Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "adds" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
4More

WASHINGTON: Citing redactions, Feinstein delays release of report on CIA interrogations... - 0 views

  • The Obama administration censored significant portions of the findings of an investigation into the CIA’s use of harsh interrogation methods on suspected terrorists, forcing the chairwoman of the Senate Intelligence Committee to delay their release “until further notice.”The postponement late Friday added to serious frictions over the investigation between the administration and lawmakers, who have been pressing for the swiftest, most extensive publication of the findings on one of darkest chapters in the CIA’s 65-year history.Feinstein announced the delay only hours after the White House returned the document to her after it completed its declassification review
  • “A preliminary review of the report indicates that there have been significant redactions. We need additional time to understand the basis for these redactions and determine their justification,” Sen. Dianne Feinstein, D-Calif., said in a statement.Sen. Mark Udall, D-Colo., a member of the committee who’s been fiercely critical of the CIA interrogation program, also decried the blackouts, saying President Barack Obama had pledged to ensure a release of the findings.“I am concerned about the excessive redactions Chairman Feinstein referenced in her statement, especially given the president’s unequivocal commitment to declassifying the Senate Intelligence Committee’s study,” Udall said. “I promised earlier this year to hold the president to his word and I intend to do so.”Udall vowed to work with Feinstein to declassify the findings “to the fullest extent possible, correct the record on the CIA’s brutal and ineffective detention and interrogation program, and ensure the CIA learns from its past mistakes.”
  • Reacting to Feinstein’s announcement, Director of National Intelligence James Clapper said that more than 85 percent of the report had been declassified and half of the redactions were in footnotes. “The redactions were the result of an extensive and unprecedented inter-agency process, headed up by my office, to protect sensitive classified information,” Clapper said in a statement. “We are confident that the declassified document delivered to the committee will provide the public with a full view of the committee’s report on the detention and interrogation program, and we look forward to a constructive dialogue with the committee.”
  •  
    The Great CIA Torture Cover-up Continues, now in its 12th year. And even the summary of the Senate report, sanitized by the Senate Intelligence Committee for complete public release, now gets axed by CIA. Our great-great-grandchildren might even get to read the full report, long after everyone involved in these war crimes has died.  
4More

ISPs take GCHQ to court in UK over mass surveillance | World news | theguardian.com - 0 views

  • Internet service providers from around the world are lodging formal complaints against the UK government's monitoring service, GCHQ, alleging that it uses "malicious software" to break into their networks.The claims from seven organisations based in six countries – the UK, Netherlands, US, South Korea, Germany and Zimbabwe – will add to international pressure on the British government following Edward Snowden's revelations about mass surveillance of the internet by UK and US intelligence agencies.The claims are being filed with the investigatory powers tribunal (IPT), the court in London that assesses complaints about the agencies' activities and misuse of surveillance by government organisations. Most of its hearings are held at least partially in secret.
  • The IPT is already considering a number of related submissions. Later this month it will investigate complaints by human rights groups about the way social media sites have been targeted by GCHQ.The government has defended the security services, pointing out that online searches are often routed overseas and those deemed "external communications" can be monitored without the need for an individual warrant. Critics say that such a legal interpretation sidesteps the need for traditional intercept safeguards.The latest claim is against both GCHQ, located near Cheltenham, and the Foreign Office. It is based on articles published earlier this year in the German magazine Der Spiegel. That report alleged that GCHQ had carried out an attack, codenamed Operation Socialist, on the Belgian telecoms group, Belgacom, targeting individual employees with "malware (malicious software)".One of the techniques was a "man in the middle" attack, which, according to the documents filed at the IPT, bypasses modern encryption software and "operates by interposing the attacker [GCHQ] between two computers that believe that they are securely communicating with each other. In fact, each is communicating with GCHQ, who collect the communications, as well as relaying them in the hope that the interference will be undetected."The complaint alleges that the attacks were a breach of the Computer Misuse Act 1990 and an interference with the privacy rights of the employees under the European convention of human rights.
  • The organisations targeted, the submission states, were all "responsible and professional internet service providers". The claimants are: GreenNet Ltd, based in the UK, Riseup Networks in Seattle, Mango Email Service in Zimbabwe, Jinbonet in South Korea, Greenhost in the Netherlands, May First/People Link in New York and the Chaos Computer Club in Hamburg.
  • ...1 more annotation...
  • Among the programs said to have been operating were Turbine, which automates the injection of data and can infect millions of machines and Warrior Pride, which enables microphones on iPhones and Android devices to be remotely activated.
4More

