Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged ruling-class

Rss Feed Group items tagged

Gary Edwards

Arnold Ahlert: The Real American Divide - The Patriot Post - 0 views

  • Nancy Pelosi and Hillary Clinton provided great examples of the Ruling Class' arrogant mindset. Pelosi believes, as she stated last week, that white, non-college-educated men who vote Republican have “voted against their own economic interests because of guns, because of gays, and because of God — the three G’s, God being the woman’s right to choose.” Clinton was worse. Regarding abortion on demand, she insisted last year that “deep-seated cultural codes, religious beliefs and structural biases have to be changed.” In other words, one embraces the progressive elitist viewpoint, or one is a religiously inspired bigot with a passé worldview that must be demolished. Thus it is no surprise these elitists conflate anything that dissents from their globalist agenda as a “world of wall-builders,” who have “already done great damage,” states The Economist. That damage includes the Brexit, the rise of nationalist (read: right-wing) parties, and “more electoral victories for closed-world types who pose the greatest threat since Communism.” In other words, elitists disdain national sovereignty and democratically determined destiny, logical responses to skyrocketing levels of elitist-enabled terrorism and uncontrolled immigration, and deeply felt concerns by non-elitists about a global economy that has devastated millions left behind in its wake.
  • The Ruling Class “solutions” for Country Class problems? “Let goods and investment flow freely, but strengthen the social safety-net to offer support and new opportunities for those whose jobs are destroyed,” The Economist states. “To manage immigration flows better, invest in public infrastructure, ensure that immigrants work and allow for rules that limit surges of people.” Codevilla explains what this really means, noting that “our Ruling Class' first priority in any and all matters, its solution to any and all problems, is to increase the power of the government — meaning those who run it, meaning themselves.” To achieve that end, new laws are longer than ever, “because length is needed to specify how people will be treated unequally.” Thus, these laws become “primarily grants of discretion,” because “all anybody has to know about them is whom they empower.” Codevilla adds, “This defines ‘crony capitalism.’”
  • If that sounds familiar, maybe it’s because WikiLeak emails reveal the DNC granted itself the sole discretion to empower Hillary Clinton’s presidential nomination, right from the beginning. Thus, when Hillary spoke of “bringing people together” during her speech at the convention, it was really about doing so on her and her fellow insiders' terms. And when she promised to get money out of politics, it can be assumed the billions of dollars that have flowed into the Clinton Foundation — dollars that conspicuously align themselves with a number of dubious initiatives — will remain exempt, even as another sham investigation of Clinton behavior conducted by an equally corrupted IRS lends an imprimatur of genuine concern to the spectacle. “If Americans, or at least a majority of them, have not completely lost their own self-regard as a free people, then the November election should turn out to be a referendum on the ‘ruling class,’ and a massive repudiation of Hillary Clinton’s sense of entitlement to be the first woman elected President of the United States,” writes American Thinker’s Salim Mansur. Perhaps. But traditional thinking dies hard. And a corrupt mainstream media — epitomized by CNN anchor Wolf Blitzer and Chief Political Analyst Gloria Borger drinking wine and celebrating with Democrat delegates at the convention’s conclusion — isn’t about to jeopardize their own Ruling Class status to provide the Country Class with any potentially unifying political insight. Which brings us to Donald Trump. In exclusive communication with The Patriot Post, Codevilla maintained there were no circumstances under which he could support Hillary or any other Democrat, but his view of Trump “is more unfavorable than ever.” He does, however, grant that Trump “is the lesser of two evils.” He sees both candidates as “identical in their disregard for the U.S. Constitution and in the establishment of a post-republican regime — an empire of the will, by of and for favored sectors of the ruling class.”
  • ...3 more annotations...
  • No doubt Codevilla’s take resonates with millions of Americans appalled by a broken, Ruling Class-dominated political system that produced both candidates. Yet realistically, we are faced with a binary choice, made by either commission or omission. And while Codevilla believes “there is no vehicle for opposition” as yet to a Ruling Class “represented by the establishment of both parties,” our own Mark Alexander warns that “the outcome of the November election will not only determine our president for at least the next four years, but also the composition of the Supreme Court for at least the next quarter-century.” That quarter century could be one in which a constitutionally contemptuous Supreme Court majority appointed by Hillary Clinton makes representative government obsolete, and eliminates any chance, short of armed revolution, for the Country Class to take America back from the Ruling Class. A nation where, as Ayn Rand put it, “The government is free to do anything it pleases, while the citizens may act only by permission.” A Trump presidency may be nothing more than a distasteful, bite-the-bullet
  • impediment to Ruling Class hegemony. But it is better than no impediment at all.
  • “While most Americans pray to the God who created us in His own image, our Ruling Class prays to themselves as saviors of the planet and as shapers of mankind in their own image.” —from The Ruling Class: How They Corrupted America and What We Can Do About It by Angelo Codevilla, 2010. While many still frame the 2016 election in terms of Democrats vs. Republicans, those divisions are losing their meaning. This election could be the first one in which Americans will either choose to continue abiding a globalist Ruling Class and their government-dominant, one-world agenda, or decide that national sovereignty, the Constitution and American exceptionalism and individualism are worth preserving. To be clear, nationalism does not equal protectionism, nativism or Islamophobia, nor is it solely embraced by know-nothing rubes unworthy of serious consideration — despite the ongoing efforts of the Ruling Class to paint it that way. Codevilla calls people who oppose the Ruling Class the Country Class, and he describes it as a diverse, often inharmonious group that “shares above all the desire to be rid of rulers it regards as inept and haughty.”
  •  
    ""While most Americans pray to the God who created us in His own image, our Ruling Class prays to themselves as saviors of the planet and as shapers of mankind in their own image." -from The Ruling Class: How They Corrupted America and What We Can Do About It by Angelo Codevilla, 2010. While many still frame the 2016 election in terms of Democrats vs. Republicans, those divisions are losing their meaning. This election could be the first one in which Americans will either choose to continue abiding a globalist Ruling Class and their government-dominant, one-world agenda, or decide that national sovereignty, the Constitution and American exceptionalism and individualism are worth preserving. To be clear, nationalism does not equal protectionism, nativism or Islamophobia, nor is it solely embraced by know-nothing rubes unworthy of serious consideration - despite the ongoing efforts of the Ruling Class to paint it that way. Codevilla calls people who oppose the Ruling Class the Country Class, and he describes it as a diverse, often inharmonious group that "shares above all the desire to be rid of rulers it regards as inept and haughty." Ruling Class haughtiness, argues Codevilla, derives from "an educational system that exposed them to the same ideas and gave them remarkably uniform guidance," and engenders "a social canon of judgments about good and evil, complete with secular sacred history, sins … and saints," all conveyed in an "in" language that serves as their "badge of identity." Irrespective of their professions, the Ruling Class is also united by the reality that "their road up included government channels and government money. … Hence, whether formally in government, out of it, or halfway in, America's Ruling Class speaks the language and has the tastes, habits, and tools of bureaucrats." Just as critically, this "fraternity" can only be joined by one who Codevilla says "shares the manners, the tastes, and the i
Paul Merrell

Gramm-Leach-Bliley Act - Wikipedia, the free encyclopedia - 0 views

  • The Gramm–Leach–Bliley Act (GLB), also known as the Financial Services Modernization Act of 1999, (Pub.L. 106–102, 113 Stat. 1338, enacted November 12, 1999) is an act of the 106th United States Congress (1999–2001). It repealed part of the Glass–Steagall Act of 1933, removing barriers in the market among banking companies, securities companies and insurance companies that prohibited any one institution from acting as any combination of an investment bank, a commercial bank, and an insurance company. With the passage of the Gramm–Leach–Bliley Act, commercial banks, investment banks, securities firms, and insurance companies were allowed to consolidate. The legislation was signed into law by President Bill Clinton.
  • Contents  [hide]  1 Legislative history 2 Changes caused by the Act 3 Remaining restrictions 4 Privacy 5 Financial Privacy Rule 5.1 Financial institutions 5.2 Consumer vs. customer defined 5.3 Consumer/client privacy rights 6 Safeguards Rule 7 Pretexting protection 8 Effect on usury law 9 Controversy 9.1 Criticisms 9.2 Defense 10 Amendments 10.1 Proposed 11 See also 12 Notes 13 References 14 Sources 15 External links 15.1 Compliance information 15.2 Consumer/client rights information 15.3 History of the GLB 15.4 Congressional voting records on Gramm–Leach–Bliley Act
Paul Merrell

Netanyahu scandals reflect corruption at the heart of Israeli society - Mondoweiss - 0 views

