Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "books" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Argentina Prosecutor Who Accused Kirchner Had Steady Contact With US Embassy, Leaked Cables Show | VICE News - 0 views

  • Alberto Nisman, the prosecutor who accused Argentina's president of a cover-up plot over the 1994 bombing of a Jewish center before being found shot to death, met repeatedly with the US embassy in Buenos Aires during his investigation, leaked diplomatic cables show.Nisman gave US officials advanced notice on his procedural moves and was apparently coached by the embassy in "improving" his requests for arrest warrants for Iranians that Nisman suspected of carrying out the deadly attack against the Argentine Israeli Mutual Association, or AIMA, according to cables published by Wikileaks."Embassy can now more logically approach the [government of Argentina] about [its] anticipated next steps and ways we might be able to coordinate outreach to other governments [...] to bring attention to the warrants and pressure to bear on Iran and Hezbollah," says one US cable dated November 1, 2006, after a meeting with Nisman.The revelations are adding fodder to the entangled scandal over the AIMA center bombing, Nisman's mysterious death, and the reactions of President Cristina Fernandez de Kirchner and her government loyalists.The president and her supporters have piled doubt on Nisman's investigation, suggesting he didn't himself write the inquiry accusing Kirchner of a cover-up deal with Iran, and that he was influenced by foreign agents in his claims. Kirchner said this week that Nisman was manipulated and double-crossed by government spies plotting against her.
  • Nisman on January 16 told VICE News he had proof that Kirchner sought a back-channel deal with Iran — swapping Iranian oil for Argentine grain — in exchange for abandoning efforts to prosecute former Iranian diplomats in connection to the Jewish center bombing.Eight-five people were killed in the terror attack, which remains unsolved. Survivors and opposition forces are now blaming Kirchner's government for Nisman's death.
  • The prosecutor, who was found dead the night before making his blockbuster claim against Kirchner and her foreign minister in Argentina's Congress, is mentioned in 46 leaked US cables.In the cable from November 2006, Nisman informed US officials of the likelihood that a judge would follow his recommendations to seek charges against Iranian suspects for the bombing. American embassy officials discussed plans to inform "other governments" ahead of time, in an apparent push to make the case against the Iranians an international matter.Another cable, dated January 19, 2007, suggests the US embassy had a hand in shaping Nisman's warrant requests with Interpol, the international diplomatic police force. The cable shows US officials thought Nisman's work was shoddy and needed help.Before the Justice Department's Office of International Affairs intervened in the warrant applications, the cable says, Nisman's paperwork contained "statements that were presumptuous conclusions of guilt."Nisman took on the case of the AIMA center bombing in 2004, at the request of the then-President Nestor Kirchner, Cristina Fernandez's late husband. In his interview with VICE News — perhaps his last with a foreign news organization — Nisman denied connections with any foreign spy agencies.
  • ...4 more annotations...
  • "You won't find reports from the CIA, Mossad, or the MI5 in my files. I have no doubt that there is a link between them and the Argentine intelligence agency, but I never dealt with any foreign intelligence agencies," Nisman said, two days before he was found dead.The US embassy in Buenos Aires declined to discuss its officers' interactions with Nisman. "We will not comment on the contents of these alleged cables that purport to include classified information," an embassy spokesman told VICE News.
  • The relationship was apparently so involved that Nisman apologized for not letting then-ambassador Earl Anthony Wayne know that he would call for the arrest of former president Carlos Menem in relation to the case."AMIA Special Prosecutor Alberto Nisman called the Ambassador on May 23 to apologize for not giving the Embassy advance notice of his request for the arrest of former President Menem and other [government of Argentina] officials for their alleged roles in the cover up of the 'local connection' in the 1994 terrorist bombing of the AMIA Jewish community center," says a cable from May 2008.The prosecutor also apologized that the judicial order coincided with a visit to Argentina from the former deputy director of the FBI, John Pistole, adding it was "completely unintentional," the cable shows."He noted that he was very sorry and that he sincerely appreciates all of the [US government's] help and support and in no way meant to undermine that," the cable continues.
  • The cable also notes that US officials "have for the past two years recommended to Nisman that he focus on the perpetrators of the terrorist attack and not on the possible mishandling of the first investigation."Santiago O'Donnell, author of two books based on the cables released by Julian Assange, said in an interview that the leaked cables show the US influenced Nisman throughout his work on the AIMA bombing investigation."The embassy gave instructions to the prosecutor Nisman for him to follow the Iranian lead, and not follow other leads, like the Syrian lead, or the local connection, because that would detract from the terrorist image that the US was trying to impose on Iran," O'Donnell said.President Kirchner this week proposed in a nationally televised address to disband and reform the government's intelligence agency. In doing so, she said rogue government spies were responsible for Nisman's death. Opposition voices, meanwhile, said the reform plan for the Secretaría de Inteligencia, or SI, would further politicize the work of the embattled spy agency and make it more responsive to the president's political whims.
  • Alberto Nisman, the prosecutor who accused Argentina's president of a cover-up plot over the 1994 bombing of a Jewish center before being found shot to death, met repeatedly with the US embassy in Buenos Aires during his investigation, leaked diplomatic cables show.Nisman gave US officials advanced notice on his procedural moves and was apparently coached by the embassy in "improving" his requests for arrest warrants for Iranians that Nisman suspected of carrying out the deadly attack against the Argentine Israeli Mutual Association, or AIMA, according to cables published by Wikileaks."Embassy can now more logically approach the [government of Argentina] about [its] anticipated next steps and ways we might be able to coordinate outreach to other governments [...] to bring attention to the warrants and pressure to bear on Iran and Hezbollah," says one US cable dated November 1, 2006, after a meeting with Nisman.
  •  
    Well this is interesting. The U.S. was covertly working through an Argentinian prosecutor to topple Argentina's head of state. On the plan to reform the Argentine intelligence service, that service's subordination to the CIA was the prototype operation than led to Operation Condor, in which the CIA subverted most intelligence services in Latin America, leading to coups and the deaths and disappearnaces of hundreds of thousands Latin American citizens suspected of being left-leaning. The overthrow of the Allende government in Chile is perhaps the best known in the U.S. 
Paul Merrell

Blackwater Founder Remains Free and Rich While His Former Employees Go Down on Murder Charges - The Intercept - 0 views

  • The incident for which the men were tried was the single largest known massacre of Iraqi civilians at the hands of private U.S. security contractors. Known as “Baghdad’s bloody Sunday,” operatives from Blackwater gunned down 17 Iraqi civilians at a crowded intersection at Nisour Square on September 16, 2007. The company, founded by secretive right-wing Christian supremacist Erik Prince, pictured above, had deep ties to the Bush Administration and served as a sort of neoconservative Praetorian Guard for a borderless war launched in the immediate aftermath of 9/11. While Barack Obama pledged to reign in mercenary forces when he was a senator, once he became president he continued to employ a massive shadow army of private contractors. Blackwater — despite numerous scandals, congressional investigations, FBI probes and documented killings of civilians in both Iraq and Afghanistan — remained a central part of the Obama administration’s global war machine throughout his first term in office.
  • Just as with the systematic torture at Abu Ghraib, it is only the low level foot-soldiers of Blackwater that are being held accountable. Prince and other top Blackwater executives continue to reap profits from the mercenary and private intelligence industries. Prince now has a new company, Frontier Services Group, which he founded with substantial investment from Chinese enterprises and which focuses on opportunities in Africa. Prince recently suggested that his forces at Blackwater could have confronted Ebola and ISIS. “If the administration cannot rally the political nerve or funding to send adequate active duty ground forces to answer the call, let the private sector finish the job,” he wrote. None of the U.S. officials from the Bush and Obama administrations who unleashed Blackwater and other mercenary forces across the globe are being forced to answer for their role in creating the conditions for the Nisour Square shootings and other deadly incidents involving private contractors. Just as the main architect of the CIA interrogation program, Jose Rodriguez, is on a book tour for his propagandistic love letter to torture, Hard Measures: How Aggressive CIA Actions After 9/11 Saved American Lives, so too is Erik Prince pushing his own revisionist memoir, Civilian Warriors: The Inside Story of Blackwater and the Unsung Heroes of the War on Terror.
  • While the Blackwater verdict is an important and rare moment of accountability in an overwhelmingly unaccountable private war industry, it does not erase the fact that those in power—the CEOs, the senior officials, the war profiteers—walk freely and will likely do so for the rest of their lives.
  • ...1 more annotation...
  • Filmmaker Richard Rowley and I produced a 30 minute documentary on the Nisour Square massacre and the story of Ali Kinani for Democracy Now! and The Nation magazine:
Paul Merrell