How Russia and Germany may save Europe from war - RT Op-Edge - 0 views

  • Washington/Wall Street elites are now deep into nuclear war paranoia. A few studies at least hint at the obvious; glaring US strategic weakness. Consider some of the basics: - Russian ICBMs armed with MIRVs travel at about 18 Mach; that is way faster than anything in the US arsenal. And basically they are unbeatable. - The S-400 and S-500 double trouble; Moscow has agreed to sell the S-400 surface-to-air missile system to China; the bottom line is this will make Beijing impermeable to US air power, ICBMs and cruise missiles. Russia, for its part, is already focusing on the state of the art S-500 – which essentially makes the Patriot anti-missile system look like a V-2 from WWII. - The Russian Iskander missile travels at Mach 7 – with a range of 400km, carrying a 700kg warhead of several varieties, and with a circular error probability of around five meters. Translation: an ultimate lethal weapon against airfields or logistic infrastructure. The Iskander can reach targets deep inside Europe. - And then there’s the Sukhoi T-50 PAK FA.
  • NATO clowns dreaming of a war on Russia would have to come up with an ironclad system to knock out these Iskanders. They don’t have any. Additionally, they would have to face the S-400s, which the Russians can deploy all over the spectrum. Think of a hefty batch of S-400s positioned at the Russian exclave of Kaliningrad; that would turn NATO air operations deep inside Europe into an absolutely horrendous nightmare. On top of it, good ol’ NATO fighter jets cost a fortune. Imagine the effect of hundreds of destroyed fighter jets on an EU already financially devastated and austerity-plagued to death.
  • Still assuming those NATO clowns would insist on playing war, Moscow has already made it very clear Russia would use their awesome arsenal of 5,000-plus tactical nuclear weapons - and whatever else it takes - to defend the nation against a NATO conventional attack. Moreover, a few thousand S-400 and S-500 systems are enough to block a US nuclear attack.
  • ...1 more annotation...
  • ust in case the “pivoting to Asia” gang starts harboring funny ideas about the Middle Kingdom as well, China is massively investing in bouncing lasers off satellites; satellite-hitting missiles; silent submarines that surface beside US aircraft carriers without detection; and a made in China anti-missile missile that can hit a reentering satellite moving faster than any ICBM. In a nutshell; Beijing knows the US surface fleet is obsolete - and undefendable. And needless to add, all of these Chinese modernizing developments are proceeding way faster than anything in the US.
7More

Asia Times Online :: China's silky road to glory - 0 views

  • If there were any remaining doubts about the unlimited stupidity Western corporate media is capable of dishing out, the highlight of the Asia-Pacific Economic Cooperation (APEC) summit in Beijing has been defined as Russian President Vladimir Putin supposedly "hitting" on Chinese President Xi Jinping's wife - and the subsequent Chinese censoring of the moment when Putin draped a shawl over her shoulders in the cold air where the leaders were assembled. What next? Putin and Xi denounced as a gay couple?

    Let's dump the clowns and get down to the serious business. Right at the start, President Xi urged APEC to "add firewood to



