Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged trouble

Rss Feed Group items tagged

4More

How Russia and Germany may save Europe from war - RT Op-Edge - 0 views

  • Washington/Wall Street elites are now deep into nuclear war paranoia. A few studies at least hint at the obvious; glaring US strategic weakness. Consider some of the basics: - Russian ICBMs armed with MIRVs travel at about 18 Mach; that is way faster than anything in the US arsenal. And basically they are unbeatable. - The S-400 and S-500 double trouble; Moscow has agreed to sell the S-400 surface-to-air missile system to China; the bottom line is this will make Beijing impermeable to US air power, ICBMs and cruise missiles. Russia, for its part, is already focusing on the state of the art S-500 – which essentially makes the Patriot anti-missile system look like a V-2 from WWII. - The Russian Iskander missile travels at Mach 7 – with a range of 400km, carrying a 700kg warhead of several varieties, and with a circular error probability of around five meters. Translation: an ultimate lethal weapon against airfields or logistic infrastructure. The Iskander can reach targets deep inside Europe. - And then there’s the Sukhoi T-50 PAK FA.
  • NATO clowns dreaming of a war on Russia would have to come up with an ironclad system to knock out these Iskanders. They don’t have any. Additionally, they would have to face the S-400s, which the Russians can deploy all over the spectrum. Think of a hefty batch of S-400s positioned at the Russian exclave of Kaliningrad; that would turn NATO air operations deep inside Europe into an absolutely horrendous nightmare. On top of it, good ol’ NATO fighter jets cost a fortune. Imagine the effect of hundreds of destroyed fighter jets on an EU already financially devastated and austerity-plagued to death.
  • Still assuming those NATO clowns would insist on playing war, Moscow has already made it very clear Russia would use their awesome arsenal of 5,000-plus tactical nuclear weapons - and whatever else it takes - to defend the nation against a NATO conventional attack. Moreover, a few thousand S-400 and S-500 systems are enough to block a US nuclear attack.
  • ...1 more annotation...
  • ust in case the “pivoting to Asia” gang starts harboring funny ideas about the Middle Kingdom as well, China is massively investing in bouncing lasers off satellites; satellite-hitting missiles; silent submarines that surface beside US aircraft carriers without detection; and a made in China anti-missile missile that can hit a reentering satellite moving faster than any ICBM. In a nutshell; Beijing knows the US surface fleet is obsolete - and undefendable. And needless to add, all of these Chinese modernizing developments are proceeding way faster than anything in the US.
3More

On Media Outlets That Continue to Describe Unknown Drone Victims As "Militants" - The I... - 0 views

  • It has been more than two years since The New York Times revealed that “Mr. Obama embraced a disputed method for counting civilian casualties” of his drone strikes which “in effect counts all military-age males in a strike zone as combatants…unless there is explicit intelligence posthumously proving them innocent.” The paper noted that “this counting method may partly explain the official claims of extraordinarily low collateral deaths,” and even quoted CIA officials as deeply “troubled” by this decision: “One called it ‘guilt by association’ that has led to ‘deceptive’ estimates of civilian casualties. ‘It bothers me when they say there were seven guys, so they must all be militants. They count the corpses and they’re not really sure who they are.’” But what bothered even some intelligence officials at the agency carrying out the strikes seemed of no concern whatsoever to most major media outlets. As I documented days after the Times article, most large western media outlets continued to describe completely unknown victims of U.S. drone attacks as “militants”—even though they (a) had no idea who those victims were or what they had done and (b) were well-aware by that point that the term had been “re-defined” by the Obama administration into Alice in Wonderland-level nonsense.
  • A new article in The New Yorker by Steve Coll underscores how deceptive this journalistic practice is. Among other things, he notes that the U.S. government itself—let alone the media outlets calling them “militants”—often has no idea who has been killed by drone strikes in Pakistan. That’s because, in 2008, George W. Bush and his CIA chief, Gen. Michael Hayden, implemented “signature strikes,” under which “new rules allowed drone operators to fire at armed military-aged males engaged in or associated with suspicious activity even if their identities were unknown.” The Intercept previously reported that targeting decisions can even be made on the basis of nothing more than metadata analysis and tracking of SIM cards in mobile phones.
  • The journalist Daniel Klaidman has noted that within the CIA, they “sometimes call it crowd killing….  If you don’t have positive ID on the people you’re targeting with these drone strikes.” The tactic of drone-killing first responders and rescuers who come to the scene of drone attacks or even mourners at funerals of drone victims—used by the Obama administration and designated “terror groups” alike—are classic examples. Nobody has any real idea who the dead are, but they are nonetheless routinely called “militants” by the American government and media. As international law professor Kevin Jon Heller documented in 2012, “The vast majority of drone attacks conducted by the U.S. have been signature strikes—those that target ‘groups of men who bear certain signatures, or defining characteristics associated with terrorist activity, but whose identities aren’t known.’”
18More

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
1More

Justices back air marshal who blew whistle on cutbacks - 0 views

  • A former air marshal who leaked information about agency cutbacks had a good day at the Supreme Court Tuesday, while the federal government he served had trouble convincing justices that he deserved to be fired.The result could turn out to be a rare court victory for government whistle-blowers who expose potential dangers to health or safety, even if the disclosures violate agency rules.Nearly all the justices appeared to agree that Robert MacLean was within his rights in 2003 when he leaked the fact that the Transportation Security Administration was taking air marshals off overnight flights. MacLean believed the action risked passengers' safety, and his leak to MSNBC prompted congressional criticism, leading the TSA to reverse itself.
7More

US v. Comprehensive Drug Testing, Inc., 621 F. 3d 1162 - Court of Appeals, 9th Circuit ... - 0 views

