Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "update" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

UPDATE: Julian Assange of Wikileaks To Appear by Video Tomorrow Due to Assassination Concerns | Heat Street - 0 views

  • After canceling a planned announcement in London, Wikileaks founder Julian Assange is now planning to appear via video link Tuesday morning at Wikileaks’ 10th anniversary celebration in Berlin. He’s a last-minute addition to the roster of festivities taking place this week in Germany. The change in venue appears to be related to what Wikileaks is clearly implying to be a perceived threat on Assange’s life.
  • Wikileaks used its Facebook page and Twitter to confirm that Assange would speak at the event, which starts at 4am Eastern time. An information pack published by Wikileaks late last night includes a running order which schedules Assange’s appearance for 5am Eastern (11am in Berlin):
  • According to Wikileaks, the change of venue was made “due to specific information.” Wikileaks did not specify further, but Monday’s Tweet followed several in which Wikileaks alleged that the Clinton camp wants to assassinate Assange.
  • ...3 more annotations...
  • The news that Assange plans to appear (remotely) in Berlin comes after Wikileaks abruptly canceled a much-anticipated announcement in London that was to be made from the balcony of London’s Ecuadorian Embassy, where Assange has sought sanctuary for years. The cancelation was first reported by NBC News. According to NBC’s Jesse Rodriguez, the announcement was canceled due to “security concerns”. There had been widespread anticipating that Tuesday’s announcement might have been Assange’s long-promised document dump on Hillary Clinton. Assange appeared on Fox News last month, repeating his assertion that Wikileaks has damaging documents on Clinton and suggested WikiLeaks may soon release “teasers”. More than three weeks later, that release has yet to take place. Clinton’s more fervent opponents have hoped for weeks that the promised document dump would be an “October surprise” — damaging and revelatory emails or the like — and inflict a mortal wound on her campaign. There’s no evidence, however, that such damaging information even exists. It was only this summer that Assange’s group leaked thousands of embarrassing emails from the Democratic National Committee which showed their disdain for Bernie Sanders’ insurgent campaign for the Democratic presidential nomination. The uproar over the disclosures forced DNC Chairwoman Debbie Wasserman-Schultz to resign in disgrace on the eve of the Democratic National Convention.
  • Assange and his supporters have long claimed that his personal safety is at risk due to the danger he (supposedly) represents to Clinton’s presidential ambitions. Monday morning, Wikileaks via Twitter was promoting the conspiracy theory that Clinton herself has sought to rub out Assange.
  • Assange himself has also recently hinted publicly that low-level DNC staffer Seth Rich, who was murdered this summer in Washington DC, had been the source for Wikileaks’ document dump on the DNC. And that Rich’s alleged role in the leaks was linked to his death. There has been no evidence linking Rich to the leak and no evidence that his murder was anything more than a botched robbery. Nonetheless, the Wikileaks’ cancellation of Tuesday’s announcement in London — and the scheduling of the Tuesday video link in Berlin — has anti-Clinton conspiracy theorists working up a frantic stew of speculation.
  •  
    So Assange is speaking at 5 a.m. Wednesday morning East Coast tIme. Probably some headlines by 6 a.m. So 3 a.m. West Coast time. Let's hope this is Assange's October Surprise announcement for Hillary. "Specific concerns" about security on the canceled Ecuadoran Embassy speech? Well, Hillary reportedly made a specific assassination proposal for Assange. Personally, I wouldn't put it past her; the Clintons already have the blood of millions on their hands.
Paul Merrell

