Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged transparency-tools

Rss Feed Group items tagged

Paul Merrell

Transparency Toolkit - 0 views

  • About Transparency Toolkit We need information about governments, companies, and other institutions to uncover corruption, human rights abuses, and civil liberties violations. Unfortunately, the information provided by most transparency initiatives today is difficult to understand and incomplete. Transparency Toolkit is an open source web application where journalists, activists, or anyone can chain together tools to rapidly collect, combine, visualize, and analyze documents and data. For example, Transparency Toolkit can be used to get data on all of a legislator’s actions in congress (votes, bills sponsored, etc.), get data on the fundraising parties a legislator attends, combine that data, and show it on a timeline to find correlations between actions in congress and parties attended. It could also be used to extract all locations from a document and plot them on a map where each point is linked to where the location was mentioned in the document.
  • Analysis Platform On the analysis platform, users can add steps to the analysis process. These steps chain together the tools, so someone could scrape data, upload a document, crossreference that with the scraped data, and then visualize the result all in less than a minute with little technical knowledge. Some of the tools allow users to specify input, but when this is not the case the output of the last step is the input of the next. Tools Existing and planned Transparency Toolkit tools include include scrapers and APIs for accessing data, format converters, extraction tools (for dates, names, locations, numbers), tools for crossreferencing and merging data, visualizations (maps, timelines, network graphs, maps), and pattern and trend detecting tools. These tools are designed to work in many cases rather than a single specific situation. The tools can be linked together on Transparency Toolkit, but they are also available individually. Where possible, we build our tools off of existing open source software. Road Map You can see the plans for future development of Transparency Toolkit here.
  •  
    If you think this isn't a tool for some very serious research, check the short descriptions of the modules here. https://github.com/transparencytoolkit I'll be installing this and doing some test-driving soon. From the source files, the glue for the tools seems to be Ruby on Rails. The development roadmap linked from the last word on this About page is also highly instructive. It ranks among the most detailed dev roadmaps I have ever seen. Notice that it is classified by milestones with scheduled work periods, giving specific date ranges for achievement. Even given the inevitable need to alter the schedule for unforeseen problems, this is a very aggressive (not quite the word I want) development plan and schedule. And the planned changes look to be super-useful, including a lot of "make it easier for the user" changes.   
Gary Edwards

The Daily Bell - Catherine Austin Fitts on Moral Investing and the Coming Equity 'Crash... - 1 views

  • If you talk about legacy systems and then a breakaway civilization, the legacy systems were financed with debt and if the resources have basically been shifted out and over into "NewCo" then that's going to be an equity model. We're literally coming into what I consider to be a planetary debt for equity swap. So the question for all of us is how do we navigate the turn? When do you leave the bond market and when does the equity increase occur? We've seen North America equity markets rising and the emerging markets falling this year.
  • We're seeing a tremendous divergence in the economy in North America between those portions of the economy that are adapting new technology and growing and the rest of the economy.
  • The other thing I watch is what the divergence means to bond credits and to equity valuations. If you look at the indices you don't really see it. If you look inside the indices you see some enormous splits in quality and value going on.
  • ...43 more annotations...
  • The slow burn is a world in which for most people income is flat or falling and expenses are steadily rising. It's a debasement scenario. And the reality is the central banks have been able to have a quite liberal monetary policy because we've been able to offset that with labor deflation. So by globalizing labor and instituting technology you have tremendous deflationary pressures, which offset very generous monetary policy.
  • Starting in the '90s a decision was made to move significant amounts of capital out of existing systems in  the developed world and literally trillions of dollars of financial fraud was engineered to do that. As a financial phenomenon it was quite clever and trillions have literally been moved out between the fraud and the bailouts. I think what the Fed has been doing with quantitative easing is running a shredding operation where they buy up the fraudulent mortgage securities paper and are shredding it.
  • If you look at the Treasury, they've run a very tight regulatory process where that money doesn't seep out on Main Street. It's quite phenomenal the way they've managed to control it. I think one of the big questions is where is that money going to go now? It certainly looks to me like a great effort is being made to make sure it goes into equities, sort of keeps the bond market afloat and goes into equities. So I look it as a very political move.
  • You can balance the budget with fiscal measures or you can balance the budget by the Fed just buying bonds and if you look at the Fed's balance sheet, I think they have a much greater capacity to buy bonds. If you look at all the money that was stolen, the breakaway civilization has plenty of money to buy bonds.
  • I would say so far the Fed's policies have worked for what they're intended to do. We've moved a tremendous amount of money out of the economy. We've now basically run through the statute of limitations or done whatever management needed to cut the cords so that what I call the legacy systems can't get the money back. So the financial coup d'état has been successful and now the cover-up is pretty much over and successful.
  • So now you have big decisions. You have two economies. Before this started what I call the legacy systems had $100 trillion of liabilities and $100 trillion of assets – now, I'm just pulling those numbers out of the air – and
  • the coup moved $40 trillion of assets over into NewCo
  • if you will. Now we've got the legacy systems trying to reconcile $60 trillion of assets to $100 trillion of liabilities and there is a long, drawn-out, grinding process by which some people will get 50 cents on the dollar, some people will get zero cents on the dollar, some people will get 100 cents on the dollar. It's just a very difficult, complex and tangled political scene as to how that's going to all happen. Meantime, NewCo, with $40 trillion dollars, is investing and going gangbusters. NewCo is enjoying an unprecedented boom, investing in lots of new technology and new frontiers, including space. So I think the next step is to manage the lowering of expectations in the legacy systems. That's basically what the administration and the Fed are going to be doing for the next couple years, is just gutting their way through retirees' disappointment.
  • There are three things
  • Number one, Obamacare was created to create a framework that would allow significant reduction of costs and benefits under Medicare over time and healthcare over time;
  • Well, the goal of Obamacare is to control.
  • number two, Obamacare was to provide much more control over both the medical establishment and the population at large;
  • and then, three, to do it in a way that will protect corporate profits.
  • in a relatively short period of time US Medicare expenses would be several multiplicities of the GNP.
  • It's clearly a system that makes no economic sense. It's not just that people are aging. If we eat food that has little nutrition and provide healthcare in which pharmaceutical companies are allowed to charge many multiples of what they charge in other countries you're going to get a financial train wreck, which is where we're headed.
  • So I think the goal was to reconcile that and do it in a way that favors corporations and control.
  • If you go around the entire financial ecosystem, they're getting hit within every line by the same pro-centralization policies that ultimately go up to the same people.
  • Do I think it will snuff out the recovery? No. I think it will simply destroy the economics for a whole world of people who were productive.
  • I don't think the banks are fragile. What happened was they were asked to do a job, they did it and now they've taken all the fraudulent paper and sold it to the Fed or torn it up because they had so much in federal credit arbitrage earnings during this period. So I don't think they're fragile.
  • So it certainly puts us in a position where the creditworthiness of a lot of sovereign debt depends on government military might and the ability to debase a variety of players.
  • There's been a lot of regulation to make it easy for Wall Street to control and make it difficult for small businesses to raise and circulate liquid equity. It's one of the areas in the economy where there really has been a very serious conspiracy.
  • if you want to go really fast and prototype and build out infrastructure, the best way to do it is to make capital available to early venture and start-ups.
  • we, as a society, have stopped the markets from working in the start-up and the small business space.
  • If you look at it across all the different tools, from fabrication technology to new composite materials to robotics to lasers, we're reaching a critical mass of the economic costs dropping and the speed of learning accelerating.
  • If you look back at the history of the US stock market you'll see two huge spikes, one in the '20s, one in the '90s, both when very profound new communication and information technology came out.
  • I think we're in danger of another tech bubble. If you look at who's interested in putting money in this and getting lots of prototypes, the last time they did this was in the '90s. They made a fortune on fraud and they used it not only to serve some fundamental economic purposes but they used it to drain out the pension funds and the retail investors.
  • securities convertible into store credits
  • Wall Street doesn't understand about crowdfunding, are the new alignments that are going to be created in terms of circulating knowledge and purchases and money between consumers and entrepreneurs and companies. It's going to create a whole new level of intimacy.
  • I recommend the documentary, "The Naked Brand." It gives a good sense of the worth of that intimacy and the change from a mass media model to much more intimate relationships
  • awakening of global consciousness.
  • in North America there is almost an astonishing lack of transparency about how government money works within the jurisdiction for which we vote for political representation.
  • So if you were going to have proper transparency in America you would have annual financial statements for your congressional district as well as for the whole country.
  • Now, the government has refused since 1995, as required by law, to produce annual financial statements let alone for the places in which you're voting for jurisdiction. And if you're going to have any kind of citizenry accountability or legislator accountability you have to have that kind of transparency and the government has gone to enormous lengths to prevent that kind of transparency while pretending that we're very transparent. So the Internet is going to make it more and more difficult for that absence of transparency to continue or be justified, and that's good.
  • if you have all your assets in the legacy economy and none in the growing economy you're going to suffer.
  • That's number one.
  • Number two, a lot of households have assets which represent liabilities of the legacy economy, whether Social Security, Medicare or others, and one of the things you have to understand is the politics – you need to not get trapped in the politics of stringing people out for those benefits. Do the best you can but don't get lost in the treadmill of trying to get promised benefits that may or may not come true. And to the extent that you can not get financially dependent on those benefits it would be very good.
  • The final thing is, of course, and readers know this if they're reading The Daily Bell, you're dealing in a system that includes a significant amount of corruption and fraud so you just need to be extremely careful about the quality of the people or the enterprises in which you invest or do business with and keep your assets fairly diversified in terms of both areas of the economy, or sectors, and places.
  • Take a look at different predictions that gold is going to increase significantly in value. All those predictions assume that the monetary inflation is going to spill into commodities. And what you're watching instead is the G-7 have been essentially building a corral that forces the horses to run out through the stock market. That's why I call it a crash-up.
  • I think one scenario we're looking at is the possibility of a crash-up scenario where that monetary increase is funneled into the equity markets. One of the most important questions there is, can you get the global population interested in investing in equities? Because the long bond market bull is coming to a close.
  • We have two choices. We can basically write down the debt and go through a huge crunch period or we can have a crash-up in the equity markets.
  • Right after 9/11 – and General Wesley Clark has said this and I experienced it in my tiny little community in Tennessee – we were basically given what the battle plan was going to be – the US military taking over Eurasia. First we were going to go to Afghanistan, then we were going to go to Iraq, then we were going to go to Libya, then we were going to go to Syria and then we're going to Iran. It was all laid out for us and we seem to be following that battle plan, albeit slower than predicted at that time.
  • If we're going to create a global financial system and a one-world currency, you need everybody in the central banking model. You have outliers. We seem to be bringing in all the outliers. As we do, we are trying to checkmate Russia and China within Eurasia, because I think control of Eurasia is essential for maintaining global empire.
  • what we're watching is an effort to bring everybody into a centrally controlled central banking model.
  •  
    Catherine is a frequent guest on CoastToCoastAM.com, so I've come to know her well.  Although this interview doesn't discuss her ability to see into the future, I know from experience that she is a real visionary hitting the mark at an astounding clip.  Chalk this interview up as a must read.
Paul Merrell

