Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "book" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gary Edwards

Election Fraud & Financial Corruption - Shows - Coast to Coast AM - 0 views

  • Date: 03-15-14 Host: Richard Syrett Guests: Greg Palast, Douglas Hagmann Guest host Richard Syrett welcomed New York Times bestselling author Greg Palast for a discussion on his investigation into election fraud and corruption in the financial world. First hour guest, investigative author Douglas Hagmann of the Northeast Intelligence Network, commented on the recent spate of mysterious banker deaths. Website(s): gregpalast.com homelandsecurityus.com Book(s): Vultures' Picnic
  •  
    Incredible investigative journalism uncovers the Bankster plot to destroy the USA Dollar as a currency, and replace it with a World Currency. Extensive discussion about how the Bankster Billionaires control elections, playing both sides against the middle, and always getting their way. Contact me if you need download access.
Paul Merrell

Ron Paul announces own media venture - RT USA - 0 views

  • Former US congressman Ron Paul has announced the launch of a new media network this summer, adding that to a growing list of projects announced since his retirement, including an upcoming book on American education. According to a video posted to Facebook last weekend, the imminent launch of The Ron Paul Channel is in response to the coordination between news outlets and government sources. “The lying and conniving and collusion between those that give us our news and information and the government, this is going to change,” states Paul in the promotional video. “FINALLY a media network dedicated to liberty, peace, prosperity, and the celebration of all the values that you and I share,” reads the announcement.  The new channel aims to provide “breaking news stories, interviews with influential headliners and hard hitting reporting.”
Gary Edwards

Knowledge and Power: The Information Theory of Capitalism and How it is Revolutionizing our World: George Gilder: 9781621570271: Amazon.com: Books - 0 views

  • Classical economics, whether in the Keynesian variety or the supply-side variety, builds models of economic systems from a mechanistic point of view. That is, it tries to build systems that interact with humans, but for which the human is not an integral part of the system.
  • Economics before Knowledge and Power had the equivalent of a Newtonian perspective: it was believed possible to construct a closed-system model that could predict behavior of humans interacting with the system and responding to incentives.
  • Past economic models have treated capitalism as an incentive system, but in reality capitalism is an information system
  • ...9 more annotations...
  • Further, in Knowledge and Power George Gilder applies a deep understanding of communication theory to economics.
  • Knowledge and Power shows that information and the human, and specifically the entrepreneur, are central to any economic model.
  • Economic systems, in an analogy to communication systems, can be divided into content and conduit; that is, divided into the information or knowledge (content) and the means for delivery (carrier or conduit).
  • An economy is a vast information system in which knowledge is distributed among its human actors. In capitalist systems, knowledge and power are together in the individual; in socialist systems knowledge still resides in individuals, but power is vested a hierarchy with no access to the knowledge.
  • The conduit is the transport mechanism; it has to be predictable and reliable for the most efficient transfer of content.
  • If the conduit is noisy, unreliable, or if its function varies with time, then its ability to transport content degrades.
  • For economic systems, conduit includes such things as stable currency, property rights, modest taxes, and rule of law. The content is the exchange of information and goods.
  • If the conduit elements of the system aren't reliable, predictable, and stable, then the flow information and goods is degraded or even perverted.
  • Valuable human intelligence (the ultimate resource) is diverted to compensate for or even to exploit noise in the conduit. People choose careers in currency trading, regulatory agencies, tax consulting, government, and law instead of science, engineering, and business and we are all poorer as a result.
Paul Merrell

Timeline of NSA Domestic Spying | Electronic Frontier Foundation - 1 views

  • All of the evidence found in this timeline can also be found in the Summary of Evidence we submitted to the court in Jewel v. National Security Agency (NSA). It is intended to recall all the credible accounts and information of the NSA's domestic spying program found in the media, congressional testimony, books, and court actions. The timeline also includes documents leaked by the Guardian in June 2013 that confirmed the domestic spying by the NSA. The documents range from a Top Secret Court Order by the secret court overseeing the spying, the Foreign Intelligence Surveillance Court (FISA Court), to a working draft of an NSA Inspector General report detailing the history of the program. The "NSA Inspectors General Reports" tab consists of one of three documents: a July 10, 2009 report written by Inspectors General of the Department of Justice (DOJ), NSA, Department of Defense (DOD), Central Intelligence Agency (CIA), and the Office of the Director of National Intelligence; an internal working draft NSA Inspector General report leaked by the Guardian on June 27, 2013; and, an "End to End Review" of the Section 215 program conducted by the NSA for the FISA Court. For a short description of the people involved in the spying you can look at our Profiles page, which includes many of the key characters from the NSA Domestic Spying program.
  •  
    This is definitely one to bookmark. Timeline traces the history of government electronic surveillance from adoption of the Fourth Amendment to present. This is a dancing sugar plum document with each entry expandable to show more detail and a link from each expansion to further information. 
  •  
    Wow! You are so right Paul. What an incredible collection of NSA information. The EFF has created a wikipedia of illegal and un-Constitutional actions by the NSA and Federal Government. The JavaScript is awesome too.
Paul Merrell

