Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged text-messages

Rss Feed Group items tagged

Paul Merrell

A Secret Catalogue of Government Gear for Spying on Your Cellphone - 0 views

  • HE INTERCEPT HAS OBTAINED a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and local police inside the United States. The catalogue includes details on the Stingray, a well-known brand of surveillance gear, as well as Boeing “dirt boxes” and dozens of more obscure devices that can be mounted on vehicles, drones, and piloted aircraft. Some are designed to be used at static locations, while others can be discreetly carried by an individual. They have names like Cyberhawk, Yellowstone, Blackfin, Maximus, Cyclone, and Spartacus. Within the catalogue, the NSA is listed as the vendor of one device, while another was developed for use by the CIA, and another was developed for a special forces requirement. Nearly a third of the entries focus on equipment that seems to have never been described in public before.
  • The Intercept obtained the catalogue from a source within the intelligence community concerned about the militarization of domestic law enforcement. (The original is here.) A few of the devices can house a “target list” of as many as 10,000 unique phone identifiers. Most can be used to geolocate people, but the documents indicate that some have more advanced capabilities, like eavesdropping on calls and spying on SMS messages. Two systems, apparently designed for use on captured phones, are touted as having the ability to extract media files, address books, and notes, and one can retrieve deleted text messages. Above all, the catalogue represents a trove of details on surveillance devices developed for military and intelligence purposes but increasingly used by law enforcement agencies to spy on people and convict them of crimes. The mass shooting earlier this month in San Bernardino, California, which President Barack Obama has called “an act of terrorism,” prompted calls for state and local police forces to beef up their counterterrorism capabilities, a process that has historically involved adapting military technologies to civilian use. Meanwhile, civil liberties advocates and others are increasingly alarmed about how cellphone surveillance devices are used domestically and have called for a more open and informed debate about the trade-off between security and privacy — despite a virtual blackout by the federal government on any information about the specific capabilities of the gear.
  • ANY OF THE DEVICES in the catalogue, including the Stingrays and dirt boxes, are cell-site simulators, which operate by mimicking the towers of major telecom companies like Verizon, AT&T, and T-Mobile. When someone’s phone connects to the spoofed network, it transmits a unique identification code and, through the characteristics of its radio signals when they reach the receiver, information about the phone’s location. There are also indications that cell-site simulators may be able to monitor calls and text messages. In the catalogue, each device is listed with guidelines about how its use must be approved; the answer is usually via the “Ground Force Commander” or under one of two titles in the U.S. code governing military and intelligence operations, including covert action.
  • ...2 more annotations...
  • “We’ve seen a trend in the years since 9/11 to bring sophisticated surveillance technologies that were originally designed for military use — like Stingrays or drones or biometrics — back home to the United States,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation, which has waged a legal battle challenging the use of cellphone surveillance devices domestically. “But using these technologies for domestic law enforcement purposes raises a host of issues that are different from a military context.”
  • But domestically the devices have been used in a way that violates the constitutional rights of citizens, including the Fourth Amendment prohibition on illegal search and seizure, critics like Lynch say. They have regularly been used without warrants, or with warrants that critics call overly broad. Judges and civil liberties groups alike have complained that the devices are used without full disclosure of how they work, even within court proceedings.
Paul Merrell

Spy Tech Company 'Hacking Team' Gets Hacked | Motherboard - 0 views

  • Sometimes even the cops get robbed. The controversial Italian surveillance company Hacking Team, which sells spyware to governments all around the world, including agencies in Ethiopia, Morocco, the United Arab Emirates, as well as the US Drug Enforcement Administration, appears to have been seriously hacked. Hackers have made 500 GB of client files, contracts, financial documents, and internal emails, some as recent as 2015, publicly available for download. Hacking Team’s spokesperson Eric Rabe did not immediately respond to Motherboard’s calls and email asking for verification that the hacked information is legitimate. Without confirmation from the company itself, it’s difficult to know what percentage of the files are real—however, based on the sheer size of the breach and the information in the files, the hack appears to be authentic. What’s more, the unknown hackers announced their feat through Hacking Team’s own Twitter account.
  • he hackers composed the tweets as if they were written by Hacking Team. “Since we have nothing to hide, we're publishing all our e-mails, files, and source code,” the hackers wrote in a tweet, which included the link to around 500 Gb of files. The hackers also started tweeting a few samples of internal emails from the company. One of the screenshots shows an email dated 2014 from Hacking Team’s founder and CEO David Vincenzetti to another employee. In the email, titled “Yet another Citizen Lab attack,” Vincenzetti links to a report from the online digital rights research center Citizen Lab, at the University of Toronto’s Munk School of Global Affairs, which has exposed numerous cases of abuse from Hacking Team’s clients. Hacking Team has never revealed a list of its clients, and has always and repeatedly denied selling to sketchy governments, arguing that it has an internal procedure to address human rights concerns about prospective customers.
  • It’s unclear exactly how much the hackers got their hands on, but judging from the size of the files, it’s certainly a large collection of internal files. A source who asked to speak anonymously due to the sensitivity of the issue, told me that based on the file names and folders in the leak, the hackers who hit Hacking Team "got everything." A few hours after the initial hack, a list of alleged Hacking Team customers was posted on Pastebin. The list includes past and current customers. Among the most notable, there are a few that were previously unknown, such as the FBI, Chile, Australia, Spain, and Iraq, among others.
  • ...1 more annotation...
  • The breach on Hacking Team comes almost a year after another surveillance tech company, the competing FinFisher, was hacked in a similar way, with a hacker leaking 40 Gb of internal files. FinFisher, like Hacking Team, sells surveillance software to law enforcement agencies across the world. Their software, once surreptitiously installed on a target’s cell phone or computer, can be used to monitor the target’s communications, such as phone calls, text messages, Skype calls, or emails. Operators can also turn on the target’s webcam and exfiltrate files from the infected device.
Paul Merrell

Hackers Use Old Lure on Web to Help Syrian Government - NYTimes.com - 0 views

  • To the young Syrian rebel fighter, the Skype message in early December 2013 appeared to come from a woman in Lebanon, named Iman Almasri, interested in his cause. Her picture, in a small icon alongside her name, showed a fair-skinned 20-something in a black head covering, wearing sunglasses.They chatted online for nearly two hours, seemingly united in their opposition to the rule of Bashar al-Assad, the Syrian leader still in power after a civil war that has taken more than 200,000 lives. Eventually saying she worked “in a programing company in Beirut,” the woman asked the fighter whether he was talking from his computer or his smartphone. He sent her a photo of himself and asked for another of her in return. She sent one immediately, apologizing that it was a few years old.“Angel like,” he responded. “You drive me crazy.”
  • What the fighter did not know was that buried in the code of the second photo was a particularly potent piece of malware that copied files from his computer, including tactical battle plans and troves of information about him, his friends and fellow fighters. The woman was not a friendly chat partner, but a pro-Assad hacker — the photos all appear to have been plucked from the web.
  • The Syrian conflict has been marked by a very active, if only sporadically visible, cyberbattle that has engulfed all sides, one that is less dramatic than the barrel bombs, snipers and chemical weapons — but perhaps just as effective. The United States had deeply penetrated the web and phone systems in Syria a year before the Arab Spring uprisings spread throughout the country. And once it began, Mr. Assad’s digital warriors have been out in force, looking for any advantage that could keep him in power.In this case, the fighter had fallen for the oldest scam on the Internet, one that helped Mr. Assad’s allies. The chat is drawn from a new study by the intelligence-gathering division of FireEye, a computer security firm, which has delved into the hidden corners of the Syrian conflict — one in which even a low-tech fighting force has figured out a way to use cyberespionage to its advantage. FireEye researchers found a collection of chats and documents while researching malware hidden in PDF documents, which are commonly used to share letters, books or other images. That quickly took them to the servers where the stolen data was stored.
Paul Merrell

Bulk Collection Under Section 215 Has Ended… What's Next? | Just Security - 0 views