The US government doesn't want you to know the cops are tracking you | Trevor Timm | Co... - 0 views

  • All across America, from Florida to Colorado and back again, the country's increasingly militarized local police forces are using a secretive technology to vacuum up cellphone data from entire neighborhoods – including from people inside their own homes – almost always without a warrant. This week, numerous investigations by major news agencies revealed the US government is now taking unbelievable measures to make sure you never find out about it. But a landmark court ruling for privacy could soon force the cops to stop, even as the Obama administration fights to keep its latest tool for mass surveillance a secret.So-called International Mobile Subscriber Identity (IMSI) catchers – more often called their popular brand name, "Stingray" – have long been the talk of the civil liberties crowd, for the indiscriminate and invasive way these roving devices conduct surveillance. Essentially, Stingrays act as fake cellphone towers (usually mounted in a mobile police truck) that police can point toward any given area and force every phone in the area to connect to it. So even if you're not making a call, police can find out who you've been calling, and for how long, as well as your precise location. As Nathan Freed Wessler of the ACLU explained on Thursday, "In one Florida case, a police officer explained in court that he 'quite literally stood in front of every door and window' with his stingray to track the phones inside a large apartment complex."
  • Yet these mass surveillance devices have largely stayed out of the public eye, thanks to the federal government and local police refusing to disclose they're using them in the first place – sometimes, shockingly, even to judges. As the Associated Press reported this week, the Obama administration has been telling local cops to keep information on Stingrays secret from members of the news media, even when it seems like local public records laws would mandate their disclosure. The AP noted:Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.
  • Some of the government's tactics to hide Stingray from journalists and the public have been downright disturbing. After the ACLU had filed a records request for information on Stingrays, the local police force initially told them that, yes, they had the documents and to come on down to the station to look at them. But just before an ACLU rep was due to arrive, US Marshals seized the records and hid them away at another location, in what Wessler describes as "a blatant violation of state open-records laws".The federal government has used various other tactics around the country to prevent disclosure of similar information.USA Today also published a significant nationwide investigation about the Stingray problem, as well as what are known as "cellphone tower dumps". When police agencies don't have Stingrays at their disposal, they can go to cell phone providers to get the cellphone location information of everyone who has connected to a specific cell tower (which inevitably includes thousands of innocent people). The paper's John Kelly reported that one Colorado case shows cellphone tower dumps got police "'cellular telephone numbers, including the date, time and duration of any calls,' as well as numbers and location data for all phones that connected to the towers searched, whether calls were being made or not."
  • ...3 more annotations...
  • It's scary enough to think that the NSA is collecting so much information, but this mass location and metadata tracking at the local level all may be about to change. This week, the ACLU won a historic victory in the 11th Circuit Court of Appeals (serving Florida, Alabama and Georgia), which ruled that police need to get a warrant from a judge before extracting from your cellphone the location data obtained by way of a cell tower. This ruling will apply whether cops are going after one person, the whole tower and, one can assume, Stingrays. (The case was also argued by the aforementioned Wessler, who clearly is this month’s civil liberties Most Valuable Player.)This case has huge implications, and not just for the Stingrays secretly being used in Florida. It virtually guarantees the US supreme court will soon have to tackle the larger cellphone location question in some form – and whether police across the country have to finally start getting a warrant to find out where your precise location for days or weeks at a time. But as Stanford law professor Jennifer Granick wrote on Friday, it could also have an impact on NSA spying, which relies on the theory that indiscriminately collecting metadata is fair game until a court says otherwise.
  • You may be asking: how, exactly, are the local cops getting their hands on such advanced military technology? Well, the feds are, in many cases, giving away the technology for free. When the US government is not loaning police agencies their own Stingrays, the Defense Department and Homeland Security are giving federal grants to cops, which allow departments to purchase the gear at the cost of $400,000 a pop from defense contractors like Harris Corporation, which makes the Stingray brand.
  • Like Stingrays, and the NSA's phone dragnet before them, the militarization of America's local cops is a phenomenon that's only now getting widespread attention. As journalist Radley Balko, who wrote a seminal book on the subject two years ago, said this week, the Obama administration could easily limit these tactics to "cases of legitimate national security" – but has clearly chosen not to.No matter how much President Obama talks about how he has "maintained a healthy skepticism toward our surveillance programs", it seems the Most Transparent Administration in American History™ remains much more interested in maintaining a healthy, top-secret surveillance state.
Paul Merrell

