Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "government-security-checks" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
4More

Beware the Dangers of Congress' Latest Cybersecurity Bill | American Civil Liberties Union - 0 views

  • A new cybersecurity bill poses serious threats to our privacy, gives the government extraordinary powers to silence potential whistleblowers, and exempts these dangerous new powers from transparency laws. The Cybersecurity Information Sharing Act of 2014 ("CISA") was scheduled to be marked up by the Senate Intelligence Committee yesterday but has been delayed until after next week's congressional recess. The response to the proposed legislation from the privacy, civil liberties, tech, and open government communities was quick and unequivocal – this bill must not go through. The bill would create a massive loophole in our existing privacy laws by allowing the government to ask companies for "voluntary" cooperation in sharing information, including the content of our communications, for cybersecurity purposes. But the definition they are using for the so-called "cybersecurity information" is so broad it could sweep up huge amounts of innocent Americans' personal data. The Fourth Amendment protects Americans' personal data and communications from undue government access and monitoring without suspicion of criminal activity. The point of a warrant is to guard that protection. CISA would circumvent the warrant requirement by allowing the government to approach companies directly to collect personal information, including telephonic or internet communications, based on the new broadly drawn definition of "cybersecurity information."
  • While we hope many companies would jealously guard their customers' information, there is a provision in the bill that would excuse sharers from any liability if they act in "good faith" that the sharing was lawful. Collected information could then be used in criminal proceedings, creating a dangerous end-run around laws like the Electronic Communications Privacy Act, which contain warrant requirements. In addition to the threats to every American's privacy, the bill clearly targets potential government whistleblowers. Instead of limiting the use of data collection to protect against actual cybersecurity threats, the bill allows the government to use the data in the investigation and prosecution of people for economic espionage and trade secret violations, and under various provisions of the Espionage Act. It's clear that the law is an attempt to give the government more power to crack down on whistleblowers, or "insider threats," in popular bureaucratic parlance. The Obama Administration has brought more "leaks" prosecutions against government whistleblowers and members of the press than all previous administrations combined. If misused by this or future administrations, CISA could eliminate due process protections for such investigations, which already favor the prosecution.
  • While actively stripping Americans' privacy protections, the bill also cloaks "cybersecurity"-sharing in secrecy by exempting it from critical government transparency protections. It unnecessarily and dangerously provides exemptions from state and local sunshine laws as well as the federal Freedom of Information Act. These are both powerful tools that allow citizens to check government activities and guard against abuse. Edward Snowden's revelations from the past year, of invasive spying programs like PRSIM and Stellar Wind, have left Americans shocked and demanding more transparency by government agencies. CISA, however, flies in the face of what the public clearly wants. (Two coalition letters, here and here, sent to key members of the Senate yesterday detail the concerns of a broad coalition of organizations, including the ACLU.)
  •  
    Text of the bill is on Sen. Diane Feinstein's site, http://goo.gl/2cdsSA It is truly a bummer.
11More

Internet Giants Erect Barriers to Spy Agencies - NYTimes.com - 0 views

  • As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps.
  • After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. Google, for example, is laying its own fiber optic cable under the world’s oceans, a project that began as an effort to cut costs and extend its influence, but now has an added purpose: to assure that the company will have more control over the movement of its customer data.
  • A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant.
  • ...8 more annotations...
  • Eric Grosse, Google’s security chief, suggested in an interview that the N.S.A.'s own behavior invited the new arms race.“I am willing to help on the purely defensive side of things,” he said, referring to Washington’s efforts to enlist Silicon Valley in cybersecurity efforts. “But signals intercept is totally off the table,” he said, referring to national intelligence gathering.“No hard feelings, but my job is to make their job hard,” he added.
  • Hardware firms like Cisco, which makes routers and switches, have found their products a frequent subject of Mr. Snowden’s disclosures, and their business has declined steadily in places like Asia, Brazil and Europe over the last year. The company is still struggling to convince foreign customers that their networks are safe from hackers — and free of “back doors” installed by the N.S.A. The frustration, companies here say, is that it is nearly impossible to prove that their systems are N.S.A.-proof.
  • Many point to an episode in 2012, when Russian security researchers uncovered a state espionage tool, Flame, on Iranian computers. Flame, like the Stuxnet worm, is believed to have been produced at least in part by American intelligence agencies. It was created by exploiting a previously unknown flaw in Microsoft’s operating systems. Companies argue that others could have later taken advantage of this defect.Worried that such an episode undercuts confidence in its wares, Microsoft is now fully encrypting all its products, including Hotmail and Outlook.com, by the end of this year with 2,048-bit encryption, a stronger protection that would take a government far longer to crack. The software is protected by encryption both when it is in data centers and when data is being sent over the Internet, said Bradford L. Smith, the company’s general counsel.
  • Mr. Smith also said the company was setting up “transparency centers” abroad so that technical experts of foreign governments could come in and inspect Microsoft’s proprietary source code. That will allow foreign governments to check to make sure there are no “back doors” that would permit snooping by United States intelligence agencies. The first such center is being set up in Brussels.Microsoft has also pushed back harder in court. In a Seattle case, the government issued a “national security letter” to compel Microsoft to turn over data about a customer, along with a gag order to prevent Microsoft from telling the customer it had been compelled to provide its communications to government officials. Microsoft challenged the gag order as violating the First Amendment. The government backed down.
  • In Washington, officials acknowledge that covert programs are now far harder to execute because American technology companies, fearful of losing international business, are hardening their networks and saying no to requests for the kind of help they once quietly provided.Continue reading the main story Robert S. Litt, the general counsel of the Office of the Director of National Intelligence, which oversees all 17 American spy agencies, said on Wednesday that it was “an unquestionable loss for our nation that companies are losing the willingness to cooperate legally and voluntarily” with American spy agencies.
  • In one slide from the disclosures, N.S.A. analysts pointed to a sweet spot inside Google’s data centers, where they could catch traffic in unencrypted form. Next to a quickly drawn smiley face, an N.S.A. analyst, referring to an acronym for a common layer of protection, had noted, “SSL added and removed here!”
  • Facebook and Yahoo have also been encrypting traffic among their internal servers. And Facebook, Google and Microsoft have been moving to more strongly encrypt consumer traffic with so-called Perfect Forward Secrecy, specifically devised to make it more labor intensive for the N.S.A. or anyone to read stored encrypted communications.One of the biggest indirect consequences from the Snowden revelations, technology executives say, has been the surge in demands from foreign governments that saw what kind of access to user information the N.S.A. received — voluntarily or surreptitiously. Now they want the same.
  • The latest move in the war between intelligence agencies and technology companies arrived this week, in the form of a new Google encryption tool. The company released a user-friendly, email encryption method to replace the clunky and often mistake-prone encryption schemes the N.S.A. has readily exploited.But the best part of the tool was buried in Google’s code, which included a jab at the N.S.A.'s smiley-face slide. The code included the phrase: “ssl-added-and-removed-here-; - )”
1More

What the hell just happened? 'Tyranny By Executive Order' | by Constitutional Attorney ... - 0 views

  •  
    "What the hell just happened? That is the question that many Americans should be asking themselves following the news conference where Obama unveiled his plan for destroying the Bill of Rights to the U.S. Constitution. At first glance it appeared to be a case of Obama shamelessly using the deaths of innocents, and some live children as a backdrop, to push for the passage of radical gun control measures by Congress. Most of these have no chance of passing, yet, Obama's signing of Executive orders initiating 23 so called Executive actions on gun control seemed like an afterthought. Unfortunately, that is the real story, but it is generally being overlooked. The fact is that with a few strokes of his pen Obama set up the mechanisms he will personally use to not only destroy the Second Amendment to the Constitution, but also the First, Fourth, and Fifth Amendments. It will not matter what Congress does, Obama can and will act on his own, using these Executive actions, and will be violating both the Constitution and his oath of office when he does it. Here are the sections of the Executive Order that he will use: "1. Issue a Presidential Memorandum to require federal agencies to make relevant data available to the federal background-check system." What exactly is relevant data? Does it include our medical records obtained through Obamacare, our tax returns, our political affiliations, our military background, and our credit history? I suggest that all of the above, even if it violates our fourth Amendment right to privacy will now be relevant data for determining if we are allowed to purchase a firearm. "2. Address unnecessary legal barriers, particularly relating to the Health Insurance Portability and Accountability Act, that may prevent states from making information available to the background-check system." This should be read in conjunction with section 16 of the order that says: "16. Clarify that the Affordable Care Act does not prohibit doctors
8More

Obama's "Catastrophic Defeat" in Ukraine » CounterPunch: Tells the Facts, Nam... - 0 views

