Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged thank-you-for-your-service

Rss Feed Group items tagged

Paul Merrell

Tomgram: Nan Levinson, America's New Military Mystique | TomDispatch - 0 views

  • Nan Levinson has spent a lot of time with the veterans of America’s recent wars and produced a new book in which they are neither simply heroes to be thanked nor victims to be pitied, but actors in their own complicated story. War Is Not a Game: The New Antiwar Soldiers and the Movement They Built offers a grunt’s eye view of this country’s two recent occupations -- in Iraq and Afghanistan -- and the complicated, unnerving world American soldiers face (including all those civilians thanking them) on returning home. Today, she considers what in the world we are to make of the new military mystique that envelops our country and the strange war culture that goes with it. Tom The Big Dick School of American Patriotism And What We Make of It By Nan Levinson
  • Nan Levinson’s new book, War Is Not a Game: The New Antiwar Soldiers and the Movement They Built (Rutgers University Press), is based on seven years she spent not-quite-embedded with military-related antiwar groups around the country. As a freelance journalist, she writes about the military, free speech, and other aspects of civil liberties, culture, and technology. She teaches journalism and fiction writing at Tufts University.
  •  
    I get so expasperated by "thank you for your service" that I usually just respond that it would be good to inquire how someone feels about their "service" before they say "thank you for your service." There are many veterans who haven't fallen for the "hero" and "patriot" propaganda constantly being spread about "our troops" and "our veterans." Many of us are far less than proud of what we did in the military and the wars we fought. Anyone who repeats that horrible "thank you" slogan is in reality displaying just how ignorant they are of the reasons the U.S. goes to war and in my experience just as ignorant about how many millions of people we have killed and maimed, both military and civilians alike. Example: We killed over 3 million Vietnamese. The men and women we fought were true patriots. We were foreign invaders. I sum up the wisdom I gained from 27 months plus one day in Viet Nam as follows:  "When you find yourself part of an invading force in a foreign land fighting patriots, it's time for a reality check on your world view." The same could be just as accurately be said of those who say, "thank you for your service."   
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
  •  
    " CANADIAN SPIES COLLECT DOMESTIC EMAILS IN SECRET SECURITY SWEEP BY RYAN GALLAGHER AND GLENN GREENWALD @rj_gallagher@ggreenwald YESTERDAY AT 2:02 AM SHARE TWITTER FACEBOOK GOOGLE EMAIL PRINT POPULAR EXCLUSIVE: TSA ISSUES SECRET WARNING ON 'CATASTROPHIC' THREAT TO AVIATION CHICAGO'S "BLACK SITE" DETAINEES SPEAK OUT WHY DOES THE FBI HAVE TO MANUFACTURE ITS OWN PLOTS IF TERRORISM AND ISIS ARE SUCH GRAVE THREATS? NET NEUTRALITY IS HERE - THANKS TO AN UNPRECEDENTED GUERRILLA ACTIVISM CAMPAIGN HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE Canada's electronic surveillance agency is covertly monitoring vast amounts of Canadians' emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada's equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats. Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation - exposing the controversial details the government withheld from the public. Under Canada's criminal code, CSE is no
Gary Edwards