Loopholes, Filing Failures, and Lax Enforcement: How the Foreign Agents Registration Ac... - 0 views

  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Why This Matters The Foreign Agents Registration Act requires American lobbyists working on behalf of foreign clients to disclose significantly more information about their activities than what is required of domestic lobbyists. This includes the actual documents used to influence policy makers, called informational materials. These materials include draft legislation, speeches, press releases and more, all created to influence U.S. policy. But the lobbyists do not always follow the letter of the law and enforcement by the Justice Department has been lax in recent years. Furthermore, the law itself seems to have loopholes that make enforcement difficult if not impossible. The Foreign Agents Registration Act is intended to bring transparency into the world of foreign lobbying. But when American lobbyists working on behalf of foreign interests fail to follow the law, or the Justice Department fails to enforce it, the American people are left in the dark.
  • Executive Summary The Foreign Agents Registration Act (FARA) requires that all American citizens working to influence U.S. policy on behalf of foreign governments register with the Department of Justice and to disclose information on any and all political activity in which they engaged for foreign clients. This includes filing, within 48 hours, any informational materials disseminated to two or more people.
  • ...7 more annotations...
  • Table of Contents Executive SummaryIntroductionBackgroundWhat the Foreign Influence Database ShowsEgypt: A Case Study Of Foreign InfluenceSame-Day ContributionsSystemic Foreign InfluenceQuid Pro Quo or Coincidence?Foreign Money and the LawLax Compliance with and Enforcement of FARAEnforcementConclusionRecommendationsEndnotes
  • The law requires lobbyists for foreign interests to plainly and conspicuously identify themselves as such in any materials distributed in the course of their lobbying—for example, emails, other correspondence, or publications. We found that many documents filed with the Justice Department lack this identification statement; furthermore, many lobbyists admitted that they did not comply with this requirement. More than half (51 percent) of the registrants we examined in a sample from 2010 checked a box on a the semi-annual Justice Department questionnaire saying they had filed informational materials, and checked another box saying they had not met the legal requirement that they identify themselves in those materials as working on behalf of foreign interests. Toby Moffett, a former Member of Congress from Connecticut who is now Chairman of the Moffett Group and one of its registered lobbyists, told POGO that “Around the edges there’s a lot of loosey-goosey stuff going on. People representing foreign interests and not reporting.”[4] But even when lobbyists do report to the Justice Department, the information they provide is not easily accessible to the public. Astonishingly, informational materials are not available online, despite the fact that the Justice Department has an electronic filing system. Instead, these documents are kept in an office at the Justice Department that is only open for four hours each weekday. Hard copies of the documents are kept in folders that are often disorganized and susceptible to misfiling. This archaic system undermines the intended transparency of the law.
  • We set out to determine the extent to which lobbyists for foreign interests were filing lobbying materials at the Justice Department within the required time frame. Based on a review of filings made in 2012, in those instances where it was possible to answer the question, POGO estimates that almost half—46 percent—were filed late. Fifteen percent were filed more than 30 business days after they were distributed, and 12 percent were filed more than 100 business days after they were distributed. In many instances, the Justice Department would be hard pressed to enforce the filing deadline. Based on the records the Department maintains to enforce the law, we found that in more than a quarter (26 percent) of the 2012 filings, it was impossible to determine whether the lobbyists complied. For example, in many cases, the records did not show when the lobbyists disseminated the materials to the targets of their lobbying. In a glaring omission, the law does not require lobbyists to provide that information. Without it, there may be no way for the government or the public to know whether lobbying materials were filed on time.
  • Though federal law bars foreign money from U.S. political campaigns, there appears to be a gray area in the law that can let in such money indirectly. POGO found many instances in which members of lobbying firms made political contributions to Members of Congress on the same day that those firms were lobbying the Members of Congress or their legislative staffs on behalf of foreign clients.[1] Lobbyists who fail to comply with certain FARA requirements may have little to fear from the Justice Department. “The cornerstone of the Registration Unit’s enforcement efforts is encouraging voluntary compliance,” a Justice Department website says.[2] When lobbyists do not voluntarily comply, the Justice Department rarely uses one of the key tools at its disposal to enforce the law—seeking a court injunction. A representative of the Department’s FARA unit told POGO: “While the FARA statute and regulations authorize the pursuit of formal legal proceedings, such as injunctive remedy options, the FARA Unit [has] not pursued injunctive remedy options recently and has instead utilized other mechanisms to achieve compliance.”[3] It appears that some registered foreign agents have been distributing materials but not filing them with the Justice Department. It’s unclear the extent to which that illustrates a lack of compliance with the law or loopholes in the law. In the process of researching this report, POGO noticed that many more lobbyists were registering as foreign agents than had filed informational materials that we could locate at the FARA office. To determine what was happening, we looked at a sampling of questionnaires that the Justice Department requires registered agents to complete every six months. Some checked one box indicating they had distributed materials and another box stating they did not file them with the FARA office.
  • The Project On Government Oversight examined thousands of these materials spanning four years, as well as additional public records related to the Justice Department’s oversight of lobbyists for foreign interests. We found that lobbyists for foreign interests have routinely failed to comply with the law—a failure that prevents journalists and watchdogs from scrutinizing the lobbying activities while foreign interests are trying to influence U.S. policy. We found a pattern of lax enforcement of FARA requirements by the Justice Department. We found that the Justice Department office responsible for administering the law is a record-keeping mess. And we found loopholes in the law that often makes it difficult if not impossible for the government to police compliance or to discipline lobbyists who fail to comply. Here are some highlights of our investigation:
  • When lobbyists for foreign interests do not follow the law, when the U.S. government fails to enforce it, and when the Justice Department makes it difficult for the American people to access records to which they are legally entitled, the public is left in the dark. To bring more transparency to this opaque realm, POGO has made four years of informational materials available for the first time online with our Foreign Influence Database, allowing the public to see how lobbyists attempt to influence American policies on behalf of their foreign clients.
  • With the release of the Foreign Influence Database, the Project On Government Oversight (POGO) is making years of documents from this key set of FARA filings electronically available for the first time. The materials were previously only available in hard copy at the FARA Registration Unit in Washington, DC, which is only open to the public from 11am to 3pm on weekdays.[12] In this digital age it is surprising that these materials could not be read online and are instead stored in file folders, where they are disorganized and susceptible to misfiling. Even those that were electronically filed by the registrants are not available to the public in an electronic format. POGO’s database includes informational materials filed in 2009, 2010, 2011, and 2012.[13]
  •  
    POGO does thorough work and doesn't let up until it gets results. Forcing DoJ to puts its foreign agents registration materials online should be a fairly trivial battle. The real war, though, will be forcing better enforcement. The new database is at http://www.pogo.org/tools-and-data/foreign-influence-database/ I punched up the word "Israel" and came up with 113 documents in the search results. Each search hit lists the name of the nation involved that the lobbying was done for. Of those 113 document hits, only two were for the nation of Israel, both for its Ministry of Tourism. The rest were by other nations who had mentioned Israel in their lobbying materials.  Now that is fairly incredible, given that Israel outright controls Congress when it comes to Middle East policy.  The last administration to attempt to do something about Israeli lobbyists not registering was the the Kennedy Administration. The result was that the major Israeli lobbying group disbanded and was promptly reformed under a new corporate charter and name. That was the very last attempt at enforcing the Foreign Agents Registration Act against Israel's lobbyists in the U.S., despite the fact that the reformed group, AIPAC, has even been caught more than once being passed highly classified U.S. documents by double agents working inside the U.S. military establishment. The leakers went to prison but the AIPACers were never prosecuted. AIPAC rules.  
Paul Merrell