  • The first (and thus far only) roll-back of post-9/11 surveillance authorities was implemented over the weekend: The National Security Agency shuttered its program for collecting and holding the metadata of Americans’ phone calls under Section 215 of the Patriot Act. While bulk collection under Section 215 has ended, the government can obtain access to this information under the procedures specified in the USA Freedom Act. Indeed, some experts have argued that the Agency likely has access to more metadata because its earlier dragnet didn’t cover cell phones or Internet calling. In addition, the metadata of calls made by an individual in the United States to someone overseas and vice versa can still be collected in bulk — this takes place abroad under Executive Order 12333. No doubt the NSA wishes that this was the end of the surveillance reform story and the Paris attacks initially gave them an opening. John Brennan, the Director of the CIA, implied that the attacks were somehow related to “hand wringing” about spying and Sen. Tom Cotton (R-Ark.) introduced a bill to delay the shut down of the 215 program. Opponents of encryption were quick to say: “I told you so.”
  • But the facts that have emerged thus far tell a different story. It appears that much of the planning took place IRL (that’s “in real life” for those of you who don’t have teenagers). The attackers, several of whom were on law enforcement’s radar, communicated openly over the Internet. If France ever has a 9/11 Commission-type inquiry, it could well conclude that the Paris attacks were a failure of the intelligence agencies rather than a failure of intelligence authorities. Despite the passage of the USA Freedom Act, US surveillance authorities have remained largely intact. Section 702 of the FISA Amendments Act — which is the basis of programs like PRISM and the NSA’s Upstream collection of information from Internet cables — sunsets in the summer of 2017. While it’s difficult to predict the political environment that far out, meaningful reform of Section 702 faces significant obstacles. Unlike the Section 215 program, which was clearly aimed at Americans, Section 702 is supposedly targeted at foreigners and only picks up information about Americans “incidentally.” The NSA has refused to provide an estimate of how many Americans’ information it collects under Section 702, despite repeated requests from lawmakers and most recently a large cohort of advocates. The Section 215 program was held illegal by two federal courts (here and here), but civil attempts to challenge Section 702 have run into standing barriers. Finally, while two review panels concluded that the Section 215 program provided little counterterrorism benefit (here and here), they found that the Section 702 program had been useful.
  • There is, nonetheless, some pressure to narrow the reach of Section 702. The recent decision by the European Court of Justice in the safe harbor case suggests that data flows between Europe and the US may be restricted unless the PRISM program is modified to protect the information of Europeans (see here, here, and here for discussion of the decision and reform options). Pressure from Internet companies whose business is suffering — estimates run to the tune of $35 to 180 billion — as a result of disclosures about NSA spying may also nudge lawmakers towards reform. One of the courts currently considering criminal cases which rely on evidence derived from Section 702 surveillance may hold the program unconstitutional either on the basis of the Fourth Amendment or Article III for the reasons set out in this Brennan Center report. A federal district court in Colorado recently rejected such a challenge, although as explained in Steve’s post, the decision did not seriously explore the issues. Further litigation in the European courts too could have an impact on the debate.
  • ...2 more annotations...
  • The US intelligence community’s broadest surveillance authorities are enshrined in Executive Order 12333, which primarily covers the interception of electronic communications overseas. The Order authorizes the collection, retention, and dissemination of “foreign intelligence” information, which includes information “relating to the capabilities, intentions or activities of foreign powers, organizations or persons.” In other words, so long as they are operating outside the US, intelligence agencies are authorized to collect information about any foreign person — and, of course, any Americans with whom they communicate. The NSA has conceded that EO 12333 is the basis of most of its surveillance. While public information about these programs is limited, a few highlights give a sense of the breadth of EO 12333 operations: The NSA gathers information about every cell phone call made to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan, and possibly other countries. A joint US-UK program tapped into the cables connecting internal Yahoo and Google networks to gather e-mail address books and contact lists from their customers. Another US-UK collaboration collected images from video chats among Yahoo users and possibly other webcam services. The NSA collects both the content and metadata of hundreds of millions of text messages from around the world. By tapping into the cables that connect global networks, the NSA has created a database of the location of hundreds of millions of mobile phones outside the US.
  • Given its scope, EO 12333 is clearly critical to those seeking serious surveillance reform. The path to reform is, however, less clear. There is no sunset provision that requires action by Congress and creates an opportunity for exposing privacy risks. Even in the unlikely event that Congress was inclined to intervene, it would have to address questions about the extent of its constitutional authority to regulate overseas surveillance. To the best of my knowledge, there is no litigation challenging EO 12333 and the government doesn’t give notice to criminal defendants when it uses evidence derived from surveillance under the order, so the likelihood of a court ruling is slim. The Privacy and Civil Liberties Oversight Board is currently reviewing two programs under EO 12333, but it is anticipated that much of its report will be classified (although it has promised a less detailed unclassified version as well). While the short-term outlook for additional surveillance reform is challenging, from a longer-term perspective, the distinctions that our law makes between Americans and non-Americans and between domestic and foreign collection cannot stand indefinitely. If the Fourth Amendment is to meaningfully protect Americans’ privacy, the courts and Congress must come to grips with this reality.
Gary Edwards

E-mail's Big Privacy Problem: Q&A With Silent Circle Co-Founder Phil Zimmerma... - 1 views

  • Customers of Silent Circle’s encrypted mail service got an unfortunate surprise on Friday: all their messages had been deleted. The management  of Silent Circle, an encryption firm that specializes in smartphone communication, abruptly shut down their e-mail service yesterday, saying they were pre-empting the U.S. government from forcing them to hand over customer data. While they were confident they could protect text messages, voice calls and video calls, e-mail had always been less secure because it relied on standard Internet protocols. Yesterday’s catalyst was a competitor, Lavabit, whose founder announced he was shutting his email-hosting company down due to an apparent government investigation, and told Forbes on Friday: “If you knew what I knew about e-mail, you might not use it.” Edward Snowden had been a Lavabit user.
  • Phil Zimmermann, the inventor of popular email encryption service Pretty Good Privacy (PGP) and co-founder of Silent Circle, told us even he was using e-mail less and less, and relying more heavily on mobile messaging services in the quest for privacy. He also explained the gnawing problem of Silent Circle’s e-mail service and why the company was now planning to put servers in Switzerland. Read the full Q&A with Zimmermann below, and you can read Kashmir Hill’s interview with Lavabit’s founder here.
  •  
    Good interview with Phil Zimmerman, the inventor of PGP, and founder of Silent Circle eMail Service.  Which is being shut down because of the what the Feds did to LavaBit. What concerns me most about this illegal and systematic invasion of privacy is the massive potential for blackmail and extortion.  Think of what the IRS illegally did to tens of millions of Americans, targeting them because of their religious and political views, and seeking volumes of highly personal information far beyond reasonable requirements.   What happens when the politicians in power start using the IRS and NSA for political purposes - like what we just saw in the 2012 elections? When I was working on the wiki-Word and SurDoc projects, we were very concerned about having our documents and designs hosted or passing through competitor (Microsoft and Google) servers and email systems.  At the time I thought I was just being paranoid.  Now we know differently.  We had every reason to be concerned.
Paul Merrell