  •       Israeli prime minister Benjamin Netanyahu is in danger of being brought down, possibly soon, over what initially appears to be little more than an imprudent taste for Cuban cigars and pink champagne. In truth, however, the allegations ensnaring Netanyahu reveal far more than his personal flaws or an infatuation with the high life. They shine a rare light on the corrupt nexus between Israel’s business, political and media worlds, compounded by the perverse influence of overseas Jewish money. Of the two police investigations Netanyahu faces (there are more in the wings), the one known as Case 1000, concerning gifts from businessmen worth hundreds of thousands of dollars, is most likely to lead to his downfall. But it is the second investigation, Case 2000, and the still-murky relationship between the two cases, that more fully exposes the rot at the heart of Israel’s political system. This latter case hinges on a tape recording in which Netanyahu plots with an Israeli newspaper tycoon to rig media coverage in his favor. Leads from both cases suggest that Netanyahu may have been further meddling, together with his billionaire friends, in the shadowy world of international espionage.
  • Netanyahu’s appetite for a free lunch has been common knowledge in Israel since his first term as prime minister in the late 1990s. Then, he was twice investigated for fraud, though controversially charges were not brought in either case. Police discovered along the way that he and his wife, Sara, had horded many of the gifts he received during state visits. More than 100 were never recovered. The clarifications that were issued more than 15 years ago, as a result of those investigations, make it hard for Netanyahu to claim now that he did not understand the rules. According to justice ministry advice in 2001, government and state officials cannot keep gifts worth more than $100 without risking violating Israeli law. The gifts Netanyahu received from one of the Israeli businessmen involved in Case 1000, Hollywood film producer Arnon Milchan, amounted to as much as $180,000. Netanyahu has argued that these presents, ranging from cigars to jewelry, were expressions of a close friendship rather than bribes to him in his capacity as prime minister. The problem, however, is that Netanyahu appears to have reciprocated by using his position as head of the Israeli government to lobby John Kerry, the then U.S. secretary of state, to gain Milchan a 10-year U.S. residency visa. He may have done more.
  • Also being investigated are his family’s ties to a friend of Milchan’s, Australian billionaire James Packer, who made his fortune in the media and gambling industries. Packer has similarly lavished gifts on the Netanyahu family, especially Yair, Netanyahu’s eldest son. At the same time, Packer, now a neighbor of the Netanyahus in the coastal town of Caesarea, has been seeking permanent residency and the enormous benefits that would accrue with tax status in Israel. As a non-Jew, Packer should have no hope of being awarded residency. There are suspicions that Netanyahu may have been trying to pull strings on the Australian’s behalf. Many of these gifts were apparently not given freely. The Netanyahus asked for them. Indicating that Netanyahu knew there might be legal concerns, he used code words – “leaves” for cigars and “pinks” for champagne – to disguise his orders to Milchan. Police are reported to be confident, after questioning Netanyahu three times, that they have enough evidence to indict him. If they do, Netanyahu will be under heavy pressure to resign.
  • ...5 more annotations...
  • Yossi Cohen was appointed head of the Mossad a year ago, after a government vetting committee accepted that he had no personal ties to Netanyahu. But Cohen forgot to mention that he is extremely close to Netanyahu’s high-flying friends – connections that are now under investigation. Milchan set up a global security firm in 2008 called Blue Sky International, stuffed with Israeli security veterans. Packer soon became a partner. They developed close ties to Cohen, first while he was a senior official at the Mossad and later when he headed Israel’s national security council. Before Cohen was appointed head of Mossad in December 2015, the pair had hoped to recruit him to their cyber-security operations. Cohen received several gifts from Packer, in violation of Israeli government rules, including a stay at one of his luxury hotels. A source speaking to Haaretz said Blue Sky had “more than [a] direct line” to Netanyahu. They “would pull him out from anywhere, at any time, on any occasion.” According to Haaretz’s military analyst, Amir Oren, the new disclosures raise serious questions about whether Milchan and Packer twisted Netanyahu’s arm to parachute Cohen into the post over the favored candidate. In return, Packer may have been hoping that Cohen would authorise exceptional Israeli residency for him, classifying him as a security asset.
  • From Hollywood to Mossad Cases 1000 and 2000 share at least one figure in common. Milchan gave Netanyahu extravagant gifts over many years, but he is also reported to have acted as go-between, bringing arch-enemies Netanyahu and Mozes together. Milchan has his own financial stake in the media, in his case a holding in the Channel 10 TV station. In addition, Milchan introduced Netanyahu to sympathetic businessmen, including his friend Packer, to discuss taking the ailing Yedioth media group off Mozes’ hands. Only last October he arranged for media mogul Rupert Murdoch’s son, Lachlan, to fly to Israel for one night for a secret meeting with Netanyahu. Milchan is undoubtedly at the centre of the shadowy world of power and finance that corrupts public life in Israel. Not only is Milchan a highly influential Hollywood figure, having produced more than 100 films, but he has admitted that he is a former Mossad agent. He used his Hollywood connections to help make arms deals and secure parts for Israel’s nuclear weapons program. One can only wonder whether Milchan was not effectively set up in his Hollywood career as a cover for his Mossad activities. But Milchan, it seems, is still wielding influence in Israel’s twilight world of security.
  • eyond this, one one can only speculate about how Cohen’s indebtedness to Milchan, Packer and Netanyahu might have influenced his decisions as head of the Mossad. It was only a few years ago that the former Mossad chief, Meir Dagan, was reported to have wrestled furiously with Netanyahu to stop him launching a military strike on Iran. Prosecution drags feet It is unclear for the time being whether the revelations are drawing to a close or will lead deeper into Israel’s twin netherworlds of financial corruption and security. But what has emerged so far should be enough to finish off Netanyahu as prime minister. Whether it does so may depend on the extent of Israel’s compromised legal system. Attorney general Avichai Mendelblit was appointed by Netanyahu and is a political ally. He appears to have been dragging his feet as much as possible to slow down the police investigation, if not sabotage it. But the weight of evidence is looking like it may prove too overwhelming. As political analyst Yossi Verter observed: “There’s no way that a police commissioner … appointed [by Netanyahu] and a cautious attorney general, who in the past was part of his close circle and one of his loyalists, would be putting him through the seven circles of hell if they weren’t convinced that there’s a solid basis for indictment and conviction.” The next question for Netanyahu is whether he will step down if indicted. He should, if Olmert’s example is followed. But his officials are citing a 1993 high court ruling that allows a cabinet minister under indictment to remain in office. Certainly if Netanyahu chooses to stay on, his decision would be appealed to the court again. However, the judges may be reluctant to oust a sitting prime minister. The court of public opinion is likely to be decisive in that regard. A recent poll shows few Israelis believe Netanyahu is innocent of the allegations. Some 54 per cent think he broke the law, while only 28 believe him. Opinion, however, is split evenly on whether he should resign.
  • If past experience is any measure, Netanyahu will try to turn public opinion his way by increasing friction with the Palestinians and exploiting the international arena, especially his relations with the Trump administration. He may be expected to encourage Trump at the very least to posture more stridently against Iran. Nonetheless, most observers assume Netanyahu is doomed – it is simply a matter of when. The odds are on an indictment in late spring, followed by elections in the fall, say Israeli analysts. At this stage, none of his political rivals wants to be seen stabbing Netanyahu in the back. Most are keeping quiet. But behind the scenes, political leaders are hurrying to forge new alliances and extract political concessions while Netanyahu is wounded.
  • Who might succeed Netanyahu? Yair Lapid, of the centre-right Yesh Atid, is heading the polls, but that may in part reflect the disarray in Netanyahu’s Likud party. In a sign of where the deeper currents in Israeli society are leading, a Maariv poll last week showed that settler leader Naftali Bennett would win an election if he were to head the Likud. Netanyahu now needs the help of all the powerful friends he can muster. His biggest ally, U.S. casino magnate Sheldon Adelson, may not be among them. After the revelations that Netanyahu was conspiring against him with Mozes, Adelson has cut back on Israel Hayom’s circulation and is reported to be offering less favorable coverage of the Netanyahus. That could prove the final straw, sealing Netanyahu’s fate.
Paul Merrell

Audio Reveals What John Kerry Told Syrians Behind Closed Doors - The New York Times - 0 views

  • Secretary of State John Kerry was clearly exasperated, not least at his own government. Over and over again, he complained to a small group of Syrian civilians that his diplomacy had not been backed by a serious threat of military force, according to an audio recording of the meeting obtained by The New York Times.
  • At the meeting last week, Mr. Kerry was trying to explain that the United States has no legal justification for attacking Mr. Assad’s government, whereas Russia was invited in by the government.
  • His frustrations and dissent within the Obama administration have hardly been a secret, but in the recorded conversation, Mr. Kerry lamented being outmaneuvered by the Russians, expressed disagreement with some of Mr. Obama’s policy decisions and said Congress would never agree to use force. 0:19
  • ...3 more annotations...
  • He also spoke of the obstacles he faces back home: a Congress unwilling to authorize the use of force and a public tired of war.
  • As time ran short, Mr. Kerry told the Syrians that their best hope was a political solution to bring the opposition into a transitional government. Then, he said, “you can have an election and let the people of Syria decide: Who do they want?” A State Department official, speaking on the condition of anonymity, said later that Mr. Kerry was not indicating a shift in the administration’s view of Mr. Assad, only reiterating a longstanding belief that he would be ousted in any fair election. At one point, Mr. Kerry astonished the Syrians at the table when he suggested that they should participate in elections that include President Bashar al-Assad, five years after President Obama demanded that he step down. Mr. Kerry described the election saying it would be set up by Western and regional powers, and the United Nations, “under the strictest standards.” He said that the millions of Syrians who have fled since the war began in 2011 would be able to participate. 0:19
  • “Everybody who’s registered as a refugee anywhere in the world can vote. Are they going to vote for Assad? Assad’s scared of this happening.” But the Syrians were skeptical that people living under government rule inside Syria would feel safe casting ballots against Mr. Assad, even with international observers — or that Russia would agree to elections if it could not ensure the outcome. And that is when the conversation reached an impasse, with Ms. Shehwaro, an educator and social media activist, recalling hopes for a more direct American role. “So you think the only solution is for somebody to come in and get rid of Assad?” Mr. Kerry asked. “Yes,” Ms. Shehwaro said. “Who’s that going to be?” he asked. “Who’s going to do that?”
  •  
    Sounding more and more like Obama won't be willing to commence another overt war. But look for more instances of the U.S. doing strategic bombing for ISIL and Al-Nusrah, as with the attack on the Syrian Army and blowing up the two bridges over the Euphrates that the Syrian Army needed to attack an ISIL stronghold.
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

CONFIRMED: Russia sends S-300 advanced missile system to Syria, U.S. runs out of options - 0 views