    the fire of the Asia-Pacific and world economy". Two days later, China got what it wanted on all fronts.
  • 3) Beijing and Moscow committed to a second gas mega-deal - this one through the Altai pipeline in Western Siberia - after the initial "Power of Siberia" mega-deal clinched last May. 4) Beijing announced the funneling of no less than US$40 billion to start building the Silk Road Economic Belt and the 21st Century Maritime Silk Road.
  • Predictably, once again, this vertiginous flurry of deals and investment had to converge towards the most spectacular, ambitious, wide-ranging plurinational infrastructure offensive ever attempted: the multiple New Silk Roads - that complex network of high-speed rail, pipelines, ports, fiber optic cables and state of the art telecom that China is already building across the Central Asian stans, linked to Russia, Iran, Turkey and the Indian Ocean, and branching out to Europe all the way to Venice, Rotterdam, Duisburg and Berlin
  • ...3 more annotations...
  • ) Beijing had all 21 APEC member-nations endorsing the Free Trade Area of the Asia-Pacific (FTAAP) - the Chinese vision of an "all inclusive, all-win" trade deal capable of advancing Asia-Pacific cooperation - see South China Morning Post (paywall). The loser was the US-driven, corporate-redacted, fiercely opposed (especially by Japan and Malaysia) 12-nation Trans-Pacific Partnership (TPP). [See also here. 2) Beijing advanced its blueprint for "all-round connectivity" (in Xi's words) across Asia-Pacific - which implies a multi-pronged strategy. One of its key features is the implementation of the Beijing-based US$50 billion Asian Infrastructure Investment Bank. That's China's response to Washington refusing to give it a more representative voice at the International Monetary Fund than the current, paltry 3.8% of votes (a smaller percentage than the 4.5% held by stagnated France).
  • Now imagine the paralyzed terror of the Washington/Wall Street elites as they stare at Beijing interlinking Xi's "Asia-Pacific Dream" way beyond East Asia towards all-out, pan-Eurasia trade - with the center being, what else, the Middle Kingdom; a near future Eurasia as a massive Chinese Silk Belt with, in selected latitudes, a sort of development condominium with Russia.
  • Vlad doesn't do stupid stuff As for "Don Juan" Putin, everything one needs to know about Asia-Pacific as a Russian strategic/economic priority was distilled in his intervention at the APEC CEO summit.
  •  
    Pepe Escobar chronicles the decline of the American empire and the ascension of the China-funded New Silk Roads.
3More

Common currency: a forex scandal that epitomises the blindness in the banking crisis | ... - 0 views

  • The biggest open secret in the financial world has been confirmed. Regulators in the UK, the US and Switzerland have announced massive fines for some of the world’s largest banks for a manipulation of global currency markets that in its callous ubiquity says so much about the banking behaviours that sparked the global financial crisis. Fines levied by the UK regulator add up to £1.1 billion. The US regulator announced fines of $1.4 billion. Banks hit by these fines include UBS, Citi, JP Morgan, HSBC and RBS. Barclays is yet to come to a settlement on the back of the investigations.
  • The probe uncovered individuals traders within large banks who were working together in trading clubs which had names you would expect from the “ruthless narcissists” on BBC TV show, The Apprentice. These included “the players”, “the 3 musketeers” and “1 team, 1 dream”. These clubs worked together to influence the WM Reuters 4pm fix – essentially the official number used to fix currency rates. It shapes everything from how much we pay for currency when we go overseas to how much our pension fund pays when it wants to buy into an offshore investment. This is one of the core numbers in global finance.
  • So, it sounds important, but why should we actually care? Well global currency markets are worth over £5 trillion a day. They are the world’s biggest financial market. More than 40% of the trade takes place in London, and more than half of this trade is dominated by just four players: Citi, Deutsche Bank, UBS and Barclays. A small percentage of the trade relates to buying actual things (such as a shipment of coffee or oil). Most of it is either purely speculative or part of the process buying other speculative financial instruments. According to one piece in the Financial Times, there are really only a hundred or so people who really matter in this market. About 30 of them have been either placed on gardening leave or have been fired from their position in the last year.
18More

Tomgram: Shamsi and Harwood, An Electronic Archipelago of Domestic Surveillance | TomDi... - 0 views

