Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "progressive-socialism" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Is Open-Ended Chaos the Desired US-Israeli Aim in the Middle East? » CounterPunch: Tells the Facts, Names the Names - 0 views

  • During the last week we have seen Sunni militias take control of ever-greater swathes of eastern Syria and western Iraq. In the mainstream media, the analysis of this emerging reality has been predictably idiotic, basically centering on whether: a) Obama is to blame for this for having removed US troops in compliance with the 2008 Status of Forces Agreement (SOFA) negotiated and signed by Bush. b) Obama is “man enough” to putatively resolve the problem by going back into the country and killing more people and destroying whatever remains of the country’s infrastructure. This cynically manufactured discussion has generated a number of intelligent rejoinders on the margins of the mainstream media system. These essays, written by people such as Juan Cole, Robert Parry, Robert Fisk and Gary Leupp, do a fine job of explaining the US decisions that led to the present crisis, while simultaneously reminding us how everything occurring  today was readily foreseeable as far back as 2002.
  • What none of them do, however, is consider whether the chaos now enveloping the region might, in fact, be the desired aim of policy planners in Washington and Tel Aviv. Rather, each of these analysts presumes that the events unfolding in Syria and Iraq are undesired outcomes engendered by short-sighted decision-making at the highest levels of the US government over the last 12 years. Looking at the Bush and Obama foreign policy teams—no doubt the most shallow and intellectually lazy members of that guild to occupy White House in the years since World War II—it is easy to see how they might arrive at this conclusion. But perhaps an even more compelling reason for adopting this analytical posture is that it allows these men of clear progressive tendencies to maintain one of the more hallowed, if oft-unstated, beliefs of the Anglo-Saxon world view.
  • What is that? It is the idea that our engagements with the world outside our borders—unlike those of, say, the Russians and the Chinese—are motivated by a strongly felt, albeit often corrupted, desire to better the lives of those whose countries we invade. While this belief seems logical, if not downright self-evident within our own cultural system, it is frankly laughable to many, if not most, of the billions who have grown up outside of our moralizing echo chamber. What do they know that most of us do not know, or perhaps more accurately, do not care to admit?
  • ...4 more annotations...
  • First, that we are an empire, and that all empires are, without exception, brutally and programmatically self-seeking. Second, that one of the prime goals of every empire is to foment ongoing internecine conflict in the territories whose resources and/or strategic outposts they covet. Third, that the most efficient way of sparking such open-ended internecine conflict is to brutally smash the target country’s social matrix and physical infrastructure. Fourth, that ongoing unrest has the additional perk of justifying the maintenance and expansion of the military machine that feeds the financial and political fortunes of the metropolitan elite. In short, what of the most of the world understands (and what even the most “prestigious” Anglo-Saxon analysts cannot seem to admit) is that divide and rule is about as close as it gets to a universal recourse the imperial game and that it is, therefore, as important to bear it in mind today as it was in the times of Alexander the Great, Julius Caesar, the Spanish Conquistadors and the British Raj.
  • To those—and I suspect there are still many out there—for whom all this seems too neat or too conspiratorial, I would suggest a careful side-by side reading of: a) the “Clean Break” manifesto generated by the Jerusalem-based Institute for Advanced Strategic and Political Studies (IASPS) in 1996 and b) the “Rebuilding America’s Defenses” paper generated by The Project for a New American Century (PNAC) in 2000, a US group with deep personal and institutional links to the aforementioned Israeli think tank, and with the ascension of  George Bush Junior to the White House, to the most exclusive  sanctums of the US foreign policy apparatus.
  • To read the cold-blooded imperial reasoning in both of these documents—which speak, in the first case, quite openly of the need to destabilize the region so as to reshape Israel’s “strategic environment” and, in the second of the need to dramatically increase the number of US “forward bases” in the region—as I did twelve years ago, and to recognize its unmistakable relationship to the underlying aims of the wars then being started by the US in Afghanistan and Iraq, was a deeply disturbing experience. To do so now, after the US’s systematic destruction of Iraq and Libya—two notably oil-rich countries whose delicate ethnic and religious balances were well known to anyone in or out of government with more than passing interest in history—, and after the its carefully calibrated efforts to generate and maintain murderous and civilization-destroying stalemates in Syria and Egypt (something that is easily substantiated despite our media’s deafening silence on the subject), is downright blood-curdling.
  • And yet, it seems that for even very well-informed analysts, it is beyond the pale to raise the possibility that foreign policy elites in the US and Israel, like all virtually all the ambitious hegemons before them on the world stage, might have quite coldly and consciously fomented open-ended chaos in order to achieve their overlapping strategic objectives in this part of the world.
  •  
    This is the most succinct distillation of U.S. (and Israeli) foreign policy in the Mideast and Northern Africa ("MENA") areas that I have read to date. And it's absolutely spot on. The only major portion omitted is the Israeli ambition to expand its territory drastically to encompass from the Nile River in Egypt to the Jordan River in Southwest Asia and eastward throughout the Arabian Peninsula, whilst becoming the empirical economic and military center of MENA.  
Paul Merrell

