Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "problems" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gary Edwards

MF Global: Where's the Cash? -- Part II | ZeroHedge - 0 views

  •  
    It's complicated.  The bottom line is that we know where the $1.6 Billion in customer assets, squandered and "lost" by Corzine, is.  JP Morgan is holding the bulk of it, and due to recent changes in the 546(e) section of the Federal Bankruptcy code, JP Morgan and the other big banksters will be able to keep that money from it's rightful owners.  Oh, yeah.  One other thing.  The big banksters now running off with the assets of investors are the very same people who lobbied hard and heavy ($$$) to have the changes in the code pushed through by their unwitting stooges in Congress. excerpt: This week in The Institutional Risk Analyst we published a comment on the ongoing financial genocide at MF Global, "MF Global: Where's the Cash?"  http://us1.irabankratings.com/pub/IRAstory.asp?tag=515 The comment correctly identifies the location of the "missing" $1.6 billion as JP Morgan Chase and other bank custodians of MF Global.  The trouble is that even though we now know where the missing customer money has gone, namely JPMorgan, there is little chance that the defrauded customers of Jon Corzine will ever recover a dime. Here's the link to a video by William Rochelle of Bloomberg News explaining how the safe harbor in Section 546(e) of the Bankruptcy Code likely will prevent MF Global customers from ever getting their $1.6 billion back -- even when it's located, as it has been evidently. ... (MONEY SHOT) The problem here is that the existing laws against pillaging customer accounts and other acts of fraud are in conflict with the bankruptcy statute designed to make the world safe for large banks and over-the-counter derivatives.  Specifically, the post 2005 bankruptcy laws prohibit trustees from clawing back the $1.6 billion in stolen customer funds.  Indeed, the Bankruptcy Court and trustee are precluded from pursuing the banks just as the trustee in the Madoff fraud has likewise been stymied.    In addition to the clients of MF Global who were ap
Gary Edwards

J.P. Morgan Chase's Ugly Family Secrets Revealed | Matt Taibbi | Rolling Stone - 0 views

  •  
    Socialist blogger and Rolling Stone Magazine journalist Matt Taibi has made a career out of exposing Banksters and their criminal activities causing the 2008 collapse of the global financial industry.  Here he sights a story in American Banker that fully demonstrates the depths of depravity and criminal activities that continues to characterize big Banksters. The mortgage-foreclosure-robo signing scandal is just the tip of the ice berg.  Matt recounts the story of Linda Almonte, a JP Morgan Chase employee in charge of Credit Card debt bundling.  It's horrific. Money shot: The financial crash wouldn't have happened if even a slim plurality of financial executives had done what Linda Almonte did, i.e. simply refuse to sign off on a bogus transaction. If companies had merely upheld their own stated policies and stayed within the ballpark of the law, none of these messes could have accumulated: fraudulent mortgages wouldn't have been sold, families wouldn't have been foreclosed upon based on robo-signed documentation, investors wouldn't have been duped into buying huge packets of "misrepresented assets." ............. excerpt: In a story that should be getting lots of attention, American Banker has released an excellent and disturbing exposé of J.P. Morgan Chase's credit card services division, relying on multiple current and former Chase employees. One of them, Linda Almonte, is a whistleblower whom I've known since last September; I'm working on a recount of her story for my next book. One of the things we were promised by the lawmakers who passed the Dodd-Frank reform bill a few years back is that this would be a new era for whistleblowers who come forward to tell the world about problems in our financial infrastructure. This story now looms as a test case for that proposition. American Banker reporter Jeff Horwitz did an outstanding job in this story detailing the sweeping irregularities in-house at Chase, but his very thoroughness means the news may have ram
Gary Edwards

PETER SCHIFF: The Housing Bust Was Just A Preview For The Coming Catastrophe - Business Insider - 0 views

  •  
    Peter Schiff talks about his new book "The Real Crash: America's Coming Bankruptcy, How to Save Yourself and Your Country".  I caught the Coast-to-Coast "Financial Crisis Special" interview with Peter earlier this week where he spoke on the "Real Crash" issues.  Stunning stuff.  His hour on Coast was followed by Lindsey Williams who pointed out that the New World Order - Illuminati - Bankster trigger point would be signaled by a collapse in the derivatives market. The derivatives market is now over a quadrillion dollars of  casino style gambling.  This is where Banksters make huge bets on things like whether or not interest rates will go up or down.  Then they take out insurance to cover their bets, which further compounds the cost.  Recent events like the Jon Corzine MF Global gamble that the Federal Reserve Bankster Cartel would backstop explosive European sovereign bankster debt are the first indications of collapse in the derivatives market.  We now know that JP Morgan placed similar bets on a European bailout by the Federal Reserve and World Bank, and lost big.  The only difference is that Corzine robbed his clients personal accounts to cover his bets. While Schiff argues the facts on the table, the "what", Lindsay argued the "why"; claiming that this escalating debt mess is all by design.  Lindsay claims that an operational fundamental of the New World Order elites is to first overturn the USA Constitution.  Using a Machiavellian Principle known as, "out of chaos comes order", they seek to de-stabilize and overthrow the USA Constitutional Republic using massive and crushing debt to first destroy the dollar currency.  This will create massive chaos requiring martial law and government seizure of private property and production. Peter Schiff warns that the government is driving us deeper into debt at exactly the time we should be saving and investing those savings in future private sector productivity.  Lindsay argues that this is all by desig
Gary Edwards

