Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged social-media

Rss Feed Group items tagged

Gary Edwards

25 Facts That The Mainstream Media Doesn't Really Want To Talk About - BlackListedNews.com - 1 views

  •  
    Excellent list!  Also check out "Who Owns the Media?" http://goo.gl/O18r excerpt: "For decades, the mainstream media in the United States was accustomed to being able to tell the American people what to think.  Unfortunately for them, a whole lot of Americans are starting to break free from that paradigm and think for themselves.  A Gallup survey from earlier this year found that 60 percent of all Americans "have little or no trust" in the mainstream media.  More people than ever are realizing that the mainstream media is giving them a very distorted version of "the truth" and they are increasingly seeking out alternative sources of information.  In the United States today, just six giant media corporationscontrol the mainstream media.  Those giant media corporations own television networks, cable channels, movie studios, radio stations, newspapers, magazines, publishing houses, music labels and even many prominent websites.  But now thanks to the Internet the mainstream media no longer has a complete monopoly on the news.  In recent years the "alternative media" has exploded in popularity.  People want to hear about the things that the mainstream media doesn't really want to talk about.  They want to hear news that is not filtered by corporate bosses and government censors.  They want "the truth" and they know that they are not getting it from the mainstream media. We are watching a media revolution happen, and many in the mainstream media are totally freaking out about it.  In fact, some in the mainstream media have even begun publishing articles that mock the American people for not trusting them. " Anyone that does not acknowledge that the mainstream media has an agenda is not being honest with themselves.  The mainstream media presents a view of the world that is very favorable to their big corporate owners and the big corporations that spend billions of dollars to advertise on their networks.  The mainstream media is the mo
Paul Merrell

Americans' Trust in Mass Media Sinks to New Low - 0 views

  • Americans' trust and confidence in the mass media "to report the news fully, accurately and fairly" has dropped to its lowest level in Gallup polling history, with 32% saying they have a great deal or fair amount of trust in the media. This is down eight percentage points from last year.
  • Gallup began asking this question in 1972, and on a yearly basis since 1997. Over the history of the entire trend, Americans' trust and confidence hit its highest point in 1976, at 72%, in the wake of widely lauded examples of investigative journalism regarding Vietnam and the Watergate scandal. After staying in the low to mid-50s through the late 1990s and into the early years of the new century, Americans' trust in the media has fallen slowly and steadily. It has consistently been below a majority level since 2007.
  • Democrats' and independents' trust in the media has declined only marginally, with 51% of Democrats (compared with 55% last year) and 30% of independents (versus 33% last year) expressing trust. Over the past 20 years, Democrats have generally expressed more trust than Republicans in the media, although in 2000, the two parties were most closely aligned, with 53% of Democrats and 47% of Republicans professing trust.
  • ...4 more annotations...
  • While it is clear Americans' trust in the media has been eroding over time, the election campaign may be the reason that it has fallen so sharply this year. With many Republican leaders and conservative pundits saying Hillary Clinton has received overly positive media attention, while Donald Trump has been receiving unfair or negative attention, this may be the prime reason their relatively low trust in the media has evaporated even more. It is also possible that Republicans think less of the media as a result of Trump's sharp criticisms of the press. Republicans who say they have trust in the media has plummeted to 14% from 32% a year ago. This is easily the lowest confidence among Republicans in 20 years.
  • Older Americans are more likely than younger Americans to say they trust the media, but trust has declined among both age groups this year. Currently, 26% of those aged 18 to 49 (down from 36% last year) and 38% of those aged 50 and older (down from 45%) say they have a great deal or fair amount of trust in the media.
  • In 2001, younger Americans (55%) were more likely than older Americans (50%) to express trust and confidence in mass media. This gap emerged again in 2005 when 53% of 18- to 49-year-olds had trust and 45% of those 50 and older expressed the same sentiment. Yet in the past decade, older Americans have mostly had more confidence than younger Americans, and this year, the gap between these age groups is 12 points. And 2016 marks the first time that confidence among older Americans has dropped below 40% in polling since 2001.
  • The divisive presidential election this year may be corroding Americans' trust and confidence in the media, particularly among Republicans who may believe the "mainstream media" are too hyperfocused on every controversial statement or policy proposal from Trump while devoting far less attention to controversies surrounding the Clinton campaign. However, the slide in media trust has been happening for the past decade. Before 2004, it was common for a majority of Americans to profess at least some trust in the mass media, but since then, less than half of Americans feel that way. Now, only about a third of the U.S. has any trust in the Fourth Estate, a stunning development for an institution designed to inform the public. With the explosion of the mass media in recent years, especially the prevalence of blogs, vlogs and social media, perhaps Americans decry lower standards for journalism. When opinion-driven writing becomes something like the norm, Americans may be wary of placing trust on the work of media institutions that have less rigorous reporting criteria than in the past. On the other hand, as blogs and social media "mature," they may improve in the American public's eyes. This could, in turn, elevate Americans' trust and confidence in the mass media as a whole.
  •  
    Personally, I suspect the fact that mainstream media's journalism standards have dropped as MSM ownership has been consolidated into 6 giant corporations might have far more to do with the decline. So declined too has been the relevance of editorial focus. In other words, MSM has only itself to blame for the public's loss of confidence. Fortunately, we've seen the rise of independent investigative journalism via the internet. Alternative media now offers far richer sources of information than MSM, once you learn to filter unreliable sources.
Paul Merrell

Information Warfare: Automated Propaganda and Social Media Bots | Global Research - 0 views

  • NATO has announced that it is launching an “information war” against Russia. The UK publicly announced a battalion of keyboard warriors to spread disinformation. It’s well-documented that the West has long used false propaganda to sway public opinion. Western military and intelligence services manipulate social media to counter criticism of Western policies. Such manipulation includes flooding social media with comments supporting the government and large corporations, using armies of sock puppets, i.e. fake social media identities. See this, this, this, this and this. In 2013, the American Congress repealed the formal ban against the deployment of propaganda against U.S. citizens living on American soil. So there’s even less to constrain propaganda than before.
  • Information warfare for propaganda purposes also includes: The Pentagon, Federal Reserve and other government entities using software to track discussion of political issues … to try to nip dissent in the bud before it goes viral “Controlling, infiltrating, manipulating and warping” online discourse Use of artificial intelligence programs to try to predict how people will react to propaganda
  • Some of the propaganda is spread by software programs. We pointed out 6 years ago that people were writing scripts to censor hard-hitting information from social media. One of America’s top cyber-propagandists – former high-level military information officer Joel Harding – wrote in December: I was in a discussion today about information being used in social media as a possible weapon.  The people I was talking with have a tool which scrapes social media sites, gauges their sentiment and gives the user the opportunity to automatically generate a persuasive response. Their tool is called a “Social Networking Influence Engine”. *** The implications seem to be profound for the information environment. *** The people who own this tool are in the civilian world and don’t even remotely touch the defense sector, so getting approval from the US Department of State might not even occur to them.
  • ...2 more annotations...
  • How Can This Real? Gizmodo reported in 2010: Software developer Nigel Leck got tired rehashing the same 140-character arguments against climate change deniers, so he programmed a bot that does the work for him. With citations! Leck’s bot, @AI_AGW, doesn’t just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source. As can be the case with these sorts of things, many of the deniers don’t know they’ve been targeted by a robot and engage AI_AGW in debate. The bot will continue to fire back canned responses that best fit the interlocutor’s line of debate—Leck says this goes on for days, in some cases—and the bot’s been outfitted with a number of responses on the topic of religion, where the arguments unsurprisingly often end up. Technology has come a long way in the past 5 years. So if a lone programmer could do this 5 years ago, imagine what he could do now. And the big players have a lot more resources at their disposal than a lone climate activist/software developer does.  For example, a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (and see this).  So if the lone programmer is doing it, it’s not unreasonable to assume that the big boys are widely doing it.
  • How Effective Are Automated Comments? Unfortunately, this is more effective than you might assume … Specifically, scientists have shown that name-calling and swearing breaks down people’s ability to think rationally … and intentionally sowing discord and posting junk comments to push down insightful comments  are common propaganda techniques. Indeed, an automated program need not even be that sophisticated … it can copy a couple of words from the main post or a comment, and then spew back one or more radioactive labels such as “terrorist”, “commie”, “Russia-lover”, “wimp”, “fascist”, “loser”, “traitor”, “conspiratard”, etc. Given that Harding and his compadres consider anyone who questions any U.S. policies as an enemy of the state  – as does the Obama administration (and see this) – many honest, patriotic writers and commenters may be targeted for automated propaganda comments.
Gary Edwards

