Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "7" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Paul Merrell

America7;s new, more 7;usable7;, nuclear bomb in Europe | World news | The Guardian - 0 views

  • The $8 billion upgrade to the US B61 nuclear bomb has been widely condemned as an awful lot of money to spend on an obsolete weapon. As an old fashioned ‘dumb’ bomb it has no role in US or NATO nuclear doctrine, but the upgrade has gone ahead anyway, in large part as a result of lobbying by the nuclear weapons laboratories. In non-proliferation terms however the only thing worse than a useless bomb is a ‘usable’ bomb. Apart from the stratospheric price, the most controversial element of the B61 upgrade is the replacement of the existing rigid tail with one that has moving fins that will make the bomb smarter and allow it to be guided more accurately to a target. Furthermore, the yield can be adjusted before launch, according to the target. The modifications are at the centre of a row between anti-proliferation advocates and the government over whether the new improved B61-12 bomb is in fact a new weapon, and therefore a violation of President Obama’s undertaking not to make new nuclear weapons. His administration’s 2010 Nuclear Posture Review said life extension upgrades to the US arsenal would “not support new military missions or provide for new military capabilities.”
  • The issue has a particular significance for Europe where a stockpile of 180 B61’s is held in six bases in five countries. If there is no change in that deployment by the time the upgraded B61-12’s enter the stockpile in 2024, many of them will be flown out to the bases in Belgium, the Netherlands, Germany, Italy and Turkey. The row has had a semantic tone, revolving on what the definition of ‘new’ is, but arguably the only definition that counts is whether the generals and officials responsible for dropping bombs, view its role in a different light as a result of its refurbishment. Referring to the B61-12’s enhanced accuracy on a recent PBS Newshour television programme, the former head of US Strategic Command, General James Cartwright, made this striking remark: If I can drive down the yield, drive down, therefore, the likelihood of fallout, etc, does that make it more usable in the eyes of some — some president or national security decision-making process? And the answer is, it likely could be more usable.
  • In general, it is not a good thing to see the words ‘nuclear bomb’ and ‘usable’ anywhere near each other. Yet they seem to share space in the minds of some of America’s military leaders, as Hans Kristensen of the Federation of American Scientists, points out. Cartwright’s confirmation follows General Norton Schwartz, the former U.S. Air Force Chief of Staff, who in 2014 assessed that the increased accuracy would have implications for how the military thinks about using the B61. “Without a doubt. Improved accuracy and lower yield is a desired military capability. Without a question,” he said. The great thing about nuclear weapons was that their use was supposed to be unthinkable and they were therefore a deterrent to contemplation of a new world war. Once they become ‘thinkable’ we are in a different, and much more dangerous, universe.
  •  
    Oh, Lord, please save this planet from idiocy in high places. 
Paul Merrell

9/11: Larry Silverstein Designed New WTC-7 One Year Before Attacks - 0 views

  • Larry Silverstein was caught admitting on camera that he planned to build an entirely new World Trade Center 7 (WTC-7) building one year before the 9/11 attacks had occurred.
  • Back in April 2000, one year and five months before the attacks, “Lucky Larry” held a meeting to discuss plans to replace building 7 in 2002.  As reported by Veterans Today: “We got the designs.  And the first design meeting was in April of 2000. And construction began shortly thereafter, in 2002.”
  • One slight problem: If he hadn’t been planning the illegal, un-permitted, homicidal demolitions of WTC-7 and the entire World Trade Center complex that took place on September 11th, 2001, there would have been no point to any such design meeting back in April, 2000 … and no opportunity for beginning construction of a new WTC-7 in 2002.
  • ...4 more annotations...
  • With the supreme chutzpah that has become his trademark, Silverstein breezes over the demolitions of 9/11/2001 as if they were not even worth remarking on, instead going straight from his new-WTC-7 design meeting in April 2000 to the beginning of construction in 2002. In 2001, “Lucky Larry,” who had previously owned only WTC-7, orchestrated a deal with his fellow-ultra-Zionist Lewis Eisenberg, Chairman of the mobbed-up NY Port Authority, and another Zionist extremist billionaire, Frank Lowy, to sell the entire WTC complex to Silverstein and backers on a 100-year lease. The deal was finalized in July, 2001, and Larry took possession of the buildings … and security arrangements. But first, he hard-balled his insurers into doubling the terror insurance coverage and changing the terms to “instant cash payout.”
  • On September 11th, Larry hit the jackpot. The condemned-for-asbestos and largely vacant Twin Towers, with their obsolete communications infrastructure and money-hemorrhaging balance sheet, were both demolished for free – with 3,000 people inside.
  • Larry’s luck held out when he demanded double indemnity – on the basis that he had been “victimized” by two completely separate and unrelated terrorist attacks, namely the two planes – and got it, to the tune of 4. 5 billion dollars. That’s a hefty cash-payout return on a relatively minor investment. (Silverstein put up less than 15 million of his own money to buy the WTC, and his backers had added a little over 100 million.) Even after video proof emerged that he had confessed to “pulling” (i.e. demolishing) WTC-7, he still somehow evaded the hangman’s noose. Then he went back to court to ask for more than $10 billion more – this time not from his own insurers, but from those of the airlines he falsely blamed for the demolitions that he himself had conducted. But that didn’t stop not-quite-so-Lucky Larry from trying to steal another 500 million from the federal government through an EB-5 visa scam. Then last month, Larry’s inimitable chutzpah resurfaced when he said that his first thought on looking at the plans for the new South Tower was “it looks like it’s going to topple, it’s going to fall over.” At least if you “pull” on it hard enough, it might. Right, Larry? Larry’s chutzpah is so monumental that it became the basis of an annual award. Whatever will this unbelievable character do next?
  • Will someone finally arrest him? Will we ever see him swing from the gallows? Or will Lucky Larry’s luck hold out until he finally dies of natural causes, leaving his heirs billions of blood-stained dollars with which to conduct more outrageous Zionist mischief?
  •  
    A year before 9-11, Larry Silverstein was just coming off a very big loss (from much larger deal than he had ever been able to finance before). He had no money. He was only a trip to the courthouse shy of being officially bankrupt. So he gets a 100-year-lease on the World Trade Center from the Port of New York. The then-existing buildings are mostly vacant and are in drastic need of a major asbestos removal. There are no prospects of paying off the loan, either over the short or mid-term, let alone turning a profit. But insure-and-burn seems to have been the business plan for a very quick and very large profit. Design for a new building to replace WTC-7 in the year before 9-11-200? Now can we get on to the folks who did the financing for the burn operation? Hint: It wasn't Osama bin Laden, who disavowed Al-Qaeda responsibility in the immediate aftermath. Another hint: It was the Israeli prime minister who first went public with the charge that Al-Qaeda was responsible.  
Gary Edwards

75 Economic Numbers From 2012 That Are Almost Too Crazy To Believe - 0 views

  •  
    Thanks to Marbux we have this extraordinary collection of facts and figures describing the economic catastrophe that has hit the USA.  excerpt: "What a year 2012 has been!  The mainstream media continues to tell us what a "great job" the Obama administration and the Federal Reserve are doing of managing the economy, but meanwhile things just continue to get even worse for the poor and the middle class.  It is imperative that we educate the American people about the true condition of our economy and about why all of this is happening.  If nothing is done, our debt problems will continue to get worse, millions of jobs will continue to leave the country, small businesses will continue to be suffocated, the middle class will continue to collapse, and poverty in the United States will continue to explode.  Just "tweaking" things slightly is not going to fix our economy.  We need a fundamental change in direction.  Right now we are living in a bubble of debt-fueled false prosperity that allows us to continue to consume far more wealth than we produce, but when that bubble bursts we are going to experience the most painful economic "adjustment" that America has ever gone through.  We need to be able to explain to our fellow Americans what is coming, why it is coming and what needs to be done.  Hopefully the crazy economic numbers that I have included in this article will be shocking enough to wake some people up. The end of the year is a time when people tend to gather with family and friends more than they do during the rest of the year.  Hopefully many of you will use the list below as a tool to help start some conversations about the coming economic collapse with your loved ones.  Sadly, most Americans still tend to doubt that we are heading into economic oblivion.  So if you have someone among your family and friends that believes that everything is going to be "just fine", just show them these numbers.  They are a good summary of the problems that the U
Paul Merrell