Fact Check: Osama Bin Laden Alive, General Motors Dead - 0 views

  •  
    Excellent analysis and statement of facts in evidence.   Conclussion is that Osama is well on his way to winning on every one of his stated objectives, and GM is heading for a real bankruptcy, despie $100 Billion in taxpayer bailout funds.  GM is expected to cost taxpayers upwards of $56 Billion when all is said and done. excerpt: "Vice President Joe Biden has a suggested slogan for the Obama/Biden 2012 campaign. He repeats it everywhere he goes. "Osama Bin Laden is dead," he bellows, "and General Motors is alive!" There's only one problem. He's wrong. Yes, Bin Laden's dead, thank God. And General Motors is still an operating concern. But in point of fact, the cause for which Osama Bin Laden stood is stronger than at any time in American history, thanks in large part to the Obama administration. And as for GM, it's not so much alive as it is a member of the corporate living dead, feasting on taxpayer brains while slowly deteriorating, the first zombie company created by Obama's cronyism. On the eleventh anniversary of Osama Bin Laden's attack on America, it's worthwhile to examine just what he hoped to accomplish. He spelled out his goals in three documents: a 1996 fatwa titled, "Declaration of War Against The Americans Occupying The Land of the Two Holy Places"; a 2002 "Letter to America"; and a 2004 video. In these manifestos, he declared his willingness to die, of course. His goals included:"
Gary Edwards

Newt Gingrich: 15 Things You Don't Know About Him - 1 views

  •  
    Good article on Newt; covers the good, the bad, and the ugly.  Personally i don't trust Newt.  As former repubican senator Jim Talent of Missouri says, "He's not a reliable and trusted conservative leader".  Strangely, Talent supports Romney. And there is nothing conservative about Romney.   The one thing i do like about Newt is that he is a bomb thrower extraordinaire.  There isn't a Libertarian (moi), conservative, or Constitutional conservative anywhere that wouldn't love to see Newt in the ring with Obama, hammering his Marxist ass without mercy.  But i'm not so sure that that desire is enough to overcome the serious character flaws and self centered egotistical baggage Newt hauls around.  He proves time and again that he lacks the core values of a true conservative, including dedication to the upholding the Constitution and Rule of Law. Funny though that a valueless establishment repubican "we can manage big government more efficiently and make it work" guy like Romney is attacking Newt as not being a true conservative?  What does that make Romney?  At least Newt can point to the awesome Contract with America repubican take over of Congress - after 40 years in the wilderness. Even though Ron Paul has lost it on foreign policy, i continue to send money.  My switch from Reagan Constitutional Conservative to Libertarian has "nearly" everything to do with the 2008 financial collapse, and the years of research and study that followed.   I say "nearly" because i just couldn't pull the trigger until unexpectedly i found myself in a Bloomberg discussion questioning my support for Herman Cain.  Sadly, Herman supports the Federal Reserve, including full approval of both Greenspan and Bernacke policies that have destroyed the US dollar and enabled the Banksters to run off with over $29 Trillion of our money.  Of course, this is an indefensible and inexcusable position.  The Libertarian's in the discussion pointed out that the problems this country faces cann
  •  
    disclosure: I met Cokie and Steve Roberts at an intimate house party in NH. Probably in 1991. Very nice people but they are full blown unionist-socialist-progressives iron bent on the European Socialism model. Not Constitutionalist in any way shape of form. Certainly not Constitutional Capitalist or free market types either.
Gary Edwards

Public unions thrive at taxpayer expense - 1 views

  •  
    The bottom line is that the public unions continue to increase their wages and benefits, inspite of the economic free fall the economy is in, because they ruthlessly use members dues for lobbying and bargaining with politicians who are paying them with "other people's money". CC provides some interesting diagrams describing how the scam works, and, he does point to two solutions being tested in Wisconsin and Indiana. In Wisconsin, gov Walker is trying to end public sector "collective bargaining". While Gov Daniels in Indiana has successfully ended the the requirement that the State deduct union workers membership dues from their pay checks. When given the chance to choose, most union workers chose NOT to pay those dues. The Daniels method seems to be working very well, and is based on an easy to understand Constitutional principle; money earned is personal property, and the individual should have the right to chose what happens to their property. There are some other things that might be tried, although i think the Daniels principle should be an automatic first step taxpayers take to restore Constitutional Rule of Law. .... Break strike threat with non union replacements President Reagan was tested by the public sector unions when they threatened a strike by the thought to be essential and irreplaceable Air Controllers union. Reagan called them on it, and brought in non union replacements to break the strike. Painful, but it worked. ..... Privatization The most basic and Constitutional response is to privatize the service, and turn it over to the open market of competitive contract bids. Works every time, but the awarding of contracts has it's own level of political corruption and influence peddling. Personally i would prefer a grand jury approach to oversight problem involved in the awarding of contracts. Citizens need to be pressed into the task of backstopping political corruption. Any connection of cross channeling of people or t
Gary Edwards

Banksters - William Black tells the real truth - YouTube - 0 views

  •  
    Savings & Loan crisis regulator Bill Black testifies in front of the House in 2011.  He explains the financial collapse of 2008, the role of subprime and liar's loans, and the incredible fraud running rampant through the Bankster industry.  Lehman Brothers alone was responsible for near 80% of the fraudulent liar loan mortgage security packages sold throughout the world.  Black lays much of the blame on the Federal Reserve, the SEC, and three individuals: Greenspan, Bernanke, and Timothy Geitner (NY Federal Reserve).  He compares how regulators with limited authority were able to contain and minimise the Savings and Loan fraud problem, with the near total lack of effort by the Federal Reserve, FDIC and SEC regulators.  Extrordinary testimony.  And Congress, the Justice Department, the Federal rEserve, the SEC, the FDIC and all the other elite regulators continue to do NOTHING!
Gary Edwards