Allen West to Democrats: Get your leftism the hell out of America! » The Righ... - 1 views

  •  
    Throw the socialist out!  The full video of Col. Allan West's speech at the Lincoln Day Dinner in West Palm Beach Florida.  Incredible and well worth your time.  You will want to stand up and cheer.   Left lengthy note in the new Diigo Quick Note.  Wish i could do the same with EverNote!!!  Quick note is okay.  Very convenient, but no tags, groups or lists.  And the only HTML-Rich Text editing is at Diigo where you can edit a QuickNote.  No bookmarking either with QuickNote either.  Hopefully Diigo users will persuade QucikNote to improve this useful product.  And hopefully EverNote will come to see the advantages of Diigo. Need to edit the QuickNote with some quick definitions of the isms: Conservatism, the ,any Socialisms, Fascism, Nazism, Communism, Obammunism and libertarianism. My QuickNote discusses three corners: Libertarianism, Socialism and Fascism. Some quick comments:  Libertarianism differs from Conservatism in that conservatives champion conservative-judeo-christian social values.  The kind you think of when you hear God, Country, Community and Family.  The Libertarian champions the founding documents; the Declaration and the Constitution.  Here the only "value" the founding fathers desired to be embedded in the governing structure was that of "individual liberty".  Making the governing structure a Republic focused entirely on the objective of "ordered liberty". socialist are also focused on social values, but their primary objective is the welfare of the group.  More often than not, the individual's liberty is sacrificed to the welfare of the group.  In fact, in knee jerk socialism, the individual only exist to benefit the greater society.  When the individual becomes a drag, euthanasia is the tool of choice for a socialist.  Not though that as long as the individual is a voting and consuming member of the group that is overturning the Constitutional Republic, and clamoring to replace the Republic with mobocracy democracy, the
Paul Merrell

Intelligence Archives - Secrecy News - 0 views

  • The U.S. military has been investigating the use of sophisticated data mining tools to probe social media and other open sources in order to support military operations against money laundering, drug trafficking, terrorism and other threats.  But the window for doing so may be closing as the social media landscape changes, according to an internal assessment. U.S. Special Operations Command (SOCOM) National Capital Region (NCR) conducted a series of experiments over the past year under the rubric “QUANTUM LEAP” that was intended to test “non-traditional” tools and techniques to advance the SOCOM mission. An after-action report on the first experiment said it “was successful in identifying strategies and techniques for exploiting open sources of information, particularly social media, in support of a counter threat finance mission.”  Counter threat finance refers to efforts to disrupt an adversary’s finances.  A copy of the SOCOM NCR report was obtained by Secrecy News.  See “Project QUANTUM LEAP: After Action Report,” 12 September 2012. “Major lessons learned were the pronounced utility of social media in exploiting human networks, including networks in which individual members actively seek to limit their exposure to the internet and social media…,” the report said.
  • The report said that as valuable as the opportunity created by new techniques for data mining of open sources appears to be, it may prove to be transient. “We are currently in a ‘window’ of opportunity for exploitation of social media sources for application to CTF [counter threat finance] or other SOCOM NCR missions. This window could be as narrow as 18-24 months before the social media phenomenon transforms. This future transformation is unknown and could offer additional opportunities, or existing opportunities could be closed, but the only thing that is certain is that there will continue to be rapid change.”
Paul Merrell

How US Propaganda Plays in Syrian War - Consortiumnews - 0 views

  • U.S. foreign policymakers have experimented at planting propaganda in social media and then citing it as evidence to support their goals, a process now playing out in the Syrian “regime change,” as Rick Sterling explains.
  • The major achievement of The Syria Campaign has been the branding and promotion of the “White Helmets,” also known as “Syria Civil Defense,” which began with a British military contractor, James LeMesurier, giving some rescue training to Syrians in Turkey with funding provided by the U.S. and U.K. The group stole this name from the REAL Syria Civil Defense as documented in this recent report from Aleppo. The “White Helmets” are marketed in the West as civilian volunteers doing rescue work. On Sept. 22, it was announced that the Right Livelihood Award , the so-called “Alternative Nobel Prize,” is being given to the U.S./U.K.-created White Helmets “for their outstanding bravery, compassion and humanitarian engagement in rescuing civilians from the destruction of the Syrian civil war.”  But the White Helmets are largely a propaganda tool promoting Western intervention against Syria. Unlike a legitimate rescue organization such as the Red Cross or Red Crescent, the “White Helmets” only work in areas controlled by the armed opposition. As shown in this video, the White Helmets pick up the bodies of individuals executed by the terrorists; they claim to be unarmed but are not; and they falsely claim to be neutral.
  • Many of the videos from Al Qaeda/terrorist-dominated areas of Syria have the “White Helmets” logo because the White Helmets work in alliance with these extremist groups as primarily a media marketing tool to raise public support for continuing the support to the armed opposition as well as the demonization of the Syrian government.  The Rights Livelihood press release said the White Helmets “remain outspoken in calling for an end to hostilities in the country.” But that is false, too. The White Helmets actively call for U.S./NATO military intervention through a “No Fly Zone,” which would begin with attacks upon and destruction of government anti-aircraft positions and aircraft. A Major Act of War Taking over the skies above another country is an act of war that would require a major U.S. military operation, according to senior American generals.
  • ...6 more annotations...
  • The New York Times reported that in 2012 General Martin E. Dempsey, chairman of the Joint Chiefs of Staff, told the White House that imposing a no-fly zone in Syria would require up to 70,000 American servicemen to destroy Syria’s antiaircraft system and then impose round-the-clock control over Syrian airspace. General Carter Ham, former commander of the U.S. Africa Command who oversaw the aerial attacks on Libya in 2011, said on CBS News that “I worry sometimes that, when people say ‘impose a no-fly zone,’ there is this almost antiseptic view that this is an easily accomplished military task. It’s extraordinarily difficult. … “It first entails — we should make no bones about it. It first entails killing a lot of people and destroying the Syrian air defenses and those people who are manning those systems. And then it entails destroying the Syrian air force, preferably on the ground, in the air if necessary. This is a violent combat action that results in lots of casualties and increased risk to our own personnel.”
  • In other words, an appeal for a “no-fly zone” is not a call for a non-violent solution. It is seeking a bloody act of war by the United States against Syria, a nation that poses no threat to America. It also would almost surely be carried out in violation of international law since a United Nations Security Council resolution would face vetoes from Russia and probably China. Also, the White Helmets have never criticized or called for the end of funding to extremist organizations including Nusra Front, Al Qaeda’s Syrian affiliate. On the contrary, White Helmets are generally embedded with this organization which is defined as “terrorist” by even the U.S., which is likely why the head of the White Helmets, Raed Saleh, was denied entry to the U.S. The foreign and marketing company origins of the White Helmets were exposed over 1½ years ago – and since then, writer Vanessa Beeley has revealed the organization in more depth in articles such as “Who Are the White Helmets?” and “War by Way of Deception.”  Despite these exposés, understanding of the White Helmets is limited, with many liberal and progressive people uncritically accepting the propaganda and misinformation about Syria. Much of the progressive media has effectively blocked or censored critical examinations amid a flood of propaganda about “barrel bombs” dropped by the “brutal dictator” and his “regime.” 
  • In the last week, Netflix started showing a 40-minute documentary movie about the “White Helmets” that amounts to a promotional video. A substantial portion of it takes place in Turkey where we see trainees in hotel rooms making impassioned phone calls to inquire about their families in Syria.  The “family values” theme is evident throughout, a good marketing angle. The political message of the video is also clear: after a bombing attack, “It’s the Russians …. they say they are fighting ISIS but they are targeting civilians.” The movie includes video previously promoted by the White Helmets such as the “Miracle Baby” rescue, an incident that may or may not have been staged. The video includes self-promoting proclamations such as “You are real heroes.” While no doubt there are some real rescues in the midst of war, many of the videos purporting to show the heroes at work have an unrealistic and contrived look to them as revealed here.
  • “Alternative media” in the West has echoed mainstream media regarding the Syria conflict. The result is that many progressive individuals and groups are confused or worse. For example, the activist group CodePink recently issued a media release promoting the Netflix White Helmets propaganda video. 
  • The White Helmets video is produced by Grain Media and Violet Films/Ultra-Violet Consulting, which advertises itself as a marketing corporation specializing in social media management, grant writing, crowd building and campaign implementation. The only question is who paid them to produce this video.  There is growing resistance to this manipulation and deception. In response to a petition to give the Nobel Peace Prize to the White Helmets, there is a counter petition at Change.org. Following the Right Livelihood Awards’ announcement, there will soon be a petition demanding retraction of the award to the White Helmets. The story of the White Helmets is principally a “feel good” hoax to manipulate public perception about the conflict in Syria and continue the drive for “regime change.” That’s why big money was paid to “Purpose” to “incubate” The Syria Campaign to brand and promote the White Helmets using Facebook, Twitter, etc. That’s why more big money was paid to create a self-promotional documentary. 
  • The judges at Rights Livelihood were probably influenced by the documentary since critical examination of facts around Syria is so rare. It’s a sad commentary on the media. As veteran war correspondent Stephen Kinzer recently wrote, “Coverage of the Syrian war will be remembered as one of the most shameful episodes in the history of the American press.”
Paul Merrell

