Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "Slides" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

US Intel Vets Dispute Russia Hacking Claims - Consortiumnews - 0 views

  • As the hysteria about Russia’s alleged interference in the U.S. election grows, a key mystery is why U.S. intelligence would rely on “circumstantial evidence” when it has the capability for hard evidence, say U.S. intelligence veterans. Veteran Intelligence Professionals for Sanity MEMORANDUM Allegations of Hacking Election Are Baseless A New York Times report on Monday alluding to “overwhelming circumstantial evidence” leading the CIA to believe that Russian President Vladimir Putin “deployed computer hackers with the goal of tipping the election to Donald J. Trump” is, sadly, evidence-free. This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking – by Russians or anyone else.
  • We have gone through the various claims about hacking. For us, it is child’s play to dismiss them. The email disclosures in question are the result of a leak, not a hack. Here’s the difference between leaking and hacking: Leak: When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did. Hack: When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data. All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it – and know both sender and recipient. In short, since leaking requires physically removing data – on a thumb drive, for example – the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.
  • These collection resources are extensive [see attached NSA slides 1, 2, 3, 4, 5]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network. Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources. The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network. The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked. The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.
  • ...1 more annotation...
  • As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking. For the Steering Group, Veteran Intelligence Professionals for Sanity (VIPS)
Paul Merrell

Israel's global standing continues to sink, top strategists say | The Electronic Intifada - 0 views

  • +
  • !Over Quota
  • !Over Quota
  • ...13 more annotations...
  • !Over Quota
  • +!Over Quota
  • +!Over Quota
  • +
  • +
  • +
  • +
  • Israel’s global standing is continuing to deteriorate, a new report from some of the country’s top strategists concludes. “Israel’s image in Western countries continues to decline, a trend that enhances the ability of hostile groups to engage in actions aimed at depriving Israel of moral and political legitimacy and launch boycotts,” the Institute for National Security Studies (INSS) at Tel Aviv University states in its 2016-2017 Strategic Survey for Israel. The 275-page report, authored by a who’s who of figures from Israel’s political, intelligence and military establishment, was presented on Monday to Israeli President Reuven Rivlin by INSS director Amos Yadlin, a former air force general and head of Israeli military intelligence. It notes in particular that “the international campaign to delegitimize Israel continues, as reflected in the BDS movement,” a reference to the growing Palestinian-led boycott, divestment and sanctions campaign. Israel habitually describes advocacy for full rights for Palestinians, or criticism of its abuses, as “delegitimization.” The report says that Israel’s “current right-wing government has contributed to this deterioration,” as have “anti-democratic legislative initiatives,” as well as international concerns about Israel’s “overreaction” to what it terms a “wave of terrorist attacks” by Palestinians.
  • +
  • According to the report, Israel’s efforts to compensate for its deteriorating relations with its traditional supporters, by bolstering ties with “non-democratic countries, especially Russia and China, are looked down upon in the international arena.” There is “no sign that [such countries] are willing to give Israel the political, scientific, technological and military support it receives from other countries, mainly the United States and some European countries,” the report states. This is particularly worrying for Israel given that the “status of the United States in the Middle East continues to weaken” as does its commitment to maintaining its hegemony in the Middle East, an alliance Israel relies on for ensuring its “power and deterrence.” “Despite good relations between Moscow and Jerusalem, Russia is not a substitute for security, political and economic support by the United States and the West,” the report concludes. While Israeli leaders expect close relations with the United States under President Donald Trump, the report warns that his administration is expected to “reinforce isolationist trends.” It also notes trends within the United States that threaten long-term support for Israel. During President Barack Obama’s term, “the notion that the two nations have ‘shared values,’ appears to have eroded with the perceived weakening of Israel’s democratic ethos.” Similarly, the report finds an “erosion” of the identification Jewish Americans feel with Israel, which is also “bound to have harmful repercussions for Israel.”
  • There is also polarization: conservative support for Israel remains strong, while liberals are increasingly ambivalent, displaying a “greater inclination to view the Palestinian plight as analogous to apartheid.” This sentiment, the report adds, is helping fuel the BDS movement, which is “now widespread on American campuses” and could affect US-Israel relations in the future.
  • Israel’s top strategists recognize that the stalemate with the Palestinians is a major contributor to the deterioration of Israel’s global standing. It is also an obstacle to fostering closer and more public ties with sectarian dictatorships like Saudi Arabia, whose publics still strongly support the Palestinian cause. While the INSS reports sees no realistic possibility of movement toward a two-state solution in the foreseeable future, its authors fear a continuing slide down a “slope leading toward a one-state reality” – a warning similar to that given by outgoing US Secretary of State John Kerry last month. But INSS has no new ideas for how to get Israel out of its predicament. Indeed the report tries to revive the concept of “unilateral separation” that was proposed by the governments of Ariel Sharon and Ehud Olmert more than a decade ago. The idea is to consolidate Israeli settlements in large parts of the occupied West Bank, pacify the Palestinian population through improved economic conditions and strengthen the Israeli-backed Palestinian Authority police-state regime to keep Palestinians under tight control. The separation would be cosmetic, however, since at all times Israel’s occupation forces and Shin Bet secret police would maintain “complete freedom of action” throughout the West Bank. Eventually, Israel might recognize a “Palestinian state within provisional borders” in up to 65 percent of the West Bank, while it effectively annexes large areas it has settled west of the separation wall it has built in the occupied territory.
  • The report acknowledges that “a severe humanitarian crisis already prevails in the Gaza Strip,” which has been under a decade-long Israeli blockade, supported by Egypt’s military rulers. This will inevitably lead to another major escalation of violence, unless something is done to alleviate the situation, the authors warn. That too could further erode Israel’s position. The INSS proposes such measures as building a port in Gaza and improving the infrastructure.
Paul Merrell

Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters - The Intercept - 0 views

  • Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution. The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous. One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
  • Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
  • In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.” “News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.” Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name. The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
  • ...2 more annotations...
  • The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges. In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens. The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)
  • It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”
  •  
    "... the Obama administration urged foreign allies to file criminal charges against Assange over the group's publication of the Afghanistan war logs." Sweden promptly launches an alleged rape investigation and Assange is forced by the UK courts to take refuge in the London embassy of Ecuador. Because of urging by the Obama administration aimed at chilling the the First Amendment rights of journalists. That should be grounds for impeachment.  
Paul Merrell