The Purchase Of Our Republic | Zero Hedge - 0 views

  • The massive consolidation of wealth, combined with the removal of any limits on money in campaigns, has allowed for the purchase of our government. Today I am publishing a comprehensive and important guest essay, The Purchase of Our Republic, by longtime correspondent Y. Falkson.
  • Americans know that something is wrong, deeply wrong. They see signs of the problem everywhere: income inequality, growing concentration and power of mega corporations, political donations/corruption, the absence of jobs with decent salaries, the explosion of the US prison population, healthcare costs, student loan debt, homelessness, etc. etc.  However, the true causes and benefactors behind these problems are purposely hidden from view. What Americans see is Kabuki Theater of a functioning form of capitalism and democracy, but beyond this veneer our country has devolved into the exact opposite. Those who benefit from this crony capitalist state go to extreme lengths to paper over the reality and convince Americans that the system works, the American Dream is still a reality and that American democracy is in fact democratic. Below I hope to begin to outline some of the underlying dynamics and trends that have evolved in recent decades and led us so far from what we once were. As fun as it would be, the answer is not some evil conspiracy by the Illuminati, but rather the unfortunate result of three long term and mutually reinforcing components that have been attacking the fundamental roots of the structure of our Republic. The first is the increased concentr
  • When the average American goes to pick up some groceries, they are shopping at Walmart and buying something from P&G that is mostly made of Monsanto corn. Is that true choice? The same story plays out with our news and media (and other industries) where we have gone from 50 companies in 1983 to the big 6 which control over 90% of all media. Is choosing to watch one of 30 news channels, all of which are owned by News Corp (Rupert Murdoch) a real choice? This is not capitalism and they are not competing, not in the true sense of the word. Along with this consolidation of corporations in recent decades, their senior leaders have taken up a larger and larger piece of the pie at the expense of their employees. In particular, the ratio of CEO-to-worker pay has increased 1,000 percent since 1950. Unsurprisingly, Walmart is both the largest employer in the country and the worst CEO pay offender with a ratio of over 1000:1. This is at a time where worker productivity has increased significantly, something that historically correlated with increased pay. But no more. It’s a new twist on the old Soviet saying “we pretend to work and they pretend to pay us”, but now it’s closer to “we do all of the work and they pretend to pay us”.
  • ...28 more annotations...
  • 1. Faux Capitalism = Wealth Consolidation / Income Inequality
  • While there is no true beginning to the story, we can start with the incredible build up and concentration of wealth among corporations in recent decades. The USA now boasts a cartel-like set of corporate titans in almost every industry. It goes beyond, but certainly includes, our Too Biggerer To Fail banks, merged from what was 37 banks in 1995 into a Frankenstein’s monster like 5 (Citigroup, JP Morgan-Chase, Bank of America, Wells Fargo and Goldman Sachs). In agriculture, Monsanto alone controls over 85% of all corn and soy bean crops, four companies control 83% of the beef market, 66% of the hog market and 58% of the chicken market. So while shopping at the grocery store might appear to be the manifestation of capitalism at its finest, it doesn’t take much digging to look behind the curtain to see how little competition truly exists.
  • ation of corporate and private wealth. Both of which are quickly yelled down in the media as anti-free market and class war hysteria. The second is the use of this wealth to capture all three branches of government in order to ensure the continued extraction of capital from the many and to the few.The rich might have climbed the ladder because they earned it, but they have then purchased government to pull up the ladder behind them. The consequence of the first two components is a democracy in name only that represents the very few.
  • Private Wealth: As a consequence of the royal tribute we pay to the C-suite class these days, we have likely surpassed the pre-Depression Roaring Twenties in terms of inequality.
  • This, amazingly, has only accelerated since the crisis in 2008 in thanks to bailouts, Quantitative Easing and other gifts from Congress and the Fed. The wealthy 1% and in particular the .01% have now grown their fortunes to levels that tax comprehension and even their ability to spend it (the decisions by a few billionaires such as Bill Gates to essentially donate his fortune is a tacit acknowledgement that our current system over provides wealth to a select few).
  • 2. Wealthy Purchase of Government Institutions / Elections
  • To squash or prevent competition, the oligopolies and oligarchs target their resources on the one place that can make competition illegal, our government.Something to keep in mind the next time you see a corporate billionaire grandstanding about the importance of “Free Markets” when their strategy is quite the opposite. As this capture of the government has taken place we have essentially shifted from capitalism and to crony capitalism. So we now have industries that have mastered the art of faking capitalism by turning our government into one that fakes democracy. This government takeover took time, but the purchase of all 3 branches of government has almost been completed by 2014. You don’t have to take my word for it, luckily that has now been empirically proven in an analysis of over 20 years of government policy where the clear conclusion was that policy makers respond solely to those in the top 90th percentile and essentially ignore the large majority of Americans.
  • So what is an incredibly wealthy capitalist CEO of a mega-corporation do once they control their industry and have essentially limitless wealth? Well in a competitive market, the only way to go from the top is down and the only thing that can make that happen is competition. Consequently, competition must be avoided whenever possible.
  • Purchase of the Executive Branch:
  • Let’s take a step back and take a glimpse at how the government was purchased, beginning with the executive branch. In 1980, Reagan’s election cost less than $300 million. When Bush beat Kerry in 2004, it cost almost 3x times as much, almost $900 Million. 4 years later, the 2008 election cost a record $1.3 Billion. It was in this election where Obama hammered the final nail in the coffin for government funded for elections. Obama, more so than any other candidate in recent decades had the widespread support of millions of small donors, but in the end I guess it wasn’t enough. So when Obama “leaned to the green”, it forever set the precedent that you can’t win without the backing of our nation’s oligarchs. Consequently, the money has only gushed in since as the cost of Obama’s reelection in 2012 skyrocketed to an unfathomable $7 billion. Needless to say this is slightly above the rate of inflation. Our Presidents are now preselected exclusively by a tiny fraction of Americans can have the money to fund what has become necessary for a legitimate run. Summary: Candidates spend years courting the super-rich to build up a multi-billion dollar war chest. Only those who succeed can actually run a campaign that an average American will be aware of. Then Americans get to choose one of the pre-selected “candidates”. No wonder voter turnout is so low… Executive branch, check!
  • – Note that media corporations benefit doubly as they can use their cash to fund elections, but are also the beneficiary of all that money as it is used for campaign spending.
  • Purchase of the Legislative Branch:
  • In addition, increasingly those who work on Congress (and regulators) were previously employed by these large corporations or expect to work there later. A recent example is Chris Dodd who left the Senate the head lobbyist for Hollywood at the MPAA, the guys behind SOPA and PIPA, but there are many many others.
  • Review: Congressmen beg for money to get elected, make sure to vote the way your benefactors would like, consequently get more money to get elected again. If at any point they do lose or quit, they take the big payday to work for those who have been paying them all along. Legislative Branch, Check!