Bernie Sanders Introduces a Bill to Break Up the Big Banks | The Nation - 0 views

  • Senator Bernie Sanders announced legislation Wednesday that would break up the country’s largest financial institutions. It’s the third time he’s introduced such a measure, but this time around he wields the large microphone of a presidential candidate. The bill, titled the “Too Big to Fail, Too Big to Exist Act,” will also be introduced in the House by Representatives Brad Sherman and Alan Grayson. If passed, it would require regulators at the Financial Stability Oversight Council to come up with a list of too-big-to-fail institutions whose failure would threaten the economy. One year later, those banks would be broken up by the secretary of the Treasury. Sure to be included on that list, based on the standards outlined in the legislation, would be JPMorgan Chase, Citigroup, Goldman Sachs, Bank of America, and Morgan Stanley.
  • It also unavoidably poses a test for Hillary Clinton, the other declared Democratic candidate. Much of the Draft Warren movement launched by progressive activists focused on the Massachusetts senator’s advocacy for combating the financial sector’s power generally, and breaking up the big banks in particular—and Clinton’s perceived weakness on that front.
  • Another likely Democratic candidate, former Maryland governor Martin O’Malley, wrote an op-ed in The Des Moines Register in March that also called for the biggest financial institutions to be broken up. Elsewhere, Senators Sherrod Brown and David Vitter have introduced similar legislation in the past, and the Federal Deposit Insurance Corporation’s Tom Hoenig also favors break-ups. Sanders and Sherman cited the danger posed to the economy by big banks, many of which are dramatically larger than they were before the 2008 financial crisis. JPMorgan Chase, for example, has increased its assets by $1.1 trillion since 2007. “In 2008 we learned that if Wall Street calls and says ‘bail us out or we’re going to take the economy down with us,’ that even if there is no statutory provision for bailouts, which there really isn’t today, Congress will pass as we did in 2008 a bill mandating the bailout,” said Sherman. “So ‘too big to fail’ means you will be bailed. That isn’t capitalism. That is socialism for the wealthy.”
  • ...2 more annotations...
  • Sanders noted the large fines and settlement paid by big financial institutions since 2009, totaling $176 billion, and referenced former attorney general Eric Holder’s frank admission in 2013 that some banks are “too big to jail.” (Holder later walked back that comment, though no high-level executives have gone to prison for anything related to the financial crisis.)
  • The duo also described their belief that big Wall Street banks are crushing smaller and medium-sized banks. Sherman cited research from the International Monetary Fund that when big banks have implicit taxpayer backing, their access to capital is so much easier that it amounts to an extra $83 billion annually—something he argued was an unfair advantage over smaller banks that would be allowed to fail. The Independent Community Bankers of America, which represents 6,000 smaller banks, has endorsed the Sanders-Sherman legislation. Beyond just small banks, Sanders argued that enormous financial institutions harm the broader economy because those smaller banks are key sources of capital for small businesses. “Wall Street cannot be an island unto itself separate from the productive economy,” he said.
  •  
    Sanders pushing Hillary to commit to doing something about the banks. Fat chance. But maybe he can show who she really is.
Gary Edwards

The secret corporate takeover of trade agreements | Business | The Guardian - 0 views