  • Shortly before the US announcement of its decision to suspend talks with Russia on the ‘cessation of hostilities’ agreement reached by US Secretary State Kerry and Russian Foreign Minister Lavrov on 9th September 2016, a clearly well-sourced article setting out US options was published by Reuters. This article was clearly written on the basis of information provided by senior officials of the US government.  It confirms that “staff level” discussions are underway in the US in light of the collapse of the Kerry-Lavrov agreement and the Syrian army’s advances in Aleppo, though as of the date of publication of the Reuters article (29th September 2016) no suggestions of what to do had been made to Obama. Here is a list of the options apparently being considered (1) “supporting rebel counter attacks elsewhere with additional weaponry or even air strikes, which “might not reverse the tide of battle, but might cause the Russians to stop and think””; (2) “a U.S. air strike on a Syrian air base far from the fighting between Assad’s troops and rebel forces in the north” (the Syrian air base in question is probably the one at Deir Ezzor); (3) “sending more U.S. special operations forces to train and advise Kurdish and Syrian rebel groups”; (4) “deploying additional American and allied naval and airpower to the eastern Mediterranean, where a French aircraft carrier is already en route”.
  • Apparently the idea of supplying more shoulder held surface to air missiles to the Jihadis has been ruled out because “the Obama administration fears (they) could fall into the hands of Islamic State militants or al Qaeda-linked groups”. As for the idea of a no-fly zone (“a humanitarian airlift to rebel-held areas (NB: this almost certain refers to Aleppo – AM), which would require escorts by U.S. warplanes”) this has apparently been deemed “too risky” and has been “moved down the list”. This list of options exposes how completely out of options the US really is. 
  • Options (1) and (2) cannot influence the course of the fighting in Aleppo and US officials apparently admit as much.  On past experience option (1) is less likely to make the Russians “stop and think” than to make them more determined and more angry.  Option (3) is a case of more of the same.  The US has been doing this for years without achieving any results.  Option (4) is essentially symbolic unless it is intended to prepare the way for the declaration of a no-fly zone, which however US officials seem to be ruling out. If reports are to be believed the Russians may be taking more steps to guard against the possibility of the US declaring a no-fly zone.  Fox News is reporting US officials as saying that the Russians have reinforced the S400 anti aircraft missile system they have already deployed to Syria with a number of advanced S-300VM “Antey-2500″ anti aircraft systems.  Whilst the Russians have not confirmed this report, if it is true then it makes any US attempt to impose a no-fly zone even more risky.  A sign that the report probably is true is that the Kremlin is pointedly failing to deny it. The Russians have also pointedly reminded the US that they know the whereabouts of all US military personnel in Syria, including presumably those supposedly present in the various Jihadi headquarters (or “operations rooms”) existing in the country. 
  • ...1 more annotation...
  • This looks frankly like a threat to retaliate against US military personnel if Russian military personnel in Syria are attacked by the US.  There have been unconfirmed reports that the Russians did exactly that by attacking a Jihadi “operations room” partly staffed by US and Western military personnel following the US attack on the Syrian military near Deir Ezzor.  If those reports are true then the implied threat the Russians are making to retaliate against US troops in the event of attacks upon their own military is not an empty one. One way or the other, it is not difficult to see why the US might conclude that imposing a no-fly zone is “too risky” and why this option has been “moved down the list”. Possibly because the US has no real options short of steps that might threaten a nuclear war with Russia, Kerry spoke twice by telephone to Lavrov over the weekend, presumably in an attempt to get the Russians to get the Syrians to pull back in Aleppo so as to preserve the US’s bluff.  However it is clear he found Lavrov immoveable.  Lavrov has instead been issuing a series of statements accusing the US of siding with Jabhat Al-Nusra (ie. Al-Qaeda), questioning whether President Obama is any longer in control of the US military, and calling into question Kerry’s good faith.  
Paul Merrell

Classified Report on the C.I.A.'s Secret Prisons Is Caught in Limbo - The New York Times - 0 views

  • A Senate security officer stepped out of the December chill last year and delivered envelopes marked “Top Secret” to the Pentagon, the C.I.A., the State Department and the Justice Department. Inside each packet was a disc containing a 6,700-page classified report on the C.I.A.’s secret prison program and a letter from Senator Dianne Feinstein, urging officials to read the report to ensure that the lessons were not lost to time. Today, those discs sit untouched in vaults across Washington, still in their original envelopes. The F.B.I. has not retrieved a copy held for it in the Justice Department’s safe. State Department officials, who locked up their copy and marked it “Congressional Record — Do Not Open, Do Not Access” as soon as it arrived, have not read it either. Continue reading the main story Related Coverage document The Senate Committee’s Report on the C.I.A.’s Use of TortureDEC. 9, 2014 Panel Faults C.I.A. Over Brutality and Deceit in Terrorism InterrogationsDEC. 9, 2014 Senate Votes to Turn Presidential Ban on Torture Into LawJUNE 16, 2015 Outside Psychologists Shielded U.S. Torture Program, Report FindsJULY 10, 2015 Nearly a year after the Senate released a declassified 500-page summary of the report, the fate of the entire document remains in limbo, the subject of battles in the courts and in Congress. Until those disputes are resolved, the Justice Department has prohibited officials from the government agencies that possess it from even opening the report, effectively keeping the people in charge of America’s counterterrorism future from reading about its past. There is also the possibility that the documents could remain locked in a Senate vault for good.
  • In a letter to Attorney General Loretta E. Lynch last week, Ms. Feinstein, a California Democrat, said the Justice Department was preventing the government from “learning from the mistakes of the past to ensure that they are not repeated.”Although Ms. Feinstein is eager to see the document circulated, the Senate is now under Republican control. Her successor as head of the Intelligence Committee, Senator Richard M. Burr of North Carolina, has demanded that the Obama administration return every copy of the report. Mr. Burr has declared the report to be nothing more than “a footnote in history.”It was always clear that the full report would remain shielded from public view for years, if not decades. But Mr. Burr’s demand, which means that even officials with top security clearances might never read it, has reminded some officials of the final scene of “Raiders of the Lost Ark,” when the Ark of the Covenant is put into a wooden crate alongside thousands of others in a government warehouse of secrets.
  • The full report is not expected to offer evidence of previously undisclosed interrogation techniques, but the interrogation sessions are said to be described in great detail. The report explains the origins of the program and names the officials involved. The full report also offers details on the role of each agency in the secret prison program.The Justice Department, which played a central role in approving the interrogation methods, has even prohibited its own officials from reading the full report.“The Department of Justice was among those parts of the executive branch that were misled about the program, and D.O.J. officials’ understanding of this history is critical to its institutional role going forward,” Ms. Feinstein wrote to the Justice Department last week in a letter she signed with Senator Patrick J. Leahy of Vermont, the top Democrat on the Judiciary Committee.In court, Justice Department lawyers have agreed with Mr. Burr’s contention that the document belongs to Congress. As evidence, they point to an agreement between the C.I.A. and the Senate as the Intelligence Committee began its lengthy investigation. The Senate was under Democratic control at the time.
  • ...2 more annotations...
  • The American Civil Liberties Union has sued the C.I.A. for access to the document, and at this point the case hinges on who owns it. Senate documents are exempt from public records laws, but executive branch records are not. In May, a federal judge ruled that even though Ms. Feinstein distributed the report to the executive branch, the document still belongs to Congress. That decision is under appeal, with court papers due this month.Justice Department officials defend their stance, saying that handling the document at all could influence the outcome of the lawsuit. They said that a State Department official who opened the report, read it and summarized it could lead a judge to determine that the document was an executive branch record, altering the lawsuit’s outcome. The Justice Department has also promised not to return the records to Mr. Burr until a judge settles the matter.“It’s quite bizarre, and I cannot think of a precedent,” said Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists. He said there are any number of classified Senate documents that are shared with intelligence agencies and remain as congressional records, even if they are read by members of the executive branch.
  • The agreement says that any “documents, draft and final recommendations, reports or other materials” generated during the investigation are congressional documents. “As such these records are not C.I.A. records under the Freedom of Information Act,” the agreement says.The A.C.L.U. argues that agreement was void once Ms. Feinstein sent the report to the government agencies. Because she clearly intended the executive branch to use the report, the A.C.L.U. contends, the committee gave up control of the document.If Mr. Burr were to succeed in getting copies of the report returned to the Intelligence Committee, Mr. Aftergood said, he could slowly make it irrelevant.“The longer that it’s buried, the less relevant it becomes,” he said.
  •  
    If it is ultimately found that the report is an Executive Branch record, then the FOIA requires disclosure of all "segregable portions" that are not properly classified.  
Gary Edwards

Articles: Ruling Class Without a Clue - 0 views

  • We the people want a little free stuff.
  • The ruling class wants to seize and hold political power.
  • Usually, those vote-buying promises result in policies that damage the economy.
  • ...16 more annotations...
  • Promising free stuff is how you get elected.
  • There's only one way that the ruling class knows how to deal with the inevitable consequence of gunning the housing market with mortgage subsidies
  • That is the way to understand the global economic situation. It is governments trying to paper over their mistakes.
  • In the U.S. the government is trying to paper over a credit system that is still badly holed from the mortgage meltdown.
  • The result is that politicians and their officials are always involved in trying to band-aid over the distortions and the wounds they have inflicted on the economy in their crude bid for power.
  • Print lots of money to float the underwater mortgages.
  • What can we understand from all this news? It stands to reason. These ruling classes don't have a clue what they are doing.
  • In Europe the ruling class is trying to deal with the consequence of its 50-year hubris. The people, they decided after World War II, were a bunch of crypto-Nazis.
  • So the enlightened ruling class would federalize Europe to make sure that aggressive nationalism would never rear its ugly head again.
  • Think of the Chinese ruling class. The Chi-com rulers really want to bring China into the modern era, but they naturally feel that this is only possible under their wise leadership.
  • So they get exactly the crony capitalism we enjoy here in the United States, as the ruling class dribbles subsidies out to its supporters out in the provinces to keep them on-side while they fundamentally transform China.
  • The Fed wants to stop the presses, and it can, it will some day. But it doesn't want to bring on another panic. The trouble is that even talk about ending its quantitative easing leads to a market swoon.
  • As Angelo Codevilla writes, those NSA data mining efforts might really amount to something if the NSA had a clue what it was doing.
  • [T]he aftermath of 9/11, technology, inertia, and allergy to accountability gave the US government the capacity to capture and examine at will well nigh the whole electronic realm. It would very much like to do the protective job that President Obama and Karl Rove claim and may even believe it is doing. But there is no evidence that anyone has figured out how to sidestep the realities that prevent that.
  • In Codevilla's view, the U.S. government is still going what it decided to do in WWII. Collect everything and then decide what to do with it.
  • is the Fed fighting recession or fighting inflation?
  •  
    Good bullet analysis of how things work and why governments continue to get it wrong.  It comes as no surprise that the article turns out to be a quick summary of some deep thinking by Angelo Codevilla, the genius who coined the term "Ruling Class".  Linked at:  JUN 23, 2013 The Ruling Class Consensus On Domestic Spying http://www.libertylawsite.org/2013/06/23/the-ruling-class-consensus-on-domestic-spying/ At the end of the day, the Ruling Class El;ites hate the American Constitution, and will do whatever it takes to destroy the only Republic ever dedicated to individual liberty, freedom and the rule of law.
Gary Edwards

