Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Development" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

PCLOB - 0 views

  • ​​​​​​​​​​​​PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD
  • PCLOB ISSUES REPORTReport on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court
  •  
    There are four grounds upon which we find that the telephone records program fails to comply with Section 215. First, the telephone records acquired under the program have no connection to any specific FBI investigation at the time of their collection. Second, because the records are collected in bulk - potentially encompassing all telephone calling records across the nation - they cannot be regarded as "relevant" to any FBI investigation as required by the statute without redefining the word relevant in a manner that is circular, unlimited in scope, and out of step with the case law from analogous legal contexts involving the production of records. Third, the program operates by putting telephone companies under an obligation to furnish new calling records on a daily basis as they are generated (instead of turning over records already in their possession) - an approach lacking foundation in the statute and one that is inconsistent with FISA as a whole. Fourth, the statute permits only the FBI to obtain items for use in its investigations; it does not authorize the NSA to collect anything.  In addition, we conclude that the program violates the Electronic Communications Privacy Act. That statute prohibits telephone companies from sharing customer records with the government except in response to specific enumerated circumstances, which do not include Section 215 orders. Finally, we do not agree that the program can be considered statutorily authorized because Congress twice delayed the expiration of Section 215 during the operation of the program without amending the statute. The "reenactment doctrine," under which Congress is presumed to have adopted settled administrative or judicial interpretations of a statute, does not trump the plain meaning of a law, and cannot save an administrative or judicial interpretation that contradicts the statute itself. Moreover, the circumstances presented here differ in pivotal ways from any in which the reenact
Paul Merrell

N.S.A. Able to Foil Basic Safeguards of Privacy on Web - NYTimes.com - 1 views

  • The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
  • The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
  • The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
  • ...11 more annotations...
  • “For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
  • Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.
  • For at least three years, one document says, GCHQ, almost certainly in collaboration with the N.S.A., has been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document. (Google denied giving any government access and said it had no evidence its systems had been breached).
  • Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip. “And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.
  • The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus on GCHQ but include thousands from or about the N.S.A. Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.
  • The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June. “Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.
  • Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.
  • At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service.
  • Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method. Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology and later by the International Organization for Standardization, which has 163 countries as members. Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.” “Eventually, N.S.A. became the sole editor,” the memo says.
  • But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence. A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum.
  • Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”
  •  
    Lengthy article, lots of new information on NSA decryption capabilities, none of it good for those who value their data privacy.
  •  
    Thanks Paul - nice job cutting this monster down to size :)
Paul Merrell

Congress cuts U.S. military and development aid for Afghanistan - The Washington Post - 0 views

  • With no perceptible opposition from the Obama administration, Congress has quietly downscaled Washington’s ambitions for the final year of the Afghan war, substantially curtailing development aid and military assistance plans ahead of the U.S. troop pullout. As congressional appropriators put the final touches on a huge spending bill in recent weeks, they slashed Afghanistan development aid by half and barred U.S. defense officials from embarking on major new infrastructure projects. After making a bid last year for $2.6 billion worth of “critical” capabilities such as mobile strike vehicles for Afghan security forces, the Pentagon agreed it could do with just 40 percent of what it had sought.
  • The Obama administration had long hoped to bring the Afghan war to a dignified conclusion this year and viewed the president’s State of the Union speech Tuesday as an opportunity to describe the end of America’s longest war as a foreign policy success. But Washington’s appetite to remain engaged in Afghanistan appears to be eroding precipitously, in large part because of how poisonous its relationship with the country’s president has become.
  • The prevailing sentiment in Washington toward President Hamid Karzai, who has thus far refused to sign a security agreement that would keep U.S. troops and funding in Afghanistan beyond 2014, was even codified in the Afghan portion of the spending bill, which was drawn up without significant public debate. “The bill prohibits the obligation or expenditure by the United States government, of funds appropriated in this or any other act, for the direct personal benefit of the President of Afghanistan,” appropriators wrote, an unprecedented move that President Obama signed into law last week.U.S. officials said the cuts and restrictions might appear starker than they actually are because agency heads will retain significant flexibility to use unspent funds from previous years or draw from other sources. But many see the reductions as the unmistakable end of an era of wartime largesse.
  •  
    Attention: major history rewrite in progress. "... the final year of the Afghan war ...  The Obama administration had long hoped to bring the Afghan war to a dignified conclusion this year." Blither.
Paul Merrell

Snowden Docs: British Spies Used Sex and 'Dirty Tricks' - NBC News.com - 0 views

  • ritish spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications. advertisement Both PowerPoint presentations describe “Effects” campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda campaigns use deception, mass messaging and “pushing stories” via Twitter, Flickr, Facebook and YouTube. JTRIG also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.
  • ritish spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.
  • In connection with this report, NBC is publishing documents that Edward Snowden took from the NSA before fleeing the U.S., which can be viewed by clicking here and here. The documents are being published with minimal redactions.
  •  
    Glenn Greenwald adds another dollop to the brew. 
Paul Merrell

DARPA seeks the Holy Grail of search engines - 0 views

  • The scientists at DARPA say the current methods of searching the Internet for all manner of information just won't cut it in the future. Today the agency announced a program that would aim to totally revamp Internet search and "revolutionize the discovery, organization and presentation of search results." Specifically, the goal of DARPA's Memex program is to develop software that will enable domain-specific indexing of public web content and domain-specific search capabilities. According to the agency the technologies developed in the program will also provide the mechanisms for content discovery, information extraction, information retrieval, user collaboration, and other areas needed to address distributed aggregation, analysis, and presentation of web content.
  • Memex also aims to produce search results that are more immediately useful to specific domains and tasks, and to improve the ability of military, government and commercial enterprises to find and organize mission-critical publically available information on the Internet. "The current one-size-fits-all approach to indexing and search of web content limits use to the business case of web-scale commercial providers," the agency stated. 
  • The Memex program will address the need to move beyond a largely manual process of searching for exact text in a centralized index, including overcoming shortcomings such as: Limited scope and richness of indexed content, which may not include relevant components of the deep web such as temporary pages, pages behind forms, etc.; an impoverished index, which may not include shared content across pages, normalized content, automatic annotations, content aggregation, analysis, etc. Basic search interfaces, where every session is independent, there is no collaboration or history beyond the search term, and nearly exact text input is required; standard practice for interacting with the majority of web content, which remains one-at-a-time manual queries that return federated lists of results. Memex would ultimately apply to any public domain content; initially, DARPA  said it intends to develop Memex to address a key Defense Department mission: fighting human trafficking. Human trafficking is a factor in many types of military, law enforcement and intelligence investigations and has a significant web presence to attract customers. The use of forums, chats, advertisements, job postings, hidden services, etc., continues to enable a growing industry of modern slavery. An index curated for the counter-trafficking domain, along with configurable interfaces for search and analysis, would enable new opportunities to uncover and defeat trafficking enterprises.
  • ...1 more annotation...
  • DARPA said the Memex program gets its name and inspiration from a hypothetical device described in "As We May Think," a 1945 article for The Atlantic Monthly written by Vannevar Bush, director of the U.S. Office of Scientific Research and Development (OSRD) during World War II. Envisioned as an analog computer to supplement human memory, the memex (a combination of "memory" and "index") would store and automatically cross-reference all of the user's books, records and other information. This cross-referencing, which Bush called associative indexing, would enable users to quickly and flexibly search huge amounts of information and more efficiently gain insights from it. The memex presaged and encouraged scientists and engineers to create hypertext, the Internet, personal computers, online encyclopedias and other major IT advances of the last seven decades, DARPA stated.
  •  
    DoD announces that they want to go beyond Google. Lots more detail in the proposal description linked from the article. Interesting tidbits: [i] the dark web is a specific target; [ii] they want the ability to crawl web pages blocked by robots.txt; [iii] they want to be able to search page source code and comments. 
Paul Merrell

