Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "learning" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radicalizers' - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
Paul Merrell

Group Thinks Anonymity Should Be Baked Into the Internet Itself Using Tor - Slashdot - 0 views

  • "David Talbot writes at MIT Technology review that engineers on the Internet Engineering Task Force (IETF), an informal organization of engineers that changes Internet code and operates by rough consensus, have asked the architects of Tor to consider turning the technology into an Internet standard. If widely adopted, such a standard would make it easy to include the technology in consumer and business products ranging from routers to apps and would allow far more people to browse the Web without being identified by anyone who might be spying on Internet traffic. The IETF is already working to make encryption standard in all web traffic. Stephen Farrell believes that forging Tor into a standard that interoperates with other parts of the Internet could be better than leaving Tor as a separate tool that requires people to take special action to implement. 'I think there are benefits that might flow in both directions,' says Farrell. 'I think other IETF participants could learn useful things about protocol design from the Tor people, who've faced interesting challenges that aren't often seen in practice. And the Tor people might well get interest and involvement from IETF folks who've got a lot of experience with large-scale systems.' Andrew Lewman, executive director of Tor, says the group is considering it. 'We're basically at the stage of 'Do we even want to go on a date together?' It's not clear we are going to do it, but it's worth exploring to see what is involved. It adds legitimacy, it adds validation of all the research we've done.'"
Paul Merrell

Zionism's Last Card and Hope For Palestine - Alan Hart - 0 views

  • Following the interim agreement with Iran the next six months will tell us whether or not the American-led Zionist lobby and Zionism itself has played its last card and lost. If it does lose President Obama will be free to use the leverage he has to try to cause Israel to be serious about peace on terms almost all Palestinians and most other Arabs and Muslims everywhere could accept (and which would not pose any threat to the wellbeing and security of those Jews now living in Palestine that became Israel and who wanted to stay). The stakes could not be higher. As I write I am recalling what former President Carter said to my wife and I when we met with him and Rosalyn, words I quote in my book Zionism: The Real Enemy of the Jews and which bear repeating. “Any American president has only two windows of opportunity to take on the Zionist lobby – in the first nine months of his first term and the last year of his second term if he has one.”
  • I am happy to go public with this positive speculation in part because of an article by Philip Weiss. In it he noted that Netanyahu has been playing the Iran threat card “to keep the world’s eyes off the West Bank and Jerusalem.” Then, commenting on Netanyahu’s statement that Israel will not allow Iran to attain nuclear capability, he wrote this. “The ardent supporters of the Jewish state in the U.S. have never been in a worse position. They are largely supportive of this deal (as are a majority of all Americans, I add). They will have to throw Netanyahu under the bus.” Not long ago the proclaimed view of some American supporters of Israel right or wrong was that Obama was throwing Israel under a bus. The idea that American Jews should now throw Netanyahu under it appeals to me, as I am sure it does to Obama. If Congress does back away from doing Zionism’s bidding to wreck the prospects for a new-start American and European accommodation with Iran, what options if any will Netanyahu’s Israel have to distract the world’s media and political attention from Zionism’s on-going colonization – ethnic cleansing slowly and by stealth – of the occupied West Bank? Only one that I can see. War.
  • Though events may prove me wrong, my overall speculation is that Zionism’s last card is not a winner and that Obama will succeed in getting, six months or so from now, what he wants – a new-start and mutually beneficial relationship with Iran. And defeat for the Zionist lobby will, as I indicated in my opening paragraph, free him to use the presidential leverage to try to oblige Israel to be serious about peace on terms the vast majority of Palestinians could accept.
  • ...3 more annotations...
  • In the context above what I am suggesting is that if and when he is free to put real pressure on Israel to be serious about peace with the Palestinians, Obama should make best use of the Kennedy quote – “What we want from Israel arises because our relationship is a two-way street”. And he could and should put flesh on that bone by saying, among other things, that it is not in America’s own best interests to allow Israel to go on denying the Palestinians an acceptable measure of justice. But his crunch point could and should be something like this. “What America wants and needs, in order to best protect its own interests in the Arab and wider Muslim world, is an end to Israel’s denial of an acceptable amount of justice for the Palestinians. Unless we get that, I as president will have no choice but to use the leverage at my disposal to press you.” Israelis would know, even if Obama didn’t spell it out, that the pressure would include an end to American vetoes of Security Council resolutions condemning Israel and sanctions. If Obama was to go public with such a position in the wake of defeat for the Zionist lobby over the Iran nuclear issue, I think it’s reasonable to assume that a big majority of Jewish Americans would signal, if only by their silence and/or refusal to condemn Obama, that their first loyalty was to America not Israel.
  • There is no certainty about how the Jews of Israel would respond, but there’s a good case for believing that because what most of them care most about is the relationship with America, a significant majority of them would say to Netanyahu and his coalition government something like: “Enough is enough. We insist that you make peace with the Palestinians on terms they can accept, even if that means a short, sharp civil war with those settlers who refuse to withdraw from the West Bank and be relocated and compensated.”
  • For those who might believe there is little or no prospect of a Jewish civil war in the event of President Obama insisting with leverage as necessary on Israel making peace with the Palestinians on terms they could accept, I recommend Chapter 12 of Volume Three of the American edition of my book. This chapter is titled The Blood Oath. It reveals that Sharon convened a secret meeting of many senior military officers to sign a blood oath committing them to make common cause with those settlers who would resist “to the death” the implementation of any government decision to withdraw from the West Bank. My named and quoted source for that dramatic story was none other than Ezer Weizman, Israel’s defense minister of the time. When Ezer told me of the secret meeting minutes after he learned about it, he asked me a question. Did I think Sharon would act in accordance with the blood oath he and others had signed? I said: “What I think is of no consequence. I’m a visiting goy. You’re Israel’s defense minister, what do you think?” He replied: “Of course, he would. He’s mad enough to nuke the entire fucking Arab world!“ The coming months will tell us how mad Netanyahu is. And also whether or not the optimism expressed in this post was justified.
  •  
    'Twould be nice if it worked out this way. But Obama is spineless so I won't hold my breath. 
Paul Merrell

Congressional oversight of the NSA is a joke. I should know, I'm in Congress | Alan Grayson | Comment is free | theguardian.com - 0 views

  • Despite being a member of Congress possessing security clearance, I've learned far more about government spying on me and my fellow citizens from reading media reports than I have from "intelligence" briefings. If the vote on the Amash-Conyers amendment is any indication, my colleagues feel the same way. In fact, one long-serving conservative Republican told me that he doesn't attend such briefings anymore, because, "they always lie".Many of us worry that Congressional Intelligence Committees are more loyal to the "intelligence community" that they are tasked with policing, than to the Constitution. And the House Intelligence Committee isn't doing anything to assuage our concerns.
  • And why do Generals Alexander and Clapper remain in office, when all the evidence points to them committing the felony of lying to Congress and the American people?
  •  
    Congressman Alan Grayson speaks out on the illusion of Congressional oversight of the U.S. intelligence community. A must-read
Paul Merrell

White House OKd spying on allies, U.S. intelligence officials say - latimes.com - 0 views