  • The US and the world are engaged in a great debate about new trade agreements. Such pacts used to be called free-trade agreements; in fact, they were managed trade agreements, tailored to corporate interests, largely in the US and the EU. Today, such deals are more often referred to as partnerships, as in the Trans-Pacific Partnership (TPP). But they are not partnerships of equals: the US effectively dictates the terms. Fortunately, America’s “partners” are becoming increasingly resistant. It is not hard to see why. These agreements go well beyond trade, governing investment and intellectual property as well, imposing fundamental changes to countries’ legal, judicial, and regulatory frameworks, without input or accountability through democratic institutions. Perhaps the most invidious – and most dishonest – part of such agreements concerns investor protection. Of course, investors have to be protected against rogue governments seizing their property. But that is not what these provisions are about. There have been very few expropriations in recent decades, and investors who want to protect themselves can buy insurance from the Multilateral Investment Guarantee Agency, a World Bank affiliate, and the US and other governments provide similar insurance. Nonetheless, the US is demanding such provisions in the TPP, even though many of its partners have property protections and judicial systems that are as good as its own.
  • The real intent of these provisions is to impede health, environmental, safety, and, yes, even financial regulations meant to protect America’s own economy and citizens. Companies can sue governments for full compensation for any reduction in their future expected profits resulting from regulatory changes. This is not just a theoretical possibility. Philip Morris is suing Uruguay and Australia for requiring warning labels on cigarettes. Admittedly, both countries went a little further than the US, mandating the inclusion of graphic images showing the consequences of cigarette smoking. The labeling is working. It is discouraging smoking. So now Philip Morris is demanding to be compensated for lost profits. In the future, if we discover that some other product causes health problems (think of asbestos), rather than facing lawsuits for the costs imposed on us, the manufacturer could sue governments for restraining them from killing more people. The same thing could happen if our governments impose more stringent regulations to protect us from the impact of greenhouse gas emissions.
  • When I chaired Bill Clinton’s council of economic advisers, when he was president, anti-environmentalists tried to enact a similar provision, called “regulatory takings”. They knew that once enacted, regulations would be brought to a halt, simply because government could not afford to pay the compensation. Fortunately, we succeeded in beating back the initiative, both in the courts and in the US Congress. But now the same groups are attempting an end run around democratic processes by inserting such provisions in trade bills, the contents of which are being kept largely secret from the public (but not from the corporations that are pushing for them). It is only from leaks, and from talking to government officials who seem more committed to democratic processes, that we know what is happening.
  • ...3 more annotations...
  • Fundamental to America’s system of government is an impartial public judiciary, with legal standards built up over the decades, based on principles of transparency, precedent, and the opportunity to appeal unfavourable decisions. All of this is being set aside, as the new agreements call for private, non-transparent, and very expensive arbitration. Moreover, this arrangement is often rife with conflicts of interest; for example, arbitrators may be a judge in one case and an advocate in a related case. The proceedings are so expensive that Uruguay has had to turn to Michael Bloomberg and other wealthy Americans committed to health to defend itself against Philip Morris. And, though corporations can bring suit, others cannot. If there is a violation of other commitments – on labour and environmental standards, for example – citizens, unions, and civil society groups have no recourse. If there ever was a one-sided dispute-resolution mechanism that violates basic principles, this is it. That is why I joined leading US legal experts, including from Harvard, Yale, and Berkeley, in writing a letter to Barack Obama explaining how damaging to our system of justice these agreements are.
  • American supporters of such agreements point out that the US has been sued only a few times so far, and has not lost a case. Corporations, however, are just learning how to use these agreements to their advantage. And high-priced corporate lawyers in the US, Europe and Japan will likely outmatch the underpaid government lawyers attempting to defend the public interest. Worse still, corporations in advanced countries can create subsidiaries in member countries through which to invest back home, and then sue, giving them a new channel to bloc regulations. If there were a need for better property protection, and if this private, expensive dispute-resolution mechanism were superior to a public judiciary, we should be changing the law not just for well heeled foreign companies but also for our own citizens and small businesses. But there has been no suggestion that this is the case.
  • Rules and regulations determine the kind of economy and society in which people live. They affect relative bargaining power, with important implications for inequality, a growing problem around the world. The question is whether we should allow rich corporations to use provisions hidden in so-called trade agreements to dictate how we will live in the 21st century. I hope citizens in the US, Europe and the Pacific answer with a resounding no. Joseph Stiglitz, a Nobel laureate in economics, is a professor at Columbia University. His most recent book, co-authored with Bruce Greenwald, is Creating a Learning Society: A New Approach to Growth, Development, and Social Progress
  •  
    Economist Joseph Stiglitz takes on the TPP (Trans Pacific Partnership) trade agreement, explaining how corporations will use the agreement to side step environmental and regulatory laws of sovereign nations. Amazing stuff. No doubt Wall Street Money is behind these trade agreement. The Banksters are said to own over 40% of the world's corporations and these agreements are designed to establish corporate sovereignty while greatly diminishing state sovereignty. It's the New World Order. "Terms such as 'investor' and 'partner' are taking on new meanings as multinationals manipulate deals to take legal action against sovereign states"
Paul Merrell