Yemen as Vietnam or Afghanistan | Consortiumnews - 0 views

  • Yemen as Vietnam or Afghanistan April 1, 2015 With U.S. intelligence help, Saudi Arabia has launched air strikes into Yemen and wants Egypt and Pakistan to invade, threatening to turn a long-simmering civil war into a regional conflict, a scenario that reminded retired U.S. diplomat William R. Polk of his work for President Kennedy on an earlier Yemeni war.By William R. PolkAs the events unfold with the Saudi and Egyptian engagement in Yemen, I was reminded of my discussion with Egypt’s President Gamal Abdel Nasser on “his” Yemen war, sometimes called the North Yemen Civil War that began in 1962, became a stalemate and finally ended in 1970. As Mark Twain may have said, “history doesn’t repeat but sometimes it rhymes.” The rhymes, at least, seem unmistakable.In the course of our first lengthy talk on Yemen, Nasser (rather angrily) replied to one of my comments, “you don’t think I will win the war, do you?”
  • “No, Mr. President,” I replied, “I don’t.”
  • “Well,” Nasser retorted, “you American’s think you know all about everything, and you don’t even have any of your people in Sanaa and none up in the north where the fighting is going on. You don’t know anything about Yemen.” Then, without thinking of the implication, I suppose, he said, ” You should go see.”“Mr. President,” I quickly said. “I regard that as an invitation.” Impolitely, I then stood up. He looked at me with narrow, angry eyes. He obviously had not meant what I had inferred.“All right, go see,” he said. “I will give instructions that you can go anywhere you want, talk to anyone you want, see everything..”“But, of course, I cannot even get there without your help,” I said.“You can have my plane.”Rather off-handedly and not warmly, we shook hands. I said goodbye and rushed back to our embassy and wrote an “eyes only” message to  President John Kennedy. I did not want it scattered around our government so I prevailed upon the CIA station chief to send it by his rather more restricted route. It was encrypted and sent in three batches. Before the second batch got sent, a reply came back: “go.”
  • ...2 more annotations...
  • s I was leaving, Nasser took me out to my car and even opened the car door for me. His guards were as astonished as I was, Apparently, he had never before done this. As we shook hands, he said, “Well, Bill, where are you off to this time?”“This time, Mr. President, I am not going to tell you!”He burst out laughing as did I. We did not meet again but our frankness and respect later enabled me to work out the 1970 ceasefire on Suez with him shortly before his death.
  • It is hard to believe that history now seems to be repeating with Egypt and Saudi Arabia again engaged in a counter-guerrilla war in Yemen! For Nasser, it was Egypt’s Vietnam. Will the new Yemen war be Egypt’s (and Saudi Arabia’s) Afghanistan? I think it is very likely. All of the signs point in that direction.And, as I have laid out in numerous essays on Afghanistan, Iraq, Syria, Somalia, Mali and Algeria, and in my little book Violent Politics, guerrilla wars are almost never “won” but usually drain the supposedly dominant power of its wealth, moral position and political unity.
Paul Merrell

These Are all the Countries Where the US Has a Military Presence | Global Research - Centre for Research on Globalization - 0 views

  • On Mar. 24, US president Barack Obama announced that all 9,800 US troops currently stationed in Afghanistan will remain until the end of 2015. This generated a fair amount of criticism: it was, after all, Obama’s promise that the last American troop would leave the country in 2014. How have Obama’s plans for pulling out of Afghanistan fared so far? http://t.co/avoxwJzzQw pic.twitter.com/3S5FJ3lgho — FiveThirtyEight (@FiveThirtyEight) March 26, 2015
  • Those expecting the US to leave Afghanistan, however, should take a minute to consider this: the US still hasn’t left Germany. In fact, there are quite a few places the US hasn’t left, and while certainly most of them don’t pose a threat to American soldiers, they reveal a pattern about the US staying, rather than leaving. According to official information provided by the Department of Defense (DoD) and its Defense Manpower Data Center (DMDC) there are still about 40,000 US troops, and 179 US bases in Germany, over 50,000 troops in Japan (and 109 bases), and tens of thousands of troops, with hundreds of bases, all over Europe. Over 28,000 US troops are present in 85 bases in South Korea, and have been since 1957. Altogether, based on information contained in the DoD’s latest Base Structure Report (BSR), the US has bases in at least 74 countries and troops practically all over the world, ranging from thousands to just one in some countries (it could be a military attaché, for instance).
  • By comparison, France has bases in 10 countries, and the UK has bases in seven. Calculating the extent of the US military presence abroad is not an easy task. The data released by the Department of Defense is incomplete, and inconsistencies are found within documents. Quartz has requested clarification from the Department of Defense, but hasn’t received a response. In his forthcoming book Base Nation: How US Military Bases Abroad Harm America and the World, David Vine, associate professor of anthropology at American University details the difficulties of assessing the US military presence abroad. He writes: according to the most recent publicized count, the U.S. military currently still occupies 686 “base sites” outside the fifty states and Washington, DC. While 686 base sites is quite a figure in its own right, that tally strangely excludes many well-known U.S. bases, like those in Kosovo, Kuwait, and Qatar. Less surprisingly, the Pentagon’s count also excludes secret (or secretive) American bases, like those reported in Israel and Saudi Arabia. There are so many bases, the Pentagon itself doesn’t even know the true total. That is not the only issue—even a definitive count of bases would include a wide range of facilities. “Base” itself is an umbrella term that includes locations referred to as “post,” “station,” “camp,” or “fort” by different military bodies. Vine explains:
  • ...1 more annotation...
  • bases come in all sizes and shapes, from massive sites in Germany and Japan to small radar facilities in Peru and Puerto Rico. […] Even military resorts and recreation areas in places like Tuscany and Seoul are bases of a kind; worldwide, the military runs more than 170 golf courses. The map below represents US military bases abroad, according to the official BSR, and from independent research conducted by Vine (and Quartz) using verified news reports as well as cross-referencing information with Google Maps. This map does not take into account NATO bases, including a rumored base in Turkmenistan and a base in Algeria, reported by Wikileaks to be a suspected US base.
Paul Merrell

The CIA and Signals Intelligence - 0 views

  • The CIA and Signals Intelligence Formerly Top-Secret Multi-Volume History Details Spy Agency’s Conflicts with NSA and Military over SIGINT Role Additional Declassified Documents Describe CIA Domestic and Foreign SIGINT Activity CIA Role Often Put It in Direct Competition with NSA, but Recent Cooperation Made Possible Controversial Exploits Uncovered by Edward Snowden National Security Archive Electronic Briefing Book No. 506
Gary Edwards

Rumsfeldt's Missing Trillions, Stavridis and Unconventional War | nsnbc international - 0 views

  • One of these survivors is April Gallop. April Gallop would testify under oath in a two-hour-long, video-taped interview with Barbara Honegger who has conducted an in-depth investigation into the events at the Pentagon on September 11. April Gallop would state that a violent explosion near her desk in Wedge Two on Corridor Five, more than 100 ft north from the official narratives’ alleged plane impact point stopped her watch at 9:30.
  • Gallop would state the she saw fires coming out of computers. Barbara Honegger reports that other eyewitnesses, including Tracy Webb experienced such computer fires at the E Ring of Corridor Four.
  • The alleged plane impact happened at least eight minutes after massive explosions inside the Pentagon.
  • ...5 more annotations...
  • Another clock from the Pentagon that is kept at the Smithsonian as well as photographic evidence prove that other clocks stopped due to explosions before the alleged plane impact. Barbara Honegger’s research would show that “something” struck the Pentagon from the outside too. That object, however, was not a jetliner and struck some 150 meters from the alleged jetliner impact site.
  • Donald Rumsfeldt’s war on waste would turn into the Global War on Terror and lead to the invasions of Afghanistan and Iraq. Information about the missing 2.3 trillion dollar was destroyed on September 11.
  • The document states that the United States, for the foreseeable future, would primarily be engaged in unconventional warfare. The document contains a structured approach to the subversion of targeted nation States, beginning with an assessment of a feasible and cooperative opposition, the creation of events to polarize society, the establishment of armed groups and their development into a fighting force that is capable of fighting a civil war or unconventional war under U.S. supervision to achieve U.S. foreign policy goals.
  • The TC 18-01 contains a de-facto blueprint for the United States’ and NATO’s involvement in Libya and Syria under the command of NATO SACEUR Stavridis. The TC 18-01 also represents a precise blueprint of the ongoing war in Iraq and the “crisis” in Ukraine.
  • Arguably, 2.3 trillion dollar are a seizable start-up budget for wars which have to be waged “off the books”.
  •  
    "September 10, 2001. U.S. Secretary of Defense Donald Rumsfeldt stated that 2.3 trillion dollar from the Pentagon's annual budget could not be accounted for. September 11, 2001, the Pentagon's accounting office and the Naval Command Center were targeted, allegedly by a plane. Survivors would report about explosions inside the Pentagon prior to the alleged plane impact. During a 2012 Forestall Lecture , Admiral James G. Stavridis noted that he was working as a newly selected 1-star accounting officer at the Pentagon and that he was lucky to have survived. By 2009 Stavridis would have been promoted to the rank of Admiral and NATO's Supreme Allied Commander Europe. Responsible for NATO's 2011 military operations in Libya, Stavridis would describe NATO's intervention in Libya as "a teachable moment and model for future interventions". "
Paul Merrell

