Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "trust-in-media" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
2More

How Government and the Media Equate Political Dissent with "Conspiracy Theories" and "H... - 0 views

  • In this age of propaganda and disinformation when mainstream media outlets act as presstitutes for the corporatized federal government, there has been an overt movement in recent years to label dissenters, patriots, government critics and even returning US soldiers from the warfronts as potential homegrown terrorists. For decades the government and co-opted mainstream media’s onetime favorite tactic heavy-handedly used to customarily dismiss their critics was to simply label those exposing government deception as “conspiracy theorists.” However, with distrust mounting amongst Americans toward both their leaders (86% distrust government) and the media (over 60% little or no trust toward media), this strategy is no longer working because so many conspiracies have been proven to be real. With a fascist state worried that its authority is fast slipping away amongst its populace, today the stakes have never been higher. Slander, character assassination and guilt by association are increasingly utilized nowadays as favorite tools to systematically destroy, discredit and demonize those citizens courageous enough to speak the truth exposing government lies, deception, theft and destruction.
  • Raising the stakes from the relative benign label “conspiracy theorist” to “homegrown terrorist” reflects a parallel process the US government has historically employed in manufacturing convenient enemies as needed – Russia and China’s expanding Communism from the 1950’s cold war through the 1980’s, to al Qaeda’s expanding terrorism in the twenty-first century and now back to Russia and China’s expanding imperialism all over again. The vicious cycle locked by design in a forever do-loop as the same subversive strategy remains unchanged throughout the years, only the names and dates change as the government self-servingly sees fit. As long as there are enemy targets to conveniently blame designed to induce fear and elicit support from a dumbed down, brainwashed and powerless American public, war and the military security complex will continue to flourish on a perpetual permanency basis, of course at the expense of humanity both domestically and globally.
6More

100th Anniversary of the Beginning of the End? (Part 1) - The Patriot Post - 1 views

  • I take the Oath of John Galt and put action to it: "I swear by my life and my love of it, that I will never live for the sake of another person, nor ask another to live their life for me."
  • In this dark day of the former republic, I stand in Resistance to the premier means of acquisition by the State, the Income Tax.
  • "They that can give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety." (Ben Franklin)
  • ...2 more annotations...
  • "A Constitution of Government once changed from Freedom, can never be restored. Liberty, once lost, is lost forever." (John Adams)
  • "Our cause is noble; it is the cause of mankind!" (George Washington)
  •  
    Excellent history of how America lost it's Constitutional Republic.  The author tags the first progressive (marxist/socialist) President, Woodrow Wilson, as the culprit.  In 1913 Wilson shoved through the 16th and 17th Amendments.  He also pushed through the midnight express known as the Federal Reserve.  And as if that was not enough damage, he pushed for the "League of Nations" - a precursor to the present day United Nations Globalist New World Order. Oh yeah, the first progressive president also jacked us into humanities first World War. Wilson was a Manchurian stooge for the Globalist Rothschild Banksters, and the USA Bankster contingent led by Rockefeller, Morgan and Carnegie.   Note that in the election of 1896, the Banksters banked the corporatist McKinley against the GOLD standard populist, William Jennings Bryan.  McKinley was assassinated in 1901, and his VP, Teddy Roosevelt, became President.  Roosevelt successfully went after the Robber Bankster Barons; Rockefeller, Carnegie and Morgan, passing the Sherman Anti Trust laws and bringing the criminal corporations to trial.  This set the stage for the Bankster coup in 1913, where, with the election of Wilson the Banksters ended the great Consttitutional Republic and ushered in a century of ever encroaching socialist tyranny. ........................... excerpt: "One hundred years ago, our federal government, under control of the progressive Woodrow Wilson, took actions that have since become a disaster for these United States. Looking back, these actions were the beginning of what could be the end of our Constitutional Republic. With progressives in control in 2013, similar actions are underway that could complete a sinister view by progressives then and now to "transform" us into something our Founders never intended, and most Americans through the years never wanted and still don't. In 1913 our Constitution was amended by the ratification of two amendments, the Sixteenth and Seventeenth, an
10More

ISIL, Turkey: The Dream of Restoring the Glories of Sublime Ottoman State , by Israa Al... - 0 views

  • The ISIL’s funding father is Erdogan’s personal friend The name of the Saudi businessman Yassin al-Qadi has been linked to organizations classified as terrorist internationally. In particular, the foreign press and the Turkish opposition media describe him as “al-Qaeda’s funding father”. After the events of September 11/2001, al-Qadi- along with other figures- has been included in the world’s list of terrorists, and his name was stereotyped as a terrorist man. This made several countries ban him from entering into their territories, Turkey was one of them. Earlier, the Turkish media documented a photo scandal: Erdogan’s meetings with Yassin al-Qadi as well as long meetings with his son Bilal Recep Tayyip Erdogan. The scandal that was leaked by Turkish security elements came in the context of the case of corruption of which the son of the former Turkish Prime Minister has been accused. Based upon this, a large number of elements of the security corps were arrested being accused of plotting a coup against the government.
  • Nevertheless, the French journalist Thierry Meyssan describes Yassin al-Qadi as a personal friend of both Dick Cheney (former U.S. Vice President) and Recep Tayyip Erdogan. According to him, al-Qadi visited Turkey four times during 2012, and “his plane used to land at the second airport of Istanbul, and was being welcomed by the Prime Minister personally, without going through the smart gate, and after cutting the security cameras’ power supply”. The Turkish Gmehoriet Newspaper intended to publish details about the investigations conducted by the Turkish judiciary on the same case, and mentioned that Recep Tayyip Erdogan introduced Yassine al-Qadi as a Saudi businessman visiting Turkey to invest and denied that he is a terrorist. It quoted him as saying: “I trust Mr. Al-Qadi just as I trust myself. He is an almsgiver”.
  • The Turkish newspaper, after publishing Erdogan’s utterances before the Turkish judiciary, revealed that the Turkish police monitored 12 visits made by the Saudi man to Turkey. Seven out of these visits have been made with the help of Erdogan, the period when he was banned from entering Turkey, because his name was added as one of the world wanted terrorists in the list of the American FBI. The newspaper commented saying: “When the Turkish police was looking for al-Qadi, he was holding meetings with the Prime Minister”. Also, it published a photograph that showed separately the aforesaid man, Erdogan, and the Turkish intelligence chief Hakan Fidan, when they were going to a meeting that gathered them. The newspaper noted that Fidan himself met with al-Qadi 5 times when Al-Qadi has been banned from entering the Turkish territory.
  • ...7 more annotations...
  • Yet, the interesting thing is the leaked recordings published by the newspaper that disclose that Yassin al-Qadi used to give orders to the Erdogan’s office. He used to call to inform them that he had decided today to meet with Erdogan, and that the latter should not engage in any other obligations. The newspaper reported details about the dates of the meetings between the two men, what implies that the meetings were being attended by Fidan and by the Egyptian businessman Osama Qutob; the son of Muhammad Qutob the brother of the Brotherhood leader Sayyid Qutob who holds the Turkish citizenship and is living with his father in Turkey at present. This also mean that the meetings were taking place sometimes at the home of the Turkish businessman Mustafa Latif Topas in Istanbul, attended by Erdogan’s son and Moaz the son of al-Qadi. The recordings verify that Qutob was in charge of delivering the messages from the insurgents in the battlefield in Syria to Erdogan, what signifies that the meetings of these figures exceeded the issues of investment, and perhaps they exploited the title of a charity practice!
  • Those returning from Turkey refer to the public sympathy in the pro-government Turkish street with the ISIL. Social networking websites publish photos of Islamic libraries in Istanbul selling “T-shirts” and goods with the ISIL logo on them. Perhaps this news is no longer shocking after what the German (ARD) Television has revealed regarding the opening of an office for the ISIL in al-Fateh Street in Istanbul, being ran by Turks. Through it, the process of supporting and supplying the Takfiri organization in Iraq and Syria with funds and fighters takes place.
  • The German channel itself revealed in a video report aired by it that the ISIL has training camps on the Turkish territory: 1- The GAZIANTEP Camp: a training camp for the ISIL fighters According to the report published by the website of “Today’s Zaman”, an English-language newspaper in Turkey, the Governor of the Gaziantep (Erdal Ata) rushed to hold a press conference to deny what has been revealed by the German television. However, he spoke about the arrest of 19 elements that belong to the ISIL in the city, among those who came from European countries before committing them to trial.
  • Additionally, the Lebanese journalist Hassan Hamade, in an earlier interview with Al-Manar, drew attention to the existence of three training camps in Turkey for the fighters of extremist organizations [3]. 2- The ORFA Camp, southeastern Turkey: a camp out of which the gunmen came when they attacked the Kasab city that its residents are predominantly Armenian.
  • 3- The OSMANIYA camp in Adana, southern Turkey: It is directly near the major bases of the U.S. Air Force in the Turkish territory. Yet, what is interesting is that the Osmaniya camp is a stone’s throw away from the gas pipelines points of intersection coming from Iraq and Central Asia that empty the freight in the Turkish port of Ceyhan on the Mediterranean Sea. 4- The KARMAN camp, it is also in Adana but is much closer to Istanbul. Moreover, a document published by the French journalist Thierry Meyssan, earlier, revealed that Turkey facilitated the infiltration of 5,000 fighters, who belong to al-Qaeda, to the Syrian territory after receiving training in Libya.
  • Perhaps the report of the American TV Network clarifies the argument of the Turkish journalist Orhan Kama Genghis: “The strongholds of the ISIL are located close to the Turkish border, and this did not happen coincidentally”. The Turkish journalist Kadri Gursel talks about the fact that the Turkish border territories have turned into an easy pathway facilitating the arrival and departure of the militants, where there are no formal procedures (visas, etc…) that could bother them, referring to the cooperation of the Turkish intelligence agency with the militants. Above and beyond, the Turkish opposition Republican People’s Party MP Muharram Ingee said that the ISIL leader “Mazen Abu Mohammed” received treatment in one of the Turkish government hospitals in the city of Hatay on April 2014, publishing a photo of the terrorist man in the hospital.
  • Reviewing these data provide an early answer to the question of the Saudi writer, Nawaf Qadimi, who is known for his support for the Muslim Brotherhood, where the phenomenon of the ISIL leads us to evoke history. The Seljuks drew the policies to expand their influence and their tools were the advocates of takfir and the recruiting of fighters in the name of religion. Here is Erdogan in actual fact walking in the footsteps of the ancestors and painting policies, and the tools are the texts of takfir for which he is recruiting fighters in the name of religion itself! That is how history is enabling us to understand our present...
5More