Turkish PM replaces 10 ministers amid graft inquiry | Reuters - 0 views

  • (Reuters) - Turkey's Prime Minister Tayyip Erdogan said he replaced ten cabinet ministers, half of his total roster, after three ministers resigned over a high-level graft inquiry on Wednesday. The replaced ministers included EU Minister Egemen Bagis, who was allegedly named in the corruption probe but had not resigned yet, and key positions such as the Economy and justice ministers.
  •  
    It appears that a large-scale purge is under way in NATO member and E.U. candidate nation Turkey, ostensibly based on corruption and graft charges. Score card so far: ten cabinet ministers fired, three more resigned. More than 500 police officers in the Istanbul area have been fired. http://www.todayszaman.com/news-334870-400-more-police-officers-in-istanbul-removed-from-duty.html The purge of police appears to be largely aimed at upper ranks. More than 110 police chiefs have lost their posts and journalists are in an uproar because of a new directive " banning journalists from entering police department buildings." It appears that a large-scale purge is under way in NATO member and E.U. candidate nation Turkey, ostensibly based on corruption and graft charges. Score card so far: ten cabinet ministers fired, three more resigned. More than 500 police officers in the Istanbul area have been fired. http://www.todayszaman.com/news-334870-400-more-police-officers-in-istanbul-removed-from-duty.html The purge of police appears to be largely aimed at upper ranks. More than 110 police chiefs have lost their posts and journalists are in an uproar because of a new directive " banning journalists from entering police department buildings." It appears that a large-scale purge is under way in NATO member and E.U. candidate nation Turkey, ostensibly based on corruption and graft charges. Score card so far: ten cabinet ministers fired, three more resigned. More than 500 police officers in the Istanbul area have been fired. http://www.todayszaman.com/news-334870-400-more-police-officers-in-istanbul-removed-from-duty.html The purge of police appears to be largely aimed at upper ranks. More than 110 police chiefs have lost their posts and journalists are in an uproar because of a new directive " banning journalists from
  •  
    "The United States has demanded the Turkish government condemn false news reports about US Ambassador Francis J. Ricciardone and urged Ankara to protect the strong partnership between the two countries, a Turkish daily reported on Tuesday. Jen Psaki, US State Department Spokesperson, said in a press conference that the ongoing false allegations against US ambassador is disturbing. "On Saturday, several pro-government newspapers accused the US ambassador of being behind a recent wave of arrests as part of the corruption investigation. Pro-government Yeni Şafak wrote on its front page: "Get out of this country," a headline that was apparently directed at the US ambassador. "The US Embassy denied the accusations as "lies and slander." It said through Twitter in Turkish: "No one should jeopardize Turkish-US relations through baseless claims." http://www.todayszaman.com/newsDetail_getNewsById.action;jsessionid=1F7B777659D734167420623A648E1335?newsId=334788&columnistId=0
  •  
    Another reaction came from the Contemporary Journalists Association (ÇGD) on Tuesday. The president of the ÇGD's western Central Anatolia branch, Can Hacıoğlu, said the decisions to ban journalists from entering police departments and the closure of press rooms at those departments are unacceptable. He added that the fact that police departments prefer censorship in a period when Turkey has been discussing opening press agencies at police departments and prosecutor's offices as part of the EU harmonization process is very challenging. "We journalists find this situation very odd," Hacıoğlu said. Hacıoğlu also harshly criticized Turkish Airlines (THY) for stopping the distribution of the Zaman, Today's Zaman, Bugün and Ortadoğu dailies to business class passengers on its planes on Monday without providing any explanation, though other dailies are still being handed out onboard. "Hacıoğlu accused THY of discriminating against the dailies for their coverage of the major corruption scandal involving numerous bureaucrats and the sons of three ministers." "Access to Taraf journalist Mehmet Baransu's website was blocked to users in Turkey by the Telecommunications Directorate (TİB) as of Wednesday evening for publishing photos and tapes about the recent graft investigation. The website, yenidönem.com, is still blocked." http://www.todayszaman.com/newsDetail_getNewsById.action;jsessionid=1F7B777659D734167420623A648E1335?newsId=334831&columnistId=0
Gary Edwards

Breakaway Civilizations/ Rethinking History - Shows - Coast to Coast AM - 0 views

  •  
    "Date: 03-16-14 Host: George Knapp Guests: Joseph P. Farrell, Brad Olsen In the first half, George Knapp was joined by author Joseph Farrell, who detailed his research into the possibility that a secret, breakaway civilization was formed by American elites following World War II. He explained that, after the war, the United States was faced with three formidable challenges: escaped Nazis bent on recreating their empire elsewhere, the Cold War, and the UFO phenomenon. In turn, Farrell surmised, a secret system was put into place to develop defenses against these dangers facing the country. He theorized that, in order to surreptitiously fund such a massive undertaking, the United States used the vast wealth that had been plundered by Japan during WWII to bankroll various projects. Farrell suggested that, over time, similar secret infrastructures were created by other technologically advanced countries such as England, Russia, and China. In the ensuing years since its creation, Farrell said, the American organization likely developed amazing technological capabilities far beyond what is known to the general population, hence the concept of a 'breakaway civilization,' which shares our planet but exists within a world of knowledge far different from our own. Manmade UFOs, weather control, and zero point energy may be achievements that have secretly been accomplished, but remain classified for fear of revealing technologies which could be weaponized and used against the United States. Farrell pointed to the emergence of 3D printing and the push for mining in space as potential signs of previously accomplished breakthroughs which are now slowly being introduced to the public. --------------------------------- In the latter half, author Brad Olsen discussed flaws in modern history and how conspiracy theories, esoteric insights, and fringe subjects can be used to help change a dead-end course for humanity. He contended that nearly every facet of human life, from science,
Paul Merrell

