Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "averages" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
Paul Merrell

On this Veterans Day, suicide has caused more American casualties than wars in Iraq and Afghanistan - 0 views

  • One of the most tragic problems afflicting those who served their country is the specter of suicide, often the fallout of post traumatic stress disorder (PTSD). After more than a year of intense lobbying by veterans groups, Congress this year passed the Clay Hunt Suicide Prevention for American Veterans Act, named for a Marine veteran who took his own life even after working as an advocate for suicide prevention. The law is designed to reduce military and veteran suicides, and improve access to quality mental health care. But veterans experts estimate that 17 of the 22 daily suicides involve vets not enrolled in the VA’s healthcare system, suggesting more research — and far greater funding — will be necessary to get a handle on the problem.
  • With U.S. combat operations winding down in Afghanistan and Iraq, the suicide rate among ex-military members has risen from 18 a day in 2010, although studies undertaken by the Veterans Administration have failed to pinpoint a direct cause. Only about a third of all vets use the VA for healthcare, which leaves a wide swath of people who once wore the uniform outside the reach of the military’s data gathering.“Common sense would have us expect a correlation between number of deployments and combat with suicide risk,” says Fred MacRae, lead suicide prevention coordinator at the VA hospital in Palo Alto. But recent research suggests that’s not necessarily the case. #AD_text{ font-size: 11px; color: #999999; } Advertisement Not even the horrors of battle are a proven cause. “More and more,” says Jackie Maffucci, research director for Iraq and Afghanistan Veterans of America (IAVA), “the data are suggesting that exposure to combat is not one of the high-risk factors.”
  • Almost everyone who has served in the military now knows someone — often several someones — who suffers from disabling depression. Some end their own lives. Members of the IAVA were asked in a survey last year if they knew at least one post-9/11 veteran who had attempted suicide, and 47 percent answered yes. Another 40 percent knew at least one veteran who had died by suicide. “And 31 percent indicated they had thought about taking their own life since joining the military,” says Maffucci. “Those are startling numbers.”Daniel Faddis told another veteran in his family that he felt he had let down his military buddies when he was booted out. “He carried around a lot of guilt about that,” Stan Faddis says. “Some guys he knew ended up dying in combat, and he felt bad he wasn’t there to save them, or to die with them.”The current wait time for a mental health appointment at the VA in Palo Alto is about 12 days, and in a recent national study by the Government Accountability Office it averaged 26 days. Still, that’s considerably shorter than when the country went on a wartime footing following 9/11. “In 2001, your chances of dying by suicide were greater if you got your care in the VA system than if you got it elsewhere,” MacRae acknowledges. The new federal legislation is creating a program to help the VA recruit psychiatrists by assisting with their tuition payments, and it also requires an annual evaluation of VA mental health and suicide-prevention programs.
Paul Merrell

The storm that will unfreeze the North Pole - 0 views

  • The sun has not risen above the North Pole since mid-September. The sea ice — flat, landlike, windswept, and stretching as far as the eye can see—has been bathed in darkness for months.But later this week, something extraordinary will happen: Air temperatures at the Earth’s most northernly region, in the middle of winter, will rise above freezing for only the second time on record.On Wednesday, the same storm system that last week spun up deadly tornadoes in the American southeast will burst into the far north, centering over Iceland. It will bring strong winds and pressure as low as is typically seen during hurricanes.That low pressure will suck air out of the planet’s middle latitudes and send it rushing to the Arctic. And so on Wednesday, the North Pole will likely see temperatures of about 35 degrees Fahrenheit, or 2 degrees Celsius. That’s 50 degrees hotter than average: It’s usually 20 degrees Fahrenheit below zero there at this time of year.
Paul Merrell

Poll Finds 37% Of Americans Believe Israel Has Too Much Influence Over US Politics - 0 views

  • Poll results released last month show that Americans are sharply divided over the influence of Israel on U.S. politics, and those divisions often fall along party lines. On Dec. 4, The Brookings Institution, a highly influential Washington-based think tank, released the results of a study of American attitudes toward Israel and the Middle East. The report comes after a year in which Israel’s influence on America’s governance and foreign policy received heightened scrutiny, especially following a controversial speech to a joint session of Congress by Israeli President Benjamin Netanyahu on March 3. AIPAC, the powerful Israeli lobbying group, also faced increased criticism. The bulk of the poll was based on the opinions of 875 randomly selected Americans, but the study’s author, Shibley Telhami, a nonresident senior fellow at Brookings’ Project on U.S. Relations with the Islamic World, also polled an additional 863 additional Americans who self-identify as Evangelical or Born-again Christians to determine how their attitudes differed from the average.
  • When asked “How Much Influence Does the Israeli Government Have in American Politics?” 37 percent, or just over 1 in 3 Americans, feel Israel has too much influence. Eighteen percent say Israel should have even more influence over our government, while the largest group, at 44 percent, feels Israel wields an appropriate level of influence. Almost half of Democrats, 49 percent, feel Israel has too much influence over U.S. politics, while a slight majority of Republicans, 52 percent, are comfortable with Israel’s current level of influence. Among Evangelical Christians, meanwhile, 39 percent believe Israel has too little influence and 38 percent are satisfied with the country’s level of influence. Telhami also asked respondents about their views on the conflict between apartheid Israel and occupied Palestine. Twenty-nine percent of Americans reported that they are “very concerned” about recent events in Israel and Palestine, while 38 percent are “somewhat concerned.” When asked who is to blame for strife in the region, the most popular answer, 31 percent, was the lack of a peace process, “while 26% equally blame continued Israeli occupation and settlement, expansion in the West Bank, and Palestinian extremists.” These results also showed strong partisan differences:
  • “[A] plurality of Democrats, 37%, blame continued Israeli occupation and settlement expansion, followed by 35% who blame the absence of serious peace diplomacy, while 15% blame Palestinian extremists. In contrast, 40% of Republicans blame Palestinian extremists first, followed by 27% who blame absence of serious diplomacy, and 16% blame continued Israeli occupation and settlement expansion.” The report noted a slight increase in support for a one-state solution to problems in Israel compared to findings in 2014. Under a one-state solution, Israel and Palestine would become a single, multicultural, multireligious nation, as opposed to two-state solutions which would divide Israel and Palestine into two separate, independent countries. “Those who advocate a one-state solution, 31%, are now comparable to those who advocate a two-state solution, 35%,” Telhami wrote, adding that Republicans saw the largest increase in support for a single-state solution. “The most notable change is that Republicans this year equally support a two-state solution vs. one-state solution (29% each).” More people are also willing to accept a single-state solution if a two-state solution proves impossible, he added: “Among those who advocate a two-state solution as their preferred solution, 73% say they would support a one-state solution if the first option were no longer possible (in comparison to only 66% in 2014).” The poll also found that Netanyahu’s popularity has fallen sharply over the last year, at least among Democrats. Thirty-four percent now view him unfavorably, up from 22 percent in 2014, while Republicans’ opinions of him remain largely unchanged.
Paul Merrell