The worst rise to the top - Mises Economic Blog - 0 views

  •  
    Very interesting post from Douglas French concerning the repubican primaries and F.A. Hayek's "Road to Serfom" comments on modern politics. Fascinating stuff. Hayek argues that, in politics, "the worst rise to the top", and he outlines three reasons why: .... Choosing is the problem. Informed people are more "nuanced" - they have many divergent opinions and views. Uniformity however drives the group dynamics behind a democratic process. Uniformity of opinion rules, and the less informed a person is, the more uniform and drawn to larger groups they will be. The "lowest common denominator" rule rules the democratic process. Mobocracy at work. .... Those on top, pursuing the political leadership positions, must appeal to the masses and weave together the groups driven by the "lowest common denominator" rule. The docile and gullible "are ready to accept whatever values and ideology drummed into them". Advantage to big media, the socialist assemblage ruling public education, and public workers unions. ..... Third, political leaders "don't promote a positive agenda, but a negative one of hating an enemy and envy of the wealthy. To appeal to the masses, leaders preach an "us" against "them" program." The great unwashed and uninformed being guided and driven "by emotion and passion rather than critical thinking." Not sure i agree with any of this, much as i admire and recognize the importance of Hayek and his seminal, game changing "Road to Serfdom". One reason is that some of the most informed people i know are goose stepping socialist hell bent on ending individual liberty - as in "life, liberty and the pursuit of happiness", in exchange for Marxist social equality. Another reason i would disagree is that the salt of the earth "bitter clingers" Reagan Conservatives that rock the Tea Party movement are exactly what the establishment elites call the "uninformed masses". Not sure if that's what Hayek meant, but his viewpoint does look a
Gary Edwards

U.S. Senate: Senators Home - 0 views

  •  
    Petition Time!  Last week, in a bipartisan action, the House of Representatives voted 267-159 to repeal the CLASS Act. excerpt from the Independent Woman's Voice call-to-action ; The CLASS Act is a microcosm of two of the primary problems that plague ObamaCare - it's unaffordable and completely unworkable. Indeed, that's why Department of Health & Human Services Secretary Kathleen Sebelius had to pull the plug on the CLASS Act back in October. Sebelius was required to certify that CLASS - the health care law's provision to provide for long-term insurance for assisted living - would remain affordable and fiscally solvent for the next 75 years. To the surprise of only those who believe the fairy tail that ObamaCare will never add to the national debt, Secretary Sebelius was compelled to finally cease defending CLASS and abandon it. If only that same standard could be applied to all of ObamaCare. Now, the repeal of the CLASS Act moves on to the Senate. It's high time the Patriots mobilize to put pressure on the Senate to follow the House in repealing CLASS and sending it on to President Obama's desk. Not surprisingly the President has indicated he wouldn't sign repeal of CLASS.  Nonetheless, he should feel the pressure from the American people to do so.
Gary Edwards

RSA Animate - Crises of Capitalism - YouTube - 0 views

  •  
    Excellent white board illustrated discussion on capitalism and the financial crisis.   I have a question though?  How do you discuss capitalism without also discussing borrowing, interest rates and dividends?  Seriously.  No mention of interest rates?  No mention of the relationship between GOLD, commodities and fiat money?   Yes, the Banksters collapsed the world economy with the willing consent of corrupt crony politicians.   The corruption and practice of crony corporatism is NOT Capitalism!  It's fascism.   Nor are the bailouts of the Banksters and big unions capitalism!  In capitalism there is no such thing as a government bailout or two big too fail.  Capitalism would have put the Banksters into the dirt without blinking. There is an interesting transection where the cartoonist suggest that global corporatism demanded capital from creative financiers.  And that caused the the problem.  Seems the Banksters got too too creative. I disagree with this perspective, and am left wondering how the connection between global commerce and creative "casino" financial instruments are natural consequences of each other?  It's a commonly held belief that global explosion was due to the a Reagan - Thatcher conservative revolution where one of the key corporate organizing principles was that of the "franchise" backed by IPO style public stock offerings.  Clowns like Warren Buffett gobbled up tons of Coca Cola and McDonalds stock, waiting for global trade barriers to fall in the wake of Reagan - Thatcher liberty.  When the Soviet Union collapsed, the "walls" truly did come down.  And USA corporations were uniquely positioned and structured to roll out globally. That doesn't have anything to do with the kind of creative casino gambling that brought the world to it's knees.  What do exotic financial derivatives have to do with funding corporations?  Yes, they were used to hedge financial positions as sovereign governments were maddeningly borrowing and s
Joe La Fleur