Ukraine: One 'Regime Change' Too Many? | Consortiumnews - 0 views

  • Russia’s parliament has approved President Putin’s request for the use of force inside neighboring Ukraine, as the latest neocon-approved “regime change” spins out of control and threatens to inflict grave damage on international relations, ex-CIA analyst Ray McGovern explains. By Ray McGovern Is “regime change” in Ukraine the bridge too far for the neoconservative “regime changers” of Official Washington and their sophomoric “responsibility-to-protect” (R2P) allies in the Obama administration? Have they dangerously over-reached by pushing the putsch that removed duly-elected Ukrainian President Viktor Yanukovych? Russian President Vladimir Putin has given an unmistakable “yes” to those questions – in deeds, not words. His message is clear: “Back off our near-frontier!”
  • Unless Obama is completely bereft of advisers who know something about Russia, it should have been a “known-known” (pardon the Rumsfeldian mal mot) that the Russians would react this way to a putsch removing Yanukovich. It would have been a no-brainer that Russia would use military force, if necessary, to counter attempts to use economic enticement and subversive incitement to slide Ukraine into the orbit of the West and eventually NATO. This was all the more predictable in the case of Ukraine, where Putin – although the bête noire in corporate Western media – holds very high strategic cards geographically, militarily, economically and politically.
  • Putin has many other cards to play and time to play them. These include sitting back and doing nothing, cutting off Russia’s subsidies to Ukraine, making it ever more difficult for Yanukovich’s successors to cope with the harsh realities. And Moscow has ways to remind the rest of Europe of its dependence on Russian oil and gas.
  • ...6 more annotations...
  • There is one huge difference between Prague in 1968 and Kiev 2014. The “Prague Spring” revolution led by Dubcek enjoyed such widespread spontaneous popular support that it was difficult for Russian leaders Leonid Brezhnev and Aleksey Kosygin to argue plausibly that it was spurred by subversion from the West. Not so 45-plus years later. In early February, as violent protests raged in the Ukrainian capital of Kiev and the White House professed neutrality, U.S. State Department officials were, in the words of NYU professor emeritus of Russian studies Stephen Cohen, “plotting a coup d’état against the elected president of Ukraine.” We know that thanks to neocon prima donna Victoria Nuland, now Assistant Secretary of State for European Affairs, who seemed intent on giving new dimension to the “cookie-pushing” role of U.S. diplomats. Recall the photo showing Nuland in a metaphor of over-reach, as she reached deep into a large plastic bag to give each anti-government demonstrator on the square a cookie before the putsch. More important, recall her amateurish, boorish use of an open telephone to plot regime change in Ukraine with a fellow neocon, U.S. Ambassador Geoffrey Pyatt. Crass U.S. interference in Ukrainian affairs can be seen (actually, better, heard) in an intercepted conversation posted on YouTube on Feb. 4.
  • There was a surreal quality to President Obama’s remarks, several hours after Russian (or pro-Russian) troops took control of key airports and other key installations in the Crimea, which is part of Ukraine, and home to a large Russian naval base and other key Russian military installations. Obama referred merely to “reports of military movements taken by the Russian Federation inside of Ukraine” and warned piously that “any violation of Ukraine’s sovereignty and territorial integrity would be deeply destabilizing.” That Obama chose the subjunctive mood – when the indicative was, well, indicated – will not be lost on the Russians. Here was Obama, in his typically lawyerly way, trying to square the circle, giving a sop to his administration’s neocon holdovers and R2P courtiers, with a Milquetoasty expression of support for the new-Nuland-approved government (citing Biden’s assurances to old whatshisname/yatshisname). While Obama stuck to the subjunctive tense, Prime Minister Yatsenyuk appealed to Russia to recall its forces and “stop provoking civil and military resistance in Ukraine.” Obama’s comments seemed almost designed to sound condescending – paternalistic, even – to the Russians. Already into his second paragraph of his scripted remarks, the President took a line larded with words likely to be regarded as a gratuitous insult by Moscow, post-putsch.
  • “We’ve made clear that they [Russian officials] can be part of an international community’s effort to support the stability of a united Ukraine going forward, which is not only in the interest of the people of Ukraine and the international community, but also in Russia’s interest.” By now, Russian President Vladimir Putin is accustomed to Obama, Secretary of State John Kerry, National Security Adviser Susan Rice, et al. telling the Kremlin where its interests lie, and I am sure he is appropriately grateful. Putin is likely to read more significance into these words of Obama: “The United States will stand with the international community in affirming that there will be costs for any military intervention in Ukraine … and we will continue to coordinate closely with our European allies.”
  • There are bound to be fissures in the international community and in the Western alliance on whether further provocation in Ukraine is advisable. Many countries have much to lose if Moscow uses its considerable economic leverage over natural gas supplies, for example. And, aspiring diplomat though she may be, Victoria Nuland presumably has not endeared herself to the EC by her expressed “Fuck the EC” attitude. Aside from the most servile allies of the U.S. there may be a growing caucus of Europeans who would like to return the compliment to Nuland. After all does anyone other than the most extreme neocon ideologue think that instigating a civil war on the border of nuclear-armed Russia is a good idea? Or that it makes sense to dump another economic basket case, which Ukraine surely is, on the EU’s doorstep while it’s still struggling to get its own economic house in order? Europe has other reasons to feel annoyed about the overreach of U.S. power and arrogance. The NSA spying revelations – that continue, just like the eavesdropping itself does – seem to have done some permanent damage to transatlantic relationships.
  • In any case, Obama presumably knows by now that he pleased no one on Friday by reading that flaccid statement on Ukraine. And, more generally, the sooner he realizes that – without doing dumb and costly things – he can placate neither the neocons nor the R2P folks (naively well meaning though the latter may be), the better for everyone. In sum, the Nulands of this world have bit off far more than they can chew; they need to be reined in before they cause even more dangerous harm. Broader issues than Ukraine are at stake. Like it or not, the United States can benefit from a cooperative relationship with Putin’s Russia – the kind of relationship that caused Putin to see merit last summer in pulling Obama’s chestnuts out of the fire on Syria, for example, and in helping address thorny issues with Iran.
  • Ray McGovern works with Tell the Word, a publishing arm of the ecumenical Church of the Saviour in inner-city Washington. His academic degrees are in Russian and he was an analyst of Russian foreign policy for the first decade of his 27-year career with the CIA.  He is now on the Steering Group of Veteran Intelligence Professionals for Sanity (VIPS).
  •  
    Former CIA Russian analyst Ray McGovern thinks the neocons bit off more than they can chew in the Ukraine. I hope they receive the blowback they so deeply deservie.
Paul Merrell