Has questioning 9/11 become more acceptable? - RT Op-Edge - 2 views

  • Despite the media’s best efforts to dismiss 9/11 conspiracy theories, one in two Americans doubt the government’s narrative and skepticism is slowly seeping its way into the mainstream. Twelve years on from the events of September 11, 2001, and a seemingly nightmarish deja vu has gripped the United States and its war-weary citizens. Again, the public is told that destructive weapons in faraway countries pose a critical danger, and that despite wearing the clothes of humanitarianism, a military solution that will inevitably harm civilians is the only meaningful response. The main difference today is that after an abstract decade-long ‘War on Terror’, Washington finds itself fighting in Syria on the same side as Al-Qaeda and those who are sympathetic to the alleged culprits of the 9/11 attacks.
  • Contrary to how the US media has presented them, movements that have questioned 9/11 continue to gather momentum and are often led by increasingly vocal scientists and academics that claim the account presented in the official 9/11 Commission report could not possibly be accurate.
  • The 9/11 Commission was chartered to provide a full and complete account of the circumstances surrounding the attacks, but even former commission vice-chairman Lee Hamilton wrote an article in the New York Times in 2008 describing how the CIA obstructed the 9/11 investigations, destroyed evidence and failed to respond to the commission’s own lawful requests for information – plus it’s also widely known that the 9/11 Commission report relies heavily on torture testimony.
  • ...3 more annotations...
  • If the United States continually lobbies its population to intervene in unpopular new military conflicts using unsubstantiated claims and questionable evidence, there is little doubt that greater numbers of people will reexamine 9/11 and endorse more critical perspectives of it, especially as those campaigns mature and become more sophisticated. There are many who have looked at the evidence and are convinced that Washington is lying, but the real juicy question is who exactly is responsible? Kevin Ryan of the Journal of 9/11 Studies recently published a book, “Another Nineteen,” which is perhaps the most comprehensive analysis of the political and military command structure that spectacularly failed to act on the morning of 9/11. The task at hand for 9/11 advocacy movements is grasping both the scientific and political totality of events and bringing that scrutiny into the mainstream, which it is steadily beginning to do.
  • It’s not easy to reliably gauge public opinion figures on this issue, but in 2008, a comprehensive international poll showed that 54 percent of respondents believed that parties other than Al-Qaeda were responsible, as reported by Reuters. A new poll conducted in September 2013 by polling firm YouGov found that one in two Americans have doubts about the government’s account of 9/11. 
  • There will always be mocking and scathing criticisms of those who question 9/11, but if scientists and experts disagree over the technical fundamentals, this enough is sufficient ground for advocating a new and comprehensive investigation. As it stands, this transformative event that radically altered American foreign and domestic policy and led to the deaths of over a million people has not been sufficiently explained.
  •  
    On August 31st, 2013, Kevin Ryan appeared on Coast to Coast (http://www.coasttocoastam.com/show/2013/08/31) for a four hour interview that is available on request. Amazing interview! The long-time co-editor of the Journal of 9/11, Kevin Ryan, offered an evidence-based analysis of other potential suspects responsible for the September 11th attacks in 2001. A former employee of Underwriters Laboratories (UL), Ryan pointed out that the World Trade Center (WTC) was designed to withstand the impact of airliners and the steel used in the buildings was certified by UL to tolerate several hours of intense fire. The steel was tested at 2000 degrees F and a typical office fire burns at 1200 degrees F, he explained, noting that the temperatures measured at the WTC were much lower, around 500 degrees F. This presents a glaring problem since one of the towers was completely destroyed in only 56 minutes, Ryan added. The UL repeated its tests after the disaster and determined the steel columns and floor structures should not have failed, he revealed. A proponent of controlled-demolition theory, Ryan stated definitively that "the evidence really points to the buildings having been destroyed through the use of explosives." Many witnesses reported explosions and flashes of light, he said. Ryan questioned the official government story that 19 young Arab Muslims led by Osama bin Laden and Khalid Sheikh Mohammed executed this unbelievable attack, observing that such a feat could not have been accomplished by these men as they had no access to plant explosives. Ryan identified former U.S. Defense Secretary Donald Rumsfeld and former Vice President Dick Cheney as "the two people who were in perfect position to coordinate the attacks of 9/11." Rumsfeld went missing for more than 30 minutes during the height of the attacks and Cheney gave a stand-down order as a plane approached the Pentagon, he reported. Ryan credited Rumsfeld and Cheney with the false conclusions that led to the Iraq
  •  
    Be sure to catch the free on-line documentary, "September 11 - The New Pearl Harbor", where director Massimo Mazzucco presents five hours of interviews and evidence comparing the 9-11 events to Pearl Harbor. Massimo confirms the findings of the Architects and Engineers for 9/11 Truth; that this was a controlled demolition. He then goes on to name the inside players responsible, and why they did it. Lots of discussion about the 1997 Cheney-Rumsfeld white paper, "The New American Century". The documentary (3 DVD's) is at: http://goo.gl/EIie3d
Paul Merrell

America's Lead Iran Negotiator Misrepresents U.S. Policy (and International Law) to Congress « Going to Tehran - 0 views

  • Last month, while testifying to the Senate Foreign Relations Committee, Wendy Sherman—Undersecretary of State for Political Affairs and the senior U.S. representative in the P5+1 nuclear talks with Iran—said, with reference to Iranians, “We know that deception is part of the DNA.”  This statement goes beyond orientalist stereotyping; it is, in the most literal sense, racist.  And it evidently was not a mere “slip of the tongue”:  a former Obama administration senior official told us that Sherman has used such language before about Iranians. 
  • Putting aside Sherman’s glaring display of anti-Iranian racism, there was another egregious manifestation of prejudice-cum-lie in her testimony to the Senate Foreign Relations Committee that we want to explore more fully.  It came in a response to a question from Senator Marco Rubio (R-Florida) about whether states have a right to enrich under the Nuclear Non-Proliferation Treaty (NPT).  Here is the relevant passage in Sherman’s reply:  “It has always been the U.S. position that Article IV of the Nuclear Non-Proliferation Treaty does not speak about the right of enrichment at all [and] doesn’t speak to enrichment, period.  It simply says that you have the right to research and development.”  Sherman goes on to acknowledge that “many countries such as Japan and Germany have taken that [uranium enrichment] to be a right.”  But, she says, “the United States does not take that position.  We take the position that we look at each one of these [cases].”  Or, as she put it at the beginning of her response to Sen. Rubio, “It has always been the U.S. position that Article IV of the Nuclear Non-Proliferation Treaty does not speak about the right of enrichment at all” (emphasis added). 
  • Two points should be made here.  First, the claim that the NPT’s Article IV does not affirm the right of non-nuclear-weapons states to pursue indigenous development of fuel-cycle capabilities, including uranium enrichment, under international safeguards is flat-out false.  Article IV makes a blanket statement that “nothing in this Treaty shall be interpreted as affecting the inalienable right of all the Parties to the Treaty to develop research, production and use of nuclear energy for peaceful purposes without discrimination.”  And it’s not just “countries such as Japan and Germany”—both close U.S. allies—which affirm that this includes the right of non-weapons states to enrich uranium under safeguards.  The BRICS (Brazil, Russia, India, China, and South Africa) countries and the Non-Aligned Movement (whose 120 countries represent a large majority of UN members) have all clearly affirmed the right of non-nuclear-weapons states, including the Islamic Republic of Iran, to pursue indigenous safeguarded enrichment.  In fact, just four countries in the world hold that there is no right to safeguarded enrichment under the NPT:  the United States, Britain, France, and Israel (which isn’t even a NPT signatory).  That’s it.  Moreover, the right to indigenous technological development—including nuclear fuel-cycle capabilities, should a state choose to pursue them—is a sovereign right.  It is not conferred by the NPT; the NPT’s Article IV recognizes states’ “inalienable right” in this regard, while other provisions bind non-weapons states that join the Treaty to exercise this right under international safeguards.       
  • ...3 more annotations...
  • There have been many first-rate analyses demonstrating that the right to safeguarded enrichment under the NPT is crystal clear—from the Treaty itself, from its negotiating history, and from subsequent practice, with at least a dozen non-weapons states building fuel-cycle infrastructures potentially capable of supporting weapons programs.  Bill Beeman published a nice Op Ed in the Huffington Post on this question in response to Sherman’s Senate Foreign Relations Committee testimony, see here and, for a text including references, here.  For truly definitive legal analyses, see the work of Daniel Joyner, for example here and here.  The issue will also be dealt with in articles by Flynt Leverett and Dan Joyner in a forthcoming special issue of the Penn State Journal of Law and International Affairs, which should appear within the next few days.         From any objectively informed legal perspective, denying non-weapons states’ right of safeguarded enrichment amounts to nothing more than a shameless effort to rewrite the NPT unilaterally.  And this brings us to our second point about Sherman’s Senate Foreign Relations Committee testimony. 
  • Sherman claims that “It has always been the U.S. position that Article IV of the Nuclear Non-Proliferation Treaty does not speak about the right of enrichment at all [and] doesn’t speak to enrichment, period.”  But, in fact, the United States originally held that the right to peaceful use recognized in the NPT’s Article IV includes the indigenous development of safeguarded fuel-cycle capabilities.  In 1968, as America and the Soviet Union, the NPT’s sponsors, prepared to open it for signature, the founding Director of the U.S. Arms Control and Disarmament Agency, William Foster, told the Senate Foreign Relations Committee—the same committee to which Sherman untruthfully testified last month—that the Treaty permitted non-weapons states to pursue the fuel cycle.  We quote Foster on this point:   “Neither uranium enrichment nor the stockpiling of fissionable material in connection with a peaceful program would violate Article II so long as these activities were safeguarded under Article III.”  [Note:  In Article II of the NPT, non-weapons states commit not to build or acquire nuclear weapons; in Article III, they agree to accept safeguards on the nuclear activities, “as set forth in an agreement to be negotiated and concluded with the International Atomic Energy Agency.”] 
  • Thus, it is a bald-faced lie to say that the United States has “always” held that the NPT does not recognize a right to safeguarded enrichment.  As a matter of policy, the United States held that that the NPT recognized such a right even before it was opened for signature; this continued to be the U.S. position for more than a quarter century thereafter.  It was only after the Cold War ended that the United States—along with Britain, France, and Israel—decided that the NPT should be, in effect, unilaterally rewritten (by them) to constrain the diffusion of fuel-cycle capabilities to non-Western states.  And their main motive for trying to do so has been to maximize America’s freedom of unilateral military initiative and, in the Middle East, that of Israel.  This is the agenda for which Wendy Sherman tells falsehoods to a Congress that is all too happy to accept them.    
  •  
    What should be the reaction of Congress upon discovering that the U.S. lead negotiator with Iran in regard to its budding peaceful use of nuclear power lies to Congress about the Nuclear Non-Proliferation Treaty's applicability to Iran's actions? 
Paul Merrell

