Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "if" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gary Edwards

Jobs Depend on Obamacare Defeat | Cato Institute - 0 views

  • The Affordable Care Act authorizes the disputed “employer mandate” penalties and the health insurance subsidies that trigger them, only through insurance exchanges that are “established by the State.” Due to public opposition to Obamacare, at least 34 states, including Virginia, Utah and Indiana, failed to establish exchanges. Those states are being served — if that’s the word — by HealthCare.Gov, an exchange established by the federal government, which is clearly not a “State.” Ignoring the clear and unambiguous language of the statute, the IRS somehow decided to deploy the disputed taxes and spending in HealthCare.Gov states. Two lower courts found that Obamacare itself “unambiguously forecloses” the IRS’ “invalid” misinterpretation of the law. The plaintiffs in King v. Burwell represent Kevin Pace and tens of millions of other Americans who are injured by this breathtaking power grab.
  • If the King plaintIffs prevail before the Supreme Court, it will mean more jobs, more hours and higher incomes for millions of Americans — particularly part-time and minimum-wage workers. Employers will have more flexibility to structure their health benefits. States will be able to attract new businesses by shielding employers from Obamacare’s employer mandate. Critics complain such a ruling would eliminate subsidies in HealthCare.gov states, making the cost of Obamacare coverage transparent to enrollees. But those enrollees will be able to switch to lower-cost “catastrophic” plans — If the Obama administration allows it. To date, the administration has adamantly refused to say whether it would take even this small step to help affected HealthCare.gov enrollees.
  • More important, transparency is a good thing. If enrollees don’t want to pay the full cost of Obamacare coverage, that tells us something very important about Obamacare. It means nobody likes the way Obamacare actually works. Forcing the IRS to implement the law as written will thus create an opportunity for real health care reforms that actually reduce the cost of care. Reining in the IRS would affirm the rule of law, and lead to real health care reform. We should all hope for such an outcome.
  •  
    "By Michael F. Cannon This article appeared on USA Today on March 4, 2015. As if Obamacare weren't problematic enough, two federal courts have found that the IRS unlawfully expanded the health care law's individual and employer mandates, by imposing them on tens of millions of Americans whom Congress exempted. On Wednesday, the Supreme Court will hear King v. Burwell, a case challenging that illegal and ongoing attempt to expand Obamacare outside the legislative process. The victims of this illegal Obamacare expansion include Kevin Pace, a jazz musician and adjunct professor of music in Northern Virginia. Anticipating the Obamacare mandate that employers cover all workers who put in at least 30 hours a week, Pace's employer was forced to cut hours for part-time professors like him in order to avoid massive penalties. In 2013, The Washington Post reported that Pace was left with "an $8,000 pay cut." "Thousands of other workers in Virginia" also had their hours cut. Even though the Obama administration has delayed the employer mandate, many employers have left the cuts in place for when the rules are enforced. " King v. Burwell is about more than IRS rules; it could kill the employer mandate, too." This unlawful expansion of Obamacare's employer mandate is causing workers across the country to lose more income with every passing day. It forced Utah's Granite School District to cut hours for 1,200 part-timers. According to the state of Indiana, which filed a similar legal challenge, this IRS power grab pushed "many Indiana public school corporations (to) reduc(e) the working hours of instructional aides, substitute teachers, non-certified employees, cafeteria staff, bus drivers, coaches and leaders of extracurricular activities." Employers and consumers are also suffering. Pace's employer, for example, has less flexibility to structure its health benefits and less ability to offer attractive educational options to its stude
Paul Merrell

NZ Prime Minister John Key Retracts Vow to Resign if Mass Surveillance Is Shown - 0 views

  • In August 2013, as evidence emerged of the active participation by New Zealand in the “Five Eyes” mass surveillance program exposed by Edward Snowden, the country’s conservative Prime Minister, John Key, vehemently denied that his government engages in such spying. He went beyond mere denials, expressly vowing to resign if it were ever proven that his government engages in mass surveillance of New Zealanders. He issued that denial, and the accompanying resignation vow, in order to reassure the country over fears provoked by a new bill he advocated to increase the surveillance powers of that country’s spying agency, Government Communications Security Bureau (GCSB) — a bill that passed by one vote thanks to the Prime Minister’s guarantees that the new law would not permit mass surveillance.
  • Since then, a mountain of evidence has been presented that indisputably proves that New Zealand does exactly that which Prime Minister Key vehemently denied — exactly that which he said he would resign if it were proven was done. Last September, we reported on a secret program of mass surveillance at least partially implemented by the Key government that was designed to exploit the very law that Key was publicly insisting did not permit mass surveillance. At the time, Snowden, citing that report as well as his own personal knowledge of GCSB’s participation in the mass surveillance tool XKEYSCORE, wrote in an article for The Intercept: Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. . . . The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks.
  • A series of new reports last week by New Zealand journalist Nicky Hager, working with my Intercept colleague Ryan Gallagher, has added substantial proof demonstrating GCSB’s widespread use of mass surveillance. An article last week in The New Zealand Herald demonstrated that “New Zealand’s electronic surveillance agency, the GCSB, has dramatically expanded its spying operations during the years of John Key’s National Government and is automatically funnelling vast amounts of intelligence to the US National Security Agency.” Specifically, its “intelligence base at Waihopai has moved to ‘full-take collection,’ indiscriminately intercepting Asia-Pacific communications and providing them en masse to the NSA through the controversial NSA intelligence system XKeyscore, which is used to monitor emails and internet browsing habits.” Moreover, the documents “reveal that most of the targets are not security threats to New Zealand, as has been suggested by the Government,” but “instead, the GCSB directs its spying against a surprising array of New Zealand’s friends, trading partners and close Pacific neighbours.” A second report late last week published jointly by Hager and The Intercept detailed the role played by GCSB’s Waihopai base in aiding NSA’s mass surveillance activities in the Pacific (as Hager was working with The Intercept on these stories, his house was raided by New Zealand police for 10 hours, ostensibly to find Hager’s source for a story he published that was politically damaging to Key).
  • ...6 more annotations...
  • That the New Zealand government engages in precisely the mass surveillance activities Key vehemently denied is now barely in dispute. Indeed, a former director of GCSB under Key, Sir Bruce Ferguson, while denying any abuse of New Zealander’s communications, now admits that the agency engages in mass surveillance.
  • Meanwhile, Russel Norman, the head of the country’s Green Party, said in response to these stories that New Zealand is “committing crimes” against its neighbors in the Pacific by subjecting them to mass surveillance, and insists that the Key government broke the law because that dragnet necessarily includes the communications of New Zealand citizens when they travel in the region.
  • So now that it’s proven that New Zealand does exactly that which Prime Minister Key vowed would cause him to resign if it were proven, is he preparing his resignation speech? No: that’s something a political official with a minimal amount of integrity would do. Instead — even as he now refuses to say what he has repeatedly said before: that GCSB does not engage in mass surveillance — he’s simply retracting his pledge as though it were a minor irritant, something to be casually tossed aside:
  • When asked late last week whether New Zealanders have a right to know what their government is doing in the realm of digital surveillance, the Prime Minister said: “as a general rule, no.” And he expressly refuses to say whether New Zealand is doing that which he swore repeatedly it was not doing, as this excellent interview from Radio New Zealand sets forth: Interviewer: “Nicky Hager’s revelations late last week . . . have stoked fears that New Zealanders’ communications are being indiscriminately caught in that net. . . . The Prime Minister, John Key, has in the past promised to resign if it were found to be mass surveillance of New Zealanders . . . Earlier, Mr. Key was unable to give me an assurance that mass collection of communications from New Zealanders in the Pacific was not taking place.” PM Key: “No, I can’t. I read the transcript [of former GCSB Director Bruce Ferguson’s interview] – I didn’t hear the interview – but I read the transcript, and you know, look, there’s a variety of interpretations – I’m not going to critique–”
  • Interviewer: “OK, I’m not asking for a critique. Let’s listen to what Bruce Ferguson did tell us on Friday:” Ferguson: “The whole method of surveillance these days, is sort of a mass collection situation – individualized: that is mission impossible.” Interviewer: “And he repeated that several times, using the analogy of a net which scoops up all the information. . . . I’m not asking for a critique with respect to him. Can you confirm whether he is right or wrong?” Key: “Uh, well I’m not going to go and critique the guy. And I’m not going to give a view of whether he’s right or wrong” . . . . Interviewer: “So is there mass collection of personal data of New Zealand citizens in the Pacific or not?” Key: “I’m just not going to comment on where we have particular targets, except to say that where we go and collect particular information, there is always a good reason for that.”
  • From “I will resign if it’s shown we engage in mass surveillance of New Zealanders” to “I won’t say if we’re doing it” and “I won’t quit either way despite my prior pledges.” Listen to the whole interview: both to see the type of adversarial questioning to which U.S. political leaders are so rarely subjected, but also to see just how obfuscating Key’s answers are. The history of reporting from the Snowden archive has been one of serial dishonesty from numerous governments: such as the way European officials at first pretended to be outraged victims of NSA only for it to be revealed that, in many ways, they are active collaborators in the very system they were denouncing. But, outside of the U.S. and U.K. itself, the Key government has easily been the most dishonest over the last 20 months: one of the most shocking stories I’ve seen during this time was how the Prime Minister simultaneously plotted in secret to exploit the 2013 proposed law to implement mass surveillance at exactly the same time that he persuaded the public to support it by explicitly insisting that it would not allow mass surveillance. But overtly reneging on a public pledge to resign is a new level of political scandal. Key was just re-elected for his third term, and like any political official who stays in power too long, he has the despot’s mentality that he’s beyond all ethical norms and constraints. But by the admission of his own former GCSB chief, he has now been caught red-handed doing exactly that which he swore to the public would cause him to resign if it were proven. if nothing else, the New Zealand media ought to treat that public deception from its highest political official with the level of seriousness it deserves.
  •  
    It seems the U.S. is not the only nation that has liars for head of state. 
Paul Merrell