Goldman Sachs Makes Oil Prices Drop | Global Research - Centre for Research on Globalization - 0 views

  • Schedule of falling oil prices, adjusted in relation to the current fluctuations, has essentially been a straight line since last September, when prices fell from $ 50 per barrel to the current $ 29. What was so momentous that happened in the world market in September? In September, “Goldman Sachs” lowered expectations for the average oil price for 2016, assuming that it will drop to $ 20 a barrel. “Expectations” of “Goldman Sachs” were “whole-heartedly” supported by “Merrill Lynch”, “Bank of America” and others. There you have it – $ 20, quoted by “Goldman Sachs”, was not a forecast. It was the target. Only our own Ministry of Economy is the one that makes forecasts, “Goldman Sachs” , on the other hand, makes the markets. The oil market – is not the market of raw materials. Supply contracts for actual oil makes only 2% percent of the market, the rest – speculative securities, futures and other derivatives. Prices for futures are not determined by supply and demand, but by “expectations”. The futures market is completely controlled by the largest US banks. This is the market of expectations, which creates a real “Industry of expectations” using the notorious rating agencies, “independent” experts and the media.
Paul Merrell

Saudi Arabia is on the Brink of Regime Change - nsnbc international | nsnbc international - 0 views

  • It seems that Saudi Arabia has started to undergo the transformation various experts predicted. Those became obvious when the sitting king Salman bin Abdulaziz Al Saud replaced his deceased elder brother Abdullah bin Abdulaziz Al Saud in January 2015, and made a number of quite unusual arrangements within the ruling elite, appointing the head of the Ministry of Interior Muhammad bin Nayef from Abdullah’s clan the Crown Prince, while his 33-year-old son Mohammad bin Salman Al Saudfrom the Sudairy clan received the appointment of Deputy Crown Prince.
  • Now it seems that the wheels of the political machine are moving again. Last week reports from Riyadh indicated that his disease is taking a toll on the king and he wants to renounce his reign in favor of the Crown Prince. But then neighboring states, especially Qatar and the United Arab Emirates, started hinting that the members of the Saudi royal family along with the sheikhs of the strongest tribes, which are the foundation of Al Saud’s rule, are extremely dissatisfied with the sharp deterioration of the economic and social situation in the country, leading to a major drop in their personal incomes. It is no secret that Riyadh increased the volume of oil production to weaken the positions of its main competitors – Russia, Iran and Venezuela. But the kingdom had to take a punch as well, it was forced to unseal its reserve fund and cut the funding of numerous social programs.
  • Now the highly respected Institute for Gulf Affairs is stating that the king of Saudi Arabia Salman bin Abdulaziz Al Saud is preparing to renounce the throne in favor of his son Mohammad bin Salman Al Saud, and has since brought his country to the brink of a disaster. It means that the 80-year-old Salman is trying desperately hard to persuade his brothers on the succession board to allow him to change the principle of succession of the Saudi throne, since he’s ready to leave, but not so ready for his nephew Mohammad bin Salman Al Saud to rule the country. What the king has been doing is allegedly done “only for the sake of the stability of the kingdom.” Although the reality of the situation is clear – should Salman retain his position, the disintegration of the kingdom is imminent, with certain Shia areas breaking away, while the regions on the border with Yemen which are mostly populated by Yemeni tribes, more than happy to return home. Moreover, the Minister of Interior used to be a habitual cocaine user, so he was only able to “produce” two daughters, and now he’s somewhat incapable of producing more children. Should the king manage to carry out the above described scheme, he will become the first Saudi monarch to leave the throne to his son.
  • ...3 more annotations...
  • And the fact that there’s a growing crisis in Saudi Arabia was evident from the cuts in subsidies and bonuses that king Salman started at the beginning of this year to reduce the country’s total dependence on oil. After decades of extensive use of oil revenues to subsidize companies’ payment of generous salaries and providing enormous social benefits, falling oil prices struck Saudi Arabia at its heart. It’s enough to say that revenues from oil exports in 2015 alone dropped by half. Ultimately it’s hard to say which country suffers the most from these oil wars – Russia or Saudi Arabia, since the latter has virtually no other sectors to support the economy. Saudi economist Turki Fadaak believes that Saudi Arabia is exiting the policy of “universal welfare”, so there’s an ongoing psychological shift in the minds of the ruling elite of the state. Fadaak is convinced that the ultimate aim of king Salman’s measures is to eliminate the Saudi dependency on oil. But is it really? According to leading international experts – the answer is a resounding “no”, with all the arguments to the contrary nothing more than fantasy.
  • Although initially it seemed that Salman, who came to power after the death of his brother, King Abdullah, will continue his course, after assuming the throne Salman generously spent over 30 billion dollars from the budget on bonuses for civil servants, military personnel, and students. Additionally, prices for basic goods and services, including fuel, electricity and water prices were kept at extremely low levels due to government subsidies from oil revenues. However, due to falling oil prices, under the pressure of such costs the budget started to rupture. The most important thing now for the kingdom is to execute the transition from the extremely lavish social security system to a productive economy, but then the subjects of the king will be forced to cut their costs, and it looks that they do not agree with this notion. And accusations in the imminent economic collapse will go Salman’s way, so it is better for him to leave now, before protests even start.
  • It is curious that Saudi Arabia has been rather realistic about its budget for the year 2016, since it was based on the average price of oil keeping at the level 29 dollars per barrel. Last year, the Saudi budget deficit amounted to almost 98 billion dollars and the costs were considerably higher than it was originally planed due to bonuses for civil servants, military personnel and retirees. In 2016 the authorities decided to put up to 49 billion dollars into a special fund to provide funding for the most important projects in case oil prices drop even further. But it was Saudi Arabia back in 2014 that proposed new tactics for OPEC, that implied that there would be no cuts in the level of production, the tactics that drove oil prices to today’s levels. So we are to learn pretty soon should Riyadh choose the path of the utter and complete collapse of the kingdom, or the path of giving power to the young and pragmatic technocrats who are going to pursue a comprehensive oil policy. Either way, Saudi Arabia will be forced to put an end to the costly military adventures in Syria and Yemen as well as its confrontations with Russia and Iran.
Paul Merrell