Michael Hayden talks to CNN about XKEYSCORE program. - 0 views

  • Does the NSA really operate a vast database that allows its analysts to sift through millions of records showing nearly everything a user does on the Internet, as was recently reported? Yes, and people should stop worrying and learn to love it, according former NSA chief Gen. Michael Hayden. Last week, the Guardian published a series of leaked documents revealing new details about an NSA surveillance program called XKEYSCORE. The newspaper said that the program enabled the agency to “search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals,” and secret slides dated 2008 showed how people could be deemed a target for searching the Web for “suspicious stuff” or by using encryption. Following the disclosures, Hayden appeared on CNN to discuss the agency’s surveillance programs. The general, who directed the NSA from 1999 through 2005, was remarkably candid in his responses to Erin Burnett’s questions about the Guardian’s XKEYSCORE report. Was there any truth to claims that the NSA is sifting through millions of browsing histories and able to collect virtually everything users do on the Internet? “Yeah,” Hayden said. “And it's really good news.”
  • Not only that, Hayden went further. He revealed that the XKEYSCORE was “a tool that's been developed over the years, and lord knows we were trying to develop similar tools when I was at the National Security Agency.” The XKEYSCORE system, Hayden said, allows analysts to enter a “straight-forward question” into a computer and sift through the “oceans of data” that have been collected as part of foreign intelligence gathering efforts. How this process works was illustrated in the Guardian’s report. Analysts can enter search terms to sift through data and select from a drop-down menu a target’s “foreignness factor,” which is intended to minimize the warrantless surveillance of Americans. However, operating a vast electronic dragnet such as this is far from an exact science, and the NSA’s system of sifting data from the backbone of international Internet networks likely sometimes involves gobbling up information on Americans’ communications and online activity—whether it is done wittingly or not. Indeed, the NSA reportedly only needs to have 51 percent certainty that it is targeting a foreigner. And as leaked secret rules for the surveillance have shown, even if the NSA does “inadvertently” gather Americans’ communications, it can hold on to them if they are deemed valuable for vague “foreign intelligence” purposes or if the communications show evidence of a crime that has occurred or may occur in the future.
  • In the CNN interview, Hayden described XKEYSCORE as “really quite an achievement” and said that it enabled NSA spies to find the needle in the haystack. But his ardent defense of the system is unlikely to reassure civil liberties advocates. Having Hayden’s support is a rather dubious stamp of approval, particularly because he was responsible for leading the NSA’s illegal warrantless wiretapping program, which was initiated post-9/11 and exposed by the New York Times in 2005. Hayden later went on to lead the CIA from 2006 through 2009, where he oversaw the use of the waterboarding torture technique and the operation of a controversial black-site prison program that was eventually dismantled by President Obama. The former NSA chief retired in 2009, but he has since become a regular media commentator, using a recent column at CNN to blast Snowden for leaking the secret NSA documents and implying that he’d like to see the Guardian journalist Glenn Greenwald prosecuted as a “co-conspirator” for his role reporting the surveillance scoops.
  •  
    Let's see, the entire U.S. military has been forbidden from reading The Guardian because the documents Edward Snowden leaked are still classified. But a former NSA chief can confirm their accuracy on CNN?  Surely, even as I write a grand jury is busy indicting him on Espionage Act charges? No? Smells like hypocrisy to me. 
Paul Merrell

Exposed: Google's "Smart Home" Surveillance Plans, or, How To Not Be Colonized | TBYP - 0 views

  • Two weeks ago, the New York Times’ truth-humor strip on “The Home of the Future” came on the heels of Google’s purchase of ‘smart thermostat’ manufacturer Nest for $3.2 Billion.  With power utility commissions such as California already stating their intention to “expand third-party access” to in-home data, the perfect storm is brewing for Google’s mission of making you their product – even in your own home. For context, this is the same Google whose executive chairman, Eric Schmidt, told MSNBC: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
  • So where does a ‘smart thermostat’ fit in the current corporatist drive for total in-home surveillance? For the last couple of years, utilities around the globe have all been touting their new metering systems with buzzwords such as ‘smart’, ‘advanced’, ‘upgraded’, or ‘modernized’.  All rhetoric aside, these devices are intended to integrate with all appliances in your home to form an inescapable wireless data-mining dragnet, dubbed as the “home area network”, with your HVAC and likely other in-home systems overseen by spy-giant Google, if they get their way. As we’ve seen, even former CIA director David Patraeus was publicly frothing over having the ability to spy through ‘smart’ appliances, intended to wirelessly report back to the meter continuously, while receiving energy-use dictates from the meter. According to a US Congressional Research Report:
  • “With smart meters, police will have access to data that might be used to track residents’ daily lives and routines while in their homes, including their eating, sleeping, and showering habits, what appliances they use and when, and whether they prefer the television to the treadmill, among a host of other details.” Smart grid planners and working groups have even laid these aims out in their internal roadmaps, citing goals such as “new tools for mining data and intel” and “data mining and analytics to become core competency” (see slide 17).
  • ...3 more annotations...
  • Despite pilot programs indicating no energy savings and mounting opposition now from several hundred activist groups, federal governments such as the US are continuing with their push to incentivize utilities to push forward ‘smart’ grid deployment. Apparently, having a piece of the $11 Billion taxpayer-funded ‘smart’ grid pie, pushed through by the Obama Administration immediately following the 2008 election, is sufficient motivation for utility executives to steamroll forward despite the growing resistance. As an example, PECO, a major utility in Pennsylvania, is slated to receive $200 Million in stimulus funding if they can deploy 600,000 ‘smart’ meters by April 2014. Significantly, anyone can choose to protect their in-home rights by saying no to the deployment of a ‘smart’ meter on their home.  There are no legal requirements in any country or region for an energy customer to accept a ‘smart’ meter.
  • So what can be done to protect rights?  While people cannot vote to prevent corporations from making products such as data-mining thermostats appliances, they do have a voice as utilities try their best to deploy the home-colonizing meters.  Public resistance to ‘smart’ meter deployments has predictably been considerable, as people are learning about not only surveillance capabilities, but also skyrocketing electricity costs, time-of-use billing, risk of fires, home hackability, electrical quality degradation and functional impairments from pulsed microwave radiation — amazingly, all being linked to the new utility metering system.
  • However, utilities are using tactics of intimidation, propaganda, and tacit acceptance – which means that unless you said a clear “no”, they assume a “yes.” In some cases even with a homeowner’s refusal, utilities are forcibly deploying anyway, apparently assuming the liability for doing so, risking litigation. So Google has played their hand with the $3.2 Billion purchase of Nest, desiring to capture the worldwide ‘smart’ home data-mining market, and praying to the all-spying-eye that people will stay tethered to their ‘smart’ wireless toys as their rights roll swiftly towards a cliff.  But will awareness eventually reach a game-changing crescendo?  It seems as though the potential exists. If we want to experience a future other than being ruled by technocrats, now is the time to speak up – even if facing the situation isn’t convenient.  People simply need to know the facts. As stated by former Apple executive Jeffrey Armstrong in our film Take Back Your Power, the question of whether homes will remain free of invasive ‘smart’ metering and appliance technology is “a test case for a technological democracy, if I have ever seen one.” 
Paul Merrell

