Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "problems" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

We are screwed! US Debt To GDP: The Numbers are stunning! - 0 views

  •  
    Government debt has remained at a relatively consistent percentage of GDP for the past 50 years, but the debt of companies, consumers, and financial businesses has soared.  The problem now is that the value of the assets that serve as collateral for that debt (houses, stocks, cars, etc.) is plummeting.  Thus, the percentage of debt to equity is increasing, and in many areas, the equity is being wiped out.
2More

Derivatives - The $600 Trillion Time Bomb Set to Explode | InvestorPlace - 0 views

  • The world’s gross domestic product (GDP) is only about $65 trillion, or roughly 10.83% of the worldwide value of the global derivatives market, according to The Economist. So there is literally not enough money on the planet to backstop the banks trading these things if they run into trouble.
  •  
    Pay Attention Alert!  This is why the Banksters are hoarding cash and not lending ...... excerpt:  Do you want to know the real reason banks aren't lending and the PIIGS have control of the barnyard in Europe? It's because risk in the $600 trillion derivatives market isn't evening out. To the contrary, it's growing increasingly concentrated among a select few banks, especially here in the United States. In 2009, five banks held 80% of derivatives in America. Now, just four banks hold a staggering 95.9% of U.S. derivatives, according to a recent report from the Office of the Currency Comptroller. The four banks in question are JPMorgan Chase (NYSE:JPM), Citigroup (NYSE:C), Bank of America (NYSE:BAC) and Goldman Sachs (NYSE:GS). Derivatives played a crucial role in bringing down the global economy, so you would think that the world's top policymakers would have reined these things in by now - but they haven't. Instead of attacking the problem, regulators have let it spiral out of control, and the result is a $600 trillion time bomb called the derivatives market.
5More

The Left Ought to Worry About Hillary Clinton, Hawk and Militarist, in 2016 | The Nation - 0 views

  • When it comes to Hillary Clinton’s foreign policy, start first by disentangling the nonsense about Benghazi—a nonexistent scandal if ever there was one—from the broader palette of Clinton’s own, relatively hawkish views. As she consolidates her position as the expected nominee in 2016, with wide leads over all the likely GOP challengers, it ought to worry progressives that the next president of the United States is likely to be much more hawkish than the current one. Expect to be deluged, in the next few weeks, with news about Hard Choices, the memoir of her years as secretary of state under President Obama, to be released June 10. But we don’t need a memoir to know that, comparatively speaking, two things can be said about her tenure at the State Department: first, that in fact she accomplished very little; and second, that both before her appointment and during her service, she consistently came down on the hawkish side of debates inside the administration, from Afghanistan to Libya and Syria. She’s also taken a more hawkish line than Obama on Ukraine and the confrontation with Russia.
  • Commentators were observing that in an administration where all power and decision making were gravitating toward the White House, Clinton and I represented the only independent “power center”, not least because…we were both seen as “unfire-able.” [page 289] Gates confirms that he and Clinton lined up with the hawks against the doves on Afghanistan
  • In the brief excerpt that’s been released by her publisher, Clinton notes that as secretary of state she “ended up visiting 112 countries and traveling nearly one million miles.” But what, if anything, did she accomplish with all that to-ing and fro-ing? Not a lot. She largely avoided the Israel-Palestine tangle, perhaps because she didn’t want to risk crossing the Israel lobby at home, and it’s hard to see what she actually did, other than to promote the education and empowerment of girls and women in places where they are severely beaten down. And, while it’s wrong (and really silly) to call Clinton a neoconservative, she’s more of—how to put it?—a “right-wing realist” on foreign policy, who often backed military intervention as a first or second resort, while others in the White House—especially Obama’s national security staff and Vice President Biden’s own aides, were far more reluctant to employ the troops. In that vein, it’s useful to explore the memoirs of Robert Gates, who was secretary of defense under George W. Bush and then, inexplicably, under President Obama, too. In Duty: Memoir of a Secretary at War (which could also be the subtitle of Clinton’s own memoir), Gates says several times that he and Clinton saw eye to eye. (This has also been extensively documented by Bob Woodward, if more narrowly focused, in his 2010 book, Obama’s Wars.) In Duty, Gates says that he formed an alliance with Clinton because both he and her had independent power bases and were, in his words, “un-fireable”
  • ...1 more annotation...
  • And Gates says that on the crucial decision to escalate the Afghan war in 2009 and then to slow the drawdown in 2010, he and Clinton were on the same side:
  •  
    Criticism of Hillary from the progressive side: even more prone to use military intervention than Obama and pro-military/industrial complex, with some evidence to back those classifications. The problem, of course, is that public wishes bedamned, both the Republicans and Democrats will select candidates representing the War Party then present the choice of evils as their campaign theme. Either way, the War Party wins unless a winning third party candidate miraculously emerges. Such is the state of democracy in the American republic.   
3More

Transparency Toolkit - 0 views

  • About Transparency Toolkit We need information about governments, companies, and other institutions to uncover corruption, human rights abuses, and civil liberties violations. Unfortunately, the information provided by most transparency initiatives today is difficult to understand and incomplete. Transparency Toolkit is an open source web application where journalists, activists, or anyone can chain together tools to rapidly collect, combine, visualize, and analyze documents and data. For example, Transparency Toolkit can be used to get data on all of a legislator’s actions in congress (votes, bills sponsored, etc.), get data on the fundraising parties a legislator attends, combine that data, and show it on a timeline to find correlations between actions in congress and parties attended. It could also be used to extract all locations from a document and plot them on a map where each point is linked to where the location was mentioned in the document.
  • Analysis Platform On the analysis platform, users can add steps to the analysis process. These steps chain together the tools, so someone could scrape data, upload a document, crossreference that with the scraped data, and then visualize the result all in less than a minute with little technical knowledge. Some of the tools allow users to specify input, but when this is not the case the output of the last step is the input of the next. Tools Existing and planned Transparency Toolkit tools include include scrapers and APIs for accessing data, format converters, extraction tools (for dates, names, locations, numbers), tools for crossreferencing and merging data, visualizations (maps, timelines, network graphs, maps), and pattern and trend detecting tools. These tools are designed to work in many cases rather than a single specific situation. The tools can be linked together on Transparency Toolkit, but they are also available individually. Where possible, we build our tools off of existing open source software. Road Map You can see the plans for future development of Transparency Toolkit here.
  •  
    If you think this isn't a tool for some very serious research, check the short descriptions of the modules here. https://github.com/transparencytoolkit I'll be installing this and doing some test-driving soon. From the source files, the glue for the tools seems to be Ruby on Rails. The development roadmap linked from the last word on this About page is also highly instructive. It ranks among the most detailed dev roadmaps I have ever seen. Notice that it is classified by milestones with scheduled work periods, giving specific date ranges for achievement. Even given the inevitable need to alter the schedule for unforeseen problems, this is a very aggressive (not quite the word I want) development plan and schedule. And the planned changes look to be super-useful, including a lot of "make it easier for the user" changes.   
12More

