Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "1-state-solution" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Netanyahu: I won't forcibly evacuate settlements | The Times of Israel - 0 views

  • he Israeli government will not force West Bank settlers to leave their homes, even under a permanent peace agreement with the Palestinians, Prime Minister Benjamin Netanyahu said in a TV interview.
  • The prime minister said it was clear that Israel would not be able to extend its sovereignty under a permanent accord to encompass all of the settlements, but he was adamant that “there will be no act of evacuation.” The comment marked the first time that he has indicated that he would not countenance a repeat of the 2005 forced evacuation of Gaza’s settlements, overseen by the late prime minister Ariel Sharon, which he opposed at the time. Asked in the Channel 2 interview on Friday how he could hope to reach a deal with the Palestinians within such limitations, and whether he expected settlers to leave their homes voluntarily, Netanyahu said it was not yet clear where the borders of a two-state solution would run, and that he did not “want to go into the details” of how an accommodation regarding the settlers might be achieved. “Of course some of the settlements won’t be part of the deal, everyone understands that,” Netanyahu said. “I will make sure that [number] is as limited as possible, if we get there.” He pledged that no Israeli will be “abandoned.” Netanyahu’s comments marked the closest he has come to confirming The Times of Israel’s exclusive report from last month, which quoted a well-placed official in the Prime Minister’s Office as saying that Netanyahu would insist that settlers who find themselves on the far side of a two-state border be given the choice between remaining in place and living under Palestinian rule, or relocating to areas under Israeli sovereign rule.
  • The prime minister charged, however, that the Palestinians under PA President Mahmoud Abbas were “a very long way” from readiness for viable peace terms. They had to recognize Israel as a Jewish state, abandon the demand for a “right of return” for millions of refugee descendants to Israel, and agree to an “end of the conflict” accord, he said, and were giving no signs of being prepared to do so. Asked about the stern interview given by Barack Obama to Bloomberg on the eve of his meeting with Netanyahu in Washington Monday — the US president had castigated the settlement enterprise in a wide-ranging critique — Netanyahu said vaguely that “lots of people say lots of things.” He said he’d “stood up to pressure” in the past, and added that he had done so again while in the US this week, but did not elaborate. More important than any critical interview, he said, was the “positive” meeting he had with Obama at the White House.
  • ...1 more annotation...
  • he Israeli government will not force West Bank settlers to leave their homes, even under a permanent peace agreement with the Palestinians, Prime Minister Benjamin Netanyahu said in a TV interview.
  •  
    Netanyahu serves up yet another deal-breaker in the ongoing Israel-Palestine negotiations led by John Kerry. Let's keep in mind that most of the Israeli settlements in Palestine territory are built on land forcibly stolen from Palestinians and served by stolen Palestinian water rights.
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • ...7 more annotations...
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Paul Merrell

How US Propaganda Plays in Syrian War - Consortiumnews - 0 views

  • U.S. foreign policymakers have experimented at planting propaganda in social media and then citing it as evidence to support their goals, a process now playing out in the Syrian “regime change,” as Rick Sterling explains.
  • The major achievement of The Syria Campaign has been the branding and promotion of the “White Helmets,” also known as “Syria Civil Defense,” which began with a British military contractor, James LeMesurier, giving some rescue training to Syrians in Turkey with funding provided by the U.S. and U.K. The group stole this name from the REAL Syria Civil Defense as documented in this recent report from Aleppo. The “White Helmets” are marketed in the West as civilian volunteers doing rescue work. On Sept. 22, it was announced that the Right Livelihood Award , the so-called “Alternative Nobel Prize,” is being given to the U.S./U.K.-created White Helmets “for their outstanding bravery, compassion and humanitarian engagement in rescuing civilians from the destruction of the Syrian civil war.”  But the White Helmets are largely a propaganda tool promoting Western intervention against Syria. Unlike a legitimate rescue organization such as the Red Cross or Red Crescent, the “White Helmets” only work in areas controlled by the armed opposition. As shown in this video, the White Helmets pick up the bodies of individuals executed by the terrorists; they claim to be unarmed but are not; and they falsely claim to be neutral.
  • Many of the videos from Al Qaeda/terrorist-dominated areas of Syria have the “White Helmets” logo because the White Helmets work in alliance with these extremist groups as primarily a media marketing tool to raise public support for continuing the support to the armed opposition as well as the demonization of the Syrian government.  The Rights Livelihood press release said the White Helmets “remain outspoken in calling for an end to hostilities in the country.” But that is false, too. The White Helmets actively call for U.S./NATO military intervention through a “No Fly Zone,” which would begin with attacks upon and destruction of government anti-aircraft positions and aircraft. A Major Act of War Taking over the skies above another country is an act of war that would require a major U.S. military operation, according to senior American generals.
  • ...6 more annotations...
  • The New York Times reported that in 2012 General Martin E. Dempsey, chairman of the Joint Chiefs of Staff, told the White House that imposing a no-fly zone in Syria would require up to 70,000 American servicemen to destroy Syria’s antiaircraft system and then impose round-the-clock control over Syrian airspace. General Carter Ham, former commander of the U.S. Africa Command who oversaw the aerial attacks on Libya in 2011, said on CBS News that “I worry sometimes that, when people say ‘impose a no-fly zone,’ there is this almost antiseptic view that this is an easily accomplished military task. It’s extraordinarily difficult. … “It first entails — we should make no bones about it. It first entails killing a lot of people and destroying the Syrian air defenses and those people who are manning those systems. And then it entails destroying the Syrian air force, preferably on the ground, in the air if necessary. This is a violent combat action that results in lots of casualties and increased risk to our own personnel.”
  • In other words, an appeal for a “no-fly zone” is not a call for a non-violent solution. It is seeking a bloody act of war by the United States against Syria, a nation that poses no threat to America. It also would almost surely be carried out in violation of international law since a United Nations Security Council resolution would face vetoes from Russia and probably China. Also, the White Helmets have never criticized or called for the end of funding to extremist organizations including Nusra Front, Al Qaeda’s Syrian affiliate. On the contrary, White Helmets are generally embedded with this organization which is defined as “terrorist” by even the U.S., which is likely why the head of the White Helmets, Raed Saleh, was denied entry to the U.S. The foreign and marketing company origins of the White Helmets were exposed over 1½ years ago – and since then, writer Vanessa Beeley has revealed the organization in more depth in articles such as “Who Are the White Helmets?” and “War by Way of Deception.”  Despite these exposés, understanding of the White Helmets is limited, with many liberal and progressive people uncritically accepting the propaganda and misinformation about Syria. Much of the progressive media has effectively blocked or censored critical examinations amid a flood of propaganda about “barrel bombs” dropped by the “brutal dictator” and his “regime.” 
  • In the last week, Netflix started showing a 40-minute documentary movie about the “White Helmets” that amounts to a promotional video. A substantial portion of it takes place in Turkey where we see trainees in hotel rooms making impassioned phone calls to inquire about their families in Syria.  The “family values” theme is evident throughout, a good marketing angle. The political message of the video is also clear: after a bombing attack, “It’s the Russians …. they say they are fighting ISIS but they are targeting civilians.” The movie includes video previously promoted by the White Helmets such as the “Miracle Baby” rescue, an incident that may or may not have been staged. The video includes self-promoting proclamations such as “You are real heroes.” While no doubt there are some real rescues in the midst of war, many of the videos purporting to show the heroes at work have an unrealistic and contrived look to them as revealed here.
  • “Alternative media” in the West has echoed mainstream media regarding the Syria conflict. The result is that many progressive individuals and groups are confused or worse. For example, the activist group CodePink recently issued a media release promoting the Netflix White Helmets propaganda video. 
  • The White Helmets video is produced by Grain Media and Violet Films/Ultra-Violet Consulting, which advertises itself as a marketing corporation specializing in social media management, grant writing, crowd building and campaign implementation. The only question is who paid them to produce this video.  There is growing resistance to this manipulation and deception. In response to a petition to give the Nobel Peace Prize to the White Helmets, there is a counter petition at Change.org. Following the Right Livelihood Awards’ announcement, there will soon be a petition demanding retraction of the award to the White Helmets. The story of the White Helmets is principally a “feel good” hoax to manipulate public perception about the conflict in Syria and continue the drive for “regime change.” That’s why big money was paid to “Purpose” to “incubate” The Syria Campaign to brand and promote the White Helmets using Facebook, Twitter, etc. That’s why more big money was paid to create a self-promotional documentary. 
  • The judges at Rights Livelihood were probably influenced by the documentary since critical examination of facts around Syria is so rare. It’s a sad commentary on the media. As veteran war correspondent Stephen Kinzer recently wrote, “Coverage of the Syrian war will be remembered as one of the most shameful episodes in the history of the American press.”
Paul Merrell