Spies and internet giants are in the same business: surveillance. But we can stop them | John Naughton | Comment is free | The Guardian - 0 views

  • On Tuesday, the European court of justice, Europe’s supreme court, lobbed a grenade into the cosy, quasi-monopolistic world of the giant American internet companies. It did so by declaring invalid a decision made by the European commission in 2000 that US companies complying with its “safe harbour privacy principles” would be allowed to transfer personal data from the EU to the US. This judgment may not strike you as a big deal. You may also think that it has nothing to do with you. Wrong on both counts, but to see why, some background might be useful. The key thing to understand is that European and American views about the protection of personal data are radically different. We Europeans are very hot on it, whereas our American friends are – how shall I put it? – more relaxed.
  • Given that personal data constitutes the fuel on which internet companies such as Google and Facebook run, this meant that their exponential growth in the US market was greatly facilitated by that country’s tolerant data-protection laws. Once these companies embarked on global expansion, however, things got stickier. It was clear that the exploitation of personal data that is the core business of these outfits would be more difficult in Europe, especially given that their cloud-computing architectures involved constantly shuttling their users’ data between server farms in different parts of the world. Since Europe is a big market and millions of its citizens wished to use Facebook et al, the European commission obligingly came up with the “safe harbour” idea, which allowed companies complying with its seven principles to process the personal data of European citizens. The circle having been thus neatly squared, Facebook and friends continued merrily on their progress towards world domination. But then in the summer of 2013, Edward Snowden broke cover and revealed what really goes on in the mysterious world of cloud computing. At which point, an Austrian Facebook user, one Maximilian Schrems, realising that some or all of the data he had entrusted to Facebook was being transferred from its Irish subsidiary to servers in the United States, lodged a complaint with the Irish data protection commissioner. Schrems argued that, in the light of the Snowden revelations, the law and practice of the United States did not offer sufficient protection against surveillance of the data transferred to that country by the government.
  • The Irish data commissioner rejected the complaint on the grounds that the European commission’s safe harbour decision meant that the US ensured an adequate level of protection of Schrems’s personal data. Schrems disagreed, the case went to the Irish high court and thence to the European court of justice. On Tuesday, the court decided that the safe harbour agreement was invalid. At which point the balloon went up. “This is,” writes Professor Lorna Woods, an expert on these matters, “a judgment with very far-reaching implications, not just for governments but for companies the business model of which is based on data flows. It reiterates the significance of data protection as a human right and underlines that protection must be at a high level.”
  • ...2 more annotations...
  • This is classic lawyerly understatement. My hunch is that if you were to visit the legal departments of many internet companies today you would find people changing their underpants at regular intervals. For the big names of the search and social media worlds this is a nightmare scenario. For those of us who take a more detached view of their activities, however, it is an encouraging development. For one thing, it provides yet another confirmation of the sterling service that Snowden has rendered to civil society. His revelations have prompted a wide-ranging reassessment of where our dependence on networking technology has taken us and stimulated some long-overdue thinking about how we might reassert some measure of democratic control over that technology. Snowden has forced us into having conversations that we needed to have. Although his revelations are primarily about government surveillance, they also indirectly highlight the symbiotic relationship between the US National Security Agency and Britain’s GCHQ on the one hand and the giant internet companies on the other. For, in the end, both the intelligence agencies and the tech companies are in the same business, namely surveillance.
  • And both groups, oddly enough, provide the same kind of justification for what they do: that their surveillance is both necessary (for national security in the case of governments, for economic viability in the case of the companies) and conducted within the law. We need to test both justifications and the great thing about the European court of justice judgment is that it starts us off on that conversation.
Gary Edwards