Testosterone Pit - Home - The Other Reason Why IBM Throws A Billion At Linux (With NSA- Designed Backdoor) - 0 views

  • IBM announced today that it would throw another billion at Linux, the open-source operating system, to run its Power System servers. The first time it had thrown a billion at Linux was in 2001, when Linux was a crazy, untested, even ludicrous proposition for the corporate world. So the moolah back then didn’t go to Linux itself, which was free, but to related technologies across hardware, software, and service, including things like sales and advertising – and into IBM’s partnership with Red Hat which was developing its enterprise operating system, Red Hat Enterprise Linux. “It helped start a flurry of innovation that has never slowed,” said Jim Zemlin, executive director of the Linux Foundation. IBM claims that the investment would “help clients capitalize on big data and cloud computing with modern systems built to handle the new wave of applications coming to the data center in the post-PC era.” Some of the moolah will be plowed into the Power Systems Linux Center in Montpellier, France, which opened today. IBM’s first Power Systems Linux Center opened in Beijing in May. IBM may be trying to make hay of the ongoing revelations that have shown that the NSA and other intelligence organizations in the US and elsewhere have roped in American tech companies of all stripes with huge contracts to perfect a seamless spy network. They even include physical aspects of surveillance, such as license plate scanners and cameras, which are everywhere [read.... Surveillance Society: If You Drive, You Get Tracked].
  • Then another boon for IBM. Experts at the German Federal Office for Security in Information Technology (BIS) determined that Windows 8 is dangerous for data security. It allows Microsoft to control the computer remotely through a “special surveillance chip,” the wonderfully named Trusted Platform Module (TPM), and a backdoor in the software – with keys likely accessible to the NSA and possibly other third parties, such as the Chinese. Risks: “Loss of control over the operating system and the hardware” [read.... LEAKED: German Government Warns Key Entities Not To Use Windows 8 – Links The NSA.
  • It would be an enormous competitive advantage for an IBM salesperson to walk into a government or corporate IT department and sell Big Data servers that don’t run on Windows, but on Linux. With the Windows 8 debacle now in public view, IBM salespeople don’t even have to mention it. In the hope of stemming the pernicious revenue decline their employer has been suffering from, they can politely and professionally hype the security benefits of IBM’s systems and mention in passing the comforting fact that some of it would be developed in the Power Systems Linux Centers in Montpellier and Beijing. Alas, Linux too is tarnished. The backdoors are there, though the code can be inspected, unlike Windows code. And then there is Security-Enhanced Linux (SELinux), which was integrated into the Linux kernel in 2003. It provides a mechanism for supporting “access control” (a backdoor) and “security policies.” Who developed SELinux? Um, the NSA – which helpfully discloses some details on its own website (emphasis mine): The results of several previous research projects in this area have yielded a strong, flexible mandatory access control architecture called Flask. A reference implementation of this architecture was first integrated into a security-enhanced Linux® prototype system in order to demonstrate the value of flexible mandatory access controls and how such controls could be added to an operating system. The architecture has been subsequently mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel, spawning a wide range of related work.
  • ...1 more annotation...
  • Among a slew of American companies who contributed to the NSA’s “mainstreaming” efforts: Red Hat. And IBM? Like just about all of our American tech heroes, it looks at the NSA and other agencies in the Intelligence Community as “the Customer” with deep pockets, ever increasing budgets, and a thirst for technology and data. Which brings us back to Windows 8 and TPM. A decade ago, a group was established to develop and promote Trusted Computing that governs how operating systems and the “special surveillance chip” TPM work together. And it too has been cooperating with the NSA. The founding members of this Trusted Computing Group, as it’s called facetiously: AMD, Cisco, Hewlett-Packard, Intel, Microsoft, and Wave Systems. Oh, I almost forgot ... and IBM. And so IBM might not escape, despite its protestations and slick sales presentations, the suspicion by foreign companies and governments alike that its Linux servers too have been compromised – like the cloud products of other American tech companies. And now, they’re going to pay a steep price for their cooperation with the NSA. Read...  NSA Pricked The “Cloud” Bubble For US Tech Companies
Gary Edwards