M of A - Syria: A First Major Win Due To The Cessation of Hostilities Agreement - 0 views

  • The Russian/Syrian agreement to the cessation of hostilities in Syria is seen critical from a military point of view. It would have been better to use the current momentum and to proceed fighting instead of giving respite to the enemy. But the agreement has one huge advantage. It excludes the Islamic State and Jabhat al-Nusra. Every "western" media report on the agreement and its likelihood to proceed now has to admit what has long been denied. That the unicorn U.S. supported "moderate rebels" are in deep alliance with al-Qaeda. Even the grey lady now concedes: many of the anti-Assad groups aligned with the United States fight alongside the Nusra Front The readers of such piece note that the U.S. is actually supporting the terrorists it claimed to be fighting for the last 13 years. Somehow that does not compute. This will put pressure the Obama administration. It can hardly blame Russia and Syria for continuing a campaign against Al-Qaeda even during a cessation of hostility with U.S. supported "moderates". The U.S. lauds itself over killing alleged Al-Qaeda followers in drone strikes all over the world. How can it blame Russia for doing like in Syria?
  • But not only "western" media are now exposed. The new situation compels the actors behind Nusra/al-Qaeda to reveal their positions: "The PYD is supported because it fights against ISIL. Nusra Front is also fighting against ISIL. Why is it bad?" [the Turkish President Erdogan] asked. "AIDS also kills ISIL? Why is it bad?" Just in time the BBC is reporting what everybody watching the war on Yemen already knew. Al-Qaeda is fighting together Saudi and other Gulf troops in their assault on the city of Taiz. Since 9/11 the "western" public has been conditioned to see Al-Qaeda as the evil enemy. I do not think that it is possible to eradicate that within a few weeks or month. With the push for the cessation of hostilities the Russian/Syrian side has won a major point in the public relation position. It is becoming clear to even average "western" reader that they are fighting real terrorists while the U.S. and its allies support at least associates to terrorists, if not the terrorists themselves.
  •  
    Yes. The cover is well and truly blown.
Paul Merrell

Refugee camps are the "cities of tomorrow", says aid expert - 0 views

  • Governments should stop thinking about refugee camps as temporary places, says Kilian Kleinschmidt, one of the world's leading authorities on humanitarian aid (+ interview). "These are the cities of tomorrow," said Kleinschmidt of Europe's rapidly expanding refugee camps. "The average stay today in a camp is 17 years. That's a generation." "In the Middle East, we were building camps: storage facilities for people. But the refugees were building a city," he told Dezeen.
  • Kleinschmidt said a lack of willingness to recognise that camps had become a permanent fixture around the world and a failure to provide proper infrastructure was leading to unnecessarily poor conditions and leaving residents vulnerable to "crooks". "I think we have reached the dead end almost where the humanitarian agencies cannot cope with the crisis," he said. "We're doing humanitarian aid as we did 70 years ago after the second world war. Nothing has changed."
  • He believes that migrants coming into Europe could help repopulate parts of Spain and Italy that have been abandoned as people gravitate increasingly towards major cities. "Many places in Europe are totally deserted because the people have moved to other places," he said. "You could put in a new population, set up opportunities to develop and trade and work. You could see them as special development zones which are actually used as a trigger for an otherwise impoverished neglected area."
  • ...2 more annotations...
  • Refugees could also stimulate the economy in Germany, which has 600,000 job vacancies and requires tens of thousands of new apartments to house workers, he said. "Germany is very interesting, because it is actually seeing this as the beginning of a big economic boost," he explained. "Building 300,000 affordable apartments a year: the building industry is dreaming of this!" "It creates tons of jobs, even for those who are coming in now. Germany will come out of this crisis."
  • Kleinschmidt told Dezeen that aid organisations and governments needed to accept that new technologies like 3D printing could enable refugees and migrants to become more self-sufficient. "With a Fab Lab people could produce anything they need – a house, a car, a bicycle, generating their own energy, whatever," he said. His own attempts to set up a Zaatari Fab Lab – a workshop providing access to digital fabrication tools – have been met with opposition. "That whole concept that you can connect a poor person with something that belongs to the 21st century is very alien to even most aid agencies," he said. "Intelligence services and so on from government think 'my god, these are just refugees, so why should they be able to do 3D-printing? Why should they be working on robotics?' The idea is that if you're poor, it's all only about survival." "We have to get away from the concept that, because you have that status – migrant, refugee, martian, alien, whatever – you're not allowed to be like everybody else." Read the edited transcript from our interview with Kilian Kleinschmidt:
Paul Merrell

Cy Vance's Proposal to Backdoor Encrypted Devices Is Riddled With Vulnerabilities | Just Security - 0 views