Victory for Users: Librarian of Congress Renews and Expands Protections for Fair Uses | Electronic Frontier Foundation - 0 views

  • The new rules for exemptions to copyright's DRM-circumvention laws were issued today, and the Librarian of Congress has granted much of what EFF asked for over the course of months of extensive briefs and hearings. The exemptions we requested—ripping DVDs and Blurays for making fair use remixes and analysis; preserving video games and running multiplayer servers after publishers have abandoned them; jailbreaking cell phones, tablets, and other portable computing devices to run third party software; and security research and modification and repairs on cars—have each been accepted, subject to some important caveats.
  • The exemptions are needed thanks to a fundamentally flawed law that forbids users from breaking DRM, even if the purpose is a clearly lawful fair use. As software has become ubiquitous, so has DRM.  Users often have to circumvent that DRM to make full use of their devices, from DVDs to games to smartphones and cars. The law allows users to request exemptions for such lawful uses—but it doesn’t make it easy. Exemptions are granted through an elaborate rulemaking process that takes place every three years and places a heavy burden on EFF and the many other requesters who take part. Every exemption must be argued anew, even if it was previously granted, and even if there is no opposition. The exemptions that emerge are limited in scope. What is worse, they only apply to end users—the people who are actually doing the ripping, tinkering, jailbreaking, or research—and not to the people who make the tools that facilitate those lawful activities. The section of the law that creates these restrictions—the Digital Millennium Copyright Act's Section 1201—is fundamentally flawed, has resulted in myriad unintended consequences, and is long past due for reform or removal altogether from the statute books. Still, as long as its rulemaking process exists, we're pleased to have secured the following exemptions.
  • The new rules are long and complicated, and we'll be posting more details about each as we get a chance to analyze them. In the meantime, we hope each of these exemptions enable more exciting fair uses that educate, entertain, improve the underlying technology, and keep us safer. A better long-terms solution, though, is to eliminate the need for this onerous rulemaking process. We encourage lawmakers to support efforts like the Unlocking Technology Act, which would limit the scope of Section 1201 to copyright infringements—not fair uses. And as the White House looks for the next Librarian of Congress, who is ultimately responsible for issuing the exemptions, we hope to get a candidate who acts—as a librarian should—in the interest of the public's access to information.
Paul Merrell

Secret program at secret Guantánamo prison hears everything | Miami Herald - 0 views

  • A secret Defense Department program provides unfettered eavesdropping on the accused terrorists imprisoned at Guantánamo’s clandestine Camp 7 lockup, recently released war court documents show.Army Col. James L. Pohl, the judge in 9/11 trial, discovered the existence of the secret surveillance program during a recent war court hearing. Little is publicly known about the program, not even its unclassified two-word nickname.
  • The disclosure of pervasive eavesdropping at Guantánamo’s lockup for 14 former CIA prisoners comes in before-and-after documents released by the court from the recent Oct. 19-30 pretrial hearings in the death-penalty case of five men accused of orchestrating the hijackings that killed nearly 3,000 people on Sept. 11, 2001.At issue was accused 9/11 plotter Walid bin Attash’s request for guidance on how he could function as his own attorney. Bin Attash is a Yemeni in his mid-30s who is accused of training some of the hijackers. “You must assume anything you say in Camp 7 is not confidential and will be disclosed to the U.S. Government,” warns an Oct. 23 draft of the advisory, crafted after the judge was informed of the covert program. “Only when you are in Echo 2 will anything you say be covered by the attorney-client privilege.”An Oct. 20 draft of the advisory omits those lines.
  • This is not the first time in the proceedings that a surveillance program caught Pohl by surprise. In January 2013, he ordered the CIA to unplug a button that allowed an unseen observer to cut the court’s audio feed to the public. Perhaps ironically, the lone site the judge considers safe for consultative trial preparation — the Camp Echo compound of wooden huts, each containing a cell — at one time had covert recording devices that looked like smoke detectors. The judge ordered them disabled in February 2013.Attorney Dror Ladin of the American Civil Liberties Union, who was an observer at the Guantánamo hearings last month, said the apparent disclosure of “pervasive surveillance at Camp 7” is the latest issue to challenge the possibility of a fair trial.“It is shocking that for years neither defense counsel nor the judge were made aware that the government was capturing everything said aloud by the detainees there,” he said Thursday. It also adds to mounting questions of “how these military commissions can produce a fair result,” said Ladin, especially if one of the men represents himself. “These are detainees who really can’t see the evidence against them and simultaneously have been provided no rehabilitation services for the torture they suffered for years. It would be astonishing if any of them could craft a fair defense for capital charges.”
  • ...3 more annotations...
  • A defense attorney in another case said the prosecution wants to use a surreptitiously recorded conversation between two Camp 7 captives against an alleged al-Qaida commander. And in 2012 the journalist Daniel Klaidman wrote in his book “Kill or Capture” that the U.S. government had recordings made in a Guantánamo prison recreation yard of the alleged Sept. 11 mastermind Khalid Sheik Mohammed talking about evidence that could be used against him.The latest disclosure comes at a time of decreasing transparency at the war court.On Oct. 29, the judge held a 13-minute secret session without advanced notice to the public. A day later the judge wrote in a three-page ruling that he closed the court at the request of “the Government” — war-court-speak for the prosecution — to protect state secrets whose disclosure “could result in grave danger to national security.”Pohl also ordered the court to issue a censored transcript of the parts the excluded public and accused would be allowed to see. No transcript has been released.Then the next day, Oct. 30, the judge held a daylong, open hearing on a restraining order he issued forbidding female guards from touching the 9/11 accused when they are being taken to court or legal meetings. The judge’s order has outraged members of Congress and the Pentagon brass.
  • In that public court hearing, soldiers called as witnesses from the prison discussed staffing patterns at Camp 7. Normally the Pentagon releases transcripts of open hearings the same day. Unusually, the court has not yet released the Oct. 30 transcript. A Pentagon spokesman suggested Thursday — 13 days after the open court hearing — that somebody was scrubbing the transcript of information already made public. “The security review of the Oct. 30 transcript remains ongoing,” said Navy Cmdr. Gary Ross. “We will provide an update once additional information becomes available.”Much of the October session focused on bin Attash’s question about how he’d act as his own lawyer in a system that does not let the accused terrorist see classified information in the case. The judge and attorneys devoted days to designing a script Pohl would read to any accused 9/11 terrorist who tries to take charge of his defense — and spent a full afternoon huddling in a closed meeting on the secret program.
  • In it, Pohl made clear that he never intended to let bin Attash dismiss his Pentagon-paid defense attorneys — Chicago criminal defense attorney Cheryl Bormann and Air Force Maj. Michael Schwartz. Instead, the script shows Pohl planned to appoint Bormann and Schwartz as “standby counsel” the judge could activate to carry out cross-examination of certain witnesses who might have “particular sensitivities” to being questioned by the alleged terrorist.“If you are represented by lawyers, then it is the lawyers, and not you, who will conduct the defense,” the warning says. “Correspondingly, if you represent yourself, you will be able to perform the lawyer’s core functions, but you will not necessarily be allowed to direct special appearances by counsel when it is convenient to you.”The language suggests a far more limited role by the American lawyers than those carried out in an aborted attempt to hold the Sept. 11 trial during the Bush administration. In those proceedings, alleged 9/11 terrorists serving as their own lawyer regularly had standby counsel write and argue motions in court.The script also envisions a scenario in which an accused 9/11 plotter serving as his own lawyer becomes unruly, disruptive or disobedient rather than respect “the dignity of the courtroom.” In such a case, the judge said he could deal with “obstructionist misconduct” by putting “physical restraints” on bin Attash or ejecting him from the court.Bin Attash, for his part, has not been noticeably disruptive across years of pretrial proceedings. An amputee, he was brought to his May 5, 2012 arraignment in a Guantánamo prison restraint chair routinely used for forced-feeding of hunger strikers — with guards carrying his prosthetic leg separately.
  •  
    It's long past time to recognize that the military cannot provide a fair trial for GITMOI detainees, transfer them to the U.S., and try them in a civilian Article II court. If this kind of crap were going down before an Article II judge, those conducting the surveillance would be sitting in jail. 
Paul Merrell

