Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "started" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

Tomgram: Alfred McCoy, It's About Blackmail, Not National Security | TomDispatch - 0 views

  • For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places.  Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington.  The answer is remarkably simple.  For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line -- like, in fact, the steal of the century.  Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.
  • What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of U.S. surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies. Not only does such surveillance help gain intelligence advantageous to U.S. diplomacy, trade relations, and war-making, but it also scoops up intimate information that can provide leverage -- akin to blackmail -- in sensitive global dealings and negotiations of every sort. The NSA’s global panopticon thus fulfills an ancient dream of empire. With a few computer key strokes, the agency has solved the problem that has bedeviled world powers since at least the time of Caesar Augustus: how to control unruly local leaders, who are the foundation for imperial rule, by ferreting out crucial, often scurrilous, information to make them more malleable.
  • Once upon a time, such surveillance was both expensive and labor intensive. Today, however, unlike the U.S. Army’s shoe-leather surveillance during World War I or the FBI’s break-ins and phone bugs in the Cold War years, the NSA can monitor the entire world and its leaders with only 100-plus probes into the Internet’s fiber optic cables. This new technology is both omniscient and omnipresent beyond anything those lacking top-secret clearance could have imagined before the Edward Snowden revelations began.  Not only is it unimaginably pervasive, but NSA surveillance is also a particularly cost-effective strategy compared to just about any other form of global power projection. And better yet, it fulfills the greatest imperial dream of all: to be omniscient not just for a few islands, as in the Philippines a century ago, or a couple of countries, as in the Cold War era, but on a truly global scale. In a time of increasing imperial austerity and exceptional technological capability, everything about the NSA’s surveillance told Washington to just “go for it.”  This cut-rate mechanism for both projecting force and preserving U.S. global power surely looked like a no-brainer, a must-have bargain for any American president in the twenty-first century -- before new NSA documents started hitting front pages weekly, thanks to Snowden, and the whole world began returning the favor.
  • ...12 more annotations...
  • As the gap has grown between Washington’s global reach and its shrinking mailed fist, as it struggles to maintain 40% of world armaments (the 2012 figure) with only 23% of global gross economic output, the U.S. will need to find new ways to exercise its power far more economically. As the Cold War took off, a heavy-metal U.S. military -- with 500 bases worldwide circa 1950 -- was sustainable because the country controlled some 50% of the global gross product. But as its share of world output falls -- to an estimated 17% by 2016 -- and its social welfare costs climb relentlessly from 4% of gross domestic product in 2010 to a projected 18% by 2050, cost-cutting becomes imperative if Washington is to survive as anything like the planet’s “sole superpower.” Compared to the $3 trillion cost of the U.S. invasion and occupation of Iraq, the NSA’s 2012 budget of just $11 billion for worldwide surveillance and cyberwarfare looks like cost saving the Pentagon can ill-afford to forego. Yet this seeming “bargain” comes at what turns out to be an almost incalculable cost. The sheer scale of such surveillance leaves it open to countless points of penetration, whether by a handful of anti-war activists breaking into an FBI field office in Media, Pennsylvania, back in 1971 or Edward Snowden downloading NSA documents at a Hawaiian outpost in 2012.
  • In October 2001, not satisfied with the sweeping and extraordinary powers of the newly passed Patriot Act, President Bush ordered the National Security Agency to commence covert monitoring of private communications through the nation's telephone companies without the requisite FISA warrants. Somewhat later, the agency began sweeping the Internet for emails, financial data, and voice messaging on the tenuous theory that such “metadata” was “not constitutionally protected.” In effect, by penetrating the Internet for text and the parallel Public Switched Telephone Network (PSTN) for voice, the NSA had gained access to much of the world’s telecommunications. By the end of Bush’s term in 2008, Congress had enacted laws that not only retrospectively legalized these illegal programs, but also prepared the way for NSA surveillance to grow unchecked. Rather than restrain the agency, President Obama oversaw the expansion of its operations in ways remarkable for both the sheer scale of the billions of messages collected globally and for the selective monitoring of world leaders.
  • By 2012, the centralization via digitization of all voice, video, textual, and financial communications into a worldwide network of fiber optic cables allowed the NSA to monitor the globe by penetrating just 190 data hubs -- an extraordinary economy of force for both political surveillance and cyberwarfare.
  • With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all, once FBI agents had tapped thousands of phones, stenographers had typed up countless transcripts, and clerks had stored this salacious paper harvest in floor-to-ceiling filing cabinets, J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C.  To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans -- an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet
  • Through the expenditure of $250 million annually under its Sigint Enabling Project, the NSA has stealthily penetrated all encryption designed to protect privacy. “In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” reads a 2007 NSA document. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” By collecting knowledge -- routine, intimate, or scandalous -- about foreign leaders, imperial proconsuls from ancient Rome to modern America have gained both the intelligence and aura of authority necessary for dominion over alien societies. The importance, and challenge, of controlling these local elites cannot be overstated. During its pacification of the Philippines after 1898, for instance, the U.S. colonial regime subdued contentious Filipino leaders via pervasive policing that swept up both political intelligence and personal scandal. And that, of course, was just what J. Edgar Hoover was doing in Washington during the 1950s and 1960s.
  • Indeed, the mighty British Empire, like all empires, was a global tapestry woven out of political ties to local leaders or “subordinate elites” -- from Malay sultans and Indian maharajas to Gulf sheiks and West African tribal chiefs. As historian Ronald Robinson once observed, the British Empire spread around the globe for two centuries through the collaboration of these local leaders and then unraveled, in just two decades, when that collaboration turned to “non-cooperation.” After rapid decolonization during the 1960s transformed half-a-dozen European empires into 100 new nations, their national leaders soon found themselves the subordinate elites of a spreading American global imperium. Washington suddenly needed the sort of private information that could keep such figures in line. Surveillance of foreign leaders provides world powers -- Britain then, America now -- with critical information for the exercise of global hegemony. Such spying gave special penetrating power to the imperial gaze, to that sense of superiority necessary for dominion over others.  It also provided operational information on dissidents who might need to be countered with covert action or military force; political and economic intelligence so useful for getting the jump on allies in negotiations of all sorts; and, perhaps most important of all, scurrilous information about the derelictions of leaders useful in coercing their compliance.
  • In late 2013, the New York Times reported that, when it came to spying on global elites, there were “more than 1,000 targets of American and British surveillance in recent years,” reaching down to mid-level political actors in the international arena. Revelations from Edward Snowden’s cache of leaked documents indicate that the NSA has monitored leaders in some 35 nations worldwide -- including Brazilian president Dilma Rousseff, Mexican presidents Felipe Calderón and Enrique Peña Nieto, German Chancellor Angela Merkel, and Indonesia’s president Susilo Bambang Yudhoyono.  Count in as well, among so many other operations, the monitoring of “French diplomatic interests” during the June 2010 U.N. vote on Iran sanctions and “widespread surveillance” of world leaders during the Group 20 summit meeting at Ottawa in June 2010. Apparently, only members of the historic “Five Eyes” signals-intelligence alliance (Australia, Canada, New Zealand, and Great Britain) remain exempt -- at least theoretically -- from NSA surveillance. Such secret intelligence about allies can obviously give Washington a significant diplomatic advantage. During U.N. wrangling over the U.S. invasion of Iraq in 2002-2003, for example, the NSA intercepted Secretary-General Kofi Anan’s conversations and monitored the “Middle Six” -- Third World nations on the Security Council -- offering what were, in essence, well-timed bribes to win votes. The NSA’s deputy chief for regional targets sent a memo to the agency’s Five Eyes allies asking “for insights as to how membership is reacting to on-going debate regarding Iraq, plans to vote on any related resolutions [..., and] the whole gamut of information that could give U.S. policymakers an edge in obtaining results favorable to U.S. goals.”
  • Indicating Washington’s need for incriminating information in bilateral negotiations, the State Department pressed its Bahrain embassy in 2009 for details, damaging in an Islamic society, on the crown princes, asking: “Is there any derogatory information on either prince? Does either prince drink alcohol? Does either one use drugs?” Indeed, in October 2012, an NSA official identified as “DIRNSA,” or Director General Keith Alexander, proposed the following for countering Muslim radicals: “[Their] vulnerabilities, if exposed, would likely call into question a radicalizer’s devotion to the jihadist cause, leading to the degradation or loss of his authority.” The agency suggested that such vulnerabilities could include “viewing sexually explicit material online” or “using a portion of the donations they are receiving… to defray personal expenses.” The NSA document identified one potential target as a “respected academic” whose “vulnerabilities” are “online promiscuity.”
  • Just as the Internet has centralized communications, so it has moved most commercial sex into cyberspace. With an estimated 25 million salacious sites worldwide and a combined 10.6 billion page views per month in 2013 at the five top sex sites, online pornography has become a global business; by 2006, in fact, it generated $97 billion in revenue. With countless Internet viewers visiting porn sites and almost nobody admitting it, the NSA has easy access to the embarrassing habits of targets worldwide, whether Muslim militants or European leaders. According to James Bamford, author of two authoritative books on the agency, “The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to ‘neutralize’ their targets.”
  • Indeed, whistleblower Edward Snowden has accused the NSA of actually conducting such surveillance.  In a December 2013 letter to the Brazilian people, he wrote, “They even keep track of who is having an affair or looking at pornography, in case they need to damage their target's reputation.” If Snowden is right, then one key goal of NSA surveillance of world leaders is not U.S. national security but political blackmail -- as it has been since 1898. Such digital surveillance has tremendous potential for scandal, as anyone who remembers New York Governor Eliot Spitzer’s forced resignation in 2008 after routine phone taps revealed his use of escort services; or, to take another obvious example, the ouster of France’s budget minister Jérôme Cahuzac in 2013 following wire taps that exposed his secret Swiss bank account. As always, the source of political scandal remains sex or money, both of which the NSA can track with remarkable ease.
  • By starting a swelling river of NSA documents flowing into public view, Edward Snowden has given us a glimpse of the changing architecture of U.S. global power. At the broadest level, Obama’s digital “pivot” complements his overall defense strategy, announced in 2012, of reducing conventional forces while expanding into the new, cost-effective domains of space and cyberspace. While cutting back modestly on costly armaments and the size of the military, President Obama has invested billions in the building of a new architecture for global information control. If we add the $791 billion expended to build the Department of Homeland Security bureaucracy to the $500 billion spent on an increasingly para-militarized version of global intelligence in the dozen years since 9/11, then Washington has made a $1.2 trillion investment in a new apparatus of world power.
  • So formidable is this security bureaucracy that Obama’s recent executive review recommended the regularization, not reform, of current NSA practices, allowing the agency to continue collecting American phone calls and monitoring foreign leaders into the foreseeable future. Cyberspace offers Washington an austerity-linked arena for the exercise of global power, albeit at the cost of trust by its closest allies -- a contradiction that will bedevil America’s global leadership for years to come. To update Henry Stimson: in the age of the Internet, gentlemen don't just read each other’s mail, they watch each other’s porn. Even if we think we have nothing to hide, all of us, whether world leaders or ordinary citizens, have good reason to be concerned.
Paul Merrell