America, the Election, and the Dismal Tide « LobeLog - 0 views

  • I thought about that March night as the election results rolled in, as the New York Times forecast showed Hillary Clinton’s chances of winning the presidency plummet from about 80% to less than 5%, while Trump’s fortunes skyrocketed by the minute. As Clinton’s future in the Oval Office evaporated, leaving only a whiff of her stale dreams, I saw all the foreign-policy certainties, all the hawkish policies and military interventions, all the would-be bin Laden raids and drone strikes she’d preside over as commander-in-chief similarly vanish into the ether. With her failed candidacy went the no-fly escalation in Syria that she was sure to pursue as president with the vigor she had applied to the disastrous Libyan intervention of 2011 while secretary of state.  So, too, went her continued pursuit of the now-nameless war on terror, the attendant “gray-zone” conflicts — marked by small contingents of U.S. troops, drone strikes, and bombing campaigns — and all those munitions she would ship to Saudi Arabia for its war in Yemen. As the life drained from Clinton’s candidacy, I saw her rabid pursuit of a new Cold War start to wither and Russo-phobic comparisons of Putin’s rickety Russian petro-state to Stalin’s Soviet Union begin to die.  I saw the end, too, of her Iron Curtain-clouded vision of NATO, of her blind faith in an alliance more in line with 1957 than 2017. As Clinton’s political fortunes collapsed, so did her Israel-Palestine policy — rooted in the fiction that American and Israeli security interests overlap — and her commitment to what was clearly an unworkable “peace process.”  Just as, for domestic considerations, she would blindly support that Middle Eastern nuclear power, so was she likely to follow President Obama’s trillion-dollarpath to modernizing America’s nuclear arsenal.  All that, along with her sure-to-be-gargantuan military budget requests, were scattered to the winds by her ringing defeat.
  • Clinton’s foreign policy future had been a certainty.  Trump’s was another story entirely.  He had, for instance, called for a raft of military spending: growing the Army and Marines to a ridiculous size, building a Navy to reach a seemingly arbitrary and budget-busting number of ships, creating a mammoth air armada of fighter jets, pouring money into a missile defense boondoggle, and recruiting a legion of (presumably overweight) hackers to wage cyber war.  All of it to be paid for by cutting unnamed waste, ending unspecified “federal programs,” or somehow conjuring up dollars from hither and yon.  But was any of it serious?  Was any of it true?  Would President Trump actually make good on the promises of candidate Trump?  Or would he simply bark “Wrong!” when somebody accused him of pledging to field an army of 540,000 active duty soldiers or build a Navy of 350 ships. Would Trump actually attempt to implement his plan to defeat ISIS — that is, “bomb the shit out of them” and then “take the oil” of Iraq?  Or was that just the bellicose bluster of the campaign trail?  Would he be the reckless hawk Clinton promised to be, waging wars like the Libyan intervention?  Or would he follow the dictum of candidate Trump who said, “The current strategy of toppling regimes, with no plan for what to do the day after, only produces power vacuums that are filled by terrorists.” Outgoing representative Randy Forbes of Virginia, a contender to be secretary of the Navy in the new administration, recently said that the president elect would employ “an international defense strategy that is driven by the Pentagon and not by the political National Security Council… Because if you look around the globe, over the last eight years, the National Security Council has been writing that. And find one country anywhere that we are better off than we were eight years [ago], you cannot find it.”
  • Such a plan might actually blunt armed adventurism, since it was war-weary military officials who reportedly pushed back against President Obama’s plans to escalate Iraq War 3.0.  According to some Pentagon-watchers, a potentially hostile bureaucracy might also put the brakes on even fielding a national security team in a timely fashion. While Wall Street investors seemed convinced that the president elect would be good for defense industry giants like Lockheed Martin and General Dynamics, whose stocks surged in the wake of Trump’s win, it’s unclear whether that indicates a belief in more armed conflicts or simply more bloated military spending. Under President Obama, the U.S. has waged war in or carried out attacks on at least eight nations — Afghanistan, Iran, Iraq, Pakistan, Somalia, Yemen, Libya, and Syria.  A Clinton presidency promised more, perhaps markedly more, of the same — an attitude summed up in her infamous comment about the late Libyan autocrat Muammar Gaddafi: “We came, we saw, he died.”  Trump advisor Senator Jeff Sessions said, “Trump does not believe in war. He sees war as bad, destructive, death and a wealth destruction.”  Of course, Trump himself said he favors committing war crimes like torture and murder.  He’s also suggested that he would risk war over the sort of naval provocations — like Iranian ships sailing close to U.S. vessels — that are currently met with nothing graver than warning shots. So there’s good reason to assume Trump will be a Clintonesque hawk or even worse, but some reason to believe — due to his propensity for lies, bluster, and backing down — that he could also turn out to be less bellicose.
  • ...3 more annotations...
  • Given his penchant for running businesses into the ground and for economic proposals expected to rack up trillions of dollars in debt, it’s possible that, in the end, Trump will inadvertently cripple the U.S. military.  And given that the government is, in many ways, a national security state bonded with a mass of money and orbited by satellite departments and agencies of far lesser import, Trump could even kneecap the entire government.  If so, what could be catastrophic for Americans — a battered, bankrupt United States — might, ironically, bode well for the wider world.
  • At the time, I told my questioner just what I thought a Hillary Clinton presidency might mean for America and the world: more saber-rattling, more drone strikes, more military interventions, among other things.  Our just-ended election aborted those would-be wars, though Clinton’s legacy can still be seen, among other places, in the rubble of Iraq, the battered remains of Libya, and the faces of South Sudan’s child soldiers.  Donald Trump has the opportunity to forge a new path, one that could be marked by bombast instead of bombs.  If ever there was a politician with the ability to simply declare victory and go home — regardless of the facts on the ground — it’s him.  Why go to war when you can simply say that you did, big league, and you won? The odds, of course, are against this.  The United States has been embroiled in foreign military actions, almost continuously, since its birth and in 64 conflicts, large and small, according to the military, in the last century alone.  It’s a country that, since 9/11, has been remarkably content to wage winless, endless wars with little debate or popular outcry.  It’s a country in which Barack Obama won election, in large measure, due to dissatisfaction with the prior commander-in-chief’s signature war and then, after winning a Nobel Peace Prize and overseeing the withdrawal of troops from Iraq, reengaged in an updated version of that very same war — bequeathing it now to Donald J. Trump. “This Trump.  He’s a crazy man!” the African aid worker insisted to me that March night.  “He says some things and you wonder: Are you going to be president?  Really?”  It turns out the answer is yes. “It can’t happen, can it?” That question still echoes in my mind.
  • I know all the things that now can’t happen, Clinton’s wars among them. The Trump era looms ahead like a dark mystery, cold and hard.  We may well be witnessing the rebirth of a bitter nation, the fruit of a land poisoned at its root by evils too fundamental to overcome; a country exceptional for its squandered gifts and forsaken providence, its shattered promises and moral squalor. “It can’t happen, can it?” Indeed, my friend, it just did.
Paul Merrell

New WikiLeaks Trove Further Exposes TISA's Neoliberal Agenda - 0 views

  • WikiLeaks on Wednesday released a trove of documents detailing previously unknown pro-corporate provisions and updates to the Trade in Services Agreement (TISA), exposing the extent to which the U.S.-driven deal will force signatory nations to privatize public services and deregulate corporations. As the 52 nations involved in TISA comprise a full two-thirds of global GDP, the deal is poised to impact billions of lives around the world. The 18th round of negotiations on TISA resumed Thursday. Released for the very first time on Wednesday was TISA’s annex on “State-Owned Enterprises” (SOEs), which mandates that public services must be treated like private businesses. The documents reveal that the annex was introduced only two days after the U.S. successfully forced through similar text in the Trans-Pacific Partnership (TTP) in October 2015.
  • Trade expert Jane Kelsey, who teaches law at the University of Auckland, described how the U.S. pushed through such provisions in order to target other nations’ public services—and China’s in particular: When the [TPP] negotiations began in 2010 the U.S. made it clear that it required a chapter on SOEs. The goal was always to create precedent-setting rules that could target China, although the U.S. also had other countries’ SOEs in its sights—the state-managed Vietnamese economy, various countries’ sovereign wealth funds, and once Japan joined, Japan Post’s banking, insurance and delivery services. All the other countries were reluctant to concede the need for such a chapter and the talks went around in circles for several years. Eventually the U.S. had its way. “The U.S. proposal for TISA adopts and adapts key parts of the [TPP] chapter that force majority-owned SOEs to operate like private sector businesses,” Kelsey added. “The most extreme, complicated and potentially unworkable provisions in the [TPP] relating to state support are not included—yet. But there is an extraordinary power for a single TISA party to require the development of those rules if another TISA country, or a country seeking to join TISA, has too many large SOEs.”
  • Observers have long taken note of the implicitly anti-China stance of the several U.S.-backed pro-corporate “free trade” deals being negotiated now. While TISA is perhaps the least well-known of these agreements, together with the TPP and the TransAtlantic Trade and Investment Pact (TTIP), the deals “form not only a new legal order shaped for transnational corporations, but a new economic ‘grand enclosure,’ which excludes China and all other BRICS countries,” as WikiLeaks founder Julian Assange put it last year. The leaked documents also showed new, multinational-friendly updates to sections of the deal titled “Domestic Regulation,” “Transparency,” and “New Provisions.” The latest versions, argues WikiLeaks, have further advanced towards the ‘deregulation’ objectives of big corporations entering overseas markets. Local regulations like store size restrictions or hours of operations are considered an obstacle to achieve ‘operating efficiencies’ of large-scale retailing, disregarding their public benefit that foster livable neighbors and reasonable hours of work for employees.
  • ...1 more annotation...
  • Consumer protection advocates are outraged that such radically pro-corporate deals are being hidden and negotiated away from public view. “Consumer organizations shouldn’t have to rely on leaks to find out about negotiations that will have a major impact on consumers’ lives,” said Amanda Long, general director of the UK-based Consumers International, on Wednesday. “Without greater transparency, the negotiations can’t be exposed to the scrutiny needed to design a good agreement and build public trust, this must be a priority.” The impact of such an agreement will indeed be major: “The TISA provisions in their current form will establish a wide range of new grounds for domestic regulations to be challenged by corporations—even those without a local presence in that country,” WikiLeaks concluded. Kelsey observed, “As President Obama said of the [TPP] in October 2015, these agreements are about the U.S. making the rules for the global economy in the 21st century[…] in ways that ‘reflect America’s values.'”
Paul Merrell