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
6More

History of the Federal Judiciary - 0 views

  •  Olmstead v. United States: The Constitutional Challenges of Prohibition Enforcement Historical Documents Dissenting opinion of Justice Louis D. Brandeis in Olmstead v. United States Justice Brandeis’s dissenting opinion is one of the more notable dissents in Supreme Court history. He attempted to define a general right of privacy based on the Fourth and Fifth Amendments. Brandeis had long been interested in the problem of privacy in the modern age; years earlier he and his law partner, Samuel Warren, published what many consider the seminal article on the topic (Samuel Warren & Louis D. Brandeis, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890)). Brandeis’s opinion in Olmstead attempted to apply to the current era what he said were the principles of the Fourth and Fifth Amendments. Historians often overlook how much his approach draws on the dissenting opinion of Judge Rudkin in the circuit court, but Brandeis himself acknowledged his debt to Rudkin in the text. The quotation about “the form that evil had theretofore taken” referred to the Supreme Court decision in Weems v. United States, in which Justice Joseph McKenna wrote of the need for the Court to apply the general principles of the Constitution to new problems.
  • Moreover, “in the application of a constitution, our contemplation cannot be only of what has been but of what may be.” The progress of science in furnishing the Government with means of espionage is not likely to stop with wire-tapping. Ways may someday be developed by which the Government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Advances in the psychic and related sciences may bring means of exploring unexpressed beliefs, thoughts and emotions. “That places the liberty of every man in the hands of every petty officer” was said by James Otis of much lesser intrusions than these. To Lord Camden, a far slighter intrusion seemed “subversive of all the comforts of society.” Can it be that the Constitution affords no protection against such invasions of individual security? . . .
  • In Ex parte Jackson, 96 U.S. 727, it was held that a sealed letter entrusted to the mail is protected by the Amendments. The mail is a public service furnished by the Government. The telephone is a public service furnished by its authority. There is, in essence, no difference between the sealed letter and the private telephone message. As Judge Rudkin said below: “True, the one is visible, the other invisible; the one is tangible, the other intangible; the one is sealed, and the other unsealed, but these are distinctions without a difference.” The evil incident to invasion of the privacy of the telephone is far greater than that involved in tampering with the mails. Whenever a telephone line is tapped, the privacy of the persons at both ends of the line is invaded and all conversations between them upon any subject, and, although proper, confidential and privileged, may be overheard. Moreover, the tapping of one man’s telephone line involves the tapping of the telephone of every other person whom he may call or who may call him. As a means of espionage, writs of assistance and general warrants are but puny instruments of tyranny and oppression when compared with wire-tapping.
  • ...2 more annotations...
  • Time and again, this Court in giving effect to the principle underlying the Fourth Amendment, has refused to place an unduly literal construction upon it. This was notably illustrated in the Boyd case itself. Taking language in its ordinary meaning, there is no “search” or “seizure” when a defendant is required to produce a document in the orderly process of a court’s procedure. “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures,” would not be violated, under any ordinary construction of language, by compelling obedience to a subpoena. But this Court holds the evidence inadmissible simply because the information leading to the issue of the subpoena has been unlawfully secured. . . . The provision against self-incrimination in the Fifth Amendment has been given an equally broad construction. . . .
  • Decisions of this Court applying the principle of the Boyd case have settled these things. Unjustified search and seizure violates the Fourth Amendment, whatever the character of the paper; whether the paper when taken by the federal officers was in the home, in an office, or elsewhere; whether the taking was effected by force, by fraud, or in the orderly process of a court’s procedure. From these decisions, it follows necessarily that the Amendment is violated by the officer’s reading the paper without a physical seizure, without his even touching it; and that use, in any criminal proceeding, of the contents of the paper so examined—as where they are testified to by a federal officer who thus saw the document, or where, through knowledge so obtained, a copy has been procured elsewhere—any such use constitutes a violation of the Fifth Amendment. The protection guaranteed by the Amendments is much broader in scope. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man’s spiritual nature, of his feelings, and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone—the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment. And the use, as evidence in a criminal proceeding, of facts ascertained by such intrusion must be deemed a violation of the Fifth.
  •  
    The linked opinion is Justice Brandeis' dissent in Olmstead v. U.S., the first Supreme Court decision to approve the use of secret wiretap evidence in a criminal proceeding, even though gathered without a search warrant. The warrant requirement would later be imposed in 1967 by the decision in Katz v. U.S., which established that the Fourth Amendment the privacy of people, not places, reviving the Brandeis dissent to a large degree. Since Katz and the advent of broad government surveillance, Justice Brandeis' dissent is gaining still more attention. 
5More

9/11 Museum World Trade Center Evidence: No Plane Hit Pentagon? | Dissident Voice - 0 views

  • Even a determined debunker of 9/11 skeptics, while laying out a coherent argument that the official 9/11 Pentagon story is true (and conflating physical evidence with photography), ends up concluding: In this essay I asked what conclusions about the Pentagon attack were supported by physical evidence — primarily post-crash photographs of the site. I found that, in every aspect I considered, this evidence comports with the crash of a Boeing 757. At the same time, the evidence does not conclusively prove that the aircraft was a 757, much less that it was Flight 77. However, that lack of conclusiveness should not be surprising given the systematic suppression of evidence by authorities.
  • At best, the events of 9/11 represent the catastrophic failure of numerous American agencies, including airport security, air traffic controllers, national air defense command, and the U.S. Air Force. That reality alone is enough to raise suspicions of a cover-up, if only to avoid accountability for lethal incompetence. Absence of evidence is not evidence of absence. At worst, the events of 9/11 were the result of an almost unimaginable criminal conspiracy designed to produce the “new Pearl Harbor” that would enable fans of the New American Century (many of them members of the Bush administration) to take the United States in new, warlike, world-dominating directions (maybe something like a Global War on Terror).
  • In any event, the Bush administration fought long and hard to prevent any investigation of 9/11 and continued to work to undermine the 9/11 Commission until it produced its flawed report in August 2004. That final report omits any mention, much less explanation, of what Vice President Dick Cheney knew and when he knew it regarding the attack on the Pentagon. The 9/11 Commission knew full well – and chose not to confront – the serious implications of the testimony to the commission by Transportation Secretary Norman Pinetta (May 23, 2003): During the time that the airplane was coming into the Pentagon, there was a young man who would come in and say to the Vice President…the plane is 50 miles out…the plane is 30 miles out….and when it got down to the plane is 10 miles out, the young man also said to the vice president “do the orders still stand?” And the Vice President turned and whipped his neck around and said “Of course the orders still stand, have you heard anything to the contrary!??”
  • ...1 more annotation...
  • Even now, still in the shadows of 9/11, it might be instructive to hear President Bush and members of his administration vigorously questioned, under oath, as to why they decided to pay no attention – none at all (Bush is said to have told a CIA officer “you’ve covered your ass,” which sounds in retrospect almost like foreknowledge) – to the CIA briefing paper with the title: “Bin Laden Determined To Strike in US.” Long after the facts of 9/11, the Bush people defended their absolute inattention and inaction based on the absence of evidence.
  •  
    Re 9-11, I see the cover-up conspiracy's existence as having been established beyond any reasonable doubt in enormous detail. The cover-up conspiracy's very existence casts doubt on the official version of events. The official version of events itself is a conspiracy theory and it seems beyond question that a conspiracy involving multiple persons was in fact involved (four airliners hijacked within a few hours of each other involves more than  a single pilot acting on his own). The remaining problem is determining who the real conspirators were, their roles and actions, and their motives. Given that the official version is itself a conspiracy theory, other reconstructions of events cannot logically be discarded just on the basis that they are conspiracy theories. 
6More