State department designates German rapper turned Islamic State 'operative' - The Long War Journal - 0 views

  • The State Department announced today that Denis Cuspert, a German member of the Islamic State, has been added to the US government's list of specially designated global terrorists. Cuspert previously performed as a rapper, going by the name of Deso Dogg, and even briefly toured with the popular American performer known as DMX. Some of Cuspert's music is still available for purchase in the US and elsewhere online. However, State explains that as a result of his designation as a terrorist "all property subject to US jurisdiction in which Cuspert has any interest is blocked and US persons are prohibited from engaging in transactions with him or to his benefit." US citizens cannot, therefore, legally purchase his rap songs online if he receives proceeds from the sale. According to State, Cuspert is "a foreign terrorist fighter and operative for ISIL," or the Islamic State of Iraq and the Levant. (The group calls itself the Islamic State, but the US government refers to it by the acronym of its previous name, or ISIL.) "Cuspert joined ISIL in 2012 and has appeared in numerous videos on its behalf, the most recent dating from early November, in which he appears holding a severed head he claims belongs to a man executed for opposing ISIL." Cuspert, who is 39 years old, "spent time in jail for various offensives" in Germany before traveling to Syria. He is still "wanted by the German government on suspicion of involvement in terrorist activities in his home country."
  • There has been some controversy over whether or not Cuspert is really alive. He has been reported dead in the past. Some of the confusion is owed to Cuspert's nom de guerre, Abu Talha al Almani, which has been used by other Islamic State jihadists, including one who was killed in Syria last year.
  •  
    There are some obvious first amendment issues with banning the purchase of music, magnified when the music carries a political message. Where, as here, the purpose is not to regulate speech but has an incidental effect on speech, the restriction will be upheld only "if it is within the constitutional power of the Government; if it furthers an important or substantial governmental interest; if the governmental interest is unrelated to the suppression of free expression; and if the incidental restriction on alleged First Amendment freedoms is no greater than is essential to the furtherance of that interest." United States v. O'Brien, 391 U.S. 367, 377 (U.S. 1968).  There is a strong argument here that the State Department is not using the least restrictive means of blocking Cuspert's income from sale of his music, i.e., the government could instead leavy against Cuspert's share of the revenue from the recording studio.  I presume that either the studio or citizens who wish to purchase Cuspert's music would have standing to mount such a legal challenge. The argument would basically be that the statute and regulation are overbroad as applied to activity protected by the First Amended. A First Amendment "as applied" challenge leaves the court with discretition to leave the statute and regualtion unchanged, but judicially create an exception. 
Paul Merrell

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [if you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. if you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Just Security - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. if and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

Erdogan Says Will Resign If Oil Purchases From ISIS Proven After Putin Says Has "More Proof" | Zero Hedge - 0 views

  • “I’ve shown photos taken from space and from aircraft which clearly demonstrate the scale of the illegal trade in oil and petroleum products,” Vladimir Putin told reporters earlier this month on the sidelines of the G-20 summit in Antalya. Putin was of course referencing Islamic State’s illicit and highly lucrative oil trade, the ins and outs of which we’ve documented extensively over the past two weeks: The Most Important Question About ISIS That Nobody Is Asking Meet The Man Who Funds ISIS: Bilal Erdogan, The Son Of Turkey's President How Turkey Exports ISIS Oil To The World: The Scientific Evidence ISIS Oil Trade Full Frontal: "Raqqa's Rockefellers", Bilal Erdogan, KRG Crude, And The Israel Connection Turkey’s move to shoot down a Russian Su-24 warplane near the Syrian border afforded the Russian President all the motivation and PR cover he needed to expose Ankara’s alleged role in the trafficking of illegal crude from Iraq and Syria and in the aftermath of last Tuesday’s “incident,” Putin lambasted Erdogan. “Oil from Islamic State is being shipped to Turkey,” Putin said while in Jordan for a meeting with King Abdullah. In case that wasn’t clear enough, Putin added this: “Islamic State gets cash by selling oil to Turkey.”
  • To be sure, it’s impossible to track the path ISIS oil takes from extraction to market with any degree of precision. That said, it seems that Islamic State takes advantage of the same network of smugglers, traders, and shipping companies that the KRG uses to transport Kurdish crude from Kurdistan to the Turkish port of Ceyhan. From there, the oil makes its way to Israel and other markets (depending on which story you believe) and if anyone needs to be thrown off the trail along the way, there’s a ship-to-ship transfer trick that can be executed off the coast of Malta. The maneuver allegedly makes the cargoes more difficult to track.  Some believe Erdogan’s son Bilal - who owns a marine transport company called BMZ Group - is heavily involved in the trafficking of Kurdish and ISIS crude. Most of the ships BMZ owns are Malta-flagged.  In light of the above, some have speculated that Turkey shot down the Su-24 in retaliation for Russia’s bombing campaign that recently has destroyed over 1,000 ISIS oil trucks. Here’s what Syrian Information Minister Omran al-Zoub said on Friday:
  • “All of the oil was delivered to a company that belongs to the son of Recep [Tayyip] Erdogan. This is why Turkey became anxious when Russia began delivering airstrikes against the IS infrastructure and destroyed more than 500 trucks with oil already. This really got on Erdogan and his company’s nerves. They’re importing not only oil, but wheat and historic artefacts as well." Al-Zoub isn’t alone in his suspicions. In an interview with RT, Iraqi MP and former national security adviser, Mowaffak al Rubaie - who personally led Saddam to the gallows - said ISIS is selling around $100 million of stolen crude each month in Turkey. Here are some excerpts:  “In the last eight months ISIS has managed to sell ... $800 million dollars worth of oil on the black market of Turkey. This is Iraqi oil and Syrian oil, carried by trucks from Iraq, from Syria through the borders to Turkey and sold ...[at] less than 50 percent of the international oil price."   "Now this either get consumed inside, the crude is refined on Turkish territory by the Turkish refineries, and sold in the Turkish market. Or it goes to Jihan and then in the pipelines from Jihan to the Mediterranean and sold to the international market.”
  • ...4 more annotations...
  • Hilariously, the man who just finished starting a civil war just so he could regain a few lost seats in Parliament and who would just as soon throw you in jail as look at you if he thinks you might be a threat to his government, now says he will resign if Putin (or anyone else) can present "proof": “We are not that dishonest as to buy oil from terrorists. if it is proven that we have, in fact, done so, I will leave office. if there is any evidence, let them present it, we’ll consider [it]."  Hold your breath on that. And so, the Turkey connection has been exposed and in dramatic fashion. Unfortunately for Ankara, Erdogan can't arrest Vladimir Putin like he can award winning journalists and honest police officers who, like Moscow, want to see the flow of money and weapons to Sunni militants in Syria cut off.  The real question is how NATO will react now that Turkey is quickly becoming a liability. Furthermore, you can be sure that the US, Saudi Arabia, and Qatar (who are all heavily invested in the Sunni extremist cause in Syria), are getting nervous. No one wants to see this blown wide open as that would mean the Western public getting wise to the fact that it is indeed anti-ISIS coalition governments that are funding and arming not only ISIS, but also al-Nusra and every other rebel group fighting to wrest control of the country from Assad. Worse, if it gets out that the reason the US has refrained from bombing ISIS oil trucks until now is due to the fact that Ankara and Washington had an understanding when it comes to the flow of illicit crude to Cehyan, the American public may just insist on indicting "some folks." 
  • On Monday, Putin was back at it, saying that Russia has obtained new information that further implicates Turkey in the Islamic State oil trade. “At the moment we have received additional information confirming that that oil from the deposits controlled by Islamic State militants enters Turkish territory on industrial scale," Putin said on the sidelines of the climate change summit in Paris. "We have traced some located on the territory of the Turkish Republic and living in regions guarded by special security services and police that have used the visa-free regime to return to our territory, where we continue to fight them." "We have every reason to believe that the decision to down our plane was guided by a desire to ensure security of this oil’s delivery routes to ports where they are shipped in tankers," he added, taking it up another notch still.  As for Erdogan, well, he "can't accept" the accusations which he calls "not moral": ERDOGAN: TURKEY CAN'T ACCEPT RUSSIA CLAIMS THAT IT BUYS IS OIL LATEST - Erdo?an: Russia’s claim that Turkey bought oil from Daesh is not ‘moral’, such claims have to be proved pic.twitter.com/PZka8MwzpL — DAILY SABAH (@DailySabah) November 30, 2015
  • lars generated by selling Iraqi and Syrian oil on the Turkish black market  is like the oxygen supply to ISIS and it’s operation,” he added. “Once you cut the oxygen then ISIS will suffocate.”   "There isn't a shadow of a doubt that the Turkish government knows about the oil smuggling operations. The merchants, the businessmen [are buying oil] in the black market in Turkey under the noses – under the auspices if you like – of the Turkish intelligence agency and the Turkish security apparatus."   “There are security officers who are sympathizing with ISIS in Turkey. They are allowing them to go from Istanbul to the borders and infiltrate ... Syria and Iraq.”   “There is no terrorist organization which can stand alone, without a neighboring country helping it – in this case Turkey.”
  • Remember, when it comes to criminal conspiracies, the guy who gets caught first usually ends up getting cut loose. It will be interesing to see if Erdogan starts to get the cold shoulder from Ankara's "allies" going forward.
Paul Merrell