Leaving the USS Liberty Crew Behind | Consortiumnews - 0 views

  • By Ray McGovern On June 8, 1967, Israeli leaders learned they could deliberately attack a U.S. Navy ship and try to send it, together with its entire crew, to the bottom of the Mediterranean – with impunity. Israeli aircraft and torpedo boats attacked the USS Liberty, a state-of-the-art intelligence collection platform sailing in international waters off the Sinai, killing 34 of the 294 crew members and wounding more than 170. On the 47th anniversary of that unprovoked attack let’s be clear about what happened: Israeli messages intercepted on June 8, 1967, leave no doubt that sinking the USS Liberty was the mission assigned to the attacking Israeli warplanes and torpedo boats as the Six-Day War raged in the Middle East. Let me repeat: there is no doubt – none – that the mission of the Israeli Defense Forces (IDF) was to destroy the USS Liberty and kill its entire crew.
  • Here, for example, is the text of an intercepted Israeli conversation, just one of many pieces of hard, unambiguous evidence that the Israeli attack was not a mistake: Israeli pilot to ground control: “This is an American ship. Do you still want us to attack?” Ground control: “Yes, follow orders.” … Israeli pilot: “But, sir, it’s an American ship – I can see the flag!” Ground control: “Never mind; hit it!”
  • Halbardier skated across the Liberty’s slippery deck while it was being strafed in order to connect a communications cable and enable the Liberty to send out an SOS. The Israelis intercepted that message and, out of fear of how the U.S. Sixth Fleet would respond, immediately broke off the attack, returned to their bases, and sent an “oops” message to Washington confessing to their unfortunate “mistake.” As things turned out, the Israelis didn’t need to be so concerned. When President Johnson learned that the USS America and USS Saratoga had launched warplanes to do battle with the forces attacking the Liberty, he told Defense Secretary Robert McNamara to call Sixth Fleet commander Rear Admiral Lawrence Geiss and tell him to order the warplanes to return immediately to their carriers. According to J.Q. “Tony” Hart, a chief petty officer who monitored these conversations from a U.S. Navy communications relay station in Morocco, Geiss shot back that one of his ships was under attack. Tellingly, McNamara responded: “President Johnson is not going to go to war or embarrass an American ally over a few sailors.”
  • ...3 more annotations...
  • John Crewdson, a Pulitzer Prize-winning journalist for the Chicago Tribune, asked McNamara about this many years later. McNamara’s answer is worth reading carefully; he said he had “absolutely no recollection of what I did that day,” except that “I have a memory that I didn’t know at the time what was going on.” Crewsdon has written the most detailed and accurate account of the Israeli attack on the Liberty; it appeared in the Chicago Tribune, and also in the Baltimore Sun, on Oct. 2, 2007. Read it and you’ll understand why Crewdson got no Pulitzer for his investigative reporting on the Liberty. Instead, the Tribune laid him off in November 2008 after 24 years.
  • The mainstream U.S. media has avoided the USS Liberty case like the plague. I just checked the Washington Post and – surprise, surprise – it has missed the opportunity for the 46th consecutive year, to mention the Liberty anniversary. On the few occasions when the mainstream U.S. media outlets are forced to address what happened, they blithely ignore the incredibly rich array of hard evidence and still put out the false narrative of the “mistaken” Israeli attack on the Liberty. And they attempt to conflate fact with speculation, asking why Israel would deliberately attack a ship of the U.S. Navy. Why Tel Aviv wanted the Liberty and its entire crew on the bottom of the Mediterranean remains a matter of speculation, but there are plausible theories including Israel’s determination to keep the details of its war plans secret from everyone, including the U.S. government. But there is no doubt that destroying the Liberty and its crew was the mission assigned to Israel’s warplanes and torpedo boats. One Navy Admiral with a conscience, former Chairman of the Joint Chiefs of Staff (and before that Chief of Naval Operations) Thomas Moorer, has “broken ranks,” so to speak. Moorer helped lead an independent, blue-ribbon commission to investigate what happened to the Liberty.
  • The following are among the commission’s findings made public in October 2003: -That the attack, by a U.S. ally, was a “deliberate attempt to destroy an American ship and kill its entire crew” -That the attack included the machine-gunning of stretcher-bearers and life rafts -That “the White House deliberately prevented the U.S. Navy from coming to the defense of the [ship] … never before in naval history has a rescue mission been cancelled when an American ship was under attack” -That surviving crew members were later threatened with “court-martial, imprisonment, or worse” if they talked to anyone about what had happened to them; and were “abandoned by their own government.”
  •  
    Former CIA senior analyst Ray McGovern on the shameful cover-up of Israel's deliberate attack on the USS Liberty in international waters during the 1967 Six Day War in which Israel -- which initiated the surprise war of aggression -- seized Palestine, the Egyptian Sinai, and portions of Jordan. Although not discussed in this article, the generally accepted motive among those who accept that the Israeli attack on the LIberty was deliberate was to blind the U.S. military to Israel's actions during the war. The Liberty was a U.S. Navy electronic intelligence gathering platform.
Gary Edwards