Memo to Potential Whistleblowers: If You See Something, Say Something | Global Research - 0 views

  • Blowing the whistle on wrongdoing creates a moral frequency that vast numbers of people are eager to hear. We don’t want our lives, communities, country and world continually damaged by the deadening silences of fear and conformity. I’ve met many whistleblowers over the years, and they’ve been extraordinarily ordinary. None were applying for halos or sainthood. All experienced anguish before deciding that continuous inaction had a price that was too high. All suffered negative consequences as well as relief after they spoke up and took action. All made the world better with their courage. Whistleblowers don’t sign up to be whistleblowers. Almost always, they begin their work as true believers in the system that conscience later compels them to challenge. “It took years of involvement with a mendacious war policy, evidence of which was apparent to me as early as 2003, before I found the courage to follow my conscience,” Matthew Hoh recalled this week.“It is not an easy or light decision for anyone to make, but we need members of our military, development, diplomatic and intelligence community to speak out if we are ever to have a just and sound foreign policy.”
  • Hoh describes his record this way: “After over 11 continuous years of service with the U.S. military and U.S. government, nearly six of those years overseas, including service in Iraq and Afghanistan, as well as positions within the Secretary of the Navy’s Office as a White House Liaison, and as a consultant for the State Department’s Iraq Desk, I resigned from my position with the State Department in Afghanistan in protest of the escalation of war in 2009.” Another former Department of State official, the ex-diplomat and retired Army colonel Ann Wright, who resigned in protest of the Iraq invasion in March 2003, is crossing paths with Hoh on Friday as they do the honors at a ribbon-cutting — half a block from the State Department headquarters in Washington — for a billboard with a picture of Pentagon Papers whistleblower Daniel Ellsberg. Big-lettered words begin by referring to the years he waited before releasing the Pentagon Papers in 1971. “Don’t do what I did,” Ellsberg says on the billboard.  “Don’t wait until a new war has started, don’t wait until thousands more have died, before you tell the truth with documents that reveal lies or crimes or internal projections of costs and dangers. You might save a war’s worth of lives.
  • The billboard – sponsored by the ExposeFacts organization, which launched this week — will spread to other prominent locations in Washington and beyond. As an organizer for ExposeFacts, I’m glad to report that outreach to potential whistleblowers is just getting started. (For details, visit ExposeFacts.org.) We’re propelled by the kind of hopeful determination that Hoh expressed the day before the billboard ribbon-cutting when he said: “I trust ExposeFacts and its efforts will encourage others to follow their conscience and do what is right.” The journalist Kevin Gosztola, who has astutely covered a range of whistleblower issues for years, pointed this week to the imperative of opening up news media. “There is an important role for ExposeFacts to play in not only forcing more transparency, but also inspiring more media organizations to engage in adversarial journalism,” he wrote. “Such journalism is called for in the face of wars, environmental destruction, escalating poverty, egregious abuses in the justice system, corporate control of government, and national security state secrecy. Perhaps a truly successful organization could inspire U.S. media organizations to play much more of a watchdog role than a lapdog role when covering powerful institutions in government.”
  • ...2 more annotations...
  • Overall, we desperately need to nurture and propagate a steadfast culture of outspoken whistleblowing. A central motto of the AIDS activist movement dating back to the 1980s – Silence = Death – remains urgently relevant in a vast array of realms. Whether the problems involve perpetual war, corporate malfeasance, climate change, institutionalized racism, patterns of sexual assault, toxic pollution or countless other ills, none can be alleviated without bringing grim realities into the light. “All governments lie,” Ellsberg says in a video statement released for the launch of ExposeFacts, “and they all like to work in the dark as far as the public is concerned, in terms of their own decision-making, their planning — and to be able to allege, falsely, unanimity in addressing their problems, as if no one who had knowledge of the full facts inside could disagree with the policy the president or the leader of the state is announcing.” Ellsberg adds: “A country that wants to be a democracy has to be able to penetrate that secrecy, with the help of conscientious individuals who understand in this country that their duty to the Constitution and to the civil liberties and to the welfare of this country definitely surmount their obligation to their bosses, to a given administration, or in some cases to their promise of secrecy.”
  • Right now, our potential for democracy owes a lot to people like NSA whistleblowers William Binney and Kirk Wiebe, and EPA whistleblower Marsha Coleman-Adebayo. When they spoke at the June 4 news conference in Washington that launched ExposeFacts, their brave clarity was inspiring. Antidotes to the poisons of cynicism and passive despair can emerge from organizing to help create a better world. The process requires applying a single standard to the real actions of institutions and individuals, no matter how big their budgets or grand their power. What cannot withstand the light of day should not be suffered in silence. If you see something, say something.
  •  
    While some governments -- my own included -- attempt to impose an Orwellian Dark State of ubiquitous secret surveillance, secret wars, the rule of oligarchs, and public ignorance, the Edward Snowden leaks fanned the flames of the countering War on Ignorance that had been kept alive by civil libertarians. Only days after the U.S. Supreme Court denied review in a case where a reporter had been ordered to reveal his source of information for a book on the Dark State under the penalties for contempt of court (a long stretch in jail), a new web site is launched for communications between sources and journalists where the source's names never need to be revealed. This article is part of the publicity for that new weapon fielded by the civil libertarian side in the War Against Ignorance.  Hurrah!
4More