Senator Aims to End Phone Searches at Airports and Borders | Mother Jones - 0 views

  • More than a month after Sen. Ron Wyden (D-Ore.) requested information about US Customs and Border Protection's practice of searching cell phones at US borders and airports, he's still waiting for answers—but he's not waiting to introduce legislation to end the practice. "It's very concerning that [the Department of Homeland Security] hasn't managed to answer my questions about the number of digital searches at the border, five weeks after I requested that basic information," Wyden, a leading congressional advocate for civil liberties and privacy, told Mother Jones on Tuesday through a spokesman. "If CBP were to undertake a system of indiscriminate digital searches, that would distract CBP from its core mission, dragging time and attention away from catching the bad guys." Wyden's request to DHS and CBP came on the heels of a February 18 report from the Associated Press of a "fivefold increase" in electronic media searches in fiscal year 2016 over the previous year, from fewer than 5,000 to nearly 24,000. It also followed Homeland Security Secretary John Kelly's suggestion that visitors from a select group of countries, mainly Muslim, might be required to hand over passwords to their social media accounts as a condition of entry. (That comment came a week after President Donald Trump first unveiled his executive order⁠ banning travel from seven majority-Muslim countries.) The Knight First Amendment Institute, which advocates for freedom of speech, sued DHS on Monday for records relating to the seizure of electronic devices at border checkpoints. Wyden requested similar data on CBP device searches and demands for travelers' passwords. "There are well-established legal rules governing how law enforcement agencies may obtain data from social media companies and email providers," Wyden wrote in the February 20 letter to DHS and CBP. "By requesting a traveler's credentials and then directly accessing their data, CBP would be short-circuiting the vital checks and balances that exist in our current system." The senator wrote that the searches not only violate civil liberties but could reduce international business travel or force companies to outfit employees with "burner" laptops and mobile devices, "which some firms already use when employees visit nations like China."
  • "Folks are going to be less likely to travel freely to the US with the devices they need if they don't feel their sensitive business information is going to be safe at the border," Wyden said Tuesday, noting that CBP can copy the information it views on a device. "Then they can store that information and search it without a warrant." Wyden will soon introduce legislation to force law enforcement to obtain warrants before searching devices at the border. His bill would also prevent CBP from compelling travelers to reveal passwords to their accounts. A DHS spokesman said in a statement that "all travelers arriving to the US are subject to CBP inspection," which includes inspection of any electronic devices they may be carrying. Access to these devices, the spokesman said, helps CBP agents ascertain the identity and admissibility of people from other countries and "deter the entry of possible terrorists, terrorist weapons, controlled substances," and other prohibited items. "CBP electronic media searches," the spokesman said, "have resulted in arrests for child pornography, evidence helpful in combating terrorist activity, violations of export controls, convictions for intellectual property rights violations, and visa fraud discoveries." In a March 27 USA Today op-ed, Joseph B. Maher, DHS acting general counsel, compared device searches to searching luggage. "Just as Customs is charged with inspecting luggage, vehicles and cargo containers upon arrival to the USA, there are circumstances in this digital age when we must inspect an electronic device for violations of the law," Maher wrote.
  • But in a unanimous 2014 ruling, the Supreme Court found that police need warrants to search cell phones. Chief Justice John Roberts wrote in the opinion that cell phones are "such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy." In response to a Justice Department argument that cell phones were akin to wallets, purses, and address books, Roberts wrote: "That is like saying a ride on horseback is materially indistinguishable from a flight to the moon." The law, however, applies differently at the border because of the "border search doctrine," which has traditionally given law enforcement wider latitude under the Fourth Amendment to perform searches at borders and international airports. CBP says it keeps tight controls on its searches and is sensitive to personal privacy. Wyden isn't convinced. "Given Trump's worrying track record so far, and the ease with which CBP could change its guidelines, it's important we create common-sense statutory protections for Americans' liberty and security," he says.
  • ...1 more annotation...
  • Sophia Cope, a staff attorney with the Electronic Frontier Foundation who has written extensively about searches of electronic devices, says that searches of mobile devices appear to be on the rise. "They realized that people are carrying these devices with them all the time, it's just another thing for them to search," she says. "But also it does seem that after the executive order that they've been emboldened to do this even more." Wyden says that the data collection creates an opportunity for hackers. "Given how frequently hackers have stolen government information," he says, "I think a lot of Americans would be worried to know their whole lives could be sitting in a government database that's got a huge bull's-eye on it for hackers."
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Paul Merrell

Сhina expands its Influence in African Media | nsnbc international - 0 views

  • The Chinese Government, in the interest of broadening its political-economic expansion, has recently begun to pay particular attention to strengthening its influence in foreign media. Today, Chinese central television already controls multiple specialized channels, broadcasting to foreign audiences: in Chinese, French, Spanish, English and Russian. Through government instituted and controlled media, Beijing is actively striving to not only propagate national culture and language, but also to communicate to foreign audiences the favorable position held by the PRC in political, economic and social aspects, countering Western propaganda.
  • In the light of a noticeable recent decrease of western media representatives in Africa, due to financial issues, China is actively expanding its influence in this field on the “black continent”. Investing tens of billions of dollars in various economic sectors of the African continent, a considerable portion of them the PRC is channeling to media. With these measures, the Chinese Government is attempting to outweigh the influence of western media, which it holds responsible for a distorted view of the Celestial Empire. In addition, expanding media influence in resource wealthy African regions is, according to Beijing, a necessary means for improving the performance levels of local Chinese representatives.
Paul Merrell