Liberals, Progressives and Socialists - Walter E. Williams - Page 1 - 1 views

  •  
    The Williams article does no more than to sing to the choir and certainly is no scholarly work. First he stuffs the Nazis into his own "socialist" bag, ignoring the fact that the "socialist" label in the party name was only window dressing for what was in reality a mix of fascism and capitalism, not socialism. Then he declares that "communists" in the Soviet Union were responsible for mass murders, blinking past the fact that the Soviet Union was communist in name only. It was a fascist state during the entire period when the mass murders there took place and wound up an oligarchy before it died. "Communist China" likewise was never a communist state. It began as a socialist state ruled by an oligarchy, became near-fascist under Chairman Mao, and returned to being an oligarchy after his death, but this time sprouting capitalist wings. (Nixon removing the U.S. trade barriers with China had a lot to do with this.) Having stuffed everything in sight into his "socialist" bag, deserving or not, and labeling *all* socialists as government mass murders, Williams takes the insurmountable mental leap to paint groups like the "NAACP, the National Council of La Raza, Green for All, the Sierra Club and the Children's Defense Fund" as mass murderers, apparently should their views ever become dominant in the U.S. (Williams provides no connective tissue for his illogic there.) Then to top it all off, the web site's editor slaps a title on the essay lumping liberals and progressives in with the socialists, so apparently liberals and progressives are potential mass murderers too, which is unmistakably his innuendo. Williams seems to have a problem with organizations working *through our legal system* to expand civil liberties and to raise ethnic minorities out of poverty. Love 'em or hate 'em, those are not groups of mass murderers. Williams has the right to dislike those organizations. He also has the right to make absurd arguments, which he has fully exercised. But he wa
Gary Edwards

U.S. Treasury Says Financial Crisis Is Over But The Next One May Be Right In Front Of Us - 0 views

  •  
    More great charts, this time courtesy of the US Treasury Department. The charts use select areas of measurement to show a slowly improving economy, with the private sector leading the way. What the charts don't show or discuss is that the Obama economy has been assisted by $3 Trillion in Federal Reserve Bankster Cartel "quantitative easing", and the $5 Trillion in debt that Obama spending has racked up. Throw in the secret $16.1 Trillion the Federal Reserve pumped into the international bankster system, and the question becomes, "Where is all this money going? And why isn't the economy jumping?" The numbers are staggering. One chart provided by Treasury shows a successful TARP program where the Banksters have paid back in full the massive bailout funds. One has to wonder though, are they paying back the taxpayer bailout with newly generated profits? Or are they simply using freshly printed Federal Reserve dollars ($19.1 Trillion by the Federal Reserve's count), passed to them at zero interest? The shell game Obama, the ruling establishment, and the Federal Reserve Bankster Cartel have been playing may be running out of steam. We're now in the money laundering stage where Banksters and trading partners like China are dumping their digital-ions of dollars for real property, corporate assets and hard currencies. The St Louis branch of the Federal Reserve Cartel says as much in their most recent economic study. From the article: ....... The nation's debt load has grown to the point where the U.S. is now threatened with bankruptcy but the economy is not likely to grow fast enough to reduce the need for additional government borrowing. Empirical studies have shown a strong correlation between high levels of debt and reduced economic growth which results in decreased government revenue as explained below.......... An essay published by the St. Louis Federal Reserve on the Federal debt poised the question, "Too Little Revenue or Too Much Spe
Gary Edwards

Suit: Roberts' ruling a poison pill for Obamacare - 0 views

  •  
    "The penalties Americans will be required to pay under Obamacare for going without health insurance were declared constitutional in a US. Supreme Court decision that hinged on Chief Justice John Roberts' assertion that the assessments are taxes. But a legal challenge to the federal government takeover of health-care decision-making says that's a problem, because Harry Reid created the Obamacare legislation, with all of its new "taxes," in the U.S. Senate. The Constitution requires any tax bills to begin in the House. The demand for an explanation is being raised in an amended complaint filed by the Pacific Legal Foundation, which is representing a man who believes the new bureaucracy isn't legal."
Paul Merrell

In Keeping Grip on Data Pipeline, Obama Does Little to Reassure Industry - NYTimes.com - 0 views

