Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged science

Rss Feed Group items tagged

Paul Merrell

Glenn Greenwald: The NSA Can "Literally Watch Every Keystroke You Make" - 0 views

  • On Sunday, the German publication Der Spiegel revealed new details about secretive hacking—a secretive hacking unit inside the NSA called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Still with us, Jameel Jaffer, deputy legal director of the ACLU, director of the ACLU’s Center for Democracy, and Glenn Greenwald, the journalist who first broke the story about Edward Snowden. Glenn, can you just talk about the revelations in Der Spiegel?
  • And one of the ways that they’re doing it is that they intercept products in transit, such as if you order a laptop or other forms of Internet routers or servers and the like, they intercept it in transit, open the box, implant the malware, factory-seal it and then send it back to the user. They also exploit weaknesses in Google and YouTube and Yahoo and other services, as well, in order to implant these devices. It’s unclear to what extent, if at all, the companies even know about it, let alone cooperate in it. But what is clear is that they’ve been able to compromise the physical machines themselves, so that it makes no difference what precautions you take in terms of safeguarding the sanctity of your online activity.
  • But we’ve actually been working, ourselves, on certain stories that should be published soon regarding similar interdiction efforts. And one of the things that I think is so amazing about this, Amy, is that the U.S. government has spent the last three or four years shrilly, vehemently warning the world that Chinese technology companies are unsafe to purchase products from, because they claim the Chinese government interdicts these products and installs surveillance, backdoors and other forms of malware onto the machinery so that when you get them, immediately your privacy is compromised. And they’ve actually driven Chinese firms out of the U.S. market and elsewhere with these kinds of accusations. Congress has convened committees to issue reports making these kind of accusations about Chinese companies. And yet, at the same time, the NSA is doing exactly that which they accuse these Chinese companies of doing. And there’s a real question, which is: Are these warnings designed to steer people away from purchasing Chinese products into the arms of the American industry so that the NSA’s ability to implant these devices becomes even greater, since now everybody is buying American products out of fear that they can no longer buy Chinese products because this will happen to them?
  • ...1 more annotation...
  • And the final thing I want to say is, you know, all this talk about amnesty for Edward Snowden, and it’s so important that the rule of law be applied to him, it’s really quite amazing. Here’s Michael Hayden. He oversaw the illegal warrantless eavesdropping program implemented under the Bush administration. He oversaw torture and rendition as the head of the CIA. James Clapper lied to the face of Congress. These are felonies at least as bad, and I would say much worse, than anything Edward Snowden is accused of doing, and yet they’re not prosecuted. They’re free to appear on television programs. The United States government in Washington constantly gives amnesty to its highest officials, even when they commit the most egregious crimes. And yet the idea of amnesty for a whistleblower is considered radical and extreme. And that’s why a hardened felon like Michael Hayden is free to walk around on the street and is treated on American media outlets as though he’s some learned, wisdom-drenched elder statesman, rather than what he is, which is a chronic criminal.
  •  
    Greenwald asks a very good question about the U.S. government accusing the Chinese government of cyber-espionage and the government's finding that Chinese-manufactured ware pose a security risk. Was that intended to drive people to purchase hardware that comes equipped with NSA backdoors? The flip side, of course, is whether the world should be beating feet to purchase their hardware from the Chinese in order to escape the NSA backdoors. Then there is the question of how those backdoors might have made their way into the hardware devices without the acquiescence of their manufacturers, who surely would have realized that their businesses might take enormous financial hits if knowledge of the backdoors became public? Bribing key staff? The manufacturers named in the Der Spiegel article surely are going to face some hard questions and they may face some very unhappy shareholders if their stock prices take a dive. It would be fun to see a shareholder's derivative class action against one of these companies for having acquiesced to NSA implantation of backdoors, leading to the disclosure and the fall in stock price. Caption the case as Wall Street, Inc. v. National Security Agency, dba Seagate Technology, PLC, then watch the feathers and blood fly.  "Seagate is the company the world trusts to store our lives - our files and photos, our libraries and histories, our science and progress."   Yes, and your stockholders trusted you not to endanger their investment by adding NSA backdoors in your products.
Gary Edwards

Breakaway Civilizations/ Rethinking History - Shows - Coast to Coast AM - 0 views

  •  
    "Date: 03-16-14 Host: George Knapp Guests: Joseph P. Farrell, Brad Olsen In the first half, George Knapp was joined by author Joseph Farrell, who detailed his research into the possibility that a secret, breakaway civilization was formed by American elites following World War II. He explained that, after the war, the United States was faced with three formidable challenges: escaped Nazis bent on recreating their empire elsewhere, the Cold War, and the UFO phenomenon. In turn, Farrell surmised, a secret system was put into place to develop defenses against these dangers facing the country. He theorized that, in order to surreptitiously fund such a massive undertaking, the United States used the vast wealth that had been plundered by Japan during WWII to bankroll various projects. Farrell suggested that, over time, similar secret infrastructures were created by other technologically advanced countries such as England, Russia, and China. In the ensuing years since its creation, Farrell said, the American organization likely developed amazing technological capabilities far beyond what is known to the general population, hence the concept of a 'breakaway civilization,' which shares our planet but exists within a world of knowledge far different from our own. Manmade UFOs, weather control, and zero point energy may be achievements that have secretly been accomplished, but remain classified for fear of revealing technologies which could be weaponized and used against the United States. Farrell pointed to the emergence of 3D printing and the push for mining in space as potential signs of previously accomplished breakthroughs which are now slowly being introduced to the public. --------------------------------- In the latter half, author Brad Olsen discussed flaws in modern history and how conspiracy theories, esoteric insights, and fringe subjects can be used to help change a dead-end course for humanity. He contended that nearly every facet of human life, from science,
Paul Merrell

Obama's "War on Ebola" or War for Oil? Sending 3000 Troops to African "Ebola" Areas tha... - 0 views