CNN apologizes for commentator who called WikiLeaks founder a 'pedophile' | McClatchy DC - 0 views

  • In fact, the pedophile allegation has little to do with Assange’s plight that has kept him in the embassy in London, which involves incidents in Stockholm in the summer of 2010.
  • Rather, it is a bizarre tale involving a Houston-based dating website and its global and well-funded efforts to discredit Assange around the globe. The byzantine saga involves disconnected telephones and mystery websites. The website, toddandclare.com, launched and ramped up its efforts against Assange during the U.S. presidential campaign, as WikiLeaks released hacked emails related to the campaign of Democratic nominee Hillary Clinton.Whoever is behind the dating site has marshaled significant resources to target Assange, enough to gain entry into a United Nations body, operate in countries in Europe, North America and the Caribbean, conduct surveillance on Assange’s lawyer in London, obtain the fax number of Canada’s prime minister and seek to prod a police inquiry in the Bahamas.The dating site’s campaign sought to thwart WikiLeaks’ efforts and discredit Assange, who played a role in a presidential campaign season that deeply divided the U.S. electorate and illuminated Russia as a major cyber adversary of the U.S. government.One part of toddandclare’s two-pronged campaign put a megaphone to unproven charges that Assange made contact with a young Canadian girl in the Bahamas through the internet with the intention of molesting her. The second part sought to entangle him in a plan to receive $1 million from the Russian government.
  • WikiLeaks claims the dating site is “a highly suspicious and likely fabricated” company. In turn, the company has lashed out at Assange and “his despicable activities against American national security,” and warned journalists to “check with your libel lawyers first before printing anything that could impact or endanger innocent people’s lives.”For nearly two months after the October allegations, toddandclare.com went off line. But it recently reappeared, repeating charges about the 8-year-old Canadian girl. The website did not immediately respond Thursday to a new query from McClatchy, and no respondent in the past has given a name or allowed telephone contact.The online company paints itself as all-American. Online material says its founders, Todd and Clare Hammond, “are an average American couple from Michigan, who met in the eighth grade.” In 2011, the company says, the Christian couple started an email dating service, and “have married 3,000 couples to date.” Their online network began in 2015, and a statement it filed to a U.N. body says it has “100,000+ female singles” in six countries. The company’s operating address is a warehouse loading dock in Houston. Its mail goes to a Houston drop box. Its phone numbers no longer work. WikiLeaks says Texas officials tell it the entity is not registered there either under toddandclare.com or a parent company, T&C Network Solutions.A person who answered emails to the website in November declined to identify him or herself.
  • ...5 more annotations...
  • The people behind toddandclare.com persuaded a U.N. body known as the Global Compact to give it status as a participant in May, and it submitted an eight-page report to the U.N. group Oct. 4 carefully laying out its allegations against Assange. The firm was delisted by the U.N. body eight days later amid controversy over its claims. The report was later taken off the internet. An Australian lawyer, Melinda Taylor, said the report’s precise language raised additional suspicions at WikiLeaks, where she assists Assange in human rights litigation.“This is not a report that’s been drafted by a dating agency. It’s highly legalistic and very structured. It’s the language of someone who has drafted complex legal submissions,” she said.Under Todd Hammond’s name, the report alleged that Assange’s Swedish lawyer had reached out in June to offer Assange’s services on a campaign against rape in exchange for an undisclosed amount of bitcoin. It said the two sides held two videoconferences.Then came the bombshell: It said the company had ended ties with Assange following “pedophile crimes” he had committed in the Bahamas in late September. It charged that the victim was the 8-year-old daughter of a Canadian couple on a monthlong yachting vacation. The father went to police in Nassau on Sept. 28, the report claimed, charging that his family held video and chat logs showing Assange “internet grooming” the child and “propositioning the 8-year-old juvenile ‘to perform oral and anal sex acts.’ ”It said Assange made a connection to the child’s 22-year-old sister, who was a client of the online dating site, from his refuge in London, eventually gaining access to the young girl.
  • An assistant commissioner for the Royal Bahamas Police Force, Stephen Dean, said “there is no investigation” into any such incident and that the police have received no evidence that such an incident occurred.“We got a phone call of someone giving us some information. But we never had a face-to-face. It could have been a hoax,” Dean said. “We don’t know.”If someone were in possession of video or chat logs about a pedophile crime, he or she did not provide them to Bahamian police, Dean said, which he said would be odd: “If you have something so significant, I think you’d want to leave a report.”Assange’s Swedish lawyer, Per Samuelson, wrote to the U.N. body on Oct. 10 alleging that Hammond’s report against Assange was “entirely false” in all its facets and that he had had no contact with the dating site or Hammond.Even as authorities in the Bahamas dismissed the report, the dating site sent a fax Oct. 17 to Canadian Prime Minister Justin Trudeau saying the Canadian family had fled the Bahamas due to “anti-white, racist abuse by Bahamian police.”“Julian Assange ... has started a smear campaign to claim our dating company is behind an elaborate scam. It is fully to be expected. Pedophiles are devious and cunning,” the fax said.The company said it would “continue to protect the family’s identity, until either the (Royal Bahamas Police Force) conduct a proper investigation, or hell freezes over. Whichever comes first.”
  • The fax was signed, “The Todd and Clare Team,” and left no way to contact the firm.While the founders of toddandclare.com say they’ve been in the matchmaking business since 2011, their internet presence dates only to September 2015 and really got going only early last year. Those who have done work for the company say they were kept at arm’s length.By summer, in the run-up to what many expected to be an “October surprise” from WikiLeaks to make an impact on the U.S. election, toddandclare.com began moving against Assange in multiple countries simultaneously. The DNC and a cyber-threat intelligence firm it had hired, CrowdStrike, were already fingering Russia as behind the hacks that would provide the fodder for WikiLeaks. They’d said in June that Russian hackers had access to DNC servers for about a year.A company representative, identifying herself as Hannah Hammond, emailed Assange’s Swedish and British legal agents offering $1 million for him to appear in a five-minute tongue-in-cheek television advertisement. In a subsequent exchange Sept. 19, the representative wrote that “the source of the $1,000,000 is the Russian government.”In a curious twist, she offered what she said were three facts about Assange’s London attorney that are “unknown to the public,” including details inside her home and an event in her son’s life, suggesting a capability to conduct surveillance.Taylor, the Assange lawyer, said the details appeared “to create the impression that the members of his team were under close surveillance and/or to bolster the bona fides of the claim that the offer was linked to a State. Its inclusion does appear quite menacing.”
  • A lawyer identifying himself only as “James” responded the next day, slamming the offer as an “elaborate scam designed to entrap” Assange and embarrass him for ties to Russia.The dating site representative sought to pull the veil off “James.”“Julian: We know it’s you writing. The offer expires at midnight, October 31st 2016,” she wrote back on Sept. 21, according to copies of the emails posted by WikiLeaks on its website.By early October, toddandclare.com went on the offensive. It filed a civil complaint in a British court against Assange, seeking 295 pounds sterling – about $359 – in damages because it said it could no longer use his services due to the “child sex offenses in Nassau.”The suit, said Taylor, Assange’s lawyer, “seems to be designed to evade defamation law in the U.K. They’ve put highly noxious information knowing that it would be made public.”The global tussle between the online dating company and WikiLeaks went public in mid-October when the anti-secrecy group voiced public doubt on whether toddandclare.com actually existed, or served only as a vehicle to attack Assange.
  • The announcement opened the gates for a disparate crew of internet sleuths – some motivated by hatred of Clinton and others impelled by support for WikiLeaks – to probe into the history of toddandclare.com, suspicious that the dating site might be an undercover operation with links to the Clinton campaign.Posting their findings on the discussion websites like Reddit.com, they unearthed some curious coincidences. A perusal into the archives of the internet revealed that the Hammonds had once occupied a San Francisco building later rented to a company, Premise Data, whose co-founder has ties to Clinton and her top supporters.Moreover, a telephone number once registered to a Todd Hammond later was registered to a former Premise employee, Aaron Dunn, although with a different area code.Premise co-founder David Soloff said such findings could only be coincidences.“I want to reiterate that Premise has no connection with this case. And beyond confirming that Aaron Dunn worked at Premise until 2014, I don’t know the answer to any of your questions,” Soloff wrote in an email.
Paul Merrell

