Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "trust" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
5More

Obama Issues Threats To Russia And NATO -- Paul Craig Roberts - PaulCraigRoberts.org - 0 views

  • The Obama regime has issued simultaneous threats to the enemy it is making out of Russia and to its European NATO allies on which Washington is relying to support sanctions on Russia. This cannot end well. As even Americans living in a controlled media environment are aware, Europeans, South Americans, and Chinese are infuriated that the National Stasi Agency is spying on their communications. NSA’s affront to legality, the US Constitution, and international diplomatic norms is unprecedented. Yet, the spying continues, while Congress sits sucking its thumb and betraying its oath to defend the Constitution of the United States. In Washington mumbo-jumbo from the executive branch about “national security” suffices to negate statutory law and Constitutional requirements. Western Europe, seeing that the White House, Congress and the Federal Courts are impotent and unable to rein-in the Stasi Police State, has decided to create a European communication system that excludes US companies in order to protect the privacy of European citizens and government communications from the Washington Stasi.
  • The Obama regime, desperate that no individual and no country escape its spy net, denounced Western Europe’s intention to protect the privacy of its communications as “a violation of trade laws.” Obama’s US Trade Representative, who has been negotiating secret “trade agreements” in Europe and Asia that give US corporations immunity to the laws of all countries that sign the agreements, has threatened WTO penalties if Europe’s communications network excludes the US companies that serve as spies for NSA. Washington in all its arrogance has told its most necessary allies that if you don’t let us spy on you, we will use WTO to penalize you. So there you have it. The rest of the world now has the best possible reason to exit the WTO and to avoid the Trans-Pacific and Trans-Atlantic “trade agreements.” The agreements are not about trade. The purpose of these “trade agreements” is to establish the hegemony of Washington and US corporations over other countries. In an arrogant demonstration of Washington’s power over Europe, the US Trade Representative warned Washington’s NATO allies: “US Trade Representative will be carefully monitoring the development of any such proposals” to create a separate European communication network. http://rt.com/news/us-europe-nsa-snowden-549/ Washington is relying on the Chancellor of Germany, the President of France, and the Prime Minister of the UK to place service to Washington above their countries’ communications privacy.
  • It has dawned on the Russian government that being a part of the American dollar system means that Russia is open to being looted by Western banks and corporations or by individuals financed by them, that the ruble is vulnerable to being driven down by speculators in the foreign exchange market and by capital outflows, and that dependence on the American international payments system exposes Russia to arbitrary sanctions imposed by the “exceptional and indispensable country.” Why it took the Russian government so long to realize that the dollar payments system puts countries under Washington’s thumb is puzzling.
  • ...2 more annotations...
  • Now that the Russian government understands that Russia must depart the dollar system in order to protect Russian sovereignty, President Putin has entered into barter/ruble oil deals with China and Iran. However, Washington objects to Russia abandoning the dollar international payment system. Zero Hedge, a more reliable news source than the US print and TV media, reports that Washington has conveyed to both Russia and Iran that a non-dollar oil deal would trigger US sanctions. http://www.zerohedge.com/news/2014-04-04/us-threatens-russia-sanctions-over-petrodollar-busting-deal Washington’s objection to the Russian/Iranian deal made it clear to all governments that Washington uses the dollar-based international payments system as a means of control. Why should countries accept an international payments system that infringes their sovereignty? What would happen if instead of passively accepting the dollar as the means of international payment, countries simply left the dollar system? The value of the dollar would fall and so would Washington’s power. Without the power that the dollar’s role as world reserve currency gives the US to pay its bills by printing money, the US could not maintain its aggressive military posture or its payoffs to foreign governments to do its bidding. Washington would be just another failed empire, whose population can barely make ends meet, while the One Percent who comprise the mega-rich compete with 200-foot yachts and $750,000 fountain pins. The aristocracy and the serfs. That is what America has already become. A throwback to the feudal era. It is only a matter of time before it is universally recognized that the US is a failed state. Let’s pray this recognition occurs before the arrogant inhabitants of Washington blow up the world in pursuit of hegemony over others.
  • Washington’s provocative military moves against Russia are reckless and dangerous. The buildup of NATO air, ground, and naval forces on Russia’s borders in violation of the 1997 NATO-Russian treaty and the Montreux Convention naturally strike the Russian government as suspicious, especially as the buildups are justified on the basis of lies that Russia is about to invade Poland, the Baltic States, and Moldova in addition to Ukraine. These lies are transparent. The Russian Foreign Minister Sergey Lavrov has asked NATO for an explanation, stating: “We are not only expecting answers, but answers that will be based fully on respect for the rules we agreed on.” http://rt.com/news/lavrov-ukraine-nato-convention-069/ Anders Fogh Rasmussen, Washington’s puppet installed as NATO figurehead who is no more in charge of NATO than I am, responded in a way guaranteed to raise Russian anxieties. Rasmussen dismissed the Russian Foreign Minister’s request for explanation as “propaganda and disinformation.” Clearly, what we are experiencing are rising tensions caused by Washington and NATO. These tensions are in addition to the tensions arising from Washington’s coup in Ukraine. These reckless and dangerous actions have destroyed the Russian government’s trust in the West and are moving the world toward war. Little did the protesters in Kiev, called into the streets by Washington’s NGOs, realize that their foolishness was setting the world on a path to armageddon.
4More

The US/NATO Enlargement Project » CounterPunch: Tells the Facts, Names the Names - 0 views

  • In February, 1990, US Secretary of State James Baker (1989-1992), representing President George HW Bush, traveled to Moscow to meet with Russian President Mikhail Gorbachev regarding the possible reunification of Germany and the removal of 300,000 Soviet troops. There is little serious dispute that as the Berlin Wall teetered, Baker promised Gorbachev “there would be no extension of NATO’s jurisdiction for forces of NATO one inch to the east.” Gorbachev is reported to have taken the US at its word and responded “any extension of the zone of NATO is unacceptable.” “I agree,” replied Baker.” Unfortunately, Gorbachev never got it in writing and most historians, at the time, agreed that NATO expansion was “ill conceived, ill-timed, and above all ill-suited to the realities of the post-Cold War world.”
  • President Bush’s National Security Advisor Brent Scowcroft and Bill Clinton’s Defense Secretary were also in agreement. But by 1994, that verbal contract had not deterred the concerted efforts of a handful of State Department policy professionals to subdue the overwhelming bureaucratic opposition according to James Goldgeier in his classic “Not Whether but When: The US Decision to Enlarge NATO.” By 1997, the Gorbachev-Baker-Bush agreement was a forgotten policy trinket as Hungary, Poland and the Czech Republic were accepted into NATO. In 2004, former Soviet satellite countries Lithuania, Latvia and Estonia were admitted and in 2009, Croatia and Albania joined NATO. Currently, the former Soviet republics of Ukraine, Georgia, Moldova, Kazakhstan, Armenia, and Azerbaijan are pending membership and all five former Soviet republics in Central Asia (Kyrgyzstan, Tajikistan, Turkmenistan, Kazakhstan, and Uzbekistan) provide NATO with logistical support for the US war in Afghanistan. As the US-led NATO alliance tightens its grip on the Caucasus countries, the American public has not been informed about the Ukrainian Parliament’s approval for a series of NATO military exercises that would put US troops on Russia’s border, even though the Ukraine is not yet a member of NATO. Rapid Trident is a 12-nation military ‘interoperability’ exercise led by the US who will commit the majority of participating troops and Sea Breeze is a naval exercise that will take place on the Black Sea adjacent to Russian ports. The NATO buildup includes joint ground operations with Moldova and Romania.
  • Most recently, NATO Secretary General Anders Fogh Rasmussen announced that the military alliance has cut Russia off from civilian and military cooperation and that there would be the deployment and reinforcement of military assets including increased air patrols over the Baltic Sea and AWACS surveillance flights over Poland and Romania. It goes without saying that the NATO build up is in addition to the deployment of US troops and F-16 warplanes to Poland, F-15C warplanes to Lithuania and aircraft carriers to the Black and Mediterranean Seas. All this raises the question about whether a promise and handshake in the world of international diplomacy is a real commitment and what is a 1991 international promise made by a Republican Administration worth in 1994 to a Democratic Administration? Apparently zilch.
  • ...1 more annotation...
  • What all this means is that, behind the diplomatic landscape of verbal jujitsu and summit meetings, there had been a concerted effort at the US State Department with the creation of a NATO Enlargement Office to establish what has become a Russian Wall – an impenetrable US – defined barrier of estrangement along the Russian border meant to cut the country off from land and sea access – as NATO, itching for war, continues to bait Russia with isolation and threats.
6More