Tomgram: Nick Turse, AFRICOM's Gigantic "Small Footprint" | TomDispatch - 0 views

  • In the Cold War years, while proxy battles took place between U.S.- and Soviet-backed forces in Angola and other African lands, the U.S. military, which by then had garrisoned much of the planet, was noticeably absent from the continent.  No longer.  And no one who might report on it seems to be paying attention as a downsizing media evidently sees no future in anticipating America’s future wars.  In fact, with the exception of Craig Whitlock of the Washington Post, it’s hard to think of any journalist who has dug into the fast-expanding American role in Africa.  Enter TomDispatch’s Nick Turse.  When it comes to American military plans for that continent, he has been doing the work of the rest of the American foreign press corps on his own.  For the last two years, while his bestselling book on the Vietnam War, Kill Anything That Moves, was being published, he has been carefully tracking and mapping the growing American military presence in Africa, exploring the way those moves may actually be helping to destabilize the continent, and doing his best to make sure that U.S. planning for future wars there doesn’t go unnoticed and unreported.  Today, he puts his work -- and his efforts to mine resistant AFRICOM spokespeople for information -- into a single panorama of everything a fine reporter and outsider can possibly know now about Washington’s ongoing militarization of Africa.  It’s a grim tale of the way, via a hush-hush version of mission creep, the Pentagon and AFRICOM are turning Africa into a battlefield of the future.  Don’t say you weren’t warned -- at TomDispatch. Tom
  •  
    Nick Turse does yeoman work in unearthing as much as he can of the U.S. military's secretive --- and massive --- buildup of bases throughout Africa. Lengthy but detailed. 
Gary Edwards

Jim Douglass: A Letter to the American People (and Myself in Particular) On the Unspeakable, 1999, 2012 - 0 views