One Click Politics - 0 views

  • Senate Joint Resolution 19 is a proposed Constitutional Amendment to overturn Citizens United, but it doesn’t address corporate constitutional rights at all. Please send a message to the authors of SJR19 -- let them know that Corporate Personhood MUST be included in the language of the amendment... What You Can Do: Help movetoamend accomplish these goals by contributing your power of voice. Take action now by sending a message to Congress telling them why these issues are important to you.
  • Formed in September 2009, Move to Amend is a coalition of hundreds of organizations and hundreds of thousands of individuals committed to social and economic justice, ending corporate rule, and building a vibrant democracy that is genuinely accountable to the people, not corporate interests.
  • Senate Joint Resolution 19 is a proposed Constitutional Amendment to overturn Citizens United, but it doesn’t address corporate constitutional rights at all. Please send a message to the authors of SJR19 -- let them know that Corporate Personhood MUST be included in the language of the amendment... What You Can Do: Help movetoamend accomplish these goals by contributing your power of voice. Take action now by sending a message to Congress telling them why these issues are important to you.
  •  
    I have never forwarded action alerts to others by email. The typical action alert winds up sharing your email address with at least one other organization. The next thing you know you're getting donor solicitations from both the Republican and Democratic party central national coordinating committees. It's not just that I'm a political independent; it's an ongoing task to unsubscribe from unwanted mailing lists. Today I got an action alert from Move to Amend, only the second I have received from the organization. This group does not share your email address with anyone. If you choose to participate in this action alert, which is nearing 1 million messages sent, there is a send button near the bottom of the page to participate. That takes you to a page where you can read the message that will be sent. Move to Amend is a non-partisan organization that has been working toward a constitutional amendment for around 4 years that would clear the way for Congress to regulate campaign contributions, in light of Supreme Court decisions declaring that corporations have a First Amendment right to make campaign contributions in any amount they desire. But their amendment would also abolish constitutional rights for all fictional legal "persons" other than human beings and government at the local, state, and national levels. Move to Amend has been going about the process the right way and to date has scored supporting resolutions in 16 state legislatures and hundreds of community governments. That's enough to get oligarchs worried. So there's a bill gathering steam in the U.S. Senate, SJR 19, that's a watered-down version. It grants Congress and the states power to regulate campaign contributions, but it does not speak to the problem of granting human constitutional rights to entities that have existence only in the eyes of the law. The Senate bill is here: http://goo.gl/Nkvfkg Our nation's Founders unmistakably did not contemplate that corporations would have constitution
3More

Reset The Net - Privacy Pack - 0 views

  • This June 5th, I pledge to take strong steps to protect my freedom from government mass surveillance. I expect the services I use to do the same.
  • Fight for the Future and Center for Rights will contact you about future campaigns. Privacy Policy
  •  
    I wound up joining this campaign at the urging of the ACLU after checking the Privacy Policy. The Reset the Net campaign seems to be endorsed by a lot of change-oriented groups, from the ACLU to Greenpeac to the Pirate Party. A fair number of groups with a Progressive agenda, but certainly not limited to them. The right answer to that situation is to urge other groups to endorse, not to avoid the campaign. Single-issue coalition-building is all about focusing on an area of agreement rather than worrying about who you are rubbing elbows with.  I have been looking for a a bipartisan group that's tackling government surveillance issues via mass actions but has no corporate sponsors. This might be the one. The reason: Corporate types like Google have no incentive to really butt heads with the government voyeurs. They are themselves engaged in massive surveillance of their users and certainly will not carry the battle for digital privacy over to the private sector. But this *is* a battle over digital privacy and legally defining user privacy rights in the private sector is just as important as cutting back on government surveillance. As we have learned through the Snowden disclosures, what the private internet companies have, the NSA can and does get.  The big internet services successfully pushed in the U.S. for authorization to publish more numbers about how many times they pass private data to the government, but went no farther. They wanted to be able to say they did something, but there's a revolving door of staffers between NSA and the big internet companies and the internet service companies' data is an open book to the NSA.   The big internet services are not champions of their users' privacy. If they were, they would be featuring end-to-end encryption with encryption keys unique to each user and unknown to the companies.  Like some startups in Europe are doing. E.g., the Wuala.com filesync service in Switzerland (first 5 GB of storage free). Compare tha
11More

Profiting from Your Thirst as Global Elite Rush to Control Water Worldwide :: The Marke... - 0 views