Does Trump Trump? Angelo Codevilla on Our Present Moment | Power Line - 1 views

  • Angelo Codevilla is a former staff member of the Senate Intelligence Committee, professor emeritus of international relations at Boston University, and the author of more than a dozen fine books on politics, arms control, and intelligence (if I had to pick a favorite it might be The Character of Nations), including a fine translation of Machiavelli’s Prince published by Yale University Press. Most recently his essay-turned-book The Ruling Class: How They Corrupted America and What We Can Do About It caught the attention of Rush Limbaugh and many others. It argues that our fundamental political problem is not “big government,” but the creation of a ruling class, inhabiting both parties, that is steadily increasing its authoritarian control over the nation. In a conversation a few months ago Angelo remarked, “The 2016 election is simple; the person who runs on the platform ‘Who do they think they are?’ will win.”
  • Donald Trump leapt atop other contenders for the Republican presidential nomination when he acted on the primordial fact in American public life today, from which most of the others hide their eyes, namely: most Americans distrust, fear, are sick and tired of, the elected, appointed, and bureaucratic officials who rule over us, as well as their cronies in the corporate, media, and academic world.
  • Trump’s attraction lies less in his words’ grace or even precision than in the extent to which Americans are searching for someone, anyone, to lead against this ruling class, that is making America less prosperous, less free, and more dangerous.
  • ...5 more annotations...
  • three fifths of Democratic voters approve the conduct of their officials, only about one fifth of Republican voters approve what theirs do.
  • Moreover, Americans are becoming increasingly skeptical about their celebrities’ integrity. With good reason. McCain is just a minor example of a phenomenon that characterizes our ruling class: reputations built on lies and cover-ups, lives of myth protected by mutual forbearance, by complicitous journalists, or by records deep-sixed, including in in government archives.
  • As they lord it over us, they live lives that cannot stand scrutiny.
  • The point here is simple: our ruling class has succeeded in ruling not by reason or persuasion, never mind integrity, but by occupying society’s commanding heights, by imposing itself and its ever-changing appetites on the rest of us. It has coopted or intimidated potential opponents by denying the legitimacy of opposition. Donald Trump, haplessness and clownishness notwithstanding, has shown how easily this regime may be threatened just by refusing to be intimidated.
  • At increasing speed, our ruling class has created “protected classes” of Americans defined by race, sex, age, disability, origin, religion, and now homosexuality, whose members have privileges that outsider do not. By so doing, they have shattered the principle of equality – the bedrock of the rule of law. Ruling class insiders use these officious classifications to harass their socio-political opponents. An unintimidated statesman would ask: Why should not all “classes” be equally protected? Does the rule of law even admit of “classes”? Does not the 14th amendment promise “the equal protection of the laws” to all alike? He would note that when the government sets aside written law in favor of what the powerful want, it thereby absolves citizens any obligation to obey government.
  •  
    "Does Trump trump? By Angelo M. Codevilla "In the land of the blind," so goes the saying, "the one-eyed man is king." Donald Trump leapt atop other contenders for the Republican presidential nomination when he acted on the primordial fact in American public life today, from which most of the others hide their eyes, namely: most Americans distrust, fear, are sick and tired of, the elected, appointed, and bureaucratic officials who rule over us, as well as their cronies in the corporate, media, and academic world. Trump's attraction lies less in his words' grace or even precision than in the extent to which Americans are searching for someone, anyone, to lead against this ruling class, that is making America less prosperous, less free, and more dangerous. Trump's rise reminds this class's members that they sit atop a rumbling volcano of rejection. Republicans and Democrats hope to exorcise its explosion by telling the public that Trump's remarks on immigration and on the character of fellow member John McCain (without bothering to try showing that he errs on substance), place him outside the boundaries of their polite society. Thus do they throw Br'er Rabbit into the proverbial briar patch. Now what? The continued rise in Trump's poll numbers reminds all that Ross Perot - in an era that was far more tolerant of the Establishment than is ours - outdistanced both Bush 41 and Bill Clinton before self-destructing, just by speaking ill of both parties before he self destructed. Republicans brahmins have the greater reason to fear. Whereas some three fifths of Democratic voters approve the conduct of their officials, only about one fifth of Republican voters approve what theirs do. If Americans in general are primed for revolt, Republican (and independent) voters fairly thirst for it. Trump's barest hints about what he opposes (never mind proposes) regarding just a few items on the public agenda have had such effect because they accord with
Paul Merrell

US and Israel try to rewrite history of UN resolution declaring Zionism racism - 0 views

  • “Zionism is a form of racism and racial discrimination,” reads UN General Assembly Resolution 3379. The measure was adopted 40 years ago, on Nov. 10, 1975, and the majority of the international community backed it. 72 countries voted for the resolution, with just 35 opposed (and 32 abstentions). Although little-known in the US today (it is remarkable how effectively the US and its allies have rewritten history in their favor), UN GA Res. 3379, titled “Elimination of all forms of racial discrimination,” made an indelible imprint on history. The geographic distribution of the vote was telling. The countries that voted against the resolution were primarily colonial powers and/or their allies. The countries that voted for it were overwhelmingly formerly colonized and anti-imperialist nations.
  • The resolution also cited two other little-known measures passed by international organizations in the same year: the Assembly of the Heads of State and Government of the Organization of African Unity’s resolution 77, which ruled “that the racist regime in occupied Palestine and the racist regimes in Zimbabwe and South Africa have a common imperialist origin, forming a whole and having the same racist structure”; and the Political Declaration and Strategy to Strengthen International Peace and Security and to Intensify Solidarity and Mutual Assistance among Non-Aligned Countries, which called Zionism a “racist and imperialist ideology.” When the resolution was passed, Israeli Ambassador to the UN Chaim Herzog — who later became Israel’s sixth president, and the father of Isaac Herzog, the head of Israel’s opposition — famously tore up the text at the podium. Herzog claimed the measure was “based on hatred, falsehood, and arrogance,” insisting it was “devoid of any moral or legal value.” Still today, supporters of Israel argue UN GA Res. 3379 was an anomalous product of anti-Semitism. In reality, however, the resolution was the result of international condemnation of the illegal military occupation to which Palestinians had been subjected since 1967 and the apartheid-like conditions the indigenous Arab population had lived under as second-class citizens of an ethnocratic state since 1948.
  • In 1991, resolution 3379 was repealed for two primary reasons: One, the Soviet bloc, which helped pass the resolution, had collapsed; and two, Israel and the US demanded that it be revoked or they refused to participate in the Madrid Peace Conference. At the UN on Nov. 11, US Ambassador to the UN Samantha Power and Secretary of State John Kerry eulogized the late Herzog and forcefully condemned the resolution on its 40th anniversary. In his 2,500-word statement, Kerry mentioned Palestinians just once, and only then as an extension of Israelis. In her remarks, Power did not mention Palestinians at all.
  • ...6 more annotations...
  • In his speech, Kerry smeared resolution 3379 as “anti-Semitic” and “absurd.” Kerry called it “a bitter irony that this resolution against Zionism was originally a resolution against racism and colonialism” and lamented that “reasonableness was detoured by a willful ignorance of history and truth.” Sec. Kerry insisted “we will do all in our power to prevent the hijacking of this great forum for malicious intent” — a fascinating claim, considering how incredibly often the US itself hijacks the UN against the will of the international community, in the interests of both itself and Israel. Kerry warned about “the global reality of anti-Semitism today” (he made no mention whatsoever of the global reality of rampant, rapidly accelerating, and viciously violent anti-Muslim, anti-Arab, and anti-Black racism), and implied that the “terrorist bigots of Daesh [ISIS], Boko Haram, Al Shabaab, and so many others” are part of this larger anti-Semitic trend. One could argue Sec. Kerry downplayed the severity of the present political situation by characterizing these fascistic groups’ violent extremism as rooted in anti-Semitic bigotry, rather than in radicalization under conditions of intense oppression, bitter poverty, and brutal tyranny.
  • UN Secretary-General Ban Ki-moon joined Kerry, Power, and Netanyahu in the echo chamber, albeit with a bit more subtlety. “The reputation of the United Nations was badly damaged by the adoption of resolution 3379, in and beyond Israel and the wider Jewish community,” he said. Unlike the others, Ban condemned not just anti-Semitism, but also “wide-ranging anti-Muslim bigotry and attacks [and] discrimination against migrants and refugees.” Although the Israeli government accuses the UN of bias, the evidence demonstrates the opposite. Secret cables released by whistleblowing journalism organization WikiLeaks revealed that the US and Israel worked hand-in-hand with the UN and Sec.-Gen. Ban in order to undermine investigation into and punitive action on Israel’s war crimes in Gaza.
  • In her speech at the UN, Power, like Kerry, conflated the heinous Nazi attacks on Jewish civilians in the Kristallnacht with UN GA Res. 3379. Both speakers cited the abominable horrors of the Holocaust several times as reasons to support Zionism, glossing over the fact that Zionism was created in the late 19th century and that the Balfour Declaration dates back to 1917, decades before World War II. Amb. Power — a serial warmonger and veteran blame-dodger — did what she did best: rewrote history in the favor of US imperialism. She called the resolution “1975 smearing of Jews’ aspirations to have a homeland” and insisted multiple times that resolutions like 3379 “threaten the legitimacy of the UN.” Like Kerry, Power conveniently forgot to mention that, when it comes to the halls of the UN, there is no other rogue state as blunt as the US, which regularly spits in the face of the international community, defying UN resolutions, violating the UN Charter, and breaking international law when it sees fit. Power’s speech exposed the fault lines in the contentious (to put it mildly) relationship between the US and the UN — that is to say, between the US and the international community. Such tensions are not the fault of the UN; the blame rests squarely on the shoulders of Washington, with its doctrinal “American exceptionalism” and the flagrant disregard for international law that so frequently accompanies such imperial hubris.
  • In their speeches, both Kerry and Power also thanked Israeli UN Ambassador Danny Danon, who was described by an Israeli Labor Party lawmaker as “a right-wing extremist with the diplomatic sensitivity of a pit bull” and who proposed legislation that would, in his own words, have the Israeli government “annex the West Bank and repeal the Oslo Accords.” Amb. Danon insists that God gave the land of historic Palestine to the Jewish people as an “everlasting possession” (while forsaking the US). He also told the Times of Israel that the “international community can say whatever they want, and we can do whatever we want.” Netanyahu addressed the session with a video message. He claimed that Israel, which has for years led the world in violating UN Security Council resolutions, “continues to face systemic discrimination here at the UN.” In a January 2013 statement submitted to the UN Human Rights Council, the Russell Tribunal calculated Israel had defied a bare minimum of 87 Security Council resolutions. The Russel Tribunal also crucially noted “that Israel’s ongoing colonial settlement expansion, its racial separatist policies, as well as its violent militarism would not be possible without the US’s unequivocal support.” The tribunal pointed out that Israel “is the largest recipient of US foreign aid since 1976 and the largest cumulative recipient since World War II” and that, between 1972 and 2012, the US was the lone veto of UN resolutions critical of Israel 43 times.
  • The US secretary of state extolled “Zionism as the expression of a national liberation movement.” The national liberation movements of Vietnam, Korea, China, Nicaragua, El Salvador, Colombia, Congo, South Africa, Burkina Faso, and so many more nations, however, did not get such approval from Washington; au contraire, they were mercilessly crushed under the iron fist of American empire. Traditionally, only right-wing and settler-colonial “national liberation movements” have garnered the US’s official approval. “Why do we Americans care so much about the rights of others being respected?” Kerry asked unprovoked. “Because, in an interconnected world, injustice anywhere is a threat to justice everywhere.” He should tell that to the victims of US-backed dictatorships in Saudi Arabia, the UAE, Bahrain, Qatar, Egypt, Turkmenistan, Kazakhstan, Thailand, Brunei, Rwanda, Ethiopia, Uganda, and, once again, so many more nations. “Times may change, but one thing we do know: America’s support for Israel’s dreaming and Israel’s security, that will never change,” Kerry proclaimed.
  • The real victim of the 40th anniversary event was the truth — and, of course, as it was four decades ago, the Palestinians. Yet, while UN GA Res. 3379 was repealed, the truth cannot be revoked. Zionism was and remains an unequivocally racist movement — just like any other hyper-nationalist and ethnocratic movement. None other than the founding father of Zionism, Theodor Herzl, recognized this elementary fact. In a 1902 letter to Cecil Rhodes — a diamond magnate and white supremacist British colonialist with oceans of African blood on his hands — Herzl, writing of “the idea of Zionism, which is a colonial idea,” requested help colonizing historic Palestine. “It doesn’t involve Africa, but a piece of Asia Minor, not Englishmen but Jews… How, then, do I happen to turn to you since this is an out-of-the-way matter for you? How indeed? Because it is something colonial,” Herzl wrote. “I want you to… put the stamp of your authority on the Zionist plan.”
Paul Merrell