George Bush: The Unauthorized Biography « TARPLEY.net - 0 views

  • By Webster Griffin Tarpley and Anton Chaitkin Table of Contents Introduction — American Caligula Chapter 1 – The House of Bush: Born in a Bank Chapter 2 – The Hitler Project Chapter 3 – Race Hygiene: Three Bush Family Alliances Chapter 4 – The Center of Power is in Washington Chapter 5 – Poppy and Mommy Chapter 6 – Bush in World War II Chapter 7 – Skull and Bones: The Racist Nightmare at Yale Chapter 8 – The Permian Basin Gang Chapter 8b – The Bay of Pigs and The Kennedy Assassination Chapter 9 – Bush Challenges Yarborough for The Senate Chapter 10 – Rubbers Goes to Congress Chapter 11 – United Nations Ambassador, Kissinger Clone Chapter 12 – Chairman George in Watergate Chapter 13 – Bush Attempts The Vice Presidency, 1974 Chapter 14 – Bush in Beijing Chapter 15 – CIA Director Chapter 16 – Campaign 1980 Chapter 17 – The Attempted Coup D’Etat of March 30, 1981 Chapter 18 – Iran-Contra Chapter 19 – The Leveraged Buyout Mob Chapter 20 – The Phony War On Drugs Chapter 21 – Omaha Chapter 22 – Bush Takes The Presidency Chapter 23 – The End of History Chapter 24 – The New World Order Chapter 25 – Thyroid Storm
  • Chapter 1 – The House of Bush: Born in a Bank Chapter 2 – The Hitler Project Chapter 3 – Race Hygiene: Three Bush Family Alliances Chapter 4 – The Center of Power is in Washington Chapter 5 – Poppy and Mommy Chapter 6 – Bush in World War II Chapter 7 – Skull and Bones: The Racist Nightmare at Yale Chapter 8 – The Permian Basin Gang Chapter 8b – The Bay of Pigs and The Kennedy Assassination Chapter 9 – Bush Challenges Yarborough for The Senate Chapter 10 – Rubbers Goes to Congress Chapter 11 – United Nations Ambassador, Kissinger Clone Chapter 12 – Chairman George in Watergate Chapter 13 – Bush Attempts The Vice Presidency, 1974 Chapter 14 – Bush in Beijing Chapter 15 – CIA Director Chapter 16 – Campaign 1980 Chapter 17 – The Attempted Coup D’Etat of March 30, 1981 Chapter 18 – Iran-Contra Chapter 19 – The Leveraged Buyout Mob Chapter 20 – The Phony War On Drugs Chapter 21 – Omaha Chapter 22 – Bush Takes The Presidency Chapter 23 – The End of History Chapter 24 – The New World Order Chapter 25 – Thyroid Storm
Gary Edwards

A Crisis Worse than ISIS? Bail-Ins Begin - nsnbc international | nsnbc international - 0 views

  • Propping Up the Derivatives Scheme Dodd-Frank states in its preamble that it will “protect the American taxpayer by ending bailouts.” But it does this under Title II by imposing the losses of insolvent financial companies on their common and preferred stockholders, debtholders, and other unsecured creditors. That includes depositors, the largest class of unsecured creditor of any bank.
  • Title II is aimed at “ensuring that payout to claimants is at least as much as the claimants would have received under bankruptcy liquidation.” But here’s the catch: under both the Dodd Frank Act and the 2005 Bankruptcy Act, derivative claims have super-priority over all other claims, secured and unsecured, insured and uninsured.
  • The over-the-counter (OTC) derivative market (the largest market for derivatives) is made up of banks and other highly sophisticated players such as hedge funds. OTC derivatives are the bets of these financial players against each other. Derivative claims are considered “secured” because collateral is posted by the parties. For some inexplicable reason, the hard-earned money you deposit in the bank is not considered “security” or “collateral.” It is just a loan to the bank, and you must stand in line along with the other creditors in hopes of getting it back. State and local governments must also stand in line, although their deposits are considered “secured,” since they remain junior to the derivative claims with “super-priority.”
  • ...12 more annotations...
  • Under the old liquidation rules, an insolvent bank was actually “liquidated” – its assets were sold off to repay depositors and creditors. Under an “orderly resolution,” the accounts of depositors and creditors are emptied to keep the insolvent bank in business.
  • The point of an “orderly resolution” is not to make depositors and creditors whole but to prevent another system-wide “disorderly resolution” of the sort that followed the collapse of Lehman Brothers in 2008.
  • The concern is that pulling a few of the dominoes from the fragile edifice that is our derivatives-laden global banking system will collapse the entire scheme. The sufferings of depositors and investors are just the sacrifices to be borne to maintain this highly lucrative edifice.
  • At first glance, the “bail-in” resembles the normal capitalist process of liabilities restructuring that should occur when a bank becomes insolvent. . . . The difference with the “bail-in” is that the order of creditor seniority is changed. In the end, it amounts to the cronies (other banks and government) and non-cronies. The cronies get 100% or more; the non-cronies, including non-interest-bearing depositors who should be super-senior, get a kick in the guts instead. . . . In principle, depositors are the most senior creditors in a bank. However, that was changed in the 2005 bankruptcy law, which made derivatives liabilities most senior. Considering the extreme levels of derivatives liabilities that many large banks have, and the opportunity to stuff any bank with derivatives liabilities in the last moment, other creditors could easily find there is nothing left for them at all.
  • A study involving the cost to taxpayers of the Dodd-Frank rollback slipped by Citibank into the “cromnibus” spending bill last December found that the rule reversal allowed banks to keep $10 trillion in swaps trades on their books. This is money that taxpayers could be on the hook for in another bailout; and since Dodd-Frank replaces bailouts with bail-ins, it is money that creditors and depositors could now be on the hook for.
  • As of September 2014, US derivatives had a notional value of nearly $280 trillion
  •  Citibank is particularly vulnerable to swaps on the price of oil. Brent crude dropped from a high of $114 per barrel in June 2014 to a low of $36 in December 2015.
  • What about FDIC insurance? It covers deposits up to $250,000, but the FDIC fund had only $67.6 billion in it as of June 30, 2015, insuring about $6.35 trillion in deposits. The FDIC has a credit line with the Treasury, but even that only goes to $500 billion; and who would pay that massive loan back? The FDIC fund, too, must stand in line behind the bottomless black hole of derivatives liabilities
  • You can move your money into one of the credit unions with their own deposit insurance protection; but credit unions and their insurance plans are also under attack.
  • In short, the goal of the bail-in scheme is to place losses on private creditors. Alternatives that allow them to escape could soon be blocked.
  • The Dodd Frank Act and the Bankruptcy Reform Act both need a radical overhaul, and the Glass-Steagall Act (which put a fire wall between risky investments and bank deposits) needs to be reinstated.
  • Meanwhile, local legislators would do well to set up some publicly-owned banks on the model of the state-owned Bank of North Dakota – banks that do not gamble in derivatives and are safe places to store our public and private funds.
  •  
    Excellent analysis of the coming banking crisis anw how our politicians have put the citizens on the hook for risky bank derivative gambling.  Thanks Marbux! Ellen H. Brown (nsnbc) : While the mainstream media focus on ISIS extremists, a threat that has gone virtually unreported is that your life savings could be wiped out in a massive derivatives collapse. Bank bail-ins have begun in Europe, and the infrastructure is in place in the US.  Poverty also kills.
Paul Merrell

Three House panels to investigate whether ISIS intelligence was cooked | TheHill - 0 views

  • Three House committees will jointly investigate allegations U.S. Central Command altered intelligence reports, their chairmen announced Friday.“Today, the House Armed Services Committee, the House Permanent Select Committee on Intelligence and the House Appropriations Committee established a Joint Task Force to investigate allegations that senior U.S. Central Command (CENTCOM) officials manipulated intelligence products,” Reps. David Nunes (R-Calif.), Mac Thornberry (R-Texas) and Rodney Frelinghuysen (R-N.J.) said in a joint statement.Analysts at Centcom have alleged that senior officials altered their reports to paint a rosier picture of the fight against the Islamic State in Iraq and Syria (ISIS).The Pentagon’s inspector general is already conducting an investigation into the allegations.Magazine Foreign Policy reported last month that the task force would be formed.
  • In their statement, Nunes, Thornberry and Frelinghuysen said the task force would look into the specific allegations, as well as whether there are “systemic problems across the intelligence enterprise in CENTCOM or any other pertinent intelligence organizations.”Reps. Ken Calvert (R-Calif.), Mike Pompeo (R-Kan.) and Brad Wenstrup (R-Ohio) will lead the investigation.“Any accusation of intelligence being altered to fit a political narrative must be fully investigated and those responsible held accountable,” Pompeo said in a written statement. “This matters both to those who gather the intelligence, often at great risk to their personal safety, and to the policymakers who use this intelligence to make what are often life threatening decisions.”In an interview on Fox News, Thornberry said the issue was too important to wait to investigate until after the inspector general.
  • Democrats are participating, too, he said in the interview.  “They are participating in the investigation,” he said. “Their staff had been involved in the discussions we have had with a variety of folks from Centcom and elsewhere. So again we want to be careful and do it right, but it's important.” The task force expects to have preliminary results early next year, according to the chairmen’s statement.
Paul Merrell