CURIA - Documents - 0 views

  • 37      It must be stated that the interference caused by Directive 2006/24 with the fundamental rights laid down in Articles 7 and 8 of the Charter is, as the Advocate General has also pointed out, in particular, in paragraphs 77 and 80 of his Opinion, wide-ranging, and it must be considered to be particularly serious. Furthermore, as the Advocate General has pointed out in paragraphs 52 and 72 of his Opinion, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.
  • 43      In this respect, it is apparent from recital 7 in the preamble to Directive 2006/24 that, because of the significant growth in the possibilities afforded by electronic communications, the Justice and Home Affairs Council of 19 December 2002 concluded that data relating to the use of electronic communications are particularly important and therefore a valuable tool in the prevention of offences and the fight against crime, in particular organised crime. 44      It must therefore be held that the retention of data for the purpose of allowing the competent national authorities to have possible access to those data, as required by Directive 2006/24, genuinely satisfies an objective of general interest.45      In those circumstances, it is necessary to verify the proportionality of the interference found to exist.46      In that regard, according to the settled case-law of the Court, the principle of proportionality requires that acts of the EU institutions be appropriate for attaining the legitimate objectives pursued by the legislation at issue and do not exceed the limits of what is appropriate and necessary in order to achieve those objectives (see, to that effect, Case C‑343/09 Afton Chemical EU:C:2010:419, paragraph 45; Volker und Markus Schecke and Eifert EU:C:2010:662, paragraph 74; Cases C‑581/10 and C‑629/10 Nelson and Others EU:C:2012:657, paragraph 71; Case C‑283/11 Sky Österreich EU:C:2013:28, paragraph 50; and Case C‑101/12 Schaible EU:C:2013:661, paragraph 29).
  • 67      Article 7 of Directive 2006/24, read in conjunction with Article 4(1) of Directive 2002/58 and the second subparagraph of Article 17(1) of Directive 95/46, does not ensure that a particularly high level of protection and security is applied by those providers by means of technical and organisational measures, but permits those providers in particular to have regard to economic considerations when determining the level of security which they apply, as regards the costs of implementing security measures. In particular, Directive 2006/24 does not ensure the irreversible destruction of the data at the end of the data retention period.68      In the second place, it should be added that that directive does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured. Such a control, carried out on the basis of EU law, is an essential component of the protection of individuals with regard to the processing of personal data (see, to that effect, Case C‑614/10 Commission v Austria EU:C:2012:631, paragraph 37).69      Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.
  • ...13 more annotations...
  • 58      Directive 2006/24 affects, in a comprehensive manner, all persons using electronic communications services, but without the persons whose data are retained being, even indirectly, in a situation which is liable to give rise to criminal prosecutions. It therefore applies even to persons for whom there is no evidence capable of suggesting that their conduct might have a link, even an indirect or remote one, with serious crime. Furthermore, it does not provide for any exception, with the result that it applies even to persons whose communications are subject, according to rules of national law, to the obligation of professional secrecy. 59      Moreover, whilst seeking to contribute to the fight against serious crime, Directive 2006/24 does not require any relationship between the data whose retention is provided for and a threat to public security and, in particular, it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.
  • 1        These requests for a preliminary ruling concern the validity of Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC (OJ 2006 L 105, p. 54).
  • Digital Rights Ireland Ltd (C‑293/12)vMinister for Communications, Marine and Natural Resources,Minister for Justice, Equality and Law Reform,Commissioner of the Garda Síochána,Ireland,The Attorney General,intervener:Irish Human Rights Commission, andKärntner Landesregierung (C‑594/12),Michael Seitlinger,Christof Tschohl and others,
  • JUDGMENT OF THE COURT (Grand Chamber)8 April 2014 (*)(Electronic communications — Directive 2006/24/EC — Publicly available electronic communications services or public communications networks services — Retention of data generated or processed in connection with the provision of such services — Validity — Articles 7, 8 and 11 of the Charter of Fundamental Rights of the European Union)In Joined Cases C‑293/12 and C‑594/12,
  • 34      As a result, the obligation imposed by Articles 3 and 6 of Directive 2006/24 on providers of publicly available electronic communications services or of public communications networks to retain, for a certain period, data relating to a person’s private life and to his communications, such as those referred to in Article 5 of the directive, constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter. 35      Furthermore, the access of the competent national authorities to the data constitutes a further interference with that fundamental right (see, as regards Article 8 of the ECHR, Eur. Court H.R., Leander v. Sweden, 26 March 1987, § 48, Series A no 116; Rotaru v. Romania [GC], no. 28341/95, § 46, ECHR 2000-V; and Weber and Saravia v. Germany (dec.), no. 54934/00, § 79, ECHR 2006-XI). Accordingly, Articles 4 and 8 of Directive 2006/24 laying down rules relating to the access of the competent national authorities to the data also constitute an interference with the rights guaranteed by Article 7 of the Charter. 36      Likewise, Directive 2006/24 constitutes an interference with the fundamental right to the protection of personal data guaranteed by Article 8 of the Charter because it provides for the processing of personal data.
  • 65      It follows from the above that Directive 2006/24 does not lay down clear and precise rules governing the extent of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter. It must therefore be held that Directive 2006/24 entails a wide-ranging and particularly serious interference with those fundamental rights in the legal order of the EU, without such an interference being precisely circumscribed by provisions to ensure that it is actually limited to what is strictly necessary.66      Moreover, as far as concerns the rules relating to the security and protection of data retained by providers of publicly available electronic communications services or of public communications networks, it must be held that Directive 2006/24 does not provide for sufficient safeguards, as required by Article 8 of the Charter, to ensure effective protection of the data retained against the risk of abuse and against any unlawful access and use of that data. In the first place, Article 7 of Directive 2006/24 does not lay down rules which are specific and adapted to (i) the vast quantity of data whose retention is required by that directive, (ii) the sensitive nature of that data and (iii) the risk of unlawful access to that data, rules which would serve, in particular, to govern the protection and security of the data in question in a clear and strict manner in order to ensure their full integrity and confidentiality. Furthermore, a specific obligation on Member States to establish such rules has also not been laid down.
  • 60      Secondly, not only is there a general absence of limits in Directive 2006/24 but Directive 2006/24 also fails to lay down any objective criterion by which to determine the limits of the access of the competent national authorities to the data and their subsequent use for the purposes of prevention, detection or criminal prosecutions concerning offences that, in view of the extent and seriousness of the interference with the fundamental rights enshrined in Articles 7 and 8 of the Charter, may be considered to be sufficiently serious to justify such an interference. On the contrary, Directive 2006/24 simply refers, in Article 1(1), in a general manner to serious crime, as defined by each Member State in its national law.61      Furthermore, Directive 2006/24 does not contain substantive and procedural conditions relating to the access of the competent national authorities to the data and to their subsequent use. Article 4 of the directive, which governs the access of those authorities to the data retained, does not expressly provide that that access and the subsequent use of the data in question must be strictly restricted to the purpose of preventing and detecting precisely defined serious offences or of conducting criminal prosecutions relating thereto; it merely provides that each Member State is to define the procedures to be followed and the conditions to be fulfilled in order to gain access to the retained data in accordance with necessity and proportionality requirements.
  • 55      The need for such safeguards is all the greater where, as laid down in Directive 2006/24, personal data are subjected to automatic processing and where there is a significant risk of unlawful access to those data (see, by analogy, as regards Article 8 of the ECHR, S. and Marper v. the United Kingdom, § 103, and M. K. v. France, 18 April 2013, no. 19522/09, § 35).56      As for the question of whether the interference caused by Directive 2006/24 is limited to what is strictly necessary, it should be observed that, in accordance with Article 3 read in conjunction with Article 5(1) of that directive, the directive requires the retention of all traffic data concerning fixed telephony, mobile telephony, Internet access, Internet e-mail and Internet telephony. It therefore applies to all means of electronic communication, the use of which is very widespread and of growing importance in people’s everyday lives. Furthermore, in accordance with Article 3 of Directive 2006/24, the directive covers all subscribers and registered users. It therefore entails an interference with the fundamental rights of practically the entire European population. 57      In this respect, it must be noted, first, that Directive 2006/24 covers, in a generalised manner, all persons and all means of electronic communication as well as all traffic data without any differentiation, limitation or exception being made in the light of the objective of fighting against serious crime.
  • 62      In particular, Directive 2006/24 does not lay down any objective criterion by which the number of persons authorised to access and subsequently use the data retained is limited to what is strictly necessary in the light of the objective pursued. Above all, the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data and their use to what is strictly necessary for the purpose of attaining the objective pursued and which intervenes following a reasoned request of those authorities submitted within the framework of procedures of prevention, detection or criminal prosecutions. Nor does it lay down a specific obligation on Member States designed to establish such limits. 63      Thirdly, so far as concerns the data retention period, Article 6 of Directive 2006/24 requires that those data be retained for a period of at least six months, without any distinction being made between the categories of data set out in Article 5 of that directive on the basis of their possible usefulness for the purposes of the objective pursued or according to the persons concerned.64      Furthermore, that period is set at between a minimum of 6 months and a maximum of 24 months, but it is not stated that the determination of the period of retention must be based on objective criteria in order to ensure that it is limited to what is strictly necessary.
  • 52      So far as concerns the right to respect for private life, the protection of that fundamental right requires, according to the Court’s settled case-law, in any event, that derogations and limitations in relation to the protection of personal data must apply only in so far as is strictly necessary (Case C‑473/12 IPI EU:C:2013:715, paragraph 39 and the case-law cited).53      In that regard, it should be noted that the protection of personal data resulting from the explicit obligation laid down in Article 8(1) of the Charter is especially important for the right to respect for private life enshrined in Article 7 of the Charter.54      Consequently, the EU legislation in question must lay down clear and precise rules governing the scope and application of the measure in question and imposing minimum safeguards so that the persons whose data have been retained have sufficient guarantees to effectively protect their personal data against the risk of abuse and against any unlawful access and use of that data (see, by analogy, as regards Article 8 of the ECHR, Eur. Court H.R., Liberty and Others v. the United Kingdom, 1 July 2008, no. 58243/00, § 62 and 63; Rotaru v. Romania, § 57 to 59, and S. and Marper v. the United Kingdom, § 99).
  • 26      In that regard, it should be observed that the data which providers of publicly available electronic communications services or of public communications networks must retain, pursuant to Articles 3 and 5 of Directive 2006/24, include data necessary to trace and identify the source of a communication and its destination, to identify the date, time, duration and type of a communication, to identify users’ communication equipment, and to identify the location of mobile communication equipment, data which consist, inter alia, of the name and address of the subscriber or registered user, the calling telephone number, the number called and an IP address for Internet services. Those data make it possible, in particular, to know the identity of the person with whom a subscriber or registered user has communicated and by what means, and to identify the time of the communication as well as the place from which that communication took place. They also make it possible to know the frequency of the communications of the subscriber or registered user with certain persons during a given period. 27      Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.
  • 32      By requiring the retention of the data listed in Article 5(1) of Directive 2006/24 and by allowing the competent national authorities to access those data, Directive 2006/24, as the Advocate General has pointed out, in particular, in paragraphs 39 and 40 of his Opinion, derogates from the system of protection of the right to privacy established by Directives 95/46 and 2002/58 with regard to the processing of personal data in the electronic communications sector, directives which provided for the confidentiality of communications and of traffic data as well as the obligation to erase or make those data anonymous where they are no longer needed for the purpose of the transmission of a communication, unless they are necessary for billing purposes and only for as long as so necessary.
  • On those grounds, the Court (Grand Chamber) hereby rules:Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC is invalid.
  •  
    EU Court of Justice decision in regard to a Directive that required communications data retention by telcos/ISPs, finding the Directive invalid as a violation of the right of privacy in communications. Fairly read, paragraph 59 outlaws bulk collection of such records, i.e., it requires the equivalent of a judge-issued search warrant in the U.S. based on probable cause to believe that the particular individual's communications are a legitimate object of a search.  Note also that paragraph 67 effectively forbids transfer of any retained data outside the E.U. So a barrier for NSA sharing of data with GCHQ derived from communications NSA collects from EU communications traffic. Bye-bye, Big Data for GCHQ in the E.U. 
Paul Merrell