  • Less than a week after the attacks in Paris — while the public and policymakers were still reeling, and the investigation had barely gotten off the ground — Cy Vance, Manhattan’s District Attorney, released a policy paper calling for legislation requiring companies to provide the government with backdoor access to their smartphones and other mobile devices. This is the first concrete proposal of this type since September 2014, when FBI Director James Comey reignited the “Crypto Wars” in response to Apple’s and Google’s decisions to use default encryption on their smartphones. Though Comey seized on Apple’s and Google’s decisions to encrypt their devices by default, his concerns are primarily related to end-to-end encryption, which protects communications that are in transit. Vance’s proposal, on the other hand, is only concerned with device encryption, which protects data stored on phones. It is still unclear whether encryption played any role in the Paris attacks, though we do know that the attackers were using unencrypted SMS text messages on the night of the attack, and that some of them were even known to intelligence agencies and had previously been under surveillance. But regardless of whether encryption was used at some point during the planning of the attacks, as I lay out below, prohibiting companies from selling encrypted devices would not prevent criminals or terrorists from being able to access unbreakable encryption. Vance’s primary complaint is that Apple’s and Google’s decisions to provide their customers with more secure devices through encryption interferes with criminal investigations. He claims encryption prevents law enforcement from accessing stored data like iMessages, photos and videos, Internet search histories, and third party app data. He makes several arguments to justify his proposal to build backdoors into encrypted smartphones, but none of them hold water.
  • Before addressing the major privacy, security, and implementation concerns that his proposal raises, it is worth noting that while an increase in use of fully encrypted devices could interfere with some law enforcement investigations, it will help prevent far more crimes — especially smartphone theft, and the consequent potential for identity theft. According to Consumer Reports, in 2014 there were more than two million victims of smartphone theft, and nearly two-thirds of all smartphone users either took no steps to secure their phones or their data or failed to implement passcode access for their phones. Default encryption could reduce instances of theft because perpetrators would no longer be able to break into the phone to steal the data.
  • Vance argues that creating a weakness in encryption to allow law enforcement to access data stored on devices does not raise serious concerns for security and privacy, since in order to exploit the vulnerability one would need access to the actual device. He considers this an acceptable risk, claiming it would not be the same as creating a widespread vulnerability in encryption protecting communications in transit (like emails), and that it would be cheap and easy for companies to implement. But Vance seems to be underestimating the risks involved with his plan. It is increasingly important that smartphones and other devices are protected by the strongest encryption possible. Our devices and the apps on them contain astonishing amounts of personal information, so much that an unprecedented level of harm could be caused if a smartphone or device with an exploitable vulnerability is stolen, not least in the forms of identity fraud and credit card theft. We bank on our phones, and have access to credit card payments with services like Apple Pay. Our contact lists are stored on our phones, including phone numbers, emails, social media accounts, and addresses. Passwords are often stored on people’s phones. And phones and apps are often full of personal details about their lives, from food diaries to logs of favorite places to personal photographs. Symantec conducted a study, where the company spread 50 “lost” phones in public to see what people who picked up the phones would do with them. The company found that 95 percent of those people tried to access the phone, and while nearly 90 percent tried to access private information stored on the phone or in other private accounts such as banking services and email, only 50 percent attempted contacting the owner.
  • ...8 more annotations...
  • In addition to his weak reasoning for why it would be feasible to create backdoors to encrypted devices without creating undue security risks or harming privacy, Vance makes several flawed policy-based arguments in favor of his proposal. He argues that criminals benefit from devices that are protected by strong encryption. That may be true, but strong encryption is also a critical tool used by billions of average people around the world every day to protect their transactions, communications, and private information. Lawyers, doctors, and journalists rely on encryption to protect their clients, patients, and sources. Government officials, from the President to the directors of the NSA and FBI, and members of Congress, depend on strong encryption for cybersecurity and data security. There are far more innocent Americans who benefit from strong encryption than there are criminals who exploit it. Encryption is also essential to our economy. Device manufacturers could suffer major economic losses if they are prohibited from competing with foreign manufacturers who offer more secure devices. Encryption also protects major companies from corporate and nation-state espionage. As more daily business activities are done on smartphones and other devices, they may now hold highly proprietary or sensitive information. Those devices could be targeted even more than they are now if all that has to be done to access that information is to steal an employee’s smartphone and exploit a vulnerability the manufacturer was required to create.
  • Privacy is another concern that Vance dismisses too easily. Despite Vance’s arguments otherwise, building backdoors into device encryption undermines privacy. Our government does not impose a similar requirement in any other context. Police can enter homes with warrants, but there is no requirement that people record their conversations and interactions just in case they someday become useful in an investigation. The conversations that we once had through disposable letters and in-person conversations now happen over the Internet and on phones. Just because the medium has changed does not mean our right to privacy has.
  • Vance attempts to downplay this serious risk by asserting that anyone can use the “Find My Phone” or Android Device Manager services that allow owners to delete the data on their phones if stolen. However, this does not stand up to scrutiny. These services are effective only when an owner realizes their phone is missing and can take swift action on another computer or device. This delay ensures some period of vulnerability. Encryption, on the other hand, protects everyone immediately and always. Additionally, Vance argues that it is safer to build backdoors into encrypted devices than it is to do so for encrypted communications in transit. It is true that there is a difference in the threats posed by the two types of encryption backdoors that are being debated. However, some manner of widespread vulnerability will inevitably result from a backdoor to encrypted devices. Indeed, the NSA and GCHQ reportedly hacked into a database to obtain cell phone SIM card encryption keys in order defeat the security protecting users’ communications and activities and to conduct surveillance. Clearly, the reality is that the threat of such a breach, whether from a hacker or a nation state actor, is very real. Even if companies go the extra mile and create a different means of access for every phone, such as a separate access key for each phone, significant vulnerabilities will be created. It would still be possible for a malicious actor to gain access to the database containing those keys, which would enable them to defeat the encryption on any smartphone they took possession of. Additionally, the cost of implementation and maintenance of such a complex system could be high.
  • Vance also suggests that the US would be justified in creating such a requirement since other Western nations are contemplating requiring encryption backdoors as well. Regardless of whether other countries are debating similar proposals, we cannot afford a race to the bottom on cybersecurity. Heads of the intelligence community regularly warn that cybersecurity is the top threat to our national security. Strong encryption is our best defense against cyber threats, and following in the footsteps of other countries by weakening that critical tool would do incalculable harm. Furthermore, even if the US or other countries did implement such a proposal, criminals could gain access to devices with strong encryption through the black market. Thus, only innocent people would be negatively affected, and some of those innocent people might even become criminals simply by trying to protect their privacy by securing their data and devices. Finally, Vance argues that David Kaye, UN Special Rapporteur for Freedom of Expression and Opinion, supported the idea that court-ordered decryption doesn’t violate human rights, provided certain criteria are met, in his report on the topic. However, in the context of Vance’s proposal, this seems to conflate the concepts of court-ordered decryption and of government-mandated encryption backdoors. The Kaye report was unequivocal about the importance of encryption for free speech and human rights. The report concluded that:
  • States should promote strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that allow anonymity online. … States should not restrict encryption and anonymity, which facilitate and often enable the rights to freedom of opinion and expression. Blanket prohibitions fail to be necessary and proportionate. States should avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows. Additionally, the group of intelligence experts that was hand-picked by the President to issue a report and recommendations on surveillance and technology, concluded that: [R]egarding encryption, the U.S. Government should: (1) fully support and not undermine efforts to create encryption standards; (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.
  • The clear consensus among human rights experts and several high-ranking intelligence experts, including the former directors of the NSA, Office of the Director of National Intelligence, and DHS, is that mandating encryption backdoors is dangerous. Unaddressed Concerns: Preventing Encrypted Devices from Entering the US and the Slippery Slope In addition to the significant faults in Vance’s arguments in favor of his proposal, he fails to address the question of how such a restriction would be effectively implemented. There is no effective mechanism for preventing code from becoming available for download online, even if it is illegal. One critical issue the Vance proposal fails to address is how the government would prevent, or even identify, encrypted smartphones when individuals bring them into the United States. DHS would have to train customs agents to search the contents of every person’s phone in order to identify whether it is encrypted, and then confiscate the phones that are. Legal and policy considerations aside, this kind of policy is, at the very least, impractical. Preventing strong encryption from entering the US is not like preventing guns or drugs from entering the country — encrypted phones aren’t immediately obvious as is contraband. Millions of people use encrypted devices, and tens of millions more devices are shipped to and sold in the US each year.
  • Finally, there is a real concern that if Vance’s proposal were accepted, it would be the first step down a slippery slope. Right now, his proposal only calls for access to smartphones and devices running mobile operating systems. While this policy in and of itself would cover a number of commonplace devices, it may eventually be expanded to cover laptop and desktop computers, as well as communications in transit. The expansion of this kind of policy is even more worrisome when taking into account the speed at which technology evolves and becomes widely adopted. Ten years ago, the iPhone did not even exist. Who is to say what technology will be commonplace in 10 or 20 years that is not even around today. There is a very real question about how far law enforcement will go to gain access to information. Things that once seemed like merely science fiction, such as wearable technology and artificial intelligence that could be implanted in and work with the human nervous system, are now available. If and when there comes a time when our “smart phone” is not really a device at all, but is rather an implant, surely we would not grant law enforcement access to our minds.
  • Policymakers should dismiss Vance’s proposal to prohibit the use of strong encryption to protect our smartphones and devices in order to ensure law enforcement access. Undermining encryption, regardless of whether it is protecting data in transit or at rest, would take us down a dangerous and harmful path. Instead, law enforcement and the intelligence community should be working to alter their skills and tactics in a fast-evolving technological world so that they are not so dependent on information that will increasingly be protected by encryption.
Paul Merrell