U.S. Says It Spied on 89,000 Targets Last Year, But the Number Is Deceptive | Threat Le... - 0 views

  • About 89,000 foreigners or organizations were targeted for spying under a U.S. surveillance order last year, according to a new transparency report. The report was released for the first time Friday by the Office of the Director of Intelligence, upon order of the president, in the wake of surveillance leaks by NSA whistleblower Edward Snowden. But the report, which covers only surveillance orders issued in 2013, doesn’t tell the whole story about how many individuals the spying targeted or how many Americans were caught in the surveillance that targeted foreigners. Civil liberties groups say the real number is likely “orders of magnitude” larger than this. “Even if it was an honest definition of ‘target’—that is, an individual instead of a group—that also is not encompassing those who are ancillary to a target and are caught up in the dragnet,” says Kurt Opsahl, deputy general counsel of the Electronic Frontier Foundation.
  • In its report, the government indicated that the 423 selectors involved just 248 “known or presumed” Americans whose information was collected by the agency in the database. But Opsahl says that both of these numbers are deceptive given what we know about the database and how it’s been used. “We know it’s affecting millions of people,” he points out. But “then we have estimated numbers of affected people [that are just] in the three digits. That requires some effort [on the government's part] to find a way to do the definition of the number [in such a way] to make it as small as possible.”
  • “If you’re actually trying to get a sense of the number of human beings affected or the number of Americans affected, the number of people affected is vastly, vastly larger,” says Julian Sanchez, senior fellow at the Cato Institute. “And how many of those are Americans is impossible to say. But [although] you may not think you are routinely communicating with foreign persons, [this] is not any kind of assurance that your communications are not part of the traffic subject to interception.” Sanchez points out that each individual targeted is likely communicating with dozens or hundred of others, whose communications will be picked up in the surveillance. “And probably a lot of these targets are not individuals but entire web sites or companies. While [a company like the Chinese firm] Huawei might be a target, thousands of emails used by thousands of employees will be swept up.” How many of those employees might be American or communicating with Americans is unknown.
  • ...5 more annotations...
  • Also revealed in today’s report is the number of times the government has queried the controversial phone records database it created by collecting the phone records of every subscriber from U.S. providers. According to the report, the government used 423 “selectors” to search its massive phone records database, which includes records going back to at least 2006 when the program began. A search involves querying a specific phone number or device ID that appears in the database. The government has long maintained that its collection of phone records isn’t a violation of its authority, since it only views the records of specific individuals targeted in an investigation. But such searches, even if targeted at phone numbers used by foreigners, would include calls made to and from Americans as well as calls exchanged with people two or three hops out from the targeted number.
  • The report, remarkably, shows that the government obtained just one order last year under Section 702 of FISA—which allows for bulk collection of data on foreigners—and that this one order covered 89,138 targets. But, as the report notes, “target” can refer to “an individual person, a group, an organization composed of multiple individuals or a foreign power that possesses or is likely to communicate foreign intelligence information.” Furthermore, Section 702 orders are actually certificates issued by the FISA Court that can cover surveillance of an entire facility. And since, as the government points out in its report, the government cannot know how many people use a facility, the figure only “reflects an estimate of the number of known users of particular facilities (sometimes referred to as selectors) subject to intelligence collection under those Certifications,” the report notes.
  • One additional figure today’s report covers is the number of National Security Letters the government issued last year to businesses to obtain data on accountholders and users—19,212. NSLs are written demands from the FBI that compel internet service providers, credit companies, financial institutions and others to hand over confidential records about their customers, such as subscriber information, phone numbers and e-mail addresses, websites visited, and more. These letters are a powerful tool because they do not require court approval, and they come with a built-in gag order, preventing recipients from disclosing to anyone that they have received an NSL. An FBI agent looking into a possible anti-terrorism case can self-issue an NSL to a credit bureau, ISP, or phone company with only the sign-off of the Special Agent in Charge of their office. The FBI has merely to assert that the information is “relevant” to an investigation into international terrorism or clandestine intelligence activities.
  • The FBI has issued hundreds of thousands of NSLs over the years and has been reprimanded for abusing them. Last year a federal judge ruled that the use of NSLs is unconstitutional, due to the gag order that accompanies them, and ordered the government to stop using them. Her ruling, however, was stayed pending the government’s appeal.
  • According to the government’s report today, the 19,000 NSLs issued last year involved more than 38,000 requests for information.
Paul Merrell

Beware the Dangers of Congress' Latest Cybersecurity Bill | American Civil Liberties Union - 0 views

  • A new cybersecurity bill poses serious threats to our privacy, gives the government extraordinary powers to silence potential whistleblowers, and exempts these dangerous new powers from transparency laws. The Cybersecurity Information Sharing Act of 2014 ("CISA") was scheduled to be marked up by the Senate Intelligence Committee yesterday but has been delayed until after next week's congressional recess. The response to the proposed legislation from the privacy, civil liberties, tech, and open government communities was quick and unequivocal – this bill must not go through. The bill would create a massive loophole in our existing privacy laws by allowing the government to ask companies for "voluntary" cooperation in sharing information, including the content of our communications, for cybersecurity purposes. But the definition they are using for the so-called "cybersecurity information" is so broad it could sweep up huge amounts of innocent Americans' personal data. The Fourth Amendment protects Americans' personal data and communications from undue government access and monitoring without suspicion of criminal activity. The point of a warrant is to guard that protection. CISA would circumvent the warrant requirement by allowing the government to approach companies directly to collect personal information, including telephonic or internet communications, based on the new broadly drawn definition of "cybersecurity information."
  • While we hope many companies would jealously guard their customers' information, there is a provision in the bill that would excuse sharers from any liability if they act in "good faith" that the sharing was lawful. Collected information could then be used in criminal proceedings, creating a dangerous end-run around laws like the Electronic Communications Privacy Act, which contain warrant requirements. In addition to the threats to every American's privacy, the bill clearly targets potential government whistleblowers. Instead of limiting the use of data collection to protect against actual cybersecurity threats, the bill allows the government to use the data in the investigation and prosecution of people for economic espionage and trade secret violations, and under various provisions of the Espionage Act. It's clear that the law is an attempt to give the government more power to crack down on whistleblowers, or "insider threats," in popular bureaucratic parlance. The Obama Administration has brought more "leaks" prosecutions against government whistleblowers and members of the press than all previous administrations combined. If misused by this or future administrations, CISA could eliminate due process protections for such investigations, which already favor the prosecution.
  • While actively stripping Americans' privacy protections, the bill also cloaks "cybersecurity"-sharing in secrecy by exempting it from critical government transparency protections. It unnecessarily and dangerously provides exemptions from state and local sunshine laws as well as the federal Freedom of Information Act. These are both powerful tools that allow citizens to check government activities and guard against abuse. Edward Snowden's revelations from the past year, of invasive spying programs like PRSIM and Stellar Wind, have left Americans shocked and demanding more transparency by government agencies. CISA, however, flies in the face of what the public clearly wants. (Two coalition letters, here and here, sent to key members of the Senate yesterday detail the concerns of a broad coalition of organizations, including the ACLU.)
  •  
    Text of the bill is on Sen. Diane Feinstein's site, http://goo.gl/2cdsSA It is truly a bummer.
Paul Merrell