  • The process has progressed similarly in Congress. In 1978, outside groups spent $303,000 on congressional races. In 2012 that was up to $457,000,000. That is over 1,500 times the level in 1978. It would be funny, if it was so blatant and terrifying. By many accounts, our “leaders” in Congress spend 50% or more of their time working the phones or fundraisers rather than trying (and failing) to actually do the “people’s business”. Let’s also take a minute to appreciate the hypocrisy of anyone that pretends that the money doesn’t influence our government. Businesses do not give to politicians for charity. This is a payment for services that has proven exceedingly reliable and profitable. The ROI for money invested in purchasing Congressman is what CEO dreams are made of. No wonder the incentive is to invest in Congress rather than R&D or marketing. There are very few places in the world or times in history where you can find ROI’s in the thousands, or even the tens of thousands.
  • Judicial Branch Endorsement of the Purchase of Government:
  • Last but not least, we have the enabling Judicial Branch. It only took a few purchased presidents to ensure the appointment of a majority of “free market” and “pro-business” judges. For instance, and disgracefully, Clarence Thomas was once legal counsel for Monsanto, but has not once recused himself from any cases involving Monsanto and always votes in their favor. These radicals have now fully endorsed and enabled the influx of money used to purchase the other branches. Specifically, 2 major decisions have completely opened the floodgates, Citizens United and McCutcheon. The first allowed unlimited contributions of corporate money into elections and brought us the notorious declaration that “corporations are people” and that “money is free speech”. This was more recently followed up with the private wealth equivalent in McCutcheon. In this ruling, Supreme Court Chief Justice John Roberts said as part of his majority opinion (presumably with a straight face) “… nor does the possibility that an individual who spends large sums may garner influence over or access to elected officials or political parties”. And with this, the Supreme Court has fully endorsed both major sources of immense wealth to purchase our elections and consequently our government. Review: The rich fund Presidential elections, Presidents nominate “business-friendly” judges and then the bought Congress approves their nominations. New judge then votes to ensure even more money is allowed to purchase elections. Judicial Branch, CHECK!
  • 3. A Faux Republic Dependent Upon the Funders and Not the Voters
  • The Founder’s Hope and the Sad Reality:
  • Acknowledging where we are as a country, it is often helpful to look to where we started for some perspective. Unsurprisingly, this type of problem was not overlooked back in the 18th century. In 1776, James Madison stated that his goal was to design a republic in which “powerful interest groups would be rendered incapable of subdoing the general will”. Madison hoped, perhaps naively, that factions would be thwarted by competing with other factions. Sadly, we are now in a time where factions (aka wealthy special interests) subdue the will of the people and ensure the government responds to them alone on those issues where they have a “special interest” and consequently asymmetric stakes in the game (Charles Hugh Smith). As a result, these groups essentially collude to allocate their resources to their own issues, but do not “thwart” or compete with other factions as they do the same. It’s a pretty great system, as long as you’re one of the wealthy few who can use their money to drown out the poor and voiceless many. And just like that, what was once a Republic has become a corrupt shell of its past self. All the signs are still there; votes, elections, campaigns, branches of government, etc., but behind the scenes the only ones represented are those who can afford to be heard.
  • Summary: This massive consolidation of wealth, combined with the removal of any limits on money in campaigns, has allowed for the purchase of our government, or as Dick Durban once stated, “frankly they [the banks in this case] own the place”. If money = free speech, then those with all the money, have all the free speech.
  • What Might Help? Now that I have likely and thoroughly depressed the reader, let’s bounce around some ideas for what can be done. As stated in the beginning, this is not an unknown problem and many people are promoting a number of ways to fix or at least ameliorate the problem. I will briefly describe just a few which I think provide some direction any of us could easily implement or support.
  • Change the Rules: Laurence Lessig of Harvard Law has put forward a visionary proposal for re-writing the way that campaigns are financed in his book, Republic, Lost: How Money Corrupts Congress--and a Plan to Stop It. Put simply, he would like to empower every voter with a stipend, say $150 per election to give to whatever candidate or candidates they prefer. If you would like to accept this money, you would need to forgo any other contributions or support (one would hope including the indirect PAC kind). This would actually provide even more money than is used in current elections, but would effectively democratize the funding process. While there would still be a “funding election” that takes place before the actual election, the funding would not be unequally provided. Lessig’s work has only begun, as this sort of bill or likely constitutional reform is nearly impossible to achieve, but he has undertaken and I assume will continue to implement many brave and creative ways of bringing about the change all American’s should support. Most recently he has suggested we begin to fund, ironically enough, a Super PAC to end all Super PACs. It would be funded with the solitary goal of changing how money impacts our elections. Please support them here: www.mayone.us/
  • Change Our Day-to-Day: At the more micro level, Charles Hugh Smith believes that we will inevitably see our overly centralized and inefficient system erode away as it is replaced by more resilient, local and efficient businesses and societies outside of the current system. With that in mind, he recommends that “all anyone can do is the basic things--lower our energy footprint, stay healthy and avoid unnecessary medications and procedures, support local businesses, organic food growers, etc. In other words, what we can do is support local businesses that are part of the emerging economy rather than support corporate cartels.” Your Vote Does Matter: Do you live in Ohio, Florida or New Hampshire? Probably not. Despite what we are told every 4 years, there are actually states outside of the “swing states”, and even more surprising, the very large majority of Americans live in those states where your “vote doesn’t matter”. New Yorkers an Californians all know their state will turn Blue no matter who the candidates are and either don’t vote at all, or often vote for the Blue team in order to feel like they are on the winning side.
  • The truth is that if you see the election as Red vs. Blue, you vote probably doesn’t matter. But here is the trick, if all the people who think their vote didn’t matter decided to vote for whom they might actually believe in, then their votes just might matter.
  • What if all the growing number of “Independents” (who usually still vote Blue), chose to vote for a third party? What if a third party candidate won a state like New York or California? What if that candidate was one whose primary promise to the voters was to champion a change to the role of money in government (perhaps in line with what Lessig proposes)? Would you vote for such a person?I would argue you should. If California alone (with 55 electoral votes) were to vote for a 3rd party that would likely prevent either Red or Blue candidate from winning the requisite 270 electoral votes.
  • Think about the message that would send to both parties. I would predict that both sides would start to bend over backwards for an endorsement from that 3rd party and they would have to get it by taking up the same primary cause for reforming money in government. Consequently, at the root of our corrupted system which is perpetually ignored as both sides might suddenly become the big issue of the election. Then maybe we might begin to turn things around.
  • Sources: Charles Hugh Smith (oftwominds, Surivival+, etc.), Yves Smith (Naked Capitalism, Econned), Laurence Lessig (Republic Lost, multiple TED Talks), Matt Taibbi (blog at Rolling Stone and now at The Intercept), Zero Hedge, John Robb, Max Keiser, Clay Shirky (Cognitive Surplus), Aldous Huxley (Brave New World, Brave New World Revisited), George Orwell (1984), Michael Lewis, Daniel Kahneman (Thinking Fast and Slow), James Richards (Currency Wars), Han Joon Chang (23 Things They Don’t Tell You About Capitalism) and Joseph Stiglitz (Mismeasuring Our Lives) 
Gary Edwards