Saudi Arabia threatens to blockade Qatar over terrorism - The Irish Times - Tue, Mar 11, 2014 - 0 views

  • Saudi Arabia has threatened to blockade neighbouring Qatar by air, land and sea unless Doha cuts ties with Egypt’s Muslim Brotherhood, closes global channel al-Jazeera, and expels local branches of the US Brookings Institution and Rand Corporation think tanks. The threat was issued by Riyadh before it withdrew its ambassador to Doha and branded as “terrorist organisations” the brotherhood, Lebanon’s Hizbullah and al-Qaeda-linked Islamic State of Iraq and Syria and Jabhat al-Nusra. Although the kingdom has long been the font of Sunni ultra-orthodox Salafism and jihadism, it now seeks to contain radical movements and media and other organisations giving them publicity.
  • King Abdullah has decreed that any Saudi who fights abroad could be jailed for 20-30 years, and those who join, endorse or provide moral or material support to groups classified as “terrorist” or “extremist” will risk prison sentences of five to 30 years. The decree followed the gazetting of a sweeping new anti- terrorism law prohibiting acts that disturb public order, promote insecurity, undermine national unity or harm the reputation of the kingdom.
  • While the law and decree are meant to curb jihadi operations on Saudi soil as well as counter non-jihadi dissidence, these legal instruments appear to contradict government policy on foreign jihad. While 400 Saudis have returned home from Syrian battlefields, another 1,000-2,000 are believed to be fighting with jihadi groups funded by the government as well as wealthy Saudis, Kuwaitis and Qataris. An informed source speculated the decree sends a message to Saudis: “Don’t come home. Fight unto death or victory.” For half a century Saudi Arabia used its oil wealth to promote Muslim fundamentalists, notably the brotherhood and its offshoots, to counter the secular pan-Arab nationalism preached by Egyptian president Gamal Abdel Nasser and the Syrian and Iraqi Baath parties.
  • ...1 more annotation...
  • Fearing blowback from Saudi jihadis engaged in the Syrian war, Riyadh has recently given the Syrian file to the interior minister Prince Mohamed bin Nayef, who has been in charge of an anti-terrorism campaign in the kingdom and Yemen, replacing intelligence chief Prince Bandar bin Sultan. The Wall Street Journal has quoted a key Saudi source who said the shift suggests that Riyadh could rely more on diplomatic than military means by exerting pressure on Russia, Iran and Hizbullah, Damascus’s chief supporters, to resolve the conflict by removing President Bashar al-Assad. Nevertheless, Riyadh also favours providing shoulder-fired anti-aircraft missiles to “vetted” rebels, well aware these weapons could fall into al-Qaeda hands.
  •  
    Time will tell whether the House of Saud is actually getting out of the terrorism business.
Paul Merrell

UK spy base GCHQ tapped Irish internet cables - 0 views

  • New documents released this week via the National Security Agency whistleblower Edward Snowden outline how Irish subsea telecommunications cables have been targeted by British intelligence. The documents detail a whole series of underwater cables – essentially the backbone that connects Ireland to the globe – that are being tapped. A document titled “Partner Cables” list the cables that Britain’s Government Communications Headquarters (GCHQ) has accessed or sought to access. The commercial owners of the cables are identified by codenames.
  • The cables include the Solas undersea cable, which extends from the Wexford coast to southern Wales. The owner of the cable is listed as “GERONTIC”, the password for Cable & Wireless, which is now part of Vodafone. The method of access is described as “DCO” or Direct Cable Ownership.
  • British intelligence also access the Hibernia cable, which connects Ireland to the US and Canada from Dublin to Halifax, Nova Scotia. It loops to the UK via Southport, on the other side of the Irish Sea. It is listed as a cable to which GCHQ does not “currently have good access”. According to the documents, the only providers assisting GCHQ with access to the Hibernia cable are called “VITREOUS” and “LITTLE”. They provide what’s called IRU/LC or “Indefeasible Rights of Use/Lit Capacity” access. An Irish company linked to the VITREOUS codename last night denied involvement.
  • ...2 more annotations...
  • A cable called ESAT 1, which goes from Kilmore Quay in Wexford and lands at Sennen Cove in Cornwall, is on the list, as is ESAT2, another cable that runs from Sandymount in Dublin to Southport, north of Liverpool in the UK. The German newspaper Süddeutsche Zeitung released the documents as part of its report on a new cache of documents from Mr Snowden. It focused on how telecom firm Cable & Wireless, which was acquired by Vodafone in 2012, “played a key role in establishing one of the Government Communications Headquarters’ (GCHQ) most controversial surveillance programmes”.
  • The newspaper said that according to the documents, Cable & Wireless “actively shaped and provided the most data to GCHQ mass surveillance programmes, and received millions of pounds in compensation”.Vodafone says it does not go beyond what is required under the law when responding to demands from any agency for access to customer data. Telecommunications companies can be legally compelled to co-operate with intelligence agencies in providing access to cables and also forbidden to disclose their involvement.
Paul Merrell

Keith Alexander Unplugged: on Bush/Obama, 1.7 million stolen documents and other matters - The Intercept - 0 views