Obama Lets N.S.A. Exploit Some Internet Flaws, Officials Say - NYTimes.com - 0 views

  • Stepping into a heated debate within the nation’s intelligence agencies, President Obama has decided that when the National Security Agency discovers major flaws in Internet security, it should — in most circumstances — reveal them to assure that they will be fixed, rather than keep mum so that the flaws can be used in espionage or cyberattacks, senior administration officials said Saturday.But Mr. Obama carved a broad exception for “a clear national security or law enforcement need,” the officials said, a loophole that is likely to allow the N.S.A. to continue to exploit security flaws both to crack encryption on the Internet and to design cyberweapons.
  • elements of the decision became evident on Friday, when the White House denied that it had any prior knowledge of the Heartbleed bug, a newly known hole in Internet security that sent Americans scrambling last week to change their online passwords. The White House statement said that when such flaws are discovered, there is now a “bias” in the government to share that knowledge with computer and software manufacturers so a remedy can be created and distributed to industry and consumers.Caitlin Hayden, the spokeswoman for the National Security Council, said the review of the recommendations was now complete, and it had resulted in a “reinvigorated” process to weigh the value of disclosure when a security flaw is discovered, against the value of keeping the discovery secret for later use by the intelligence community.“This process is biased toward responsibly disclosing such vulnerabilities,” she said.
  • The N.S.A. made use of four “zero day” vulnerabilities in its attack on Iran’s nuclear enrichment sites. That operation, code-named “Olympic Games,” managed to damage roughly 1,000 Iranian centrifuges, and by some accounts helped drive the country to the negotiating table.Not surprisingly, officials at the N.S.A. and at its military partner, the United States Cyber Command, warned that giving up the capability to exploit undisclosed vulnerabilities would amount to “unilateral disarmament” — a phrase taken from the battles over whether and how far to cut America’s nuclear arsenal.“We don’t eliminate nuclear weapons until the Russians do,” one senior intelligence official said recently. “You are not going to see the Chinese give up on ‘zero days’ just because we do.” Even a senior White House official who was sympathetic to broad reforms after the N.S.A. disclosures said last month, “I can’t imagine the president — any president — entirely giving up a technology that might enable him some day to take a covert action that could avoid a shooting war.”
  • ...2 more annotations...
  • One recommendation urged the N.S.A. to get out of the business of weakening commercial encryption systems or trying to build in “back doors” that would make it far easier for the agency to crack the communications of America’s adversaries. Tempting as it was to create easy ways to break codes — the reason the N.S.A. was established by Harry S. Truman 62 years ago — the committee concluded that the practice would undercut trust in American software and hardware products. In recent months, Silicon Valley companies have urged the United States to abandon such practices, while Germany and Brazil, among other nations, have said they were considering shunning American-made equipment and software. Their motives were hardly pure: Foreign companies see the N.S.A. disclosures as a way to bar American competitors.Continue reading the main story Continue reading the main story AdvertisementAnother recommendation urged the government to make only the most limited, temporary use of what hackers call “zero days,” the coding flaws in software like Microsoft Windows that can give an attacker access to a computer — and to any business, government agency or network connected to it. The flaws get their name from the fact that, when identified, the computer user has “zero days” to fix them before hackers can exploit the accidental vulnerability.
  • But documents released by Edward J. Snowden, the former N.S.A. contractor, make it clear that two years before Heartbleed became known, the N.S.A. was looking at ways to accomplish exactly what the flaw did by accident. A program code-named Bullrun, apparently named for the site of two Civil War battles just outside Washington, was part of a decade-long effort to crack or circumvent encryption on the web. The documents do not make clear how well it succeeded, but it may well have been more effective than exploiting Heartbleed would be at enabling access to secret data.The government has become one of the biggest developers and purchasers of information identifying “zero days,” officials acknowledge. Those flaws are big business — Microsoft pays up to $150,000 to those who find them and bring them to the company to fix — and other countries are gathering them so avidly that something of a modern-day arms race has broken out. Chief among the nations seeking them are China and Russia, though Iran and North Korea are in the market as well.
  •  
    Note that this is only an elastic policy, not law. Also notice that NYT is now reporting as *fact* that the NSA did the cyber attack on the Iranian enrichment centrifuges. By any legal measure, if true that was an act of war, a war of aggression.  So why wasn't the American public informed that we were at war with Iran? 
9More

The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket - The Intercept - 0 views

  • This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.
  • he documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.
  • The document was presented by GCHQ’s Joint Threat Research Intelligence Group (JTRIG). The unit’s self-described purpose is “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).” The British agency describes its JTRIG and Computer Network Exploitation operations as a “major part of business” at GCHQ, conducting “5% of Operations.” The annual SIGDEV conference, according to one NSA document published today by The Intercept, “enables unprecedented visibility of SIGINT Development activities from across the Extended Enterprise, Second Party and US Intelligence communities.” The 2009 Conference, held at Fort Meade, included “eighty-six representatives from the wider US Intelligence Community, covering agencies as diverse as CIA (a record 50 participants), the Air Force Research Laboratory and the National Air and Space Intelligence Center.” Defenders of surveillance agencies have often insinuated that such proposals are nothing more than pipe dreams and wishful thinking on the part of intelligence agents. But these documents are not merely proposals or hypothetical scenarios. As described by the NSA document published today, the purpose of SIGDEV presentations is “to synchronize discovery efforts, share breakthroughs, and swap knowledge on the art of analysis.”
  • ...5 more annotations...
  • (The GCHQ document also describes a practice called “credential harvesting,” which NBC described as an effort to “select journalists who could be used to spread information” that the government wants distributed. According to the NBC report, GCHQ agents would employ “electronic snooping to identify non-British journalists who would then be manipulated to feed information to the target of a covert campaign.” Then, “the journalist’s job would provide access to the targeted individual, perhaps for an interview.” Anonymous sources that NBC didn’t characterize claimed at the time that GCHQ had not employed the technique.) Whether governments should be in the business of publicly disseminating political propaganda at all is itself a controversial question. Such activities are restricted by law in many countries, including the U.S. In 2008, The New York Times’ David Barstow won a Pulitzer Prize for exposing a domestic effort coordinated by the Pentagon whereby retired U.S. generals posed as “independent analysts” employed by American television networks and cable news outlets as they secretly coordinated their messaging with the Pentagon.
  • The GCHQ document we are publishing today expressly contemplates exploiting social media venues such as Twitter, as well as other communications venues including email, to seed state propaganda–GHCQ’s word, not mine–across the internet:
  • For instance: One of the programs described by the newly released GCHQ document is dubbed “Royal Concierge,” under which the British agency intercepts email confirmations of hotel reservations to enable it to subject hotel guests to electronic monitoring. It also contemplates how to “influence the hotel choice” of travelers and to determine whether they stay at “SIGINT friendly” hotels. The document asks: “Can we influence the hotel choice? Can we cancel their visit?” Previously, der Spiegel and NBC News both independently confirmed that the “Royal Concierge” program has been implemented and extensively used. The German magazine reported that “for more than three years, GCHQ has had a system to automatically monitor hotel bookings of at least 350 upscale hotels around the world in order to target, search, and analyze reservations to detect diplomats and government officials.” NBC reported that “the intelligence agency uses the information to spy on human targets through ‘close access technical operations,’ which can include listening in on telephone calls and tapping hotel computers as well as sending intelligence officers to observe the targets in person at the hotels.”
  • Because American law bars the government from employing political propaganda domestically, that program was likely illegal, though no legal accountability was ever brought to bear (despite all sorts of calls for formal investigations). Barack Obama, a presidential candidate at the time, pronounced himself in a campaign press release “deeply disturbed” by the Pentagon program, which he said “sought to manipulate the public’s trust.” Propagandizing foreign populations has generally been more legally acceptable. But it is difficult to see how government propaganda can be segregated from domestic consumption in the digital age. If American intelligence agencies are adopting the GCHQ’s tactics of “crafting messaging campaigns to go ‘viral’,” the legal issue is clear: A “viral” online propaganda campaign, by definition, is almost certain to influence its own citizens as well as those of other countries.
  • But these documents, along with the AP’s exposure of the sham “Cuban Twitter” program, underscore how aggressively western governments are seeking to exploit the internet as a means to manipulate political activity and shape political discourse. Those programs, carried out in secrecy and with little accountability (it seems nobody in Congress knew of the “Cuban Twitter” program in any detail) threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
  •  
    Glenn Greenwald drops a choice few new documents. Well worth viewing. 
13More