The Thorium Powered Car - EPautos - 0 views

  • An internal combustion can burn gas and CNG (or propane). All that was necessary to allow the switch from one fuel to another was some additional plumbing and calibration of the car’s ECU (the computer that makes air-fuel ratio adjustments and so on). So, no worries about running empty – and no waiting for hours to refuel. Three, CNG was (is) cheap and burns very cleanly and is massively abundant right here in the U.S.  At a stroke, the three major charges leveled against the pure-gasoline-burning car are vacated. The CNG car hardly pollutes and it greatly reduces and potentially eliminates dependence on “foreign” oil. Also, the cost of the CNG car itself was within reason because no uber-elaborate technology was necessary (unlike electric cars and hybrid electric cars). Just some modifications to an existing car. Sure, there were some issues to be sorted out – the big one being making it easy (and safe) for the average person to refill the CNG tanks. But the technology of the car itself worked – and was economic.
  • So why wasn’t it developed? Perhaps precisely because it did work – and was economic. People could drive big – and powerful cars. At a reasonable cost. Well, they could have.
  • Here’s another, more recent one: The thorium-turbine powered car. Heat energy from the thorium – a weakly radioactive element (named after the Norse god Thor) that is estimated to be 3-4 times more naturally abundant than uranium and which contains 20 million times the energy as an equivalent lump of coal – is used to generate steam, which is then used to power a small turbine, which provides the motive force. The beauty of the system is that – like a nuclear submarine – the fuel lasts almost forever. Well, longer than you will last, probably. How’s 100 years sound? No more stopping for “gas”… ever. This alone would make current IC cars seem as wasteful of time (and energy) as current IC cars make electric cars look wasteful of time and energy. But wait, there’s more.
  • ...2 more annotations...
  • Well, less. No emissions at all. Because nothing’s being burned, there’s no exhaust. Water to steam, expansion and contraction – and back again. Closed (and clean) loop. The Algoreans ought to be ecstatic. Yet there is dead silence. You can hear the crickets chirping. Is it because thorium is radioactive? The word is third rail to scientifically illiterate homo Americanus – who fears it in the same way a savage fears the voices coming out of the Talk Box (radio). The mere mention of the word is sufficient to incite a panic. It’s why the nuclear power grid is dead in the water; or rather, as old as a Betamax copy of Saturday Night Fever. But it’s not even the same thing. Thorium is mildly radioactive. Dr. Charles Stevens, CEO of Laser Power Systems – which is developing the technology, or at least, trying to – says: “The radiation can be shielded by a single sheet of aluminum foil.” 
  • Bear in mind that gasoline is a highly volatile, highly explosive liquid fuel. But most of us do not sweat having 15 or so gallons of the stuff sloshing around in our cars, because we’re used to it. Because we know the gas tank is well-protected and not likely to burst into flames. It could happen, sure. But the individual risk is very small – just as the individual risk posed by a thorium-turbine car’s low-level radioactivity is small. Well, would be. If such cars were to be produced. But, it doesn’t look like they will be. Stevens told Mashable that “the automakers don’t want to buy them” – so his company is focusing on other applications of the technology, including an air conditioner-size unit that could power an entire restaurant or hotel, eliminating the need for grid electricity. This ought to please the Algoreans, too – since the electric grid is powered mostly by coal and oil-fired utility plants. But, again, crickets. It kind of makes you wonder, doesn’t it?
  •  
    "Why is it that alternative technologies that clearly do not work -  which are so gimped by functional and economic problems as to be not-viable on the market absent huge subsidies and even then, it's hard to give them away - continue to receive seemingly endless financial and political support … while technologies that actually might work better than current internal combustion engine technology can't seem to get any traction at all? Electric cars are hopeless. For more than a century now, generations of engineers have tried - and, so far, failed - to develop a battery that will endow an electric car with the range and reasonable recharge times necessary for everyday-driver viability… at a cost (not subsidized) that would make such a car a better choice, economically speaking, than an otherwise comparable gasoline (or diesel) powered car. Billions of dollars, probably, have been thrown at the electric car and - so far - no major technological improvement over a 1906 Baker Landolet. Meanwhile, whatever happened to the natural gas-burning car? Back in the mid-'90s, both Ford and GM built - and actually sold - natural-gas (CNG) fueled cars. Several things about them were interesting. One, they were big cars. Ford sold a CNG version of its six-passenger/full-size Crown Vic; GM sold a CNG version of the Vic's primary competition - the Chevy Caprice. Part of the reason for going with the big car as the platform was the need for a big trunk to house the CNG tank (and still have some trunk space left for people's things). But the take-home point was that you got a nice big family car - with a V8 engine - rather than a scrunched up subcompact. Two, they were practical. No range issue, because you had plenty (150-plus) on the CNG and the distance you could drive was not affected by the outside temperature or greatly reduced if you ran accessories like the AC and headlights, as it is in electric cars. And besides, when the C
Paul Merrell

Gaza Could Be Uninhabitable In 5 Years, UN Report Warns | nsnbc international - 0 views

  • A new report by the UN Conference on Trade and Development (UNCTAD) found that under current conditions, the Gaza Strip, home to 1.8 million Palestinians, will become uninhabitable within the next five years.
  • The report states that “The social, health and security-related ramifications of the high population density and overcrowding are among the factors that may render Gaza unliveable by 2020″. The UNCTAD report, entitled “Assistance to the Palestinian people: Developments in the economy of the Occupied Palestinian Territory”, was released today. The report examined the current conditions in the coastal strip, and found that Gaza could become uninhabitable by 2020 due to ongoing de-Development, eight years of economic blockade and three military operations in the past six years. Last year’s invasion by the Israeli military “ravaged the already debilitated infrastructure of Gaza, shattered its productive base, left no time for meaningful reconstruction or economic recovery and impoverished the Palestinian population in Gaza,” the report said.
  • The report also called for an end to the Israeli siege on Gaza, stating, “Short of ending the blockade, donor aid… will not reverse the ongoing de-development and impoverishment in Gaza.” According to the UN Report, socio-economic conditions in Gaza today are currently “at their lowest point since 1967,” In addition to the 500,000 people who have been displaced in Gaza as a result of the most recent military operation in 2014, the report estimates significant economic losses, including the destruction or severe damage of more than 20,000 Palestinian homes, 148 schools and 15 hospitals and 45 primary health-care centres.
Gary Edwards

Obama Socialism and the Universal Drwadown of U.S. Forces: Biden's Hint by Bill Whittle on National Review Online - 0 views

  •  
    Quote from Obama: "I will cut investments in unproven missile defense systems. I will not weaponize space. I will slow our development of future combat systems. [snip] I will set a goal of a world without nuclear weapons. To seek that goal, I will not develop new nuclear weapons. I will seek a global ban on the production of fissile material. And I will negotiate with Russia to take our ICBM's off hair-trigger alert." Wow. Is Barack Obama planning a unilateral drawdown of U.S. forces? He says that's what he wants, and he sounds pretty clear about it to me.
Gary Edwards

States negotiating immunity for banks over foreclosures - 0 views

  •  
    Thanks to Marbux.  Seems like nothing will stop the Banksters from seizing it all.  I think i've previously posted that when i was with Virtual Realty (VRi), we were forever trying to crack into the MERS electronic database.  Wow did the Banksters screw this one up.  Now only their corrupt sycophants in Congress and the Coursts can save them.  Not even the lap dog media will touch this. excerpt: A coalition of all 50 states' attorneys general has been negotiating settlements with five of the biggest U.S. banks that would include payment of up to $25 billion in penalties and commitments to follow new rules. In exchange, the banks would get immunity from civil lawsuits by the states, as well as similar guarantees by the Justice Department and Department of Housing and Urban Development, which have participated in the talks. State and federal officials declined to say if any form of immunity from criminal prosecution also is under discussion. The banks involved in the talks are Bank of America, Wells Fargo, CitiGroup, JPMorgan Chase and Ally Financial. REUTERS REPORT PROMPTS LETTER Reuters reported Monday that major banks and other loan servicers have continued to file questionable documents in foreclosure cases. These include false mortgage assignments, and promissory notes with suspect or missing "endorsements," which prove ownership. The Reuters report also showed continued "robo-signing," in which lenders' employees or outside contractors churn out reams of documents without fully understanding their content. The report turned up several cases involving individuals who were publicly identified as robo-signers months ago. Reuters found that such activity has continued even after 14 major mortgage lenders signed settlements with federal bank regulators promising to halt such practices and give remediation to some homeowners who were harmed. In response to these disclosures, Sen. Robert Menendez (D-NJ), chairman of the Senate Subcommittee on Housing, Trans
Paul Merrell