American Thinker: Taking Back Our Constitution by Anthony G.P. Marini - 0 views

  • However, any powers that the Congress derives regarding commerce activities arise from Article I, Section 8 of the Constitution: "[Congress has the power] To regulate Commerce with foreign Nations, and among the several States, and with the Indian tribes[.]"This clause was considered silent because lawmakers couldn't figure out a straight-faced way to exploit this narrowly-defined power: The actual wording gives Congress power to regulate commerce among the states, but not between individual citizens
  • So by conflating a generous reinterpretation with commerce-related laws, the Congress gave itself the authority to regulate individual citizens.
  • Congress required new powers of the purse...the power to tax outside of those powers explicitly set forth in Article I, Section 8 of the Constitution:
  • ...4 more annotations...
  • Congress was able to accomplish what was once unthinkable by past Congresses. Congress acquired the legislative tools required to implement a sweeping, socially progressive agenda using just two words: Commerce and Welfare.
  • two mid-1930s Supreme Court decisions2 did the Congress finally get their desired taxation superpowers.
  • clause. However actual expansions of these powers were a long time coming, and
  • not until
  •  
    Americans, the Constitution of the United States of America doesn't belong to us anymore. We have let our guard down one too many times with regard to our constitutional responsibilities, rights, and liberties, and now elected politicians control the document. Because of a lack of vigilance and perhaps of laziness on our part, our representatives and our government constrain and dominate us using legislative powers obtained from interpretations, penumbrae, and self-serving close calls for scant (and vaguely defined) words in our Constitution. It took a long time for Congress and the government to amass these powers that they have taken from us, and they certainly won't relinquish them as easily as we gave them up. But with unflinching purpose, we must begin to take the Constitution back, as well as reimpose limits on congressional powers, for the sake of future Americans. The start of flagrant congressional abuse of the Constitution may be traced to the late 19th century1, when lawmakers found they could exploit the previously "silent" commerce clause. As Americans are highly dependent upon commerce, a government that can control all aspects of commerce is a very powerful government indeed. However, any powers that the Congress derives regarding commerce activities arise from Article I, Section 8 of the Constitution: "[Congress has the power] To regulate Commerce with foreign Nations, and among the several States, and with the Indian tribes[.]" This clause was considered silent because lawmakers couldn't figure out a straight-faced way to exploit this narrowly-defined power: The actual wording gives Congress power to regulate commerce among the states, but not between individual citizens. So by conflating a generous reinterpretation with commerce-related laws, the Congress gave itself the authority to regulate individual citizens.
Gary Edwards

Morning Bell: The Obama Fiscal Responsibility Farce Continues | The Foundry: Conservative Policy News. - 3 views

  • This February, after signing the largest single-year increase in domestic federal spending since World War II, President Obama held a “fiscal responsibility” summit designed to “send a signal that we are serious” about putting the nation on sounder financial footing. The Washington Post’s Dana Milbank quipped at the time: “Holding a ‘fiscal responsibility summit’ at the White House in the middle of a government spending spree is a bit like having an Alcoholics Anonymous meeting at a frat house on homecoming weekend.”
  •  
    Conn puts the numbers into the context of events and issues.  Good read. Today President Barack Obama's National Commission on Fiscal Responsibility and Reform will convene for the first time at the White House. Tasked with making recommendations to Congress that would put the budget in primary balance by 2015 and "meaningfully improve" our nation's long-term fiscal outlook, the commission meets a little over a month after Congress approved a new $2.5 trillion health care entitlement that the Obama administration now confirms will increase our nation's total health care spending. This is a now familiar pattern for the White House: first enact record breaking levels of deficit spending, then turn right around and promise austerity sometime in the future.
Paul Merrell

Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise - The Intercept - 0 views

  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
  • By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content: Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect. The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists: INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting: A = Indian Diplomatic & Indian Navy B = Central Asian diplomatic C = Chinese Human Rights Defenders D = Tibetan Pro-Democracy Personalities E = Uighur Activists F = European Special Rep to Afghanistan and Indian photo-journalism G = Tibetan Government in Exile
  • In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.” In instances where hacking may compromise data from the U.S. and U.K. governments, or their allies, notification was given to the “relevant parties.” In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge. “Analysts are potentially missing out on valuable open source information relating to cyber defence because of an inability to easily keep up to date with specific blogs and Twitter sources,” according to one document. GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media. The Twitter accounts designated for collection in the 2012 document:
  • ...3 more annotations...
  • These accounts represent a cross section of the hacker community and security scene. In addition to monitoring multiple accounts affiliated with Anonymous, GCHQ monitored the tweets of Kevin Mitnick, who was sent to prison in 1999 for various computer and fraud related offenses. The U.S. Government once characterized Mitnick as one of the world’s most villainous hackers, but he has since turned security consultant and exploit broker. Among others, GCHQ monitored the tweets of reverse-engineer and Google employee, Thomas Dullien. Fellow Googler Tavis Ormandy, from Google’s vulnerability research team Project Zero, is featured on the list, along with other well known offensive security researchers, including Metasploit’s HD Moore and James Lee (aka Egypt) together with Dino Dai Zovi and Alexander Sotirov, who at the time both worked for New York-based offensive security company, Trail of Bits (Dai Zovi has since taken up a position at payment company, Square). The list also includes notable anti-forensics and operational security expert “The Grugq.” GCHQ monitored the tweets of former NSA agents Dave Aitel and Charlie Miller, and former Air Force intelligence officer Richard Bejtlich as well as French exploit vendor, VUPEN (who sold a one year subscription for its binary analysis and exploits service to the NSA in 2012).
  • Documents published with this article: LOVELY HORSE – GCHQ Wiki Overview INTOLERANT – Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers – SIDtoday  HAPPY TRIGGER/LOVELY HORSE/Zool/TWO FACE – Open Source for Cyber Defence/Progress NATO Civilian Intelligence Council – Cyber Panel – US Talking Points
  • The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents. In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document. These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
Paul Merrell