Google will 'de-rank' RT articles to make them harder to find - Eric Schmidt - RT World News - 0 views

  • Eric Schmidt, the Executive Chairman of Google’s parent company Alphabet, says the company will “engineer” specific algorithms for RT and Sputnik to make their articles less prominent on the search engine’s news delivery services. “We are working on detecting and de-ranking those kinds of sites – it’s basically RT and Sputnik,” Schmidt said during a Q & A session at the Halifax International Security Forum in Canada on Saturday, when asked about whether Google facilitates “Russian propaganda.”
  • “We are well of aware of it, and we are trying to engineer the systems to prevent that [the content being delivered to wide audiences]. But we don’t want to ban the sites – that’s not how we operate.”The discussion focused on the company’s popular Google News service, which clusters the news by stories, then ranks the various media outlets depending on their reach, article length and veracity, and Google Alerts, which proactively informs subscribers of new publications.
  • The Alphabet chief, who has been referred to by Hillary Clinton as a “longtime friend,” added that the experience of “the last year” showed that audiences could not be trusted to distinguish fake and real news for themselves.“We started with the default American view that ‘bad’ speech would be replaced with ‘good’ speech, but the problem found in the last year is that this may not be true in certain situations, especially when you have a well-funded opponent who is trying to actively spread this information,” he told the audience.
  • ...1 more annotation...
  • RT America registered under FARA earlier this month, after being threatened by the US Department of Justice with arrests and confiscations of property if it failed to comply. The broadcaster is fighting the order in court.
  •  
    " HomeWorld News Google will 'de-rank' RT articles to make them harder to find - Eric Schmidt Published time: 20 Nov, 2017 19:58 Edited time: 21 Nov, 2017 03:41 Get short URL   © Global Look Press Eric Schmidt, the Executive Chairman of Google's parent company Alphabet, says the company will "engineer" specific algorithms for RT and Sputnik to make their articles less prominent on the search engine's news delivery services. "We are working on detecting and de-ranking those kinds of sites - it's basically RT and Sputnik," Schmidt said during a Q & A session at the Halifax International Security Forum in Canada on Saturday, when asked about whether Google facilitates "Russian propaganda." Schmidt appearance begins at 1:07:00 mark, relevant question at 1:33:00 "We are well of aware of it, and we are trying to engineer the systems to prevent that [the content being delivered to wide audiences]. But we don't want to ban the sites - that's not how we operate." The discussion focused on the company's popular Google News service, which clusters the news by stories, then ranks the various media outlets depending on their reach, article length and veracity, and Google Alerts, which proactively informs subscribers of new publications. Read more 'Slap at the First Amendment' - RT America forced to register as foreign agent RT has criticized the proposed move - whose timescale has not been publicized - as arbitrary and a form of censorship. "Good to have Google on record as defying all logic and reason: facts aren't allowed if they come from RT, 'because Russia' - even if we have Google on Congressional record saying they've found no manipulation of their platform or policy violations by RT," Sputnik and RT Editor-in-Chief Margarita Simonyan said in a statement. During the discussion, Schmidt claimed that he was "very strongly not in favor of censorship," but said that he has faith in "ranking" without ackno
Gary Edwards

Doug Casey: All Banks Are Bankrupt - Casey Research - 1 views

  •  
    This interview should be must reading for every citizen of this world.  Doug Casey lays it out, explaining in the simplest of terms the problem of corrupt governments and banksters.  Put this RSS feed right next to Sir Charles' Priced In Gold" blog as essential to start your day with reading. excerpt: "Anyone with any sense should withdraw whatever cash they have in European banks, whether in euros or any other currency, immediately. Cyprus demonstrated that governments are quite willing and able to confiscate money sitting in a bank account in order to preserve the banking system. We live in Bizarro World. L: Why would it spread? Cyprus was said to be particularly vulnerable because of its strong Greek connections; Cypriot banks had bought of lot Greek debt. Would people in Luxembourg be as exposed? Doug: All banks are in effect creatures of the state at this point. They all own a lot of government bonds, which are considered the most secure form of capital. Of course, that's the opposite of the truth; all these governments are bankrupt as well. The Greek government is just more overtly bankrupt than most. Actually, we should take a minute here to discuss what a properly run banking system looks like. Historically, banks offered two types of accounts: demand deposits and time deposits. Demand deposits are what we call checking accounts today, but the original idea was that you'd pay your bank to store your money securely, and you had the right to "demand" your deposit back immediately, and to transfer funds via check. The idea of time deposits, which became savings accounts, was that the bank would pay you interest when you deposited your money with them for a specific period of time. That's why it's called a "time" deposit; you lent the bank your money for a given time, as did other depositors, and the banks would always know how much money they could lend out - at higher interest rates. Furthermore, loans made against time deposits were always short term
Gary Edwards

Professor Hoppe's new book: "The Competition of Crooks") | The God That Failed - 0 views

  • And perhaps then, finally, will come the realization that democracy – in whose name all these dirty tricks have been done – is nothing more than an especially insidious form of communism, and that the politicians who have wrought this immoral and economic madness and who have thereby enriched themselves personally (never, of course, being liable for the damages they have caused!), are nothing more than a despicable bunch of communist crooks.
  • democracy which is causally responsible for the fatal conditions afflicting us now
  • The number of productive people is constantly decreasing, and the number of people parasitically consuming the income and wealth of this dwindling number of productive people is increasing steadily. This can’t work in the long run.
  • ...20 more annotations...
  • That the whole democratic house of cards has not yet completely collapsed speaks volumes about the still tremendous creative power of capitalism, even in the face of ever-increasing governmental strangulation.
  • And this fact also allows us to conjecture about what economic ‘miracles’ would be possible if we had unimpeded capitalism liberated from such parasitism.
  • the correct realization becomes generally accepted that the only antagonistic conflict of interest in society is the one between tax-payers, i.e. the exploited, and tax-consumers, i.e. the exploiters.:
  • In other words, between the class of people on the one hand who earn their income and assets by producing something that is bought voluntarily and valued accordingly by others; and the class of those on the other hand who produce nothing considered to be of value, but who live instead by living off and enriching themselves from the incomes and assets of other, productive people, forcibly taken via taxation – that is to say all government employees and all recipients of government “welfare assistance”, subsidies and monopolistic privileges.
  • book’s thesis is that the government is a monopolist of ultimate justice and law enforcement and that every monopoly is always bad from the perspective of the consumer – in this case the citizen. Your alternative solution is a private law society.
  • The basic idea is quite simple. Abolish monopoly and encourage competition.
  • I can only go to a state court of law, staffed by judges who themselves are paid from taxes to enforce government regulations.
  • In this way, government-staged robbery, assault, manslaughter, murder, war is “legally” sanctioned.
  • In a private law society, if we had such a conflict, we would instead approach arbitrators who are independent of both parties, and who are competing with other arbitrators for voluntarily paying customers.
  • We would not use an inherently biased judge working for and paid directly by the state, who is therefore partisan, but rather a neutral third party, to adjudicate the normal human legal conflicts arising between existing and recognized property rights and private contract law.
  • the mediation market.
  • My income from my work is my property (not the state’s) and the restaurant is my property (not the state’s).
  • Therefore, any government-imposed tax upon me or use restrictions upon my property (such as a smoking ban) would therefore be judged unlawful, as robbery and expropriation.
  • the state is nothing but a “great band of robbers,” a mafia, only a much larger, more overwhelming and dangerous one.
  • the subject of class consciousness
  • “there’s absolutely no reason in any case why the state should have anything at all to do with the production of money.”
  • And every newly printed bill causes a redistribution of social wealth.
  • More paper money doesn’t make a society richer overall. It’s just more paper. But every new piece of printed paper reduces the purchasing power of all the other previously-existing paper bills
  • these machinations, taking place every day on an almost unimaginable scale, are nothing more than a gigantic case of fraudulent theft.
  • in a competitive environment, a better kind of money would be produced. Why? Because there’ll always be a demand for means of exchange.
  •  
    Interview with Hoppe where he once again pushes libertarian thinking forward.  Hoppe puts most of the blame on "democracy" itself, caling it "an insidious form of communism".  Good stuff.  Highlighted parts. excerpt: "That the whole democratic house of cards has not yet completely collapsed speaks volumes about the still tremendous creative power of capitalism, even in the face of ever-increasing governmental strangulation. And this fact also allows us to conjecture about what economic 'miracles' would be possible if we had unimpeded capitalism liberated from such parasitism. if, and when, this insight finally bears fruit will depend upon the class consciousness of the population. There is a Marxist myth, eagerly promoted by the state, of an irreconcilable clash of interests between employers (capitalists) and employees (workers), or between the rich and the poor. As long as this myth prevails in public opinion, nothing at all will change and disaster is inevitable. A fundamental change can only occur if, instead of this, the correct realization becomes generally accepted that the only antagonistic conflict of interest in society is the one between tax-payers, i.e. the exploited, and tax-consumers, i.e. the exploiters.: In other words, between the class of people on the one hand who earn their income and assets by producing something that is bought voluntarily and valued accordingly by others; and the class of those on the other hand who produce nothing considered to be of value, but who live instead by living off and enriching themselves from the incomes and assets of other, productive people, forcibly taken via taxation - that is to say all government employees and all recipients of government "welfare assistance", subsidies and monopolistic privileges. Only when the producer class clearly recognises this, and publicly speaks out; when the producers are finally confident to take the moral high ground and reject the insolent admonitions from the po
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNING OPERATION FOR MUSLIM BROTHERHOOD & OTHER INSURGENTS FIGHTING IN SYRIA? - Liberty News - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Gary Edwards

