Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "update" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gary Edwards

Paul D. Ryan: A GOP Road Map for America's Future - WSJ.com - 0 views

  •  
    America needs an alternative. For that reason, I have reintroduced my plan to tackle our nation's most pressing domestic challenges-updated to reflect the dramatic decline in our economic and fiscal condition. The plan, called A Road Map for America's Future and first introduced in 2008, is a comprehensive proposal to ensure health and retirement security for all Americans, to lift the debt burdens that are mounting every day because of Washington's reckless spending, and to promote jobs and competitiveness in the 21st century global economy. The difference between the Road Map and the Democrats' approach could not be more clear. From the enactment of a $1 trillion "stimulus" last February to the current pass-at-all costs government takeover of health care, the Democratic leadership has followed a "progressive" strategy that will take us closer to a tipping point past which most Americans receive more in government benefits than they pay in taxes-a European-style welfare state where double-digit unemployment becomes a way of life. Americans don't have to settle for this path of decline. There's still time to choose a different future. That is what the Road Map offers. It is based on a fundamentally different vision from the one now prevailing in Washington. It focuses the government on its proper role. It restrains government spending, and hence limits the size of government itself. It rejuvenates the vibrant market economy that made America the envy of the world. And it restores an American character rooted in individual initiative, entrepreneurship and opportunity. Here are the principal elements:
Gary Edwards

Cow Economics & Politics - 1 views

  •  
    Update on that classic economic-political use case; "You have two cows". Hard to joke when the stock market has lost over $2 Trill in one week, and neither the government or the Federal Banksters Reserve show any concern.  Obama's golf game, fund raising and vacation schedule will not miss a beat.  Cape Cod calls and Obama is there.  Bernake and the Banksters met today, with a stock market begging for him to print up some more free fuel.  Bernake decides to stick with the plan and go with the collapse of the USA and the Dollar as scheduled. GOLD today is over $1780 /oz.  It's value in dollars has risen over $120 /oz since the raising of the debt limit to near $17 Trillion. The stock market melted down yesterday, crashing through key support barriers … shattering the confidence of millions of individual investors … and prompting most - who had been trying to turn a blind eye to the carnage - to start heading for the hills. Yesterday, Aug 9 2011 was the worst trading day since December of 2008. Just since the market began falling on July 26th, more than $7.8 trillion in equity has now been erased! Even though the Banksters are flush with $16.1 Trill in Federal Bankster Reserve coupons (GAO Audit of 2009-2010 Bankster books), the market can't seem to sort things out. And Banks stocks got hit hardest of all in yesterdays crash: US Bancorp and Wells Fargo were both down 9%. Huntington Bancshares and JP Morgan Chase declined 8.5% and 9.4% respectively. Fifth Third Bankcorp fell 11.4% and Capital One fell 12.08%. Regions Bank dropped 13.5% and SunTrust lost 13.9% of its value. Saw a National Media special on S&P last night.  These clowns gave Enron, Worldcom, Lehman Brothers, Ireland, Greece and Iceland their highest ratings right up until the eve of their collapse.  And then there's those trillions in garbage mortgage securities and derivatives rated triple A right through the collapse of the World economy
Gary Edwards

The EAGLE PLAN : Ending the War in Afghanistan - 0 views

  •  
    I caught the Coast-to-Coast interview with Marshal Klarfeld.  Marshal explained the Eagle plan, which was first developed in 1967 as a method of negotiating a peace plan for Vietnam.  He has updated the plan Afghanistan.  Very interesting proposal.  And no doubt Marshal is a great thinker and historian. The EAGLE PLAN: an alternative strategy This is a non partisan effort to bring about the end of US military involvement in Afghanistan. There are many reasons we, as citizens, need to take action. Some reasons are: the loss of American lives and the duration of this war that seems endless; the loss of innocent Afghan lives and the destruction of their homes and villages; the incredible financial burden on US taxpayers and the destruction of our economy. Our politicians and our military have not come up with a workable solution to date. This plan is an attempt to find an alternative to the continuation of ineffective policy.
Gary Edwards

U.S. Federal Deficits, Presidents, and Congress - 1 views

  •  
    Last updated 6/30/2011.  Awesome tabulation of the numbers.  Stephen Boch runs the deficit spending - deficit numbers for each President going back to 1911, about the time when the Federal Reserve, the IRS, and the Income Tax were first conceived.  He also adjust for inflation.  Not surprisingly, the Obama-Bush 2008-2009 debacle rattles the teeth.  The conversion of private Bankster debt into national "public" debt that took place during that shared fiscal year is something else.  Although Mr. Boch is primarily concerned about War and Budgets, Presidential and Congressional party affiliations, and their impact on the debt; there is nothing in the history of the USA that compares to what the Banksters have done.  Even if you add up the total debt of Bush and Obama, it doesn't come close to the $23 Trillion the Banksters sacked us with.  But then, without the full and complete complicity of Bush and Obama, and their Congresses, the Banksters could not have pulled this off.
Gary Edwards

The Problem With Debt | Clusterstock on HomeOwner Equity Loss - 0 views

  •  
    "15.4 million homeowners now owe more on their houses than their houses are worth, up from 13.6 million four months ago. The number will probably top 20 million when all is said and done. To mark this sad stat, we've updated our post from last fall on the power of leverage." Excellent math in this article. Very simple and straightforward explanation. Do the math and weep.
Paul Merrell

EFF Fights Destruction of Spying Evidence in Court Wednesday | Electronic Frontier Foundation - 0 views