  • The White House and State Department signed off on surveillance targeting phone conversations of friendly foreign leaders, current and former U.S. intelligence officials said Monday, pushing back against assertions that President Obama and his aides were unaware of the high-level eavesdropping. Professional staff members at the National Security Agency and other U.S. intelligence agencies are angry, these officials say, believing the president has cast them adrift as he tries to distance himself from the disclosures by former NSA contractor Edward Snowden that have strained ties with close allies. The resistance emerged as the White House said it would curtail foreign intelligence collection in some cases and two senior U.S. senators called for investigations of the practice. France, Germany, Italy, Mexico and Sweden have all publicly complained about the NSA surveillance operations, which reportedly captured private cellphone conversations by German Chancellor Angela Merkel, among other foreign leaders.
  • On Monday, as Spain joined the protest, the fallout also spread to Capitol Hill.
  • Until now, members of Congress have chiefly focused their attention on Snowden's disclosures about the NSA's collection of U.S. telephone and email records under secret court orders. "With respect to NSA collection of intelligence on leaders of U.S. allies — including France, Spain, Mexico and Germany — let me state unequivocally: I am totally opposed," said Sen. Dianne Feinstein (D-Calif.), who chairs the Senate Intelligence Committee. "Unless the United States is engaged in hostilities against a country or there is an emergency need for this type of surveillance, I do not believe the United States should be collecting phone calls or emails of friendly presidents and prime ministers," she said in a statement. Feinstein said the Intelligence Committee had not been told of "certain surveillance activities" for more than a decade, and she said she would initiate a major review of the NSA operation. She added that the White House had informed her that "collection on our allies will not continue," although other officials said most U.S. surveillance overseas would not be affected. Sen. John McCain (R-Ariz.), ranking minority member of the Armed Services Committee, said Congress should consider creating a special select committee to examine U.S. eavesdropping on foreign leaders.
  • ...5 more annotations...
  • "Obviously, we're going to want to know exactly what the president knew and when he knew it," McCain told reporters in Chicago. "We have always eavesdropped on people around the world. But the advance of technology has given us enormous capabilities, and I think you might make an argument that some of this capability has been very offensive both to us and to our allies."
  • Precisely how the surveillance is conducted is unclear. But if a foreign leader is targeted for eavesdropping, the relevant U.S. ambassador and the National Security Council staffer at the White House who deals with the country are given regular reports, said two former senior intelligence officials, who spoke on condition of anonymity in discussing classified information. Obama may not have been specifically briefed on NSA operations targeting a foreign leader's cellphone or email communications, one of the officials said. "But certainly the National Security Council and senior people across the intelligence community knew exactly what was going on, and to suggest otherwise is ridiculous." If U.S. spying on key foreign leaders was news to the White House, current and former officials said, then White House officials have not been reading their briefing books. Some U.S. intelligence officials said they were being blamed by the White House for conducting surveillance that was authorized under the law and utilized at the White House. "People are furious," said a senior intelligence official who would not be identified discussing classified information. "This is officially the White House cutting off the intelligence community."
  • Any decision to spy on friendly foreign leaders is made with input from the State Department, which considers the political risk, the official said. Any useful intelligence is then given to the president's counter-terrorism advisor, Lisa Monaco, among other White House officials. Jay Carney, the White House press secretary, said Monday that Obama had ordered a review of surveillance capabilities, including those affecting America's closest foreign partners and allies. "Our review is looking across the board at our intelligence gathering to ensure that as we gather intelligence, we are properly accounting for both the security of our citizens and our allies and the privacy concerns shared by Americans and citizens around the world," Carney said.
  • Caitlin Hayden, spokeswoman for the National Security Council, said the review would examine "whether we have the appropriate posture when it comes to heads of state, how we coordinate with our closest allies and partners, and what further guiding principles or constraints might be appropriate for our efforts." She said the review should be completed this year.
  • Intelligence officials also disputed a Wall Street Journal article Monday that said the White House had learned only this summer — during a review of surveillance operations that might be exposed by Snowden — about an NSA program to monitor communications of 35 world leaders. Since then, officials said, several of the eavesdropping operations have been stopped because of political sensitivities.
  •  
    Good. The Intelligence community is calling BS on Obama's claim that he didn't know about the spying on foreign heads of allied states. And McCain says we need a select Congressional committee to look into what the president knew and when he knew it. That's an implicit slam of the Feinstein-led Senate Select Committee on Intelligence's oversight of the intelligence agencies and a signal that there is a scandal lurking here. More importantly, a new select committee would not have the same membership as the existing Intelligence Community, which has largely functioned as a rubber stamp for what the intelligence agencies want. We have been down this road before, in the mid-70s, when the Defense Dept. intelligence agencies were caught spying on Americans, leading to the Select Committee investigation headed by former Sen. Frank Church and to the initial passage of the Foreign Intelligence Surveillance Act, among other legislation delivering a strong message to the intelligence agencies that what happens within the U.S. is off-limits to them. But that was a lesson forgotten as new technology came along for NSA to play with. If Obama is smart, he will promptly respond to the LA Times article with a clarification that top members of his staff knew and the previous statement dealt only with his personal knowledge. But the Obama Administration has overwhelmingly demonstrated an inability to head off scandals and a big tendency to cover-up rather than get out in front of story, particularly in matters involving the NSA. So we may see a major scandal emerge from this already enormous scandal that is laid directly at Barack Obama's feet, a cover-up scandal.   Who knew what when, where, why, and how? My favorite question. 
Paul Merrell

Officials Say U.S. May Never Know Extent of Snowden's Leaks - NYTimes.com - 0 views

  • American intelligence and law enforcement investigators have concluded that they may never know the entirety of what the former National Security Agency contractor Edward J. Snowden extracted from classified government computers before leaving the United States, according to senior government officials.
  • “They’ve spent hundreds and hundreds of man-hours trying to reconstruct everything he has gotten, and they still don’t know all of what he took,” a senior administration official said. “I know that seems crazy, but everything with this is crazy.” That Mr. Snowden was so expertly able to exploit blind spots in the systems of America’s most secretive spy agency illustrates how far computer security still lagged years after President Obama ordered standards tightened after the WikiLeaks revelations of 2010.
  • In recent days, a senior N.S.A. official has told reporters that he believed Mr. Snowden still had access to documents not yet disclosed. The official, Rick Ledgett, who is heading the security agency’s task force examining Mr. Snowden’s leak, said he would consider recommending amnesty for Mr. Snowden in exchange for those documents. “So, my personal view is, yes, it’s worth having a conversation about,” Mr. Ledgett told CBS News. “I would need assurances that the remainder of the data could be secured, and my bar for those assurances would be very high. It would be more than just an assertion on his part.”
  • ...1 more annotation...
  • Because the N.S.A. is still uncertain about exactly what Mr. Snowden took, government officials sometimes first learn about specific documents from reporters preparing their articles for publication — leaving the State Department with little time to notify foreign leaders about coming disclosures.
Paul Merrell

How Americans Were Deceived About Cell-Phone Location Data - Conor Friedersdorf - The Atlantic - 0 views

  • Put simply, everyone who feared that the NSA collects location data on Americans was correct. But they didn't learn that back when they expressed those fears.  Quite the contrary. On multiple occasions, Obama Administration officials spoke about the collection of cell-phone location data in ways that were often technically accurate but wildly deceptive. In so doing, they succeeded in confusing the surveillance debate and creating the inaccurate impression that location data wasn't being collected. This is a review of their deceptions. 
  • Obama Administration officials carried out all this deception even though they knew that Snowden's cache would likely reveal the truth about the collection of location data. Sure enough, the truth came out a few months later, but it wouldn't be correct to suggest that their efforts had no consequences. Their behavior on this matter perfectly illustrates why neither the press nor the public should ever take anything a surveillance-state official says at face value. Even if they usually (though not always) say things that are technically true, they are also masters of deception, willing to egregiously mislead with their rhetoric if doing so will help them maintain maximum secrecy a bit longer. 
Paul Merrell

Exclusive: Secret contract tied NSA and security industry pioneer | Reuters - 0 views

  • (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
  • The earlier disclosures of RSA's entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.
  • The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.
  • ...2 more annotations...
  • The NSA came under attack this week in a landmark report from a White House panel appointed to review U.S. surveillance policy. The panel noted that "encryption is an essential basis for trust on the Internet," and called for a halt to any NSA efforts to undermine it.
  • From RSA's earliest days, the U.S. intelligence establishment worried it would not be able to crack well-engineered public key cryptography. Martin Hellman, a former Stanford researcher who led the team that first invented the technique, said NSA experts tried to talk him and others into believing that the keys did not have to be as large as they planned.
  •  
    Reuters gives the NSA's history of introducing backdoors in encryption standards a deep look, focusing on RSA's acceptance of a $10 million NSA bribe post-9/11 to implement the NSA-created Dual Elliptic Curve standard for generating "random" numbers, which had what Bruce Schneier described as a "back door." A tip of the hat to Miro for alerting me to this article.
Gary Edwards

The Daily Bell - Catherine Austin Fitts on Moral Investing and the Coming Equity 'Crash-Up' - 1 views