  • For a Nobel Peace Prize President, Barack Obama seems destined to go down in history books as the President who presided over one of the most aggressive series of wars ever waged by a bellicose Washington Administration. Not even George Bush and Dick Cheney came close.
  • Now Obama’s advisers, no doubt led by the blood-thirsty National Security Adviser, Susan Rice, have come up with a new war. This is the War Against Ebola. On September 16, President Obama solemnly declared the war. He announced, to the surprise of most sane citizens, that he had ordered 3,000 American troops, the so-called “boots on the ground” that the Pentagon refuses to agree to in Syria, to wage a war against….a virus? In a carefully stage-managed appearance at the US Centers for Disease Control (CDC), Obama read a bone-chilling speech. He called the alleged Ebola outbreaks in west Africa, “a global threat, and it demands a truly global response. This is an epidemic that is not just a threat to regional security. It’s a potential threat to global security, if these countries break down, if their economies break down, if people panic,” Obama continued, conjuring images that would have made Andromeda Strain novelist Michael Chrichton drool with envy. Obama added, “That has profound effects on all of us, even if we are not directly contracting the disease. This outbreak is already spiraling out of control.”
  • With that hair-raising introduction, the President of the world’s greatest Superpower announced his response. In his role as Commander-in-Chief of the United States of America announced he has ordered 3,000 US troops to west Africa in what he called, “the largest international response in the history of the CDC.” He didn’t make clear if their job would be to shoot the virus wherever it reared its ugly head, or to shoot any poor hapless African suspected of having Ebola. Little does it matter that the US military doesn’t have anywhere near 3,000 troops with the slightest training in public health. Before we all panic and line up to receive the millions of doses of untested and reportedly highly dangerous “Ebola vaccines” the major drug-makers are preparing to dump on the market, some peculiarities of this Ebola outbreak in Africa are worth noting.
  • ...6 more annotations...
  • A major problem for Chan and her backers, however, is that her Ebola statistics are very, very dubious. For those whose memory is short, this is the same Dr Margaret Chan at WHO in Geneva who was guilty in 2009 of trying to panic the world into taking unproven vaccines for “Swine Flu” influenza, by declaring a Global Pandemic with statistics calling every case of symptoms that of the common cold to be “Swine Flu,” whether it was runny nose, coughing, sneezing, sore throat. That changed WHO definition of Swine Flu allowed the statistics of the disease to be declared Pandemic. It was an utter fraud, a criminal fraud Chan carried out, wittingly or unwittingly (she could be simply stupid but evidence suggests otherwise), on behalf of the major US and EU pharmaceutical cartel. In a recent Washington Post article it was admitted that sixty-nine percent of all the Ebola cases in Liberia registered by WHO have not been laboratory confirmed through blood tests. Liberia is the epicenter of the Ebola alarm in west Africa. More than half of the alleged Ebola deaths, 1,224, and nearly half of all cases, 2,046, have been in Liberia says WHO. And the US FDA diagnostic test used for the lab confirmation of Ebola is so flawed that the FDA has prohibited anyone from claiming they are safe or effective. That means, a significant proportion of the remaining 31 % of the Ebola cases lab confirmed through blood tests could be false cases.
  • Then the official WHO Ebola Fact Sheet dated September, 2014, states, “It can be difficult to distinguish EVD from other infectious diseases such as malaria, typhoid fever and meningitis.” Excuse me, Dr Margaret Chan, can you say that slowly? It can be difficult to distinguish EVD from other infectious diseases such as malaria, typhoid fever and meningitis? And you admit that 69% of the declared cases have never been adequately tested? And you state that the Ebola symptoms include “sudden onset of fever fatigue, muscle pain, headache and sore throat. This is followed by vomiting, diarrhea, rash, symptoms of impaired kidney and liver function, and in some cases, both internal and external bleeding”? In short it is all the most vague and unsubstantiated basis that lies behind President Obama’s new War on Ebola.
  • One striking aspect of this new concern of the US President for the situation in Liberia and other west African states where alleged surges of Ebola are being claimed is the presence of oil, huge volumes of untapped oil. The offshore coast of Liberia and east African ‘Ebola zones’ conveniently map with the presence of vast untapped oil and gas resources shown here The issue of oil in west Africa, notably in the waters of the Gulf of Guinea have become increasingly strategic both to China who is roaming the world in search of future secure oil import sources, and the United States, whose oil geo-politics was summed up in a quip by then Secretary of State Henry Kissinger in the 1970’s: ‘If you control the oil, you control entire nations.’
  • The Obama Administration and Pentagon policy has continued that of George W. Bush who in 2008 created the US military Africa Command or AFRICOM, to battle the rapidly-growing Chinese economic presence in Africa’s potential oil-rich countries. West Africa is a rapidly-emerging oil treasure, barely tapped to date. A US Department of Energy study projected that African oil production would rise 91 percent between 2002 and 2025, much from the region of the present Ebola alarm. Chinese oil companies are all over Africa and increasingly active in west Africa, especially Angola, Sudan and Guinea, the later in the epicenter of Obama’s new War on Ebola troop deployment.
  • If the US President were genuine about his concern to contain a public health emergency, he could look at the example of that US-declared pariah Caribbean nation, Cuba. Reuters reports that the Cuban government, a small financially distressed, economically sanctioned island nation of 11 million people, with a national budget of $50 billion, Gross Domestic Product of 121 billion and per capita GDP of just over $10,000, is dispatching 165 medical personnel to Africa to regions where there are Ebola outbreaks. Washington sends 3,000 combat troops. Something smells very rotten around the entire Ebola scare.
  • F. William Engdahl is strategic risk consultant and lecturer, he holds a degree in politics from Princeton University and is a best-selling author on oil and geopolitics, exclusively for the online magazine “New Eastern Outlook”
Paul Merrell

NSA head: We need bulk collection | TheHill - 0 views

  • The head of the National Security Agency on Thursday told Senate lawmakers that preventing his agency from collecting Americans’ information in bulk would make it harder to do its job.Under questioning before the Senate Intelligence Committee, Adm. Michael Rogers agreed that ending bulk collection would “significantly reduce [his] operational capabilities.”ADVERTISEMENT“Right now, bulk collection gives us the ability ... to generate insights as to what’s going on,” Rogers told the committee.The NSA head also referenced a January report from the National Academy of Sciences that concluded there is “no software technique that will fully substitute for bulk collection” because of the ability to search through the storehouse of old information. “That independent, impartial, scientifically-founded body came back and said no, under the current structure there is no real replacement,” Rogers said.Rogers was questioned on Thursday by Sen. Ron Wyden (D-Ore.), a member of the Intelligence Committee who has become its most vocal privacy hawk.
  • In response to the NSA head’s comments, Wyden pointed to a 2013 White House review group, which found that one controversial NSA bulk collection program “was not essential to preventing attacks” and that the information obtained by the NSA “could readily have been obtained in a timely manner using” other means.The debate follows on a congressional clash earlier this year over the NSA’s bulk collection of records about the phone calls of millions of Americans. The records contained information about whom people called and when but not what they talked about.
  • After a brief lapsing of some portions of the Patriot Act, Congress eventually reined in the NSA by forcing it to go through the courts to search private phone companies’ records for a narrower set of records. Many privacy advocates treated the new law, called the USA Freedom Act, as a significant victory, through national security hawks worried that it would make it harder for the NSA to track terrorists.Under the new system — which has not gone into effect yet — the amount of time it takes to obtain those records “is probably going to be longer I suspect,” Rogers said.Though the phone records database has been the NSA’s most prominent bulk collection program, it is not the only one. The agency’s collection of vast amounts of Internet data has alarmed many privacy advocates and is the target of a current lawsuit from Wikipedia and the American Civil Liberties Union. 
Gary Edwards