  • A disturbing trend in the water sector is accelerating worldwide. The new “water barons” --- the Wall Street banks and elitist multibillionaires --- are buying up water all over the world at unprecedented pace. Familiar mega-banks and investing powerhouses such as Goldman Sachs, JP Morgan Chase, Citigroup, UBS, Deutsche Bank, Credit Suisse, Macquarie Bank, Barclays Bank, the Blackstone Group, Allianz, and HSBC Bank, among others, are consolidating their control over water. Wealthy tycoons such as T. Boone Pickens, former President George H.W. Bush and his family, Hong Kong’s Li Ka-shing, Philippines’ Manuel V. Pangilinan and other Filipino billionaires, and others are also buying thousands of acres of land with aquifers, lakes, water rights, water utilities, and shares in water engineering and technology companies all over the world. The second disturbing trend is that while the new water barons are buying up water all over the world, governments are moving fast to limit citizens’ ability to become water self-sufficient (as evidenced by the well-publicized Gary Harrington’s case in Oregon, in which the state criminalized the collection of rainwater in three ponds located on his private land, by convicting him on nine counts and sentencing him for 30 days in jail). Let’s put this criminalization in perspective:
  • Billionaire T. Boone Pickens owned more water rights than any other individuals in America, with rights over enough of the Ogallala Aquifer to drain approximately 200,000 acre-feet (or 65 billion gallons of water) a year. But ordinary citizen Gary Harrington cannot collect rainwater runoff on 170 acres of his private land. It’s a strange New World Order in which multibillionaires and elitist banks can own aquifers and lakes, but ordinary citizens cannot even collect rainwater and snow runoff in their own backyards and private lands.
  • In 2008, Goldman Sachs called water “the petroleum for the next century” and those investors who know how to play the infrastructure boom will reap huge rewards, during its annual “Top Five Risks” conference. Water is a U.S.$425 billion industry, and a calamitous water shortage could be a more serious threat to humanity in the 21st century than food and energy shortages, according to Goldman Sachs’s conference panel. Goldman Sachs has convened numerous conferences and also published lengthy, insightful analyses of water and other critical sectors (food, energy). Goldman Sachs is positioning itself to gobble up water utilities, water engineering companies, and water resources worldwide. Since 2006, Goldman Sachs has become one of the largest infrastructure investment fund managers and has amassed a $10 billion capital for infrastructure, including water.
  • ...7 more annotations...
  • Citigroup’s top economist Willem Buitler said in 2011 that the water market will soon be hotter the oil market (for example, see this and this): “Water as an asset class will, in my view, become eventually the single most important physical-commodity based asset class, dwarfing oil, copper, agricultural commodities and precious metals.” In its recent 2012 Water Investment Conference, Citigroup has identified top 10 trends in the water sector, as follows:
  • Specifically, a lucrative opportunity in water is in hydraulic fracturing (or fracking), as it generates massive demand for water and water services. Each oil well developed requires 3 to 5 million gallons of water, and 80% of this water cannot be reused because it’s three to 10 times saltier than seawater. Citigroup recommends water-rights owners sell water to fracking companies instead of to farmers because water for fracking can be sold for as much as $3,000 per acre-foot instead of only $50 per acre/foot to farmers.
  • One of the world’s largest banks, JPMorgan Chase has aggressively pursued water and infrastructure worldwide. In October 2007, it beat out rivals Morgan Stanley and Goldman Sachs to buy U.K.’s water utility Southern Water with partners Swiss-based UBS and Australia’s Challenger Infrastructure Fund. This banking empire is controlled by the Rockefeller family; the family patriarch David Rockefeller is a member of the elite and secretive Bilderberg Group, Council on Foreign Relations, and Trilateral Commission.
  • Barclays PLC is a U.K.-based major global financial services provider operating in all over the world with roots in London since 1690; it operates through its subsidiary Barclays Bank PLC and its investment bank called Barclays Capital. Barclays Bank’s unit Barclays Global Investors manages an exchange-traded fund (ETF) called iShares S&P Global Water, which is listed on the London Stock Exchanges and can be purchased like any ordinary share through a broker. Touting the iShares S&P Global Water as offering “a broad based exposure to shares of the world’s largest water companies, including water utilities and water equipment stocks” of water companies around the world, this fund as of March 31, 2007 was valued at U.S.$33.8 million.
  • Deutsche Bank is one of the major players in the water sector worldwide. Its Deutsche Bank Advisors have identified water as a part of the climate investment strategies. In its presentation, “Global Warming: Implications for Investors,” they have identified the four following major areas for water investment: § Distribution and management: (1) Supply and recycling, (2) water distribution and sewage, (3) water management and engineering. § Water purification: (1) Sewage purification, (2) disinfection, (3) desalination, (4) monitoring. § Water efficiency (demand): (1) Home installation, (2) gray-water recycling, (3) water meters. § Water and nutrition: (1) Irrigation, (2) bottled water.
  • Moreover, Deutsche Bank has channeled €6 billion (U.S.$8.55 billion) into climate change funds, which will target companies with products that cut greenhouse gases or help people adapt to a warmer world, in sectors from agriculture to power and construction (Reuters, October 18, 2007). In addition to SCM, Deutsche Bank also has the RREEF Infrastructure, part of RREEF Alternative Investments, headquartered in New York with main hubs in Sydney, Singapore, and London. RREEF Infrastructure has more than €6.7 billion in assets under management. One of its main targets is utilities, including electricity networks, water-treatment or distribution operations, and natural-gas networks. In October 2007, RREEF partnered with Goldman Sachs, GE, Prudential, and Babcok & Brown Ltd. to bid unsuccessfully for U.K.’s water utility Southern Water. § Crediting the boom in European infrastructure investment, the RREEF fund by August 2007 had raised €2 billion (U.S.$2.8 billion); Europe’s infrastructure market is valued at between U.S.$4 trillion to U.S.$6 trillion (DowJones Financial News Online, August 7, 2007). § Bulgaria --- Deutsche Bank Bulgaria is planning to participate in large infrastructure projects, including public-private partnership projects in water and sewage worth up to €1 billion (Sofia Echo Media, February 26, 2008). § Middle East --- Along with Ithmaar Bank B.S.C. (an private-equity investment bank in Bahrain), Deutsche Bank co-managed a U.S.$2 billion Shari'a-compliant Infrastructure and Growth Capital Fund and plans to target U.S.$630 billion in regional infrastructure.
  • In my 2008 article, I overlooked the astonishingly large land purchases (298,840 acres, to be exact) by the Bush family in 2005 and 2006. In 2006, while on a trip to Paraguay for the United Nation’s children’s group UNICEF, Jenna Bush (daughter of former President George W. Bush and granddaughter of former President George H.W. Bush) reportedly bought 98,840 acres of land in Chaco, Paraguay, near the Triple Frontier (Bolivia, Brazil, and Paraguay). This land is said to be near the 200,000 acres purchased by her grandfather, George H.W. Bush, in 2005. The lands purchased by the Bush family sit over not only South America’s largest aquifer --- but the world’s as well --- Acuifero Guaraní, which runs beneath Argentina, Brazil, Paraguay, and Uruguay. This aquifer is larger than Texas and California combined. Online political magazine Counterpunch quoted Argentinean pacifist Adolfo Perez Esquivel, the winner of 1981 Nobel Peace Prize, who “warned that the real war will be fought not for oil, but for water, and recalled that Acuifero Guaraní is one of the largest underground water reserves in South America….”
  •  
     Like the land rush for Arctic lands soon to be bared of ice by global warming, banksters are also moving to capitalize on looming water shortages, aided by IMF privatization loan conditions the the dwindling of potable water supplies globally via pollution, deforestation, and aquifer depletion. All trace to the common problem over human overpopulation of the planet.  
1More

12 Charts That Show The Permanent Damage That Has Been Done To The U.S. Economy | Silve... - 0 views

  •  
    "Most people that discuss the "economic collapse" focus on what is coming in the future.  And without a doubt, we are on the verge of some incredibly hard times.  But what often gets neglected is the immense permanent damage that has been done to the U.S. economy by the long-term economic collapse that we are already experiencing. But because unprecedented levels of government debt and reckless money printing by the Federal Reserve have bought us a very short window of relative stability, most Americans don't seem too concerned about our long-term problems. They seem to have faith that our "leaders" will be able to find a way to muddle through whatever challenges are ahead.  Hopefully the following 12 charts below will be a wake up call. The last major wave of the economic collapse did a colossal amount of damage to our economic foundations, and now the next major wave of the economic collapse is rapidly approaching."
1More

Ebola Debuts on Americans' List of Top U.S. Problems - 0 views

  • As the quarantine period ends for people exposed to the first person in the U.S. to be diagnosed with Ebola, the virus for the first time ranks among the top 10 issues Americans consider to be the most important ones facing the country. However, Ebola still ranks behind five other issues, including the economy (17%), dissatisfaction with government (16%) and unemployment (10%), and ties several others.
4More

Israeli Elections To Be Held March 17 | nsnbc international - 0 views

  • The Israeli daily Haaretz has reported that the bill to dissolve the Knesset passed the first reading, Wednesday, in a 22 to 0 vote, preparing to head for new elections on March 17, 2015. The developments came less than a day after Israeli Prime Minister Benjamin Netanyahu fired Justice Minister Tzipi Livni, and Finance Minister Yair Lapid.
  • Haaretz said the vote came just a few hours after the bill to dissolve the Knesset passed a preliminary reading with a 84 to 0 vote, with one abstention. It added that the umbrella proposal grants the Knesset a period of three to five months to prepare for new election after the Knesset has been dissolved. There will be two more readings at the Knesset next week, and after the approval, the Knesset moves to elections recess.
  • On Tuesday, Netanyahu fired both Livni and Lapid after accusing them of trying to out throw him, and for defying his own polices, including his insistence that the Palestinians must recognize Israel as a Jewish State, and his policies regarding the “Iranian Nuclear File.”
  •  
    Netanyahu's approval rating is down around 20 per cent. The only problem there is that the next higher rating of another politico is 7 per cent. The pundits seem to agree that Netanyahu's Likud Party will likely be charged with forming a new ruling coalition, which keeps Netanyahu and Israel's right wing in power. 
8More