  • Concluding Thoughts
  • This case well illustrates both the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation. At the time of Tamura, most individuals and enterprises kept records in their file cabinets or similar physical facilities. Today, the same kind of data is usually stored electronically, often far from the premises. Electronic storage facilities intermingle data, making them difficult to retrieve without a thorough understanding of the filing and classification systems used—something that can often only be determined by closely analyzing the data in a controlled environment. Tamura involved a few dozen boxes and was considered a broad seizure; but even inexpensive electronic storage media today can store the equivalent of millions of pages of information. 1176*1176 Wrongdoers and their collaborators have obvious incentives to make data difficult to find, but parties involved in lawful activities may also encrypt or compress data for entirely legitimate reasons: protection of privacy, preservation of privileged communications, warding off industrial espionage or preventing general mischief such as identity theft. Law enforcement today thus has a far more difficult, exacting and sensitive task in pursuing evidence of criminal activities than even in the relatively recent past. The legitimate need to scoop up large quantities of data, and sift through it carefully for concealed or disguised pieces of evidence, is one we've often recognized. See, e.g., United States v. Hill, 459 F.3d 966 (9th Cir.2006).
  • This pressing need of law enforcement for broad authorization to examine electronic records, so persuasively demonstrated in the introduction to the original warrant in this case, see pp. 1167-68 supra, creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant. The problem can be stated very simply: There is no way to be sure exactly what an electronic file contains without somehow examining its contents—either by opening it and looking, using specialized forensic software, keyword searching or some other such technique. But electronic files are generally found on media that also contain thousands or millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there. Once a file is examined, however, the government may claim (as it did in this case) that its contents are in plain view and, if incriminating, the government can keep it. Authorization to search some computer files therefore automatically becomes authorization to search all files in the same sub-directory, and all files in an enveloping directory, a neighboring hard drive, a nearby computer or nearby storage media. Where computers are not near each other, but are connected electronically, the original search might justify examining files in computers many miles away, on a theory that incriminating electronic data could have been shuttled and concealed there.
  • ...3 more annotations...
  • The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. For example, many people no longer keep their email primarily on their personal computer, and instead use a web-based email provider, which stores their messages along with billions of messages from and to millions of other people. Similar services exist for photographs, slide shows, computer code and many other types of data. As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google's email servers to look for a few incriminating messages could jeopardize the privacy of millions. It's no answer to suggest, as did the majority of the three-judge panel, that people can avoid these hazards by not storing their data electronically. To begin with, the choice about how information is stored is often made by someone other than the individuals whose privacy would be invaded by the search. Most people have no idea whether their doctor, lawyer or accountant maintains records in paper or electronic format, whether they are stored on the premises or on a server farm in Rancho Cucamonga, whether they are commingled with those of many other professionals 1177*1177 or kept entirely separate. Here, for example, the Tracey Directory contained a huge number of drug testing records, not only of the ten players for whom the government had probable cause but hundreds of other professional baseball players, thirteen other sports organizations, three unrelated sporting competitions, and a non-sports business entity—thousands of files in all, reflecting the test results of an unknown number of people, most having no relationship to professional baseball except that they had the bad luck of having their test results stored on the same computer as the baseball players.
  • Second, there are very important benefits to storing data electronically. Being able to back up the data and avoid the loss by fire, flood or earthquake is one of them. Ease of access from remote locations while traveling is another. The ability to swiftly share the data among professionals, such as sending MRIs for examination by a cancer specialist half-way around the world, can mean the difference between death and a full recovery. Electronic storage and transmission of data is no longer a peculiarity or a luxury of the very rich; it's a way of life. Government intrusions into large private databases thus have the potential to expose exceedingly sensitive information about countless individuals not implicated in any criminal activity, who might not even know that the information about them has been seized and thus can do nothing to protect their privacy. It is not surprising, then, that all three of the district judges below were severely troubled by the government's conduct in this case. Judge Mahan, for example, asked "what ever happened to the Fourth Amendment? Was it ... repealed somehow?" Judge Cooper referred to "the image of quickly and skillfully moving the cup so no one can find the pea." And Judge Illston regarded the government's tactics as "unreasonable" and found that they constituted "harassment." Judge Thomas, too, in his panel dissent, expressed frustration with the government's conduct and position, calling it a "breathtaking expansion of the `plain view' doctrine, which clearly has no application to intermingled private electronic data." Comprehensive Drug Testing, 513 F.3d at 1117.
  • Everyone's interests are best served if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment. Tamura has provided a workable framework for almost three decades, and might well have sufficed in this case had its teachings been followed. We have updated Tamura to apply to the daunting realities of electronic searches. We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.
  •  
    From a Ninth U.S. Circuit Court of Appeals en banc ruling in 2010. The Court's holding was that federal investigators had vastly overstepped the boundaries of multiple subpoenas and a search warrant --- and the Fourth Amendment --- by seizing records of a testing laboratory and reviewing them for information not described in the warrant or the subpoenas. At issue in this particular case was the government's use of a warrant that found probable cause to believe that the records contained evidence that steroids had been found in the urine of ten major league baseball players but searched the seized records for urine tests of other baseball players. The Court upheld the lower courts' rulings that the government was required to return all records other than those relevant to the ten players identified in the warrant. (The government had instead used the records of other player's urine tests to issue subpoenas for evidence relevant to those players potential use of steroids.) This decision cuts very heavily against the notion that the Fourth Amendment allows the bulk collection of private information about millions of Americans with or without a warrantor court order on the theory that some of the records *may* later become relevant to a lawful investigation.   Or rephrased, here is the en banc decision of the largest federal court of appeals (as many judges as most other federal appellate courts combined), in direct disagreement with the FISA Court orders allowing bulk collection of telephone records and bulk "incidental" collection of Americans' telephone conversations on the theory that the records *might* become relevant to national security investigations. Yet none of the FISA judges in any of the FISA opinions published thus far even cited, let alone distinguished, this Ninth Circuit en banc decision. Which says a lot of the quality of the legal research performed by the FISA Court judges. However, this precedent is front and center in briefs filed with the Ni
5More

Looking at Armenian-Iranian Relations Through a Russian Lens « LobeLog - 0 views

  • The late January visit to Armenia by Iranian Foreign Minister Javad Zarif got little media attention, but it could have significant ramifications for geopolitics in Eurasia. Specifically, the trip could help Russia gain a trade outlet that softens the blow of Western sanctions.
  • Most significantly, Zarif said Iran has “no restrictions” in developing ties with Armenia, highlighting two areas in particular – transportation and trade. On both fronts, the role of Russia looms large. First, both Tehran and Yerevan have emphasized the need to make progress on the construction of the Southern Armenia Railway, a project that would better link the two countries. On the issue of trade, Zarif praised Armenia’s accession to the Russia-dominated Eurasian Economic Union (EEU) and pointed to it as a potentially important development for Iran.
  • a Russian angle to the construction of the Southern Armenia Railway is apparent. As Prime Minister Abrahamyan put it, “Iran and Armenia can jointly produce agricultural products and export them to Eurasia” via the proposed rail project. However, both Moscow and Tehran evidently have much greater ambitions than just providing an outlet to and from the small Armenian market. Iran’s trade with Armenia is only about $300 million per year, a tiny share of its overall trade. The 470-km rail project, which was first proposed in 2010 and has remained largely on the drawing board since then, is seen as a missing link in a North-South Eurasian trade corridor connecting the Persian Gulf to the Black Sea. Its construction would give both Iran and Russia an important alternative outlet for trade. The significance of the project is also reflected in President Vladimir Putin’s announcement back in September 2013 to contribute $429 million in financing for the multi-billion-dollar rail project. Given its current economic woes, there is no longer a guarantee that Russia could follow through on Putin’s pledge. Still, Russian diplomatic and economic interests in Iran are intensifying.
  • ...2 more annotations...
  • The statements made during Zarif’s trip to Yerevan are better understood when Russia’s regional role is taken into account. Since Armenia regained independence in 1991, Russia has served as a geopolitical protector for Yerevan. And thanks to the EEU and to Russia’s acquisition of strategic economic assets in Armenia over the past decade, the Kremlin is in position to play economic kingmaker for the South Caucasus country. Meanwhile, Iran has played a complementary role to that of Russia as far as Armenia is concerned. Tehran has served as Armenia’s most reliable trade outlet to the world since 1994, when Turkey and Azerbaijan imposed a blockade. In addition, Iran has tended to favor Armenia, and not fellow Shia Azerbaijan, in the search for a lasting political settlement to the Nagorno-Karabakh conflict. Two factors are driving Iran’s desire for closer ties to Armenia. First, Tehran has from early on resented Azerbaijan’s relatively strong relationship with the United States and European Union, and is particularly alarmed by Baku’s growing contacts with Israel. While Iranian-Azerbaijani relations have improved in recent months, Tehran remains wary of Baku’s intentions.
  • Second, Tehran has made a strategic decision not to challenge or upset Russian interests in Moscow’s self-defined “near abroad.” For Iran, Russian goodwill is important in light of Tehran’s troubled relations with the Western world. Ultimately, when it comes to Armenia, Iran has pursued a policy that is deferential to Russian interests. In cases where Russians interests have been at stake – when, for example, Iran and Armenia pursued joint energy projects that would circumvent Moscow – the Iranians have been quick to back down in the face of Kremlin opposition. These days, when it comes to Iranian-Armenian ties, Russian calculations are straightforward: given the rising tension between Moscow and the West over Ukraine, the Kremlin wants to secure alternative trade partners. As long as Russia believes closer Armenian-Iranian ties serve its interests, the momentum that Zarif and his hosts in Yerevan spoke about stands a good chance of building.
1More