Tomgram: Nomi Prins, Goldmanizing Donald Trump | TomDispatch - 0 views

  •  
    "The Goldman Sachs Effect How a Bank Conquered Washington By Nomi Prins This is a MUST READ document. Yeah, and it should scare the crap out of all of us. .............................................. Irony isn't a concept with which President Donald J. Trump is familiar. In his Inaugural Address, having nominated the wealthiest cabinet in American history, he proclaimed, "For too long, a small group in our nation's capital has reaped the rewards of government while the people have borne the cost. Washington flourished -- but the people did not share in its wealth."  Under Trump, an even smaller group will flourish -- in particular, a cadre of former Goldman Sachs executives. To put the matter bluntly, two of them (along with the Federal Reserve) are likely to control our economy and financial system in the years to come. Infusing Washington with Goldman alums isn't exactly an original idea. Three of the last four presidents, including The Donald, have handed the wheel of the U.S. economy to ex-Goldmanites. But in true Trumpian style, after attacking Hillary Clinton for her Goldman ties, he wasn't satisfied to do just that.  He had to do it bigger and better.  Unlike Bill Clinton and George W. Bush, just a sole Goldman figure lording it over economic policy wasn't enough for him. Only two would do. The Great Vampire Squid Revisited Whether you voted for or against Donald Trump, whether you're gearing up for the revolution or waiting for his next tweet to drop, rest assured that, in the years to come, the ideology that matters most won't be that of the "forgotten" Americans of his Inaugural Address. It will be that of Goldman Sachs and it will dominate the domestic economy and, by extension, the global one. At the dawn of the twentieth century, when President Teddy Roosevelt governed the country on a platform of trust busting aimed at reducing corporate power, even he could not bring himself to bust up the banks.  That was a mistake
Gary Edwards

Everyone is on the Gold Standard. It's not a choice any country or central bank can make. - 0 views

Dear WSJ Moderator, I tried to post a comment to the community forum for the article, "Currency Chaos; Where do we go from here?" My comments were rejected with the error message, "The language y...

gold gold-currency wsj robert-mundell milton-friedman fiat-currencies

started by Gary Edwards on 20 Oct 10 no follow-up yet
Paul Merrell

Verizon's New, Encrypted Calling App Plays Nice With the NSA - Businessweek - 0 views

  • Verizon is the latest big company to enter the post-Snowden market for secure communication, and it's doing so with an encryption standard that comes with a way for law enforcement to access ostensibly secure phone conversations.Verizon Voice Cypher, the product introduced on Thursday with the encryption company Cellcrypt, offers business and government customers end-to-end encryption for voice calls on iOS, Android, or BlackBerry devices equipped with a special app. The encryption software provides secure communications for people speaking on devices with the app, regardless of their wireless carrier, and it can also connect to an organization's secure phone system. Cellcrypt and Verizon both say that law enforcement agencies will be able to access communications that take place over Voice Cypher, so long as they're able to prove that there's a legitimate law enforcement reason for doing so. Seth Polansky, Cellcrypt's vice president for North America, disputes the idea that building technology to allow wiretapping is a security risk. "It's only creating a weakness for government agencies," he says. "Just because a government access option exists, it doesn't mean other companies can access it." 
  • Phone carriers like Verizon are required by U.S. law to build networks that can be wiretapped. But the legislation known as the Communications Assistance for Law Enforcement Act requires phone carriers to decrypt communications for the government only if they have designed their technology to make it possible to do so. If Verizon and Cellcrypt had structured their encryption so that neither company had the information necessary to decrypt the calls, they would not have been breaking the law.
  • There has been increased interest in encryption from individual consumers, too, largely thanks to the NSA revelations leaked by Edward Snowden. Yahoo and Google began offering end-to-end encrypted e-mail services this year. Silent Circle, a startup catering to consumer and enterprise clients, has been developing end-to-end voice encryption for phones calls. Verizon's service, with a monthly price of $45 per device, isn't targeting individual buyers and won't be offered to average consumers in the near future.But Verizon's partner, Cellcrypt, looks upon selling to large organizations as the first step toward bringing down the price before eventually offering a consumer-level encryption service. "At the end of the day, we'd love to have this be a line item on your Verizon bill," says Polansky.
  • ...2 more annotations...
  • Other companies have designed their encryption in this way, including AT&T, which offers encrypted phone service for business customers. Apple and Android recently began protecting content stored on users's phones in a way that would keep the tech companies from being able to comply with requests from law enforcement. The move drew public criticism from FBI Director James Comey, and some security experts expect that a renewed effort to stir passage of legislation banning such encryption will accompany Silicon Valley's increased interest in developing these services. Verizon believes major demand for its new encryption service will come from governmental agencies conveying sensitive but unclassified information over the phone, says Tim Petsky, a senior product manager for Verizon Wireless. Corporate customers who are concerned about corporate espionage are also itching for answers. "You read about breaches in security almost every week in the press," says Petsky. "Enterprise customers have been asking about ways to secure their communications and up until this point, we didn't have a solution." 
  • Many people in the security industry believe that a designed access point creates a vulnerability for criminals or spies to exploit. Last year reports surfaced that the FBI was pushing legislation that would require many forms of Internet communication to be wiretap-ready. A group of prominent security experts responded strongly: "Requiring software vendors to build intercept functionality into their products is unwise and will be ineffective, with the result being serious consequences (PDF) for the economic well-being and national security of the United States," they wrote in a report issued in May. 
Paul Merrell