Republican Contract with America, Version 2.0 -- Politics Daily - 0 views

  •  
    What follows are my suggestions for what a 21st century compact might look like. Call it the GOP Contract with America, version 2.0. -- call it whatever you want. It would not be a "purity test," but instead a promise from the party leadership to the American people that if Republicans are given control of the Congress, the following acts will be brought to a vote in the 112th Congress: ..The American Health Care Act:  ..The e-Congress Act: ..The Limited Government and Transparency Act: ..The Energy Independence Now Act: ..The Strong National Defense Act ..Secure Our Borders Act: ..The Free Campaign Speech and Workplace Act: ..The Science and Final Frontiers Act: ..The Savings for the Future Act : ..The Educate America Act
Gary Edwards

Big Lies and Little Facts - The Global Warming Hoax and the lier's who promote it - WSJ... - 0 views

  •  
    quote from global warming hoax advocate Stephen H. Schneider: "as scientists we are ethically bound to the scientific method, in effect promising to tell the truth, the whole truth, and nothing but--which means that we must include all the doubts, the caveats, the ifs, ands, and buts." So let me get this straight.  Scientist who support the global warming hoax are lying.  That puts them at odds with the most fundamental of scientific requirements - don't lie.  So therefore, global warming hoaxsters have disqualified themselves as legitimate scientists.  At best, they are dissembling practitioners of "political science". So, if we disqualify the scientific posers who are lying about global warming, and then take a look at the consensus of real scientist left (truth tellers), we have an interesting fact.  100% of legitimate scientists do not believe in the global warming hoax.   100% consensus!!! Bastardos.  Potemkin villages.  Show trials. 5 year plans.  Where have we seen this before?
Gary Edwards

Revealed - the capitalist network that runs the world - physics-math - 19 October 2011 ... - 0 views

  •  
    The secret 1% revealed at last. Using advanced "complex systems heuristics", a group of mathematicians and scientist studying the stability of complex systems has applied their techniques to study the interlocking relationships driving the global economy. They claim to have identified the inner architecture of global economic power, and hope to make it more stable. Incredible stuff! A list of the top 50 of the 147 superconnected companies cross references nicely with the question, "Who Owns the Federal Reserve Bankster Cartel?" The focus is on global "Transnational Corporations" (TNCs) and how the interlocking ownership/cross-director-relationships has affected the global economy. The study discovers a "super-entity" comprised of a core 147 companies that control over 40% of the world's wealth and productivity capacity. Most of these are global banking and financial operations. Yes, Wall Street Banksters! "In effect, less than 1 per cent of the companies were able to control 40 per cent of the entire network," says James Glattfelder, head of the Zurich research team. Most were financial institutions. The top 20 included Barclays Bank, JPMorgan Chase & Co, and The Goldman Sachs Group. Collectively this 1% control a further 60% of global revenues. excerpt: AS OWS PROTESTS against financial power sweep the world this week, science may have confirmed the protesters' worst fears. An analysis of the relationships between 43,000 transnational corporations has identified a relatively small group of companies, mainly banks, with disproportionate power over the global economy.

    The study's assumptions have attracted some criticism, but complex systems analysts contacted by New Scientist say it is a unique effort to untangle control in the global economy. Pushing the analysis further, they say, could help to identify ways of making global capitalism more stable.

    The idea that a few bankers control a large chunk of the global econo
  •  
    Important work but perhaps too immature to base decisions on with confidence. I was struck by this statement: "Glattfelder says we may need global anti-trust rules, which now exist only at national level, to limit over-connection among TNCs. Sugihara says the analysis suggests one possible solution: firms should be taxed for excess interconnectivity to discourage this risk." My relevant question is, who would be the recipients of the postulated tax? Anytime you create a revenue stream, the recipients acquire a vested interest in maintaining and expanding that revenue stream and the folks who pay the revenue acquire a vested interest in minimizing or eliminating the expense. While the payers incentives are consistent with the article's statement, the identities of the recipients and their incentives to tweak the tax to produce more revenue needs more thought and discussion with a strong focus on: [i] who makes that decision; [ii] who has the the power to decide whether that authority is abused; and [iii] who has standing to initiate actions to correct abuse. On the latter, the U.S. Constitution would seem to require that those who pay the taxes are entitled to Due Process. But at the same time, the individual consumer can also be injured by abuse. However, a hallmark trait of most trade agreements is that only government and regulated corporations are granted standing to challenge regulatory decisions, which has skewed their interpretation heavily to the corporate side. Universal standing is the cure.
Paul Merrell

Why Aren't Big Bankers in Jail? - FAIR: Fairness & Accuracy In Reporting - 0 views