  • The just-retired long-time NSA chief, Gen. Keith Alexander, recently traveled to Australia to give a remarkably long and wide-ranging interview with an extremely sycophantic “interviewer” with The Australian Financial Review. The resulting 17,000-word transcript and accompanying article form a model of uncritical stenography journalism, but Alexander clearly chose to do this because he is angry, resentful, and feeling unfairly treated, and the result is a pile of quotes that are worth examining, only a few of which are noted below:
  • How Edward Snowden managed to steal an alleged 1.7 million documents from the NSA. Sunday: http://t.co/gbrIu5yMcc — 60 Minutes (@60Minutes) December 13, 2013 Mike McConnell, the vice chairman of Booz Allen and former Director of National Intelligence in the Bush administration, then claimed that ”Snowden absconded with 1.7 million to 1.8 million documents.” Ever since then, that Snowden “stole” 1.7 or 1.8 million documents from the NSA has been repeated over and over again by US media outlets as verified fact. The Washington Post‘s Walter Pincus, citing an anonymous official source, purported to tell readers that “among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports”. Reuters frequently includes in its reports the unchallenged assertion that “Snowden was believed to have taken 1.7 million computerized documents.” Just this week, the global news agency told its readers that “Snowden was believed to have taken 1.7 million computerized documents.”
  • AFR: Can you now quantify the number of documents [Snowden] stole? Gen. Alexander: Well, I don’t think anybody really knows what he actually took with him, because the way he did it, we don’t have an accurate way of counting. What we do have an accurate way of counting is what he touched, what he may have downloaded, and that was more than a million documents. It’s hard to recall a better and clearer example of how mindless and uncritical the American media is when it comes to the unproven pronouncements of the U.S. Government. Back in December, 60 Minutes broadcast a now-notorious segment of pure access journalism in which they gullibly disseminated one false NSA claim after the next in exchange for being given exclusive(!) access to a few Secret and Exciting Rooms inside the agency’s headquarters. The program claimed that Snowden “is believed to still have access to 1.5 million classified documents he has not leaked”. On its Twitter account, 60 Minutes made this claim to promote its show:
  • ...2 more annotations...
  • In fact, that number is and always has been a pure fabrication, as even Keith Alexander admits. The claimed number has changed more times than one can count: always magically morphing into randomly chosen higher and scarier numbers. The reality, in the words of the General, is that the US Government ”really [doesn7;t] know[] what he actually took with him” and they ”don’t have an accurate way of counting”. All they know is how many documents he accessed in his entire career at NSA, which is a radically different question from how many documents he took. But that hasn’t stopped American media outlets from repeatedly affirming the inflammatory evidence-free claim that Snowden took 1.7 million documents. As usual, even the most blatantly unreliable claims from National Security State officials are treated as infallible papal pronouncements by our Adversarial Watchdog Press. There’s an equally vital point made by Alexander’s admission. The primary defense of the NSA and its defenders is that one need not worry about the staggering sums of data they collect because they have implemented very rigorous oversight mechanisms and controls that prevent abuse. Yet Edward Snowden spent months downloading a large amount of highly sensitive documents right under their noses. And not only did they have no idea that he was doing it, but now – even after spending large sums of money to find out – they are still completely incapable of learning which documents he took or even how many he took. Does that at all sound like a well-managed, tightly controlled system that you can trust to safeguard your most personal data and to detect and prevent abuse of this system by the tens of thousands of people who have access to it?
  • The release date for my book on the NSA, privacy, and our reporting of the surveillance story, No Place to Hide, is next Tuesday, May 13, at which time all of the previously unpublished NSA documents that are reported on in the book will be placed online, with free access, at the book’s website.
Paul Merrell

Ten Years Ago: The London 7/7 Mock Terror Drill: What Relationship to the Real Time Terror Attacks? | nsnbc international - 0 views

  • uly 7, 2005, ten years ago, the London 7/7 bombings. Was there advanced knowledge of the attacks? Was it a conspiracy? The following text was first published by Global Research on August 8, 2005 A fictional “scenario” of multiple bomb attacks on London’s underground took place at exactly the same time as the bomb attack on July 7, 2005.
  • Peter Power, Managing Director of Visor Consultants, a private firm on contract to the London Metropolitan Police, described in a BBC interview how he had organized and conducted the anti-terror drill, on behalf of an unnamed business client. The fictional scenario was based on simultaneous bombs going off at exactly the same time at the underground stations where the real attacks were occurring:
Gary Edwards

911: Lloyds of London Insurance brokers have sued Citigroup-AMEC et al. in respect of the destruction of WTC#7 - 1 views

  • We allege the Citigroup-AMEC partners sabotaged the diesel generators to feed fires lit by arsonists on the 11th, 12th or 13th floors of WTC7 where the Securities & Exchange Commission lost between 3,000 to 4,000 files. The SEC files contained evidence of insider trading by Citigroup-AMEC investment bank partners in the shares of initial public offerings during the high-tech boom. The House Financial Services Committee was seeking information about the treatment Citigroup7;s Salmon Smith Barney investing banking division may have given WorldCom executives. Salomon had offices in 7 World Trade Center and Citigroup says back-up tapes of corporate emails from September 1998 through December 2000 were stored at the building and destroyed in 9/11. Citigroup subsequently paid $2.65 billion to the settlement class which purchased WorldCom securities during the period from April 1999 through June 2002. www.thestreet.com/markets...36925.html www.citigroup.com/citigro...40510a.htm
  • At 5:20 p.m. on 9/11, 7 World Trade Center collapsed in its own footprint at a speed slightly slower than free fall under gravity in a manner consistent with a controlled demolition. Molten steel and partially evaporated steel members were found in the debris pile of WTC #1, 2 and 7. The thermal signature of 32 hot spots, 5 days and 10 days after the collapse, is consistent with all the buildings being rigged for demolition with an incendiary such as thermite.
  • We allege that the Citigroup-AMEC partnership now conspired to remove and destroy evidence of arson before filing bogus property insurance claims in an arrangement with Larry Silverstein and Silverstein Properties, including a claim for a double payment for the destruction of the Twin Towers. "Griffin quotes court documents to the effect that Silverstein had only $14 million invested in the insurance deal for the Twin Towers (compared to 50 times as much by his [off-book] lenders) through limited liability investment vehicles."
  •  
    Incredible.  In 2006 Lloyd's of London sued a group comprised of Citigroup, AMEC and GMAC for a "concealed demolition" conspiracy resulting in insurance fraud.  This is complicated, but the key assertion is that World Trade Center building #1, #2, and #7 were rigged for demolition prior to the 9/11/01 attack.  The claim also alleges the involvement of Larry Silverstein, who had purchased these buildings a few months prior to the 9/11 attack, and made the subsequent and fraudulent insurance claim. Based on the Lloyd's of London report: "9/11 - A Citigroup-AMEC insurance fraud on Lloyd's of London?" .. by David Hawkins, Foundation Scholar, Cambridge University, Founder of the Citizen's Association of Forensic Economists at Hawks' CAFE .
Paul Merrell