US looks at ways to prevent spying on its spying - 0 views

  • (AP) — The U.S. government is looking at ways to prevent anyone from spying on its own surveillance of Americans' phone records. As the Obama administration considers shifting the collection of those records from the National Security Agency to requiring that they be stored at phone companies or elsewhere, it's quietly funding research to prevent phone company employees or eavesdroppers from seeing whom the U.S. is spying on, The Associated Press has learned. The Office of the Director of National Intelligence has paid at least five research teams across the country to develop a system for high-volume, encrypted searches of electronic records kept outside the government's possession. The project is among several ideas that would allow the government to discontinue storing Americans' phone records, but still search them as needed.
  • Under the research, U.S. data mining would be shielded by secret coding that could conceal identifying details from outsiders and even the owners of the targeted databases, according to public documents obtained by The Associated Press and AP interviews with researchers, corporate executives and government officials.
  • Internal documents describing the Security and Privacy Assurance Research project do not cite the NSA or its phone surveillance program. But if the project were to prove successful, its encrypted search technology could pave the way for the government to shift storage of the records from NSA computers to either phone companies or a third-party organization. A DNI spokesman, Michael Birmingham, confirmed that the research was relevant to the NSA's phone records program. He cited "interest throughout the intelligence community" but cautioned that it may be some time before the technology is used. The intelligence director's office is by law exempt from disclosing detailed budget figures, so it's unclear how much money the government has spent on the SPAR project, which is overseen by the DNI's Intelligence Advanced Research Projects Activity office. Birmingham said the research is aimed for use in a "situation where a large sensitive data set is held by one party which another seeks to query, preserving privacy and enforcing access policies."
  • ...3 more annotations...
  • A Columbia University computer sciences expert who heads one of the DNI-funded teams, Steven M. Bellovin, estimates the government could start conducting encrypted searches within the next year or two. "If the NSA wanted to deploy something like this it would take one to two years to get the hardware and software in place to start collecting data this way either from phone companies or whatever other entity they decide on," said Bellovin, who is also a former chief technologist for the Federal Trade Commission.
  • An encrypted search system would permit the NSA to shift storage of phone records to either phone providers or a third party, and conduct secure searches remotely through their databases. The coding could shield both the extracted metadata and identities of those conducting the searches, Bellovin said. The government could use encrypted searches to ensure its analysts were not leaking information or abusing anyone's privacy during their data searches. And the technique could also be used by the NSA to securely search out and retrieve Internet metadata, such as emails and other electronic records. Some computer science experts are less sanguine about the prospects for encrypted search techniques. Searches could bog down because of the encryption computations needed, said Daniel Weitzner, principal research scientist at MIT's Computer Science and Artificial Intelligence Laboratory and former deputy U.S. chief technology officer for the Obama administration. "There's no silver bullet that guarantees the intelligence community will only have access to the records they're supposed to have access to," Weitzner said. "We also need oversight of the actual use of the data."
  • The encrypted search techniques could make it more difficult for hackers to access the phone records and could prevent phone companies from knowing which records the government was searching. "It would remove one of the big objections to having the phone companies hold the data," Bellovin said. Similar research is underway by researchers at University of California at Irvine; a group from the University of Wisconsin-Madison and the University of Texas at Austin; another group from MIT, Yale and Rensselaer Polytechnic Institute; and a fourth from Stealth Software Technologies, a Los Angeles-based technology company.
Paul Merrell

Asia Times Online :: Central Asian News and current affairs, Russia, Afghanistan, Uzbekistan - 0 views