Turkey military coup: Erdoğan says 'we will overcome this' - live updates | World news | The Guardian - 0 views

  • President Erdogan called on Turks to take to the streets in a surreal interview with CNN Türk, in which he was forced to speak to the network via a mobile phone and FaceTime.
  • I urge the Turkish people to gather at public squares and airports. ... There is no power higher than the power of the people.” He added that he believes the coup attempt will be thwarted soon, and that there will be a “strong response” to those responsible for the coup attempt. They will receive the “heavy price”, he said. The president was speaking from an undisclosed location, and NBC News, citing an anonymous US military source, said that his plane had been refused landing rights in Istanbul.
  • A presidential source has said: “This is a coup attempt by the Gulen movement, at which several known Gulenists hinted in recent months. The perpetrators have violated the chain in command.” Here’s an interesting piece on the Gulenist movement.
  • ...1 more annotation...
  • John Kerry, the secretary of state, said he had heard the reports but could not comment. “I hope there will be stability and peace and continuity within Turkey,” he said while visiting Moscow. Ned Price, spokesperson for the National Security Council at the White House, said: “The president’s national security team has apprised him of the unfolding situation in Turkey. The president will continue to receive regular updates.” Turkey has the second biggest army in Nato after the US. It was a crucial ally during the cold war, although relations hit a bump in March 2003 when Turkey refused to let the US to invade Iraq from the north through Turkish territory.
Paul Merrell

NSA 'not interested in' Americans, privacy officer claims | TheHill - 0 views

  • The National Security Agency’s internal civil liberties watchdog insisted on Thursday that the agency has no interest in spying on Americans under its controversial spying tools. “Our employees are trained to not look for U.S. persons,” NSA privacy and civil liberties officer Rebecca Richards said on Thursday.
  • “We’re not interested in those U.S. persons. We’re trying to look away from those,” she added. “Instead, we’re looking for where are our targets?”Richards’s comments came up during a Capitol Hill panel discussion about a new report on U.S. spying from the Brennan Center for Justice.The analysis looks at aspects of a presidential order that dates back to Ronald Reagan and was updated by then-President George W. Bush, called Executive Order 12333.
  • Programs under the order, which is meant to guide foreign surveillance, “have implications for Americans’ privacy that could well be greater than those of their domestic counterparts,” the organization wrote in its analysis. “The vast majority of Americans — whether wittingly or not — engage in communication that is transmitted or stored overseas.”“This reality of the digital age renders Americans’ communications and data highly vulnerable to NSA surveillance abroad.”
  • ...2 more annotations...
  • NSA surveillance under Executive Order 12333 is separate from the agency’s higher profile bulk collection of Americans’ phone records, which ended last year. It also occurs under separate legal powers than a controversial provision of the 2008 update to the Foreign Intelligence Surveillance Act, which comes up for renewal at the end of 2017.The executive order targets foreigners, but can “incidentally” pick up data about Americans if their activity on the Internet crosses international borders, Richards acknowledged.“Our procedures are designed to say: There are occasions when you are going to get U.S. persons,” she said, “and when you get those U.S. persons, here’s the rules.”
  • Richards is the agency’s first ever civil liberties officer. She was hired in early 2014, on the heels of fallout from Edward Snowden’s leaks about the spy agency. 
  •  
    Not interested. Apparently that's why NSA was turning over raw search results to Israel without filtering out "U.S. persons" data. And why they just decided to give other agencies including law enforcement access to raw search results. And why Gen. Keith Alexander personally put together a program to ruin people's reputations including a "U.S. person." And why Russell Tice said that he personally had Obama's NSA dossier in his hands when Obama was running for the U.S. Senate. And why Tice says NSA had similar dossiers on members of Congress and the justices of the U.S. Supreme Court and targeted "lots of lawyers." On and on.  Ms. Richards appears to have become a quick study in NSA's hallmark skill of lying to the public. 
Paul Merrell

Trump's travel ban has revoked 60,000 visas for now - 0 views

  • About 60,000 visas were revoked under U.S. President Donald Trump's executive order temporarily halting immigration from seven Muslim-majority countries, the State Department said on Friday, in one of several government communications clarifying how the order is being rolled out.The revocation means the government voided travel visas for people trying to enter the United States but the visas could be restored later without a new application, said William Cocks, a spokesman for consular affairs at the State Department."We will communicate updates to affected travelers following the 90-day review," he said.Earlier news reports, citing a government attorney at a federal court hearing, put the figure at more than 100,000 visas.The government issued over 11 million immigrant and non-immigrant visas in fiscal year 2015, the State Department said.The immigration executive order signed by Trump a week ago temporarily halted the U.S. refugee program and imposed a 90-day suspension on people traveling from Iran, Iraq, Libya, Somalia, Sudan, Syria and Yemen. Trump said the measures would help protect Americans from terrorist attacks.
Gary Edwards

'Clinton death list': 33 spine-tingling cases - 0 views

  •  
    "(Editor's note: This list was originally published in August 2016 and has gone viral on the web. WND is running it again as American voters cast their ballots for the nation's next president on Election Day.) How many people do you personally know who have died mysteriously? How about in plane crashes or car wrecks? Bizarre suicides? People beaten to death or murdered in a hail of bullets? And what about violent freak accidents - like separate mountain biking and skiing collisions in Aspen, Colorado? Or barbells crushing a person's throat? Bill and Hillary Clinton attend a funeral Apparently, if you're Bill or Hillary Clinton, the answer to that question is at least 33 - and possibly many more. Talk-radio star Rush Limbaugh addressed the issue of the "Clinton body count" during an August show. "I swear, I could swear I saw these stories back in 1992, back in 1993, 1994," Limbaugh said. He cited a report from Rachel Alexander at Townhall.com titled, "Clinton body count or left-wing conspiracy? Three with ties to DNC mysteriously die." Limbaugh said he recalled Ted Koppel, then-anchor of ABC News' "Nightline," routinely having discussions on the issue following the July 20, 1993, death of White House Deputy Counsel Vince Foster. In fact, Limbaugh said, he appeared on Koppel's show. "One of the things I said was, 'Who knows what happened here? But let me ask you a question.' I said, 'Ted, how many people do you know in your life who've been murdered? Ted, how many people do you know in your life that have died under suspicious circumstances?' "Of course, the answer is zilch, zero, nada, none, very few," Limbaugh chuckled. "Ask the Clintons that question. And it's a significant number. It's a lot of people that they know who have died, who've been murdered. "And the same question here from Rachel Alexander. It's amazing the cycle that exists with the Clintons. [Citing Townhall]: 'What it
Gary Edwards