Afghan Holocaust, Afghan Genocide - 0 views

  • This site is dedicated to informing people about the ongoing, US Alliance-imposed Afghan Holocaust and Afghan Genocide that as of 2012 is associated with post-2001 violent and non-violent avoidable deaths totalling 7.2  million and Afghan and Pashtun refugees totalling 5-6 million – an Afghan Holocaust ( a huge number of deaths) and an Afghan Genocide as defined by Article 2 of the UN Geneva Convention (see: http://www.edwebproject.org/sideshow/genocide/convention.html ) which states: “In the present Convention, genocide means any of the following acts committed with intent to destroy, in whole or in part, a national, ethnic, racial or religious group, as such: a) Killing members of the group; b) Causing serious bodily or mental harm to members of the group; c) Deliberately inflicting on the group conditions of life calculated to bring about its physical destruction in whole or in part; d) Imposing measures intended to prevent births within the group; e) Forcibly transferring children of the group to another group.”Also utterly ignored by Neocon American and Zionist  Imperialist (NAZI)-perverted and subverted Western Mainstream media are the 1.2 million people who have died world-wide since 9-11 due to US Alliance restoration of the Taliban-destroyed Afghan opium industry from 6% of world market share in 2001 to 93% in 2007, the breakdown (as of 2015)  including 280,000 Americans, 256,000 Indonesians, 68,000 Iranians, 25,000 British, 14,000 Canadians, 10,000 Germans, 5,000 Australians and 500 French.
  • As of January 2014  deaths from the Afghanistan War include approximately 7 million violent and non-violent excess deaths of Indigenous Afghans since 2001 and 3,417 US Alliance deaths (see: http://icasualties.org/oif/ ).As of January  2014 it is estimated from the latest UN Population Division data that in Occupied Afghanistan post-invasion non-violent excess deaths total 5.5 million.  Assuming expert US-Australian advice that the level of violence has been 4 times lower in the Afghan War than in the Iraq War where the ratio of violent deaths to non-violent avoidable deaths was 1.5 million/1.2million = 1.25, then post-invasion violent deaths in Afghanistan can be estimated at 1.25 x 5.5 million/4 = 1.7 million. Post-invasion violent and non-violent avoidable deaths total 5.5 million plus 1.7 million = 7.2 million; and post-invasion under-5 infant deaths total 3.0 million (90% avoidable and due to US Alliance war crimes in gross violence of the Geneva Convention – Articles 55 and 56 of the Geneva Convention Relative to the Protection of Civilian Persons in Time of War demand that an Occupier must supply life-sustaining food and medical requisites “to the fullest extent of the means available to it” (see: http://www1.umn.edu/humanrts/instree/y4gcpcp.htm ) but according to the WHO (see: http://www.who.int/countries/en/ ) the “total annual expenditure on health per capita” permitted in Occupied Afghanistan is $50 as compared to $8,608 in Occupier US, $3,322 in Occupier UK, $4.086 in Occupier France, $4,371 in Occupier Germany  and $3,692  in Occupier racist, white Apartheid Australia).  
  • There are 3-4 million Afghan refugees plus a further 2.5 million Pashtun refugees generated in NW Pakistan by the obscene war policies of war criminal Nobel Peace Prize Laureate Obama – this carnage involving 4.5 million post-invasion violent and non-violent excess Afghan deaths constitutes an Afghan Holocaust and an Afghan Genocide as defined by Article 2 of the UN Genocide Convention (see: http://www.edwebproject.org/sideshow/genocide/convention.html ).
  • ...6 more annotations...
  • As of January 2014  2009 it was estimated from the latest UN Population Division data that in Occupied Afghanistan post-invasion non-violent excess deaths totalled 5.5 million and post-invasion violent deaths totalled 1.7 million (this based on assuming expert US-Australian advice that the level of violence has been 4 times lower in the Afghan War than in the Iraq War).
  • The US Alliance restored the Taliban-destroyed Afghan opium industry from about 6% of world market share in 2001 to 93% in 2007 (see UNODC World Drug Report 2007: http://www.unodc.org/unodc/en/data-and-analysis/WDR-2007.html and World Drug Report 2009: http://www.unodc.org/unodc/en/data-and-analysis/WDR-2009.html   and World Drug Report , Opium/heroin market, 2009: http://www.unodc.org/documents/wdr/WDR_2009/WDR2009_Opium_Heroin_Market.pdf ).
  • About 0.1 million people die from opiate drug-related causes each year (see Australian National Drug Research Centre: http://db.ndri.curtin.edu.au/media.asp?mediarelid=40 ; UN Office on Drugs and Crime (UNODC), “Addiction, crime and insurgency. The transnational threat of Afghan opium”, 2009: http://www.unodc.org/documents/data-and-analysis/Afghanistan/Afghan_Opium_Trade_2009_web.pdf ) and hence about 0.8 million have died since the invasion of Afghanistan in October 2001, of whom about 90%, i.e. 0.9 x 0.8 million = 0.7 million people, have died as a result of the huge expansion of the Afghan opium industry under US Alliance occupation. In 2005 in the US, of 18,347 deaths due to narcotics and psychodysleptics, 12, 262 were due to heroin (2,011), other opioids (5,789) or methadone (4,462) (see Health E-stat, “Increases in poisoning and methadone-related deaths: United States,1999-2005 “: http://www.cdc.gov/nchs/data/hestat/poisoning/poisoning.pdf  ) . Given the over 90% contribution of the US restoration of the Taliban-destroyed opium industry to world illicit heroin production, and the interconnectedness and effective indistinguishability of "Afghan-derived heroin" from the "pool" of other abusively-used opiates, one can accordingly crudely estimate 0.9 x 12,262 persons/year x 8 years = 88,286 US opiate drug-related deaths (0.9 x 2,011 deaths/year x 8 years = 14,479 heroin-related deaths) connected with the aftermath of the US invasion and occupation of Afghanistan.
  • Global deaths from violent priorities and ignoring Developing World poverty. Professor John Holdren (Professor of Environmental Policy at the Kennedy School of Government at Harvard University; Director of the Woods Hole Research Center;  recent Chairman of the American Association for the Advancement of Science) identified nuclear weapons, poverty and global warming as the three biggest threats facing Humanity (see: http://www.aaas.org/news/releases/2007/0216am_holdren_address.shtml ). The US military budget is now about $1 trillion per annum (see: http://en.wikipedia.org/wiki/Military_budget_of_the_United_States ) and 2001 Economics Nobel Laureate and former World Bank Chief Economist, Professor Joseph Stiglitz (Columbia University) has estimated that the accrual cost (long-term committed cost as opposed to the shirt-term budgeted cost) of the Iraq War is about $3 trillion (see: http://www.abc.net.au/lateline/content/2007/s2236161.htm and “The Three Trillion Dollar War” by Joseph Stiglitz). In 2009, funds for war had been equally distributed between Iraq and Afghanistan, which each received $700 million. But in 2010, the bulk of the funds - $1.2 billion dollars will go to Afghanistan (see: http://www.defencetalk.com/afghan-war-costs-to-overtake-iraq-in-2010-pentagon-18679/ ). The budgeted cost from Congress of the Afghan War is estimated to have been $38 billion (see: http://www.asianews.it/index.php?l=en&art=16570
  • Poverty results in the deaths of 16 million people annually (including 9.5 million under-5 year old infants) from deprivation and deprivation exacerbated disease (2003 data; see Gideon Polya, “Body Count. Global avoidable mortality since 1950”, G.M. Polya, Melbourne, 2007). yet high female literacy, good governance, good primary health care and a modest increase in economic security could abolish this global avoidable mortality holocaust. It is estimated that the simple expedient of increasing the per capita of all countries to about $1000 would cost only $1.4 trillion, roughly the annual global “defence” budget and about 2.65 of global GNP (2003) ( p169,  Gideon Polya, “Body Count. Global avoidable mortality since 1950”). Global deaths from worsening climate genocide. Both Dr James Lovelock FRS (Gaia hypothesis) and Professor Kevin Anderson ( Director, Tyndall Centre for Climate Change Research, University of Manchester, UK) have recently estimated that fewer than 1 billion people will survive this century due to unaddressed, man-made global warming – noting that the world population is expected to reach 9.5 billion by 2050, these estimates translate to a climate genocide involving deaths of 10 billion people this century, this including 6 billion under-5 year old infants, 3 billion Muslims, 2 billion Indians, 0.5 billion Bengalis, 0.3 billion Pakistanis and 0.3 billion Bangladeshis (see “Climate Genocide”: http://sites.google.com/site/climategenocide/ ).
  • US Alliance war policies in a swathe of countries from Occupied Haiti to Occupied Afghanistan and NW Pakistan, coupled with similarly greedy and  racist US Alliance global warming policies, oppose and prevent global equity and will ultimately kill 10 billion non-Europeans this century.
  •  
    Nauseating statistics. Site also has stats for Palestine and Iraq.
Gary Edwards

Romney Did Not Lose - 0 views

  •  
    excerpt: I'm still formulating how I need to proceed in light of this new understanding, but what I know, and what I need to factor into my future calculations is the fact that we - the people who love our country and favor fiscal sanity and subscribe to the ideals of the Founders - are not outnumbered. We remain in the majority. I can't remember ever having been here. I grew up in the '60s, but served in the military rather than in Haight-Ashbury. I raised my family to be responsible and self-sufficient, just as my parents did. I guess you could say I was more or less aligned with the "establishment" of the day, even though I have for years disagreed with the trend toward more socialism and fascism. Today, the Establishment has crossed a line. They have arrayed themselves against the majority of the American people. I won't be joining them. I won't be agreeing with them. I won't be accepting their "truth." I will, instead, stand for my truth. And I suspect I am not alone. The usurpers (for I can't reasonably refer to them otherwise) are now the "establishment" even though they are really in the minority. So… that makes us… what? Well, what do you call someone who stands against the Establishment? Feels kinda odd to be in those shoes, doesn't it? Welcome to the Resistance. ......................... ...................................... Historical data on 56 previous elections indicate at least 15 to 20 million votes flipped and missing. Data available for everyone right in front of our eyes. Out of 56 presidential elections there were only 7 elections that voter turn out was down from previous elections. The combined total for all 7 elections is 13,428,613 or 0.73% out of all 56 elections generating 1,835,207,811 votes. These 7 elections had events such as war of 1812, civil war, ww2, stock market crash attached to declines in voter turn out. The average growth in all presidential elections is 2,892,573 per election. The
Gary Edwards

The List: Unnecessarily Shut Down by Obama to Inflict Public Pain - 0 views

  •  
    "The media may or may not report on these individual occurrences, but what they will never do is provide the American people with the full context and scope of Obama's shrill pettiness. Below is a list of illogical, unnecessary, and shockingly spiteful moves our government is making in the name of essential and non-essential. This list will be regularly updated, and if you have something you feel should be added, please email me at jnolte@breitbart.com or tweet me @NolteNC.Please include a link to the news source. -- 1. Treatments for Children Suffering From Cancer - The GOP have agreed to a compromise by funding part of the government, including the National Institutes of Health, which offers children with cancer last-chance experimental treatment. Obama has threatened to veto this funding. 2. The World War II Memorial - The WWII memorial on the DC Mall is a 24/7 open-air memorial that is not regularly staffed. Although the White House must have known that WWII veterans in their eighties and nineties had already booked flights to visit this memorial, the White House still found the resources to spitefully barricade the attraction.  The Republican National Committee has offered to cover any costs required to keep the memorial open. The White House refused. Moreover, like the NIH, the GOP will pass a compromise bill that would fund America's national parks. Obama has threatened to veto that bill. 3. Furloughed Military Chaplains Not Allowed to Work for Free - Furloughed military chaplains willing to celebrate Mass and baptisms for free have been told they will be punished for doing so. 4. Business Stops In Florida Keys - Although the GOP have agreed to compromise in the ongoing budget stalemate and fund the parks, Obama has threatened to veto that funding. As a result, small businesses, hunters, and commercial fisherman can't practice their trade. While the feds have deemed the personnel necessary to keep this area open "non-essential," the "enforcement office
Paul Merrell