  • Government Claims EFF's Lawsuits Don't Cover Ongoing Surveillance – Raising Fears Key Documents May Have Been DestroyedUPDATE: Judge White today continued his temporary restraining order in these two cases until a more permanent order could be put in place. The question of whether the government improperly destroyed evidence so far will be briefed over the next several weeks.
  • San Francisco - The Electronic Frontier Foundation (EFF) will fight disturbing new government claims in an emergency court hearing Wednesday – claims that may imply records documenting ongoing government surveillance have been destroyed despite a judge's order. Over the last several weeks, EFF has been battling to ensure that evidence of the NSA surveillance program will be preserved as part of its two cases challenging the illegal government spying: Jewel v. NSA and First Unitarian Church of Los Angeles v. NSA. But in a court filing late Monday, the government made shocking new assertions, arguing that its obligation to preserve evidence was limited to aspects of the original Bush-era spying program, which the government contends ended eight years ago with a transition to FISA court orders.
  • Government Claims EFF's Lawsuits Don't Cover Ongoing Surveillance – Raising Fears Key Documents May Have Been DestroyedUPDATE: Judge White today continued his temporary restraining order in these two cases until a more permanent order could be put in place. The question of whether the government improperly destroyed evidence so far will be briefed over the next several weeks.
  • ...1 more annotation...
  • This argument simply does not make sense. EFF has been demanding an injunction to stop this illegal spying program, regardless of the government's shifting justifications," said EFF Legal Director Cindy Cohn, who will argue in front of U.S. District Court Judge Jeffrey S. White at the hearing Wednesday. "But these government claims aren't just nonsensical – they are extremely worrisome and dangerous. The government is suggesting it may have destroyed years' worth of evidence about its illegal spying, justified by its own secret interpretation of our case. This is about more than just phone records; it's about evidence concerning all of the government's spying. EFF is asking the court for a full accounting of just what is going on here, and it's time for the government to come clean." EFF has been litigating against illegal NSA surveillance for more than eight years. Jewel v. NSA is a case brought on behalf of AT&T customers who were subject to unconstitutional NSA spying. In First Unitarian Church of Los Angeles v. NSA, EFF represents 22 groups whose First Amendment rights to association are violated by the NSA program.
Paul Merrell

There's A Huge New Snowden Leak - And No One Knows Where It Came From [UPDATED] - Yahoo Finance - 0 views

  • On Tuesday, news site The Register published a story containing explosive "above top secret" information about Britain's surveillance programs, including details of a "clandestine British base tapping undersea cables in the Middle East." Reporter Duncan Campbell, who wrote the story, said it was based on documents "leaked by fugitive NSA sysadmin Edward Snowden" that other news outlets had declined to publish.  However, it's not necessarily clear how Campbell got his hands on Snowden's document stash.  Glenn Greenwald, who published the first stories based on Snowden's documents in The Guardian, told Business Insider on Tuesday that Snowden has "no source relationship" with Campbell. "Snowden has no source relationship with Duncan (who is a great journalist), and never provided documents to him directly or indirectly, as Snowden has made clear," Greenwald said in an email. "I can engage in informed speculation about how Duncan got this document — it's certainly a document that several people in the Guardian UK possessed — but how he got it is something only he can answer."
  • For his part, Campbell is not interested in discussing how he got the documents used for his story. "Journalists in the UK — just as in the US — do not reveal their sources, or respond to questions as to confidential sources. We protect them. That is our obligation and our duty," Campbell wrote in an email to Business Insider. This isn't the first story Campbell has published allegedly based on Snowden documents. Last August, Campbell wrote a piece for The Independent about the secret British surveillance base. In that article, Campbell suggested The Guardian "agreed to the Government’s request not to publish any material contained in the Snowden documents that could damage national security," including the existence of the surveillance base.
  • Greenwald responded with a column that included a statement from Snowden saying he had not worked with Campbell and speculating the documents were actually by the British government as part of an attempt to make the case his leaks were "harmful." In addition to Snowden's theory that Campbell may have obtained documents from a government source, it also seems possible he was leaked information by a Guardian staffer with access to the documents. Business Insider asked Guardian editor Alan Rusbridger about this possibility on Tuesday and received a response from a representative for the paper who said they have no idea how Campbell obtained any of Snowden's documents.  "We don't know who Mr Campbell's source is. We have always been open and transparent about all of our reporting partners," the representative  said.
  • ...1 more annotation...
  • So it seems someone out there is in possession of Snowden documents other newspapers have declined to publish and is eager to release them. In other words, the Snowden leaks have leaked. [UPDATE 20:45 EDT] Duncan Campbell told Wired UK that he " was able to look at some of the material provided in Britain to the Guardian  by Edward Snowden last year." Campbell, who has been reporting about Britain's signals intelligence agency (GCHQ) for more than 30 years,  would not answer a question about whether he has copies of the relevant documents.
Paul Merrell