Obama broken promises and Lies | The Rugged Individualist - 0 views

  •  
    "Top 50 (President) Obama Failures and Flip-Flops-Updated July 18, 2012" This is an impressive, if not exhaustive list of broken promises and outright lies that Obama has made to get elected.  Great for reference and for sure my next pocket printout project.
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Gary Edwards

Welcome to Post-Constitution America - Peter Van Buren - 0 views

  • On July 30, 1778, the Continental Congress created the first whistleblower protection law, stating “that it is the duty of all persons in the service of the United States to give the earliest information to Congress or other proper authority of any misconduct, frauds, or misdemeanors committed by any officers or persons in the service of these states.”
  • Two hundred thirty-five years later, on July 30, 2013, Bradley Manning was found guilty on 20 of the 22 charges for which he was prosecuted, specifically for “espionage” and for videos of war atrocities he released, but not for “aiding the enemy.”
  • Days after the verdict, with sentencing hearings in which Manning could receive 136 years of prison time ongoing, the pundits have had their say. The problem is that they missed the most chilling aspect of the Manning case: the way it ushered us, almost unnoticed, into post-Constitutional America.
  • ...22 more annotations...
  • As at Guantanamo, rules of evidence reaching back to early
  • During the months of the trial, the U.S. military refused to release official transcripts of the proceedings. Even a private courtroom sketch artist was barred from the room. Independent journalist and activist Alexa O’Brien then took it upon herself to attend the trial daily, defy the Army, and make an unofficial record of the proceedings by hand. Later in the trial, armed military police were stationed behind reporters listening to testimony. Above all, the feeling that Manning’s fate was predetermined could hardly be avoided. After all, President Obama, the former Constitutional law professor, essentially proclaimed him guilty back in 2011 and the Department of Defense didn’t hesitate to state more generally that “leaking is tantamount to aiding the enemies of the United States.”
  • And so to Bradley Manning. As the weaponry and technology of war came home, so did a new, increasingly Guantanamo-ized definition of justice. This is one thing the Manning case has made clear. As a start, Manning was treated no differently than America’s war-on-terror prisoners at Guantanamo and the black sites that the Bush administration set up around the world. Picked up on the “battlefield,” Manning was first kept incommunicado in a cage in Kuwait for two months with no access to a lawyer. Then, despite being an active duty member of the Army, he was handed over to the Marines, who also guard Guantanamo, to be held in a military prison in Quantico, Virginia. What followed were three years of cruel detainment, where, as might well have happened at Gitmo, Manning, kept in isolation, was deprived of clothing, communications, legal advice, and sleep. The sleep deprivation regime imposed on him certainly met any standard, other than Washington’s and possibly Pyongyang’s, for torture. In return for such abuse, even after a judge had formally ruled that he was subjected to excessively harsh treatment, Manning will only get a 112-day reduction in his eventual sentence. Eventually the Obama administration decided Manning was to be tried as a soldier before a military court. In the courtroom, itself inside a military facility that also houses NSA headquarters, there was a strikingly gulag-like atmosphere.  His trial was built around secret witnesses and secret evidence; severe restrictions were put on the press -- the Army denied press passes to 270 of the 350 media organizations that applied; and there was a clear appearance of injustice. Among other things, the judge ruled against nearly every defense motion.
  • “What constitutes due process in this case is a due process in war.”
  • Given all this, it is small comfort to know that Manning, nailed on the Espionage Act after multiple failures in other cases by the Obama administration, was not convicted of the extreme charge of “aiding the enemy.”
  • Obama administration lawyers went on to claim the legal right to execute U.S. citizens without trial or due process and have admitted to killing four Americans. Attorney General Eric Holder declared that “United States citizenship alone does not make such individuals immune from being targeted.”
  • As if competing for an Orwellian prize, an unnamed Obama administration official told the Washington Post,
  • English common law were turned upside down. In Manning’s case, he was convicted of espionage, even though the prosecution did not have to prove either his intent to help another government or that harm was caused; a civilian court had already paved the way for such a ruling in another whistleblower case. In addition, the government was allowed to label Manning a “traitor” and an “anarchist” in open court, though he was on trial for neither treason nor anarchy.
  • Similarly, full-spectrum spying is not considered to violate the Fourth Amendment and does not even require probable cause.
  • Justice can be twisted and tangled into an almost unrecognizable form and then used to send a young man to prison for decades.
  • Government officials concerned over possible wrongdoing in their departments or agencies who “go through proper channels” are fired or prosecuted.
  • Government whistleblowers are commanded to return to face justice, while law-breakers in the service of the government are allowed to flee justice. CIA officers who destroy evidence of torture go free, while a CIA agent who blew the whistle on torture is locked up.
  • Thanks to the PATRIOT Act, citizens, even librarians, can be served by the FBI with a National Security Letter (not requiring a court order) demanding records and other information, and gagging them from revealing to anyone that such information has been demanded or such a letter delivered.
  • Citizens may be held without trial, and denied their Constitutional rights as soon as they are designated “terrorists.” Lawyers and habeas corpus are available only when the government allows.
  • The war on whistleblowers is metastasizing into a war on the First Amendment.
  • People may now be convicted based on secret testimony by unnamed persons.
  • Military courts and jails can replace civilian ones.
  • An Obama administration Insider Threat Program requires federal employees (including the Peace Corps) to report on the suspicious behavior of coworkers.
  • Claiming its actions lawful while shielding the “legal” opinions cited, often even from Congress, the government can send its drones to assassinate its own citizens.
  • One by one, the tools and attitudes of the war on terror, of a world in which the “gloves” are eternally off, have come home.
  • The comic strip character Pogo’s classic warning -- “We have met the enemy and he is us” -- seems ever less like a metaphor.
  • According to the government, increasingly we are now indeed their enemy.
  •  
    Well written and researched article describing what it means to live in a post-Constitutional America.  Chilling facts with a cold but obvious conclusion.
Gary Edwards

You Won't BELIEVE What's Going On with Government Spying on Americans - BlackListedNews.com - 1 views