Israeli Banks flipping out over looming European boycott - Mondoweiss - 0 views

  •      The Israeli newspaper Ma’ariv (Hebrew) has a splashing headline today warning that Israeli banks are preparing for a “political-economic tsunami”  due to the possibility of an impending European boycott. Unsurprisingly, the banks – Israel’s largest – have been holding meetings amongst themselves to prepare for this tsunami, albeit “quietly and under the radar”. According to Ma’ariv there is “increasing evidence in recent weeks” that the European Union is considering recommendations published in a policy paper last month by the European Council on Foreign Relations (ECFR). Heavily reported at the time (our coverage here), ECFR’s policy paper warned that transactions between European states and Israeli financial institutions are obligated to adhere to EU policies based on international law when providing loans and financing to Israeli businesses, institutions and individuals in transaction with the illegal Israeli settlements enterprise. An unnamed senior banking official told Ma’ariv, “Beneath the surface this is a mega-event” and if this should happen the economic implications on the banks will have a “massive” impact on the Israeli economy.
  • This is same tsunami we’ve been hearing about for years now. The timing of the article is somewhat intriguing given there was no information provided indicating what this “increasing evidence” is. But there was this rather curious tickler (google translate): Further deterioration in relations between Israel and the United States downplays the chances that the Americans will try to curb this European action. Maybe the opposite is true. According to various diplomatic sources, the Americans have actually released the reins on Europe and are encouraging Europe to intensify its operations against the continuation of Israel’s settlement policy in the territories. Do tell. One wonders if an increase in pressure might be in relation to Israeli influence over looming U.S. congressional legislation seeking to tank the P5+1 deal with Iran over their nuclear program.
  • Quoting officials in the Israeli banking system, this is a national issue; there are no banks in Israel not involved in the settlements and there’s “no trick that can solve this affair”:
  • ...2 more annotations...
  • “Credit marking” means that each Israeli bank which provides mortgage for the purchasing of an Apartment in Maale Adumim, Ariel, certain Places in Modi’in etc. enters the blacklist. The Europeans include also Jerusalem, Ariel, Golan heights, road 443 and parts of road 1 under the term “conquered territory”. There is not a bank in Israel that is not involved in activities in these areas. Every credit given to a business, every mortgage, can mean the bank risks a European boycott. “It has an enormous implication”, a senior in the banking system says, “the meaning of this is a siege upon the Israeli economy, a kind of SHUT DOWN. In such a situation we will have to organise and refer to the PM. Solutions for such an issue can only come in the national arena. It’s already far more than a just a financial issue per se. The assessment is, that soon the banking system will exit the bunker and attempt to form an organised policy vis-a-vis the government. In such a situation, it is expected that heads of the banks will meet with the Finance Minister and PM and discuss a “credit and financial safety net for the banks against the new danger”. It is doubtful whether the government is able to produce such a safety net. “We must admit that this is a national issue, we too are aware that there is no trick that can solve this affair”, they say in the banking system, “but this does not lessen our concern. We are speaking about a mega-event which we must prepare towards and digest. This is what we are currently trying to do”.
  • English translation of Ma’ariv’s article, provided by Jonathan Ofir
  •  
    If this happens, will the Israel-firsters in Congress ride to the rescue of the Israeli banks?
Paul Merrell

Tomgram: Engelhardt, A Record of Unparalleled Failure | TomDispatch - 0 views

  • The United States has been at war -- major boots-on-the-ground conflicts and minor interventions, firefights, air strikes, drone assassination campaigns, occupations, special ops raids, proxy conflicts, and covert actions -- nearly nonstop since the Vietnam War began.  That’s more than half a century of experience with war, American-style, and yet few in our world bother to draw the obvious conclusions. Given the historical record, those conclusions should be staring us in the face.  They are, however, the words that can’t be said in a country committed to a military-first approach to the world, a continual build-up of its forces, an emphasis on pioneering work in the development and deployment of the latest destructive technology, and a repetitious cycling through styles of war from full-scale invasions and occupations to counterinsurgency, proxy wars, and back again. So here are five straightforward lessons -- none acceptable in what passes for discussion and debate in this country -- that could be drawn from that last half century of every kind of American warfare:
  • 1. No matter how you define American-style war or its goals, it doesn’t work. Ever. 2. No matter how you pose the problems of our world, it doesn’t solve them. Never. 3. No matter how often you cite the use of military force to “stabilize” or “protect” or “liberate” countries or regions, it is a destabilizing force. 4. No matter how regularly you praise the American way of war and its “warriors,” the U.S. military is incapable of winning its wars. 5. No matter how often American presidents claim that the U.S. military is “the finest fighting force in history,” the evidence is in: it isn’t.
  • And here’s a bonus lesson: if as a polity we were to take these five no-brainers to heart and stop fighting endless wars, which drain us of national treasure, we would also have a long-term solution to the Veterans Administration health-care crisis.  It’s not the sort of thing said in our world, but the VA is in a crisis of financing and caregiving that, in the present context, cannot be solved, no matter whom you hire or fire.  The only long-term solution would be to stop fighting losing wars that the American people will pay for decades into the future, as the cost in broken bodies and broken lives is translated into medical care and dumped on the VA.
Paul Merrell

