Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching ""how to"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gary Edwards

Of Bailouts, Bonuses, and Generational Responsibility from The Daily Bail - 0 views

  • When one transfers the learned behavior of selfishness to the world of economics, it is east to see how we got to the world of adjustable rate mortgages, thirty-to-one leverage, credit default swaps, and thirty year hedge fund workers acting as is million dollar paychecks was an otherwise normal entitlement.  If it felt good, it was therefore right – and by all means, don’t rock the boat.  And what we are witnessing today in Washington and Wall Street in response to our economic crisis is nothing but a conscious and willing decision to pass off to the next generation the cost of our mistakes.
  • the fundamental principles of capitalism – namely that bad actors need to fail.
  • First and most foremost, the Congress needs to institute a modernized version of Glass-Stegall and separate commercial banking from investment banking activities. What we have seen in the abolishment Glass-Stegall (please thank Mr. Rubin formerly of Goldman Sachs) is the creation of federally subsidize casinos masquerading as publicly traded financial institutions.  They kept profits from over-leveraged bets and were kind enough to pass their losses onto the taxpayers.  Second, Congress needs to repeal legislation (Gramm-Leach) that allowed financial institutions not only to leverage in ways previously not permitted, but which also granted banks and financial situations exemption from federal gambling laws. Third, and this is where moral outrage hits home to those on Wall Street, we cannot live in a country in which any company is allowed to manipulate the levers of government in such a way as to make itself obscenely rich at the expense of the public.
  • ...11 more annotations...
  • We saw as we proceeded through life that pursuing one’s self-interest was rewarded just as often than doing what was right, that morals were relative, and that there would be no consequences to bad behavior. It became de rigueur to assume that our parents (and their lawyers) would save us from our bad behavior.
  • no consequences to irresponsible behavior.
  • it is hard to avoid the reality that my generation, the baby boomers who are now approaching retirement, have caused the greatest collapse of the world economy since the 1930s, and in the process damaged this country in ways we are now only beginning to understand.
  • Goldman is only the largest corporate contributor to the Obama administration
  • Looking back more eighteen months after the first signs of distress in our economy appeared, it seems that leaders in Congress and Wall Street have erred in a manner never before witnessed in this nation.  In the process, they have conspired through their collective arrogance, greed, and ignorance to damage the economy of the country (if not the world), make many themselves rich beyond the imaginations of most Americans, and in the process commit the greatest financial rape of the American public in the history of the country.  And if that does resonate, then either you have not been paying attention for the past two years, or you have received your paycheck form Goldman Sachs.
  • Capitalism remains the best economic system on the planet, but when those who have profited handsomely seek to socialize losses caused by their errors, then those in power in Washington have a moral responsibility to demand an accounting.  Our anger comes from the fact that our leaders have failed in their public obligations at the expense of the interests on Wall Street, and in the process created the greatest social divide that this country has seen in the past 40 years.
  • our nation has one of the highest ratios of debt to GDP on the globe
  • Finally, the administration should demand (I know it won’t) that Goldman Sachs return the approximately $13 billion it received in backdoor payments through AIG when AIG received $180 billion in bailout money. That $13 billion belongs to the taxpayers of this country, and the decision to allow Goldman to receive that money perhaps stands as the greatest moral outrage of this entire sordid affair.  
  • he nation will not die; to the contrary, it would become stronger if we permit free markets to work, and allow the next-generation to live unburdened by our mistakes and arrogance.
  • The proposal in question was Ryan's "Roadmap for America's Future," a sweeping plan to stave off the nation's looming economic and fiscal collapse by changing the tax code, overhauling the health care system, and reforming the nation's major entitlement programs. Its debt-reducing claims aren't based on mere fantasy -- the Congressional Budget Office has determined that the plan would boost economic growth while making Medicare and Social Security solvent. And it accomplishes these aims without raising taxes or affecting the benefits of current retirees.
  • There's no doubt where the Treasury will turn for finance. We are about to see the greatest stuffing of banks with government securities the world has ever seen. American banks will be forced to gorge on Treasury securities, and disgorge bank reserves. Where else can the government get the next trillion to spend on things like wars, unemployment benefits, and food stamps?There are a few obvious things to think about here. At the rate of $120 billion a month, it will only take about nine months to blow through over a trillion dollars in free bank reserves. Each Treasury auction will find it more difficult to sell all of the treasury securities, and it will take rising interest rates to coax out even more reserves from the banks. (When you need to borrow over $4 billion a day, even a trillion dollars doesn't last long.)
  •  
    Wow!  This is the best response to the financial collapse i have read to date.  Exceptional in clarity, but written with a tone of mixed sorrow and shame.  Mr. Gallow places the blame exactly where it should be placed.  It's a generational thing with one exception Mr. Gallow overlooks - the Obama margin of victory was very much due to the massive turnout and votes of post baby boomer generations.  We boomers may have created and caused the financial collapse and destruction of America, but they were dumb enough to put the decline of capitalism and ordered liberty on marxist steroids. excerpt:  .... this is the first time that I have been so angered by incompetence and greed in government and Wall Street to express publicly my own thoughts.  In simple terms, what has dawned on me is that my generation, the "Baby Boomers" between the ages of 45 and 65, has emerged not as not the most significant or talented generation in our history (as we thought we were), but rather as the most self-absorbed and reckless. Because ours will be the first generation in the history of this country to leave to its successors a nation in worse shape than that which it inherited; put differently, we will be the first generation in this nation to have taken from our parents and stolen from our children. .. it is hard to avoid the reality that my generation, the baby boomers who are now approaching retirement, have caused the greatest collapse of the world economy since the 1930s, and in the process damaged this country in ways we are now only beginning to understand. ... Looking back more eighteen months after the first signs of distress in our economy appeared, it seems that leaders in Congress and Wall Street have erred in a manner never before witnessed in this nation.  In the process, they have conspired through their collective arrogance, greed, and ignorance to damage the economy of the country (if not the world), make many themselves rich beyond the imaginations of mo
Gary Edwards

The Real Reason for the Iraq War | VICE United Kingdom - 1 views

  • Like most lefty journalists, I assumed that George Bush and Tony Blair invaded Iraq to buy up its oil fields, cheap and at gun-point, and cart off the oil. We thought we knew the neo-cons true casus belli: Blood for oil. But the truth in the Options for Iraqi Oil Industry was worse than "Blood for Oil". Much, much worse.
  • Within days, our chief of investigations, Ms Badpenny, delivered to my shack in the woods outside New York a 323-page, three-volume programme for Iraq's oil crafted by George Bush's State Department and petroleum insiders meeting secretly in Houston, Texas. I cracked open the pile of paper – and I was blown away.
  • I'd already had in my hands a 101-page document, another State Department secret scheme, first uncovered by Wall Street Journal reporter Neil King, that called for the privatisation, the complete sell-off of every single government-owned asset and industry. And in case anyone missed the point, the sales would include every derrick, pipe and barrel of oil, or, as the document put it, "especially the oil". That plan was created by a gaggle of corporate lobbyists and neo-cons working for the Heritage Foundation. In 2004, the plan's authenticity was confirmed by Washington power player Grover Norquist. (It's hard to erase the ill memory of Grover excitedly waving around his soft little hands as he boasted about turning Iraq into a free-market Disneyland, recreating Chile in Mesopotamia, complete with the Pinochet-style dictatorship necessary to lock up the assets – while behind Norquist, Richard Nixon snarled at me from a gargantuan portrait.) The neo-con idea was to break up and sell off Iraq's oil fields, ramp up production, flood the world oil market – and thereby smash OPEC and with it, the political dominance of Saudi Arabia.
  • ...6 more annotations...
  • General Jay Garner also confirmed the plan to grab the oil. Indeed, Secretary of Defense Donald Rumsfeld fired Garner, when the General, who had lived in Iraq, complained the neo-con grab would set off a civil war. It did. Nevertheless, Rumsfeld replaced Garner with a new American viceroy, Paul Bremer, a partner in Henry Kissinger's firm, to complete the corporate takeover of Iraq's assets – "especially the oil".
  • But that was not to be. While Bremer oversaw the wall-to-wall transfer of Iraqi industries to foreign corporations, he was stopped cold at the edge of the oil fields. How? I knew there was only one man who could swat away the entire neo-con army: James Baker, former Secretary of State, Bush family consiglieri and most important, counsel to Exxon-Mobil Corporation and the House of Saud.
  • There was no way in hell that Baker's clients, from Exxon to Abdullah, were going to let a gaggle of neo-con freaks smash up Iraq's oil industry, break OPEC production quotas, flood the market with six million bbd of Iraqi oil and thereby knock the price of oil back down to $13 a barrel where it was in 1998.
  • Big Oil could not allow Iraq's oil fields to be privatised and taken from state control. That would make it impossible to keep Iraq within OPEC (an avowed goal of the neo-cons) as the state could no longer limit production in accordance with the cartel's quota system. The US oil industry was using its full political mojo to prevent their being handed ownership of Iraq's oil fields. That's right: The oil companies didn't want to own the oil fields – and they sure as hell didn't want the oil. Just the opposite. They wanted to make sure there would be a limit on the amount of oil that would come out of Iraq. Saddam wasn't trying to stop the flow of oil – he was trying to sell more. The price of oil had been boosted 300 percent by sanctions and an embargo cutting Iraq's sales to two million barrels a day from four. With Saddam gone, the only way to keep the damn oil in the ground was to leave it locked up inside the busted state oil company which would remain under OPEC (i.e. Saudi) quotas. The James Baker Institute quickly and secretly started in on drafting the 323-page plan for the State Department. With authority granted from the top (i.e. Dick Cheney), ex-Shell Oil USA CEO Phil Carroll was rushed to Baghdad in May 2003 to take charge of Iraq's oil. He told Bremer, "There will be no privatisation of oil – END OF STATEMENT." Carroll then passed off control of Iraq's oil to Bob McKee of Halliburton, Cheney's old oil-services company, who implemented the Baker "enhance OPEC" option anchored in state ownership.
  • This week, VICE readers can download, for free, Greg Palast's investigation of the war in Iraq in the BBC film, Bush Family Fortunes, at www.GregPalast.com – as well as the illustrated poster of "The Secret History of War over Oil in Iraq" from Palast's international bestseller, Armed Madhouse, also at www.GregPalast.com
  • Some oil could be released, mainly to China, through limited, but lucrative, "production sharing agreements". And that's how George Bush won the war in Iraq. The invasion was not about "blood for oil", but something far more sinister: blood for no oil. War to keep supply tight and send prices skyward. Oil men, whether James Baker or George Bush or Dick Cheney, are not in the business of producing oil. They are in the business of producing profits. And they've succeeded. Iraq, capable of producing six to 12 million barrels of oil a day, still exports well under its old OPEC quota of three million barrels. The result: As we mark the tenth anniversary of the invasion this month, we also mark the fifth year of crude at $100 a barrel. As George Bush could proudly say to James Baker: Mission Accomplished!
  •  
    The Sherman Act forbids conspiracies in restraint of trade and is at its zenith in price-fixing cases. This looks to be the mother of all price-fixing cases, to say the least.   
  •  
    Wow, Marbux has it right.  This report from the legendary Greg Palast of the BBC News Network is a stunning reversal of what everyone believed to be the truth.  To wit, the militarist and global strategist - resource control hungry neocon contingent of the Repubican party was always thought to be behind the Iraqi war.  For control of cheap, plentiful oil and, the protection / destruction of Israel's enemies.   Funny, but it turns out America was fighting for higher oil prices and limited supplies.  Just as in the first Gulf War, Americans were fighting to protect Saudi and big oil profits. excerpt: Big Oil could not allow Iraq's oil fields to be privatised and taken from state control. That would make it impossible to keep Iraq within OPEC (an avowed goal of the neo-cons) as the state could no longer limit production in accordance with the cartel's quota system. The US oil industry was using its full political mojo to prevent their being handed ownership of Iraq's oil fields. That's right: The oil companies didn't want to own the oil fields - and they sure as hell didn't want the oil. Just the opposite. They wanted to make sure there would be a limit on the amount of oil that would come out of Iraq. Saddam wasn't trying to stop the flow of oil - he was trying to sell more. The price of oil had been boosted 300 percent by sanctions and an embargo cutting Iraq's sales to two million barrels a day from four. With Saddam gone, the only way to keep the damn oil in the ground was to leave it locked up inside the busted state oil company which would remain under OPEC (i.e. Saudi) quotas. The James Baker Institute quickly and secretly started in on drafting the 323-page plan for the State Department. With authority granted from the top (i.e. Dick Cheney), ex-Shell Oil USA CEO Phil Carroll was rushed to Baghdad in May 2003 to take charge of Iraq's oil. He told Bremer, "There will be no privatisation of oil - END OF STATEMENT." Carroll then passed off control
Paul Merrell