When Silencing Dissent Isn't News :  Information Clearing House - ICH - 0 views

  • The criminal case against ex-CIA analyst Ray McGovern for “resisting arrest” when he was denied entry to a public speech by retired Gen. David Petraeus appears to be nearly over, but the image of police brutally shielding the mighty from a citizen’s question remains troubling, writes Robert Parry.
3More

Iceland convicts bad bankers and says other nations can act | Reuters - 0 views

  • Iceland's Supreme Court has upheld convictions of market manipulation for four former executives of the failed Kaupthing bank in a landmark case that the country's special prosecutor said showed it was possible to crack down on fraudulent bankers. Hreidar Mar Sigurdsson, Kaupthing's former chief executive, former chairman Sigurdur Einarsson, former CEO of Kaupthing Luxembourg Magnus Gudmundsson, and Olafur Olafsson, the bank's second largest shareholder at the time, were all sentenced on Thursday to between four and five and a half years.The verdict is the heaviest for financial fraud in Iceland's history, local media said. Kaupthing collapsed under heavy debts after the 2008 financial crisis and the four former executives now live abroad. Though they sometimes returned to Iceland to collaborate with the court investigation, none were present on Thursday.Iceland's government appointed a special prosecutor to investigate its bankers after the world's financial systems were rocked by the discovery of huge debts and widespread poor corporate governance. He said Thursday's ruling was a signal to countries slow to pursue similar cases that no individual was too big to be prosecuted.
  • "This case...sends a strong message that will wake up discussion," special prosecutor Olafur Hauksson told Reuters. "It shows that these financial cases may be hard, but they can also produce results."Not all of Iceland's prosecutions have succeeded. But the country's efforts contrast with the United States and particularly Europe, where though some banks have been fined, few executives have been tried and voters suffering post-crisis austerity conditions feel bankers got off lightly.A recent scandal at the Swiss private bank of Europe's biggest lender HSBC has highlighted the controversy again and sparked a political row about whether the bank did enough to pursue possible tax dodgers..
  • Iceland struggled initially to appoint a special prosecutor. Hauksson, 50, a policeman from a small fishing village, was encouraged to put in for the job after the initial advertisement drew no applications. Nor have all of his prosecutions been trouble-free: two former bank executives were acquitted in one case, while sentences imposed on others have been criticized for being too light.However, Icelandic lower courts have convicted the chief executives of all three of its largest banks for their responsibility in a crisis that prosecutors said highlighted the operations of a club of wealth financiers in a country of just 320,000 people.They also convicted former chief executives of two other major banks, Glitnir and Landsbanki, for charges ranging from fraud and market manipulation.Parliament relaxed bank secrecy laws in Iceland to help the prosecutors investigate bank documents without court orders."Why should we have a part of our society that is not being policed or without responsibility?" Hauksson said. "It is dangerous that someone is too big to investigate - it gives a sense there is a safe haven."Seven criminal cases involving bankers have made it to the Supreme Court, which upheld six of them. Five more, including cases of CEOs - are due to be heard by the top court. Another 14 cases are awaiting possible prosecution, Hauksson said.
8More

Yellowstone Oil Spills Expose Threat to Pipelines Under Rivers Nationwide | Inside Clim... - 0 views