Google, ACLU call to delay government hacking rule | TheHill - 0 views

  • A coalition of 26 organizations, including the American Civil Liberties Union (ACLU) and Google, signed a letter Monday asking lawmakers to delay a measure that would expand the government’s hacking authority. The letter asks Senate Majority Leader Mitch McConnellMitch McConnellTrump voices confidence on infrastructure plan GOP leaders to Obama: Leave Iran policy to Trump GOP debates going big on tax reform MORE (R-Ky.) and Minority Leader Harry ReidHarry ReidNevada can’t trust Trump to protect public lands Sanders, Warren face tough decision on Trump Google, ACLU call to delay government hacking rule MORE (D-Nev.), plus House Speaker Paul RyanPaul RyanTrump voices confidence on infrastructure plan GOP leaders to Obama: Leave Iran policy to Trump GOP debates going big on tax reform MORE (R-Wis.), and House Minority Leader Nancy Pelosi (D-Calif.) to further review proposed changes to Rule 41 and delay its implementation until July 1, 2017. ADVERTISEMENTThe Department of Justice’s alterations to the rule would allow law enforcement to use a single warrant to hack multiple devices beyond the jurisdiction that the warrant was issued in. The FBI used such a tactic to apprehend users of the child pornography dark website, Playpen. It took control of the dark website for two weeks and after securing two warrants, installed malware on Playpen users computers to acquire their identities. But the signatories of the letter — which include advocacy groups, companies and trade associations — are raising questions about the effects of the change. 
  •  
    ".. no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." Fourth Amendment. The changes to Rule 41 ignore the particularity requirement by allowing the government to search computers that are not particularly identified in multiple locations not particularly identifed, in other words, a general warrant that is precisely the reason the particularity requirement was adopted to outlaw.
Paul Merrell

NSA targets the privacy-conscious (Seite 1)| Das Erste - Panorama - Meldungen - 0 views

  • The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Three authors of this investigation have personal and professional ties to the Tor Project, an American company mentioned within the following investigation.
  • Teil 1: NSA targets the privacy-conscious Teil 2: The Tor Project - anathema to the NSA Teil 3: Servers in Germany targeted Teil 4: Simple web searches are suspicious Teil 5: NSA: In strict accordance with the rule of law
  • ...3 more annotations...
  • von J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Downloads XKeyscore rules Read/download the XKeyscore rules here  | download
  • Yet despite these efforts, one of the servers is targeted by the NSA. The IP address 212.212.245.170 is explicitly specified in the rules of the powerful and invasive spy software program XKeyscore. The code is published here exclusively for the first time. After a year of NSA revelations based on documents that focus on program names and high-level Powerpoint presentations, NDR and WDR are revealing NSA source code that shows how these programs function and how they are implemented in Germany and around the world. Months of investigation by the German public television broadcasters NDR and WDR, drawing on exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government reveal that not only is the server in Nuremberg under observation by the NSA, but so is virtually anyone who has taken an interest in several well-known privacy software systems.
Paul Merrell

NSA shares raw intelligence including Americans' data with Israel | World news | The Gu... - 0 views

  • The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process "minimization", but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.
  • The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content."According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. "NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection", it says.
  • In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy."Any US person information that is acquired as a result of NSA's surveillance activities is handled under procedures that are designed to protect privacy rights," the spokesperson said.The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.
  • ...3 more annotations...
  • While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel."Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge," states the report, titled 'History of the US – Israel Sigint Relationship, Post-1992'. "In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA's only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner."
  • In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. "On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems," the official says. "A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US."Later in the document, the official is quoted as saying: "One of NSA's biggest threats is actually from friendly intelligence services, like Israel. There are parameters on what NSA shares with them, but the exchange is so robust, we sometimes share more than we intended."
  • The Guardian asked the Obama administration how many times US data had been found in the raw intelligence, either by the Israelis or when the NSA reviewed a sample of the files, but officials declined to provide this information. Nor would they disclose how many other countries the NSA shared raw data with, or whether the Fisa court, which is meant to oversee NSA surveillance programs and the procedures to handle US information, had signed off the agreement with Israel.In its statement, the NSA said: "We are not going to comment on any specific information sharing arrangements, or the authority under which any such information is collected. The fact that intelligence services work together under specific and regulated conditions mutually strengthens the security of both nations."NSA cannot, however, use these relationships to circumvent US legal restrictions. Whenever we share intelligence information, we comply with all applicable rules, including the rules to protect US person information."
Paul Merrell