  • The man in charge of a bank that engaged in massive mortgage fraud chatted with a corporate media host (CNBC Squawk on the Street, 7/12/13) about the fact that virtually none of those who enriched themselves while eviscerating the life savings of many blameless people, derailing the US economy along the way, have faced criminal prosecution
  • Granted, Cramer is no one's idea of a serious interrogator of the financial system (FAIR Blog, 3/13/09). But much journalism on the question of criminal prosecution of industry leaders amounts to similar apologia. While there have been substantive inquiries into the wrongdoing of investment banks and auditors, those calling for jail time are often dismissed as irrational, driven by "blood lust" (Washington Post, 9/12/13), "anger" (Chicago Tribune, 11/30/13) or "vengeance" (Washington Post, 11/18/13).
  • What the soft-headed among us don't recognize, evidently, is that "blowing up your company isn't necessarily a crime," as the Christian Science Monitor (10/11/11) put it. "America doesn't criminalize bad business decisions," wrote the Washington Post (9/12/13). Or, from Businessweek (5/12/11): "In the American legal system, people who merely act badly or unwisely do not do time." But some have no trouble pointing to actual crimes in the crisis. "Issuing a mortgage that is known to be based on false information and then selling it in the secondary market is fraud and punishable by time in jail," economist Dean Baker (Beat the Press, 9/13/13) noted, citing the Financial Crisis Inquiry Commission. "Packaging loans into mortgage backed securities that an investment bank has good reason to believe are based on false information is also fraud and punishable by time in jail." Former federal bailout inspector Neil Barofsky agrees we're not talking about a perhaps lamentable but inactionable "culture." Asked by NPR (7/26/13) about the no-actual-crime "narrative," Barofsky answered: "No. I think that there was a tremendous amount of fraud."
  • ...2 more annotations...
  • We're told such calls come from the margins: That no "financial industry types" have been jailed is "a recurring theme among Occupy Wall Street protesters and some Democratic politicians" (Christian Science Monitor, 10/11/11) or "the Occupy Wall Street crowd" (New York Times, 3/1/13). People who believe bankers should go to jail are deflecting blame—from the people: "The real scandal," explained the Washington Post's Charles Lane ("Banks Aren't the Bad Guys," 11/18/13), was "Americans' shared, erroneous belief in ever-rising housing prices and corresponding mania to profit from them." And maybe they need to move on: "This all happened a really long time ago. What-ever happened to the statute of limitations?" the Washington Post (11/19/13) asked itself in a recent Q&A.
  • Certainly the problem extends beyond the actions of a few bigwigs. But people who say jailing industry executives should be the sole response exist only in pundits' minds. William Black, who advocates prison for industry executives (Moyers & Company, 9/17/13), pointed to structural reasons for a lack of prosecutions, including regulatory agencies' abandonment of key functions since the 1980s' Savings & Loan scandal. "When the regulators ceased making criminal referrals—which had nothing to with an end of crime, obviously; it just had to do with a refusal to be involved in the prosecutorial effort anymore—they doomed us to a disaster where we would not succeed." Others say revolving-door relationships between banks and their government watchdogs contribute to settlements that are too generous to serve as deterrents (LittleSis, 10/23/13). Even the historic $13 billion JP Morgan settlement winds up being less than meets the eye, as much of the fine is tax-deductible, $4 billion of it is part of an earlier settlement and much of the rest will take the form of mortgage relief that will help the bank in the long run (Salon, 11/20/13).
  •  
    Fairness & Accuracy in Reporting weighs in on mainstream media's reluctance to call for banksters to be issued horizontal striped suits, noting that the excuses used ignore that there are real victims and that real crimes were comitted. 
Paul Merrell

History of the Federal Judiciary - 0 views

  •  Olmstead v. United States: The Constitutional Challenges of Prohibition Enforcement Historical Documents Dissenting opinion of Justice Louis D. Brandeis in Olmstead v. United States Justice Brandeis’s dissenting opinion is one of the more notable dissents in Supreme Court history. He attempted to define a general right of privacy based on the Fourth and Fifth Amendments. Brandeis had long been interested in the problem of privacy in the modern age; years earlier he and his law partner, Samuel Warren, published what many consider the seminal article on the topic (Samuel Warren & Louis D. Brandeis, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890)). Brandeis’s opinion in Olmstead attempted to apply to the current era what he said were the principles of the Fourth and Fifth Amendments. Historians often overlook how much his approach draws on the dissenting opinion of Judge Rudkin in the circuit court, but Brandeis himself acknowledged his debt to Rudkin in the text. The quotation about “the form that evil had theretofore taken” referred to the Supreme Court decision in Weems v. United States, in which Justice Joseph McKenna wrote of the need for the Court to apply the general principles of the Constitution to new problems.
  • Moreover, “in the application of a constitution, our contemplation cannot be only of what has been but of what may be.” The progress of science in furnishing the Government with means of espionage is not likely to stop with wire-tapping. Ways may someday be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Advances in the psychic and related sciences may bring means of exploring unexpressed beliefs, thoughts and emotions. “That places the liberty of every man in the hands of every petty officer” was said by James Otis of much lesser intrusions than these. To Lord Camden, a far slighter intrusion seemed “subversive of all the comforts of society.” Can it be that the Constitution affords no protection against such invasions of individual security? . . .
  • In Ex parte Jackson, 96 U.S. 727, it was held that a sealed letter entrusted to the mail is protected by the Amendments. The mail is a public service furnished by the Government. The telephone is a public service furnished by its authority. There is, in essence, no difference between the sealed letter and the private telephone message. As Judge Rudkin said below: “True, the one is visible, the other invisible; the one is tangible, the other intangible; the one is sealed, and the other unsealed, but these are distinctions without a difference.” The evil incident to invasion of the privacy of the telephone is far greater than that involved in tampering with the mails. Whenever a telephone line is tapped, the privacy of the persons at both ends of the line is invaded and all conversations between them upon any subject, and, although proper, confidential and privileged, may be overheard. Moreover, the tapping of one man’s telephone line involves the tapping of the telephone of every other person whom he may call or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire-tapping.
  • ...2 more annotations...
  • Time and again, this Court in giving effect to the principle underlying the Fourth Amendment, has refused to place an unduly literal construction upon it. This was notably illustrated in the Boyd case itself. Taking language in its ordinary meaning, there is no “search” or “seizure” when a defendant is required to produce a document in the orderly process of a court’s procedure. “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures,” would not be violated, under any ordinary construction of language, by compelling obedience to a subpoena. But this Court holds the evidence inadmissible simply because the information leading to the issue of the subpoena has been unlawfully secured. . . . The provision against self-incrimination in the Fifth Amendment has been given an equally broad construction. . . .
  • Decisions of this Court applying the principle of the Boyd case have settled these things. Unjustified search and seizure violates the Fourth Amendment, whatever the character of the paper; whether the paper when taken by the federal officers was in the home, in an office, or elsewhere; whether the taking was effected by force, by fraud, or in the orderly process of a court’s procedure. From these decisions, it follows necessarily that the Amendment is violated by the officer’s reading the paper without a physical seizure, without his even touching it; and that use, in any criminal proceeding, of the contents of the paper so examined—as where they are testified to by a federal officer who thus saw the document, or where, through knowledge so obtained, a copy has been procured elsewhere—any such use constitutes a violation of the Fifth Amendment. The protection guaranteed by the Amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man’s spiritual nature, of his feelings, and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone—the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment. And the use, as evidence in a criminal proceeding, of facts ascertained by such intrusion must be deemed a violation of the Fifth.
  •  
    The linked opinion is Justice Brandeis' dissent in Olmstead v. U.S., the first Supreme Court decision to approve the use of secret wiretap evidence in a criminal proceeding, even though gathered without a search warrant. The warrant requirement would later be imposed in 1967 by the decision in Katz v. U.S., which established that the Fourth Amendment the privacy of people, not places, reviving the Brandeis dissent to a large degree. Since Katz and the advent of broad government surveillance, Justice Brandeis' dissent is gaining still more attention. 
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Paul Merrell

NSA targets the privacy-conscious (Seite 1)| Das Erste - Panorama - Meldungen - 0 views