Columbine Survivor Pens Bold Open Letter to Obama Rejecting Gun Control: 'Whose Side Are You On?' | TheBlaze.com - 0 views

  •  
    Amazing letter from Columbine survivor, Evan Todd, to Obama, explaining why Obama's gun control proposals are non sense. Evan Todd's open letter to Obama, below. - Mr. President, As a student who was shot and wounded during the Columbine massacre, I have a few thoughts on the current gun debate. In regards to your gun control initiatives: Universal Background Checks First, a universal background check will have many devastating effects. It will arguably have the opposite impact of what you propose. If adopted, criminals will know that they can not pass a background check legally, so they will resort to other avenues. With the conditions being set by this initiative, it will create a large black market for weapons and will support more criminal activity and funnel additional money into the hands of thugs, criminals, and people who will do harm to American citizens. Second, universal background checks will create a huge bureaucracy that will cost an enormous amount of tax payers dollars and will straddle us with more debt. We cannot afford it now, let alone create another function of government that will have a huge monthly bill attached to it. Third, is a universal background check system possible without universal gun registration? If so, please define it for us. Universal registration can easily be used for universal confiscation. I am not at all implying that you, sir, would try such a measure, but we do need to think about our actions through the lens of time. It is not impossible to think that a tyrant, to the likes of Mao, Castro, Che, Hitler, Stalin, Mussolini, and others, could possibly rise to power in America. It could be five, ten, twenty, or one hundred years from now - but future generations have the natural right to protect themselves from tyrannical government just as much as we currently do. It is safe to assume that this liberty that our forefathers secured has been a thorn in the side of would-be tyrants ever since the Second Amendmen
Paul Merrell

Facebook, Apple, Microsoft, Skype & Yahoo Hit With Prism Data Protection Complaints In Europe | TechCrunch - 0 views

  • The European data protection activists behind the Europe v Facebook (evf) campaign group, that has long been a thorn in Facebook’s side in Europe, have filed new complaints under regional data protection law targeting Facebook, Apple, Microsoft, Skype and Yahoo for their alleged collaboration with the NSA’s Prism data collection program. The student activist organisation is targeting the European subsidiaries of these five U.S. companies, arguing that their corporate structure means they fall fully under European privacy laws despite being U.S. headquartered companies. And yet, being as they are U.S. companies, they are required to comply with U.S. surveillance laws — putting them in the “tricky” situation of having to comply with potentially conflicting legal requirements. It’s that legal conflict evf is now probing.
  • Evf takes the view that the law needs clarifying — and it using these new data protection complaints as the vehicle to obtain clarification from the various regional data protection agencies. Facebook and Apple; Microsoft and Skype; and Yahoo have subsidiaries in Ireland, Luxembourg and Germany respectively. ”We want a clear statement by the authorities if a European company may simply give foreign intelligence agencies access to its customer data. if this turns out to be legal, then we might have to change the laws,” noted evf speaker, Max Schrems, in a statement. The key question, as evf sees it, is whether “mass transfer” of personal data from to a foreign intelligence agency is legal under European law.  ”Many journalists have asked us in recent weeks if PRISM is legal from a EU perspective. We have looked at that a little closer. The result was – after consulting with legal experts – that it is very likely illegal under EU data protection laws, because of the corporate structure of the companies,” added Schrems. Google and YouTube have not been included in this first round of evf complaints being as they have a different corporate structure that does not include European subsidiaries. However it notes they do have datacenters in European countries, which will give evf a route to filing Prism-related data protection complaints against both at a later date.
  • Writing in a press notice announcing its new action, evf added: If a European subsidiary sends user data to the American parent company, this is considered an “export” of personal data. Under EU law, an export of data is only allowed If the European subsidiary can ensure an “adequate level or protection” in the foreign country. After the recent disclosures on the “PRISM” program such trust in an “adequate level of protection” by the involved companies can hardly be upheld. There can in no way be an adequate level of protection If they cooperate with the NSA on the other end of the line. Right now an export of data to the US must be seen as illegal If the involved companies cannot disprove the reports on the PRISM program. According to evf, the subsidiaries being targeted by these complaints have “the burden of proof” — to either “credibly assure” that the Prism program is a hoax, or “explain how mass access by a foreign intelligence agency interplays with EU data protection laws”. Evf cites a 2006 case precedent involving payment processor SWIfT which had forwarded transaction details to U.S. authorities. In that case it says a group of EU data protection authorities decided that such a mass data transfer is illegal under EU law, leading to SWIfT to move European data to a server in Switzerland. The case also led to an agreement between the U.S. and the EU on the use of payment data to combat crime.
Paul Merrell

The CIA's Absence of Conviction - Craig Murray - 0 views

  • I have watched incredulous as the CIA’s blatant lie has grown and grown as a media story – blatant because the CIA has made no attempt whatsoever to substantiate it. There is no Russian involvement in the leaks of emails showing Clinton’s corruption. Yes this rubbish has been the lead today in the Washington Post in the US and the Guardian here, and was the lead item on the BBC main news. I suspect it is leading the American broadcasts also. A little simple logic demolishes the CIA’s claims. The CIA claim they “know the individuals” involved. Yet under Obama the USA has been absolutely ruthless in its persecution of whistleblowers, and its pursuit of foreign hackers through extradition. We are supposed to believe that in the most vital instance imaginable, an attempt by a foreign power to destabilise a US election, even though the CIA knows who the individuals are, nobody is going to be arrested or extradited, or (if in Russia) made subject to yet more banking and other restrictions against Russian individuals? Plainly it stinks. The anonymous source claims of “We know who it was, it was the Russians” are beneath contempt. As Julian Assange has made crystal clear, the leaks did not come from the Russians. As I have explained countless times, they are not hacks, they are insider leaks – there is a major difference between the two. And it should be said again and again, that if Hillary Clinton had not connived with the DNC to fix the primary schedule to disadvantage Bernie, if she had not received advance notice of live debate questions to use against Bernie, if she had not accepted massive donations to the Clinton foundation and family members in return for foreign policy influence, if she had not failed to distance herself from some very weird and troubling people, then none of this would have happened. The continued ability of the mainstream media to claim the leaks lost Clinton the election because of “Russia”, while still never acknowledging the truths the leaks reveal, is Kafkaesque.
  • I had a call from a Guardian journalist this afternoon. The astonishing result was that for three hours, an article was accessible through the Guardian front page which actually included the truth among the CIA hype: The Kremlin has rejected the hacking accusations, while the WikiLeaks founder Julian Assange has previously said the DNC leaks were not linked to Russia. A second senior official cited by the Washington Post conceded that intelligence agencies did not have specific proof that the Kremlin was “directing” the hackers, who were said to be one step removed from the Russian government. Craig Murray, the former UK ambassador to Uzbekistan, who is a close associate of Assange, called the CIA claims “bullshit”, adding: “They are absolutely making it up.” “I know who leaked them,” Murray said. “I’ve met the person who leaked them, and they are certainly not Russian and it’s an insider. It’s a leak, not a hack; the two are different things. “if what the CIA are saying is true, and the CIA’s statement refers to people who are known to be linked to the Russian state, they would have arrested someone if it was someone inside the United States. “America has not been shy about arresting whistleblowers and it’s not been shy about extraditing hackers. They plainly have no knowledge whatsoever.” But only three hours. While the article was not taken down, the home page links to it vanished and it was replaced by a ludicrous one repeating the mad CIA allegations against Russia and now claiming – incredibly – that the CIA believe the FBI is deliberately blocking the information on Russian collusion. Presumably this totally nutty theory, that Putin is somehow now controlling the FBI, is meant to answer my obvious objection that, if the CIA know who it is, why haven’t they arrested somebody. That bit of course would be the job of the FBI, who those desperate to annul the election now wish us to believe are the KGB. It is terrible that the prime conduit for this paranoid nonsense is a once great newspaper, the Washington Post, which far from investigating executive power, now is a sounding board for totally evidence free anonymous source briefing of utter bullshit from the executive.
  • Now both Julian Assange and I have stated definitively the leak does not come from Russia. Do we credibly have access? Yes, very obviously. Very, very few people can be said to definitely have access to the source of the leak. The people saying it is not Russia are those who do have access. After access, you consider truthfulness. Do Julian Assange and I have a reputation for truthfulness? Well in 10 years not one of the tens of thousands of documents WikiLeaks has released has had its authenticity successfully challenged. As for me, I have a reputation for inconvenient truth telling. Contrast this to the “credible sources” Freedland relies on. What access do they have to the whistleblower? Zero. They have not the faintest idea who the whistleblower is. Otherwise they would have arrested them. What reputation do they have for truthfulness? It’s the Clinton gang and the US government, for goodness sake. In fact, the sources any serious journalist would view as “credible” give the opposite answer to the one Freedland wants. But in what passes for Freedland’s mind, “credible” is 100% synonymous with “establishment”. When he says “credible sources” he means “establishment sources”. That is the truth of the “fake news” meme. You are not to read anything unless it is officially approved by the elite and their disgusting, crawling whores of stenographers like Freedland.
Paul Merrell