  • At the time the Poplar pipeline ruptured, about 110 feet of it was completely uncovered along the bottom of the Yellowstone River, exposing it to damage.
  • Bridger Pipeline LLC was so sure its Poplar oil line was safely buried below the Yellowstone River that it planned to wait five years to recheck it. But last month, 3.5 years later, the Poplar wasn't eight feet under the river anymore. It was substantially exposed on the river bottom—and leaking more than 30,000 gallons of oil upstream from Glendive, Montana. An ExxonMobil pipeline wasn't buried deeply enough for the Yellowstone River, either. High floodwaters in 2011 uncovered the Silvertip pipe, leaving it defenseless against the fast-moving current and traveling debris. It broke apart in July, and sent 63,000 gallons of oil into the river near Laurel, Montana.
  • Both companies underestimated the river's power and its penchant for scouring away the earth that's covering and protecting their pipelines. That miscalculation led to the Exxon Silvertip spill and it's likely to be declared a significant factor, at a minimum, in the Poplar spill. Such misjudgments have potentially troubling implications nationwide, since pipelines carrying crude oil and petroleum products pass beneath rivers and other bodies of water in more than 18,000 places across America. Many of them are buried only a few feet below the water. "There were a lot of people who wanted to think that the last pipeline spill in the Yellowstone River in 2011 was a freak accident that would never happen again. After this most recent spill, no one believes that anymore," said Scott Bosse, Northern Rockies director for American Rivers. "The truth is, there are probably hundreds of pipelines across the country that are at considerable risk of rupturing under our rivers."
  • ...4 more annotations...
  • While corrosion is the No. 1 cause of pipeline spills, a sizable number of pipelines at water crossings have ruptured or been endangered by river scour. Among them: ► The Poplar (Jan. 2015) and Silvertip (July 2011) pipeline failures on the Yellowstone River. ► More than 20 pipeline river crossings in Montana were found to be "dangerously close to exposure" during inspections of nearly 90 pipeline crossings in 2011, according to one report. Many of them have since been reburied significantly deeper. The Poplar pipeline was not among the crossings tagged as being close to exposure. ► Nearly half of the 55 oil and gas pipelines that cross the Missouri River were found to have sections buried 10 feet or less below the riverbed, according to the Wall Street Journal. A study by the U.S. Geological Survey, meanwhile, found that the Missouri riverbed had deepened by nine to 41 feet in 27 places because of severe scouring during the 2011 floods. ► An Enterprise Products Partners LLP pipeline that was uncovered by river scouring and ruptured in August 2011. The line spilled more than 28,350 gallons of a gasoline additive into the Missouri River in Iowa. ► A June 2012 spill in Alberta, Canada, where an oil pipeline owned by Plains Midstream Canada failed along the Red Deer River and released more than 122,000 gallons of light crude. Investigators concluded that the pipe was uncovered by scour during high flood waters and subjected to vibrations from the river flow that led a weld to fail.
  • Three Enbridge Corp. crude oil pipelines crossing Minnesota's Tamarac River were exposed by floodwater erosion years ago, and were still exposed in mid-2014. None of the pipes had failed at that point, but one was being propped up by steel legs, according to an MPR News account. Federal regulations aren't much help. The only rule that addresses pipe burial at major river crossings requires petroleum pipelines to be laid at least four feet below the riverbed at the time of construction. Once a pipeline's installed, there are no requirements regarding burial depth. There is no rule requiring exposed pipelines to be reburied, though a spill under those conditions would invite regulatory penalties for leaving the line exposed to hazards. What's more, federal rules put the pipeline companies in charge of identifying all threats that could cause a spill in highly populated or environmentally sensitive areas, and the companies get wide latitude in deciding what to do about them, according to Rebecca Craven, program manager at the Pipeline Safety Trust, a nonprofit group that tracks pipeline risks and regulations.
  • Indeed, the required four-foot minimum initial burial depth for pipelines can be completely eliminated by natural erosion over time or by a single flood event. Active free-flowing rivers can carve with enough ferocity to lower their riverbeds by 20 feet or shift the waterway onto an entirely new path, which can add new stresses to the pipeline or put the river over pipe that has less cover or lacks reinforcement or protective cement casings. The hotly debated Keystone XL oil pipeline project would cross nearly 2,000 rivers, streams and reservoirs in Montana, South Dakota and Nebraska, according to one estimate. The route takes the pipe across the Missouri and Yellowstone rivers, where owner TransCanada has pledged to install the pipeline 35 feet below the riverbeds.
  • See Also: Ruptured Yellowstone Oil Pipeline Was Built With Faulty Welding in 1950sIce Hinders Cleanup of Yellowstone Oil Pipeline SpillExxon Overlooked, Masked Safety Threats in Years Before Pegasus Pipeline BurstDilbit in Exxon's Pegasus May Have Contributed to Pipeline's Rupture
  •  
    One of the hidden costs of oil dependence. 
2More

Germany Gives Greece Just Enough Rope: Varoufakis Says If Troika Rejects Reforms "The D... - 0 views

  • As usual, the fine print of any European "deal" is revealed not only after the agreement, but after the US market close. So for all those waiting for the real punchline, here it is - it also is the reason why Greece got until Monday to reveal the list of "reforms" it would undertake: "We’re in trouble next week if creditors don’t accept Greece’s reforms", Greek Finance Minister Yanis Varoufakis says. "If our list of reforms is not backed by the institutions, this agreement is dead and buried." That's bad. But... "But it’s not going to be knocked down by the institutions." For his sake, let's hopes he is correct in predicting what the Troika, pardon, Institutions will do. Because this is precisely what Schauble meant when he said that the "Greeks Certainly Will Have A Difficult Time To Explain The Deal To Their Voters": under the conditionality of the Troika's approval, the Tsipras government now has to walk back essentially all the promises it made to the Greek people - promises which by some accounts amount to over €20 billion in additional spending - or the Troika, pardon Institutions, will yank the entire deal and the Grexit can then commence. And that's the bottom line.
  • It's also the reason Schauble was gloating: because he gave the Greek government just enough rope with which to hang itself. Then again, if and when the Tsirpas government is booted out next once the Greek euphoria turns to disgust and disillusionment, does Germany really want to negotiate with Golden Dawn instead?
4More

Google warns of US government 'hacking any facility' in the world | Technology | The Gu... - 0 views

  • Google is boldly opposing an attempt by the US Justice Department to expand federal powers to search and seize digital data, warning that the changes would open the door to US “government hacking of any facility” in the world. In a strongly worded submission to the Washington committee that is considering the proposed changes, Google says that increasing the FBI’s powers set out in search warrants would raise “monumental and highly complex constitutional, legal and geopolitical concerns that should be left to Congress to decide”. The search giant warns that under updated proposals, FBI agents would be able to carry out covert raids on servers no matter where they were situated, giving the US government unfettered global access to vast amounts of private information.
  • In particular, Google sounds the alarm over the FBI’s desire to “remotely” search computers that have concealed their location – either through encryption or by obscuring their IP addresses using anonymity services such as Tor. Those government searches, Google says, “may take place anywhere in the world. This concern is not theoretical. ... [T]he nature of today’s technology is such that warrants issued under the proposed amendment will in many cases end up authorizing the government to conduct searches outside the United States.”
  • The Justice Department itself has tried to assuage anxieties about its proposed amendment. In its comment to the committee, DoJ officials say that federal agents would only request the new type of warrants where there was “probable cause to search for or seize evidence, fruits, or instrumentalities of crime”. But civil liberties and legal groups remain unconvvinced, insisting that the language is so vaguely worded that it would have draconian and global implications. In its submission, the American Civil Liberties Union said that the proposed changes could violate the fourth amendment of the US constitution, which bans unreasonable searches and seizures. The ACLU’s principal technologist, Christopher Soghoian, said: “The government is seeking a troubling expansion of its power to surreptitiously hack into computers, including using malware. Although this proposal is cloaked in the garb of a minor procedural update, in reality it would be a major and substantive change that would be better addressed by Congress.”
  •  
    Fourth Amendment: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and *particularly* describing *the place to be searched,* and the persons or things to be seized." The Justice Department proposed amendment to the rules would abolish the emphasized portion of the Amendment, substituting in its place the "general warrant" that the Amendment was intended to forbid. I'm coming to realize more and more that it's my own government, not terrorists™, that needs more surveillance.  
6More