2015 Will Be All About Iran, China and Russia / Sputnik International - 0 views

  • Fasten your seatbelts; 2015 will be a whirlwind pitting China, Russia and Iran against what I have described as the Empire of Chaos.
  • Considering that this swift move was conceived as a checkmate, Moscow’s defensive strategy was not that bad. On the key energy front, the problem remains the West’s – not Russia’s. If the EU does not buy what Gazprom has to offer, it will collapse. Moscow’s key mistake was to allow Russia's domestic industry to be financed by external, dollar-denominated debt. Talk about a monster debt trap  which can be easily manipulated by the West. The first step for Moscow should be to closely supervise its banks. Russian companies should borrow domestically and move to sell their assets abroad. Moscow should also consider implementing a system of currency controls so the basic interest rate can be brought down quickly. And don’t forget that Russia can always deploy a moratorium on debt and interest, affecting over $600 billion. That would shake the entire world's banking system to the core. Talk about an undisguised “message” forcing the US/EU economic warfare to dissolve.
  • Global oil prices are bound to remain low. All bets are off on whether a nuclear deal will be reached by this summer between Iran and the P5+1. If sanctions (actually economic war) against Iran remain and continue to seriously hurt its economy, Tehran’s reaction will be firm, and will include even more integration with Asia, not the West.
  • ...5 more annotations...
  • Now let’s take a look at Russian fundamentals. Russia’s government debt totals only 13.4% of its GDP. Its budget deficit in relation to GDP is only 0.5%.  If we assume a US GDP of $16.8 trillion (the figure for 2013), the US budget deficit totals 4% of GDP, versus 0.5% for Russia. The Fed is essentially a private corporation owned by regional US private banks, although it passes itself off as a state institution. US publicly held debt is equal to a whopping 74% of GDP in fiscal year 2014. Russia’s is only 13.4%. The declaration of economic war by the US and EU on Russia – via the run on the ruble and the oil derivative attack – was essentially a derivatives racket. Derivatives – in theory – may be multiplied to infinity. Derivative operators attacked both the ruble and oil prices in order to destroy the Russian economy. The problem is, the Russian economy is more soundly financed than America's.
  • So yes – it will be all about further moves towards the integration of Eurasia as the US is progressively squeezed out of Eurasia. We will see a complex geostrategic interplay progressively undermining the hegemony of the US dollar as a reserve currency and, most of all, the petrodollar. For all the immense challenges the Chinese face, all over Beijing it's easy to detect unmistakable signs of a self-assured, self-confident, fully emerged commercial superpower. President Xi Jinping and the current leadership will keep investing heavily in the urbanization drive and the fight against corruption, including at the highest levels of the Chinese Communist Party (CCP). Internationally, the Chinese will accelerate their overwhelming push for new 'Silk Roads' – both overland and maritime – which will underpin the long-term Chinese master strategy of unifying Eurasia with trade and commerce.
  • Russia does not need to import any raw materials. Russia can easily reverse-engineer virtually any imported technology if it needs to. Most of all, Russia can generate — from the sale of raw materials – enough credit in US dollars or euros. Russia's sale of its energy wealth — or sophisticated military gear — may decline. However, they will bring in the same amount of rubles — as the ruble has also declined.  Replacing imports with domestic Russian manufacturing makes total sense. There will be an inevitable “adjustment” phase – but that won’t take long. German car manufacturers, for instance, can no longer sell their cars in Russia due to the ruble's decline. This means they will have to relocate their factories to Russia. If they don’t, Asia – from South Korea to China — will blow them out of the market.
  • The EU's declaration of economic war against Russia makes no sense whatsoever. Russia controls, directly or indirectly, most of the oil and natural gas between Russia and China: roughly 25% of the world's supply. The Middle East is bound to remain a mess. Africa is unstable. The EU is doing everything it can to cut itself off from its most stable supply of hydrocarbons, prompting Moscow to redirect energy to China and the rest of Asia. What a gift for Beijing – as it minimizes the alarm about the US Navy playing with "containment" across the high seas.  Still, an unspoken axiom in Beijing is that the Chinese remain extremely worried about an Empire of Chaos losing more and more control, and dictating the stormy terms of the relationship between the EU and Russia. The bottom line is that Beijing would never allow itself to be in a position where the US could interfere with China's energy imports – as was the case with Japan in July 1941 when the US declared war by imposing an oil embargo, cutting off 92% of Japanese oil imports. Everyone knows a key plank of China’s spectacular surge in industrial power was the requirement for manufacturers to produce in China. If Russia did the same, its economy would be growing at a rate of over 5% per year in no time. It could grow even more if bank credit was tied only to productive investment.
  • Now imagine Russia and China jointly investing in a new gold, oil and natural resource-backed monetary union as a crucial alternative to the failed debt "democracy" model pushed by the Masters of the Universe on Wall Street, the Western central bank cartel, and neoliberal politicians. They would be showing the Global South that financing prosperity and improved standards of living by saddling future generations with debt was never meant to work in the first place. Until then, a storm will be threatening our very lives – today and tomorrow. The Masters of the Universe/Washington combo won’t give up their strategy to make Russia a pariah state cut off from trade, the transfer of funds, banking and Western credit markets and thus prone to regime change. Further on down the road, if all goes according to plan, their target will be (who else) China. And Beijing knows it. Meanwhile, expect a few bombshells to shake the EU to its foundations. Time may be running out – but for the EU, not Russia. Still, the overall trend won’t be altered; the Empire of Chaos is slowly but surely being squeezed out of Eurasia.
5More