NSA Spying Inspires ProtonMail 'End-to-End' Encrypted Email Service | NDTV Gadgets - 0 views

  • ne new email service promising "end-to-end" encryption launched on Friday, and others are being developed while major services such as Google Gmail and Yahoo Mail have stepped up security measures.A major catalyst for email encryption were revelations about widespread online surveillance in documents leaked by Edward Snowden, the former National Security Agency contractor."A lot of people were upset with those revelations, and that coalesced into this effort," said Jason Stockman, a co-developer of ProtonMail, a new encrypted email service which launched Friday with collaboration of scientists from Harvard, the Massachusetts Institute of Technology and the European research lab CERN.Stockman said ProtonMail aims to be as user-friendly as the major commercial services, but with extra security, and with its servers located in Switzerland to make it more difficult for US law enforcement to access.
  • "Our vision is to make encryption and privacy mainstream by making it easy to use," Stockman told AFP. "There's no installation. Everything happens behind the scenes automatically."Even though email encryption using special codes or keys, a system known as PGP, has been around for two decades, "it was so complicated," and did not gain widespread adoption, Stockman said.After testing over the past few months, ProtonMail went public Friday using a "freemium" model a basic account will be free with some added features for a paid account.
  • By locating in Switzerland, ProtonMail hopes to avoid the legal woes of services like Lavabit widely believed to be used by Snowden which shut down rather than hand over data to the US government, and which now faces a contempt of court order.Even if a Swiss court ordered data to be turned over, Stockman said, "we would hand over piles of encrypted data. We don't have a key. We never see the password."
  • ...3 more annotations...
  • As our users from China, Iran, Russia, and other countries around the world have shown us in the past months, ProtonMail is an important tool for freedom of speech and we are happy to finally be able to provide this to the whole world," the company said in a blog post.Google and Yahoo recently announced efforts to encrypt their email communications, but some specialists say the effort falls short."These big companies don't want to encrypt your stuff because they spy on you, too," said Bruce Schneier, a well-known cryptographer and author who is chief technology officer for CO3 Systems."Hopefully, the NSA debate is creating incentives for people to build more encryption."Stockman said that with services like Gmail, even if data is encrypted, "they have the key right next to it if you have the key and lock next to each other, so it's pretty much useless."
  • Lavabit founder Ladar Levison meanwhile hopes to launch a new service with other developers in a coalition known as the "Dark Mail Alliance."Levison told AFP he hopes to have a new encrypted email system in testing within a few months and widely available later this year."The goal is to make it ubiquitous, so people don't have to turn it on," he said.But he added that the technical hurdles are formidable, because the more user-friendly the system becomes, "the more susceptible it is to a sophisticated attacker with fake or spoofed key information."Levison said he hopes Dark Mail will become a new open standard that can be adopted by other email services.
  • on Callas, a cryptographer who developed the PGP standard and later co-founded the secure communications firm Silent Circle, cited challenges in making a system that is both secure and ubiquitous."If you are a bank you have to have an email system that complies with banking regulations," Callas told AFP, which could allow, for example, certain emails to be subject to regulatory or court review."Many of the services on the Internet started with zero security. We want to start with a system that is totally secure and let people dial it down."The new email system would complement Silent Circle's existing secure messaging system and encrypted mobile phone, which was launched earlier this year."If we start competing for customers on the basis of maximum privacy, that's good for everybody," Callas said.
  •  
    They're already so swamped that you have to reserve your user name and wait for an invite. They say they have to add servers. Web site is at https://protonmail.ch/ "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones. It's as simple as visiting our site and logging in. There are no plugins or apps to install - simply use your favorite web browser." "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones.
Paul Merrell

​Ready, reset, go! ...to Cold War 2.0 - RT Op-Edge - 0 views

  • Enter a fragile Europe. Russia is the EU’s third-largest trading partner. Top economies such as Germany, France and Italy are vastly integrated with the Russian economy. A key plank of Washington’s strategy is to de-link Europe from Russia, part of a much larger agenda of preventing by all means Eurasia’s trade/commercial/economic development integration. It all hinges on Germany. That’s the key debate in Berlin nowadays. German business – and even conservative politicians – are reaching a stark conclusion; they do not want a heavily dysfunctional relationship with Russia. Public opinion, at 57 percent, wants a foreign policy more independent from the US. The US Orwellian/Panopticon complex intrusions in Germany have been instrumental as a game-changer.
  • The real, no-holds-barred reason for the Empire of Chaos’s obsessive economic war on Russia is that Moscow, as a BRICS member, alongside especially China and Brazil, is at the leading edge of emerging powers challenging the global financial/political (dis)order – wallowing in the mire of casino capitalism – dictated by the Empire of Chaos. And it gets ‘curiouser and curiouser’, because the effect of the sanctions hysteria has been to accumulate even more sympathy from the developing world towards Russia. The typical Washington rumbling about “the world” united to “isolate” Russia – in a replay of the Iran case – only applies to NATO. I have closely followed the latest chapters in Eurasia integration, from the Russia-China gas ‘deal of the century’ clinched in Shanghai to the St. Petersburg Economic Forum and then closer Eurasia-South America integration at the BRICS summit in Brazil, which created the New Development Bank and advanced the BRICS drive to develop their own parallel global institutions. President Putin even proposed a BRICS energy coalition, complete with nuclear power agreements and its own “fuel reserve bank and an energy policy institute.” Moscow – as well as Beijing - is actively strengthening energy deals across South America, as in Rosatom signing with both Argentina and Brazil to build nuclear power plants.
  • Eurasia integration, on the Asian front, proceeds unabated. Russia will sell more gas at lower prices not only to China, but also, in the near future, to Japan and South Korea as well. Beijing, meanwhile, is carefully moving its financial, economic and geopolitical pieces on the chessboard, and now on full red alert regarding the sanctions hysteria; the collective leadership very well knows that the target one day may be Russia because of Ukraine, but the next day may be China, because of the South China Sea or even a Hong Kong currently moving towards an impasse; should candidates for Hong Kong chief executive be chosen by direct democracy, or by committee, as Beijing prefers? The key point is, forget about a US-Russia reset. The Russia-China strategic partnership will strengthen. China is preparing itself for its turn in the sanction hysteria show. And for the foreseeable future, the new game in the chessboard is Cold War 2.0.
  •  
    The U.S. throws its weight around expecting Germany (and the EU) to commit economic suicide by honoring U.S. sanctions on Russia and sticking with the sinking dollar. The U.S. invests in guns and projection of military power while Russia and the other BRICS nations just offer to do business. Methinks the U.S. has the losing strategy. 
Paul Merrell