White House defends 'Cuban Twitter' to stir unrest - Yahoo News - 0 views

  • The Obama administration defended its creation of a Twitter-like Cuban communications network to undermine the communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval.
  • But two senior Democrats on congressional intelligence and judiciary committees said Thursday they had known nothing about the effort, which one of them described as "dumb, dumb, dumb." A showdown with that senator's panel is expected next week, and the Republican chairman of a House oversight subcommittee said that it, too, would look into the program.An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform.First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent.
  • Yet its users were neither aware it was created by a U.S. agency with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes.It is unclear whether the scheme was legal under U.S. law, which requires written authorization of covert action by the president as well as congressional notification. White House spokesman Jay Carney said he was not aware of individuals in the White House who had known about the program.
  • ...9 more annotations...
  • USAID's top official, Rajiv Shah, is scheduled to testify on Tuesday before the Senate Appropriations State Department and Foreign Operations Subcommittee, on the agency's budget. The subcommittee's chairman, Patrick Leahy, a Democrat, is the senator who called the project "dumb, dumb, dumb" during an appearance Thursday on MSNBC.The administration said early Thursday that it had disclosed the initiative to Congress — Carney said the program had been "debated in Congress" — but hours later the narrative had shifted to say that the administration had offered to discuss funding for it with the congressional committees that approve federal programs and budgets."We also offered to brief our appropriators and our authorizers," said State Department spokeswoman Marie Harf. She added that she was hearing on Capitol Hill that many people support these kinds of democracy promotion programs. And some lawmakers did speak up on that subject. But by late Thursday no members of Congress had acknowledged being aware of the Cuban Twitter program earlier than this week.
  • Harf described the program as "discreet" but said it was in no way classified or covert. Harf also said the project, dubbed ZunZuneo, did not rise to a level that required the secretary of state to be notified. Neither former Secretary of State Hillary Rodham Clinton nor John Kerry, the current occupant of the office, was aware of ZunZuneo, she said.In his prior position as chairman of the Senate Foreign Relations Committee, Kerry had asked congressional investigators to examine whether or not U.S. democracy promotion programs in Cuba were operated according to U.S. laws, among other issues. The resulting report, released by the Government Accountability Office in January 2013, does not examine whether or not the programs were covert. It does not say that any U.S. laws were broken.The GAO report does not specifically refer to ZunZuneo, but does note that USAID programs included "support for the development of independent social networking platforms."
  • "I know they said we were notified," Leahy told AP. "We were notified in the most oblique way, that nobody could understand it. I'm going to ask two basic questions: Why weren't we specifically told about this if you're asking us for money? And secondly, whose bright idea was this anyway?"The Republican chairman of a House oversight subcommittee said his panel will be looking into the project, too."That is not what USAID should be doing," said Rep. Jason Chaffetz, the Republican chairman of the House Oversight and Government Reform National Security Subcommittee. "USAID is flying the American flag and should be recognized around the globe as an honest broker of doing good. If they start participating in covert, subversive activities, the credibility of the United States is diminished."
  • At minimum, details uncovered by the AP appear to muddy the USAID's longstanding claims that it does not conduct covert actions, and the details could undermine the agency's mission to deliver aid to the world's poor and vulnerable — an effort that requires the trust and cooperation of foreign governments.Leahy and Rep. C.A. Dutch Ruppersberger, the top Democrat on the House Intelligence Committee, said they were unaware of ZunZuneo.
  • USAID and its contractors went to extensive lengths to conceal Washington's ties to the project, according to interviews and documents obtained by the AP. They set up front companies in Spain and the Cayman Islands to hide the money trail, and recruited CEOs without telling them they would be working on a U.S. taxpayer-funded project."There will be absolutely no mention of United States government involvement," according to a 2010 memo from Mobile Accord Inc., one of the project's creators. "This is absolutely crucial for the long-term success of the service and to ensure the success of the Mission."ZunZuneo was publicly launched shortly after the 2009 arrest in Cuba of American contractor Alan Gross. He was imprisoned after traveling repeatedly to the country on a separate, clandestine USAID mission to expand Internet access using sensitive technology that only governments use.The AP obtained more than 1,000 pages of documents about the ZunZuneo project's development. It independently verified the project's scope and details in the documents through publicly available databases, government sources and interviews with those involved.
  • The social media project began after Washington-based Creative Associates International obtained a half-million Cuban cellphone numbers. It was unclear to the AP how the numbers were obtained, although documents indicate they were done so illicitly from a key source inside the country's state-run provider. Project organizers used those numbers to start a subscriber base.ZunZuneo's organizers wanted the social network to grow slowly to avoid detection by the Cuban government. Eventually, documents and interviews reveal, they hoped the network would reach critical mass so that dissidents could organize "smart mobs" — mass gatherings called at a moment's notice — that could trigger political demonstrations, or "renegotiate the balance of power between the state and society."At a 2011 speech at George Washington University, Clinton said the U.S. helps people in "oppressive Internet environments get around filters." Noting Tunisia's role in the Arab Spring, she said people used technology to help "fuel a movement that led to revolutionary change."Suzanne Hall, then a State Department official working on Clinton's social media efforts, helped spearhead an attempt to get Twitter founder Jack Dorsey to take over the ZunZuneo project, documents indicate. Dorsey declined to comment.
  • The estimated $1.6 million spent on ZunZuneo was publicly earmarked for an unspecified project in Pakistan, public government data show, but those documents don't reveal where the funds were actually spent.ZunZuneo's organizers worked hard to create a network that looked like a legitimate business, including the creation of a companion website — and marketing campaign — so users could subscribe and send their own text messages to groups of their choice."Mock ad banners will give it the appearance of a commercial enterprise," one written proposal obtained by the AP said. Behind the scenes, ZunZuneo's computers were also storing and analyzing subscribers' messages and other demographic information, including gender, age, "receptiveness" and "political tendencies." USAID believed the demographics on dissent could help it target its other Cuba programs and "maximize our possibilities to extend our reach."
  • Executives set up a corporation in Spain and an operating company in the Cayman Islands — a well-known British offshore tax haven — to pay the company's bills so the "money trail will not trace back to America," a strategy memo said. Disclosure of that connection would have been a catastrophic blow, they concluded, because it would undermine the service's credibility with subscribers and get it shut down by the Cuban government.Similarly, subscribers' messages were funneled through two other countries — and never through American-based computer servers.Denver-based Mobile Accord considered at least a dozen candidates to head the European front company. One candidate, Francoise de Valera, told the AP she was told nothing about Cuba or U.S. involvement.
  • James Eberhard, Mobile Accord's CEO and a key player in the project's development, declined to comment. Creative Associates referred questions to USAID.For more than two years, ZunZuneo grew, reaching at least 40,000 subscribers. But documents reveal the team found evidence Cuban officials tried to trace the text messages and break into the ZunZuneo system. USAID told the AP that ZunZuneo stopped in September 2012 when a government grant ended.
  •  
    More coming related to this story.
4More