The Purchase Of Our Republic | Zero Hedge - 0 views

  • The massive consolidation of wealth, combined with the removal of any limits on money in campaigns, has allowed for the purchase of our government. Today I am publishing a comprehensive and important guest essay, The Purchase of Our Republic, by longtime correspondent Y. Falkson.
  • Americans know that something is wrong, deeply wrong. They see signs of the problem everywhere: income inequality, growing concentration and power of mega corporations, political donations/corruption, the absence of jobs with decent salaries, the explosion of the US prison population, healthcare costs, student loan debt, homelessness, etc. etc.  However, the true causes and benefactors behind these problems are purposely hidden from view. What Americans see is Kabuki Theater of a functioning form of capitalism and democracy, but beyond this veneer our country has devolved into the exact opposite. Those who benefit from this crony capitalist state go to extreme lengths to paper over the reality and convince Americans that the system works, the American Dream is still a reality and that American democracy is in fact democratic. Below I hope to begin to outline some of the underlying dynamics and trends that have evolved in recent decades and led us so far from what we once were. As fun as it would be, the answer is not some evil conspiracy by the Illuminati, but rather the unfortunate result of three long term and mutually reinforcing components that have been attacking the fundamental roots of the structure of our Republic. The first is the increased concentr
  • ation of corporate and private wealth. Both of which are quickly yelled down in the media as anti-free market and class war hysteria. The second is the use of this wealth to capture all three branches of government in order to ensure the continued extraction of capital from the many and to the few.The rich might have climbed the ladder because they earned it, but they have then purchased government to pull up the ladder behind them. The consequence of the first two components is a democracy in name only that represents the very few.
  • ...28 more annotations...
  • 1. Faux Capitalism = Wealth Consolidation / Income Inequality
  • While there is no true beginning to the story, we can start with the incredible build up and concentration of wealth among corporations in recent decades. The USA now boasts a cartel-like set of corporate titans in almost every industry. It goes beyond, but certainly includes, our Too Biggerer To Fail banks, merged from what was 37 banks in 1995 into a Frankenstein’s monster like 5 (Citigroup, JP Morgan-Chase, Bank of America, Wells Fargo and Goldman Sachs). In agriculture, Monsanto alone controls over 85% of all corn and soy bean crops, four companies control 83% of the beef market, 66% of the hog market and 58% of the chicken market. So while shopping at the grocery store might appear to be the manifestation of capitalism at its finest, it doesn’t take much digging to look behind the curtain to see how little competition truly exists.
  • When the average American goes to pick up some groceries, they are shopping at Walmart and buying something from P&G that is mostly made of Monsanto corn. Is that true choice? The same story plays out with our news and media (and other industries) where we have gone from 50 companies in 1983 to the big 6 which control over 90% of all media. Is choosing to watch one of 30 news channels, all of which are owned by News Corp (Rupert Murdoch) a real choice? This is not capitalism and they are not competing, not in the true sense of the word. Along with this consolidation of corporations in recent decades, their senior leaders have taken up a larger and larger piece of the pie at the expense of their employees. In particular, the ratio of CEO-to-worker pay has increased 1,000 percent since 1950. Unsurprisingly, Walmart is both the largest employer in the country and the worst CEO pay offender with a ratio of over 1000:1. This is at a time where worker productivity has increased significantly, something that historically correlated with increased pay. But no more. It’s a new twist on the old Soviet saying “we pretend to work and they pretend to pay us”, but now it’s closer to “we do all of the work and they pretend to pay us”.
  • Private Wealth: As a consequence of the royal tribute we pay to the C-suite class these days, we have likely surpassed the pre-Depression Roaring Twenties in terms of inequality.
  • This, amazingly, has only accelerated since the crisis in 2008 in thanks to bailouts, Quantitative Easing and other gifts from Congress and the Fed. The wealthy 1% and in particular the .01% have now grown their fortunes to levels that tax comprehension and even their ability to spend it (the decisions by a few billionaires such as Bill Gates to essentially donate his fortune is a tacit acknowledgement that our current system over provides wealth to a select few).
  • So what is an incredibly wealthy capitalist CEO of a mega-corporation do once they control their industry and have essentially limitless wealth? Well in a competitive market, the only way to go from the top is down and the only thing that can make that happen is competition. Consequently, competition must be avoided whenever possible.
  • To squash or prevent competition, the oligopolies and oligarchs target their resources on the one place that can make competition illegal, our government.Something to keep in mind the next time you see a corporate billionaire grandstanding about the importance of “Free Markets” when their strategy is quite the opposite. As this capture of the government has taken place we have essentially shifted from capitalism and to crony capitalism. So we now have industries that have mastered the art of faking capitalism by turning our government into one that fakes democracy. This government takeover took time, but the purchase of all 3 branches of government has almost been completed by 2014. You don’t have to take my word for it, luckily that has now been empirically proven in an analysis of over 20 years of government policy where the clear conclusion was that policy makers respond solely to those in the top 90th percentile and essentially ignore the large majority of Americans.
  • 2. Wealthy Purchase of Government Institutions / Elections
  • Purchase of the Executive Branch:
  • Let’s take a step back and take a glimpse at how the government was purchased, beginning with the executive branch. In 1980, Reagan’s election cost less than $300 million. When Bush beat Kerry in 2004, it cost almost 3x times as much, almost $900 Million. 4 years later, the 2008 election cost a record $1.3 Billion. It was in this election where Obama hammered the final nail in the coffin for government funded for elections. Obama, more so than any other candidate in recent decades had the widespread support of millions of small donors, but in the end I guess it wasn’t enough. So when Obama “leaned to the green”, it forever set the precedent that you can’t win without the backing of our nation’s oligarchs. Consequently, the money has only gushed in since as the cost of Obama’s reelection in 2012 skyrocketed to an unfathomable $7 billion. Needless to say this is slightly above the rate of inflation. Our Presidents are now preselected exclusively by a tiny fraction of Americans can have the money to fund what has become necessary for a legitimate run. Summary: Candidates spend years courting the super-rich to build up a multi-billion dollar war chest. Only those who succeed can actually run a campaign that an average American will be aware of. Then Americans get to choose one of the pre-selected “candidates”. No wonder voter turnout is so low… Executive branch, check!
  • – Note that media corporations benefit doubly as they can use their cash to fund elections, but are also the beneficiary of all that money as it is used for campaign spending.
  • Purchase of the Legislative Branch:
  • The process has progressed similarly in Congress. In 1978, outside groups spent $303,000 on congressional races. In 2012 that was up to $457,000,000. That is over 1,500 times the level in 1978. It would be funny, if it was so blatant and terrifying. By many accounts, our “leaders” in Congress spend 50% or more of their time working the phones or fundraisers rather than trying (and failing) to actually do the “people’s business”. Let’s also take a minute to appreciate the hypocrisy of anyone that pretends that the money doesn’t influence our government. Businesses do not give to politicians for charity. This is a payment for services that has proven exceedingly reliable and profitable. The ROI for money invested in purchasing Congressman is what CEO dreams are made of. No wonder the incentive is to invest in Congress rather than R&D or marketing. There are very few places in the world or times in history where you can find ROI’s in the thousands, or even the tens of thousands.
  • Review: Congressmen beg for money to get elected, make sure to vote the way your benefactors would like, consequently get more money to get elected again. If at any point they do lose or quit, they take the big payday to work for those who have been paying them all along. Legislative Branch, Check!
  • In addition, increasingly those who work on Congress (and regulators) were previously employed by these large corporations or expect to work there later. A recent example is Chris Dodd who left the Senate the head lobbyist for Hollywood at the MPAA, the guys behind SOPA and PIPA, but there are many many others.
  • Judicial Branch Endorsement of the Purchase of Government:
  • Last but not least, we have the enabling Judicial Branch. It only took a few purchased presidents to ensure the appointment of a majority of “free market” and “pro-business” judges. For instance, and disgracefully, Clarence Thomas was once legal counsel for Monsanto, but has not once recused himself from any cases involving Monsanto and always votes in their favor. These radicals have now fully endorsed and enabled the influx of money used to purchase the other branches. Specifically, 2 major decisions have completely opened the floodgates, Citizens United and McCutcheon. The first allowed unlimited contributions of corporate money into elections and brought us the notorious declaration that “corporations are people” and that “money is free speech”. This was more recently followed up with the private wealth equivalent in McCutcheon. In this ruling, Supreme Court Chief Justice John Roberts said as part of his majority opinion (presumably with a straight face) “… nor does the possibility that an individual who spends large sums may garner influence over or access to elected officials or political parties”. And with this, the Supreme Court has fully endorsed both major sources of immense wealth to purchase our elections and consequently our government. Review: The rich fund Presidential elections, Presidents nominate “business-friendly” judges and then the bought Congress approves their nominations. New judge then votes to ensure even more money is allowed to purchase elections. Judicial Branch, CHECK!
  • 3. A Faux Republic Dependent Upon the Funders and Not the Voters
  • The Founder’s Hope and the Sad Reality:
  • Acknowledging where we are as a country, it is often helpful to look to where we started for some perspective. Unsurprisingly, this type of problem was not overlooked back in the 18th century. In 1776, James Madison stated that his goal was to design a republic in which “powerful interest groups would be rendered incapable of subdoing the general will”. Madison hoped, perhaps naively, that factions would be thwarted by competing with other factions. Sadly, we are now in a time where factions (aka wealthy special interests) subdue the will of the people and ensure the government responds to them alone on those issues where they have a “special interest” and consequently asymmetric stakes in the game (Charles Hugh Smith). As a result, these groups essentially collude to allocate their resources to their own issues, but do not “thwart” or compete with other factions as they do the same. It’s a pretty great system, as long as you’re one of the wealthy few who can use their money to drown out the poor and voiceless many. And just like that, what was once a Republic has become a corrupt shell of its past self. All the signs are still there; votes, elections, campaigns, branches of government, etc., but behind the scenes the only ones represented are those who can afford to be heard.
  • Summary: This massive consolidation of wealth, combined with the removal of any limits on money in campaigns, has allowed for the purchase of our government, or as Dick Durban once stated, “frankly they [the banks in this case] own the place”. If money = free speech, then those with all the money, have all the free speech.
  • What Might Help? Now that I have likely and thoroughly depressed the reader, let’s bounce around some ideas for what can be done. As stated in the beginning, this is not an unknown problem and many people are promoting a number of ways to fix or at least ameliorate the problem. I will briefly describe just a few which I think provide some direction any of us could easily implement or support.
  • Change the Rules: Laurence Lessig of Harvard Law has put forward a visionary proposal for re-writing the way that campaigns are financed in his book, Republic, Lost: How Money Corrupts Congress--and a Plan to Stop It. Put simply, he would like to empower every voter with a stipend, say $150 per election to give to whatever candidate or candidates they prefer. If you would like to accept this money, you would need to forgo any other contributions or support (one would hope including the indirect PAC kind). This would actually provide even more money than is used in current elections, but would effectively democratize the funding process. While there would still be a “funding election” that takes place before the actual election, the funding would not be unequally provided. Lessig’s work has only begun, as this sort of bill or likely constitutional reform is nearly impossible to achieve, but he has undertaken and I assume will continue to implement many brave and creative ways of bringing about the change all American’s should support. Most recently he has suggested we begin to fund, ironically enough, a Super PAC to end all Super PACs. It would be funded with the solitary goal of changing how money impacts our elections. Please support them here: www.mayone.us/
  • Change Our Day-to-Day: At the more micro level, Charles Hugh Smith believes that we will inevitably see our overly centralized and inefficient system erode away as it is replaced by more resilient, local and efficient businesses and societies outside of the current system. With that in mind, he recommends that “all anyone can do is the basic things--lower our energy footprint, stay healthy and avoid unnecessary medications and procedures, support local businesses, organic food growers, etc. In other words, what we can do is support local businesses that are part of the emerging economy rather than support corporate cartels.” Your Vote Does Matter: Do you live in Ohio, Florida or New Hampshire? Probably not. Despite what we are told every 4 years, there are actually states outside of the “swing states”, and even more surprising, the very large majority of Americans live in those states where your “vote doesn’t matter”. New Yorkers an Californians all know their state will turn Blue no matter who the candidates are and either don’t vote at all, or often vote for the Blue team in order to feel like they are on the winning side.
  • The truth is that if you see the election as Red vs. Blue, you vote probably doesn’t matter. But here is the trick, if all the people who think their vote didn’t matter decided to vote for whom they might actually believe in, then their votes just might matter.
  • What if all the growing number of “Independents” (who usually still vote Blue), chose to vote for a third party? What if a third party candidate won a state like New York or California? What if that candidate was one whose primary promise to the voters was to champion a change to the role of money in government (perhaps in line with what Lessig proposes)? Would you vote for such a person?I would argue you should. If California alone (with 55 electoral votes) were to vote for a 3rd party that would likely prevent either Red or Blue candidate from winning the requisite 270 electoral votes.
  • Think about the message that would send to both parties. I would predict that both sides would start to bend over backwards for an endorsement from that 3rd party and they would have to get it by taking up the same primary cause for reforming money in government. Consequently, at the root of our corrupted system which is perpetually ignored as both sides might suddenly become the big issue of the election. Then maybe we might begin to turn things around.
  • Sources: Charles Hugh Smith (oftwominds, Surivival+, etc.), Yves Smith (Naked Capitalism, Econned), Laurence Lessig (Republic Lost, multiple TED Talks), Matt Taibbi (blog at Rolling Stone and now at The Intercept), Zero Hedge, John Robb, Max Keiser, Clay Shirky (Cognitive Surplus), Aldous Huxley (Brave New World, Brave New World Revisited), George Orwell (1984), Michael Lewis, Daniel Kahneman (Thinking Fast and Slow), James Richards (Currency Wars), Han Joon Chang (23 Things They Don’t Tell You About Capitalism) and Joseph Stiglitz (Mismeasuring Our Lives) 
Paul Merrell