As Optimism Grows, Possible Iran Deal Gains Key Endorsement « LobeLog - 0 views

  • Optimism that the US and world powers can, after all, strike a nuclear deal with Iran by or shortly after the current November 24 deadline appeared to grow here in Washington substantially this week. Such a deal also gained a critical endorsement, one that should provide a lot of political cover to shaky Democrats, as well as voices in the US Jewish community who, in contrast to the right-wing leadership of AIPAC and other “mainstream” Jewish organizations, have long favored President Obama’s diplomatic efforts. In an interview with the Jerusalem Post, Amb. Stuart Eizenstat, who played a key role in promoting sanctions against Iran under both Jimmy Carter and Bill Clinton and who succeeded Dennis Ross as chairman of the Jerusalem-based Jewish People Policy Institute (JPPI), challenged Israeli Intelligence Minister Yuval Steinitz’s recent claim in a New York Times op-ed that the failure to reach an agreement “can be regarded a qualified success, because it would represent the integrity of an international community adhering to its principles rather than sacrificing the future of global security.”
  • According to Eizenstat, whose experience in Democratic foreign policy circles was described as “vast” by none other than Bill Kristol’s Weekly Standard two years ago: No deal is not a success, because it means an unrestrained use of centrifuges, the Iranian plutonium plant at Arak continuing, no intrusive inspections, no elimination of 20-percent enriched uranium, and less likelihood of eliminating weaponization. …[A deal] would not be a bouquet of roses. It has a lot of thorns in it. But the alternative is nothing but thorns. It would almost force a military reaction, which even under the best circumstances  …would set back Iran two to three years and have ripple effects that would tremendously harm Israel, such as attacks from Hezbollah.
  • Eizenstat’s remarks came during a week in which, according to the Wall Street Journal’s well-connected Jay Solomon, the administration has begun actively promoting a possible nuclear deal with foreign allies, key members of Congress, and former senior foreign policy officials. While administration officials insist that important gaps between Iran and the P5+1 (US, UK, France, Russia, China and Germany) remain on some key issues, it appears that last week’s meetings in Vienna made important progress. The Journal also reported that the two sides may be moving toward a compromise on one key issue that has gained a lot of attention here—the number of centrifuges (around 4,000) that Iran could keep spinning to produce low-enriched uranium under an accord.
  • ...2 more annotations...
  • The fact that the administration is indeed briefing interested parties on the likely parameters of a final accord—and apparently aggressively defending it—indicates a higher degree of confidence that it will get a deal than even ten days ago. Of course, the administration’s hand may have been forced somewhat by the backlash provoked by the very damaging—and, in my view, quite misleading (because the administration has never tried to hide its intentions in this regard)—New York Times article by David Sanger, “Obama Sees an Iran Deal That Could Avoid Congress.”
  • Again, administration officials privately stress that the deal is not yet done, but I think it’s pretty clear from the past week’s developments that the negotiators and the administration believe that one is definitely within reach, and within the next month or soon thereafter. In his interview, Eizenstat, who met with Iranian Foreign Minister Javad Zarif during the UN General Assembly in September and enjoys access to top administration officials as well, said he believed there was a 20-40% chance of reaching a comprehensive deal by Nov. 24, but the Post also noted that “he was certain a deal would be attained before President Obama leaves office in January 2017.”
Paul Merrell

Libya: From Africa's Richest State Under Gaddafi, to Failed State After NATO Intervention | Global Research - 0 views