  • If you talk about legacy systems and then a breakaway civilization, the legacy systems were financed with debt and if the resources have basically been shifted out and over into "NewCo" then that's going to be an equity model. We're literally coming into what I consider to be a planetary debt for equity swap. So the question for all of us is how do we navigate the turn? When do you leave the bond market and when does the equity increase occur? We've seen North America equity markets rising and the emerging markets falling this year.
  • We're seeing a tremendous divergence in the economy in North America between those portions of the economy that are adapting new technology and growing and the rest of the economy.
  • The other thing I watch is what the divergence means to bond credits and to equity valuations. If you look at the indices you don't really see it. If you look inside the indices you see some enormous splits in quality and value going on.
  • ...43 more annotations...
  • The slow burn is a world in which for most people income is flat or falling and expenses are steadily rising. It's a debasement scenario. And the reality is the central banks have been able to have a quite liberal monetary policy because we've been able to offset that with labor deflation. So by globalizing labor and instituting technology you have tremendous deflationary pressures, which offset very generous monetary policy.
  • Starting in the '90s a decision was made to move significant amounts of capital out of existing systems in  the developed world and literally trillions of dollars of financial fraud was engineered to do that. As a financial phenomenon it was quite clever and trillions have literally been moved out between the fraud and the bailouts. I think what the Fed has been doing with quantitative easing is running a shredding operation where they buy up the fraudulent mortgage securities paper and are shredding it.
  • If you look at the Treasury, they've run a very tight regulatory process where that money doesn't seep out on Main Street. It's quite phenomenal the way they've managed to control it. I think one of the big questions is where is that money going to go now? It certainly looks to me like a great effort is being made to make sure it goes into equities, sort of keeps the bond market afloat and goes into equities. So I look it as a very political move.
  • You can balance the budget with fiscal measures or you can balance the budget by the Fed just buying bonds and if you look at the Fed's balance sheet, I think they have a much greater capacity to buy bonds. If you look at all the money that was stolen, the breakaway civilization has plenty of money to buy bonds.
  • I would say so far the Fed's policies have worked for what they're intended to do. We've moved a tremendous amount of money out of the economy. We've now basically run through the statute of limitations or done whatever management needed to cut the cords so that what I call the legacy systems can't get the money back. So the financial coup d'état has been successful and now the cover-up is pretty much over and successful.
  • So now you have big decisions. You have two economies. Before this started what I call the legacy systems had $100 trillion of liabilities and $100 trillion of assets – now, I'm just pulling those numbers out of the air – and
  • the coup moved $40 trillion of assets over into NewCo
  • if you will. Now we've got the legacy systems trying to reconcile $60 trillion of assets to $100 trillion of liabilities and there is a long, drawn-out, grinding process by which some people will get 50 cents on the dollar, some people will get zero cents on the dollar, some people will get 100 cents on the dollar. It's just a very difficult, complex and tangled political scene as to how that's going to all happen. Meantime, NewCo, with $40 trillion dollars, is investing and going gangbusters. NewCo is enjoying an unprecedented boom, investing in lots of new technology and new frontiers, including space. So I think the next step is to manage the lowering of expectations in the legacy systems. That's basically what the administration and the Fed are going to be doing for the next couple years, is just gutting their way through retirees' disappointment.
  • There are three things
  • Number one, Obamacare was created to create a framework that would allow significant reduction of costs and benefits under Medicare over time and healthcare over time;
  • Well, the goal of Obamacare is to control.
  • number two, Obamacare was to provide much more control over both the medical establishment and the population at large;
  • and then, three, to do it in a way that will protect corporate profits.
  • in a relatively short period of time US Medicare expenses would be several multiplicities of the GNP.
  • It's clearly a system that makes no economic sense. It's not just that people are aging. If we eat food that has little nutrition and provide healthcare in which pharmaceutical companies are allowed to charge many multiples of what they charge in other countries you're going to get a financial train wreck, which is where we're headed.
  • So I think the goal was to reconcile that and do it in a way that favors corporations and control.
  • If you go around the entire financial ecosystem, they're getting hit within every line by the same pro-centralization policies that ultimately go up to the same people.
  • Do I think it will snuff out the recovery? No. I think it will simply destroy the economics for a whole world of people who were productive.
  • I don't think the banks are fragile. What happened was they were asked to do a job, they did it and now they've taken all the fraudulent paper and sold it to the Fed or torn it up because they had so much in federal credit arbitrage earnings during this period. So I don't think they're fragile.
  • So it certainly puts us in a position where the creditworthiness of a lot of sovereign debt depends on government military might and the ability to debase a variety of players.
  • There's been a lot of regulation to make it easy for Wall Street to control and make it difficult for small businesses to raise and circulate liquid equity. It's one of the areas in the economy where there really has been a very serious conspiracy.
  • if you want to go really fast and prototype and build out infrastructure, the best way to do it is to make capital available to early venture and start-ups.
  • we, as a society, have stopped the markets from working in the start-up and the small business space.
  • If you look at it across all the different tools, from fabrication technology to new composite materials to robotics to lasers, we're reaching a critical mass of the economic costs dropping and the speed of learning accelerating.
  • If you look back at the history of the US stock market you'll see two huge spikes, one in the '20s, one in the '90s, both when very profound new communication and information technology came out.
  • I think we're in danger of another tech bubble. If you look at who's interested in putting money in this and getting lots of prototypes, the last time they did this was in the '90s. They made a fortune on fraud and they used it not only to serve some fundamental economic purposes but they used it to drain out the pension funds and the retail investors.
  • securities convertible into store credits
  • Wall Street doesn't understand about crowdfunding, are the new alignments that are going to be created in terms of circulating knowledge and purchases and money between consumers and entrepreneurs and companies. It's going to create a whole new level of intimacy.
  • I recommend the documentary, "The Naked Brand." It gives a good sense of the worth of that intimacy and the change from a mass media model to much more intimate relationships
  • awakening of global consciousness.
  • in North America there is almost an astonishing lack of transparency about how government money works within the jurisdiction for which we vote for political representation.
  • So if you were going to have proper transparency in America you would have annual financial statements for your congressional district as well as for the whole country.
  • Now, the government has refused since 1995, as required by law, to produce annual financial statements let alone for the places in which you're voting for jurisdiction. And if you're going to have any kind of citizenry accountability or legislator accountability you have to have that kind of transparency and the government has gone to enormous lengths to prevent that kind of transparency while pretending that we're very transparent. So the Internet is going to make it more and more difficult for that absence of transparency to continue or be justified, and that's good.
  • if you have all your assets in the legacy economy and none in the growing economy you're going to suffer.
  • That's number one.
  • Number two, a lot of households have assets which represent liabilities of the legacy economy, whether Social Security, Medicare or others, and one of the things you have to understand is the politics – you need to not get trapped in the politics of stringing people out for those benefits. Do the best you can but don't get lost in the treadmill of trying to get promised benefits that may or may not come true. And to the extent that you can not get financially dependent on those benefits it would be very good.
  • The final thing is, of course, and readers know this if they're reading The Daily Bell, you're dealing in a system that includes a significant amount of corruption and fraud so you just need to be extremely careful about the quality of the people or the enterprises in which you invest or do business with and keep your assets fairly diversified in terms of both areas of the economy, or sectors, and places.
  • Take a look at different predictions that gold is going to increase significantly in value. All those predictions assume that the monetary inflation is going to spill into commodities. And what you're watching instead is the G-7 have been essentially building a corral that forces the horses to run out through the stock market. That's why I call it a crash-up.
  • I think one scenario we're looking at is the possibility of a crash-up scenario where that monetary increase is funneled into the equity markets. One of the most important questions there is, can you get the global population interested in investing in equities? Because the long bond market bull is coming to a close.
  • We have two choices. We can basically write down the debt and go through a huge crunch period or we can have a crash-up in the equity markets.
  • Right after 9/11 – and General Wesley Clark has said this and I experienced it in my tiny little community in Tennessee – we were basically given what the battle plan was going to be – the US military taking over Eurasia. First we were going to go to Afghanistan, then we were going to go to Iraq, then we were going to go to Libya, then we were going to go to Syria and then we're going to Iran. It was all laid out for us and we seem to be following that battle plan, albeit slower than predicted at that time.
  • If we're going to create a global financial system and a one-world currency, you need everybody in the central banking model. You have outliers. We seem to be bringing in all the outliers. As we do, we are trying to checkmate Russia and China within Eurasia, because I think control of Eurasia is essential for maintaining global empire.
  • what we're watching is an effort to bring everybody into a centrally controlled central banking model.
  •  
    Catherine is a frequent guest on CoastToCoastAM.com, so I've come to know her well.  Although this interview doesn't discuss her ability to see into the future, I know from experience that she is a real visionary hitting the mark at an astounding clip.  Chalk this interview up as a must read.
Paul Merrell