  • Here's the US's exceptionalist promotion of "democracy" in action; Washington has recognized a coup d'etat in Ukraine that regime-changed a - for all its glaring faults - democratically elected government. And here is Russian President Vladimir Putin, already last year, talking about how Russia and China decided to trade in roubles and yuan, and stressing how Russia needs to quit the "excessive monopoly" of the US dollar. He had to be aware the Empire would strike back. Now there's more; Russian presidential adviser Sergey Glazyev <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> told RIA Novosti, "Russia will abandon the US dollar as a reserve currency if the United States initiates sanctions against the Russian Federation." So the Empire struck back by giving "a little help" to regime change in the Ukraine. And Moscow counter-punched by taking control of Crimea in less than a day without firing a shot - with or without crack Spetsnaz brigades (UK-based think tanks say they are; Putin says they are not).
  • Putin's assessment of what happened in Ukraine is factually correct; "an anti-constitutional takeover and armed seizure of power". It's open to endless, mostly nasty debate whether the Kremlin overreacted or not. Considering the record of outright demonization of both Russia and Putin going on for years - and now reaching fever pitch - the Kremlin's swift reaction was quite measured. Putin applied Sun Tzu to the letter, and now plays the US against the EU. He has made it clear Moscow does not need to "invade" Ukraine. The 1997 Ukraine-Russia partition treaty specifically allows Russian troops in Crimea. And Russia after all is an active proponent of state sovereignty; it's under this principle that Moscow refuses a Western "intervention" in Syria. What he left the door open for is - oh cosmic irony of ironies - an American invention/intervention (and that, predictably, was undetectable by Western corporate media); the UN's R2P - "responsibility to protect" - in case the Western-aligned fascists and neo-nazis in Ukraine threaten Russians or Russian-speaking civilians with armed conflict. Samantha Power should be proud of herself.
  • The "West" once again has learned you don't mess with Russian intelligence, which in a nutshell preempted in Crimea a replica of the coup in Kiev, largely precipitated by UNA-UNSO - a shady, ultra-rightwing, crack paramilitary NATO-linked force using Ukraine as base, as exposed by William Engdahl. And Crimea was an even murkier operation, because those neo-nazis from Western Ukraine were in tandem with Tatar jihadis (the House of Saud will be heavily tempted to finance them from now on). The Kremlin is factually correct when pointing out that the coup was essentially conducted by fascists and ultra-right "nationalists" - Western code for neo-nazis. Svoboda ("Freedom") party political council member Yury Noyevy even admitted openly that using EU integration as a pretext "is a means to break our ties with Russia." Western corporate media always conveniently forgets that Svoboda - as well as the Right Sector fascists - follow in the steps of Galician fascist/terrorist Stepan Bandera, a notorious asset of a basket of "Western" intel agencies. Now Svoboda has managed to insert no less than six bigwigs as part of the new regime in Kiev.
  • ...5 more annotations...
  • And even as 66% of Russian gas exported to the EU transits through Ukraine, the country is fast losing its importance as a transit hub. Both the Nord Stream and South Stream pipelines - Russia not on-the-ground but under-seas - bypass Ukraine. The Nord Stream, finished in 2011, links Russia with Germany beneath the Baltic Sea. South Stream, beneath the Black Sea, will be ready before the end of 2015. Geoeconomically, the Empire needs Ukraine to be out of the Eurasian economic union promoted by the Kremlin - which also includes Kazakhstan and Belarus. And geopolitically, when NATO Secretary General, the vain puppet Anders Fogh Rasmussen, said that an IMF-EU package for the Ukraine would be "a major boost for Euro-Atlantic security", this is what clinched it; the only thing that matters in this whole game is NATO "annexing" Ukraine, as I examined earlier. It has always been about the Empire of Bases - just like the encirclement of Iran; just like the "pivot" to Asia translating into encirclement of China; just like encircling Russia with bases and "missile defense". Over the Kremlin's collective dead body, of course.
  • Then there are the new regional governors appointed to the mostly Russophone east and south of Ukraine. They are - who else - oligarchs, such as billionaires Sergei Taruta posted to Donetsk and Ihor Kolomoysky posted in Dnipropetrovsk. People in Maidan in Kiev were protesting mostly against - who else - kleptocrat oligarchs. Once again, Western corporate media - which tirelessly plugged a "popular" uprising against kleptocracy - hasn't noticed it.
  • Ukraine's foreign currency reserves, only in the past four weeks, plunged from US$17.8 billion to $15 billion. Wanna buy some hryvnia? Well, not really; the national currency, is on a cosmic dive against the US dollar. This is jolly good news only for disaster capitalism vultures. And right on cue, the International Monetary Fund is sending a "fact-finding mission" to Ukraine this week. Ukrainians of all persuasions may run but they won't hide from "structural adjustment". They could always try to scrape enough for a ticket with their worthless hryvnia (being eligible for visa on arrival in Thailand certainly helps). European banks - who according to the Bank for International Settlements (BIS) hold more than $23 billion in outstanding loans - could lose big in Ukraine. Italian banks, for instance, have loaned nearly $6 billion. On the Pipelineistan front, Ukraine heavily depends on Russia; 58% of its gas supply. It cannot exactly diversify and start buying from Qatar tomorrow - with delivery via what, Qatar Airways?
  • US Secretary of State John Kerry accusing Russia of "invading Ukraine", in "violation of international law", and "back to the 19th century", is so spectacularly pathetic in its hypocrisy - once again, look at the US's record - it does not warrant comment from any informed observer. Incidentally, this is as pathetic as his offer of a paltry $1 billion in "loan guarantees" - which would barely pay Ukraine's bills for two weeks. The Obama administration - especially the neo-cons of the "F**k the EU" kind - has lost is power play. And for Moscow, it has no interlocutor in Kiev because it considers the regime-changers illegal. Moscow also regards "Europe" as a bunch of pampered whining losers - with no common foreign policy to boot. So any mediation now hinges on Germany. Berlin has no time for "sanctions" - the sacrosanct American exceptionalist mantra; Russia is a plush market for German industry. And for all the vociferations at the Economist and the Financial Times, the City of London also does not want sanctions; the financial center feeds on lavish Russian politico/oligarch funds. As for the West's "punishment" for Russia by threatening to expel it from the Group of Eight, that is a joke. The G-8, which excludes China, does not decide anything relevant anymore; the G-20 does.
  • If a wide-ranging poll were to be conducted today, it would reveal that the majority of Ukrainians don't want to be part of the EU - as much as the majority of Europeans don't want the Ukraine in the EU. What's left for millions of Ukrainians is the bloodsucking IMF, to be duly welcomed by "Yats" (as Prime Minister Yatsenyuk is treated by Vic "F**k the EU" Nuland). Ukraine is slouching towards federalization. The Kiev regime-changers will have no say on autonomous Crimea - which most certainly will remain part of Ukraine (and Russia by the way will save $90 million in annual rent for the Sevastopol base, which until now was payable to Kiev.) The endgame is all but written; Moscow controls an autonomous Crimea for free, and the US/EU "control", or try to plunder, disaster capitalism-style, a back of beyond western Ukraine wasteland "managed" by a bunch of Western puppets and oligarchs, with a smatter of neo-nazis. So what is the Obama/Kerry strategic master duo to do? Start a nuclear war?
Paul Merrell