Glenn Greenwald: The NSA Can "Literally Watch Every Keystroke You Make" - 0 views

  • On Sunday, the German publication Der Spiegel revealed new details about secretive hacking—a secretive hacking unit inside the NSA called the Office of Tailored Access Operations, or TAO. The unit was created in 1997 to hack into global communications traffic. Still with us, Jameel Jaffer, deputy legal director of the ACLU, director of the ACLU’s Center for Democracy, and Glenn Greenwald, the journalist who first broke the story about Edward Snowden. Glenn, can you just talk about the revelations in Der Spiegel?
  • And one of the ways that they’re doing it is that they intercept products in transit, such as if you order a laptop or other forms of Internet routers or servers and the like, they intercept it in transit, open the box, implant the malware, factory-seal it and then send it back to the user. They also exploit weaknesses in Google and YouTube and Yahoo and other services, as well, in order to implant these devices. It’s unclear to what extent, if at all, the companies even know about it, let alone cooperate in it. But what is clear is that they’ve been able to compromise the physical machines themselves, so that it makes no difference what precautions you take in terms of safeguarding the sanctity of your online activity.
  • But we’ve actually been working, ourselves, on certain stories that should be published soon regarding similar interdiction efforts. And one of the things that I think is so amazing about this, Amy, is that the U.S. government has spent the last three or four years shrilly, vehemently warning the world that Chinese technology companies are unsafe to purchase products from, because they claim the Chinese government interdicts these products and installs surveillance, backdoors and other forms of malware onto the machinery so that when you get them, immediately your privacy is compromised. And they’ve actually driven Chinese firms out of the U.S. market and elsewhere with these kinds of accusations. Congress has convened committees to issue reports making these kind of accusations about Chinese companies. And yet, at the same time, the NSA is doing exactly that which they accuse these Chinese companies of doing. And there’s a real question, which is: Are these warnings designed to steer people away from purchasing Chinese products into the arms of the American industry so that the NSA’s ability to implant these devices becomes even greater, since now everybody is buying American products out of fear that they can no longer buy Chinese products because this will happen to them?
  • ...1 more annotation...
  • And the final thing I want to say is, you know, all this talk about amnesty for Edward Snowden, and it’s so important that the rule of law be applied to him, it’s really quite amazing. Here’s Michael Hayden. He oversaw the illegal warrantless eavesdropping program implemented under the Bush administration. He oversaw torture and rendition as the head of the CIA. James Clapper lied to the face of Congress. These are felonies at least as bad, and I would say much worse, than anything Edward Snowden is accused of doing, and yet they’re not prosecuted. They’re free to appear on television programs. The United States government in Washington constantly gives amnesty to its highest officials, even when they commit the most egregious crimes. And yet the idea of amnesty for a whistleblower is considered radical and extreme. And that’s why a hardened felon like Michael Hayden is free to walk around on the street and is treated on American media outlets as though he’s some learned, wisdom-drenched elder statesman, rather than what he is, which is a chronic criminal.
  •  
    Greenwald asks a very good question about the U.S. government accusing the Chinese government of cyber-espionage and the government's finding that Chinese-manufactured ware pose a security risk. Was that intended to drive people to purchase hardware that comes equipped with NSA backdoors? The flip side, of course, is whether the world should be beating feet to purchase their hardware from the Chinese in order to escape the NSA backdoors. Then there is the question of how those backdoors might have made their way into the hardware devices without the acquiescence of their manufacturers, who surely would have realized that their businesses might take enormous financial hits if knowledge of the backdoors became public? Bribing key staff? The manufacturers named in the Der Spiegel article surely are going to face some hard questions and they may face some very unhappy shareholders if their stock prices take a dive. It would be fun to see a shareholder's derivative class action against one of these companies for having acquiesced to NSA implantation of backdoors, leading to the disclosure and the fall in stock price. Caption the case as Wall Street, Inc. v. National Security Agency, dba Seagate Technology, PLC, then watch the feathers and blood fly.  "Seagate is the company the world trusts to store our lives - our files and photos, our libraries and histories, our science and progress."   Yes, and your stockholders trusted you not to endanger their investment by adding NSA backdoors in your products.
9More

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
16More

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahama... - 0 views

  • The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month. SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
  • All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
  • By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.
  • ...12 more annotations...
  • The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country. MYSTIC was established in 2009 by the NSA’s Special Source Operations division, which works with corporate partners to conduct surveillance. Documents in the Snowden archive describe it as a “program for embedded collection systems overtly installed on target networks, predominantly for the collection and processing of wireless/mobile communications networks.”
  • If an entire nation’s cell-phone calls were a menu of TV shows, MYSTIC would be a cable programming guide showing which channels offer which shows, and when. SOMALGET would be the DVR that automatically records every show on every channel and stores them for a month. MYSTIC provides the access; SOMALGET provides the massive amounts of storage needed to archive all those calls so that analysts can listen to them at will after the fact. According to one NSA document, SOMALGET is “deployed against entire networks” in the Bahamas and the second country, and processes “over 100 million call events per day.”
  • When U.S. drug agents need to tap a phone of a suspected drug kingpin in another country, they call up their counterparts and ask them set up an intercept. To facilitate those taps, many nations – including the Bahamas – have hired contractors who install and maintain so-called lawful intercept equipment on their telecommunications. With SOMALGET, it appears that the NSA has used the access those contractors developed to secretly mine the country’s entire phone system for “signals intelligence” –recording every mobile call in the country. “Host countries,” the document notes, “are not aware of NSA’s SIGINT collection.” “Lawful intercept systems engineer communications vulnerabilities into networks, forcing the carriers to weaken,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “Host governments really should be thinking twice before they accept one of these Trojan horses.”
  • The DEA has long been in a unique position to help the NSA gain backdoor access to foreign phone networks. “DEA has close relationships with foreign government counterparts and vetted foreign partners,” the manager of the NSA’s drug-war efforts reported in a 2004 memo. Indeed, with more than 80 international offices, the DEA is one of the most widely deployed U.S. agencies around the globe. But what many foreign governments fail to realize is that U.S. drug agents don’t confine themselves to simply fighting narcotics traffickers. “DEA is actually one of the biggest spy operations there is,” says Finn Selander, a former DEA special agent who works with the drug-reform advocacy group Law Enforcement Against Prohibition. “Our mandate is not just drugs. We collect intelligence.” What’s more, Selander adds, the NSA has aided the DEA for years on surveillance operations. “On our reports, there’s drug information and then there’s non-drug information,” he says. “So countries let us in because they don’t view us, really, as a spy organization.”
  • “I seriously don’t think that would be your run-of-the-mill legal interception equipment,” says the former engineer, who worked with hardware and software that typically maxed out at 1,000 intercepts. The NSA, by contrast, is recording and storing tens of millions of calls – “mass surveillance,” he observes, that goes far beyond the standard practices for lawful interception recognized around the world. The Bahamas Telecommunications Company did not respond to repeated phone calls and emails.
  • The proliferation of private contractors has apparently provided the NSA with direct access to foreign phone networks. According to the documents, MYSTIC draws its data from “collection systems” that were overtly installed on the telecommunications systems of targeted countries, apparently by corporate “partners” cooperating with the NSA. One NSA document spells out that “the overt purpose” given for accessing foreign telecommunications systems is “for legitimate commercial service for the Telco’s themselves.” But the same document adds: “Our covert mission is the provision of SIGINT,” or signals intelligence.
  • According to the NSA documents, MYSTIC targets calls and other data transmitted on  Global System for Mobile Communications networks – the primary framework used for cell phone calls worldwide. In the Philippines, MYSTIC collects “GSM, Short Message Service (SMS) and Call Detail Records” via access provided by a “DSD asset in a Philippine provider site.” (The DSD refers to the Defence Signals Directorate, an arm of Australian intelligence. The Australian consulate in New York declined to comment.) The operation in Kenya is “sponsored” by the CIA, according to the documents, and collects “GSM metadata with the potential for content at a later date.” The Mexican operation is likewise sponsored by the CIA. The documents don’t say how or under what pretenses the agency is gathering call data in those countries. In the Bahamas, the documents say, the NSA intercepts GSM data that is transmitted over what is known as the “A link”–or “A interface”–a core component of many mobile networks. The A link transfers data between two crucial parts of GSM networks – the base station subsystem, where phones in the field communicate with cell towers, and the network subsystem, which routes calls and text messages to the appropriate destination. “It’s where all of the telephone traffic goes,” says the former engineer.
  • When U.S. drug agents wiretap a country’s phone networks, they must comply with the host country’s laws and work alongside their law enforcement counterparts. “The way DEA works with our allies – it could be Bahamas or Jamaica or anywhere – the host country has to invite us,” says Margolis. “We come in and provide the support, but they do the intercept themselves.” The Bahamas’ Listening Devices Act requires all wiretaps to be authorized in writing either by the minister of national security or the police commissioner in consultation with the attorney general. The individuals to be targeted must be named. Under the nation’s Data Protection Act, personal data may only be “collected by means which are both lawful and fair in the circumstances of the case.” The office of the Bahamian data protection commissioner, which administers the act, said in a statement that it “was not aware of the matter you raise.” Countries like the Bahamas don’t install lawful intercepts on their own. With the adoption of international standards, a thriving market has emerged for private firms that are contracted by foreign governments to install and maintain lawful intercept equipment. Currently valued at more than $128 million, the global market for private interception services is expected to skyrocket to more than $970 million within the next four years, according to a 2013 report from the research firm Markets and Markets.
  • If the U.S. government wanted to make a case for surveillance in the Bahamas, it could point to the country’s status as a leading haven for tax cheats, corporate shell games, and a wide array of black-market traffickers. The State Department considers the Bahamas both a “major drug-transit country” and a “major money laundering country” (a designation it shares with more than 60 other nations, including the U.S.). According to the International Monetary Fund, as of 2011 the Bahamas was home to 271 banks and trust companies with active licenses. At the time, the Bahamian banks held $595 billion in U.S. assets. But the NSA documents don’t reflect a concerted focus on the money launderers and powerful financial institutions – including numerous Western banks – that underpin the black market for narcotics in the Bahamas. Instead, an internal NSA presentation from 2013 recounts with pride how analysts used SOMALGET to locate an individual who “arranged Mexico-to-United States marijuana shipments” through the U.S. Postal Service.
  • The presentation doesn’t say whether the NSA shared the information with the DEA. But the drug agency’s Special Operations Divison has come under fire for improperly using classified information obtained by the NSA to launch criminal investigations – and then creating false narratives to mislead courts about how the investigations began. The tactic – known as parallel construction – was first reported by Reuters last year, and is now under investigation by the Justice Department’s inspector general. So: Beyond a desire to bust island pot dealers, why would the NSA choose to apply a powerful collection tool such as SOMALGET against the Bahamas, which poses virtually no threat to the United States? The answer may lie in a document that characterizes the Bahamas operation as a “test bed for system deployments, capabilities, and improvements” to SOMALGET. The country’s small population – fewer than 400,000 residents – provides a manageable sample to try out the surveillance system’s features. Since SOMALGET is also operational in one other country, the Bahamas may be used as a sort of guinea pig to beta-test improvements and alterations without impacting the system’s operations elsewhere. “From an engineering point of view it makes perfect sense,” says the former engineer. “Absolutely.”
  • SOMALGET operates under Executive Order 12333, a Reagan-era rule establishing wide latitude for the NSA and other intelligence agencies to spy on other countries, as long as the attorney general is convinced the efforts are aimed at gathering foreign intelligence. In 2000, the NSA assured Congress that all electronic surveillance performed under 12333 “must be conducted in a manner that minimizes the acquisition, retention, and dissemination of information about unconsenting U.S. persons.” In reality, many legal experts point out, the lack of judicial oversight or criminal penalties for violating the order render the guidelines meaningless. “I think it would be open, whether it was legal or not,” says German, the former FBI agent. “Because we don’t have all the facts about how they’re doing it. For a long time, the NSA has been interpreting their authority in the broadest possible way, even beyond what an objective observer would say was reasonable.” “An American citizen has Fourth Amendment rights wherever they are,” adds Kurt Opsahl, an attorney with the Electronic Frontier Foundation. “Nevertheless, there have certainly been a number of things published over the last year which suggest that there are broad, sweeping programs that the NSA and other government agencies are doing abroad that sweep up the communications of Americans.”
  • Legal or not, the NSA’s covert surveillance of an entire nation suggests that it will take more than the president’s tepid “limits” to rein in the ambitions of the intelligence community. “It’s almost like they have this mentality – if we can, we will,” says German. “There’s no analysis of the long-term risks of doing it, no analysis of whether it’s actually worth the effort, no analysis of whether we couldn’t take those resources and actually put them on real threats and do more good.” It’s not surprising, German adds, that the government’s covert program in the Bahamas didn’t remain covert. “The undermining of international law and international cooperation is such a long-term negative result of these programs that they had to know would eventually be exposed, whether through a leak, whether through a spy, whether through an accident,” he says. “Nothing stays secret forever. It really shows the arrogance of these agencies – they were just going to do what they were going to do, and they weren’t really going to consider any other important aspects of how our long-term security needs to be addressed.”
  •  
    Words fail me.
12More