WikiLeaks: Clinton Campaign Panics After Obama7;s Statements On Private Email Server - 0 views

  • An email hacked from the private Gmail account of John Podesta, Hillary Clinton’s campaign chair, is raising new questions about when President Barack Obama found out about Clinton’s private email server. In a March 7, 2015 interview with CBS News’ senior White House correspondent Bill Plante, Obama said he hadn’t been aware of Clinton’s use of a private email server during her time as secretary of state until “the same time everybody else learned it through news reports.”
  • On Tuesday, WikiLeaks’ highlighted a March 7, 2015 email found in its archives of Podesta’s emails, writing: “Clinton campaign panics after Obama misleads public over Clinton emails.”
  • In the original email sent shortly after the CBS interview aired, Josh Schwerin, spokesperson for Hillary For America, Clinton’s 2016 presidential campaign, alerted Jennifer Palmieri, the campaign’s director of communications, about Obama’s statements. Schwerin wrote: “Jen you probably have more on this but it looks like POTUS just said he found out HRC was using her personal email when he saw it in the news.” The email also includes a link to a March 7, 2015 tweet from Katherine Miller, a political editor at Buzzfeed. “I have some questions here,” she wrote about Obama’s statement.
  • ...1 more annotation...
  • Schwerin’s email was also sent to Nicholas Merrill, Clinton’s traveling press secretary, and other close Clinton associates. Merrill, in turn, forwarded the email to Cheryl Mills, former White House counsel to Bill Clinton and a top aide to Hillary Clinton. Hours later, Mills forwarded the email chain to Podesta, writing: “we need to clean this up – he has emails from her – they do not say state.gov” On Tuesday, Jon Scott, host of Fox News’ “Happening Now,” said the email showed Mills going into “damage control mode.” He added: “That is going to be the matter of some discussion, you would imagine, on Capitol Hill. What the president told the world versus what he may have known or perhaps should have known.” Some conservative news sources have suggested the email chain shows the president lied or was involved in a cover-up about Clinton’s private email server.
Paul Merrell

Secret program at secret Guantánamo prison hears everything | Miami Herald - 0 views

  • A secret Defense Department program provides unfettered eavesdropping on the accused terrorists imprisoned at Guantánamo’s clandestine Camp 7 lockup, recently released war court documents show.Army Col. James L. Pohl, the judge in 9/11 trial, discovered the existence of the secret surveillance program during a recent war court hearing. Little is publicly known about the program, not even its unclassified two-word nickname.
  • The disclosure of pervasive eavesdropping at Guantánamo’s lockup for 14 former CIA prisoners comes in before-and-after documents released by the court from the recent Oct. 19-30 pretrial hearings in the death-penalty case of five men accused of orchestrating the hijackings that killed nearly 3,000 people on Sept. 11, 2001.At issue was accused 9/11 plotter Walid bin Attash’s request for guidance on how he could function as his own attorney. Bin Attash is a Yemeni in his mid-30s who is accused of training some of the hijackers. “You must assume anything you say in Camp 7 is not confidential and will be disclosed to the U.S. Government,” warns an Oct. 23 draft of the advisory, crafted after the judge was informed of the covert program. “Only when you are in Echo 2 will anything you say be covered by the attorney-client privilege.”An Oct. 20 draft of the advisory omits those lines.
  • This is not the first time in the proceedings that a surveillance program caught Pohl by surprise. In January 2013, he ordered the CIA to unplug a button that allowed an unseen observer to cut the court’s audio feed to the public. Perhaps ironically, the lone site the judge considers safe for consultative trial preparation — the Camp Echo compound of wooden huts, each containing a cell — at one time had covert recording devices that looked like smoke detectors. The judge ordered them disabled in February 2013.Attorney Dror Ladin of the American Civil Liberties Union, who was an observer at the Guantánamo hearings last month, said the apparent disclosure of “pervasive surveillance at Camp 7” is the latest issue to challenge the possibility of a fair trial.“It is shocking that for years neither defense counsel nor the judge were made aware that the government was capturing everything said aloud by the detainees there,” he said Thursday. It also adds to mounting questions of “how these military commissions can produce a fair result,” said Ladin, especially if one of the men represents himself. “These are detainees who really can’t see the evidence against them and simultaneously have been provided no rehabilitation services for the torture they suffered for years. It would be astonishing if any of them could craft a fair defense for capital charges.”
  • ...3 more annotations...
  • A defense attorney in another case said the prosecution wants to use a surreptitiously recorded conversation between two Camp 7 captives against an alleged al-Qaida commander. And in 2012 the journalist Daniel Klaidman wrote in his book “Kill or Capture” that the U.S. government had recordings made in a Guantánamo prison recreation yard of the alleged Sept. 11 mastermind Khalid Sheik Mohammed talking about evidence that could be used against him.The latest disclosure comes at a time of decreasing transparency at the war court.On Oct. 29, the judge held a 13-minute secret session without advanced notice to the public. A day later the judge wrote in a three-page ruling that he closed the court at the request of “the Government” — war-court-speak for the prosecution — to protect state secrets whose disclosure “could result in grave danger to national security.”Pohl also ordered the court to issue a censored transcript of the parts the excluded public and accused would be allowed to see. No transcript has been released.Then the next day, Oct. 30, the judge held a daylong, open hearing on a restraining order he issued forbidding female guards from touching the 9/11 accused when they are being taken to court or legal meetings. The judge’s order has outraged members of Congress and the Pentagon brass.
  • In that public court hearing, soldiers called as witnesses from the prison discussed staffing patterns at Camp 7. Normally the Pentagon releases transcripts of open hearings the same day. Unusually, the court has not yet released the Oct. 30 transcript. A Pentagon spokesman suggested Thursday — 13 days after the open court hearing — that somebody was scrubbing the transcript of information already made public. “The security review of the Oct. 30 transcript remains ongoing,” said Navy Cmdr. Gary Ross. “We will provide an update once additional information becomes available.”Much of the October session focused on bin Attash’s question about how he’d act as his own lawyer in a system that does not let the accused terrorist see classified information in the case. The judge and attorneys devoted days to designing a script Pohl would read to any accused 9/11 terrorist who tries to take charge of his defense — and spent a full afternoon huddling in a closed meeting on the secret program.
  • In it, Pohl made clear that he never intended to let bin Attash dismiss his Pentagon-paid defense attorneys — Chicago criminal defense attorney Cheryl Bormann and Air Force Maj. Michael Schwartz. Instead, the script shows Pohl planned to appoint Bormann and Schwartz as “standby counsel” the judge could activate to carry out cross-examination of certain witnesses who might have “particular sensitivities” to being questioned by the alleged terrorist.“If you are represented by lawyers, then it is the lawyers, and not you, who will conduct the defense,” the warning says. “Correspondingly, if you represent yourself, you will be able to perform the lawyer’s core functions, but you will not necessarily be allowed to direct special appearances by counsel when it is convenient to you.”The language suggests a far more limited role by the American lawyers than those carried out in an aborted attempt to hold the Sept. 11 trial during the Bush administration. In those proceedings, alleged 9/11 terrorists serving as their own lawyer regularly had standby counsel write and argue motions in court.The script also envisions a scenario in which an accused 9/11 plotter serving as his own lawyer becomes unruly, disruptive or disobedient rather than respect “the dignity of the courtroom.” In such a case, the judge said he could deal with “obstructionist misconduct” by putting “physical restraints” on bin Attash or ejecting him from the court.Bin Attash, for his part, has not been noticeably disruptive across years of pretrial proceedings. An amputee, he was brought to his May 5, 2012 arraignment in a Guantánamo prison restraint chair routinely used for forced-feeding of hunger strikers — with guards carrying his prosthetic leg separately.
  •  
    It's long past time to recognize that the military cannot provide a fair trial for GITMOI detainees, transfer them to the U.S., and try them in a civilian Article II court. If this kind of crap were going down before an Article II judge, those conducting the surveillance would be sitting in jail. 
Paul Merrell