  • “But if they’re not [authentic], then you have something of a magnitude beyond common experience that would reflect so devastatingly on our society as a whole and its corruptibility that you don’t know how to deal with it.”[4]
  • Since I began researching the assassinations of Martin Luther King, Malcolm X, and John and Robert Kennedy, I have been shocked by the obvious signature that is written across all four of them. It is the signature of what President Eisenhower identified as the military-industrial complex of our government.[6] We can read that signature at once in Dallas in the identity of the scapegoat Lee Harvey Oswald.
  • When Lee Harvey Oswald was arrested in Dallas after the assassination, he was carrying a Department of Defense ID card that is routinely issued to U.S. intelligence agents abroad. The FBI later obliterated the card by “testing” it but writer Mary La Fontaine discovered a copy of it in l992 in a Dallas Police Department photo. Oswald had been a radar operator for the CIA’s U-2 spy plane while he was a Marine stationed at Atsugi Naval Air Station in Japan. The Atsugi base served as the CIA’s center for its Far East operations. His fellow Marines David Bucknell and James Botelho said that when Oswald “defected” to the Soviet Union, he did so under the direction of U.S. intelligence.[8] The professed traitor Oswald was given a U.S.-government loan to assist his return from the USSR. When he settled in Dallas, his closest friend and mentor was longtime U.S. intelligence operative George DeMohrenschildt.
  • ...10 more annotations...
  • Fidel Castro recognized “CIA” written all over Lee Harvey Oswald and the press releases on him that were being sent around the world within minutes of the assassination. The whole Dallas set-up was obvious to someone as familiar with CIA assassination plots as Fidel Castro was.
  • The more one investigates the assassination of John Kennedy, the more one becomes immersed in the depths of U.S. intelligence. The American intelligence community was the sea around Lee Harvey Oswald, Jack Ruby, and the host of anti-Castro Cuban exiles and gun runners with whom Oswald and Ruby worked closely.
  • By the Fall of l963 John Kennedy had also decided to withdraw from Vietnam.[14] Robert McNamara in his memoir In Retrospect[15] has described the contentious October 2, l963, National Security Council meeting at which Kennedy decided, against the arguments of most of his advisors: to withdraw all U.S. forces from Vietnam by the end of l965; to withdraw l,000 U.S. troops by the end of l963; to announce this policy publicly “to set it in concrete,” which Press Secretary Pierre Salinger did at a press conference when the meeting was over.[16]
  • After JFK’s assassination, his withdrawal policy was quietly voided.[18] In light of the future consequences of Dallas, it was not only John Kennedy who was crucified on November 22, l963, but 58,000 other Americans and over three million Vietnamese, Laotians, and Cambodians.
  • Clifton Baird was a Louisville, Kentucky, police officer in l965 when he was asked to help kill Martin Luther King. On September l8, l965, Baird gave a ride home in his car to fellow Louisville officer Arlie Blair after their 3-ll pm shift. Baird parked his car in Blair’s driveway, and the two men talked. Alarmed at what Blair was saying, Clifton Baird secretly turned on a microphone hidden under his seat that was connected to a recorder in a rear speaker. What Baird taped was an offer to engage in a conspiracy to kill Dr. King. He later shared the information with author William F. Pepper who included it in his book on the King assassination Orders to Kill.[32] Blair told Baird that an organization he belonged to was willing to pay $500,000 for the death of King. Would Baird be willing to participate? Baird said he definitely would not. He urged Blair to stay away from it, too.
  • The next day at a Louisville police station, Clifton Baird saw Arlie Blair conferring with a group of police officers and FBI agents. The FBI agents had, over a period of sixteen years or more, developed a close relationship with members of the Louisville police force.
  • On September 20, l965, Baird taped a second car conversation with Blair. Blair again brought up the $500,000 bounty for King, which Baird had now connected with the FBI.
  • Myron Billett was another witness to the truth. By undergoing a conversion in his own life, Myron Billett was able to reveal that in January l968 FBI and CIA agents offered a New York Mafia leader a $l million contract to kill Martin Luther King.
  • After Dr. King was assassinated on April 4, Sam Giancana gave Myron Billett $30,000 and told him to start running: They both knew too much and were going to be killed. Giancana was in fact murdered in his Chicago home in June l975, just before he was scheduled to testify before the Church Committee concerning assassination plots. His killing took the form of a symbolic warning to other possible assassination witnesses. Giancana was shot seven times in a circle around his mouth.
  • In his Canadian Broadcasting Corporation lectures at the end of l967 (later published as The Trumpet of Conscience[39]), King’s vision went beyond even these overwhelming concerns. He saw the next step as a global nonviolent movement using escalating acts of massive civil disobedience to disrupt the entire international order and block economic and political exploitation across borders.
Gary Edwards

Theodore and Woodrow: How Two American Presidents Destroyed Constitutional Freedom: Andrew P. Napolitano: 9781595553515: Amazon.com: Books - 0 views

  •  
    Judge Andrew Napolitano at his best: summary: "Either the Constitution means what it says, or it doesn't." America's founding fathers saw freedom as a part of our nature to be protected-not to be usurped by the federal government-and so enshrined separation of powers and guarantees of freedom  in the Constitution and the Bill of Rights. But a little over a hundred years after America's founding, those God-given rights were laid siege by two presidents caring more about the advancement of progressive, redistributionist ideology than the principles on which America was founded. Theodore and Woodrow is Judge Andrew P. Napolitano's shocking historical account of how a Republican and a Democratic president oversaw the greatest shift in power in American history, from a land built on the belief that authority should be left to the individuals and the states to a bloated, far-reaching federal bureaucracy, continuing to grow and consume power each day. With lessons rooted in history, Judge Napolitano shows the intellectually arrogant, anti-personal freedom, even racist progressive philosophy driving these men to poison the American system of government.  And Americans still pay for their legacy-in the federal income, in state-prescribed compulsory education, in the Federal Reserve, in perpetual wars, and in the constant encroachment of a government that coddles special interests and discourages true competition in the marketplace. With his attention to detail, deep constitutional knowledge, and unwavering adherence to truth telling, Judge Napolitano moves through the history of these men and their times in office to show how American values and the Constitution were sadly set aside, leaving personal freedom as a shadow of its former self,  in the grip of an insidious, Nanny state, progressive ideology.
Gary Edwards

Revealed: Obama's Immense Shadow Army & Its Shocking Takeover Plan - 1 views

  •  
    Is the ObamaCare train wreck a wreck by design? Another notch in the Bankster belt marking another step in the bankrupting of America? Revealed: Obama's Immense Shadow Army & Its Shocking Takeover Plan October 26, 2013  //  By: Eric Odom  //   The ObamaCare train wreck - it's awful, possibly purposeful, certainly useful for team Obama and its growing army of community activists and organizers. In a previous report, we explored the question, "What if the ObamaCare debacle is really a diversion, using a military term a "feint" - a tactical distraction to draw our attention, our focus and our fire away from the real point of attack on liberty?" Remember that horrible train wreck in Spain not long ago, captured on video? As tragic as it was, watching the crash and its gruesome aftermath was almost irresistible, wasn't it? Well, what if the disastrous rollout of the President's signature legislative achievement - what if this spectacular slow motion ObamaCare train wreck has been and is being allowed to happen so that what's going on around the bend from the fiery crash site gets little attention, from the public, from the media or from Congressional investigators? Think about it, friends. How could Barack Obama and his celebrated team of incredibly proficient, plugged in techies - the team that twice got him elected - be behind the utterly disastrous launch of the ObamaCare online storefront, healthcare.gov - arguably the biggest website failure in history? How could so much money have been spent to produce such a problem-plagued site that apparently was doomed in its developmental confusion? And how to fix this monumental mess, well, there doesn't seem to be any clear plan…other than hope. And now we learn that many, if not most, of the people actually signing up for ObamaCare through the website are enrolling in Medicaid, not signing up for private insurance policies they pay for, but adding their names onto government roll
  •  
    There is no doubt in my mind that corporations (and their Chamber of Commerce boot licking lackys) believe that employer provided healthcare benefits was a HUGE MISTAKE. The key feature of ObamaCare is that of ENDING the HMO-Employee Healthcare profit draining quagmire these corporations somehow stumbled into. (Hint: they traded healthcare benefits for wide open government assisted Globalization - the new world order Merchantilism). IMHO, the insurance companies know full well that the entire HMO-Employee Healthcare bandwagon is going to end. Not because of socialism; because of profit hungry out of control mercantilism. So they are trying to cut the best deal possible with the government. The merchantilist doesn't care that their employees are going to suffer. They only care that this cost and the blame for losing the benefit is moved from their books to the government. Nor does the merchantilist care about protecting our borders. They want cheap labor. Even if the social cost of that cheap labor lands on the government and destroys the nation. That's why the merchantilist and his Bankster financiers support Open Borders. The merchantilist could care less about the trade deficit and the massive transfer of American manufacturing jobs overseas. As long as they can sell their junk back into the USA market without a 33% import tax these bastardos are happy to destroy their country. I wonder whose army and navy will secure their investments when the USA no longer can? Are their private armies enough? Just wondering.
Paul Merrell