From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views

  • HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
  • Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
  • The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
  • ...17 more annotations...
  • A huge volume of the Internet data GCHQ collects flows directly into a massive repository named Black Hole, which is at the core of the agency’s online spying operations, storing raw logs of intercepted material before it has been subject to analysis. Black Hole contains data collected by GCHQ as part of bulk “unselected” surveillance, meaning it is not focused on particular “selected” targets and instead includes troves of data indiscriminately swept up about ordinary people’s online activities. Between August 2007 and March 2009, GCHQ documents say that Black Hole was used to store more than 1.1 trillion “events” — a term the agency uses to refer to metadata records — with about 10 billion new entries added every day. As of March 2009, the largest slice of data Black Hole held — 41 percent — was about people’s Internet browsing histories. The rest included a combination of email and instant messenger records, details about search engine queries, information about social media activity, logs related to hacking operations, and data on people’s use of tools to browse the Internet anonymously.
  • Throughout this period, as smartphone sales started to boom, the frequency of people’s Internet use was steadily increasing. In tandem, British spies were working frantically to bolster their spying capabilities, with plans afoot to expand the size of Black Hole and other repositories to handle an avalanche of new data. By 2010, according to the documents, GCHQ was logging 30 billion metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion. The agency was developing “unprecedented” techniques to perform what it called “population-scale” data mining, monitoring all communications across entire countries in an effort to detect patterns or behaviors deemed suspicious. It was creating what it said would be, by 2013, “the world’s biggest” surveillance engine “to run cyber operations and to access better, more valued data for customers to make a real world difference.”
  • A document from the GCHQ target analysis center (GTAC) shows the Black Hole repository’s structure.
  • The data is searched by GCHQ analysts in a hunt for behavior online that could be connected to terrorism or other criminal activity. But it has also served a broader and more controversial purpose — helping the agency hack into European companies’ computer networks. In the lead up to its secret mission targeting Netherlands-based Gemalto, the largest SIM card manufacturer in the world, GCHQ used MUTANT BROTH in an effort to identify the company’s employees so it could hack into their computers. The system helped the agency analyze intercepted Facebook cookies it believed were associated with Gemalto staff located at offices in France and Poland. GCHQ later successfully infiltrated Gemalto’s internal networks, stealing encryption keys produced by the company that protect the privacy of cell phone communications.
  • Similarly, MUTANT BROTH proved integral to GCHQ’s hack of Belgian telecommunications provider Belgacom. The agency entered IP addresses associated with Belgacom into MUTANT BROTH to uncover information about the company’s employees. Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware. The hacking operation resulted in GCHQ gaining deep access into the most sensitive parts of Belgacom’s internal systems, granting British spies the ability to intercept communications passing through the company’s networks.
  • In March, a U.K. parliamentary committee published the findings of an 18-month review of GCHQ’s operations and called for an overhaul of the laws that regulate the spying. The committee raised concerns about the agency gathering what it described as “bulk personal datasets” being held about “a wide range of people.” However, it censored the section of the report describing what these “datasets” contained, despite acknowledging that they “may be highly intrusive.” The Snowden documents shine light on some of the core GCHQ bulk data-gathering programs that the committee was likely referring to — pulling back the veil of secrecy that has shielded some of the agency’s most controversial surveillance operations from public scrutiny. KARMA POLICE and MUTANT BROTH are among the key bulk collection systems. But they do not operate in isolation — and the scope of GCHQ’s spying extends far beyond them.
  • The agency operates a bewildering array of other eavesdropping systems, each serving its own specific purpose and designated a unique code name, such as: SOCIAL ANTHROPOID, which is used to analyze metadata on emails, instant messenger chats, social media connections and conversations, plus “telephony” metadata about phone calls, cell phone locations, text and multimedia messages; MEMORY HOLE, which logs queries entered into search engines and associates each search with an IP address; MARBLED GECKO, which sifts through details about searches people have entered into Google Maps and Google Earth; and INFINITE MONKEYS, which analyzes data about the usage of online bulletin boards and forums. GCHQ has other programs that it uses to analyze the content of intercepted communications, such as the full written body of emails and the audio of phone calls. One of the most important content collection capabilities is TEMPORA, which mines vast amounts of emails, instant messages, voice calls and other communications and makes them accessible through a Google-style search tool named XKEYSCORE.
  • As of September 2012, TEMPORA was collecting “more than 40 billion pieces of content a day” and it was being used to spy on people across Europe, the Middle East, and North Africa, according to a top-secret memo outlining the scope of the program. The existence of TEMPORA was first revealed by The Guardian in June 2013. To analyze all of the communications it intercepts and to build a profile of the individuals it is monitoring, GCHQ uses a variety of different tools that can pull together all of the relevant information and make it accessible through a single interface. SAMUEL PEPYS is one such tool, built by the British spies to analyze both the content and metadata of emails, browsing sessions, and instant messages as they are being intercepted in real time. One screenshot of SAMUEL PEPYS in action shows the agency using it to monitor an individual in Sweden who visited a page about GCHQ on the U.S.-based anti-secrecy website Cryptome.
  • Partly due to the U.K.’s geographic location — situated between the United States and the western edge of continental Europe — a large amount of the world’s Internet traffic passes through its territory across international data cables. In 2010, GCHQ noted that what amounted to “25 percent of all Internet traffic” was transiting the U.K. through some 1,600 different cables. The agency said that it could “survey the majority of the 1,600” and “select the most valuable to switch into our processing systems.”
  • According to Joss Wright, a research fellow at the University of Oxford’s Internet Institute, tapping into the cables allows GCHQ to monitor a large portion of foreign communications. But the cables also transport masses of wholly domestic British emails and online chats, because when anyone in the U.K. sends an email or visits a website, their computer will routinely send and receive data from servers that are located overseas. “I could send a message from my computer here [in England] to my wife’s computer in the next room and on its way it could go through the U.S., France, and other countries,” Wright says. “That’s just the way the Internet is designed.” In other words, Wright adds, that means “a lot” of British data and communications transit across international cables daily, and are liable to be swept into GCHQ’s databases.
  • A map from a classified GCHQ presentation about intercepting communications from undersea cables. GCHQ is authorized to conduct dragnet surveillance of the international data cables through so-called external warrants that are signed off by a government minister. The external warrants permit the agency to monitor communications in foreign countries as well as British citizens’ international calls and emails — for example, a call from Islamabad to London. They prohibit GCHQ from reading or listening to the content of “internal” U.K. to U.K. emails and phone calls, which are supposed to be filtered out from GCHQ’s systems if they are inadvertently intercepted unless additional authorization is granted to scrutinize them. However, the same rules do not apply to metadata. A little-known loophole in the law allows GCHQ to use external warrants to collect and analyze bulk metadata about the emails, phone calls, and Internet browsing activities of British people, citizens of closely allied countries, and others, regardless of whether the data is derived from domestic U.K. to U.K. communications and browsing sessions or otherwise. In March, the existence of this loophole was quietly acknowledged by the U.K. parliamentary committee’s surveillance review, which stated in a section of its report that “special protection and additional safeguards” did not apply to metadata swept up using external warrants and that domestic British metadata could therefore be lawfully “returned as a result of searches” conducted by GCHQ.
  • Perhaps unsurprisingly, GCHQ appears to have readily exploited this obscure legal technicality. Secret policy guidance papers issued to the agency’s analysts instruct them that they can sift through huge troves of indiscriminately collected metadata records to spy on anyone regardless of their nationality. The guidance makes clear that there is no exemption or extra privacy protection for British people or citizens from countries that are members of the Five Eyes, a surveillance alliance that the U.K. is part of alongside the U.S., Canada, Australia, and New Zealand. “If you are searching a purely Events only database such as MUTANT BROTH, the issue of location does not occur,” states one internal GCHQ policy document, which is marked with a “last modified” date of July 2012. The document adds that analysts are free to search the databases for British metadata “without further authorization” by inputing a U.K. “selector,” meaning a unique identifier such as a person’s email or IP address, username, or phone number. Authorization is “not needed for individuals in the U.K.,” another GCHQ document explains, because metadata has been judged “less intrusive than communications content.” All the spies are required to do to mine the metadata troves is write a short “justification” or “reason” for each search they conduct and then click a button on their computer screen.
  • Intelligence GCHQ collects on British persons of interest is shared with domestic security agency MI5, which usually takes the lead on spying operations within the U.K. MI5 conducts its own extensive domestic surveillance as part of a program called DIGINT (digital intelligence).
  • GCHQ’s documents suggest that it typically retains metadata for periods of between 30 days to six months. It stores the content of communications for a shorter period of time, varying between three to 30 days. The retention periods can be extended if deemed necessary for “cyber defense.” One secret policy paper dated from January 2010 lists the wide range of information the agency classes as metadata — including location data that could be used to track your movements, your email, instant messenger, and social networking “buddy lists,” logs showing who you have communicated with by phone or email, the passwords you use to access “communications services” (such as an email account), and information about websites you have viewed.
  • Records showing the full website addresses you have visited — for instance, www.gchq.gov.uk/what_we_do — are treated as content. But the first part of an address you have visited — for instance, www.gchq.gov.uk — is treated as metadata. In isolation, a single metadata record of a phone call, email, or website visit may not reveal much about a person’s private life, according to Ethan Zuckerman, director of Massachusetts Institute of Technology’s Center for Civic Media. But if accumulated and analyzed over a period of weeks or months, these details would be “extremely personal,” he told The Intercept, because they could reveal a person’s movements, habits, religious beliefs, political views, relationships, and even sexual preferences. For Zuckerman, who has studied the social and political ramifications of surveillance, the most concerning aspect of large-scale government data collection is that it can be “corrosive towards democracy” — leading to a chilling effect on freedom of expression and communication. “Once we know there’s a reasonable chance that we are being watched in one fashion or another it’s hard for that not to have a ‘panopticon effect,’” he said, “where we think and behave differently based on the assumption that people may be watching and paying attention to what we are doing.”
  • When compared to surveillance rules in place in the U.S., GCHQ notes in one document that the U.K. has “a light oversight regime.” The more lax British spying regulations are reflected in secret internal rules that highlight greater restrictions on how NSA databases can be accessed. The NSA’s troves can be searched for data on British citizens, one document states, but they cannot be mined for information about Americans or other citizens from countries in the Five Eyes alliance. No such constraints are placed on GCHQ’s own databases, which can be sifted for records on the phone calls, emails, and Internet usage of Brits, Americans, and citizens from any other country. The scope of GCHQ’s surveillance powers explain in part why Snowden told The Guardian in June 2013 that U.K. surveillance is “worse than the U.S.” In an interview with Der Spiegel in July 2013, Snowden added that British Internet cables were “radioactive” and joked: “Even the Queen’s selfies to the pool boy get logged.”
  • In recent years, the biggest barrier to GCHQ’s mass collection of data does not appear to have come in the form of legal or policy restrictions. Rather, it is the increased use of encryption technology that protects the privacy of communications that has posed the biggest potential hindrance to the agency’s activities. “The spread of encryption … threatens our ability to do effective target discovery/development,” says a top-secret report co-authored by an official from the British agency and an NSA employee in 2011. “Pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out,” the report says, adding that the agencies were working on a plan that would “(hopefully) allow our Internet Exploitation strategy to prevail.”
Gary Edwards

I Am a Peaceful AR-15 Assault Rifle Owner by Marc J. Victor - 0 views

  • "Firearms stand next in importance to the constitution itself. They are the American people's liberty teeth and keystone under independence … from the hour the Pilgrims landed to the present day, events, occurances and tendencies prove that to ensure peace security and happiness, the rifle and pistol are equally indispensable … the very atmosphere of firearms anywhere restrains evil interference – they deserve a place of honor with all that's good." ~ George Washington
  • I am an American. As such, none of my rights depend on a showing of need. I am a free man who has the right to define and pursue my happiness in any peaceful way I see fit. The government does not grant me rights. I was born free. The legitimate role of government is to act as my agent to protect my rights; which exist independent of government. Americans do not beg the government for rights nor are they required to demonstrate a "need" for rights.
  • Government never has a more tempting opportunity to increase its size, power and scope, and to curtail the liberties of free people, than during or immediately after a crisis. Indeed, crisis is so tempting an opportunity for government that governments invent crisis whenever possible. This is why "emergency acts" and "wars" on anyone and anything are so popular for governments. Nothing entices people to stop thinking, act impulsively, and to relinquish liberties so easily as a "crisis" or a "tragedy" or an "emergency." We need to be smarter if liberty is to survive.
  • ...31 more annotations...
  • Banning Guns is Un-American and Immoral "And that the said Constitution be never construed to authorize Congress to infringe the just liberty of the Press, or the rights of Conscience; or to prevent the people of the United States, who are peaceable citizens, from keeping their own arms; …" ~ Samuel Adams
  • The Idea of Banning Guns is Foolishness "They that give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." ~ Ben Franklin
  • The single biggest contributing factor to our culture of violence is that our society no longer adheres to the once basic notion that initiating force against non-aggressors is wrong
  • Although President Obama appears excited about the notion of banning guns, I have not heard him order a ban on the very guns used to protect him. Apparently, when it comes to his protection, President Obama prefers to be protected by people armed with guns. Indeed, I suspect none of these gun ban advocates would hesitate to call 911 and request help from people armed with guns if they were faced with an intruder in their homes in the middle of the night. I fail to understand why we can’t all agree that guns save lives.
  • Our Culture of Violence
  • "Democracy is two wolves and a lamb voting on what to have for lunch. Liberty is a well-armed lamb contesting the vote!" ~ Benjamin Franklin
  • Gun Regulations Never Reduce Gun Violence and Usually Increase Violent Crime "The constitutions of most of our States assert that all power is inherent in the people; that … it is their right and duty to be at all times armed; … " ~ Thomas Jefferson
  • Our laws are replete with instances of legal trespass against peaceful people.
  • I prefer that my children are no longer unprotected sitting ducks at a federally mandated gun free zone in school.
  • We no longer recognize the sovereignty of the individual.
  • democracy is akin to mob rule.
  • Our spending on the drug war will soon be approaching 100 billion dollars per year.
  • Not only do guns remain widely available in Mexico, but their gun related homicide rate outpaces ours. The same can be said of all these drug war countries.
  • Mexico has some of the strictest gun control laws in the world. Its laws effectively prohibit gun ownership.
  • Rather than living in a democratic republic where most decisions are left to the property owner, we now have an unfettered democracy where anything goes so long as the majority of voters agree
  • "To preserve liberty, it is essential that the whole body of the people always possess arms and be taught alike, especially when young, how to use them." ~ Richard Henry Lee
  • Indeed, this law may have encouraged Mr. Lanza to work his horrific violence at the Sandy Hook Elementary School knowing federal law provides that nobody could have the capacity to stop him.
  • One unintended consequence of this federal law has been to create a guaranteed victim zone, comprised of children, who are unprotected sitting ducks for any deranged lunatic such as Mr. Lanza.
  • Our culture of violence is more directly attributable to anti-freedom government policies which diminish and disrespect the rights of the individual.
  • Here is a short list of some notable examples compiled by the Libertarian Party:
  • A 1997 high school shooting in Pearl, Mississippi was halted by the school's vice principal after he retrieved the Colt .45 he kept in his truck. A 1998 middle school shooting ended when a man living next door heard gunfire and apprehended the shooter with his shotgun. A 2002 terrorist attack at an Israeli school was quickly stopped by an armed teacher and a school guard. A 2002 law school shooting in Grundy, Virginia came to an abrupt conclusion when students carrying firearms confronted the shooter. A 2007 mall shooting in Ogden, Utah ended when an armed off-duty police officer intervened. A 2009 workplace shooting in Houston, Texas was halted by two co-workers who carried concealed handguns. A 2012 church shooting in Aurora, Colorado was stopped by a member of the congregation carrying a gun. At the recent mall shooting in Portland, Oregon the gunman took his own life minutes after being confronted by a shopper carrying a concealed weapon.
  • Three Reasons Americans Have a Right to Own Guns "Are we at last brought to such humiliating and debasing degradation, that we cannot be trusted with arms for our defense? Where is the difference between having our arms in possession and under our direction and having them under the management of Congress? If our defense be the real object of having those arms, in whose hands can they be trusted with more propriety, or equal safety to us, as in our own hands?" ~ Patrick Henry
  • First, free people have a right to self defense.
  • The second reason for a right to keep and bear arms is to deter possible foreign invasions.
  • The founders of our nation believed people must always preserve their right to resistance and revolution against their own government. "And what country can preserve its liberties, if its rulers are not warned from time to time that their people preserve the spirit of resistance? Let them take arms....The tree of liberty must be refreshed from time to time, with the blood of patriots and tyrants." ~ Thomas Jefferson.
  • Japanese Admiral Isoroku Yamamoto
  • The third reason for a right to keep and bear arms is, as Thomas Jefferson stated, "The strongest reason for people to retain the right to keep and bear arms is, as a last resort, to protect themselves against tyranny in government."
  • "When the people fear the government, there is tyranny. When the government fears the people, there is liberty."
  • "You cannot invade the mainland United States. There would be a rifle behind every blade of grass"
  • In the 20th century alone, the death toll resulting from governments murdering their own disarmed citizens after guns were legally banned is estimated at 56 million.
  • "If ye love wealth greater than liberty, the tranquility of servitude greater than the animating contest for freedom, go home from us in peace. We seek not your counsel, nor your arms. Crouch down and lick the hand that feeds you; and may posterity forget that ye were our countrymen." ~ Samuel Adams
  •  
    Excellent article on the importance of gun ownership in America.  The author is a defense attorney practicing law in Arizona.  He's also a war veteran and well versed libertarian.   Excerpts: "I am an American. As such, none of my rights depend on a showing of need. I am a free man who has the right to define and pursue my happiness in any peaceful way I see fit. The government does not grant me rights. I was born free. The legitimate role of government is to act as my agent to protect my rights; which exist independent of government. Americans do not beg the government for rights nor are they required to demonstrate a "need" for rights." "Government never has a more tempting opportunity to increase its size, power and scope, and to curtail the liberties of free people, than during or immediately after a crisis. Indeed, crisis is so tempting an opportunity for government that governments invent crisis whenever possible. This is why "emergency acts" and "wars" on anyone and anything are so popular for governments. Nothing entices people to stop thinking, act impulsively, and to relinquish liberties so easily as a "crisis" or a "tragedy" or an "emergency." We need to be smarter if liberty is to survive." "Although President Obama appears excited about the notion of banning guns, I have not heard him order a ban on the very guns used to protect him. Apparently, when it comes to his protection, President Obama prefers to be protected by people armed with guns. "
  •  
    Excellent article other than the fact that the author erred in referring to the AR-15 as an "assault rifle." It is not. It is an "assault weapon," a semi-automatic rifle with only a cosmetic resemblance to the M-16 fully automatic "assault rifle." "Assault rifles" have been outlawed in the U.S. for decades. The U.S. had a complete ban on "assault weapon" rifles from 1994 to 2004. It did not affect gun violence rates at all, because semi-automatic rifles that lacked the cosmetic resemblance to "assault rifles" remained on the market. The distinction between the two terms is critical to understanding the current gun debate. Those who propose a ban on "assault weapons" are offering only a cosmetic sop to the anti-gun crowd, banning a sub-set of semi-automatic rifles whilst leaving equally capable semi-autos on the market. The correct question to ask is "why bother?" One might as well ban toy guns that bear a resemblance to assault weapons; other toy guns remain unaffected. For a more in depth discussion of "assault weapon" vs. "assault rifle" with references see http://en.wikipedia.org/wiki/Assault_weapon
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Gary Edwards