The Daily Dot - How a major bank and the U.S. government joined forces to spy on Anonymous - 0 views

  • New details have surfaced regarding the surveillance protocols used by Bank of America to keep tabs on social activists. Last year, Anonymous hacktivists published 14 gigabytes of private emails and spreadsheets which revealed that Bank of America was monitoring social media and other online services used by activists for basic communication. This time however, information about the bank’s recent surveillance activities were obtained legally through a public records request by a single petitioner. The newly published documents reveal a coordinated effort by Bank of America, the Washington State Patrol (WSP), and federal counterterrorism agencies, to monitor activists as they prepared for a public demonstration in Olympia, Wash. Over 230 people originally signed up to attend the “Million Mask March” event, which was organized by the Anonymous movement and took place on November 5, 2013. Although an official report by the WSP described the event as a “peaceful protest” being organized by activists who had made “no threats of violence,” those involved were still monitored by the department before the event took place. Information gathered about the potential protesters was then shared with Bank of America. Furthermore, Bank of America solicited information about activists from various federal agencies, including the Federal Bureau of Investigation.
  • According to Andrew Charles Hendricks, an activist who originally acquired the documents, the emails included the home address of a demonstration organizer. Hendricks claims he redacted the address before publishing the documents online. The relationship between Bank of America and the WSP, as well as their long-term investment in surveillance, is highlighted by an email sent on September 23, 2013. Kim Triplett-Kolerich, an intelligence analyst for Bank of America requested that WSP share any intelligence gathered on activists taking part in the Million Mask March with the bank. She began the email by identifying herself as a former officer and provided her former rank. “From time to time I will see items that I believe will be of use to my friends at WSP—especially during session,” she told the officer. “May Day I will pick your brain for intel and I will give you a lot also,” she wrote.
  • Triplett-Kolerich concluded her email by boasting that the surveillance tactics used by Bank of America to monitor activists online was superior to that of the WSP. “I will most likely find it first as social media trolling is not what WSP does best. Bank of America has a team of 20 people and that’s all they do all day and then pass it to us around the country!!!” On October 24, an email was sent by a sergeant at the WSP’s Special Operations Division to an executive aide at the Thurston County Sheriff’s Office. The sergeant notified the office that a large number of arrests may take place during the Million Mask March, which could impact the jail. Attached to the letter was a message written by an Anonymous activist, and a link to its Facebook event page where the names of those planning to attend the march could be seen.
  • ...2 more annotations...
  • The next week, Triplett-Kolerich emailed the same WSP sergeant again about the march. “Sorry for not getting back to you sooner—hectic weeks lately with foreclosures and this MMM,” Triplett-Kolerich wrote. She then notified the sergeant that Bank of America has been in contact with “the Fusion Center and JTTF” regarding the Anonymous march. JTTF refers to the Joint Terrorism Task Force, which is a group comprised of local law enforcement agencies, the Federal Bureau of Investigation (with whom it shares a website) and the Homeland Security department. The Fusion Center is a state-level counterterrorism agency, which coordinates “national intelligence” between various local law enforcement and public safety departments. In addition, the Fusion Center provides for “the effective communication of locally generated threat-related information to the federal government.”
  • Unbeknownst to the crowd, the supervisor of a local transit company had dropped off an Olympia city bus nearby at the request of the WSP. According to recently published emails, it was parked on the west side of an administration building close to the demonstration, just in case they needed to move in and haul a large group of disorderly protesters off to jail—but they didn’t. The Daily Dot reached out to Triplett-Kolerich and three Bank of America media relations contacts requesting a comment for this article, but received no response. 
  •  
    More evidence of the cozy relationship between the banksters and the "anti-terrorism" folk in the U.S. Of particular interest BofA has a 20-person unit that spends their days trolling social media for intelligence.
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
Paul Merrell

Researcher who joked about hacking a jet plane barred from United flight | Ars Technica - 0 views

  • A researcher who specializes in the security of commercial airplanes was barred from a United Airlines flight Saturday, three days after he tweeted a poorly advised joke mid-flight about hacking a key communications system of the plane he was in. Chris Roberts was detained by FBI agents on Wednesday as he was deplaning his United flight, which had just flown from Denver to Syracuse, New York. While on board the flight, he tweeted a joke about taking control of the plane's engine-indicating and crew-alerting system, which provides flight crews with information in real-time about an aircraft's functions, including temperatures of various equipment, fuel flow and quantity, and oil pressure. In the tweet, Roberts jested: "Find myself on a 737/800, lets see Box-IFE-ICE-SATCOM, ? Shall we start playing with EICAS messages? 'PASS OXYGEN ON' Anyone ? :)" FBI agents questioned Roberts for four hours and confiscated his iPad, MacBook Pro, and storage devices.
  •  
    Bruce Schneier's take on this: "But to me, the fascinating part of this story is that a computer was monitoring the Twitter feed and understood the obscure references, alerted a person who figured out who wrote them, researched what flight he was on, and sent an FBI team to the Syracuse airport within a couple of hours. There's some serious surveillance going on. Now, it is possible that Roberts was being specifically monitored. He is already known as a security researcher who is working on avionics hacking. But still..." Some serious surveillance, indeed. And does the FBI have its own social media monitoring program or is this the result of a tip from the NSA, which assuredly does have a social media surveillance capability?  Consider the short time between the post and interception by FBI agents at the airport and all of the steps it takes to accomplish that feat. I come up with a system that is directly harvesting tweets as they are transmitted, not a web crawler. A huge amount of automation to identify the tweet as a potential threat and get it to someone with the vocabulary to understand the message. And another round of automation to get the import of the post to an FBI dispatcher who sends the agents to the airport armed with the information needed to question the tweeter for four hours on an esoteric subject. That's astounding to me.  
Paul Merrell

British army creates team of Facebook warriors | UK news | The Guardian - 0 views

  • he British army is creating a special force of Facebook warriors, skilled in psychological operations and use of social media to engage in unconventional warfare in the information age. The 77th Brigade, to be based in Hermitage, near Newbury, in Berkshire, will be about 1,500-strong and formed of units drawn from across the army. It will formally come into being in April. The brigade will be responsible for what is described as non-lethal warfare. Both the Israeli and US army already engage heavily in psychological operations.
  • Against a background of 24-hour news, smartphones and social media, such as Facebook and Twitter, the force will attempt to control the narrative. The 77th will include regulars and reservists and recruitment will begin in the spring. Soldiers with journalism skills and familiarity with social media are among those being sought. An army spokesman said: “77th Brigade is being created to draw together a host of existing and developing capabilities essential to meet the challenges of modern conflict and warfare. It recognises that the actions of others in a modern battlefield can be affected in ways that are not necessarily violent.” The move is partly a result of experience in counter-insurgency operations in Afghanistan. It can also be seen as a response to events of the last year that include Russia’s actions in Ukraine, in particular Crimea, and Islamic State’s (Isis) takeover of large swaths of Syria and Iraq.
  • The Israel Defence Forces have pioneered state military engagement with social media, with dedicated teams operating since Operation Cast Lead, its war in Gaza in 2008-9. The IDF is active on 30 platforms – including Twitter, Facebook, Youtube and Instagram – in six languages. “It enables us to engage with an audience we otherwise wouldn’t reach,” said an Israeli army spokesman. It has been approached by several western countries, keen to learn from its expertise.
  • ...1 more annotation...
  • During last summer’s war in Gaza, Operation Protective Edge, the IDF and Hamas’s military wing, the Qassam Brigades, tweeted prolifically, sometimes engaging directly with one another.
  •  
    No mention of foreign langauge skills as a criteria for selecting troops., That raises a strong suspicion that those who speak English are the psywar targets. So long until the UK Army  is beaming propaganda at the U.S.?  Do we have to put up with this?
Gary Edwards