U.S. government reveals breadth of requests for Internet records | Reuters - 0 views

  • The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows.The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval.The filing made public Monday was the result of an 11-year-old legal battle waged by Nicholas Merrill, founder of Calyx Internet Access, a hosted service provider, who refused to comply with a national security letter (NSL) he received in 2004. Merrill told Reuters the release was significant “because the public deserves to know how the government is gathering information without warrants on Americans who are not even suspected of a crime.”
  • National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data.A federal court ruled earlier this year that the gag on Merrill’s NSL should be lifted. Merrill's challenge also disclosed that the FBI may use NSLs to gain IP addresses on everyone a suspect has corresponded with and cell-site location information. The FBI said in the court filings it no longer used NSLs for location information. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight or transparency.
  • Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests, or between 1,000 and 1,999. Twitter (TWTR.N) has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year, though the agency says it is unaware of the precise number. At one point that number eclipsed 50,000 letters annually. The FBI did not respond to a request for comment Monday.
Paul Merrell

Internet Giants Erect Barriers to Spy Agencies - NYTimes.com - 0 views

  • As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps.
  • After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. Google, for example, is laying its own fiber optic cable under the world’s oceans, a project that began as an effort to cut costs and extend its influence, but now has an added purpose: to assure that the company will have more control over the movement of its customer data.
  • A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant.
  • ...8 more annotations...
  • Eric Grosse, Google’s security chief, suggested in an interview that the N.S.A.'s own behavior invited the new arms race.“I am willing to help on the purely defensive side of things,” he said, referring to Washington’s efforts to enlist Silicon Valley in cybersecurity efforts. “But signals intercept is totally off the table,” he said, referring to national intelligence gathering.“No hard feelings, but my job is to make their job hard,” he added.
  • Hardware firms like Cisco, which makes routers and switches, have found their products a frequent subject of Mr. Snowden’s disclosures, and their business has declined steadily in places like Asia, Brazil and Europe over the last year. The company is still struggling to convince foreign customers that their networks are safe from hackers — and free of “back doors” installed by the N.S.A. The frustration, companies here say, is that it is nearly impossible to prove that their systems are N.S.A.-proof.
  • Many point to an episode in 2012, when Russian security researchers uncovered a state espionage tool, Flame, on Iranian computers. Flame, like the Stuxnet worm, is believed to have been produced at least in part by American intelligence agencies. It was created by exploiting a previously unknown flaw in Microsoft’s operating systems. Companies argue that others could have later taken advantage of this defect.Worried that such an episode undercuts confidence in its wares, Microsoft is now fully encrypting all its products, including Hotmail and Outlook.com, by the end of this year with 2,048-bit encryption, a stronger protection that would take a government far longer to crack. The software is protected by encryption both when it is in data centers and when data is being sent over the Internet, said Bradford L. Smith, the company’s general counsel.
  • Mr. Smith also said the company was setting up “transparency centers” abroad so that technical experts of foreign governments could come in and inspect Microsoft’s proprietary source code. That will allow foreign governments to check to make sure there are no “back doors” that would permit snooping by United States intelligence agencies. The first such center is being set up in Brussels.Microsoft has also pushed back harder in court. In a Seattle case, the government issued a “national security letter” to compel Microsoft to turn over data about a customer, along with a gag order to prevent Microsoft from telling the customer it had been compelled to provide its communications to government officials. Microsoft challenged the gag order as violating the First Amendment. The government backed down.
  • In Washington, officials acknowledge that covert programs are now far harder to execute because American technology companies, fearful of losing international business, are hardening their networks and saying no to requests for the kind of help they once quietly provided.Continue reading the main story Robert S. Litt, the general counsel of the Office of the Director of National Intelligence, which oversees all 17 American spy agencies, said on Wednesday that it was “an unquestionable loss for our nation that companies are losing the willingness to cooperate legally and voluntarily” with American spy agencies.
  • In one slide from the disclosures, N.S.A. analysts pointed to a sweet spot inside Google’s data centers, where they could catch traffic in unencrypted form. Next to a quickly drawn smiley face, an N.S.A. analyst, referring to an acronym for a common layer of protection, had noted, “SSL added and removed here!”
  • Facebook and Yahoo have also been encrypting traffic among their internal servers. And Facebook, Google and Microsoft have been moving to more strongly encrypt consumer traffic with so-called Perfect Forward Secrecy, specifically devised to make it more labor intensive for the N.S.A. or anyone to read stored encrypted communications.One of the biggest indirect consequences from the Snowden revelations, technology executives say, has been the surge in demands from foreign governments that saw what kind of access to user information the N.S.A. received — voluntarily or surreptitiously. Now they want the same.
  • The latest move in the war between intelligence agencies and technology companies arrived this week, in the form of a new Google encryption tool. The company released a user-friendly, email encryption method to replace the clunky and often mistake-prone encryption schemes the N.S.A. has readily exploited.But the best part of the tool was buried in Google’s code, which included a jab at the N.S.A.'s smiley-face slide. The code included the phrase: “ssl-added-and-removed-here-; - )”
Paul Merrell

Emails Show Feds Asking Florida Cops to Deceive Judges | Threat Level | WIRED - 0 views

  • Police in Florida have, at the request of the U.S. Marshals Service, been deliberately deceiving judges and defendants about their use of a controversial surveillance tool to track suspects, according to newly obtained emails. At the request of the Marshals Service, the officers using so-called stingrays have been routinely telling judges, in applications for warrants, that they obtained knowledge of a suspect’s location from a “confidential source” rather than disclosing that the information was gleaned using a stingray. A series of five emails (.pdf) written in April, 2009, were obtained today by the American Civil Liberties Union showing police officials discussing the deception. The organization has filed Freedom of Information Act requests with police departments throughout Florida seeking information about their use of stingrays.
  • The initial email, which bears the subject line “Trap and Trace Confidentiality,” was sent by Sarasota police Sgt. Kenneth Castro to colleagues at the North Port (Florida) Police Department. It was sent after Assistant State Attorney Craig Schaefer contacted police to express concern about an application for a probable cause warrant filed by a North Port police detective. The application “specifically outlined” for the court the investigative means used to locate the suspect. Castro informs his colleague that the application should be revised to conceal the use of the surveillance equipment. “In the past,” Castro writes, “and at the request of the U.S. Marshalls (sic), the investigative means utilized to locate the suspect have not been revealed so that we may continue to utilize this technology without the knowledge of the criminal element. In reports or depositions we simply refer to the assistance as ‘received information from a confidential source regarding the location of the suspect.’ To date this has not been challenged, since it is not an integral part of the actual crime that occurred.”
  • He then requests that “If this is in fact one of your cases, could you please entertain either having the Detective submit a new PCA and seal the old one, or at minimum instruct the detectives for future cases, regarding the fact that it is unnecessary to provide investigative means to anyone outside of law enforcement, especially in a public document.” Capt. Robert Estrada, at the North Port Police Department, later confirmed in an email, “[W]e have changed the PCA within the agency after consulting with the [State Attorney's Office]. The PCA that was already within the court system according to the SAO will have to remain since it has already been submitted. At some point and time the SAO will submit the changed document as an addendum. We have implemented within our detective bureau to not use this investigative tool on our documents in the future.”
  • ...1 more annotation...
  • The release of the emails showing interference by a state attorney and the U.S. Marshals Service comes two weeks after agents from the Marshals Service took the extraordinary measure of seizing other public documents related to stingrays from the Sarasota Police Department in order to prevent the ACLU from examining them. The documents, which were responsive to a FOIA request seeking information about Sarasota’s use of the devices, had been set aside for ACLU attorneys to examine in person. But hours before they arrived for the appointment to view the documents, someone from the Marshals Service swooped in to seize the documents and cart them to another location. ACLU staff attorney Nathan Freed Wessler called the move “truly extraordinary and beyond the worst transparency violations” the group has seen regarding documents detailing police use of the technology.
  •  
    Unfortunately for the cops, stingrays also provide location information. See http://www.wired.com/2014/03/harris-stingray-nda/ That brings them directly within the scope of a ruling a few days ago by the Eleventh U.S. Circuit Court of Appeals (territory includer Florida) that law enforcement must obtain a warrant based on probable cause to believe that a crime has occurred in order to use a device that provides location data. http://www.ca11.uscourts.gov/opinions/ops/201212928.pdf
Paul Merrell