Brazil's Epic Scandal Takes Down a Banker - Bloomberg Business - 0 views

  • Brazilians have become inured to seeing politicians and businessmen marched off to prison for corruption. But the mug shot of banker André Esteves—unshaven and frowning—that flashed across TV screens in early December was a shock. Part of a cadre of mavericks who got astonishingly rich from Brazil’s transformation into one of the world’s top 10 economies in the 2000s, Esteves helped turn Grupo BTG Pactual into Latin America’s biggest standalone investment bank. Supremely confident, Esteves—who was a billionaire by his mid-30s—liked to quip that the initials in his company’s name stood for “Better than Goldman.”Around dawn on Nov. 25, Esteves’s fortunes soured in an instant. Police showed up at his apartment, which faces Rio de Janeiro’s legendary Ipanema beach, and hauled him away on allegations of obstructing a federal investigation into a massive pay-to-play scheme centered on Brazil’s state-run oil giant, Petrobras. Now Esteves, 47, resides in a cell block with concrete beds and communal toilets at Bangu, a high-security prison in Rio better known for housing drug traffickers and murderers.
  • Having its founder, chief executive officer, and chairman behind bars has pushed BTG Pactual to the brink of insolvency as clients pull their money out. Within days of his arrest, Esteves had relinquished his controlling stake in the firm, and his partners had begun a wholesale selloff of assets. To avert disaster, Brazil’s central bank helped engineer a $1.6 billion rescue line from the country’s privately funded deposit guarantee fund. Still, the bank’s shares have lost half their value since Esteves’s arrest. On Dec. 7, prosecutors formally accused the banker of obstruction of justice. Antônio Carlos de Almeida Castro, Esteves’s lawyer, says his client has done nothing wrong.The metastatic graft scandal that sent Esteves to jail threatens more than the survival of BTG. So many legislators are implicated, Congress has been unable to pass legislation to contain an exploding budget deficit. President Dilma Rousseff has grown so unpopular that lawmakers are maneuvering to impeach her for allegedly cooking the government’s books. Meanwhile, the economy is sliding into what Goldman Sachs calls a full-blown depression.
  • BTG’s collapse won’t cause Brazil’s capital markets to seize up as Lehman Brothers’ failure did in the U.S. in 2008. Yet having one of the country’s most prominent financiers behind bars is a body blow to the confidence of investors at a time when Brazil needs their cash. “It very much gives you the impression that the corruption scheme is so widespread that it induces a kind of counterparty risk,” says Monica de Bolle, a former International Monetary Fund economist. “You enter into transactions with people in Brazil without knowing whether or not they might be implicated in something.” The result: “Nothing gets done. There’s no business,” she says.
Paul Merrell

This might be the most controversial theory for what's behind the rise of ISIS - The Washington Post - 0 views

  • A year after his 700-page opus "Capital in the Twenty-First Century" stormed to the top of America's best-seller lists, Thomas Piketty is out with a new argument about income inequality. It may prove more controversial than his book, which continues to generate debate in political and economic circles. The new argument, which Piketty spelled out recently in the French newspaper Le Monde, is this: Inequality is a major driver of Middle Eastern terrorism, including the Islamic State attacks on Paris earlier this month — and Western nations have themselves largely to blame for that inequality. Piketty writes that the Middle East's political and social system has been made fragile by the high concentration of oil wealth into a few countries with relatively little population. If you look at the region between Egypt and Iran — which includes Syria — you find several oil monarchies controlling between 60 and 70 percent of wealth, while housing just a bit more than 10 percent of the 300 million people living in that area. (Piketty does not specify which countries he's talking about, but judging from a study he co-authored last year on Middle East inequality, it appears he means Qatar, the United Arab Emirates, Kuwait, Saudia Arabia, Bahrain and Oman. By his numbers, they accounted for 16 percent of the region's population in 2012 and almost 60 percent of its gross domestic product.)
  • This concentration of so much wealth in countries with so small a share of the population, he says, makes the region "the most unequal on the planet." Within those monarchies, he continues, a small slice of people controls most of the wealth, while a large — including women and refugees — are kept in a state of "semi-slavery." Those economic conditions, he says, have become justifications for jihadists, along with the casualties of a series of wars in the region perpetuated by Western powers. His list starts with the first Gulf War, which he says resulted in allied forces returning oil "to the emirs." Though he does not spend much space connecting those ideas, the clear implication is that economic deprivation and the horrors of wars that benefited only a select few of the region's residents have, mixed together, become what he calls a "powder keg" for terrorism across the region.
  • Piketty is particularly scathing when he blames the inequality of the region, and the persistence of oil monarchies that perpetuate it, on the West: "These are the regimes that are militarily and politically supported by Western powers, all too happy to get some crumbs to fund their [soccer] clubs or sell some weapons. No wonder our lessons in social justice and democracy find little welcome among Middle Eastern youth." Terrorism that is rooted in inequality, Piketty continues, is best combated economically. To gain credibility with those who do not share in the region's wealth, Western countries should demonstrate that they are more concerned with the social development of the region than they are with their own financial interests and relationships with ruling families. The way to do this, he says, is to ensure that Middle eastern oil money funds "regional development," including far more education.
  • ...2 more annotations...
  • He concludes by looking inward, at France, decrying its discrimination in the hiring of immigrants and the high unemployment levels among those populations. He says Europe must turn away from "austerity" and reinvigorate its model of integration and job creation, and notes that the continent accepted a net 1 million immigrants per year before the financial crisis. The argument has not gained much notice in the United States thus far. It rests on some controversial principles, not the least of which is the question of how unequal the Middle East is compared to the rest of the world — a problem rooted in the region's poor quality of economic statistics. In his paper last year, Piketty and a co-author concluded inequality was in fact quite high. "Under plausible assumptions," the paper states in its abstract, "the top 10% income share (for the Middle East) could be well over 60%, and the top 1% share might exceed 25% (vs. 20% in the United States, 11% in Western Europe, and 17% in South Africa)."
  • Those would, indeed, be jarring levels. They are the high end of the scenarios Piketty lays out in the paper. Whether they are a root cause of the Islamic State is a debate that is very likely just beginning.
Paul Merrell

Bulk Collection Under Section 215 Has Ended… What's Next? | Just Security - 0 views