  • This week marks the three-year anniversary of the Western-backed assassination of Libya’s former president, Muammar Gaddafi, and the fall of one of Africa’s greatest nations. In 1967 Colonel Gaddafi inherited one of the poorest nations in Africa; however, by the time he was assassinated, Gaddafi had turned Libya into Africa’s wealthiest nation. Libya had the highest GDP per capita and life expectancy on the continent. Less people lived below the poverty line than in the Netherlands. After NATO’s intervention in 2011, Libya is now a failed state and its economy is in shambles. As the government’s control slips through their fingers and into to the militia fighters’ hands, oil production has all but stopped. The militias variously local, tribal, regional, Islamist or criminal, that have plagued Libya since NATO’s intervention, have recently lined up into two warring factions. Libya now has two governments, both with their own Prime Minister, parliament and army.
  • For over 40 years, Gaddafi promoted economic democracy and used the nationalized oil wealth to sustain progressive social welfare programs for all Libyans. Under Gaddafi’s rule, Libyans enjoyed not only free health-care and free education, but also free electricity and interest-free loans. Now thanks to NATO’s intervention the health-care sector is on the verge of collapse as thousands of Filipino health workers flee the country, institutions of higher education across the East of the country are shut down, and black outs are a common occurrence in once thriving Tripoli. One group that has suffered immensely from NATO’s bombing campaign is the nation’s women. Unlike many other Arab nations, women in Gaddafi’s Libya had the right to education, hold jobs, divorce, hold property and have an income. The United Nations Human Rights Council praised Gaddafi for his promotion of women’s rights. When the colonel seized power in 1969, few women went to university. Today, more than half of Libya’s university students are women. One of the first laws Gaddafi passed in 1970 was an equal pay for equal work law. Nowadays, the new “democratic” Libyan regime is clamping down on women’s rights. The new ruling tribes are tied to traditions that are strongly patriarchal. Also, the chaotic nature of post-intervention Libyan politics has allowed free reign to extremist Islamic forces that see gender equality as a Western perversion.
  • Hifter’s forces are currently vying with the Al Qaeda group Ansar al-Sharia for control of Libya’s second largest city, Benghazi. Ansar al-Sharia was armed by America during the NATO campaign against Colonel Gaddafi. In yet another example of the U.S. backing terrorists backfiring, Ansar al-Sharia has recently been blamed by America for the brutal assassination of U.S. Ambassador Stevens. Hifter is currently receiving logistical and air support from the U.S. because his faction envision a mostly secular Libya open to Western financiers, speculators, and capital. Perhaps, Gaddafi’s greatest crime, in the eyes of NATO, was his desire to put the interests of local labour above foreign capital and his quest for a strong and truly United States of Africa. In fact, in August 2011, President Obama confiscated $30 billion from Libya’s Central Bank, which Gaddafi had earmarked for the establishment of the African IMF and African Central Bank. In 2011, the West’s objective was clearly not to help the Libyan people, who already had the highest standard of living in Africa, but to oust Gaddafi, install a puppet regime, and gain control of Libya’s natural resources.
  • ...3 more annotations...
  • On one side, in the West of the country, Islamist-allied militias took over control of the capital Tripoli and other cities and set up their own government, chasing away a parliament that was elected over the summer. On the other side, in the East of the Country, the “legitimate” government dominated by anti-Islamist politicians, exiled 1,200 kilometers away in Tobruk, no longer governs anything. The fall of Gaddafi’s administration has created all of the country’s worst-case scenarios: Western embassies have all left, the South of the country has become a haven for terrorists, and the Northern coast a center of migrant trafficking. Egypt, Algeria and Tunisia have all closed their borders with Libya. This all occurs amidst a backdrop of widespread rape, assassinations and torture that complete the picture of a state that is failed to the bone. America is clearly fed up with the two inept governments in Libya and is now backing a third force: long-time CIA asset, General Khalifa Hifter, who aims to set himself up as Libya’s new dictator. Hifter, who broke with Gaddafi in the 1980s and lived for years in Langley, Virginia, close to the CIA’s headquarters, where he was trained by the CIA, has taken part in numerous American regime change efforts, including the aborted attempt to overthrow Gaddafi in 1996.
  • Three years ago, NATO declared that the mission in Libya had been “one of the most successful in NATO history.” Truth is, Western interventions have produced nothing but colossal failures in Libya, Iraq, and Syria. Lest we forget, prior to western military involvement in these three nations, they were the most modern and secular states in the Middle East and North Africa with the highest regional women’s rights and standards of living. A decade of failed military expeditions in the Middle East has left the American people in trillions of dollars of debt. However, one group has benefited immensely from the costly and deadly wars: America’s Military-Industrial-Complex. Building new military bases means billions of dollars for America’s military elite. As Will Blum has pointed out, following the bombing of Iraq, the United States built new bases in Kuwait, Bahrain, Qatar, the United Arab Emirates, Oman and Saudi Arabia. Following the bombing of Afghanistan, the United States is now building military bases in Pakistan, Kazakhstan, Uzbekistan and Tajikistan. Following the recent bombing of Libya, the United States has built new military bases in the Seychelles, Kenya, South Sudan, Niger and Burkina Faso.
  • Given that Libya sits atop the strategic intersection of the African, Middle Eastern and European worlds, Western control of the nation, has always been a remarkably effective way to project power into these three regions and beyond. NATO’s military intervention may have been a resounding success for America’s military elite and oil companies but for the ordinary Libyan, the military campaign may indeed go down in history as one of the greatest failures of the 21st century.
  •  
    Indeed, Muammar Gadafi was well on his way to becoming the Simón Bolívar of Africa when the U.S. snuffed out his government and his life to end his efforts to create a United States of Africa with its own gold-backed currency. Were there Justice in this world, Barack Obama would be in prison today for his war crimes against the Libyan people. 
Paul Merrell