DOJ's Motion to Dismiss in Smith v. Obama, the case challenging the legality of the war against ISIL | Just Security - 0 views

  • As I noted in an earlier post, Nathan Smith, a U.S. Army captain deployed to Kuwait as part of the campaign against ISIL, Operation Inherent Resolve, has sued the President, seeking a declaration that Congress has not authorized the hostilities in Iraq and Syria and that therefore the War Powers Resolution requires the President to remove U.S. forces from hostilities in those nations. On Tuesday, the Department of Justice filed a motion to dismiss the case. Its brief in support of the motion includes one argument that I think is correct (albeit not for all the reasons the government offers) — namely, that Smith lacks standing to sue. That ought to be sufficient to have the case dismissed. The brief also includes an argument on the merits (albeit not designated as such) that is very interesting and potentially important — an account of how Congress has allegedly authorized Inherent Resolve in three ways: (i) in the 2001 AUMF; (ii) in the 2002 AUMF; and (iii) in current appropriations statutes. The heart of the brief, however, is devoted to a third argument — that Judge Koller-Kotelly must dismiss the case on the basis of the political question doctrine — that is not only wrong, but that simply ignores the Supreme Court’s recent (and repeated) repudiation of that very argument.
  • On page 39 of its 45-page brief, the government finally gets around to the reason why the court should dismiss the complaint: Smith lacks standing. Importantly, Smith’s theory of standing is not that he — an Army captain deployed to perform intelligence services in Kuwait — is more likely to be injured or killed by virtue of the President’s decision to deploy troops into hostilities in Iraq and Syria. It is, instead, that the President’s alleged failure to comply with the War Powers Act results in Captain Smith’s own violation of his officer’s oath to “support and defend” the Constitution “against all enemies, foreign and domestic,” and to “bear true faith and allegiance” to the Constitution.
  • The government’s standing argument begins (p. 35) by suggesting that “[p]laintiff’s claim that he is being forced to betray his oath is insufficient to establish standing because the violation of an oath, by itself, is not an injury in fact.” The cases the government cites for that proposition, however, do not say that a forced oath violation would not be an injury in fact — and that’s not a question the judge needs to resolve. What the cases establish, instead, is the point the government finally argues at page 39 — namely, that a government officer does not violate his oath by complying with superiors’ orders, even if it turns out that the law prohibits the military operation in which those orders are issued. Indeed, Smith would not violate his oath of office even if his superiors’ orders themselves were unauthorized, or if the intelligence activities he is ordered to performed were unauthorized. But he does not allege even those things (as I discuss below, he does not, for instance, alleged that he is being ordered to do anything unlawful). Instead, he merely argues that because President Obama should have withdrawn troops from Syria and Iraq 60 days after their deployment, Smith himself is violating his oath to “bear true faith and allegiance to the Constitution.” This is a non sequitur: Even if Smith is right that the continuation of Operation Inherent Resolve is unlawful, that would not mean that he is acting in violation of his oath. (Much more on this in my earlier post.) And that simple fact is reason enough for Judge Koller-Kotelly to dismiss the case.
  • ...8 more annotations...
  • One of Smith’s counsel, Professor Bruce Ackerman, argues that this reason for rejecting the oath-based theory of standing ignores the Supreme Court’s 1804 decision in Little v. Barreme. Little, however, is not on point. In that case, Navy Captain Little was sued by the owners of a Danish ship for damages caused when Little seized that neutral ship. The Court held that Little could be liable, notwithstanding the fact that he was following orders, because the capture violated a implicit statutory prohibition on the military’s seizure of ships sailing from France to the United States. In this case, however, Captain Smith has not argued — nor could he — that he has been ordered to do anything unlawful (in violation of a statute), let alone that he has been ordered to do something that would subject him to possible liability for damages. He is, instead, arguing that President Obama violated a statute. That is not enough to establish Smith’s standing to sue.
  • The government’s main argument, to which it devotes far too many pages, is that the judge must dismiss the case because it raises a “political question” that courts cannot answer. This is flatly wrong — and it ignores several controlling precedents, including the Supreme Court’s recent 8-1 rejection of virtually the same government argument in Zivotofsky v. Clinton.
  • The most interesting thing about the government’s brief — and by far the most important aspect of it, for public purposes apart from the lawsuit itself — is that, in the section ostensibly arguing that the case is nonjusticiable (see pp. 25-30, and also pp. 4-14), DOJ actually offers the Executive branch’s most detailed defense yet about why Operation Inherent Resolve is congressionally authorized. As some of us predicted, the government relies on three arguable authorizations, any one of which would be sufficient to defeat Smith’s WPR claim if the courts were to reach the merits. In this post I’m not going to assess the merits of the three arguments. For now, my purpose is only to describe them, and to raise one issue with respect to the third. i. First, the government argues that the 2001 AUMF authorizes the operation against ISIL.
  • Second, the government argues that the 2002 AUMF also authorizes Operation Inherent Resolve, just as it authorized operations in Iraq against AQI (which became ISIL) from 2003 to 2011, after the Hussain regime fell.
  • Finally, and most interestingly (in part because the government has not previously made this argument), DOJ argues that a recent “unbroken stream” of appropriations statutes not only confirm the authorities allegedly conferred by the 2001 and 2002 AUMFs, but also offer their own, independent congressional authorization.
  • Two things are fairly clear from this: The members of Congress approve of Operation Inherent Resolve — indeed, there’s virtually no opposition. And Congress has (most likely) appropriated funds to pay for it. The operative question, however, is whether Congress’s appropriations also serve as an authorization that would supersede the requirement of WPR section 5(b). The government brief alludes to one important argument that the plaintiff will undoubtedly raise: Section 8(a)(1) of the WPR provides that, for purposes of tolling the 60-day clock of section 5(b), “[a]uthority to introduce United States Armed Forces into hostilities or into situations wherein involvement in hostilities is clearly indicated by the circumstances shall not be inferred (1) from any provision of law . . . including any provision contained in any appropriations Act, unless such provision specifically authorizes the introduction of United States Armed Forces into hostilities or into such situations and states that it is intended to constitute specific statutory authorization within the meaning of this chapter.” Obviously, the 2016 Act does not satisfy that requirement. Is that fatal to the appropriations-as-authorization argument?
  • As the Office of Legal Counsel 50 U.S.C. 1542 and 1543). These provisions might be read simply to convey that the executive must continue to comply with the consultation and reporting requirements of WPR sections 3 and 4, even after the 2016 Act authorizes the introduction of troops into hostilities in Iraq and Syria. Or they might alternatively be construed to also specify that the Act is not providing the authority that section 5(b) of the WPR calls for.
  • Not surprisingly, DOJ argues for the former view (pp. 27-28 of the brief): “[I]n the few provisions in which Congress did reference the War Powers Resolution, to clarify that no funds made available for Operation Inherent Resolve are to be used ‘in contravention’ of the Resolution, Congress signaled its agreement that the President’s counter-ISIL military actions were authorized by simultaneously funding Operation Inherent Resolve. if Congress believed that the United States had been conducting airstrikes and other counter-ISIL military activities ‘in contravention of the War Powers Resolution,’ it would have made no sense for Congress to use the ‘in contravention’ proviso in the same laws that make funds available for the express purpose of continuing those military activities.” That’s not a bad argument, at least at first glance; but it’s not a slam-dunk, either, in part because appropriations provisions do not necessarily establish authorizations. It’ll be interesting to see how Captain Smith’s lawyers respond to this particular aspect of the merits argument. I doubt Judge Koller-Kotelly will reach it, however, because she is likely to dismiss the case for want of standing.
  •  
    I've read the brief. I don't think the implied partial repeal of the War Powers Resolution argument should fly. The relevant provision establishes a rule of interpretation of later statutes and the appropriations bills neither reject the rule of interpretation nor specifically provide authorization for use of military force. They just authorize funding. On the standing issue, I think the DoJ position is correct; the oath of office applies only to senior officers who make the decision to initiate a war. But DoJ may have opened the door to a more compelling standing argument by arguing that the war does not constitute a war crime, a crime against peace, or a crime against humanity under international law. DoJ did not need to make that argument because Smith had not alleged in his complaint that he was being ordered to commit such crimes, but by doing so DoJ waives any argument that such issues are beyond the scope of Smith's standing and the evidence that the Iraq and Syrian wars are illegal under international law is, to say the least, strong.
Paul Merrell