Comey has Long History of Cases Ending Favorable to Clintons - Tea Party News - 0 views

  • Messages found stored on Clinton’s private email server show that Berger – a convicted thief of classified documents – had been advising Clinton while she served as secretary of state and had access to emails containing classified information. For example, in an email dated Sept. 22, 2009, Berger advised Clinton advised how she could leverage information to make Israeli Prime Minister Benjamin Netanyahu more cooperative in discussions with the Obama administration over a settlement freeze.
  • Law firm ties Berger, Lynch, Mills Berger worked as a partner in the Washington law firm Hogan & Hartson from 1973 to 1977, before taking a position as the deputy director of policy planning at the State Department in the Carter administration. When Carter lost his re-election bid, Berger returned to Hogan & Hartson, where he worked until he took leave in 1988 to act as foreign policy adviser in Gov. Michael Dukakis’ presidential campaign. When Dukakis was defeated, Berger returned to Hogan & Hartson until he became foreign policy adviser for Bill Clinton’s presidential campaign in 1992. On March 28, WND reported Lynch was a litigation partner for eight years at Hogan & Hartson, from March 2002 through April 2010. Mills also worked at Hogan & Hartson, for two years, starting in 1990, before she joined then President-elect Bill Clinton’s transition team, on her way to securing a position as White House deputy counsel in the Clinton administration. According to documents Hillary Clinton’s first presidential campaign made public in 2008, Hogan & Hartson’s New York-based partner Howard Topaz was the tax lawyer who filed income tax returns for Bill and Hillary Clinton beginning in 2004. In addition, Hogan & Hartson in Virginia filed a patent trademark request on May 19, 2004, for Denver-based MX Logic Inc., the computer software firm that developed the email encryption system used to manage Clinton’s private email server beginning in July 2013. A tech expert has observed that employees of MX Logic could have had access to all the emails that went through her account.
  • In 1999, President Bill Clinton nominated Lynch for the first of her two terms as U.S. attorney for the Eastern District of New York, a position she held until she joined Hogan & Hartson in March 2002 to become a partner in the firm’s Litigation Practice Group. She left Hogan & Hartson in 2010, after being nominated by President Obama for her second term as U.S. attorney for the Eastern District of New York, a position she held until Obama nominated her to serve in her current position as attorney general. A report published April 8, 2008, by The American Lawyer noted Hogan & Hartson was among Hillary Clinton’s biggest financial supporters in the legal industry during her first presidential campaign. “Firm lawyers and staff have donated nearly $123,400 to her campaign so far, according to campaign contribution data from the Center for Responsive Politics,” Nate Raymond observed in The American Lawyer article. “Christine Varney, a partner in Hogan’s Washington, D.C., office, served as chief counsel to the Clinton-Gore Campaign in 1992.” While there is no evidence that Lynch played a direct role either in the tax work done by the firm for the Clintons or in linking Hillary’s private email server to MX Logic, the ethics of the legal profession hold all partners jointly liable for the actions of other partners in a business. “If Hogan and Hartson previously represented the Clintons on tax matters, it is incumbent upon U.S. Attorney General Loretta Lynch to [disclose] what, if any, role she had in such tax matters,” said Tom Fitton, president of Washington-based Judicial Watch.
  • ...4 more annotations...
  • HSBC link When Lynch’s nomination as attorney general was considered by the Senate one year ago, as WND reported, the Senate Judiciary Committee examined her role in the Obama administration’s decision not to prosecute the banking giant HSBC for laundering funds for Mexican drug cartels and Middle Eastern terrorists. WND was first to report in a series of articles beginning in 2012 money-laundering charges brought by John Cruz, a former HSBC vice president and relationship manager, based on his more than 1,000 pages of evidence and secret audio recordings. The staff of the Senate Judiciary Committee focused on Cruz’s allegations that Lynch, acting then in her capacity as the U.S. attorney for the Eastern District of New York, engaged in a Department of Justice cover-up. Obama’s attorney general nominee allowed HSBC in December 2011 to enter into a “deferred prosecution” settlement in which the bank agreed to pay a $1.9 billion fine and admit “willful criminal conduct” in exchange for dropping criminal investigations and prosecutions of HSBC directors or employees. Cruz called the $1.92 billion fine the U.S. government imposed on HSBC “a joke” and filed a $10 million lawsuit for “retaliation and wrongful termination.” From 2002 to 2003, Comey held the position of U.S. Attorney for the Southern District of New York, the same position held by Lynch. On March 4, 2013, he joined the HSBC board of directors, agreeing to serve as an independent non-executive director and a member of the bank’s Financial System Vulnerabilities Committee, positions he held until he resigned on Aug. 3, 2013, to become head of the FBI.
  • Comey, Fitzgerald and Valerie Plame On Jan. 1, 2004, the Washington Post reported that after Attorney General John Aschroft recused himself and his staff from any involvement in the investigation of who leaked the name of CIA employee Valerie Plame after journalist Robert Novak named her in print as a CIA operative, Comey assumed the role of acting attorney general for the purposes of the investigation. Comey appointed Patrick J. Fitzgerald, a U.S. attorney in Chicago, to act as special counsel in conducting the inquiry into what became known as “Plamegate.” At the time Comey made the appointment, Fitzgerald was already godfather to one of Comey’s children. On April 13, 2015, co-authoring a USA Today op-ed piece, Plame and her husband, retired ambassador Joseph Wilson, made public their support for Hillary Clinton’s 2016 presidential campaign, openly acknowledging their political closeness to both Hillary and Bill Clinton. The first two paragraphs of the editorial read: We have known Hillary Clinton both professionally and personally for close to 20 years, dating back to before President Bill Clinton’s first trip to Africa in 1998 — a trip that they both acknowledge changed their lives, and gave considerable meaning to their post-White House years and to the activities of the Clinton Foundation. Joe, serving as the National Security Council Senior Director for African Affairs, was instrumental in arranging that historic visit. Our history became entwined with Hillary further after Valerie’s identity as a CIA officer was deliberately exposed. That criminal act was taken in retribution for Joe’s article in The New York Times in which he explained he had discovered no basis for the Bush administration’s justification for the Iraq War that Saddam Hussein was seeking yellowcake uranium to develop a nuclear weapon.
  • In January 2016, Chuck Ross in the Daily Caller reported that Hillary Clinton emails made public made clear that one of her “most frequent favor-seekers when she was secretary of state was former Ambassador Joseph Wilson, a longtime Clinton friend, an endorser of Clinton’s 2008 presidential campaign, and an Africa expert with deep business ties on the continent.” Ross noted that Wilson emailed Clinton on Dec. 22, 2009, seeking help for Symbion Power, an American engineering contractor for whom Wilson consulted, in the company’s bid to pursue a U.S. Agency of International Development contract for work in Afghanistan. In the case of the Afghanistan project, Ross noted, Clinton vouched for Wilson and Symbion as she forwarded the request to Jack Lew, who served then as deputy secretary of state for management and resources. Ross further reported Wilson’s request might also have been discussed with President Obama, as one email indicates. In 2005, Fitzgerald prosecuted Libby, a prominent adviser to then Vice President Dick Cheney, in the Plame investigation, charging him with two counts of perjury, two counts of making false statements to federal prosecutors and one count of obstruction of justice. On March 6, 2007, Libby was convicted of four of the five counts, and on June 5, 2007, was sentenced by U.S. District Judge Reggie B. Walton to two and a half years in federal prison. On April 6, 2015, the Wall Street Journal reported the publication of New York Times reporter Judith Miller’s memoir “The Story: A Reporter’s Journey” exposed “unscrupulous conduct” by Fitzgerald in the 2007 trial of Libby.
  • WSJ reporter Peter Berkowitz noted Miller “writes that Mr. Fitzgerald induced her to give what she now realizes was false testimony.” “By withholding critical information and manipulating her memory as he prepared her to testify, Ms. Miller relates, Mr. Fitzgerald ‘steered’ her ‘in the wrong direction.’” http://www.wnd.com/2016/07/comey-has-long-history-of-clinton-related-cases/
  •  
    Bend over and grab your ankles. The rats nest of Clinton operatives in Washington DC is far deeper than anyone ever imagined. "FBI Director James Comey has a long history of involvement in Department of Justice actions that arguably ended up favorable to the Clintons. In 2004, Comey, then serving as a deputy attorney general in the Justice Department, apparently limited the scope of the criminal investigation of Sandy Berger, which left out former Clinton administration officials who may have coordinated with Berger in his removal and destruction of classified records from the National Archives. The documents were relevant to accusations that the Clinton administration was negligent in the build-up to the 9/11 terrorist attack. On Tuesday, Comey announced that despite evidence of "extreme negligence by Hillary Clinton and her top aides regarding the handling of classified information through a private email server, the FBI would not refer criminal charges to Attorney General Loretta Lynch and the Justice Department. Curiously, Berger, Lynch and Cheryl Mills all worked as partners in the Washington law firm Hogan & Hartson, which prepared tax returns for the Clintons and did patent work for a software firm that played a role in the private email server Hillary Clinton used when she was secretary of state. Lynch and Comey both served as U.S. attorney for the Southern District of New York. They crossed paths in the investigation of HSBC bank, which avoided criminal charges in a massive money-laundering scandal for which the bank paid a $1.9 billion fine. After Attorney General John Aschroft recused himself in the Valerie Plame affair in 2004, Comey appointed as special counsel Patrick J. Fitzgerald, who ended up convicting "Scooter" Libby, a top aide to then Vice President Dick Cheney, of perjury and obstruction of justice. The charge affirmed the accusations of Plame and her former ambassador husband, Joe Wilson - both partisan supporters of Bill and
  •  
    The "ethical" situation is far worse than described. Attorney disciplinary rules require that a lawyer, including all lawyers in the same firm, owe a lifetime duty of loyalty to a client, a duty that does not end with representation in a particular matter. Accordingly, Lynch had what the disciplinary rules refer to as an "actual conflict of interest" between her duties of loyalty to both Hillary and the U.S. government that required her withdrawal from representing either in the decision whether to prosecute Hillary. Saying that she would rubber stamp what Comey recommended was not the required withdrawal. Comey is an investigator, not a prosecutor. This was a situation for appointment of a special counsel to represent the Department of Justice in the decision whether to prosecute, not satisfied by rubber stamping Comey's recomendation,.
Gary Edwards

Liberty's backlash -- why we should be grateful to Edward Snowden | Fox News - 1 views