Global Financial Meltdown Coming? Clear Signs That The Great Derivatives Crisis Has Now... - 0 views

  • No one “understands” derivatives. How many times have readers heard that thought expressed (please round-off to the nearest thousand)? Why does no one understand derivatives? For many; the answer to that question is that they have simply been thinking too hard. For others; the answer is that they don’t “think” at all. Derivatives are bets. This is not a metaphor, or analogy, or generalization. Derivatives are bets. Period. That’s all they ever were. That’s all they ever can be.
  • One very large financial institution that appears to be in serious trouble with these financial weapons of mass destruction is Glencore.  At one time Glencore was considered to be the 10th largest company on the entire planet, but now it appears to be coming apart at the seams, and a great deal of their trouble seems to be tied to derivatives.  The following comes from Zero Hedge… Of particular concern, they said, was Glencore’s use of financial instruments such as derivatives to hedge its trading of physical goods against price swings. The company had $9.8 billion in gross derivatives in June 2015, down from $19 billion in such positions at the end of 2014, causing investors to query the company about the swing. Glencore told investors the number went down so drastically because of changes in market volatility this year, according to people briefed by Glencore. When prices vary significantly, it can increase the value of hedging positions. Last year, there were extreme price moves, particularly in the crude-oil market, which slid from about $114 a barrel in June to less than $60 a barrel by the end of December.
  • That response wasn’t satisfying, said Michael Leithead, a bond fund portfolio manager at EFG Asset Management, which managed $12 billion as of the end of March and has invested in Glencore’s debt.
  • ...8 more annotations...
  • According to Bank of America, the global financial system has about 100 billion dollars of exposure overall to Glencore.  So if Glencore goes bankrupt that is going to be a major event.  At this point, Glencore is probably the most likely candidate to be “the next Lehman Brothers”. And it isn’t just Glencore that is in trouble.  Other financial giants such as Trafigura are in deep distress as well.  Collectively, the global financial system has approximately half a trillion dollars of exposure to these firms… Worse, since it is not just Glencore that the banks are exposed to but very likely the rest of the commodity trading space, their gross exposure blows up to a simply stunning number:
  • For the banks, of course, Glencore may not be their only exposure in the commodity trading space. We consider that other vehicles such as Trafigura, Vitol and Gunvor may feature on bank balance sheets as well ($100 bn x 4?)
  • Call it half a trillion dollars in very highly levered exposure to commodities: an asset class that has been crushed in the past year. The mainstream media is not talking much about any of this yet, and that is probably a good thing.  But behind the scenes, unprecedented moves are already taking place. When I came across the information that I am about to share with you, I was absolutely stunned.  It comes from Investment Research Dynamics, and it shows very clearly that everything is not “okay” in the financial world… Something occurred in the banking system in September that required a massive reverse repo operation in order to force the largest ever Treasury collateral injection into the repo market.   Ordinarily the Fed might engage in routine reverse repos as a means of managing the Fed funds rate.   However, as you can see from the graph below, there have been sudden spikes up in the amount of reverse repos that tend to correspond the some kind of crisis – the obvious one being the de facto collapse of the financial system in 2008:
  • What in the world could possibly cause a spike of that magnitude? Well, that same article that I just quoted links the troubles at Glencore with this unprecedented intervention… What’s even more interesting is that the spike-up in reverse repos occurred at the same time – September 16 – that the stock market embarked on an 8-day cliff dive, with the S&P 500 falling 6% in that time period.  You’ll note that this is around the same time that a crash in Glencore stock and bonds began.   It has been suggested by analysts that a default on Glencore credit derivatives either by Glencore or by financial entities using derivatives to bet against that event would be analogous to the “Lehman moment” that triggered the 2008 collapse. The blame on the general stock market plunge was cast on the Fed’s inability to raise interest rates.  However that seems to be nothing more than a clever cover story for something much more catastrophic which began to develop out sight in the general liquidity functions of the global banking system. Back in 2008, Lehman Brothers was not “perfectly fine” one day and then suddenly collapsed the next.  There were problems brewing under the surface well in advance. Well, the same thing is happening now at banking giants such as Deutsche Bank, and at commodity trading firms such as Glencore, Trafigura and The Noble Group. And of course a lot of smaller fish are starting to implode as well.  I found this example posted on Business Insider earlier today…
  • On September 11, Spruce Alpha, a small hedge fund which is part of a bigger investment group, sent a short report to investors. The letter said that the $80 million fund had lost 48% in a month, according the performance report seen by Business Insider. There was no commentary included in the note. No explanation. Just cold hard numbers.
  • Wow – how do you possibly lose 48 percent in a single month? It would be hard to do that even if you were actually trying to lose money on purpose. Sadly, this kind of scenario is going to be repeated over and over as we get even deeper into this crisis. Meanwhile, our “leaders” continue to tell us that there is nothing to worry about.  For example, just consider what former Fed Chairman Ben Bernanke is saying…
  • Former Federal Reserve chairman Ben Bernanke doesn’t see any bubbles forming in global markets right right now. But he doesn’t think you should take his word for it. And even if you did, that isn’t the right question to ask anyway. Speaking at a Wall Street Journal event on Wednesday morning, Bernanke said, “I don’t see any obvious major mispricings. Nothing that looks like the housing bubble before the crisis, for example. But you shouldn’t trust me.”
  • I certainly agree with that last sentence.  Bernanke was the one telling us that there was not going to be a recession back in 2008 even after one had already started.  He was clueless back then and he is clueless today. Most of our “leaders” either don’t understand what is happening or they are not willing to tell us. So that means that we have to try to figure things out for ourselves the best that we can.  And right now there are signs all around us that another 2008-style crisis has begun. Personally, I am hoping that there will be a lot more days like today when the markets were relatively quiet and not much major news happened around the world. Unfortunately for all of us, these days of relative peace and tranquility are about to come to a very abrupt end.
  •  
    "Warren Buffett once referred to derivatives as "financial weapons of mass destruction", and it was inevitable that they would begin to wreak havoc on our financial system at some point.  While things may seem somewhat calm on Wall Street at the moment, the truth is that a great deal of trouble is bubbling just under the surface.  As you will see below, something happened in mid-September that required an unprecedented 405 billion dollar surge of Treasury collateral into the repo market.  I know - that sounds very complicated, so I will try to break it down more simply for you.  It appears that some very large institutions have started to get into a significant amount of trouble because of all the reckless betting that they have been doing.  This is something that I have warned would happen over and over again.  In fact, I have written about it so much that my regular readers are probably sick of hearing about it.  But this is what is going to cause the meltdown of our financial system. Many out there get upset when I compare derivatives trading to gambling, and perhaps it would be more accurate to describe most derivatives as a form of insurance.  The big financial institutions assure us that they have passed off most of the risk on these contracts to others and so there is no reason to worry according to them. Well, personally I don't buy their explanations, and a lot of others don't either.  On a very basic, primitive level, derivatives trading is gambling.  This is a point that Jeff Nielson made very eloquently in a piece that he recently published…"
12More