Israel cancels peace talks meeting after unity deal announced | Maan News Agency - 0 views

  • Israeli prime minister Benjamin Netanyahu cancelled a planned session of peace talks with Palestinian negotiators on Wednesday after news of a unity deal between the Palestine Liberation Organization and Hamas was announced."Israel has canceled a negotiations meeting that was expected to be held this evening," a statement released by the prime minister's office on Wednesday said, without further explanation, according to Reuters.The cancellation comes hours after top Palestinian political leaders from the Palestinian Liberation Organization and Hamas announced a reconciliation deal after more than seven years of political division.Israeli officials lambasted the deal, with economy minister and chairman of the "Jewish Home" party Naftali Bennett saying: "The Palestinian Authority has become the world's largest terror organization; we have entered a new political era in the Mideast," according to Israeli newspaper the Jerusalem Post.
  • Bennett added that just as the US does not talk with al-Qaeda, Israel should not negotiate with the Palestinian Authority, who he called "killers."The unity deal authorized the Palestinian president to set a date for new elections and signaled a potentially historic reconciliation between the two major Palestinian political factions, the Fatah-dominated Palestinian Authority in the West Bank and the Hamas-ruled government in the Gaza Strip.Earlier, Palestinian officials announced that they had agreed to form a unity government within five weeks that will be headed by either President Mahmoud Abbas or former Deputy Prime Minister of the 2006 unity government Nasser al-Din al-Shaer, who is a member of Hamas.The parties also agreed that both Hamas in Gaza and Fatah in the occupied West Bank would release prisoners detained for their political affiliation.
  • The unity deal comes amid a major impasse in ongoing US-backed peace talks between the Palestinian Authority and Israel, which were re-activated in July.Israel has announced plans to build thousands of settlement homes across the occupied West Bank since the start of talks, angering the Palestinians.In late March, meanwhile, Israel refused to release the final round of Palestinian veteran prisoners that it had promised to release as part of a trust-building measure, participating the current crisis.
  •  
    A true complication for the Obama Administration and Israeli government, if the Palestinian unity deal sticks. At Israel's urging, the U.S. formally designated Hamas as a Terrorist Organization™ shortly after it won a valid election to lead government in the Gaza Strip, imposing sanctions and criminal penalties on any person or legal entity that aids Hamas. With Gaza and the West Bank organized under a single government that includes Hamas, Obama may have to decide whether to end the Hamas terrorist designation or abandon attempts to broker a settlement of the Israel-Palestine question.  
2More

How Government and the Media Equate Political Dissent with "Conspiracy Theories" and "H... - 0 views

  • In this age of propaganda and disinformation when mainstream media outlets act as presstitutes for the corporatized federal government, there has been an overt movement in recent years to label dissenters, patriots, government critics and even returning US soldiers from the warfronts as potential homegrown terrorists. For decades the government and co-opted mainstream media’s onetime favorite tactic heavy-handedly used to customarily dismiss their critics was to simply label those exposing government deception as “conspiracy theorists.” However, with distrust mounting amongst Americans toward both their leaders (86% distrust government) and the media (over 60% little or no trust toward media), this strategy is no longer working because so many conspiracies have been proven to be real. With a fascist state worried that its authority is fast slipping away amongst its populace, today the stakes have never been higher. Slander, character assassination and guilt by association are increasingly utilized nowadays as favorite tools to systematically destroy, discredit and demonize those citizens courageous enough to speak the truth exposing government lies, deception, theft and destruction.
  • Raising the stakes from the relative benign label “conspiracy theorist” to “homegrown terrorist” reflects a parallel process the US government has historically employed in manufacturing convenient enemies as needed – Russia and China’s expanding Communism from the 1950’s cold war through the 1980’s, to al Qaeda’s expanding terrorism in the twenty-first century and now back to Russia and China’s expanding imperialism all over again. The vicious cycle locked by design in a forever do-loop as the same subversive strategy remains unchanged throughout the years, only the names and dates change as the government self-servingly sees fit. As long as there are enemy targets to conveniently blame designed to induce fear and elicit support from a dumbed down, brainwashed and powerless American public, war and the military security complex will continue to flourish on a perpetual permanency basis, of course at the expense of humanity both domestically and globally.
7More

Tomgram: Laura Gottesdiener, Security vs. Securities | TomDispatch - 0 views

  • I live in Washington, D.C.'s Capitol Hill neighborhood. I can more or less roll out of bed into the House of Representatives or the Senate; the majestic Library of Congress doubles as my local branch. (If you visit, spend a sunset on the steps of the library's Jefferson Building. Trust me.) You can't miss my place, three stories of brick painted Big Bird yellow. It's a charming little corner of the city. Each fall, the trees outside my window shake their leaves and carpet the street in gold. Nora Ephron, if she were alive, might've shot a scene for her latest movie in one of the lush green parks that bookend my block. The neighborhood wasn't always so nice. A few years back, during a reporting trip to China, I met an American consultant who had known Capitol Hill in a darker era. "I was driving up the street one time," he told me, "and walking in the opposite direction was this huge guy carrying an assault rifle. Broad daylight, no one even noticed. That's what kind of neighborhood it was." Nowadays, row houses around me sell for $1 million or more. I rent.
  • Washington's a fun place to live if you're young and employed. But as a recent Washington Post story pointed out, the nation's capital is slowly pricing out even its yuppies who, in their late-twenties and early-thirties, want to start families but can't afford it. "I hate to say it, but the facts show that the D.C. market is for people who are single and relatively affluent," a real estate researcher told the Post. The District's housing boom just won't stop; off go those new and expecting parents to the suburbs. And we're talking about the lucky ones. Elsewhere in the country, vulnerability in the housing market isn't a trend story; it's the norm. The Cedillo family, as Laura Gottesdiener writes today, went looking for their version of the American housing dream and thought they found it in Chandler, Arizona. They didn't know that the house they chose to rent rested on a shaky foundation -- not physically but financially. It had been one of thousands snapped up and rented out by massive investment firms making a killing in the wake of the housing collapse. As Gottesdiener -- who has put the new rental empires of private equity firms on the map for TomDispatch -- shows, the goal of such companies is to squeeze every dime of profit from their properties, from homes like the Cedillos', and that can lead to tragedy.
  • Drowning in Profits A Private Equity Firm, a Missing Pool Fence, and the Price of a Child’s Death By Laura Gottesdiener
  • ...4 more annotations...
  • Security is a slippery idea these days -- especially when it comes to homes and neighborhoods. Perhaps the most controversial development in America’s housing “recovery” is the role played by large private equity firms. In recent years, they have bought up more than 200,000 mostly foreclosed houses nationwide and turned them into rental empires. In the finance and real estate worlds, this development has won praise for helping to raise home values and creating a new financial product known as a “rental-backed security.” Many economists and housing advocates, however, have blasted this new model as a way for Wall Street to capitalize on an economic crisis by essentially pushing families out of their homes, then turning around and renting those houses back to them. Caught in the crosshairs are tens of thousands of families now living in these private equity-owned homes.
  • The same month that the family rented the house at 1471 West Camino Court, Progress Residential purchased more homes in Maricopa Country than any other institutional buyer. Nationally, Blackstone, a private equity giant, has been the leading purchaser of single-family homes, spending upwards of $8 billion between 2012 and 2014 to purchase 43,000 homes in about a dozen cities. However, in May 2013, according to Michael Orr, director of the Center for Real Estate Theory and Practice at the W. P. Carey School of Business at Arizona State University, Progress Residential bought nearly 200 houses, surpassing Blackstone's buying rate that month in the Phoenix area. The condition and code compliance of these houses varies and is rarely known at the time of the purchase. Mike Anderson, who works for a bidding service contracted by Progress Residential and other private equity giants to buy houses at auctions, was sometimes asked to go out and look at the homes. But with the staggering buying rate -- up to 15 houses a day at the peak -- he couldn’t keep up. “There’d be too many, you couldn’t go out and look at them,” he said. “It’s just a gamble. You never know what you’ve got into.”
  • Global private equity firms have not been, historically, in the business of dealing with pool fences and the other hassles of maintaining single-family houses. But following the housing market collapse, the idea of buying a ton of these foreclosed properties suddenly made sense, at least to investors. Such private-equity purchases were to make money in three ways: buying cheap and waiting for the houses to gain value as the market bounced back; renting them out and collecting monthly rental payments; and promoting a financial product known as “rental-backed securities,” similar to the infamous mortgage-backed securities that triggered the housing meltdown of 2007-2008. Even though the buying of the private equity firms has finally slowed, economists (including those at the Federal Reserve) have expressed concern about the possibility that someday those rental-backed securities could even destabilize -- translation: crash -- the broader market.
  • ince Wall Street was overwhelmingly responsible for the original collapse of the housing market, many have characterized these new purchases as a land grab. In many ways, Progress CEO Donald Mullen is the poster-child for this argument. An investment banker who enjoyed a brief flurry of fame after losing a bidding war to Alec Baldwin at an art auction, he was the leader of a team at Goldman Sachs that orchestrated an infamous bet against the housing market. Known as “the big short,” it allowed that company to make “some serious money“ when the economy melted down, according to Mullen’s own emails. (They were released by the Senate Permanent Subcommittee on Investigations in 2010.) As Kevin Roose of New York magazine has written, “A guy whose most famous trade was a successful bet on the full-scale implosion of the housing market is now swooping in to pick up the pieces on the other end.”
5More