Google Says Website Encryption Will Now Influence Search Rankings - 0 views

  • Google will begin using website encryption, or HTTPS, as a ranking signal – a move which should prompt website developers who have dragged their heels on increased security measures, or who debated whether their website was “important” enough to require encryption, to make a change. Initially, HTTPS will only be a lightweight signal, affecting fewer than 1% of global queries, says Google. That means that the new signal won’t carry as much weight as other factors, including the quality of the content, the search giant noted, as Google means to give webmasters time to make the switch to HTTPS. Over time, however, encryption’s effect on search ranking make strengthen, as the company places more importance on website security. Google also promises to publish a series of best practices around TLS (HTTPS, is also known as HTTP over TLS, or Transport Layer Security) so website developers can better understand what they need to do in order to implement the technology and what mistakes they should avoid. These tips will include things like what certificate type is needed, how to use relative URLs for resources on the same secure domain, best practices around allowing for site indexing, and more.
  • In addition, website developers can test their current HTTPS-enabled website using the Qualys Lab tool, says Google, and can direct further questions to Google’s Webmaster Help Forums where the company is already in active discussions with the broader community. The announcement has drawn a lot of feedback from website developers and those in the SEO industry – for instance, Google’s own blog post on the matter, shared in the early morning hours on Thursday, is already nearing 1,000 comments. For the most part, the community seems to support the change, or at least acknowledge that they felt that something like this was in the works and are not surprised. Google itself has been making moves to better securing its own traffic in recent months, which have included encrypting traffic between its own servers. Gmail now always uses an encrypted HTTPS connection which keeps mail from being snooped on as it moves from a consumer’s machine to Google’s data centers.
  • While HTTPS and site encryption have been a best practice in the security community for years, the revelation that the NSA has been tapping the cables, so to speak, to mine user information directly has prompted many technology companies to consider increasing their own security measures, too. Yahoo, for example, also announced in November its plans to encrypt its data center traffic. Now Google is helping to push the rest of the web to do the same.
  •  
    The Internet continues to harden in the wake of the NSA revelations. This is a nice nudge by Google.
Paul Merrell

Israel deploys a new weapons system in Gaza - Intellihub.com - 0 views

  • Reports, including photographic evidence reveal that Israel is using an energy weapon to attack targets in Gaza. The destructive beam, thought to be a high energy laser, is emitted from a plane identified as a Boeing KC707 “Re’em,” originally configured for Electronic Warfare. Those observing the attacks cite a beam from a 4 engine jet hitting a target which immediately turns “white hot.” After these attacks, the target area is then hit with either bombs or artillery to destroy evidence of the use of an American designed and built energy weapon illegally given to Israel. BACKGROUND The weapon used is identified as part of the YAL 1 system, a COIL laser (chemical, oxygen/iodine laser), originally intended as an aircraft mounted system to shoot down ICBMs. Boeing approached the Department of Defense in 2002 and by 2004 had mounted its first system on a 747/400 previously flown by Air India. Boeing had convinced Secretary of Defense Donald Rumsfeld that this system, mounted on as many as 7 aircraft, could fly 24 hours a day around Iran and defend “the free world” against nuclear tipped ICBMs that Rumsfeld believed Iran was planning to use. Please note that it was Rumsfeld that told television audiences that Afghanistan was “peppered” with underground cities serviced by rail links that supported division sized Al Qaeda units that, after ten years, no one was able to locate.
  • Boeing tested the system in 2007. The Department of Defense claimed the system could shoot down low earth orbit satellites and that in tests conducted in 2010, destroyed multiple test missiles. There is no reliable confirmation of this other than a press release from then Secretary of Defense Robert Gates. CANCELLATION AND MYSTERIOUS DISAPPEARANCE The Center for Strategic Studies, in an interview with then Defense Secretary Gates published the following: “I don’t know anybody at the Department of Defense who thinks that this program should, or would, ever be operationally deployed. The reality is that you would need a laser something like 20 to 30 times more powerful than the chemical laser in the plane right now to be able to get any distance from the launch site to fire.” So, right now the ABL would have to orbit inside the borders of Iran in order to be able to try and use its laser to shoot down that missile in the boost phase. And if you were to operationalize this you would be looking at 10 to 20 747s, at a billion and a half dollars apiece, and $100 million a year to operate. And there’s nobody in uniform that I know who believes that this is a workable concept.”
  • After $5 billion was spent, the functioning prototype only capable of being fired directly at nearby targets, a system very capable of acquisition and destruction of ground targets with no air defense protection only, was said to have been flown to a scrap yard. The plane itself is still there, at Davis Monthan Air Force Base, with other failed dreams and nightmares. However, the weapons system disappeared, only to reappear in Israel as a “missile defense” project, an adjunct to the “Iron Dome” system. Israel’s Rafael Defense had been trying to develop laser weapons on its own to intercept rockets being fired from Gaza. It was never able to neither deploy a laser powerful enough nor develop a radar system able to be effective.
  • ...5 more annotations...
  • “Friends of Israel,” within the US defense community were convinced by Israel that the system could be finished and deployed to protect Israel against a purported “missile onslaught” from Tehran. In truth, there was no such intention. Instead, as in the film “Real Genius,” the laser system was always intended to be deployed against ground targets, for terrorism and assassinations. The “delivery system,” a Boeing airliner configured for AWAC, electronic warfare or refueling, could easily be modified to “clone” commercial air traffic and attack targets thousands of miles away or as close as Gaza, Lebanon, Syria or Iraq with total impunity.
  • McLeod and Rogers, in The Law of War, examine the history of prohibition of incendiary weapons. Israel’s use of white phosphorous, intended as a “smoke market” as a corrosive anti-personnel weapon against civilian populations in Lebanon and Gaza skirts initial language, as cited below, in the St. Petersburg Declaration of 1868, but falls well short of evading later prohibition on the use of chemical agents. “The first treaty to deal with weapons was the St Petersburg Declaration of 1868. Here states were concerned about the development of explosive or incendiary bullets for use against the wagon trains of enemy forces. It was felt that these bullets might be used against enemy personnel15 and cause unnecessary injury. The Contracting Parties agreed ‘mutually to renounce, in case of war among themselves, the employment by their military or naval troops of any projectile of a weight below 400 grammes, which is either explosive or charged with fulminating or inflammable substances’.
  • The declaration does not seem to have affected the practice of states in using tracer for range finding, even mixed with normal ammunition, nor the use of small explosive projectiles for anti-aircraft and anti-material uses. It did not prevent states from using four pound, thermite-based incendiary bombs during the Second World War. These, obviously, were more than 400 grammes in weight. Furthermore it could be argued that they were not ‘projectiles’, a term that certainly would not include illuminating flares or smoke canisters.” The use of energy weapons for assassinations and terrorism had, prior to only a few short days ago, been subject of speculative fiction only. No one had imagined that a failed American weapons system would be pirated for deployment in acts of terrorism by a rogue state. A greater question arises, if this “failed system” costing many billions has been shipped off “in the dark of night” without public knowledge or official authorization for use in a criminal manner, what other systems may have been similarly pirated? There is conclusive evidence that W54/Davy Crocket nuclear weapons made their way to Israel after 1991 after an accident at Dimona is reputed to have made that facility useless for weapons development.
  • Similarly, when the Ukraine retired its “fleet” of SS21 tactical nuclear missiles, Israel took possession of the warheads, servicing their deuterium booster gas all these years to keep them ready for deployment. Intercepted communications between the Kiev junta and Israel now indicate that Israel is ready to “repatriate” some of these nuclear weapons to the Ukraine for use against pro-Russian separatists. Ukrainian leaders have spoken of the intent to deploy and use these nuclear weapons publicly on several recent occasions. From USA Today: “KIEV, Ukraine — Ukraine may have to arm itself with nuclear weapons if the United States and other world powers refuse to enforce a security pact that obligates them to reverse the Moscow-backed takeover of Crimea, a member of the Ukraine parliament told USA TODAY. ‘We gave up nuclear weapons because of this agreement,’ said Rizanenko, a member of the Udar Party headed by Vitali Klitschko, a candidate for president. ‘Now there’s a strong sentiment in Ukraine that we made a big mistake.’”
  • With the recent bombing of a UN refugee facility in Gaza, with the use of chemical and now energy weapons, with Israel’s planned sale of nuclear warheads to Ukraine, there is little more that could be done to establish Israel, not only as a rogue state, but as a “clear and present danger” to not only regional but global security as well. As Jim W. Dean of Veterans Today recently stated, “Their fingerprints are at every crime scene.”
Paul Merrell