The best way to read Glenn Greenwald's 'No Place to Hide' - 0 views

  • Journalist Glenn Greenwald just dropped a pile of new secret National Security Agency documents onto the Internet. But this isn’t just some haphazard WikiLeaks-style dump. These documents, leaked to Greenwald last year by former NSA contractor Edward Snowden, are key supplemental reading material for his new book, No Place to Hide, which went on sale Tuesday. Now, you could just go buy the book in hardcover and read it like you would any other nonfiction tome. Thanks to all the additional source material, however, if any work should be read on an e-reader or computer, this is it. Here are all the links and instructions for getting the most out of No Place to Hide.
  • Greenwald has released two versions of the accompanying NSA docs: a compressed version and an uncompressed version. The only difference between these two is the quality of the PDFs. The uncompressed version clocks in at over 91MB, while the compressed version is just under 13MB. For simple reading purposes, just go with the compressed version and save yourself some storage space. Greenwald also released additional “notes” for the book, which are just citations. Unless you’re doing some scholarly research, you can skip this download.
  • No Place to Hide is, of course, available on a wide variety of ebook formats—all of which are a few dollars cheaper than the hardcover version, I might add. Pick your e-poison: Amazon, Nook, Kobo, iBooks. Flipping back and forth Each page of the documents includes a corresponding page number for the book, to allow readers to easily flip between the book text and the supporting documents. If you use the Amazon Kindle version, you also have the option of reading Greenwald’s book directly on your computer using the Kindle for PC app or directly in your browser. Yes, that may be the worst way to read a book. In this case, however, it may be the easiest way to flip back and forth between the book text and the notes and supporting documents. Of course, you can do the same on your e-reader—though it can be a bit of a pain. Those of you who own a tablet are in luck, as they provide the best way to read both ebooks and PDF files. Simply download the book using the e-reader app of your choice, download the PDFs from Greenwald’s website, and dig in. If you own a Kindle, Nook, or other ereader, you may have to convert the PDFs into a format that works well with your device. The Internet is full of tools and how-to guides for how to do this. Here’s one:
  • ...1 more annotation...
  • Kindle users also have the option of using Amazon’s Whispernet service, which converts PDFs into a format that functions best on the company’s e-reader. That will cost you a small fee, however—$0.15 per megabyte, which means the compressed Greenwald docs will cost you a whopping $1.95.
Paul Merrell

Keith Alexander, On Stage While Story Of NSA Infiltrations Breaks, Tries To Mislead Wit... - 0 views

  • In an interesting bit of timing, just as the Washington Post was breaking the news that the NSA had infiltrated Google and Yahoo's cloud data by hacking into the (stupidly) unencrypted data links between data centers, it turned out that NSA boss Keith Alexander was on stage at a Bloomberg Government Cybersecurity conference. He was asked about the report, and he tried to tap dance around it by claiming the NSA doesn't have access to Yahoo and Google's servers. The Guardian has a brief summary: Alexander, asked about the Post report, denied it. “Not to my knowledge, that’s never happened,” the NSA director said, before reiterating an earlier denial Prism gave the NSA direct access to the servers of its internet service provider partners. “Everything we do with those companies that work with us, they are compelled to work with us,” Alexander said. “These are specific requirements that come from a court order. This is not the NSA breaking into any databases. It would be illegal for us to do that. So I don’t know what the report is, but I can tell you factually: we do not have access to Google servers, Yahoo servers, dot-dot-dot. We go through a court order.” But, of course, in typical Alexander fashion, he's choosing his words carefully -- and thankfully people can more easily see through it at this point, since they're getting so used to it. The report didn't say they were accessing those companies' servers or databases, but rather hacking into the network connection between their data centers. That's like a report breaking of the NSA hijacking armored cars with cash, and Alexander claiming "we didn't break into the bank." Nice try.
  •  
    Dear Gen. Alexander, The reason the White House has jumped ship on you and your agency is that they don't want to go down with your ship. If you haven't figured that out by now, you probably also do not realize that those who get caught lying repeatedly set fire to the stage they stand on. As said during World War II, "Loose lips sink ships." You'd be far better off if you just stopped making public statements. But thanks for contributing to our entertainment.
Gary Edwards

‪Ask the President: What are you going to do with $181 Billion Dollars if you... - 0 views

  •  
    President Obama, what exactly will you choose to pay? What are your priorities?  Excellent YouTube video explaining the National Debt Ceiling SCAM!  (Many thanks to uber Patriot Frank A. for the link).  Great graphics, and the end sequence is perfect!! The graph is meant to visually demonstrate just what was stated in the video... That after obligations like Social Security, Medicare, Military, Air Traffic Control, and existing debt management are met, there is still another 17 billion left over.  Meaning the aforementioned services are being threatened at the President's own discretion. The politics are thick here, with both the Federal Reserve and the Treasury Department full participants in the political scam.   The question remains, if Obama is not going to meet those debt obligations outlined in the graph, WHAT IS HE GOING TO DO WITH THE $181.1 Billion in MONEY that comes into the Treasury this August?
Paul Merrell

Sorry for letting them snoop? Dell apologizes for 'inconvenience' caused by NSA backdoo... - 0 views