Drone Strikes Are Creating Hatred Toward America That Will Last for Generations - Defense One - 0 views

  • If we want to curb terrorism in the United States, we must stop drone attacks in the Middle East.
  • It’s a sick myth that Islamic extremists attack the United States or other nations because they “hate our freedom.” They attack us for our foreign policy. In 2006, the United States National Intelligence Estimate reported that the US invasion and occupation of Iraq made the problem of terrorism worse by creating a new generation of terrorists. And since then, top ranking military and counter-terrorism authorities such as General Stanley McChrystal, General Mike Flynn and George W. Bush’s counter-terrorism czar Richard Clarke say that drone strikes in particular are creating more terrorists than they’re killing. If we want to stop terrorist attacks, we should stop the barbaric blind bombings that are fueling radicalization.
  • “The resentment created by American use of unmanned strikes … is much greater than the average American appreciates,” Gen. McChrystal, who led the US counter-insurgency strategy in Afghanistan, said in 2013. “They are hated on a visceral level, even by people who’ve never seen one or seen the effects of one.” <a href="http://ad.doubleclick.net/N617/jump/defenseone.com/section_ideas;pos=defenseone-instream;sz=600x300;" title=""> <img alt="" src="http://ad.doubleclick.net/N617/ad/defenseone.com/section_ideas;pos=defenseone-instream;sz=600x300;tile=4;"/> </a> <a href="http://ad.doubleclick.net/N617/jump/defenseone.com/section_ideas;pos=contextual-large-rectangle-tablet;sz=700x350;" title=""> <img alt="" src="http://ad.doubleclick.net/N617/ad/defenseone.com/section_ideas;pos=contextual-large-rectangle-tablet;sz=700x350;tile=5;"/> </a> <a href="http://ad.doubleclick.net/N617/jump/defenseone.com/section_ideas;pos=contextual-large-rectangle-mobile;sz=300x150;" title=""> <img alt="" src="http://ad.doubleclick.net/N617/ad/defenseone.com/section_ideas;pos=contextual-large-rectangle-mobile;sz=300x150;tile=6;"/> </a> Gen. Flynn, who until recently was the head of the Defense Intelligence Agency and has become a harsh critic of President Obama’s strategy in the Middle East, has said, “When you drop a bomb from a drone … you are going to cause more damage than you are going to cause good.” Flynn, who has actually backs a more muscular military approach, doesn’t think it should include drones. Clarke has said that when we use unmanned drones to drop bombs which, no matter how hard we try otherwise, inevitably kill innocent people: [Y]ou cause enemies for the United States that will last for generations. All of these innocent people that you kill have brothers and sisters and tribe—tribal relations. Many of them were not opposed to the United States prior to some one of their friends or relatives being killed. And then, sometimes, they cross over, not only to being opposed to the United States, but by being willing to pick up arms and become a terrorist against the United States. So you may actually be creating terrorists, rather than eliminating them,
  • ...2 more annotations...
  • In fact, in the wake of the ISIL-linked terrorist attacks in Paris, four whistleblowers in the United States Air Force wrote an open letter to the Obama Administration calling for an end to drone strikes. The authors, all of whom had operational experience with drone strikes, wrote that such attacks “fueled the feelings of hatred that ignited terrorism and groups like Isis, while also serving as a fundamental recruitment tool.” They say that the killing of innocent civilians by American drones is one of most “devastating driving forces for terrorism and destabilization around the world.” It’s worth noting here that counter-terrorism experts with whom I’ve spoken have said that the sort of anti-Muslim rhetoric and policies proposed by several Republican presidential candidates also helps inflame and incite terrorism. So we should also stop that immediately, not just as a matter of upholding our national moral and legal values but because it’s strategically destructive. Yet Republican and Democratic politicians appear fairly united on continuing drone strikes and, if anything, disagree about how much to increase their intensity. Experienced, knowledgeable military advisors have said that drone strikes create more terrorists than they kill. So what possible reason do we have for continuing them?
  • We know that our reactionary, militarily aggressive impulses got us into this situation. Although arguably complex in origin, it’s unarguable that the failed US invasion and occupation of Iraq helped create ISIS. And now in the wake of the San Bernadino attack that has rightfully shaken our nation to its core, our reactionary, militarily aggressive impulses may once again make matters worse. Continuing let alone expanding American drone strikes in the Middle East will continue to create more terrorists than we kill. Unmanned drone strikes are inhumane. They are also stupid and self-defeating.
  •  
    Also just announced: The Air Force plans to double its number of drone units in the budget just passed. 
Paul Merrell