  •  
    "New Revelations Are Breaking Every Day" This web page is very well sourced and filled with links where you will get lost for hours. Excellent reference document ............................ Revelations about the breathtaking scope of government spying are coming so fast that it's time for an updated roundup: - Just weeks after NSA boss Alexander said that a review of NSA spying found not even one violation, the Washington Post published an internal NSA audit showing that the agency has broken its own rules thousands of times each year - 2 Senators on the intelligence committee said the violations revealed in the Post article were just the "tip of the iceberg" - Glenn Greenwald notes:  "One key to the WashPost story: the reports are internal, NSA audits, which means high likelihood of both under-counting & white-washing".(Even so, the White House tried to do damage control by retroactively changing on-the-record quotes) - The government is spying on essentially everything we do. It is not just "metadata" … although that is enough to destroy your privacy - The government has adopted a secret interpretation of the Patriot Act which allows it to pretend that "everything" is relevant … so it spies on everyone - NSA whistleblowers say that the NSA collects all of our conversations word-for-word - It's not just the NSA … Many other agencies, like the FBI and IRS - concerned only with domesticissues - spy on Americans as well - The information gained through spying is shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes.  The agencies are instructed to intentionally "launder" the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges - Top counter-terror experts say that the government's mass spying doesn't keep us
Gary Edwards

The List: Unnecessarily Shut Down by Obama to Inflict Public Pain - 0 views

  •  
    "The media may or may not report on these individual occurrences, but what they will never do is provide the American people with the full context and scope of Obama's shrill pettiness. Below is a list of illogical, unnecessary, and shockingly spiteful moves our government is making in the name of essential and non-essential. This list will be regularly updated, and if you have something you feel should be added, please email me at jnolte@breitbart.com or tweet me @NolteNC.Please include a link to the news source. -- 1. Treatments for Children Suffering From Cancer - The GOP have agreed to a compromise by funding part of the government, including the National Institutes of Health, which offers children with cancer last-chance experimental treatment. Obama has threatened to veto this funding. 2. The World War II Memorial - The WWII memorial on the DC Mall is a 24/7 open-air memorial that is not regularly staffed. Although the White House must have known that WWII veterans in their eighties and nineties had already booked flights to visit this memorial, the White House still found the resources to spitefully barricade the attraction.  The Republican National Committee has offered to cover any costs required to keep the memorial open. The White House refused. Moreover, like the NIH, the GOP will pass a compromise bill that would fund America's national parks. Obama has threatened to veto that bill. 3. Furloughed Military Chaplains Not Allowed to Work for Free - Furloughed military chaplains willing to celebrate Mass and baptisms for free have been told they will be punished for doing so. 4. Business Stops In Florida Keys - Although the GOP have agreed to compromise in the ongoing budget stalemate and fund the parks, Obama has threatened to veto that funding. As a result, small businesses, hunters, and commercial fisherman can't practice their trade. While the feds have deemed the personnel necessary to keep this area open "non-essential," the "enforcement office
Paul Merrell

NSA phone surveillance program likely unconstitutional, federal judge rules | World news | theguardian.com - 0 views

  • A federal judge in Washington ruled on Monday that the bulk collection of Americans’ telephone records by the National Security Agency is likely to violate the US constitution, in the most significant legal setback for the agency since the publication of the first surveillance disclosures by the whistleblower Edward Snowden. Judge Richard Leon declared that the mass collection of metadata probably violates the fourth amendment, which prohibits unreasonable searches and seizures, and was "almost Orwellian" in its scope. In a judgment replete with literary swipes against the NSA, he said James Madison, the architect of the US constitution, would be "aghast" at the scope of the agency’s collection of Americans' communications data. The ruling, by the US district court for the District of Columbia, is a blow to the Obama administration, and sets up a legal battle that will drag on for months, almost certainly destined to end up in the supreme court. It was welcomed by campaigners pressing to rein in the NSA, and by Snowden, who issued a rare public statement saying it had vindicated his disclosures. It is also likely to influence other legal challenges to the NSA, currently working their way through federal courts.
  • In Monday’s ruling, the judge concluded that the pair's constitutional challenge was likely to be successful. In what was the only comfort to the NSA in a stinging judgment, Leon put the ruling on hold, pending an appeal by the government. Leon expressed doubt about the central rationale for the program cited by the NSA: that it is necessary for preventing terrorist attacks. “The government does not cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack,” he wrote.
  • Leon’s opinion contained stern and repeated warnings that he was inclined to rule that the metadata collection performed by the NSA – and defended vigorously by the NSA director Keith Alexander on CBS on Sunday night – was unconstitutional. “Plaintiffs have a substantial likelihood of showing that their privacy interests outweigh the government’s interest in collecting and analysing bulk telephony metadata and therefore the NSA’s bulk collection program is indeed an unreasonable search under the fourth amendment,” he wrote. Leon said that the mass collection of phone metadata, revealed by the Guardian in June, was "indiscriminatory" and "arbitrary" in its scope. "The almost-Orwellian technology that enables the government to store and analyze the phone metadata of every telephone user in the United States is unlike anything that could have been conceived in 1979," he wrote, referring to the year in which the US supreme court ruled on a fourth amendment case upon which the NSA now relies to justify the bulk records program.
  • ...5 more annotations...
  • In a statement, Snowden said the ruling justified his disclosures. “I acted on my belief that the NSA's mass surveillance programs would not withstand a constitutional challenge, and that the American public deserved a chance to see these issues determined by open courts," he said in comments released through Glenn Greenwald, the former Guardian journalist who received leaked documents from Snowden. "Today, a secret program authorised by a secret court was, when exposed to the light of day, found to violate Americans’ rights. It is the first of many.”
  • In his ruling, Judge Leon expressly rejected the government’s claim that the 1979 supreme court case, Smith v Maryland, which the NSA and the Obama administration often cite to argue that there is no reasonable expectation of privacy over metadata, applies in the NSA’s bulk-metadata collection. The mass surveillance program differs so much from the one-time request dealt with by the 1979 case that it was of “little value” in assessing whether the metadata dragnet constitutes a fourth amendment search.
  • In a decision likely to influence other federal courts hearing similar arguments from the ACLU, Leon wrote that the Guardian’s disclosure of the NSA’s bulk telephone records collection means that citizens now have standing to challenge it in court, since they can demonstrate for the first time that the government is collecting their phone data.
  • Leon also struck a blow for judicial review of government surveillance practices even when Congress explicitly restricts the ability of citizens to sue for relief. “While Congress has great latitude to create statutory schemes like Fisa,” he wrote, referring to the seminal 1978 surveillance law, “it may not hang a cloak of secrecy over the constitution.”
  • In his ruling on Monday, Judge Leon predicted the process would take six months. He urged the government to take that time to prepare for an eventual defeat. “I fully expect that during the appellate process, which will consume at least the next six months, the government will take whatever steps necessary to prepare itself to comply with this order when, and if, it is upheld,” wrote Leon in his opinion. “Suffice it to say, requesting further time to comply with this order months from now will not be well received and could result in collateral sanctions.”
  •  
    This is the case I thought was the weakest because of poor drafting in the complaint. The judge noted those issues in dismissing the plaintiffs' claims under the Administrative Procedures Act, but picked his way through what remained to find sufficient allegations to support the 4th Amendment challenge. Because he ruled for the plaintiffs on the 4th Amendment count, the judge did not reach the plaintiffs' arguments under the First and Fifth Amendments. This case is about cellphone call metadata, which the FISA Court has been ordering cell phone companies to provide every day, with the orders updated every 90 days. The judge's 68-page opinion is at https://ecf.dcd.uscourts.gov/cgi-bin/show_public_doc?2013cv0881-40 (cleaner copy than the Guardian's, which was apparently faxed). Notably, the judge, Richard Leon, is a Bush II appointee and one of the plaintiffs is a prominent conservative civil libertarian lawyer. The other plaintiff is the father of an NSA cryptologist who worked closely with SEAL Team 6 and was killed along with members of that team when their helicopter crashed in Afghanistan. I'll add some more in a comment. But digital privacy is not yet dead.
  •  
    Unfortunately, DRM is not dead yet either and the court's PDF file is locked. No easy copying of its content. If you want to jump directly to the discussion of 4th Amendment issues, go to page 35. That way, you can skip past all the dreary discussion of the Administrative Procedures Act claim and you won't miss much that's memorable. In ruling on the plaintiffs' standing to raise the 4th Amendment claim, Judge Leon postulated two possible search issues: [i] the bulk daily collection of metadata and its retention in the database for five years; and [ii] the analysis of that data through the NSA's querying process. The judge had no difficulty with the first issue; it definitely qualifies as a search. But the judge rejected the plaintiffs' argument on the second type (which was lame), demonstrating that at least one federal judge understands how computers work. The government's filings indicated that a "seed" telephone number or other identifier is used as the query string. Judge Leon figured out for himself from this fact that the NSA of necessity had to compare that number or identifier to every number or identifier in its database looking for a match. The judge concluded that the plaintiffs' metadata --- indeed everyone's metadata --- had to be searched for comparison purposes *every* time the NSA analysts ran any query against the database. See his incisive discussion at pp. 39-41. So having established that two searches were involved, one every time the NSA queried the database, the judge moved on to the next question, whether "the plaintiffs had a reasonable expectation of privacy that is violated when the Government indiscriminately collects their telephony metadata along with the metadata of hundreds of millions of other citizens without any particularized suspicion of wrongdoing, retains that metadata for five years, and then queries, analyzes, and investigates that data without prior judicial approval of the investigative targets." pg. 43. More later
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