  •  
    Liberty's backlash -- why we should be grateful to Edward Snowden By Judge Andrew P. Napolitano Published August 01, 2013 FoxNews.com Last week, Justin Amash, the two-term libertarian Republican congressman from Michigan, joined with John Conyers, the 25-term liberal Democratic congressman from the same state, to offer an amendment to legislation funding the National Security Agency (NSA). If enacted, the Amash-Conyers amendment would have forced the government's domestic spies when seeking search warrants to capture Americans' phone calls, texts and emails first to identify their targets and produce evidence of their terror-related activities before a judge may issue a warrant. The support they garnered had a surprising result that stunned the Washington establishment. It almost passed. The final vote, in which the Amash-Conyers amendment was defeated by 205 to 217, was delayed for a few hours by the House Republican leadership, which opposed the measure. The Republican leadership team, in conjunction with President Obama and House Minority Leader Nancy Pelosi, needed more time for arm-twisting so as to avoid a humiliating loss. But the House rank-and-file did succeed in sending a message to the big-government types in both parties: Nearly half of the House of Representatives has had enough of government spying and then lying about it, and understands that spying on every American simply cannot withstand minimal legal scrutiny or basic constitutional analysis. The president is deeply into this and no doubt wishes he wasn't. He now says he welcomed the debate in the House on whether his spies can have all they want from us or whether they are subject to constitutional requirements for their warrants. Surely he knows that the Supreme Court has ruled consistently since the time of the Civil War that the government is always subject to the Constitution, wherever it goes and whatever it does. As basic as that sounds, it is not a universally held belief am
Gary Edwards

Gun Control: WWJD? | RedState - 0 views

  •  
    Excellent discussion of the 2nd Amendment and the gun control arguments of the socialists.  The article centers on the well trod socialist argument, "What would Jesus do?".  The author, Ben Howe, demolishes this argument and then moves on to the core issue of why the 2nd Amendment is important.  Includes a must see youtube capture of the idiot Piers Morgan interview with Ben Shapiro of Breitbart Magazine.  Awesome job Ben!! Great closing quote: "Without the 2nd Amendment, the Constitution is just a wishlist". excerpt: "As the gun control debate rages in America following the abominable events in Newtown, eventually, perhaps inevitably, the media will ask itself, "What would Jesus do?" They've done it for years as it relates to wealth redistribution and Obamacare. Obama gave an entire speech about taxes in which he used Jesus for his justification. I'd wager that the tactic is designed to hit God fearing southerners where, in keeping with the caricature that the media has created of them, they are most likely to submit without question and accept the answer given to them by their betters. Of course this vastly underestimates the target, but putting that aside, is there any truth to the idea that Jesus would deplore a concealed carry license or a mom defending her children from an intruder? After all, Jesus has some pretty radically pacifist quotes that need only be lifted from the Bible without context to sound convincing. Such has been the case on Twitter where I've already more than once been the victim of "well meaning" gun control advocates who simply want me to be as "peaceful as Jesus." Virtually without fail, they point to Matthew 5:39: But I say to you, do not resist an evil person; but whoever slaps you on your right cheek, turn the other to him also. If anyone wants to sue you and take your shirt, let him have your coat also. Whoever forces you to go one mile, go with him two. Give to him who asks of you, and do not turn away fr
Gary Edwards

Operation Sleeping Giant: "Breaking The Silver Manipulation Barrier" by Brandon Smith - 0 views

  •  
    Written in August of 2011, this article continues to be an important guideline to understanding Gold and Silver prices, and the efforts of Banksters to manipulate these competing forms of monetary exchange to the US Dollar.  Good stuff.  And i did write Brandon a proposal for a mobile application connecting PayPal to the Storage Vault Depositories he sites in this article (based on the GOLD app design i provided to Tino in 2008). excerpt: China Competes With The Comex As of this summer China now has its own Comex, called the Hong Kong Mercantile Exchange. The exchange opened for trade on May 18th (the CME's incredible margin hikes in silver began only weeks before, which suggests to me that they were trying to preempt the positive effects the HKMEX would have on metals). The HKMEX moved into action only five months after the Chinese Pan American Gold Exchange was instituted. The exchange issues its own ETF's in gold and silver. These securities, though, are not based on leverage or derivatives like most Comex based ETFs. The bottom line; the Comex global monopoly on commodities trade is over: How To Break The Barrier Methods for smaller investors to fight back against the market manipulations of large banks have been sparse, and often limited to desperate appeals to the CFTC and the government, who are bought and paid for, and who have no intention of ever stopping global financiers from dragging their unwashed behinds across the face of the planet. Relying on bureaucrats to mend the wounds they themselves encouraged or inflicted is foolhardy, to say the least. Top down solutions are NOT an option now, and I'm not sure if they ever were. This leaves us with only one other choice; to fix the problem with our own hands from the bottom up. This is, of course, easier said than done… In the case of silver manipulation, what we are faced with is an unprecedented effort to subvert and suppress an alternative system so that the mainstream system can continue to
Gary Edwards

Doug Hagmann: The Embassy Threat, Proxy War - America Conservative 2 Conservative - 0 views

  •  
    The real story behind Benghazi, Syria and WWIII. excerpt: "Benghazi exposed .... It was shortly after the September 11, 2012 attack in Benghazi that I wrote in explicit detail the actual reason for that attack. Thanks to a highly placed source in the intelligence venue, readers learned the truth ten months before the corporate media finally acknowledged that the compound in Benghazi was the operations center for a large CIA weapons smugglin... where Libya was being used as a weaponsstorage depot to arm the anti-Assad "rebels." The attack at Benghazi was described by this administration and the Clinton State Department as a spontaneous protest over an internet video, although that narrative was proven to be a lie. It was a lie they continued to stick with to hide the fact that the U.S., in conjunction with other NATO allies, were actually doing the work of Saudi Arabia. But why - who benefits? To understand the answer to that question, we must look at what Saudi Arabia is and how the Saudi royals came to power. Much like the U.S., the nation of Saudi Arabia itself is a captured operation, established by a cabal of globalists for the sake of oil. It would be helpful to understand the role Aramco and other oil interests played in the establishment of the Saudi power structure. As the Obama regime continued forward to advance this Saudi-globalist agenda, Russia's Putin warned the U.S. that the insanity of destabilizing Syria was not in their best interests, and certainly not in ours. When the warnings were not heeded, proxy groups for Russia, Syria and Iran, in the form of Ansar al Sharia and AQIM launched a deadly assault on the CIA operations center in Benghazi. The continued pressure of possibly exposing the true nature of the activities in Benghazi, from the illegal arms trafficking in violation of international law to the attack itself, became a serious annoyance to the globalist planners and the Obama subjects to the Saudi royals. The assistanc
Paul Merrell

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas - The Intercept - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
Paul Merrell

Why Did the Saudi Regime and Other Gulf Tyrannies Donate Millions to the Clinton Foundation? - 0 views

  • As the numerous and obvious ethical conflicts surrounding the Clinton Foundation receive more media scrutiny, the tactic of Clinton-loyal journalists is to highlight the charitable work done by the foundation, and then insinuate — or even outright state — that anyone raising these questions is opposed to its charity. James Carville announced that those who criticize the foundation are “going to hell.” Other Clinton loyalists insinuated that Clinton Foundation critics are indifferent to the lives of HIV-positive babies or are anti-gay bigots. That the Clinton Foundation has done some good work is beyond dispute. But that fact has exactly nothing to do with the profound ethical problems and corruption threats raised by the way its funds have been raised. Hillary Clinton was America’s chief diplomat, and tyrannical regimes such as the Saudis and Qataris jointly donated tens of millions of dollars to an organization run by her family and operated in its name, one whose works has been a prominent feature of her public persona. That extremely valuable opportunity to curry favor with the Clintons, and to secure access to them, continues as she runs for president.
  • The claim that this is all just about trying to help people in need should not even pass a laugh test, let alone rational scrutiny. To see how true that is, just look at who some of the biggest donors are. Although it did not give while she was secretary of state, the Saudi regime by itself has donated between $10 million and $25 million to the Clinton Foundation, with donations coming as late as 2014, as she prepared her presidential run. A group called “Friends of Saudi Arabia,” co-founded “by a Saudi Prince,” gave an additional amount between $1 million and $5 million. The Clinton Foundation says that between $1 million and $5 million was also donated by “the State of Qatar,” the United Arab Emirates, and the government of Brunei. “The State of Kuwait” has donated between $5 million and $10 million. Theoretically, one could say that these regimes — among the most repressive and regressive in the world — are donating because they deeply believe in the charitable work of the Clinton Foundation and want to help those in need. Is there a single person on the planet who actually believes this? Is Clinton loyalty really so strong that people are going to argue with a straight face that the reason the Saudi, Qatari, Kuwaiti and Emirates regimes donated large amounts of money to the Clinton Foundation is because those regimes simply want to help the foundation achieve its magnanimous goals?
  • All those who wish to argue that the Saudis donated millions of dollars to the Clinton Foundation out of a magnanimous desire to aid its charitable causes, please raise your hand. Or take the newfound casting of the Clinton Foundation as a champion of LGBTs, and the smearing of its critics as indifferent to AIDS. Are the Saudis also on board with these benevolent missions? And the Qataris and Kuwaitis?
  • ...4 more annotations...
  • Which is actually more homophobic: questioning the Clinton Foundation’s lucrative relationship to those intensely anti-gay regimes, or cheering and defending that relationship? All the evidence points to the latter. But whatever else is true, it is a blatant insult to everyone’s intelligence to claim that the motive of these regimes in transferring millions to the Clinton Foundation is a selfless desire to help them in their noble work. Another primary project of the Clinton Foundation is the elimination of wealth inequality, which “leads to significant economic disparities, both within and among countries, and prevents underserved populations from realizing their potential.” Who could possibly maintain that the reason the Qatari and Emirates regimes donated millions to the Clinton Foundation was their desire to eliminate such economic oppression?
  • It doesn’t exactly take a jaded disposition to doubt that these donations from some of the world’s most repressive regimes are motivated by a desire to aid the Clinton Foundation’s charitable work. To the contrary, it just requires basic rationality. That’s particularly true given that these regimes “have donated vastly more money to the Clinton Foundation than they have to most other large private charities involved in the kinds of global work championed by the Clinton family.” For some mystifying reason, they seem particularly motivated to transfer millions to the Clinton Foundation but not the other charities around the world doing similar work. Why might that be? What could ever explain it? Some Clinton partisans, unwilling to claim that Gulf tyrants have charity in their hearts when they make these donations to the Clinton Foundation, have settled on a different tactic: grudgingly acknowledging that the motive of these donations is to obtain access and favors, but insisting that no quid pro quo can be proven. In other words, these regimes were tricked: They thought they would get all sorts of favors through these millions in donations, but Hillary Clinton was simply too honest and upstanding of a public servant to fulfill their expectations. The reality is that there is ample evidence uncovered by journalists suggesting that regimes donating money to the Clinton Foundation received special access to and even highly favorable treatment from the Clinton State Department. But it’s also true that nobody can dispositively prove the quid pro quo. Put another way, one cannot prove what was going on inside Hillary Clinton’s head at the time that she gave access to or otherwise acted in the interests of these donor regimes: Was she doing it as a favor in return for those donations, or simply because she has a proven affinity for Gulf State and Arab dictators, or because she was merely continuing decades of U.S. policy of propping up pro-U.S. tyrants in the region?
  • While this “no quid pro quo proof” may be true as far as it goes, it’s extremely ironic that Democrats have embraced it as a defense of Hillary Clinton. After all, this has long been the primary argument of Republicans who oppose campaign finance reform, and indeed, it was the primary argument of the Citizens United majority, once depicted by Democrats as the root of all evil. But now, Democrats have to line up behind a politician who, along with her husband, specializes in uniting political power with vast private wealth, in constantly exploiting the latter to gain the former, and vice versa. So Democrats are forced to jettison all the good-government principles they previously claimed to believe and instead are now advocating the crux of the right-wing case against campaign finance reform: that large donations from vested factions are not inherently corrupting of politics or politicians. Indeed, as I documented in April, Clinton-defending Democrats have now become the most vocal champions of the primary argument used by the Citizens United majority. “We now conclude,” wrote Justice Anthony Kennedy for the Citizens United majority, “that independent expenditures, including those made by corporations, do not give rise to corruption or the appearance of corruption.” That is now exactly the argument Clinton loyalists are spouting to defend the millions in donations from tyrannical regimes (as well as Wall Street banks and hedge funds): Oh, there’s no proof there’s any corruption going on with all of this money. The elusive nature of quid pro quo proof — now the primary Democratic defense of Clinton — has also long been the principal argument wielded by the most effective enemy of campaign finance reform, GOP Sen. Mitch McConnell. This is how USA Today, in 1999, described the arguments of McConnell and his GOP allies when objecting to accusations from campaign finance reform advocates that large financial donations are corrupting:
  • So if you want to defend the millions of dollars that went from tyrannical regimes to the Clinton Foundation as some sort of wily, pragmatic means of doing good work, go right ahead. But stop insulting everyone’s intelligence by pretending that these donations were motivated by noble ends. Beyond that, don’t dare exploit LGBT rights, AIDS, and other causes to smear those who question the propriety of receiving millions of dollars from the world’s most repressive, misogynistic, gay-hating regimes. Most important, accept that your argument in defense of all these tawdry relationships — that big-money donations do not necessarily corrupt the political process or the politicians who are their beneficiaries — has been and continues to be the primary argument used to sabotage campaign finance reform. Given who their candidate is, Democrats really have no choice but to insist that these sorts of financial relationships are entirely proper (needless to say, Goldman Sachs has also donated millions to the Clinton Foundation, but Democrats proved long ago they don’t mind any of that when they even insisted that it was perfectly fine that Goldman Sachs enriched both Clintons personally with numerous huge speaking fees — though Democrats have no trouble understanding why Trump’s large debts to Chinese banks and Goldman Sachs pose obvious problems). But — just as is true of their resurrecting a Cold War template and its smear tactics against their critics — the benefits derived from this tactic should not obscure how toxic it is and how enduring its consequences will likely be.
Paul Merrell