The worst rise to the top - Mises Economic Blog - 0 views

  •  
    Very interesting post from Douglas French concerning the repubican primaries and F.A. Hayek's "Road to Serfom" comments on modern politics. Fascinating stuff. Hayek argues that, in politics, "the worst rise to the top", and he outlines three reasons why: .... Choosing is the problem. Informed people are more "nuanced" - they have many divergent opinions and views. Uniformity however drives the group dynamics behind a democratic process. Uniformity of opinion rules, and the less informed a person is, the more uniform and drawn to larger groups they will be. The "lowest common denominator" rule rules the democratic process. Mobocracy at work. .... Those on top, pursuing the political leadership positions, must appeal to the masses and weave together the groups driven by the "lowest common denominator" rule. The docile and gullible "are ready to accept whatever values and ideology drummed into them". Advantage to big media, the socialist assemblage ruling public education, and public workers unions. ..... Third, political leaders "don't promote a positive agenda, but a negative one of hating an enemy and envy of the wealthy. To appeal to the masses, leaders preach an "us" against "them" program." The great unwashed and uninformed being guided and driven "by emotion and passion rather than critical thinking." Not sure i agree with any of this, much as i admire and recognize the importance of Hayek and his seminal, game changing "Road to Serfdom". One reason is that some of the most informed people i know are goose stepping socialist hell bent on ending individual liberty - as in "life, liberty and the pursuit of happiness", in exchange for Marxist social equality. Another reason i would disagree is that the salt of the earth "bitter clingers" Reagan Conservatives that rock the Tea Party movement are exactly what the establishment elites call the "uninformed masses". Not sure if that's what Hayek meant, but his viewpoint does look a
Gary Edwards

19 Reasons Why The Federal Reserve Is At The Heart Of Our Economic Problems - 0 views

  •  
    Nice summary with a chilling conclusion. I can't believe i've been so wrong about the financial collapse and the End of the American Dream. In 2008 i set out to discover why the September financial collapse occurred. This was the beginning of my Diigo "Socialism and the End of the American Dream" list. Since then however, i've come to see that it isn't ideology that's behind the financial collapse and the assault on the American Constitution, Rule of Law, and the principles of individual liberty and freedom described in our Declaration of Independence. No, IT'S ALL ABOUT THE MONEY! Mark Levin argues eloquently and with great passion and insight that "Statism" is the problem. He argues that socialism, progressivism, communism and fascism are just forms of centralized government, authority, and control. For Mark, it's all about power. And that's Tyranny of the highest order. Today though, i see things differently. It's all about the money. And with that money comes the power to dictate, control and seize property at will. The Banksters are behind it all, and debt is their doomsday nuclear weapon of choice. Baron Von Rothschild once famously said that WAR is the most expensive endeavor governments can engage in. War means borrowing from banksters. It means debt. The problem for the Banksters has long been the lesson of Charlemagne and Napoleon: There is no way for the Banksters to collect their debt (and interest) from the victor. The only way to force Napoleon to pay was to create an opposing army (thanks to the ruling elites of England and the Duke of Wellington - who were not threatened by Napoleon. And since then, the Bansters have been beholden to the Brittish ruling elites). Balance of Power and the magic of Francois Metternich's Treaty of Vienna worked for almost 100 years after the defeat of Napoleon. The ruling nobility of Europe came apart with WWI, but the Banksters played both ends against the middle, and came out on top.
  •  
    i hate it when Diigo clips my comments!#!$$ . No warning. The above was clipped short so here's the bottom line: It's not the ideology. It's the money and the power.
Paul Merrell