White House OKd spying on allies, U.S. intelligence officials say - latimes.com - 0 views

  • The White House and State Department signed off on surveillance targeting phone conversations of friendly foreign leaders, current and former U.S. intelligence officials said Monday, pushing back against assertions that President Obama and his aides were unaware of the high-level eavesdropping. Professional staff members at the National Security Agency and other U.S. intelligence agencies are angry, these officials say, believing the president has cast them adrift as he tries to distance himself from the disclosures by former NSA contractor Edward Snowden that have strained ties with close allies. The resistance emerged as the White House said it would curtail foreign intelligence collection in some cases and two senior U.S. senators called for investigations of the practice. France, Germany, Italy, Mexico and Sweden have all publicly complained about the NSA surveillance operations, which reportedly captured private cellphone conversations by German Chancellor Angela Merkel, among other foreign leaders.
  • On Monday, as Spain joined the protest, the fallout also spread to Capitol Hill.
  • Until now, members of Congress have chiefly focused their attention on Snowden's disclosures about the NSA's collection of U.S. telephone and email records under secret court orders. "With respect to NSA collection of intelligence on leaders of U.S. allies — including France, Spain, Mexico and Germany — let me state unequivocally: I am totally opposed," said Sen. Dianne Feinstein (D-Calif.), who chairs the Senate Intelligence Committee. "Unless the United States is engaged in hostilities against a country or there is an emergency need for this type of surveillance, I do not believe the United States should be collecting phone calls or emails of friendly presidents and prime ministers," she said in a statement. Feinstein said the Intelligence Committee had not been told of "certain surveillance activities" for more than a decade, and she said she would initiate a major review of the NSA operation. She added that the White House had informed her that "collection on our allies will not continue," although other officials said most U.S. surveillance overseas would not be affected. Sen. John McCain (R-Ariz.), ranking minority member of the Armed Services Committee, said Congress should consider creating a special select committee to examine U.S. eavesdropping on foreign leaders.
  • ...5 more annotations...
  • "Obviously, we're going to want to know exactly what the president knew and when he knew it," McCain told reporters in Chicago. "We have always eavesdropped on people around the world. But the advance of technology has given us enormous capabilities, and I think you might make an argument that some of this capability has been very offensive both to us and to our allies."
  • Precisely how the surveillance is conducted is unclear. But if a foreign leader is targeted for eavesdropping, the relevant U.S. ambassador and the National Security Council staffer at the White House who deals with the country are given regular reports, said two former senior intelligence officials, who spoke on condition of anonymity in discussing classified information. Obama may not have been specifically briefed on NSA operations targeting a foreign leader's cellphone or email communications, one of the officials said. "But certainly the National Security Council and senior people across the intelligence community knew exactly what was going on, and to suggest otherwise is ridiculous." If U.S. spying on key foreign leaders was news to the White House, current and former officials said, then White House officials have not been reading their briefing books. Some U.S. intelligence officials said they were being blamed by the White House for conducting surveillance that was authorized under the law and utilized at the White House. "People are furious," said a senior intelligence official who would not be identified discussing classified information. "This is officially the White House cutting off the intelligence community."
  • Any decision to spy on friendly foreign leaders is made with input from the State Department, which considers the political risk, the official said. Any useful intelligence is then given to the president's counter-terrorism advisor, Lisa Monaco, among other White House officials. Jay Carney, the White House press secretary, said Monday that Obama had ordered a review of surveillance capabilities, including those affecting America's closest foreign partners and allies. "Our review is looking across the board at our intelligence gathering to ensure that as we gather intelligence, we are properly accounting for both the security of our citizens and our allies and the privacy concerns shared by Americans and citizens around the world," Carney said.
  • Caitlin Hayden, spokeswoman for the National Security Council, said the review would examine "whether we have the appropriate posture when it comes to heads of state, how we coordinate with our closest allies and partners, and what further guiding principles or constraints might be appropriate for our efforts." She said the review should be completed this year.
  • Intelligence officials also disputed a Wall Street Journal article Monday that said the White House had learned only this summer — during a review of surveillance operations that might be exposed by Snowden — about an NSA program to monitor communications of 35 world leaders. Since then, officials said, several of the eavesdropping operations have been stopped because of political sensitivities.
  •  
    Good. The Intelligence community is calling BS on Obama's claim that he didn't know about the spying on foreign heads of allied states. And McCain says we need a select Congressional committee to look into what the president knew and when he knew it. That's an implicit slam of the Feinstein-led Senate Select Committee on Intelligence's oversight of the intelligence agencies and a signal that there is a scandal lurking here. More importantly, a new select committee would not have the same membership as the existing Intelligence Community, which has largely functioned as a rubber stamp for what the intelligence agencies want. We have been down this road before, in the mid-70s, when the Defense Dept. intelligence agencies were caught spying on Americans, leading to the Select Committee investigation headed by former Sen. Frank Church and to the initial passage of the Foreign Intelligence Surveillance Act, among other legislation delivering a strong message to the intelligence agencies that what happens within the U.S. is off-limits to them. But that was a lesson forgotten as new technology came along for NSA to play with. If Obama is smart, he will promptly respond to the LA Times article with a clarification that top members of his staff knew and the previous statement dealt only with his personal knowledge. But the Obama Administration has overwhelmingly demonstrated an inability to head off scandals and a big tendency to cover-up rather than get out in front of story, particularly in matters involving the NSA. So we may see a major scandal emerge from this already enormous scandal that is laid directly at Barack Obama's feet, a cover-up scandal.   Who knew what when, where, why, and how? My favorite question. 
Paul Merrell