  • The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Three authors of this investigation have personal and professional ties to the Tor Project, an American company mentioned within the following investigation.
  • Teil 1: NSA targets the privacy-conscious Teil 2: The Tor Project - anathema to the NSA Teil 3: Servers in Germany targeted Teil 4: Simple web searches are suspicious Teil 5: NSA: In strict accordance with the rule of law
  • ...3 more annotations...
  • von J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Downloads XKeyscore rules Read/download the XKeyscore rules here  | download
  • Yet despite these efforts, one of the servers is targeted by the NSA. The IP address 212.212.245.170 is explicitly specified in the rules of the powerful and invasive spy software program XKeyscore. The code is published here exclusively for the first time. After a year of NSA revelations based on documents that focus on program names and high-level Powerpoint presentations, NDR and WDR are revealing NSA source code that shows how these programs function and how they are implemented in Germany and around the world. Months of investigation by the German public television broadcasters NDR and WDR, drawing on exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government reveal that not only is the server in Nuremberg under observation by the NSA, but so is virtually anyone who has taken an interest in several well-known privacy software systems.
Paul Merrell

Embassy of Cuba in NZ Newsletter - No.4 31st January 2015 | Scoop News - 0 views

  • Agreement China-CELAC a ‘Costa Rican achievement’ — Correa Ecuador president Rafael Correa has said that the Celac agreement with China, was probably the greatest achievement of Costa Rica during its presidency, adding that among the main achievements was reaching concrete agreements with China in the bilateral forum recently held there.In an interview with several local television channels, the Ecuadorian president said that for its size, China can be considered as a region, and deepening the relationship would be beneficial for the Celac countries.Beijing was the “principal financier of the world” and to achieve agreements to finance projects aimed at the development of Latin America and the Caribbean Project was “a great success,” he said.Correa, now pro tempore president of the regional bloc, said that at the current stage of development of the region, what was needed was financing.“We no longer need,” he said, “the alms like those given by NGOs who come to construct little schools, because we can do that.“What we need is science, technology, technology transfer to help us create our human talent, and China can give those to us,” he added.
  • Correa considered it was a complementary relationship between equals, given that China needs energy, oil and food, which could be obtained from Latin American and Caribbean countries.Four priority areas were identified for the work of the new presidency: reducing extreme poverty, establishment of a new international financial architecture, development of science and technology, and road, productive and energy infrastructure.
  • Cuba and China strengthen economic relations Cuba and China have signed five new agreements — in agriculture, telecoms, trade, finances, industry and transportation — confirming both countries’ interest in strengthening and expanding their economic relations.This was the result of the 27th Intergovernmental Commission Cuba-China held last week which also made official the postponement of the starting date of payment of the credit given by China through the Economic and Technical Cooperation agreement.
  • ...1 more annotation...
  • Both parties agreed to carry out a special session in four months to examine the bilateral economic agenda and the processes of implementation of the signed documents.The 27th Intergovernmental Commission also reviewed 29 cooperation and economic agreements signed during the visit of Chinese President, Xi Jinping on July 22 last year.The documents dealt with the concession of a line of credit for the construction of the multipurpose terminal in the port of Santiago de Cuba, in the eastern region of the island, among other facilities.Deputy minister of foreign trade and investment Ileana Nuñez said the agreements would attract more revenues to sectors like tourism, mining and construction.She underlined the favourable conditions and level of mutual relations, which grow, deepen and expand the interest of more Chinese investors.China is the second biggest trading partner of Cuba and Cuba is China´s major partner in the Caribbean, while Cuban tobacco and marine products gain ground in Asia.Assistant trade minister of China Zhang Xiangchen ratified their intention to honour commitments and strengthen economic and trade relations with Cuba.The trade relationship of both nations exceeded 1.4 billion dollars in 2013 and after signing the latest agreements, it could increase by 26 percent, according to official estimates.
Paul Merrell

Egypt's foreign policy accommodates world's multipolarity: ECFA discussion | Cairo Post - 0 views

  • In a step to follow the world’s political  evolution, Egypt is working on changing its foreign policy to accommodate the “multipolarity” system, former Minister of Foreign Affairs Mohamed Kamel Amr said in a conference held by the Egyptian Council for Foreign Affairs (ECFA), Tuesday. The two-day international conference dubbed “Egypt and the World… a New Era” was held in order to “correct misconceptions” of Egypt’s political development after the ouster of President Mohamed Morsi. The members of ECFA, which was formed 15 years ago, are predominantly former diplomats. “To say that Egypt is turning its back to a certain power is emotional for it is rebalancing its relations,” Amr said at the “Egypt and the World’s Major Powers” session of the conference. The U.S. delivered 10 Apache Helicopters to Egypt in November, but other than that, strategic cooperation has pretty much stopped in the past two years, said Mostafa Elwi, a Cairo University professor of political science. China and Russia supported the change after June 30, 2013, when millions marched to topple Morsi, and exchanged visits between Egyptian officials and their counterparts from these two countries have been “very fruitful,” unlike U.S. Secretary of State John Kerry’s visits to Egypt, Elwi added. Amr explained that Egypt’s foreign policy has been successful in moving forward in coalitions, rather than its own, in the face of major powers, such as the Non-Aligned Movement, the Arab League and as part of coordination with regional forces.
  • “Ridding Egypt of the U.S. dominancy is not an easy task because it is the only country in the world that has the four factors of being a dominant power: military, economy, culture and science,” Elwy said. However, he added that as bilateral relations with China and Russia have very wide and open horizons, renewed strategic relations with them should not stop at purchasing arms, but should expand to cooperation in manufacturing weapons in Egypt.
  • For his part, Councilor of the Chinese People’s Institute of Foreign Affairs Wu Sike emphasized that China respects the Egyptian people’s will, and that foreign interference in Egypt’s internal affairs is “unacceptable.” Economically, Elwy and Sike underlined that their countries realize the potential of their anticipate cooperation, especially in the New Suez Canal Project and the proposed project of the New Silk Road, planned to pass through Egypt and expected to change the course of world trade. “After the revolution of June 30, relations with Egypt, including strategic relations, will deepen. Our government encourages Chinese companies to invest in Egypt’s Suez Canal and the route of the Silk Road in its territory,” said Sike, who was also a former Egyptian Ambassador, calling on Egypt to focus on development efforts to “compensate for the time it lost.”
  •  
    One I had missed in December, 2014. China is bankrolling an upgrade of the Suez Canal and Egypt has rejected U.S. hegemony. Egypt will buy Russian and Chinese weapons but wants to expand to collaborative manufacture of weapons in Egypt.  The U.S. is paying the price of having initiated a failed "color revolution" in Egypt that gave temporary control of Egyptian government to the non-secular Muslim Brotherhood, subsquently overthrown by the Egyptian military with enormous public support. 
Paul Merrell