Obama confidant's spine-chilling proposal - Salon.com - 0 views

  • Cass Sunstein has long been one of Barack Obama’s closest confidants.  Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama’s head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for “overseeing policies relating to privacy, information quality, and statistical programs.”  In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites — as well as other activist groups — which advocate views that Sunstein deems “false conspiracy theories” about the Government.  This would be designed to increase citizens’ faith in government officials and undermine the credibility of conspiracists.  The paper’s abstract can be read, and the full paper downloaded, here. Sunstein advocates that the Government’s stealth infiltration should be accomplished by sending covert agents into “chat rooms, online social networks, or even real-space groups.”  He also proposes that the Government make secret payments to so-called “independent” credible voices to bolster the Government’s messaging (on the ground that those who don’t believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).   This program would target those advocating false “conspiracy theories,” which they define to mean: “an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role.”  Sunstein’s 2008 paper was flagged by this blogger, and then amplified in an excellent report by Raw Story‘s Daniel Tencer.
  • There’s no evidence that the Obama administration has actually implemented a program exactly of the type advocated by Sunstein, though in light of this paper and the fact that Sunstein’s position would include exactly such policies, that question certainly ought to be asked.  Regardless, Sunstein’s closeness to the President, as well as the highly influential position he occupies, merits an examination of the mentality behind what he wrote.  This isn’t an instance where some government official wrote a bizarre paper in college 30 years ago about matters unrelated to his official powers; this was written 18 months ago, at a time when the ascendancy of Sunstein’s close friend to the Presidency looked likely, in exactly the area he now oversees.  Additionally, the government-controlled messaging that Sunstein desires has been a prominent feature of U.S. Government actions over the last decade, including in some recently revealed practices of the current administration, and the mindset in which it is grounded explains a great deal about our political class.  All of that makes Sunstein’s paper worth examining in greater detail.
  • Initially, note how similar Sunstein’s proposal is to multiple, controversial stealth efforts by the Bush administration to secretly influence and shape our political debates.  The Bush Pentagon employed teams of former Generals to pose as “independent analysts” in the media while secretly coordinating their talking points and messaging about wars and detention policies with the Pentagon.  Bush officials secretly paid supposedly “independent” voices, such as Armstrong Williams and Maggie Gallagher, to advocate pro-Bush policies while failing to disclose their contracts.  In Iraq, the Bush Pentagon hired a company, Lincoln Park, which paid newspapers to plant pro-U.S. articles while pretending it came from Iraqi citizens.  In response to all of this, Democrats typically accused the Bush administration of engaging in government-sponsored propaganda — and when it was done domestically, suggested this was illegal propaganda.  Indeed, there is a very strong case to make that what Sunstein is advocating is itself illegal under long-standing statutes prohibiting government ”propaganda” within the U.S., aimed at American citizens: As explained in a March 21, 2005 report by the Congressional Research Service, “publicity or propaganda” is defined by the U.S. Government Accountability Office (GAO) to mean either (1) self-aggrandizement by public officials, (2) purely partisan activity, or (3) “covert propaganda.”  By covert propaganda, GAO means information which originates from the government but is unattributed and made to appear as though it came from a third party.
  • ...10 more annotations...
  • Covert government propaganda is exactly what Sunstein craves.  His mentality is indistinguishable from the Bush mindset that led to these abuses, and he hardly tries to claim otherwise.  Indeed, he favorably cites both the covert Lincoln Park program as well as Paul Bremer’s closing of Iraqi newspapers which published stories the U.S. Government disliked, and justifies them as arguably necessary to combat “false conspiracy theories” in Iraq — the same goal Sunstein has for the U.S.Sunstein’s response to these criticisms is easy to find in what he writes, and is as telling as the proposal itself.  He acknowledges that some “conspiracy theories” previously dismissed as insane and fringe have turned out to be entirely true (his examples:  the CIA really did secretly administer LSD in “mind control” experiments; the DOD really did plot the commission of terrorist acts inside the U.S. with the intent to blame Castro; the Nixon White House really did bug the DNC headquarters).  Given that history, how could it possibly be justified for the U.S. Government to institute covert programs designed to undermine anti-government “conspiracy theories,” discredit government critics, and increase faith and trust in government pronouncements?  Because, says Sunstein, such powers are warranted only when wielded by truly well-intentioned government officials who want to spread The Truth and Do Good — i.e., when used by people like Cass Sunstein and Barack Obama
  • Throughout, we assume a well-motivated government that aims to eliminate conspiracy theories, or draw their poison, if and only if social welfare is improved by doing so. But it’s precisely because the Government is so often not “well-motivated” that such powers are so dangerous.  Advocating them on the ground that “we will use them well” is every authoritarian’s claim.  More than anything else, this is the toxic mentality that consumes our political culture:  when our side does X, X is Good, because we’re Good and are working for Good outcomes.  That was what led hordes of Bush followers to endorse the same large-government surveillance programs they long claimed to oppose, and what leads so many Obama supporters now to justify actions that they spent the last eight years opposing.
  • Consider the recent revelation that the Obama administration has been making very large, undisclosed payments to MIT Professor Jonathan Gruber to provide consultation on the President’s health care plan.  With this lucrative arrangement in place, Gruber spent the entire year offering public justifications for Obama’s health care plan, typically without disclosing these payments, and far worse, was repeatedly held out by the White House — falsely — as an “independent” or “objective” authority.  Obama allies in the media constantly cited Gruber’s analysis to support their defenses of the President’s plan, and the White House, in turn, then cited those media reports as proof that their plan would succeed.  This created an infinite “feedback loop” in favor of Obama’s health care plan which — unbeknownst to the public — was all being generated by someone who was receiving hundreds of thousands of dollars in secret from the administration (read this to see exactly how it worked).In other words, this arrangement was quite similar to the Armstrong Williams and Maggie Gallagher scandals which Democrats, in virtual lockstep, condemned.  Paul Krugman, for instance, in 2005 angrily lambasted right-wing pundits and policy analysts who received secret, undisclosed payments, and said they lack “intellectual integrity”; he specifically cited the Armstrong Williams case.  Yet the very same Paul Krugman last week attacked Marcy Wheeler for helping to uncover the Gruber payments by accusing her of being “just like the right-wingers with their endless supply of fake scandals.”  What is one key difference?  Unlike Williams and Gallagher, Jonathan Gruber is a Good, Well-Intentioned Person with Good Views — he favors health care — and so massive, undisclosed payments from the same administration he’s defending are dismissed as a “fake scandal.”
  • Sunstein himself — as part of his 2008 paper — explicitly advocates that the Government should pay what he calls “credible independent experts” to advocate on the Government’s behalf, a policy he says would be more effective because people don’t trust the Government itself and would only listen to people they believe are “independent.”  In so arguing, Sunstein cites the Armstrong Williams scandal not as something that is wrong in itself, but as a potential risk of this tactic (i.e., that it might leak out), and thus suggests that “government can supply these independent experts with information and perhaps prod them into action from behind the scenes,” but warns that “too close a connection will be self-defeating if it is exposed.”  In other words, Sunstein wants the Government to replicate the Armstrong Williams arrangement as a means of more credibly disseminating propaganda — i.e., pretending that someone is an “independent” expert when they’re actually being “prodded” and even paid “behind the scenes” by the Government — but he wants to be more careful about how the arrangement is described (don’t make the control explicit) so that embarrassment can be avoided if it ends up being exposed.  
  • In this 2008 paper, then, Sunstein advocated, in essence, exactly what the Obama administration has been doing all year with Gruber:  covertly paying people who can be falsely held up as “independent” analysts in order to more credibly promote the Government line.  Most Democrats agreed this was a deceitful and dangerous act when Bush did it, but with Obama and some of his supporters, undisclosed arrangements of this sort seem to be different.  Why?  Because, as Sunstein puts it:  we have “a well-motivated government” doing this so that “social welfare is improved.”  Thus, just like state secrets, indefinite detention, military commissions and covert, unauthorized wars, what was once deemed so pernicious during the Bush years — coordinated government/media propaganda — is instantaneously transformed into something Good.* * * * *What is most odious and revealing about Sunstein’s worldview is his condescending, self-loving belief that “false conspiracy theories” are largely the province of fringe, ignorant Internet masses and the Muslim world.  That, he claims, is where these conspiracy theories thrive most vibrantly, and he focuses on various 9/11 theories — both domestically and in Muslim countries — as his prime example.
  • It’s certainly true that one can easily find irrational conspiracy theories in those venues, but some of the most destructive “false conspiracy theories” have emanated from the very entity Sunstein wants to endow with covert propaganda power:  namely, the U.S. Government itself, along with its elite media defenders. Moreover, “crazy conspiracy theorist” has long been the favorite epithet of those same parties to discredit people trying to expose elite wrongdoing and corruption. Who is it who relentlessly spread “false conspiracy theories” of Saddam-engineered anthrax attacks and Iraq-created mushroom clouds and a Ba’athist/Al-Qaeda alliance — the most destructive conspiracy theories of the last generation?  And who is it who demonized as “conspiracy-mongers” people who warned that the U.S. Government was illegally spying on its citizens, systematically torturing people, attempting to establish permanent bases in the Middle East, or engineering massive bailout plans to transfer extreme wealth to the industries which own the Government?  The most chronic and dangerous purveyors of “conspiracy theory” games are the very people Sunstein thinks should be empowered to control our political debates through deceit and government resources:  namely, the Government itself and the Enlightened Elite like him.
  • It is this history of government deceit and wrongdoing that renders Sunstein’s desire to use covert propaganda to “undermine” anti-government speech so repugnant.  The reason conspiracy theories resonate so much is precisely that people have learned — rationally — to distrust government actions and statements.  Sunstein’s proposed covert propaganda scheme is a perfect illustration of why that is.  In other words, people don’t trust the Government and “conspiracy theories” are so pervasive precisely because government is typically filled with people like Cass Sunstein, who think that systematic deceit and government-sponsored manipulation are justified by their own Goodness and Superior Wisdom.
  • The point is that there are severe dangers to the Government covertly using its resources to “infiltrate” discussions and to shape political debates using undisclosed and manipulative means.  It’s called “covert propaganda” and it should be opposed regardless of who is in control of it or what its policy aims are. UPDATE II:  Ironically, this is the same administration that recently announced a new regulation dictating that “bloggers who review products must disclose any connection with advertisers, including, in most cases, the receipt of free products and whether or not they were paid in any way by advertisers, as occurs frequently.”  Without such disclosure, the administration reasoned, the public may not be aware of important hidden incentives (h/t pasquin).  Yet the same administration pays an MIT analyst hundreds of thousands of dollars to advocate their most controversial proposed program while they hold him out as “objective,” and selects as their Chief Regulator someone who wants government agents to covertly mold political discussions “anonymously or even with false identities.”
  • UPDATE III:  Just to get a sense for what an extremist Cass Sunstein is (which itself is ironic, given that his paper calls for ”cognitive infiltration of extremist groups,” as the Abstract puts it), marvel at this paragraph:
  • So Sunstein isn’t calling right now for proposals (1) and (2) — having Government ”ban conspiracy theorizing” or “impose some kind of tax on those who” do it — but he says “each will have a place under imaginable conditions.”  I’d love to know the “conditions” under which the government-enforced banning of conspiracy theories or the imposition of taxes on those who advocate them will “have a place.”  That would require, at a bare minumum, a repeal of the First Amendment.  Anyone who believes this should, for that reason alone, be barred from any meaningful government position.
  •  
    This is a January 2010 article by Glenn Greenwald. The Sunstein paper referred to was published in 2008 and is at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1084585  Sunstein left the Obama Administration in 2012 and now teaches law at Harvard. He is the husband of U.S. Ambassador to the U.N. Susan Rice,a notorious neocon.  His paper is scholarly only in format. His major premises have no citations and in at least two cases are straw man logical fallacies that misportray the position of the groups he criticizes. This is "academic" work that a first-year-law student heading for a 1.0 grade point average could make mincemeat of. This paper alone would seem to disqualify him from a Supreme Court nomination and from teaching law. Has he never heard of the First Amendment and why didn't he bother to check whether it is legal to inflict propaganda on the American public? But strange things happen when you're a buddy of an American president. Most noteworthy, however, is that the paper unquestionably puts an advocate of waging psychological warfare against the foreign populations *and* the American public as the head of the White House White House OMB Office of Information and Regulatory Affairs from 2008 through 2012 and on Obama's short list for the Supreme Court. Given the long history of U.S. destabilization of foreign nations via propaganda, of foreign wars waged under false pretenses, of the ongoing barrage of false information disseminated by our federal government, can there be any reasonable doubt that the American public is not being manipulated by false propaganda disseminated by their own government?  An inquiring mind wants to know ...   
Paul Merrell

