monetary Fund operate primarily as instruments of corporate power and nation-controlling infrastructure investment mechanisms. For example, the primary purpose of the World Bank is to bully developing countries into borrowing money for infrastructure investments that will fleece trillions of dollars while permanently indebting these “debtor” nations to West. But how exactly does the World Bank go about doing this? John Perkins wrote about this paradigm in his book, Confessions of an Economic Hitman. During the 1970s, Perkins worked for the international engineering consulting firm, Chas T. Main, as an “economic hitman.” He says the operations of the World Bank are nothing less than “pure economic colonization on behalf of powerful corporations and banks that use the United States government as their tool.”
  • ...1 more annotation...
  • In his book, Perkins discusses Joseph Stiglitz, the Chief Economist for the World Bank from 1997-2000, at length. Stiglitz described the four-step plan for bamboozling developing countries into becoming debtor nations: Step One, according to Stiglitz, is to convince a nation to privatize its state industries. Step Two utilizes “capital market liberalization,” which refers to the sudden influx of speculative investment money that depletes national reserves and property values while triggering a large interest bump by the IMF. Step Three, Stiglitz says, is “Market-Based Pricing,” which means raising the prices on food, water and cooking gas. This leads to “Step Three and a Half: The IMF Riot.” Examples of this can be seen in Indonesia, Bolivia, Ecuador and many other countries where the IMF’s actions have caused financial turmoil and social strife. Step 4, of course, is “free trade,” where all barriers to the exploitation of local produce are eliminated. There is a connection between the U.S. black budget and the trillion dollar international investment fraud scheme. Our government and the banking cartels and corporatocracy running it have configured a complex screen to block our ability to audit their budget and the funds they use for various black op projects. However, they can not block our ability to uncover their actions and raise awareness.
1 - 20 of 665 Next › Last »
Showing 20 items per page