NSA Data Will Soon Be Used By Domestic Law Enforcement - 0 views

  • If you’re reading this, then I’m willing to bet that you’ve been called many dIfferent names throughout your lIfe. If I were to hazard a guess, I would say they were names like kook, paranoid, conspiracy theorist, alarmist, insane, or gullible. And after this week, you can go by a new name: Vindicated. I’m of course talking about recent revelations from the NSA. Long before Edward Snowden came along, it was no secret that the NSA was spying on everyone without good cause. Anyone who believed that fact was called a conspiracy theorist, but their fears were eventually validated. These same people also understood that the NSA’s surveillance powers would never be used exclusively against terrorists and hostile governments. The power they have is just too tempting for any government. If various government agencies weren’t using the NSA’s surveillance apparatus to solve domestic crimes, it was only a matter of time before it was used for just that.
  • And again, they called us conspiracy theorists for believing that. And again, we were right all long. A while back, we noted a report showing that the “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains why this is important: What does this rule change mean for you? In short, domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. FBI agents don’t need to have any “national security” related reason to plug your name, email address, phone number, or other “selector” into the NSA’s gargantuan data trove. They can simply poke around in your private information in the course of totally routine investigations. And if they find something that suggests, say, involvement in illegal drug activity, they can send that information to local or state police. That means information the NSA collects for purposes of so-called “national security” will be used by police to lock up ordinary Americans for routine crimes.
  • Anybody who knows anything about how governments work, should not surprised. You can’t give them any kind of power, and expect them to use it responsibly. You can’t give them any stipulations. Eventually they’ll find a legal loophole to work around any limitations that have been placed on them. In other news, the Pentagon admitted this week that they’ve been deploying military drones over the United States for domestic surveillance purposes. Much like the NSA’s surveillance apparatus, we were assured that drones were for terrorists in faraway lands. Nothing so Orwellian would ever be used against ordinary American citizens at home. Yet here we are, with more to come.
  •  
    The Privacy Act, 5 U.S.C. 552a, provides in relevant part: "(a)(4) the term "record" means any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph[.] ... "(b) Conditions of Disclosure.-No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be- ... "(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought[.]" So a separate written request for each "portion" of any individual record that describes the "law enforcement activity for which the record is sought[.]" That doesn't sound like the contemplated unfettered access to bulk raw data. And it gets even better, with a right to sue for any violation, attorney fees and expenses, and a statutory minimum of $1,000 damages per violation just for winning the case.  
Paul Merrell

Netanyahu scandals reflect corruption at the heart of Israeli society - Mondoweiss - 0 views

  •       Israeli prime minister Benjamin Netanyahu is in danger of being brought down, possibly soon, over what initially appears to be little more than an imprudent taste for Cuban cigars and pink champagne. In truth, however, the allegations ensnaring Netanyahu reveal far more than his personal flaws or an infatuation with the high life. They shine a rare light on the corrupt nexus between Israel’s business, political and media worlds, compounded by the perverse influence of overseas Jewish money. Of the two police investigations Netanyahu faces (there are more in the wings), the one known as Case 1000, concerning gifts from businessmen worth hundreds of thousands of dollars, is most likely to lead to his downfall. But it is the second investigation, Case 2000, and the still-murky relationship between the two cases, that more fully exposes the rot at the heart of Israel’s political system. This latter case hinges on a tape recording in which Netanyahu plots with an Israeli newspaper tycoon to rig media coverage in his favor. Leads from both cases suggest that Netanyahu may have been further meddling, together with his billionaire friends, in the shadowy world of international espionage.
  • Netanyahu’s appetite for a free lunch has been common knowledge in Israel since his first term as prime minister in the late 1990s. Then, he was twice investigated for fraud, though controversially charges were not brought in either case. Police discovered along the way that he and his wife, Sara, had horded many of the gifts he received during state visits. More than 100 were never recovered. The clarifications that were issued more than 15 years ago, as a result of those investigations, make it hard for Netanyahu to claim now that he did not understand the rules. According to justice ministry advice in 2001, government and state officials cannot keep gifts worth more than $100 without risking violating Israeli law. The gifts Netanyahu received from one of the Israeli businessmen involved in Case 1000, Hollywood film producer Arnon Milchan, amounted to as much as $180,000. Netanyahu has argued that these presents, ranging from cigars to jewelry, were expressions of a close friendship rather than bribes to him in his capacity as prime minister. The problem, however, is that Netanyahu appears to have reciprocated by using his position as head of the Israeli government to lobby John Kerry, the then U.S. secretary of state, to gain Milchan a 10-year U.S. residency visa. He may have done more.
  • Also being investigated are his family’s ties to a friend of Milchan’s, Australian billionaire James Packer, who made his fortune in the media and gambling industries. Packer has similarly lavished gifts on the Netanyahu family, especially Yair, Netanyahu’s eldest son. At the same time, Packer, now a neighbor of the Netanyahus in the coastal town of Caesarea, has been seeking permanent residency and the enormous benefits that would accrue with tax status in Israel. As a non-Jew, Packer should have no hope of being awarded residency. There are suspicions that Netanyahu may have been trying to pull strings on the Australian’s behalf. Many of these gifts were apparently not given freely. The Netanyahus asked for them. Indicating that Netanyahu knew there might be legal concerns, he used code words – “leaves” for cigars and “pinks” for champagne – to disguise his orders to Milchan. Police are reported to be confident, after questioning Netanyahu three times, that they have enough evidence to indict him. if they do, Netanyahu will be under heavy pressure to resign.
  • ...5 more annotations...
  • Yossi Cohen was appointed head of the Mossad a year ago, after a government vetting committee accepted that he had no personal ties to Netanyahu. But Cohen forgot to mention that he is extremely close to Netanyahu’s high-flying friends – connections that are now under investigation. Milchan set up a global security firm in 2008 called Blue Sky International, stuffed with Israeli security veterans. Packer soon became a partner. They developed close ties to Cohen, first while he was a senior official at the Mossad and later when he headed Israel’s national security council. Before Cohen was appointed head of Mossad in December 2015, the pair had hoped to recruit him to their cyber-security operations. Cohen received several gifts from Packer, in violation of Israeli government rules, including a stay at one of his luxury hotels. A source speaking to Haaretz said Blue Sky had “more than [a] direct line” to Netanyahu. They “would pull him out from anywhere, at any time, on any occasion.” According to Haaretz’s military analyst, Amir Oren, the new disclosures raise serious questions about whether Milchan and Packer twisted Netanyahu’s arm to parachute Cohen into the post over the favored candidate. In return, Packer may have been hoping that Cohen would authorise exceptional Israeli residency for him, classifying him as a security asset.
  • From Hollywood to Mossad Cases 1000 and 2000 share at least one figure in common. Milchan gave Netanyahu extravagant gifts over many years, but he is also reported to have acted as go-between, bringing arch-enemies Netanyahu and Mozes together. Milchan has his own financial stake in the media, in his case a holding in the Channel 10 TV station. In addition, Milchan introduced Netanyahu to sympathetic businessmen, including his friend Packer, to discuss taking the ailing Yedioth media group off Mozes’ hands. Only last October he arranged for media mogul Rupert Murdoch’s son, Lachlan, to fly to Israel for one night for a secret meeting with Netanyahu. Milchan is undoubtedly at the centre of the shadowy world of power and finance that corrupts public life in Israel. Not only is Milchan a highly influential Hollywood figure, having produced more than 100 films, but he has admitted that he is a former Mossad agent. He used his Hollywood connections to help make arms deals and secure parts for Israel’s nuclear weapons program. One can only wonder whether Milchan was not effectively set up in his Hollywood career as a cover for his Mossad activities. But Milchan, it seems, is still wielding influence in Israel’s twilight world of security.
  • eyond this, one one can only speculate about how Cohen’s indebtedness to Milchan, Packer and Netanyahu might have influenced his decisions as head of the Mossad. It was only a few years ago that the former Mossad chief, Meir Dagan, was reported to have wrestled furiously with Netanyahu to stop him launching a military strike on Iran. Prosecution drags feet It is unclear for the time being whether the revelations are drawing to a close or will lead deeper into Israel’s twin netherworlds of financial corruption and security. But what has emerged so far should be enough to finish off Netanyahu as prime minister. Whether it does so may depend on the extent of Israel’s compromised legal system. Attorney general Avichai Mendelblit was appointed by Netanyahu and is a political ally. He appears to have been dragging his feet as much as possible to slow down the police investigation, if not sabotage it. But the weight of evidence is looking like it may prove too overwhelming. As political analyst Yossi Verter observed: “There’s no way that a police commissioner … appointed [by Netanyahu] and a cautious attorney general, who in the past was part of his close circle and one of his loyalists, would be putting him through the seven circles of hell if they weren’t convinced that there’s a solid basis for indictment and conviction.” The next question for Netanyahu is whether he will step down if indicted. He should, if Olmert’s example is followed. But his officials are citing a 1993 high court ruling that allows a cabinet minister under indictment to remain in office. Certainly if Netanyahu chooses to stay on, his decision would be appealed to the court again. However, the judges may be reluctant to oust a sitting prime minister. The court of public opinion is likely to be decisive in that regard. A recent poll shows few Israelis believe Netanyahu is innocent of the allegations. Some 54 per cent think he broke the law, while only 28 believe him. Opinion, however, is split evenly on whether he should resign.
  • If past experience is any measure, Netanyahu will try to turn public opinion his way by increasing friction with the Palestinians and exploiting the international arena, especially his relations with the Trump administration. He may be expected to encourage Trump at the very least to posture more stridently against Iran. Nonetheless, most observers assume Netanyahu is doomed – it is simply a matter of when. The odds are on an indictment in late spring, followed by elections in the fall, say Israeli analysts. At this stage, none of his political rivals wants to be seen stabbing Netanyahu in the back. Most are keeping quiet. But behind the scenes, political leaders are hurrying to forge new alliances and extract political concessions while Netanyahu is wounded.
  • Who might succeed Netanyahu? Yair Lapid, of the centre-right Yesh Atid, is heading the polls, but that may in part reflect the disarray in Netanyahu’s Likud party. In a sign of where the deeper currents in Israeli society are leading, a Maariv poll last week showed that settler leader Naftali Bennett would win an election if he were to head the Likud. Netanyahu now needs the help of all the powerful friends he can muster. His biggest ally, U.S. casino magnate Sheldon Adelson, may not be among them. After the revelations that Netanyahu was conspiring against him with Mozes, Adelson has cut back on Israel Hayom’s circulation and is reported to be offering less favorable coverage of the Netanyahus. That could prove the final straw, sealing Netanyahu’s fate.
Gary Edwards