  • “We are currently witnessing an epic and historic event. The Ukrainian regular army and the punitive battalions are suffering a catastrophic defeat to the south of Donetsk…..It still is not quite clear how the Junta intends to avoid a complete defeat here…. By squandering the most combat-capable brigades in systematic offensive operations, the Junta sustained enormous losses and at the same time suffered a crushing, purely military defeat. The southern front has collapsed.” – The Southern Front Catastrophe – August 27, 2014″, Colonel Cassad, Military Briefing, Novorossiya, Ukraine “The reports out of Novorussia (New Russia) are nothing short of incredible… sources are reporting that Novorussian forces have bypassed Mariupol from the north and have entered the Zaporozhie region!” – News from the Front, Vineyard of the Saker Barack Obama has pushed Ukraine to the brink of political, economic and social collapse. Now he wants to blame Russia for the damage he’s done. It’s absurd. Moscow is in no way responsible for Ukraine’s descent into anarchy. That’s all Washington’s doing, just as Iraq, Afghanistan, Libya, and now Syria were Washington’s doing. If you want to blame someone, blame Obama.
  • “We are currently witnessing an epic and historic event. The Ukrainian regular army and the punitive battalions are suffering a catastrophic defeat to the south of Donetsk…..It still is not quite clear how the Junta intends to avoid a complete defeat here…. By squandering the most combat-capable brigades in systematic offensive operations, the Junta sustained enormous losses and at the same time suffered a crushing, purely military defeat. The southern front has collapsed.” – The Southern Front Catastrophe – August 27, 2014″, Colonel Cassad, Military Briefing, Novorossiya, Ukraine “The reports out of Novorussia (New Russia) are nothing short of incredible… sources are reporting that Novorussian forces have bypassed Mariupol from the north and have entered the Zaporozhie region!” – News from the Front, Vineyard of the Saker Barack Obama has pushed Ukraine to the brink of political, economic and social collapse. Now he wants to blame Russia for the damage he’s done. It’s absurd. Moscow is in no way responsible for Ukraine’s descent into anarchy. That’s all Washington’s doing, just as Iraq, Afghanistan, Libya, and now Syria were Washington’s doing. If you want to blame someone, blame Obama.
  • Ukraine’s troubles began when the US State Department toppled the elected president in February and replaced him with a compliant stooge who agreed to follow Washington’s directives. The new “junta” government quickly launched a full-blown war against Russian-speaking Ukrainians in the east which split the civilian population and drove the country to ruin. The plan “pacify” the East was concocted in Washington, not Kiev and certainly not Moscow.
  • ...4 more annotations...
  • Donetsk and Lugansk have formed militias and taken the war to the enemy. They’ve engaged Obama’s proxy-army on the battlefield and pounded it into mincemeat. That’s why Obama deployed his propagandists to lie about the fictitious “Russian invasion”. The administration needs a diversion because the Novorussia forces (aka-the “pro Russia separatists”) are kicking the holy crap out of Obama’s legions. That’s why Washington and Kiev are in full panic-mode, because none of this was supposed to happen. Obama figured the army would put down the insurrection, crush the resistance, and move him one step closer to his goal of establishing NATO bases and missile defense systems on Russia’s western flank. Well, guess what? It’s not playing out that way and it probably never will. The Novorussia fighters are too tough, too smart and too motivated to be one-upped by Obama’s feckless troopers. (Check out this short video and you’ll see why the rebels are winning: Vineyard of the Saker)
  • Putin hasn’t sent tanks and artillery into Ukraine. He doesn’t need to. The militias are loaded with battle-hardened veterans who know how to fight and who are quite good at it. Just ask Poroshenko whose army has been taking it in the shorts for the last couple of weeks. Check out this blurb in Thursday’s Itar Tass: “Over the week of August 16-23, the self-defense fighters of the Donetsk and Luhansk People’s Republics seized 14 T-64 tanks, 25 infantry fighting vehicles, 18 armored personnel carriers, one armored reconnaissance and patrol vehicle, one Uragan multiple launch rocket system, two Gvozdika self-propelled artillery guns, four D-30 howitzers, four mortars, one ZU-23-2 air defense system and 33 vehicles.” (East Ukraine militias seize large amount of Ukrainian armor, Itar Tass) Get the picture? The Ukrainian army is getting beaten to a pulp, which means that Obama’s glorious “pivot strategy” just slammed into a brick wall.
  • Bottom line: Russia has not invaded Ukraine. The propagandists in the media are just trying to hide the fact that the Novorussia Army Forces (NAF; aka-the pro Russia separatists) are kicking ass and taking names. That’s what’s really going on. That’s why Obama and his gaggle of miscreant neocons are in a furor. It’s because they don’t know what to do next, so they’ve returned to their default position on every issue; lie like hell until they settle on a plan.
  • So, who do you believe; Kerry or the facts? And who are you going to believe this time; “Aluminum tubes” Gordie or Organization for Security and Co-operation in Europe (OSCE) monitor Andrey Kelin who said yesterday: “We have said that no Russian involvement has been spotted, there are no soldiers or equipment present.” “Accusations relating to convoys of armored personnel carriers have been heard during the past week and the week before that. All of them were proven false back then, and are being proven false again now.” (RT) Repeat: “No Russian involvement”. All the accusations “were proven false.” “False” as in fake, phony, propaganda, bunkum, lies which, by the way, appears to be Gordon’s area of expertise.
  •  
    Don't miss the video at http://vineyardsaker.blogspot.com/2014/08/watershed-press-conference-by-top.html It's a press conference by Alexander V. Zakharchenko, Chairman of The Council of Ministers of The Donetsk National Republic, describing the rout of coup government forces and the reconstitution of the Novorussia militias into a national army. Russian with English subtitle translation.  According to him the DNR army has killed thousands of Ukrainian soldiers, but the coup government is notifying family members that they are "missing in action," even when the DNR transfers the bodies to Ukraine. He also describes encountering coup government soldiers wearing the insignia of the Galacia SS Division, a Ukraine collaborators' division of the Nazi World War II Waffen SS. (The coup government includes in its leadership neo-Nazis, and neo-Nazi militias are fighting on the side of the coup government.)  
8More