Western Sponsors Liable for Kiev Basket Case | nsnbc international - 0 views

  • The Kiev ultra rightwing regime that Washington and Brussels railroaded into power in February this year, in an illegal coup d’état, has compounded fiscal bankruptcy with a seventh-month criminal war on the ethnic Russian population of the eastern Donbass regions, prompting up to a million refugees to stream across the border with Russia. Earlier this month, the International Monetary Fund (IMF) warned that Ukraine will need to find an additional $19 billion to avoid bankruptcy if the Kiev regime continues with its military operations in the east of the country. That is on top of the $17 billion that the IMF has already committed to Kiev following the CIA-backed coup against the elected government of President Victor Yanukovych. The legality and delivery of those IMF funds are questionable given the Washington-based institute’s own prohibition on funding states that are engaged in war.
  • This is the context for why Russia was obliged to put Ukraine on a prepayment basis over gas purchases back in June. At a trilateral negotiation in Brussels on September 26, the parties appeared to reach an agreement on a winter package of gas supply to Ukraine from Russia to cover the months of October to March inclusively, which would be based on a prepayment scheme. The payment rate agreed to was $385 per 1,000 cubic metres of natural gas. Granted, that payment rate is a lot more than what Moscow was previously supplying the Yanukovych government. But that was on a preferential basis to an ally. Given that the Kiev regime ousted this ally of Moscow and has shown unprecedented hostility towards Russia ever since the coup in February it is not unreasonable that Russian state-owned Gazprom has raised the price of its gas to $385, and especially because that figure is the average price paid by all European countries for Russian gas.
  • The fact is that Ukraine owes Russia $5.3 billion in unpaid gas bills going back several years. As Western consumer societies might just appreciate, if a customer does not make good on outstanding credit for a service or goods, then the supplier of that service is entitled by law to with-hold further delivery.
  • ...5 more annotations...
  • «We are ready to pay in advance but the advance payment mechanism has not yet been squared,» the Kiev energy minister told media. Hmmm, payment mechanism has not yet been squared? That hardly sounds like an ironclad commitment to honour contracts with Russia and to make long overdue amends to outstanding debt. It sounds rather like more of the same shenanigans that typifies this warmongering junta. Russia’s energy minister Alexandr Novak is therefore not only entitled, but is merely exercising a modicum of sanity, to insist that Kiev presents a definitive source of funds by the next trilateral meeting scheduled to take place on October 29. To any reasonable person, Russia’s insistence on Kiev providing proof of ability and willingness to pay for the next delivery of natural gas is not an act of «intimidation» but rather is a basic and wholly justified reservation on the part of Moscow to make sure that it is indeed paid for a strategically vital export. One can only imagine how the US or EU would react if they were being dictated to by a hostile jumped-up regime.
  • The depth of Kiev’s insolvency is probably even worse than the IMF’s own dire forecast. Sergei Glazyev, an economic advisor to Russian President Vladimir Putin, earlier this month reckoned that Ukraine will need at least $100 billion to stabilise its economy. He says that the Kiev regime won’t be able to meet its international obligations even if all the promised financial aid from the US and the European Union is delivered, which is doubtful. «Default is inevitable,» Glazyev concludes. In this context of extreme credit unworthiness, it is not surprising therefore that Russia is insisting that the Kiev regime make prepayments for the further purchase of natural gas. Ukraine will require some 18 billion cubic metres of the fuel to see it through the bitter winter months – and all of it from Russia.
  • The September 26 agreement also stipulated that Kiev would pay off its $5.3 billion debt to Russia in roughly two equal tranches amounting to a total of $3.1 billion by the end of this year, with the first payment at the end of this month. However, on October 13, the Kiev-appointed energy minister Yuriy Prodan announced an about-turn by declaring that the regime would not be making any prepayment, and that money would be forthcoming only after delivery of Russian gas. Such a truculent attitude is by no means the first time that Kiev has vacillated on commitments, not just over gas, but also in the realm of political negotiations to find a peaceful solution to the violence in the eastern regions. In a word, the Western-backed regime in Kiev has shown itself to be unreliable to say the least, if not downright unscrupulous. That conclusion is not based on random delinquent behaviour but rather on a systematic pattern since the regime seized power. Then this week at the latest trilateral talks in Brussels, Kiev’s Prodan once again swivelled position and is now appearing to say that the regime will make good on the arrangement of prepayments.
  • What’s more, Russia’s adamant stance on gas prepayments is all the more warranted because the Western sponsors of the Kiev regime have so far shown little inclination to help it deal with its looming energy crisis.
  • Last week, Kiev put a request to the European Commission for a loan of $2.6 billion. But all that the EC would say is that it is considering the request. Yet, on the basis of no money, the EU’s energy commissioner Guenther Oettinger this week says that he expects a gas deal to be signed on October 29 between Russia and Ukraine under the auspices of Brussels. Washington is even more circumspect than Brussels on the matter of providing hard cash to Kiev, as opposed to lots of hot-air promises of nebulous aid. One gets the feeling that the Western sponsors know full well that this regime is a basket case. Nevertheless, these Western sponsors are liable for the basket case that they created. Russia is thus dead right to be sceptical and to insist: show us the colour of your money. If not, then the Western-aspiring regime should be ready to abide by its Western consumer-market principles. No money, no delivery – unless your Western daddy bails you out, which is not looking likely so far. If Ukraine comes off the rails with an energy crisis this winter, the responsibility lies with the reckless regime-hijackers in Washington and Brussels. They created this wreck, they should pay for it – not the government of Russia, which has shown incredible forbearance in spite of gratuitous insults, provocation and insolence.
Paul Merrell

Ex-envoy to US warns: There's no Iron Dome against Abbas's moves | The Times of Israel - 0 views

  • ASHINGTON — Hours after Palestinian Authority President Mahmoud Abbas convened a crisis meeting of the Palestinian leadership to get ready to apply for membership in the International Criminal Court, former Israeli ambassador to the United States Michael Oren warned that Abbas’s moves to penalize Israel through international organizations were a “strategic threat” for Israel. In contrast, he said Wednesday, continuing rocket fire from the Hamas-controlled Gaza Strip was a tactical threat that Israel could confront
  • “We have an Iron Dome to protect against rockets, but we have no Iron Dome for this,” cautioned Oren. “The danger of sanctions and embargoes is a real one.” Abbas’s actions, including his threats to seek ICC membership so that he could prosecute Israel though the international legal body, were part of a strategy that Oren warned was not designed “to get a better two-state solution.”
  • Oren cautioned that while Hamas’s rocket fire against Israelis was a “tactical threat” that Israel could confront with weapons technology, Abbas’s plans to upgrade the Palestinian Authority’s international status in order to initiate punitive actions against Israel was a “strategic threat” that Israel was challenged to counter. The former ambassador noted that despite the continued rocket fire against Israeli targets, Washington has maintained a seemingly paradoxical policy of condemning Hamas rocket fire and defending Israel’s right to defend itself, while at the same time “there has been no indication whatsoever that the US or other members of the Quartet are willing to review or reassess their participation in the [Palestinian] unity government.”
  • ...2 more annotations...
  • At the same time, US support for Abbas’s technocratic government, formed this spring as part of a unity agreement with Hamas, has remained steady. On Tuesday, Philip Gordon, a special assistant to US President Barack Obama and the White House coordinator for the Middle East, warned that Jerusalem “should not take for granted the opportunity to negotiate” with Abbas, who has proven to be a “reliable partner.” But Abbas’s stance, said Oren, “doesn’t resonate with segments of Israeli population who see Abbas refusing to condemn rocket fire but accusing Israel of committing war crimes.” With tens of thousands of reservists massing at the border with Gaza, Oren said that a ground operation against the Hamas-held territory “would be in Hamas’s interest.” Their influence has declined markedly over the past year, he explained, noting that the Islamist group has recently lost support from key backers in Syria and Iran as well as with the fall of the Morsi government in Egypt.
  • “The economy in Gaza is abysmal,” Oren said, arguing that Hamas believes that if it can drag Israel into a ground operation it will come out with the upper hand and Israel will face heavy casualties as well as international criticism and even prosecution for war crimes.
  •  
    It's a huge strategic threat precisely because Israel's leaders are go clearly guilty of war crimes against the Palestinians on a massive scale since the time Israel was established in 1948. 
Paul Merrell

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • ...5 more annotations...
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
Paul Merrell

Former Top Brass to Netanyahu: Accept Iran Accord as 'Done Deal' - Diplomacy and Defense - Haaretz Daily Newspaper Israel News - 0 views