NSA Whistleblower: Snowden Never Had Access to the "Juiciest" Intelligence Documents | Global Research - 0 views

  • NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping. Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:
  • He says the NSA started spying on President Obama when he was a candidate for Senate:
  • Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this. Washington’s Blog called Tice to find out more about what he saw when he was at NSA.
  • ...8 more annotations...
  • NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.] Does Snowden even have documents which contain the information which you’ve seen? RUSSELL TICE:  The answer is no. WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
  • RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden? Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing? They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.] Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” - Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way. I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.
  • Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS. And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance]. ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks. These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
  • It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency. When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up. There was no such thing beforehand. It was made up … to try to placate the American people. The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of. So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
  • Snowden’s Failure To Understand the Most Important Documents RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG. The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at. But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there. I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
  • Cheney Was Running the Show WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive]. Is that right … and if so, how do you know that? RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington. WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means? RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.
  • NSA Is Spying On CONTENT as Well as Metadata WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata? RUSSELL TICE: Of course it is. Of course. [Background. But see this.] NSA Spying On Journalists, Congress, Admirals, Lawyers … RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such. I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state. Or an Admiral and his wife, and his kids and his staffers …
  • The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else. These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.
  •  
    Whistleblower Russell Tice says that there are super-classified domestic surveillance records that Edward Snowden, Congressional oversight committees, and the NSA Inspector-General did not have access to. Must-read.
Paul Merrell

Hard choices: Hillary Clinton admits role in Honduran coup aftermath | Al Jazeera America - 0 views

  • The chapter on Latin America, particularly the section on Honduras, a major source of the child migrants currently pouring into the United States, has gone largely unnoticed. In letters to Clinton and her successor, John Kerry, more than 100 members of Congress have repeatedly warned about the deteriorating security situation in Honduras, especially since the 2009 military coup that ousted the country’s democratically elected President Manuel Zelaya. As Honduran scholar Dana Frank points out in Foreign Affairs, the U.S.-backed post-coup government “rewarded coup loyalists with top ministries,” opening the door for further “violence and anarchy.”
  • Despite this, however, both under Clinton and Kerry, the State Department’s response to the violence and military and police impunity has largely been silence, along with continued U.S. aid to Honduran security forces. In “Hard Choices,” Clinton describes her role in the aftermath of the coup that brought about this dire situation. Her firsthand account is significant both for the confession of an important truth and for a crucial false testimony. First, the confession: Clinton admits that she used the power of her office to make sure that Zelaya would not return to office. “In the subsequent days [after the coup] I spoke with my counterparts around the hemisphere, including Secretary [Patricia] Espinosa in Mexico,” Clinton writes. “We strategized on a plan to restore order in Honduras and ensure that free and fair elections could be held quickly and legitimately, which would render the question of Zelaya moot.” This may not come as a surprise to those who followed the post-coup drama closely. (See my commentary from 2009 on Washington’s role in helping the coup succeed here, here and here.) But the official storyline, which was dutifully accepted by most in the media, was that the Obama administration actually opposed the coup and wanted Zelaya to return to office.
  • The question of Zelaya was anything but moot. Latin American leaders, the United Nations General Assembly and other international bodies vehemently demanded his immediate return to office. Clinton’s defiant and anti-democratic stance spurred a downward slide in U.S. relations with several Latin American countries, which has continued. It eroded the warm welcome and benefit of the doubt that even the leftist governments in region offered to the newly installed Obama administration a few months earlier. Clinton’s false testimony is even more revealing. She reports that Zelaya was arrested amid “fears that he was preparing to circumvent the constitution and extend his term in office.” This is simply not true. As Clinton must know, when Zelaya was kidnapped by the military and flown out of the country in his pajamas on June 28, 2009, he was trying to put a consultative, nonbinding poll on the ballot to ask voters whether they wanted to have a real referendum on reforming the constitution during the scheduled election in November. It is important to note that Zelaya was not eligible to run in that election. Even if he had gotten everything he wanted, it was impossible for Zelaya to extend his term in office. But this did not stop the extreme right in Honduras and the United States from using false charges of tampering with the constitution to justify the coup.
  • ...1 more annotation...
  • In addition to her bold confession and Clinton’s embrace of the far-right narrative in the Honduran episode, the Latin America chapter is considerably to the right of even her own record on the region as secretary of state. This appears to be a political calculation. There is little risk of losing votes for admitting her role in making most of the hemisphere’s governments disgusted with the United States. On the other side of the equation, there are influential interest groups and significant campaign money to be raised from the right-wing Latin American lobby, including Floridian Cuban-Americans and their political fundraisers.
Paul Merrell