Syria may turn out to be Obama's defining legacy | Asia Times - 0 views

  • By M.K. Bhadrakumar October 5, 2016 9:54 AM (UTC+8) Share 0 Tweet Print Email Comment 0 Asia Times is not responsible for the opinions, facts or any media content presented by contributors. In case of abuse, click here to report. On Monday, the Barack Obama administration fulfilled its week-old threat to suspend bilateral talks with Russia over the Syrian crisis. Does this signal that the dogs of war are about to be unleashed? The thought may seem preposterous but tensions are palpable. US spy planes are spotted ever more frequently in the Eastern Mediterranean and the Black Sea over Russian bases, especially Tartus and Hmeimim in Syria.
  • Russia has deployed SA-23 Gladiator anti-missile and anti-aircraft systems in Syria, the first-ever such deployments outside Russia. Western analysts see it as a pre-emptive step to counter any American cruise missile attack. Russia is not taking any chances.
  • Moscow factors in that the US may use some rebel groups to ensure that Russian “body bags” are sent to Moscow, as threatened explicitly by US state department spokesman John Kirby last week. Moscow suspects American involvement in the missile attack on the Russian embassy in Damascus — “Brits and Ukrainians clumsily helped the Americans”, a Russian statement in New York said on Tuesday. Indeed, passions are running high. There could be several dozen western intelligence operatives trapped with the rebel groups in east Aleppo. Clearly, the turning point was reached when the US and western allies undertook a fierce air attack on the Syrian army base at Deir Ezzor lasting an hour and killing 62 government troops. The US explanation of that being an accident lost credibility, since within an hour of the airstrike, extremist groups of al-Qaida followed up with ground attack as if acting in tandem.
  • ...8 more annotations...
  • Trust has consequently broken down. The Russians are convinced that the US was never really interested in separating the moderate groups from extremists despite repeated promises, because Washington sees a use for al-Qaida affiliates, which happen to be the only capable fighting force to push the ‘regime change agenda in Syria. Put differently, Russians are inclined to agree with what Tehran has been saying all along. Moscow, therefore, switched tack and put its resources behind the Syrian operations to capture the strategic city of Aleppo and the military campaign is within sight of victory.
  • That is, unless there is US intervention in the coming days to tilt the military balance in favor of extremist groups trapped in the eastern districts of Aleppo with supply lines for reinforcements cut.
  • With no prospect of getting reinforcements, facing relentless air and ground attacks from the north and south, the rebels are staring at a hopeless battle of attrition. The point is, with the fall of Aleppo, the Syrian war becomes a residual military operation to purge the al-Qaida affiliate Jubhat al-Nusra from Idlib province as well, which means regime forces would secure control over the entire populous regions of Syria, all main cities and the entire Mediterranean coast. In a nutshell, the Syrian war ends with President Bashar al-Assad ensconced in power. The specter of “total victory” for Assad haunts Washington. It explains the string of vituperative statements against Moscow, betraying a high level of frustration. Theoretically, Obama can order missile attacks on the victorious Syrian government forces, but that will be like pouring oil on fire. On Saturday, the Russian Defense Ministry warned the Pentagon that any US military intervention to remove Assad would result in “terrible tectonic shifts” across the region.
  • In considering the war option, Obama has three things to take into account. First, Washington’s equations with Ankara and Riyadh are hugely uncertain at the moment and both regional allies are key partners in Syria.
  • Second, Turkish President Recep Erdogan is unlikely to gamble on another confrontation with Russia when his country’s legitimate interests in Syria can be secured by working in tandem with President Vladimir Putin at the negotiating table.
  • Third, and most important, Obama is unlikely to lead his country into a war without any clear-cut objective to realize when the curtain is coming down on his presidency. In this current state of play, Assad stands between the West and the deluge.
  • But what rankles is that Russian victory in Syria would mark the end of western hegemony over the Middle East, and historians are bound to single it out as the defining foreign-policy legacy of Obama’s presidency. Certainly, Moscow cannot but be sensing this. Russia may offer at some point a face-saving exit strategy — but only after the capture of Aleppo. After all, there is really no hurry between now and January to salvage Russia-US ties.
  • The debris of Russia’s ties with the US lies all around and no one knows where to begin a clean-up. Relations got worse when Obama called the Kremlin leadership “barbarous” in regard to Aleppo. Then, on Monday, Moscow explained its decision to suspend cooperation in getting rid of excess plutonium (that could be used to make nuclear weapons) as being due to “the emergence of a threat to strategic stability and as a result of unfriendly actions” by the US. This was a decision that Moscow could have deferred until Obama left office. After all, it meant suspending the sole Russian-American nuclear security initiative carrying Obama’s imprimatur. However, Moscow couldn’t resist depicting a Nobel Prize winner who promised to ensure “America’s commitment to seek the peace and security of a world without nuclear weapons,” as someone who actually enhanced the role of nuclear weapons in the security strategy of the US.
  •  
    If you haven't been following the Syrian War in the last couple of weeks, you'd have missed that the U.S. government has gone bats**t crazy lately, since the ceasefire agreement Kerry negotiated with Lavrov fell apart because the U.S. couldn't deliver its fundamental promise to separate the "moderate" Syrian opposition from Al-Nusrah and ISIL The U.S. problem was two-fold: [i] the Pentagon mutinied and ended all talk of intelligence sharing with Russia by bombing a Syrian Army unit, killing over 60 and wounding over 100, followed within minutes by a coordinated Al-Nusra ground attack; and [ii] all the "moderate Syrian opposition groups refused the U.S. instruction to separate from the head-choppers, saying that ISIL and Al-Nusrah were their brothers-in-arms. (In fact, there are no "moderate" Syrian rebels; just agents of ISIL and Al-Nusrah who fly a different flag when it's time to pick up their supplies and ammunition from the U.S.) What's the Empire of Chaos to do when the mercenaries refuse to obey orders? So with all major elements of al-Nurah surrounded in an East Aleppo noose with the knot rapidly tightening (Aleppo will be taken before Hillary takes her throne), it's up to Obama to decide whether to unleash the Pentagon to save the CIA's al-Nusrah from destruction. He can't kick that can down the road to Hillary (or Donald). MSM is flooding its viewership with anti-Putin propaganda of the most vituperative kind as well as horror stories about all those poor freedom fighters and their kids being ruthlessly killed by Russia in East Aleppo. James Clapper dutifully trotted out an announcement of sorts blaming the Russian government for attempting to hack the U.S. election process, so Hillary could red-bait Donald's "I'd get along with Putin" position in the last debate. The choice must be painful for Obama. Does he want his legacy to be the President who lost the Middle East or the President who waged a war of aggression to protect al-Qaeda from destructio
3More

Conflicts of interest in the Syria debate | Public Accountability Initiative - 1 views

  • During the public debate around the question of whether to attack Syria, Stephen Hadley, former national security adviser to George W. Bush, made a series of high-profile media appearances. Hadley argued strenuously for military intervention in appearances on CNN, MSNBC, Fox News, and Bloomberg TV, and authored a Washington Post op-ed headlined “To stop Iran, Obama must enforce red lines with Assad.” In each case, Hadley’s audience was not informed that he serves as a director of Raytheon, the weapons manufacturer that makes the Tomahawk cruise missiles that were widely cited as a weapon of choice in a potential strike against Syria. Hadley earns $128,500 in annual cash compensation from the company and chairs its public affairs committee. He also owns 11,477 shares of Raytheon stock, which traded at all-time highs during the Syria debate ($77.65 on August 23, making Hadley’s share’s worth $891,189). Despite this financial stake, Hadley was presented to his audience as an experienced, independent national security expert.
  • Though Hadley’s undisclosed conflict is particularly egregious, it is not unique. The following report documents the industry ties of Hadley, 21 other media commentators, and seven think tanks that participated in the media debate around Syria. Like Hadley, these individuals and organizations have strong ties to defense contractors and other defense- and foreign policy-focused firms with a vested interest in the Syria debate, but they were presented to their audiences with a veneer of expertise and independence, as former military officials, retired diplomats, and independent think tanks. The report offers a new look at an issue raised by David Barstow’s 2008 Pulitzer Prize-winning New York Times series on the role military analysts played in promoting the Bush Administration’s narrative on Iraq. In addition to exposing coordination with the Pentagon, Barstow found that many cable news analysts had industry ties that were not disclosed on air. If the recent debate around Syria is any guide, media outlets have done very little to address the gaps in disclosure and abuses of the public trust that Barstow exposed. Some analysts have stayed the same, others are new, and the issues and range of opinion are different. But the media continues to present former military and government officials as venerated experts without informing the public of their industry ties – the personal financial interests that may be shaping their opinions of what is in the national interest.
  • This report details these ties, in addition to documenting the industry backing of think tanks that played a prominent role in the Syria debate. It reveals the extent to which the public discourse around Syria was corrupted by the pervasive influence of the defense industry, to the point where many of the so-called experts appearing on American television screens were actually representatives of companies that profit from heightened US military activity abroad. The threat of war with Syria may or may not have passed, but the threat that these conflicts of interest pose to our public discourse – and our democracy – is still very real.
6More

Memo to Potential Whistleblowers: If You See Something, Say Something | Global Research - 0 views