Exposed: Google's "Smart Home" Surveillance Plans, or, How To Not Be Colonized | TBYP - 0 views

  • Two weeks ago, the New York Times’ truth-humor strip on “The Home of the Future” came on the heels of Google’s purchase of ‘smart thermostat’ manufacturer Nest for $3.2 Billion.  With power utility commissions such as California already stating their intention to “expand third-party access” to in-home data, the perfect storm is brewing for Google’s mission of making you their product – even in your own home. For context, this is the same Google whose executive chairman, Eric Schmidt, told MSNBC: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
  • So where does a ‘smart thermostat’ fit in the current corporatist drive for total in-home surveillance? For the last couple of years, utilities around the globe have all been touting their new metering systems with buzzwords such as ‘smart’, ‘advanced’, ‘upgraded’, or ‘modernized’.  All rhetoric aside, these devices are intended to integrate with all appliances in your home to form an inescapable wireless data-mining dragnet, dubbed as the “home area network”, with your HVAC and likely other in-home systems overseen by spy-giant Google, if they get their way. As we’ve seen, even former CIA director David Patraeus was publicly frothing over having the ability to spy through ‘smart’ appliances, intended to wirelessly report back to the meter continuously, while receiving energy-use dictates from the meter. According to a US Congressional Research Report:
  • “With smart meters, police will have access to data that might be used to track residents’ daily lives and routines while in their homes, including their eating, sleeping, and showering habits, what appliances they use and when, and whether they prefer the television to the treadmill, among a host of other details.” Smart grid planners and working groups have even laid these aims out in their internal roadmaps, citing goals such as “new tools for mining data and intel” and “data mining and analytics to become core competency” (see slide 17).
  • ...3 more annotations...
  • Despite pilot programs indicating no energy savings and mounting opposition now from several hundred activist groups, federal governments such as the US are continuing with their push to incentivize utilities to push forward ‘smart’ grid deployment. Apparently, having a piece of the $11 Billion taxpayer-funded ‘smart’ grid pie, pushed through by the Obama Administration immediately following the 2008 election, is sufficient motivation for utility executives to steamroll forward despite the growing resistance. As an example, PECO, a major utility in Pennsylvania, is slated to receive $200 Million in stimulus funding if they can deploy 600,000 ‘smart’ meters by April 2014. Significantly, anyone can choose to protect their in-home rights by saying no to the deployment of a ‘smart’ meter on their home.  There are no legal requirements in any country or region for an energy customer to accept a ‘smart’ meter.
  • So what can be done to protect rights?  While people cannot vote to prevent corporations from making products such as data-mining thermostats appliances, they do have a voice as utilities try their best to deploy the home-colonizing meters.  Public resistance to ‘smart’ meter deployments has predictably been considerable, as people are learning about not only surveillance capabilities, but also skyrocketing electricity costs, time-of-use billing, risk of fires, home hackability, electrical quality degradation and functional impairments from pulsed microwave radiation — amazingly, all being linked to the new utility metering system.
  • However, utilities are using tactics of intimidation, propaganda, and tacit acceptance – which means that unless you said a clear “no”, they assume a “yes.” In some cases even with a homeowner’s refusal, utilities are forcibly deploying anyway, apparently assuming the liability for doing so, risking litigation. So Google has played their hand with the $3.2 Billion purchase of Nest, desiring to capture the worldwide ‘smart’ home data-mining market, and praying to the all-spying-eye that people will stay tethered to their ‘smart’ wireless toys as their rights roll swiftly towards a cliff.  But will awareness eventually reach a game-changing crescendo?  It seems as though the potential exists. If we want to experience a future other than being ruled by technocrats, now is the time to speak up – even if facing the situation isn’t convenient.  People simply need to know the facts. As stated by former Apple executive Jeffrey Armstrong in our film Take Back Your Power, the question of whether homes will remain free of invasive ‘smart’ metering and appliance technology is “a test case for a technological democracy, if I have ever seen one.” 
Paul Merrell

WASHINGTON: CIA's use of harsh interrogation went beyond legal authority, Senate report says | National Security & Defense | McClatchy DC - 0 views

  • A still-secret Senate Intelligence Committee report calls into question the legal foundation of the CIA’s use of waterboarding and other harsh interrogation techniques on suspected terrorists, a finding that challenges the key defense on which the agency and the Bush administration relied in arguing that the methods didn’t constitute torture.The report also found that the spy agency failed to keep an accurate account of the number of individuals it held, and that it issued erroneous claims about how many it detained and subjected to the controversial interrogation methods. The CIA has said that about 30 detainees underwent the so-called enhanced interrogation techniques.
  • The CIA’s claim “is BS,” said a former U.S. official familiar with evidence underpinning the report, who asked not to be identified because the matter is still classified. “They are trying to minimize the damage. They are trying to say it was a very targeted program, but that’s not the case.”The findings are among the report’s 20 main conclusions. Taken together, they paint a picture of an intelligence agency that seemed intent on evading or misleading nearly all of its oversight mechanisms throughout the program, which was launched under the Bush administration after the Sept. 11, 2001, attacks and ran until 2006.
  • Some of the report’s other conclusions, which were obtained by McClatchy, include:_ The CIA used interrogation methods that weren’t approved by the Justice Department or CIA headquarters._ The agency impeded effective White House oversight and decision-making regarding the program._ The CIA actively evaded or impeded congressional oversight of the program._ The agency hindered oversight of the program by its own Inspector General’s Office.
  • ...6 more annotations...
  • The investigation determined that the program produced very little intelligence of value and that the CIA misled the Bush White House, the Congress and the public about the effectiveness of the interrogation techniques, committee members have said.The techniques included waterboarding, which produces a sensation of drowning, stress positions, sleep deprivation for up to 11 days at a time, confinement in a cramped box, slaps and slamming detainees into walls. The CIA held detainees in secret “black site” prisons overseas and abducted others who it turned over to foreign governments for interrogation.The CIA, which contends that it gained intelligence from the program that helped identify al Qaida terrorists and averted plots against the United States, agreed with some of the report’s findings but disputed other conclusions in an official response sent to the committee in June 2013.
  • Some current and former U.S. officials and military commanders, numerous experts and foreign governments have condemned the harsh interrogation methods as violations of international and U.S. laws against torture, a charge denied by the CIA and the Bush administration.They’ve based their defense on a series of top-secret legal opinions issued by the Justice Department beginning in August 2002. At that time, the agency sought advice on whether using the harsh techniques on Zayn al Abidin Muhammad Husayn, a close aide to Osama bin Laden who went by the nom de guerre Abu Zubaydah, would violate U.S. law against torture.The Justice Department’s Office of Legal Counsel found that the methods wouldn’t breach the law because those applying them didn’t have the specific intent of inflicting severe pain or suffering.The Senate report, however, concluded that the Justice Department’s legal analyses were based on flawed information provided by the CIA, which prevented a proper evaluation of the program’s legality.
  • “The CIA repeatedly provided inaccurate information to the Department of Justice, impeding a proper legal analysis of the CIA’s Detention and Interrogation Program,” the report found.Several human rights experts said the conclusion called into question the program’s legal foundations.“If the CIA fundamentally misrepresented what it was doing and that was what led (Justice Department) lawyers to conclude that the conduct was legal, then the legal conclusions themselves were inaccurate,” said Andrea Prasow, senior national security counsel for Human Rights Watch. “The lawyers making those assessments were relying on the facts that were laid before them.”“This just reinforces the view that everyone who has said the torture program was legal has been selling a bill of goods and it’s time to revisit the entire conventional wisdom being pushed by those who support enhanced interrogation that this program was safe, humane and lawful,” said Raha Wala, a lawyer with Human Rights First’s Law and Public Safety Program.
  • Among other findings, the report said that CIA personnel used interrogation methods that weren’t approved by the Justice Department or their headquarters.The conclusion that the CIA provided inaccurate information to the Justice Department reflects the findings of a top-secret investigation of the program by the CIA Inspector General’s Office that was triggered by allegations of abuse.The CIA inspector general’s May 7, 2004, report, which was declassified, found that in waterboarding Zubaydah and Khalid Sheikh Mohammad, deemed the chief architect of the 9/11 attacks, the CIA went beyond the parameters it outlined to the Justice Department’s Office of Legal Counsel, which wrote the legal opinions.Zubaydah was waterboarded 83 times, while Mohammad underwent the procedure 183 times.Those cases clashed with the CIA’s assertion _ outlined in the now-declassified top-secret August 2002 Office of Legal Counsel opinion _ that repetition of the methods “will not be substantial because the techniques generally lose their effectiveness after several repetitions.”
  • The Office of Legal Counsel opinion stated that its finding that the harsh interrogation techniques didn’t constitute torture was based on facts provided by the CIA, and that “if these facts were to change, this advice would not necessarily apply.”The CIA inspector general’s report found that the “continued applicability of the DOJ opinion” was in question because the CIA told the Justice Department that it would use waterboarding in the same way that it was used in training U.S. military personnel to evade capture and resist the enemy. In fact, the inspector general’s report continued, the CIA used waterboarding in a “manner different” from U.S. military training.The CIA also failed to keep track of the number of individuals it captured under the program, the Senate report concluded. Moreover, it said, the agency held people who didn’t meet the legal standard for detention. The report puts that number at 26, McClatchy has learned.
  • “The CIA did not conduct a comprehensive or accurate accounting of the number of individuals it detained and held individuals who did not meet the legal standard for detention,” it found. “The CIA’s claims about the number of detainees held and subjected to its enhanced interrogation techniques were inaccurate.”“The CIA’s records were hazy, inconsistent and at times inaccurate,” said the former U.S. official.
Paul Merrell