  • Uncle Sam’s Databases of Suspicion A Shadow Form of National ID
  • We do know that the nation’s domestic-intelligence network is massive, including at least 59 federal agencies, over 300 Defense Department units, and approximately 78 state-based fusion centers, as well as the multitude of law enforcement agencies they serve. We also know that local law enforcement agencies have themselves raised concerns about the system’s lack of privacy protections.
  • The SAR database is part of an ever-expanding domestic surveillance system established after 9/11 to gather intelligence on potential terrorism threats. At an abstract level, such a system may seem sensible: far better to prevent terrorism before it happens than to investigate and prosecute after a tragedy. Based on that reasoning, the government exhorts Americans to “see something, say something” -- the SAR program’s slogan. Indeed, just this week at a conference in New York City, FBI Director James Comey asked the public to report any suspicions they have to authorities. “When the hair on the back of your neck stands, listen to that instinct and just tell somebody,” said Comey. And seeking to reassure those who do not want to get their fellow Americans in trouble based on instinct alone, the FBI director added, “We investigate in secret for a very good reason, we don't want to smear innocent people.”
  • ...15 more annotations...
  • At a fundamental level, suspicious activity reporting, as well as the digital and physical infrastructure of networked computer servers and fusion centers built around it, depends on what the government defines as suspicious.  As it happens, this turns out to include innocuous, First Amendment-protected behavior. As a start, a little history: the Nationwide Suspicious Activity Reporting Initiative was established in 2008 as a way for federal agencies, law enforcement, and the public to report and share potential terrorism-related information. The federal government then developed a list of 16 behaviors that it considered “reasonably indicative of criminal activity associated with terrorism.” Nine of those 16 behaviors, as the government acknowledges, could have nothing to do with criminal activity and are constitutionally protected, including snapping photographs, taking notes, and “observation through binoculars.”
  • There are any number of problems with this approach, starting with its premise.  Predicting who exactly is a future threat before a person has done anything wrong is a perilous undertaking. That’s especially the case if the public is encouraged to report suspicions of neighbors, colleagues, and community members based on a “hair-on-the-back-of-your-neck” threshold. Nor is it any comfort that the FBI promises to protect the innocent by investigating “suspicious” people in secret. The civil liberties and privacy implications are, in fact, truly hair-raising, particularly when the Bureau engages in abusive and discriminatory sting operations and other rights violations.
  • A few months later, a scathing report from the Senate subcommittee on homeland security described similar intelligence problems in state-based fusion centers. It found that Department of Homeland Security (DHS) personnel assigned to the centers “forwarded ‘intelligence’ of uneven quality -- oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections... and more often than not unrelated to terrorism.”
  • Law enforcement officials, including the Los Angeles Police Department’s top counterterrorism officer, have themselves exhibited skepticism about suspicious activity reporting (out of concern with the possibility of overloading the system). In 2012, George Washington University’s Homeland Security Policy Institute surveyed counterterrorism personnel working in fusion centers and in a report generally accepting of SARs noted that the program had “flooded fusion centers, law enforcement, and other security outfits with white noise,” complicating “the intelligence process” and distorting “resource allocation and deployment decisions.” In other words, it was wasting time and sending personnel off on wild goose chases.
  • Under federal regulations, the government can only collect and maintain criminal intelligence information on an individual if there is a “reasonable suspicion” that he or she is “involved in criminal conduct or activity and the information is relevant to that criminal conduct or activity.” The SAR program officially lowered that bar significantly, violating the federal government’s own guidelines for maintaining a “criminal intelligence system.” There’s good reason for, at a minimum, using a reasonable suspicion standard. Anything less and it’s garbage in, garbage out, meaning counterterrorism “intelligence” databases become anything but intelligent.
  • yet another burgeoning secret database that the federal government calls its “consolidated terrorism watchlist.” Inclusion in this database -- and on government blacklists that are generated from it -- can bring more severe repercussions than unwarranted law enforcement attention. It can devastate lives.
  • There is hope, however. In August, four years after the ACLU filed a lawsuit on behalf of 13 people on the no-fly list, a judge ruled that the government’s redress system is unconstitutional. In early October, the government notified Mashal and six others that they were no longer on the list. Six of the ACLU’s clients remain unable to fly, but at least the government now has to disclose just why they have been put in that category, so that they can contest their blacklisting. Soon, others should have the same opportunity.
  • As of August 2013, there were approximately 47,000 people, including 800 U.S. citizens and legal permanent residents like Mashal, on that secretive no-fly list, all branded as “known or suspected terrorists.” All were barred from flying to, from, or over the United States without ever being given a reason why. On 9/11, just 16 names had been on the predecessor “no transport” list. The resulting increase of 293,650% -- perhaps more since 2013 -- isn’t an accurate gauge of danger, especially given that names are added to the list based on vague, broad, and error-prone standards.
  • The No Fly List is only the best known of the government’s web of terrorism watchlists. Many more exist, derived from the same master list.  Currently, there are more than one million names in the Terrorist Identities Datamart Environment, a database maintained by the National Counterterrorism Center. This classified source feeds the Terrorist Screening Database (TSDB), operated by the FBI’s Terrorist Screening Center. The TSDB is an unclassified but still secret list known as the “master watchlist.” containing what the government describes as “known or suspected terrorists,” or KSTs.
  • Nothing encapsulates the post-9/11, Alice-in-Wonderland inversion of American notions of due process more strikingly than this “blacklist first, innocence later... maybe” mindset. The Terrorist Screening Database is then used to fill other lists. In the context of aviation, this means the no-fly list, as well as the selectee and expanded selectee lists. Transportation security agents subject travelers on the latter two lists to extra screenings, which can include prolonged and invasive interrogation and searches of laptops, phones, and other electronic devices. Around the border, there’s the State Department’s Consular Lookout and Support System, which it uses to flag people it thinks shouldn’t get a visa, and the TECS System, which Customs and Border Protection uses to determine whether someone can enter the country.
  • According to documents recently leaked to the Intercept, as of August 2013 that master watchlist contained 680,000 people, including 5,000 U.S. citizens and legal permanent residents. The government can add people’s names to it according to a shaky “reasonable suspicion” standard. There is, however, growing evidence that what’s “reasonable” to the government may only remotely resemble what that word means in everyday usage. Information from a single source, even an uncorroborated Facebook post, can allow a government agent to watchlist an individual with virtually no outside scrutiny. Perhaps that’s why 40% of those on the master watchlist have “no recognized terrorist group affiliation,” according to the government’s own records.
  • This opens up the possibility of increased surveillance and tense encounters with the police, not to speak of outright harassment, for a large but undivulged number of people. When a police officer stops a person for a driving infraction, for instance, information about his or her KST status will pop up as soon a driver’s license is checked.  According to FBI documents, police officers who get a KST hit are warned to “approach with caution” and “ask probing questions.” When officers believe they’re about to go face to face with a terrorist, bad things can happen. It’s hardly a stretch of the imagination, particularly after a summer of police shootings of unarmed men, to suspect that an officer approaching a driver whom he believes to be a terrorist will be quicker to go for his gun. Meanwhile, the watchlisted person may never even know why his encounters with police have taken such a peculiar and menacing turn. According to the FBI's instructions, under no circumstances is a cop to tell a suspect that he or she is on a watchlist.
  • Inside the United States, no watchlist may be as consequential as the one that goes by the moniker of the Known or Appropriately Suspected Terrorist File. The names on this blacklist are shared with more than 17,000 state, local, and tribal police departments nationwide through the FBI’s National Crime Information Center (NCIC). Unlike any other information disseminated through the NCIC, the KST File reflects mere suspicion of involvement with criminal activity, so law enforcement personnel across the country are given access to a database of people who have secretly been labeled terrorism suspects with little or no actual evidence, based on virtually meaningless criteria.
  • And once someone is on this watchlist, good luck getting off it. According to the government’s watchlist rulebook, even a jury can’t help you. “An individual who is acquitted or against whom charges are dismissed for a crime related to terrorism,” it reads, “may nevertheless meet the reasonable standard and appropriately remain on, or be nominated to, the Terrorist Watchlist.” No matter the verdict, suspicion lasts forever.
  • The SARs program and the consolidated terrorism watchlist are just two domestic government databases of suspicion. Many more exist. Taken together, they should be seen as a new form of national ID for a growing group of people accused of no crime, who may have done nothing wrong, but are nevertheless secretly labeled by the government as suspicious or worse. Innocent until proven guilty has been replaced with suspicious until determined otherwise. Think of it as a new shadow system of national identification for a shadow government that is increasingly averse to operating in the light. It’s an ID its “owners” don’t carry around with them, yet it’s imposed on them whenever they interact with government agents or agencies. It can alter their lives in disastrous ways, often without their knowledge. And they could be you. If this sounds dystopian, that’s because it is.
3More