  • Blowing the whistle on wrongdoing creates a moral frequency that vast numbers of people are eager to hear. We don’t want our lives, communities, country and world continually damaged by the deadening silences of fear and conformity. I’ve met many whistleblowers over the years, and they’ve been extraordinarily ordinary. None were applying for halos or sainthood. All experienced anguish before deciding that continuous inaction had a price that was too high. All suffered negative consequences as well as relief after they spoke up and took action. All made the world better with their courage. Whistleblowers don’t sign up to be whistleblowers. Almost always, they begin their work as true believers in the system that conscience later compels them to challenge. “It took years of involvement with a mendacious war policy, evidence of which was apparent to me as early as 2003, before I found the courage to follow my conscience,” Matthew Hoh recalled this week.“It is not an easy or light decision for anyone to make, but we need members of our military, development, diplomatic and intelligence community to speak out if we are ever to have a just and sound foreign policy.”
  • Hoh describes his record this way: “After over 11 continuous years of service with the U.S. military and U.S. government, nearly six of those years overseas, including service in Iraq and Afghanistan, as well as positions within the Secretary of the Navy’s Office as a White House Liaison, and as a consultant for the State Department’s Iraq Desk, I resigned from my position with the State Department in Afghanistan in protest of the escalation of war in 2009.” Another former Department of State official, the ex-diplomat and retired Army colonel Ann Wright, who resigned in protest of the Iraq invasion in March 2003, is crossing paths with Hoh on Friday as they do the honors at a ribbon-cutting — half a block from the State Department headquarters in Washington — for a billboard with a picture of Pentagon Papers whistleblower Daniel Ellsberg. Big-lettered words begin by referring to the years he waited before releasing the Pentagon Papers in 1971. “Don’t do what I did,” Ellsberg says on the billboard.  “Don’t wait until a new war has started, don’t wait until thousands more have died, before you tell the truth with documents that reveal lies or crimes or internal projections of costs and dangers. You might save a war’s worth of lives.
  • The billboard – sponsored by the ExposeFacts organization, which launched this week — will spread to other prominent locations in Washington and beyond. As an organizer for ExposeFacts, I’m glad to report that outreach to potential whistleblowers is just getting started. (For details, visit ExposeFacts.org.) We’re propelled by the kind of hopeful determination that Hoh expressed the day before the billboard ribbon-cutting when he said: “I trust ExposeFacts and its efforts will encourage others to follow their conscience and do what is right.” The journalist Kevin Gosztola, who has astutely covered a range of whistleblower issues for years, pointed this week to the imperative of opening up news media. “There is an important role for ExposeFacts to play in not only forcing more transparency, but also inspiring more media organizations to engage in adversarial journalism,” he wrote. “Such journalism is called for in the face of wars, environmental destruction, escalating poverty, egregious abuses in the justice system, corporate control of government, and national security state secrecy. Perhaps a truly successful organization could inspire U.S. media organizations to play much more of a watchdog role than a lapdog role when covering powerful institutions in government.”
  • ...2 more annotations...
  • Overall, we desperately need to nurture and propagate a steadfast culture of outspoken whistleblowing. A central motto of the AIDS activist movement dating back to the 1980s – Silence = Death – remains urgently relevant in a vast array of realms. Whether the problems involve perpetual war, corporate malfeasance, climate change, institutionalized racism, patterns of sexual assault, toxic pollution or countless other ills, none can be alleviated without bringing grim realities into the light. “All governments lie,” Ellsberg says in a video statement released for the launch of ExposeFacts, “and they all like to work in the dark as far as the public is concerned, in terms of their own decision-making, their planning — and to be able to allege, falsely, unanimity in addressing their problems, as if no one who had knowledge of the full facts inside could disagree with the policy the president or the leader of the state is announcing.” Ellsberg adds: “A country that wants to be a democracy has to be able to penetrate that secrecy, with the help of conscientious individuals who understand in this country that their duty to the Constitution and to the civil liberties and to the welfare of this country definitely surmount their obligation to their bosses, to a given administration, or in some cases to their promise of secrecy.”
  • Right now, our potential for democracy owes a lot to people like NSA whistleblowers William Binney and Kirk Wiebe, and EPA whistleblower Marsha Coleman-Adebayo. When they spoke at the June 4 news conference in Washington that launched ExposeFacts, their brave clarity was inspiring. Antidotes to the poisons of cynicism and passive despair can emerge from organizing to help create a better world. The process requires applying a single standard to the real actions of institutions and individuals, no matter how big their budgets or grand their power. What cannot withstand the light of day should not be suffered in silence. If you see something, say something.
  •  
    While some governments -- my own included -- attempt to impose an Orwellian Dark State of ubiquitous secret surveillance, secret wars, the rule of oligarchs, and public ignorance, the Edward Snowden leaks fanned the flames of the countering War on Ignorance that had been kept alive by civil libertarians. Only days after the U.S. Supreme Court denied review in a case where a reporter had been ordered to reveal his source of information for a book on the Dark State under the penalties for contempt of court (a long stretch in jail), a new web site is launched for communications between sources and journalists where the source's names never need to be revealed. This article is part of the publicity for that new weapon fielded by the civil libertarian side in the War Against Ignorance.  Hurrah!
6More

Trump Should Rethink Syria Escalation - Consortiumnews - 0 views

  • MEMORANDUM FOR: The President FROM: Veteran Intelligence Professionals for Sanity (VIPS)* SUBJECT: Syria: Was It Really “A Chemical Weapons Attack”? 1 – We write to give you an unambiguous warning of the threat of armed hostilities with Russia – with the risk of escalation to nuclear war. The threat has grown after the cruise missile attack on Syria in retaliation for what you claimed was a “chemical weapons attack” on April 4 on Syrian civilians in southern Idlib Province.
  • 7 – Three-plus years later, on April 4, 2017, Russian Prime Minister Medvedev spoke of “absolute mistrust,” which he characterized as “sad for our now completely ruined relations [but] good news for terrorists.” Not only sad, in our view, but totally unnecessary – worse still, dangerous. 8 – With Moscow’s cancellation of the agreement to de-conflict flight activity over Syria, the clock has been turned back six months to the situation last September/October when 11 months of tough negotiation brought a ceasefire agreement. U.S. Air Force attacks on fixed Syrian army positions on Sept. 17, 2016, killing about 70 and wounding another 100, scuttled the fledgling ceasefire agreement approved by Obama and Putin a week before. Trust evaporated.
  • 5 – After Putin persuaded Assad in 2013 to give up his chemical weapons, the U.S. Army destroyed 600 metric tons of Syria’s CW stockpile in just six weeks. The mandate of the U.N.’s Organization for the Prohibition of Chemical Weapons (OPCW-UN) was to ensure that all were destroyed – like the mandate for the U.N. inspectors for Iraq regarding WMD. The U.N. inspectors’ findings on WMD were the truth. Rumsfeld and his generals lied and this seems to be happening again. The stakes are even higher now; the importance of a relationship of trust with Russia’s leaders cannot be overstated. 6 – In September 2013, after Putin persuaded Assad to relinquish his chemical weapons (giving Obama a way out of a tough dilemma), the Russian President wrote an op-ed for the New York Times in which he said: “My working and personal relationship with President Obama is marked by growing trust. I appreciate this.”
  • ...3 more annotations...
  • 2 – Our U.S. Army contacts in the area have told us this is not what happened. There was no Syrian “chemical weapons attack.” Instead, a Syrian aircraft bombed an al-Qaeda-in-Syria ammunition depot that turned out to be full of noxious chemicals and a strong wind blew the chemical-laden cloud over a nearby village where many consequently died. 3 – This is what the Russians and Syrians have been saying and – more important –what they appear to believe happened. 4 – Do we conclude that the White House has been giving our generals dictation; that they are mouthing what they have been told to say?
  • 9 – On Sept 26, 2016, Foreign Minister Lavrov lamented: “My good friend John Kerry … is under fierce criticism from the US military machine, [which] apparently does not really listen to the Commander in Chief.” Lavrov criticized JCS Chairman Joseph Dunford for telling Congress that he opposed sharing intelligence with Russia on Syria, “after the [ceasefire] agreement, concluded on direct orders of Russian President Vladimir Putin and US President Barack Obama, had stipulated that the two sides would share intelligence. … It is difficult to work with such partners. …” 10 – On Oct. 1, 2016, Russia’s Foreign Ministry spokesperson Maria Zakharova warned, “If the US launches a direct aggression against Damascus and the Syrian Army, it would cause a terrible, tectonic shift not only in the country, but in the entire region.” 11 – On Oct 6, 2016, Russian defense spokesman Maj. Gen. Igor Konashenkov cautioned that Russia was prepared to shoot down unidentified aircraft – including any stealth aircraft – over Syria. Konashenkov made a point of adding that Russian air defenses “will not have time to identify the origin” of the aircraft.
  • 12 – On Oct 27, 2016, Putin publicly lamented, “My personal agreements with the President of the United States have not produced results,” and complained about “people in Washington ready to do everything possible to prevent these agreements from being implemented in practice.” Referring to Syria, Putin decried the lack of a “common front against terrorism after such lengthy negotiations, enormous effort, and difficult compromises.” 13 – Thus, the unnecessarily precarious state into which U.S.-Russian relations have now sunk – from “growing trust” to “absolute mistrust.” To be sure, many welcome the high tension, which – admittedly – is super for the arms business. 14 – We believe it of transcendent importance to prevent relations with Russia from falling into a state of complete disrepair. Secretary Tillerson’s visit to Moscow this week offers an opportunity to stanch the damage, but there is also a danger that it could increase the acrimony – particularly if Secretary Tillerson is not familiar with the brief history set down above. 15 – Surely it is time to deal with Russia on the basis of facts, not allegations based largely on dubious evidence – from “social media,” for example. While many would view this time of high tension as ruling out a summit, we suggest the opposite may be true. You might consider instructing Secretary Tillerson to begin arrangements for an early summit with President Putin.
12More

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
6More

Provocations as Pretexts for Imperial War: From Pearl Harbor to 9/11 | Global Research - 0 views