  • Security researcher Jacob Appelbaum dropped a bombshell of sorts earlier this week when he accused American tech companies of placing government-friendly backdoors in their devices. Now Texas-based Dell Computers is offering an apology. Or to put it more accurately, Dell told an irate customer on Monday that they “regret the inconvenience” caused by selling to the public for years a number of products that the intelligence community has been able to fully compromise in complete silence up until this week. Dell, Apple, Western Digital and an array of other Silicon Valley-firms were all name-checked during Appelbaum’s hour-long presentation Monday at the thirtieth annual Chaos Communication Congress in Hamburg, Germany. As RT reported then, the 30-year-old hacker-cum-activist unveiled before the audience at the annual expo a collection of never-before published National Security Agency documents detailing how the NSA goes to great lengths to compromise the computers and systems of groups on its long list of adversaries.
  • Spreading viruses and malware to infect targets and eavesdrop on their communications is just one of the ways the United States’ spy firm conducts surveillance, Appelbaum said. Along with those exploits, he added, the NSA has been manually inserting microscopic computer chips into commercially available products and using custom-made devices like hacked USB cables to silently collect intelligence. One of the most alarming methods of attack discussed during his address, however, comes as a result of all but certain collusion on the part of major United States tech companies. The NSA has information about vulnerabilities in products sold by the biggest names in the US computer industry, Appelbaum said, and at the drop off a hat the agency has the ability of launching any which type of attack to exploit the flaws in publically available products.
  • The NSA has knowledge pertaining to vulnerabilities in computer servers made by Dell and even Apple’s highly popular iPhone, among other devices, Appelbaum told his audience. “Hey Dell, why is that?” Appelbaum asked. “Love to hear your statement about that.”
  • ...4 more annotations...
  • Appelbaum didn’t leave Dell off the hook after revealing just that one exploit known to the NSA, however. Before concluding his presentation, he displayed a top-secret document in which the agency makes reference to a hardware implant that could be manually installed onto Dell PowerEdge servers to exploit the JTAG debugging interface on its processor — a critical circuitry component that apparently contains a vulnerability known to the US government. “Why did Dell leave a JTAG debugging interface on these servers?” asked Appelbaum. “Because it’s like leaving a vulnerability in. Is that a bugdoor, or a backdoor or just a mistake? Well hopefully they will change these things or at least make it so that if you were to see this, you would know that you have some problems. Hopefully Dell will release some information about how to mitigate this advance persistent threat.” Appelbaum also provoked Apple by acknowledging that the NSA boasts of being able to hack into any of their mobile devices running the iOS operating system. “Either they have a huge collection of exploits that work against Apple products — meaning they are hoarding information about critical systems American companies product and sabotaging them — or Apple sabotages it themselves,” he said.
  • @DellCares @dellcarespro Inconvenience? You got to be F*ckin kidding me! You place an NSA bug in our servers and call it an inconvenience? — Martijn Wismeijer (@twiet) December 31, 2013
  • TechDirt reporter Mike Masnick noticed early Tuesday that Dell’s official customer service Twitter account opted to issue a cookie-cutter response that drips of insincerity. “Thanks you for reaching out and regret the inconvenience,” the Dell account tweeted to Wismeijer. “Our colleagues at @DellCaresPro will be able to help you out.” “Inconvenience? You got to be F*ckin kidding me!” Wismeijer responded. “You place an NSA bug in our servers and call it an inconvenience?”
  • Security researcher Jacob Appelbaum dropped a bombshell of sorts earlier this week when he accused American tech companies of placing government-friendly backdoors in their devices. Now Texas-based Dell Computers is offering an apology. Or to put it more accurately, Dell told an irate customer on Monday that they “regret the inconvenience” caused by selling to the public for years a number of products that the intelligence community has been able to fully compromise in complete silence up until this week. Dell, Apple, Western Digital and an array of other Silicon Valley-firms were all name-checked during Appelbaum’s hour-long presentation Monday at the thirtieth annual Chaos Communication Congress in Hamburg, Germany. As RT reported then, the 30-year-old hacker-cum-activist unveiled before the audience at the annual expo a collection of never-before published National Security Agency documents detailing how the NSA goes to great lengths to compromise the computers and systems of groups on its long list of adversaries.
Paul Merrell

British Lawmakers Condemn 2011 Intervention in Libya - The New York Times - 0 views

  • A committee of British lawmakers issued a damning assessment on Wednesday of the 2011 intervention in Libya led by Britain and France, concluding that the military action had lacked a coherent strategy, had been based on poor intelligence and had led to a political collapse that aided the rise of the Islamic State in North Africa.
  • The report from the foreign affairs committee of the House of Commons directly blamed the former prime minister, David Cameron, saying he “was ultimately responsible for the failure to develop a coherent Libya strategy.”In echoing many criticisms from another inquiry, published this year, into Britain’s role in the Iraq war under one of Mr. Cameron’s predecessors, Tony Blair, the report suggested that lessons from that conflict had not been learned.Fearing civilian deaths, an international coalition assembled by Britain and France launched air and missile strikes in March 2011, after Col. Muammar el-Qaddafi’s forces threatened to attack the rebel-held city of Benghazi.Libya descended into chaos, and a power vacuum ensued after the Qaddafi government collapsed, allowing fighters for the Islamic State, also known as ISIS or ISIL, to gain a significant foothold in the country, and the report suggested that Britain had lost interest in the country after Colonel Qaddafi lost power. Advertisement Continue reading the main story The mission represented a significant shift from the Iraq war, with Britain and France assuming the main leadership role — Mr. Cameron had pressed for military action alongside the French president at the time, Nicolas Sarkozy — and the United States taking an active, but less visible, role.
  • In many ways, the report mirrored the assessment of President Obama, who offered a candid appraisal of the intervention in an interview published in The Atlantic this year. “It didn’t work,” Mr. Obama said, citing what he described as his misplaced faith that “the Europeans” in general would be invested in the follow-up. He also said that Mr. Cameron had soon become “distracted by other things” and that Mr. Sarkozy had been voted out of office the next year.The report by the 11-person committee, which included six lawmakers from Mr. Cameron’s Conservative Party, criticized the British strategy as flawed from its inception, concluding that it “was founded on erroneous assumptions and an incomplete understanding of the evidence.”
  • ...1 more annotation...
  • There had been, they said, no thorough assessment of the nature of the rebellion in Libya or of the real threat to civilians. Nor, they added, had there been any attempt at political engagement with the government, leaving military intervention as the sole focus. Today’s Headlines Wake up each morning to the day’s top news, analysis and opinion delivered to your inbox. Please verify you're not a robot by clicking the box. Invalid email address. Please re-enter. Sign Up Receive occasional updates and special offers for The New York Times's products and services. Thank you for subscribing to Today’s Headlines. An error has occurred. Please try again later. You are already subscribed to this email. View all New York Times newsletters. See Sample Manage Email Preferences Not you? Privacy Policy “By the summer of 2011, the limited intervention to protect civilians had drifted into an opportunist policy of regime change,” the lawmakers said.The consequence of the military action was “political and economic collapse, intermilitia and intertribal warfare, humanitarian and migrant crises, widespread human rights violations, the spread of Qaddafi regime weapons across the region and the growth of ISIL in North Africa,” the lawmakers said.
Paul Merrell