iSpy: The CIA Campaign to Steal Apple's Secrets - 0 views

  • ESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.
  • The CIA declined to comment for this story. The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store. The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode. Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”
  • Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows. The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies. “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”
Paul Merrell

U.S. urges allies to think twice before joining China-led bank - Yahoo Finance - 0 views

  • (Reuters) - The United States urged countries on Tuesday to think twice about signing up to a new China-led Asian development bank that Washington sees as a rival to the World Bank, after Germany, France and Italy followed Britain in saying they would join. The concerted move by U.S. allies to participate in Beijing's flagship economic outreach project is a diplomatic blow to the United States and its efforts to counter the fast-growing economic and diplomatic influence of China. Europe's participation reflects the eagerness to partner with China's economy, the world's second largest, and comes amid prickly trade negotiations between Brussels and Washington.
  • European Union and Asian governments are frustrated that the U.S. Congress has held up a reform of voting rights in the International Monetary Fund that would give China and other emerging powers more say in global economic governance.
  • Washington insists it has not actively discouraged countries from joining the new bank, but it has questioned whether the Asian Infrastructure Investment Bank (AIIB) will have sufficient standards of governance and environmental and social safeguards. "I hope before the final commitments are made anyone who lends their name to this organization will make sure that the governance is appropriate," Treasury Secretary Jack Lew told U.S. lawmakers. Lew warned the Republican-dominated Congress that China and other rising powers were challenging American leadership in global financial institutions, and he urged lawmakers to swiftly ratify stalled reform of the IMF.
  • ...6 more annotations...
  • In a joint statement, the foreign and finance ministers of Germany, France and Italy said they would work to ensure the new institution "follows the best standards and practices in terms of governance, safeguards, debt and procurement policies." Luxembourg’s Finance Ministry confirmed the country, a big financial centre, has also applied to be a founding member of the $50 billion AIIB.
  • A spokeswoman for the European Commission, the EU's executive arm, endorsed member states' participation in the AIIB as a way of tackling global investment needs and as an opportunity for EU companies.
  • Lew told lawmakers that the U.S. delay in ratifying the agreement was undermining its credibility and influence as countries question the United States' commitment to international institutions. “It's not an accident that emerging economies are looking at other places because they are frustrated that, frankly, the United States has stalled a very mild and reasonable set of reforms in the IMF,” Lew said.
  • Some Republicans have complained the changes would cost too much at a time Washington is running big budget deficits. The reforms have also ran afoul of a growing isolationist trend among the party's influential Tea Party wing.
  • Washington says it sees a role for the IAAB given Asia's immense infrastructure needs and regards it as a potential partner for established institutions like the ADB. But its strategy of questioning the IAAB's standards has drawn criticism from some observers, who say the administration should have been more accepting of the new bank or offered alternatives within the existing institutions. "If you try to fight the rising power's peaceful ascent you sow big problems in the future," said Fred Bergsten, a former top international affairs official at the U.S. Treasury and currently a fellow at the Peterson Institute in Washington. Scott Morris, a former U.S. Treasury official who led U.S. engagement with the multilateral development banks during the first Obama administration, said Washington was paying the price for delay on IMF reform. "It's a clear sentiment among a pretty diverse group of countries: We would like to mobilize more capital for infrastructure through MDBs (multilateral development banks)," said Morris, now with the Washington-based Center for Global development. "And the U.S. stands in the way of that and now finds itself increasingly isolated as a result.”
  • Japan, Australia and South Korea remain notable regional absentees from the AIIB. Australian Prime Minister Tony Abbott said at the weekend he would make a final decision on membership soon. South Korea has said it is still in discussions with China and other countries about possible participation. Japan is unlikely to join the AIIB, but ADB head Takehiko Nakao told the Nikkei Asian Review that the two institutions were in discussions and could work together.
  •  
    Oh, man. Angela Merkel just hitched Germany's wagon to China's, which implictly means Russia's and the rest of BRICS too. Plus the European Commission, UK, France, Italy, and Luxembourg   Keep in mind that China will open its RMB trading centers in the major financial hubs in September and that the folks in Brussels are making noises about a European combined defense organization, independent of NATO anjd the U.S.   I want more information to be certain that there is more here than moves to create bargaining leverage with Washington, D.C.. but it might soon be time to buy a wheelbarrow to carry my walkabout spending money. Wow!
Paul Merrell