[New post] Chaos in Libya as Supreme Court Declares Parliament "Invalid" - marbux@gmail... - 0 views

  • Libyan and international analysts presume that Thursday's Supreme Court ruling against the internationally recognized parliament will cause even more violence and bloodshed in the war-torn North African nation. Others, however, welcomed the ruling against the parliament. The ruling reportedly prompted Islamist militia which won control over the capital Tripoli in August to launch salvos of celebratory gunfire. The court's ruling cannot be appealed and adds to the pressure against Libya's current Prime Minister Abdullah al-Thinni. The PM fled the capital Tripoli after heavy fighting in August. Al-Thinni and the parliament are currently residing in the north-eastern city of Tobruk. The al-Thinni administration's control and sovereignty is largely limited to the city of Tobruk, while the government is unable to assert its power in the capital Tripoli, in Bengazi, Derna, Bani Walid and other major cities and regions.
  • The chaos in Libya following the 2011 "Arab Spring", the subversion of the Libyan government and the murder of Libya's head of State continues, as Libya's Supreme Court, on Thursday, declared that the country's parliament in Tobruk led by PM Al-Thinni is invalid. 
  • The Supreme Court was investigating the validity and legality of the current parliament following a complained filed by several Libyan lawmakers after the parliamentary elections in June.
3More