To beat ISIS, kick out US-led coalition | nsnbc international - 0 views

  • It’s been a bad time for foes of ISIS. Islamic State scored a neat hat-trick by invading strategic Ramadi in Iraq’s mainly Sunni Anbar province, occupying Syria’s historic gem Palmyra, and taking over Al-Tanf, the last remaining border crossing with Iraq. The multinational, American-led ‘Coalition’ launched last August to thwart Islamic State’s (IS, formerly ISIS) march across Syria and Iraq…did nothing.
  • The Iraqis have shot back. Key MP Hakim al-Zamili blames Ramadi’s collapse on the US’s failure to provide “good equipment, weapons and aerial support” to troops. Deputy Prime Minister Saleh Mutlaq, himself a Sunni from Anbar Province, concluded that the Americans were coming up short in all areas. “The Coalition airstrikes are not enough to eliminate IS.” Furthermore, the US policy of recruiting Sunni tribes for the fight, he added, was “too late” – it is “important but not enough.” If ever there was an understatement, this is it. Washington’s long-stated objective of rallying together a vetted Sunni fighting force – or its equivalent in the form of a National Guard – has always served as a placeholder to avoid facing realities.
  • One thing we have learned from IS gains in small and large Sunni towns alike, is that the extremist group prides itself on sleeper cells and alliances inside of these areas. Sunni tribes and families, both, are divided on their support of IS. And the militants ensure that everyone else falls in line through a brutal campaign of inflicting fear and pain indiscriminately. So the likelihood of a significant, anti-IS, well-trained and equipped Sunni fighting force emerging anytime soon is just about nil. So too is the idea of a US-led Coalition air force that can cripple Islamic State. Washington has run fewer sorties over Syria and Iraq in the nine months since inception of its air campaign, than Israel ran in its entire three-week Gaza blitz in 2008-09. Where were the American bombers when Ramadi and Palmyra were being taken? And why does the US Air Force only seem to engage in earnest when their Kurdish allies are being threatened – as in Kobani (Ain al-Arab), Syria, and Erbil in Iraq?
  • ...12 more annotations...
  • If actions speak louder than words, then Washington’s moves in the Mideast have been deafening. Forget talk of a ‘unified Iraq’ with a ‘strong central government’. And definitely forget loudly-proclaimed objectives of ‘training moderate forces’ to ‘fight off IS’ across the Jordanian and Turkish borders in Syria. That’s just talk. An objective look at US interests in the region paint an entirely different picture. The Americans seek to maintain absolute hegemony in the Mideast, even as they exit costly military occupations of Iraq and Afghanistan. Their primary interests are 1) access to low cost oil and gas, 2) propping up Israel, and more recently, 3) undermining Russian (and Chinese) influence in the region. Clinging on to hegemony would be a whole lot easier without the presence of a powerful, independent Islamic Republic of Iran, which continues to throw a wrench in many of Washington’s regional projects. So hegemony is somewhat dependent on weakening Iran – and its supportive alliances.
  • But why ignore Sunni groups who are unreservedly opposed to IS? Aren’t they America’s natural constituents inside Iraq? The Takfiri extremist groups serve a purpose for Washington. IS has had the ability – where competing Sunni factions, with their ever-growing lists of demands from Baghdad, have not – to transform the US’ ‘buffer’ project into a physical reality. And Washington has not needed to expend blood, treasure or manpower to get the job done.
  • You only have to look at recent US actions in Iraq to see this unspoken plan in action. Washington’s most intensive airstrikes to date were when Kurdish Erbil and its environs came under threat by ISIS.Washington’s most intensive airstrikes to date were when Kurdish Erbil and its environs came under threat by ISIS. Congress has breached all international norms by ushering through legislation to directly arm Sunni and Kurdish militias and bypass the central government in Baghdad. And despite endless promises and commitments, the Americans have failed at every hurdle to train and equip the Iraqi Army and security forces to do anything useful. A weak, divided Iraq can never become a regional powerhouse allied with Iran and the Resistance Axis. Likewise a weak, divided Syria. But without US control over these central governments, the only way to achieve this is 1) through the creation of sectarian and ethnic strife that could carve out pro-US buffers inside the ‘Resistance states’ and/or 2) through the creation of a hostile ‘Sunni buffer’ to break this line from Iran to Palestine.
  • General Walid Sukariyya, a Sunni, pro-resistance member of Lebanon’s parliament, agrees. “ISIS will be better for the US and Israel than having a strong Iran, Iraq and Syria…If they succeed at this, the Sunni state in Iraq will split the resistance from Palestine.” While Washington has long sought to create a buffer in Iraq on the Syrian border, it has literally spent years trying – and failing – to find, then mold, representative Sunni Iraqi leaders who will comfortably toe a pro-American line. An example of this is the Anbar delegation US General John Allen handpicked last December for a DC tour, which excluded representatives of the two most prominent Sunni tribes fighting IS in Iraq – the Albu Alwan and Albu Nimr. A spokesman for the tribes, speaking to Al-Jarida newspaper, objected at the time: “We are fighting ISIL and getting slaughtered, while suffering from a shortage of weapons. In the meantime, others are going to Washington to get funds and will later be assigned as our leaders.”
  • With the removal of Saddam Hussein in Iraq, the US inadvertently extended Iran’s arc of influence in a direct geographic line to Palestine, leaving the Israeli colonial project vulnerable. Former President George W. Bush immediately took on the task of destroying this Resistance Axis by attempting to neuter Iranian allies Hezbollah, Syria and Hamas – and failed. The Arab Spring presented a fresh opportunity to regroup: the US and its Turkish and Persian Gulf allies swung into action to create conditions for regime-change in Syria. The goal? To break this geographic line from Iran – through Iraq, Syria and Lebanon – to Palestine. When regime-change failed, the goalpost moved to the next best plan: dividing Syria into several competing chunks, which would weaken the central state and create a pro-US ‘buffer’ along the border with Israel. Weakening the central government in Iraq by dividing the state along Kurdish, Sunni and Shiite lines has also been a priority for the Americans.
  • The DIA brief makes clear that the escalation of conflict in Syria will create further sectarianism and radicalization, which will increase the likelihood of an ‘Islamic State’ on the Syrian-Iraqi border, one that would likely be manned by the Islamic State of Iraq (ISI). So what did Washington do when it received this information? It lied. Less than one month after the DIA report was published, US Secretary of State John Kerry told the Senate Foreign Relations Committee this about the Syrian opposition: “I just don’t agree that a majority are Al-Qaeda and the bad guys. That’s not true. There are about 70,000 to 100,000 oppositionists … Maybe 15 percent to 25 percent might be in one group or another who are what we would deem to be bad guys…There is a real moderate opposition that exists.” Using the fabricated storyline of ‘moderate rebels’ who need assistance to fight a ‘criminal Syrian regime’, the US government kept the Syrian conflict buzzing, knowing full well the outcome would mean the establishment of a Sunni extremist entity spanning the Syrian-Iraqi border…which could cripple, what the Americans call, “the strategic depth of the Shia expansion.”As US Council on Foreign Relations member and terrorism analyst Max Abrahms conceded on Twitter: “The August 5, 2012 DIA report confirms much of what Assad has been saying all along about his opponents both inside & outside Syria.”
  • Since last year, numerous Iraqi officials have complained about the US airdropping weapons to IS – whether deliberately or inadvertently remains disputed. Military sources, on the other hand, have made clear that the US-led Coalition ignores many of the Iraqi requests for air cover during ground operations. If the US isn’t willing to play ball in Iraq’s existential fight against IS, then why bother with the Americans at all? Iraqi Prime Minister Haider al-Abadi is viewed as a ‘weak’ head of state – a relatively pro-American official who will work diligently to keep a balance between US interests and those of Iraq’s powerful neighbor, Iran. But after the disastrous fall of Ramadi, and more bad news from inside Syria, Abadi has little choice but to mitigate these losses, and rapidly. The prime minister has now ordered the engagement of thousands of Hashd al-Shaabi (Shiite paramilitary groups, commonly known as the Popular Mobilization Forces) troops in the Anbar to wrest back control of Ramadi. And this – unusually – comes with the blessings of Anbar’s Sunni tribes who voted overwhelmingly to appeal to the Hashd for military assistance.
  • Joining the Hashd are a few thousand Sunni fighters, making this a politically palatable response. If the Ramadi operation goes well, this joint Sunni-Shiite effort (which also proved successful in Tikrit) could provide Iraq with a model to emulate far and wide. The recent losses in Syria and Iraq have galvanized IS’ opponents from Lebanon to Iran to Russia, with commitments pouring in for weapons, manpower and funds. If Ramadi is recovered, this grouping is unlikely to halt its march, and will make a push to the Syrian border through IS-heavy territory. There is good reason for this: the militants who took Ramadi came across the Syrian border – in full sight of US reconnaissance capabilities. A senior resistance state official told me earlier this year: “We will not allow the establishment of a big (extremist) demographic and geographic area between Syria and Iraq. We will work to push Syrian ISIS inside Syria and Iraqi ISIS inside Iraq.”
  • Right now, the key to pushing back Takfiri gains inside Syria’s eastern and northwestern theaters lies in the strengthening of the Iraqi military landscape. And an absolute priority will be in clearing the IS ‘buffer’ between the two states. Eighteen months ago, in an analysis about how to fight jihadist militants from the Levant to the Persian Gulf, I wrote that the solution for this battle will be found only within the region, specifically from within those states whose security is most compromised or under threat: Lebanon, Syria, Iraq and Iran. I argued that these four states would be forced to increase their military cooperation as the battles intensified, and that they would provide the only ‘boots on the ground’ in this fight. And they will. But air cover is a necessary component of successful offensive operations, even in situations of unconventional warfare. If the US and its flimsy Coalition are unable or unwilling to provide the required reconnaissance assistance and the desired aerial coverage, as guided by a central Iraqi military command, then Iraq should look elsewhere for help.
  • Iran and Russia come to mind – and we may yet get there. Iraq and Syria need to merge their military strategies more effectively – again, an area where the Iranians and Russians can provide valuable expertise. Both states have hit a dangerous wall in the past few weeks, and the motivation for immediate and decisive action is high today. Lebanese resistance group Hezbollah is coming into play increasingly as well – its Secretary-General Hassan Nasrallah has recently promised that Hezbollah will no longer limit itself geographically, and will go where necessary to thwart this Takfiri enemy. The non-state actors that make up the jihadist and Takfiri core cannot be beaten by conventional armies, which is why local militias accustomed to asymmetric warfare are best suited for these battles. Criticizing the US’s utterly nonexistent response to the Ramadi debacle yesterday, Iran’s elite Quds Force Commander Qassem Suleimani points out: “Today, there is nobody in confrontation with [IS] except the Islamic Republic of Iran, as well as nations who are next to Iran or supported by Iran.” The Iranians have become central figures in the fight against terror, and are right next door to it – as opposed to Washington, over 6,000 miles away.
  • If the US has any real commitment to the War on Terror, it should focus on non-combat priorities that are also essential to undermine extremism: 1) securing the Turkish and Jordanian borders to prevent any further infiltration of jihadists into Syria and Iraq, 2) sanctioning countries and individuals who fund and weaponize the Takfiris, most of whom are staunch US allies, now ironically part of the ‘Coalition’ to fight IS, and 3) sharing critical intelligence about jihadist movements with those countries engaged in the battle. It is time to cut these losses and bring some heavyweights into this battle against extremism. If the US-directed Coalition will not deliver airstrikes under the explicit command of sovereign states engaged at great risk in this fight, it may be time to clear Iraqi and Syrian airspace of coalition jets, and fill those skies with committed partners instead.
  • Related documentation: DIA Doc Syria and Iraq:_ Pg.-291-Pgs.-287-293-JW-v-DOD-and-State-14-812-DOD-Release-2015-04-10-final-version11.
  •  
    Woh! Things definitely coming to an inflexion point in Syria and Iraq. This is a reprint from RT.com, the Russian video and web page news service. The hint of direct and overt military action by Russia and Iran should not be ignored. The U.S. is sandbagging for ISIL and al Nusiryah. 
Paul Merrell

Fellow soldiers call Bowe Bergdahl a deserter, not a hero - CNN.com - 0 views

  • The sense of pride expressed by officials of the Obama administration at the release of Army Sgt. Bowe Bergdahl is not shared by many of those who served with him: veterans and soldiers who call him a deserter whose "selfish act" ended up costing the lives of better men.
  •  
    I've been disgusted with American mainstream media and our political class for a very long time. Every now and then I get super-disgusted.  I'll begin with the Obama Administration. They tried to make political hay with something that should not have been made public other than notifying the released American prisoners' parents before the prisoner had been debriefed. Moreover, while I have no problems with swapping Taliban prisoners to get the American prisoner back even if it meant not giving Congress the full 30-day notice required by statute, the Administration certainly could have done a better job of it, notifying key committee members earlier that the deal might be pulled off. Waiting until the Taliban prisoners were up to the steps of the airplane bound for the exchange was not the way this should have happened. Next up, we have the members of Congress who have done their level best to turn the situation into a partisan issue. Obama may have deserved criticism given that he tried to make political hay with the release. But prisoner swaps during wartime have been a feature of most U.S. wars. It is an ancient custom of war and procedures for doing so are even enshrined in the Geneva Conventions governing warfare. So far, I have not heard any war veteran member of Congress scream about releasing terrorists. During my 2+ years in a Viet Nam combat role, the thought of being captured was horrifying. Pilots shot down over North Viet Nam were the lucky ones. No American soldier captured in South Viet Nam was ever released. The enemy was fighting a guerrilla war in the South. They had no means to confine and care for prisoners. So captured American troops were questioned for intelligence and then killed.  Truth be told, American combat troops were prone to killing enemy who surrendered. War is a very ugly situation and feelings run high. It is perhaps a testament to the Taliban that they kept Sgt. Berdahl alive. Certainly that fact clashes irreconcilably with
Paul Merrell

The Latest Rules on How Long NSA Can Keep Americans' Encrypted Data Look Too Familiar | Just Security - 0 views