Tomgram: Engelhardt, Who Rules Washington? | TomDispatch - 0 views

  • As every schoolchild knows, there are three check-and-balance branches of the U.S. government: the executive, Congress, and the judiciary. That’s bedrock Americanism and the most basic high school civics material. Only one problem: it’s just not so. During the Cold War years and far more strikingly in the twenty-first century, the U.S. government has evolved.  It sprouted a fourth branch: the national security state, whose main characteristic may be an unquenchable urge to expand its power and reach.  Admittedly, it still lacks certain formal prerogatives of governmental power.  Nonetheless, at a time when Congress and the presidency are in a check-and-balance ballet of inactivity that would have been unimaginable to Americans of earlier eras, the Fourth Branch is an ever more unchecked and unbalanced power center in Washington.  Curtained off from accountability by a penumbra of secrecy, its leaders increasingly are making nitty-gritty policy decisions and largely doing what they want, a situation illuminated by a recent controversy over the possible release of a Senate report on CIA rendition and torture practices.
  • From the Pentagon to the Department of Homeland Security to the labyrinthine world of intelligence, the rise to power of the national security state has been a spectacle of our time.  Whenever news of its secret operations begins to ooze out, threatening to unnerve the public, the White House and Congress discuss “reforms” which will, at best, modestly impede the expansive powers of that state within a state.  Generally speaking, its powers and prerogatives remain beyond constraint by that third branch of government, the non-secret judiciary.  It is deferred to with remarkable frequency by the executive branch and, with the rarest of exceptions, it has been supported handsomely with much obeisance and few doubts by Congress. And also keep in mind that, of the four branches of government, only two of them -- an activist Supreme Court and the national security state -- seem capable of functioning in a genuine policymaking capacity at the moment.
  • In this century, a full-scale second “Defense Department,” the Department of Homeland Security, was created.  Around it has grown up a mini-version of the military-industrial complex, with the usual set of consultants, K Street lobbyists, political contributions, and power relations: just the sort of edifice that President Eisenhower warned Americans about in his famed farewell address  in 1961.  In the meantime, the original military-industrial complex has only gained strength and influence. Increasingly, post-9/11, under the rubric of “privatization,” though it should more accurately have been called “corporatization,” the Pentagon took a series of crony companies off to war with it.  In the process, it gave “capitalist war” a more literal meaning, thanks to its wholesale financial support of, and the shrugging off of previously military tasks onto, a series of warrior corporations. Meanwhile, the 17 members of the U.S. Intelligence Community -- yes, there are 17 major intelligence outfits in the national security state -- have been growing, some at prodigious rates.  A number of them have undergone their own versions of corporatization, outsourcing many of their operations to private contractors in staggering numbers, so that we now have “capitalist intelligence” as well.  With the fears from 9/11 injected into society and the wind of terrorism at their backs, the Intelligence Community has had a remarkably free hand to develop surveillance systems that are now essentially “watching” everyone -- including, it seems, other branches of the government.
  • ...4 more annotations...
  • All of this is or should be obvious, but remains surprisingly unacknowledged in our American world. The rise of the Fourth Branch began at a moment of mobilization for a global conflict, World War II.  It gained heft and staying power in the Cold War of the second half of the twentieth century, when that other superpower, the Soviet Union, provided the excuse for expansion of every sort.  Its officials bided their time in the years after the fall of the Soviet Union, when “terrorism” had yet to claim the landscape and enemies were in short supply.  In the post-9/11 era, in a phony “wartime” atmosphere, fed by trillions of taxpayer dollars, and under the banner of American “safety,” it has grown to unparalleled size and power.  So much so that it sparked a building boom in and around the national capital (as well as elsewhere in the country).  In their 2010 Washington Post series “Top Secret America,” Dana Priest and William Arkin offered this thumbnail summary of the extent of that boom for the U.S. Intelligence Community: “In Washington and the surrounding area,” they wrote, “33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings -- about 17 million square feet of space.”  And in 2014, the expansion is ongoing.
  • In that light, let’s turn to a set of intertwined events in Washington that have largely been dealt with in the media as your typical tempest in a teapot, a catfight among the vested and powerful.  I’m talking about the various charges and countercharges, anger, outrage, and irritation, as well as news of acts of seeming illegality now swirling around a 6,300-page CIA “torture report” produced but not yet made public by the Senate Intelligence Committee.  This ongoing controversy reveals a great deal about the nature of the checks and balances on the Fourth Branch of government in 2014.
  • Fourteen years into the twenty-first century, we’re so used to this sort of thing that we seldom think about what it means to let the CIA -- accused of a variety of crimes -- be the agency to decide what exactly can be known by the public, in conjunction with a deferential White House.  The Agency’s present director, it should be noted, has been a close confidant and friend of the president and was for years his key counterterrorism advisor.  To get a sense of what all this really means, you need perhaps to imagine that, in 2004, the 9/11 Commission was forced to turn its report over to Osama bin Laden for vetting and redaction before releasing it to the public.  Extreme as that may sound, the CIA is no less a self-interested party. And this interminable process has yet to end, although the White House is supposed to release something, possibly heavily redacted, as early as this coming week or perhaps in the dog days of August.
  • The fact is that, for the Fourth Branch, this remains the age of impunity.  Hidden in a veil of secrecy, bolstered by secret law and secret courts, surrounded by its chosen corporations and politicians, its power to define policy and act as it sees fit in the name of American safety is visibly on the rise.  No matter what setbacks it experiences along the way, its urge to expand and control seems, at the moment, beyond staunching.  In the context of the Senate’s torture report, the question at hand remains: Who rules Washington?
  •  
    The indefatigable and perceptive Tom Englehardt finds formally secret features of the Dark State revealed in the ongoing political jockeying involving the CIA's torture, black prisons, and extarordinary rendition program. 
4More

The progressive endgame, and how to prevent it | protein wisdom - 2 views

  • Social Security Administration employees are being instructed to tell people who ask that if the debt ceiling is not raised, their social security benefits could be in danger. In an email sent Friday, obtained by The Daily Caller, employees are instructed: “If a member of the public asks whether their Social Security payment will be affected if the federal debt ceiling is not raised, you may give the following response: ‘Unlike a federal shutdown which has no impact on the payment of Social Security benefits, failure to raise the debt ceiling puts Social Security benefits at risk.’ “Direct all program–related and technical questions to your supervisor.”
  • This was done before in 2011 also and the answer is the same as it was then. Social Security holds $2.6 trillion in special-issue Treasury securities. Those bonds are part of the $14.3 trillion debt amassed by the U.S. government, and benefits are paid out of those securities. So, the theory goes, if Treasury redeemed the needed Social Security bonds, and issued new marketable Treasury bonds to make good on the Social Security bonds, it would be a one for one swap and the debt ceiling would not be increased. There is a technical wrinkle involving the fact that payroll taxes that are collected are supposed to be immediately turned into Treasury securities, but there could be ways around that, such as putting the monies in a noninterest bearing account, as during the 1985 debt crisis. [...] “I’m now 99.9 percent positive that Treasury has legal authority to pay Social Security benefits in both cases of a government shutdown and hitting the debt limit, since the payment of benefits shouldn’t affect the debt limit because it reduces the trust funds to the exact extent that it increase publicly-held debt,” Fichtner said. “What I don’t know is whether Treasury has to pay benefits if it chooses not to.” Dean Baker, co-director of the Center for Economic and Policy Research who has derided “the phony crisis” of Social Security, also believes the checks could keep flowing. “I would think that they could legally pay Social Security by reducing the obligations of the fund,” he said. “It no doubt would be a huge political issue.”
  •  
    Incredible theory, which, if true, would indeed end our Constitutional Republic.
  •  
    Diigo is having problems, I see. Correct link to the article quoted is http://proteinwisdom.com/?p=51354
12More

Most Agencies Falling Short on Mandate for Online Records - 0 views

  • Nearly 20 years after Congress passed the Electronic Freedom of Information Act Amendments (E-FOIA), only 40 percent of agencies have followed the law's instruction for systematic posting of records released through FOIA in their electronic reading rooms, according to a new FOIA Audit released today by the National Security Archive at www.nsarchive.org to mark Sunshine Week. The Archive team audited all federal agencies with Chief FOIA Officers as well as agency components that handle more than 500 FOIA requests a year — 165 federal offices in all — and found only 67 with online libraries populated with significant numbers of released FOIA documents and regularly updated.
  • Congress called on agencies to embrace disclosure and the digital era nearly two decades ago, with the passage of the 1996 "E-FOIA" amendments. The law mandated that agencies post key sets of records online, provide citizens with detailed guidance on making FOIA requests, and use new information technology to post online proactively records of significant public interest, including those already processed in response to FOIA requests and "likely to become the subject of subsequent requests." Congress believed then, and openness advocates know now, that this kind of proactive disclosure, publishing online the results of FOIA requests as well as agency records that might be requested in the future, is the only tenable solution to FOIA backlogs and delays. Thus the National Security Archive chose to focus on the e-reading rooms of agencies in its latest audit. Even though the majority of federal agencies have not yet embraced proactive disclosure of their FOIA releases, the Archive E-FOIA Audit did find that some real "E-Stars" exist within the federal government, serving as examples to lagging agencies that technology can be harnessed to create state-of-the art FOIA platforms. Unfortunately, our audit also found "E-Delinquents" whose abysmal web performance recalls the teletype era.
  • E-Delinquents include the Office of Science and Technology Policy at the White House, which, despite being mandated to advise the President on technology policy, does not embrace 21st century practices by posting any frequently requested records online. Another E-Delinquent, the Drug Enforcement Administration, insults its website's viewers by claiming that it "does not maintain records appropriate for FOIA Library at this time."
  • ...9 more annotations...
  • "The presumption of openness requires the presumption of posting," said Archive director Tom Blanton. "For the new generation, if it's not online, it does not exist." The National Security Archive has conducted fourteen FOIA Audits since 2002. Modeled after the California Sunshine Survey and subsequent state "FOI Audits," the Archive's FOIA Audits use open-government laws to test whether or not agencies are obeying those same laws. Recommendations from previous Archive FOIA Audits have led directly to laws and executive orders which have: set explicit customer service guidelines, mandated FOIA backlog reduction, assigned individualized FOIA tracking numbers, forced agencies to report the average number of days needed to process requests, and revealed the (often embarrassing) ages of the oldest pending FOIA requests. The surveys include:
  • The federal government has made some progress moving into the digital era. The National Security Archive's last E-FOIA Audit in 2007, " File Not Found," reported that only one in five federal agencies had put online all of the specific requirements mentioned in the E-FOIA amendments, such as guidance on making requests, contact information, and processing regulations. The new E-FOIA Audit finds the number of agencies that have checked those boxes is now much higher — 100 out of 165 — though many (66 in 165) have posted just the bare minimum, especially when posting FOIA responses. An additional 33 agencies even now do not post these types of records at all, clearly thwarting the law's intent.
  • The FOIAonline Members (Department of Commerce, Environmental Protection Agency, Federal Labor Relations Authority, Merit Systems Protection Board, National Archives and Records Administration, Pension Benefit Guaranty Corporation, Department of the Navy, General Services Administration, Small Business Administration, U.S. Citizenship and Immigration Services, and Federal Communications Commission) won their "E-Star" by making past requests and releases searchable via FOIAonline. FOIAonline also allows users to submit their FOIA requests digitally.
  • THE E-DELINQUENTS: WORST OVERALL AGENCIES In alphabetical order
  • Key Findings
  • Excuses Agencies Give for Poor E-Performance
  • Justice Department guidance undermines the statute. Currently, the FOIA stipulates that documents "likely to become the subject of subsequent requests" must be posted by agencies somewhere in their electronic reading rooms. The Department of Justice's Office of Information Policy defines these records as "frequently requested records… or those which have been released three or more times to FOIA requesters." Of course, it is time-consuming for agencies to develop a system that keeps track of how often a record has been released, which is in part why agencies rarely do so and are often in breach of the law. Troublingly, both the current House and Senate FOIA bills include language that codifies the instructions from the Department of Justice. The National Security Archive believes the addition of this "three or more times" language actually harms the intent of the Freedom of Information Act as it will give agencies an easy excuse ("not requested three times yet!") not to proactively post documents that agency FOIA offices have already spent time, money, and energy processing. We have formally suggested alternate language requiring that agencies generally post "all records, regardless of form or format that have been released in response to a FOIA request."
  • Disabilities Compliance. Despite the E-FOIA Act, many government agencies do not embrace the idea of posting their FOIA responses online. The most common reason agencies give is that it is difficult to post documents in a format that complies with the Americans with Disabilities Act, also referred to as being "508 compliant," and the 1998 Amendments to the Rehabilitation Act that require federal agencies "to make their electronic and information technology (EIT) accessible to people with disabilities." E-Star agencies, however, have proven that 508 compliance is no barrier when the agency has a will to post. All documents posted on FOIAonline are 508 compliant, as are the documents posted by the Department of Defense and the Department of State. In fact, every document created electronically by the US government after 1998 should already be 508 compliant. Even old paper records that are scanned to be processed through FOIA can be made 508 compliant with just a few clicks in Adobe Acrobat, according to this Department of Homeland Security guide (essentially OCRing the text, and including information about where non-textual fields appear). Even if agencies are insistent it is too difficult to OCR older documents that were scanned from paper, they cannot use that excuse with digital records.
  • Privacy. Another commonly articulated concern about posting FOIA releases online is that doing so could inadvertently disclose private information from "first person" FOIA requests. This is a valid concern, and this subset of FOIA requests should not be posted online. (The Justice Department identified "first party" requester rights in 1989. Essentially agencies cannot use the b(6) privacy exemption to redact information if a person requests it for him or herself. An example of a "first person" FOIA would be a person's request for his own immigration file.) Cost and Waste of Resources. There is also a belief that there is little public interest in the majority of FOIA requests processed, and hence it is a waste of resources to post them. This thinking runs counter to the governing principle of the Freedom of Information Act: that government information belongs to US citizens, not US agencies. As such, the reason that a person requests information is immaterial as the agency processes the request; the "interest factor" of a document should also be immaterial when an agency is required to post it online. Some think that posting FOIA releases online is not cost effective. In fact, the opposite is true. It's not cost effective to spend tens (or hundreds) of person hours to search for, review, and redact FOIA requests only to mail it to the requester and have them slip it into their desk drawer and forget about it. That is a waste of resources. The released document should be posted online for any interested party to utilize. This will only become easier as FOIA processing systems evolve to automatically post the documents they track. The State Department earned its "E-Star" status demonstrating this very principle, and spent no new funds and did not hire contractors to build its Electronic Reading Room, instead it built a self-sustaining platform that will save the agency time and money going forward.
2More