Core Secrets: NSA Saboteurs in China and Germany - The Intercept - 0 views

  • The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms. The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA.
  • with vast amounts of customer data, including phone records and email traffic. But documents published today by The Intercept suggest that even as the agency uses secret operatives to penetrate them, companies have also cooperated more broadly to undermine the physical infrastructure of the internet than has been previously confirmed. In addition to so-called “close access” operations, the NSA’s “core secrets” include the fact that the agency works with U.S. and foreign companies to weaken their encryption systems; the fact that the NSA spends “hundreds of millions of dollars” on technology to defeat commercial encryption; and the fact that the agency works with U.S. and foreign companies to penetrate computer networks, possibly without the knowledge of the host countries. Many of the NSA’s core secrets concern its relationships to domestic and foreign corporations.
  • Sentry Eagle includes six programs: Sentry Hawk (for activities involving computer network exploitation, or spying), Sentry Falcon (computer network defense), Sentry Osprey (cooperation with the CIA and other intelligence agencies), Sentry Raven (breaking encryption systems), Sentry Condor (computer network operations and attacks), and Sentry Owl (collaborations with private companies). Though marked as a draft from 2004, it refers to the various programs in language indicating that they were ongoing at the time, and later documents in the Snowden archive confirm that some of the activities were going on as recently as 2012.
  • ...3 more annotations...
  • The agency’s core secrets are outlined in a 13-page “brief sheet” about Sentry Eagle, an umbrella term that the NSA used to encompass its most sensitive programs “to protect America’s cyberspace.” “You are being indoctrinated on Sentry Eagle,” the 2004 document begins, before going on to list the most highly classified aspects of its various programs. It warns that the details of the Sentry Eagle programs are to be shared with only a “limited number” of people, and even then only with the approval of one of a handful of senior intelligence officials, including the NSA director. “The facts contained in this program constitute a combination of the greatest number of highly sensitive facts related to NSA/CSS’s overall cryptologic mission,” the briefing document states. “Unauthorized disclosure…will cause exceptionally grave damage to U.S. national security. The loss of this information could critically compromise highly sensitive cryptologic U.S. and foreign relationships, multi-year past and future NSA investments, and the ability to exploit foreign adversary cyberspace while protecting U.S. cyberspace.”
  • The most controversial revelation in Sentry Eagle might be a fleeting reference to the NSA infiltrating clandestine agents into “commercial entities.” The briefing document states that among Sentry Eagle’s most closely guarded components are “facts related to NSA personnel (under cover), operational meetings, specific operations, specific technology, specific locations and covert communications related to SIGINT enabling with specific commercial entities (A/B/C).” It is not clear whether these “commercial entities” are American or foreign or both. Generally the placeholder “(A/B/C)” is used in the briefing document to refer to American companies, though on one occasion it refers to both American and foreign companies. Foreign companies are referred to with the placeholder “(M/N/O).” The NSA refused to provide any clarification to The Intercept.
  • Documents: Sentry Eagle Brief Sheet (13 pages) TAREX Classification Guide (7 pages) Exceptionally Controlled Information Listing (6 pages) ECI WHIPGENIE Classification Guide (7 pages) ECI Pawleys Classification Guide (4 pages) ECI Compartments (4 pages) CNO Core Secrets Slide Slices (10 pages) CNO Core Secrets Security Structure (3 pages) Computer Network Exploitation Classification Guide (8 pages) CNO Core Secrets (7 pages)
Paul Merrell

Wikipedia takes feds to court over spying | TheHill - 0 views

  • The foundation behind Wikipedia is suing the U.S. government over spying that it says violates core provisions of the Constitution.The Wikimedia Foundation joined forces on Tuesday with a slew of human rights groups, The Nation magazine and other organizations in a lawsuit accusing the National Security Agency (NSA) and Justice Department of violating the constitutional protections for freedom of speech and privacy.
  • If successful, the lawsuit could land a crippling blow to the web of secretive spying powers wielded by the NSA and exposed by Edward Snowden nearly two years ago. Despite initial outrage after Snowden’s leaks, Congress has yet to make any serious reforms to the NSA, and many of the programs continue largely unchanged.The lawsuit targets the NSA’s “upstream” surveillance program, which taps into the fiber cables that make up the backbone of the global Internet and allows the agency to collect vast amounts of information about people on the Web.“As a result, whenever someone overseas views or edits a Wikipedia page, it’s likely that the N.S.A. is tracking that activity — including the content of what was read or typed, as well as other information that can be linked to the person’s physical location and possible identity,” Tretikov and Wikipedia founder Jimmy Wales wrote in a joint New York Times op-ed announcing the lawsuit. Because the operations are largely overseen solely by the secretive Foreign Intelligence Surveillance Court — which operates out of the public eye and has been accused of acting as a rubber stamp for intelligence agencies — the foundation accused the NSA of violating the guarantees of a fair legal system.In addition to the Wikimedia Foundation and The Nation, the other groups joining the lawsuit are the National Association of Criminal Defense Lawyers, Human Rights Watch, Amnesty International, the Pen American Center, the Global Fund for Women, the Rutherford Institute and the Washington Office on Latin America. The groups are being represented by the American Civil Liberties Union.
  • In 2013, a lawsuit against similar surveillance powers brought by Amnesty International was tossed out by the Supreme Court on the grounds that the organization was not affected by the spying and had no standing to sue. That decision came before Snowden’s leaks later that summer, however, which included a slide featuring Wikipedia’s logo alongside those of Facebook, Yahoo, Google and other top websites. That should be more than enough grounds for a successful suit, the foundation said. In addition to the new suit, there are also a handful of other outstanding legal challenges to the NSA’s bulk collection of Americans’ phone records, a different program that has inspired some of the most heated antipathy. Those suits are all pending in appeals courts around the country.
Paul Merrell

NSA Issues Non-Denial Denial Of Infiltrating Google & Yahoo's Networks | Techdirt - 0 views