Controversies - Insurance Industry Adjusts to Earthquake Risk Caused by Fracking - AllGov - News - 0 views

  • In another sign that fracking is increasingly being acknowledged as a cause of earthquakes, the insurance industry has announced that it is now linking the controversial drilling procedure with seismic activity in establishing its rates. Before insurance companies set their rates for an upcoming year, they turn to the U.S. Geological Survey (USGS) for information on quake activity. Specifically, insurers look at the USGS’s National Seismic Hazard Map, which “predicts where future earthquakes will occur, how often they will occur and how strongly they will shake the ground,” according to the Dallas Morning News. But this map will now take into account earthquakes that occur within the vicinity of fracking wells, the USGS has decided. That means insurance rates may go up in some areas considered more at risk of seismic events because of fracking operations. Between the years 2010 and 2013, central and eastern United States had an average of five times as many quakes per year as between 1970 and 2000. Human activity, including fracking, has been cited by scientists as the cause, according to Dallas Morning News.
  • Last year, USGS connected a 5.7-magnitude quake in Oklahoma to that state’s robust fracking industry. “The observation that a human-induced earthquake can trigger a cascade of earthquakes, including a larger one, has important implications for reducing the seismic risk from wastewater injection,” USGS seismologist and coauthor of the study Elizabeth Cochran said at the time. More than 120 quakes have hit the Dallas area in the past six years, and scientists have cited the work performed at nearby fracking sites as the reason, according to Homeland Security News Wire. Even the Texas Oil & Gas Association agreed that some research into the nexus of fracking and quakes is called for. “The oil and natural gas industry agrees that recent seismic activity warrants robust investigation to determine the precise location, impact and cause or causes of seismic events,” Todd Staples, the association’s president, said in a statement. A study published in the Bulletin of the Seismological Society of America says fracking near Ohio’s Poland Township triggered a previously undiscovered fault. The result was more than 70 earthquakes ranging in magnitude of 2.1 to 3.0, the latter of which was described as “rare” by the experts.
  •  
    Yet another factor to contribute to the piercing of the shale oil bubble in the U.S. economy.The shale oil and gas industry in the U.S. is collapsing because its production costs can not result in profits when the price of oil is so low. Banksters have ended the flow of new well development funding. Shale oil development companies are going bankrupt by the dozens  and tens of thousands of shale oil workers have been laid off.  
Paul Merrell

Beltway Foreign Policy Groups to Congress: Stay Out of the Way on Iran! « LobeLog - 0 views

  • The November 24 deadline for Iran and world powers to reach an agreement on Iran’s nuclear program is quickly approaching.
  • If there is a deal on Nov. 24, the White House indicated, in an article authored by David E. Sanger in Sunday’s New York Times, that it would not seek an immediate vote on the agreement or sanctions relief, instead asserting that the administration can, and may need to, roll back some sanctions unilaterally as part of immediate sanctions relief guarantees in a possible agreement. Hawks in Congress may want to portray their position as representing the mainstream consensus but a letter signed by thirty-seven organizations and sent to members of Congress on Thursday offers some indication that many foreign policy groups in the beltway are concerned by Congress’ latest effort to meddle in the final weeks of sensitive diplomacy before the November deadline. The signatories—which include the Center for Arms Control and Non-Proliferation; J Street; MoveOn.org; the National Iranian American Council; Progressive Democrats of America; the United Methodist Church and VoteVets— expressed “deep concern with inaccurate and counterproductive rhetoric from a handful of Members of Congress regarding possible outcomes of the current negotiations.”
  • They continue: Particularly irresponsible are threats to oppose any comprehensive agreement limiting Iran’s nuclear program that initially suspends US sanctions on Iran through lawful executive action. Congress’ authorization of the President’s power to suspend and re-impose US sanctions on Iran is clear and unmistakable in each piece of legislation it has passed on the subject. Use of these provisions by the President to implement the initial phase of an agreement that ensures Iran does not acquire a nuclear weapon would reflect an affirmation, not a subversion, of Congress’ will. The echo chamber on Capitol Hill may give members of the House and Senate the impression that only the threat of military action or crushing sanctions are effective tools in bringing Iran to the negotiating table. (My colleague Ali Gharib and I discussed the disproportionate voice given to individuals from neoconservative organizations at congressional hearings on Iran in a July article in The Nation.)
  • ...1 more annotation...
  • But the letter sent out on Thursday might give some congressional Democrats pause. Congress may lean hawkish but progressive groups in the beltway are throwing their weight behind the White House’s efforts to reach a diplomatic agreement on Iran’s nuclear program and are urging Congress to stay out of the way.
  •  
    There's more behind this story than appears in its words. "Progressive" organizations have largely stood silent on the topic of war since Obama was elected because they are Obama fans and Obama has been anything but peaceful. But now they turn out because Obama needs Congress to stay out of the Iran situation until negotiations are complete and for some time afterward. The pressure on Congress to intervene is coming from the Israel Lobby. Keep in mind that it's been the consensus position of all 17 U.S. intelligence agencies for many years that Iran has no plans to create a nuclear weapon capability. Several Israeli intelligence and military leaders have said the same thing. The Iranian nukes myth is a propaganda theme of the ultra-right wing Israeli government leadership that has been used for several years in efforts to persuade the U.S. to invade Iran and bomb it back into the Stone Age. And their excuse for involving the U.S. military evaporates if the Obama Administration successfully negotiates an agreement with Iran that limits its lawful development of nuclear energy for peaceful purposes that will safeguard from any change of mind in Iran on development of nuclear weapons via, e.g., production limits and on-site inspections. The counter-argument is that such an agreement would have to be ratified by the Senate on grounds that it would be a treaty. But that argument falls short of the mark because: [i] the Executive has always had the unfettered right to negotiate and sign treaties; [ii] the U.S. government is not bound by treaties unless and until the Senate ratifies the treaty; and [iii] Congress already explicitly gave Obama authority to impose and suspend economic sanctions at his discretion. Meanwhile, part of the interim agreement with Iran so that negotiations can take place is a promise by the Obama Administration that it would veto any legislation imposing further sanctions on Iran during the period of negotiation. Because of the Israel Lobby'
« First ‹ Previous 41 - 60 of 761 Next › Last »
Showing 20 items per page