What Sanctions? The Russian Economy Is Growing Again - 0 views

  • Six months ago, the price of oil—the lifeblood of the Russian economy—began to crater, and U.S.-led sanctions, implemented in the wake of Russia’s annexation of Crimea in Ukraine, were biting. Russia’s currency, the ruble, buckled, and capital flight began to accelerate as rich but nervous Russians moved more and more money out of the country. It seemed plausible then to wonder: Could Vladimir Putin be losing his grip? Might economic pressure be enough to rein him in, or even lead to his downfall?Today, the answer is becoming clear—and it’s not the one the West was hoping for. Not only is Putin still standing, but the Russian economy, against most expectations, is recovering. Its stock market is one of the best performing globally this year; the ruble, after losing nearly half its value against the dollar over the course of a year, is rebounding; interest rates have come down from their post-sanctions peak; the government is taking in more revenue than its own forecast expected; and foreign exchange reserves have risen nearly $10 billion from their post-crisis low.
  • The lower price of oil still hurts. Citicorp economists estimate that every $10 decline in the price of Brent crude shaves 2 percent from Russia’s gross domestic product (GDP). Further declines—not out of the question, given that Saudi Arabia, the world’s largest and lowest-cost producer, is still pumping record amounts of crude—will crimp growth even more. But those same Citicorp economists forecast that GDP, after contracting for the past 18 months, could now begin to grow at up to 3.5 percent per year, even without a recovery in crude prices.
  • Though better run than many Russian firms, Severstal is not an outlier. According to data from Bloomberg, some 78 percent of Russian companies on the MICEX index showed greater revenue growth in the most recent quarter than their global peers did. And Russian companies on the whole are now more profitable than their peers on the MSCI Emerging Markets index.What’s bailing out Moscow? For the second time in two decades, Russia is showing that while a sharp drop in its currency’s value does bring financial pain—it raises prices for imports and makes any foreign debt Russia or its companies have taken on that much more expensive in ruble terms—it also eventually produces textbook economic benefits. Since a devaluation raises import prices, it also paves the way for what economists call “import substitution,” a clunky way to say that consumers switch to buying less pricey products produced at home instead of imported goods.
  • ...3 more annotations...
  • For companies such as Severstal, which exports nearly 20 percent of its output, the benefits of devaluation are obvious: All of the costs that go into producing steel in Russia—iron ore, manganese, nickel, labor, electricity—are priced in rubles. That means the companies’ costs relative to their international competitors’ have plummeted. At the same time, any steel they sell abroad is priced in either U.S. dollars or euros—both of which have risen in value against the ruble. When the companies bring those sales dollars home, they are worth far more in rubles than they were a year ago.The same phenomenon applies in a big way to Russia’s vast energy sector. Moscow exports huge amounts of oil and gas, and brings in dollars for it. That’s why Rosneft, a huge oil producer with close ties to Putin’s Kremlin, reported a revenue increase of 18 percent last year, compared with an increase of less than 1 percent for its international competitors, according to Bloomberg data. This is a big part of the reason why Russia’s tax revenue has not fallen off a cliff, mitigating somewhat the pain of last year’s crisis. Russia’s oil output is still near record highs—one of the reasons, along with continued full-tilt Saudi output, that prices remain so weak.
  • The world shouldn’t have been surprised by what has happened. More or less the same thing happened in 1998, when the Asian financial crisis spread to Russia and Moscow both defaulted on its international debt and devalued the ruble. There was an immediate negative economic shock, followed by an import substitution-led recovery that was sharper than most international economists at the time believed would occur. “This argues for an economic recovery now similar in nature, if not necessarily in magnitude, to the one after 1998,” says Ivan Tchakarov, an economist at Citicorp.
  • When oil prices crumbled last year, there was a fair bit of hope in Western capitals that the pain would do what sanctions hadn’t yet: force a Russian climbdown in Ukraine, and perhaps prompt Putin to turn back inward and tend to his troubles at home.Maybe that was wishful thinking. Whatever the case, it’s now a moot point. The Russian economy is showing enough resilience that it appears unlikely to check Putin’s behavior abroad. Public opinion surveys at home provide little evidence that the people have turned on him. For Washington and its allies, the time for wishful thinking is over. Vladimir Putin is not going anywhere. 
3More

Barack Obama's top aide says Israeli 'occupation' must end - Edward-Isaac Dovere - POLI... - 0 views

  • White House Chief of Staff Denis McDonough made clear in a speech to a left-leaning Israel advocacy group that President Barack Obama isn’t letting Israeli Prime Minister Benjamin Netanyahu off the hook for his dismissal of a two-state solution. That stance, as well as Netanyahu’s suggestion also made in the closing days before last week’s Israeli elections that he’d approved settlements in contested territory in Jerusalem for the strategic purpose of changing the borders are “so very troubling,” McDonough told J Street’s annual conference in Washington. He called the pro-Israel group, which opposes some of Netanyahu’s policies, “our partner.” Story Continued Below McDonough added that the White House isn’t impressed by Netanyahu’s efforts since last Tuesday to backtrack on what he meant when he said there wouldn’t be a Palestinian state established so long as he’s prime minister. “We cannot simply pretend that these comments were never made,” McDonough said.
  • McDonough said the Obama administration is well aware of the regional security problems Netanyahu referenced in explaining why he didn’t see a two-state solution as an imminent possibility. But he said Obama does not believe that is or could be reason to back off talks — and this is not simply matter of personal “pique” about Netanyahu, the chief of staff said. “The United States will never stop working for a two-state solution and a lasting peace that Israelis and Palestinians so richly deserve,” he said. McDonough then described the alternate to a two-state agreement: a one-state solution based on unilateral annexation and abandonment of democratic rights for Palestinians that, he warned, “would only contribute to Israel’s further isolation.” In other words, he said, more divestment, boycotts and efforts to delegitimize Israel in the international community. “An occupation that has lasted more than 50 years must end,” McDonough said, one of several times he brought the crowd to its feet.
7More

Senior Defense Dept. officials decry Guantánamo judge's female guard ban | Mi... - 0 views