  • While NSA boss Keith Alexander issued a misleading denial of this morning's report of how the NSA has infiltrated Yahoo and Google's networks by hacking into their private network connections between datacenters, the NSA has now come out with its official statement which is yet another typical non-denial denial. They deny things that weren't quite said while refusing to address the actual point:
  • Note what is missing from all of this. They do not deny hacking into the data center connection lines outside of the US. They do not deny getting access to all that data, especially on non-US persons. As for the claim that they're protecting the privacy of US persons, previous statements from Robert Litt, the general counsel for the Office of the Director of National Intelligence, have already made it clear that if they collect info on Americans, they're going to use this loophole to search them: "If we're validly targeting foreigners and we happen to collect communications of Americans, we don't have to close our eyes to that," Litt said. "I'm not aware of other situations where once we have lawfully collected information, we have to go back and get a warrant to look at the information we've already collected."
  • So, for all the claims that this kind of information will be "minimized," it certainly looks like they've already admitted they don't do that. Meanwhile, that Guardian article that has the NSA's response also has responses from the 3 other players in this drama. There's the UK's GCHQ, who apparently has partnered with the NSA in breaking into Google and Yahoo. It didn't want to say a damn thing: "We are aware of the story but we don't have any comment."
  • ...2 more annotations...
  • Google, however, was reasonably furious about this story. In a statement, Google's chief legal officer, David Drummond, said the company was "outraged" by the latest revelations. "We have long been concerned about the possibility of this kind of snooping, which is why we have continued to extend encryption across more and more Google services and links, especially the links in the slide," he said. "We do not provide any government, including the US government, with access to our systems. We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform."
  • Yahoo's response, unfortunately, was a lot more restrained and not particularly on point. "We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency." Yeah, but the story is how the NSA got around your security. Yahoo should be a lot angrier about this. One hopes that once the technical people talk to management, the company will realize just how bad this situation is. Hopefully, this means that Google and Yahoo will stop just focusing on getting more "transparency" out of the government concerning NSA surveillance, and will start taking a much more active role. This includes: (1) pushing back hard against government surveillance, including going to court to stop it and (2) building much more secure systems that cannot be easily compromised by the NSA.
Paul Merrell

Report: Russia to send marines to Syria - Yahoo! News - 0 views

  • Two Russian navy ships are completing preparations to sail to Syria with a unit of marines on a mission to protect Russian citizens and the nation's base there, a news report said Monday. The deployment appears to reflect Moscow's growing concern about Syrian President Bashar Assad's future.
  • The Interfax news agency quoted an unidentified Russian navy official as saying that the two amphibious landing vessels, Nikolai Filchenkov and Caesar Kunikov, will be heading shortly to the Syrian port of Tartus, but didn't give a precise date.
  • Each ship is capable of carrying up to 300 marines and a dozen tanks, according to Russian media reports. That would make it the largest known Russian troop deployment to Syria, signaling that Moscow is becoming increasingly uneasy about Syria's slide toward civil war. Interfax also quoted a deputy Russian air force chief as saying that Russia will give the necessary protection to its citizens in Syria. "We must protect our citizens," Maj.-Gen. Vladimir Gradusov was quoted as saying. "We won't abandon the Russians and will evacuate them from the conflict zone, if necessary." Asked whether the air force would provide air support for the navy squadron, Gradusov said they will act on orders.
  • ...4 more annotations...
  • Asked if the Pentagon is concerned about the plan, officials in Washington said it depends on the mission. They had no comment on the stated goal of protecting Russian citizens and the Russian military position there, something the U.S. would do in a foreign country if in a similar situation. "I think we'd leave it to the Russian Ministry of Defense to speak to their naval movements and their national security decision-making process," said Capt. John Kirby, a Pentagon spokesman, adding that it's not the business of the U.S. Defense Department to "endorse or disapprove of an internal mission like that."
  • What would greatly concern the U.S., he said, is if the Russian naval ships were taking weapons or sending people to support the Assad regime in its crackdown. "The secretary of defense (Leon Panetta) remains concerned about any efforts by external countries or external organizations to supply lethal arms to the Syrian regime so that they can turn around and use those to kill their own people," Kirby said.
  • Ta rtus is Russia's only naval base outside the former Soviet Union, serving Russian navy ships on missions to the Mediterranean and hosting an unspecified number of military personnel.
  • Opposition groups say more than 14,000 people have been killed since the Syrian uprising began in March 2011 with mostly peaceful protests against Assad's autocratic regime. But a ferocious government crackdown led many to take up arms, and the conflict is now an armed insurgency.
  •  
    The U.S. propaganda effort is in full bloom in this article rife with "Red Menace" Cold War overtones: "'The secretary of defense (Leon Panetta) remains concerned about any efforts by external countries or external organizations to supply lethal arms to the Syrian regime so that they can turn around and use those to kill their own people,' Kirby said." Even as the U.S. has decided to now do openly rather than through its Saudi and Qatari proxies? More than 14,000 killed in Syria since the "uprising" began? The U.N. reported about a week ago that its tool stands at 93,000, up from its previous figure of 80,000. The U.N. numbers are undoubtedly understated. They only count the dead whose names are reported to avoid duplicate counting. The nameless are ignored. "[T]he Syrian uprising began in March 2011 with mostly peaceful protests ..." Syria has been on the Israeli/Neocon hit list for many years as part of Israel's empirical ambitions, which requires destabilizing and  balkanizing surrounding nations. But the Syrian ambitions came to the fore after U.S. deployments to Iraq, Afghanistan, and Libya wound down and Israel, Qatar, and Saudi Arabia decided they wished to exploit large natural gas deposits in Qatar and off the Israeli coast via a pipeline through Syria to connect with an existing pipeline supplying the E.U. with a terminus in Turkey, all at the expense of an existing Russian monopoly on natural gas sales in the E.U. To boot, Syria is the ally of Iran, which is also on the Israeli hit list.  "[T]he conflict is now an armed insurgency."  Vocabulary please? "An insurgency is an armed rebellion against a constituted authority (for example, an authority recognized as such by the United Nations) when those taking part in the rebellion are not recognized as belligerents." It's not a rebellion; it is a proxy war against Syria being waged mostly by foreign mercenaries and jihadists. An "insurgency" is a military rebellion by citizens of the nation being
Paul Merrell

Energy companies planning more layoffs - Business Insider - 0 views

  • The oil crash is not over. For a few weeks, oil prices climbed and stabilized, and it looked as if the worst of the oil crash were finally ebbing away. After reaching the lows of the year in mid-March, West Texas Intermediate crude oil gained about 50%, steadily climbing, first back to $60 a barrel. But by the first week of July, oil had started to slide again until it finally crashed into a bear market, defined as 20% decline from recent highs. And now energy companies are saying the same things we heard months ago.
  • In a story on Sunday, The Wall Street Journal's Lynn Cook reported that with oil prices hitting new lows, US energy companies were planning to cut more jobs and sell more assets — the same tactics they employed to cope with the first wave of the crash.
  • Morgan Stanley thinks this could be the worst oil crash in 45 years
  • ...1 more annotation...
  • According to The Journal, the drilling giants Halliburton and Baker Hughes have now cut more than twice the number of jobs they disclosed in February — about 27,000 in total. And as we noted last week, Baker Hughes warned in its earnings release that it expected tough market conditions to continue "across all segments" for the rest of 2015. The company also did not forecast a rebound in oil prices.
Paul Merrell