Congress Is Irrelevant on Mass Surveillance. Here's What Matters Instead. - The Intercept - 0 views

  • The “USA Freedom Act”—the proponents of which were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill. The “debate” among the Senators that preceded the vote was darkly funny and deeply boring, in equal measure. The black humor was due to the way one GOP senator after the next—led by ranking intelligence committee member Saxby Chambliss of Georgia (pictured above)—stood up and literally screeched about 9/11 and ISIS over and over and over, and then sat down as though they had made a point.
  • So the pro-NSA Republican senators were actually arguing that if the NSA were no longer allowed to bulk-collect the communication records of Americans inside the U.S., then ISIS would kill you and your kids. But because they were speaking in an empty chamber and only to their warped and insulated D.C. circles and sycophantic aides, there was nobody there to cackle contemptuously or tell them how self-evidently moronic it all was. So they kept their Serious Faces on like they were doing The Nation’s Serious Business, even though what was coming out of their mouths sounded like the demented ramblings of a paranoid End is Nigh cult. The boredom of this spectacle was simply due to the fact that this has been seen so many times before—in fact, every time in the post-9/11 era that the U.S. Congress pretends publicly to debate some kind of foreign policy or civil liberties bill. Just enough members stand up to scream “9/11″ and “terrorism” over and over until the bill vesting new powers is passed or the bill protecting civil liberties is defeated.
  • Eight years ago, when this tawdry ritual was still a bit surprising to me, I live-blogged the 2006 debate over passage of the Military Commissions Act, which, with bipartisan support, literally abolished habeas corpus rights established by the Magna Carta by sanctioning detention without charges or trial. (My favorite episode there was when GOP Sen. Arlen Specter warned that “what the bill seeks to do is set back basic rights by some nine hundred years,” and then voted in favor of its enactment.) In my state of naive disbelief, as one senator after the next thundered about the “message we are sending” to “the terrorists,” I wrote: “The quality of the ‘debate’ on the Senate floor is so shockingly (though appropriately) low and devoid of substance that it is hard to watch.” So watching last night’s Senate debate was like watching a repeat of some hideously shallow TV show. The only new aspect was that the aging Al Qaeda villain has been rather ruthlessly replaced by the show’s producers with the younger, sleeker ISIS model. Showing no gratitude at all for the years of value it provided these senators, they ignored the veteran terror group almost completely in favor of its new replacement. And they proceeded to save a domestic surveillance program clearly unpopular among those they pretend to represent.
  • ...8 more annotations...
  • Ever since the Snowden reporting began and public opinion (in both the U.S. and globally) began radically changing, the White House’s strategy has been obvious. It’s vintage Obama: Enact something that is called “reform”—so that he can give a pretty speech telling the world that he heard and responded to their concerns—but that in actuality changes almost nothing, thus strengthening the very system he can pretend he “changed.” That’s the same tactic as Silicon Valley, which also supported this bill: Be able to point to something called “reform” so they can trick hundreds of millions of current and future users around the world into believing that their communications are now safe if they use Facebook, Google, Skype and the rest. In pretty much every interview I’ve done over the last year, I’ve been asked why there haven’t been significant changes from all the disclosures. I vehemently disagree with the premise of the question, which equates “U.S. legislative changes” with “meaningful changes.” But it has been clear from the start that U.S. legislation is not going to impose meaningful limitations on the NSA’s powers of mass surveillance, at least not fundamentally. Those limitations are going to come from—are now coming from —very different places:
  • All of that illustrates what is, to me, the most important point from all of this: the last place one should look to impose limits on the powers of the U.S. government is . . . the U.S. government. Governments don’t walk around trying to figure out how to limit their own power, and that’s particularly true of empires. The entire system in D.C. is designed at its core to prevent real reform. This Congress is not going to enact anything resembling fundamental limits on the NSA’s powers of mass surveillance. Even if it somehow did, this White House would never sign it. Even if all that miraculously happened, the fact that the U.S. intelligence community and National Security State operates with no limits and no oversight means they’d easily co-opt the entire reform process. That’s what happened after the eavesdropping scandals of the mid-1970s led to the establishment of congressional intelligence committees and a special FISA “oversight” court—the committees were instantly captured by putting in charge supreme servants of the intelligence community like Senators Dianne Feinstein and Chambliss, and Congressmen Mike Rogers and “Dutch” Ruppersberger, while the court quickly became a rubber stamp with subservient judges who operate in total secrecy.
  • There is a real question about whether the defeat of this bill is good, bad, or irrelevant. To begin with, it sought to change only one small sliver of NSA mass surveillance (domestic bulk collection of phone records under section 215 of the Patriot Act) while leaving completely unchanged the primary means of NSA mass surveillance, which takes place under section 702 of the FISA Amendments Act, based on the lovely and quintessentially American theory that all that matters are the privacy rights of Americans (and not the 95 percent of the planet called “non-Americans”). There were some mildly positive provisions in the USA Freedom Act: the placement of “public advocates” at the FISA court to contest the claims of the government; the prohibition on the NSA holding Americans’ phone records, requiring instead that they obtain FISA court approval before seeking specific records from the telecoms (which already hold those records for at least 18 months); and reducing the agency’s “contact chaining” analysis from three hops to two. One could reasonably argue (as the ACLU and EFF did) that, though woefully inadequate, the bill was a net-positive as a first step toward real reform, but one could also reasonably argue, as Marcy Wheeler has with characteristic insight, that the bill is so larded with ambiguities and fundamental inadequacies that it would forestall better options and advocates for real reform should thus root for its defeat.
  • 1) Individuals refusing to use internet services that compromise their privacy.
  • 2) Other countries taking action against U.S. hegemony over the internet.
  • 3) U.S. court proceedings.
  • 4) Greater individual demand for, and use of, encryption.
  • The “USA Freedom Act”—which its proponents were heralding as “NSA reform” despite its suffocatingly narrow scope—died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate and move on to an up-or-down vote. All Democratic and independent senators except one (Bill Nelson of Florida) voted in favor of the bill, as did three tea-party GOP Senators (Ted Cruz, Mike Lee, and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House had issued a statement “strongly supporting” the bill.
  •  
    Glenn Greenwald on why the death of the USA Freedom Act is actually a Very Good Thing. I couldn't agree more.
Paul Merrell

In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle - NYTimes.com - 0 views

  • In the fall of 2008, a 30-year-old computer expert named Zarrar Shah roamed from outposts in the northern mountains of Pakistan to safe houses near the Arabian Sea, plotting mayhem in Mumbai, India’s commercial gem.Mr. Shah, the technology chief of Lashkar-e-Taiba, the Pakistani terror group, and fellow conspirators used Google Earth to show militants the routes to their targets in the city. He set up an Internet phone system to disguise his location by routing his calls through New Jersey. Shortly before an assault that would kill 166 people, including six Americans, Mr. Shah searched online for a Jewish hostel and two luxury hotels, all sites of the eventual carnage.
  • But he did not know that by September, the British were spying on many of his online activities, tracking his Internet searches and messages, according to former American and Indian officials and classified documents disclosed by Edward J. Snowden, the former National Security Agency contractor. They were not the only spies watching. Mr. Shah drew similar scrutiny from an Indian intelligence agency, according to a former official briefed on the operation. The United States was unaware of the two agencies’ efforts, American officials say, but had picked up signs of a plot through other electronic and human sources, and warned Indian security officials several times in the months before the attack.
Paul Merrell

In Egypt, Angry Talk of Western Conspiracy Over Plane Crash - The New York Times - 0 views

  • Egyptian media have reacted with fury as Britain and the United States increasingly point to a bomb as the cause of the Oct. 31 Russian plane crash in Sinai, with many outlets hammering home the same message: Egypt is facing a Western conspiracy that seeks to scare off tourists and destroy the country's economy. The warnings of a plot have been widely promoted by opinion-makers in print, online, and on TV, sometimes hinting and sometimes saying flat-out that the West has restricted flights to Egypt not purely out of safety concerns for its citizens but because it wants to undermine the country or prevent President Abdel-Fattah el-Sissi from making Egypt too strong.And though they seem wild, these conspiracy theories have apparently tapped into the Egyptian mindset — so much so that when Russia last Friday grounded all flights to Egypt, some media speculated that Moscow had fallen victim to British pressure and manipulation."The people defy the conspiracy — Egypt will not cave in to pressures," the state-owned Al-Gomhuria newspaper proclaimed in a front-page headline this week. "Egypt stands up to 'the West's terrorism,'" an independent daily, El-Watan, headlined.
  •  
    Seems as though I'm not the only one who suspects a false flag operation by the U.S.
Paul Merrell