  • Does the National Security Agency (NSA) have the authority to collect and keep all encrypted Internet traffic for as long as is necessary to decrypt that traffic? That was a question first raised in June 2013, after the minimization procedures governing telephone and Internet records collected under Section 702 of the Foreign Intelligence Surveillance Act were disclosed by Edward Snowden. The issue quickly receded into the background, however, as the world struggled to keep up with the deluge of surveillance disclosures. The Intelligence Authorization Act of 2015, which passed Congress this last December, should bring the question back to the fore. It established retention guidelines for communications collected under Executive Order 12333 and included an exception that allows NSA to keep ‘incidentally’ collected encrypted communications for an indefinite period of time. This creates a massive loophole in the guidelines. NSA’s retention of encrypted communications deserves further consideration today, now that these retention guidelines have been written into law. It has become increasingly clear over the last year that surveillance reform will be driven by technological change—specifically by the growing use of encryption technologies. Therefore, any legislation touching on encryption should receive close scrutiny.
  • Section 309 of the intel authorization bill describes “procedures for the retention of incidentally acquired communications.” It establishes retention guidelines for surveillance programs that are “reasonably anticipated to result in the acquisition of [telephone or electronic communications] to or from a United States person.” Communications to or from a United States person are ‘incidentally’ collected because the U.S. person is not the actual target of the collection. Section 309 states that these incidentally collected communications must be deleted after five years unless they meet a number of exceptions. One of these exceptions is that “the communication is enciphered or reasonably believed to have a secret meaning.” This exception appears to be directly lifted from NSA’s minimization procedures for data collected under Section 702 of FISA, which were declassified in 2013. 
  • While Section 309 specifically applies to collection taking place under E.O. 12333, not FISA, several of the exceptions described in Section 309 closely match exceptions in the FISA minimization procedures. That includes the exception for “enciphered” communications. Those minimization procedures almost certainly served as a model for these retention guidelines and will likely shape how this new language is interpreted by the Executive Branch. Section 309 also asks the heads of each relevant member of the intelligence community to develop procedures to ensure compliance with new retention requirements. I expect those procedures to look a lot like the FISA minimization guidelines.
  • ...6 more annotations...
  • This language is broad, circular, and technically incoherent, so it takes some effort to parse appropriately. When the minimization procedures were disclosed in 2013, this language was interpreted by outside commentators to mean that NSA may keep all encrypted data that has been incidentally collected under Section 702 for at least as long as is necessary to decrypt that data. Is this the correct interpretation? I think so. It is important to realize that the language above isn’t just broad. It seems purposefully broad. The part regarding relevance seems to mirror the rationale NSA has used to justify its bulk phone records collection program. Under that program, all phone records were relevant because some of those records could be valuable to terrorism investigations and (allegedly) it isn’t possible to collect only those valuable records. This is the “to find a needle a haystack, you first have to have the haystack” argument. The same argument could be applied to encrypted data and might be at play here.
  • This exception doesn’t just apply to encrypted data that might be relevant to a current foreign intelligence investigation. It also applies to cases in which the encrypted data is likely to become relevant to a future intelligence requirement. This is some remarkably generous language. It seems one could justify keeping any type of encrypted data under this exception. Upon close reading, it is difficult to avoid the conclusion that these procedures were written carefully to allow NSA to collect and keep a broad category of encrypted data under the rationale that this data might contain the communications of NSA targets and that it might be decrypted in the future. If NSA isn’t doing this today, then whoever wrote these minimization procedures wanted to at least ensure that NSA has the authority to do this tomorrow.
  • There are a few additional observations that are worth making regarding these nominally new retention guidelines and Section 702 collection. First, the concept of incidental collection as it has typically been used makes very little sense when applied to encrypted data. The way that NSA’s Section 702 upstream “about” collection is understood to work is that technology installed on the network does some sort of pattern match on Internet traffic; say that an NSA target uses example@gmail.com to communicate. NSA would then search content of emails for references to example@gmail.com. This could notionally result in a lot of incidental collection of U.S. persons’ communications whenever the email that references example@gmail.com is somehow mixed together with emails that have nothing to do with the target. This type of incidental collection isn’t possible when the data is encrypted because it won’t be possible to search and find example@gmail.com in the body of an email. Instead, example@gmail.com will have been turned into some alternative, indecipherable string of bits on the network. Incidental collection shouldn’t occur because the pattern match can’t occur in the first place. This demonstrates that, when communications are encrypted, it will be much harder for NSA to search Internet traffic for a unique ID associated with a specific target.
  • This lends further credence to the conclusion above: rather than doing targeted collection against specific individuals, NSA is collecting, or plans to collect, a broad class of data that is encrypted. For example, NSA might collect all PGP encrypted emails or all Tor traffic. In those cases, NSA could search Internet traffic for patterns associated with specific types of communications, rather than specific individuals’ communications. This would technically meet the definition of incidental collection because such activity would result in the collection of communications of U.S. persons who aren’t the actual targets of surveillance. Collection of all Tor traffic would entail a lot of this “incidental” collection because the communications of NSA targets would be mixed with the communications of a large number of non-target U.S. persons. However, this “incidental” collection is inconsistent with how the term is typically used, which is to refer to over-collection resulting from targeted surveillance programs. If NSA were collecting all Tor traffic, that activity wouldn’t actually be targeted, and so any resulting over-collection wouldn’t actually be incidental. Moreover, greater use of encryption by the general public would result in an ever-growing amount of this type of incidental collection.
  • This type of collection would also be inconsistent with representations of Section 702 upstream collection that have been made to the public and to Congress. Intelligence officials have repeatedly suggested that search terms used as part of this program have a high degree of specificity. They have also argued that the program is an example of targeted rather than bulk collection. ODNI General Counsel Robert Litt, in a March 2014 meeting before the Privacy and Civil Liberties Oversight Board, stated that “there is either a misconception or a mischaracterization commonly repeated that Section 702 is a form of bulk collection. It is not bulk collection. It is targeted collection based on selectors such as telephone numbers or email addresses where there’s reason to believe that the selector is relevant to a foreign intelligence purpose.” The collection of Internet traffic based on patterns associated with types of communications would be bulk collection; more akin to NSA’s collection of phone records en mass than it is to targeted collection focused on specific individuals. Moreover, this type of collection would certainly fall within the definition of bulk collection provided just last week by the National Academy of Sciences: “collection in which a significant portion of the retained data pertains to identifiers that are not targets at the time of collection.”
  • The Section 702 minimization procedures, which will serve as a template for any new retention guidelines established for E.O. 12333 collection, create a large loophole for encrypted communications. With everything from email to Internet browsing to real-time communications moving to encrypted formats, an ever-growing amount of Internet traffic will fall within this loophole.
  •  
    Tucked into a budget authorization act in December without press notice. Section 309 (the Act is linked from the article) appears to be very broad authority for the NSA to intercept any form of telephone or other electronic information in bulk. There are far more exceptions from the five-year retention limitation than the encrypted information exception. When reading this, keep in mind that the U.S. intelligence community plays semantic games to obfuscate what it does. One of its word plays is that communications are not "collected" until an analyst looks at or listens to partiuclar data, even though the data will be searched to find information countless times before it becomes "collected." That searching was the major basis for a decision by the U.S. District Court in Washington, D.C. that bulk collection of telephone communications was unconstitutional: Under the Fourth Amendment, a "search" or "seizure" requiring a judicial warrant occurs no later than when the information is intercepted. That case is on appeal, has been briefed and argued, and a decision could come any time now. Similar cases are pending in two other courts of appeals. Also, an important definition from the new Intelligence Authorization Act: "(a) DEFINITIONS.-In this section: (1) COVERED COMMUNICATION.-The term ''covered communication'' means any nonpublic telephone or electronic communication acquired without the consent of a person who is a party to the communication, including communications in electronic storage."       
Gary Edwards

The Daily Bell - America's Coming Crackup - 0 views

  • Our government bankers print money today like loons in an asylum spew absurdity. Glib media shills lure us every night into a disgraceful indolence. And our corporations lust like spoiled children after mega-billions of illicit lucre. Cataclysm is coming. No one with a minimal awareness of history, politics and proper economics today has faith that our society can continue much longer at its present level of government privilege and debt accumulation. There is a Grand Piper that must be paid, and he will manifest in any number of scenarios, none of which will be pleasant. One thing is for sure: The next two decades are going to be tumultuous and tragic. The events that unfold will be far more radical than we dare envision today. Paradigms in banking, politics and philosophy will be overturned. Wrenching lifestyle shifts will be forced upon millions. Something akin to what happened in the Soviet Union after the fall of communism in 1991 will take place in America. Our ruling regime will collapse and bring Russian-style economic hardship to us all. How exactly things unfold will depend upon whether the nation's intelligentsia bring themselves to seriously question the shams of statism, or whether the government-media-academy triad is able to continue bamboozling them. What is extremely unnerving is that whoever wins this battle to control the destiny of our country will determine the fate of freedom on the planet for hundreds, perhaps thousands of years. A monumental clash of ideology and propriety looms up ahead.
  • Why We Are Disintegrating as a Society
  • America's dilemma is this: We are being propelled toward an Orwellian style despotism that's purpose is to centralize government power in Washington, phase out American sovereignty and move our country as much as possible into subordination to the United Nations and eventually alignment with Canada, Mexico and Central America into a regional government. The world is moving toward the nightmare of Oceana, Eurasia and East Asia in Orwell's Nineteen Eighty-Four, which will extinguish freedom and merge mankind into a tyrannical egalitarianism. Why is this happening? Such is the influential force of ideology. We are being destroyed because of what historian Clarence Carson called a "collectivist curvature of the mind" that took over our intellectuals back in the early twentieth century. This curvature of the mind functions as the grand fueling mechanism for the goals of government centralization and ending our national sovereignty. It's horrifying, but every year our schools form the "best and the brightest minds" into collectivist apparatchiks to go out in the world and work their way into the power centers of society. The schools do this via false teachings in philosophy, economics, political science and history. This "ideological indoctrination" teaches every new generation that capitalism is an evil, exploitative, racist, warmongering system and must be phased out of modern societies. It teaches that national sovereignty is anachronistic and must be given up. Such indoctrination is being done very subtly and sophisticatedly, but it is a powerful, pervasive theme instilled into all our children from the first grade on.
  • ...15 more annotations...
  • This is why we have so many bankers, corporate moguls, political statesmen, authors, pundits, artists, publishers and priests working today to undercut the country. Being "the best and the brightest," they were taught in their youth that capitalist America is an evil nation. They, thus, have gone out and risen to positions of power with a globalist worldview that believes economic freedom can't work in the modern day, that American sovereignty is an anachronism belonging to the nineteenth century. Since they are the nation's intelligentsia, they are immensely influential. Their socialist-collectivist worldview is spread to the masses which then elect legislators sympathetic to such irrationality to Congress and the White House.
  • Every one of us has to choose whether we will try to make a difference or give in to indifference. Will we fight to inform our neighbors or succumb to the easy road of apathy? Will we opt for principle or popularity? Will we succumb to the statist thugs on the far left, or fall for the anarchic screwballs on the far right? The "mean" of constitutional sanity beckons to the percipient among us. Will it survive the tumult ahead?
  • All quite clear and horrifying. But how are we, as mere laymen with no access to national media or huge fortunes, to confront this destruction of freedom and sanity in America and throughout the West?
  • We must take a page from the story of the old man and the starfish. After a huge storm had brought a mini-tidal wave to his beach community one night, there were tens of thousands of starfish washed up on the shore that next morning. Amidst the masses of starfish the old man could be seen patiently picking them up and tossing them back into the sea. Along came a young lad in his twenties with green hair, eyebrow rings and a scornful face. He started laughing and mocked the old man with cynical derision. "You have to be crazy, old timer. You can't possibly save those starfish; there's thousands of them. You're wasting your time, you fool. YOU CAN'T MAKE A DIFFERENCE!" The old man looked up at the insolent youth and smiled. He then reached down and picked up one of the struggling starfish and winged it far out into the water, replying to his tormentor, "Made a difference with that one, didn't I?"
  • Making a Difference
  • A Diplomatic Nuisance
  • Not everyone, naturally, has the time and mental wherewithal to forcefully fight the "ideological indoctrination" destroying our country today. But many of us do. Our power lies in our minds and the strength of our personalities. We who possess this inner strength feel compelled to spread the word in any way we can for as long as we live. We feel compelled to wing as many starfish back to life as we can. The apathetic and cynical will scorn all this as senseless, just as the green-haired youth did. They will choose to remain wards of the state and sanction their enslavers. This has always been the nature of most humans. When such wards see others fighting valiantly against seemingly insurmountable odds for the freedom they have scorned, they are subconsciously humiliated because they are not deep in the thick of the fight themselves. They have chosen to avoid the fight and sanction the tyrants who are destroying our way of life. Thus, they must find a way to salve their consciences. That way is to caustically mock the Davids who go up against the Goliaths, to smear the Rolands of Roncesvalles that history hands down to us as heroic exemplars.
  • You the reader have a paramount decision to make regarding all this. It is High Noon for the cause of freedom. Will you fight with the heroic exemplars? If you choose to fight, then your first necessity is to become aware of WHAT is happening and WHY it is happening. That awareness can only be found via fervent curiosity and a commitment to the study of libertarian and conservative literature.
  • Your second duty is to emulate Paul Revere and warn all those in your sphere of influence. You do this by making a diplomatic nuisance of yourself, by pleasantly pestering your comrades to wake up to the elite's usurpations growing by leaps and bounds in our lives. You do it by convincing them that there are grander values in life than shiny new SUVs and country club memberships. There is something called the American way of life that requires personal independence.
  • Time is short. Collectivism steals over us like crack cocaine filters into a ghetto. It devastates everything of worth in its path. All the stoic traditions of strength, all the great lessons of logic, all the revered truths of Nature that have been handed down to us throughout the centuries are being assailed. The weasel-tyrants and their unctuous lackeys have gained control of the intellectual, political and banking power centers of our country, but they can't control the ultimate factor – the truth – because they can't control our minds unless we let them. They can't prohibit defiance. Solzhenitsyn showed us this. They can't extend their enslavement UNLESS WE SANCTION IT!
  • What the elites fear is a populace with the strength of William Wallace fighting King Edward at Sterling Bridge in 1297, the daring of Washington's band crossing the Delaware in the dead of winter. They fear those willing to fight for the original America. Up against such heady citizens, our collectivist tyrants will scatter like feeding jackals in face of approaching hunters. Our job is to build an army of such heady citizens. You can help by joining the cause. Read the books of freedom and sound money, and pass them on as the early Americans did with Common Sense. Bring people to the website where you are reading this essay. Bring them to AFR's website. Bring them to a state of urgency. Bring them to the truth of our Constitution and to the laws of Nature and Nature's God. Nothing other than this kind of effort will suffice. You cannot help truth and freedom by watching moronic TV shows at night. That is how the elites control you. They flood the airwaves with mindless entertainment. It's today's version of Brave New World's "soma for the masses." Today's TV is for zombies and dullards. The same applies to our movies. Next time you're in the theater, look around you at all the hoi polloi stuffing their faces with popcorn and their psyches with over-the top-violence and trashy sex.
  • Aldous Huxley was the first to point out that modern totalitarian regimes leave the "activities of sex" alone, but regiment the "activities of production." This allows those who are servile to think they are still free as they vote away their REAL freedom – their freedom to acquire and keep wealth, to associate with whom they please, to speak and worship as they please. Look around you. There are far more servile people in this human race than there are independent people. This is the reason why dictatorships dominate the history of man; the majority of humans want to be ruled. They want to relinquish their meaningful freedom; it requires too much self-assurance and grit.
  • Logic and History
  • The cause of America is the cause of REAL freedom. It won't be found with the malefic forces of statism on the left, nor with the eccentric cults of anarchism on the right. Both are living death, a fool's game for those devoid of the capacity to see the big picture, i.e., to see that the spectrum of reality is not two-poled, but three-poled with multifarious gradations and a golden mean of truth in between. The nature of human existence is complexity, wrapped up in mystery, contained in inconceivability, subsumed under the power of Truth. We will never create a free society by denying this and ignoring the results of logic and the record of history. This is what statists and anarchists do. REAL freedom is impossible without a grasp of logic and a deep knowledge of history, which teach us that the cornerstones of freedom are equal rights, strictly limited government, gold money and self-reliant people. The statists violate logic and ignore history because they are callous brutes who place power above all and simply don't care. The anarchists violate logic and ignore history because logic and history show their political system to be unworkable.
  • The truths we learn from logic and history are the disinfectants we must hurl into Washington's swamp of political leeches that are sucking all verity from our lives. When the Washington leeches have so stultified our nation that ghastly ruin prevails throughout, then is when the crackup will commence. All readers should take note. A meltdown is coming; a revolution will follow. We must make sure this revolution goes in the direction of the Founding Fathers, not in the direction of the statist left, nor in the direction of the anarchistic right. Statism and anarchism are like the AIDS virus; they will always be deadly to life. It is to Aristotle, Locke and Jefferson that we must turn. They will always be sustaining to life.
  •  
    Wow, if this article isn't a MUST READ, then nothing is. Spot on call-to-arms. "Nelson Hultberg is a freelance scholar/writer in Dallas, Texas and the Director of Americans for a Free Republic. Nelson's articles have appeared in such publications as American Conservative, Insight, Liberty, The Freeman and The Dallas Morning News, as well as on numerous Internet sites. He is the author of The Golden Mean: Libertarian Politics, Conservative Values. Email: NelsHultberg (at) aol.com."
Gary Edwards