Racism, Colonialism And Exceptionalism - 0 views

  • "What makes America different, what makes us exceptional, is that we are dedicated to act." (Barak Obama, speech, September, 2013)
  • It seems to be possible for nations, and the majority of their citizens, to commit the worst imaginable atrocities, including torture, murder and genocide, while feeling that what they are doing is both noble and good.. Some understanding of how this is possible can be gained by watching the 3-part BBC documentary, “The History of Racism”.
  • Looking at the BBC documentary we can see how often in human history economic greed and colonial exploitation have been justified by racist theories. The documentary describes almost unbelievable cruelties committed against the peoples of the Americas and Africa by Europeans. For example, in the Congo, a vast region which which King Leopold II of Belgium claimed as his private property, the women of villages were held as hostages while the men were forced to gather rubber in the forests. Since neither the men nor the women could produce food under these circumstances, starvation was the result. Leopold's private army of 90,000 men were issued ammunition, and to make sure that the used it in the proper way, the army was ordered to cut off the hands of their victims and send them back as proof that the bullets had not been wasted. Human hands became a kind of currency, and hands were cut off from men, women and children when rubber quotas were not fulfilled. Sometimes more than a thousand human hands were gathered in a single day. During the rule of Leopold, roughly 10,000,000 Congolese were killed, which was approximately half the population of the region. According to the racist theories that supported these atrocities, it was the duty of philanthropic Europeans like Leopold to bring civilization and the Christian religion to Africa. Similar theories were used to justify the genocides committed by Europeans against the native inhabitants of the Americas. Racist theories were also used to justify enormous cruelties committed by the British colonial government in India. For example, during the great famine of 1876-1878, during which ten million people died, the Viceroy, Lord Lytton, oversaw the export to England of a record 6.4 million hundredweight of wheat.
  • ...1 more annotation...
  • Meanwhile, in Europe,almost everyone was proud of the role which they were playing in the world. All that they read in newspapers and in books or heard from the pulpits of their churches supported the idea that they were serving the non-Europeans by bringing them the benefits of civilization and Christianity. Kipling wrote: “Take up the White Man's burden, Send forth the best ye breed, Go bind your sons to exile, To serve your captives' need; To wait in heavy harness, On fluttered folk and wild, Your new-caught, sullen peoples, Half-devil and half-child.” On the whole, the mood of Europe during this orgy of external cruelty and exploitation, was self-congratulatory. Can we not see a parallel with the self-congratulatory mood of the American people and their allies, who export violence to the whole world, but who think of themselves as “exceptional”?
Paul Merrell

Solution to the "Shutdown": The Fed Could Simply Cancel $2 Trillion of Government Debt | Global Research - 0 views

  • Bipartisan Proposal Would Take Pressure Off the Budget Crisis Congressman Alan Grayson and former congressman Ron Paul are two of the fiercest warriors against an out-of-control Federal Reserve. Paul has campaigned to dissolve the Fed for 35 years, and wrote an entire book called “End the Fed“. Grayson has  repeatedly slammed the Fed, and absolutely demolished it … to its face.    Paul and Grayson also co-sponsored a bill to audit the Federal Reserve. (Their desire to rein in the Fed is supported by numerous top economists.) So when the two of them support a Fed-related solution to the “government shutdown” crisis,  I listen.
Paul Merrell

The U.S. Has REPEATEDLY Defaulted | Washington's Blog - 2 views

  • It’s a Myth that the U.S. Has Never Defaulted On Its Debt Some people argue that countries can’t default.  But that’s false. It is widely stated that the U.S. government has never defaulted.  However, that is also a myth.
  •  
    Excellent article Paul! But it left me in tears. The bastardos are destroying the currency. Quick Count of The U.S. defaulting on its debt obligations: ... Continental Currency in 1779 ... Domestic debt between 1782 through 1790 ... Greenbacks in 1862 ... Liberty Bonds in 1934 ... 1933 Dollar to GOLD devaluation (1/35 th per ounce) ... 1971 Nixon ends GOLD backing of dollar, violating the terms of the Bretton Woods Agreement ... 1979 Treasury defaults, refusing to redeem maturing treasury bonds The only thing keeping the American Economy going is the massive rush to convert the fiat currency the Federal Reserve is churning out into hard assets; like land and corporate stock. In 2008 the Federal Reserve Bankster Cartel pumped $29 Trillion into the world banking system. They continue to pump $85 Billion per month into Bankster financial markets, buying up bad mortgage paper and backstopping the many insured derivatives scams now unwinding. The Banksters were bust in 2008, but are now flush with more dollars than anyone knows what to do with. Instead of "loaning" this money out, and investing in traditional business productivity, they use the freshly minted dollars to purchase hard assets. Business loans would provide profit based on interest - a gambit that requires confidence in the value of the dollar since the dollar is the measure of the economic reward. The purchase of hard assets is different. The "value" is not in the profitability of the investment, as measured in fiat currency. The value is in hard asset and any future economic power that asset holds through the expected currency crash. The only mystery here is that of military might. How do the banksters and global elites protect their assets in the future collapse they have made certain? Oh wait - private security companies capable of waging war. It's no accident that the early geopolitical energy wars of the 21st century saw a massive buildup of private corporate military and i
Paul Merrell

Amend the Federal Reserve: We Need a Central Bank that Serves Main Street | Global Research - 0 views