  • Dozens of former senior members of Israel's defense establishment have published an open letter to Prime Minister Benjamin Netanyahu on Monday urging him to accept the nuclear accord with Iran as an "done deal." The letter also called on Netanyahu and his government to renew the trust with the U.S. in order to prepare for the deal's challenges, and to "initiate a political move which will provide credibility to Israel's support of a two-state solution." This, according to the letter, would enable the formation of a moderate Sunni-Western axis which will act against extremists in the region. The letter was signed by former Shin Bet chiefs Amy Ayalon and Carmi Gillon, former MK Maj. Gen. (ret.) Amram Mitzna, Brig. Gen. (ret.) Shaul Arieli, former MK Roman Bronfman, former police chief  Assaf Heffetz, among others.
  • The letter, as will be published on Tuesday's English newspaper:
Paul Merrell

Bail-In and the Financial Stability Board: The Global Bankers' Coup | nsnbc international - 0 views

  • Ellen H. Brown (WoD) : On December 11, 2014, the US House passed a bill repealing the Dodd-Frank requirement that risky derivatives be pushed into big-bank subsidiaries, leaving our deposits and pensions exposed to massive derivatives losses. The bill was vigorously challenged by Senator Elizabeth Warren; but the tide turned when Jamie Dimon, CEO of JPMorganChase, stepped into the ring. Perhaps what prompted his intervention was the unanticipated $40 drop in the price of oil. As financial blogger Michael Snyder points out, that drop could trigger a derivatives payout that could bankrupt the biggest banks. And if the G20’s new “bail-in” rules are formalized, depositors and pensioners could be on the hook. The new bail-in rules were discussed in my last last article entitled “New G20 Rules: Cyprus-style Bail-ins to Hit Depositors AND Pensioners.” They are edicts of the Financial Stability Board (FSB), an unelected body of central bankers and finance ministers headquartered in the Bank for International Settlements in Basel, Switzerland. Where did the FSB get these sweeping powers, and is its mandate legally enforceable?
  • Those questions were addressed in an article I wrote in June 2009, two months after the FSB was formed, titled “Big Brother in Basel: BIS Financial Stability Board Undermines National Sovereignty.” It linked the strange boot shape of the BIS to a line from Orwell’s 1984: “a boot stamping on a human face—forever.” The concerns raised there seem to be materializing, so I’m republishing the bulk of that article here. We need to be paying attention, lest the bail-in juggernaut steamroll over us unchallenged. The Shadowy Financial Stability Board Alarm bells went off in April 2009, when the Bank for International Settlements (BIS) was linked to the new Financial Stability Board (FSB) signed onto by the G20 leaders in London. The FSB was an expansion of the older Financial Stability Forum (FSF) set up in 1999 to serve in a merely advisory capacity by the G7 (a group of finance ministers formed from the seven major industrialized nations). The chair of the FSF was the General Manager of the BIS. The new FSB was expanded to include all G20 members (19 nations plus the EU).
  • Formally called the “Group of Twenty Finance Ministers and Central Bank Governors,” the G20 was, like the G7, originally set up as a forum merely for cooperation and consultation on matters pertaining to the international financial system. What set off alarms was that the new Financial Stability Board had real teeth, imposing “obligations” and “commitments” on its members; and this feat was pulled off without legislative formalities, skirting the usual exacting requirements for treaties. It was all done in hasty response to an “emergency.” Problem-reaction-solution was the slippery slope of coups. Buried on page 83 of an 89-page Report on Financial Regulatory Reform issued by the US Obama administration was a recommendation that the FSB strengthen and institutionalize its mandate to promote global financial stability. It sounded like a worthy goal, but there was a disturbing lack of detail. What was the FSB’s mandate, what were its expanded powers, and who was in charge? An article in The London Guardian addressed those issues in question and answer format:
  • ...2 more annotations...
  • For three centuries, private international banking interests have brought governments in line by blocking them from issuing their own currencies and requiring them to borrow banker-issued “banknotes” instead. Political colonialism is now a thing of the past, but under the new FSB guidelines, nations could still be held in feudalistic subservience to foreign masters. Consider this scenario: the new FSB rules precipitate a massive global depression due to contraction of the money supply. XYZ country wakes up to the fact that all of this is unnecessary – that it could be creating its own money, freeing itself from the debt trap, rather than borrowing from bankers who create money on computer screens and charge interest for the privilege of borrowing it. But this realization comes too late: the boot descends and XYZ is crushed into line. National sovereignty has been abdicated to a private committee, with no say by the voters. Marilyn Barnewall, dubbed by Forbes Magazine the “dean of American private banking,” wrote in an April 2009 article titled “What Happened to American Sovereignty at G-20?”: It seems the world’s bankers have executed a bloodless coup and now represent all of the people in the world. . . . President Obama agreed at the G20 meeting in London to create an international board with authority to intervene in U.S. corporations by dictating executive compensation and approving or disapproving business management decisions.  Under the new Financial Stability Board, the United States has only one vote. In other words, the group will be largely controlled by European central bankers. My guess is, they will represent themselves, not you and not me and certainly not America.
  • Are these commitments legally binding? Adoption of the FSB was never voted on by the public, either individually or through their legislators. The G20 Summit has been called “a New Bretton Woods,” referring to agreements entered into in 1944 establishing new rules for international trade. But Bretton Woods was put in place by Congressional Executive Agreement, requiring a majority vote of the legislature; and it more properly should have been done by treaty, requiring a two-thirds vote of the Senate, since it was an international agreement binding on the nation. “Bail-in” is not the law yet, but the G20 governments will be called upon to adopt the FSB’s resolution measures when the proposal is finalized after taking comments in 2015. The authority of the G20 has been challenged, but mainly over whether important countries were left out of the mix. The omitted countries may prove to be the lucky ones, having avoided the FSB’s net.
Paul Merrell

Riyadh invites 65 Syrian opposition figures ahead of peace talks -paper | GulfNews.com - 0 views

  • Saudi Arabia has issued invitations to 65 Syrian opposition figures to attend a conference in Riyadh to try to unify their positions ahead of proposed Syrian peace talks, Saudi newspapers reported on Tuesday.Asharq Al Awsat and Al Hayat said no date has yet been set for the Riyadh meeting, but quoted unnamed sources as saying it could take place next week.Asharq Al Awsat quoted Ahmad Ramadan, a member of the Syrian National Coalition (SNC) opposition group, as saying that the Saudi foreign ministry had “invited 65 figures to attend the conference in Riyadh”.He said 20 members of the coalition, which is based outside Syria, had been invited, along with seven from the National Coordination Body, an internal opposition group.Another 10 to 15 places were allocated to rebel leaders and 20 to 25 to independents, business leaders and religious figures, the paper quoted Ramadan as saying.
  • Saudi Arabia, a main supporter of opposition groups seeking to topple President Bashar Al Assad, has said it was in contact with them about the conference, which comes after an international agreement to launch talks between the government and the opposition by January 1.The Riyadh meeting marks an attempt to bring together groups whose disunity has been a long-standing obstacle in seeking a peaceful solution to the nearly five-year conflict that has killed more than 250,000 people and displaced millions.US Secretary of State John Kerry held talks in Abu Dhabi with UAE officials and Saudi Foreign Minister Adel Al Jubeir last week to discuss ways of bringing the opposition together.Al Hayat newspaper quoted NCB co-chairman, Hassan Abdul Azim, as saying he had sent a list of 22 nominees, including the head of the Kurdish Democratic Union, Saleh Muslim.Muslim had said earlier last month that Syrian Kurds need political and military representation at the opposition conference in Riyadh.
Paul Merrell