US Congresswoman Introduces Bill To Stop "Illegal" War On Assad; Says CIA Ops Must Stop... - 0 views

  • That was before Paris.  Well, in the wake of the attacks, Gabbard has apparently had just about enough of Washington vacillating in the fight against terror just so the US can ensure that ISIS continues to destabilize Assad and now, with bi-partisan support, the brazen Hawaii Democrat has introduced legislation to end the "illegal war" to overthrow Assad.  Gabbard, who fought in Iraq - twice - has partnered with Republican Adam Scott on the bill. Here's AP:  In an unusual alliance, a House Democrat and Republican have teamed up to urge the Obama administration to stop trying to overthrow Syrian President Bashar Assad and focus all its efforts on destroying Islamic State militants.   Reps. Tulsi Gabbard, a Democrat, and Austin Scott, a Republican, introduced legislation on Friday to end what they called an "illegal war" to overthrow Assad, the leader of Syria accused of killing tens of thousands of Syrian citizens in a more than four-year-old civil war entangled in a battle against IS extremists, also known as ISIS.   "The U.S. is waging two wars in Syria," Gabbard said. "The first is the war against ISIS and other Islamic extremists, which Congress authorized after the terrorist attack on 9/11. The second war is the illegal war to overthrow the Syrian government of Assad."
  • Last month, US Congresswoman Tulsi Gabbard went on CNN and laid bare Washington’s Syria strategy.  In a remarkably candid interview with Wolf Blitzer, Gabbard calls Washington’s effort to oust Assad “counterproductive” and “illegal” before taking it a step further and accusing the CIA of arming the very same terrorists who The White House insists are "sworn enemies.”  In short, Gabbard all but tells the American public that the government is lying to them and may end up inadvertently starting “World War III.” For those who missed it, here’s the clip:
  • Last month, US Congresswoman Tulsi Gabbard went on CNN and laid bare Washington’s Syria strategy.  In a remarkably candid interview with Wolf Blitzer, Gabbard calls Washington’s effort to oust Assad “counterproductive” and “illegal” before taking it a step further and accusing the CIA of arming the very same terrorists who The White House insists are "sworn enemies.”  In short, Gabbard all but tells the American public that the government is lying to them and may end up inadvertently starting “World War III.” For those who missed it, here’s the clip:
  • ...6 more annotations...
  • That was before Paris.  Well, in the wake of the attacks, Gabbard has apparently had just about enough of Washington vacillating in the fight against terror just so the US can ensure that ISIS continues to destabilize Assad and now, with bi-partisan support, the brazen Hawaii Democrat has introduced legislation to end the "illegal war" to overthrow Assad.  Gabbard, who fought in Iraq - twice - has partnered with Republican Adam Scott on the bill. Here's AP:  In an unusual alliance, a House Democrat and Republican have teamed up to urge the Obama administration to stop trying to overthrow Syrian President Bashar Assad and focus all its efforts on destroying Islamic State militants.   Reps. Tulsi Gabbard, a Democrat, and Austin Scott, a Republican, introduced legislation on Friday to end what they called an "illegal war" to overthrow Assad, the leader of Syria accused of killing tens of thousands of Syrian citizens in a more than four-year-old civil war entangled in a battle against IS extremists, also known as ISIS.   "The U.S. is waging two wars in Syria," Gabbard said. "The first is the war against ISIS and other Islamic extremists, which Congress authorized after the terrorist attack on 9/11. The second war is the illegal war to overthrow the Syrian government of Assad."
  • That was before Paris.  Well, in the wake of the attacks, Gabbard has apparently had just about enough of Washington vacillating in the fight against terror just so the US can ensure that ISIS continues to destabilize Assad and now, with bi-partisan support, the brazen Hawaii Democrat has introduced legislation to end the "illegal war" to overthrow Assad.  Gabbard, who fought in Iraq - twice - has partnered with Republican Adam Scott on the bill. Here's AP:  In an unusual alliance, a House Democrat and Republican have teamed up to urge the Obama administration to stop trying to overthrow Syrian President Bashar Assad and focus all its efforts on destroying Islamic State militants.   Reps. Tulsi Gabbard, a Democrat, and Austin Scott, a Republican, introduced legislation on Friday to end what they called an "illegal war" to overthrow Assad, the leader of Syria accused of killing tens of thousands of Syrian citizens in a more than four-year-old civil war entangled in a battle against IS extremists, also known as ISIS.   "The U.S. is waging two wars in Syria," Gabbard said. "The first is the war against ISIS and other Islamic extremists, which Congress authorized after the terrorist attack on 9/11. The second war is the illegal war to overthrow the Syrian government of Assad."   Scott said, "Working to remove Assad at this stage is counter-productive to what I believe our primary mission should be."
  • ing to remove Assad at this stage is counter-productive to what I believe our primary mission should be."   Since 2013, the CIA has trained an estimated 10,000 fighters, although the number still fighting with so-called moderate forces is unclear. CIA-backed rebels in Syria, who had begun to put serious pressure on Assad's forces, are now under Russian bombardment with little prospect of rescue by their American patrons, U.S. officials say.   For years, the CIA effort had foundered — so much so that over the summer, some in Congress proposed cutting its budget. Some CIA-supported rebels had been captured; others had defected to extremist groups.   Gabbard complained that Congress has never authorized the CIA effort, though covert programs do not require congressional approval, and the program has been briefed to the intelligence committees as required by law, according to congressional aides who are not authorized to be quoted discussing the matter.   Gabbard contends the effort to overthrow Assad is counter-productive because it is helping IS topple the Syrian leader and take control of all of Syria. If IS were able to seize the Syrian military's weaponry, infrastructure and hardware, the group would become even more dangerous than it is now and exacerbate the refugee crisis.
  • And make no mistake, Tulsi's understanding of Washington's absurd Mid-East policy goes far beyond Syria. That is, Gabbard fully grasps the big picture as well. Here's what she has to say about the idea that the US should everywhere and always attempt to overthrow regimes when human rights groups claim there's evidence of oppression: "People said the very same thing about Saddam (Hussein), the very same thing about (Moammar) Gadhafi, the results of those two failed efforts of regime change and the following nation-building have been absolute, not only have they been failures, but they've actually worked to strengthen our enemy." Somebody get Langley on the phone, this woman must be stopped.  Here's Gabbard speaking to CNN this week about Assad:
  • So there's hope for the US public after all. Perhaps if the clueless masses won't listen to "lunatic" fringe blogs or Sergei Lavrov, they'll listen to a US Congresswoman who served two tours of duty in Iraq and who is now telling Americans that The White House, The Pentagon, and most especially the CIA are together engaged in an "illegal" effort to overthrow the government of a sovereign country and in the process are arming the very same extremists that are attacking civilians in places like Paris. Good luck Tulsi, and thanks for proving that there's at least one person inside that Beltway that isn't either dishonest or naive.  *  *  * From Gabbard  “Here are 10 reasons the U.S. must end its war to overthrow the Syrian government of Assad: Because if we succeed in overthrowing the Syrian government of Assad, it will open the door for ISIS, al-Qaeda, and other Islamic extremists to take over all of Syria.  There will be genocide and suffering on a scale beyond our imagination.  These Islamic extremists will take over all the weaponry, infrastructure, and military hardware of the Syrian army and be more dangerous than ever before. We should not be allying ourselves with these Islamic extremists by helping them achieve their goal because it is against the security interests of the United States and all of civilization. Because the money and weapons the CIA is providing to overthrow the Syrian government of Assad are going directly or indirectly into the hands of the Islamic extremist groups, including al-Qaeda affiliates, al-Nusra, Ahrar al-Sham, and others who are the actual enemies of the United States.  These groups make up close to 90 percent of the so-called opposition forces, and are the most dominant fighters on the ground. Because our efforts to overthrow Assad has increased and will continue to increase the strength of ISIS and other Islamic extremists, thus making them a bigger regional and global threat.
  • Because this war has exacerbated the chaos and carnage in Syria and, along with the terror inflicted by ISIS and other Islamic extremist groups fighting to take over Syria, continues to increase the number of Syrians forced to flee their country. Because we should learn from our past mistakes in Iraq and Libya that U.S. wars to overthrow secular dictators (Saddam Hussein and Muammar Gaddafi) cause even more chaos and human suffering and open the door for Islamic extremists to take over in those countries. Because the U.S. has no credible government or government leader ready to bring order, security, and freedom to the people of Syria. Because even the ‘best case’ scenario—that the U.S. successfully overthrows the Syrian government of Assad—would obligate the United States to spend trillions of dollars and the lives of American service members in the futile effort to create a new Syria.  This is what we have been trying to do in Iraq for twelve years, and we still have not succeeded.  The situation in Syria will be much more difficult than in Iraq. Because our war against the Syrian government of Assad is interfering with our being one-pointedly focused on the war to defeat ISIS, Al-Qaeda, and the other Islamic extremists who are our actual enemy. Because our war to overthrow the Assad government puts us in direct conflict with Russia and increases the likelihood of war between the United States and Russia and the possibility of another world war.” *  *  * Oh, and if you needed another reason to like Tulsi, here's a bonus 40 second clip for your amusement...
Paul Merrell