What Does Today's "Rate Hike" Mean? -- Paul Craig Roberts - PaulCraigRoberts.org - 0 views

  • Paul Craig Roberts The Federal Reserve raised the interbank borrowing rate today by one quarter of one percent or 25 basis points. Readers are asking, “what does that mean?” It means that the Fed has had time to figure out that the effect of the small “rate hike” would essentially be zero. In other words, the small increase in the target rate from a range of 0 to 0.25% to 0.25 to 0.50% is insufficient to set off problems in the interest-rate derivatives market or to send stock and bond prices into decline.
  • However, the fact of the matter is that the available liquidity exceeded demand in the old rate range. The purpose of raising interest rates is to choke off credit demand, but there was no need to choke off credit demand when the demand for credit was only sufficient to keep the average rate in the midpoint of the old range. This “rate hike” is a fraud. It is only for the idiots in the financial media who have been going on about a rate hike forever and the need for the Fed to protect its credibility by raising interest rates.
  • Thus, the rate hike has the effect of making smaller banks pay higher interest expense to the mega-banks favored by the Federal Reserve. A different way of putting it is that the “rate hike” favors banks sitting on excess reserves over banks who are lending to businesses and consumers in their community. In other words, the rate hike just facilitates more looting by the One Percent.
Paul Merrell