Brazil: The Provisional Banana Scoundrel Republic - 0 views

  • Every political junkie on the planet has to be glued to the ongoing Brazilian House of Cards, consistently offering an unparalleled feast of cheap thrills.The latest cliffhanger was the leak of a conversation between one of the key operators involved in the oil giant Petrobras corruption scandal and a senator and short-lived Minister of Planning in the usurper interim government currently replacing President Dilma Rousseff while she is undergoing an impeachment trial by the Senate.  Call the leak a short autopsy of what from the beginning should have been defined as golpeachment; a mix of coup (“golpe”, in Portuguese) and impeachment, which took place in a one/two sequential vote in the Brazilian Congress and Senate, as a notorious congregation of crooks investigated for myriad offenses and crimes seized power in Brasilia in a full-fledged Buffon’s Opera. I call their scam Provisional Banana Scoundrel Republic (PBSR).  
  • The leak/autopsy duly unveiled how the PBSR cancer progressed.  One of the key plotters outlines the coup; stresses how it should protect Brazilian plutocracy/kleptocracy from unintended consequences of the ongoing, two-year-old Car Wash corruption investigation; and how the Left – from President Rousseff to Lula and the Workers’ Party – should be criminalized for good. 
  • The rest would be history, including the demolition of recently acquired social and workers’ rights via the imposition of a neoliberal restoration; total reversion in foreign policy, with geopolitical and geoeconomic relations back to a colonized mindset; and the reestablishment of a conservative, neoliberal, rentier hegemonic class lording over a socially-oriented, democratic society. That fits in with the current Brazilian Congress and Senate dominated by “BBB” interests. “BBB” stands for Beef (the powerful agribusiness lobby); Bullet (the weapons and private security complex); and Bible (evangelical fanatics), all supported by corporate media. Many of these unsavory characters are connected and/or represent the toxic Brazilian rural aristocracy – which are in fact heirs to nobility titles handed over to slave owners. It was going all so swell after only a few days – even with the former head of the lower house, notorious crook Eduardo Cunha, temporarily sidelined; Cunha – the ringleader of a campaign financing scam inside Congress – de facto had become the Prime Minister of the puppet former Vice-President and current, interim President Michel Temer. 
  • ...3 more annotations...
  • The key variable from now on is how the PBSR gang will maneuver – possibly illegally — to cling to power. The Public Ministry and the Federal police are totally politicized. Increasingly there are no mediation powers. The PBSR gang will take no prisoners. The Public Ministry will go after Lula while the attorney general will try to block any chance of Rousseff being reinstated. Meanwhile, the social democrats turned neoliberal enforcers – key associates of the PBSR — will keep advancing their own agenda; hardcore privatizations; handing over the exploration of the pre-salt oil deposits to US Big Oil; and dutifully prostrating as Washington vassals. One just needs to examine the extreme interest by the US Department of Justice on all things related to the Car Wash investigation to infer how Washington is deeply involved in smashing leading Brazilian corporations.   
  • Washington has not had the balls to do it directly – relying on minions such as the State Department spokesman and the interim ambassador to the OAS. But the message is unmistakable; golpeachment is legal, and Washington trusts Brazilian “democratic institutions”. Compare it to the Russian Foreign Ministry, which alerted to “foreign interference” in Brazilian affairs. The new Brazilian Foreign Minister – a sore loser (twice) in presidential elections won by the Workers’ Party – took no time to launch his glorious Vassal of Washington/US Big Capital policy. He already issued a veiled “threat” to Cuba, Venezuela, Nicaragua, Bolivia, Ecuador and El Salvador. Mercosur will be sidelined to the benefit of the Pacific Alliance – where Mexico, Peru and Colombia are under Washington’s wings. Unasur will be ditched.
  • And then there’s the stale ice cream in the scoundrel’s tart; the “B” in BRICS is now dormant. This means the role of Brazil in the BRICS bank will be seriously compromised. Granted, the BRICS were never a homogenous group and have been riddled with conflicting interests. For instance, India’s nuclear-sharing agreement with the US effectively ties it up with Washington. The next BRICS summit is in India, in October. Brazil risks the ignominy of being represented by the PBSR gang.  Meanwhile, make no mistake; as much as the Car Wash investigation was revealed to be a totally politicized drive – where fighting corruption was just a convenient cover – the PBSR gang and their allies will do everything to get rid of the 2018 direct presidential elections. So here’s the sorry Brazilian road map up to 2018; total political, economic, social and juridical chaos. 
  •  
    Pepe Escobar, himself a Brazilian expatriate journailist, riffs on the Brazilian coup-gone-sour-by-discllosure-of-plans. If you have a browser extension to do translations, read the article linked from the "U.S. Department of Justice" text. It seems that the U.S. played a part in setting the coup in motion. Surprise, surprise. A very fun read. 
Paul Merrell