How JP Morgan Took Over All Kentucky's Financial Services, And Why You Should Be Scared... - 0 views

  • Writing in response to the JP lawsuit on his Rolling Stone blog, Taibbi lamented that big banks were getting away with crimes that, when pulled off by blue-collar muscle outfits like the mob (and they are), result in lengthy jail sentences. Fraud on the part of JP Morgan and other corporate banks, he concluded, is “not going to stop until people start doing hard time for these crimes.”
  •  
    On July 1, JP Morgan Chase became the Commonwealth's bank. As the state's official depository, JP now receives all deposits, writes all checks and makes all wire transfers on the $12-15 billion that flow through Kentucky state government in the course of a fiscal year. It will cut payroll checks, receive federal and other funds earmarked for the state, and disburse educational or transportation or any other funds to their appropriate monetary endpoints. For its trouble, the bank will receive $1.3 million in state fees and the ability to re-lend idle state funds out to customers for private gain. Yes, you should be worried. JP's decade A global corporation with more than $2 trillion in assets and operations in 60 countries, JP Morgan Chase has been a major figure in the ongoing global financial crisis. As one of the largest private banks in the U.S., the bank made incredible amounts of money by underwriting many of the questionable loans (sub-prime, zero down, adjustable rate) that fueled the American housing bubble. It then made even more money by packaging hundreds of these shitty loans into a single "product," a mortgage backed security, which it sold like Twinkies to pious religious non-profits, filthy-rich hedge fund managers, municipal fire-fighters, retired auto-workers, and the like, each security effectively putting these groups on the hook-and not JP-for the shitty loans that it had helped create. When, inevitably, individual homeowners began to default on their loans, thereby triggering the stock market collapse of 2008, JP Morgan found a way to make money on that, too, by buying insurance (known as credit default swaps) on the shitty securities of shitty mortgages that it had sold to unwitting investors. For good measure, the U.S. government handed the corporation $25 billion in TARP funds, $30 billion in U.S. treasury backing to purchase bankrupt Bear Stearns (previously a global leader in mortgage backed securities), and the biggest chun
39More

The Daily Bell - Doug Casey on the Continuing Debasement of Money, Language and Banking... - 0 views