  • Google, which briefly considered moving all of its computer servers out of the United States last year after learning how they had been penetrated by the National Security Agency, was looking for a public assurance from President Obama that the government would no longer secretly suck data from the company’s corner of the Internet cloud.Microsoft was listening to see if Mr. Obama would adopt a recommendation from his advisers that the government stop routinely stockpiling flaws in its Windows operating system, then using them to penetrate some foreign computer systems and, in rare cases, launch cyberattacks.
  • Intel and computer security companies were eager to hear Mr. Obama embrace a commitment that the United States would never knowingly move to weaken encryption systems. They got none of that.
  • Perhaps the most striking element of Mr. Obama’s speech on Friday was what it omitted: While he bolstered some protections for citizens who fear the N.S.A. is downloading their every dial, tweet and text message, he did nothing, at least yet, to loosen the agency’s grip on the world’s digital pipelines. White House officials said that Mr. Obama was committed to studying the complaints by American industry that the revelations were costing them billions of dollars in business overseas, by giving everyone from the Germans to the Brazilians to the Chinese an excuse to avoid American hardware and cloud services. “The most interesting part of this speech was not how the president weighed individual privacy against the N.S.A.,” said Fred H. Cate, the director of the Center of Applied Cybersecurity Research at Indiana University, “but that he said little about what to do about the agency’s practice of vacuuming up everything it can get its hands on.”
  • ...4 more annotations...
  • In fact, behind the speech lies a struggle Mr. Obama nodded at but never addressed head on. It pits corporations that view themselves as the core of America’s soft power around the world — the country’s economic driver and the guardians of its innovative edge — against an intelligence community 100,000 strong that regards its ability to peer into any corner of the digital world, and manipulate it if necessary, as crucial to the country’s security.In public, the coalition was polite if unenthusiastic about the president’s speech. His proposals, the companies said in a statement, “represent positive progress on key issues,” even while “crucial details remain to be addressed on these issues, and additional steps are needed on other important issues.” But in the online chat rooms that users and employees of those services inhabit each day, the president’s words were mocked. “If they really cared about the security of US infrastructure, they’d divulge the vulnerabilities they found or bought from the black market that exploit the security of these systems, so those systems can be fixed, and no one else can exploit them with these exploits,” wrote a user called “higherpurpose” on Hacker News.
  • In an interview, a senior administration official acknowledged that the administration had weighed what the president could say in public about the delicate problems of encryption, or the N.S.A.’s use of “zero day” flaws in software, the name for security holes that have never been seen before. It is a subject the intelligence agencies have refused to discuss in public, and Mr. Obama determined that it was both too secret, and too fluid, to discuss in the speech, officials said.In response to questions, the White House said the president had asked his special assistant for cybersecurity, Michael Daniel, and the president’s office of science and technology policy to study a recent advisory panel’s recommendation that the government get out of the business of corrupting the encryption systems created by American companies.
  • It will not be an easy task. One of the recent disclosures, first reported by Reuters, indicated that the N.S.A. paid millions of dollars to RSA, a major encryption firm, to incorporate a deliberately weakened algorithm into some of its products, giving the government a “back door” to read whatever it wanted. But when the advisory panel concluded that the United States should not “in any way subvert, weaken or make vulnerable generally available commercial software,” the intelligence agencies protested.“Some in the intelligence community saw that as a call for the N.S.A. to get out of cryptography, which is the reason they were created,” the senior official said. He added: “We’ve said that we are very much supportive of U.S. industry and making sure that U.S. industry remains competitive, and able to produce really good products. And N.S.A. has been out there saying they have no interest in breaking encryption that guards global commerce.”
  • But as Mr. Obama himself acknowledged, the United States has a credibility problem that will take years to address. The discovery that it had monitored the cellphone of Chancellor Angela Merkel of Germany, or that it has now found a way to tap into computers around the world that are completely disconnected from the Internet — using covert radio waves — only fuels the argument that American products cannot be trusted.That argument, heard these days from Berlin to Mexico City, may only be an excuse for protectionism. But it is an excuse that often works.
Paul Merrell

Growing boycott will "hit each of us in the pocket" warns Israel finance minister | The Electronic Intifada - 0 views

  • Israeli finance minister Yair Lapid has become the latest senior official to warn about the serious impact of growing boycott, divestment and sanctions (BDS) campaigns targeting Israel. “The world seems to be losing patience with us,” Lapid told the Hebrew edition of Ynet on 10 January.
  • Lapid, leader of the Yesh Atid faction, is the senior coalition partner of Israeli Prime Minister Benjamin Netanyahu.
  • Lapid added: “We have formulated complete scenarios as to what will happen if the boycott continues and exports are hurt. In all scenarios, things do not look good. The status quo will hit each of us in the pocket, will hurt every Israeli. We are export-oriented, and this [export trade] depends on our global standing.” Lapid was particularly concerned about further announcements by Israel of new tenders for houses in illegal Jewish-only colonies in the occupied West Bank. Lapid’s frank comments come just days after Dutch pensions giant PGGM took the unprecedented decision to divest from all Israeli banks because of their role in the colonization program.
  • ...1 more annotation...
  • Lapid, an alleged “centrist” who has habitually made anti-Arab comments, joins other senior politicians who have warned about the looming threat of boycott. Recently, the chair of the governing coalition’s Habayit Hayehudi party said that boycott was the “greatest threat” Israel faced. Justice minister and war crimes suspect Tzipi Livni also warned that “The boycott is moving and advancing uniformly and exponentially … Those who don’t want to see it, will end up feeling it.”
  •  
    This is the largest part of the real back story on John Kerry's feverish effort to negotiate a two-state solution to the Israel-Palestine apartheid problem. The Palestinian Boycott, Divestment, and Sanctions ("BDS") movement against Israel is growing rapidly, nearly doubling the rate of growth of the former BDS movement that successfully ended apartheid government of South Africa.   Israel has become a pariah state diplomatically because of its war crimes against Palestinians and because of BDS, is increasingly becoming a pariah state economically. At the same time, Israel has illegally colonized Palestine to the extent that a 2-state solution is all but impossible, meaning that the most likely outcome is that Israel will cease being the "Jewish State" and be forced to grant equality to Palestinians as well in a new secular government. The situation became all the more dire for Israel as the "Jewish State" when the U.N. General Assembly granted Palestine observer state status, opening the way for Palestine to, e.g., pursue criminal prosecution of Israeli leaders for war crimes before the International Criminal Court.  That has dramatically increased the Palestinian Authority's leverage in negotiations. Kerry is on a rescue mission to see if he can coerce the Palestinian Authority to cede sufficient land and powers to Israel to make a 2-state solution credible. Kerry's leverage is that the U.S. has been underwriting the Palestinian Authority's expenses and can threaten to withdraw the financial support.  All of which brings it down to the question of Palestinian Authority leadership corruption. If the PA stands tall and refuses to accept Kerry's ridiculous demands, there will almost certainly be no 2-state solution, ever, because Israel continues to colonize Palestine and has locked up most of Palestine's water resources. Further colonization means still less water for an "independent" Palestine state. The Palestine Authority, on the other hand, suffered f
Paul Merrell