The Daily Bell - Richard Ebeling on Libertarianism, Anarchism and the Truth of Austrian Economics - 0 views

  • These are at least two conceivable methods of compelling the government to stop, or limit, its abuse of the monetary printing press.
    • Gary Edwards
       
      Ebeling proposes two methods of reining in out of control government printing of paper money.  There is a third method; one used by Lincoln and Kennedy.  This is the issuance of gold/silver/oil backed reserve notes.  The notes represent gold or silver being held on deposit, and are fully redeemable.   The value of the gold/silver or another commodity represented floats in the marketplace against goods and services.  Nor is there a fixed exchange rate for converting fiat (paper) dollars.  The market will figure those things out if left free to do so.  And that's one big big "if".
  • So the normal market pressures of downward price and wage adjustments in the recession are partly counter-acted by a new monetary expansion that is delaying the necessary re-coordination of market activities. Thus, given these two pressures, prices do not fall as much as a post-recession adjustment may require and they do not rise as much or as fast as might otherwise occur due to the renewed monetary expansion.
  • At the same time, as you correctly ask, the Federal Reserve has been paying banks a relatively low rate of interest to keep large excessive reserves in their accounts at the Federal Reserve, rather than to fully lend those excessive reserves to private borrowers. And given the low market rates of interest that Federal Reserve policy has generated, even the low rate of interest on unlent excess reserves offered to banks by the Federal Reserve appears the relatively more profitable way to use their available funds.
  • ...44 more annotations...
  • Why has the Federal Reserve done this? They infused these two trillion dollars into the financial markets back in 2008-2010 because they feared that an economy-wide bank collapse was possible. They are afraid to reverse this monetary expansion because to do so would reduce potential bank-lending capacity and put upward pressure on interest rates at a time when the Federal Reserve wants to prevent the sluggish recovery from slowing down even more and also raise the cost of the US government's financing of its trillion dollar a year deficits. So, instead, they leave this excess bank lending power sloshing around in the system, while keeping it off the market and from causing significant new price inflationary pressures, by paying banks not to lend those vast sums.
  • Austrians argue that economics is fundamentally a science and study of "human action." It attempts to trace out the logic and implications of man's intentional conduct in selecting among ends desired and applying perceived means to try to attain them. Austrians emphasize that all human action and the social and market interactions among men occur in a setting of imperfect knowledge, inescapable degrees of uncertainty and always through the passage of time.
  • They try to explain the market processes by which men discover mutual gains from trade.
  • They emphasize that the networks of social institutions in which and through which men discover ways to coordinate their interdependent actions in complex systems of division of labor are not the creations of government edict or command; but are most often among those unintended consequences of multitudes of self-interested individual actions and interactions.
  • They have developed theories of market competition and the role of the entrepreneur as the individuals always alert to market opportunities, and whose actions tend to bring about coordination between market supplies and demands.
  • The Austrian analysis of markets, competition and prices, led them to devastating critiques of the unworkability of all forms of socialist central planning, the inherent contradictions and inconsistencies in virtually all forms of government intervention and regulation, and a theory of money and the business cycle that points the finger of responsibility for inflations and recessions at the doorstep of government monetary and fiscal policies.
  • The philosophy of liberty proclaims that each individual is unique and possessing inherent rights to his life, liberty and honestly acquired property.
  • It is not surprising that classical liberal and libertarian ideas are often attacked. After all they are the ideas that consistently oppose the current political systems of plunder, privilege and power lusting.
  • That government, if it is to exist, is to serve as the protector and guardian of our distinct individual rights, and not the master of men who are obligated to sacrifice themselves for some asserted "national interest," "general welfare," or "common good."
  • The only reasonable meaning to the "common good" or the "general welfare" is when each individual is free to peacefully live his life as he chooses and is at liberty to voluntarily associate and interact with his fellow men for mutually beneficial improvements to their lives.
  • It is virtually inevitable that those who use political power for their own gain at their neighbor's expense will vehemently resist and oppose any attempt to stop them from feeding at the government trough.
  • there is everywhere a class of plundering peoples – politicians, bureaucrats, special interest groups – receiving tax-based income redistributions and subsidies and benefiting from anti-competitive regulations and protections against and at the expense of their fellow human beings.
  • This is the great battle of the twenty-first century;
  • Austrian Economics, not surprisingly, has been attacked precisely because of its insightful and cogent analysis of how it was government intervention and central bank monetary manipulation that generated the unsustainable boom in the last decade that set the stage for the inescapable bust, which the world is still suffering from.
  • There are "natural rights" libertarians
  • "utilitarian" or "consequentialist" libertarians.
  • most convincing case for human liberty
  • Because libertarians have not agreed about this among themselves, nor have they been able to persuade enough others in society to move the world further away from the collectivist premises and the interventionist-welfare state policies that guide so much that goes on in the world.
  • I happen to have been most strongly influenced by the "natural rights" defense of liberty, and especially as formulated by Ayn Rand in her philosophy of Objectivism.
  • First, it is argued that if one believes that the use of any and all forms of coercion are morally unacceptable in human relationships, then this should also imply that any compulsory taxation, even when for the funding of defense and legal justice, is unjustifiable. And, second, it is argued that the private sector could provide such admittedly essential services far more efficiently and cost-effectively than the monopoly agency of government. Murray Rothbard and David Friedman probably have been among the most well-known and articulate proponents of the anarcho-capitalist position over the last 50 years.
  • Others like the Ayn Rand, Robert Nozick and Ludwig von Mises have made the case for constitutionally limited government. Their counter arguments have centered on the ideas that conflicts over jurisdiction, disputes among private defense agencies contracted by different individuals who have disagreements, and the likelihood that "defense" would turn out to be a "natural monopoly" anyway – that is, a tendency for one agency to end up being the single provider of defense and judicial services over a wide geographical area – raise questions about the long-run workability and sustainability of competing defense companies in society.
  • From a moral perspective, I am in sympathy with the anarcho-capitalist position, in that I find the compulsory taking of people's income and wealth without their consent for whatever reason to be ethically repugnant.
  • We should focus on what we all agree upon:
  • This means that the Supreme Court has said that you are the slave of "society" and the government that represents "the people," since, in principle, anything that you do or not do can be argued to have some affect, positive or negative, on others.
  • Think about this Court decision. It is saying that if you do not buy health insurance the government will tax you to pay for it. if you refuse to pay the tax, the government will end up attempting to seize financial assets or real property you own in lieu of failure to pay. if you try to prevent this taking of your property, you are subject to arrest and imprisonment. if you resist arrest or imprisonment, the police have the authority to force you to comply – up to and including lethal force to subdue you into obedience.
  • the freedom and dignity of the individual human being; and the attempt whenever and wherever on our part to reduce, repeal and abolish all forms of regulation, control, restriction, prohibition on the peaceful and honest affairs of our fellow men.
  • Once you accept this premise, there is no end to the minutest detail and content of your life and actions the government cannot claim jurisdiction over to regulate, control or prohibit.
  • Here is that end-of-the-road of the notion of unlimited democratic rule by "the people" and those who claim to speak for "the people" and rule on their behalf.
  • Ayn Rand, of course, rejected any connection or compatibility with libertarianism. She argued this on two grounds. First, she felt that too frequently libertarians spoke of individual freedom, free markets and limited government, but failed to explicitly and clearly ground their political-economic ideas in a demonstrable philosophy of man, nature and society.
  • Government control of money is the potentially most dangerous and damaging form of government power short of outright socialism.
  • Rand's political philosophy arises out of the "natural rights" tradition, that rights are inherent in the nature of man and precede government.
  • Mises believed that rights were, in a sense, "social conventions" that had evolved out of the discovery that certain social institutional arrangements were more conducive to the mutual betterment of all members of society for achieving their individual goals and values
  • What they did agree upon was that, given their respective conceptions of the basis of individual rights, there was no social and economic system more consistent with the protection of those rights and more likely to generate the material and cultural achievements that are potentially possible than laissez-faire capitalism.
  • And in the twentieth century, Rand and Mises were two of the most principled and uncompromising advocates for the completely free market society
  • Second, she rejected the anarchist elements in the libertarian movement, believing that any reasonable analysis of the reality of man and the human condition strongly suggested the inescapable need for a single legal standard for defining and enforcing individual rights and a single authority to as impartially and "objectively" as possible enforce laws defending each individual's rights to his life, liberty and honestly acquired property.
  • "Hardly ever do the advocates of free capitalism realize how utterly their ideal was frustrated at the moment the state assumed control of the monetary system . . .
  • A 'free' capitalism with government responsibility for money and credit has lost its innocence.
  • From that point on it is no longer a matter of principle but one of expediency how far one wishes or permits government interference to go.
  • Money control is the supreme and most comprehensive of all governmental controls short of expropriation."
  • Government basically has three ways to acquire the income and wealth of its citizens: taxation, borrowing and printing money
  • So, governments throughout history have turned to the monetary printing press to fund the expenditures not covered by taxes or borrowed money
  • This "non-neutral," or uneven, impact on prices and wages in the economy during the inflationary process brings in its wake distorted profit margins, misallocations of resources and labor and various mal-investments of capital. Here are the seeds for the artificial and unsustainable "booms" that invariably come crashing down in the "bust" once the monetary expansion that has set it all in motion is stopped or slowed down.
  • I believe that the choice and use of money should be left to the market, that is, to the free and voluntary interactive decisions of those buying and selling in the market.
  • I consider a private, competitive free banking system to be the only one consistent with a truly free market society.
Gary Edwards