CIA Torture Report: Oversight, But No Remedies Yet - 0 views

  • The release of the executive summary of the Senate Intelligence Committee report on CIA’s post-9/11 interrogation program is, among other things, an epic act of record preservation. Numerous CIA records that might not have been disclosed for decades, or ever, were rescued from oblivion by the Senate report and are now indelibly cited and quoted, even if many of them are not yet released in full. That’s not a small thing, since the history of the CIA interrogation program was not a story that the Agency was motivated or equipped to tell. “The CIA informed the Committee that due to CIA record retention policies, the CIA could not produce all CIA email communications requested by the Committee,” the report noted, explaining that the desired information was sometimes recovered from a reply message when the original email was missing. Agency emails turned out to be a critical source of information, a fact that illuminates the Committee’s sharp response recently to the (now suspended) CIA proposal to the National Archives (NARA) to destroy most Agency emails of non-senior officials.
  • Thus, the gruesome record of the waterboarding of al Qaeda operative Abu Zubaydah “was referenced in emails, but was not documented or otherwise noted in CIA cables.” (This is at odds with NARA’s initial view that “It is unlikely that permanent records will be found in these email accounts that is not filed in other appropriate files.”) The Committee report is also a remarkable demonstration of the congressional oversight function that is all the more impressive because it was performed in adverse, unfavorable conditions. It is striking to see how the CIA sometimes treated the Senate Intelligence Committee, its leadership and its staff with the same disdain and evasiveness that is often perceived by FOIA requesters and other members of the public. Committee questions were ignored, inaccurate information was provided, and the oversight process was gamed.
  • “Internal CIA emails include discussion of how the CIA could ‘get… off the hook on the cheap’ regarding [then-Committee] Chairman [Bob] Graham’s requests for additional information…. In the end, CIA officials simply did not respond to Graham’s requests prior to his departure from the Committee in January 2003,” the report said. “I am deeply disturbed by the implications of the study for the committee’s ability to discharge its oversight responsibility,” wrote Sen. Angus King (I-Maine) in his additional remarks. “Because it appears from the study that the committee was continuously misled as to virtually all aspects of this program, it naturally raises the extremely troubling question as to whether we can trust the representations of the agency in connection with difficult or sensitive issues in the future.” But minority members of the Committee disputed this characterization: “In reality, the overall pattern of engagement with the Congress shows that the CIA attempted to keep the Congress informed of its activities,” they wrote in their extensive dissenting views. Perhaps the most important achievement of the Committee report was to document and memorialize the fact that agents of the US Government practiced torture. Not “harsh measures” or “enhanced techniques,” but torture.
  • ...2 more annotations...
  • Senator Susan Collins (R-Maine), who criticized what she said were methodological flaws in the Committee report, said in her additional views that “Despite these significant flaws, the report’s findings lead me to conclude that some detainees were subject to techniques that constituted torture. This inhumane and brutal treatment never should have occurred.” By the same token, the most important omission from the report is the absence of any discussion of remedies. Now that it is firmly established that “we tortured some folks,” as President Obama awkwardly put it, the question is what to do about it. Confession without atonement is incomplete. Prosecution seems problematic for a number of reasons, including the difficulty of localizing responsibility, when it is entire institutions and not just particular officials that failed. A different approach to the problem would start by considering the individuals who suffered abuse at the hands of the U.S. government, including a number of persons who were detained in error. Congress could now ask how some of them (i.e. those who are still alive) could be compensated in some measure for what was wrongly done to them.
  • Several previous efforts to seek remedies for torture were deflected by use of the state secrets privilege. In light of the detailed findings of the Senate Intelligence Committee report, that sort of evasion should be harder to sustain. Congress could accelerate a resolution of the problem with a focused investigation of what potential remedies are now feasible and appropriate.
1More

The GCC and its Problems | nsnbc international - 0 views

  •  
    If this article is correct, there's a realignment of GCC-U.S. relations well under way. But I'm skeptical about the Saudi rhetoric on combating terrorism. So far as I'm aware, Riyadh has taken no action to halt the flow of Saudi funding to ISIL and Al-Nusrah (which earlier this year announced their merger). And the Saudis are providing a base for the U.S. to train "moderate Syrian fighters" aka ISIL and Al-Nusrah. Meanwhile, the Saudi efforts to depress oil prices has been widely reported as resulting from a deal with the U.S. to cripple the economies of Russia, Iran, and Venezuela in exchange for the U.S. agreeing to target the Assad government in Syria before attacking ISIL and Al-Nusrah. 
3More

Is democracy a trade barrier? | European Public Affairs - 0 views

  • The United States and the European Union (EU) are negotiating a trade agreement, the Transatlantic Trade and Investment Partnership (TTIP). The aim is to lower trade barriers. Unfortunately those ‘barriers’ include not just traditional trade tariffs and quotas, but also the laws your elected representatives make.
  • This is why the fight against TTIP is a fight for democracy. It is not about protectionism, but rather the protection of our democratic laws over their business interests.
  •  
    "In a democracy, elected representatives make laws. But with new trade agreements, businesses could co-write legislation. The United States and the European Union (EU) are negotiating a trade agreement, the Transatlantic Trade and Investment Partnership (TTIP). The aim is to lower trade barriers. Unfortunately those 'barriers' include not just traditional trade tariffs and quotas, but also the laws your elected representatives make. For example, Pierre Defraigne, former Deputy Director-General in the EU Commission Department responsible for Trade, sees the core battle of TTIP is over "the norms and standards in terms of environmental, health and consumer protection". This is why the fight against TTIP is a fight for democracy. It is not about protectionism, but rather the protection of our democratic laws over their business interests. If TTIP was to be signed, two new doors will be opened for businesses to influence legislation: 1. Firstly, regulatory co-operation will give access to industry before laws are to be signed. This means regulators and stakeholders work together for the convergence of laws across the Atlantic. 2. And secondly, once laws are enacted, private investors can sue the EU or US in private tribunals, outside of national courts (known as ISDS or investor-state dispute settlement). The example of the chemical Bisphenol A illustrates what both these 'open doors' for business could mean in practice. Used in everything from water bottles to the lining of food cans, Bisphenol A is one of the most ubiquitous endocrine disruptors. As such, it disrupts the hormonal system of the body, which is responsible for all vital features such as growth, sexual development, and even behaviour. Its presence in the natural world is already felt: two out of three fish caught in Austrian rivers are now female. Bisphenol A has been banned in France since 1st January 2015. This ban goes further than the existing EU ban. Meanwhile, Bisphenol A is stil
5More

FBI says search warrants not needed to use "stingrays" in public places | Ars Technica - 0 views

  • The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed "stingrays," the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts. The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa). In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were "concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests" of Americans. According to the letter, which was released last week: For example, we understand that the FBI’s new policy requires FBI agents to obtain a search warrant whenever a cell-site simulator is used as part of a FBI investigation or operation, unless one of several exceptions apply, including (among others): (1) cases that pose an imminent danger to public safety, (2) cases that involve a fugitive, or (3) cases in which the technology is used in public places or other locations at which the FBI deems there is no reasonable expectation of privacy.
  • The letter was prompted in part by a Wall Street Journal report in November that said the Justice Department was deploying small airplanes equipped with cell-site simulators that enabled "investigators to scoop data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location." The bureau's position on Americans' privacy isn't surprising. The Obama Administration has repeatedly maintained that the public has no privacy in public places. It began making that argument as early as 2010, when it told a federal appeals court that the authorities should be allowed to affix GPS devices on vehicles and track a suspect's every move without court authorization. The Supreme Court, however, eventually ruled that warrants are required. What's more, the administration has argued that placing a webcam with pan-and-zoom capabilities on a utility pole to spy on a suspect at his or her residence was no different from a police officer's observation from the public right-of-way. A federal judge last month disagreed with the government's position, tossing evidence gathered by the webcam that was operated from afar.
  • In their letter, Leahy and Grassley complained that little is known about how stingrays, also known as ISMI catchers, are used by law enforcement agencies. The Harris Corp., a maker of the devices from Florida, includes non-disclosure clauses with buyers. Baltimore authorities cited a non-disclosure agreement to a judge in November as their grounds for refusing to say how they tracked a suspect's mobile phone. They eventually dropped charges rather than disclose their techniques. Further, sometimes the authorities simply lie to judges about their use or undertake other underhanded methods to prevent the public from knowing that the cell-site simulators are being used.
  • ...1 more annotation...
  • Hanni Fakhoury, an attorney for the Electronic Frontier Foundation, said some states and judges are pushing back against stingrays. "In Tacoma, judges now require police (to) specifically note they plan to use an IMSI catcher and promise not to store data collected from people who are not investigation targets," he said. "The Florida and Massachusetts state supreme courts ruled warrants were necessary for real-time cell phone tracking. Nine states—Colorado, Illinois, Indiana, Maryland, Minnesota, Tennessee, Utah, Virginia, and Wisconsin—passed laws specifically requiring police to use a warrant to track a cell phone in real time."
  •  
    Is there any problem here that couldn't be cured by discharge and public flogging for any government official caught using information derived from a stingray?
13More