Former PM Ehud Olmert jailed for six years for corruption - Israel News, Ynetnews - 0 views

  • Former Prime Minister Ehud Olmert was sentenced to six years in prison and fined NIS 1 million in court in Tel Aviv on Tuesday morning for his role in the 'Holyland Affair', the real estate corruption case considered the largest of its kind in Israeli history.
  • The case marks the first time a prime minister was convicted of a felony and now, with his sentencing, the first time a former prime minister has ever been sentenced to jail time.
  • Additional sentencing included Hillel Cherney, who was the developer behind the Holyland project and was sentenced to 3.5 years in prison and fined NIS 2 million. Cherney was convicted of 19 offences of corruption and a slew of additional corruption and break of trust offences.   Danny Dankner, the former chairman of Israel's second-biggest bank, also received three years in jail during Tuesday's senctencing. Dankner, who is now the joint chairman of Israel Salt Industries, was also fined a million and half shekel.   Avigdor Kelner, also a developer in the project, who was convicted of two corruption charge in the affair, was sentenced to three years and fined NIS 1 million.   Former Jerusalem Mayor Uri Lupolianski, who succeeded Olmert as the city's mayor, and Dankner, were both charged and convicted of offering hundreds of thousands of dollars in bribes to a government official to rezone land for the project.
  • ...1 more annotation...
  • Ehud Olmert was also accused of asking the middleman to help out city engineer Uri Sheetrit, who also had money woes. Sheetrit later dropped his opposition to the broad expansion of the Holyland complex, which burgeoned from a small development into a massive, high-rise project that sticks out from its low-rise neighbors. According to the indictment, Sheetrit received hundreds of thousands of dollars in bribes.   Among those also sentenced on Tuesday was Sheetrit, who was sent to prison for seven years.
  •  
    Notice that the former CEO of Israel's second-largest bank was among those convicted and sentenced to prison. So Israel joins Iceland in the exclusive club of nations willing to slap banksters with prison sentences, unless the sentence is overturned on appeal. 
5More

Keith Alexander Unplugged: on Bush/Obama, 1.7 million stolen documents and other matter... - 0 views

  • The just-retired long-time NSA chief, Gen. Keith Alexander, recently traveled to Australia to give a remarkably long and wide-ranging interview with an extremely sycophantic “interviewer” with The Australian Financial Review. The resulting 17,000-word transcript and accompanying article form a model of uncritical stenography journalism, but Alexander clearly chose to do this because he is angry, resentful, and feeling unfairly treated, and the result is a pile of quotes that are worth examining, only a few of which are noted below:
  • How Edward Snowden managed to steal an alleged 1.7 million documents from the NSA. Sunday: http://t.co/gbrIu5yMcc — 60 Minutes (@60Minutes) December 13, 2013 Mike McConnell, the vice chairman of Booz Allen and former Director of National Intelligence in the Bush administration, then claimed that ”Snowden absconded with 1.7 million to 1.8 million documents.” Ever since then, that Snowden “stole” 1.7 or 1.8 million documents from the NSA has been repeated over and over again by US media outlets as verified fact. The Washington Post‘s Walter Pincus, citing an anonymous official source, purported to tell readers that “among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports”. Reuters frequently includes in its reports the unchallenged assertion that “Snowden was believed to have taken 1.7 million computerized documents.” Just this week, the global news agency told its readers that “Snowden was believed to have taken 1.7 million computerized documents.”
  • AFR: Can you now quantify the number of documents [Snowden] stole? Gen. Alexander: Well, I don’t think anybody really knows what he actually took with him, because the way he did it, we don’t have an accurate way of counting. What we do have an accurate way of counting is what he touched, what he may have downloaded, and that was more than a million documents. It’s hard to recall a better and clearer example of how mindless and uncritical the American media is when it comes to the unproven pronouncements of the U.S. Government. Back in December, 60 Minutes broadcast a now-notorious segment of pure access journalism in which they gullibly disseminated one false NSA claim after the next in exchange for being given exclusive(!) access to a few Secret and Exciting Rooms inside the agency’s headquarters. The program claimed that Snowden “is believed to still have access to 1.5 million classified documents he has not leaked”. On its Twitter account, 60 Minutes made this claim to promote its show:
  • ...2 more annotations...
  • In fact, that number is and always has been a pure fabrication, as even Keith Alexander admits. The claimed number has changed more times than one can count: always magically morphing into randomly chosen higher and scarier numbers. The reality, in the words of the General, is that the US Government ”really [doesn't] know[] what he actually took with him” and they ”don’t have an accurate way of counting”. All they know is how many documents he accessed in his entire career at NSA, which is a radically different question from how many documents he took. But that hasn’t stopped American media outlets from repeatedly affirming the inflammatory evidence-free claim that Snowden took 1.7 million documents. As usual, even the most blatantly unreliable claims from National Security State officials are treated as infallible papal pronouncements by our Adversarial Watchdog Press. There’s an equally vital point made by Alexander’s admission. The primary defense of the NSA and its defenders is that one need not worry about the staggering sums of data they collect because they have implemented very rigorous oversight mechanisms and controls that prevent abuse. Yet Edward Snowden spent months downloading a large amount of highly sensitive documents right under their noses. And not only did they have no idea that he was doing it, but now – even after spending large sums of money to find out – they are still completely incapable of learning which documents he took or even how many he took. Does that at all sound like a well-managed, tightly controlled system that you can trust to safeguard your most personal data and to detect and prevent abuse of this system by the tens of thousands of people who have access to it?
  • The release date for my book on the NSA, privacy, and our reporting of the surveillance story, No Place to Hide, is next Tuesday, May 13, at which time all of the previously unpublished NSA documents that are reported on in the book will be placed online, with free access, at the book’s website.
6More

Glenn Greenwald: how the NSA tampers with US-made internet routers | World news | The G... - 0 views

  • The NSA has been covertly implanting interception tools in US servers heading overseas – even though the US government has warned against using Chinese technology for the same reasons, says Glenn Greenwald, in an extract from his new book about the Snowden affair, No Place to Hide
  • For years, the US government loudly warned the world that Chinese routers and other internet devices pose a "threat" because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA's documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.
  • The Rogers committee voiced fears that the two companies were enabling Chinese state surveillance, although it acknowledged that it had obtained no actual evidence that the firms had implanted their routers and other systems with surveillance devices. Nonetheless, it cited the failure of those companies to cooperate and urged US firms to avoid purchasing their products
  • ...3 more annotations...
  • The constant accusations became such a burden that Ren Zhengfei, the 69-year-old founder and CEO of Huawei, announced in November 2013 that the company was abandoning the US market. As Foreign Policy reported, Zhengfei told a French newspaper: "'If Huawei gets in the middle of US-China relations,' and causes problems, 'it's not worth it'."
  • But while American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organisations would have been well advised to beware of American-made ones. A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)".Eventually, the implanted device connects back to the NSA. The report continues: "In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network."
  • Warning the world about Chinese surveillance could have been one of the motives behind the US government's claims that Chinese devices cannot be trusted. But an equally important motive seems to have been preventing Chinese devices from supplanting American-made ones, which would have limited the NSA's own reach. In other words, Chinese routers and servers represent not only economic competition but also surveillance competition.
8More