  • The first (and thus far only) roll-back of post-9/11 surveillance authorities was implemented over the weekend: The National Security Agency shuttered its program for collecting and holding the metadata of Americans’ phone calls under Section 215 of the Patriot Act. While bulk collection under Section 215 has ended, the government can obtain access to this information under the procedures specified in the USA Freedom Act. Indeed, some experts have argued that the Agency likely has access to more metadata because its earlier dragnet didn’t cover cell phones or Internet calling. In addition, the metadata of calls made by an individual in the United States to someone overseas and vice versa can still be collected in bulk — this takes place abroad under Executive Order 12333. No doubt the NSA wishes that this was the end of the surveillance reform story and the Paris attacks initially gave them an opening. John Brennan, the Director of the CIA, implied that the attacks were somehow related to “hand wringing” about spying and Sen. Tom Cotton (R-Ark.) introduced a bill to delay the shut down of the 215 program. Opponents of encryption were quick to say: “I told you so.”
  • But the facts that have emerged thus far tell a different story. It appears that much of the planning took place IRL (that’s “in real life” for those of you who don’t have teenagers). The attackers, several of whom were on law enforcement’s radar, communicated openly over the Internet. If France ever has a 9/11 Commission-type inquiry, it could well conclude that the Paris attacks were a failure of the intelligence agencies rather than a failure of intelligence authorities. Despite the passage of the USA Freedom Act, US surveillance authorities have remained largely intact. Section 702 of the FISA Amendments Act — which is the basis of programs like PRISM and the NSA’s Upstream collection of information from Internet cables — sunsets in the summer of 2017. While it’s difficult to predict the political environment that far out, meaningful reform of Section 702 faces significant obstacles. Unlike the Section 215 program, which was clearly aimed at Americans, Section 702 is supposedly targeted at foreigners and only picks up information about Americans “incidentally.” The NSA has refused to provide an estimate of how many Americans’ information it collects under Section 702, despite repeated requests from lawmakers and most recently a large cohort of advocates. The Section 215 program was held illegal by two federal courts (here and here), but civil attempts to challenge Section 702 have run into standing barriers. Finally, while two review panels concluded that the Section 215 program provided little counterterrorism benefit (here and here), they found that the Section 702 program had been useful.
  • There is, nonetheless, some pressure to narrow the reach of Section 702. The recent decision by the European Court of Justice in the safe harbor case suggests that data flows between Europe and the US may be restricted unless the PRISM program is modified to protect the information of Europeans (see here, here, and here for discussion of the decision and reform options). Pressure from Internet companies whose business is suffering — estimates run to the tune of $35 to 180 billion — as a result of disclosures about NSA spying may also nudge lawmakers towards reform. One of the courts currently considering criminal cases which rely on evidence derived from Section 702 surveillance may hold the program unconstitutional either on the basis of the Fourth Amendment or Article III for the reasons set out in this Brennan Center report. A federal district court in Colorado recently rejected such a challenge, although as explained in Steve’s post, the decision did not seriously explore the issues. Further litigation in the European courts too could have an impact on the debate.
  • ...2 more annotations...
  • The US intelligence community’s broadest surveillance authorities are enshrined in Executive Order 12333, which primarily covers the interception of electronic communications overseas. The Order authorizes the collection, retention, and dissemination of “foreign intelligence” information, which includes information “relating to the capabilities, intentions or activities of foreign powers, organizations or persons.” In other words, so long as they are operating outside the US, intelligence agencies are authorized to collect information about any foreign person — and, of course, any Americans with whom they communicate. The NSA has conceded that EO 12333 is the basis of most of its surveillance. While public information about these programs is limited, a few highlights give a sense of the breadth of EO 12333 operations: The NSA gathers information about every cell phone call made to, from, and within the Bahamas, Mexico, Kenya, the Philippines, and Afghanistan, and possibly other countries. A joint US-UK program tapped into the cables connecting internal Yahoo and Google networks to gather e-mail address books and contact lists from their customers. Another US-UK collaboration collected images from video chats among Yahoo users and possibly other webcam services. The NSA collects both the content and metadata of hundreds of millions of text messages from around the world. By tapping into the cables that connect global networks, the NSA has created a database of the location of hundreds of millions of mobile phones outside the US.
  • Given its scope, EO 12333 is clearly critical to those seeking serious surveillance reform. The path to reform is, however, less clear. There is no sunset provision that requires action by Congress and creates an opportunity for exposing privacy risks. Even in the unlikely event that Congress was inclined to intervene, it would have to address questions about the extent of its constitutional authority to regulate overseas surveillance. To the best of my knowledge, there is no litigation challenging EO 12333 and the government doesn’t give notice to criminal defendants when it uses evidence derived from surveillance under the order, so the likelihood of a court ruling is slim. The Privacy and Civil Liberties Oversight Board is currently reviewing two programs under EO 12333, but it is anticipated that much of its report will be classified (although it has promised a less detailed unclassified version as well). While the short-term outlook for additional surveillance reform is challenging, from a longer-term perspective, the distinctions that our law makes between Americans and non-Americans and between domestic and foreign collection cannot stand indefinitely. If the Fourth Amendment is to meaningfully protect Americans’ privacy, the courts and Congress must come to grips with this reality.
Paul Merrell

A Secret Catalogue of Government Gear for Spying on Your Cellphone - 0 views

  • HE INTERCEPT HAS OBTAINED a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and local police inside the United States. The catalogue includes details on the Stingray, a well-known brand of surveillance gear, as well as Boeing “dirt boxes” and dozens of more obscure devices that can be mounted on vehicles, drones, and piloted aircraft. Some are designed to be used at static locations, while others can be discreetly carried by an individual. They have names like Cyberhawk, Yellowstone, Blackfin, Maximus, Cyclone, and Spartacus. Within the catalogue, the NSA is listed as the vendor of one device, while another was developed for use by the CIA, and another was developed for a special forces requirement. Nearly a third of the entries focus on equipment that seems to have never been described in public before.
  • The Intercept obtained the catalogue from a source within the intelligence community concerned about the militarization of domestic law enforcement. (The original is here.) A few of the devices can house a “target list” of as many as 10,000 unique phone identifiers. Most can be used to geolocate people, but the documents indicate that some have more advanced capabilities, like eavesdropping on calls and spying on SMS messages. Two systems, apparently designed for use on captured phones, are touted as having the ability to extract media files, address books, and notes, and one can retrieve deleted text messages. Above all, the catalogue represents a trove of details on surveillance devices developed for military and intelligence purposes but increasingly used by law enforcement agencies to spy on people and convict them of crimes. The mass shooting earlier this month in San Bernardino, California, which President Barack Obama has called “an act of terrorism,” prompted calls for state and local police forces to beef up their counterterrorism capabilities, a process that has historically involved adapting military technologies to civilian use. Meanwhile, civil liberties advocates and others are increasingly alarmed about how cellphone surveillance devices are used domestically and have called for a more open and informed debate about the trade-off between security and privacy — despite a virtual blackout by the federal government on any information about the specific capabilities of the gear.
  • ANY OF THE DEVICES in the catalogue, including the Stingrays and dirt boxes, are cell-site simulators, which operate by mimicking the towers of major telecom companies like Verizon, AT&T, and T-Mobile. When someone’s phone connects to the spoofed network, it transmits a unique identification code and, through the characteristics of its radio signals when they reach the receiver, information about the phone’s location. There are also indications that cell-site simulators may be able to monitor calls and text messages. In the catalogue, each device is listed with guidelines about how its use must be approved; the answer is usually via the “Ground Force Commander” or under one of two titles in the U.S. code governing military and intelligence operations, including covert action.
  • ...2 more annotations...
  • “We’ve seen a trend in the years since 9/11 to bring sophisticated surveillance technologies that were originally designed for military use — like Stingrays or drones or biometrics — back home to the United States,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation, which has waged a legal battle challenging the use of cellphone surveillance devices domestically. “But using these technologies for domestic law enforcement purposes raises a host of issues that are different from a military context.”
  • But domestically the devices have been used in a way that violates the constitutional rights of citizens, including the Fourth Amendment prohibition on illegal search and seizure, critics like Lynch say. They have regularly been used without warrants, or with warrants that critics call overly broad. Judges and civil liberties groups alike have complained that the devices are used without full disclosure of how they work, even within court proceedings.
Paul Merrell

Neocons Launch 2016 Manifesto « LobeLog - 0 views

  • A mostly neoconservative group of national-security analysts have published perhaps the first comprehensive outline of what they believe a Republican foreign policy should look like as of Inauguration Day 2017. It’s titled “Choosing to Lead: American Foreign Policy for a Disordered World.” Although it concedes that “there are limitations on American power,” according to the book’s “Forward” by former George W. Bush speechwriter, Peter Wehner, all of the contributors …understand, too, that with the right leadership and policies in place, the United States can once again be a guarantor of global order and peace, a champion of human rights, and a beacon of economic growth and human flourishing. There is no reason the 21st century cannot be the next American Century. …Choosing to Lead offers perspectives and recommendations on how to make the next American Century happen. In doing so, we believe it will serve the world as well as the United States of America.[Emphasis added.] If you sense a rebirth of the Project for the New American Century (PNAC), you’re probably not far off, although Bob Kagan and Bill Kristol, who co-founded PNAC, are not among the large number of contributors. PNAC published two volumes, Present Dangers and Rebuilding American Defenses, that together formed a neocon manifesto for the Republican presidential candidate in the 2000 election in which the organization initially backed John McCain.
  • The new compilation is the product of the John Hay Initiative, named after Theodore Roosevelt’s chief diplomat, and brings together many of the foreign-policy advisers to Mitt Romney’s 2012 presidential campaign. The Initiative is co-chaired by Eliot Cohen (a charter member of PNAC), former Romney adviser Brian Hook, and Eric Edelman (who succeeded Doug Feith as undersecretary of defense under George W. Bush and has since served as co-founder and director—with Kagan and Kristol—of PNAC’s lineal descendant, the Foreign Policy Initiative). The 200 “experts” connected to the Initiative have reportedly advised almost all of the 2016 Republican presidential candidates. The Initiative has made no secret of its hope that a successful Republican presidential candidate will appoint many of its members to senior policy-making positions (much as PNAC’s charter members, such as Dick Cheney, Donald Rumsfeld, Paul Wolfowitz, and Elliott Abrams, were all rewarded with senior posts under George W. Bush. Cohen positioned himself for an appointment in that administration by writing the perfectly timed book, Supreme Command, in the run-up to the Iraq invasion about how the best wartime presidents ignored the more cautious advice of their generals. A faithful signer of PNAC’s letters, Cohen was named counsel to Condoleezza Rice in Bush’s second term.
Paul Merrell