President Xi's speech to Davos in full | World Economic Forum - 0 views

  • “It was the best of times, it was the worst of times.” These are the words used by the English writer Charles Dickens to describe the world after the Industrial Revolution. Today, we also live in a world of contradictions. On the one hand, with growing material wealth and advances in science and technology, human civilization has developed as never before. On the other hand, frequent regional conflicts, global challenges like terrorism and refugees, as well as poverty, unemployment and widening income gap have all added to the uncertainties of the world. Many people feel bewildered and wonder: What has gone wrong with the world? To answer this question, one must first track the source of the problem. Some blame economic globalization for the chaos in the world. Economic globalization was once viewed as the treasure cave found by Ali Baba in The Arabian Nights, but it has now become the Pandora’s box in the eyes of many. The international community finds itself in a heated debate on economic globalization.
  • Today, I wish to address the global economy in the context of economic globalization. The point I want to make is that many of the problems troubling the world are not caused by economic globalization. For instance, the refugee waves from the Middle East and North Africa in recent years have become a global concern. Several million people have been displaced, and some small children lost their lives while crossing the rough sea. This is indeed heartbreaking. It is war, conflict and regional turbulence that have created this problem, and its solution lies in making peace, promoting reconciliation and restoring stability. The international financial crisis is another example. It is not an inevitable outcome of economic globalization; rather, it is the consequence of excessive chase of profit by financial capital and grave failure of financial regulation. Just blaming economic globalization for the world’s problems is inconsistent with reality, and it will not help solve the problems.
  • But we should also recognize that economic globalization is a double-edged sword. When the global economy is under downward pressure, it is hard to make the cake of global economy bigger. It may even shrink, which will strain the relations between growth and distribution, between capital and labor, and between efficiency and equity. Both developed and developing countries have felt the punch. Voices against globalization have laid bare pitfalls in the process of economic globalization that we need to take seriously. As a line in an old Chinese poem goes, “Honey melons hang on bitter vines; sweet dates grow on thistles and thorns.” In a philosophical sense, nothing is perfect in the world. One would fail to see the full picture if he claims something is perfect because of its merits, or if he views something as useless just because of its defects. It is true that economic globalization has created new problems, but this is no justification to write economic globalization off completely. Rather, we should adapt to and guide economic globalization, cushion its negative impact, and deliver its benefits to all countries and all nations.
  • ...15 more annotations...
  • Whether you like it or not, the global economy is the big ocean that you cannot escape from. Any attempt to cut off the flow of capital, technologies, products, industries and people between economies, and channel the waters in the ocean back into isolated lakes and creeks is simply not possible. Indeed, it runs counter to the historical trend.
  • First, lack of robust driving forces for global growth makes it difficult to sustain the steady growth of the global economy. The growth of the global economy is now at its slowest pace in seven years. Growth of global trade has been slower than global GDP growth. Short-term policy stimuli are ineffective. Fundamental structural reform is just unfolding. The global economy is now in a period of moving toward new growth drivers, and the role of traditional engines to drive growth has weakened. Despite the emergence of new technologies such as artificial intelligence and 3-D printing, new sources of growth are yet to emerge. A new path for the global economy remains elusive. Second, inadequate global economic governance makes it difficult to adapt to new developments in the global economy. Madame Christine Lagarde recently told me that emerging markets and developing countries already contribute to 80 percent of the growth of the global economy. The global economic landscape has changed profoundly in the past few decades. However, the global governance system has not embraced those new changes and is therefore inadequate in terms of representation and inclusiveness. The global industrial landscape is changing and new industrial chains, value chains and supply chains are taking shape. However, trade and investment rules have not kept pace with these developments, resulting in acute problems such as closed mechanisms and fragmentation of rules.
  • Third, uneven global development makes it difficult to meet people’s expectations for better lives. Dr. Schwab has observed in his book The Fourth Industrial Revolution that this round of industrial revolution will produce extensive and far-reaching impacts such as growing inequality, particularly the possible widening gap between return on capital and return on labor. The richest one percent of the world’s population own more wealth than the remaining 99 percent. Inequality in income distribution and uneven development space are worrying. Over 700 million people in the world are still living in extreme poverty. For many families, to have warm houses, enough food and secure jobs is still a distant dream. This is the biggest challenge facing the world today. It is also what is behind the social turmoil in some countries. All this shows that there are indeed problems with world economic growth, governance and development models, and they must be resolved. The founder of the Red Cross Henry Dunant once said, “Our real enemy is not the neighboring country; it is hunger, poverty, ignorance, superstition and prejudice.” We need to have the vision to dissect these problems; more importantly, we need to have the courage to take actions to address them.
  • First, we should develop a dynamic, innovation-driven growth model. The fundamental issue plaguing the global economy is the lack of driving force for growth.Innovation is the primary force guiding development. Unlike the previous industrial revolutions, the fourth industrial revolution is unfolding at an exponential rather than linear pace. We need to relentlessly pursue innovation. Only with the courage to innovate and reform can we remove bottlenecks blocking global growth and development. With this in mind, G-20 leaders reached an important consensus at the Hangzhou Summit, which is to take innovation as a key driver and foster new driving force of growth for both individual countries and the global economy. We should develop a new development philosophy and rise above the debate about whether there should be more fiscal stimulus or more monetary easing. We should adopt a multipronged approach to address both the symptoms and the underlying problems. We should adopt new policy instruments and advance structural reform to create more space for growth and sustain its momentum. We should develop new growth models and seize opportunities presented by the new round of industrial revolution and digital economy. We should meet the challenges of climate change and aging population. We should address the negative impact of IT application and automation on jobs. When cultivating new industries and new forms models of business models, we should create new jobs and restore confidence and hope to our peoples.
  • Second, we should pursue a well-coordinated and inter-connected approach to develop a model of open and win-win cooperation. Today, mankind has become a close-knit community of shared future. Countries have extensive converging interests and are mutually dependent. All countries enjoy the right to development. At the same time, they should view their own interests in a broader context and refrain from pursuing them at the expense of others. We should commit ourselves to growing an open global economy to share opportunities and interests through opening-up and achieve win-win outcomes. One should not just retreat to the harbor when encountering a storm, for this will never get us to the other shore of the ocean. We must redouble efforts to develop global connectivity to enable all countries to achieve inter-connected growth and share prosperity. We must remain committed to developing global free trade and investment, promote trade and investment liberalization and facilitation through opening-up and say no to protectionism. Pursuing protectionism is like locking oneself in a dark room. While wind and rain may be kept outside, that dark room will also block light and air. No one will emerge as a winner in a trade war.
  • Third, we should develop a model of fair and equitable governance in keeping with the trend of the times. As the Chinese saying goes, people with petty shrewdness attend to trivial matters, while people with vision attend to governance of institutions. There is a growing call from the international community for reforming the global economic governance system, which is a pressing task for us. Only when it adapts to new dynamics in the international economic architecture can the global governance system sustain global growth. Countries, big or small, strong or weak, rich or poor, are all equal members of the international community. As such, they are entitled to participate in decision-making, enjoy rights and fulfill obligations on an equal basis. Emerging markets and developing countries deserve greater representation and voice. The 2010 IMF quota reform has entered into force, and its momentum should be sustained. We should adhere to multilateralism to uphold the authority and efficacy of multilateral institutions. We should honor promises and abide by rules. One should not select or bend rules as he sees fit. The Paris Agreement is a hard-won achievement which is in keeping with the underlying trend of global development. All signatories should stick to it instead of walking away from it as this is a responsibility we must assume for future generations.
  • Despite a sluggish global economy, China’s economy is expected to grow by 6.7 percent in 2016, still one of the highest in the world. China’s economy is far bigger in size than in the past, and it now generates more output than it did with double-digit growth in the past. Household consumption and the services sector have become the main drivers of growth. In the first three quarters of 2016, added value of the tertiary industry took up 52.8 percent of the GDP and domestic consumption contributed to 71 percent of economic growth. Household income and employment have steadily risen, while per unit GDP energy consumption continues to drop. Our efforts to pursue green development are paying off. The Chinese economy faces downward pressure and many difficulties, including acute mismatch between excess capacity and an upgrading demand structure, lack of internal driving force for growth, accumulation of financial risks, and growing challenges in certain regions. We see these as temporary hardships that occur on the way forward. And the measures we have taken to address these problems are producing good results. We are firm in our resolve to forge ahead. China is the world’s largest developing country with over 1.3 billion people, and their living standards are not yet high. But this reality also means China has enormous potential and space for development. Guided by the vision of innovative, coordinated, green, open and shared development, we will adapt to the new normal, stay ahead of the curve, and make coordinated efforts to maintain steady growth, accelerate reform, adjust economic structure, improve people’s living standards and fend off risks. With these efforts, we aim to achieve medium-high rate of growth and upgrade the economy to higher end of the value chain.
  • We should foster a culture that values diligence, frugality and enterprise and respects the fruits of hard work of all. Priority should be given to addressing poverty, unemployment, the widening income gap and the concerns of the disadvantaged to promote social equity and justice. It is important to protect the environment while pursuing economic and social progress so as to achieve harmony between man and nature and between man and society. The 2030 Agenda for Sustainable Development should be implemented to realize balanced development across the world. A Chinese adage reads, “Victory is ensured when people pool their strength; success is secured when people put their heads together.” As long as we keep to the goal of building a community of shared future for mankind and work hand in hand to fulfill our responsibilities and overcome difficulties, we will be able to create a better world and deliver better lives for our peoples.
  • This is a path that puts people’s interests first. China follows a people-oriented development philosophy and is committed to bettering the lives of its people. Development is of the people, by the people and for the people. China pursues the goal of common prosperity. We have taken major steps to alleviate poverty and lifted over 700 million people out of poverty, and good progress is being made in our efforts to finish building a society of initial prosperity in all respects. This is a path of pursuing reform and innovation. China has tackled difficulties and met challenges on its way forward through reform. China has demonstrated its courage to take on difficult issues, navigate treacherous rapids and remove institutional hurdles standing in the way of development. These efforts have enabled us to unleash productivity and social vitality. Building on progress of 30-odd years of reform, we have introduced more than 1,200 reform measures over the past four years, injecting powerful impetus into China’s development.
  • This is a path of pursuing common development through opening-up. China is committed to a fundamental policy of opening-up and pursues a win-win opening-up strategy. China’s development is both domestic and external oriented; while developing itself, China also shares more of its development outcomes with other countries and peoples. China’s outstanding development achievements and the vastly improved living standards of the Chinese people are a blessing to both China and the world. Such achievements in development over the past decades owe themselves to the hard work and perseverance of the Chinese people, a quality that has defined the Chinese nation for several thousand years. We Chinese know only too well that there is no such thing as a free lunch in the world. For a big country with over 1.3 billion people, development can be achieved only with the dedication and tireless efforts of its own people. We cannot expect others to deliver development to China, and no one is in a position to do so. When assessing China’s development, one should not only see what benefits the Chinese people have gained, but also how much hard effort they have put in, not just what achievements China has made, but also what contribution China has made to the world. Then one will reach a balanced conclusion about China’s development.
  • Between 1950 and 2016, despite its modest level of development and living standard, China provided more than 400 billion yuan of foreign assistance, undertook over 5,000 foreign assistance projects, including nearly 3,000 complete projects, and held over 11,000 training workshops in China for over 260,000 personnel from other developing countries. Since it launched reform and opening-up, China has attracted over $1.7 trillion of foreign investment and made over $1.2 trillion of direct outbound investment, making huge contribution to global economic development. In the years following the outbreak of the international financial crisis, China contributed to over 30 percent of global growth every year on average. All these figures are among the highest in the world. The figures speak for themselves. China’s development is an opportunity for the world; China has not only benefited from economic globalization but also contributed to it. Rapid growth in China has been a sustained, powerful engine for global economic stability and expansion. The inter-connected development of China and a large number of other countries has made the world economy more balanced. China’s remarkable achievement in poverty reduction has contributed to more inclusive global growth. And China’s continuous progress in reform and opening-up has lent much momentum to an open world economy.
  • Fourth, we should develop a balanced, equitable and inclusive development model. As the Chinese saying goes, “A just cause should be pursued for common good.”Development is ultimately for the people. To achieve more balanced development and ensure that the people have equal access to opportunities and share in the benefits of development, it is crucial to have a sound development philosophy and model and make development equitable, effective and balanced.
  • — China will foster an enabling and orderly environment for investment. We will expand market access for foreign investors, build high-standard pilot free trade zones, strengthen protection of property rights, and level the playing field to make China’s market more transparent and better regulated. In the coming five years, China is expected to import $8 trillion of goods, attract $600 billion of foreign investment and make $750 billion of outbound investment. Chinese tourists will make 700 million overseas visits. All this will create a bigger market, more capital, more products and more business opportunities for other countries. China’s development will continue to offer opportunities to business communities in other countries. China will keep its door wide open and not close it. An open door allows both other countries to access the Chinese market and China itself to integrate with the world. And we hope that other countries will also keep their door open to Chinese investors and keep the playing field level for us.
  • — China will vigorously foster an external environment of opening-up for common development. We will advance the building of the Free Trade Area of the Asia Pacific and negotiations of the Regional Comprehensive Economic Partnership to form a global network of free trade arrangements. China stands for concluding open, transparent and win-win regional free trade arrangements and opposes forming exclusive groups that are fragmented in nature. China has no intention to boost its trade competitiveness by devaluing the RMB, still less will it launch a currency war. Over three years ago, I put forward the “Belt and Road” initiative. Since then, over 100 countries and international organizations have given warm responses and support to the initiative. More than 40 countries and international organizations have signed cooperation agreements with China, and our circle of friends along the “Belt and Road” is growing bigger. Chinese companies have made over $50 billion of investment and launched a number of major projects in the countries along the routes, spurring the economic development of these countries and creating many local jobs. The “Belt and Road” initiative originated in China, but it has delivered benefits well beyond its borders.
  • Ladies and Gentlemen,Dear Friends, World history shows that the road of human civilization has never been a smooth one, and that mankind has made progress by surmounting difficulties. No difficulty, however daunting, will stop mankind from advancing. When encountering difficulties, we should not complain about ourselves, blame others, lose confidence or run away from responsibilities. We should join hands and rise to the challenge. History is created by the brave. Let us boost confidence, take actions and march arm-in-arm toward a bright future.
  •  
    Very important speech. A must-read (I snipped only portions).
Paul Merrell

Data Transfer Pact Between U.S. and Europe Is Ruled Invalid - The New York Times - 0 views