Edward Snowden, a year on: reformers frustrated as NSA preserves its power | World news... - 1 views

  • For two weeks in May, it looked as though privacy advocates had scored a tenuous victory against the widespread surveillance practices exposed by Edward Snowden a year ago. Then came a resurgent intelligence community, armed with pens, and dry, legislative language.During several protracted sessions in secure rooms in the Capitol, intelligence veterans, often backed by the congressional leadership, sparred with House aides to abridge privacy and transparency provisions contained in the first bill rolling back National Security Agency spying powers in more than three decades. The revisions took place in secret after two congressional committees had passed the bill. The NSA and its allies took creative advantage of a twilight legislative period permitting technical or cosmetic language changes.The episode shows the lengths to which the architects and advocates of bulk surveillance have gone to preserve their authorities in the time since the Guardian, 12 months ago today, began disclosing the scope of NSA data collection. That resistance to change, aided by the power and trust enjoyed by the NSA on Capitol Hill, helps explain why most NSA powers remain intact a year after the largest leak in the agency's histo
  • But exactly one year on, the NSA’s greatest wound so far has been its PR difficulties. The agency, under public pressure, has divested itself of exactly one activity, the bulk collection of US phone data. Yet while the NSA will not itself continue to gather the data directly, the major post-Snowden legislative fix grants the agency wide berth in accessing and searching large volumes of phone records, and even wider latitude in collecting other kinds of data.There are no other mandated reforms.
  • Some NSA critics look to the courts for a fuller tally of their victories in the wake of the Snowden disclosures. Judges have begun to permit defendants to see evidence gathered against them that had its origins in NSA email or call intercepts, which could disrupt prosecutions or invalidate convictions. At least one such defendant, in Colorado, is seeking the exclusion of such evidence, arguing that its use in court is illegal.Still other cases challenging the surveillance efforts have gotten beyond the government’s longtime insistence that accusers cannot prove they were spied upon, as the Snowden trove demonstrated a dragnet that presumptively touched every American’s phone records. This week, an Idaho federal judge implored the supreme court to settle the question of the bulk surveillance's constitutionality."The litigation now is about the merits. It’s about the lawfulness of the surveillance program," said Jameel Jaffer, the ACLU’s deputy legal director.
  • ...4 more annotations...
  • The Freedom Act ultimately sped to passage in the House on May 22 by a bipartisan 303-121 vote. NSA advocates who had blasted its earlier version as hazardous to national security dropped their objections – largely because they had no more reason.Accordingly, the compromise language caused civil libertarians and technology groups not just to abandon the Freedom Act that they had long championed, but to question whether it actually banned bulk data collection. The government could acquire call-records data up to two degrees of separation from any "reasonable articulable suspicion" of wrongdoing, potentially representing hundreds or thousands of people on a single judicial order." That was not all.
  • "As the bill stands today, it could still permit the collection of email records from everyone who uses a particular email service," warned a Google legislative action alert after the bill passed the House. In a recent statement, cloud-storage firm Tresorit lamented that "there still has been no real progress in achieving truly effective security for consumer and corporate information."No one familiar with the negotiations alleges the NSA or its allies broke the law by amending the bill during the technical-fix period. But it is unusual for substantive changes to be introduced secretly after a bill has cleared committee and before its open debate by the full Senate or House."It is not out of order, but major changes in substance are rare, and appropriately so," said Norman Ornstein, an expert on congressional procedure at the American Enterprise Institute.Steve Aftergood, an intelligence policy analyst at the Federation of American Scientists, said the rewrites to the bill were an "invitation to cynicism."
  • "There does seem to be a sort of gamesmanship to it. Why go through all the troubling of crafting legislation, enlisting support and co-sponsorship, and adopting compromises if the bill is just going to be rewritten behind closed doors anyway?" Aftergood said.
  • Civil libertarians and activists now hope to strengthen the bill in the Senate. Its chief sponsor, Patrick Leahy of Vermont, vowed to take it up this month, and to push for "meaningful reforms" he said he was "disappointed" the House excluded. Obama administration officials will testify in the Senate intelligence committee about the bill on Thursday afternoon, the first anniversary of the Guardian's disclosure of bulk domestic phone records collection. That same day, Reddit, Imgur and other large websites will stage an online "Reset The Net" protest of NSA bulk surveillance.But the way the bill "morphed behind the scenes," as Lofgren put it, points to the obstacles such efforts face. It also points to a continuing opportunity for the NSA to say that Congress has actually blessed widespread data collection – a claim made after the Snowden leaks, despite most members of Congress and the public not knowing that NSA and the Fisa court secretly reinterpreted the Patriot Act in order to collect all US phone records.
  •  
    Good Guardian article on how the American Freedom Act as reported out of House committees was gutted in secret meetings between key representatives and NSA (and other Executive Branch) officials. The House of Representatives kisses the feet of Dark Government. 
7More

David Davis' devastating attack on our loss of privacy | Mail Online - 0 views

  • The last time the main parties got together in a closed room, did a deal and told the country there was a need to act urgently, we were on the edge of abandoning 300 years of press freedom.This time our privacy is under threat. In the name of security, the Government is fast-tracking legislation through Parliament that will allow it to collect huge quantities of our personal data. We would do well to remember the advice of Ben Franklin: ‘Those who would give up essential liberty, to purchase a little temporary safety, deserve neither liberty nor safety.’
  • The Government has engineered a ‘theatrical emergency’ – in this case terrorism and hidden paedophile rings – to ram the Data Retention and Investigatory Powers Bill through Parliament without proper debate. It is an insult to the supremacy of Parliament, to democracy and to the trust of the public.It was April 8 when the European Court of Justice struck down the Data Retention Directive for being incompatible with human rights. The Home Office has had time to put an alternative in place, so the excuses for why the legislation is being  fast-tracked are laughable.
  • It is a sad state of affairs when European courts are a greater defender of our ancient rights than Parliament and Her Majesty’s Government. Even the German Supreme Court overturned its far less invasive data collection laws for violating the privacy rights of German citizens. How far we have slipped, this birthplace of democracy, that our own judicial safeguards stand by while our hard-fought rights are stripped from us by a Government that has lost its sense of proportion in its fear of making a mistake.
  • ...3 more annotations...
  • Even the statistics already released are cause for concern.  The 2013 report of the Interception of Communications Commissioner revealed that 514,608 requests were made for data. By comparison, the most requests issued by the FBI in a year is 56,507. How can it be our intelligence agencies made nine times the number of requests for communications data than their US counterparts?
  • After the ‘dodgy dossier’ on weapons of mass destruction, the deceit on rendition and torture, and the debacle over the snooper’s charter, it is hard to be confident.Our Government has claimed that intercepted communications data was the critical evidence in 95 per cent of all serious crime cases. This would seem to go against the experience of the Metropolitan Police, which in evidence to a joint committee stated that ‘communications data is used sparingly, because it is costly and resource intensive, and because of the need to… consider the impact of collateral intrusion on innocent people’.
  • What this Government is chasing is not public security, it is protection from blame if anything goes wrong. Those are not the same thing.One person’s loss of freedom is everybody’s loss of freedom, one person’s loss of privacy is everybody’s loss of privacy. We must stand up for our rights and not succumb to the politics of fear. Otherwise we give those who hate our civilisation an easy victory, without a shot being fired.
  •  
    A UK M.P. critiques the full court press in the House of Commons for new legislation attempting to work around the EU Court of Justice ruling on electronic communication data retention laws.  Very nice essay.
7More