Three Schools of Economic Wizardry | The Rugged Individualist - 0 views

  •  
    Exceellent repub of Mike Shedlock's wonderful article describing the 3 Schools of Economic Wizardry.  Includes a simplified but exacting view of the "why and how"  the Keynesian and Monetarist Wizardry Schools wreck havoc on the world.   ... Keynesian Voodoo Wizards ... Monetarist Voodoo Wizards ... Austrian Realists Remember the voodoo motto: "if it doesn't work, keep doing more of it, even if that is what got you in trouble in the first place!" ..... Excerpt: Once upon a time (today), in a land not so far away (USA), there lived a trio of economic wizards (economists), whose names shall remain anonymous (Paul Krugman, Greg Mankiw, Ben Bernanke). A fourth wizard, Murry Rothbard, is no longer among the living but resides in the netherworld. The above wizards seldom agree with each other because they come from competing schools of wizardry. Three Schools of Economic Wizardry 1. Keynesian School of Fiscal Voodoo and Witchcraft 2. Monetarist School of Monetary Voodoo and Witchcraft 3. Austrian School of Sound Money, Sound Economic Principles and Common Sense. "Dark Arts" Wizardry The first two wizardry schools belong to a class of wizardry promoted to aspiring wizards as the "Dark Arts." Philosophical Beliefs Keynesian wizards believe governments can spend their way to economic health and although fiscal deficits may matter at some point in time, they never matter now, in practice. Monetarist wizards believe money will cure any and every problem if enough is dropped from helicopters and interest rates held low. Austrian wizards believe that economic problems are created by unsound money, haphazard loans, excessive debts, and government manipulations. Keynesian and Monetarist wizards believe in the voodoo principle "the problem is the solution if only you do more of it." The former relies primarily on fiscal voodoo; the latter relies primarily on monetary voodoo. Austrian wizards do not believe "the problem is the solution," no matter ho
Paul Merrell

Huge swath of GCHQ mass surveillance is illegal, says top lawyer | UK news | The Guardian - 0 views

  • GCHQ's mass surveillance spying programmes are probably illegal and have been signed off by ministers in breach of human rights and surveillance laws, according to a hard-hitting legal opinion that has been provided to MPs.The advice warns that Britain's principal surveillance law is too vague and is almost certainly being interpreted to allow the agency to conduct surveillance that flouts privacy safeguards set out in the European convention on human rights (ECHR).The inadequacies, it says, have created a situation where GCHQ staff are potentially able to rely "on the gaps in the current statutory framework to commit serious crime with impunity".
  • Last year, Hague told MPs: "It has been suggested GCHQ uses our partnership with the US to get around UK law, obtaining information that they cannot legally obtain in the UK. I wish to be absolutely clear that this accusation is baseless."However, the legal advice poses awkward new questions about the framework GCHQ operates within, the role of ministers and the legality of transferring bulk data to other spy agencies.The advice makes clear Ripa does not allow GCHQ to conduct mass surveillance on communications between people in the UK, even if the data has briefly left British shores because the call or email has travelled to an internet server overseas.
  • The legal advice has been sent to the 46 members of the all-party parliamentary group on drones, which is chaired by the Labour MP, Tom Watson.
  • ...6 more annotations...
  • In a 32-page opinion, the leading public law barrister Jemima Stratford QC raises a series of concerns about the legality and proportionality of GCHQ's work, and the lack of safeguards for protecting privacy.
  • The opinion notes that the UK has not adopted the doctrine of "anticipatory self-defence" in the same way as the US to provide legal cover for drone strikes in countries where it is not involved in an international armed conflict."Accordingly, in our view, if GCHQ transferred data to the NSA in the knowledge that it would or might be used for targeting drone strikes, that transfer is probably unlawful," the advice states."The transferor would be an accessory to murder for the purposes of domestic law … We consider that, pursuant to the transfer, the agent is likely to become an accessory to murder."Watson said he would be submitting the legal opinion to the parliamentary intelligence and security committee, which is undertaking an inquiry into mass surveillance."MPs now have strong independent advice questioning the legality of major UK intelligence programmes," he said.
  • The advice concludes: "In short, the rules concerning communications data are too uncertain and do not provide sufficient clarity to be in accordance with the law … we consider the mass interception of communications via a transatlantic cable to be unlawful, and that these conclusions would apply even if some or all of the interception is taking place outside UK territorial waters."Leaving decisions about whether data can be shared with agencies abroad to the "unfettered discretion" of ministers is also a probable breach of the convention, the advice warns.
  • "First, the transfer of private data is a significant interference with an individual's article 8 rights. That interference will only be lawful when proportionate."Secondly, the ECHR has held on more than one occasion that surveillance, and the use of surveillance data, is an area in which governments must conduct themselves in a transparent and 'predictable' manner. The current framework is uncertain: it relies on the discretion of one individual."Thirdly, on a pragmatic level,there is a real possibility that the NSA might function as GCHQ's unofficial 'backup' service. if GCHQ is not entitled to hold onto data itself, it might transfer it to the NSA. In time, and if relevant, that data might be transferred back to GCHQ. Without strong guidelines and scrutiny, the two services might support each other to (in effect) circumvent the requirements of their domestic legislation."The opinion adds: "if GCHQ transfers communications data to other governments it does so without any statutory restrictions. Such transfers are a disproportionate interference with the article 8 rights of the individuals concerned. There are no restrictions, checks or restraints on the transfer of that data."
  • At its most extreme, the advice raises issues about the possible vulnerability of staff at GCHQ if it could be proved that intelligence used for US drone strikes against "non-combatants" had been passed on or supplied by the British before being used in a missile attack."An individual involved in passing that information is likely to be an accessory to murder. It is well arguable, on a variety of different bases, that the government is obliged to take reasonable steps to investigate that possibility," the advice says.
  • "If ministers are prepared to allow GCHQ staff to be potential accessories to murder, they must be very clear that they are responsible for allowing it. We have seen a step change in mass covert surveillance and intelligence gathering, underpinned on dubious legal grounds and with virtually no parliamentary oversight. "The leadership of all the main parties should stop turning a blind eye to a programme that has far-reaching consequences around the globe."
  •  
    The lawyer who wrote the opinion is a QC, or Queen's Counsel. See http://en.wikipedia.org/wiki/Queen's_Counsel This opinion *will* result in changes in UK law and oversight of GCHQ. And because much of it is based on the European Convention on Human Rights, the opinion will stoke the anti-spying sentiment in the European Community, which is already at fever-pitch. The ECHR is Europe's implementation of several U.N. treaties on human rights, so the blowback may well extend beyond the EU and UK.  
Gary Edwards

The Precinct Project's Blog | Want to really "do something?" Take back the Republican Party precinct by precinct from the ground up. - 0 views

  •  
    "Where do the candidates on our primary ballots come from? An estimated 95 per cent of the candidates of the Republican and Democrat parties who win the primary election are those who are endorsed by the leadership of those parties. Do You Know Who Elects The Party Leaders? Did You Elect Them? Who elects the leadership of the parties? Do you know? Are you a registered Republican? Guess what? As a "mere" registered Republican voter, without more, you did not have a vote in the election of the present leadership of the Republican Party. Sorry, but those are the facts. Only elected precinct committeemen get to vote for the leadership of the Party. Do I yet have your attention? Ponder the fact that only elected precinct committeemen get to elect the Party leadership. Don't you want to have a vote in those elections? Getting into position to have that right is easy. About 3,141 counties exist in the United States. Almost all have a county party organization. And, those county organizations almost always endorse candidates in the party primaries. And, usually, those party-endorsed candidates win. Tired of the kind of Republican In Name Only Republicans who are winning the primaries? Then do something real and become a Republican Party precinct committeeman! Guess what? About half of the Republican Party precinct committeeman slots, nationwide, are unfilled! There's about 400,000 slots nationwide and about 200,000 of those slots are vacant. If conservatives filled up all the empty slots they OWN the Party. Precinct Committeemen are the Party. Do I yet have your attention? Has the light bulb above your head clicked on yet? In some counties, like the one where I reside, Maricopa County, Arizona, within which Phoenix sits, TWO-THIRDS of the precinct committeeman slots in the Republican Party sat unfilled on Election Day, 2008. [Well, it's now November, 2012, and we're now at 52 per cent strength instead of where we were back in 2008 at 31 per cent.] Spend a few
« First ‹ Previous 41 - 60 of 2473 Next › Last »
Showing 20 items per page