Enron Corpus - Wikipedia, the free encyclopedia - 0 views

  • The Enron Corpus is a large database of over 600,000 emails generated by 158 employees[1] of the Enron Corporation and acquired by the Federal Energy Regulatory Commission during its investigation after the company7;s collapse.[2]
  • The Enron data was originally collected at Enron Corporation headquarters in Houston during two weeks in May 2002 by Joe Bartling,[3] a litigation support and data analysis contractor working for Aspen Systems, now Lockheed Martin, whom the Federal Energy Regulatory Commission (FERC) had hired to preserve and collect the vast amounts of data in the wake of the Enron Bankruptcy in December 2001. In addition to the Enron employee emails, all of Enron7;s enterprise database systems,[4] hosted in Oracle databases on Sun Microsystems servers, were also captured and preserved including its online energy trading platform, EnronOnline. Once collected, the Enron emails were processed and hosted in litigation platform Concordance, and then iCONECT, for the investigative team from the Federal Energy Regulatory Commission, the Commodity Futures Trading Commission, and Department of Justice investigators to review. At the conclusion of the investigation, and upon the issuance of the FERC staff report,[5] the emails and information collected were deemed to be in the public domain, to be used for historical research and academic purposes. The email archive was made publicly available and searchable via the web using iCONECT 24/7, but the sheer volume of email of over 160GB made it impractical to use. Copies of the collected emails and databases were made available on hard drives.
  • A copy of the email database was subsequently purchased for $10,000 by Andrew McCallum, a computer scientist at the University of Massachusetts Amherst.[6] He released this copy to researchers, providing a trove of data that has been used for studies on social networking and computer analysis of language.
  • ...1 more annotation...
  • The corpus is unique in that it is one of the only publicly available mass collections of real emails easily available for study, as such collections are typically bound by numerous privacy and legal restrictions which render them prohibitively difficult to access.[6] In 2010, EDRM.net published a revised version 2 of the corpus.[7] This expanded corpus, containing over 1.7 million messages, is now available on Amazon S3 for easy access to the research community. Jitesh Shetty and Jafar Adibi from the University of Southern California processed this corpus in 2004 and released a MySQL version[8] of it and also published some link analysis results based on this.[9]
Paul Merrell

Basic income - Wikipedia - 0 views

  • A basic income (also called basic income guarantee, Citizen7;s Income, unconditional basic income, universal basic income, or universal demogrant[2]) is a form of social security[3] in which all citizens or residents of a country regularly receive an unconditional sum of money, either from a government or some other public institution, in addition to any income received from elsewhere. An unconditional income transfer of less than the poverty line is sometimes referred to as a partial basic income. Basic income systems that are financed by the profits of publicly owned enterprises (often called social dividend, also known as citizen7;s dividend) are major components in many proposed models of market socialism.[4] Basic income schemes have also been promoted within the context of capitalist systems, where they would be financed through various forms of taxation.[5] Similar proposals for "capital grants provided at the age of majority" date to Thomas Paine7;s Agrarian Justice of 1795, there paired with asset-based egalitarianism. The phrase "social dividend" was commonly used as a synonym for basic income in the English-speaking world before 1986, after which the phrase "basic income" gained widespread currency.[6
  • Contents  [hide]  1 Policy aspects 1.1 Transparency 1.2 Administrative efficiency 1.3 Poverty reduction 1.4 Basic income and growth 1.5 Freedom 1.6 Work incentives 1.7 Affordability 1.7.1 Key principles 1.7.2 Case studies 2 Pilot programs 3 Basic income and ideology 3.1 Economic perspectives 3.2 Georgist views 3.3 Right-wing views 3.4 Feminist views 3.5 Technological unemployment 4 Criticism 4.1 Economics research 4.2 Political debate 5 Worldwide 6 Advocates 6.1 Europe 6.2 The United States and Canada 6.3 Asia, Africa, Latin America, Oceania 7 Petitions and referendums 8 Public opinions 9 See also 10 References 11 Further reading 12 External links
  • Technological unemployment[edit] Concerns about automation and other causes of technological unemployment have caused many in the high-tech industry to turn to basic income proposals as a necessary implication of their business models. Journalist Nathan Schneider first highlighted the turn of the "tech elite" to these ideas with an article in Vice magazine, which cited figures such as Marc Andreessen, Sam Altman, Peter Diamandis, and others.[47] The White House, in a report to Congress, has put the probability at 83% that a worker making less than $20 an hour in 2010 will eventually lose their job to a machine. Even workers making as much as $40 an hour face odds of 31 percent.[48] To better address both the funding concerns and concerns about government control, one alternative model is that the cost and control would be distributed across the private sector instead of the public sector. Companies across the economy would be required to employ humans, but the job descriptions would be left to private innovation, and individuals would have to compete to be hired and retained. This would be a for-profit sector analog of basic income, that is, a market-based form of basic income. It differs from a job guarantee in that the government is not the employer (rather, companies are) and there is no aspect of having employees who "cannot be fired", a problem that interferes with economic dynamism. The economic salvation in this model is not that every individual is guaranteed a job, but rather just that enough jobs exist that massive unemployment is avoided and employment is no longer solely the privilege of only the very smartest or highly trained 20% of the population. Another option for a market-based form of basic income has been proposed by the Center for Economic and Social Justice (CESJ) as part of "a Just Third Way" (a Third Way with greater justice) through widely distributed power and liberty. Called the Capital Homestead Act,[49] it is reminiscent of James S. Albus7;s Peoples7; Capitalism[50][51] in that money creation and securities ownership are widely and directly distributed to individuals rather than flowing through, or being concentrated in, centralized or elite mechanisms.
  •  
    Coming to grips with the fact that we do and will not have jobs for everyone: Can basic-income replace the failed welfare state system?
Gary Edwards

Rand Paul7;s Tea Party Response: Full Text - 0 views

  • With my five-year budget, millions of jobs would be created by cutting the corporate income tax in half, by creating a flat personal income tax of 17%, and by cutting the regulations that are strangling American businesses.
  • America has much greatness left in her. We will begin to thrive again when we begin to believe in ourselves again, when we regain our respect for our founding documents, when we balance our budget, when we understand that capitalism and free markets and free individuals are what creates our nation’s prosperity.
  •  
    Outstanding statement about what made America great, an dhow are government is destroying that greatness.  This is the full Text of Sen. Rand Paul's Tea Party Response to Obama's State of the Union Address: I speak to you tonight from Washington, D.C. The state of our economy is tenuous but our people remain the greatest example of freedom and prosperity the world has ever known. People say America is exceptional. I agree, but it's not the complexion of our skin or the twists in our DNA that make us unique. America is exceptional because we were founded upon the notion that everyone should be free to pursue life, liberty, and happiness. For the first time in history, men and women were guaranteed a chance to succeed based NOT on who your parents were but on your own initiative and desire to work. We are in danger, though, of forgetting what made us great. The President seems to think the country can continue to borrow $50,000 per second. The President believes that we should just squeeze more money out of those who are working. The path we are on is not sustainable, but few in Congress or in this Administration seem to recognize that their actions are endangering the prosperity of this great nation. Ronald Reagan said, government is not the answer to the problem, government is the problem. Tonight, the President told the nation he disagrees. President Obama believes government is the solution: More government, more taxes, more debt. What the President fails to grasp is that the American system that rewards hard work is what made America so prosperous. What America needs is not Robin Hood but Adam Smith. In the year we won our independence, Adam Smith described what creates the Wealth of Nations. He described a limited government that largely did not interfere with individuals and their pursuit of happiness. All that we are, all that we wish to be is now threatened by the notion that you can have something for nothing, that you can have your cake and ea
Paul Merrell