NSA loophole allows warrantless search for US citizens' emails and phone calls | World news | The Guardian - 0 views

  • The National Security Agency has a secret backdoor into its vast databases under a legal authority enabling it to search for US citizens' email and phone calls without a warrant, according to a top-secret document passed to the Guardian by Edward Snowden.The previously undisclosed rule change allows NSA operatives to hunt for individual Americans' communications using their name or other identifying information. Senator Ron Wyden told the Guardian that the law provides the NSA with a loophole potentially allowing "warrantless searches for the phone calls or emails of law-abiding Americans".The authority, approved in 2011, appears to contrast with repeated assurances from Barack Obama and senior intelligence officials to both Congress and the American public that the privacy of US citizens is protected from the NSA's dragnet surveillance programs.
  • The intelligence data is being gathered under Section 702 of the of the Fisa Amendments Act (FAA), which gives the NSA authority to target without warrant the communications of foreign targets, who must be non-US citizens and outside the US at the point of collection.The communications of Americans in direct contact with foreign targets can also be collected without a warrant, and the intelligence agencies acknowledge that purely domestic communications can also be inadvertently swept into its databases. That process is known as "incidental collection" in surveillance parlance.But this is the first evidence that the NSA has permission to search those databases for specific US individuals' communications.
  • A secret glossary document provided to operatives in the NSA's Special Source Operations division – which runs the Prism program and large-scale cable intercepts through corporate partnerships with technology companies – details an update to the "minimization" procedures that govern how the agency must handle the communications of US persons. That group is defined as both American citizens and foreigners located in the US."While the FAA 702 minimization procedures approved on 3 October 2011 now allow for use of certain United States person names and identifiers as query terms when reviewing collected FAA 702 data," the glossary states, "analysts may NOT/NOT [not repeat not] implement any USP [US persons] queries until an effective oversight process has been developed by NSA and agreed to by DOJ/ODNI [Office of the Director of National Intelligence]."The term "identifiers" is NSA jargon for information relating to an individual, such as telephone number, email address, IP address and username as well as their name.The document – which is undated, though metadata suggests this version was last updated in June 2012 – does not say whether the oversight process it mentions has been established or whether any searches against US person names have taken place.
  • ...2 more annotations...
  • Wyden, an Oregon Democrat on the Senate intelligence committee, has obliquely warned for months that the NSA's retention of Americans' communications incidentally collected and its ability to search through it has been far more extensive than intelligence officials have stated publicly. Speaking this week, Wyden told the Guardian it amounts to a "backdoor search" through Americans' communications data."Section 702 was intended to give the government new authorities to collect the communications of individuals believed to be foreigners outside the US, but the intelligence community has been unable to tell Congress how many Americans have had their communications swept up in that collection," he said."Once Americans' communications are collected, a gap in the law that I call the 'back-door searches loophole' allows the government to potentially go through these communications and conduct warrantless searches for the phone calls or emails of law-abiding Americans."
  • Exclusive: Spy agency has secret backdoor permission to search databases for individual Americans' communications
Paul Merrell

ExposeFacts - For Whistleblowers, Journalism and Democracy - 0 views

  • Launched by the Institute for Public Accuracy in June 2014, ExposeFacts.org represents a new approach for encouraging whistleblowers to disclose information that citizens need to make truly informed decisions in a democracy. From the outset, our message is clear: “Whistleblowers Welcome at ExposeFacts.org.” ExposeFacts aims to shed light on concealed activities that are relevant to human rights, corporate malfeasance, the environment, civil liberties and war. At a time when key provisions of the First, Fourth and Fifth Amendments are under assault, we are standing up for a free press, privacy, transparency and due process as we seek to reveal official information—whether governmental or corporate—that the public has a right to know. While no software can provide an ironclad guarantee of confidentiality, ExposeFacts—assisted by the Freedom of the Press Foundation and its “SecureDrop” whistleblower submission system—is utilizing the latest technology on behalf of anonymity for anyone submitting materials via the ExposeFacts.org website. As journalists we are committed to the goal of protecting the identity of every source who wishes to remain anonymous.
  • The seasoned editorial board of ExposeFacts will be assessing all the submitted material and, when deemed appropriate, will arrange for journalistic release of information. In exercising its judgment, the editorial board is able to call on the expertise of the ExposeFacts advisory board, which includes more than 40 journalists, whistleblowers, former U.S. government officials and others with wide-ranging expertise. We are proud that Pentagon Papers whistleblower Daniel Ellsberg was the first person to become a member of the ExposeFacts advisory board. The icon below links to a SecureDrop implementation for ExposeFacts overseen by the Freedom of the Press Foundation and is only accessible using the Tor browser. As the Freedom of the Press Foundation notes, no one can guarantee 100 percent security, but this provides a “significantly more secure environment for sources to get information than exists through normal digital channels, but there are always risks.” ExposeFacts follows all guidelines as recommended by Freedom of the Press Foundation, and whistleblowers should too; the SecureDrop onion URL should only be accessed with the Tor browser — and, for added security, be running the Tails operating system. Whistleblowers should not log-in to SecureDrop from a home or office Internet connection, but rather from public wifi, preferably one you do not frequent. Whistleblowers should keep to a minimum interacting with whistleblowing-related websites unless they are using such secure software.
    • Gary Edwards
       