Exclusive: TSA's Secret Behavior Checklist to Spot Terrorists - The Intercept - 0 views

  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening. The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program.
  • Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points. These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept. The checklist is part of TSA’s controversial program to identify potential terrorists based on behaviors that it thinks indicate stress or deception — known as the Screening of Passengers by Observation Techniques, or SPOT. The program employs specially trained officers, known as Behavior Detection Officers, to watch and interact with passengers going through screening.
  • The document listing the criteria, known as the “Spot Referral Report,” is not classified, but it has been closely held by TSA and has not been previously released. A copy was provided to The Intercept by a source concerned about the quality of the program. The checklist ranges from the mind-numbingly obvious, like “appears to be in disguise,” which is worth three points, to the downright dubious, like a bobbing Adam’s apple. Many indicators, like “trembling” and “arriving late for flight,” appear to confirm allegations that the program picks out signs and emotions that are common to many people who fly.
  • ...5 more annotations...
  • A TSA spokesperson declined to comment on the criteria obtained by The Intercept. “Behavior detection, which is just one element of the Transportation Security Administration’s (TSA) efforts to mitigate threats against the traveling public, is vital to TSA’s layered approach to deter, detect and disrupt individuals who pose a threat to aviation,” a spokesperson said in an emailed statement.
  • Since its introduction in 2007, the SPOT program has attracted controversy for the lack of science supporting it. In 2013, the Government Accountability Office found that there was no evidence to back up the idea that “behavioral indicators … can be used to identify persons who may pose a risk to aviation security.” After analyzing hundreds of scientific studies, the GAO concluded that “the human ability to accurately identify deceptive behavior based on behavioral indicators is the same as or slightly better than chance.” The inspector general of the Department of Homeland Security found in 2013 that TSA had failed to evaluate SPOT, and “cannot ensure that passengers at United States airports are screened objectively, show that the program is cost-effective, or reasonably justify the program’s expansion.” Despite those concerns, TSA has trained and deployed thousands of Behavior Detection Officers, and the program has cost more than $900 million since it began in 2007, according to the GAO.
  • The 92-point checklist listed in the “Spot Referral Report” is divided into various categories with a point score for each. Those categories include a preliminary “observation and behavior analysis,” and then those passengers pulled over for additional inspection are scored based on two more categories: whether they have “unusual items,” like almanacs and “numerous prepaid calling cards or cell phones,” and a final category for “signs of deception,” which include “covers mouth with hand when speaking” and “fast eye blink rate. Points can also be deducted from someone’s score based on observations about the traveler that make him or her less likely, in TSA’s eyes, to be a terrorist. For example, “apparent” married couples, if both people are over 55, have two points deducted off their score. Women over the age of 55 have one pointed deducted; for men, the point deduction doesn’t come until they reach 65. Last week, the ACLU sued TSA to obtain records related to its behavior detection programs, alleging that they lead to racial profiling. The lawsuit is based on a Freedom of Information Act request the ACLU filed last November asking for numerous documents related to the program, including the scientific justification for the program, changes to the list of behavior indicators, materials used to train officers and screen passengers, and what happens to the information collected on travelers.
  • “The TSA has insisted on keeping documents about SPOT secret, but the agency can’t hide the fact that there’s no evidence the program works,” said Hugh Handeyside, staff attorney with the ACLU National Security Project, in a statement announcing the lawsuit. Being on the lookout for suspicious behavior is a “common sense approach” that is used by law enforcement, according to TSA. “No single behavior alone will cause a traveler to be referred to additional screening or will result in a call to a law enforcement officer (LEO),” the agency said in its emailed statement. “Officers are trained and audited to ensure referrals for additional screening are based only on observable behaviors and not race or ethnicity.” One former Behavior Detection Officer manager, who asked not to be identified, said that SPOT indicators are used by law enforcement to justify pulling aside anyone officers find suspicious, rather than acting as an actual checklist for specific indicators. “The SPOT sheet was designed in such a way that virtually every passenger will exhibit multiple ‘behaviors’ that can be assigned a SPOT sheet value,” the former manager said.
  • The signs of deception and fear “are ridiculous,” the source continued. “These are just ‘catch all’ behaviors to justify BDO interaction with a passenger. A license to harass.” The observations of a TSA screener or a Behavior Detection Officer shouldn’t be the basis for referring someone to law enforcement. “The program is flawed and unnecessarily delays and harasses travelers. Taxpayer dollars would be better spent funding real police at TSA checkpoints,” the former manager said. A second former Behavior Detection Officer manager, who also asked not to be identified, told The Intercept that the program suffers from lack of science and simple inconsistency, with every airport training its officers differently. “The SPOT program is bullshit,” the manager told The Intercept. “Complete bullshit.”
  •  
    I've completely boycotted airlines in the U.S. since 2002 because I refuse to submit to the outrageous treatment by government that is now required to board a commercial airliner. If the airlines want my business, they need to start lobbying to end the politics of fear and the Gestapo tactics of government. plus pushing for an honest investigation of the 9/11/2001 incidents.  
Gary Edwards