Israel decries US 'knife in back' over Palestinian govt - Yahoo News - 0 views

  • Washington's support for a new Palestinian government backed by Israel's Islamist foe Hamas, has left the Jewish state feeling betrayed, triggering a new crisis with its closest ally. Several Israeli ministers expressed public anger on Tuesday after the US State Department said it was willing to work with the new Palestinian unity government put together by the West Bank leadership and Gaza's Hamas rulers. Technocratic in nature, the new government was sworn in on Monday in front of president Mahmud Abbas, with Washington offering its backing several hours later.
  • Speaking to reporters on Monday, State Department spokeswoman Jen Psaki said the new cabinet would be judged "by its actions.""At this point, it appears that president Abbas has formed an interim technocratic government that does not include ministers affiliated with Hamas," she said. "With what we know now, we will work with this government."
  • The US endorsement was viewed as a major blow for Israeli Prime Minister Benjamin Netanyahu, who had on Sunday urged the international community not to rush into recognising the new government, which he said would only "strengthen terror."
  • ...4 more annotations...
  • "Unfortunately, American naivety has broken all records," said Communications Minister Gilad Erdan, a cabinet hardliner who is close to Netanyahu."Collaborating with Hamas, which is defined as a terror organisation in the United States, is simply unthinkable. "US capitulation to Palestinian tactics badly damages the chance of ever returning to negotiations and will cause Israel to take unilateral steps to defend its citizens from the government of terror which Abu Mazen (Abbas) has set up." Public radio said Netanyahu was feeling "betrayed and deceived," particularly as he had assured his security cabinet that US Secretary of State John Kerry had promised him Washington would not recognise the new government immediately.
  • "And it wasn't immediate -- it was five hours later that this recognition took place," the radio noted ironically. A senior political official quoted by the Israel Hayom freesheet, widely regarded as Netanyahu's mouthpiece, said the US move was "like a knife in the back." - 'Answer with annexation' - Israeli commentators said the Palestinians had chalked up a "major success" in driving a new wedge between Israel and its US ally.
  • With the peace process in tatters, hardliners within Netanyahu's rightwing coalition have been pushing for Israel to take unilateral steps such as the annexation of the main Jewish settlement blocs in the occupied West Bank.
  • The security cabinet agreed on Monday to set up a team to examine the annexation option, but Yediot Aharonot commentator Shimon Shiffer said the move was a sop to Bennett and other hardliners rather than a serious policy change.
  •  
    What's remarkable here is that Obama has apparently ratcheted down his fear of the Israel Lobby. But it's not as though Mr. Netanyahu was not warned that the world would see Israel as responsible if it blew up the Kerry-brokered negotiation between Israel and Palestine. Israel did blow it up by not delivering the last shipment of Palestinian prisoners required by the pre-negotiation agreement, attempting to gain further concessions using their release as leverage.  Palestine responded by joining a large number of U.N. treaty organizations and was thus recognized by most nations on the planet as a nation: a critically important move, because it is recognition by other nations as a nation that qualifies Palestine as a full-fledged U.N. member rather than an observer state, an application Palestine can now make at the time of its choosing. That is also important because Palestine is now positioned to join the Rome Convention that created the International Criminal Court, providing Palestine with legal standing to file war crime charges against high Israeli officials that would then obligate the Court to investigate. Palestine is holding back on that move, using it as bargaining leverage on the world stage.   Palestine also responded by forming a coalition "unity" government with Hamas, the political party that nominally rules the Gaza strip, the world's largest open-air concentration camp. At Israel's request, the U.S. had several years ago designated Hamas as a terrorist organization. But that was a purely political move. It seems that the political situation has changed. Obama is pivoting out of the Mideast as he performs his ballyhooed "pivot to Asia," which is actually a pivot to contain Russia that isn't working and a pivot to subjugate Africa and its huge store of untapped natural resources, including lots of oil. Blocking China's economic deals in Africa with military force seems to be the current top concern in the White House. Israel was already a pari
Paul Merrell

FBI Director: Sony's 'Sloppy' North Korean Hackers Revealed Their IP Addresses | WIRED - 0 views

  • The Obama administration has been tightlipped about its controversial naming of the North Korean government as the definitive source of the hack that eviscerated Sony Pictures Entertainment late last year. But FBI director James Comey is standing by the bureau’s conclusion, and has offered up a few tiny breadcrumbs of the evidence that led to it. Those crumbs include the claim that Sony hackers sometimes failed to use the proxy servers that masked the origin of their attack, revealing IP addresses that the FBI says were used exclusively by North Korea. Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has “very high confidence” in the FBI’s attribution of the attack to North Korea. And he named several of the sources of his evidence, including a “behavioral analysis unit” of FBI experts trained to psychologically analyze foes based on their writings and actions. He also said that the FBI compared the Sony attack with their own “red team” simulations to determine how the attack could have occurred. And perhaps most importantly, Comey now says that the hackers in the attack failed on multiple occasions to use the proxy servers that bounce their Internet connection through an obfuscating computer somewhere else in the world, revealing IP addresses that tied them to North Koreans.
  • “In nearly every case, [the Sony hackers known as the Guardians of Peace] used proxy servers to disguise where they were coming from in sending these emails and posting these statements. But several times they got sloppy,” Comey said. “Several times, either because they forgot or because of a technical problem, they connected directly and we could see that the IPs they were using…were exclusively used by the North Koreans.” “They shut it off very quickly once they saw the mistake,” he added. “But not before we saw where it was coming from.” Comey’s brief and cryptic remarks—with no opportunity for followup questions from reporters—respond to skepticism and calls for more evidence from cybersecurity experts unsatisfied with the FBI’s vague statements tying the hack to North Korean government. In a previous public announcement the FBI had said only that it found “similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,” as well as IP addresses that matched prior attacks it knows to have originated in North Korea. At that time, the FBI also said it had further evidence matching the tools used in the attack to a North Korean hacking attack that hit South Korean banks and media outlets.
  • Following those elliptical statements, the cybersecurity community demanded more information be released to prove North Korea’s involvement. Some have even signed a petition on the White House website calling for more transparency in the investigation. Well-known security blogger and author Bruce Schneier has compared the FBI’s “trust us” mentality to the claims of the Bush administration about Saddam Hussein’s nonexistent weapons of mass destruction in the run-up to the Iraq War. Without more information, security experts themselves have remained deeply divided in their conclusions about who hacked Sony.
  • ...1 more annotation...
  • That pseudo-explanation will likely do little to quell the security community’s doubts. Even if the hackers appeared to fail to use proxies on some occasions, it could still be very difficult to be sure those “real” IP addresses weren’t proxies themselves designed to serve as further misdirection. And a nagging loose thread remains that the Guardians of Peace hackers in their initial statements to Sony tried to extort money from the company before making any political demands. Sony’s Kim Jong-un assassination comedy “The Interview,” the suppression of which is believed by many to be the North Korean government’s motive in the hack, wasn’t even mentioned by the hackers until long after the intrusion was underway. Comey didn’t address that plot hole in the North Korean explanation in his speech.
Paul Merrell