  • December 23rd marks the 100th anniversary of the Federal Reserve. Dissatisfaction with its track record has prompted calls to audit the Fed and end the Fed.  At the least, Congress needs to amend the Fed, modifying the Federal Reserve Act to give the central bank the tools necessary to carry out its mandates. The Federal Reserve is the only central bank with a dual mandate. It is charged not only with maintaining low, stable inflation but with promoting maximum sustainable employment. Yet unemployment remains stubbornly high, despite four years of radical tinkering with interest rates and quantitative easing (creating money on the Fed’s books). After pushing interest rates as low as they can go, the Fed has admitted that it has run out of tools. At an IMF conference on November 8, 2013, former Treasury Secretary Larry Summers suggested that since near-zero interest rates were not adequately promoting people to borrow and spend, it might now be necessary to set interest at below zero. This idea was lauded and expanded upon by other ivory-tower inside-the-box thinkers, including Paul Krugman. Negative interest would mean that banks would charge the depositor for holding his deposits rather than paying interest on them. Runs on the banks would no doubt follow, but the pundits have a solution for that: move to a cashless society, in which all money would be electronic. “This would make it impossible to hoard cash outside the bank,” wrote Danny Vinik in Business Insider, “allowing the Fed to cut interest rates to below zero, spurring people to spend more.”
  • Business Week quotes Douglas Holtz-Eakin, a former director of the Congressional Budget Office: “We’ve had four years of extraordinarily loose monetary policy without satisfactory results, and the only thing they come up with is we need more?” Paul Craig Roberts, former Assistant Secretary of the Treasury, calls the idea “harebrained.” He is equally skeptical of quantitative easing, the Fed’s other tool for stimulating the economy. Roberts points to Andrew Huszar’s explosive November 11th Wall Street Journal article titled “Confessions of a Quantitative Easer,” in which Huszar says that QE was always intended to serve Wall Street, not Main Street.  Huszar’s assignment at the Fed was to manage the purchase of $1.25 trillion in mortgages with dollars created on a computer screen. He says he resigned when he realized that the real purpose of the policy was to drive up the prices of the banks’ holdings of debt instruments, to provide the banks with trillions of dollars at zero cost with which to lend and speculate, and to provide the banks with “fat commissions from brokering most of the Fed’s QE transactions.”
  • Bernanke created debt-free money and bought government debt with it, returning the interest to the Treasury. The result was interest-free credit, a good deal for the government. But the problem, says Lounsbury, is that: The helicopters dropped all the money into a hole in the ground (excess reserve accounts) and very little made its way into the economy.  It was essentially a rearrangement of the balance sheets of the creditor nation with little impact on the debtor nation. . . . The fatal flaw of QE is that it delivers money to the accounts of the creditors and does nothing for the accounts of the debtors. Bad debts remain unserviced and the debt crisis continues.
  • ...2 more annotations...
  • Bernanke delivered the money to the creditors because that was all the Federal Reserve Act allowed. If the Fed is to fulfill its mandate, it clearly needs more tools; and that means amending the Act.  Harvard professor Ken Rogoff, who spoke at the November 2013 IMF conference before Larry Summers, suggested several possibilities; and one was to broaden access to the central bank, allowing anyone to have an ATM at the Fed. Rajiv Sethi, Barnard/Columbia Professor of Economics, expanded on this idea in a blog titled “The Payments System and Monetary Transmission.” He suggested making the Federal Reserve the repository for all deposit banking. This would make deposit insurance unnecessary; it would eliminate the need to impose higher capital requirements; and it would allow the Fed to implement monetary policy by targeting debtor rather than creditor balance sheets. Instead of returning its profits to the Treasury, the Fed could do a helicopter drop directly into consumer bank accounts, stimulating demand in the consumer economy. John Lounsbury expanded further on these ideas. He wrote in Econintersect that they would open a pathway for investment banking and depository banking to be separated from each other, analogous to that under Glass-Steagall. Banks would no longer be too big to fail, since they could fail without destroying the general payment system of the economy. Lounsbury said the central bank could operate as a true public bank and repository for all federal banking transactions, and it could operate in the mode of a postal savings system for the general populace.
  • The Federal Reserve Act was drafted by bankers to create a banker’s bank that would serve their interests. It is their own private club, and its legal structure keeps all non-members out.  A century after the Fed’s creation, a sober look at its history leads to the conclusion that it is a privately controlled institution whose corporate owners use it to direct our entire economy for their own ends, without democratic influence or accountability.  Substantial changes are needed to transform the Fed, and these will only come with massive public pressure. Congress has the power to amend the Fed – just as it did in 1934, 1958 and 2010. For the central bank to satisfy its mandate to promote full employment and to become an institution that serves all the people, not just the 1%, the Fed needs fundamental reform.
  •  
    In my view, the Fed is beyond salvage. It needs abolition, not a new role. The Constitution grants Congress the power to mint and coin money, not a group of rent-seeking banksters. 
Gary Edwards

The Project To Restore America - 0 views

  • One hundred years ago this month, on December 23, 1913, the Congress passed the Federal Reserve Act, establishing a national central-banking system in the United States. The governing board of the Federal Reserve was organized on August 12, 1914, and the Federal Reserve banks opened for operation on November 16, 1914.   On the surface, the preamble to the Act, which summarized the purpose of the new government-created institution, seemed fairly innocuous:   “An Act to provide for the establishment of Federal reserve banks, to furnish an elastic currency, to afford means of rediscounting commercial paper, to establish a more effective supervision of banking in the United States, and for other purposes.”
  • The Powers of the Federal Reserve   But what this meant was the start of the monopolization of monetary matters in the hands of a single politically appointed authority within the boundaries of the United States.   Those innocuously sounding functions listed in the Act’s preamble, however, gave the Federal Reserve the power to:   (a) Control the quantity of money and credit supplied in the United States.   (b) Influence the value, or purchasing power, of the monetary unit that is used by the citizenry of the country in all their transactions.   (c) Indirectly manipulate the rates of interest at which borrowers and lenders transfer savings for investment and other purposes, including the funding of government budget deficits.
  • A Century of Central Bank Mismanagement   The 100-year record of the Federal Reserve has been a roller coaster of inflations and recessions, including the disaster of the Great Depression of the 1930s, the “excessive exuberance” of the late 1990s that resulted in the “Dot.Com” bubble that burst in the early 2000s, and the recent boom-bust cycle of the last decade from which the U.S. economy is still slowly recovering.   The crucial and fundamental problem with the power and authority of the Federal Reserve is that it represents monetary central planning. In a world that has, for the most part, turned its back on the theoretical error and practical disaster of believing that governments have the wisdom and ability to centrally plan the economic affairs of a society, central banking remains one of the major remaining forms of socialism practiced around the globe.   Government control and planning of the monetary system has resulted in extensive political power over virtually every aspect of our economic life. In 1942 Gustav Stolper, a German free-market economist then in exile in America from war-torn Europe, published a book titled “This Age of Fables.” He pointed out:
  • ...1 more annotation...
  • “Hardly ever do the advocates of free capitalism realize how utterly their ideal was frustrated at the moment the state assumed control of the monetary system . . . A ‘free’ capitalism with government responsibility for money and credit has lost its innocence. From that point on it is no longer a matter of principle but one of expediency how far one wishes or permits government interference to go. Money control is the supreme and most comprehensive of all governmental controls short of expropriation.”
  •  
    Interesting two part summary of the Federal Reserve that emphasis' the essential relationship between central banking and socialism.  The author, Richard Ebeling, goes as far as to say that not only is central banking essential to socialism but also that free market - individual liberty capitalism cannot coexist with central banking. IIRC, there is a clause int he Federal Reserve Act of 1913 where the US Treasury can purchase back control of the money supply at a cost of $144 Million dollars.  Not sure where I read that, but the cancellation of near two thirds of the interest due on our national debt would work wonders for the dollar.
Paul Merrell

U.S. "Stock Market Is Rigged" - 0 views

  • Steve Kroft reports on a new book from Michael Lewis, "Flash Boys," that reveals how a group of unlikely characters discovered how some high speed traders work the stock market to their advantage.  U.S. stock ownership is at a record low and less than half of Americans trust banks and financial services. And in the last two weeks, the New York attorney general and the Commodities Futures Trading Commission in Washington have both launched investigations into high-frequency computerized stock trading that now controls more than half the market.
Paul Merrell