The Daily Bell - 9/11 Fourteen Years Later - 0 views

  • The Official Version of 9/11 goes something like this: Directed by a beardy-guy from a cave in Afghanistan, nineteen hard-drinking, coke-snorting, devout Muslims enjoy lap dances before their mission to meet Allah. Using nothing more than craft knifes, they overpower cabin crew, passengers and pilots on four planes. And hangover or not, they manage to give the world's most sophisticated air defence system the slip. Unfazed by leaving their "How to Fly a Passenger Jet" guide in the car at the airport, they master the controls in no-time and score direct hits on two towers, causing THREE to collapse completely.
  • The laws of physics fail, and the world watches in awe as asymmetrical damage and scattered low temperature fires cause steel-framed buildings to collapse symmetrically through their own mass at free-fall speed, for the first time in history. Despite their dastardly cunning and superb planning, they give their identity away by using explosion-proof passports, which survive the destruction of steel and concrete and fall to the ground where they are quickly discovered lying on top of the mass of debris.
  • Meanwhile in Washington Hani Hanjour, having previously flunked Cessna flying school, gets carried away with all the success of the day and suddenly finds incredible abilities behind the controls of a jet airliner. Instead of flying straight down into the large roof area of the Pentagon, he decides to show off a little. Executing an incredible 270 degree downward spiral, he levels off to hit the low facade of the Pentagon. Without ruining the nicely mowed lawn and at a speed just too fast to capture on video.
  • ...4 more annotations...
  • In the skies above Pennsylvania  Desperate to talk to loved ones before their death, some passengers use sheer willpower to connect mobile calls that would not be possible until several years later. And following a heroic attempt by some to retake control of Flight 93, the airliner crashes into a Pennsylvania field leaving no trace of engines, fuselage or occupants except for the standard issue Muslim terrorist bandana.
  • During these events President Bush continues to read "My Pet Goat" to a class of primary school children.
  • In New York World Trade Center leaseholder Larry Silverstein blesses his own foresight in insuring the buildings against terrorist attack only six weeks previously. 
  • In Washington The Neoconservatives are overjoyed by the arrival of the "New Pearl Harbor," the necessary catalyst for launching their pre-planned wars.
  •  
    "Millions of refugees from Washington's wars are currently over-running Europe. Washington's 14-year and ongoing slaughter of Muslims and destruction of their countries are war crimes for which the US government's official 9/11 conspiracy theory was the catalyst. Factual evidence and science do not support Washington's conspiracy theory. The 9/11 Commission did not conduct an investigation. It was not permitted to investigate. The Commission sat and listened to the government's story and wrote it down. Afterwards, the chairman and cochairman of the Commission said that the Commission "was set up to fail." For a factual explanation of 9/11, watch this film: https://www.youtube.com/watch?v=OsoY3AIRUGA&feature=youtu.be. Here is an extensive examination of many of the aspects of 9/11: http://www.luogocomune.net/site/modules/sections/index.php?op=viewarticle&artid=167. Phil Restino of the Central Florida chapter of Veterans For Peace wants to know why national antiwar organizations buy into the official 9/11 story when the official story is the basis for the wars that antiwar organizations oppose. Some are beginning to wonder if ineffectual peace groups are really Homeland Security or CIA fronts. The account below of the government's 9/11 conspiracy theory reads like a parody, but in fact is an accurate summary of the official 9/11 conspiracy theory. It was posted as a comment in the online UK Telegraph on September 12, 2009, in response to Charlie Sheen's request to President Obama to conduct a real investigation into what happened on September 11, 2001."
Gary Edwards

Search for "cash" - Washington's Blog - 2 views

  •  
    "Business, Investing, Economy, Politics, World News, Energy, Environment, Science, Technology" A Marbux favorite!
Paul Merrell

Who owns space? US asteroid-mining act is dangerous and potentially illegal - 0 views

  • Nope, a flag is not enough to make the moon a colony.
  • An event of cosmic proportions occurred on November 18 when the US congress passed the Space Act of 2015 into law. The legislation will give US space firms the rights to own and sell natural resources they mine from bodies in space, including asteroids. Although the act, passed with bipartisan support, still requires President Obama’s signature, it is already the most significant salvo that has been fired in the ideological battle over ownership of the cosmos. It goes against a number of treaties and international customary law which already apply to the entire universe. The new law is nothing but a classic rendition of the “he who dares wins” philosophy of the Wild West. The act will also allow the private sector to make space innovations without regulatory oversight during an eight-year period and protect spaceflight participants from financial ruin. Surely, this will see private firms begin to incorporate the mining of asteroids into their investment plans.
  • Supporters argue that the US Space Act is a bold statement that finally sets private spaceflight free from the heavy regulation of the US government. The misdiagnosis begins here. Space exploration is a universal activity and therefore requires international regulation. The act represents a full-frontal attack on settled principles of space law which are based on two basic principles: the right of states to scientific exploration of outer space and its celestial bodies and the prevention of unilateral and unbriddled commercial exploitation of outer-space resources. These principles are found in agreements including the Outer Space Treaty of 1967 and the Moon Agreement of 1979. The US House Committee on Science, Space and Technology denies there is anything in the act which violates the US’s international obligations. According to this body, the right to extract and use resources from celestial bodies “is affirmed by State practice and by the US State Department in Congressional testimony and written correspondence”. Crucially, there is no specific reference to international law in this statement. Simply relying on US legislation and policy statements to justify the plans is obviously insufficient.
  • ...5 more annotations...
  • Gbenga Oduntan is the author of Sovereignty and Jurisdiction in Airspace and Outer Space: Legal Criteria for Spatial Delimitation. London: Routledge-Cavendish 2012. https://www.routledge.com/products/9780415562126
  • Ever since NASA discovered signs of liquid water on Mars, concerns have been raised about the risk of contaminating the red planet.
  • So what’s at stake? We can assume that the list of states that have access to outer space – currently a dozen or so – will grow. These states may also shortly respond with mining programmes of their own. That means that the pristine conditions of the cradle of nature from which our own Earth was born may become irrevocably altered forever – making it harder to trace how we came into being. Similarly, if we started contaminating celestial bodies with microbes from Earth, it could ruin our chances of ever finding alien life there. Mining minerals in space could also damage the environment around the Earth and eventually lead to conflict over resources. Indeed what right has the second highest polluter of the Earth’s environment got to proceed with some of the same corporations in a bid to plunder outer space? While we’re not there yet, developments towards actual space mining may begin to occur within a decade.
  • Ultimately, the US plans must be understood in the light of existing rules of space law. Money is not a dirty word in space – the total value of the satellite telecommunications industry in 2013 was more than $195bn. Free market principles also apply to the operations of the International Space Station. So, let’s get down to the nitty-gritty.
  • Currently corporations can exploit outer space in a number of ways, including for space tourism and scientific training. Companies may also be allowed to extract certain resources, but the very first provision of the Outer Space Treaty (1967), to which the US is a signatory, is that such exploration and use shall be carried out for the benefit and in the interests of all countries. This therefore prevents the sale of space-based minerals for profit. The treaty also states that outer space shall be the “province of all mankind … and that states shall avoid harmful contamination of space". Meanwhile, the Moon Agreement (1979) has in effect forbidden states to conduct commercial mining on planets and asteroids until there is an international regime for such exploitation. While the US has refused to sign up to this, it is binding as customary international law. The idea that American companies can on the basis of domestic laws alone systematically exploit mineral resources in space, despite huge environmental risks, really amounts to the audacity of greed. The Romans had this all correctly figured out in their legal maxim: “What concerns all must be decided upon by all.”
Paul Merrell

Storie di censure, petizioni, Elmetti bianchi e "catene di affetti" - SIBIALIRIA - 0 views