The Newest Reforms on SIGINT Collection Still Leave Loopholes | Just Security - 0 views

  • Director of National Intelligence James Clapper this morning released a report detailing new rules aimed at reforming the way signals intelligence is collected and stored by certain members of the United States Intelligence Community (IC). The long-awaited changes follow up on an order announced by President Obama one year ago that laid out the White House’s principles governing the collection of signals intelligence. That order, commonly known as PPD-28, purports to place limits on the use of data collected in bulk and to increase privacy protections related to the data collected, regardless of nationality. Accordingly, most of the changes presented as “new” by Clapper’s office  (ODNI) stem directly from the guidance provided in PPD-28, and so aren’t truly new. And of the biggest changes outlined in the report, there are still large exceptions that appear to allow the government to escape the restrictions with relative ease. Here’s a quick rundown.
  • Retention policy for non-U.S. persons. The new rules say that the IC must now delete information about “non-U.S. persons” that’s been gathered via signals intelligence after five-years. However, there is a loophole that will let spies hold onto that information indefinitely whenever the Director of National Intelligence determines (after considering the views of the ODNI’s Civil Liberties Protection Officer) that retaining information is in the interest of national security. The new rules don’t say whether the exceptions will be directed at entire groups of people or individual surveillance targets.  Section 215 metadata. Updates to the rules concerning the use of data collected under Section 215 of the Patriot Act includes the requirement that the Foreign Intelligence Surveillance Court (rather than authorized NSA officials) must determine spies have “reasonable, articulable suspicion” prior to query Section 215 data, outside of emergency circumstances. What qualifies as an emergency for these purposes? We don’t know. Additionally, the IC is now limited to two “hops” in querying the database. This means that spies can only play two degrees of Kevin Bacon, instead of the previously allowed three degrees, with the contacts of anyone targeted under Section 215. The report doesn’t explain what would prevent the NSA (or other agency using the 215 databases) from getting around this limit by redesignating a phone number found in the first or second hop as a new “target,” thereby allowing the agency to continue the contact chain.
  • National security letters (NSLs). The report also states that the FBI’s gag orders related to NSLs expire three years after the opening of a full-blown investigation or three years after an investigation’s close, whichever is earlier. However, these expiration dates can be easily overridden by by an FBI Special Agent in Charge or a Deputy Assistant FBI Director who finds that the statutory standards for secrecy about the NSL continue to be satisfied (which at least one court has said isn’t a very high bar). This exception also doesn’t address concerns that NSL gag orders lack adequate due process protections, lack basic judicial oversight, and may violate the First Amendment.
  • ...1 more annotation...
  • The report also details the ODNI’s and IC’s plans for the future, including: (1) Working with Congress to reauthorize bulk collection under Section 215. (2) Updating agency guidelines under Executive Order 12333 “to protect the privacy and civil liberties of U.S. persons.” (3) Producing another annual report in January 2016 on the IC’s progress in implementing signals intelligence reforms. These plans raise more questions than they answer. Given the considerable doubts about Section 215’s effectiveness, why is the ODNI pushing for its reauthorization? And what will the ODNI consider appropriate privacy protections under Executive Order 12333?
Paul Merrell

iSpy: The CIA Campaign to Steal Apple's Secrets - 0 views

  • ESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.
  • The CIA declined to comment for this story. The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store. The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode. Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”
  • Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows. The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies. “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”
Paul Merrell

Israel Banned Renowned Doctor and Human Rights Activist Mads Gilbert from Entering Gaza for Life | Global Research - 0 views