A Distorted Lens Justifying An Illegitimate Ukrainian Government - 0 views

  • Support it or oppose it, a coup d’état took place in Kiev after an EU-brokered agreement was signed by the Ukrainian government and the mainstream opposition on Feb. 21. The agreement called for power sharing between both sides through the formation of a national unity government and for an end to the opposition-led street protests in Kiev. President Viktor Yanukovych ordered the Ukrainian police and security forces to withdraw from their positions, and even earlier, he had made multiple concessions to the opposition leadership. Instead of keeping its end of the bargain, the Ukrainian mainstream opposition executed a coup through the use of violence by organized ultra-nationalist gangs, which some analysts have compared to stay-behinds or secretive militias that were created by NATO during the Cold War. These armed ultra-nationalist groups took over administrative bodies in Ukraine and fought until they managed to oust the Ukrainian government and opened the path for opposition leaders to take power on Feb. 25. The Ukrainian mainstream opposition used the EU-brokered agreement, which the Brussels-based European Commission deliberately refused to enforce, as a means of justifying the formation of a coup-imposed government.
  • In the absence of almost half the Ukrainian Verkhovna Rada, or Ukrainian Parliament, the opposition parties began to arbitrarily pass unconstitutional laws. They also unconstitutionally selected Oleksandr/Aleksandr Valentynovych Turchynov as the acting president of Ukraine before President Viktor Yanukovych was even impeached. Intimidation and violence were additionally used to secure the cooperation of any disagreeing parliamentarians or state officials in Kiev. Saying that the ultra-nationalists and fascists are marginal elements, the mainstream media networks in North America and the European Union have simply dismissed the armed ultra-nationalist groups involved in the coup that are presently integrated into the putsch regime running Kiev. The militant ultra-nationalists, however, are very influential and amassing power under the illegal premiership of Arseniy Yatsenyuk.  Yatsenyuk, himself, is from Yulia Tymoshenko’s notoriously corrupt All-Ukrainian Union Fatherland Party (Batkivshchyna) and essentially a U.S. and EU appointee. There is even a pre-coup leaked telephone interception, likely either recorded by the intelligence services of Russia or Ukraine, in which U.S. Assistant Secretary of State Victory Nuland says that Yatsenyuk will be appointed as the prime minister of the Ukrainian government that the U.S. is putting together.
  • It is unlikely that Yatsenyuk and the loosely-knit alliance of the governing parties that ran Ukraine under the Yushchenko-Tymoshenko governments, foreign-based Ukrainians, and the forces behind the Orange Revolution that form the Orangist camp which he belongs to could have gotten back into power in Ukraine without pressure, the use of force and foreign backing. Yatsenyuk was even threatened and booed by the Ukrainians gathered at Independence Square when it was announced that he would be appointed as the prime minister of the post-coup government. A vast segment of the protesters made it clear that Tymoshenko, Yatsenyuk’s party leader, was no alternative to the ousted President Viktor Yanukovych in their eyes, either, when it was announced that she wanted to run for prime minister. The Orangists do not have the support of a majority of the population, nor did they form the parliamentary majority in the Verkhovna Rada. Their Orangist president, Viktor Yushchenko, only got 5 percent of the vote in January 2010, in a show of no-confidence, whereas Viktor Yanukovych won the first and second rounds of the presidential elections in 2010. According to Victoria Nuland, the U.S. has also poured $5 billion into “democracy promotion” inside Ukraine. This is U.S. State Department doublespeak for politicized funding that Washington has sent to Ukraine to organize the Orange Revolution and its Euromaidan sequel or what can frankly be described as regime change.
  • ...10 more annotations...
  • To rule Ukraine once more, the Orangists and their foreign backers have used and manipulated the ultra-nationalist elements of the population — some of which are openly anti-European Union — as their foot soldiers in an application of force against their democratically-elected opponents. Despite their views, the ultra-nationalists are actually more honest than the Orangist liberal figures like Arseniy Yatsenyuk. Unlike the misleading and utterly corrupt Orangist leaders, the ultra-nationalists do not hide their agendas and platforms.
  • The ultra-nationalists have inconsolably anti-Russian attitudes. Many of them also dislike a vast spectrum of other groups, including Jews, Armenians, Roma, Poles, Tatars, supporters of the Party of Regions and communists. In this context, it should come as no surprise that one of the first decisions that the post-coup regime in Kiev made was to remove the legal status of the Russian language as the regional language of half of Ukraine. Right Sector is, itself, a coalition of militant ultra-nationalists. These militants were instrumental in fighting government forces and taking over both government buildings in Kiev and regional governments in the western portion of Ukraine. Despite the protests of First Deputy Defense Minister Oleynik, Deputy Defense Minister Mozharovskiy and Defense Minister Babenk, Arseniy Yatsenyuk’s post-coup government has even given the ultra-nationalist opposition militias official status within the Ukrainian military and security forces. Yatsenyuk and the Orangists also dismissed all the officials that protested that the move would fracture the country and make the political divide in Ukraine irreversible.
  • Several members of Svoboda have been given key cabinet and government posts. One of the two junior deputy prime ministers, or assistant deputy prime ministers, is Oleksandr Sych. The ministry of agriculture and food has been given for management to Ihor Shvaika. The environment and natural resources ministry has been assigned to Andry/Andriy Mokhnyk. The defense minister is Ihor Tenyukh, a former admiral in the Ukrainian Navy who obstructed Russian naval movements in Sevastopol during the Russo-Georgian War over South Ossetia and who was later dismissed by the Ukrainian government for insubordination. Oleh Makhnitsky, another member of Svoboda, has been assigned as the new prosecutor-general of Ukraine by the coup government. Andry Parubiy, one of the founders of Svoboda, is now the post-coup secretary of the National Security and Defense Council of Ukraine (RNBO). He was the man controlling the so-called “Euromaidan security forces” that fought government forces in Kiev. His job as secretary is to represent the president and act on his behalf in coordinating and implementing the RNBO’s decisions. As a figure, Parubiy clearly illustrates how the mainstream opposition in Ukraine is integrated with the ultra-nationalists. Parubiy is an Orangist and was a leader in the Orange Revolution. He has changed parties several times. After founding Svoboda, he joined Viktor Yushchenko’s Our Ukraine before joining Yulia Tymoshenko’s Fatherland Party and being elected as one of the Fatherland Party’s deputies, or members of parliament.
  • While the mainstream media in North America and the EU look the other way about the ultra-nationalists in the coup government in Kiev, the facts speak for themselves. Both the EU and the U.S. governments have rubbed their elbows with the ultra-nationalists. Oleh Tyahnybok, the leader of Svoboda (formerly the Social Nationalist Party of Ukraine), was even part of the opposition triumvirate that all the U.S. and EU officials visiting Kiev met with while performing their political pilgrimages to Ukraine to encourage the protesters to continue with their demonstrations and riots demanding Euro-Atlantic integration. Svoboda has popularly been described as a neo-Nazi grouping. The World Jewish Congress has demanded that Svoboda be banned. The ultra-nationalist party was even condemned by the EU’s own European Parliament, which passed a motion on Dec. 13, 2012 categorically condemning Svoboda.
  • The ultra-nationalists are such an integral part of the mainstream opposition that the U.S.-supported Orangist president of Ukraine, Viktor Yushchenko, posthumously awarded the infamous Nazi collaborator Stepan Bandera the title and decoration of the “Hero of Ukraine” in 2010. Foreign audiences, however, would not know that if they relied on reportage from the likes of the U.S. state-run Radio Free Europe, which tried to protect Yushchenko because he wanted to reorient Ukraine toward the U.S. and EU. Parubiy also lobbied the European Parliament not to oppose Yushchenko’s decision. Other smaller ultra-nationalists parties were also given government posts, and several of the independent cabinet members are also aligned to these parties. Dmytro Yarosh from Right Sector (Pravyi Sektor) is the deputy secretary of the RNBO, and the Trizub Party was given the education ministry. Trizub had Sergey Kvit appointed to the post of education minister.
  • The role of the ultra-nationalists in executing the coup has been essentially ignored by the mainstream media in North America and the EU. The roots of the bloodshed in Kiev have been ignored, too. The shootings of protesters by snipers have simply been presented as the vile actions of the Ukrainian government, never taking into consideration the agitation of the armed ultra-nationalist gangs and the mainstream opposition leaders for a conflict. According to a leaked telephone conversation on Feb. 26 between Estonian Foreign Minister Urmas Paet and European Union Commissionaire Catherine Ashton, which was leaked by the Security Service of Ukraine (SBU) , the snipers who shot at protesters and police in Kiev were allegedly hired by Ukrainian opposition leaders. Estonian Foreign Minister Paet made the statements on the basis of details he was given by one of the head doctors of the medical team of the anti-government protests, Olga Bogomolets, an opponent of Viktor Yanukovych’s government who wanted it removed from power. Paet tells Ashton the following first: “There is now stronger and stronger understanding that behind the snipers, it was not Yanukovych, but it was somebody from the new coalition.” This is also corroborated by the fact that Yanukovych actually had ordered the Ukrainian riot police and security forces not to use lethal force.
  • The Estonian official then mentions that it was verified to him that the same snipers were killing people on both sides. He tells Ashton the following: “And second, what was quite disturbing, this same Olga [Bogomolets] told as well that all the evidence shows that the people who were killed by snipers from both sides, among policemen and then people from the streets, that they were the same snipers killing people from both sides.” Another important point that Paet makes to Ashton is the following: “[Dr. Olga Bogomolets] then also showed me some photos she said that as a medical doctor she can say that it is the same handwriting, the same type of bullets, and it’s really disturbing that now the new coalition, that they don’t want to investigate what exactly happened.” Past reports that the mainstream media were hostile to the ousted Ukrainian government also raise serious questions that corroborate what has been said about the snipers intentionally killing protesters to instigate regime change.
  • The Telegraph reported on Feb. 20 that “[a]t least three of the bodies displayed single bullet wounds to the heads,” and “were shot in the head, the neck or the heart. None were shot anywhere else like in the legs.” This means that the snipers were making kill shots by design, which seems like the last thing that the Ukrainian government would want to do when it was trying to appease the protesters and bring calm to Kiev. The Ukrainian journalist Alexey Yaroshevsky’s account of the sniper shootings is also worth noting, and it is backed up by footage taken by his Russian crew in Kiev.  Their footage shows armed opposition members running away from the scene of the shooting of anti-government protesters. What comes across as unusual is that the armed members of the opposition were constantly agitating to start firefights at every opportunity that they could get.
  • The commandant of the SSU, Major-General Oleksandr Yakimenko, has testified that his counter-intelligence forces were monitoring the CIA in Ukraine during the protests. According to the SSU, the CIA was active on the ground in Kiev and collaborating with a small circle of opposition figures. Yakimenko has also said that it was not the police or government forces that fired on the protesters, but snipers from the Philharmonic Building that was controlled by the opposition leader Andriy Parubiy, which he asserts was interacting with the CIA. Speaking to the Russian media, Yakimenko said that 20 men wearing “special combat clothes” and carrying “sniper rifle cases, as well as AKMs with scopes” ran out of the opposition-controlled Philharmonic Building and split into two groups of 10 people, with one taking position at the Ukraine Hotel. The anti-government protesters even saw this and asked Ukrainian police to pursue them, and even figures from Right Sector and Svoboda asked Yakimenko’s SSU to investigate and apprehend them, but Parubiy prevented it. Major-General Yakimenko has categorically stated that opposition leaders were behind the shootings. Following the release of the conversation between Paet and Ashton, the Estonian Foreign Ministry confirmed that the leak was authentic, whereas the European Commission kept silent. The mainstream media in North America and the EU either ignored it or said very little. The Telegraph even claimed that Dr. Bogomolets told it that she had not treated any government forces even though she contradicts this directly in an interview with CNN where says she treated military personnel.
  • CNN, on the other hand, quickly glossed over the story, giving it only enough attention to create the impression that the network is fairly covering the news. Opting not to give the story the airtime that it deserved, CNN instead posted it on its webpage. The conversation is immediately discredited, undermined and dismissed in the first sentence of the article, which is attributed to Foreign Minister Paet: “Don’t read too much into the conversation.” The article was deliberately structured by CNN to undermine the important information that would challenge the narrative that the U.S. mainstream media have been painting. The title, sub-titles and opening sentences of most texts act as microcosms or summaries of the articles, and in many cases, readers evaluate or decide to read the articles on the basis of what these texts communicate. Moreover, the first sentence of the article sets the tempo for readers and and influences their opinion, too. Although anyone who listens to the conversation between Paet and Ashton and considers the evidence that is being discussed would realize just how important the news was, the message being set forth by CNN was a dismissive one.
Paul Merrell