Information Awareness Office - Wikipedia, the free encyclopedia - 0 views

  • The Information Awareness Office (IAO) was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security, by achieving Total Information Awareness (TIA). This would be achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant.[1] This information would then be analyzed to look for suspicious activities, connections between individuals, and "threats".[2] Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods.[2] Following public criticism that the development and deployment of this technology could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded, and merely run under different names.[3][4][5][6]
  • The IAO was established after Admiral John Poindexter, former United States National Security Advisor to President Ronald Reagan, and SAIC executive Brian Hicks approached the US Department of Defense with the idea for an information awareness program after the attacks of September 11, 2001.[5] Poindexter and Hicks had previously worked together on intelligence-technology programs for the Defense Advanced Research Projects Agency. DARPA agreed to host the program and appointed Poindexter to run it in 2002. The IAO began funding research and development of the Total Information Awareness (TIA) Program in February 2003 but renamed the program the Terrorism Information Awareness Program in May that year after an adverse media reaction to the program7;s implications for public surveillance. Although TIA was only one of several IAO projects, many critics and news reports conflated TIA with other related research projects of the IAO, with the result that TIA came in popular usage to stand for an entire subset of IAO programs. The TIA program itself was the "systems-level" program of the IAO that intended to integrate information technologies into a prototype system to provide tools to better detect, classify, and identify potential foreign terrorists with the goal to increase the probability that authorized agencies of the United States could preempt adverse actions. As a systems-level program of programs, TIA7;s goal was the creation of a "counterterrorism information architecture" that integrated technologies from other IAO programs (and elsewhere, as appropriate). The TIA program was researching, developing, and integrating technologies to virtually aggregate data, to follow subject-oriented link analysis, to develop descriptive and predictive models through data mining or human hypothesis, and to apply such models to additional datasets to identify terrorists and terrorist groups.
  • Among the other IAO programs that were intended to provide TIA with component data aggregation and automated analysis technologies were the Genisys, Genisys Privacy Protection, Evidence Extraction and Link Discovery, and Scalable Social Network Analysis programs. On August 2, 2002, Dr. Poindexter gave a speech at DARPAtech 2002 entitled "Overview of the Information Awareness Office"[7] in which he described the TIA program. In addition to the program itself, the involvement of Poindexter as director of the IAO also raised concerns among some, since he had been earlier convicted of lying to Congress and altering and destroying documents pertaining to the Iran-Contra Affair, although those convictions were later overturned on the grounds that the testimony used against him was protected.
  • ...1 more annotation...
  • On January 16, 2003, Senator Russ Feingold introduced legislation to suspend the activity of the IAO and the Total Information Awareness program pending a Congressional review of privacy issues involved.[8] A similar measure introduced by Senator Ron Wyden would have prohibited the IAO from operating within the United States unless specifically authorized to do so by Congress, and would have shut the IAO down entirely 60 days after passage unless either the Pentagon prepared a report to Congress assessing the impact of IAO activities on individual privacy and civil liberties or the President certified the program7;s research as vital to national security interests. In February 2003, Congress passed legislation suspending activities of the IAO pending a Congressional report of the office7;s activities (Consolidated Appropriations Resolution, 2003, No.108–7, Division M, §111(b) [signed Feb. 20, 2003]). In response to this legislation, DARPA provided Congress on May 20, 2003 with a report on its activities.[9] In this report, IAO changed the name of the program to the Terrorism Information Awareness Program and emphasized that the program was not designed to compile dossiers on US citizens, but rather to research and develop the tools that would allow authorized agencies to gather information on terrorist networks. Despite the name change and these assurances, the critics continued to see the system as prone to potential misuse or abuse. As a result House and Senate negotiators moved to prohibit further funding for the TIA program by adding provisions to the Department of Defense Appropriations Act, 2004[10] (signed into law by President Bush on October 1, 2003). Further, the Joint Explanatory Statement included in the conference committee report specifically directed that the IAO as program manager for TIA be terminated immediately.[11]
  •  
    What became today's NSA programs of public concern were the brain child of Admiral John Poindexter and a private sector compadre. U.S. v. Poindexter, 951 F.2d 369, 390 (D.C. Cir. 1991). Poindexter had previously been convicted on five criminal counts involving lying to Congress and destruction and alteration of evidence.  His convictions were overturned on appeal on grounds that some of the testimony against him had been immunized from use in prosecution by Congress. There was no claim on appeal that any such evidence had been false.  86 U.S. v. Poindexter, 951 F.2d 369, 390 (D.C. Cir. 1991), . For far more detail of the evidence against Poindexter, see the August 4, 1993 final report by independent prosecutor Lawrence Walsh, Vol 1, Part 4 section 3, .  So one might say that today's controversial NSA activities were the idea of and conceived by a government official more than willing to lie to Congress and  to destroy and alter evidence. 
Paul Merrell

After Criticism, Washington Post Disavows 7;Russian Propaganda7; Blacklist Of Indie Media - 0 views

  • AUSTIN, Texas — Amid a wave of widespread criticism and legal threats, the Washington Post has added a lengthy editor’s note to an article which alleged that a host of independent media websites were spreading Russian propaganda. Washington Post added editor7;s note to top of "Russian propaganda" story after being called out for shoddy reportinghttps://t.co/dWKbZJGS9a pic.twitter.com/skGiZUX2Ls — Ben Norton (@BenjaminNorton) December 7, 2016 The article, written by Craig Timberg and published on Nov. 24, relied largely on information compiled by PropOrNot, an anonymous group that claims to be comprised of media analysts and researchers. At the time the Post story was published, the group’s homepage featured a list of 200 websites, including MintPress News and many other well-established independent media outlets, which the organization alleges are either deliberately or inadvertently spreading Russian propaganda. Among other criticisms levied against the group, PropOrNot’s research depends on overly broad criteria. According to its own stated methodology, criticism of the ”US, Obama, Hillary Clinton, the EU, Angela Merkel, NATO, Ukraine, Jewish people, US allies, the ‘mainstream media,’ and democrats, the center-right or center-left, and moderates of all stripes,” would be grounds for inclusion on “The List.” The Post added an editor’s note to the article on Wednesday in an apparent attempt to distance the newspaper from the controversy. “The Washington Post on Nov. 24 published a story on the work of four sets of researchers who have examined what they say are Russian propaganda efforts to undermine American democracy and interests,” the note begins.
  • While Timberg’s article does refer to the work of multiple researchers, the bulk of the report relied on allegations made by PropOrNot. The Washington Post continued: “One of them was PropOrNot, a group that insists on public anonymity, which issued a report identifying more than 200 websites that, in its view, wittingly or unwittingly published or echoed Russian propaganda. A number of those sites have objected to being included on PropOrNot’s list, and some of the sites, as well as others not on the list, have publicly challenged the group’s methodology and conclusions. The Post, which did not name any of the sites, does not itself vouch for the validity of PropOrNot’s findings regarding any individual media outlet, nor did the article purport to do so.” Numerous websites, including MintPress, have objected to their inclusion on “The List.” On Tuesday, James Moody, the lawyer representing the publisher of the website Naked Capitalism, demanded a formal retraction and public apology on Tuesday. Moody wrote: “You did not provide even a single example of ‘fake news’ allegedly distributed or promoted by Naked Capitalism or indeed any of the 200 sites on the PropOrNot blacklist. You provided no discussion or assessment of the credentials or backgrounds of these so-called ‘researchers’ (Clint Watts, Andrew Weisburd, and J.M. Berger and the “team” at PropOrNot), and no discussion or analysis of the methodology, protocol or algorithms such ‘researchers’ may or may not have followed.” Backlash against both PropOrNot and the Post’s story hasn’t just come from media outlets included on “The List,” though.
  • “The group promoted by the Post … embodies the toxic essence of Joseph McCarthy, but without the courage to attach individual names to the blacklist,” wrote Ben Norton and Glenn Greenwald in The Intercept, which was not featured on the PropOrNot list, on Nov. 26. The Post’s editor’s note concludes: “Since publication of The Post’s story, PropOrNot has removed some sites from its list.” However, MintPress and Naked Capitalism remain on “The List,” as do respected alternative and independent media sites Antiwar.com, Black Agenda Report, Truthout, and Truthdig. Overall, the Post’s new position seemed poorly received by many of the media analysts who have criticized the story. On Wednesday evening, Adam Johnson, a reporter who writes for Fairness and Accuracy in Reporting, tweeted that the Post editors who refuse to retract the story are “a bunch of cowards.” what a bunch of cowards. "This blacklist that served as the entire news basis of our piece is bullshit but we wont retract the story" https://t.co/V5ZSwSMgTg — Adam H. Johnson (@adamjohnsonNYC) December 7, 2016 Timberg’s article appeared amid widespread outcry over the apparent threat of “fake news” against American democracy. Kevin Gosztola, managing editor of Shadowproof, told MintPress editor-in-chief Mnar Muhawesh that the rush to create “blacklists” of media outlets undermines the freedom of the press.
  • ...1 more annotation...
  • “When you start to put people on lists you’re actually diminishing speech,” Gosztola said in an interview with Muhawesh for “Behind the Headline.”
  •  
    The Washington Post backpedals from its "fake news" story.
Paul Merrell

Wikileaks Releases "NightSkies 1.2": Proof CIA Bugs "Factory Fresh" iPhones | Zero Hedge - 0 views

  • The latest leaks from WikiLeaks7; Vault 7 is titled “Dark Matter” and claims that the CIA has been bugging “factory fresh” iPhones since at least 2008 through suppliers.
  • And here is the full press release from WikiLeaks: Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA7;s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 7;persistence7; on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.   Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA7;s "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.   "DarkSeaSkies" is "an implant that persists in the EFI firmware of an Apple MacBook Air computer" and consists of "DarkMatter", "SeaPea" and "NightSkies", respectively EFI, kernel-space and user-space implants.   Documents on the "Triton" MacOSX malware, its infector "Dark Mallet" and its EFI-persistent version "DerStake" are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.   Also included in this release is the manual for the CIA7;s "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.   While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization7;s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
1 - 20 of 456 Next › Last »
Showing 20 items per page