Americans on Wrong Side of Income Gap Run Out of Means to Cope - 0 views

  • “We’ve exhausted our coping mechanisms,” said Alan Krueger, an economics professor at Princeton University in New Jersey and former chairman of President Barack Obama’s Council of Economic Advisers. “They weren’t sustainable.” The result has been a downsizing of expectations. By almost two to one — 64 percent to 33 percent — Americans say the U.S. no longer offers everyone an equal chance to get ahead, according to the latest Bloomberg National Poll. The lack of faith is especially pronounced among those making less than $50,000 a year, with close to three-quarters in the Dec. 6-9 survey saying the economy is unfair.
  • The diminished expectations have implications for the economy. Workers are clinging to their jobs as prospects fade for higher-paying employment. Households are socking away more money and charging less on credit cards. And young adults are living with their parents longer rather than venturing out on their own. In the meantime, record-high stock prices are enriching wealthier Americans, exacerbating polarization and bringing income inequality to the political forefront. Even independent government agencies like the Securities and Exchange Commission and the Federal Reserve have been dragged into the debate.
  • “The basic bargain at the heart of our economy has frayed,” Obama said in a Dec. 4 speech in Washington. “This is the defining challenge of our time: Making sure our economy works for every working American.” Democratic lawmakers also intend to press next year for a higher minimum wage to tackle the yawning gap between rich and poor, Durbin said. Republicans aren’t ceding the issue. “The American dream is certainly more in doubt than in decades,” House Speaker John Boehner of Ohio said in response to Obama’s speech. “But after more than five years in office, the president has no one to blame but himself.”
  • ...11 more annotations...
  • Income inequality has been rising more or less steadily since the mid-1970s. The Gini coefficient, a broad-based measure of inequality, stood at a record high last year, according to Census Bureau data dating back 46 years.
  • Women who became unemployed during the recession and its aftermath have been slower to find new positions. Among women losing jobs they’d held for at least three years between January 2009 and the end of 2011, 50 percent were re-employed by the start of 2012, while the share for men was 61 percent, according to a Bureau of Labor Statistics report released in February. Households turned to stepped-up borrowing to help make ends meet, until that avenue was shut off by the collapse of house prices. About 10.8 million homeowners still owed more money on their mortgages than their properties were worth in the third quarter, according to Seattle-based Zillow Inc. The fallout has made many Americans less inclined to take risks. The quits rate — the proportion of Americans in the workforce who voluntarily left their jobs — stood at 1.7 percent in October. While that’s up from 1.5 percent a year earlier, it’s below the 2.2 percent average for 2006, the year house prices started falling, government data show.
  • “The middle has really collapsed,” said Lawrence Katz, an economics professor at Harvard University in Cambridge, Massachusetts, and a former chief economist at the Labor Department in Washington. Even those with college degrees are having trouble keeping up, he said. While they earn more than those with less schooling, they’ve seen no real wage growth in recent years. The median income of men 25 years of age and older with a bachelor’s degree was $56,656 last year, 10 percent less than in 2007 after taking account of inflation, according to Census data.
  • It’s the richest of the rich who are reaping the most benefit as an increasingly interconnected and technologically sophisticated world puts a premium on those perceived to have the highest skills — a phenomenon dubbed “winner take all” by Cornell University Professor Robert Frank. Government policies also play a role. The Treasury Department, for instance, taxes capital gains racked up by the wealthy on the sale of shares, bonds and other assets at about half the rate of ordinary income. The top 1 percent captured 95 percent of the gains in incomes in the first three years of the recovery, based on analysis of tax returns by Saez. Those less well-off, meanwhile, are running out of ways to cope. The percentage of working-age women who are in the labor force steadily climbed from a post-World War II low of 32 percent to a peak of 60.3 percent in April 2000, fueling a jump in dual-income households and helping Americans deal with slow wage growth for a while. Since the recession ended, the workforce participation rate for women has been in decline, echoing a longer-running trend among men. November data showed 57 percent of women in the labor force and 69.4 percent of men.
  • The disparity has widened since the recovery began in mid-2009. The richest 10 percent of Americans earned a larger share of income last year than at any time since 1917, according to Emmanuel Saez, an economist at the University of California at Berkeley. Those in the top one-tenth of income distribution made at least $146,000 in 2012, almost 12 times what those in the bottom tenth made, Census Bureau data show. Economists have posited a variety of explanations for the growing differences in incomes. Manufacturing companies moved once high-paying jobs abroad, to China and elsewhere. Technological advances led to the loss of clerical and office work, especially relating to routine tasks. The decline of unions — 11.3 percent of workers were represented in 2012 compared with 20.1 percent in 1983 — has advantaged bosses at the expense of their employees.
  • Millennials — adults aged 18 to 32 — are still slow to set out on their own more than four years after the recession ended, according to an Oct. 18 report by the Pew Research Center in Washington. Just over one in three head their own households, close to a 38-year low set in 2010. Obama has proposed a raft of policies to attack the widening wage gap — from simplifying the tax code and increasing exports to enhancing worker training and boosting pre-kindergarten education. Yet in a divided Washington he hasn’t made much progress pushing them through. The president’s renewed focus on income inequality has more to do with politics than policy, said Douglas Holtz-Eakin, president of the American Action Forum, a self-described center- right institute in Washington.
  • “It’s great politics to demagogue income distribution and complain about the rich getting ahead and the poor falling behind,” said Holtz-Eakin, a former Congressional Budget Office director. “The substance of what he’s actually done doesn’t match the enormity of the problem as he’s portrayed it.”
  • The wage-gap debate has reverberated to other parts of Washington, as the SEC published a rule Sept. 18 that would compel public companies to reveal pay ratios between chief executives and their employees. While businesses have decried the requirement as overreach, some investors welcome the data as a way to help assess a company’s health.
  • Across companies in the S&P 500, the average multiple of CEO compensation to that of rank-and-file workers is 204, up 20 percent since 2009, according to data compiled by Bloomberg in April. The Fed also has been caught up in the debate over growing income disparities. Lawmakers from both parties have questioned whether its bond-buying policy, called quantitative easing, has benefited the rich at the expense of those less well-off by boosting prices of stocks and other assets.
  • The S&P 500 stock index has risen 29 percent in 2013. The richest third of U.S. households account for 89 percent of all equities ownership, according to the Center for Retirement Research at Boston College.
  • Janet Yellen, nominated to take over as Fed chairman next year, defended the central bank’s actions at a Senate Banking Committee hearing on Nov. 14. “The policies we’ve undertaken have been meant to generate a robust recovery,” Yellen told the committee. The growing calls for action to reduce income inequality have translated into a national push for a higher minimum wage. Fast-food workers in 100 cities took to the streets Dec. 5 to demand a $15 hourly salary.
  •  
    Monetary policy of, by, and for banksters continues in the U.S. One irony is that banksters press for transition to an all digital currency so that savers can be penalized, a blatant "trickle-up"economic policy, whilst also pressing for more bank bailouts, wielding the thoroughly-discredited "trickle down" economic theory. But "trickle down" theory, in the context of bank bailouts, has not successfully trickled down and the only beneficiaries have been the few Americans who can still invest in the stock market, paying the highest dividends to the wealthiest among us. Has their ever been a time when the stock market's behavior has been so divorced from the well-being of the middle and lower economic classes? I doubt there has been at least in the last 50 years. Where would we be if the bank bail-out trillions had instead been mailed as checks to the middle and lower economic classes? "Trickle up" works and that is what built the American economy to its peak in inflation-adjusted dollars -- an affluent middle class. But do not expect leadership from Washington, D.C. in correcting income inquequality; only political rhetoric and a fight over extension of unemployment benefits, now lapsed. "According to the World Bank, the GINI coefficient "measures the extent to which the distribution of income or consumption expenditure among individuals households within an economy deviates from a perfectly equal distribution." Therefore it is used as an indication of income inequality within countries. ... In the late 2000s, Chile had the highest GINI coefficient, after taxes and transfers, among OECD member countries. The United States, Turkey and Mexico came right before it. At the other end of the scale, Slovenia, Denmark and Norway led the ranking with the lowest levels of income inequality." http://www.gfmag.com/tools/global-database/economic-data/11944-wealth-distribution-income-inequality.html#ixzz2pGpv4xGZ Higher minimum wages? How about instead abolishing the Feder
Paul Merrell

Your Computer May Already be Hacked - NSA Inside? | Steve Blank - 1 views

  • But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”  Say what??  They can see the plaintext on my computer before I encrypt it? That defeats any/all encryption methods. How could they do that? Bypass Encryption While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
  • The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT. Today every desktop and laptop computer has another way for the NSA to get inside. Intel Inside It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn’t crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip. After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing it’s microprocessors to load fixes automatically when your computer starts.
  • Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer’s BIOS.). Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update. Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that 3rd parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it is impossible to know whether anyone is loading a backdoor into your computer.
  • ...3 more annotations...
  • Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security conscious sites can discover rootkits by tools that check kernel code and data for changes. But what if you could use the configuration and state of microprocessor hardware in order to hide? You’d be invisible to all rootkit detection techniques that checks the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA’s biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.) Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys  giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.) That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.
  • A few months ago these kind of discussions would have been theory at best, if not paranoia.
  • The Prism disclosures prove otherwise – the National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven’t implemented a microcode backdoor. The downside is that 1) backdoors can be hijacked by others with even worse intent. So if NSA has a microcode backdoor – who else is using it? and 2) What other pieces of our infrastructure, (routers, smartphones, military computers, satellites, etc) use processors with uploadable microcode? —— And that may be why the Russian president is now using a typewriter rather than a personal computer.
Gary Edwards

How World War I Paved the Way for the Warfare State :: The Mises Economics Blog: The Circle Bastiat - 0 views

  •  
    Part ONE "by David Stockman Remarks To The Committee For The Republic, Washington DC, February 2014 (Part 1 of 6 Parts) [From David Stockman's Contra Corner.] Flask in hand, Boris Yelstin famously mounted a tank outside the Soviet Parliament in August 1991. Presently, the fearsome Red Army stood down-an outcome which 45 years of Cold War military mobilization by the West had failed to accomplish. At the time, the U.S. Warfare State's budget- counting the pentagon, spy agencies, DOE weapons, foreign aid, homeland security and veterans--was about $500 billion in today's dollars.  Now, a quarter century on from the Cold War's end, that same metric stands at $900 billion. This near doubling of the Warfare State's fiscal girth is a tad incongruous.  After all, America's war machine was designed to thwart a giant, nuclear-armed industrial state, but, alas, we now have no industrial state enemies left on the planet. The much-shrunken Russian successor to the Soviet Union, for example, has become a kleptocracy run by a clever thief who prefers stealing from his own citizens. Likewise, the Red Chinese threat consists of a re-conditioned aircraft carrier bought second-hand from a former naval power--otherwise known as the former Ukraine. China's bubble-ridden domestic economy would collapse within six weeks were it to actually bomb the 4,000 Wal-Mart outlets in America on which its mercantilist export machine utterly depends. On top of that, we've been fired as the world's policeman, al Qaeda has splintered among warlords who inhabit the armpits of the world from Yemen to Somalia and during last September's Syria war scare the American people even took away the President's keys to the Tomahawk missile batteries.  In short, the persistence of America's trillion dollar Warfare State budget needs some serious "splainin". The Great War and Its Aftermath My purpose tonight is to sketch the long story of how it all happened, starti
Paul Merrell

Moscow won't exclude sanctions to counter US and EU - Ministry - RT Business - 0 views