Obama's NSA 'reforms' are little more than a PR attempt to mollify the public | Glenn Greenwald | Comment is free | The Guardian - 0 views

  • In response to political scandal and public outrage, official Washington repeatedly uses the same well-worn tactic. It is the one that has been hauled out over decades in response to many of America's most significant political scandals. Predictably, it is the same one that shaped President Obama's much-heralded Friday speech to announce his proposals for "reforming" the National Security Agency in the wake of seven months of intense worldwide controversy.The crux of this tactic is that US political leaders pretend to validate and even channel public anger by acknowledging that there are "serious questions that have been raised". They vow changes to fix the system and ensure these problems never happen again. And they then set out, with their actions, to do exactly the opposite: to make the system prettier and more politically palatable with empty, cosmetic "reforms" so as to placate public anger while leaving the system fundamentally unchanged, even more immune than before to serious challenge.
  • In response to political scandal and public outrage, official Washington repeatedly uses the same well-worn tactic. It is the one that has been hauled out over decades in response to many of America's most significant political scandals. Predictably, it is the same one that shaped President Obama's much-heralded Friday speech to announce his proposals for "reforming" the National Security Agency in the wake of seven months of intense worldwide controversy.The crux of this tactic is that US political leaders pretend to validate and even channel public anger by acknowledging that there are "serious questions that have been raised". They vow changes to fix the system and ensure these problems never happen again. And they then set out, with their actions, to do exactly the opposite: to make the system prettier and more politically palatable with empty, cosmetic "reforms" so as to placate public anger while leaving the system fundamentally unchanged, even more immune than before to serious challenge.This scam has been so frequently used that it is now easily recognizable.
  •  
    Glenn Greenwald offers his take on Obama's NSA "reform" speech.
Paul Merrell

N.S.A. Devises Radio Pathway Into Computers - NYTimes.com - 1 views

  • The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
  • The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyberattack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.
  • The N.S.A. and the Pentagon’s Cyber Command have implanted nearly 100,000 “computer network exploits” around the world, but the hardest problem is getting inside machines isolated from outside communications.
  • ...8 more annotations...
  • the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”
  • A program named Treasure Map tried to identify nearly every node and corner of the web, so that any computer or mobile device that touched it could be located.
  • Over the past two months, parts of the program have been disclosed in documents from the trove leaked by Edward J. Snowden, the former N.S.A. contractor. A Dutch newspaper published the map of areas where the United States has inserted spy software, sometimes in cooperation with local authorities, often covertly. Der Spiegel, a German newsmagazine, published the N.S.A.'s catalog of hardware products that can secretly transmit and receive digital signals from computers, a program called ANT. The New York Times withheld some of those details, at the request of American intelligence officials, when it reported, in the summer of 2012, on American cyberattacks on Iran.
  • A 2008 map, part of the Snowden trove, notes 20 programs to gain access to big fiber-optic cables — it calls them “covert, clandestine or cooperative large accesses” — not only in the United States but also in places like Hong Kong, Indonesia and the Middle East. The same map indicates that the United States had already conducted “more than 50,000 worldwide implants,” and a more recent budget document said that by the end of last year that figure would rise to about 85,000. A senior official, who spoke on the condition of anonymity, said the actual figure was most likely closer to 100,000.
  • The N.S.A.'s efforts to reach computers unconnected to a network have relied on a century-old technology updated for modern times: radio transmissions.In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using technology that would have brought a smile to Q, James Bond’s technology supplier.
  • One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.
  • Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.
  • But the Stuxnet strike does not appear to be the last time the technology was used in Iran. In 2012, a unit of the Islamic Revolutionary Guards Corps moved a rock near the country’s underground Fordo nuclear enrichment plant. The rock exploded and spewed broken circuit boards that the Iranian news media described as “the remains of a device capable of intercepting data from computers at the plant.” The origins of that device have never been determined.
  •  
    Even radio transceivers emplanted in USB jacks. So now to be truly secure, we need not only an air gap but also a Faraday cage protecting the air gap. 
Paul Merrell

Your Computer May Already be Hacked - NSA Inside? | Steve Blank - 1 views

  • But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”  Say what??  They can see the plaintext on my computer before I encrypt it? That defeats any/all encryption methods. How could they do that? Bypass Encryption While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
  • The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT. Today every desktop and laptop computer has another way for the NSA to get inside. Intel Inside It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn’t crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip. After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing it’s microprocessors to load fixes automatically when your computer starts.
  • Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer’s BIOS.). Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update. Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that 3rd parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it is impossible to know whether anyone is loading a backdoor into your computer.
  • ...3 more annotations...
  • Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security conscious sites can discover rootkits by tools that check kernel code and data for changes. But what if you could use the configuration and state of microprocessor hardware in order to hide? You’d be invisible to all rootkit detection techniques that checks the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA’s biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.) Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys  giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.) That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.
  • A few months ago these kind of discussions would have been theory at best, if not paranoia.
  • The Prism disclosures prove otherwise – the National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven’t implemented a microcode backdoor. The downside is that 1) backdoors can be hijacked by others with even worse intent. So if NSA has a microcode backdoor – who else is using it? and 2) What other pieces of our infrastructure, (routers, smartphones, military computers, satellites, etc) use processors with uploadable microcode? —— And that may be why the Russian president is now using a typewriter rather than a personal computer.
Paul Merrell