  • Europe’s highest court on Tuesday struck down an international agreement that allowed companies to move digital information like people’s web search histories and social media updates between the European Union and the United States. The decision left the international operations of companies like Google and Facebook in a sort of legal limbo even as their services continued working as usual.The ruling, by the European Court of Justice, said the so-called safe harbor agreement was flawed because it allowed American government authorities to gain routine access to Europeans’ online information. The court said leaks from Edward J. Snowden, the former contractor for the National Security Agency, made it clear that American intelligence agencies had almost unfettered access to the data, infringing on Europeans’ rights to privacy. The court said data protection regulators in each of the European Union’s 28 countries should have oversight over how companies collect and use online information of their countries’ citizens. European countries have widely varying stances towards privacy.
  • Data protection advocates hailed the ruling. Industry executives and trade groups, though, said the decision left a huge amount of uncertainty for big companies, many of which rely on the easy flow of data for lucrative businesses like online advertising. They called on the European Commission to complete a new safe harbor agreement with the United States, a deal that has been negotiated for more than two years and could limit the fallout from the court’s decision.
  • Some European officials and many of the big technology companies, including Facebook and Microsoft, tried to play down the impact of the ruling. The companies kept their services running, saying that other agreements with the European Union should provide an adequate legal foundation.But those other agreements are now expected to be examined and questioned by some of Europe’s national privacy watchdogs. The potential inquiries could make it hard for companies to transfer Europeans’ information overseas under the current data arrangements. And the ruling appeared to leave smaller companies with fewer legal resources vulnerable to potential privacy violations.
  • ...3 more annotations...
  • “We can’t assume that anything is now safe,” Brian Hengesbaugh, a privacy lawyer with Baker & McKenzie in Chicago who helped to negotiate the original safe harbor agreement. “The ruling is so sweepingly broad that any mechanism used to transfer data from Europe could be under threat.”At issue is the sort of personal data that people create when they post something on Facebook or other social media; when they do web searches on Google; or when they order products or buy movies from Amazon or Apple. Such data is hugely valuable to companies, which use it in a broad range of ways, including tailoring advertisements to individuals and promoting products or services based on users’ online activities.The data-transfer ruling does not apply solely to tech companies. It also affects any organization with international operations, such as when a company has employees in more than one region and needs to transfer payroll information or allow workers to manage their employee benefits online.
  • But it was unclear how bulletproof those treaties would be under the new ruling, which cannot be appealed and went into effect immediately. Europe’s privacy watchdogs, for example, remain divided over how to police American tech companies.France and Germany, where companies like Facebook and Google have huge numbers of users and have already been subject to other privacy rulings, are among the countries that have sought more aggressive protections for their citizens’ personal data. Britain and Ireland, among others, have been supportive of Safe Harbor, and many large American tech companies have set up overseas headquarters in Ireland.
  • “For those who are willing to take on big companies, this ruling will have empowered them to act,” said Ot van Daalen, a Dutch privacy lawyer at Project Moore, who has been a vocal advocate for stricter data protection rules. The safe harbor agreement has been in place since 2000, enabling American tech companies to compile data generated by their European clients in web searches, social media posts and other online activities.
  •  
    Another take on it from EFF: https://www.eff.org/deeplinks/2015/10/europes-court-justice-nsa-surveilance Expected since the Court's Advocate General released an opinion last week, presaging today's opinion.  Very big bucks involved behind the scenes because removing U.S.-based internet companies from the scene in the E.U. would pave the way for growth of E.U.-based companies.  The way forward for the U.S. companies is even more dicey because of a case now pending in the U.S.  The Second U.S. Circuit Court of Appeals is about to decide a related case in which Microsoft was ordered by the lower court to produce email records stored on a server in Ireland. . Should the Second Circuit uphold the order and the Supreme Court deny review, then under the principles announced today by the Court in the E.U., no U.S.-based company could ever be allowed to have "possession, custody, or control" of the data of E.U. citizens. You can bet that the E.U. case will weigh heavily in the Second Circuit's deliberations.  The E.U. decision is by far and away the largest legal event yet flowing out of the Edward Snowden disclosures, tectonic in scale. Up to now, Congress has succeeded in confining all NSA reforms to apply only to U.S. citizens. But now the large U.S. internet companies, Google, Facebook, Microsoft, Dropbox, etc., face the loss of all Europe as a market. Congress *will* be forced by their lobbying power to extend privacy protections to "non-U.S. persons."  Thank you again, Edward Snowden.
Gary Edwards

As Country Club Republicans Link Up With The Democratic Ruling Class, Millions Of Voter... - 0 views

  •  
    "By Angelo Codevilla  (In August/July of 2012, Mr. Codevilla published another earth shaking analysis where he used the terms "ruling class" and "ruling elites".  This time he shakes it up exposing the Republican Party elites as part of the ruling class, consistently working against the interests of the millions of Americans who voted for them). On January 1, 2013 one third of Republican congressmen, following their leaders, joined with nearly all Democrats to legislate higher taxes and more subsidies for Democratic constituencies. Two thirds voted no, following the people who had elected them. For generations, the Republican Party had presented itself as the political vehicle for Americans whose opposition to ever-bigger government financed by ever-higher taxes makes them a "country class."  Yet modern Republican leaders, with the exception of the Reagan Administration, have been partners in the expansion of government, indeed in the growth of a government-based "ruling class." They have relished that role despite their voters. Thus these leaders gradually solidified their choice to no longer represent what had been their constituency, but to openly adopt the identity of junior partners in that ruling class. By repeatedly passing bills that contradict the identity of Republican voters and of the majority of Republican elected representatives, the Republican leadership has made political orphans of millions of Americans. In short, at the outset of 2013 a substantial portion of America finds itself un-represented, while Republican leaders increasingly represent only themselves."
Gary Edwards

American Thinker: The Productive Class and the American Aristocracy - 1 views

  • the ruling class and the country party.
  • In his excellent American Spectator article on "America's Ruling Class and the Perils of Revolution," Angelo Codevilla calls these two antagonistic and irreconcilable groups
  • the progressive aristocracy and the productive class.
  • ...5 more annotations...
  • they are more than just political movements and are in fact separate cultures.
  • The culture of the progressive aristocracy is devoted to statism, whereas the productive class tends to hold classical liberal values.
  • the American leaders of the past, who came from truly diverse backgrounds and held a variety of beliefs while accepting the nation's founding values.
  • progressive aristocracy is based on commitment to a set of ideas. Foremost among these is hostility toward Christianity
  • Accountability and personal responsibility -- the sine qua non of liberty and of the American experiment -- are kryptonite to the ruling class.
  •  
    As the hostilities between the current government and the Tea Party movement have become increasingly rancorous, the division of American society into two cultures holding thoroughly incompatible worldviews has become obvious. In fact, the two forces are clearly on an unavoidable collision course. Although many people may understandably be most interested in knowing which side will prevail, I think an equally important and troubling question is precisely by what means the matter will be resolved. Will reason prevail and the people in power either have their agenda confirmed or step aside gracefully? Or will there be intransigence, increasing conflict, and even violence? I do not believe that the answer to that question is by any means obvious. In his excellent American Spectator article on "America's Ruling Class and the Perils of Revolution," Angelo Codevilla calls these two antagonistic and irreconcilable groups the ruling class and the country party. Although I agree with Codevilla's outline of the two groups, I prefer to characterize them as the progressive aristocracy and the productive class. In fact, I think that it's vitally important for those in the productive class to understand that what Codevilla calls the ruling party is an aristocracy, albeit a corrupt one. Differences in nomenclature notwithstanding, Codevilla's article is particularly useful in its lengthy descriptions of the two parties to the conflict, for they are more than just political movements and are in fact separate cultures. The culture of the progressive aristocracy is devoted to statism, whereas the productive class tends to hold classical liberal values.
Paul Merrell

Shaking My Head - Medium - 0 views

  • Last month, at the request of the Department of Justice, the Courts approved changes to the obscure Rule 41 of the Federal Rules of Criminal Procedure, which governs search and seizure. By the nature of this obscure bureaucratic process, these rules become law unless Congress rejects the changes before December 1, 2016.Today I, along with my colleagues Senators Paul from Kentucky, Baldwin from Wisconsin, and Daines and Tester from Montana, am introducing the Stopping Mass Hacking (SMH) Act (bill, summary), a bill to protect millions of law-abiding Americans from a massive expansion of government hacking and surveillance. Join the conversation with #SMHact.
  • For law enforcement to conduct a remote electronic search, they generally need to plant malware in — i.e. hack — a device. These rule changes will allow the government to search millions of computers with the warrant of a single judge. To me, that’s clearly a policy change that’s outside the scope of an “administrative change,” and it is something that Congress should consider. An agency with the record of the Justice Department shouldn’t be able to wave its arms and grant itself entirely new powers.
  • These changes say that if law enforcement doesn’t know where an electronic device is located, a magistrate judge will now have the the authority to issue a warrant to remotely search the device, anywhere in the world. While it may be appropriate to address the issue of allowing a remote electronic search for a device at an unknown location, Congress needs to consider what protections must be in place to protect Americans’ digital security and privacy. This is a new and uncertain area of law, so there needs to be full and careful debate. The ACLU has a thorough discussion of the Fourth Amendment ramifications and the technological questions at issue with these kinds of searches.The second part of the change to Rule 41 would give a magistrate judge the authority to issue a single warrant that would authorize the search of an unlimited number — potentially thousands or millions — of devices, located anywhere in the world. These changes would dramatically expand the government’s hacking and surveillance authority. The American public should understand that these changes won’t just affect criminals: computer security experts and civil liberties advocates say the amendments would also dramatically expand the government’s ability to hack the electronic devices of law-abiding Americans if their devices were affected by a computer attack. Devices will be subject to search if their owners were victims of a botnet attack — so the government will be treating victims of hacking the same way they treat the perpetrators.
  • ...1 more annotation...
  • As the Center on Democracy and Technology has noted, there are approximately 500 million computers that fall under this rule. The public doesn’t know nearly enough about how law enforcement executes these hacks, and what risks these types of searches will pose. By compromising the computer’s system, the search might leave it open to other attackers or damage the computer they are searching.Don’t take it from me that this will impact your security, read more from security researchers Steven Bellovin, Matt Blaze and Susan Landau.Finally, these changes to Rule 41 would also give some types of electronic searches different, weaker notification requirements than physical searches. Under this new Rule, they are only required to make “reasonable efforts” to notify people that their computers were searched. This raises the possibility of the FBI hacking into a cyber attack victim’s computer and not telling them about it until afterward, if at all.
Paul Merrell