  • Wars in an imperialist democracy cannot simply be dictated by executive fiat, they require the consent of highly motivated masses who will make the human and material sacrifices. Imperialist leaders have to create a visible and highly charged emotional sense of injustice and righteousness to secure national cohesion and overcome the natural opposition to early death, destruction and disruption of civilian life and to the brutal regimentation that goes with submission to absolutist rule by the military. The need to invent a cause is especially the case with imperialist countries because their national territory is not under threat. There is no visible occupation army oppressing the mass of the people in their everyday life. The ‘enemy’ does not disrupt everyday normal life – as forced conscription would and does. Under normal peaceful time, who would be willing to sacrifice their constitutional rights and their participation in civil society to subject themselves to martial rule that precludes the exercise of all their civil freedoms?
  • The task of imperial rulers is to fabricate a world in which the enemy to be attacked (an emerging imperial power like Japan) is portrayed as an ‘invader’ or an ‘aggressor’ in the case of revolutionary movements (Korean and Indo-Chinese communists) engaged in a civil war against an imperial client ruler or a ‘terrorist conspiracy’ linked to an anti-imperialist, anti-colonial Islamic movements and secular states. Imperialist-democracies in the past did not need to consult or secure mass support for their expansionist wars; they relied on volunteer armies, mercenaries and colonial subjects led and directed by colonial officers. Only with the confluence of imperialism, electoral politics and total war did the need arise to secure not only consent, but also enthusiasm, to facilitate mass recruitment and obligatory conscription. Since all US imperial wars are fought ‘overseas’ – far from any immediate threats, attacks or invasions – -US imperial rulers have the special task of making the ‘causus bellicus’ immediate, ‘dramatic’ and self-righteously ‘defensive’. To this end US Presidents have created circumstances, fabricated incidents and acted in complicity with their enemies, to incite the bellicose temperament of the masses in favor of war.
  • The pretext for wars are acts of provocation which set in motion a series of counter-moves by the enemy, which are then used to justify an imperial mass military mobilization leading to and legitimizing war. State ‘provocations’ require uniform mass media complicity in the lead-up to open warfare: Namely the portrayal of the imperial country as a victim of its own over-trusting innocence and good intentions. All four major US imperial wars over the past 67 years resorted to a provocation, a pretext, and systematic, high intensity mass media propaganda to mobilize the masses for war. An army of academics, journalists, mass media pundits and experts ‘soften up’ the public in preparation for war through demonological writing and commentary: Each and every aspect of the forthcoming military target is described as totally evil – hence ‘totalitarian’ – in which even the most benign policy is linked to demonic ends of the regime. Since the ‘enemy to be’ lacks any saving graces and worst, since the ‘totalitarian state’ controls everything and everybody, no process of internal reform or change is possible. Hence the defeat of ‘total evil’ can only take place through ‘total war’. The targeted state and people must be destroyed in order to be redeemed. In a word, the imperial democracy must regiment and convert itself into a military juggernaut based on mass complicity with imperial war crimes. The war against ‘totalitarianism’ becomes the vehicle for total state control for an imperial war.
  • ...2 more annotations...
  • In the case of the US-Japanese war, the US-Korean war, the US-Indochinese war and the post-September 11 war against an independent secular nationalist regime (Iraq) and the Islamic Afghan republic, the Executive branch (with the uniform support of the mass media and congress) provoked a hostile response from its target and fabricated a pretext as a basis for mass mobilization for prolonged and bloody wars.
  • Wars in an imperialist democracy cannot simply be dictated by executive fiat, they require the consent of highly motivated masses who will make the human and material sacrifices. Imperialist leaders have to create a visible and highly charged emotional sense of injustice and righteousness to secure national cohesion and overcome the natural opposition to early death, destruction and disruption of civilian life and to the brutal regimentation that goes with submission to absolutist rule by the military. The need to invent a cause is especially the case with imperialist countries because their national territory is not under threat. There is no visible occupation army oppressing the mass of the people in their everyday life. The ‘enemy’ does not disrupt everyday normal life – as forced conscription would and does. Under normal peaceful time, who would be willing to sacrifice their constitutional rights and their participation in civil society to subject themselves to martial rule that precludes the exercise of all their civil freedoms?
  •  
    Lengthy look at provocations and pretexts used to start U.S. foreign wars. 
6More

Explosive Saudi 9/11 Evidence Still Ignored By Media - WhoWhatWhy - 0 views

  • The Times goes on to say that Moussaoui’s testimony, if found to be factually accurate, could change our understanding of Saudi Arabia and its relationship to 9/11: [T]he extent and nature of Saudi involvement in Al Qaeda, and whether it extended to the planning and financing of the Sept. 11 attacks, has long been a subject of dispute. *** That may be so, but the Times, like the rest of the traditional media, has ignored earlier evidence of deep Saudi royal ties to the 9/11 attacks—evidence that isn’t dependent on a man whose sanity has been questioned. Back in 2011, a small non-profit news outfit in South Florida, the Broward Bulldog, which does primarily local stories, published an article that also appeared in a major traditional newspaper, the Miami Herald. Despite the story’s explosive content, it was widely ignored.
  • That article revealed that a well-heeled Saudi family, living in a gated community in Sarasota, Florida, had direct connections to the hijackers. Phone records documented communication, dating back more than a year, between this Saudi family and the alleged plot leader, Mohammed Atta, his hijack pilots and 11 of the other hijackers. In addition, records from the guard house at the gated community showed Atta and other hijackers had visited the house.
  • The family left the country abruptly just before the 9/11 attacks. Family members abandoned enough valuable possessions—such as three cars—to testify to the speed of their departure. The article also revealed that the FBI had quietly investigated the family and documented numerous interactions between them and the alleged hijackers. They, however, neglected to tell Congressional investigators and the evidence didn’t appear in the 9/11 Commission Report. You might think these revelations would attract widespread attention, considering that 15 of the 19 purported hijackers were Saudi citizens. Yet the Bulldog story generated barely a blip.
  • ...3 more annotations...
  • Next, our small non-profit news outfit, WhoWhatWhy, which covers primarily international and national investigative stories, took the reporting to another level. Our story established that the owner of the house, Esam Ghazzawi, was a direct lieutenant to a powerful member of the Saudi royal family who’d learned to fly in Florida years earlier. Ghazzawi was director of the UK division of EIRAD Trading and Contracting Co. Ltd., which among other things, holds the Saudi franchise for many multinational brands including UPS. Ghazzawi’s boss, the chairman of EIRAD Holding Co. Ltd., is Prince Sultan bin Salman bin Abdul Aziz Al-Saud.
  • A fighter pilot who also flew on a Space Shuttle mission, Prince Sultan is the son of the new Saudi king, Salman. WhoWhatWhy’s reporting raised serious questions about whether high-ranking Saudis were directly involved with the 9/11 operation, and whether the U.S. government covered up what it knew. WhoWhatWhy paid a major news distribution outfit to send our story to thousands of news outlets, major and minor, in the United States. Again, the silence was deafening. *** The debate about Moussaoui’s newly released testimony centers on whether he can be trusted. But there is no debate about the Sarasota evidence we uncovered. We’re still waiting for the Times, along with the rest of the mainstream media, to acknowledge that material. Whatever happened in Florida, whatever the veracity of Moussaoui’s claims, anyone with an open mind will smell enough smoke to wonder whose interests are being served by pretending there’s no fire in the Saudi-9/11 connection.
  • For more on the Bush family’s relationship to the Saudi royal family, see Russ Baker’s book, Family of Secrets.
8More

Angela Merkel under pressure to reveal all about US spying agreement | World news | The... - 0 views

  • Angela Merkel’s reputation as an unassailable chancellor is under threat amid mounting pressure for her to reveal how much she knew about a German-supported US spying operation on European companies and officials. The onus on her government to deliver answers over the spying scandal has only increased with the Austrian government’s announcement that it has filed a legal complaint against an unnamed party over “covert intelligence to the detriment of Austria”. EADS, now Airbus, one of the companies known to have been spied on by the BND – Germany’s foreign intelligence agency – is also taking legal action, saying it will file a complaint with prosecutors in Germany. The BND stands accused of spying on behalf of America’s NSA on European companies such as EADS, as well as the French presidency and the EU commission. There are also suspicions that German government workers and journalists were spied on.
  • The Social Democrats (SPD), Merkel’s government partners, along with Germany’s federal public prosecutor, Harald Range, are demanding the release of a list of “selectors” – 40,000 search terms used in the spying operations – the results of which were passed on to the NSA. “The list must be published and only then is clarification possible,” said Christine Lambrecht, parliamentary head of the SPD faction. Merkel has so far refused to allow its release. Her spokesman, Steffen Seibert, said she would make a decision on whether or not to do so only “once consultations with the American partners are completed”. Thomas de Maizière, the interior minister and a close Merkel confidante, is under even more pressure than the chancellor over allegations he lied about what he knew of BND/NSA cooperation. On Wednesday he answered questions on the affair to a parliamentary committee investigating the row, but only in camera and in a bug-proof room. Among other alleged shortcomings over the affair, he stands accused of failing to act when the BND informed him of the espionage activities in 2008 when he was Merkel’s chief of staff. He has repeatedly been portrayed in the tabloid media with a Pinocchio nose.
  • While Merkel appeared to have remained relatively unscathed by the scandal until now, an opinion poll showed that most Germans believed the trustworthiness of the three-times chancellor was now seriously at stake. 62% of Germans said her credibility was in doubt, according to the poll, carried out by the Insa institute, while 18% said it was not. Merkel told Radio Bremen in an interview that she was prepared to speak out over the allegations to a parliamentary committee. “I will testify there and justify myself to them where it is required,” she told the broadcaster.
  • ...5 more annotations...
  • Sigmar Gabriel, the deputy chancellor and economy minister, who is also the leader of the SPD, upped the ante still further by relaying a conversation he had with Merkel in which he asked her twice if the government had evidence of economic espionage, and she said no. He added that if it emerged Germany had been involved in helping the NSA spy on companies, it would greatly strain relations between business and the government and “put a large burden on the trust the economy has in government behaviour”.
  • The scandal has already strained relations within Merkel’s grand coalition, with many observers commenting that Gabriel was seeing the affair as a chance to make political gains. Political observers were lining up to remark that the crisis is the single most critical of Merkel’s decade in government and could even lead to her and her government’s downfall.
  • But the scandal has its roots much further back than Merkel’s own government, harking to a time when Europe was gripped by the cold war. Both the US and the UK, as victors of the second world war who had Germany under close supervision, ran spying networks from Germany, most notably from Bad Aibling in Bavaria, the biggest listening station outside the US and Britain. Officially, the US withdrew its operations in 2004. But unofficially it stayed there under an agreement in which Germany agreed to hand over its intelligence findings in return for the highly sophisticated technology the US was able to provide. The events of 9/11 and the revelations that three of the pilots had lived in Germany undetected only served to increase the pressure the US was able to put on Germany that its presence was necessary. Bad Aibling, officially now solely a BND listening facility, was the post used by the NSA in the current scandal.
  • The affair has underlined just how dependent Germany still is on the US and to a lesser extent the UK, on issues of intelligence and defence. Their desire for still-closer cooperation culminated in Operation Monkey Shoulder (named after a blend of three different types of malt whiskys) involving the BND, NSA and MI6, Spiegel recently revealed. With such a background, the German government has to appear to be criticising the US at the same time as underlining the importance of cooperation. Merkel, who appeared to be hugely at odds with the US government when it was revealed in 2013 that the NSA’s mass intelligence operation included tapping her mobile phone, has so far responded in a characteristically vague and flat manner. While acknowledging that allies should not spy on each other, she has stressed that spying’s most important role is to prevent terrorist attacks. “The government will do everything to guarantee the ability of the intelligence services,” she said on Monday. “Taking terrorist threats into account, that ability is only possible in cooperation with other agencies. That very much includes the NSA, as well as others.”
  • Commenting on the crisis, Spiegel magazine called it the “biggest challenge that the ‘Merkel Regime’ has had to face”, and potentially the “turning point of her chancellorship”. “She enjoys such trust because many Germans feel she looks after the country’s needs and their own very well. But the scandal … could cause the foundations of her power to crumble,” the magazine said.
8More