      Thanks Paul! Great article and I agree with you about switching. Rather than a USB, I would rather look into a SSD and try to isolate performance to an ISP bandwidth issue. FYI, I read your Diigo posts daily at this Web site: https://groups.diigo.com/group/socialism-and-the-end-of-the-american-dream/content/user/marbux Seems to be the best visual presentation of your research. I do however think Diigo could improve their hosting of this research by enabling more extensive comments. Notice that your comments are often clipped :( Still, I really do appreciate your sharing both your research and your commentary. Priceless stuff! Many thanks! ~ge~
  •  
    A new resource site for whistle-blowers. somewhat in the tradition of Wikileaks, but designed for encrypted communications between whistleblowers and journalists.  This one has an impressive board of advisors that includes several names I know and tend to trust, among them former whistle-blowers Daniel Ellsberg, Ray McGovern, Thomas Drake, William Binney, and Ann Wright. Leaked records can only be dropped from a web browser running the Tor anonymizer software and uses the SecureDrop system originally developed by Aaron Schwartz. They strongly recommend using the Tails secure operating system that can be installed to a thumb drive and leaves no tracks on the host machine. https://tails.boum.org/index.en.html Curious, I downloaded Tails and installed it to a virtual machine. It's a heavily customized version of Debian. It has a very nice Gnome desktop and blocks any attempt to connect to an external network by means other than installed software that demands encrypted communications. For example, web sites can only be viewed via the Tor anonymizing proxy network. It does take longer for web pages to load because they are moving over a chain of proxies, but even so it's faster than pages loaded in the dial-up modem days, even for web pages that are loaded with graphics, javascript, and other cruft. E.g., about 2 seconds for New York Times pages. All cookies are treated by default as session cookies so disappear when you close the page or the browser. I love my Linux Mint desktop, but I am thinking hard about switching that box to Tails. I've been looking for methods to send a lot more encrypted stuff down the pipe for NSA to store. Tails looks to make that not only easy, but unavoidable. From what I've gathered so far, if you want to install more software on Tails, it takes about an hour to create a customized version and then update your Tails installation from a new ISO file. Tails has a wonderful odor of having been designed for secure computing. Current
Paul Merrell

Canadian Government Says Free Speech is for Offending Muslims - Not Opposing Israel - The Intercept - 0 views

  • Canadian Prime Minister Stephen Harper, January 8, 2015, on Charlie Hebdo shootings: “When a trio of hooded men struck at some of our most cherished democratic principles, freedom of expression, freedom of the press, they assaulted democracy everywhere . . . They have declared war on anybody who does not think and act exactly as they wish they would think and act . . . . they have declared war on any country, like ourselves, that values freedom, openness and tolerance.”
  • CBC, today: “Ottawa threatening hate charges against those who boycott Israel” The Harper government is signaling its intention to use hate crime laws against Canadian advocacy groups that encourage boycotts of Israel. Such a move could target a range of civil society organizations, from the United Church of Canada and the Canadian Quakers to campus protest groups and labour unions. If carried out, it would be a remarkably aggressive tactic, and another measure of the Conservative government’s lockstep support for Israeli Prime Minister Benjamin Netanyahu. . . . The government’s intention was made clear in a response to inquiries from CBC News about statements by federal ministers of a “zero tolerance” approach to groups participating in a loose coalition called Boycott, Divest and Sanction (BDS), which was begun in 2006 at the request of Palestinian non-governmental organizations.
  • Has a #JeSuisBDS hashtag started trending yet on Twitter? Under the new Charlie Hebdo standard — it’s not enough to defend free speech; one must praise and even express the speech targeted with suppression — have all of the newfound free speech crusaders begun organizing pro-Israel-boycott rallies in order to defy these suppression efforts? In a zillion years, could anyone imagine the popularity-craving officials who run PEN America bestowing one of their glamorous awards on advocates of the Israel-targeted Boycott/Divestment/Sanctions movement? The answer to all of those questions is and will remain “no,” because (as I discussed last week here with Bob Wright) the Charlie Hebdo ritual (for most, not all) was about many agendas having nothing to do with the free expression banner under which it paraded. In that regard, Stephen Harper is the perfect Poster Boy for how free expression is tribalistically manipulated and exploited in the West. When the views being suppressed are ones amenable to those in power (e.g., cartoons mocking Islam), free speech is venerated; attempts to suppress those kinds of ideas show that “they have declared war on any country, like ourselves, that values freedom, openness and tolerance.” We get to celebrate ourselves as superior and progressive and victimized, and how good that feels. But when ideas are advocated that upset those in power (e.g. speech by Muslims critical of Western nations and their allies), the very same people acquiesce to, or expressly endorse, full-scale suppression. Thus can the Canadian Prime Minister pompously parade around as some sort of Guardian of Enlightenment Ideals only, three months later, to act like the classic tyrant.
  • ...3 more annotations...
  • Asked to explain what zero tolerance means, and what is being done to enforce it, a spokesperson for Public Safety Minister Steven Blaney replied, four days later, with a detailed list of Canada’s updated hate laws, noting that Canada has one of the most comprehensive sets of such laws “anywhere in the world.”
  • As I’ve argued many times — most comprehensively here — all applications of hate speech laws are inherently tyrannical, dangerous and wrong, and it’s truly mystifying (and scary) that people convince themselves that their judgment is so unerring and their beliefs so sacrosanct that it should be illegal to question or dissent from them. But independent of that, what we see here again is the utter foolishness of endorsing such laws on pragmatic grounds: they will inevitably be used against not just the ideas you hate but the ones you like, and when that happens, if you cheered when such laws were used to suppress the ideas you hate, then you will have no valid ground to object.
  • UPDATE: Various Israel devotees such as David Frum spent the morning insisting the CBC story is false, and now the Canadian government has followed suit, issuing a statement denouncing it. Unfortunately for them, the full email exchange between the CBC reporter, Neil Macdonald, and a spokesman for the Public Safety Department can be read here, and it proves that the CBC story is 100% accurate.
Paul Merrell