FBI Abruptly Walks Out On Senate Briefing After Being Asked How 'Insider Threat' Program Avoids Whistleblowers | Techdirt - 0 views

  • While we've been disappointed that Senator Chuck Grassley appears to have a bit of a double standard with his staunch support for whistleblowers when it comes to Ed Snowden, it is true that he has fought for real whistleblower protections for quite some time. Lately, he's been quite concerned that the White House's "Insider Threat Program" (ITP) is really just a cover to crack down on whistleblowers. As we've noted, despite early promises from the Obama administration to support and protect whistleblowers, the administration has led the largest crackdown against whistleblowers, and the ITP suggests that the attack on whistleblowers is a calculated response. The program documentation argues that any leak can be seen as "aiding the enemy" and encourages government employees to snitch on each other if they appear too concerned about government wrong-doing. Despite all his high minded talk of supporting whistleblowers, President Obama has used the Espionage Act against whistleblowers twice as many times as all other Presidents combined. Also, he has never -- not once -- praised someone for blowing the whistle in the federal government.
  • Given all of that, Senator Grassley expressed some concern about this Insider Threat Program and how it distinguished whistleblowers from actual threats. He asked the FBI for copies of its training manual on the program, which it refused to give him. Instead, it said it could better answer any questions at a hearing. However, as Grassley explains, when questioned about this just 10 minutes into the hearing, the FBI abruptly got up and left: Meanwhile, the FBI fiercely resists any efforts at Congressional oversight, especially on whistleblower matters. For example, four months ago I sent a letter to the FBI requesting its training materials on the Insider Threat Program. This program was announced by the Obama Administration in October 2011. It was intended to train federal employees to watch out for insider threats among their colleagues. Public news reports indicated that this program might not do enough to distinguish between true insider threats and legitimate whistleblowers. I relayed these concerns in my letter. I also asked for copies of the training materials. I said I wanted to examine whether they adequately distinguished between insider threats and whistleblowers.
  • In response, an FBI legislative affairs official told my staff that a briefing might be the best way to answer my questions. It was scheduled for last week. Staff for both Chairman Leahy and I attended, and the FBI brought the head of their Insider Threat Program. Yet the FBI didn’t bring the Insider Threat training materials as we had requested. However, the head of the Insider Threat Program told the staff that there was no need to worry about whistleblower communications. He said whistleblowers had to register in order to be protected, and the Insider Threat Program would know to just avoid those people. Now I have never heard of whistleblowers being required to “register” in order to be protected. The idea of such a requirement should be pretty alarming to all Americans. Sometimes confidentiality is the best protection a whistleblower has. Unfortunately, neither my staff nor Chairman Leahy’s staff was able to learn more, because only about ten minutes into the briefing, the FBI abruptly walked out. FBI officials simply refused to discuss any whistleblower implications in its Insider Threat Program and left the room. These are clearly not the actions of an agency that is genuinely open to whistleblowers or whistleblower protection.
  • ...2 more annotations...
  • And yes, it's equally troubling that the FBI insists that as long as someone "registers" as a whistleblower, the FBI will suddenly, magically agree to stop investigating them as a "threat." We already know that's almost certainly bullshit. The stories of Thomas Drake and John Kiriakou are both clear examples of whistleblowers, who then had the DOJ search through basically everything they'd ever done to try to concoct some sort of Espionage Act case against them. In both cases, the eventual charges were totally ridiculous and unrelated to the whistleblowing they had done, but clearly the only reason they had been investigated was because of their status as whistleblowers. Drake was charged with having a classified document, which was just a meeting agenda and was both improperly classified and then declassified soon after. Kiriakou was charged with revealing the name of a CIA operative to a reporter, where the person in question was already widely known to journalists as working for the CIA. Meanwhile, while Grassley still hasn't come out in support of Snowden as a whistleblower, he does seem reasonably concerned that James Clapper's plans to stop the next Snowden will have severe consequences for whistleblowers:
  • Director of National Intelligence James Clapper seems to have talked about such procedures when he appeared before the Senate Armed Services Committee on February 11, 2014. In his testimony, he said: We are going to proliferate deployment of auditing and monitoring capabilities to enhance our insider threat detection. We’re going to need to change our security clearance process to a system of continuous evaluation. . . . What we need is . . . a system of continuous evaluation, where . . . we have a way of monitoring their behavior, both their electronic behavior on the job as well as off the job, to see if there is a potential clearance issue. . . . Director Clapper’s testimony gives me major pause. It sounds as though this type of monitoring would likely capture the activity of whistleblowers communicating with Congress. As Marcy Wheeler notes in her post (linked above, which called my attention to all this), by declaring war on whistleblowers, the administration is almost guaranteeing that many fewer will use "official channels" to blow the whistle. That just makes them targets with the likelihood of getting no results. Instead, all this does is incentivize people to go the Chelsea Manning/Ed Snowden route of going directly to journalists to make sure the stories get out.
Paul Merrell

Craig Murray » Blog Archive » UK Moves to Block US Senate Report to Protect Blair, Straw and Dearlove - 0 views

  • From a British diplomatic source I learn that Britain has lobbied the United States against the publication of the Senate Intelligence Committee report on torture and extraordinary rendition.  The lobbying has been carried out “at all levels” – White House, State Department and CIA.  The British have argued that at the very least the report must be emasculated before publication. The British argument is that in a number of court cases including the Belhadj case, the British government has successfully blocked legal action by victims on the grounds that this would weaken the US/UK intelligence relationship and thus vitally damage national security, by revealing facts the American intelligence service wish hidden.  [We will leave aside for the moment the utter shame of our servile groveling judges accepting such an argument].  The British Government are now pointing out to the Americans that this argument could be fatally weakened if major detail of the full horror and scope of torture and extraordinary rendition is revealed by the Senate Intelligence Committee.  The argument runs that this could in turn lead to further revelations in the courts and block the major defence against prosecutions of Blair, Straw and Dearlove, among others, potentially unleashing a transatlantic wave of judicial activism. The unabashed collusion of two torturing security states in concealing the truth of their despicable acts – including complicity in the torture of women and minors – and blocking criminal prosecution of the guilty is a sign of how low public ethics have sunk.  Fortunately there are still a few people in the British Foreign Office disgusted enough to leak it.
Paul Merrell