Land Destroyer: NATO's War on Syria Just Got Dirtier - 0 views

  • But even with the West's capitulation in Syria, and months passing without a shred of credible evidence produced, hacks among Western media continue to perpetuate the original narrative. Among these are of course corporate-financier funded think-tanks and propaganda fronts like the Brookings Institution, Foreign Policy Magazine, the Foundation for the Defense of Democracies (FDD), and establishment papers like the Guardian. In the middle of it all is couch-potato self-proclaimed weapons expert, Eliot Higgins, a representation of the West's propaganda 2.0 campaign.  UK-based Higgins lost his job and now spends his days combing social media sites for "evidence" he then analyzes and reports on. The Western media, with its propagandists expelled from Syria and many of its "sources" in Syria exposed in humiliating attempts to fabricate and manipulate evidence, quickly picked Higgins up and elevated his armchair blogging to "expert analysis." Since then, Higgins has joined the already discredited "Syrian Observatory for Human Rights" another UK-based individual, as the basis upon which the West's Syrian narrative spins. 
  • Whitaker is desperately attempting to keep the wheels on the establishment's new propaganda 2.0 vehicle - manipulating social media, much the way Hersh describes intelligence being manipulated, to create any outcome necessary to bolster a predetermined narrative.  What he doesn't address is the fact that Higgins' work almost entirely depends on videos posted online by people he does not know, who may be misrepresenting who they are, what they are posting, and their motivations for doing so - such is the nature of anonymity on the web and why this evidence alone is useless outside of a larger geopolitical context.  Both Whitaker and Higgins, who maintain that the Syrian government was behind the attacks, fail to address another glaring reality. A false flag attack is designed to look like the work of one's enemy. In other words, terrorists in Syria would use equipment, uniforms, weapons, and tactics that would pin the crime on the Syrian government. All Higgins has proved, thus far, is that the superficial details of the operation made for a convincing false flag attack. 
  • Toward the end of Higgin's piece, he, like his friends at the Guardian, attempt to claim Al Nusra, contrary to Hersh's report, are most likely not capable of producing sarin.
  • ...5 more annotations...
  • The e-mails illustrate prior knowledge of chemical weapons falling into the hands of terrorists who fully planned on using them in a false flag operation. Higgins and others had this information, and now, have Seymour Hersh's report as well, yet they still pose the argument that the militants had neither the ability nor the means to carry out the attacks. In fact, it appears that the Western media and underlings like Higgins went out of their way specifically to discredit the notion from even being considered.  In other words, a concerted cover-up.  The e-mails above, and others in the large cache also reveal the possible motivation for these lies. So-called journalists and researchers peddling the West's narrative appear to have a wide range of lucrative offers presented to them, as well as funding for them to continue doing the work they are already involved in. This of course is only the case so long as their narratives mesh with the institutions, corporations, and individuals cutting the checks. 
  • The e-mails reveal multiple correspondences regarding chemical weapons falling into the hands of terrorists aimed at using them in a false flag operation, Higgins' and Van Dyke's mutual "benefactor" located in Virginia, "near DC" (Langley, Virginia?), and job offers for Higgins from NGOs and a defense contractor involving "open source intelligence," the new buzzword used by Higgins and Whitaker in regards to the new form of propaganda they both participate in. 
  • While perhaps Higgins and company missed that CNN report, it is now revealed that at least Higgins, and several other journalists were told by an American contractor on the ground inside of Syria, that militants had gained access to chemical weapons and more importantly, were planning to use them in a false flag attack - this months before the August 21 attack in Damascus.   The Syrian Electronic Army (SEA) has released e-mails this week between American contractor Matthew Van Dyke and members of the Western media, including Higgins. The e-mails indicated that militants had chemical weapons and were planning to use them in an attack to frame the Syrian government - serving as impetus for wider foreign intervention. SEA's emails have been confirmed by Higgins himself in a series of self-incriminating tweets where he goes, point-by-point, attempting to provide explanations for the damning revelations. 
  • Why would Higgins even mention the possibility of a false flag attack, when all that would do is alienate him from the establishment he is so eagerly trying to be a part of? His recent piece in Foreign Policy and the Guardian's ceaseless promotion of his work are favors that demand reciprocation - in the form of toeing the line and selling a narrative Higgins and others know is deceitful.  That Higgins, the Guardian, and Foreign Policy are prepared to throw veteran journalist Seymour Hersh under the bus to protect their interests, gives us a look into the depths of depravity within which this "new" media Whitaker celebrates, operate.  Worst of all for the West, is that the transparency and accountability they claim to uphold, had to be kept in check by the SEA - an organization wanted by the FBI as "terrorists." We would be led to believe by the likes of Whitaker, Higgins, and Van Dyke that the Syrian government and their supporters are the villains, but in their own words and actions we see the truth. 
  • Note: The full extent of SEA's leaked e-mails exposes Van Dyke and the journalists he associates with as utterly depraved, deceitful, unprincipled individuals each driven by untethered greed and narcissism. The e-mails also reveal that "aid ships" are used to bring in weapons and foreign fighters, that the Syrians are almost entirely behind the government and that the so-called revolution was "fake." Van Dyke is exposed as having conspired to kill a man and his entire family over a trivial personal dispute and much, much more. Readers are encouraged to comb through the archives, and to follow SEA on Twitter  @Official_SEA16.
  •  
    "Brown Moses" (Eliot Higgins) has been the principle source of "evidence" that the Assad government used chemical weapons, arguing strenuously that the "rebels" had no such capability. But the Syrian Electronic Army obtained a large number of emails between Higgins and an American mercenary working in Syria showing beyond doubt that Higgins had been put on notice in May 2013 -- months before the sarin gas attack near Damascus in late August -- that the "rebels" had sarin.   Oopsies!
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