  • Israel has banned Norwegian doctor and human rights activist Mads Gilbert from entering Gaza for life. Gilbert, a professor at the University Hospital of North Norway, where he has worked since 1976, earned international renown for his philanthropic work in late 2008, during Israel’s Operation Cast Lead, an attack that, according to Israeli human rights organization B’Tselem, killed roughly 1,400 Gazans, including almost 800 civilians, 350 of whom were children. The aid worker, along with fellow Norwegian doctor Erik Fosse, decided to volunteer in Gaza as soon as he heard that bombing had started, on 27 December 2008. Thanks to diplomatic and economic support (in the sum of $1 million dollar of emergency funding from the Norwegian Ministry of Foreign Affairs), the two physicians managed to arrive in the strip by 30 December.
  • The Israeli government prevented all international press from entering Gaza during Cast Lead (a documentary, The War Around Us, was made about the only two foreign reporters in the strip at the time), in what Gilbert called Israel’s insidious “PR plan.” The doctor, as one of the only international aid workers in Gaza, thus devoted considerable time to speaking with local Palestinian news outlets, some of whom were reporting on behalf of foreign networks including BBC, CNN, ABC, and Al Jazeera. BBC aired an interview with Gilbert, conducted in the hospital. The questions asked, and the answers garnered, were eerily similar to those he would give just five years later, during Operation Protective Edge. The interviewer began asking him to respond to Israel’s claims that it was not targeting civilians, that it was only attacking Hamas militants. Gilbert called the claim “an absolutely stupid statement” and explained that, among the hundreds of patients he had seen at that point, only two had been fighters. The “large majority” were women, children, and men civilians. “These numbers are contradictory to everything Israel says,” he reported.
  • The doctor directed one heart-wrenching passage to President Obama, writing “Mr Obama – do you have a heart? I invite you – spend one night – just one night – with us in Shifa. I am convinced, 100 per cent, it would change history. Nobody with a heart and power could ever walk away from a night in Shifa without being determined to end the slaughter of the Palestinian people.” Israel later attacked Shifa hospital. Doctors Without Borders (MSF) “strongly condemn[ed]” the incursion, saying it “demonstrate[d] how civilians in Gaza have nowhere safe to go.” MSF director Marie-Noëlle Rodrigue stated, in an official statement, “When the Israeli army orders civilians to evacuate their houses and their neighborhoods, where is there for them to go? Gazans have no freedom of movement and cannot take refuge outside Gaza. They are effectively trapped.” Shifa was one of the over 10 medical facilities Israel bombed in its 50-day offensive.
  • ...5 more annotations...
  • Gilbert drew attention to the fact that the overflowing hospital did not have enough supplies to treat all of its patients, and censured the international community for doing nothing to assist them. Israel would not let in foreign doctors, and yet Palestinians were “dying waiting for surgery.” “This is a complete disaster,” he remarked, calling it “the worst man-made disaster” he could think of. “There are injuries you just don’t want to see in this world.” Operation Protective Edge In 2008 and 2009, Gilbert treated Palestinians who had been grievously wounded by Israel’s use of experimental and illegal chemical weapons, including white phosphorous, dense inert metal explosives (DIME) munitions, and flechette shells. In July 2014, in the midst of Israel’s most recent attack on Gaza, Gilbert spoke with Electronic Intifada, revealing that he saw indications of renewed use of DIME weapons and flechettes. While volunteering in Shifa hospital, Gaza’s principal medical facility, Gilbert penned an open letter, lamenting the unspeakable horrors the Israeli military was instigating.
  • Before Operation Protective Edge commenced in early July 2014, Gilbert toured medical and health facilities and individual homes in Gaza, researching for a United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) report on the dire state of the strip’s health sector. He wrote of “overstretched” health facilities, widespread physical and psychological trauma, “a deep financial crisis,” a lack of needed medical supplies, and a “severe energy crisis.” He also noted the “devastating results of the blockade imposed by the Government of Israel,” with rampant poverty, a 38.5% unemployment rate, food insecurity in at least 57% of households, and inadequate access to clean water. All of these already extreme ills were only exacerbated by the July-August Israeli assault on Gaza, an onslaught that left roughly 2,200 Palestinians dead, including over 1,500 civilians, more than 500 of whom were children. Gilbert is not the only one Israel has recently prevented from entering Gaza. In August, just after the end of its military assault, Israel refused to allow Amnesty International and Human Rights Watch, the world’s leading human rights organizations, from entering the strip, impeding them from conducting war crimes investigations. The organizations had been requesting access for over a month, before Israel had even begun its ground invasion of Gaza, yet were continuously prevented from doing so, Israeli journalist Amira Hass reported in Haaretz, “using various bureaucratic excuses.”
  • Other aid workers and medical professionals have faced even worse consequences for volunteering to help Palestinians. In August, Israeli occupation forces killed a social worker. In the same month, as the Israeli military engaged in a campaign to target and openly murder Palestinian civilians who spoke Hebrew, Israeli forces assassinated volunteers working with the Palestine Red Crescent, a non-profit humanitarian organization, part of the International Red Cross and Red Crescent Movement. A common myth suggests that Israel ended its occupation of Gaza with its 2005 disengagement. The state’s ability to ban, and even kill, internationally recognized human rights organizations and doctors—not to mention food,construction equipment, and medical supplies—from entering Palestinian territory, however, demonstrates that Gaza is by no means autonomous. Israel’s siege of the strip is clearly a continuation of its 47-year-long illegal military occupation. As legal scholar Noura Erakat explains
  • Despite removing 8,000 settlers and the military infrastructure that protected their illegal presence, Israel maintained effective control of the Gaza Strip and thus remains the occupying power as defined by Article 47 of the Hague Regulations. To date, Israel maintains control of the territory’s air space, territorial waters, electromagnetic sphere, population registry and the movement of all goods and people. … Palestinians have yet to experience a day of self-governance. Israel immediately imposed a siege upon the Gaza Strip when Hamas won parliamentary elections in January 2006 and tightened it severely when Hamas routed Fatah in June 2007. The siege has created a “humanitarian catastrophe” in the Gaza Strip. Inhabitants will not be able to access clean water, electricity or tend to even the most urgent medical needs. The World Health Organization explains that the Gaza Strip will be unlivable by 2020. Not only did Israel not end its occupation, it has created a situation in which Palestinians cannot survive in the long-term.
  • In a late October discussion with the Daily Targum, Gilbert encouraged Americans to do what they can to speak out against Israel’s illegal occupation and blockade of the Palestinian territories, and to pressure their government to stop its indefatigable support for Israeli crimes. At present, the US provides Israel with over 3.1$ billion of military aid per year. In the past 52 years, over $100 billion US tax dollars have been given to the country in military aid alone. “You are the change-makers,” Gilbert told American readers. “The key to the change when it comes to the occupation of Palestine lies in the United States.” “Solidarity, not pity,” he said, is the solution.
Paul Merrell

Former Israeli Opposition Leader Puts Bibi-Boehner Ploy Bluntly « LobeLog - 0 views