  • The Pentagon’s top two leaders on Tuesday decried as “outrageous” an Army judge’s nine-month-old ban on female guards touching the five alleged 9/11 conspirators as they move them to and from court and legal meetings.Secretary of Defense Ash Carter and Gen. Joseph Dunford Jr., chairman of the joint chiefs of staff, criticized the ban in response to a question from New Hampshire Sen. Kelly Ayotte during a Senate Armed Services Committee hearing in Washington, D.C. Ayotte and two other GOP senators visited the prison Friday, and said they met with female guards upset by the restriction.
  • “I think it is counter to the way we treat service members, including women service members, and outrage is a very good word for it,” Carter said, incorrectly attributing the ban to a federal judge — not the chief of the war court judiciary, Army Col. James L. Pohl.The five alleged Sept. 11 plotters complained through their lawyers last year that Islamic and traditional doctrine require they have no physical contact with women other than family members. They claimed that, until a year ago, prison commanders had provided the religious accommodation of not being touched by female soldiers.
  • Pentagon-paid U.S. defense attorneys got Pohl to issue an emergency, temporary restraining order against the use of female guards in January, pending testimony and legal arguments on the subject.As it happens, Pohl has listed the ban on this week’s docket for pretrial hearings in the case of the five men facing a joint death-penalty trial as the alleged plotters of the Sept. 11, 2001, terror attacks. Whether it would actually be heard, however, was unclear because the majority of the current session’s 40-item agenda has been sidelined by one alleged plotter’s interest in functioning as his own defense attorney.
  • ...3 more annotations...
  • A military lawyer for the alleged plot mastermind, Khalid Sheik Mohammed, said the remarks were troubling in light of the Senate Torture Report showing the CIA’s enhanced interrogation techniques included sexual humiliation.“These men have been subjected by the U.S. government to documented, systematic sexualized attack on their Islamic identity,” Marine Maj. Derek Poteet, Mohammed’s detailed military counsel, told the Miami Herald. “So forced touching by guards of the opposite sex is extremely inappropriate.” Poteet also called it “also extraordinarily inappropriate for these respected military and civilian leaders to inject themselves into the matters that are currently in litigation in a military commission by a military judge, raising the specter of unlawful command influence.”
  • Since the Pentagon opened the war-on-terror prison camps here in 2002, female guards routinely escorted most of the prisoners to and from appointments, classes, everything but showers. But the 9/11 defendants got here in 2006, and are segregated in the secret Camp 7 since their transfer from CIA black sites, where they were subjected to sexual humiliation.
  • Later, at a press conference, she characterized the ban as a manipulation of the U.S. legal system by “the worst of the worst.”“As the women guards at Guantánamo told us, they just want to do their jobs,” she said. “And they can’t believe that we are allowing terrorists who murdered almost 3,000 people to dictate how U.S. service members do their jobs — simply because they are women.”
  •  
    Senator Ayotte: "And they can't believe that we are allowing terrorists who murdered almost 3,000 people to dictate how U.S. service members do their jobs - simply because they are women." Hey, Senator, did you ever hear of the presumption of innocence? These guys haven't been tried and convicted. Given that they are not Israeli, I'd say they stand a fair chance of acquittal.
7More

US manoeuvre in South China Sea leaves little wiggle room with China | World news | The... - 0 views

  • Barack Obama’s decision to send a US guided missile destroyer into disputed waters off the Spratly islands in the South China Sea on Tuesday has provoked predictable outpourings of rage and veiled threats from Beijing – but nothing, yet, in the way of a military response. The worry now is that the confrontation will catch fire, escalate and spread. Both China, which claims the Spratlys as its own, and the US, which does not recognise Beijing’s sovereignty, have boxed themselves into a rhetorical and tactical corner. With the Pentagon insisting it will repeat and extend such naval patrols at will, and with the People’s Liberation Army Navy determined to stop them, it is feared a head-on collision cannot be far away. China’s heated response to Tuesday’s manoeuvre by the USS Lassen off the Spratlys’ Mischief and Subi reefs, where Beijing is controversially building military airstrips and lighthouses on reclaimed land, left it little wiggle room. The American warship had been tracked and warned off, officials said, adding that what it termed an illegal incursion was a “threat to national sovereignty” and a deliberate provocation that could backfire.
  • Anticipating the US move earlier this month, foreign ministry spokeswoman Hua Chunying said: “China will never allow any country to violate China’s territorial waters and airspace in the South China Sea.” If ever a government has publicly laid down a red line, this is it. And Obama just crossed it. Having personally failed to find a compromise in White House talks with Xi Jinping, China’s president, last month, Obama has upped the ante. As is also the case with Xi, it is now all but impossible to envisage an American climbdown without enormous loss of face and prestige. By deploying a powerful warship, by declining to inform China in advance, and by insisting the US is upholding the universal principle of free navigation in international waters and will do so again whenever and wherever it wishes, Obama has deliberately challenged Beijing to do its worst.
  • China is in dispute over other South China Sea islands and reefs with several countries that are all more or less at one with the US on the issue, including the Philippines, Vietnam and Malaysia. Renewed trouble could flare up in any of these places. One possibility is the Scarborough Shoal, claimed by Manila, where clashes have continued on and off since 2012. Another obvious pressure point is the Senkaku islands (Diaoyu in Chinese) in the East China Sea, claimed by both Japan and China. In 2013 Beijing upped the ante, unilaterally declaring an air exclusion, or identification, zone in the area, which the US promptly breached with B52 bombers. This dispute forms part of the background to the military buildup ordered by Japan’s hawkish prime minister, Shinzo Abe, who set a record £27bn defence budget this year. (China’s military budget is roughly £90bn; that of the US is about £378bn).
  • ...3 more annotations...
  • Chinese retaliation, when it comes, and it surely must, may not centre specifically on the Spratlys. There are plenty of other potential troublespots and flashpoints where Beijing might seek to give the Americans pause. In prospect is a sort of geopolitical chain reaction. A spokesman, Lu Kang, hinted at this on Tuesday: “China hopes to use peaceful means to resolve all the disputes, but if China has to make a response then the timing, method and tempo of the response will be made in accordance with China’s wishes and needs.”
  • Reacting to the perceived China threat, Abe is extending Okinawa’s defences and getting involved in South China Sea patrols in support of Washington. Japan also strengthened defence and security ties with Britain – a development that now makes David Cameron’s courtship of Beijing seem all the more incongruous. Taiwan is another powder keg that could be ignited by widening US-China confrontation. While Beijing regards Taiwan as a renegade province and seeks its return, the present-day status quo is underwritten by US military might.
  • US-China naval and aerial rivalry could expand even further afield. China is busy building a blue water fleet (a maritime force capable of operating across the deep waters of open oceans) including aircraft carriers, with the aim of challenging US dominance in the eastern Pacific. Chinese naval ships recently showed up off the Aleutian islands during an Obama visit to Alaska, the mineral-rich Arctic being another possible theatre. Meanwhile, regional western allies such as Australia have serious cause for concern that escalating superpower friction could draw them in.
  •  
    The latest Obama idiocy.
8More

Time for GOP panic? Establishment worried Carson or Trump might win. - The Washington Post - 0 views