  • Russia is ready to retaliate with counter sanctions against the EU and US if they go ahead with economic measures against Russia over tension in Crimea, the Russian Economic Ministry has said. "We hope that there will only be targeted political sanctions, and not a broad package affecting economic trade,” Deputy Economic Development Minister Aleksey Likhachev said. “Our sanctions will be, of course, similar,” he added. One way Russia plans on shielding itself from pending sanctions is by boosting trade in other currencies, not the US dollar. “We need to increase trade volume conducted in national currencies. Why, in relation to China, India, Turkey and other countries, should we be negotiating in dollars? Why should we do that? We should sign deals in national currencies- this applies to energy, oil, gas, and everything else,” Aleksey Ulyukaev, the Minister of Economic Development said in an interview with the Vesti 24 TV channel. The Duma, Russia’s parliament, is drafting legislation to allow Moscow to freeze assets of Western companies and individuals in the event sanctions are imposed following the Crimea referendum vote on March 16.
  • Earlier this week the European Union threatened to impose further sanctions on Russia starting on March 17, after the referendum in Crimea takes place on Sunday. Speaking to the German parliament, Chancellor Angela Merkel hinted sanctions would be needed if Russia "continues its course of the past weeks" in Ukraine. "It would not only change the European Union's relationship with Russia. No, this would also cause massive damage to Russia, economically and politically," Merkel said Thursday. The decision on sanctions was made, “especially on the procedure of introducing sanctions,” Poland's Prime Minister Donald Tusk said. “The consequence of this will be the start of sanctions on Monday,” he added. However, China’s ambassador to Germany Shi Mingde, warns of the global economic affect sanctions against Russia could hold. Mingde said the geo-political tiff between Russia and the West could “spiral” into chaos. President Putin and the foreign ministry have both said sanctions against Russia could backfire, and spill over into the global economy.
  •  
    I wish we had an adult residing in The White House.
Paul Merrell

The White House Has Been Covering Up the Presidency's Role in Torture for Years - The Intercept - 0 views

  • On May 10, 2013, John Brennan presented CIA’s response to the Senate Intelligence Committee Torture Report to the President. Official White House Photo by Pete Souza. The fight between the CIA and the Senate Intelligence Committee over the Committee’s Torture Report – which Dan Froomkin covered here – has now zeroed in on the White House. Did the White House order the CIA to withdraw 920 documents from a server made available to Committee staffers, as Senator Dianne Feinstein says the agency claimed in 2010? Were those documents – perhaps thousands of them – pulled in deference to a White House claim of executive privilege, as Senator Mark Udall and then CIA General Counsel Stephen Preston suggested last fall? And is the White House continuing to withhold 9,000 pages of documents without invoking privilege, as McClatchy reported yesterday? We can be sure about one thing: The Obama White House has covered up the Bush presidency’s role in the torture program for years. Specifically, from 2009 to 2012, the administration went to extraordinary lengths to keep a single short phrase, describing President Bush’s authorization of the torture program, secret.
  • As Steven Aftergood, director of the Federation of American Scientists Project on Government Secrecy, noted  in 2009 – shortly after Hayden revealed that torture started as a covert operation – this means there should be a paper trail implicating President Bush in the torture program. “[T]here should be a Presidential ‘finding’ authorizing the program,” he said, “and [] such a finding should have been provided to Congressional overseers.” The National Security Act dictates that every covert operation must be supported by a written declaration finding that the action is necessary and important to the national security. The Congressional Intelligence committees – or at least the Chair and Ranking Member – should receive notice of the finding. But there is evidence that those Congressional overseers were never told that the finding the president signed on September 17, 2001 authorized torture. For example, a letter from then ranking member of the House Intelligence Committee, Jane Harman, to the CIA’s General Counsel following her first briefing on torture asked: “Have enhanced techniques been authorized and approved by the President?” The CIA’s response at the time was simply that “policy as well as legal matters have been addressed within the Executive Branch.”
  • Nevertheless, the finding does exist. The CIA even disclosed its existence in response to the ACLU FOIA, describing it as “a 14-page memorandum dated 17 September 2001 from President Bush to the Director of the CIA pertaining to the CIA’s authorization to detain terrorists.” In an order in the ACLU suit, Judge Alvin K. Hellerstein confirmed that the declaration was “intertwined with” the administration’s effort to keep the language in the Tenet document hidden. When the administration succeeded in keeping that short phrase secret, all effort to release the declaration also ended.
  • ...4 more annotations...
  • The White House’s fight to keep the short phrase describing Bush’s authorization of the torture program hidden speaks to its apparent ambivalence over the torture program. Even after President Obama released the DOJ memos authorizing torture – along with a damning CIA Inspector General Report and a wide range of documents revealing bureaucratic discussions within the CIA about torture – the White House still fought the release of the phrase that would have made it clear that the CIA conducted this torture at the order of the president. And it did so with a classified declaration from Jones that would have remained secret had Judge Hellerstein not insisted it be made public. As Aftergood noted, such White House intervention in a FOIA suit is rare. “The number of times that a national security advisor has filed a declaration in a FOIA lawsuit is vanishingly small,” he said. “It almost never happens.” But as ACLU Deputy Legal Director Jameel Jaffer noted of the finding, “It was the original authority for the CIA’s secret prisons and for the agency’s rendition and torture program, and apparently it was the authority for the targeted killing program as well.  It was the urtext.  It’s remarkable that after all this time it’s still secret.”
  • Enduring confusion about this particular finding surely exists because of its flexible nature. As Bob Woodward described in Bush at War, CIA Director Tenet asked President Bush to sign “a broad intelligence order permitting the CIA to conduct covert operations without having to come back for formal approval for each specific operation.” As Jane Mayer described in The Dark Side, such an order not only gave the CIA flexibility, it also protected the President. “To give the President deniability, and to keep him from getting his hands dirty, the finding called for the President to delegate blanket authority to Tenet to decide on a case-by-case basis whom to kill, whom to kidnap, whom to detain and interrogate, and how.” When George Tenet signed written guidelines for the CIA’s torture program in 2003, however, he appeared to have deliberately deprived the President of that deniability by including the source of CIA’s authorization – presumably naming the President – in a document interrogators would see. You can’t blame the CIA Director, after all; Tenet signed the Guidelines just as CIA’s Inspector General and DOJ started to review the legality of the torture tactics used against detainees like Abd al-Rahim al-Nashiri, who was threatened with a drill and a gun in violation of DOJ’s ban on mock executions.
  • President Obama’s willingness to go to such lengths to hide this short phrase may explain the White House’s curious treatment of potentially privileged documents with the Senate now – describing President Bush’s authorization of the torture program and its seemingly contradictory stance supporting publishing the Torture Report while thwarting its completion by withholding privileged documents. After all, the documents in question, like the reference to the presidential finding, may deprive the President of plausible deniability. Furthermore, those documents may undermine one of the conclusions of the Torture Report. According to Senator Ron Wyden, the Senate Torture Report found that “the CIA repeatedly provided inaccurate information about its interrogation program to the White House.” Perhaps the documents reportedly withheld by the White House undermine this conclusion, and instead show that the CIA operated with the full consent and knowledge of at least some people within the White House. Finally, the White House’s sensitivity about documents involved in the torture program may stem from the structure of the finding. As John Rizzo made clear, the finding authorizes not just torturing, but killing, senior al Qaeda figures. Bob Woodward even reported that that CIA would carry out that killing using Predator drones, a program CIA still conducts. And in fact, when the Second Circuit ultimately ruled to let the White House to keep the authorization phrase secret, it did so because the phrase also relates to “a highly classified, active intelligence activity” and “pertains to intelligence activities unrelated to the discontinued [torture] program.” Given what we know about the September 17, 2001 finding, that may well refer to President Obama’s still active drone program.
  • In any case, the White House’s seemingly contradictory statements about the Torture Report might best be understood by its past treatment of CIA documents. By releasing the DOJ memos and other materials, the White House provided what seemed to be unprecedented transparency about what the CIA had done. But all the while it was secretly hiding language describing what the White House has done.
  •  
    See also U.N. Convention Against Torture, which the U.S. is a party to. http://www.un.org/documents/ga/res/39/a39r046.htm
Gary Edwards