Ukraine's Oligarchs Turn on Each Other | Consortiumnews - 0 views

  • n the never-never land of how the mainstream U.S. press covers the Ukraine crisis, the appointment last year of thuggish oligarch Igor Kolomoisky to govern one of the country’s eastern provinces was pitched as a democratic “reform” because he was supposedly too rich to bribe, without noting that his wealth had come from plundering the country’s economy.In other words, the new U.S.-backed “democratic” regime, after overthrowing democratically elected President Viktor Yanukovych because he was “corrupt,” was rewarding one of Ukraine’s top thieves by letting him lord over his own province, Dnipropetrovsk Oblast, with the help of his personal army.
  • Last year, Kolomoisky’s brutal militias, which include neo-Nazi brigades, were praised for their fierce fighting against ethnic Russians from the east who were resisting the removal of their president. But now Kolomoisky, whose financial empire is crumbling as Ukraine’s economy founders, has turned his hired guns against the Ukrainian government led by another oligarch, President Petro Poroshenko.Last Thursday night, Kolomoisky and his armed men went to Kiev after the government tried to wrest control of the state-owned energy company UkrTransNafta from one of his associates. Kolomoisky and his men raided the company offices to seize and apparently destroy records. As he left the building, he cursed out journalists who had arrived to ask what was going on. He ranted about “Russian saboteurs.”It was a revealing display of how the corrupt Ukrainian political-economic system works and the nature of the “reformers” whom the U.S. State Department has pushed into positions of power. According to BusinessInsider, the Kiev government tried to smooth Kolomoisky’s ruffled feathers by announcing “that the new company chairman [at UkrTransNafta] would not be carrying out any investigations of its finances.”
  • Yet, it remained unclear whether Kolomoisky would be satisfied with what amounts to an offer to let any past thievery go unpunished. But if this promised amnesty wasn’t enough, Kolomoisky appeared ready to use his private army to discourage any accountability.On Monday, Valentyn Nalyvaychenko, chief of the State Security Service, accused Dnipropetrovsk officials of financing armed gangs and threatening investigators, Bloomberg News reported, while noting that Ukraine has sunk to 142nd place out of 175 countries in Transparency International’s Corruptions Perception Index, the worst in Europe.The see-no-evil approach to how the current Ukrainian authorities do business relates as well to Ukraine’s new Finance Minister Natalie Jaresko, who appears to have enriched herself at the expense of a $150 million U.S.-taxpayer-financed investment fund for Ukraine.
  • ...4 more annotations...
  • Regarding Kolomoisky’s claim about “Russian saboteurs,” the government said that was not the case, explaining that the clash resulted from the parliament’s vote last week to reduce Kolomoisky’s authority to run the company from his position as a minority owner. As part of the shakeup, Kolomoisky’s protégé Oleksandr Lazorko was fired as chairman, but he refused to leave and barricaded himself in his office, setting the stage for Kolomoisky’s arrival with armed men.On Tuesday, the New York Times reported on the dispute but also flashed back to its earlier propagandistic praise of the 52-year-old oligarch, recalling that “Mr. Kolomoisky was one of several oligarchs, considered too rich to bribe, who were appointed to leadership positions in a bid to stabilize Ukraine.”Kolomoisky also is believed to have purchased influence inside the U.S. government through his behind-the-scenes manipulation of Ukraine’s largest private gas firm, Burisma Holdings. Last year, the shadowy Cyprus-based company appointed Vice President Joe Biden’s son, Hunter Biden, to its board of directors. Burisma also lined up well-connected lobbyists, some with ties to Secretary of State John Kerry, including Kerry’s former Senate chief of staff David Leiter, according to lobbying disclosures.
  • Jaresko, a former U.S. diplomat who received overnight Ukrainian citizenship in December to become Finance Minister, had been in charge of the Western NIS Enterprise Fund (WNISEF), which became the center of insider-dealing and conflicts of interest, although the U.S. Agency for International Development showed little desire to examine the ethical problems – even after Jaresko’s ex-husband tried to blow the whistle. [See Consortiumnews.com’s “Ukraine Finance Minister’s American ‘Values.’”]Passing Out the BillionsJaresko will be in charge of dispensing the $17.5 billion that the International Monetary Fund is allocating to Ukraine, along with billions of dollars more expected from U.S. and European governments.
  • As Time magazine reported, “Leiter’s involvement in the firm rounds out a power-packed team of politically-connected Americans that also includes a second new board member, Devon Archer, a Democratic bundler and former adviser to John Kerry’s 2004 presidential campaign. Both Archer and Hunter Biden have worked as business partners with Kerry’s son-in-law, Christopher Heinz, the founding partner of Rosemont Capital, a private-equity company.”According to investigative journalism in Ukraine, the ownership of Burisma has been traced to Privat Bank, which is controlled by Kolomoisky.So, it appears that Ukraine’s oligarchs who continue to wield enormous power inside the corrupt country are now circling each other over what’s left of the economic spoils and positioning themselves for a share of the international bailouts to come.
  • As for “democratic reform,” only in the upside-down world of the State Department’s Orwellian “information war” against Russia over Ukraine would imposing a corrupt and brutal oligarch like Kolomoisky as the unelected governor of a defenseless population be considered a positive.(Early Wednesday morning, President Poroshenko dismissed Kolomoisky from his post as Dnipropetrovsk regional governor.)
  •  
    Another of the greatest U.S. exports: corruption.
  •  
    Corporate oligarchs leading private but well armed armies in raids against the Ukrainian government holdings - controlled by other corporate oligarchs? This article dives into the mess that the USA and European NATO allies have stirred in the Ukraine, and through this lens we get to see what the world will look like when corporate oligarchs and their Bankster masters rule the world. The article is revealing, but it fails to connect the corporatist to the Banks that are sending in billions of dollars. The connection instead is made to the democratic governments intent on pushing the world into world war 3. Nor is there much mention of the oil and natural gas pipeline and supply geographics that dominate battlefields from the Ukraine, to Syria, Iraq and Lybia. The New World Order needs a third World War if it's to truly overturn the fragile post World War II economic order loosely based on free market capitalism, individual liberty and democratic governance. The end of national sovereignty, religious and cultural identities has one more hurdle. And there is no doubt in my mind that the elites are ready to jump that hurdle. World War III has spread from the middle east to middle Europe. Best we all hold on. .................. "Exclusive: Ukraine's post-coup regime is facing what looks like a falling-out among thieves as oligarch-warlord Igor Kolomoisky, who was given his own province to rule, brought his armed men to Kiev to fight for control of the state-owned energy company, further complicating the State Department's propaganda efforts, reports Robert Parry. In the never-never land of how the mainstream U.S. press covers the Ukraine crisis, the appointment last year of thuggish oligarch Igor Kolomoisky to govern one of the country's eastern provinces was pitched as a democratic "reform" because he was supposedly too rich to bribe, without noting that his wealth had come from plundering the country's economy. In other words, the new U.S.-b
Paul Merrell

Reported US-Syrian Accord on Air Strikes | Consortiumnews - 1 views

  • Exclusive: A problem with President Obama’s plan to expand the war against ISIS into Syria was always the risk that Syrian air defenses might fire on U.S. warplanes, but now a source says Syria’s President Assad has quietly agreed to permit strikes in some parts of Syria, reports Robert Parry.
  • The Obama administration, working through the Russian government, has secured an agreement from the Syrian regime of Bashar al-Assad to permit U.S. airstrikes against Islamic State targets in parts of Syria, according to a source briefed on the secret arrangements. The reported agreement would clear away one of the chief obstacles to President Barack Obama’s plan to authorize U.S. warplanes to cross into Syria to attack Islamic State forces – the concern that entering Syrian territory might prompt anti-aircraft fire from the Syrian government’s missile batteries.
  • In essence, that appears to be what is happening behind the scenes in Syria despite the hostility between the Obama administration and the Assad government. Obama has called for the removal of Assad but the two leaders find themselves on the same side in the fight against the Islamic State terrorists who have battled Assad’s forces while also attacking the U.S.-supported Iraqi government and beheading two American journalists.
  • ...13 more annotations...
  • The usual protocol for the U.S. military – when operating in territory without a government’s permission – is to destroy the air defenses prior to conducting airstrikes so as to protect American pilots and aircraft, as was done with Libya in 2011. However, in other cases, U.S. intelligence agencies have arranged for secret permission from governments for such attacks, creating a public ambiguity usually for the benefit of the foreign leaders while gaining the necessary U.S. military assurances.
  • Just last month, Obama himself termed the strategy of arming supposedly “moderate” Syrian rebels “a fantasy.” He told the New York Times’ Thomas L. Friedman: “This idea that we could provide some light arms or even more sophisticated arms to what was essentially an opposition made up of former doctors, farmers, pharmacists and so forth, and that they were going to be able to battle not only a well-armed state but also a well-armed state backed by Russia, backed by Iran, a battle-hardened Hezbollah, that was never in the cards.” Obama’s point would seem to apply at least as much to having the “moderate” rebels face down the ruthless Islamic State jihadists who engage in suicide bombings and slaughter their captives without mercy. But this “fantasy” of the “moderate” rebels has a big following in Congress and on the major U.S. op-ed pages, so Obama has included the $500 million in his war plan despite the risk it poses to Assad’s acquiescence to American air attacks.
  • In a national address last week, Obama vowed to order U.S. air attacks across Syria’s border without any coordination with the Syrian government, a proposition that Damascus denounced as a violation of its sovereignty. So, in this case, Syria’s behind-the-scenes acquiescence also might provide some politically useful ambiguity for Obama as well as Assad. Yet, this secret collaboration may go even further and include Syrian government assistance in the targeting of the U.S. attacks, according to the source who spoke on condition of anonymity. That is another feature of U.S. military protocol in conducting air strikes – to have some on-the-ground help in pinpointing the attacks. As part of its public pronouncements about the future Syrian attacks, the Obama administration sought $500 million to train “vetted” Syrian rebels to handle the targeting tasks inside Syria as well as to carry out military ground attacks. But that approach – while popular on Capitol Hill – could delay any U.S. airstrikes into Syria for months and could possibly negate Assad’s quiet acceptance of the U.S. attacks, since the U.S.-backed rebels share one key goal of the Islamic State, the overthrow of Assad’s relatively secular regime.
  • Without Assad’s consent, the U.S. airstrikes might require a much wider U.S. bombing campaign to first target Syrian government defenses, a development long sought by Official Washington’s influential neoconservatives who have kept “regime change” in Syria near the top of their international wish list. For the past several years, the Israeli government also has sought the overthrow of Assad, even at the risk of Islamic extremists gaining power. The Israeli thinking had been that Assad, as an ally of Iran, represented a greater threat to Israel because his government was at the center of the so-called Shiite crescent reaching from Tehran through Damascus to Beirut and southern Lebanon, the base for Hezbollah.
  • The thinking was that if Assad’s government could be pulled down, Iran and Hezbollah – two of Israel’s principal “enemies” – would be badly damaged. A year ago, then-Israeli Ambassador to the United States Michael Oren articulated this geopolitical position in an interview with the Jerusalem Post. “The greatest danger to Israel is by the strategic arc that extends from Tehran, to Damascus to Beirut. And we saw the Assad regime as the keystone in that arc,” Oren said. “We always wanted Bashar Assad to go, we always preferred the bad guys who weren’t backed by Iran to the bad guys who were backed by Iran.” He said this was the case even if the other “bad guys” were affiliated with al-Qaeda. More recently, however, with the al-Qaeda-connected Nusra Front having seized Syrian territory adjacent to the Israeli-occupied Golan Heights – forcing the withdrawal of UN peacekeepers – the balance of Israeli interests may be tipping in favor of preferring Assad to having Islamic extremists possibly penetrating directly into Israeli territory.
  • In the longer term, by working together to create political solutions to various Mideast crises, the Obama-Putin cooperation threatened to destroy the neocons’ preferred strategy of escalating U.S. military involvement in the region. There was the prospect, too, that the U.S.-Russian tag team might strong-arm Israel into a peace agreement with the Palestinians. So, starting last September – almost immediately after Putin helped avert a U.S. air war against Syria – key neocons began taking aim at Ukraine as a potential sore point for Putin. A leading neocon, Carl Gershman, president of the U.S.-government-funded National Endowment for Democracy, took to the op-ed pages of the neocon Washington Post to identify Ukraine as “the biggest prize” and explaining how its targeting could undermine Putin’s political standing inside Russia. “Ukraine’s choice to join Europe will accelerate the demise of the ideology of Russian imperialism that Putin represents,” Gershman wrote. “Russians, too, face a choice, and Putin may find himself on the losing end not just in the near abroad but within Russia itself.” At the time, Gershman’s NED was funding scores of political and media projects inside Ukraine.
  • The Russian Hand Besides the tactical significance of U.S. intelligence agencies arranging Assad’s tacit acceptance of U.S. airstrikes over Syrian territory, the reported arrangement is also significant because of the role of Russian intelligence serving as the intermediary. That suggests that despite the U.S.-Russian estrangement over the Ukraine crisis, the cooperation between President Obama and Russian President Vladimir Putin has not been extinguished; it has instead just gone further underground. Last year, this growing behind-the-scenes collaboration between Obama and Putin represented a potential tectonic geopolitical shift in the Middle East. In the short term, their teamwork produced agreements that averted a U.S. military strike against Syria last September (by getting Assad to surrender his chemical weapons arsenal) and struck a tentative deal with Iran to constrain but not eliminate its nuclear program.
  • Direct attacks on Israel would be a temptation to al-Nusra Front, which is competing for the allegiance of young jihadists with the Islamic State. While the Islamic State, known by the acronyms ISIS or ISIL, has captured the imaginations of many youthful extremists by declaring the creation of a “caliphate” with the goal of driving Western interests from the Middle East, al-Nusra could trump that appeal by actually going on the offensive against one of the jihadists’ principal targets, Israel. Yet, despite Israel’s apparent rethinking of its priorities, America’s neocons appear focused still on their long-held strategy of using violent “regime change” in the Middle East to eliminate governments that have been major supporters of Lebanon’s Hezbollah and Palestine’s Hamas, i.e. Syria and Iran. One reason why Obama may have opted for a secretive overture to the Assad regime, using intelligence channels with the Russians as the middlemen, is that otherwise the U.S. neocons and their “liberal interventionist” allies would have howled in protest.
  • By early 2014, American neocons and their “liberal interventionist” pals were conspiring “to midwife” a coup to overthrow Ukraine’s elected President Viktor Yanukovych, according to a phrase used by U.S. Ambassador Geoffrey Pyatt in an intercepted phone conversation with Assistant Secretary of State for European Affairs Victoria Nuland, who was busy handpicking leaders to replace Yanukovych. A neocon holdover from George W. Bush’s administration, Nuland had been a top aide to Vice President Dick Cheney and is married to prominent neocon Robert Kagan, a co-founder of the Project for a New American Century which prepared the blueprint for the neocon strategy of “regime change” starting with the 2003 U.S.-led invasion of Iraq.
  • The U.S.-backed coup ousted Yanukovych on Feb. 22 and sparked a bloody civil war, leaving thousands dead, mostly ethnic Russians in eastern Ukraine. But the Gershman-Nuland strategy also drove a deep wedge between Obama and Putin, seeming to destroy the possibility that their peace-seeking collaboration would continue in the Middle East. [See Consortiumnews.com’s “Neocons’ Ukraine-Syria-Iran Gambit.”] New Hope for ‘Regime Change’ The surprise success of Islamic State terrorists in striking deep inside Iraq during the summer revived neocon hopes that their “regime change” strategy in Syria might also be resurrected. By baiting Obama to react with military force not only in Iraq but across the border in Syria, neocons like Sens. John McCain and Lindsey Graham put the ouster of Assad back in play.
  • In a New York Times op-ed on Aug. 29, McCain and Graham used vague language about resolving the Syrian civil war, but clearly implied that Assad must go. They wrote that thwarting ISIS “requires an end to the [civil] conflict in Syria, and a political transition there, because the regime of President Bashar al-Assad will never be a reliable partner against ISIS; in fact, it has abetted the rise of ISIS, just as it facilitated the terrorism of ISIS’ predecessor, Al Qaeda in Iraq.” Though the McCain-Graham depiction of Assad’s relationship to ISIS and al-Qaeda was a distortion at best – in fact, Assad’s army has been the most effective force in pushing back against the Sunni terrorist groups that have come to dominate the Western-backed rebel movement – the op-ed’s underlying point is obvious: a necessary step in the U.S. military operation against ISIS must be “regime change” in Damascus.
  • That would get the neocons back on their original track of forcing “regime change” in countries seen as hostile to Israel. The first target was Iraq with Syria and Iran always meant to follow. The idea was to deprive Israel’s close-in enemies, Lebanon’s Hezbollah and Palestine’s Hamas, of crucial support. But the neocon vision got knocked off track when Bush’s Iraq War derailed and the American people balked at extending the conflict to Syria and Iran. Still, the neocons retained their vision even after Bush and Cheney departed. They also remained influential by holding onto key positions inside Official Washington – at think tanks, within major news outlets and even inside the Obama administration. They also built a crucial alliance with “liberal interventionists” who had Obama’s ear. [See Consortiumnews.com’s “The Dangerous Neocon-R2P Alliance.”]
  • The neocons’ new hope arrived with the public outrage over ISIS’s atrocities. Yet, while pushing to get this new war going, the neocons have downplayed their “regime change” agenda, getting Obama to agree only to extend his anti-ISIS bombing campaign from Iraq into Syria. But it was hard to envision expanding the war into Syria without ousting Assad. Now, however, if the source’s account is correct regarding Assad’s quiet assent to U.S. airstrikes, Obama may have devised a way around the need to bomb Assad’s military, an maneuver that might again frustrate the neocons’ beloved goal of “regime change.”
  •  
    Robert Parry lands another major scoop. But beware of government officials who leak government plans because they do not invariably speak the truth.  I am particularly wary of this report because Obama's planned arming and training of the "moderate Syrian opposition" was such a patent lie. The "moderate Syrian opposition" disappeared over two years ago as peaceful protesters were replaced by Saudi, Qatari, Turkish, and American-backed Salafist mercenaries took their place. Up until this article, there has been every appearance that the U.S. was about to become ISIL's Air Force in Syria. In other words, there has been a steady gushing of lies from the White House on fundamental issues of war and peace. In that light, I do not plan to accept this article as truth before I see much more confirmation that ISIL rather than the Assad government is the American target in Syria. We have a serial liar in the White House.
Gary Edwards