Moon of Alabama - 0 views

  • Over the last year the U.S. bombed Jabhat al-Nusra personal and facilities in Syria some five or six times. The al-Qaeda subgroup also has a history of attacking U.S. paid "relative moderate" proxy forces in Syria. The Pentagon recently inserted another U.S. mercenary group into north Syria. This was accompanied by a media campaign in which the administration lauded itself for the operation. The newly inserted group is especially trained and equipped to direct U.S. air attacks like those that earlier hit al-Nusra fighters. Now that freshly inserted group was attacked by Jabhat al-Nusra. Some of its members were killed and others were abducted. The Obama administration is shocked, SHOCKED, ABSOLUTELY SHOCKED that Jabhat al-Nusra would do such a ghastly deed. "Why would they do that?" "Who could have known that they would attack U.S. proxy forces???"
  • There is no longer an Jihadist ISIS or ISIL in Syria and Iraq. The people leading that entity declared (pdf) today, at the highly symbolic beginning of Ramadan, themselves to be a new caliphate:
  • Could someone explain to the fucking dimwits in the Pentagon and the Obama administrations that people everywhere, and especially terrorists group, hate it when you bomb them and kill their leaders? That those people you bomb might want to take revenge against you and your proxies? That people you bombed will not like your targeting team moving in next door to them? That alQaeda is not an "ally"? These people are too pathetically clueless to even be embarrassed about it. The accumulated intelligence quotient of the administration and Pentagon officials running the anti-Syria operation must be below three digits. But aside from their lack of basic intelligence the utter lack of simple "street smarts" is the real problem here. These people have no idea how life works outside of their beltway cages.
  • ...12 more annotations...
  • On more thought from me on why the dimwits did not foresee that Nusra would attack. The White House insisted on calling a part of Nusra the "Khorasan group" and explained that it was only bombing this groups of alQaeda veterans now part of Nusra because the "Khorasan group" planning to hit in "western" countries. No expert nor anyone on the ground in Syria thought that this differentiation was meaningful. Nusra is alQaeda and so are all of its members. But the White House and Pentagon probably thought that Nusra would accept the artificial separation they themselves had made up. That Nusra would understand that it is seen as an "ally" and only the "Khorasan group" is seen as an enemy. If that was the line of thinking, and the situation seems to point to that, then these people have fallen for their own propaganda stunt. They probably believed that the "Khorasan group" was an accepted narrative because they were telling that tale to themselves. Poor idiots.
  • UPDATE: The one sane guy at the Council of Foreign relations, Micah Zenko, foresaw this debacle and wrote on March 2: [The U.S. trained mercenaries] will immediately be an attractive target for attacks by the Islamic State, Assad’s ground and air forces, and perhaps Nusra and other forces. Killing or taking prisoner fighters (or the families of those fighters) who were trained by the U.S. military will offer propaganda value, as well as leverage, to bargain for those prisoners’ release. He compared the whole operation to the 1961 CIA invasion of Cuba: Last September, the White House and Congress agreed to authorize and fund a train-and-equip project similar to the Bay of Pigs, but this time in the Middle East, without any discussion about phase two. The Syrian project resembles 1961 in two ways: What happens when the fighting starts is undecided, and the intended strategic objective is wholly implausible.
  • The attack on Friday was mounted by the Nusra Front, which is affiliated with Al Qaeda. It came a day after the Nusra Front captured two leaders and at least six fighters of Division 30, which supplied the first trainees to graduate from the Pentagon’s anti-Islamic State training program. In Washington, several current and former senior administration officials acknowledged that the attack and the abductions by the Nusra Front took American officials by surprise and amounted to a significant intelligence failure. While American military trainers had gone to great lengths to protect the initial group of trainees from attacks by Islamic State or Syrian Army forces, they did not anticipate an assault from the Nusra Front. In fact, officials said on Friday, they expected the Nusra Front to welcome Division 30 as an ally in its fight against the Islamic State....A senior Defense Department official acknowledged that the threat to the trainees and their Syrian recruiters had been misjudged, and said that officials were trying to understand why the Nusra Front had turned on the trainees. Like other Obama administration operations this one did not fail because of "intelligence failure" but because an utter lack of common sense.
  • U.S. media can no agree with itself if Russia is giving ISIS an airforce or if Russia pounds ISIS with the biggest bomber raid in decades. Such confusion occurs when propaganda fantasies collide with the observable reality. To bridge such divide requires some fudging. So when the U.S. claims to act against the finances of the Islamic State while not doing much, the U.S Public Broadcasting Service has to use footage of Russian airstrikes against the Islamic State while reporting claimed U.S. airstrike successes. The U.S. military recently claimed to have hit Islamic State oil tankers in Syria. This only after Putin embarrassed Obama at the G-20 meeting in Turkey. Putin showed satellite pictures of ridiculous long tanker lines waiting for days and weeks to load oil from the Islamic State without any U.S. interference.
  • The U.S. then claimed to have hit 116 oil tankers while the Russian air force claims to have hit 500. But there is an important difference between these claims. The Russians provided videos showing how their airstrikes hit at least two different very large oil tanker assemblies with hundreds of tankers in each. They also provided video of several hits on oil storage sites and refinery infrastructure. I have found no video of U.S. hits on Islamic State oil tanker assemblies. The U.S. PBS NewsHour did not find any either. In their TV report yesterday about Islamic State financing and the claimed U.S. hits on oil trucks they used the videos Russia provided without revealing the source. You can see the Russian videos played within an interview with a U.S. military spokesperson at 2:22 min.
  • The U.S. military spokesperson speaks on camera about U.S. airforce hits against the Islamic State. The video cuts to footage taken by Russian airplanes hitting oil tanks and then trucks. The voice-over while showing the Russian video with the Russians blowing up trucks says: "For the first time the U.S. is attacking oil delivery trucks." The video then cuts back to the U.S. military spokesperson. At no point is the Russian campaign mentioned or the source of the footage revealed. Any average viewer of the PBS report will assume that the black and white explosions of oil trucks and tanks are from of U.S. airstrikes filmed by U.S. air force planes. The U.S. military itself admitted that its strikes on IS oil infrastructure over the last year were "minimally effective". One wonders then how effective the claimed strike against 116 trucks really was. But unless we have U.S. video of such strikes and not copies of Russian strike video fraudulently passed off as U.S. strikes we will not know if those strikes happened at all.
  • The wannabe Sultan Erdogan did not get his will in Syria where he had planned to capture and annex Aleppo. The Russians prevented that. He now goes for his secondary target, Mosul in Iraq, which many Turks see as historic part of their country
  • Mosul, Iraq's second biggest city with about a million inhabitants, is currently occupied by the Islamic State. On Friday a column of some 1,200 Turkish soldiers with some 20 tanks and heavy artillery moved into a camp near Mosul. The camp was one of four small training areas where Turkey was training Kurds and some Sunni-Arab Iraqis to fight the Islamic State. The small camps in the northern Kurdish area have been there since the 1990s. They were first established to fight the PKK. Later their Turkish presence was justified as ceasefire monitors after an agreement ended the inner Kurdish war between the KDP forces loyal to the Barzani clan and the PUK forces of the Talabani clan. The bases were actually used to monitor movement of the PKK forces which fight for Kurdish independence in Turkey. The base near Mosul is new and it was claimed to be just a small weapons training base. But tanks and artillery have a very different quality than some basic AK-47 training. Turkey says it will increase the numbers in these camps to over 2000 soldiers.
  • Should Mosul be cleared of the Islamic State the Turkish heavy weapons will make it possible for Turkey to claim the city unless the Iraqi government will use all its power to fight that claim. Should the city stay in the hands of the Islamic State Turkey will make a deal with it and act as its protector. It will benefit from the oil around Mosul which will be transferred through north Iraq to Turkey and from there sold on the world markets. In short: This is an effort to seize Iraq's northern oil fields. That is the plan but it is a risky one. Turkey did not ask for permission to invade Iraq and did not inform the Iraqi government. The Turks claim that they were invited by the Kurds: Turkey will have a permanent military base in the Bashiqa region of Mosul as the Turkish forces in the region training the Peshmerga forces have been reinforced, Hürriyet reported. The deal regarding the base was signed between Kurdistan Regional Government (KRG) President Massoud Barzani and Turkish Foreign Minister Feridun Sinirlioğlu, during the latter’s visit to northern Iraq on Nov. 4. There are two problems with this. First: Massoud Barzani is no longer president of the KRG. His mandate ran out and the parliament refused to prolong it. Second: Mosul and its Bashiqa area are not part of the KRG. Barzani making a deal about it is like him making a deal about Paris.
  • The Iraqi government and all major Iraqi parties see the Turkish invasion as a hostile act against their country. Abadi demanded the immediate withdrawal of the Turkish forces but it is unlikely that Turkey will act on that. Some Iraqi politicians have called for the immediate dispatch of the Iraqi air force to bomb the Turks near Mosul. That would probably the best solution right now but the U.S. installed Premier Abadi is too timid to go for such strikes. The thinking in Baghdad is that Turkey can be kicked out after the Islamic State is defeated. But this thinking gives Turkey only more reason to keep the Islamic State alive and use it for its own purpose. The cancer should be routed now as it is still small. Barzani's Kurdistan is so broke that is has even confiscated foreign bank accounts to pay some bills. That may be the reason why Barzani agreed to the deal now. But the roots run deeper. Barzani is illegally selling oil that belongs to the Iraqi government to Turkey. The Barzani family occupies  not only the presidential office in the KRG but also the prime minister position and the local secret services. It is running the oil business and gets a big share of everything else. On the Turkish side the oil deal is handled within the family of President Erdogan. His son in law, now energy minister, had the exclusive right to transport the Kurdish oil through Turkey. Erdogan's son controls the shipping company that transports the oil over sea to the customer, most often Israel. The oil under the control of the Islamic State in Iraq passes the exactly same route. These are businesses that generate hundreds of millions per year.
  • It is unlikely that U.S., if it is not behinds Turkey new escapade, will do anything about it. The best Iraq could do now is to ask the Russians for their active military support. The Turks insisted on their sovereignty when they ambushed a Russian jet that brushed its border but had no intend of harming Turkey. Iraq should likewise insist on its sovereignty, ask Russia for help and immediately kick the Turks out. The longer it waits the bigger the risk that Turkey will eventually own Mosul.
  • Another fake news item currently circling is that Trump has given order to the military to create safe zones for Syria. The reality is still far from it: [H]is administration crafted a draft order that would direct the Pentagon and the State Department to submit plans for the safe zones within 90 days. The order hasn't yet been issued. The draft of the order, which will be endlessly revised, says that safe zones could be in Syria or in neighboring countries. The Pentagon has always argued against such zones in Syria and the plans it will submit, should such an order be issued at all, will reflect that. The safe zones in Syria ain't gonna happen
  •  
    So the first group of U.S. trained "moderate" Syrian opposition fighters are an epic fail. Who'd of thunk? 
Paul Merrell