  • Yossi Sarid, the former head of Israel’s Meretz Party and leader of the opposition in the Knesset from 2001 to 2003, has just written a very blunt—far too blunt for “acceptable” political discourse in Washington, DC—op-ed published Sunday by Haaretz. Unfortunately, it’s behind a pay wall, so the most I can do is extract a few excerpts. The title is straightforward: “Beware: Republican Jews on the Warpath,” and Sarid, who also served as minister of education under Ehud Barak, doesn’t pull any punches about what Boehner’s fraudulent invitation to Israeli Prime Minister Benjamin Netanyahu is really all about. Now it’s no longer a “crisis in the relationship” that they try to paper over; now it’s no longer just “tensions with the White House” that they’re making every effort to reduce in between meetings; now, it’s an open war with the United States. It’s Sheldon Adelson versus Barack Obama, and Israel is caught in the cross-fire. After Vice President Joe Biden, our greatest friend over there, announced an unspecified trip abroad that will prevent him from being in Congress at the fateful hour, Republican Jewish organizations launched a campaign of intimidation against those lawmakers who had already announced their intent to skip the joint session: Their political fate will be bitter.
  • …Ambassador to Washington Ron Dermer, in the service of his master, is rallying his troops and launching a combined assault on Capitol Hill. Benjamin Netanyahu is determined to show the president once and for all who really rules in Washington, who is the landlord both here and there. … One Matthew Brooks – the executive director of the Republican Jewish Coalition, who does the will of its financial backers – explained over the weekend, “We will commit whatever resources we need to make sure that people are aware of the facts, that given the choice to stand with Israel and Prime Minister Netanyahu in opposition to a nuclear Iran, they chose partisan interests and to stand with President Obama.” Mort Klein, president of the Zionist Organization of America, added unambiguously, “We will, of course, be publicly condemning any Democrats who don’t show up for the speech — unless they have a doctor’s note.” Doctor, this man is sick and urgently needs tranquilizers.
  • … Israel, which until now was a cornerstone of bipartisanship, has become loathsome to its traditional supporters. Benjamin Nitay Netanyahu, the Israeli-American, has made it into something that reeks, even among its longtime supporters. In these very moments, the protocols are being rewritten. Rich Jews are writing them in their own handwriting. They, in their wealth, are confirming with their own signatures what anti-Semites used to slander them with in days gone by: We, the elders of Zion, pull the strings of Congress, and the congressmen are nothing but marionettes who do our will. If they don’t understand our words, they’ll understand our threats. And if in the past, we ran the show from behind the scenes, now we’re doing it openly, from center stage. And if you forget our donations, the wellspring will run dry.
  • ...1 more annotation...
  • You’ll remember that Obama, during an off-the-record meeting with Democratic senators three weeks ago, reportedly appealed to them to resist “donors and others” who opposed a deal with Iran and were pushing for new sanctions legislation that risked sabotaging the nuclear-focused talks with Iran and an eventual deal. Sen. Robert Menendez, who has been pushing for such legislation for more than a year, reportedly replied that he took “personal offense” at Obama’s remarks about donors, apparently interpreting Obama’s comments as suggesting that Menendez’s position was motivated by his desire and need for campaign cash. The New York Times helpfully noted in a profile of Menendez that the New Jersey senator had received $341,170 from hard-line pro-Israel groups over the past seven years, “more than any other Democrat in the Senate.” (In fact, he received more money than any other Senate candidate—Democratic or Republican—in the 2012 elections, while his Republican comrade-in-arms and co-sponsor for sanctions legislation, Illinois Sen. Mark Kirk, has received more campaign cash from pro-Israel political actions committees (PACs) associated with the American Israel Public Affairs Committee (AIPAC) than any other member of Congress over the past decade. And that doesn’t necessarily include all the much-harder-to-track money provided by donors like Adelson, who chairs Brooks’s RJC, through super PACS and other vehicles.)  Indeed, there’s no doubt that Obama’s reference to “donors” touched a very sensitive nerve with Menendez. Sarid, whose op-ed is most unlikely to appear in any mainstream U.S. publication, has now pounded it with a sledgehammer.
  •  
    There it is, finally out in the open. 
Paul Merrell

False Flags, Charlie Hebdo and Tsarnaev's Trial: Cui bono? | Global Research - 0 views