  • Less than three months before the kickoff Iowa caucuses, there is growing anxiety bordering on panic among Republican elites about the dominance and durability of Donald Trump and Ben Carson and widespread bewilderment over how to defeat them. Party leaders and donors fear that nominating either man would have negative ramifications for the GOP ticket up and down the ballot, virtually ensuring a Hillary Rodham Clinton presidency and increasing the odds that the Senate falls into Democratic hands. The party establishment is paralyzed. Big money is still on the sidelines. No consensus alternative to the outsiders has emerged from the pack of governors and senators running, and there is disagreement about how to prosecute the case against them. Recent focus groups of Trump supporters in Iowa and New Hampshire commissioned by rival campaigns revealed no silver bullet.
  • According to other Republicans, some in the party establishment are so desperate to change the dynamic that they are talking anew about drafting Romney — despite his insistence that he will not run again. Friends have mapped out a strategy for a late entry to pick up delegates and vie for the nomination in a convention fight, according to the Republicans who were briefed on the talks, though Romney has shown no indication of reviving his interest.
  • South Carolina Gov. Nikki Haley, herself an outsider who rode the tea party wave into office five years ago, explained the phenomenon. “You have a lot of people who were told that if we got a majority in the House and a majority in the Senate, then life was gonna be great,” she said in an interview Thursday. “What you’re seeing is that people are angry. Where’s the change? Why aren’t there bills on the president’s desk every day for him to veto? They’re saying, ‘Look, what you said would happen didn’t happen, so we’re going to go with anyone who hasn’t been elected.’ ”
  • ...5 more annotations...
  • There are similar concerns about Sen. Ted Cruz of Texas, who is gaining steam and is loathed by party elites, but they are more muted, at least for now.
  • Still, the party establishment’s greatest weapon — big money — is partly on the shelf. Kenneth G. Langone, a founder of Home Depot and a billionaire supporter of New Jersey Gov. Chris Christie, said he is troubled that many associates in the New York financial community have so far refused to invest in a campaign due to the race’s volatility.
  • “Some of them are in, but too many are still saying, ‘I’ll wait to see how this all breaks,’ ” Langone said. “People don’t want to write checks unless they think the candidate has a chance of winning.” He said that his job as a ­mega-donor “is to figure out how we get people on the edge of their chairs so they start to give money.” Many of Romney’s 2012 National Finance Committee members have sat out the race so far,
  • The apprehension among some party elites goes beyond electability, according to one Republican strategist who spoke on the condition of anonymity to talk candidly about the worries. “We’re potentially careening down this road of nominating somebody who frankly isn’t fit to be president in terms of the basic ability and temperament to do the job,” this strategist said. “It’s not just that it could be somebody Hillary could destroy electorally, but what if Hillary hits a banana peel and this person becomes president?” Angst about Trump intensified this week after he made two comments that could prove damaging in a general election. First, he explained his opposition to raising the minimum wage by saying “wages are too high.” Second, he said he would create a federal “deportation force” to remove the more than 11 million immigrants living in the United States illegally. “To have a leading candidate propose a new federal police force that is going to flush out illegal immigrants across the nation? That’s very disturbing and concerning to me about where that leads Republicans,” said Dick Wadhams, a former GOP chairman in Colorado, a swing state where Republicans are trying to pick up a Senate seat next year.
  • Said Austin Barbour, a veteran operative and fundraiser now advising former Florida governor Jeb Bush: “If we don’t have the right [nominee], we could lose the Senate, and we could face losses in the House. Those are very, very real concerns. If we’re not careful and we nominate Trump, we’re looking at a race like Barry Goldwater in 1964 or George McGovern in 1972, getting beat up across the board because of our nominee.” George Voinovich, a retired career politician who rose from county auditor to mayor of Cleveland to governor of Ohio to U.S. senator, said this cycle has been vexing. “This business has turned into show business,” said Voinovich, who is backing Ohio Gov. John Kasich. “We can’t afford to have somebody sitting in the White House who doesn’t have governing experience and the gravitas to move this country ahead.”
2More

Taliban Control of Afghanistan Highest Since U.S. Invasion - NBC News - 0 views

  • America's 14-year project to defeat the Taliban and build a stable Afghanistan is teetering on the brink of failure, according to a sobering report Friday by a government watchdog. The Taliban controls more of the country than at any time since U.S. troops invaded in 2001, notes the quarterly report to Congress by the Special Inspector General for Afghanistan Reconstruction. The fragile economy is worsening. One of the few bright spots of the troubled reconstruction effort — getting more girls in school — has been tainted by allegations of fraud. "The lack of security has made it almost impossible for many U.S. and even some Afghan officials to get out to manage and inspect U.S.-funded reconstruction projects," wrote John Sopko, the inspector general. The U.S. has spent more than $113 billion on Afghan reconstruction, more in constant dollars than it spend rebuilding Western Europe after World War II under the Marshall Plan. It is on track to spend billions more, but many critics view the Afghan civilian aid effort as a wasteful failure. Sopko has examined a fraction of the spending, but his audits have uncovered $17 billion in questioned costs in just three years, according to a tally by ProPublica, the investigative group.
  •  
    The rational commander would have recognized it was mission impossible and turned it down before the war began. But the U.S. response almost beyond doubt will be to send in reinforcements. 
5More

Russia, Assad deliver blow to Turkey in Syria - Business Insider - 0 views

  • Pro-government forces in Syria have reportedly broken a rebel siege of two villages northwest of Aleppo, effectively cutting off Turkey's supply line to opposition groups operating in and around Syria's largest city. Government troops, accompanied by Iran-backed Shiite militias and Hezbollah forces, apparently reached the cities of Nubl and Zahraa with the help of heavy Russian airstrikes on Wednesday. The opposition had held these cities since 2012, according to the Institute for the Study of War. Russian airstrikes across northern Syria had been steadily shifting the epicenter of the war toward the corridor north of Aleppo since late November, in retaliation for Turkey's decision to shoot down a Russian warplane that it said violated its airspace.
  • A stepped-up Russian bombing campaign in the Bayirbucak region of northwest Syria, near the strategically important city of Azaz, had primarily targeted the Turkey-backed Turkmen rebels and civilians — and the Turkish aid convoys that supplied them. As a result, Turkey's policy in Syria of bolstering rebels fighting Syrian President Bashar Assad's regime — and establishing a "safe zone" for displaced Syrians that might hinder the regime's efforts to take Aleppo — has been unraveling for months, and now appears to have been defeated entirely.
  • "It cuts Turkey off from Aleppo via Azaz," Aaron Stein, an expert on Turkey and Senior Fellow at the Atlantic Council, told Business Insider on Wednesday. "Ankara can still access Aleppo via Reyhanli, through Idlib," Stein said in an email. But "Turkey is on the back foot in Syria and is at a disadvantage now that Russia is deterring them from flying strike missions," he added. Indeed, Turkey's ability to retaliate against the Russian bombing campaign in northern Syria was severely limited by the de facto no-fly zone Russia created in the north following Turkey's downing of the Russian warplane in November. "This has to be Turkey's weakest position in Syria in years," David Kenner, Foreign Policy magazine's Middle East editor, noted on Twitter. "Shooting down of that Russian jet was a pivot point — backfired in a major way."
  • ...2 more annotations...
  • On Twitter, Stein noted that another aspect of Turkey's Syria policy is on the brink of total collapse — namely, restricting the movements of the Kurdish YPG, with whom Turkey has clashed, to east of the Syrian city of Marea. "Weapons and aid now must be sent through Bab al Hawa via Idlib," Stein wrote. "Turkish efforts to secure Marea line in trouble. Huge implications." To Turkey's chagrin, Russian President Vladimir Putin offered to help the Kurds consolidate their territorial gains in northern Syria by linking the Kurdish-held town of Kobani with Afrin in September. He apparently began to make good on his after Turkey shot down a Russian warplane, offering to arm and support the Kurdish YPG in the name of cutting Turkey's rebel supply line to Aleppo.
  • In December, "Moscow delivered weapons to the 5,000 Kurdish fighters in Afrin, while Russian aircraft bombed a convoy of trucks that crossed the Turkish border into Syria at Bab al-Salam," the Washington Institute's Fabrice Balanche wrote in an analysis of the Azaz corridor's strategic importance. As Stein noted on Twitter, "A viable way for Kurds to connect Efrin with territory East of the Euphrates now in play. Route is out of range of TR [Turkish] artillery." Efrin is an alternative spelling for the Kurdish-held Syrian city. Aykan Erdemir, a Senior Fellow at the Foundation for Defense of Democracies and a former member of Turkish parliament, told Business Insider in December that Turkey trying to intervene to stop the Kurds' expansion westward would "undoubtedly have serious drawbacks." Any intervention, Erdemir said, "could further escalate the Turkish-Russian crisis, prompting heavier sanctions, and even new episodes of clashes between the two armies."
3More