Update: BRICS Announces New University for the South | News | teleSUR English - 0 views

  • Russian President Vladimir Putin announced Thursday the BRICS group of nations will create their own university. “Member states of the bloc have agreed to coordinate their efforts in (the area of) information security, including on the Internet. There will be a network of community universities to bolster scientific and technological exchange between member states,” Putin said. The announcement was made during the bloc's summit in Ufa, Russia.
Gary Edwards

Tomgram: Michael Klare, Superpower in Distress | TomDispatch - 0 views

  • In response, the Obama administration dispatched thousands of new advisers and trainers and began shipping in piles of new weaponry to re-equip the Iraqi army.  It also filled Iraqi skies with U.S. planes armed with their own munitions to destroy, among other things, some of that captured U.S. weaponry.  Then it set to work standing up a smaller version of the Iraqi army.  Now, skip nearly a year ahead and on a somewhat lesser scale the whole process has just happened again.  Less than two weeks ago, Islamic State militants took Ramadi, the capital of Anbar Province.  Iraqi army units, including the elite American-trained Golden Division, broke and fled, leaving behind -- you’ll undoubtedly be shocked to hear -- yet another huge cache of weaponry and equipment, including tanks, more than 100 Humvees and other vehicles, artillery, and so on. The Obama administration reacted in a thoroughly novel way: it immediately began shipping in new stocks of weaponry, starting with 1,000 antitank weapons, so that the reconstituted Iraqi military could take out future “massive suicide vehicle bombs” (some of which, assumedly, will be those captured vehicles from Ramadi).  Meanwhile, American planes began roaming the skies over that city, trying to destroy some of the equipment IS militants had captured.
  • Notice anything repetitive in all this -- other than another a bonanza for U.S. weapons makers?  Logically, it would prove less expensive for the Obama administration to simply arm the Islamic State directly before sending in the air strikes
  • In any case, what a microcosm of U.S. imperial hubris and folly in the twenty-first century all this training and equipping of the Iraqi military has proved to be.  Start with the post-invasion decision of the Bush administration to totally disband Saddam’s army and instantly eject hundreds of thousands of unemployed Sunni military men and a full officer corps into the chaos of the “new” Iraq and you have an instant formula for creating a Sunni resistance movement.  Then, add in a little extra “training” at Camp Bucca, a U.S. military prison in Iraq, for key unemployed officers, and -- Voilà! -- you’ve helped set up the petri dish in which the leadership of the Islamic State movement will grow.  Multiply such stunning tactical finesse many times over globally and, as TomDispatch regular Michael Klare makes clear today, you have what might be called the folly of the “sole superpower” writ large. Tom
  • ...9 more annotations...
  • Delusionary Thinking in Washington The Desperate Plight of a Declining Superpower By Michael T. Klare
  • Take a look around the world and it’s hard not to conclude that the United States is a superpower in decline. Whether in Europe, Asia, or the Middle East, aspiring powers are flexing their muscles, ignoring Washington’s dictates, or actively combating them. Russia refuses to curtail its support for armed separatists in Ukraine; China refuses to abandon its base-building endeavors in the South China Sea; Saudi Arabia refuses to endorse the U.S.-brokered nuclear deal with Iran; the Islamic State movement (ISIS) refuses to capitulate in the face of U.S. airpower. What is a declining superpower supposed to do in the face of such defiance? This is no small matter. For decades, being a superpower has been the defining characteristic of American identity. The embrace of global supremacy began after World War II when the United States assumed responsibility for resisting Soviet expansionism around the world; it persisted through the Cold War era and only grew after the implosion of the Soviet Union, when the U.S. assumed sole responsibility for combating a whole new array of international threats. As General Colin Powell famously exclaimed in the final days of the Soviet era, “We have to put a shingle outside our door saying, ‘Superpower Lives Here,’ no matter what the Soviets do, even if they evacuate from Eastern Europe.”
  • The problem, as many mainstream observers now acknowledge, is that such a strategy aimed at perpetuating U.S. global supremacy at all costs was always destined to result in what Yale historian Paul Kennedy, in his classic book The Rise and Fall of the Great Powers, unforgettably termed “imperial overstretch.” As he presciently wrote in that 1987 study, it would arise from a situation in which “the sum total of the United States’ global interests and obligations is… far larger than the country’s power to defend all of them simultaneously.”
  • The first of two approaches to this conundrum in Washington might be thought of as a high-wire circus act.  It involves the constant juggling of America’s capabilities and commitments, with its limited resources (largely of a military nature) being rushed relatively fruitlessly from one place to another in response to unfolding crises, even as attempts are made to avoid yet more and deeper entanglements. This, in practice, has been the strategy pursued by the current administration.  Call it the Obama Doctrine.
  • In other words, whoever enters the Oval Office in January 2017 will be expected to wield a far bigger stick on a significantly less stable planet. As a result, despite the last decade and a half of interventionary disasters, we’re likely to see an even more interventionist foreign policy with an even greater impulse to use military force.
  • The first step in any 12-step imperial-overstretch recovery program would involve accepting the fact that American power is limited and global rule an impossible fantasy.
  • Accepted as well would have to be this obvious reality: like it or not, the U.S. shares the planet with a coterie of other major powers -- none as strong as we are, but none so weak as to be intimidated by the threat of U.S. military intervention.
  • Having absorbed a more realistic assessment of American power, Washington would then have to focus on how exactly to cohabit with such powers -- Russia, China, and Iran among them -- and manage its differences with them without igniting yet more disastrous regional firestorms. 
  • fewer military entanglements abroad, a diminishing urge to garrison the planet, reduced military spending, greater reliance on allies, more funds to use at home in rebuilding the crumbling infrastructure of a divided society, and a diminished military footprint in the Middle East.
  •  
    Thanks Marbux! "Think of this as a little imperial folly update -- and here's the backstory.  In the years after invading Iraq and disbanding Saddam Hussein's military, the U.S. sunk about $25 billion into "standing up" a new Iraqi army.  By June 2014, however, that army, filled with at least 50,000 "ghost soldiers," was only standing in the imaginations of its generals and perhaps Washington.  When relatively small numbers of Islamic State (IS) militants swept into northern Iraq, it collapsed, abandoning four cities -- including Mosul, the country's second largest -- and leaving behind enormous stores of U.S. weaponry, ranging from tanks and Humvees to artillery and rifles.  In essence, the U.S. was now standing up its future enemy in a style to which it was unaccustomed and, unlike the imploded Iraqi military, the forces of the Islamic State proved quite capable of using that weaponry without a foreign trainer or adviser in sight."
‹ Previous 21 - 40 of 219 Next › Last »
Showing 20 items per page