Taliban operations span the entire country, Afghan Interior Ministry confirms | FDD's Long War Journal - 0 views

  • The Taliban are operating in all regions of Afghanistan and casualties among Afghan police have increased, according to the Ministry of Interior (MoI). The MoI statements confirms reporting by FDD’s Long War Journal and contradicts a recent press briefing by General John Nicholson, the outgoing commander of Resolute Support and US Forces- Afghanistan. The Taliban has launched “military offensives on multiple fronts across the country” and security forces “are tackling insurgents as part of their preplanned operations in at least 14 provinces,” TOLONews reported based on statements made by the spokesman for the MoI. “This year the activities of the enemy has increased compared to previous years. The number of our operations also indicates that this year the number of casualties unfortunately has also increased,” MoI spokesman Najib Danish said, according to TOLONews. TOLONews claims that its sources within the Interior Ministry state that “currently on average 50 members of the security forces are being killed and wounded each day.” Danish’s statement that the Taliban are operating in all areas of the country confirms a mid-May report by published by FDD’s Long War Journal. In that report, LWJ determined that the Taliban has targeted Afghan government forces in nearly all of Afghanistan’s 34 provinces, as the military focuses on the Taliban threat in Helmand and Kandahar. Additionally, LWJ reported, based on statements from Afghanistan’s Ministry of Defense, that the Taliban directly threaten seven provincial capitals. Additionally, the MoI’s confirmation that the Taliban is on the offensive is backed by data compiled by LWJ on the status of Afghanistan’s districts. Currently the Taliban controls or contests 60 percent of Afghanistan’s 407 districts. These statements directly contradict the highly optimistic assessment of the situation in Afghanistan given by Nicholson, as well as statements by Pentagon Spokesperson Dana White, who has described the Taliban as “desperate,” and said it “has lost ground” and “has not had the initiative.”
  •  
    With victories like this, who needs defeats?
Paul Merrell

Boondoggle, Inc. - LobeLog - 1 views

  • In its latest budget request, the Trump administration is asking for a near-record $750 billion for the Pentagon and related defense activities, an astonishing figure by any measure. If passed by Congress, it will, in fact, be one of the largest military budgets in American history, topping peak levels reached during the Korean and Vietnam Wars. And keep one thing in mind: that $750 billion represents only part of the actual annual cost of our national security state. There are at least 10 separate pots of money dedicated to fighting wars, preparing for yet more wars, and dealing with the consequences of wars already fought. So the next time a president, a general, a secretary of defense, or a hawkish member of Congress insists that the U.S. military is woefully underfunded, think twice. A careful look at U.S. defense expenditures offers a healthy corrective to such wildly inaccurate claims. Now, let’s take a brief dollar-by-dollar tour of the U.S. national security state of 2019, tallying the sums up as we go, and see just where we finally land (or perhaps the word should be “soar”), financially speaking.
  • Final tally: $1.2542 trillion So, our final annual tally for war, preparations for war, and the impact of war comes to more than $1.25 trillion — more than double the Pentagon’s base budget. If the average taxpayer were aware that this amount was being spent in the name of national defense — with much of it wasted, misguided, or simply counterproductive — it might be far harder for the national security state to consume ever-growing sums with minimal public pushback. For now, however, the gravy train is running full speed ahead and its main beneficiaries — Lockheed Martin, Boeing, Northrop Grumman, and their cohorts — are laughing all the way to the bank.
« First ‹ Previous 141 - 154 of 154
Showing 20 items per page