Media Blackout over Syria | Global Research - 0 views

  • On April 6, The London Review of Books published in its online journal Seymour Hersh’s “The Red Line and the Rat Line.” Hersh continues to expose details surrounding the staged August 21 chemical attack incident in Syria, which apparently pretty much everyone in Washington’s intelligence bureaucracy suspected was carried out by the rebels as soon as it happened. Seymour Hersh is a Pulitzer Prize winning journalist whose 40+ years career includes the exposing of the My Lai Massacre  and its cover-up, as well as the Abu Ghraib prison scandal. His December 19 report, “Whose Sarin?” -was his first report to expose the Syria chemical attack hoax based on close contact with US Intelligence officials. While “Whose Sarin” was originally prepared for the Washington Post, the newspaper rejected it and a media blackout followed in American press. Currently, Hersh’s newest investigative findings are going unacknowledged in mainstream US media.
  • Hersh’s report confirms the following: Obama’s push for attack on Syria was halted last minute when evidence that the Syrian government had nothing to do with the August 21 chemical attack became too overwhelming It had been well known to US government officials throughout the summer of 2013 that Turkish PM Erdogan was supporting al-Nusra Front in attempts to manufacture Sarin US military knew of Turkish and Saudi program for bulk Sarin production inside Syria from the spring of 2013 UN inspectors knew the rebels were using chemical weapons on the battlefield since the spring of 2013 As a result of the staged chemical incident, the White House ordered readiness for a “monster strike” on Syria, which included “two B-22 air wings and two thousand pound bombs” -and a target list which included military and civilian infrastructure targets (note: most of these are in densely populated civilian areas)
  • Full military strike was set for September 2 UK defense officials relayed to their American counterparts in the lead up to planned attack: “We’re being set up here.” CIA, MI6, Saudi Arabia, Qatar, and Turkey set up a “rat line” back in 2012 to run Libyan weapons into Syria via Turkey, including MANPADS; the Benghazi consulate was headquarters for the operation Obama OK’ed Turkish-Iranian gold export scam (that went from March 2012 to July 2013) which erupted in a Turkish scandal that nearly brought down the Erdogan government US Intelligence community had immediate doubts about Syrian regime responsibility for Aug. 21 attack, yet “reluctant to contradict the president” US government will not expose continued Turkey support of terrorism simply because “they’re a NATO ally”
  • ...2 more annotations...
  • In addition, last Thursday freelance Middle East journalist Sara Elizabeth Williams broke the story of a CIA/US Military run training camp for Syrian rebels in the Jordanian desert. VICE UK ran her story, “I Learned to Fight Like an American at the FSA Training Camp in Jordan,” yet it too failed to make it across the Atlantic into American reporting. International Syria experts thought her story hugely significant, but it got little attention. Top Syria expert in the US, Joshua Landis, announced on his Twitter account Thursday: “Sara Williams gets the scoop on the top secret FSA Training Camp in Jordan.” This courageous young freelancer revealed, with photos, the ins and outs of this secretive facility -yet the mainstream carefully shielded Americans from knowledge of the explosive report. In email conversation with her this weekend, Williams told me: “The access was tough to get, but I think it was worth the effort: to my mind, it’s important that people know what their government is doing in their name, with their tax dollars.” According to her investigative report:
  • Confirmed: “US-run training camp” for Syrian rebels in Northern Jordan Rebel recruits go “off the grid” while in secretive training camp Rebel fighter: “The Americans who taught us wore military uniforms I did not recognize. We called them by their first names and they spoke English to us.” Camp awash with “American food and American dollars”: recruits eat Kentucky Fried Chicken and live in temporary “pre-fabricated housing” units Recruits sent through intense 40 day program, which includes exercise, training in anti-tank missiles, and boot camp style atmosphere with orders given by US military instructors Upon graduation, US trained insurgents slip back across Syria’s southern border Experts say there are more camps like this one American trained rebel insurgent says: “America is benefiting from the destruction and the killing in order to weaken both sides.”
  •  
    It really says something about mainstream media when a story as explosive as Sy Hersh's new report on Obama's decision to postpone and then cancel military strikes on Syria is ignored by mainstream media. Hersh is one of the most respected of American war and intelligence journalists. 
Paul Merrell

Josh Mandel: Welders Make $150,000? Bring Back Shop Class - WSJ.com - 0 views

  • In American high schools, it is becoming increasingly hard to defend the vanishing of shop class from the curriculum. The trend began in the 1970s, when it became conventional wisdom that a four-year college degree was essential. As Forbes magazine reported in 2012, 90% of shop classes have been eliminated for the Los Angeles unified school district's 660,000 students. Yet a 2012 Bureau of Labor Statistics study shows that 48% of all college graduates are working in jobs that don't require a four-year degree.
  • A good trade to consider: welding. I recently visited Pioneer Pipe in the Utica and Marcellus shale area of Ohio and learned that last year the company paid 60 of its welders more than $150,000 and two of its welders over $200,000. The owner, Dave Archer, said he has had to turn down orders because he can't find enough skilled welders.
  • According to the 2011 Skills Gap Survey by the Manufacturing Institute, about 600,000 manufacturing jobs are unfilled nationally because employers can't find qualified workers. To help produce a new generation of welders, pipe-fitters, electricians, carpenters, machinists and other skilled tradesmen, high schools should introduce students to the pleasure and pride they can take in making and building things in shop class. American employers are so yearning to motivate young people to work in manufacturing and the skilled trades that many are willing to pay to train and recruit future laborers.
  •  
    The wisdom of offshoring manufacturing jobs and busting trade unions bites the U.S. in the bohunkus; a shortage of skilled tradesmen.  
Paul Merrell

​FBI 'intentionally and unlawfully' used No Fly List to recruit Muslims as informers - RT News - 0 views

  • The FBI used a no-fly list to recruit four US Muslims as informants, violating their constitutional rights to freedom of speech, association and religion. That’s the claim being made by four US Muslims in a New York federal court Tuesday. Muhammad Tanvir, Jameel Algibhah, Naveed Shinwari and Awais Sajjad, who are between them either US residents or permanent US residents, are demanding that the FBI remove them from the no-fly list which contains the names of people who are not permitted to board a commercial aircraft for travel in or out of the United States, according to threat and intelligence reporting. "This impermissible abuse of the No Fly List has forced Plaintiffs to choose between their constitutionally-protected right to travel, on the one hand, and their First Amendment rights on the other," says the lawsuit.
  • One of the plaintiffs, Awais Sajjad, a lawful permanent US resident, learned that he was on a No Fly List in 2012 when he tried to board a flight to Pakistan. The FBI agents questioned Sajjad at the airport before releasing him. Soon they returned with an offer: he could work as an FBI informer and in return the agency would give him citizenship and compensation, the Washington Post reported. When he refused, the bureau “kept him on the list in order to pressure and coerce Mr. Sajjad to sacrifice his constitutionally-protected rights,” says the lawsuit. Meanwhile, three other complainants – Tanvir, Algibhah and Shinwari – said they were added to the list immediately after they refused to work as FBI informants for religious reasons.
  • The fourth plaintiff, Muhammad Tanvir, started taking action against the FBI in October 2013, after he refused to spy on his local Pakistani community. Now he can’t visit his ailing mother. Ramzi Kassem, associate professor of law at the City University of New York, told the Washington Post that “the no-fly list is supposed to be about ensuring aviation safety, but the FBI is using it to force innocent people to become informants.” Meanwhile, the lawsuit seeks not only the plaintiffs’ removal from the no-fly list but also the establishment of a more robust legal mechanism to contest placement upon it.
  • ...2 more annotations...
  • Meanwhile, this is not the first No Fly List-related lawsuit against the FBI. In 2010 the American Civil Liberties Union (ACLU) attempted to sue US Department of Justice and the FBI over their barring of American citizens, including several veterans of the US military, who ended up on the No Fly List and have been denied entry to their own country. The No Fly List was created by the US government’s Terrorist Screening Center (TSC) after the September 11, 2001 attacks on the United States. In 2012, the list was extended to around 21,000 individuals. The list, including US citizens and residents as well as foreigners, has been repeatedly criticized on civil liberties grounds, due to ethnic, religious, economic, political and racial discrimination. It has also raised concerns about privacy and government secrecy.
  • The ACLU called inclusion on a list a potentially “life-altering” experience, adding that “it is not at all clear what separates a ‘reasonable-suspicion-based-on-a-reasonable-suspicion’ from a simple hunch.” Until March, no one had successfully convinced a court to force authorities to take them off the No Fly List. Rahinah Ibrahim, a Malaysian architect, became the first person ever removed from the notorious list after the managed to force officials to admit she had been placed on the list due to an error by the agency.
Paul Merrell

On 6/5, 65 Things We Know About NSA Surveillance That We Didn't Know a Year Ago | Electronic Frontier Foundation - 0 views

  • It’s been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting dragnet surveillance on millions of innocent people. Since then, the onslaught of disturbing revelations, from disclosures, admissions from government officials, Freedom of Information Act requests, and lawsuits, has been nonstop. On the anniversary of that first leak, here are 65 things we know about NSA spying that we did not know a year ago
  • here’s no question that the international relationships Obama pledged to repair, as well as the confidence of the American people in their privacy and constitutional rights, have been damaged by the NSAs dragnet surveillance. But one year later, both the United States and international governments have not taken the steps necessary to ensure that this surveillance ends. That’s why everyone must take action— contact your elected representative, join Reset the Net, and learn about how international law applies to U.S. surveillance today. 
  •  
    EFF has a great list of the top NSA disclosures in the last year, with each of the 65 bullet points linked to source articles. 
Paul Merrell