How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept - 0 views

  • Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
  • The NSA began rapidly escalating its hacking efforts a decade ago. In 2004, according to secret internal records, the agency was managing a small network of only 100 to 150 implants. But over the next six to eight years, as an elite unit called Tailored Access Operations (TAO) recruited new hackers and developed new malware tools, the number of implants soared to tens of thousands. To penetrate foreign computer networks and monitor communications that it did not have access to through other means, the NSA wanted to go beyond the limits of traditional signals intelligence, or SIGINT, the agency’s term for the interception of electronic communications. Instead, it sought to broaden “active” surveillance methods – tactics designed to directly infiltrate a target’s computers or network devices. In the documents, the agency describes such techniques as “a more aggressive approach to SIGINT” and says that the TAO unit’s mission is to “aggressively scale” these operations. But the NSA recognized that managing a massive network of implants is too big a job for humans alone.
  • “One of the greatest challenges for active SIGINT/attack is scale,” explains the top-secret presentation from 2009. “Human ‘drivers’ limit ability for large-scale exploitation (humans tend to operate within their own environment, not taking into account the bigger picture).” The agency’s solution was TURBINE. Developed as part of TAO unit, it is described in the leaked documents as an “intelligent command and control capability” that enables “industrial-scale exploitation.”
  • ...10 more annotations...
  • TURBINE was designed to make deploying malware much easier for the NSA’s hackers by reducing their role in overseeing its functions. The system would “relieve the user from needing to know/care about the details,” the NSA’s Technology Directorate notes in one secret document from 2009. “For example, a user should be able to ask for ‘all details about application X’ and not need to know how and where the application keeps files, registry entries, user application data, etc.” In practice, this meant that TURBINE would automate crucial processes that previously had to be performed manually – including the configuration of the implants as well as surveillance collection, or “tasking,” of data from infected systems. But automating these processes was about much more than a simple technicality. The move represented a major tactical shift within the NSA that was expected to have a profound impact – allowing the agency to push forward into a new frontier of surveillance operations. The ramifications are starkly illustrated in one undated top-secret NSA document, which describes how the agency planned for TURBINE to “increase the current capability to deploy and manage hundreds of Computer Network Exploitation (CNE) and Computer Network Attack (CNA) implants to potentially millions of implants.” (CNE mines intelligence from computers and networks; CNA seeks to disrupt, damage or destroy them.)
  • But not all of the NSA’s implants are used to gather intelligence, the secret files show. Sometimes, the agency’s aim is disruption rather than surveillance. QUANTUMSKY, a piece of NSA malware developed in 2004, is used to block targets from accessing certain websites. QUANTUMCOPPER, first tested in 2008, corrupts a target’s file downloads. These two “attack” techniques are revealed on a classified list that features nine NSA hacking tools, six of which are used for intelligence gathering. Just one is used for “defensive” purposes – to protect U.S. government networks against intrusions.
  • The NSA has a diverse arsenal of malware tools, each highly sophisticated and customizable for different purposes. One implant, codenamed UNITEDRAKE, can be used with a variety of “plug-ins” that enable the agency to gain total control of an infected computer. An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer’s microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer’s webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer. The implants can enable the NSA to circumvent privacy-enhancing encryption tools that are used to browse the Internet anonymously or scramble the contents of emails as they are being sent across networks. That’s because the NSA’s malware gives the agency unfettered access to a target’s computer before the user protects their communications with encryption. It is unclear how many of the implants are being deployed on an annual basis or which variants of them are currently active in computer systems across the world.
  • Infiltrating cellphone networks, however, is not all that the malware can be used to accomplish. The NSA has specifically tailored some of its implants to infect large-scale network routers used by Internet service providers in foreign countries. By compromising routers – the devices that connect computer networks and transport data packets across the Internet – the agency can gain covert access to monitor Internet traffic, record the browsing sessions of users, and intercept communications. Two implants the NSA injects into network routers, HAMMERCHANT and HAMMERSTEIN, help the agency to intercept and perform “exploitation attacks” against data that is sent through a Virtual Private Network, a tool that uses encrypted “tunnels” to enhance the security and privacy of an Internet session.
  • Eventually, the secret files indicate, the NSA’s plans for TURBINE came to fruition. The system has been operational in some capacity since at least July 2010, and its role has become increasingly central to NSA hacking operations. Earlier reports based on the Snowden files indicate that the NSA has already deployed between 85,000 and 100,000 of its implants against computers and networks across the world, with plans to keep on scaling up those numbers. The intelligence community’s top-secret “Black Budget” for 2013, obtained by Snowden, lists TURBINE as part of a broader NSA surveillance initiative named “Owning the Net.” The agency sought $67.6 million in taxpayer funding for its Owning the Net program last year. Some of the money was earmarked for TURBINE, expanding the system to encompass “a wider variety” of networks and “enabling greater automation of computer network exploitation.”
  • Before it can extract data from an implant or use it to attack a system, the NSA must first install the malware on a targeted computer or network. According to one top-secret document from 2012, the agency can deploy malware by sending out spam emails that trick targets into clicking a malicious link. Once activated, a “back-door implant” infects their computers within eight seconds. There’s only one problem with this tactic, codenamed WILLOWVIXEN: According to the documents, the spam method has become less successful in recent years, as Internet users have become wary of unsolicited emails and less likely to click on anything that looks suspicious. Consequently, the NSA has turned to new and more advanced hacking techniques. These include performing so-called “man-in-the-middle” and “man-on-the-side” attacks, which covertly force a user’s internet browser to route to NSA computer servers that try to infect them with an implant.
  • To perform a man-on-the-side attack, the NSA observes a target’s Internet traffic using its global network of covert “accesses” to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency’s surveillance sensors alert the TURBINE system, which then “shoots” data packets at the targeted computer’s IP address within a fraction of a second. In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target’s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the NSA is able to hack into the targeted computer and covertly siphon out data from its hard drive. A top-secret animation demonstrates the tactic in action.
  • The TURBINE implants system does not operate in isolation. It is linked to, and relies upon, a large network of clandestine surveillance “sensors” that the agency has installed at locations across the world.
  • The NSA’s headquarters in Maryland are part of this network, as are eavesdropping bases used by the agency in Misawa, Japan and Menwith Hill, England. The sensors, codenamed TURMOIL, operate as a sort of high-tech surveillance dragnet, monitoring packets of data as they are sent across the Internet. When TURBINE implants exfiltrate data from infected computer systems, the TURMOIL sensors automatically identify the data and return it to the NSA for analysis. And when targets are communicating, the TURMOIL system can be used to send alerts or “tips” to TURBINE, enabling the initiation of a malware attack. The NSA identifies surveillance targets based on a series of data “selectors” as they flow across Internet cables. These selectors, according to internal documents, can include email addresses, IP addresses, or the unique “cookies” containing a username or other identifying information that are sent to a user’s computer by websites such as Google, Facebook, Hotmail, Yahoo, and Twitter. Other selectors the NSA uses can be gleaned from unique Google advertising cookies that track browsing habits, unique encryption key fingerprints that can be traced to a specific user, and computer IDs that are sent across the Internet when a Windows computer crashes or updates.
  • Documents published with this article: Menwith Hill Station Leverages XKeyscore for Quantum Against Yahoo and Hotmail Five Eyes Hacking Large Routers NSA Technology Directorate Analysis of Converged Data Selector Types There Is More Than One Way to Quantum NSA Phishing Tactics and Man in the Middle Attacks Quantum Insert Diagrams The NSA and GCHQ’s QUANTUMTHEORY Hacking Tactics TURBINE and TURMOIL VPN and VOIP Exploitation With HAMMERCHANT and HAMMERSTEIN Industrial-Scale Exploitation Thousands of Implants
  •  
    *Very* long article. Only small portions quoted.
Paul Merrell

U.S. is even more implicated in Israeli settlement project than we thought - 0 views

  • The Israeli colonies are an American problem in a whole new way. Nearly one out of six settlers in the West Bank is an American. Haaretz broke the story. Oxford scholar Sara Yael Hirschhorn says Americans are starkly overrepresented among West Bank settlers: Roughly 60,000 American Jews live in West Bank settlements, where they account for 15 percent of the settler population, according to figures revealed Thursday by an Oxford University scholar and expert on this population. Newsweek’s Jack Moore reports the American policy angle: Israeli settlement watchdog Peace Now said that the new figures revealed that the settlement enterprise in the West Bank was not only an internal issue but “an international problem.” “Unfortunately, while the Obama administration has been persistently vocal against settlement developments, some 60,000 American citizens are taking an active part in an attempt to make the two state solution impossible,” says Anat Ben Nun, Peace Now’s director of development and external relations. The study leaves out all the settlers in East Jerusalem: 200,000 of them three years ago, per the United Nations. And remember that the settlement movement is funded not just by the Israeli government but tax-deductible donations from American Zionists. An issue the US media has refused to deal with.
Paul Merrell

Putin's Line in the Sand: No Regime Change in Syria - 0 views

  • The Syrian war can divided into two parts: The pre-Incirlik period and the post-Incirlik period. The pre-Incirlik period is roughly the four year stretch during which US-backed Islamic militias and al Qaida-linked groups fought the Syrian army with the intention of removing President Bashar al Assad from power. This first phase of the war ended in a draw. The post-Incirlik period looks like it could produce an entirely different outcome due to the fact that the US will be able to deploy its drones and warplanes from a Turkish airbase (Incirlik) that’s just 15 minutes flying-time from Syria. That will boost the number of sorties the USAF can able to carry out while increasing the effectiveness of its jihadi forces on the ground which will conduct their operations under the protection of US air cover. This will greatly improve their chances for success. The New York Times calls the Incirlik deal a “game-changer” which is an understatement. By allowing US F-16s to patrol the skies over Syria, Washington will impose a de facto no-fly zone over the country severely limiting Assad’s ability to battle the US-backed militias that have seized large swaths of the countryside and are now descending on Damascus. And while the war cannot be won by airpower alone, this new tactical reality tilts the playing field in favor the jihadis. In other words, the Incirlik agreement changes everything.
  • The Obama administration now believes that regime change is within its reach. Yes, they know it will require some back-up from US Special Forces and Turkish combat troops, but it’s all doable.  This is why Obama has shrugged off Russia’s plan for a transitional government or for forming a coalition to defeat ISIS.  The US doesn’t have to compromise on these matters because, after all, it has a strategically-located airbase from which it can protect its proxy-army, bomb cross-border targets, and control the skies over Syria. All Obama needs to do is intensify the war effort, put a little more pressure on Assad, and wait for the regime to collapse. This is why we should expect a dramatic escalation as we begin Phase 2 of the conflict. Russian President Vladimir Putin knows this, which is why he’s sending more weapons, supplies and advisors to Syria. He’s signaling to Washington that he knows what they’re up to and that he’ll respond if they carry things too far. In an interview with Russia’s state Channel 1, Putin said, “We have our ideas about what we will do and how we will do it in case the situation develops toward the use of force or otherwise. We have our plans.”
  • The administration is very nervous about Putin’s plans which is why they keep probing to see if they can figure out what he has up his sleeve.
  • ...2 more annotations...
  • But the fact is, Putin is not going to allow Assad to be removed by force. It’s that simple. Obama and his advisors suspect this, but they are not 100 percent certain so they keep looking for confirmation one way or the other. But Putin is not going to provide a clear answer because he doesn’t want to tip his hand or appear confrontational. But that doesn’t mean he’s not resolute. He is, and Washington knows it. In effect, Putin has drawn a line in the sand and told the US that if they cross that line, there’s going to trouble. So it’s up to Obama really. He can either seek a peaceful solution along the lines that Moscow has recommended or push for regime change and risk a confrontation with Russia. Those are the two choices. Unfortunately, Washington doesn’t have an “off” switch anymore, so changing policy is really not in the cards. Instead, the US war machine will continue to lumber ahead erratically until it hits an impasse and sputters to a halt. Once again, the immovable object will prevail over the unstoppable force (as it did in Ukraine), albeit at great cost to the battered people of Syria, their nation and the entire region.
  • It’s clear that Obama is emboldened by the Incirlik deal and believes that, with Turkey’s help, he can achieve US imperial ambitions in Syria. But it’s not going to happen.  Russia, Iran and Hezbollah are prepared to defend their ally Assad and stop Washington dead-in-its-tracks.  Obama will have succeeded in destroying another sovereign nation and scattering its people across the Middle East and Europe. But the US mission will fall short of its original objectives. There will be no regime change in Syria. Putin, Nasrallah and Khamenei will make sure of it.
Paul Merrell