Spying by N.S.A. Ally Entangled U.S. Law Firm - NYTimes.com - 0 views

  • The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: American lawyers. A top-secret document, obtained by the former N.S.A. contractor Edward J. Snowden, shows that an American law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance in which Americans were ensnared by the eavesdroppers, and is of particular interest because lawyers in the United States with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. Related Coverage Text: Document Describes Eavesdropping on American Law FirmFEB. 15, 2014 The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. It reports that the N.S.A.’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the American law firm, and offered to share the information.
  • The Australians told officials at an N.S.A. liaison office in Canberra, Australia, that “information covered by attorney-client privilege may be included” in the intelligence gathering, according to the document, a monthly bulletin from the Canberra office. The law firm was not identified, but Mayer Brown, a Chicago-based firm with a global practice, was then advising the Indonesian government on trade issues. On behalf of the Australians, the liaison officials asked the N.S.A. general counsel’s office for guidance about the spying. The bulletin notes only that the counsel’s office “provided clear guidance” and that the Australian agency “has been able to continue to cover the talks, providing highly useful intelligence for interested US customers.” The N.S.A. declined to answer questions about the reported surveillance, including whether information involving the American law firm was shared with United States trade officials or negotiators.
  • Most attorney-client conversations do not get special protections under American law from N.S.A. eavesdropping. Amid growing concerns about surveillance and hacking, the American Bar Association in 2012 revised its ethics rules to explicitly require lawyers to “make reasonable efforts” to protect confidential information from unauthorized disclosure to outsiders.Last year, the Supreme Court, in a 5-to-4 decision, rebuffed a legal challenge to a 2008 law allowing warrantless wiretapping that was brought in part by lawyers with foreign clients they believed were likely targets of N.S.A. monitoring. The lawyers contended that the law raised risks that required them to take costly measures, like traveling overseas to meet clients, to protect sensitive communications. But the Supreme Court dismissed their fears as “speculative.”The N.S.A. is prohibited from targeting Americans, including businesses, law firms and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the N.S.A. does not use the spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada and New Zealand — to skirt the law.
  • ...4 more annotations...
  • The N.S.A.’s protections for attorney-client conversations are narrowly crafted, said Stephen Gillers, an expert on legal ethics at New York University’s School of Law. The agency is barred from sharing with prosecutors intercepted attorney-client communications involving someone under indictment in the United States, according to previously disclosed N.S.A. rules. But the agency may still use or share the information for intelligence purposes. Andrew M. Perlman, a Suffolk University law professor who specializes in legal ethics and technology issues, said the growth of surveillance was troubling for lawyers. He helped create the bar association’s ethics code revisions that require lawyers to try to avoid being overheard by eavesdroppers. “You run out of options very quickly to communicate with someone overseas,” he said. “Given the difficulty of finding anything that is 100 percent secure, lawyers are in a difficult spot to ensure that all of the information remains in confidence.” 
  • Still, the N.S.A. can intercept the communications of Americans if they are in contact with a foreign intelligence target abroad, such as Indonesian officials. The N.S.A. is then required to follow so-called minimization rules to protect their privacy, such as deleting the identity of Americans or information that is not deemed necessary to understand or assess the foreign intelligence, before sharing it with other agencies. An N.S.A. spokeswoman said the agency’s Office of the General Counsel was consulted when issues of potential attorney-client privilege arose and could recommend steps to protect such information. “Such steps could include requesting that collection or reporting by a foreign partner be limited, that intelligence reports be written so as to limit the inclusion of privileged material and to exclude U.S. identities, and that dissemination of such reports be limited and subject to appropriate warnings or restrictions on their use,” said Vanee M. Vines, the spokeswoman.
  • In justifying the agency’s sweeping powers, the Obama administration often emphasizes the N.S.A.’s role in fighting terrorism and cyberattacks, but disclosures in recent months from the documents leaked by Mr. Snowden show the agency routinely spies on trade negotiations, communications of economic officials in other countries and even foreign corporations.
  • Other documents obtained from Mr. Snowden reveal that the N.S.A. shares reports from its surveillance widely among civilian agencies. A 2004 N.S.A. document, for example, describes how the agency’s intelligence gathering was critical to the Agriculture Department in international trade negotiations. “The U.S.D.A. is involved in trade operations to protect and secure a large segment of the U.S. economy,” that document states. Top agency officials “often rely on SIGINT” — short for the signals intelligence that the N.S.A. eavesdropping collects — “to support their negotiations.”
  •  
    Outrageous.
Paul Merrell

Leaked memos reveal GCHQ efforts to keep mass surveillance secret | UK news | The Guardian - 0 views

  • The UK intelligence agency GCHQ has repeatedly warned it fears a "damaging public debate" on the scale of its activities because it could lead to legal challenges against its mass-surveillance programmes, classified internal documents reveal.Memos contained in the cache disclosed by the US whistleblower Edward Snowden detail the agency's long fight against making intercept evidence admissible as evidence in criminal trials – a policy supported by all three major political parties, but ultimately defeated by the UK's intelligence community.Foremost among the reasons was a desire to minimise the potential for challenges against the agency's large-scale interception programmes, rather than any intrinsic threat to security, the documents show.
  • The papers also reveal that:• GCHQ lobbied furiously to keep secret the fact that telecoms firms had gone "well beyond" what they were legally required to do to help intelligence agencies' mass interception of communications, both in the UK and overseas.• GCHQ feared a legal challenge under the right to privacy in the Human Rights Act if evidence of its surveillance methods became admissible in court.• GCHQ assisted the Home Office in lining up sympathetic people to help with "press handling", including the Liberal Democrat peer and former intelligence services commissioner Lord Carlile, who this week criticised the Guardian for its coverage of mass surveillance by GCHQ and America's National Security Agency.The most recent attempt to make intelligence gathered from intercepts admissible in court, proposed by the last Labour government, was finally stymied by GCHQ, MI5 and MI6 in 2009.
  • Another top GCHQ priority in resisting the admission of intercepts as evidence was keeping secret the extent of the agency's co-operative relationships with telephone companies – including being granted access to communications networks overseas.In June, the Guardian disclosed the existence of GCHQ's Tempora internet surveillance programme. It uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to vast swaths of internet users' personal data. The intercepts are placed in the UK and overseas, with the knowledge of companies owning either the cables or landing stations.The revelations of voluntary co-operation with some telecoms companies appear to contrast markedly with statements made by large telecoms firms in the wake of the first Tempora stories. They stressed that they were simply complying with the law of the countries in which they operated.
  • ...6 more annotations...
  • In reality, numerous telecoms companies were doing much more than that, as disclosed in a secret document prepared in 2009 by a joint working group of GCHQ, MI5 and MI6.Their report contended that allowing intercepts as evidence could damage relationships with "Communications Service Providers" (CSPs).In an extended excerpt of "the classified version" of a review prepared for the Privy Council, a formal body of advisers made up of current and former cabinet ministers, the document sets out the real nature of the relationship between telecoms firms and the UK government."Under RIPA [the Regulation of Investigatory Powers Act 2000], CSPs in the UK may be required to provide, at public expense, an adequate interception capability on their networks," it states. "In practice all significant providers do provide such a capability. But in many cases their assistance – while in conformity with the law – goes well beyond what it requires."
  • GCHQ's internet surveillance programme is the subject of a challenge in the European court of human rights, mounted by three privacy advocacy groups. The Open Rights Group, English PEN and Big Brother Watch argue the "unchecked surveillance" of Tempora is a challenge to the right to privacy, as set out in the European convention on human rights.That the Tempora programme appears to rely at least in part on voluntary co-operation of telecoms firms could become a major factor in that ongoing case. The revelation could also reignite the long-running debate over allowing intercept evidence in court.GCHQ's submission goes on to set out why its relationships with telecoms companies go further than what can be legally compelled under current law. It says that in the internet era, companies wishing to avoid being legally mandated to assist UK intelligence agencies would often be able to do so "at little cost or risk to their operations" by moving "some or all" of their communications services overseas.
  • As a result, "it has been necessary to enter into agreements with both UK-based and offshore providers for them to afford the UK agencies access, with appropriate legal authorisation, to the communications they carry outside the UK".The submission to ministers does not set out which overseas firms have entered into voluntary relationships with the UK, or even in which countries they operate, though documents detailing the Tempora programme made it clear the UK's interception capabilities relied on taps located both on UK soil and overseas.There is no indication as to whether the governments of the countries in which deals with companies have been struck would be aware of the GCHQ cable taps.
  • Evidence that telecoms firms and GCHQ are engaging in mass interception overseas could stoke an ongoing diplomatic row over surveillance ignited this week after the German chancellor, Angela Merkel, accused the NSA of monitoring her phone calls, and the subsequent revelation that the agency monitored communications of at least 35 other world leaders.On Friday, Merkel and the French president, François Hollande, agreed to spearhead efforts to make the NSA sign a new code of conduct on how it carried out intelligence operations within the European Union, after EU leaders warned that the international fight against terrorism was being jeopardised by the perception that mass US surveillance was out of control.Fear of diplomatic repercussions were one of the prime reasons given for GCHQ's insistence that its relationships with telecoms firms must be kept private .
  • Telecoms companies "feared damage to their brands internationally, if the extent of their co-operation with HMG [Her Majesty's government] became apparent", the GCHQ document warned. It added that if intercepts became admissible as evidence in UK courts "many CSPs asserted that they would withdraw their voluntary support".The report stressed that while companies are going beyond what they are required to do under UK law, they are not being asked to violate it.Shami Chakrabarti, Director of Liberty and Anthony Romero Executive Director of the American Civil Liberties Union issued a joint statement stating:"The Guardian's publication of information from Edward Snowden has uncovered a breach of trust by the US and UK Governments on the grandest scale. The newspaper's principled and selective revelations demonstrate our rulers' contempt for personal rights, freedoms and the rule of law.
  • "Across the globe, these disclosures continue to raise fundamental questions about the lack of effective legal protection against the interception of all our communications."Yet in Britain, that conversation is in danger of being lost beneath self-serving spin and scaremongering, with journalists who dare to question the secret state accused of aiding the enemy."A balance must of course be struck between security and transparency, but that cannot be achieved whilst the intelligence services and their political masters seek to avoid any scrutiny of, or debate about, their actions."The Guardian's decision to expose the extent to which our privacy is being violated should be applauded and not condemned."
  •  
    The Guardian lands another gigantic bomb squarely on target, with massive potential for diplomatic, political, and financial disruption. Well done, Guardian. 
1 - 20 of 381 Next › Last »
Showing 20 items per page