Barrier Breakers 2016: A Project of Correct The Record - Correct The Record - 0 views

  • Task force will help Clinton supporters push back on online harassment and thank superdelegates Anonymous online attacks, from both sides of the political spectrum, have sought to spread lies and misleading narratives about Secretary Hillary Clinton. Hillary’s supporters are more enthusiastic than Sen. Bernie Sanders’ supporters, yet oftentimes are discouraged from engaging online and are “often afraid to voice their thoughts” because of the fear of online harassment. Many of Hillary Clinton’s female supporters in particular have been subject to intense cyber-bullying and sexist attacks from swarms of anonymous attackers. Among the many Hillary Clinton supporters attacked online, superdelegates have been subject to vicious attacks for supporting her. Even the director of MoveOn, which has endorsed Sen. Sanders, denounced this harassment. In response to these attacks on supporters and superdelegates, Correct The Record is launching the Barrier Breakers 2016 digital task force. While Hillary Clinton fights to break down barriers and bring America together, the Barrier Breakers 2016 digital task force will serve as a resource for supporters looking for positive content and push-back to share with their online progressive communities, as well as thanking prominent supporters and committed superdelegates on social media.
  • ask force will help Clinton supporters push back on online harassment and thank superdelegates Anonymous online attacks, from both sides of the political spectrum, have sought to spread lies and misleading narratives about Secretary Hillary Clinton. Hillary’s supporters are more enthusiastic than Sen. Bernie Sanders’ supporters, yet oftentimes are discouraged from engaging online and are “often afraid to voice their thoughts” because of the fear of online harassment. Many of Hillary Clinton’s female supporters in particular have been subject to intense cyber-bullying and sexist attacks from swarms of anonymous attackers. Among the many Hillary Clinton supporters attacked online, superdelegates have been subject to vicious attacks for supporting her. Even the director of MoveOn, which has endorsed Sen. Sanders, denounced this harassment. In response to these attacks on supporters and superdelegates, Correct The Record is launching the Barrier Breakers 2016 digital task force. While Hillary Clinton fights to break down barriers and bring America together, the Barrier Breakers 2016 digital task force will serve as a resource for supporters looking for positive content and push-back to share with their online progressive communities, as well as thanking prominent supporters and committed superdelegates on social media.
  • Correct The Record will invest more than $1 million into Barrier Breakers 2016 activities, including the more than tripling of its digital operation to engage in online messaging both for Secretary Clinton and to push back against attackers on social media platforms like Twitter, Facebook, Reddit, and Instagram. Barrier Breakers 2016 is a project of Correct The Record and the brainchild of David Brock, and the task force will be overseen by President of Correct The Record Brad Woodhouse and Digital Director Benjamin Fischbein. The task force staff’s backgrounds are as diverse as the community they will be engaging with and include former reporters, bloggers, public affairs specialists, designers, Ready for Hillary alumni, and Hillary super fans who have led groups similar to those with which the task force will organize. Lessons learned from online engagement with “Bernie Bros” during the Democratic Primary will be applied to the rest of the primary season and general election–responding quickly and forcefully to negative attacks and false narratives. Additionally, as the general election approaches, the task force will begin to push out information to Sanders supporters online, encouraging them to support Hillary Clinton. The task force currently combats online political harassment, having already addressed more than 5,000 individuals who have personally attacked Secretary Clinton on Twitter. The task force will provide a presence and space online where Clinton supporters can organize and engage with one another and are able to obtain graphics, videos, gifs, and messaging to use in their own social spaces. Additionally, the Barrier Breakers 2016 task force hopes to embrace the creativity of Hillary Clinton’s supporters by sharing their efforts and content with other groups.
Paul Merrell

Hillary Clinton Blames F.B.I. Director for Election Loss - The New York Times - 0 views

  • Hillary Clinton on Saturday cast blame for her surprise election loss on the announcement by the F.B.I. director, James B. Comey, days before the election that he had revived the inquiry into her use of a private email server.In her most extensive remarks since she conceded the race to Donald J. Trump early Wednesday, Mrs. Clinton told donors on a 30-minute conference call that Mr. Comey’s decision to send a letter to Congress about the inquiry 11 days before Election Day had thrust the controversy back into the news and had prevented her from ending the campaign with an optimistic closing argument.
  •  
    Jeez! No blame to be cast on Hillary herself for setting up the private server; blame the FBI instead? That's blaming the messenger instead of the information in the message.
Gary Edwards

Liberty's backlash -- why we should be grateful to Edward Snowden | Fox News - 1 views

  •  
    Liberty's backlash -- why we should be grateful to Edward Snowden By Judge Andrew P. Napolitano Published August 01, 2013 FoxNews.com Last week, Justin Amash, the two-term libertarian Republican congressman from Michigan, joined with John Conyers, the 25-term liberal Democratic congressman from the same state, to offer an amendment to legislation funding the National Security Agency (NSA). If enacted, the Amash-Conyers amendment would have forced the government's domestic spies when seeking search warrants to capture Americans' phone calls, texts and emails first to identify their targets and produce evidence of their terror-related activities before a judge may issue a warrant. The support they garnered had a surprising result that stunned the Washington establishment. It almost passed. The final vote, in which the Amash-Conyers amendment was defeated by 205 to 217, was delayed for a few hours by the House Republican leadership, which opposed the measure. The Republican leadership team, in conjunction with President Obama and House Minority Leader Nancy Pelosi, needed more time for arm-twisting so as to avoid a humiliating loss. But the House rank-and-file did succeed in sending a message to the big-government types in both parties: Nearly half of the House of Representatives has had enough of government spying and then lying about it, and understands that spying on every American simply cannot withstand minimal legal scrutiny or basic constitutional analysis. The president is deeply into this and no doubt wishes he wasn't. He now says he welcomed the debate in the House on whether his spies can have all they want from us or whether they are subject to constitutional requirements for their warrants. Surely he knows that the Supreme Court has ruled consistently since the time of the Civil War that the government is always subject to the Constitution, wherever it goes and whatever it does. As basic as that sounds, it is not a universally held belief am
Paul Merrell

Germany, US to negotiate 'no-spy' agreement | News | DW.DE | 12.08.2013 - 0 views

  • Germany and the US are to start talks on an anti-spying agreement, Germany's chancellery minister Ronald Pofalla has said. The announcement came as he testified on the government's role in the NSA scandal in parliament. Pofalla, who is responsible for coordinating the various intelligence services in Germany, told a parliamentary committee on Monday that the US had offered talks on a no-spy agreement, which showed that the US was serious about adhering to German law on German soil. "This offer could have never been made if the Americans' assurances that they will stick to German law in Germany wasn't actually true," he told the committee. Pofalla insisted that the allegations against the NSA and Germany's foreign intelligence service the BND had been refuted, as the NSA had declared in writing that it is prepared to observe German law in Germany. Pofalla also told parliamentarians that both British and US intelligence agencies had assured the government that there was no comprehensive spying and wiretapping by their services in Germany. "Unlike many erroneous statements to the contrary, the basic rights of millions of Germans are not being violated," Pofalla said, adding that, in the government's view, the spying allegations against the US and the UK were now "off the table."
  •  
    As though anyone could trust anything said by the Obama Administration about NSA programs. Note earlier bookmarked page: "NSA spying is targeting Germany more intensely than previously believed. Secret documents viewed by SPIEGEL reveal that the American intelligence service monitors around half a billion telephone calls, emails and text messages in the country every month." http://www.spiegel.de/international/germany/nsa-spies-on-500-million-german-data-connections-a-908648.html
Paul Merrell

President Barack Obama plans new limits on National Security Agency surveillance - POLI... - 0 views