Exclusive: Cornered but unbound by nuclear pact, Israel reconsiders military action against Iran - 0 views

  • Historic negotiations with Iran will reach an inflection point on Monday, as world powers seek to clinch a comprehensive deal that will, to their satisfaction, end concerns over the nature of its vast, decade-old nuclear program.But reflecting on the deal under discussion with The Jerusalem Post on the eve of the deadline, Israel has issued a stark, public warning to its allies with a clear argument: Current proposals guarantee the perpetuation of a crisis, backing Israel into a corner from which military force against Iran provides the only logical exit.
  • Historic negotiations with Iran will reach an inflection point on Monday, as world powers seek to clinch a comprehensive deal that will, to their satisfaction, end concerns over the nature of its vast, decade-old nuclear program.But reflecting on the deal under discussion with The Jerusalem Post on the eve of the deadline, Israel has issued a stark, public warning to its allies with a clear argument: Current proposals guarantee the perpetuation of a crisis, backing Israel into a corner from which military force against Iran provides the only logical exit.
  • World powers have presented Iran with an accord that would restrict its nuclear program for roughly ten years and cap its ability to produce fissile material for a weapon during that time to a minimum nine-month additional period, from the current three months.Should Tehran agree, the deal may rely on Russia to convert Iran's current uranium stockpile into fuel rods for peaceful use. The proposal would also include an inspection regime that would attempt to follow the program's entire supply chain, from the mining of raw material to the syphoning of that material to various nuclear facilities across Iran.Israel's leaders believe the best of a worst-case scenario, should that deal be reached, is for inspections to go perfectly and for Iran to choose to abide by the deal for the entire decade-long period.
  • ...3 more annotations...
  • On Saturday afternoon, reports from Vienna suggested the P5+1 – the US, United Kingdom, France, Russia, China and Germany – are willing to stop short of demanding full disclosure of any secret weapon work by Tehran.Speaking to the Post, a senior US official rejected concern over limited surveillance capabilities, during or after a deal."If we can conclude a comprehensive agreement, we will have significantly more ability to detect covert facilities – even after its duration is over – than we do today," the senior US official said. "After the duration of the agreement, the most intrusive inspections will continue: the Additional Protocol – which encompasses very intrusive transparency, and which Iran has already said it will implement – will continue."
  • Officials in the Netanyahu government are satisfied that their ideas and concerns have been given a fair hearing by their American counterparts. They praise the US for granting Israel unprecedented visibility into the process. But while those discussions may have affected the talks at the margins, large gaps – on whether to grant Iran the right to enrich uranium, or allow it to keep much of its infrastructure – have remained largely unaddressed.
  • Yet, more than any single enforcement standard or cap included in the deal, Israel believes the Achilles' heel of the proposed agreement is its definitive end date – the sunset clause."You've not dismantled the infrastructure, you've basically tried to put limits that you think are going to be monitored by inspectors and intelligence," said the official, "and then after this period of time, Iran is basically free to do whatever it wants."The Obama administration also rejects this claim. By e-mail, the senior US administration official said that, "'following successful implementation of the final step of the comprehensive solution for its duration, the Iranian nuclear program will be treated in the same manner as that of any non-nuclear weapon state party to the NPT – with an emphasis on non-nuclear weapon."
Paul Merrell

Remaining Snowden docs will be released to avert 'unspecified US war' - ‪Cryptome‬ * The Register - 0 views

  • All the remaining Snowden documents will be released next month, according t‪o‬ whistle-blowing site ‪Cryptome, which said in a tweet that the release of the info by unnamed third parties would be necessary to head off an unnamed "war".‬‪Cryptome‬ said it would "aid and abet" the release of "57K to 1.7M" new documents that had been "withheld for national security-public debate [sic]". <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7RchawQrMoAAHIac14AAAKH&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7RchawQrMoAAHIac14AAAKH&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> The site clarified that will not be publishing the documents itself.Transparency activists would welcome such a release but such a move would be heavily criticised by inteligence agencies and military officials, who argue that Snowden's dump of secret documents has set US and allied (especially British) intelligence efforts back by years.
  • As things stand, the flow of Snowden disclosures is controlled by those who have access to the Sn‪o‬wden archive, which might possibly include Snowden confidants such as Glenn Greenwald and Laura Poitras. In some cases, even when these people release information to mainstream media organisations, it is then suppressed by these organisations after negotiation with the authorities. (In one such case, some key facts were later revealed by the Register.)"July is when war begins unless headed off by Snowden full release of crippling intel. After war begins not a chance of release," Cryptome tweeted on its official feed."Warmongerers are on a rampage. So, yes, citizens holding Snowden docs will do the right thing," it said.
  • "For more on Snowden docs release in July watch for Ellsberg, special guest and others at HOPE, July 18-20: http://www.hope.net/schedule.html," it added.HOPE (Hackers On Planet Earth) is a well-regarded and long-running hacking conference organised by 2600 magazine. Previous speakers at the event have included Kevin Mitnick, Steve Wozniak and Jello Biafra.In other developments, ‪Cryptome‬ has started a Kickstarter fund to release its entire archive in the form of a USB stick archive. It wants t‪o‬ raise $100,000 to help it achieve its goal. More than $14,000 has already been raised.The funding drive follows a dispute between ‪Cryptome‬ and its host Network Solutions, which is owned by web.com. Access to the site was bl‪o‬cked f‪o‬ll‪o‬wing a malware infection last week. ‪Cryptome‬ f‪o‬under J‪o‬hn Y‪o‬ung criticised the host, claiming it had ‪o‬ver-reacted and had been sl‪o‬w t‪o‬ rest‪o‬re access t‪o‬ the site, which ‪Cryptome‬ criticised as a form of cens‪o‬rship.In resp‪o‬nse, ‪Cryptome‬ plans to more widely distribute its content across multiple sites as well as releasing the planned USB stick archive. ®
« First ‹ Previous 61 - 78 of 78
Showing 20 items per page