Walker falls to 10th in Iowa in latest poll | TheHill - 0 views

  • Wisconsin Gov. Scott Walker's support in Iowa continues its free fall as fellow presidential hopefuls Donald Trump and Ben Carson remain ahead of the Republican pack by double digits, according to a new Quinnipiac University Poll. Walker, the former front-runner, tumbles to 10th place in the GOP presidential pack just two months after taking the top spot in the university’s July poll. Then, he had 18 percent support, compared to just 3 in the new poll.ADVERTISEMENTAs governor of a neighboring state, Walker had long been thought to be the presumptive leader in Iowa. But his support has steadily dropped since Trump entered the race in late June. The new numbers underscore the slide that Walker has seen across the board. He has dropped below former business executive Carly Fiorina for fifth place in the five most recent Iowa polls, just a hair above former Gov. Jeb Bush (Fla.). He’s in seventh place nationally and in the second presidential nominating state of New Hampshire. 
  • By contrast, outsiders Trump and Carson continue to have a dominant hold on the polls. Real estate mogul Trump showed 27 percent support, while retired neurosurgeon Carson received 21 percent, well ahead of Sen. Ted Cruz (Texas), who received 9 percent support.If Trump was not in the race, Carson is the second choice of a vast plurality of Trump voters, with 30 percent backing him. Cruz is the second choice of 11 percent of Trump voters.
Paul Merrell

New Data Reveals U.S. Far From Freest Country in the World - 0 views

  • According to the annual Economic Freedom of the World report, the United States has dropped to #16 in an index of economic freedom. The list, released by the Fraser Institute, ranks countries around the world by a number of different factors that include the size and scope of government: expenditures, taxes, enterprises, legal structure and security of property rights, access to sound money, freedom to trade internationally, and regulation of credit, labor, and business were all evaluated. The study also considered income levels and poverty rates. As the introduction of the study details:“The cornerstones of economic freedom are (1) personal choice, (2) voluntary exchange coordinated by markets, (3) freedom to enter and compete in markets, and (4) protection of persons and their property from aggression by others. Economic freedom is present when individuals are permitted to choose for themselves and engage in voluntary transactions as long as they do not harm the person or property of others.”At the top of the list was Hong Kong, followed by Singapore, New Zealand, Switzerland, United Arab Emirates, Mauritius, Jordan, Ireland, and Canada. The United Kingdom and Chile tied at #10. The United States followed behind at #16, continuing a downward trend that has grown for several years.
  • The report also noted that “Nowhere has the reversal of the rising trend in the economic freedom been more evident than in the United States. Throughout the period from 1970 to 2000, the United States ranked as the world’s freest OECD nation (generally the third freest economy overall behind only Hong Kong and Singapore). The chain-linked summary rating of the United States in 2000 was 8.65. By 2005, the US rating had slipped to 8.22. The slide has continued. The 7.73 chain-linked rating of the United States in 2013 was more than 0.9 of a unit lower than the 2000 rating. Thus, the decline in economic freedom in the United States has been more than three times greater than the average decline found in the OECD [emphasis added].”While the U.S. has never had a truly free economy, the new study makes it evident that Americans have far less economic freedom and opportunity than they did in the year 2000. Now that economic conditions are even worse in the U.S. than they were before, a culture of extreme economic control has taken over and exacerbated the growing recession — one that history may end up redesignating a depression.
Paul Merrell

UNHCR - Worldwide displacement hits all-time high as war and persecution increase - 0 views

  • Wars, conflict and persecution have forced more people than at any other time since records began to flee their homes and seek refuge and safety elsewhere, according to a new report from the UN refugee agency. UNHCR's annual Global Trends Report: World at War, released on Thursday (June 18), said that worldwide displacement was at the highest level ever recorded. It said the number of people forcibly displaced at the end of 2014 had risen to a staggering 59.5 million compared to 51.2 million a year earlier and 37.5 million a decade ago. The increase represents the biggest leap ever seen in a single year. Moreover, the report said the situation was likely to worsen still further. Globally, one in every 122 humans is now either a refugee, internally displaced, or seeking asylum. If this were the population of a country, it would be the world's 24th biggest.
  • "We are witnessing a paradigm change, an unchecked slide into an era in which the scale of global forced displacement as well as the response required is now clearly dwarfing anything seen before," said UN High Commissioner for Refugees António Guterres. Since early 2011, the main reason for the acceleration has been the war in Syria, now the world's single-largest driver of displacement. Every day last year on average 42,500 people became refugees, asylum seekers, or internally displaced, a four-fold increase in just four years.
Paul Merrell

Obama Visits Jamaica, Urges Caribbean Nations to Break from PetroCaribe | venezuelanalysis.com - 0 views

  • US President Barack Obama arrived today in Jamaica as part of an ongoing effort to persuade the island and its neighbors to reduce dependency on Venezuela’s bilateral PetroCaribe program.As the first active US president to visit Jamaica in 33 years, the primary goal of Mr. Obama’s trip will be to develop, in coordination with the World Bank, an investment plan in the Caribbean’s energy sector. Vice-president Joe Biden has alleged that PetroCaribe, founded by Hugo Chavez in 2005, is being used as a “tool of coercion” against the region by the South American nation. For almost a decade, Venezuela has shipped fuel to 18 nations in the Caribbean and Central America with favorable terms for payment, such as low-interest loans, while investing in community projects including hospitals, schools, highways, and homeless shelters.
  • Last week, the Bolivarian government, through the Petrocaribe initiative, donated US$16 million to help the government of St. Kitts and Nevis provide for former sugar industry workers.In January, Biden gathered Caribbean heads of state in Washington as part of his Caribbean Energy Security Initiative, which he claims is seeking clean energy solutions for small island governments. However, the focus of the event was less about environmentalism and more about breaking away from Venezuelan trade.“Whether it’s the Ukraine or the Caribbean, no country should be able to use natural resources as a tool of coercion against any other country,” he told the leaders in attendance.Last month, US Secretary of State John Kerry warned of “strategic damage” on Venezuela’s part which could cause “a serious humanitarian crisis in our region.”
  • According to a Miami Herald report published on March 26th, Venezuela has halved subsidized shipments of crude oil to Cuba and other PetroCaribe member nations from 400,000 barrels per day in 2012, to 200,000 barrels per day.The article, which claimed to cite a Barclay’s Bank report, has since been refuted by the Venezuelan government. Venezuelan Foreign Affairs Minister Delcy Rodriguez insisted last week that the information was “not true,” and was being published in a concerted effort to discredit PetroCaribe.
  • ...1 more annotation...
  • Maintaining that the organization remains “pretty strong” despite sliding oil prices and a contracting economy, Rodriguez said a “war” is being waged against the socialist program, because it “brings solutions to poor people.”
  •  
    It seems the banksters are truly upset with Venezuela's leaders for failure to be in hock to the IMF and for spreading their natural resoices and wealth amongst the poor. 
Gary Edwards