  • This isn't going to last because the way you get wealthy is by producing more than you consume and saving the difference – not by consuming more than you produce, and borrowing the difference. With the Fed keeping interest rates at artificially low levels, hoping to increase consumption, they're making it very foolish to save – when you get ½% or 1% on your savings. So people are saving less and they're borrowing more than they otherwise would. This is a formula for making things worse, not better.
  • They are, idiotically, doing exactly the opposite of what they should be.
  • In point of fact, the Fed should be abolished; the market, not bureaucrats, should determine interest rates. We wouldn't be in this pickle to start with if the government wasn't involved in the economy.
  • ...35 more annotations...
  • The Chinese, the Japanese – everybody is selling, trying to pass the Old Maid card of US Government debt, which represents return–free risk. Nobody other than the Fed is buying, and interest rates would skyrocket if they stopped. The more QE there is, the more distortions it will cause, however, making for a bigger disaster the longer it goes on.
  • Will the Fed continue to inflate the money supply? Doug Casey: They have to, because with the huge amount of debt in the world – and the amount of debt in the world has increased something like 40 or 50% just since the Greater Depression started – if they don't keep increasing the amount of money in the world then nobody's going to be able to service the huge amount of debt that is out there. So I don't see anything changing in the years to come. They've truly painted themselves into a corner. They're caught between Scylla and Charybdis, and we don't have Odysseus steering the ship of state.
  • Let me say, again, that the Fed serves no useful purpose and it should be abolished. Central banks create "super money" by buying government or other debt with new currency units that they credit to the sellers' accounts at commercial banks. That's the actual engine of inflation.
  • But it's greatly compounded in the commercial banking system through fractional reserve lending – which would not be possible without a central bank. Fractional reserve lending allows banks to multiply the money supply several times.
  • If $100 of Fed super money, freshly created, is deposited in a commercial bank like Chase or Citibank, then $90 can be lent out with a 10% reserve, the current number. That money is redeposited. They'll then lend out 90% of that $90, or $81, and then 90% of that $81, so it multiplies.
  • Central banking and fractional reserve lending go hand-in-hand.
  • Without a central bank, any bank that engaged in fractional reserve banking would be considered guilty of fraud and, when discovered, would be punished by a bank run, followed by criminal charges. The point to be made here is that the entire banking system today is totally unsound and totally corrupt.
  • In a sound banking system you have two types of deposits – checking account (or demand) deposits, and savings account (or time) deposits. They are completely different businesses. With demand deposits, you pay the bank to store your money securely, and write checks against it. A bank should no more lend out demand deposit money than Allied Storage should lend out the furniture you're paying them to store.
  • Savings accounts are completely different. Here you lend money to a bank, perhaps at 3%, and they relend it at 6%, making 3% to cover costs, risks and profits. A sound bank not only has to match the maturities of its deposits with the maturities of its loans, but must insure loans are both highly secured and self-liquidating.
  • These principles have been totally lost. Today banks operate as hedge funds.
  • As an aside, if someone were to set up a well-capitalized 100% reserve bank in a tax haven, especially using gold as an alternative currency, it would be immensely successful in the years to come – when most all conventional banks will fail.
  • By all historical, normal parameters, the stock market is greatly overvalued.
  • The trillions of new currency units that the Fed is creating are creating bubbles, and one of them is in the stock market. The biggest bubble, of course, is in the bond market – that's a super bubble.
  • Not only does the dollar have no real value but the banks you keep it in are all insolvent.
  • There are few sound investments out there. Today there are no investments; there are only speculations.
  • From the economist's point of view, the bubbles created by central banking are a disaster, but from a speculator's point of view they're a godsend. It's becoming harder and harder to be an investor; I define an investor as someone who allocates capital to productive business. It's hard to be an investor because you now have to spend more money on lawyers than on engineers and workers if you want to produce something. You're increasingly forced to be a speculator in today's climate.
  • Stock and bond markets all over the world are overpriced – with the exception of Russian stocks right now; they could be a very interesting speculation. I wouldn't touch anything in China yet, because all the Chinese banks are going to go bust.
  • The Chinese have been more profligate inflating the yuan than the Americans have been with the dollar. It's fantastic what the Chinese have done since Deng liberalized the economy in the early '80s, but now's not a time to be in their markets.
  • You've got to remember there are two types of people in the world: people who want to control material reality and people who want to control other people.
  • It's that second type who go into politics. They play games – here it's called the Great Game, which dignifies it in a way it shouldn't be – with other people's lives and property. It's been this way ever since the state was created about 5,000 years ago, and I don't think you should play games with other people's lives.
  • On the bright side, there are more scientists and engineers alive today than in all of human history put together, and so technology is advancing more rapidly than ever for that reason. That's a huge plus.
  • The second good thing is that the average person, at least those who aren't on welfare, tries to produce more than he consumes. That creates capital.
  • But I'm afraid that Western civilization reached its peak before World War I. World War I destroyed a huge amount of capital and, more importantly, it changed the moral bases of so many things.
  • Then World War II institutionalized the State as the most important part of society – which is perverse, because the state is actually the enemy of civil society.
  • I think Western civilization reached its peak in 1913, when it reached its maximum geographical extent. That was coincidental with the peak of its technological and philosophical influence on the world, much the way the Roman Empire reached its peak at about the end of the first century, then went down, slowly at first and then quickly. That's what's happening to the West.
  • Relative to the rest of the world, and contribution to world production, our piece of the economic pie is getting smaller and smaller. If we have another serious war it would be absolutely smaller, and the final nail in the coffin. Meanwhile, the US, with its bloated military, is just itching for another war. It's out of control, and unlikely to change at this point. That's a big trend that is in motion that I think is going to stay in motion.
  • Europe is in particularly bad shape. The place is a fascist/socialist disaster.
  • It was possible for the average European to keep his head above water through tax evasion in the past, but now those governments have broken bank secrecy everywhere, and it will destroy a lot of capital.
  • The "nation-state" is a really stupid and dysfunctional idea, and I'm glad it's on its way out.
  • That said, even the US, which from a cultural point of view is as much of a country as any place in the world, should actually break up into at least five or six regions.
  • Canada should break up into at least five or six regions initially.
  • I don't think politically; politics is the problem, not the solution. I think that the ideal solution is for every individual to opt out of the current system. When they give a war, you don't come. When they give a tax, you don't pay. When they give an election, you don't vote. You even try not to use their currency and their banking system. T
  • he ideal thing is to let the system collapse under its own weight as opposed to starting a new political party and then continuing to act politically, which is to say to use force on other people.
  • Market risk is huge today, but political risk is even bigger. One indication of that was, when the banks in Cyprus went bust some months ago, the government essentially confiscated everybody's account above 100,000 euros, in what they called a "bail-in."
  • You need several options. It seems like people haven't learned anything from what happened in Russia in 1917, Germany in 1933, China in 1948, Cuba in 1959, or Vietnam in 1975. Rwanda, Cambodia, Yugoslavia, Zimbabwe, Ukraine, Syria ... there are lots of examples and these things can and will eventually happen almost everywhere. When the chimpanzees go crazy, you don't want to be where they are. You've got to have a Plan B. You've got to have a crib out of that political jurisdiction. Acting like a plant, and staying put, isn't a good survival strategy for a human.
  •  
    "Doug Casey: I don't see a real recovery until they stop debasing the currency, radically cut government spending and taxation and eliminate most regulation. In other words, cease doing the things that caused this depression. And that's not going to happen until there's a collapse of the current order. Things have cyclically improved since the height of the crisis of 2008-09. The trillions of currency units created by the Federal Reserve have jammed the stock market higher and kept the big banks from going under. What surprises me is that retail prices have not moved as significantly as I would have expected. The reason, I believe, is that most of that money is still sitting in financial institutions. It has gone into cash out of fear, into stocks because they represent real wealth with earning power and into various speculative assets like artwork and collectible cars. Real estate has recovered somewhat, not because of strong fundamentals but strictly because of money creation. This isn't going to last because the way you get wealthy is by producing more than you consume and saving the difference - not by consuming more than you produce, and borrowing the difference. With the Fed keeping interest rates at artificially low levels, hoping to increase consumption, they're making it very foolish to save - when you get ½% or 1% on your savings. So people are saving less and they're borrowing more than they otherwise would. This is a formula for making things worse, not better. They are, idiotically, doing exactly the opposite of what they should be. Although, I hasten to add, I hate to pontificate on what the Fed "should" do. In point of fact, the Fed should be abolished; the market, not bureaucrats, should determine interest rates. We wouldn't be in this pickle to start with if the government wasn't involved in the economy. In fact, if it wasn't for the state, I suspect we'd all have a vastly higher standard of living, and would be colonizing the Moon, Mars and
3More

Reset The Net - Privacy Pack - 0 views

  • This June 5th, I pledge to take strong steps to protect my freedom from government mass surveillance. I expect the services I use to do the same.
  • Fight for the Future and Center for Rights will contact you about future campaigns. Privacy Policy
  •  
    I wound up joining this campaign at the urging of the ACLU after checking the Privacy Policy. The Reset the Net campaign seems to be endorsed by a lot of change-oriented groups, from the ACLU to Greenpeac to the Pirate Party. A fair number of groups with a Progressive agenda, but certainly not limited to them. The right answer to that situation is to urge other groups to endorse, not to avoid the campaign. Single-issue coalition-building is all about focusing on an area of agreement rather than worrying about who you are rubbing elbows with.  I have been looking for a a bipartisan group that's tackling government surveillance issues via mass actions but has no corporate sponsors. This might be the one. The reason: Corporate types like Google have no incentive to really butt heads with the government voyeurs. They are themselves engaged in massive surveillance of their users and certainly will not carry the battle for digital privacy over to the private sector. But this *is* a battle over digital privacy and legally defining user privacy rights in the private sector is just as important as cutting back on government surveillance. As we have learned through the Snowden disclosures, what the private internet companies have, the NSA can and does get.  The big internet services successfully pushed in the U.S. for authorization to publish more numbers about how many times they pass private data to the government, but went no farther. They wanted to be able to say they did something, but there's a revolving door of staffers between NSA and the big internet companies and the internet service companies' data is an open book to the NSA.   The big internet services are not champions of their users' privacy. If they were, they would be featuring end-to-end encryption with encryption keys unique to each user and unknown to the companies.  Like some startups in Europe are doing. E.g., the Wuala.com filesync service in Switzerland (first 5 GB of storage free). Compare tha
3More

Deutsche Telekom to follow Vodafone in revealing surveillance | World news | The Guardian - 0 views

  • Germany's biggest telecoms company is to follow Vodafone in disclosing for the first time the number of surveillance requests it receives from governments around the world.Deutsche Telekom, which owns half of Britain's EE mobile network and operates in 14 countries including the US, Spain and Poland, has already published surveillance data for its home nation – one of the countries that have reacted most angrily to the Edward Snowden revelations. In the wake of Vodafone's disclosures, first published in the Guardian on Friday, it announced that it would extend its disclosures to every other market where it operates and where it is legal.A spokeswoman for Deutsche Telekom, which has 140 million customers worldwide, said: "Deutsche Telekom has initially focused on Germany when it comes to disclosure of government requests. We are currently checking if and to what extent our national companies can disclose information. We intend to publish something similar to Vodafone."
  • Bosses of the world's biggest mobile networks, many of which have headquarters in Europe, are gathering for an industry conference in Shanghai this weekend, and the debate is expected to centre on whether they should join Deutsche and Vodafone in using transparency to push back against the use of their technology for government surveillance.Mobile companies, unlike social networks, cannot operate without a government-issued licence, and have previously been reluctant to discuss the extent of their cooperation with national security and law enforcement agencies.But Vodafone broke cover on Friday by confirming that in around half a dozen of the markets in which it operates, governments in Europe and outside have installed their own secret listening equipment on its network and those of other operators.
  •  
    Looks like Vodafone broke a government transparency logjam on government surveillance via digital communications, as to disclosure of raw totals of search warrants by nations other than the U.S. 
5More