  • President Barack Obama said Thursday that he'll be reining in some of the snooping conducted by the National Security Agency, but he did not detail what new limits he plans to impose on the embattled spy organization. "I'll be proposing some self-restraint on the NSA. And...to initiate some reforms that can give people more confidence, " Obama told Chris Matthews in an interview recorded for MSNBC's "Hardball." The president insisted that the NSA's work shows respect for the rights of Americans, but he conceded that its activities are often more intrusive when it comes to foreigners communicating overseas. "The N.S.A. actually does a very good job about not engaging in domestic surveillance, not reading people's emails, not listening to the contents of their phone calls. Outside of our borders, the NSA's more aggressive. It's not constrained by laws," Obama said.
  • The White House has already acknowledged imposing some limits on overseas surveillance, publicly promising not to intercept phone calls of German Chancellor Angela Merkel and indicating that surveillance on leaders of other allies has also been curtailed.
  • During the program, Matthews raised the surveillance issue by noting a Washington Post report on NSA gathering of location data on billion of cell phones overseas. "Young people, rightly, are sensitive to the needs to preserve their privacy and to remain internet freedom.  And by the way, so am I.  That's part of not just our First Amendment rights and expectations in this country, but it's particularly something that young people care about, because they spend so much time texting and-- you know, Instagramming," the president said.
  • ...2 more annotations...
  • However, Obama also cited the terrorist threat the NSA is trying to combat. And, in with some at the NSA feeling hung out to dry by the president, he went out of his way to praise the agency's personnel for their discretion.
  • "The challenge is...we do have people who are trying to hurt us.  And they communicate through these same systems," Obama said. "And if we're going to do a good job preventing a terrorist attack in this country, a weapon of mass destruction getting on the New York subway system, etc., we do want to keep eyes on some bad actors." "I want to everybody to be clear: the people at the NSA, generally, are looking out for the safety of the American people. They are not interested in reading your emails. They're not interested in reading your text messages.  And that's not something that's done.  And we've got a big system of checks and balances, including the courts and Congress, who have the capacity to prevent that from happening," the president added.
  •  
    The usual Intelligence Community lies about all those great checks and balances and about "terrorism." But that Obama quote about the First Amendment and "young people's" privacy expectations will be quoted in some legal briefs. 
Gary Edwards

Updated specs released for the Blackphone secure smartphone - 1 views

  •  
    Nice video. I want one! excerpt: "SGP Technologies has released updated tech specs for its Blackphone, a smartphone designed with user privacy in mind. The device was unveiled at Mobile World Congress in February as a secure smartphone for the mass market. It will feature an NVIDIA Tegra 4i mobile processor. The Tegra 4i processor is amongst the most powerful mobile processors available, running 60 custom GPU cores and a quad-core CPU. It clocks in at a top speed of 2.3 GHz, with 2 GB of RAM. The device has a fifth core for battery saving. The Blackphone runs PrivatOS, SGP's own custom operating system based on on the KitKat version of Android. Users are provided with 16 GB of internal memory and have the option of using additional microSD storage. It features an 8 MP camera on the rear and a 5 MP front-facing camera. It also has a 4.7 in HD display with a resolution of 1280 x 720. Users can purchase the phone unlocked for use on any network or can buy it through "selected partner carriers." A number of privacy tools will be pre-installed, such as secure voice and video calling, secure text messaging and encrypted storage of contacts. Anonymous search, private browsing, secure VPN connectivity and secure cloud storage are also featured. The first pre-sales run of the Blackphone is sold out, but more devices are expected to become available from June. The Blackphone is listed for US$629. The video below provides an introduction to the Blackphone."
Paul Merrell

Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails "Top Secret" - 0 views

  • Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails “Top Secret” The leaking of the Clinton emails has been compared to as the next “Watergate”. By ZeroHedge.com | January 30, 2016 Share this article! targ
  • The State Department will release more emails from Clinton’s time as secretary of state later Friday. But The Associated Press has learned that 7 email chains are being withheld in full for containing “top secret” material. The 37 pages include messages recently described by a key intelligence official as concerning so-called “special access programs” — a highly restricted subset of classified material that could point to confidential sources or clandestine programs like drone strikes or government eavesdropping. Department officials wouldn’t describe the substance of the emails, or say if Clinton had sent any herself. Spokesman John Kirby tells the AP that no judgment on past classification was made. But the department is looking into that, too.
  • For those that Clinton only read, and didn’t write or forward, she still would have been required to report classification slippages that she recognized. Possible responses for classification infractions include counseling, warnings or other action, State Department officials said, though they declined to say if these applied to Clinton or senior aides who’ve since left the department. The officials weren’t authorized to speak on the matter and spoke on condition of anonymity. However, as we previously noted, the implications are tough for The DoJ – if they indict they crush their own candidate’s chances of the Presidency, if they do not – someone will leak the details and the FBI will revolt… The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days.
  • ...1 more annotation...
  • I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, which she will not be able to survive as an attorney general,” he said. “The intelligence community will not stand for that. They will fight for indictment and they are already in the process of gearing themselves to basically revolt if she refuses to bring charges.” The FBI also is looking into Clinton’s email setup, but has said nothing about the nature of its probe. Independent experts say it is highly unlikely that Clinton will be charged with wrongdoing, based on the limited details that have surfaced up to now and the lack of indications that she intended to break any laws. “What I would hope comes out of all of this is a bit of humility” and an acknowledgement from Clinton that “I made some serious mistakes,” said Bradley Moss, a Washington lawyer who regularly handles security clearance matters. Legal questions aside, it’s the potential political costs that are probably of more immediate concern for Clinton. She has struggled in surveys measuring her perceived trustworthiness and an active federal investigation, especially one buoyed by evidence that top secret material coursed through her account, could negate one of her main selling points for becoming commander in chief: Her national security resume.
Paul Merrell

US-Saudi Plan: Let 9,000 ISIS Fighters Walk Free from Mosul - to Fight in Syria - 0 views