Half of Federal Agencies Still Use Outdated Freedom of Information Regulations - 0 views

  • Nearly half (50 out of 101) of all federal agencies have still not updated their Freedom of Information Act regulations to comply with Congress's 2007 FOIA amendments, and even more agencies (55 of 101) have FOIA regulations that predate and ignore President Obama's and Attorney General Holder's 2009 guidance for a "presumption of disclosure," according to the new National Security Archive FOIA Audit released today to mark Sunshine Week. Congress amended the Freedom of Information Act in 2007 to prohibit agencies from charging processing fees if they missed their response deadlines, to include new online journalists in the fee waiver category for the media, to order agencies to cooperate with the new FOIA ombudsman (the Office of Government Information Services, OGIS), and to require reports of specific data on their FOIA output, among other provisions co-authored by Senators Patrick Leahy (D-VT) and John Cornyn (R-TX). But half the government has yet to incorporate these changes in their regulations, according to the latest National Security Archive FOIA Audit. After President Obama's "Day One" commitments to open government, Attorney General Eric Holder issued new FOIA guidance on March 19, 2009, declaring that agencies should adopt a "presumption of disclosure," encourage discretionary releases if there was no foreseeable harm (even if technically covered by an exemption), proactively post the records of greatest public interest online, and remove "unnecessary bureaucratic hurdles" from the FOIA process. But five years later, the Archive found a majority of agencies have old regulations that simply ignore this guidance.
  • The Archive's FOIA Audit also highlights some good news this Sunshine Week: New plans from both the House of Representatives and White House have the potential to compel delinquent agencies to update their regulations. "Both Congress and the White House now recognize the problem of outdated FOIA regulations, and that is something to celebrate," said Archive director Tom Blanton. "But new regs should not follow the Justice Department's terrible lead, they must follow the best practices already identified by the FOIA ombuds office and FOIA experts." "If and when this important FOIA reform occurs, open government watchdogs must be vigilant to ensure that the agencies' updated regulations are progressive, rather than regressive, and embrace best practices to ensure that more documents are released to requesters, more quickly" said Nate Jones, the Archive's FOIA coordinator.
  • In 2011, the back-to-back Rosemary Award-winning Department of Justice proposed FOIA regulations that would have — among many other FOIA setbacks — allowed the Department to lie to FOIA requesters, eliminated online-only publications from receiving media fee status, and made it easier to destroy records. After intense pushback by openness advocates, the DOJ temporarily pulled these regulations, and Pustay claimed, "some people misinterpreted what we were trying to do, misconstrued some of the provisions, and didn't necessarily understand some of the fee guidelines." Pustay also claimed — to an incredulous Senate Judiciary Committee — that updating FOIA regulations to conform with the 2007 OPEN Government Act was merely optional and "not required." National Security Archive director Tom Blanton warned in his own 2013 Senate testimony that these terrible "vampire" regulations were not gone for good. This year, Pustay testified that the Department of Justice has indeed resubmitted its FOIA regulations for OMB approval; their content is unknown to the public.
  • ...4 more annotations...
  • The House of Representatives recently unanimously passed the bipartisan Freedom of Information Act Implementation Act (H.R. 1211), which includes a provision compelling agencies to update their FOIA regulations. The House bill — which now awaits Senate approval — would require each agency to update its FOIA regulations "not later than 180 days after the enactment of this Act." The White House is also addressing the problem of outdated FOIA regulations, albeit in a different manner. In its latest Open Government Partnership National Action Plan, the White House has committed (on paper, at least) to creating one "core FOIA regulation and common set of practices [that] would make it easier for requesters to understand and navigate the FOIA process and easier for the Government to keep regulations up to date." Transparency watchdogs went on alert this week after the Department of Justice's Director of Information Policy Melanie Pustay announced during her Senate testimony on March 11, 2014 that, "My office is leading that project" to create the White House-backed common regulation which, she estimated will be, "a one or two year project." Despite Pustay's pledge that she would accept input from OGIS and the requester community, her Department's history of crafting FOIA regulations has been anything but stellar.
  • As the Department of Justice and other agencies have demonstrated, new regulations do not necessarily make good regulations. As such, the National Security Archive has recommended that any updated FOIA regulations must: mandate that FOIA officers embrace direct communications with requesters; require agencies to receive requests by e-mail and post all responses and documents online; direct agencies to update their FOIA processing software so documents can be posted to any online repository, including the government-sponsored FOIAonline; encourage agencies to join FOIAonline to make their FOIA processing more cost-effective and efficient; stream-line inter and intra-agency "referral" black holes — and keep requesters abreast of where their requests are if the agency does have to refer them; include language encouraging use of the OGIS, which can help requesters and agencies mediate disputes to avoid animosity and costly litigation; end the practice of using fees to discourage FOIA requesters. The Office of Government Information Services — which reviews and comments on agency regulations as they are proposed — has also compiled a list of best practices for agencies to consider while crafting regulations. These include: "let the Freedom of Information Act itself" — and its presumption for disclosure — "be your guide;" bring attorneys, FOIA processors, records managers and IT pros to the table; include your plan for records management and preservation; and alert requesters of their option to contact OGIS for mediation and dispute resolution services.
  • A useful compilation of current agency FOIA regulation language — already on the books — put together by the Center of Effective Government also includes helpful guidelines on preventing the destruction of requested records; narrowly interpreting claims of confidential business information; and clarifying fee waivers and procedures. FOIA experts are currently working to craft model, pro-transparency, CFR-ready language that agencies — or the drafters of government-wide common regulations — can use to bring agencies' Freedom of Information Act regulations up to standard. Watch this space, and then watch the Code of Federal Regulations (CFR). "As the staffer who waded through every single federal agencies' FOIA website and CFR chapter to locate their — sometimes hidden — regulations, I learned FOIA officials often say they view their FOIA requesters as customers," said Archive researcher Lauren Harper, "I think easy to find, updated model FOIA regulations are the best way for agencies to demonstrate they truly value their customer service, and the spirit of the FOIA."
  • The National Security Archive has conducted thirteen FOIA audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  •  
    Article includes tables indicating which agencies are out of compliance with which FOIA directives. 
Gary Edwards