  • Much is due to the fame of the White Helmets Syrians, if they're coming in a few days than 1.5 million signatures the petition on Avaaz  Protect Aleppo's children, now! Asking for no-fly zone (a successful workhorse for Avaaz also to time of Libya, on the basis of false information). And award-winning source doc The White Helmets or white helmets, autodefinitisi Syria Civil Defense, active in areas controlled Syrian armed opposition, have recently received the Right Livelihood Award , or "alternative Nobel", normally assigned since 1990 to people who have really helped mankind - the first to receive it were an Egyptian architect of the poor and organization solutions for the vegetable against world hunger. In the words of the founder, " the award is intended to help the North find a wisdom to match the science he possesses, and the South to find a science to match the ancient wisdom that has ." Good intentions. The White Helmets Syrians are the "source" credited with many of the news coming from Aleppo East - for example on the use of "barrel bomb" or the "deliberate shelling of hospitals" - days ago in a twitter have put together the two crimes talking about a cowardly "attack on a hospital with bomb barrels." To be believed on bombs and hospital nature of the affected buildings, the helmets do not need proof, just a few photos of rubble. Of course, what they fail to tell the same International Red Cross admitted to our question (we preserve their email): the 'hospitals' in opposition areas are in no way signaled, rather they are well hidden.
  • Those who support them and what they really do, they know a few. censored The White Helmets spread video in which always appear in the rubble with babies in their arms (parents, where are they?). But, nevertheless, their deeds are other videos that are real autodenunce, but that the world has chosen to ignore, or to censor. It 'just been cleared from the site of Change the petition that the anti-war activists network Syria Solidarity Movement had addressed to the organizers of the Nobel Prize (which have already been received from: Obama, Kissinger, pears, European Union ...). The petition was titled very clearly , " Do not give the Nobel Prize in 2016 to the Syrian White Helmets ". But a few days, if you try to type on the search engine, you will see this inscription: " The petition is not available ." The authors denounce the removal, stating : " He had collected 2,800 signatures and thousands of comments. This is a clear case of censorship . " So we summarize the news on the White Helmets contained in the aforesaid petition, supported with a video (more pictures can be found at the link above). Activists wrote: " Please watch the video of Steve Ezzedine Al Qaeda with a facelift  . The White Helmets will say neutral, independent, self-financed, exclusively civilian. It does not. Have received more than $ 40 million from USAID and the British Foreign Office, entities directly involved in the conflict in Syria. I am not helpless: there are photographs and films of the group members who support Al Nusra Front / Al Qaeda. More photos and video showing their 'activists' while attending the execution of civilians or while cheering on the bodies of dead soldiers. The White Helmets work only in areas controlled by armed extremist groups. Fomenting sectarianism in Syria, asking for example to set fire Kafarya and Foua two Shiite villages besieged by five years in the area of Idlib. They have repeatedly called for the no-fly zone in Libya, whose results are seen. " Added: the White Helmets or Syria Civil Defense are the highlight of the stated Maydayrescue , organization "humanitarian" founded by former British Colonel James Le Mesurier based in Dubai and Amsterdam, and training centers in Turkey and Jordan.
  • How did you do? One explanation for this world enchantment for a group to say the least objectionable? And 'the effect' chain of suffering. " In April their leader Raed Saleh had been invited to the United States to pick up a humanitarian award assigned by InterAction, a platform of 180 non-governmental organizations with development projects in all countries of the world "The voice united for global change with lay and religious members, small and large, engaged with the most vulnerable populations. " (For a mixup in communication, Saleh had been dismissed as a suspect of terrorism immigration Use on arrival. Then the US State Department had the face to say that this was not about the White Helmets). Interaction between members of perhaps counted on the fingers of one hand those that have to do with the Syrian armed opposition. There is, for example, the Syrian American Medical Association, specializes in the complaints of hospitals bombed. But all the other organizations that Syria do not know and do not mind (because maybe riforestano the Sahel, or dealing with the blind, or fair trade in Asia, Latin America or build latrines) they trust their sisters' informed ». And so, in one stroke, 180 NGOs all over the world take the White Helmets as heroes, they spread the word ...
Paul Merrell

Corporate psychopathy: Talking the walk. [Behav Sci Law. 2010 Mar-Apr] - PubMed - NCBI - 0 views

  • Behav Sci Law. 2010 Mar-Apr;28(2):174-93.Corporate psychopathy: Talking the walk.Babiak P, Neumann CS, Hare RD.SourceHRBackOffice, Hopewell Junction, New York 12533-6800, USA. Babiak@HRBackOffice.comAbstractThere is a very large literature on the important role of psychopathy in the criminal justice system. We know much less about corporate psychopathy and its implications, in large part because of the difficulty in obtaining the active cooperation of business organizations. This has left us with only a few small-sample studies, anecdotes, and speculation. In this study, we had a unique opportunity to examine psychopathy and its correlates in a sample of 203 corporate professionals selected by their companies to participate in management development programs. The correlates included demographic and status variables, as well as in-house 360 degrees assessments and performance ratings. The prevalence of psychopathic traits-as measured by the Psychopathy Checklist-Revised (PCL-R) and a Psychopathy Checklist: Screening Version (PCL: SV) "equivalent"-was higher than that found in community samples. The results of confirmatory factor analysis (CFA) and structural equation modeling (SEM) indicated that the underlying latent structure of psychopathy in our corporate sample was consistent with that model found in community and offender studies. Psychopathy was positively associated with in-house ratings of charisma/presentation style (creativity, good strategic thinking and communication skills) but negatively associated with ratings of responsibility/performance (being a team player, management skills, and overall accomplishments).
Paul Merrell

Engineering Empire: An Introduction to the Intellectuals and Institutions of American I... - 0 views

  • Educating yourself about empire can be a challenging endeavor, especially since so much of the educational system is dedicated to avoiding the topic or justifying the actions of imperialism in the modern era. If one studies political science or economics, the subject might be discussed in a historical context, but rarely as a modern reality; media and government voices rarely speak on the subject, and even more rarely speak of it with direct and honest language. Instead, we exist in a society where institutions and individuals of power speak in coded language, using deceptive rhetoric with abstract meaning. We hear about 'democracy' and 'freedom' and 'security,' but so rarely about imperialism, domination, and exploitation.
  • The objective of this report is to provide an introduction to the institutional and social structure of American imperialism. The material is detailed, but should not be considered complete or even comprehensive; its purpose is to function as a resource or reference for those seeking to educate themselves about the modern imperial system. It's not an analysis of state policies or the effects of those policies, but rather, it is an examination of the institutions and individuals who advocate and implement imperial policies. What is revealed is a highly integrated and interconnected network of institutions and individuals - the foreign policy establishment - consisting of academics (so-called "experts" and "policy-oriented intellectuals") and prominent think tanks.
  •  
    A primer on the foreign policy wonks who actually set U.S. foreign policy: a small group of people whose power to set policy survives the ebb and flow of new Presidents. Names, affiliations, who they influence, and more. 
‹ Previous 21 - 40 of 109 Next › Last »
Showing 20 items per page