War Comes Home: The Excessive Militarization of American Policing | American Civil Libe... - 0 views

  • All across the country, heavily armed SWAT teams are raiding people’s homes in the middle of the night, often just to search for drugs. It should enrage us that people have needlessly died during these raids, that pets have been shot, and that homes have been ravaged. Our neighborhoods are not warzones, and police officers should not be treating us like wartime enemies. Any yet, every year, billions of dollars’ worth of military equipment flows from the federal government to state and local police departments. Departments use these wartime weapons in everyday policing, especially to fight the wasteful and failed drug war, which has unfairly targeted people of color. As our new report makes clear, it’s time for American police to remember that they are supposed to protect and serve our communities, not wage war on the people who live in them.
  • t is widely known that policing tactics across the country often unfairly target communities of color. According to our investigation, the use of paramilitary weapons and tactics appears to be no different. These maps show the distribution of SWAT raids by racial composition of neighborhoods in two cities, but this trend is echoed nationwide. Read the complete report for more.
  • It’s not uncommon for SWAT teams to brutalize bystanders in their search for a suspect. One family in Atlanta was woken up in the middle of the night when officers burst into their home and threw a flashbang grenade into the playpen where a toddler was sleeping. This is their story.  
  • ...3 more annotations...
  • Nearly 80% of the SWAT raids the ACLU studied were conducted to serve search warrants, usually in drug cases. With public support for the War on Drugs at an all-time low, police are using hyper-aggressive, wartime tools and tactics to fight a war that has lost its public mandate.
  • Hyper-aggressive policing won’t go away simply by identifying a couple “bad apples” or dismissing the problem as a few isolated instances. As this map makes clear, excessive militarization is a nationwide trend.
  • Not every situation requires 20 heavily armed SWAT officers and an armored personnel carrier. And yet, we collected reports of full deployments to homes where no contraband was found, where there was no clear reason for thinking the people inside would be armed or awake, and where children and the elderly were present. We need to ensure that hyper-aggressive tools and tactics are only used in situations where they are truly necessary to protect people. It’s also time to push for greater transparency and ensure that the federal government is not incentivizing the militarization of our state and local police.
Gary Edwards

Welcome to Post-Constitution America - Peter Van Buren - 0 views

  • On July 30, 1778, the Continental Congress created the first whistleblower protection law, stating “that it is the duty of all persons in the service of the United States to give the earliest information to Congress or other proper authority of any misconduct, frauds, or misdemeanors committed by any officers or persons in the service of these states.”
  • Two hundred thirty-five years later, on July 30, 2013, Bradley Manning was found guilty on 20 of the 22 charges for which he was prosecuted, specifically for “espionage” and for videos of war atrocities he released, but not for “aiding the enemy.”
  • Days after the verdict, with sentencing hearings in which Manning could receive 136 years of prison time ongoing, the pundits have had their say. The problem is that they missed the most chilling aspect of the Manning case: the way it ushered us, almost unnoticed, into post-Constitutional America.
  • ...22 more annotations...
  • As at Guantanamo, rules of evidence reaching back to early
  • During the months of the trial, the U.S. military refused to release official transcripts of the proceedings. Even a private courtroom sketch artist was barred from the room. Independent journalist and activist Alexa O’Brien then took it upon herself to attend the trial daily, defy the Army, and make an unofficial record of the proceedings by hand. Later in the trial, armed military police were stationed behind reporters listening to testimony. Above all, the feeling that Manning’s fate was predetermined could hardly be avoided. After all, President Obama, the former Constitutional law professor, essentially proclaimed him guilty back in 2011 and the Department of Defense didn’t hesitate to state more generally that “leaking is tantamount to aiding the enemies of the United States.”
  • And so to Bradley Manning. As the weaponry and technology of war came home, so did a new, increasingly Guantanamo-ized definition of justice. This is one thing the Manning case has made clear. As a start, Manning was treated no differently than America’s war-on-terror prisoners at Guantanamo and the black sites that the Bush administration set up around the world. Picked up on the “battlefield,” Manning was first kept incommunicado in a cage in Kuwait for two months with no access to a lawyer. Then, despite being an active duty member of the Army, he was handed over to the Marines, who also guard Guantanamo, to be held in a military prison in Quantico, Virginia. What followed were three years of cruel detainment, where, as might well have happened at Gitmo, Manning, kept in isolation, was deprived of clothing, communications, legal advice, and sleep. The sleep deprivation regime imposed on him certainly met any standard, other than Washington’s and possibly Pyongyang’s, for torture. In return for such abuse, even after a judge had formally ruled that he was subjected to excessively harsh treatment, Manning will only get a 112-day reduction in his eventual sentence. Eventually the Obama administration decided Manning was to be tried as a soldier before a military court. In the courtroom, itself inside a military facility that also houses NSA headquarters, there was a strikingly gulag-like atmosphere.  His trial was built around secret witnesses and secret evidence; severe restrictions were put on the press -- the Army denied press passes to 270 of the 350 media organizations that applied; and there was a clear appearance of injustice. Among other things, the judge ruled against nearly every defense motion.
  • “What constitutes due process in this case is a due process in war.”
  • Given all this, it is small comfort to know that Manning, nailed on the Espionage Act after multiple failures in other cases by the Obama administration, was not convicted of the extreme charge of “aiding the enemy.”
  • Obama administration lawyers went on to claim the legal right to execute U.S. citizens without trial or due process and have admitted to killing four Americans. Attorney General Eric Holder declared that “United States citizenship alone does not make such individuals immune from being targeted.”
  • As if competing for an Orwellian prize, an unnamed Obama administration official told the Washington Post,
  • English common law were turned upside down. In Manning’s case, he was convicted of espionage, even though the prosecution did not have to prove either his intent to help another government or that harm was caused; a civilian court had already paved the way for such a ruling in another whistleblower case. In addition, the government was allowed to label Manning a “traitor” and an “anarchist” in open court, though he was on trial for neither treason nor anarchy.
  • Similarly, full-spectrum spying is not considered to violate the Fourth Amendment and does not even require probable cause.
  • Justice can be twisted and tangled into an almost unrecognizable form and then used to send a young man to prison for decades.
  • Government officials concerned over possible wrongdoing in their departments or agencies who “go through proper channels” are fired or prosecuted.
  • Government whistleblowers are commanded to return to face justice, while law-breakers in the service of the government are allowed to flee justice. CIA officers who destroy evidence of torture go free, while a CIA agent who blew the whistle on torture is locked up.
  • Thanks to the PATRIOT Act, citizens, even librarians, can be served by the FBI with a National Security Letter (not requiring a court order) demanding records and other information, and gagging them from revealing to anyone that such information has been demanded or such a letter delivered.
  • Citizens may be held without trial, and denied their Constitutional rights as soon as they are designated “terrorists.” Lawyers and habeas corpus are available only when the government allows.
  • The war on whistleblowers is metastasizing into a war on the First Amendment.
  • People may now be convicted based on secret testimony by unnamed persons.
  • Military courts and jails can replace civilian ones.
  • An Obama administration Insider Threat Program requires federal employees (including the Peace Corps) to report on the suspicious behavior of coworkers.
  • Claiming its actions lawful while shielding the “legal” opinions cited, often even from Congress, the government can send its drones to assassinate its own citizens.
  • One by one, the tools and attitudes of the war on terror, of a world in which the “gloves” are eternally off, have come home.
  • The comic strip character Pogo’s classic warning -- “We have met the enemy and he is us” -- seems ever less like a metaphor.
  • According to the government, increasingly we are now indeed their enemy.
  •  
    Well written and researched article describing what it means to live in a post-Constitutional America.  Chilling facts with a cold but obvious conclusion.
Paul Merrell