GOP immigration plan devised by Communist Party - 0 views

  • Republican support
  • But why would Republicans get behind such a plan? Some astute political observers advise that when politicians appear to be promoting agendas against their own interest, follow the money.
  • t’s no surprise that the Republicans supporting this thing are the ones with ties to the Chamber of Commerce, not ordinary voters.”
  • ...8 more annotations...
  • But even if big business benefits, the cheap labor advantages are only temporary. Once illegal aliens are fully legalized, businesses will be required to provide just as much in pay and benefits as they pay American workers.
  • In the meantime, however, it is widely assumed those workers will take jobs from American citizens, depress wages and increase unemployment. Moreover, in many key swing states, projected amnesties will swamp the rolls of the unemployed (see table)
  • So, illegal aliens would be granted legal status immediately, but five years down the road, if the fence still isn’t built and e-verify still isn’t being used, then their legal status would be revoked. Given that the Department of Homeland Security is already allegedly ignoring border security –with immigration and customs agents suing their own agency for failing to enforce the law – many voters place little confidence in political promises of future enforcement.
  • In the meantime, Senate and House opponents have been painstakingly highlighting what they consider to be glaring flaws in these proposals: Every single border security provision in the Senate bill, including the hire of 20,000 Border Patrol agents, denying amnesty to criminals, building fences and installing surveillance devices, can be waived by the Homeland Security secretary. Both the House and Senate proposals emphasize the path to citizenship – the centerpiece of communist efforts – while making border security both vague and secondary. Both bills provide a $5,000 incentive for companies to hire the newly legalized illegal aliens instead of Americans, since the aliens would not be subject to the Obamacare coverage mandate.
  • Although politicians and the media have settled on the claim that there are 11 million illegal aliens, the actual number may well be closer to 20 million to 30 million. There were 10 million in 1996, a mere 10 years after Reagan’s amnesty, and it is doubtful only one million more have been added in the ensuing 17 years. Since 1990, Border agents have apprehended on average more than 1 million illegal aliens per year, almost all from Mexico.
  • When the Reagan amnesty became law, the intention was to naturalize only 1.2 million people, but the actual figure turned out to be 2.7 million. Statistics on illegal immigration have longed tended to be underestimated, sometimes vastly so.
  • Thus, current proposals provide a path to citizenship for as many as 20 to 30 million illegal aliens here now, plus relatives who will be brought in through chain migration and at least 75 percent of those who will come in the future – virtually endless amnesty – while efforts to secure the border are almost certain to be insufficient.
  • With polls showing more than two-thirds of Americans don’t believe “immigration laws would be enforced in the future if illegal aliens were given amnesty,” it is clear that passage of the current Republican-backed bill may indeed fulfill the agenda of its communist originators – the creation of a permanent Democrat voting majority, guaranteeing permanent control of the United States government by leftist progressives.
  •  
    Wow.  Documentation up the ying yang .......... "The U.S. Senate's "Gang of Eight" immigration-reform plan, as well as a strikingly similar plan now being backed by Rep. Paul Ryan, R-Wis., and a bi-partisan House "Gang," both offer the "roadmap to citizenship" originally conceived and carefully developed by members of the Communist Party USA working within the Democratic Party and the radical left activist network for the purpose of using amnestied illegals to build a "permanent progressive majority." That is the inescapable conclusion readers will draw after reading the forthcoming book by acclaimed researcher and blogger Trevor Loudon, titled "The Enemies Within: Communists, Socialists and Progressives in the U.S. Congress." Although not yet published, Loudon agreed to allow WND readers to preview one chapter, titled "Latino Immigrants: Tools to Ensure a 'Governing Coalition' for the Left." Ads by Google Marriage Visa Lawyer $195 Get Your Fiance/Spouse to the USA. Free Consultation. (888) 902-9285 EasyFianceVisa.com/SpousalVisa Canadian Rockies By Train Experience the Rockies By Train. Luxury Mountain Travel By Rail TravelAlberta.us/Train In the book, Loudon exhaustively documents the Left's longtime agenda regarding illegal aliens and how its activists have gone about implementing it. He provides irrefutable proof that the entire immigration-reform movement was the brainchild of American communists and that their goal has long been to establish unchallengeable political supremacy. According to Loudon, the Communist Party USA has influenced U.S. policy toward illegals since at least the 1960s. He traces the history, showing how communists and communist-founded organizations slowly built the movement from the ground up. While other groups certainly joined the effort, the communists were always at the center. For example, he tells the story of CPUSA member Bert Corona, the "Communist Father of the 'Immigrants Rights' move
« First ‹ Previous 121 - 140 of 638 Next › Last »
Showing 20 items per page