  • UPDATES: Well known writers Thierry Meyssan and Kevin Barrett see the “terrorist” attach on Charlie Hebdo as a false flag attack. See http://www.voltairenet.org/article186441.html [1] and http://presstv.com/Detail/2015/01/10/392426/Planted-ID-card-exposes-Paris-false-flag [2] UPDATE: According to news reports, one of the accused in the attack on Charlie Hebdo when hearing that he was being sought for the crime turned himself in to police with an ironclad alibi. https://www.intellihub.com/18-year-old-charlie-hebdo-suspect-surrenders-police-claims-alibi/[3] According to news reports, police found the ID of Said Kouachi at the scene of the Charlie Hebdo shooting. Does this sound familiar? Remember, authorities claimed to have found the undamaged passport of one of the alleged 9/11 hijackers among the massive pulverized ruins of the twin towers. Once the authorities discover that the stupid Western peoples will believe any transparent lie, the authorities use the lie again and again. The police claim to have discovered a dropped ID is a sure indication that the attack on Charlie Hebdo was an inside job and that people identified by NSA as hostile to the Western wars against Muslims are going to be framed for an inside job designed to pull France firmly back under Washington’s thumb. http://www.wfmz.com/shooting-at-french-satirical-magazine-office/30571524 There are two ways to look at the alleged terrorist attack on the French satirical magazine Charlie Hebdo.
  • One is that in the English speaking world, or much of it, the satire would have been regarded as “hate speech,” and the satirists arrested. But in France Muslims are excluded from the privileged category, took offense at the satire, and retaliated. Why would Muslims bother? By now Muslims must be accustomed to Western hypocrisy and double standards. Little doubt that Muslims are angry that they do not enjoy the protections other minorities receive, but why retaliate for satire but not for France’s participation in Washington’s wars against Muslims in which hundreds of thousands have died? Isn’t being killed more serious than being satirized? Another way of seeing the attack is as an attack designed to shore up France’s vassal status to Washington. The suspects can be both guilty and patsies. Just remember all the terrorist plots created by the FBI that served to make the terrorism threat real to Americans. http://reason.com/blog/2014/07/22/human-rights-watch-all-of-the-high-profi [4] France is suffering from the Washington-imposed sanctions against Russia. Shipyards are impacted from being unable to deliver Russian orders due to France’s vassalage status to Washington, and other aspects of the French economy are being adversely impacted by sanctions that Washington forced its NATO puppet states to apply to Russia.
  • This week the French president said that the sanctions against Russia should end (so did the German vice-chancellor). This is too much foreign policy independence on France’s part for Washington. Has Washington resurrected “Operation Gladio,” which consisted of CIA bombing attacks against Europeans during the post-WW II era that Washington blamed on communists and used to destroy communist influence in European elections? Just as the world was led to believe that communists were behind Operation Gladio’s terrorist attacks, Muslims are blamed for the attacks on the French satirical magazine. The Roman question is always: Who benefits? The answer is: Not France, not Muslims, but US world hegemony. US hegemony over the world is what the CIA supports. US world hegemony is the neoconservative-imposed foreign policy of the US.
  •  
    Paul Craig Roberts is on a roll.
Paul Merrell

Google warns of US government 'hacking any facility' in the world | Technology | The Guardian - 0 views

  • Google is boldly opposing an attempt by the US Justice Department to expand federal powers to search and seize digital data, warning that the changes would open the door to US “government hacking of any facility” in the world. In a strongly worded submission to the Washington committee that is considering the proposed changes, Google says that increasing the FBI’s powers set out in search warrants would raise “monumental and highly complex constitutional, legal and geopolitical concerns that should be left to Congress to decide”. The search giant warns that under updated proposals, FBI agents would be able to carry out covert raids on servers no matter where they were situated, giving the US government unfettered global access to vast amounts of private information.
  • In particular, Google sounds the alarm over the FBI’s desire to “remotely” search computers that have concealed their location – either through encryption or by obscuring their IP addresses using anonymity services such as Tor. Those government searches, Google says, “may take place anywhere in the world. This concern is not theoretical. ... [T]he nature of today’s technology is such that warrants issued under the proposed amendment will in many cases end up authorizing the government to conduct searches outside the United States.”
  • The Justice Department itself has tried to assuage anxieties about its proposed amendment. In its comment to the committee, DoJ officials say that federal agents would only request the new type of warrants where there was “probable cause to search for or seize evidence, fruits, or instrumentalities of crime”. But civil liberties and legal groups remain unconvvinced, insisting that the language is so vaguely worded that it would have draconian and global implications. In its submission, the American Civil Liberties Union said that the proposed changes could violate the fourth amendment of the US constitution, which bans unreasonable searches and seizures. The ACLU’s principal technologist, Christopher Soghoian, said: “The government is seeking a troubling expansion of its power to surreptitiously hack into computers, including using malware. Although this proposal is cloaked in the garb of a minor procedural update, in reality it would be a major and substantive change that would be better addressed by Congress.”
  •  
    Fourth Amendment: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and *particularly* describing *the place to be searched,* and the persons or things to be seized." The Justice Department proposed amendment to the rules would abolish the emphasized portion of the Amendment, substituting in its place the "general warrant" that the Amendment was intended to forbid. I'm coming to realize more and more that it's my own government, not terrorists™, that needs more surveillance.  
Paul Merrell

CISA Security Bill: An F for Security But an A+ for Spying | WIRED - 0 views

  • When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.
  • On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.” The central concern of that letter was how the same data sharing meant to bolster cybersecurity for companies and the government opens massive surveillance loopholes. The bill, as worded, lets a private company share with the Department of Homeland Security any information construed as a cybersecurity threat “notwithstanding any other provision of law.” That means CISA trumps privacy laws like the Electronic Communication Privacy Act of 1986 and the Privacy Act of 1974, which restrict eavesdropping and sharing of users’ communications. And once the DHS obtains the information, it would automatically be shared with the NSA, the Department of Defense (including Cyber Command), and the Office of the Director of National Intelligence.
  • In a statement posted to his website yesterday, Senator Burr wrote that “Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes.” But in fact, the bill’s data sharing isn’t limited to cybersecurity “threat indicators”—warnings of incoming hacker attacks, which is the central data CISA is meant to disseminate among companies and three-letter agencies. OTI’s Greene says it also gives companies a mandate to share with the government any data related to imminent terrorist attacks, weapons of mass destruction, or even other information related to violent crimes like robbery and carjacking. 
  • ...2 more annotations...
  • The latest update to the bill tacks on yet another kind of information, anything related to impending “serious economic harm.” All of those vague terms, Greene argues, widen the pipe of data that companies can send the government, expanding CISA into a surveillance system for the intelligence community and domestic law enforcement. If information-sharing legislation does not include adequate privacy protections, then...It’s a surveillance bill by another name. Senator Ron Wyden
  • “CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”
  •  
    I read the legislation. It's as bad for privacy as described in the aritcle. And its drafting is incredibly sloppy.
Paul Merrell