German Embassy Releases "Alarming" Declaration to Residents in Venezuela | venezuelanal... - 0 views

  • The German Embassy in Caracas has alarmed political observers in Venezuela by publishing what the press has described as an "alarming” official declaration to its citizens in the South American country. Published on February 5th, the declaration is written and signed by the Chargé d’Affaires at the German Embassy, Dr. Jörg Polster. It began to make the rounds on social media networks over the last two days.  In the statement, German diplomat Polster informs readers that the embassy is extremely “worried” about the current situation in the country and advises German residents to take a number of “precautions in the face of the crisis”. These precautions include having “lots of provisions” such as enough food and drinking water to last “in our opinion, for 2 weeks”, as well as cash, medicine, batteries, candles, and copies of important documents.
  • “We shouldn’t take it for granted that we will have access to electricity or internet services. The validity of passports and identity documents should be verified regularly,” continues the text. A 24 hour emergency phone line and link to an information e-mailing list are also given in the statement, which recommends that members of the German community have the embassy’s phone number “at hand at all times”. “In terms of the precautions to take in the face of the current crisis, it’s important to add that the embassy is constantly monitoring the situation and will publish information about the development of events when necessary,” it states.
  • Many news outlets in the country have described the statement as “alarming” whilst others have  labelled it “suspicious”.  The socialist administration of Nicolas Maduro is currently facing a stepped up economic war which is causing scarcities of basic goods, as well as increased calls by the political opposition for his government to step down. Many observers have likened the situation to pre-coup 1973 Chile, whilst government supporters have accused the US of plotting to facilitate a coup alongside the rightwing opposition.  “What development are they waiting for? Is it possible that they know something more than they are letting on?” stated an article on the pro-government website, Laiguana in reaction to the declaration.  
19More

THE 9/11 READER. The September 11, 2001 Terror Attacks | Global Research - 0 views