Manipulation of the Gold Market: China has Imported 2400 Tons of Gold and the Price Goes Down… | Global Research - Centre for Research on Globalization - 0 views

  • We will no doubt look back upon the current era as the “crime of the century” for so many different reasons. Actually, current times represent the worst financial crimes of ALL TIME! The various crimes and how they are operated are too numerous to list and would probably fill a three volume set of books, let’s concentrate on just one. Central to everything is the U.S. issuing the global reserve currency by fiat knowing full well it truly means “non payment”. The absolute cornerstone to the dollar retaining confidence and thus value has been the suppression of the price of gold. Before getting to specifically what I’d like to point out, let’s look at a couple common sense points which beg questions. How is it China has been importing 2,400 tons of gold over the past two and a half years without any upward push to the gold price? This amount equals almost EXACTLY the TOTAL amount of gold mined annually around the world! How is it possible that ALL production has been purchased by China and yet the price goes down? The answer of course is quite simple unless you purposely close your eyes or disingenuously “apologize”.
  • The argument from the apologists is that “traders” on COMEX and LBMA believe gold will go lower so they are sellers and this is where the downward pressure has come from. You as a reader already know that much of the “selling” is done at midnight (or off hours) in the U.S. which is the lunch break in Asia, China specifically. The massive selling (as much as total global production in less than two trading days) has usually taken place during off hours when the volume is lightest and price moves the most, especially with any significant volume. The result has been gold now trades at or very near the cost of production and silver well below production costs. None of this is new, only a refresher. The reaction in the actual physical markets is backwardation, premiums over spot prices and actual shortages. Put simply, low price has brought out additional physical demand. To the point, the following is a snapshot of inventory movement (or the lack of) within the COMEX gold vaults this month:
  • Yes, yes, the open interest ALWAYS collapses and delivery “always gets made”. But doesn’t it seem strange to you that a market with less than $200 million worth of inventory is the pricing to a $5 trillion monetary asset? In comparison, a single ranch in Texas just got sold for nearly 4 times the size of what COMEX claims they have available for delivery. It used to be the tail was wagging the dog. Now, COMEX inventory has been bled down so far it can be said just a few hairs on the tail is wagging the dog! Surely I will receive comments like “this will go on forever” or “don’t worry, nothing ever comes of these delivery months”. It should be pointed out, as it stands right now a single trade of 1,820 contracts represents the entire deliverable inventory and we have seen on multiple occasions where 3,000-6,000 contracts have been sold (in one trade) to collapse the price. I ask, how does COMEX keep this in the box when something very “REAL” happens? “Real” meaning a mere push of our financial system by China? Or a military shove by Russia? Or something as simple as a “truth bomb” being released on the American public? Can an inventory of less than $200 million fiat dollars make good and keep hidden the core crime to the crime of the century? Is this why China is moving toward a physical exchange? Once they “take it out …they will take it up”!
Paul Merrell

Still Secret: Second Circuit Keeps More Drone Memos From the Public | Just Security - 0 views

  • Secret law has been anathema to our democracy since its Founding, but a federal appeals court just gave us more of it.
  • We might forgive the citizenry’s confusion, though, in attempting to square those principles with the decision by the Second Circuit Court of Appeals, published yesterday, holding that the government may continue to keep secret nine legal memoranda by the Justice Department’s Office of Legal Counsel analyzing the legality of targeted killings carried out by the US government. It was just more than a year ago that the same panel of the same court ordered the government to disclose key portions of a July 2010 OLC memorandum that authorized the targeted killing of an American citizen in Yemen. At the time, the court’s opinion seemed to promise at least a partial solution to a problem straight (as the district court in the same case put it) from Alice in Wonderland: that [a] thicket of laws and precedents … effectively allow the Executive Branch of our Government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws, while keeping the reasons for its conclusion a secret.
  • Yesterday’s opinion retreats from that promise by keeping much of the government’s law of the targeted killing program secret. (In this and two other cases, the ACLU continues to seek more than 100 other legal memoranda authored by various agencies concerning targeted killing.) It does so in two ways that warrant attention. First, the court suggests that OLC merely gives advice to executive branch agencies, and that OLC’s legal memoranda do not establish the “working law” of the government because agencies might not “adopt” the memoranda’s legal analysis as their own. This argument is legally flawed and, moreover, it flies in the face of the public evidence concerning how the executive branch treats opinions issued by OLC. In an OLC memorandum published, ironically or not, the same day (July 16, 2010) and over the same signature (David Barron’s) as the targeted killing memorandum released at the Second Circuit’s behest last year, the OLC explains that its “central function” is to provide “controlling legal advice to Executive Branch officials.” And not even two weeks ago, the acting head of the OLC told the public that even informally drafted legal advice emanating from his office is “binding by custom and practice in the executive branch,” that “[i]t’s the official view of the office, and that “[p]eople are supposed to and do follow it.”
  • ...2 more annotations...
  • But that’s not what the government told the Second Circuit, and it’s not what the Second Circuit has now suggested is the law. Second, the Second Circuit’s new opinion endorses the continued official secrecy over any discussion of a document that has supplied a purported legal basis for the targeted killing program since almost immediately after the September 11 attacks. The document — a September 17, 2001 “Memorandum of Notification” — is not much of a secret. The government publicly identified it in litigation with the ACLU eight years ago; the Senate Intelligence Committee cited it numerous times in its recent torture report; and the press frequently makes reference to it. Not only that, but the Central Intelligence Agency’s former top lawyer, John Rizzo, freely discussed it in his recent memoir. According to Rizzo, the September 17 MON is “the most comprehensive, most ambitious, most aggressive, and most risky” legal authorization of the last decade and a half — which is saying something. Rizzo explains that the MON authorizes targeted killings of suspected terrorists by the CIA, and in his new book, Power Wars, Charlie Savage reports that the MON is the original source of the controversial (and legally novel) “continuing and imminent threat” standard the government uses to govern the lethal targeting of individuals outside of recognized battlefields. The MON is also likely to have authorized an end run around the assassination “ban” in Executive Order 12333 — a legal maneuver that is discussed in, but almost entirely redacted from, an earlier OLC analysis of targeted killing.
  • In yesterday’s opinion, the Second Circuit upheld the government’s withholding of a 2002 OLC memorandum that “concerns Executive Order 12333,” which almost certainly analyzes the effect of the September 17 MON, as well as of five other memoranda that “discuss another document that remains entitled to protection.” If indeed that “document” is the MON, it would seem to be yet another case of what the DC Circuit pointedly criticized, in a 2013 opinion, as the granting of judicial “imprimatur to a fiction of deniability that no reasonable person would regard as plausible.” In that case, the DC Circuit went on to quote Justice Frankfurter: “‘There comes a point where … Court[s] should not be ignorant as judges of what [they] know as men’ and women.” Last year, the Second Circuit took that admonishment to heart when it published the July 2010 OLC memorandum. Unfortunately, yesterday, rather than once again opening the country’s eyes to the law our government is applying behind closed doors, the Second Circuit closed its own.
Paul Merrell