U.S. gives big, secret push to Internet surveillance - CNET - 0 views

  • Senior Obama administration officials have secretly authorized the interception of communications carried on portions of networks operated by AT&T and other Internet service providers, a practice that might otherwise be illegal under federal wiretapping laws. The secret legal authorization from the Justice Department originally applied to a cybersecurity pilot project in which the military monitored defense contractors' Internet links. Since then, however, the program has been expanded by President Obama to cover all critical infrastructure sectors including energy, healthcare, and finance starting June 12. "The Justice Department is helping private companies evade federal wiretap laws," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, which obtained over 1,000 pages of internal government documents and provided them to CNET this week. "Alarm bells should be going off." Those documents show the National Security Agency and the Defense Department were deeply involved in pressing for the secret legal authorization, with NSA director Keith Alexander participating in some of the discussions personally. Despite initial reservations, including from industry participants, Justice Department attorneys eventually signed off on the project.
  • The Justice Department agreed to grant legal immunity to the participating network providers in the form of what participants in the confidential discussions refer to as "2511 letters," a reference to the Wiretap Act codified at 18 USC 2511 in the federal statute books. The Wiretap Act limits the ability of Internet providers to eavesdrop on network traffic except when monitoring is a "necessary incident" to providing the service or it takes place with a user's "lawful consent." An industry representative told CNET the 2511 letters provided legal immunity to the providers by agreeing not to prosecute for criminal violations of the Wiretap Act. It's not clear how many 2511 letters were issued by the Justice Department. In 2011, Deputy Secretary of Defense William Lynn publicly disclosed the existence of the original project, called the DIB Cyber Pilot, which used login banners to inform network users that monitoring was taking place. In May 2012, the pilot was turned into an ongoing program -- broader but still voluntary -- by the name of Joint Cybersecurity Services Pilot, with the Department of Homeland Security becoming involved for the first time. It was renamed again to Enhanced Cybersecurity Services program in January, and is currently being expanded to all types of companies operating critical infrastructure.
  • Paul Rosenzweig, a former Homeland Security official and founder of Red Branch Consulting, compared the NSA and DOD asking the Justice Department for 2511 letters to the CIA asking the Justice Department for the so-called torture memos a decade ago. (They were written by Justice Department official John Yoo, who reached the controversial conclusion that waterboarding was not torture.) "If you think of it poorly, it's a CYA function," Rosenzweig says. "If you think well of it, it's an effort to secure advance authorization for an action that may not be clearly legal." A report (PDF) published last month by the Congressional Research Service, a non-partisan arm of Congress, says the executive branch likely does not have the legal authority to authorize more widespread monitoring of communications unless Congress rewrites the law. "Such an executive action would contravene current federal laws protecting electronic communications," the report says.
  • ...2 more annotations...
  • Another e-mail message from a Justice Department attorney wondered: "Will the program cover all parts of the company network -- including say day care centers (as mentioned as a question in a [deputies committee meeting]) and what are the policy implications of this?" The deputies committee includes the deputy secretary of defense, the deputy director of national intelligence, the deputy attorney general, and the vice chairman of the Joint Chiefs of Staff. "These agencies are clearly seeking authority to receive a large amount of information, including personal information, from private Internet networks," says EPIC staff attorney Amie Stepanovich, who filed a lawsuit against Homeland Security in March 2012 seeking documents relating to the program under the Freedom of Information Act. "If this program was broadly deployed, it would raise serious questions about government cybersecurity practices." In January, the Department of Homeland Security's privacy office published a privacy analysis (PDF) of the program saying that users of the networks of companies participating in the program will see "an electronic login banner [saying] information and data on the network may be monitored or disclosed to third parties, and/or that the network users' communications on the network are not private."
  • An internal Defense Department presentation cites as possible legal authority a classified presidential directive called NSPD 54 that President Bush signed in January 2008. Obama's own executive order , signed in February 2013, says Homeland Security must establish procedures to expand the data-sharing program "to all critical infrastructure sectors" by mid-June. Those are defined as any companies providing services that, if disrupted, would harm national economic security or "national public health or safety."
  •  
    Article is from April 2013, before the Snowden disclosures. 
Paul Merrell

U.S. rejects claim that Turkey planned Syria atrocity Anadolu Agency - 0 views

  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency.
  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency. Seymour Hersh, a freelance journalist, published an article in the London Review of Books (LRB) in which he claimed that Ankara had supplied the al Nusra Front with chemical weapons that they used to carry out the August 2013 attack. The Washington Post and the New Yorker declined the story prior to its publication in the LRB. “The Assad regime, and only the Assad regime, could have been responsible for the chemical weapons attack that took place on August 21,” said Shawn Turner and Caitlyn Hayden in a statement initially issued to fact checkers working on the report and later sent to AA. “The suggestion that there was an effort to suppress or alter intelligence is simply false.” State Department Spokesperson, Jen Psaki, in her daily press briefing said there is no doubt that the chemical attack was carried out by the Syrian regime.
  • The White House and State Department have refuted a media report that Turkey planned a deadly chemical attack in the suburbs of Damascus that nearly brought the U.S. into open conflict with Syria, in a statement issued to Anadolu Agency.
  • ...2 more annotations...
  • Psaki said, "In light of our reports and intelligence we had recieved, we believe beyond any doubt that the attack on 21 August had been carried out by the Syrian regime and we are still behind the same view shared by the international community." Hersh cited unidentified American officials and a classified intelligence analysis on the opposition's chemical weapons capabilities to back up his claim. “No such paper was ever requested or produced by Intelligence Community analysts,” said Turner and Hayden.     Hersh wrote that U.S. President Barack Obama had established September 2, 2013 as a fixed deadline for the U.S. military to undertake action in Syria following the chemical attack. Turner and Hayden rejected the claim as “completely fabricated”.  The journalist also wrote that the Obama administration had channeled weapons from Libya to the Syrian opposition through southern Turkey, a claim described by Turner and Hayden as “false”.
  • Turkey also reacted to the claim when Turkey's Deputy Prime Minister Bulent Arinc was asked a question about Hersh's claim that Turkey had provided Sarin gas to the people who had conducted chemical attack in Ghouta region. He said "A note sent by the Turkish Foreign Ministry in this regard says that it is absolutely not true. The White House official has also qualified these claims as definitely false and speculative in response to a question regarding the matter." Arinc said, "The claims based on anonymous sources have been conclusively rejected by the White House officials and it has been reconfirmed that the Assad regime is solely responsible for the chemical attack." Noting that they are well aware of previous articles written by Hersh, Arinc said, "Everyone knows very well that the individual's views and claims heard from some unnamed persons are certainly not any verified information and knowledge. In fact, the U.S. officials have quite fairly explained the matter and strictly rejected the claim."
  •  
    Seymour M. Hersh is among the most highly regarded journalists in the world. Mainstream media used to compete for the rights to publish his articles. But apparently he's been digging a little to deeply in the belly of the beast lately. See his latest article that the White House is denying. http://www.lrb.co.uk/2014/04/06/seymour-m-hersh/the-red-line-and-the-rat-line
Paul Merrell

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
« First ‹ Previous 241 - 260 of 369 Next › Last »
Showing 20 items per page