Turkey accuses US of arming Kurdish 'terrorists' - ITV News - 0 views

  • Turkey accused Barack Obama of arming “terrorists” in a Kurdish militant group in Syria which it has blamed for a deadly car bombing which claimed at least 28 lives on Wednesday.
  • The Turkish President Recep Tayyip Erdoğan has accused the US-supported Kurdish rebel group YPG of carrying out the attack in Ankara. America has supported the YPG fighters - linked to the political PYD group - in their fight against Islamic State in Syria but Turkey insists they are terrorists. Erdoğan said he tell Mr Obama that plane loads of weapons sent from the US had aided Kurdish group - and had also ended up in the hands of Isis. "Three plane loads arrived, half of them ended up in the hands of Daesh (Islamic State), and half of them in the hands of the PYD," he said
  •  
    Many reporters have suggested that the car bombing in Ankara was a false flag attack designed to justify Turkey's announced intent to seize a 10-mile strip of Syria to block formation of an independent  Kurdish territory on Turkey's border.  
Paul Merrell

Political ignorance and bombing Agrabah - The Washington Post - 0 views

  • A recent Public Policy Polling survey found that 30% of Republicans and 19% of Democrats say they support “bombing Agrabah” – the fictional nation portrayed in the Disney movie Aladdin.
  • All of this is just part of the broader phenomenon of widespread political ignorance. For most people, ignorance about science and public policy is perfectly rational behavior, because there is so little chance that their vote will decisively affect electoral outcomes.
  • UPDATE #2: UPDATE: It is perhaps worth noting that a whopping 41% of Donald Trump supporters favor bombing Agrabah. This adds to the other evidence indicating that his support is disproportionately drawn from the least knowledgeable parts of the electorate.
Paul Merrell

Justin Raimondo: A Covert Affair: Petraeus Caught in the Honeypot? - 0 views

  • So who would have an interest in getting rid of Petraeus? Here’s where the Cantor connection comes in. The tip by an anonymous “FBI employee” that wound up in Cantor’s office two weeks ago came through Rep. David Reichert, Republican of Washington state, who has a friend who knows the whistleblower. Cantor then spoke to the whistleblower directly, who put him in touch with FBI Director Mueller. Cantor is a great friend of Israel, and Petraeus — not so much. The General was attacked, as you’ll recall, by partisans of the Lobby, including Abe Foxman, when he delivered testimony before Congress citing Israel as a strategic liability in the Middle East. As the executor of the new Obamaite policy of sidling up to Islamists, not only in Libya but also in Syria and Egypt, Petraeus was no doubt seen by the Israelis as an enemy to be neutralized.
  • Broadwell’s affiliation with the Jebsen Center, and the Center’s connection to the neoconservative network, sets the scene: a young, attractive woman with impeccable national security credentials throws herself at Petraeus, and he takes the bait. Whether she’s been recruited by a foreign intelligence agency at this point or not is irrelevant: he’s already put himself in a vulnerable position, and there are any number of actors on the international stage more than willing to press their advantage. Will we ever know the full story? At this point, the story is so hot that it may burn the cover story — “it’s all about sex” — right off the wrapper. Because there’s more — a lot more — here than meets the eye. When Cantor pledged to Israeli Prime Minister Benjamin Netanyahu that he and his fellow Republicans “will serve as a check on the administration” in regard to the President’s policy toward Israel, he was clearly aligning himself with a foreign leader against American interests as perceived by the White House. But would he really go this far — deliberately taking down a key figure, one beloved by Republicans, in order to keep his promise to Netanyahu?
  • Update: This morning [11/12/12] the New York Times reports: “F.B.I. agents interviewed Ms. Broadwell for the first time the week of Oct. 21, and she acknowledged the affair, a government official briefed on the matter said. She also voluntarily gave the agency her computer. In a search, the agents discovered several classified documents, which raised the additional question of whether Mr. Petraeus had given them to her. She said that he had not. Agents interviewed Mr. Petraeus the following week. He also admitted to the affair but said he had not given any classified documents to her. The agents then interviewed Ms. Broadwell again on Friday, Nov. 2, the official said.”
Gary Edwards

DHS insider update: "It has begun" « Northeast Intelligence NetworkNortheast Intelligence Network - 1 views

  •  
    The forced confiscation of citizen savings held in Cypress bank accounts is a test by the International Bank to see if people will roll over or fight.  The Global elites are ready to pull the trigger on world wide economic collapse, and they're testing to see what the response will be. clip: "According to the most recent information provided to me from my source within the Department of Homeland Security known as "Rosebud," the final preparations are being made to deploy heavily armed federalized forces onto the streets of America. They will be deployed under the pretext of "restoring and maintaining order from the chaos brought about by the economic collapse," adding that "many will demand and embrace their deployment on the streets of America. They will get what they ask for, and more." Much like the security theater we have seen following the attacks of 9/11, we will be subjected to the jack-booted control of a federal army whose allegiance is not to the American people, but to the very architects of the chaos. "This is the reason that drones are flying over U.S. cities and farmland, and gun control legislation is on the fast track for complete implementation," stated this source. "How can people look at the situation in Cyprus and not think it won't happen here? It will, and the blowback will be unlike this country has ever seen. Surveillance, disarming the public, and conditioning the people to believe it's for their own safety is and has been  part of the plan all along. Anyone owing a gun will be demonized and described as contributing to the problem." "What happens when the middle class loses much of their wealth, or it is confiscated, by the stroke of a pen or a keyboard? What will the stores look like when people, unprepared due to the damn lies of the corporate media and the shills for the ruling elite, run to empty out everything they can get their hands on as the world, as they know it, collapses around them?" It was
« First ‹ Previous 41 - 60 of 219 Next › Last »
Showing 20 items per page