Korematsu's Demise? | Just Security - 0 views

  • There’s a lot that’s remarkable about last Tuesday’s Third Circuit decision in Hassan v. City of New York, which Faiza Patel cogently summarized in her post last week. In a nutshell, Hassan involves a challenge to secret intelligence operations carried out by the New York Police Department (NYPD) over the years since September 11 that allegedly targets Muslim communities “based on the false and stigmatizing premise that Muslim religious identity ‘is a permissible proxy for criminality, and that Muslim individuals, businesses, and institutions can therefore be subject to pervasive surveillance not visited upon individuals, businesses, and institutions of any other religious faith or the public at large.'” The district court had tersely granted the City’s motion to dismiss both because it concluded the plaintiffs lacked standing and because, in the alternative, it held that the plaintiffs had failed to overcome the pleading burden articulated by the Supreme Court in Iqbal. But the Third Circuit reversed on both fronts, holding that the plaintiffs’ allegations, if true, were more than enough to establish both that they had suffered an injury in fact sufficient to satisfy Article III standing, and that their equal protection and First Amendment claims were sufficiently plausible to satisfy Iqbal. To be sure, the Third Circuit’s decision is interlocutory — coming at a very preliminary stage in the litigation. But what I want to suggest in the post that follows is that, as much as any other post-September 11 judicial decision, Hassan represents the full-throated repudiation of the Supreme Court’s infamous World War II-era ruling in Korematsu v. United States that has been so long in coming — and so thoroughly overdue.
  • As I’ve written about before, Korematsu reflects two separate — but equally important — constitutional failures. The first failure was the internment policy itself, which we now know (and which the US government knew at the time) to have been a completely unnecessary — if not hysterical — overreaction to hyperbolic and (after Midway, at least) categorically overstated fears of a Japanese invasion of the West Coast. By itself, the camps were a dark stain on the history of civil liberties in the United States — albeit one of many, alas. But the second failure was, historically, the far more significant and unique one — the Supreme Court’s conscious constitutional rationalization of the internment policy, based upon a combination of naïveté on the Justices’ part and the affirmatively misleading (if not downright disingenuous) briefing by the federal government. As Justice Robert H. Jackson understood — and forcefully articulated — in his Korematsu dissent, the real violence to the “rule of law” resulting from the camps was thus not the underlying policy, but rather its validation by the Supreme Court. In his words, “a military commander may overstep the bounds of constitutionality, and it is an incident. But if we review and approve, that passing incident becomes the doctrine of the Constitution.”
  • But we’ve struggled somewhat with the second constitutional failure. The courts have repudiated Korematsu’s conviction; the Office of the Solicitor General has confessed error for its role in perpetuating the government’s misleading case before the Supreme Court; and scholars have suggested that Korematsu itself has become part of the “anti-canon” — the class of Supreme Court decisions so reviled that they are cited, if at all, in support of the wrongness of their holdings. But Korematsu itself remains on the books, as do broader concerns that courts are still vulnerable to Korematsu — style reasoning, i.e., that the need to protect national security might provide legal justification for government conduct that would otherwise be unjustifiable. Indeed, one need look no further than the ongoing debate over the SSCI’s torture report for evidence of the Korematsu mentality being alive and well.
  • ...2 more annotations...
  • That’s why I find the Third Circuit’s analysis in Hassan so significant — not because it allows this particular civil suit to go forward, but because it does so based upon an explicit (and conscious) rejection of Korematsu — style legal reasoning. As Judge Ambro explains, “No matter how tempting it might be to do otherwise, we must apply the same rigorous standards even where national security is at stake. We have learned from experience that it is often where the asserted interest appears most compelling that we must be most vigilant in protecting constitutional rights.” And applying the strict judicial scrutiny that is triggered by government action deemed to be intentionally discriminatory on the basis of religious affiliation, the court proceeds to hold that the NYPD lacked a sufficiently compelling justification for such discriminatory treatment, because even if abstract claims of security necessity could be a compelling government interest, the NYPD’s alleged policy was far too overbroad to survive the narrow tailoring required by strict scrutiny. Thus, quoting directly from Justice Jackson’s Korematsu dissent, Judge Ambro closed his opinion by noting that “Our job is judicial. We ‘can apply only law, and must abide by the Constitution, or [we] cease to be civil courts and become instruments of [police] policy.'”
  • Faiza’s post provides far more detail on the specifics of the Third Circuit’s analysis, and the opinion itself is worth a read. For present purposes, though, it’s this mentality that I find so refreshing — that even when the government invokes the specter of September 11 and the need to prevent future acts of terrorism, courts will not abdicate their responsibility to scrutinize the government’s justifications with care, and to be especially wary of overbroad government programs carried out under the broad guise of “necessity.” Hassan certainly isn’t the first example of this kind of principled judicial decisionmaking in a post-September 11 counterterrorism suit, but it is the one that, at least in my view, most directly confronts — and rejects — the kind of deferential judicial review that was responsible for the second constitutional failure in Korematsu, and all of the pain that followed.
Gary Edwards

The Fourth Industrial Revolution: what it means and how to respond - Agenda - The World Economic Forum - 0 views

  • The First Industrial Revolution used water and steam power to mechanize production. The Second used electric power to create mass production. The Third used electronics and information technology to automate production. Now a Fourth Industrial Revolution is building on the Third, the digital revolution that has been occurring since the middle of the last century. It is characterized by a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres.
  • Like the revolutions that preceded it, the Fourth Industrial Revolution has the potential to raise global income levels and improve the quality of life for populations around the world. To date, those who have gained the most from it have been consumers able to afford and access the digital world; technology has made possible new products and services that increase the efficiency and pleasure of our personal lives. Ordering a cab, booking a flight, buying a product, making a payment, listening to music, watching a film, or playing a game—any of these can now be done remotely.
  • In the future, technological innovation will also lead to a supply-side miracle, with long-term gains in efficiency and productivity. Transportation and communication costs will drop, logistics and global supply chains will become more effective, and the cost of trade will diminish, all of which will open new markets and drive economic growth.
  • ...16 more annotations...
  • As automation substitutes for labor across the entire economy, the net displacement of workers by machines might exacerbate the gap between returns to capital and returns to labor. On the other hand, it is also possible that the displacement of workers by technology will, in aggregate, result in a net increase in safe and rewarding jobs.
  • I am convinced of one thing—that in the future, talent, more than capital, will represent the critical factor of production.
  • This will give rise to a job market increasingly segregated into “low-skill/low-pay” and “high-skill/high-pay” segments, which in turn will lead to an increase in social tensions.
  • In addition to being a key economic concern, inequality represents the greatest societal concern associated with the Fourth Industrial Revolution.
  • The largest beneficiaries of innovation tend to be the providers of intellectual and physical capital—the innovators, shareholders, and investors—which explains the rising gap in wealth between those dependent on capital versus labor.
  • Technology is therefore one of the main reasons why incomes have stagnated, or even decreased, for a majority of the population in high-income countries: the demand for highly skilled workers has increased while the demand for workers with less education and lower skills has decreased. The result is a job market with a strong demand at the high and low ends, but a hollowing out of the middle.
  • A winner-takes-all economy that offers only limited access to the middle class is a recipe for democratic malaise and dereliction.
  • An underlying theme in my conversations with global CEOs and senior business executives is that the acceleration of innovation and the velocity of disruption are hard to comprehend or anticipate and that these drivers constitute a source of constant surprise, even for the best connected and most well informed. Indeed, across all industries, there is clear evidence that the technologies that underpin the Fourth Industrial Revolution are having a major impact on businesses.
  • On the supply side, many industries are seeing the introduction of new technologies that create entirely new ways of serving existing needs and significantly disrupt existing industry value chains. Disruption is also flowing from agile, innovative competitors who, thanks to access to global digital platforms for research, development, marketing, sales, and distribution, can oust well-established incumbents faster than ever by improving the quality, speed, or price at which value is delivered.
  • Major shifts on the demand side are also occurring, as growing transparency, consumer engagement, and new patterns of consumer behavior (increasingly built upon access to mobile networks and data) force companies to adapt the way they design, market, and deliver products and services.
  • A key trend is the development of technology-enabled platforms that combine both demand and supply to disrupt existing industry structures, such as those we see within the “sharing” or “on demand” economy. These technology platforms, rendered easy to use by the smartphone, convene people, assets, and data—thus creating entirely new ways of consuming goods and services in the process. In addition, they lower the barriers for businesses and individuals to create wealth, altering the personal and professional environments of workers. These new platform businesses are rapidly multiplying into many new services, ranging from laundry to shopping, from chores to parking, from massages to travel.
  • On the whole, there are four main effects that the Fourth Industrial Revolution has on business—on customer expectations, on product enhancement, on collaborative innovation, and on organizational forms.
  • Overall, the inexorable shift from simple digitization (the Third Industrial Revolution) to innovation based on combinations of technologies (the Fourth Industrial Revolution) is forcing companies to reexamine the way they do business. The bottom line, however, is the same: business leaders and senior executives need to understand their changing environment, challenge the assumptions of their operating teams, and relentlessly and continuously innovate.
  • governments will increasingly face pressure to change their current approach to public engagement and policymaking, as their central role of conducting policy diminishes owing to new sources of competition and the redistribution and decentralization of power that new technologies make possible.
  • Ultimately, the ability of government systems and public authorities to adapt will determine their survival. If they prove capable of embracing a world of disruptive change, subjecting their structures to the levels of transparency and efficiency that will enable them to maintain their competitive edge, they will endure. If they cannot evolve, they will face increasing trouble.
  • In the end, it all comes down to people and values. We need to shape a future that works for all of us by putting people first and empowering them. In its most pessimistic, dehumanized form, the Fourth Industrial Revolution may indeed have the potential to “robotize” humanity and thus to deprive us of our heart and soul. But as a complement to the best parts of human nature—creativity, empathy, stewardship—it can also lift humanity into a new collective and moral consciousness based on a shared sense of destiny. It is incumbent on us all to make sure the latter prevails.
« First ‹ Previous 341 - 360 of 369 Next ›
Showing 20 items per page