European Lawmakers Demand Answers on Phone Key Theft - The Intercept - 0 views

  • European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday. The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys. The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.” “Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal. Sophie in ’t Veld, an EU parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”
  • “If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday. The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said. Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request. Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.
  • According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year. The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.
  • ...4 more annotations...
  • While Gemalto was indeed another casualty in Western governments’ sweeping effort to gather as much global intelligence advantage as possible, the leaked documents make clear that the company was specifically targeted. According to the materials published Thursday, GCHQ used a specific codename — DAPINO GAMMA — to refer to the operations against Gemalto. The spies also actively penetrated the email and social media accounts of Gemalto employees across the world in an effort to steal the company’s encryption keys. Evidence of the Gemalto breach rattled the digital security community. “Almost everyone in the world carries cell phones and this is an unprecedented mass attack on the privacy of citizens worldwide,” said Greg Nojeim, senior counsel at the Center for Democracy & Technology, a non-profit that advocates for digital privacy and free online expression. “While there is certainly value in targeted surveillance of cell phone communications, this coordinated subversion of the trusted technical security infrastructure of cell phones means the US and British governments now have easy access to our mobile communications.”
  • For Gemalto, evidence that their vaunted security systems and the privacy of customers had been compromised by the world’s top spy agencies made an immediate financial impact. The company’s shares took a dive on the Paris bourse Friday, falling $500 million. In the U.S., Gemalto’s shares fell as much 10 percent Friday morning. They had recovered somewhat — down 4 percent — by the close of trading on the Euronext stock exchange. Analysts at Dutch financial services company Rabobank speculated in a research note that Gemalto could be forced to recall “a large number” of SIM cards. The French daily L’Express noted today that Gemalto board member Alex Mandl was a founding trustee of the CIA-funded venture capital firm In-Q-Tel. Mandl resigned from In-Q-Tel’s board in 2002, when he was appointed CEO of Gemplus, which later merged with another company to become Gemalto. But the CIA connection still dogged Mandl, with the French press regularly insinuating that American spies could infiltrate the company. In 2003, a group of French lawmakers tried unsuccessfully to create a commission to investigate Gemplus’s ties to the CIA and its implications for the security of SIM cards. Mandl, an Austrian-American businessman who was once a top executive at AT&T, has denied that he had any relationship with the CIA beyond In-Q-Tel. In 2002, he said he did not even have a security clearance.
  • AT&T, T-Mobile and Verizon could not be reached for comment Friday. Sprint declined to comment. Vodafone, the world’s second largest telecom provider by subscribers and a customer of Gemalto, said in a statement, “[W]e have no further details of these allegations which are industrywide in nature and are not focused on any one mobile operator. We will support industry bodies and Gemalto in their investigations.” Deutsche Telekom AG, a German company, said it has changed encryption algorithms in its Gemalto SIM cards. “We currently have no knowledge that this additional protection mechanism has been compromised,” the company said in a statement. “However, we cannot rule out this completely.”
  • Update: Asked about the SIM card heist, White House press secretary Josh Earnest said he did not expect the news would hurt relations with the tech industry: “It’s hard for me to imagine that there are a lot of technology executives that are out there that are in a position of saying that they hope that people who wish harm to this country will be able to use their technology to do so. So, I do think in fact that there are opportunities for the private sector and the federal government to coordinate and to cooperate on these efforts, both to keep the country safe, but also to protect our civil liberties.”
  •  
    Watch for massive class action product defect litigation to be filed against the phone companies.and mobile device manufacturers.  In most U.S. jurisdictions, proof that the vendors/manufacturers  knew of the product defect is not required, only proof of the defect. Also, this is a golden opportunity for anyone who wants to get out of a pricey cellphone contract, since providing a compromised cellphone is a material breach of warranty, whether explicit or implied..   
5More

Obama halted NSA spying on IMF and World Bank headquarters | Reuters - 0 views

  • (Reuters) - President Barack Obama has ordered the National Security Agency to stop eavesdropping on the headquarters of the International Monetary Fund and World Bank as part of a review of intelligence gathering activities, according to a U.S. official familiar with the matter.
  • The first official said Obama had ordered a halt to such practices within the last few weeks, about the same time he instructed the NSA to curtail eavesdropping on the United Nations headquarters in New York.
  • It is no secret that U.S. spy agencies historically have collected and analyzed information related to economic affairs - in public briefings to Congress, top intelligence officials have discussed assessments of economic issues.But a former senior U.S. intelligence official said that the Obama Administration had put greater emphasis and resources than predecessors into collecting and assessing economic information.In February 2009, shortly after Obama entered the White House, the Central Intelligence Agency began producing a new "Economic Intelligence Brief" for him to review along with the regular President's Daily Brief on international security and threats.Leon Panetta, Obama's first CIA director, said at the time the change was aimed at understanding the implications of the global economic crisis, and that the agency was considering hiring more economic analysts.The former U.S. intelligence official noted that insider detail on economic policy developments - for example, financial crises affecting the economies of European countries such as Greece, Italy and Spain, and the stability of the Euro - is the type of critical information U.S. policymakers welcome.
  • ...1 more annotation...
  • The desire by U.S. policymakers for such information could help explain why NSA collected information on foreign leaders such as Merkel. Her cellphone number was listed in a NSA targeting document, which German media outlets apparently obtained from Snowden's cache. U.S. officials have now indicated that much NSA eavesdropping on Merkel and other allied leaders is likely to be curtailed if not halted.
  •  
    Heaven forbid that anyone should even suspect that the NSA's economic intelligence is also being used by banksters to make investment decisions. No every NSA and NSA contractor staffer can be trusted to never disclose NSA secrets to others... er ... except Edward Snowden and he gave those secrets to journalists, not to banksters. The rest can all be trusted, no matter how much money they are offered. 
13More

White House defends 'Cuban Twitter' to stir unrest - Yahoo News - 0 views

  • The Obama administration defended its creation of a Twitter-like Cuban communications network to undermine the communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval.
  • But two senior Democrats on congressional intelligence and judiciary committees said Thursday they had known nothing about the effort, which one of them described as "dumb, dumb, dumb." A showdown with that senator's panel is expected next week, and the Republican chairman of a House oversight subcommittee said that it, too, would look into the program.An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform.First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent.
  • Yet its users were neither aware it was created by a U.S. agency with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes.It is unclear whether the scheme was legal under U.S. law, which requires written authorization of covert action by the president as well as congressional notification. White House spokesman Jay Carney said he was not aware of individuals in the White House who had known about the program.
  • ...9 more annotations...
  • USAID's top official, Rajiv Shah, is scheduled to testify on Tuesday before the Senate Appropriations State Department and Foreign Operations Subcommittee, on the agency's budget. The subcommittee's chairman, Patrick Leahy, a Democrat, is the senator who called the project "dumb, dumb, dumb" during an appearance Thursday on MSNBC.The administration said early Thursday that it had disclosed the initiative to Congress — Carney said the program had been "debated in Congress" — but hours later the narrative had shifted to say that the administration had offered to discuss funding for it with the congressional committees that approve federal programs and budgets."We also offered to brief our appropriators and our authorizers," said State Department spokeswoman Marie Harf. She added that she was hearing on Capitol Hill that many people support these kinds of democracy promotion programs. And some lawmakers did speak up on that subject. But by late Thursday no members of Congress had acknowledged being aware of the Cuban Twitter program earlier than this week.
  • Harf described the program as "discreet" but said it was in no way classified or covert. Harf also said the project, dubbed ZunZuneo, did not rise to a level that required the secretary of state to be notified. Neither former Secretary of State Hillary Rodham Clinton nor John Kerry, the current occupant of the office, was aware of ZunZuneo, she said.In his prior position as chairman of the Senate Foreign Relations Committee, Kerry had asked congressional investigators to examine whether or not U.S. democracy promotion programs in Cuba were operated according to U.S. laws, among other issues. The resulting report, released by the Government Accountability Office in January 2013, does not examine whether or not the programs were covert. It does not say that any U.S. laws were broken.The GAO report does not specifically refer to ZunZuneo, but does note that USAID programs included "support for the development of independent social networking platforms."
  • "I know they said we were notified," Leahy told AP. "We were notified in the most oblique way, that nobody could understand it. I'm going to ask two basic questions: Why weren't we specifically told about this if you're asking us for money? And secondly, whose bright idea was this anyway?"The Republican chairman of a House oversight subcommittee said his panel will be looking into the project, too."That is not what USAID should be doing," said Rep. Jason Chaffetz, the Republican chairman of the House Oversight and Government Reform National Security Subcommittee. "USAID is flying the American flag and should be recognized around the globe as an honest broker of doing good. If they start participating in covert, subversive activities, the credibility of the United States is diminished."
  • At minimum, details uncovered by the AP appear to muddy the USAID's longstanding claims that it does not conduct covert actions, and the details could undermine the agency's mission to deliver aid to the world's poor and vulnerable — an effort that requires the trust and cooperation of foreign governments.Leahy and Rep. C.A. Dutch Ruppersberger, the top Democrat on the House Intelligence Committee, said they were unaware of ZunZuneo.
  • USAID and its contractors went to extensive lengths to conceal Washington's ties to the project, according to interviews and documents obtained by the AP. They set up front companies in Spain and the Cayman Islands to hide the money trail, and recruited CEOs without telling them they would be working on a U.S. taxpayer-funded project."There will be absolutely no mention of United States government involvement," according to a 2010 memo from Mobile Accord Inc., one of the project's creators. "This is absolutely crucial for the long-term success of the service and to ensure the success of the Mission."ZunZuneo was publicly launched shortly after the 2009 arrest in Cuba of American contractor Alan Gross. He was imprisoned after traveling repeatedly to the country on a separate, clandestine USAID mission to expand Internet access using sensitive technology that only governments use.The AP obtained more than 1,000 pages of documents about the ZunZuneo project's development. It independently verified the project's scope and details in the documents through publicly available databases, government sources and interviews with those involved.
  • The social media project began after Washington-based Creative Associates International obtained a half-million Cuban cellphone numbers. It was unclear to the AP how the numbers were obtained, although documents indicate they were done so illicitly from a key source inside the country's state-run provider. Project organizers used those numbers to start a subscriber base.ZunZuneo's organizers wanted the social network to grow slowly to avoid detection by the Cuban government. Eventually, documents and interviews reveal, they hoped the network would reach critical mass so that dissidents could organize "smart mobs" — mass gatherings called at a moment's notice — that could trigger political demonstrations, or "renegotiate the balance of power between the state and society."At a 2011 speech at George Washington University, Clinton said the U.S. helps people in "oppressive Internet environments get around filters." Noting Tunisia's role in the Arab Spring, she said people used technology to help "fuel a movement that led to revolutionary change."Suzanne Hall, then a State Department official working on Clinton's social media efforts, helped spearhead an attempt to get Twitter founder Jack Dorsey to take over the ZunZuneo project, documents indicate. Dorsey declined to comment.
  • The estimated $1.6 million spent on ZunZuneo was publicly earmarked for an unspecified project in Pakistan, public government data show, but those documents don't reveal where the funds were actually spent.ZunZuneo's organizers worked hard to create a network that looked like a legitimate business, including the creation of a companion website — and marketing campaign — so users could subscribe and send their own text messages to groups of their choice."Mock ad banners will give it the appearance of a commercial enterprise," one written proposal obtained by the AP said. Behind the scenes, ZunZuneo's computers were also storing and analyzing subscribers' messages and other demographic information, including gender, age, "receptiveness" and "political tendencies." USAID believed the demographics on dissent could help it target its other Cuba programs and "maximize our possibilities to extend our reach."
  • Executives set up a corporation in Spain and an operating company in the Cayman Islands — a well-known British offshore tax haven — to pay the company's bills so the "money trail will not trace back to America," a strategy memo said. Disclosure of that connection would have been a catastrophic blow, they concluded, because it would undermine the service's credibility with subscribers and get it shut down by the Cuban government.Similarly, subscribers' messages were funneled through two other countries — and never through American-based computer servers.Denver-based Mobile Accord considered at least a dozen candidates to head the European front company. One candidate, Francoise de Valera, told the AP she was told nothing about Cuba or U.S. involvement.
  • James Eberhard, Mobile Accord's CEO and a key player in the project's development, declined to comment. Creative Associates referred questions to USAID.For more than two years, ZunZuneo grew, reaching at least 40,000 subscribers. But documents reveal the team found evidence Cuban officials tried to trace the text messages and break into the ZunZuneo system. USAID told the AP that ZunZuneo stopped in September 2012 when a government grant ended.
  •  
    More coming related to this story.
5More