The Orwellian Re-Branding of "Mass Surveillance" as Merely "Bulk Collection" - The Inte... - 0 views

  • Just as the Bush administration and the U.S. media re-labelled “torture” with the Orwellian euphemism “enhanced interrogation techniques” to make it more palatable, the governments and media of the Five Eyes surveillance alliance are now attempting to re-brand “mass surveillance” as “bulk collection” in order to make it less menacing (and less illegal). In the past several weeks, this is the clearly coordinated theme that has arisen in the U.S., UK, Canada, Australia and New Zealand as the last defense against the Snowden revelations, as those governments seek to further enhance their surveillance and detention powers under the guise of terrorism.
  • This manipulative language distortion can be seen perfectly in yesterday’s white-washing report of GCHQ mass surveillance from the servile rubber-stamp calling itself “The Intelligence and Security Committee of the UK Parliament (ISC)”(see this great Guardian Editorial this morning on what a “slumbering” joke that “oversight” body is). As Committee Member MP Hazel Blears explained yesterday (photo above), the Parliamentary Committee officially invoked this euphemism to justify the collection of billions of electronic communications events every day. The Committee actually acknowledged for the first time (which Snowden documents long ago proved) that GCHQ maintains what it calls “Bulk Personal Datasets” that contain “millions of records,” and even said about pro-privacy witnesses who testified before it: “we recognise their concerns as to the intrusive nature of bulk collection.” That is the very definition of “mass surveillance,” yet the Committee simply re-labelled it “bulk collection,” purported to distinguish it from “mass surveillance,” and thus insist that it was all perfectly legal.
  • This re-definition game goes as follows: yes, we vacuum up and store literally as much of the internet as we possibly can. Then we analyze all the data about what you’re doing, with whom you’re speaking, and who your network of associates is. Based on that analysis of all of you and your activities, we then read the communications that we want (with virtually no checks and concealing from you what percentage of it we’re reading), and store as much of the rest of it as technology permits for future trolling. But don’t worry: we’re only reading the Bad People’s emails. So run along then: no mass surveillance here. Just bulk collection! It’s not mass surveillance, but “enhanced collection techniques.”  One of the many facts that made the re-defining of “torture” so corrupt and indisputably invalid was that there was long-standing law making clear that exactly these interrogation techniques used by the U.S. government were torture and thus illegal. The same is true of this obscene attempt to re-define “mass surveillance” as nothing more than mere innocent “bulk collection.”
  • ...2 more annotations...
  • As Caspar Bowden points out, EU law is crystal clear that exactly what these agencies are doing constitutes illegal mass surveillance. From the 2000 decision of the European Court of Human Rights in Amann v. Switzerland, which found a violation of the right to privacy guaranteed by Article 8 of the European Convention on Human Rights and rejected the defense from the government that no privacy violation occurs if the data is not reviewed or exploited: The Court reiterates that the storing of data relating to the “private life” of an individual falls within the application of Article 8 § 1  . . . . The Court reiterates that the storing by a public authority of information relating to an individual’s private life amounts to an interference within the meaning of Article 8. The subsequent use of the stored information has no bearing on that finding (emphasis added). A separate 2000 ruling found a violation of privacy rights even when the government is merely storing records regarding one’s activities undertaken in public (such as attending demonstrations), because “public information can fall within the scope of private life where it is systematically collected and stored in files held by the authorities.” That’s why an EU Parliamentary Inquiry into the Snowden revelations condemned NSA and GCHQ spying in the “strongest possible terms,” pointing out that it was classic “mass surveillance” and thus illegal. That’s the same rationale that led a U.S. federal court to conclude that mass metatdata collection was very likely an unconstitutional violation of the privacy rights in the Fourth Amendment.
  • By itself, common sense should prevent any of these governments from claiming that sweeping up, storing, and analyzing much of the internet – literally examining billions of communications activities every week of entire populations – is something other than “mass surveillance.” Yet this has now become the coordinated defense from the governments in the U.S., the UK, Canada, New Zealand and Australia. It’s nothing short of astonishing to watch them try to get away with this kind of propagnadistic sophistry. (In the wake of our reports with journalist Nicky Hager on GCSB, watch the leader of New Zealand’s Green Party interrogate the country’s flailing Prime Minister this week in Parliament about this completely artificial distinction). But – just as it was stunning to watch media outlets refuse to use the term “torture” because the U.S. Government demanded that it be called something else – this Orwellian switch in surveillance language is now predictably (and mindlessly) being adopted by those nations’ most state-loyal media outlets.
5More

Obama's 'Redistributive Change' and the Death of Freedom by Andrew C. McCarthy on Natio... - 0 views

  • redistribution: the purported right of society’s ne’er-do-wells to pick the pockets of its achievers through the coercive power of government.
  • As Obama sees it, the Warren Court failed to “break free from the essential constraints that were placed by the founding fathers in the Constitution.”
  • First, the Framers viewed government as a necessary evil: required for a free people’s collective security but, if insufficiently checked, guaranteed to devour liberty. The purpose of the Constitution was not to make the positive case for government but for freedom. Freedom cannot exist without order, and thus implies some measure of government. But it is a limited government, vested with only the powers expressly enumerated. As the framers knew, a government that strays beyond those powers is necessarily treading on freedom’s territory. It is certain to erode the very “Blessings of Liberty” the Constitution was designed to secure.
  • ...1 more annotation...
  • Government is required to safeguard the rule of law and the national security. These injunctions are vital: there is no liberty without them.
  •  
    Oouch!. good article:: "There should no longer be any dispute that Barack Obama's aim is to socialize the American economy - as he vaporously puts it, to bring about "redistributive change." The real question is how he'll go about it. Very likely, the answer lies in a potentially cataclysmic treaty that has gotten virtually no attention during the campaign: the International Covenant on Economic, Social and Cultural Rights...... Obama sought to prove his point by citing the justices' failure to take on "the issues of redistribution of wealth, and of more basic issues such as political and economic justice in society............ Of course on the latter occasion, when Obama spoke of planning to "spread the wealth around," it was a slip. The candidate is far more guarded now than he was in 2001, just as he was more coy in 2001 than in his mid-Nineties incarnation - when he first sought to represent an extremely left-wing district and embraced his endorsement by the radical Chicago New Party (ACORN's electoral arm with ties to the Socialist International). ..."
11More

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
4More

DOJ accuses firm that vetted Snowden of faking 665,000 background checks - Investigations - 0 views

  • As Edward Snowden prepares to defend himself in a worldwide webinar Thursday, the Justice Department is accusing the private contractor that vetted him and thousands of other intelligence workers of bilking U.S. taxpayers out of tens of millions of dollars by conducting phony background checks.USIS, the giant private contractor that conducted the background checks of both Snowden and Washington Navy Yard shooter Aaron Alexis, is accused in a Justice Department lawsuit filed Wednesday night of conducting 665,000 fake background checks between 2008 and 2012.
  • “USIS management devised and executed a scheme to deliberately circumvent contractually required quality reviews of completed background investigations in order to increase the company’s revenues and profits,” said the Justice Department in its complaint, which was filed in U.S. District Court in Alabama. Advertise | AdChoices The DOJ lawsuit cites internal emails to back up charges that USIS senior officials devised a wide-ranging "scheme" to defraud the federal government on background checks through a practice known as "dumping" or "flushing" in order to boost the firm's profits.
  • The practice of "dumping" or "flushing" involved certifying to the U.S. Office of Personnel Management that full "quality review" background checks had been  performed when in fact those reviews had not been completed. Aided by a software program known as "Blue Zone," USIS identified large volumes of cases at the end of day as "Review Complete" -- and then fraudulently certified them to OPM, according to the complaint.
  •  
    665,000 more reasons for not trusting the government with confidential citizen data. 
9More

Failed NATO Invasion of Moldova SITREP, by Scott | The Vineyard of the Saker - 0 views