The 28 Pages and the War on Terror: Is Congress in a State of Willful Ignorance? | 28 P... - 0 views

  • Today more than ever, Americans are struggling to unravel the Gordian knot of overt and covert alliances that comprise the Middle East’s geostrategic landscape. As they do, politicians and pundits constantly remind them that reaching the correct conclusions about the region is imperative if we are to thwart the menace of terrorism and prevent the next 9/11.
  • On January 8th of this year, by way of a “Dear Colleague” letter, Jones and Massachusetts Congressman Stephen Lynch urged every one of their fellow House representatives to read the 28 pages for themselves. Among those who heeded their call was Rep. Massie. At a March 11 press conference in which he joined Jones and Lynch in imploring peers to examine the redacted finding, Massie offered a striking description of his reaction to the revelations within the 28 pages, saying: “It was a really disturbing event for me to read those. I had to stop every two or three pages and rearrange my perception of history. And it’s that fundamental…it certainly changes your view of the Middle East.”
  • For everyday Americans, ignorance about what lies within the 28 pages is imposed; for apparently far too many in Congress, that ignorance is willful. You see—unlike the citizens they represent—when it comes to reading or not reading the 28 pages, legislators enjoy the luxury of a choice: After securing permission through their respective intelligence committee, representatives and senators can venture into a guarded, soundproof room at the Capitol and read the classified findings on foreign government assistance to the 9/11 hijackers in their entirety. Astonishingly—given what’s at stake for the country and for the lives of servicemembers and civilians alike—there are indications only a slim minority have bothered to do so. Rep. Walter Jones North Carolina’s Walter Jones is one congressman who did take the initiative to learn what lies in the 28 pages. Later, he said, “I was absolutely shocked by what I read. What was so surprising was that those whom we thought we could trust really disappointed me.” He added, “The information is critical to our foreign policy moving forward and should thus be available to the American people.”
  • ...4 more annotations...
  • As if a thicket of misinformation, hit-and-miss journalism and competing propaganda didn’t make the challenge daunting enough, the American people face an even more formidable barrier in their attempts to reach informed and rational conclusions about U.S. policy in the Middle East: the classification of a 28-page finding on foreign government support of the 9/11 hijackers—classification that continues over the objections of the chairman and vice-chairman of the 9/11 Commission and the former senator who co-chaired the inquiry that produced the 28 pages. Preventing a hypothetical “next 9/11″ starts with a clear understanding of what enabled the actual one—yet, even as the U.S. military prepares for the next chapter in the seemingly perpetual War on Terror, Americans continue to be denied critical knowledge about how the September 11 attacks were planned and funded. Reflecting on that disconnect, Kentucky Congressman Thomas Massie recently told Slate, “Until we know what enabled or caused 9/11, we shouldn’t be talking about starting a third war to prevent another 9/11.”
  • in what could well emerge as a national security scandal that engulfs much of Congress, there are indications that, when it comes to acquiring essential knowledge to shape policies that safeguard the country, a majority of legislators have thus far made a conscious decision to remain ignorant: As of this writing, 13 of the House’s 432 representatives have joined as cosponsors of a Jones-authored resolution urging the president to declassify the 28 pages. A source on the Hill who is familiar with the declassification effort is personally unaware of any representative who has read the 28 pages over the last several months who didn’t emerge from the experience as a supporter of declassification. When you overlay one of those observations on the other, the result points to a woefully low level of interest among the nation’s legislators in learning what “shocking,” “surprising” and “history-rearranging” facts are contained in the classified passage.
  • Those indications paint a bleak—albeit, tentative—portrait of Congressional diligence in overseeing national security policy. What’s needed now is a precise, name-by-name accounting of which representatives and senators have read the 28 pages and which have not. To that end, 28Pages.org urges constituents, journalists and transparency advocacy organizations to help bring accountability to this essential issue of national security job performance by contacting legislators and asking them two simple, yes-or-no questions: Have you read the 28 pages? If not, have you asked permission from your intelligence committee to do so? Shortly, 28Pages.org will announce its own contribution to this national exercise in Congressional accountability. However, a thorough accounting will only be achieved with the participation of citizens, journalists and transparency advocates. And with every House and 36 Senate seats up for election on Nov. 4, the faster the country collectively assembles a name-by-name roster of 28-pages readership on the Hill, the better position voters will be in to evaluate incumbents using this potent indicator of their attentiveness to matters of national security.
  • We provide a wealth of resources to help citizens do their part, and journalists are encouraged to contact us for insights on this issue.
1More

Hayek: Cryptocurrency backed by gold - Business Insider - 0 views

  • There's a new cryptocurrency coming to the market.  What makes it unique to existing cryptocurrencies like Bitcoin? It's backed by gold. Anthem Vault, the metals and technology company, will launch the coin on May 25.  The coin will "be valued at 1 gram of gold at the day's market price, [and] will serve as a more secure store of value than Bitcoin," according to the press release. It will be called the Hayek, "after the Nobel-winning Austrian economist Friedrich Hayek."  Anthem Blanchard, the CEO of Anthem Vault, told Business Insider that "gold is arguably the most trusted store of value of all time," which is why he chose it to back his new cryptocurrency.
3More

Washington's Blog - Business, Investing, Economy, Politics, World News, Energy, Environ... - 0 views

  • A poll released today shows that Americans across the political spectrum hate the Patriot Act and NSA spying. The bipartisan polling team – made up of Global Strategy Group and G Public Strategies – found (edited for readability): By nearly a 2:1 margin (60% modify, 34% preserve), Americans believe the Patriot Act should not be reauthorized in its current form. With broad, bipartisan support across all ages, ideologies and political parties, voters are rejecting the argument that the Patriot Act should be preserved with no changes because of potential terrorist threats. Millennials (65% modify) and Independent men (75% modify), in particular, are driving the push for modification to limit government surveillance. By more than 4:1 (82% concerned, 18% not concerned), voters find it concerning that the United States government is collecting and storing the personal information of Americans, including 31% who are extremely concerned and 25% who are very concerned.
  • Over three quarters of voters found four different examples of government spying personally concerning to them. The government accessing personal communications, information or records without a judge’s permission (83%) and using that information for things other than stopping terrorist attacks (83%) were the two most concerning examples to voters. Specific arguments made in favor of adding more protections for Americans around privacy, also proved to be convincing to voters. 84% of voters said it was a convincing argument that local police and the FBI should have a warrant to search phone and email records, further confirming that Americans believe that individual privacy rights should be more strongly protected. Additionally, 81% of voters were convinced more protections were needed on account of companies providing loopholes in their services to make surveillance easier for the government.
  • This jibes with previous polls showing that Americans: Value privacy over anti-terror protections Don’t believe the NSA And are now more afraid of our own government than terrorists
3More

POGO Adds its Voice to Calls for Secret Law Oversight - 0 views

  • April 21, 2015 Dear Chairman Goodlatte, Ranking Member Conyers, Chairman Grassley, and Ranking Member Leahy: We urge you to end mass surveillance of Americans. Among us are civil liberties organizations from across the political spectrum that speak for millions of people, businesses, whistleblowers, and experts. The impending expiration of three USA PATRIOT Act provisions on June 1 is a golden opportunity to end mass surveillance and enact additional reforms. Current surveillance practices are virtually limitless. They are unnecessary, counterproductive, and costly. They undermine our economy and the public’s trust in government. And they undercut the proper functioning of government. Meaningful surveillance reform entails congressional repeal of laws and protocols the Executive secretly interprets to permit current mass surveillance practices. Additionally, it requires Congress to appreciably increase transparency, oversight, and accountability of intelligence agencies, especially those that have acted unconstitutionally.
  • A majority of the House of Representatives already has voted against mass surveillance. The Massie-Lofgren amendment to the National Defense Authorization Act [i] garnered 293 votes in support of defunding “backdoor searches.” Unfortunately, that amendment was not included in the “CRomnibus"[ii] despite overwhelming support.  We urge you to act once again to vindicate our fundamental liberties.
  •  
    Finally! A proposal for mass-surveillance reform that goes far beyond prior overly-modest proposals backed by ACLU, Electronic Frontier Foundation, etc., that were based on negotiation with members of Congress. This proposal is backed by a wide range of other organizations. A must-read.
3More