US pushing local cops to stay mum on surveillance - Yahoo News - 0 views

  • WASHINGTON (AP) -- The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods, The Associated Press has learned. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any about the purchase and use of such powerful surveillance equipment. Federal involvement in local open records proceedings is unusual. It comes at a time when President Barack Obama has said he welcomes a debate on government surveillance and called for more transparency about spying in the wake of disclosures about classified federal surveillance programs.
  • One well-known type of this surveillance equipment is known as a Stingray, an innovative way for law enforcement to track cellphones used by suspects and gather evidence. The equipment tricks cellphones into identifying some of their owners' account information, like a unique subscriber number, and transmitting data to police as if it were a phone company's tower. That allows police to obtain cellphone information without having to ask for help from service providers, such as Verizon or AT&T, and can locate a phone without the user even making a call or sending a text message. But without more details about how the technology works and under what circumstances it's used, it's unclear whether the technology might violate a person's constitutional rights or whether it's a good investment of taxpayer dollars. Interviews, court records and public-records requests show the Obama administration is asking agencies to withhold common information about the equipment, such as how the technology is used and how to turn it on. That pushback has come in the form of FBI affidavits and consultation in local criminal cases.
  • "These extreme secrecy efforts are in relation to very controversial, local government surveillance practices using highly invasive technology," said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, which has fought for the release of these types of records. "If public participation means anything, people should have the facts about what the government is doing to them." Harris Corp., a key manufacturer of this equipment, built a secrecy element into its authorization agreement with the Federal Communications Commission in 2011. That authorization has an unusual requirement: that local law enforcement "coordinate with the FBI the acquisition and use of the equipment." Companies like Harris need FCC authorization in order to sell wireless equipment that could interfere with radio frequencies. A spokesman from Harris Corp. said the company will not discuss its products for the Defense Department and law enforcement agencies, although public filings showed government sales of communications systems such as the Stingray accounted for nearly one-third of its $5 billion in revenue. "As a government contractor, our solutions are regulated and their use is restricted," spokesman Jim Burke said.
  • ...4 more annotations...
  • Local police agencies have been denying access to records about this surveillance equipment under state public records laws. Agencies in San Diego, Chicago and Oakland County, Michigan, for instance, declined to tell the AP what devices they purchased, how much they cost and with whom they shared information. San Diego police released a heavily censored purchasing document. Oakland officials said police-secrecy exemptions and attorney-client privilege keep their hands tied. It was unclear whether the Obama administration interfered in the AP requests. "It's troubling to think the FBI can just trump the state's open records law," said Ginger McCall, director of the open government project at the Electronic Privacy Information Center. McCall suspects the surveillance would not pass constitutional muster. "The vast amount of information it sweeps in is totally irrelevant to the investigation," she said.
  • A court case challenging the public release of information from the Tucson Police Department includes an affidavit from an FBI special agent, Bradley Morrison, who said the disclosure would "result in the FBI's inability to protect the public from terrorism and other criminal activity because through public disclosures, this technology has been rendered essentially useless for future investigations." Morrison said revealing any information about the technology would violate a federal homeland security law about information-sharing and arms-control laws — legal arguments that that outside lawyers and transparency experts said are specious and don't comport with court cases on the U.S. Freedom of Information Act. The FBI did not answer questions about its role in states' open records proceedings.
  • But a former Justice Department official said the federal government should be making this argument in federal court, not a state level where different public records laws apply. "The federal government appears to be attempting to assert a federal interest in the information being sought, but it's going about it the wrong way," said Dan Metcalfe, the former director of the Justice Department's office of information and privacy. Currently Metcalfe is the executive director of American University's law school Collaboration on Government Secrecy project. A criminal case in Tallahassee cites the same homeland security laws in Morrison's affidavit, court records show, and prosecutors told the court they consulted with the FBI to keep portions of a transcript sealed. That transcript, released earlier this month, revealed that Stingrays "force" cellphones to register their location and identifying information with the police device and enables officers to track calls whenever the phone is on.
  • One law enforcement official familiar with the Tucson lawsuit, who spoke on condition of anonymity because the official was not authorized to speak about internal discussions, said federal lawyers told Tucson police they couldn't hand over a PowerPoint presentation made by local officers about how to operate the Stingray device. Federal officials forwarded Morrison's affidavit for use in the Tucson police department's reply to the lawsuit, rather than requesting the case be moved to federal court. In Sarasota, Florida, the U.S. Marshals Service confiscated local records on the use of the surveillance equipment, removing the documents from the reach of Florida's expansive open-records law after the ACLU asked under Florida law to see the documents. The ACLU has asked a judge to intervene. The Marshals Service said it deputized the officer as a federal agent and therefore the records weren't accessible under Florida law.
  •  
    The Florida case is particularly interesting because Florida is within the jurisdiction of the U.S. Eleventh Circuit Court of Appeals, which has just ruled that law enforcement must obtain a search warrant from a court before using equipment to determine a cell phone's location.  
Paul Merrell

Eric Cantor's Opponent Beat Him By Calling Out GOP Corruption | - 0 views

  • “All of the investment banks, up in New York and D.C., they should have gone to jail.” That isn’t a quote from an Occupy Wall Street protester or Senator Elizabeth Warren. That’s a common campaign slogan repeated by Dave Brat, the Virginia college professor who scored one of the biggest political upsets in over a century by defeating Majority Leader Eric Cantor in the Republican primary last night. The national media is buzzing about Brat’s victory, but for all of the wrong reasons.
  • Did the Tea Party swoop in and help Brat, as many in the Democratic Party are suggesting? Actually, the Wall Street Journal reports no major Tea Party or anti-establishment GOP group spent funds to defeat Cantor. Did Cantor, the only Jewish Republican in Congress, lose because of his religion, as some have suggested? There’s no evidence so far of anti-Semitism during the campaign. Was Cantor caught flatfooted? Nope; Cantor’s campaign spent close to $1 million on the race and several outside advocacy groups, including the National Rifle Association, the National Realtors Association and the American Chemistry Council (a chemical industry lobbying association) came in and poured money into the district to defeat Brat. The New York Times claims that Brat focused his campaign primarily on immigration reform. Brat certainly made immigration a visible topic in his race, but Republic Report listened to several hours of Brat stump speeches and radio appearances, and that issue came up far less than what Brat called the main problem in government: corruption and cronyism. Brat told Internet radio host Flint Engelman that the “number one plank” in his campaign is “free markets.” Brat went on to explain, “Eric Cantor and the Republican leadership do not know what a free market is at all, and the clearest evidence of that is the financial crisis … When I say free markets, I mean no favoritism to K Street lobbyists.” Banks like Goldman Sachs were not fined for their role in the financial crisis — rather, they were rewarded with bailouts, Brat has said.
  • rat, who has identified with maverick GOP lawmakers like Representative Justin Amash of Michigan, spent much of the campaign slamming both parties for being in the pocket of “Wall Street crooks” and D.C. insiders. The folks who caused the financial crisis, Brat says, “went onto Obama’s rolodex, the Republican leadership, Eric’s rolodex.” During several campaign appearances, Brat says what upset him the most about Cantor was his role in gutting the last attempt at congressional ethics reform. “If you want to find out the smoking gun in this campaign,” Brat told Engelman, “just go Google and type the STOCK Act and CNN and Eric Cantor.” (On Twitter, Brat has praised the conservative author Peter Schweizer, whose work on congressional corruption forced lawmakers into action on the STOCK Act.) The STOCK Act, a bill to crack down on insider trading, was significantly watered down by Cantor in early 2012. The lawmaker took out provisions that would have forced Wall Street “political intelligence” firms to register as traditional lobbyists would, and removed a section of the bill to empower prosecutors to go after public officials who illegally trade on insider knowledge. And Brat may be right to charge that Cantor’s moves on the STOCK Act were motivated by self interest. Cantor played a leading role in blocking legislation to fix the foreclosure crisis while his wife and his stock portfolio were deeply invested in mortgage banks.
  • ...2 more annotations...
  • Most self-described Tea Party Republicans, including Rand Paul and Ted Cruz, have railed against Washington in a general sense without calling out the powerful – often Republican-leaning — groups that wield the most power. Not Brat. “Eric is running on Chamber of Commerce and Business Roundtable principles,” Brat told a town hall audience, later clarifying that he meant the U.S. Chamber of Commerce, the largest lobbying trade group in the country. He also called out the American Chemistry Council for funding ads in his race with Cantor, telling a radio host that his opponent had asked his “crony capitalist friends to run more ads.” Brat repeats his mantra: “I’m not against business. I’m against big business in bed with big government.” Indeed, Cantor has been a close ally to top lobbyists and the financial industry. “Many lobbyists on K Street whose clients include major financial institutions consider Cantor a go to member in leadership on policy debates, including overhauling the mortgage finance market, extending the government backstop for terrorism insurance, how Wall Street should be taxed and flood insurance,” noted Politico following Cantor’s loss last night. In 2011, Cantor was caught on video promising a group of commodity speculators that he would roll back regulations on their industry. 
  • There are many lessons to be learned from the Cantor-Brat race. For one, it’s worth reflecting on the fact that not only did Cantor easily out raise and outspend Brat by over $5 million to around $200,000 in campaign funds, but burned through a significant amount on lavish travel and entertainment instead of election advocacy. Federal Election Commission records show Cantor’s PAC spent at least $168,637 on steakhouses, $116,668 on luxury hotels (including a $17,903 charge to the Beverly Hills Hotel & Bungalows) and nearly a quarter million on airfare (with about $140,000 in chartered flights) — just in the last year and a half! But on the policy issues and political ramifications of this race, it’s not easy to box Brat into a neat caricature of an anti-immigration zealot or Tea Party demagogue, or, in TIME’s hasty reporting, a “shopworn conservative boilerplate.” If Brat ascends to Congress, which is quite likely given the Republican-leaning district that he’ll run in as the GOP nominee, he may actually continue taking on powerful elites in Washington.  
  •  
    The Cantor defeat was not a Tea Party upset victory as claimed by MSM, according to this article. Instead, Brat's stump speeches were about crony capitalism, bankster corruption of Congress, and libertarian principles. So if this article is correct, then MSM would rather claim that Cantor was a victim of the Tea Party than acknowledge the issues that Brat actually raised, Congressional corruption and big government/big corporation cronyism.  Very interesting food for thought.
« First ‹ Previous 201 - 220 of 361 Next › Last »
Showing 20 items per page