  • It’s hard to overestimate the value of planning in advance, especially when it comes to getting reservations in popular restaurants and invading countries by military force. In the week of the May 9th Victory Day two significant failures took place  each one remarkable in its own way. Each event went completely unreported by the Western corporate and government media, but discussed on Social Media.
  • In the following three weeks after the incident with the USS Florida, while Russia was preparing for Victory Day celebrations and all eyes were on Moscow, attention of Ukrainians was fully concentrated on the visit of Victoria Nuland to Kiev on April 26th allegedly to discuss the implementation of the Minsk II Agreement and the future elections in Donetsk and Lugansk republics. Since the day when President Putin said that the republics can have their elections anytime they want, the question of these elections ceased to be a subject of blackmail toward the Kremlin.   It appeared that the true reason for Nuland’s visit could be located to the west of Kiev, rather than the east. Just recently, Robert D. Kaplan, a former Stratfor’s Chief Geopolitical Analyst, and currently a senior fellow at the Center for a New American Security (CNAS) has published a book “In Europe’s Shadow” where he lays out a plan to reunite Romania with “its lost province of Moldova.” Nuland visited Moldova back in January, with the task to coerce Moldova’s government and its oligarchs to change the country’s Constitution provision of neutrality. Before she left, she gave a short speech at the American Embassy in Bucharest after a private dinner with PM Ciolos and President Klaus. “We powerfully support the desire of the people in Moldova to have responsible leaders who can implement reforms. This is the best way to assure the future of Moldova. Romania and the United States, in conjunction with NATO, have support programs in place to assure the security of Moldova but the government has to work to implement these programs.”
  • Moldova is one of the poorest countries in Eastern Europe, and its economy heavily relies on Russia. According to the CIA Fact Book: Moldova’s annual remittances of about $1.12 billion comes from the roughly one million Moldovans working in Europe, Russia, and other former Soviet Bloc countries; Moldova imports almost all of its energy supplies from Russia and Ukraine; Moldova’s dependence on Russian energy is underscored by a more than $5 billion debt to Russian natural gas supplier Gazprom; Moldova signed an Association Agreement and a Deep and Comprehensive Free Trade Agreement with the EU during fall 2014, however its biggest trade partner remains Russia. Everyone understands that a NATO membership will cut all economic ties with Russia, including jobs, and it will turn Moldova into a failed state, or in the CIA doublespeak, the country would stop being vulnerable to “Russian pressure.” Apparently, the failure of Moldova as a state, and its disappearance as a nation is also what the EU wants. On January 6, the new Moldovan Ambassador to Germany was presenting his credentials when, out of the blue, the German president asked the new ambassador what the procedure was for Republic of Moldova to formally unite with Romania. On May 4th, the Katehon reported on Vladimir Plahotniuc’s (the infamous Moldavian oligarch and mafia boss) visit to the US and his meeting with Victoria Nuland there. As the Victory Day celebration was approaching, we all fully anticipated from the US to conduct terror acts, military excursions/drills, and political and legal attacks on Russia as the US and the EU always do to harass Russia during its major national and Church holidays.
  • ...6 more annotations...
  • Starting with April 21st,  we saw a flurry of “news” about Ukraine and Romania joining NATO Black Sea flotilla and the organization of Romanian-Ukrainian-Bulgarian brigade similar to that created by Poland. On April 26, Georgia (Gruzia) pitched in via the Georgia Today: “creation of NATO Black Sea Fleet Gains US Support” and praising Turkey, Bulgaria and Romania for calls to expand the Western military. All what Russia said to all this NATO generated noise was a brief statement of  Russia’s envoy to NATO Alexander Grushko. “NATO should be in a position to know that all necessary steps will be taken from our side to neutralize the emerging threats.” With all these  preparations for the war on Russia going on, NATO also planned military drills in neutral Moldova, chosen to start on May 2nd, the day of remembrance for the victims of the Odessa Massacre. Meanwhile, the patriots of Moldavia who worked together regardless of their political views, discovered something interesting and saved Moldova. NATO reported that for drills they would be entering Moldova in four formations, and that the total of motorized units will be 50+. However, the very first formation that made an attempt to enter the territory of Moldova contained 100+ unites. This was just one formation. And there was expected three more formations.
  • The plan of NATO was to enter the country with too large for this tiny country forces, to stage a bloody false flag attack during the Victory Day celebration in Moldova with the participation of Ukrainian Right Sector terrorists masquerading as “pro-Russia separatists.” This plot worked in Ukraine, so it should work in Moldova, right? That’s the true reason why Nuland was in Kiev two weeks prior. After this false flag attack, a Romanian fleet was planned to enter Ukrainian territorial waters “by invitation of the Ukrainian government” and arrive to Odessa in order to block Russian fleets from interfering and helping Transnistria. But… Coming back to the bizarre incident near Gibraltar, when one NATO member’s tiny 20 tone Costal Guards’ boat was attacked by another NATO member for interfering with the 18,000 tones behemoth of a submarine  of the third NATO member. The NATO plan apparently was to stealthy and quietly position the Ohio-class ballistic guided-missile submarine USS Florida (SSGN 728) in the Mediterranean or even in the Black Sea so it would be able to shoot into Moldova to overwhelm Moldovan minuscule defense forces. We have to remember that it was the USS Florida “that opened up the Libya intervention,” firing more than 90 cruise missiles to destroy Libya’s air defenses and clearing the way for NATO air strikes. “Never before in the history of the United States of America has one ship conducted that much land attack strikes, conventionally, in one short time period,” Rear Adm. Rick Breckenridge had said.
  • However, thanks to Spanish Costal Guards the submarine was discovered and talked about all around the world via social media and the press. The USS Florida had no other options but to retreat and return to home base. In fact, there were TWO incidents on the same April 16th  day involving the USS Florida. First, it was  the Spanish patrol boat belonged to the Servicio de Vigilancia Aduanera, at whom the British Navy opened  fire.  A bit later,  the Guardia Civil vessel Rio Cedeña tried to cut across the submarine’s bow and was photographed  by multiple witnesses.
  • According to V.V. Pyakin, a political analyst with the Concept Technologies Foundation, a think tank located in St. Petersburg, NATO was in a process of conducting a full-scale invasion of Moldova with the annexation of a Southern part of Ukraine including Odessa to construct a NATO Navy base there. Moldova was supposed to become a part of Romania automatically with the US military forces arriving to the capital and taking  over the government of Moldova. That’s why NATO needed all those military “drills” in the Black Sea region and in the Baltics simultaneously. When the patriotic forces of Moldavia discovered that NATO was about to enter the territory of Moldova in four formations, 100+ motorized units each, they protested loudly and blocked the entrance of NATO troops on the border. Meanwhile, the biggest political fraction in Moldova threatened with the impeachment of the president for treason, if  NATO troops would be allowed to enter the country. Reports from Moldova at the time disclosed that American troops stopped at the border crossing didn’t have proper ID and other papers. Moldovans came to greet them with the banners “Moldova is a neutral country” and “Stop bases of NATO,” “Stop NATO” and “NATO go home.” As the result, on April 28th only about 60 units and 200 servicemen the U.S. Army 2nd Cavalry Regimental Engineer Squadron were allowed to enter the country.
  • When a formation of American military crossed the Romanian-Moldova border allegedly to take part in  Dragon Pioneer 2016 NATO military drills, Moldavian opposition leaders expressed protests. Several members of the Parliament blocked the road.  They reported to Russian and international media and news outlets that the US troops didn’t have an international agreement signed by the defense ministers of Moldova and USA. They also lacked a legal government agreement on the entrance of the heavy military equipment and weaponry to the territory of the country. 60% of American servicemen didn’t have valid military IDs. According to a TASS report,  “To prevent collisions, officers from the Fulger (Lightning) police battalion of special purpose intervened, which were specially delivered from Chisinau. After checking the documents, a column of military vehicles followed the US to the place of temporary location at the site of Negresht,” said the inspectorate.” “The initiative to invite the US troops into the country and hold the exhibition of American technology belongs to the Minister of Defense of Moldova Anatol Șalaru, who is famous for the organization of the “Museum of Soviet occupation” in Chisinau, calls to repeal neutrality and make the country a member of NATO, and the fight against monuments of the Soviet era.” This move was harshly criticized by Igor Dodon, whose party has the largest faction in Parliament and controls a quarter of the seats.
  • He stated: “We believe military exercises involving US troops on Moldovan territory is a flagrant violation of the constitutional principle of neutrality of Moldova. In this regard, the deputies from the Party of socialists have already initiated a number of procedures. They will continue, and this will be one of the reasons for introducing in May the initiative to dismiss the government.” By Victory Day it became apparent that the Nuland-Kogan-NATO plan for invasion of Moldova was foiled. All Americans could do was   to “crush” a Victory Day parade in the center of Moldova’s capital by coming uninvited and bringing their motorized vehicles to it. And that’s where NATO troops and Moldovan patriots came face to face. Pindos lost their freaking mind:  An American Colonel demands from the citizen of Moldova to leave the central square ПИНДОСЫ ОХРЕНЕЛИ В КОНЕЦ! Американский полковник предлагает покинуть центральную площадь Кишинева гражданину РМ pic.twitter.com/FfECO3NBXi — Серж Высоцкий (@Albertich50) May 12, 2016 An American Colonel demands from the citizen of Moldova to leave the central square
3More

Court: Ability to police U.S. spying program limited - The Washington Post - 0 views