Maybe Obama's Sanctions on Venezuela are Not Really About His "Deep Concern" Over Suppr... - 0 views

  • The White House on Monday announced the imposition of new sanctions on various Venezuelan officials, pronouncing itself “deeply concerned by the Venezuelan government’s efforts to escalate intimidation of its political opponents”: deeply concerned. President Obama also, reportedly with a straight face, officially declared that Venezuela poses “an extraordinary threat to the national security” of the U.S. — a declaration necessary to legally justify the sanctions. Today, one of the Obama administration’s closest allies on the planet, Saudi Arabia, sentenced one of that country’s few independent human rights activists, Mohammed al-Bajad, to 10 years in prison on “terrorism” charges. That is completely consistent with that regime’s systematic and extreme repression, which includes gruesome state beheadings at a record-setting rate, floggings and long prison terms for anti-regime bloggers, executions of those with minority religious views, and exploitation of terror laws to imprison even the mildest regime critics. Absolutely nobody expects the “deeply concerned” President Obama to impose sanctions on the Saudis — nor on any of the other loyal U.S. allies from Egypt to the UAE whose repression is far worse than Venezuela’s. Perhaps those who actually believe U.S. proclamations about imposing sanctions on Venezuela in objection to suppression of political opposition might spend some time thinking about what accounts for that disparity.
  • That nothing is more insincere than purported U.S. concerns over political repression is too self-evident to debate. Supporting the most repressive regimes on the planet in order to suppress and control their populations is and long has been a staple of U.S. (and British) foreign policy. “Human rights” is the weapon invoked by the U.S. Government and its loyal media to cynically demonize regimes that refuse to follow U.S. dictates, while far worse tyranny is steadfastly overlooked, or expressly cheered, when undertaken by compliant regimes, such as those in Riyadh and Cairo (see this USA Today article, one of many, recently hailing the Saudis as one of the “moderate” countries in the region). This is exactly the tactic that leads neocons to feign concern for Afghan women or the plight of Iranian gays when doing so helps to gin up war-rage against those regimes, while they snuggle up to far worse but far more compliant regimes. Any rational person who watched the entire top echelon of the U.S. government drop what they were doing to make a pilgrimage to Riyadh to pay homage to the Saudi monarchs (Obama cut short a state visit to India to do so), or who watches the mountain of arms and money flow to the regime in Cairo, would do nothing other than cackle when hearing U.S. officials announce that they are imposing sanctions to punish repression of political opposition. And indeed, that’s what most of the world outside of the U.S. and Europe do when they hear such claims. But from the perspective of U.S. officials, that’s fine, because such pretenses to noble intentions are primarily intended for domestic consumption.
  • As for Obama’s decree that Venezuela now poses an “extraordinary threat to the national security” of the United States, is there anyone, anywhere, that wants to defend the reasonability of that claim? Think about what it says about our discourse that Obama officials know they can issue such insultingly false tripe with no consequences. But what’s not too obvious to point out is what the U.S is actually doing in Venezuela. It’s truly remarkable how the very same people who demand U.S. actions against the democratically elected government in Caracas are the ones who most aggressively mock Venezuelan leaders when they point out that the U.S. is working to undermine their government. The worst media offender in this regard is The New York Times, which explicitly celebrated the 2002 U.S.-supported coup of Hugo Chavez as a victory for democracy, but which now regularly derides the notion that the U.S. would ever do something as untoward as undermine the Venezuelan government. Watch this short video from Monday where the always-excellent Matt Lee of Associated Press questions a State Department spokesperson this week after she said it was “ludicrous” to think that the U.S. would ever do such a thing:
  • ...2 more annotations...
  • The real question is this: if concern over suppression of political rights is not the real reason the U.S. is imposing new sanctions on Venezuela (perish the thought!), what is? Among the most insightful commentators on U.S. policy in Latin America is Mark Weisbrot of Just Foreign Policy. Read his excellent article for Al Jazeera on the recent Obama decree on Venezuela. In essence, Venezuela is one of the very few countries with significant oil reserves which does not submit to U.S. dictates, and this simply cannot be permitted (such countries are always at the top of the U.S. government and media list of Countries To Be Demonized). Beyond that, the popularity of Chavez and the relative improvement of Venezuela’s poor under his redistributionist policies petrifies neoliberal institutions for its ability to serve as an example; just as the Cuban economy was choked by decades of U.S. sanctions and then held up by the U.S. as a failure of Communism, subverting the Venezuelan economy is crucial to destroying this success. As Weisbrot notes, every country in the hemisphere except for the U.S. and Canada have united to oppose U.S. sanctions on Venezuela. The Community of Latin American and Caribbean States (CELAC) issued a statement in February in response to the prior round of U.S. sanctions on Venezuela that “reiterates its strong repudiation of the application of unilateral coercive measures that are contrary to international law.” This week, the chief of the Union of South American Nations (UNASUR) issued a statement announcing that “UNASUR rejects any external or internal attempt at interference that seeks to disrupt the democratic process in Venezuela.” Weisbrot compares Obama’s decree this week on Venezuela to President Reagan’s quite similar 1985 decree that Nicaragua was a national security threat to the U.S., and notes: “The Obama administration is more isolated today in Latin America than even George W. Bush’s administration was.”
  • If Obama and supporters want the government of Venezuela to be punished and/or toppled because they refuse to comply with U.S. dictates, they should at least be honest about their beliefs so that their true character can be seen. Pretending that any of this has to do with the U.S. Government’s anger over suppression of political opponents — when their closest allies are the world champions at that — should be too insulting of everyone’s intelligence to even be an option.
4More

State witness turning point in Netanyahu corruption case | The News Tribune - 0 views

  • Now that one of Benjamin Netanyahu's closest confidants has turned state witness, according to Israeli media reports Wednesday, it may mark a turning point for the beleaguered prime minister facing a slew of corruption allegations that could topple him from power. The testimony by Shlomo Filber, a long-time Netanyahu aide, is the latest in a dizzying series of developments and scandals that have engulfed the prime minister, his family and his inner circle. Police would not confirm whether Filber would testify against Netanyahu, but all the major Israeli media outlets said a deal to do so had been reached. Aluf Benn, editor-in-chief of the Haaretz daily, wrote Wednesday that "these are the final days of Benjamin Netanyahu's rule" and that "Netanyahu's leadership has been dealt a harsh blow, apparently a mortal one."
  • Former Prime Minister Ehud Barak, a bitter rival of Netanyahu, told Channel 10 TV "there is no way back" for the premier. "This chapter in the political history of Israel is about to end," he said. Barak said he closely knows Netanyahu and believes he "understands that this is the end of the story" but will try and postpone the inevitable in different ways. Other leading Israeli columnists on Wednesday suggested that if Filber told all he knew, Netanyahu was probably more worried about avoiding prison than staying in office. "When so many dark clouds accumulate in the sky, the chances of rain increase," wrote Nahum Barnea in Yediot Ahronot. "His appearance lent the fight he is waging the dimensions of a Shakespearean tragedy. This isn't the end. It isn't even the beginning of the end. But it cannot have a different end."
  • Filber, the former director of the Communications Ministry under Netanyahu, is under arrest on suspicion of promoting regulation worth hundreds of millions of dollars to Israel's Bezeq telecom company. In return, Bezeq's popular news site, Walla, allegedly provided favorable coverage of Netanyahu and his family. The reports came shortly after another bombshell allegation that a different Netanyahu confidant attempted to bribe a judge in exchange for dropping a corruption case against Netanyahu's wife. Nir Hefetz, a longtime media adviser to Netanyahu and his family, remains in custody. The prime minister, who held the communications portfolio until last year, has not yet been named a suspect, though he may soon be questioned. Netanyahu has denied all the charges, calling them part of a media-orchestrated witch hunt that has swept up the police and prosecution as well, and has vowed to carry on. Still, the string of accusations appears to be taking its toll. Senior Cabinet ministers from Netanyahu's ruling Likud party, who until just recently have marched out dutifully to defend him, have largely gone silent. Netanyahu himself appeared ashen in a video released late Tuesday calling the claims "total madness."
  • ...1 more annotation...
  • Avi Gabbay, head of Labor Party, said he was preparing for elections. "The Netanyahu era is over," he said. "These are not easy days. Netanyahu's personal battle for survival has been accompanied by the corrupting of the public service and the harming of the free press." The latest probes come days after police announced that there was sufficient evidence to indict Netanyahu for bribery, fraud and breach of trust in two separate cases.
‹ Previous 21 - 40 of 76 Next › Last »
Showing 20 items per page