Articles by Mark Dice - 0 views

  •  
    Libertarian writer and researcher, Mark Dice, has provided a list of articles he has written.  Mark's literary works include: ... "The Illuminati: Facts & Fiction" ...... separates and analyzes the various claims and evidence about the Illuminati, their history, beliefs, members, organizations, and activities. This is a supplement for Mark's previous book - ..... "The Resistance Manifesto",  which focuses more on the New World Order, the 9/11 attacks, Big Brother, and how the political agendas of the elite are fulfilling Bible prophecy.   .... "The New World Order" ....   His website, markdice.com has high light summary of his work that's quite interesting: A detailed analysis of the September 11th attacks and evidence they were aided by elements within U.S. and foreign intelligence agencies to be used as a reason to jumpstart the "War on Terror" and the erosion of privacy and personal liberties outlined in the constitution. The Knights Templar, the real Holy Grail, and the role the Templars played in the formation of the Illuminati mafia. Quotes from the original writings of the Illuminati founders and how the organization drew up plans over 200 years ago to take over every major institution of power and influence in the world through deception and criminal activity. An expose on the Bohemian Grove resort including quotes from President Richard Nixon, senator John Decamp, and information from Chris Jones who worked at the club and became an informant on the activities within the compound. The secrets of Freemasonry and a history of the organization and their influence on society and quotes from the bible of Freemasonry on how the organization knowingly deceives lower level members and nonmembers as to the true secrets and goals of the fraternity. The history and meaning of the mysterious Georgia Guidestones monument and why the elite want to reduce world population to 500 million by killing billions of people through wars and plagues. A history of
Paul Merrell

NYPD Blows Whistle on New Hillary Emails: Money Laundering, Sex Crimes with Children, Child Exploitation, Pay to Play, Perjury - 1 views

  • New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence “to put Hillary (Clinton) and her crew away for life,” NYPD sources told True Pundit. NYPD sources said Clinton’s “crew” also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday.
  • But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department’s highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. “What’s in the emails is staggering and as a father, it turned my stomach,” the NYPD Chief said. “There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that.”
  • The NYPD Chief said once Comey saw the alarming contents of the emails he was forced to reopen a criminal probe against Clinton. “People are going to prison,” he said. Meanwhile, FBI sources said Abedin and Weiner were cooperating with federal agents, who have taken over the non-sexting portions the case from NYPD. The husband-and-wife Clinton insiders  are both shopping for separate immunity deals, sources said. “If they don’t cooperate they are going to see long sentences,” a federal law enforcement source said. NYPD sources said Weiner or Abedin stored all the emails in a massive Microsoft Outlook program on the laptop. The emails implicate other current and former members of Congress and one high-ranking Democratic Senator as having possibly engaged in criminal activity too, sources said. Prosecutors in the office of US Attorney Preet Bharara have issued a subpoena for Weiner’s cell phones and travel records, law enforcement sources confirmed. NYPD said it planned to order the same phone and travel records on Clinton and Abedin, however, the FBI said it was in the process of requesting the identical records. Law enforcement sources are particularly interested in cell phone activity and travel to the Bahamas, U.S. Virgin Islands and other locations that sources would not divulge.
  • ...4 more annotations...
  • The new emails contain travel documents and itineraries indicating Hillary Clinton, President Bill Clinton, Weiner and multiple members of Congress and other government officials accompanied convicted pedophile billionaire Jeffrey Epstein on his Boeing 727 on multiple occasions to his private island in the U.S Virgin Islands, sources said. Epstein’s island has also been dubbed Orgy Island or Sex Slave Island where Epstein allegedly pimps out underage girls and boys to international dignitaries. Both NYPD and FBI sources confirm based on the new emails they now believe Hillary Clinton traveled as Epstein’s guest on at least six occasions, probably more when all the evidence is combed, sources said. Bill Clinton, it has been confirmed in media reports spanning recent years, that he too traveled with Epstein over 20 times to the island.
  • According to other uncovered emails, Abedin and Clinton both sent and received thousands of classified and top secret documents to personal email accounts including Weiner’s unsecured campaign web site which is managed by Democratic political consultants in Washington D.C. Weiner maintained little known email accounts that the couple shared on the website anthonyweiner.com. Weiner, a former seven-term Democratic Congressman from New York, primarily used that domain to campaign for Congress and for his failed mayoral bid of New York City. At one point, FBI sources said, Abedin and Clinton’s classified and top secret State Department documents and emails were stored in Weiner’s email on a server shared with a dog grooming service and a western Canadian bicycle shop. However, Weiner and Abedin, who is Hillary Clinton’s closest personal aide, weren’t the only people with access to the Weiner’s email account. Potentially dozens of unknown individuals had access to Abedin’s sensitive State Department emails that were stored in Weiner’s email account, FBI sources confirmed. FEC records show Weiner paid more than $92,000 of congressional campaign funds to Anne Lewis Strategies LLC to manage his email and web site. According to FBI sources, the D.C.-based political consulting firm has served as the official administrator of the anthonyweiner.com domain since 2010, the same time Abedin was working at the State Department. This means technically Weiner and Abedin’s emails, including top secret State Department emails, could have been accessed, printed, discussed, leaked, or distributed by untold numbers of personnel at the Anne Lewis consulting firm because they can control where the website and it emails are pointed, FBI sources said.
  • According to FBI sources, the bureau’s newly-minted probe into Clinton’s use and handling of emails while she served as secretary of state, has also been broadened to include investigating new email-related revelations, including: Abedin forwarded classified and top secret State Department emails to Weiner’s email Abedin stored emails, containing government secrets, in a special folder shared with Weiner warehousing over 500,000 archived State Department emails. Weiner had access to these classified and top secret documents without proper security clearance to view the records Abedin also used a personal yahoo address and her Clintonemail.com address to send/receive/store classified and top secret documents A private consultant managed Weiner’s site for the last six years, including three years when Clinton was secretary of state, and therefore, had full access to all emails as the domain’s listed registrant and administrator via Whois email contacts. Because Weiner’s campaign website is managed by the third-party consultant and political email guru, FBI agents are burdened with the task of trying to decipher just how many people had access to Weiner’s server and emails and who were these people. Or if the server was ever compromised by hackers, or other actors.
  • Abedin told FBI agents in an April interview that she didn’t know how to consistently print documents or emails from her secure Dept. of State system. Instead, she would forward the sensitive emails to her yahoo, Clintonemail.com and her email linked to Weiner. Abedin said, according to FBI documents, she would then access those email accounts via webmail from an unclassified computer system at the State Dept. and print the documents, many of which were classified and top secret, from the largely unprotected webmail portals. Clinton did not have a computer in her office on Mahogany Row at the State Dept. so she was not able to read timely intelligence unless it was printed out for her, Abedin said. Abedin also said Clinton could not operate the secure State Dept. fax machine installed in her Chappaqua, NY home without assistance. Perhaps more alarming, according to the FBI’s 302 Report detailing its interview with Abedin, none of the multiple FBI agents and Justice Department officials who conducted the interview pressed Abedin to further detail the email address linked to Weiner. There was never a follow up, according to the 302 report. But now, all that has changed, with the FBI’s decision to reopen the Clinton email investigation and the husband and wife seeking immunity deals to testify against Clinton and other associates about the contents of the laptop’s emails.
  •  
    "New York Police Department detectives and prosecutors working an alleged underage sexting case against former Congressman Anthony Weiner have turned over a newly-found laptop he shared with wife Huma Abedin to the FBI with enough evidence "to put Hillary (Clinton) and her crew away for life," NYPD sources told True Pundit. NYPD sources said Clinton's "crew" also included several unnamed yet implicated members of Congress in addition to her aides and insiders. The NYPD seized the computer from Weiner during a search warrant and detectives discovered a trove of over 500,000 emails to and from Hillary Clinton, Abedin and other insiders during her tenure as secretary of state. The content of those emails sparked the FBI to reopen its defunct email investigation into Clinton on Friday. But new revelations on the contents of that laptop, according to law enforcement sources, implicate the Democratic presidential candidate, her subordinates, and even select elected officials in far more alleged serious crimes than mishandling classified and top secret emails, sources said. NYPD sources said these new emails include evidence linking Clinton herself and associates to: Money laundering Child exploitation Sex crimes with minors (children) Perjury Pay to play through Clinton Foundation Obstruction of justice Other felony crimes NYPD detectives and a NYPD Chief, the department's highest rank under Commissioner, said openly that if the FBI and Justice Department fail to garner timely indictments against Clinton and co- conspirators, NYPD will go public with the damaging emails now in the hands of FBI Director James Comey and many FBI field offices. "What's in the emails is staggering and as a father, it turned my stomach," the NYPD Chief said. "There is not going to be any Houdini-like escape from what we found. We have copies of everything. We will ship them to Wikileaks or I will personally hold my own press conference if it comes to that." The NYPD
« First ‹ Previous 41 - 60 of 1827 Next › Last »
Showing 20 items per page