Poll Paints Problematic Picture of Israel's Future « LobeLog - 0 views

  • The results of the very detailed Pew poll of Israeli citizens tends to confirm that the country is going in a very negative direction, particularly with respect to Arab-Jewish relations. The entire report, “Israel’s Religiously Divided Society,” bears close reading. Based on interviews with nearly 6,000 Israeli adults—Jews, Christians, Muslims, Arabs, and Druze—the poll was conducted between mid-October 2014, and last May, well before the Arab-Jewish violence that began last fall. The headline is the finding that a 48% plurality of Israeli Jews agreed with the statement, “Arabs should be expelled or transferred from Israel.” One in five (21%) said they agreed “strongly.” Only 46 percent disagreed with the proposition. More religious and less-educated Jews tended to agree in higher percentages than secular Jews. Most troubling for the future, respondents under the age of 50 tended to agree somewhat more (49-44%) than those 50 and older. (However, there has been some criticism of the vagueness of the question.) A no less disturbing finding was that 79% of Israeli Jews agreed with the proposition that Jews “deserve preferential treatment” in Israel. Although religious Jews supported that notion overwhelmingly, nearly seven out of ten self-described secular Jews also backed that notion. As Shibley Telhami (one of the many consultants who helped design the survey) pointed out after citing this result, “so much for the notion of democracy with full equal rights for all its citizens.” Indeed, if this is what Netanyahu means when he demands that Israel be recognized as “the nation state of the Jewish people,” it would be very difficult to square it with conventional notions of democratic governance or equality before the law.
  • More than three-quarters of Israeli Jews seem to be blind to this contradiction for they see democracy as compatible with the idea of a “Jewish state.” Unsurprisingly, however, nearly two-thirds of Israel’s Arab and Druse citizens disagree.
  • The poll also found a rather dramatic plunge in optimism among Arab citizens that peaceful coexistence between Israel and an independent Palestinian state is possible. In 2013, Pew found that 74% of Israeli Arabs agreed that such a possibility was real. The most recent finding (which is almost one year old now) found that only 50% of Arab citizens share that belief. That is much closer to the 43% of Jewish Israelis who believe that coexistence is possible.
5More

File Says N.S.A. Found Way to Replace Email Program - The New York Times - 0 views

  • When the National Security Agency’s bulk collection of records about Americans’ emails came to light in 2013, the government conceded the program’s existence but said it had shut down the effort in December 2011 for “operational and resource reasons.” While that particular secret program stopped, newly disclosed documents show that the N.S.A. had found a way to create a functional equivalent. The shift has permitted the agency to continue analyzing social links revealed by Americans’ email patterns, but without collecting the data in bulk from American telecommunications companies — and with less oversight by the Foreign Intelligence Surveillance Court.
  • The disclosure comes as a sister program that collects Americans’ phone records in bulk is set to end this month. Under a law enacted in June, known as the U.S.A. Freedom Act, the program will be replaced with a system in which the N.S.A. can still gain access to the data to hunt for associates of terrorism suspects, but the bulk logs will stay in the hands of phone companies.The newly disclosed information about the email records program is contained in a report by the N.S.A.’s inspector general that was obtained by The New York Times through a lawsuit under the Freedom of Information Act. One passage lists four reasons that the N.S.A. decided to end the email program and purge previously collected data. Three were redacted, but the fourth was uncensored. It said that “other authorities can satisfy certain foreign intelligence requirements” that the bulk email records program “had been designed to meet.”The report explained that there were two other legal ways to get such data. One was the collection of bulk data that had been gathered in other countries, where the N.S.A.’s activities are largely not subject to regulation by the Foreign Intelligence Surveillance Act and oversight by the intelligence court. Because of the way the Internet operates, domestic data is often found on fiber optic cables abroad.
  • The N.S.A. had long barred analysts from using Americans’ data that had been swept up abroad, but in November 2010 it changed that rule, documents leaked by Edward J. Snowden have shown. The inspector general report cited that change to the N.S.A.’s internal procedures.The other replacement source for the data was collection under the FISA Amendments Act of 2008, which permits warrantless surveillance on domestic soil that targets specific noncitizens abroad, including their new or stored emails to or from Americans.“Thus,” the report said, these two sources “assist in the identification of terrorists communicating with individuals in the United States, which addresses one of the original reasons for establishing” the bulk email records program.
  • ...2 more annotations...
  • Timothy Edgar, a privacy official in the Office of the Director of National Intelligence in both the George W. Bush and Obama administrations who now teaches at Brown University, said the explanation filled an important gap in the still-emerging history of post-Sept. 11, 2001, surveillance. Advertisement Continue reading the main story Advertisement Continue reading the main story “The document makes it clear that N.S.A. is able to get all the Internet metadata it needs through foreign collection,” he said. “The change it made to its procedures in 2010 allowed it to exploit metadata involving Americans. Once that change was made, it was no longer worth the effort to collect Internet metadata inside the United States, in part because doing so requires N.S.A. to deal with” restrictions by the intelligence court.Observers have previously suggested that the N.S.A.’s November 2010 rules change on the use of Americans’ data gathered abroad might be connected to the December 2011 end of the bulk email records program. Marcy Wheeler of the national security blog Emptywheel, for example, has argued that this was probably what happened.
  • And officials, who spoke on the condition of anonymity to discuss sensitive collection programs, have said the rules change and the FISA Amendments Act helped make the email records program less valuable relative to its expense and trouble. The newly disclosed documents amount to official confirmation.
« First ‹ Previous 181 - 200 of 220 Next ›
Showing 20 items per page