  • Judging by both the words, and deeds of the Obama White House and its political ‘diplomatic’ appointees led by perfidious John Kerry and caustic Samantha Power – all evidence to date points to the US wanting to escalate its war on Syria – while happily baiting a military confrontation, and ‘World War‘ scenario with Russia and its allies in the process.  If this latest leak is indeed true – and time will certainly tell whether or not it is, it would constitute one of the most egregious violations of both US and international law – by the United States government and its theocratic dictator partner in Saudi Arabia. Washington’s own anti-terror legislation expressly forbids colluding to provide logistical or material support for terrorist groups, and this US-Saudi venture would be the latest in a long list of violations…
  • Here’s what makes this a potential shocker: the operation allows for safe passage for 9,000 ISIS fighters on the proviso that they are transferred from Iraq to eastern Syria in order to help US plans for “regime change” there.  “At the time of the assault, coalition aircraft would strike only on a pre-agreed detached buildings in the city, which are empty, the source said.” “According to him [the source], the plan of Washington and Riyadh also provides that the rebels move from Mosul to Syria for the attack on the government-controlled town of troops.” Essentially, Washington and Saudi Arabia, will allow 9,000 ISIS (Islamic State) fighter FREE passage into Syria if they agree to join Washington’s “regime change” operations there. This could also include, “… eastern regions of Syria to follow a major offensive operation, which involves the capture of Deir ez-Zor and Palmyra,” the source added. Before you write this story off as some ornate Russian psychological operation, consider the long trend arch. The US along with its generous Gulf sidekicks, have already established a solid track record of aiding and abetting ISIS – not just in Syria, but in Iraq too. The record shows that the US is guilty on a number of counts…
  • If the Mosul leak is true, then it wouldn’t be the first time that the US has provided cover in the military pantomime the world has come to know as “the fight against ISIS.” When large ISIS convoys crossed the Syrian desert to invade and occupy the ancient Syrian city of Palmyra in May 2015, the US ‘Coalition’ airforce did nothing, and allowed ISIS to take and destroy part of the world’s great historic cultural heritage, along with the murder of scores of innocent civilians. Professor Tim Anderson from Sydney University states: “U.S. weapons with Israeli ammunition were used by Islamic State group when taking over Palmyra. The extremists also had U.S. military rations.” “The U.S., which since 2014 claimed to be conducting a war against ISIS in Iraq and Syria, and which had air power and sophisticated surveillance of the region, did nothing to stop the huge ISIS advance on Palmyra.” The US isn’t even shy about its laissez-faire policy with ISIS in the field, with the New York Times openly boasting, “Any airstrikes against Islamic State militants in and around Palmyra would probably benefit the forces of President Bashar al-Assad. So far, United States-led airstrikes in Syria have largely focused on areas far outside government control, to avoid the perception of aiding a leader whose ouster President Obama has called for.”
  • ...4 more annotations...
  • More importantly however, is what kind of message an US statement like that sends to ISIS, as well as Al Nusra and other terrorist brigades inside Syria, which is basically, “we do not need to worry about US air strikes, only Syrian Army and Russian strikes.” This situation really sums up the utter fraud and contempt of the US deception in Syria, and it’s no surprise that the Russian Foreign Ministry are reticent to extend themselves any more where the US is concerned. Then, in March 2016, when ISIS fled Palmyra, back across the desert towards Deir ez-Zor and Raqqa – the great and powerful US ‘Coalition’ airforce actually helped ISIS in a number of ways, including allowing them free passage once more. In late August, we were told that the Turkish Army, alongside “allied Syrian rebels” (terrorist group Faylaq al-Sham) backed by the US air cover, invaded Syria in order to capture the “ISIS-held” town of Jarabulus, Syria, this supposedly to cut off ISIS’s last open route into Turkey. But what happened to ISIS? The NYT even admitted that, “… it appeared that most of the militants had fled without a fight.” Here, ISIS appears to have been given advanced warning – by either US or Turkish intelligence, as they left the contested town of Jarabulus quietly, but in droves. In reality, Turkey twisted this operation in order to attack and degrade Kurdish militias including the US-backed artificial construct called the Syrian Democratic Forces (SDF), and pro-Kurdish People’s Protection Units (YPG) and Kurdish Democratic Union Party (PYD), the Syrian affiliate of the militant Kurdistan Workers’ Party (PKK) in Iraq and Turkey – all of whom are meant to be fighting ISIS. Instead, they are now busy dodging Turkish artillery rounds. Confusing, yes, but true nonetheless.
  • It’s also common knowledge now, that top of the line US weaponry is being used by ISIS, both in Iraq, in Afghanistan and in Syria as well. In fact, if not for US weapons and supplies (along with US air intervention, or noninterventions), ISIS would have struggled to maintain many of the strategic positions it enjoys today. For the last 3 years, US officials have been dodging this issue, and when they do admit this is true, their patronizing party line is that, “this must be a mistake, if they do have US weapons, we didn’t mean it.” As if the world was born yesterday. Perhaps the most flagrant violation by the US-led forces in aiding and abetting ISIS took place on Sept 17, 2016, when the US-led Coalition bombed Syrian Army positions outside of Deir ez-Zor near al-Tharda Mountain, killing some 80 soldiers and injuring 100 more.  As if by design, an ISIS offensive began immediately following the US massacre of Syrian soldiers. Clearly, this bold move by the Pentagon paved the way for a major ISIS advance. To any normal observer, the US attack was a belligerent act of war that effective destroyed an already fragile bilateral ceasefire agreement, and yet the US response was to somehow blame Russia for calling an emergency UNSC meeting to discuss the incident. Judging by this response, it’s pretty clear that US wants to see the Syrian Conflict carry on for a while, and it will need groups like ISIS to make that happen.
  • The other problem with Washington’s hollow righteousness in the Middle East is that there are key members of the US-led “Coalition” who are financing ISIS, Al Nusra Front, Nour al Din Zinki, and Arar al Sham (all ‘moderate’ terrorists we’re told) militants in Syria, Iraq and beyond. This fact was recently admitted by former US Secretary of State and Democratic candidate Hillary Clinton, as revealed in this week’s batch of Wikileaks emails. Clinton writes: “While this military/para-military operation is moving forward, we need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region.”  Add to that the multiple exposures over the last 3 years of the US CIA illegally trafficking lethal arms to Al Nusra and other terrorists through covert operations like Timber Sycamore. Still, US and NATO member state officials and their media gatekeepers continue to deny it and play dumb, rather than come clean that the United States and its ‘partners’ in the region are helping, not hindering ISIS terrorism. Some might ask: why would they do a thing like that? By now, the answer should be simple, but threefold:
  • ISIS is still one of Washington’s best hope for continuing instability, and “regime change” in Syria. The existence of ISIS in Syria and Iraq guarantees that Washington can invite itself to the party.  The ISIS brand has been a boon for the global military industrial complex and all of its bottom-feeder businesses and ‘security’ contract firms. What’s so comical yet even more tragic, is how prominent the topic of “ISIS” factors into all of the vapid ‘national security’ debates and media panels in this year’s US Presidential election, and in the dumbed-down ‘coverage’ of the delusional US mainstream media, led by Pentagon surrogate CNN, and hopeless FOX News. Judging by their prosaic ‘coverage’, neither the networks, nor Hillary Clinton or Donald Trump have the slightest clue of what the reality on the ground is. Instead we here, “My ISIS plan is better than yours!” The US political conversation has gone beyond ridiculousness. The corps of US military and CIA media spokesman aren’t much better. The sad part is some of them do know what is really happening, but would rather lie to the American public. With so much double dealing, who can you trust? Certainly not anyone in Washington. More on the White House’s latest dangerous proposition….
Paul Merrell

Petrodollar Alert: Putin Prepares To Announce "Holy Grail" Gas Deal With China | Zero H... - 0 views

  • While Europe is furiously scrambling to find alternative sources of energy should Gazprom pull the plug on natgas exports to Germany and Europe (the imminent surge in Ukraine gas prices by 40% is probably the best indication of what the outcome would be), Russia is preparing the announcement of the "Holy Grail" energy deal with none other than China, a move which would send geopolitical shockwaves around the world and bind the two nations in a commodity-backed axis. One which, as some especially on these pages, have suggested would lay the groundwork for a new joint, commodity-backed reserve currency that bypasses the dollar, something which Russia implied moments ago when its finance minister Siluanov said that Russia may refrain from foreign borrowing this year. Translated: bypass western purchases of Russian debt, funded by Chinese purchases of US Treasurys, and go straight to the source. Here is what will likely happen next, as explained by Reuters:
  • Igor Sechin gathered media in Tokyo the next day to warn Western governments that more sanctions over Moscow's seizure of the Black Sea peninsula from Ukraine would be counter-productive.   The underlying message from the head of Russia's biggest oil company, Rosneft, was clear: If Europe and the United States isolate Russia, Moscow will look East for new business, energy deals, military contracts and political alliances.    The Holy Grail for Moscow is a natural gas supply deal with China that is apparently now close after years of negotiations. If it can be signed when Putin visits China in May, he will be able to hold it up to show that global power has shifted eastwards and he does not need the West. More details on the revelation of said "Holy Grail": State-owned Russian gas firm Gazprom hopes to pump 38 billion cubic meters (bcm) of natural gas per year to China from 2018 via the first pipeline between the world's largest producer of conventional gas to the largest consumer.   "May is in our plans," a Gazprom spokesman said, when asked about the timing of an agreement. A company source said: "It would be logical to expect the deal during Putin's visit to China."
  • Summarizing what should be and is painfully obvious to all, but apparently to the White House, which keeps prodding at Russia, is the following: "The worse Russia's relations are with the West, the closer Russia will want to be to China. If China supports you, no one can say you're isolated," said Vasily Kashin, a China expert at the Analysis of Strategies and Technologies (CAST) think thank. Bingo. And now add bilateral trade denominated in either Rubles or Renminbi (or gold), add Iran, Iraq, India, and soon the Saudis (China's largest foreign source of crude, whose crown prince also happened to meet president Xi Jinping last week to expand trade further) and wave goodbye to the petrodollar.
  •  
    The follies of an empire in decline that still imagines itself the master of the planet. 
Paul Merrell

Snowden ready to go to Germany under asylum as his letter to Berlin revealed - RT News - 0 views

  • NSA whistleblower, Edward Snowden, is ready to go to Germany and testify over the US wiretapping of Angela Merkel’s phone on condition of granting him political asylum, a German MP who met Snowden has said. He also revealed the text of Snowden’s letter.
  • The Federal Government of Germany reacted to Stroebele’s meeting with Snowden – of which they said they weren’t notified in advance – by calling an extraordinary Bundestag session. The German Federal Minister of the Interior, Hans-Peter Friedrich, announced that his government is interested in Snowden’s testimonies. “We will find ways, when Mr. Snowden is ready, to make his talk with the German officials possible,” Friedrich was quoted as saying by German media. “If the message means that Mr. Snowden wants to give us information, then we gladly accept that,” the CSU party politician said, adding that “every clarification, any information and facts that we can obtain is good.”
  •  
    So Germany may grant Edward Snowden political asylum in exchange for testimony about NSA spying on German and its citizens, especially Angela Merkel. Or is this a German ruse to establish more leverage over the U.S. in negotiations over curtailment of U.S. spying on Germany? In any event, the text of Snowden's letter to the MP is embedded and well worth the read.  
« First ‹ Previous 41 - 60 of 120 Next › Last »
Showing 20 items per page