US Military Uses IMF and World Bank to Launder 85% of Its Black Budget | Global Researc... - 1 views

  • hough transparency was a cause he championed when campaigning for the presidency, President Obama has largely avoided making certain defense costs known to the public. However, when it comes to military appropriations for government spy agencies, we know from Freedom of Information Act requests that the so-called “black budget” is an increasingly massive expenditure subsidized by American taxpayers. The CIA and and NSA alone garnered $52.6 billion in funding in 2013 while the Department of Defense black ops budget for secret military projects exceeds this number. It is estimated to be $58.7 billion for the fiscal year 2015. What is the black budget? Officially, it is the military’s appropriations for “spy satellites, stealth bombers, next-missile-spotting radars, next-gen drones, and ultra-powerful eavesdropping gear.” However, of greater interest to some may be the clandestine nature and full scope of the black budget, which, according to analyst Catherine Austin Fitts, goes far beyond classified appropriations. Based on her research, some of which can be found in her piece “What’s Up With the Black Budget?,” Fitts concludes that the during the last decade, global financial elites have configured an elaborate system that makes most of the military budget unauditable. This is because the real black budget includes money acquired by intelligence groups via narcotics trafficking, predatory lending, and various kinds of other financial fraud.
  • The result of this vast, geopolitically-sanctioned money laundering scheme is that Housing and Urban Devopment and other agencies are used for drug trafficking and securities fraud. According to Fitts, the scheme allows for at least 85 percent of the U.S. federal budget to remain unaudited. Fitts has been researching this issue since 2001, when she began to believe that a financial coup d’etat was underway. Specifically, she suspected that the banks, corporations, and investors acting in each global region were part of a “global heist,” whereby capital was being sucked out of each country. She was right.
  • As Fitts asserts, “[She] served as Assistant Secretary of Housing at the US Department of Housing and Urban Development (HUD) in the United States where I oversaw billions of government investment in US communities…..I later found out that the government contractor leading the War on Drugs strategy for U.S. aid to Peru, Colombia and Bolivia was the same contractor in charge of knowledge management for HUD enforcement. This Washington-Wall Street game was a global game. The peasant women of Latin America were up against the same financial pirates and business model as the people in South Central Los Angeles, West Philadelphia, Baltimore and the South Bronx.” This is part of an even larger financial scheme. It is fairly well-established by now that international financial institutions like the World Trade Organization, the World Bank, and the International Monetary Fund operate primarily as instruments of corporate power and nation-controlling infrastructure investment mechanisms. For example, the primary purpose of the World Bank is to bully developing countries into borrowing money for infrastructure investments that will fleece trillions of dollars while permanently indebting these “debtor” nations to West. But how exactly does the World Bank go about doing this? John Perkins wrote about this paradigm in his book, Confessions of an Economic Hitman. During the 1970s, Perkins worked for the international engineering consulting firm, Chas T. Main, as an “economic hitman.” He says the operations of the World Bank are nothing less than “pure economic colonization on behalf of powerful corporations and banks that use the United States government as their tool.”
  • ...1 more annotation...
  • In his book, Perkins discusses Joseph Stiglitz, the Chief Economist for the World Bank from 1997-2000, at length. Stiglitz described the four-step plan for bamboozling developing countries into becoming debtor nations: Step One, according to Stiglitz, is to convince a nation to privatize its state industries. Step Two utilizes “capital market liberalization,” which refers to the sudden influx of speculative investment money that depletes national reserves and property values while triggering a large interest bump by the IMF. Step Three, Stiglitz says, is “Market-Based Pricing,” which means raising the prices on food, water and cooking gas. This leads to “Step Three and a Half: The IMF Riot.” Examples of this can be seen in Indonesia, Bolivia, Ecuador and many other countries where the IMF’s actions have caused financial turmoil and social strife. Step 4, of course, is “free trade,” where all barriers to the exploitation of local produce are eliminated. There is a connection between the U.S. black budget and the trillion dollar international investment fraud scheme. Our government and the banking cartels and corporatocracy running it have configured a complex screen to block our ability to audit their budget and the funds they use for various black op projects. However, they can not block our ability to uncover their actions and raise awareness.
Paul Merrell

Report: US-led strikes in Iraq, Syria killed 459 civilians - 0 views

  • BAGHDAD (AP) — U.S.-led airstrikes targeting the Islamic State group in Iraq and Syria have likely killed at least 459 civilians over the past year, a report by an independent monitoring group said Monday. The report by Airwars, a project aimed at tracking the international airstrikes targeting the extremists, said it believed 57 specific strikes killed civilians and caused 48 suspected "friendly fire" deaths. It said the strikes have killed more than 15,000 Islamic State militants. While Airwars noted the difficulty of verifying information in territory held by the IS group, which has kidnapped and killed journalists and activists, other groups have reported similar casualties from the U.S.-led airstrikes. "Almost all claims of noncombatant deaths from alleged coalition strikes emerge within 24 hours — with graphic images of reported victims often widely disseminated," the report said. "In this context, the present coalition policy of downplaying or denying all claims of noncombatant fatalities makes little sense, and risks handing (the) Islamic State (group) and other forces a powerful propaganda tool."
  • The U.S. has only acknowledged killing two civilians in its strikes: two children who were likely slain during an American airstrike targeting al-Qaida-linked militants in Syria last year. That same strike also wounded two adults, according to an investigation released in May by the U.S. military. That strike is the subject of one of at least four ongoing U.S. military investigations into allegations of civilian casualties resulting from the airstrikes. Another probe into an airstrike in Syria and two investigations into airstrikes in Iraq are still pending. U.S. Army Col. Wayne Marotto, a spokesman for the coalition, did not address the report directly, but said "there is no other military in the world that works as hard as we do to be precise." "When an allegation of civilian casualties caused by Coalition forces is determined to be credible, we investigate it fully and strive to learn from it so as to avoid recurrence," he said in a statement emailed to the Associated Press.
  • Airwars said it identified the 57 strikes through reporting from "two or more generally credible sources, often with biographical, photographic or video evidence." The incidents also corresponded to confirmed coalition strikes conducted in the area at that time, it said. The group is staffed by journalists and describes itself as a "collaborative, not-for-profit transparency project." It does not offer policy prescriptions.
Paul Merrell