  • The leader of the secret court that is supposed to provide critical oversight of the government’s vast spying programs said that its ability to do so is limited and that it must trust the government to report when it improperly spies on Americans. The chief judge of the Foreign Intelligence Surveillance Court said the court lacks the tools to independently verify how often the government’s surveillance breaks the court’s rules that aim to protect Americans’ privacy. Without taking drastic steps, it also cannot check the veracity of the government’s assertions that the violations its staff members report are unintentional mistakes.
  • “The FISC is forced to rely upon the accuracy of the information that is provided to the Court,” its chief, U.S. District Judge Reggie B. Walton, said in a written statement to The Washington Post. “The FISC does not have the capacity to investigate issues of noncompliance, and in that respect the FISC is in the same position as any other court when it comes to enforcing [government] compliance with its orders.” Walton’s comments came in response to internal government records obtained by The Post showing that National Security Agency staff members in Washington overstepped their authority on spy programs thousands of times per year. The records also show that the number of violations has been on the rise.
  • The court’s description of its practical limitations contrasts with repeated assurances from the Obama administration and intelligence agency leaders that the court provides central checks and balances on the government’s broad spying efforts. They have said that Americans should feel comfortable that the secret intelligence court provides robust oversight of government surveillance and protects their privacy from rogue intrusions.President Obama and other government leaders have emphasized the court’s oversight role in the wake of revelations this year that the government is vacuuming up “metadata” on Americans’ telephone and Internet communications. “We also have federal judges that we’ve put in place who are not subject to political pressure,” Obama said at a news conference in June. “They’ve got lifetime tenure as federal judges, and they’re empowered to look over our shoulder at the executive branch to make sure that these programs aren’t being abused.”
3More

Sloppy Cyber Threat Sharing Is Surveillance by Another Name | Just Security - 0 views

  • Imagine you are the target of a phishing attack: Someone sends you an email attachment containing malware. Your email service provider shares the attachment with the government, so that others can configure their computer systems to spot similar attacks. The next day, your provider gets a call. It’s the Department of Homeland Security (DHS), and they’re curious. The malware appears to be from Turkey. Why, DHS wants to know, might someone in Turkey be interested in attacking you? So, would your email company please share all your emails with the government? Knowing more about you, investigators might better understand the attack. Normally, your email provider wouldn’t be allowed to give this information over without your consent or a search warrant. But that could soon change. The Senate may soon make another attempt at passing the Cybersecurity Information Sharing Act, a bill that would waive privacy laws in the name of cybersecurity. In April, the US House of Representatives passed by strong majorities two similar “cyber threat” information sharing bills. These bills grant companies immunity for giving DHS information about network attacks, attackers, and online crimes.
  • Sharing information about security vulnerabilities is a good idea. Shared vulnerability data empowers other system operators to check and see if they, too, have been attacked, and also to guard against being similarly attacked in the future. I’ve spent most of my career fighting for researchers’ rights to share this kind of information against threats from companies that didn’t want their customers to know their products were flawed. But, these bills gut legal protections against government fishing expeditions exactly at a time when individuals and Internet companies need privacy laws to get stronger, not weaker. 
  • Worse, the bills aren’t needed. Private companies share threat data with each other, and even with the government, all the time. The threat data that security professionals use to protect networks from future attacks is a far more narrow category of information than those included in the bills being considered by Congress, and will only rarely contain private information. And none of the recent cyberattacks — not Sony, not Target, and not the devastating grab of sensitive background check interviews on government employees at the Office of Personnel Management — would have been mitigated by these bills.
5More

Venezuelan Conglomerate to Halt Beer Production | venezuelanalysis.com - 0 views

  • Polar, Venezuela’s largest private food and beverage provider, released a statement on Thursday that it will stop beer production, citing its inability to import raw materials. The company alleged the Venezuelan government has not issued sufficient US currency to purchase equipment and raw goods necessary to continue its production past this April. 
  • “Our current situation is this: We have not been able to replenish the inventory, and we only have malted barley to produce until April 29. Under those circumstances, we are obliged to suspend the production of beer and malts until we get access to the currency needed to procure the raw materials,” Polar’s statement continued.   Polar produces approximately 80 percent of beer consumed in Venezuela; however, due to rising beer prices, many artisanally crafted and traditional alcohols have become increasingly popular across the country.
  • While a complete halt to production would be a significant blow to workers; on other occasions, factory workers have taken over company plants following unexpected closures. Such was the case of the Clorox factory in Los Valles del Tuy, Miranda on the outskirts of Caracas in 2014. In recent years, the Venezuelan government as well as grassroots have denounced the hoarding of raw materials and alleged shortages are tactics used by private companies to instigate destabilization and the economic war. Polar along with other corporations have been among those accused of such actions. Polar is also well-known for its cornmeal flour product Harina Pan, used to make the national dish “arepas” which is now a rare sight on supermarket shelves and often sold at speculated prices.   The government and Venezuelan grassroots have also denounced Polar’s owner, Lorenzo Mendoza of hoarding, misappropriating state-subsidized dollars as well as conspiration against the government. Mendoza has denied these allegations.
  • ...1 more annotation...
  • In February, protestors in Catia on the west side of Caracas known for its working class roots also took-over Polar distribution trucks to demand that the company stop hoarding basic food and goods.
  •  
    Having failed in two violent coup attempts that were thwarted, the U.S., UK, and Israel, acting in convert with Venezuelan oligarchs have succeeded in inflicting enough misery that the Opposition has won a controlling majority in the Venezuelan legislature. The Bolivarian Revolution lives on at least for now in the executive and justice branches of government. A presidential impeachment process is about to begin without any impeachable offense being alleged. The U.S. has been pushing very hard diplomatically and via stiff economic sanctions to secure the release of principles in the previous violent coup attempts. A bill declaring amnesty for them was found unconstitutional by the Venezuelan high court. (I haven't checked but I suspect Venezuela's constitution  resembles that of the U.S. in placing the pardon power strictly in the hands of the Executive.) Watch out, Venezuela, if Hillary becomes the U.S. PreZ. 
4More

Committee to Protect Journalists issues scathing report on Obama administration | Glenn... - 0 views

  • It's hardly news that the Obama administration is intensely and, in many respects, unprecedentedly hostile toward the news-gathering process. Even the most Obama-friendly journals have warned of what they call "Obama's war on whistleblowers". James Goodale, the former general counsel of the New York Times during its epic fights with the Nixon administration, recently observed that "President Obama wants to criminalize the reporting of national security information" and added: "President Obama will surely pass President Richard Nixon as the worst president ever on issues of national security and press freedom."Still, a new report released today by the highly respected Committee to Protect Journalists - its first-ever on press freedoms in the US - powerfully underscores just how extreme is the threat to press freedom posed by this administration. Written by former Washington Post executive editor Leonard Downie, Jr., the report offers a comprehensive survey of the multiple ways that the Obama presidency has ushered in a paralyzing climate of fear for journalists and sources alike, one that severely threatens the news-gathering process.The first sentence: "In the Obama administration's Washington, government officials are increasingly afraid to talk to the press."
  • It quotes New York Times national security reporter Scott Shane as saying that sources are "scared to death." It quotes New York Times reporter David Sanger as saying that "this is the most closed, control freak administration I've ever covered." And it notes that New York Times public editor Margaret Sullivan previously wrote that "it's turning out to be the administration of unprecedented secrecy and unprecedented attacks on a free press."Based on all this, Downie himself concludes:The administration's war on leaks and other efforts to control information are the most aggressive I've seen since the Nixon administration, when I was one of the editors involved in The Washington Post's investigation of Watergate. The 30 experienced Washington journalists at a variety of news organizations whom I interviewed for this report could not remember any precedent."And this pernicious dynamic extends far beyond national security: "Ellen Weiss, Washington bureau chief for E.W. Scripps newspapers and stations, said 'the Obama administration is far worse than the Bush administration' in trying to thwart accountability reporting about government agencies." It identifies at least a dozen other long-time journalists making similar observations.
  • The report ends by noting the glaring irony that Obama aggressively campaigned on a pledge to usher in The Most Transparent Administration Ever™. Instead, as the New Yorker's investigative reporter Jane Mayer recently said about the Obama administration's attacks: "It's a huge impediment to reporting, and so chilling isn't quite strong enough, it's more like freezing the whole process into a standstill."
  •  
    Note how Obama is not winning over the press with his legislation to give reporters for mainstream media a special privilege from some types of surveillance. When last I checked, that effort had bogged down in the effort to define "journalist" in a way that did not include every blogger on the planet. Small wonder: the Supreme Court has repeatedly held that there is no constitutional basis for a special protection for journalists *because the lone, anonymous pamphleteer has the same Freedom of the Press that mainstream journalists have.* I rarely make absolute predictions about what courts will do in the future, but this is black-letter First Amendment law. The legislation is doomed to be voided by the courts even if passed. Big, big denial of equal protection by the First Amendment. There is no alternative to ending the government surveillance except forfeiture of our freedoms.   
‹ Previous 21 - 40 of 108 Next › Last »
Showing 20 items per page