NSA After 9/11 - 0 views

  •  
    "by David Barth, written 24 June 2009 This incredible compilation of facts truly is "Source Material", and is presented as such. The material comes from the following sources, and it will blow you away: ..... The Shadow Factory The Ultra-Secret NSA from 9/11 to the Eavesdropping on America by James Bamford, 2008 ..... The Puzzle Palace Inside the National Security Agency, America's Most Secret Intelligence Organization by James Bamford, 1983 .... Intelligence and the Communications Industry National Security Agency (NSA) Predecessors ..... Various issues of Wired magazine" Once I started reading this I couldn't stop. Incredible stuff, it reads like a disjointed timeline detailing the convergence of technology, government agencies, co-opted companies and, both the terrorist and false flag operations that escalated budgets, changes in the law and political authorizations needed to create the current NSA worldwide police state. Buckle up patriots. We are in for one very wild ride. Thanks Marbux!
Gary Edwards

IRS Lawyer Carter Hull Confirms Tea Party Targeting Ordered By Washington - Investors.com - 0 views

  • Hull has confirmed the premeditated targeting of Tea Party groups went even higher than him or Lerner.
  • Apparently not only Tea Party groups were targeted but actual candidates as well. On March 9, 2010, the day Tea Party candidate Christine O'Donnell revealed her plan to run for Vice President Joe Biden's former Delaware Senate seat , an IRS tax lien was placed on a house purported to be hers, an action that was quickly publicized by those who did not wish her well.
  • Earlier this year, Dennis Martel, special agent with the Department of Treasury in Baltimore, left a message on O'Donnell's cell phone telling her that an official in Delaware state government had improperly accessed her records on that very same day. The problem was that the house was not hers in the first place and the IRS eventually blamed the lien on a computer glitch and withdrew it.
  • ...1 more annotation...
  • To us it is inconceivable that one of only two political appointees was directly involved in targeting of Tea Party groups without White House knowledge and consent. It is said the fish rots from the head, and this one is really beginning to stink.
  •  
    This has gone way too far.  The 2012 elections must be nullified and rescheduled.  Tens of millions of American citizens have been systematically targeted, their civil and Constitutional rights destroyed, and their voices and votes politically eliminated by a massive government conspiracy.  The 2012 election is a fraud.  And nothing short of complete nullification and recall, and the termination of the IRS will do the great Republic justice. excerpt: Scandal: A retiring IRS lawyer implicates the IRS chief counsel's office, headed by an Obama appointee, as well as the head of the IRS' exempt organizations office. The targeting included a Tea Party Senate candidate. In Thursday's hearing before the House Oversight Committee, 72-year-old retiring IRS lawyer Carter Hull implicated the IRS chief counsel's office headed by William J. Wilkins, who attended at least nine White House meetings, and Lois Lerner, head of the exempt-organizations office, in the IRS scandal. In so doing, he made clear the targeting of Tea Party groups started in Washington and was directed from Washington. A tax-law specialist with 48 years of IRS experience, Hull testified that Lerner, the former head of the exempt organizations division, demanded that he send some of the reviews of Tea Party groups to the IRS chief counsel's office in Washington. The chief counsel is one of two political appointees in the IRS. According to Hull's testimony, Lerner, who famously pleaded her Fifth Amendment rights before the same committee, gave an atypical instruction that the Tea Party applications undergo special scrutiny that included an uncommon multilayer review that involved a top adviser to Lerner as well as the chief counsel's office. Hull's name came up earlier in the testimony of Holly Paz, a D.C.-based supervisor in the IRS's tax-exempt status division, who reported to Lerner. It was on May 22, the day after Paz was interviewed by investigators, that Lerner refused to answer questions from
Gary Edwards

Have a T-P Pre-Primary to avoid sure defeat // Implement a drive to recruit and organize into each precinct - Tea Party Command Center - 1 views

  •  
    "This discussion needs your direct support or direct critique that I might respond.  Other idea's please start in a new discussion (note: this has been revised after 400+ comments, but if possible read all of them) thank you for your time: (revised July 20th,'13) I thought it would be helpful (stike that, it's absolutely imperative!!!!)  to have a T Party pre-primary prior to the RINO primary so we wouldn't split our vote.  That thread sort of grew to the following two steps: The following two step approach would require a temporary meeting of the minds from the various larger conservative Tea Party factions for the following purposes:: 1. Having a pre-primary to avoid the late RINO primary so we avoid splitting our vote and being able to get out there now to campaign because we have some serious hills to climb (our message, government news and funding etc.). But the main point here is that we always split our votes in the regular RINO primary, we need to avoid this.  We need some sort of (temporary or other) unified effort of all the un-unified groups for this purpose.  Make sure you don't miss a word utilized here and that the whole 'idea' is understood.  Along with this we also need to have the above bonded with the following item number 2, as follows: 2. Implement a plan to organize and recruit deep into every precinct of the T-Party. This would include the larger T-P groups to supply their associated local smaller groups with solid information to be distributed and used as a means to educate both door to door and if possible via ads in their local news papers when feasible. (with an increase in some recruiting, this can work - I've checked out the cost). We have great web sites on the internet but many republican's, democrats and independents don't go there.  We need a serious ground team for all of our upcoming elections.  Many of our small groups are getting smaller and many not associated would like to be contacted by us.  Our idea's
Gary Edwards

Google News - 0 views

  •  
    WOW!!! Incredible presentation concerning the history of Freedom vs. Tyranny. WOW!! If ever there's a MUST Watch, this is it. Very impressive and sweeping comparison of how authoritarian collectivist seize power in a free society and establish their tyrannies. My notes are listed below: How to recognize potential tyrants and keep them from seizing power. The urge to save humanity is always used to justify those who want to rule humanity. - ML Menken Daniel Webster on the Constitution Obstacles to Tyranny : Limited powers of government .... Due Process .... Presumption of Innocence .... Freedom to Dissent .... Armed Populace: The right to be Armed! Due Process .... 5th Amendment .... Emergency powers. there is no authorization in the US Constitution to suspend Due Process or any aspect of the Bill of Rights .... Asset Seizure Laws for criminal activities (alleged - without warrant or court order) .... Eminent Domain: seizure of private property for government uses: 2005 Kelo vs New London seizure based on jobs (economy) and tax revenue possibilities. .... 6th Amendment - right to trial by jury : plea bargaining admonition based on facing the awesome power of the government to prosecute no matter what - intimidation and threat of personal destruction. .... Forced confessions through plea bargaining. .... Indefinite detention without trial or charges: President has power to kill or issue orders without warrant, charges or trial .... Presumption of Innocence: Probable Cause .... Random stops at Border check points. 5th Amendment protections violated .... Sobriety Check Points: 4th and 5th Amendments violated - no presumption of innocence .... Random detention and questioning: airport security pat downs, housing projects, bus transportation .... The Right to Privacy: financial transactions and the IRS audit (without warrant or accusation) .... Warrant-less Spying .... Agents writing their own search warrants .... Snatch and Peek Freedom to Disse
Paul Merrell

Surveillance scandal rips through hacker community | Security & Privacy - CNET News - 0 views