Securing Our Digital Economy | Internet Society - 0 views

  • Germany wants G20 leaders to agree to a concrete plan – one that includes affordable Internet access across the world by 2025, common technical standards and a focus on digital learning. Today, the G20 economies, like so many other economies around the world, are digital and interconnected. Digital services have opened up new avenues for sustainable economic growth. But, the digital economy will only continue to thrive and generate opportunities for citizens if the Internet is strong, secure, and trusted. Without this foundation, the global digital economy is at risk. Currently, there are 360 million people that take part in cross-border e-commerce. 28% of output in mature economies is digital. The Internet is set to contribute $6.6 trillion a year, or 7.1% of the total GDP in the G20 countries. And, by 2020, it’s estimated that more than 1 billion users will be added and there will be 30-50 billion additional connected devices. This level of interconnection will only boost the market. However, this cannot happen without a serious commitment by all parties to security and privacy. The truth is that economies can only function within a secure and trusted environment. Which brings us to encryption. Strong encryption is an essential piece to the future of the world’s economy and the Internet Society believes it should be the norm for all online transactions. It allows us to do our banking, conduct local and global business, run our power grids, operate, communications networks, and do almost everything else.
  • Encryption is a technical building block for securing infrastructure, communications and information. It should be made stronger and universal, not weaker. However, rather than being recognized as the way to secure our online transactions or our conversations, all too often the debate focuses on the use of encryption as a way to thwart law enforcement. To undermine the positive role of encryption in the name of security could have devastating consequences. Many great minds have already devoted considerable effort to resolving the conundrum posed by competing public policy objectives: providing security, safety and trust on the one hand, and law enforcement and legitimate policy goals on the other. But, it is time to stop kicking the encryption football up and down the field. Instead, we should recognize that encryption is key to the future digital economy and stop treating it as simply an obstacle to law enforcement. We need to deconstruct the issues faced by law enforcement and policy makers and agree together how we can achieve a trusted digital economy underpinned by encryption. This is the first time the G20 countries are holding a Ministerial on digital matters. It is also the first time that the G20 is inviting non-government stakeholders to contribute to these issues. This is a turning point that should not be missed. All views, including the technical perspective, must be at the table if we are to achieve progress on the G20’s ICT goals. If the G20 countries are serious about strengthening their economies and continuing to deliver economic and social prosperity to their citizens in future, there are three key principles they should endorse and implement immediately:
  • 1. Encryption is an important technical foundation for trust in the digital economy and should be the norm. All users (whether government, business or individual) should use encryption to protect infrastructure, communications and the privacy and integrity of their data. Encryption technologies should be strengthened, not weakened. 2. The security of the digital economy is a shared responsibility that needs the expertise and experience of all stakeholders, across border and across disciplines. It is an urgent need that will require open, inclusive collaboration. 3. Users’ rights should be at the heart of any decisions related to the digital economy. They are both the customers and the contributors to the success of the digital economy. The Internet Society calls for ubiquitous encryption for the Internet. We strongly believe that this is the best foundation for trust in the digital economy, and we urge the G20 nations to stand behind encryption.
« First ‹ Previous 41 - 50 of 50
Showing 20 items per page