11,000 Icelanders Offer To House Syrian Refugees - 0 views

  • The Icelandic government is reconsidering its national refugee quota after a social media campaign resulted in over 11,000 Icelanders offering up a room in their homes to refugees. As Europe struggles to cope with unprecedented levels of those seeking shelter, residents of the sparsely populated Nordic island country resorted to direct action to pressure their leaders. Iceland was recently awarded the title of “most peaceful country” in the Global Peace Index, with Syria ranking the least peaceful. With a population of 330,000 — less than many European cities — the country’s government had previously stated it could only take in 50 people this year. Taking matters into their own hands, over 16,000 Icelanders joined a Facebook page created on Sunday to pressurize the Icelandic government into accepting more refugees. In addition to offering rooms in homes, people have pledged financial support with air fares, language teaching, clothing, food, and toys, and the page has been inundated with messages of gratitude from Syrians, some of whom are writing from refugee camps. As a result of the outpouring of support, Icelandic Prime Minister Sigmundur David Gunnlaugsson announced that a committee is being formed to re-assess the country’s current policy.
  • Undoubtedly, thousands of people across the globe are equally horrified. Inspired by Iceland’s example, social media campaigns have sprung up and united those who are dismayed by the pitiful humanitarian response to the crisis. As distressing images and stories of the hurdles and barriers faced at every turn by those seeking sanctuary saturate the European press, similar schemes have snowballed throughout Europe. In Britain, more and more people are condemning the government’s shameful response to the crisis — a response particularly ironic considering most refugees are fleeing conflicts that the U.K.’s imperialist interventions have directly contributed to. .BottomResponsiveBanner { width: 300px; height: 250px; } @media (min-width:420px) { .BottomResponsiveBanner { width: 336px; height: 280px; } } @media (min-width:1300px) { .BottomResponsiveBanner { width: 728px; height: 90px; } } Not prepared to sit back, groups like Citizens UK are pressuring U.K. leaders to step up to the plate. More than 250,000 Brits have signed a petition calling for Britain to take its fair share of Syrian refugees. Ireland’s ”Pledge a Bed” campaign was overwhelmed with thousands of offers of spare rooms within hours of its launch while hundreds of Germans have offered to share their homes on the Refugees Welcome website.
  • Swiftly following suit and not to be outdone, offers of support haven’t stopped at Europe’s shores. A U.S. group called Open Homes, Open Hearts US – for Syrian refugees launched earlier this week. With no easy answers and no end in sight, the political firestorm will continue, as will the global outrage at the humanitarian tragedy. The only thing clear is that if the West were prepared to accept more refugees, desperate families wouldn’t be forced to rely on smugglers or to climb into perilous boats and refrigeration lorries.
  •  
    Many reports in the last couple of weeks show that a wave of sympathy for war refugees is sweeping Europe in reaction to government efforts to prevent refugees from reaching Europe and forcing those already there into guarded camps. And the connection of those refugees to European foreign policy and participation in wars in the Mideast is being made. The propaganda paint of NATO nations waging "humanitarian" wars in the Mideast is definitely chipping off. 
Paul Merrell

The Money Trail: How the US Fostered Yemen's Separatist Movement / Sputnik International - 0 views

  • As Saudi Arabia and its allies have begun the bombing campaign against Yemen, in the south, a separatist movement calling for a "State of South Arabia" is emerging. Fostered by the US, it will leave the Houthis with two hostile states at their borders and locked access to the sea, if it succeeds.
  • Welcome to phase two of US regime change operations. After Yemen's 2011 revolution failed and Houthi militias overthrew President Hadi, forces trained and sponsored by the US government are being activated as a separatist movement. The Southern People's Committees (SPC), founded around 2007 although USAID has been conducting political workshops as part of a $695,000 project and actively grooming leadership in Yemen since 2005. (Also in 2007, weekly protests began, organized by women's organizations, fostered by the workshops.) The SPC were similar to many color revolution movements such as Serbia's Otpor in that they did not have a central leadership, but rather an autonomous cell-based organization. In addition, they were very capable in the use of social media technologies, text messaging and the circumventing the government's internet censorship to organize protests.
  • Meanwhile, the Yemen Center for Human Rights Studies, which received $193,000 from the EU and US-funded Foundation for the Future in 2009, conducted a poll in January 2010, which found that 70 percent of southern Yemenis favored secession. Another USAID-funded project, the $43 million Responsive Governance Project (RGP), launched in May 2010, conducted "New Social Media training for Youth leaders to equip Yemeni youth groups in the use of media to enhance their participation in formulating public issues." The project focuses on establishing contacts with the Yemeni government and providing "leadership and civic education training to youth NGOs."
  • ...5 more annotations...
  • At the same time, USAID funded a $3.58 million project called Promoting Youth for Civic Engagement (PYCE) to train Aden youth " in PACA [political activity training], first aid, self-defense, photography, calligraphy and various other topics," including "media skills," according to an evaluation report of the PYCE Project, conducted in 2012. The project was constrained to Aden and did not conduct workshops in the northern capital, Sanaa, after reportedly receiving threats.
  • The project is presented as a youth "sports program," and although it does include basketball, handball and chess, these were not the primary goal, as the report shows. At the same time, first aid, self-defense, photography and calligraphy (making protest signs) sound a lot more like protest tactics than sports. The program, initially planned to last for two years, did not make any progress reports after March 2012, when President Hadi assumed power. After the 2011 revolution, the SPC became more of a military outfit and took part in a fight against al-Qaeda in Yemen, which coincided with the CIA's expanded drone campaign in the area. This is also where the organization fades from public view when it comes to USAID expense reports, as the organization appeared to lose interest in developing democracy in the country. In a June 4, 2012 a field commander of the People's Committees gave an interview to the Yemen Times, in which he described the group's fight against the Ansar al-Sharia Islamists together with the government.
  • However, the group reappeared in public view on September 23 2014, two days after Houthis took control of Sanaa, and issued a statement in which they call on security forces to "undertake its historical role in providing security and maintaining people's property because it is in order to preserve the revolution, which is the most important accomplishment achieved by the Yemeni people." At the same time, in southern Yemen, the People's Committee has been very active on Facebook and Twitter since around October 2014. The Facebook and Twitter pages publish slick anti-Houthi propaganda and call for separatism and a "State of South Arabia," within the bounds of former South Yemen, and using South Yemen's flag
  • Since mid-March, the SPC have been fighting against Houthis and see Saudi Arabia as an ally of convenience, although some of their social media accounts, Saudi Arabia's King Salman and other royal family figures are glorified. However, the splitting of Yemen benefits Saudi Arabia, as it secludes the Houthis to a smaller Northern Yemen, which would be surrounded by two hostile states, with Saudi Arabia to the north and the new South Arabia to the south, which would also control access to the sea at the Gulf of Aden. The current situation has considerable parallels with Ukraine, which has led the Russian Foreign Minister Sergei Lavrov to call the situation one of "obvious double standards, but we clearly did not want neither what is happening in Ukraine, nor what is happening in Yemen."
  • Indeed, while Russia has been repeatedly accused of helping Donbas independence supporters, the US has openly fostered the south Yemen separatist movement. At the same time, while Ukraine's President Yanukovych was called illegitimate by the US after fleeing the country, Yemen's Hadi has remained "legitimate" and has even called for a Saudi Arabian military operation against the people who ousted him. The ongoing conflict in Yemen is currently at the second phase of US regime change operations, rebel conflict. The first stage, the color revolution, has failed, and now the last stop, foreign intervention and ground invasion remains. Saudi Arabia and its Gulf allies have already begun the airstrikes, and the South Arabia movement has begun its separatist campaign.
  •  
    Looks like Obama's drone attacks in Yemen were not enough to do the job.
  •  
    Turns out that the U.S. has been covertly rocking Yemen heavily at least since the Clinton Administration, including naval bombardment, drone strikes, cruise missiles, et cet.: Ongoing detailed compilations of U.S. covert and military actions in Yemen. (Publication dates are for first entry in compilations.) Methodology: http://www.thebureauinvestigates.com/2011/08/10/pakistan-drone-strikes-the-methodology2/ Drones Team, Yemen: reported US covert actions 2001-2011, The Bureau of Investigative Journalism (29 March 2012), http://www.thebureauinvestigates.com/2012/03/29/yemen-reported-us-covert-actions-since-2001/ (includes data through 2014). Jack Serle, Yemen: Reported US covert actions 2015, The Bureau of Investigative Journalism (26 January 2015),http://www.thebureauinvestigates.com/2015/01/26/yemen-reported-us-covert-actions-2015/
1 - 20 of 216 Next › Last »
Showing 20 items per page