  • One security start-up that had an encounter with the FBI was Wickr, a privacy-forward text messaging app for the iPhone with an Android version in private beta. Wickr's co-founder Nico Sell told CNET at Defcon, "Wickr has been approached by the FBI and asked for a backdoor. We said, 'No.'" The mistrust runs deep. "Even if [the NSA] stood up tomorrow and said that [they] have eliminated these programs," said Marlinspike, "How could we believe them? How can we believe that anything they say is true?" Where does security innovation go next? The immediate future of information security innovation most likely lies in software that provides an existing service but with heightened privacy protections, such as webmail that doesn't mine you for personal data.
  • Wickr's Sell thinks that her company has hit upon a privacy innovation that a few others are also doing, but many will soon follow: the company itself doesn't store user data. "[The FBI] would have to force us to build a new app. With the current app there's no way," she said, that they could incorporate backdoor access to Wickr users' texts or metadata. "Even if you trust the NSA 100 percent that they're going to use [your data] correctly," Sell said, "Do you trust that they're going to be able to keep it safe from hackers? What if somebody gets that database and posts it online?" To that end, she said, people will start seeing privacy innovation for services that don't currently provide it. Calling it "social networks 2.0," she said that social network competitors will arise that do a better job of protecting their customer's privacy and predicted that some that succeed will do so because of their emphasis on privacy. Abine's recent MaskMe browser add-on and mobile app for creating disposable e-mail addresses, phone numbers, and credit cards is another example of a service that doesn't have access to its own users' data.
  • Stamos predicted changes in services that companies with cloud storage offer, including offering customers the ability to store their data outside of the U.S. "If they want to stay competitive, they're going to have to," he said. But, he cautioned, "It's impossible to do a cloud-based ad supported service." Soghoian added, "The only way to keep a service running is to pay them money." This, he said, is going to give rise to a new wave of ad-free, privacy protective subscription services.
  • ...2 more annotations...
  • The issue with balancing privacy and surveillance is that the wireless carriers are not interested in privacy, he said. "They've been providing wiretapping for 100 years. Apple may in the next year protect voice calls," he said, and said that the best hope for ending widespread government surveillance will be the makers of mobile operating systems like Apple and Google. Not all upcoming security innovation will be focused on that kind of privacy protection. Security researcher Brandon Wiley showed off at Defcon a protocol he calls Dust that can obfuscate different kinds of network traffic, with the end goal of preventing censorship. "I only make products about letting you say what you want to say anywhere in the world," such as content critical of governments, he said. Encryption can hide the specifics of the traffic, but some governments have figured out that they can simply block all encrypted traffic, he said. The Dust protocol would change that, he said, making it hard to tell the difference between encrypted and unencrypted traffic. It's hard to build encryption into pre-existing products, Wiley said. "I think people are going to make easy-to-use, encrypted apps, and that's going to be the future."
  • Companies could face severe consequences from their security experts, said Stamos, if the in-house experts find out that they've been lied to about providing government access to customer data. You could see "lots of resignations and maybe publicly," he said. "It wouldn't hurt their reputations to go out in a blaze of glory." Perhaps not surprisingly, Marlinspike sounded a hopeful call for non-destructive activism on Defcon's 21st anniversary. "As hackers, we don't have a lot of influence on policy. I hope that's something that we can focus our energy on," he said.
  •  
    NSA as the cause of the next major disruption in the social networking service industry?  Grief ahead for Google? Note the point made that: "It's impossible to do a cloud-based ad supported service" where the encryption/decryption takes place on the client side. 
Gary Edwards

E-mail's Big Privacy Problem: Q&A With Silent Circle Co-Founder Phil Zimmermann - Forbes - 1 views

  • Customers of Silent Circle’s encrypted mail service got an unfortunate surprise on Friday: all their messages had been deleted. The management  of Silent Circle, an encryption firm that specializes in smartphone communication, abruptly shut down their e-mail service yesterday, saying they were pre-empting the U.S. government from forcing them to hand over customer data. While they were confident they could protect text messages, voice calls and video calls, e-mail had always been less secure because it relied on standard Internet protocols. Yesterday’s catalyst was a competitor, Lavabit, whose founder announced he was shutting his email-hosting company down due to an apparent government investigation, and told Forbes on Friday: “If you knew what I knew about e-mail, you might not use it.” Edward Snowden had been a Lavabit user.
  • Phil Zimmermann, the inventor of popular email encryption service Pretty Good Privacy (PGP) and co-founder of Silent Circle, told us even he was using e-mail less and less, and relying more heavily on mobile messaging services in the quest for privacy. He also explained the gnawing problem of Silent Circle’s e-mail service and why the company was now planning to put servers in Switzerland. Read the full Q&A with Zimmermann below, and you can read Kashmir Hill’s interview with Lavabit’s founder here.
  •  
    Good interview with Phil Zimmerman, the inventor of PGP, and founder of Silent Circle eMail Service.  Which is being shut down because of the what the Feds did to LavaBit. What concerns me most about this illegal and systematic invasion of privacy is the massive potential for blackmail and extortion.  Think of what the IRS illegally did to tens of millions of Americans, targeting them because of their religious and political views, and seeking volumes of highly personal information far beyond reasonable requirements.   What happens when the politicians in power start using the IRS and NSA for political purposes - like what we just saw in the 2012 elections? When I was working on the wiki-Word and SurDoc projects, we were very concerned about having our documents and designs hosted or passing through competitor (Microsoft and Google) servers and email systems.  At the time I thought I was just being paranoid.  Now we know differently.  We had every reason to be concerned.
Gary Edwards

SD Times: Software Development News - Top Stories - 1 views

  •  
    "Here is another example of how this administration and Congress randomly decide which laws they like and which ones they don't. For those of us paying attention we remember that Sen. Chuck Grassley, (R-Iowa) added a clause into the original text of the Affordable Care Act that said members of Congress and their aides MUST be covered by plans created by the law or offered through an exchange. Before Obamacare, Congress and their staff were covered by a health care plan that was considered "golden".  This was being paid for by the taxpayers.  Under Obamacare and Grassley's provision, Congress and staff would be subject to the exact same treatment as the rest of us. In other words, if government payments stopped, lawmakers and their aides would have been looking at thousands of dollars in additional premium payments.  (Just like the rest of us.)  Before Obamacare, the government contributed almost 75% to their premium payments. When they finally got around to "finding out what was in the bill", Capitol Hill started wringing their hands and hyperventilating.  With Grassley's provision in there, that would mean that, gasp, they would have to live by the same rules as the rest of and they just could not let that happen. All sorts of complaints were being made. For instance, "staffers don't make enough money to pay those premiums"; or "they will look for more lucrative jobs" in order to afford them.  Really?  How about the rest of the American people out there?  Do you think that they can afford higher premiums on the part-time work that they now will be forced into because of employer cut-backs?  The best line came from Nancy Pelosi who said that if Congress lost these Capitol Hill workers, a "tremendous intellectual resource" would be lost.  You just have to shake your head in disbelief. Congress is not the only one in the Ruling Class crying foul.  Just last week, IRS Chief, Daniel Werfel stated in no uncertain terms that he w
Paul Merrell

OpEdNews - Article: Our Man In Moscow - 0 views

  • Barack Obama virtually screamed his lungs out telling Russian President Vladimir Putin he had to hand him Snowden "under international law." Putin repeatedly said this was not going to happen.  Obama even phoned Putin. Nothing. Washington even forced European poodles to down Bolivian President Evo Morales' plane. Worse. Moscow kept following the letter of Russian law and eventually granted temporary asylum to Snowden.  The Edward Snowden saga has turned the Pentagon's Full Spectrum Dominance doctrine on its Hydra-head. Not only because of the humbling of the whole US security state apparatus, but also for exploding the myth of Full Spectrum Dominance by POTUS.  Obama revealed himself once again as a mediocre politician and an incompetent negotiator. Putin devoured him as a succulent serving of eggs benedict. Glenn Greenwald will be inflicting death by a thousand leaks -- because he is in charge of Snowden's digital treasure chest. And Snowden took a taxi and left the airport -- on his own terms.  Layers and layers of nuances have been captured in this fascinating discussion at Yves Smith's blog -- something impossible to find across Western corporate media. For POTUS, all that's left is to probably boycott a bilateral meeting with Putin next month, on the sidelines of the G20 summit in St Petersburg. Pathetic does not even begin to explain it. 
  • There's got to be a serious glitch with the collective IQ of these people. The Obama administration as well as the Orwellian/Panopticon complex are in shock because they simply cannot stop death by a thousand leaks. The Roving Eye is among those who suspect the NSA has no clue about what Snowden, as a systems administrator, was able to download (especially because someone with his skills can easily delete traces of access). Even the top NSA robot -- General Keith Alexander -- admitted on the record the "no such agency" does not know how Snowden pulled it off. He could have left a bug, or infected the system with a virus. The fun may have not even started. 
  • This Big Brother obsession with watching, tracking, monitoring, controlling, decoding virtually everything we do digitally is leading to monumental stupidities like Google searches attracting armed US government's agents to one's house, as is pricelessly detailed here. And still Paranoia Paradise has not isolated Washington from a major ass-kicking in Afghanistan and Iraq, or has foreseen the 2008 financial crisis; but then again it probably did, and the elites who arbitraged all that massive inside information royally profited from it.  For the moment, what we have is an Orwellian/Panopticon complex that will persist with its unchecked powers; an aphasic populace; a quiet, invisible man in a Moscow multitude; and a POTUS consumed with boundless rage. Watch out. He may be tempted to wag the (war) dog. 
  •  
    Pepe Escobar's take on the Obama Administration and Edward Snowden's leaked documents, and on the forthcoming Balkanization of the Internet. Will Obama be remembered most for destroying the Global Internet? 
Paul Merrell