Study: Surveillance will cost US tech sector more than $35B by 2016 | TheHill - 0 views

  • A new study says that the U.S. tech industry is likely to lose more than $35 billion from foreign customers by 2016 because of concerns over government surveillance.“In short, foreign customers are shunning U.S. companies,” the authors of a new study from the Information Technology and Innovation Foundation write.ADVERTISEMENT“The U.S. government’s failure to reform many of the NSA’s surveillance programs has damaged the competitiveness of the U.S. tech sector and cost it a portion of the global market share,” they said.The think tank’s report found that the cost to the tech sector associated with ongoing concerns over surveillance programs run out of the U.S. was likely to “far exceed” $35 billion by 2016, an earlier estimate set by the group.
  • The group said that lawmakers must enact additional reforms to surveillance policy if they wish to help the tech sector regain the trust of foreign customers. That includes opposing “backdoors,” which allow law enforcement to access otherwise encrypted data, and signing off on trade agreements, including the controversial Trans-Pacific Partnership, that “ban digital protectionism.”The study’s authors found that the revelations about broad U.S. surveillance programs acted as a justification for foreign policymakers to enact protectionist policies aimed at aiding their own domestic technology sectors.Foreign companies have also used the information about U.S. surveillance programs to their advantage.“Some European companies have begun to highlight where their digital services are hosted as an alternative to U.S. companies,” the authors write.
  • American companies, they found, have lost contracts to foreign competitors over fears about mass surveillance.Earlier this month, President Obama signed the USA Freedom Act, a bill that reformed the three Patriot Act provisions that authorized the bulk, warrantless collection of Americans’ phone records. The bill was widely supported by technology companies, including giants like Apple and Google.
8More

John Kerry admits: some US surveillance has gone too far | World news | theguardian.com - 0 views

  • John Kerry, the US secretary of state, conceded on Thursday that some of the country's surveillance activities had gone too far, saying that certain practices had occurred "on autopilot" without the knowledge of senior officials in the Obama administration.In the most stark comments yet by a senior administration official, Kerry promised that a previously announced review of surveillance practices would be thorough and that some activities would end altogether."The president and I have learned of some things that have been happening in many ways on an automatic pilot, because the technology is there and the ability is there," he told a conference in London via video link."In some cases, some of these actions have reached too far and we are going to try to make sure it doesn't happen in the future."
  • In recent days, the Obama administration has put some distance between it and the National Security Agency (NSA). Kerry's comments are a reflection in particular of a concern about the diplomatic fallout from the revelation that the US monitored the cellphone of the German chancellor, Angela Merkel.The tactic has irritated senior intelligence officials. On Thursday evening, the director of the NSA, General Keith Alexander, blamed US diplomats for requests to place foreign leaders under surveillance.During a pointed exchange with a former US ambassador to Romania, James Carew Rosapepe, Alexander said: "We, the intelligence agencies, don't come up with the requirements. The policy-makers come up with the requirements."He added: "One of those groups would have been, let me think, hold on, oh: ambassadors."
  • Alexander said that the NSA collected information when it was asked by policy officials to discover the "leadership intentions" of foreign countries. "If you want to know leadership intentions, these are the issues," he said at a discussion hosted by the Baltimore Council on Foreign Relations.Earlier in Washington, the debate continued about whether further legal constraints should be placed on the NSA. The Senate intelligence committee approved a bill that placed largely cosmetic restrictions on the National Security Agency's domestic surveillance programme.The bill, sponsored by committee chairwoman Dianne Feinstein, a California Democrat, allows the NSA continue to collect phone metadata of millions of Americans for renewable 90-day periods, but orders it to be more transparent about the practice.
  • ...4 more annotations...
  • The bill, which is competing with more restrictive measures from other committees, now moves forward to a full Senate vote. The stage is now set for a showdown with the USA Freedom Act, a bipartisan bill that would prohibit bulk collection of Americans' telephone records.Senator Mark Udall, a Democratic member of the Senate intelligence committee and a supporter of NSA reform, said it did not go far enough."The NSA's invasive surveillance of Americans' private information does not respect our constitutional values and needs fundamental reform, not incidental changes," he said.
  • In a separate development on Thursday, a group of technology giants called for substantial reforms to the US government's surveillance programmes. The companies were furious about revelations this week – the latest to emerge from documents leaked by the former NSA contractor Edward Snowden – that the agency had intercepted the cables that link the worldwide data centres belonging to Google and Yahoo.It was also reported that Obama had ordered the NSA to stop eavesdropping on the headquarters of the International Monetary Fund (IMF) and World Bank. Reuters cited a US official as saying the president had ordered the halt in the past few weeks.The NSA's surveillance of the IMF and World Bank has not previously been disclosed.
  • In response to Reuters inquiries, a senior Obama administration official said, "The United States is not conducting electronic surveillance targeting the headquarters of the World Bank or IMF in Washington." The Obama administration official, who spoke on condition of anonymity, did not address whether the NSA had eavesdropped on the two entities in the past.Kerry, in his comments to a conference organised by the Open Government Partnership, acknowledged that trust needed to be restored. "There is an effort to try to gather information, yes, in same cases inappropriately, and the president is now doing a thorough review, in order that nobody will have a sense of abuse," he said.Despte the cracks between the administration and the spy community, Kerry was careful to defended the motives of US intelligence agencies, insisting no "innocent people" were being abused and saying surveillance by several countries had prevented many terrorist plots.
  • A German MP said he met Snowden in Moscow on Thursday, and said the NSA whistelblower was prepared in principle to help Germany investigate allegations of surveillance by US intelligence.Hans-Christian Stroebele, a lawmaker with Germany's opposition Greens and a prominent critic of the NSA's alleged actions, told ARD television that Snowden "made clear he knows a great deal."He said Snowden would be prepared to travel to Germany and testify, "but the circumstances would have to be cleared up".
  •  
    Looks like maybe Snowden is now a hero in Germany and may be allowed to travel there. Meanwhile, the Obama Administration rats continue to desert the sinking NSA ship, but Diane Feinstein fights on to preserve mass surveillance. 
9More

Poems - The Old Issue : Rudyard Kipling - 1 views

  • Ancient Right unnoticed as the breath we draw— Leave to live by no man’s leave, underneath the Law. Lance and torch and tumult, steel and grey-goose wing Wrenched it, inch and ell and all, slowly from the King. Till our fathers ’stablished, after bloody years, How our King is one with us, first among his peers. So they bought us freedom—not at little cost Wherefore must we watch the King, lest our gain be lost,
  • (Time himself is witness, till the battle joins, Deeper strikes the rottenness in the people’s loins.)
  • Give no heed to bondsmen masking war with peace. Suffer not the old King here or overseas.
  • ...5 more annotations...
  • They that beg us barter—wait his yielding mood— Pledge the years we hold in trust—pawn our brother’s blood—
  • He shall mark our goings, question whence we came, Set his guards about us, as in Freedom’s name.
  • He shall peep and mutter; and the night shall bring Watchers ’neath our window, lest we mock the King—
  • Hate and all division; hosts of hurrying spies; Money poured in secret, carrion breeding flies.
  • Step by step, and word by word: who is ruled may read. Suffer not the old Kings: for we know the breed— All the right they promise—all the wrong they bring. Stewards of the Judgment, suffer not this King!
  •  
    Ode to the NSA!  Hat tip to Marbux for this awesome digg.  Kipling wrote this at the outbreak of the Boer War.  Like the War on Terror, the circumstance and patriotic fervor of citizens demanding safety and security becomes occasion for the government to seize and stomp liberty. There are some really beautiful lines here.
« First ‹ Previous 201 - 220 of 295 Next › Last »
Showing 20 items per page