FBI Director: Sony's 'Sloppy' North Korean Hackers Revealed Their IP Addresses | WIRED - 0 views

  • The Obama administration has been tightlipped about its controversial naming of the North Korean government as the definitive source of the hack that eviscerated Sony Pictures Entertainment late last year. But FBI director James Comey is standing by the bureau’s conclusion, and has offered up a few tiny breadcrumbs of the evidence that led to it. Those crumbs include the claim that Sony hackers sometimes failed to use the proxy servers that masked the origin of their attack, revealing IP addresses that the FBI says were used exclusively by North Korea. Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has “very high confidence” in the FBI’s attribution of the attack to North Korea. And he named several of the sources of his evidence, including a “behavioral analysis unit” of FBI experts trained to psychologically analyze foes based on their writings and actions. He also said that the FBI compared the Sony attack with their own “red team” simulations to determine how the attack could have occurred. And perhaps most importantly, Comey now says that the hackers in the attack failed on multiple occasions to use the proxy servers that bounce their Internet connection through an obfuscating computer somewhere else in the world, revealing IP addresses that tied them to North Koreans.
  • “In nearly every case, [the Sony hackers known as the Guardians of Peace] used proxy servers to disguise where they were coming from in sending these emails and posting these statements. But several times they got sloppy,” Comey said. “Several times, either because they forgot or because of a technical problem, they connected directly and we could see that the IPs they were using…were exclusively used by the North Koreans.” “They shut it off very quickly once they saw the mistake,” he added. “But not before we saw where it was coming from.” Comey’s brief and cryptic remarks—with no opportunity for followup questions from reporters—respond to skepticism and calls for more evidence from cybersecurity experts unsatisfied with the FBI’s vague statements tying the hack to North Korean government. In a previous public announcement the FBI had said only that it found “similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” as well as IP addresses that matched prior attacks it knows to have originated in North Korea. At that time, the FBI also said it had further evidence matching the tools used in the attack to a North Korean hacking attack that hit South Korean banks and media outlets.
  • Following those elliptical statements, the cybersecurity community demanded more information be released to prove North Korea’s involvement. Some have even signed a petition on the White House website calling for more transparency in the investigation. Well-known security blogger and author Bruce Schneier has compared the FBI’s “trust us” mentality to the claims of the Bush administration about Saddam Hussein’s nonexistent weapons of mass destruction in the run-up to the Iraq War. Without more information, security experts themselves have remained deeply divided in their conclusions about who hacked Sony.
  • ...1 more annotation...
  • That pseudo-explanation will likely do little to quell the security community’s doubts. Even if the hackers appeared to fail to use proxies on some occasions, it could still be very difficult to be sure those “real” IP addresses weren’t proxies themselves designed to serve as further misdirection. And a nagging loose thread remains that the Guardians of Peace hackers in their initial statements to Sony tried to extort money from the company before making any political demands. Sony’s Kim Jong-un assassination comedy “The Interview,” the suppression of which is believed by many to be the North Korean government’s motive in the hack, wasn’t even mentioned by the hackers until long after the intrusion was underway. Comey didn’t address that plot hole in the North Korean explanation in his speech.
Paul Merrell

Tech firms and privacy groups press for curbs on NSA surveillance powers - The Washingt... - 0 views

  • The nation’s top technology firms and a coalition of privacy groups are urging Congress to place curbs on government surveillance in the face of a fast-approaching deadline for legislative action. A set of key Patriot Act surveillance authorities expire June 1, but the effective date is May 21 — the last day before Congress breaks for a Memorial Day recess. In a letter to be sent Wednesday to the Obama administration and senior lawmakers, the coalition vowed to oppose any legislation that, among other things, does not ban the “bulk collection” of Americans’ phone records and other data.
  • We know that there are some in Congress who think that they can get away with reauthorizing the expiring provisions of the Patriot Act without any reforms at all,” said Kevin Bankston, policy director of New America Foundation’s Open Technology Institute, a privacy group that organized the effort. “This letter draws a line in the sand that makes clear that the privacy community and the Internet industry do not intend to let that happen without a fight.” At issue is the bulk collection of Americans’ data by intelligence agencies such as the National Security Agency. The NSA’s daily gathering of millions of records logging phone call times, lengths and other “metadata” stirred controversy when it was revealed in June 2013 by former NSA contractor Edward Snowden. The records are placed in a database that can, with a judge’s permission, be searched for links to foreign terrorists.They do not include the content of conversations.
  • That program, placed under federal surveillance court oversight in 2006, was authorized by the court in secret under Section 215 of the Patriot Act — one of the expiring provisions. The public outcry that ensued after the program was disclosed forced President Obama in January 2014 to call for an end to the NSA’s storage of the data. He also appealed to Congress to find a way to preserve the agency’s access to the data for counterterrorism information.
  • ...3 more annotations...
  • Despite growing opposition in some quarters to ending the NSA’s program, a “clean” authorization — one that would enable its continuation without any changes — is unlikely, lawmakers from both parties say. Sen. Ron Wyden (D-Ore.), a leading opponent of the NSA’s program in its current format, said he would be “surprised if there are 60 votes” in the Senate for that. In the House, where there is bipartisan support for reining in surveillance, it’s a longer shot still. “It’s a toxic vote back in your district to reauthorize the Patriot Act, if you don’t get some reforms” with it, said Rep. Thomas Massie (R-Ky.). The House last fall passed the USA Freedom Act, which would have ended the NSA program, but the Senate failed to advance its own version.The House and Senate judiciary committees are working to come up with new bipartisan legislation to be introduced soon.
  • The tech firms and privacy groups’ demands are a baseline, they say. Besides ending bulk collection, they want companies to have the right to be more transparent in reporting on national security requests and greater declassification of opinions by the Foreign Intelligence Surveillance Court.
  • Some legal experts have pointed to a little-noticed clause in the Patriot Act that would appear to allow bulk collection to continue even if the authority is not renewed. Administration officials have conceded privately that a legal case probably could be made for that, but politically it would be a tough sell. On Tuesday, a White House spokesman indicated the administration would not seek to exploit that clause. “If Section 215 sunsets, we will not continue the bulk telephony metadata program,” National Security Council spokesman Edward Price said in a statement first reported by Reuters. Price added that allowing Section 215 to expire would result in the loss of a “critical national security tool” used in investigations that do not involve the bulk collection of data. “That is why we have underscored the imperative of Congressional action in the coming weeks, and we welcome the opportunity to work with lawmakers on such legislation,” he said.
  •  
    I omitted some stuff about opposition to sunsetting the provisions. They  seem to forget, as does Obama, that the proponents of the FISA Court's expansive reading of section 215 have not yet come up with a single instance where 215-derived data caught a single terrorist or prevented a single act of terrorism. Which means that if that data is of some use, it ain't in fighting terrorism, the purpose of the section.  Patriot Act § 215 is codified as 50 USCS § 1861, https://www.law.cornell.edu/uscode/text/50/1861 That section authorizes the FBI to obtain an iorder from the FISA Court "requiring the production of *any tangible things* (including books, records, papers, documents, and other items)."  Specific examples (a non-exclusive list) include: the production of library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person." The Court can order that the recipient of the order tell no one of its receipt of the order or its response to it.   In other words, this is about way more than your telephone metadata. Do you trust the NSA with your medical records? 
1 - 15 of 15
Showing 20 items per page