Obama Downgrade: The Guns of August - 2 views

The world is upside down with the USA credit rating downgrade. Gold surges over $1700 per oz. The stock market continues it's downward spiral, now in free fall. The Federal Reserve Bankster Carte...

Obama-downgrade Cut-Cap-Balance Ryan-Budget Tea-Party-Patriots financial-collapse

started by Gary Edwards on 08 Aug 11 no follow-up yet
Paul Merrell

A Short Guide to the Internet's Biggest Enemies | Electronic Frontier Foundation - 0 views

  • Reporters Without Borders (RSF) released its annual “Enemies of the Internet” index this week—a ranking first launched in 2006 intended to track countries that repress online speech, intimidate and arrest bloggers, and conduct surveillance of their citizens.  Some countries have been mainstays on the annual index, while others have been able to work their way off the list.  Two countries particularly deserving of praise in this area are Tunisia and Myanmar (Burma), both of which have stopped censoring the Internet in recent years and are headed in the right direction toward Internet freedom. In the former category are some of the world’s worst offenders: Cuba, North Korea, China, Iran, Saudi Arabia, Vietnam, Belarus, Bahrain, Turkmenistan, Syria.  Nearly every one of these countries has amped up their online repression in recent years, from implementing sophisticated surveillance (Syria) to utilizing targeted surveillance tools (Vietnam) to increasing crackdowns on online speech (Saudi Arabia).  These are countries where, despite advocacy efforts by local and international groups, no progress has been made. The newcomers  A third, perhaps even more disheartening category, is the list of countries new to this year's index.  A motley crew, these nations have all taken new, harsh approaches to restricting speech or monitoring citizens:
  • United States: This is the first time the US has made it onto RSF’s list.  While the US government doesn’t censor online content, and pours money into promoting Internet freedom worldwide, the National Security Agency’s unapologetic dragnet surveillance and the government’s treatment of whistleblowers have earned it a spot on the index. United Kingdom: The European nation has been dubbed by RSF as the “world champion of surveillance” for its recently-revealed depraved strategies for spying on individuals worldwide.  The UK also joins countries like Ethiopia and Morocco in using terrorism laws to go after journalists.  Not noted by RSF, but also important, is the fact that the UK is also cracking down on legal pornography, forcing Internet users to opt-in with their ISP if they wish to view it and creating a slippery slope toward overblocking.  This is in addition to the government’s use of an opaque, shadowy NGO to identify child sexual abuse images, sometimes resulting instead in censorship of legitimate speech.
Paul Merrell

Exclusive: New document details America's war machine - and secret mass of contractors in Afghanistan - Salon.com - 0 views

  • What is a huge army of private contractors secretly doing in Afghanistan? A leaked PowerPoint presentation explains
  • On Tuesday, following his surprise Memorial Day visit to Bagram Air Force Base outside Kabul, President Obama announced that the United States plans to keep at least 9,800 U.S. troops in Afghanistan until 2016, further delaying the end of what he calls “America’s longest war.”But in his remarks at the White House, the president didn’t say that the nearly 10,000 U.S. troops he’s asking to remain in an “advisory role” will be augmented by a huge army of private contractors. As they have in Iraq, contractors will vastly outnumber the U.S. uniformed forces training Afghan troops as well as the special operations forces providing counterterrorism operations against what the president called “the remnants of al-Qaida.”The role of contractors in the Afghanistan war is spelled out in a document obtained by Salon from SAIC, one of the nation’s largest military and intelligence contractors. The document, an unclassified PowerPoint presentation, shows exactly how contractors have been used in that war since 2009, when Obama endorsed a surge of 33,000 troops and a counterinsurgency strategy in the war against the Taliban. Those policies increased the U.S. presence in Afghanistan to more than 100,000 troops.
  • One of the PowerPoint slides defines the four “mission areas” of the company’s five-year, $400 million contract with the U.S. Army Research Laboratory, which provides contracted services to other combat commands, special forces and other parts of the U.S. military. They are “Expeditionary Warfare; Irregular Warfare; Special Operations; Stabilization and Reconstruction Operations.”There, in black and white, is proof positive of how deeply contractors have penetrated the U.S. war machine.“We’ve already taken public functions and privatized them,” said Lawrence Wilkerson, a retired U.S. Army colonel who was the chief of staff to Secretary of State Colin Powell during the Bush administration, in a recent interview with Salon. “But this is an example of privatizing the ultimate public function, war.”
  • ...1 more annotation...
  • I passed this exchange by a former high-ranking general who served in Afghanistan and later worked as a U.S. diplomat. “That makes my eyes water,” he said. The companies involved in the ARL contract, he explained, represent “an entirely new set of actors” who have come to prominence during the wars in Iraq and Afghanistan.Under the new plan for Afghanistan, which the president is outlining in a speech Wednesday at West Point, U.S. forces will no longer be involved in direct combat after 2015 with the exception of counterterrorism operations directed against the Taliban and remnants of al-Qaida. Those operations would undoubtedly be led by the U.S. Special Forces Command, which is expected to retain a large presence in Afghanistan long after the last regular troops have left.And, clearly, thousands of contractors.
« First ‹ Previous 41 - 60 of 73 Next ›
Showing 20 items per page