Obama Starting to Lose It Over Snowden « naked capitalism - 0 views

  • Thanks to Obama’s famed “no drama” coolness, it’s hard to detect when he’s breaking a sweat. But if you look at the substance of his actions, it’s clear the President is losing his famed poise, at least as far as Snowden and the surveillance state revelations are concerned. I’m not sure yet whether his missteps are simply the result of personal obsession, or whether Obama recognizes he’s slipping into lame duck status, and his frustration with his declining power is most evident where he is most stressed, which is on the NSA revelations front.
Paul Merrell

Human rights court turns down Polish govt request to keep CIA jail hearing closed - RT News - 0 views

  • The Polish government’s request to the European Court of Human Rights to prohibit the press and public from attending a hearing investigation on whether the US kept a CIA prison on Polish soil has been rejected. The public hearing is scheduled for December 3 in Strasbourg, France and will be the first time that allegations stating that the US intelligence agency used rogue “black sites” in Poland for its “extraordinary rendition” program are heard publicly. The US is accused of illegally detaining Al-Qaeda terror suspects and using torture to interrogate them in a forest in northern Poland.
  •  
    Predictable result: the hearing will be public. So starting December 3, we should be getting more details on CIA "extraordinary renditions," referred to as "forced disappearances" in international law. 
Paul Merrell

Spies worry over doomsday cache stashed by ex-NSA contractor Snowden | Reuters - 0 views

  • (Reuters) - British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said.The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters.The passwords are in the possession of at least three different people and are valid for only a brief time window each day, they said. The identities of persons who might have the passwords are unknown.
  • One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm.U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories."The worst is yet to come," said one former U.S. official who follows the investigation closely.Snowden, who is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents, is living in Russia under temporary asylum, where he fled after traveling to Hong Kong. He has been charged in the United States under the Espionage Act.Cryptome, a website which started publishing leaked secret documents years before the group WikiLeaks or Snowden surfaced, estimated that the total number of Snowden documents made public so far is over 500.
  • Snowden's revelations of government secrets have brought to light extensive and previously unknown surveillance of phone, email and social media communications by the NSA and allied agencies. That has sparked several diplomatic rows between Washington and its allies, along with civil liberties debates in Europe, the United States and elsewhere.Among the material which Snowden acquired from classified government computer servers, but which has not been published by media outlets known to have had access to it, are documents containing names and resumes of employees working for NSA's British counterpart, the Government Communications Headquarters (GCHQ), sources familiar with the matter said.The sources said Snowden started downloading some of it from a classified GCHQ website, known as GC-Wiki, when he was employed by Dell and assigned to NSA in 2012.
  • ...2 more annotations...
  • Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published.""If anything happens at all to Edward Snowden, he has arranged for them to get access to the full archives," Greenwald said in a June interview with the Daily Beast website. He added: "I don't know for sure whether has more documents than the ones he has given me... I believe he does."In an email exchange with Reuters, Greenwald, who has said he remains in contact with Snowden, affirmed his statements about Snowden's "precautions" but said he had nothing to add.Officials believe that the "doomsday" cache is stored and encrypted separately from any material that Snowden has provided to media outlets.
  • Sources familiar with unpublished material Snowden downloaded said it also contains information about the CIA - possibly including personnel names - as well as other U.S. spy agencies such as the National Reconnaissance Office and National Geospatial-Intelligence Agency, which operate U.S. image-producing satellites and analyze their data.U.S. security officials have indicated in briefings they do not know what, if any, of the material is still in Snowden's personal possession. Snowden himself has been quoted as saying he took no such materials with him to Russia.
Paul Merrell

Zionism's Last Card and Hope For Palestine - Alan Hart - 0 views

  • Following the interim agreement with Iran the next six months will tell us whether or not the American-led Zionist lobby and Zionism itself has played its last card and lost. If it does lose President Obama will be free to use the leverage he has to try to cause Israel to be serious about peace on terms almost all Palestinians and most other Arabs and Muslims everywhere could accept (and which would not pose any threat to the wellbeing and security of those Jews now living in Palestine that became Israel and who wanted to stay). The stakes could not be higher. As I write I am recalling what former President Carter said to my wife and I when we met with him and Rosalyn, words I quote in my book Zionism: The Real Enemy of the Jews and which bear repeating. “Any American president has only two windows of opportunity to take on the Zionist lobby – in the first nine months of his first term and the last year of his second term if he has one.”
  • I am happy to go public with this positive speculation in part because of an article by Philip Weiss. In it he noted that Netanyahu has been playing the Iran threat card “to keep the world’s eyes off the West Bank and Jerusalem.” Then, commenting on Netanyahu’s statement that Israel will not allow Iran to attain nuclear capability, he wrote this. “The ardent supporters of the Jewish state in the U.S. have never been in a worse position. They are largely supportive of this deal (as are a majority of all Americans, I add). They will have to throw Netanyahu under the bus.” Not long ago the proclaimed view of some American supporters of Israel right or wrong was that Obama was throwing Israel under a bus. The idea that American Jews should now throw Netanyahu under it appeals to me, as I am sure it does to Obama. If Congress does back away from doing Zionism’s bidding to wreck the prospects for a new-start American and European accommodation with Iran, what options if any will Netanyahu’s Israel have to distract the world’s media and political attention from Zionism’s on-going colonization – ethnic cleansing slowly and by stealth – of the occupied West Bank? Only one that I can see. War.
  • Though events may prove me wrong, my overall speculation is that Zionism’s last card is not a winner and that Obama will succeed in getting, six months or so from now, what he wants – a new-start and mutually beneficial relationship with Iran. And defeat for the Zionist lobby will, as I indicated in my opening paragraph, free him to use the presidential leverage to try to oblige Israel to be serious about peace on terms the vast majority of Palestinians could accept.
  • ...3 more annotations...
  • In the context above what I am suggesting is that if and when he is free to put real pressure on Israel to be serious about peace with the Palestinians, Obama should make best use of the Kennedy quote – “What we want from Israel arises because our relationship is a two-way street”. And he could and should put flesh on that bone by saying, among other things, that it is not in America’s own best interests to allow Israel to go on denying the Palestinians an acceptable measure of justice. But his crunch point could and should be something like this. “What America wants and needs, in order to best protect its own interests in the Arab and wider Muslim world, is an end to Israel’s denial of an acceptable amount of justice for the Palestinians. Unless we get that, I as president will have no choice but to use the leverage at my disposal to press you.” Israelis would know, even if Obama didn’t spell it out, that the pressure would include an end to American vetoes of Security Council resolutions condemning Israel and sanctions. If Obama was to go public with such a position in the wake of defeat for the Zionist lobby over the Iran nuclear issue, I think it’s reasonable to assume that a big majority of Jewish Americans would signal, if only by their silence and/or refusal to condemn Obama, that their first loyalty was to America not Israel.
  • There is no certainty about how the Jews of Israel would respond, but there’s a good case for believing that because what most of them care most about is the relationship with America, a significant majority of them would say to Netanyahu and his coalition government something like: “Enough is enough. We insist that you make peace with the Palestinians on terms they can accept, even if that means a short, sharp civil war with those settlers who refuse to withdraw from the West Bank and be relocated and compensated.”
  • For those who might believe there is little or no prospect of a Jewish civil war in the event of President Obama insisting with leverage as necessary on Israel making peace with the Palestinians on terms they could accept, I recommend Chapter 12 of Volume Three of the American edition of my book. This chapter is titled The Blood Oath. It reveals that Sharon convened a secret meeting of many senior military officers to sign a blood oath committing them to make common cause with those settlers who would resist “to the death” the implementation of any government decision to withdraw from the West Bank. My named and quoted source for that dramatic story was none other than Ezer Weizman, Israel’s defense minister of the time. When Ezer told me of the secret meeting minutes after he learned about it, he asked me a question. Did I think Sharon would act in accordance with the blood oath he and others had signed? I said: “What I think is of no consequence. I’m a visiting goy. You’re Israel’s defense minister, what do you think?” He replied: “Of course, he would. He’s mad enough to nuke the entire fucking Arab world!“ The coming months will tell us how mad Netanyahu is. And also whether or not the optimism expressed in this post was justified.
  •  
    'Twould be nice if it worked out this way. But Obama is spineless so I won't hold my breath. 
« First ‹ Previous 141 - 160 of 758 Next › Last »
Showing 20 items per page