For sale: Systems that can secretly track where cellphone users go around the globe - T... - 0 views

  • Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent. The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.
  • The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.
  • It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide. “Any tin-pot dictator with enough money to buy the system could spy on people anywhere in the world,” said Eric King, deputy director of Privacy International, a London-based activist group that warns about the abuse of surveillance technology. “This is a huge problem.”
  • ...9 more annotations...
  • Yet marketing documents obtained by The Washington Post show that companies are offering powerful systems that are designed to evade detection while plotting movements of surveillance targets on computerized maps. The documents claim system success rates of more than 70 percent. A 24-page marketing brochure for SkyLock, a cellular tracking system sold by Verint, a maker of analytics systems based in Melville, N.Y., carries the subtitle “Locate. Track. Manipulate.” The document, dated January 2013 and labeled “Commercially Confidential,” says the system offers government agencies “a cost-effective, new approach to obtaining global location information concerning known targets.”
  • tracking systems that access carrier location databases are unusual in their ability to allow virtually any government to track people across borders, with any type of cellular phone, across a wide range of carriers — without the carriers even knowing. These systems also can be used in tandem with other technologies that, when the general location of a person is already known, can intercept calls and Internet traffic, activate microphones, and access contact lists, photos and other documents. Companies that make and sell surveillance technology seek to limit public information about their systems’ capabilities and client lists, typically marketing their technology directly to law enforcement and intelligence services through international conferences that are closed to journalists and other members of the public.
  • Security experts say hackers, sophisticated criminal gangs and nations under sanctions also could use this tracking technology, which operates in a legal gray area. It is illegal in many countries to track people without their consent or a court order, but there is no clear international legal standard for secretly tracking people in other countries, nor is there a global entity with the authority to police potential abuses.
  • (Privacy International has collected several marketing brochures on cellular surveillance systems, including one that refers briefly to SkyLock, and posted them on its Web site. The 24-page SkyLock brochure and other material was independently provided to The Post by people concerned that such systems are being abused.)
  • Verint, which also has substantial operations in Israel, declined to comment for this story. It says in the marketing brochure that it does not use SkyLock against U.S. or Israeli phones, which could violate national laws. But several similar systems, marketed in recent years by companies based in Switzerland, Ukraine and elsewhere, likely are free of such limitations.
  • The tracking technology takes advantage of the lax security of SS7, a global network that cellular carriers use to communicate with one another when directing calls, texts and Internet data. The system was built decades ago, when only a few large carriers controlled the bulk of global phone traffic. Now thousands of companies use SS7 to provide services to billions of phones and other mobile devices, security experts say. All of these companies have access to the network and can send queries to other companies on the SS7 system, making the entire network more vulnerable to exploitation. Any one of these companies could share its access with others, including makers of surveillance systems.
  • Companies that market SS7 tracking systems recommend using them in tandem with “IMSI catchers,” increasingly common surveillance devices that use cellular signals collected directly from the air to intercept calls and Internet traffic, send fake texts, install spyware on a phone, and determine precise locations. IMSI catchers — also known by one popular trade name, StingRay — can home in on somebody a mile or two away but are useless if a target’s general location is not known. SS7 tracking systems solve that problem by locating the general area of a target so that IMSI catchers can be deployed effectively. (The term “IMSI” refers to a unique identifying code on a cellular phone.)
  • Verint can install SkyLock on the networks of cellular carriers if they are cooperative — something that telecommunications experts say is common in countries where carriers have close relationships with their national governments. Verint also has its own “worldwide SS7 hubs” that “are spread in various locations around the world,” says the brochure. It does not list prices for the services, though it says that Verint charges more for the ability to track targets in many far-flung countries, as opposed to only a few nearby ones. Among the most appealing features of the system, the brochure says, is its ability to sidestep the cellular operators that sometimes protect their users’ personal information by refusing government requests or insisting on formal court orders before releasing information.
  • Another company, Defentek, markets a similar system called Infiltrator Global Real-Time Tracking System on its Web site, claiming to “locate and track any phone number in the world.” The site adds: “It is a strategic solution that infiltrates and is undetected and unknown by the network, carrier, or the target.”
  •  
    The Verint company has very close ties to the Iraeli government. Its former parent company Comverse, was heavily subsidized by Israel and the bulk of its manufacturing and code development was done in Israel. See https://en.wikipedia.org/wiki/Comverse_Technology "In December 2001, a Fox News report raised the concern that wiretapping equipment provided by Comverse Infosys to the U.S. government for electronic eavesdropping may have been vulnerable, as these systems allegedly had a back door through which the wiretaps could be intercepted by unauthorized parties.[55] Fox News reporter Carl Cameron said there was no reason to believe the Israeli government was implicated, but that "a classified top-secret investigation is underway".[55] A March 2002 story by Le Monde recapped the Fox report and concluded: "Comverse is suspected of having introduced into its systems of the 'catch gates' in order to 'intercept, record and store' these wire-taps. This hardware would render the 'listener' himself 'listened to'."[56] Fox News did not pursue the allegations, and in the years since, there have been no legal or commercial actions of any type taken against Comverse by the FBI or any other branch of the US Government related to data access and security issues. While no real evidence has been presented against Comverse or Verint, the allegations have become a favorite topic of conspiracy theorists.[57] By 2005, the company had $959 million in sales and employed over 5,000 people, of whom about half were located in Israel.[16]" Verint is also the company that got the Dept. of Homeland Security contract to provide and install an electronic and video surveillance system across the entire U.S. border with Mexico.  One need not be much of a conspiracy theorist to have concerns about Verint's likely interactions and data sharing with the NSA and its Israeli equivalent, Unit 8200. 
« First ‹ Previous 201 - 220 of 638 Next › Last »
Showing 20 items per page