CT Soldier Demands Apology From Karl Rove; Rove Says No Apology Needed For Iraq War - H... - 0 views

  • yan Henowitz says he was 20 years old and a medic with the 2nd Battalion of the 7th Infantry Regiment when he saw his friends “torn apart and Iraqi children screaming for their parents as indiscriminate shrapnel scarred them and us in ways that we will never know,” he told Karl Rove Tuesday at the University of Connecticut in Storrs. “Take responsibility and apologize for your decision in sending a generation to lose their humanity” and “apologize to the millions of fathers and mothers who lost their children on both sides” of the war, Henowitz demanded. WATCH: Karl Rove Calls Sen. Elizabeth Warren 'Pocahontas' Karl Rove calls Sen. Elizabeth Warren “Pocahontas” during an event on UConn's Storrs campus Tuesday evening. Karl Rove calls Sen. Elizabeth Warren “Pocahontas” during an event on UConn's Storrs campus Tuesday evening. See more videos Rove, former deputy chief of staff and senior adviser to President George W. Bush, who was in Storrs at the invitation of UConn College Republicans, thanked Henowitz for his service and said he was sorry for “what you went through,” but said he would not apologize for the war.
  • “It was right to remove Saddam Hussein from power. ... We should be proud of what we were able to do in Iraq and we should be sorry that we left them alone, because when we left them, things deteriorated,” Rove said.
  •  
    Over a million killed in Iraq and that country is in worse turmoil than ever, but Karl Rove is still unrepentant, says that removing Saddam from power was worth it. That war was a highly illegal war of aggression even by the Bush II Administration's own justifications. "Regime change" is not a lawful casus belli. 
1 - 13 of 13
Showing 20 items per page