  • GLOBAL RESEARCH ONLINE INTERACTIVE READER SERIES GR I-BOOK No.  7  THE 9/11 READER The September 11, 2001 Terror Attacks 9/11 Truth: Revealing the Lies,  Commemorating the 9/11 Tragedy
  • August 2012 The 911/ Reader is part of Global Research’s Online Interactive I-Book Reader, which brings together, in the form of chapters, a collection of Global Research feature articles, including debate and analysis, on a broad theme or subject matter.  To consult our Online Interactive I-Book Reader Series, click here.
  • Table of Contents of the 9/11 Reader In Part I, the 911 Reader provides a review of what happened on the morning of 9/11, at the White House, on Capitol Hill, the Pentagon, at Strategic Command Headquarters (USSTRATCOM), What was the response of the US Air Force in the immediate wake of the attacks?  Part II focusses on “What Happened on the Planes” as described in the 9/11 Commission Report. Part III sheds light on what caused the collapse of the World Trade Center buildings. It also challenges the official narrative with regard to the attack on the Pentagon. Part IV reviews and refutes the findings of the 9/11 Commission Report. Part V focusses on the issue of foreknowledge by Western intelligence agencies. Part VI examines the issue of how foreknowledge of the attacks was used as an instrument of insider trading on airline stocks in the days preceding September 11, 2001. The bonanza financial gains resulting from insurance claims to the leaseholders of the WTC buildings is also examined.
  • ...15 more annotations...
  • Part VII focusses on the history and central role of Al Qaeda as a US intelligence asset. Since the Soviet-Afghan war, US intelligence has supported the formation of various jihadist organizations. An understanding of this history is crucial in refuting the official 9/11 narrative which claims that Al Qaeda, was behind the attacks. Part VIII centers on the life and death of 9/11 “Terror Mastermind” Osama bin Laden, who was recruited by the CIA in the heyday of the Soviet Afghan war. This section also includes an analysis of the mysterious death of Osama bin Laden, allegedly executed by US Navy Seals in a suburb of Islamabad in May 2011. Part  IX  focusses on “False Flags” and the Pentagon’s “Second 9/11″. Part X examines the issue of “Deep Events” with contributions by renowned scholars Peter Dale Scott and Daniele Ganser. Part XI  examines the structure of 9/11 propaganda which consists in “creating” as well “perpetuating” a  “9/11 Legend”. How is this achieved? Incessantly, on a daily basis, Al Qaeda, the alleged 9/11 Mastermind is referred to by the Western media, government officials, members of the US Congress, Wall Street analysts, etc. as an underlying cause of numerous World events. Part XII focusses on the practice of 9/11 Justice directed against the alleged culprits of the 9/11 attacks. The legitimacy of 9/11 propaganda requires fabricating “convincing evidence” and “proof” that those who are accused actually carried out the attacks. Sentencing of Muslims detained in Guantanamo is part of war propaganda. It depicts innocent men who are accused of the 9/11 attacks, based on confessions acquired through systematic torture throughout their detention. Part  XIII focusses on 9/11 Truth.  The objective of 9/11 Truth is to ultimately dismantle the propaganda apparatus which is manipulating the human mindset. The 9/11 Reader concludes with a retrospective view of 9/11 ten years later.
  • PART  I Timeline: What Happened on the Morning of September 11, 2001 Nothing Urgent: The Curious Lack of Military Action on the Morning of September. 11, 2001 - by George Szamuely – 2012-08-12 Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 Contradictions: Bush in the Classroom - by Dr. David Ray Griffin – 2008-04-04 9/11 Contradictions: When Did Cheney Enter the Underground Bunker? - by David Ray Griffin – 2008-04-24 VIDEO: Pilots For 9/11 Truth: Intercepted Don’t miss this important documentary, now on GRTV - 2012-05-16
  • PART II What Happened on the Planes “United 93″: What Happened on the Planes? - by Michel Chossudovsky – 2006-05-01   Phone Calls from the 9/11 Airliners Response to Questions Evoked by My Fifth Estate Interview - by Prof David Ray Griffin – 2010-01-12 Given the cell phone technology available in 2001, cell phone calls from airliners at altitudes of more than a few thousand feet, were virtually impossible Ted Olson’s Report of Phone Calls from Barbara Olson on 9/11: Three Official Denials - by David Ray Griffin – 2008-04-01 Ted Olson’s report was very important. It provided apparent “evidence” that American 77 had struck the Pentagon.
  • PART III What Caused the Collapse of The WTC Buildings and the Pentagon? The Destruction of the World Trade Center: Why the Official Account Cannot Be True - by Dr. David Ray Griffin – 2006-01-29 The official theory about the Twin Towers says that they collapsed because of the combined effect of the impact of the airplanes and the resulting fires Evidence Refutes the Official 9/11 Investigation: The Scientific Forensic Facts - by Richard Gage, Gregg Roberts – 2010-10-13 VIDEO: Controlled Demolitions Caused the Collapse of the World Trade Center (WTC) buildings on September 11, 2001 - by Richard Gage – 2009-09-20 VIDEO: 9/11: The Myth and The Reality Now on GRTV - by Prof. David Ray Griffin – 2011-08-30 Undisputed Facts Point to the Controlled Demolition of WTC 7 - by Richard Gage – 2008-03-28 VIDEO: 9/11 Explosive Evidence: Experts Speak Out See the trailer for this ground-breaking film on GRTV - 2011-08-03 9/11: “Honest Mistake” or BBC Foreknowledge of Collapse of WTC 7? Jane Standley Breaks Her Silence - by James Higham – 2011-08-18 The Collapse of WTC Building Seven. Interview. Comment by Elizabeth Woodworth - by David Ray Griffin – 2009-10-17   Building What? How SCADs Can Be Hidden in Plain Sight: The 9/11 “Official Story” and the Collapse of WTC Building Seven - by Prof David Ray Griffin – 2010-05-30 Besides omitting and otherwise falsifying evidence, NIST also committed the type of scientific fraud called fabrication, which means simply “making up results.” VIDEO; Firefighters’ Analysis of the 9/11 Attacks Refutes the Official Report - by Erik Lawyer – 2012-08-27 VIDEO: Pentagon Admits More 9/11 Remains Dumped in Landfill - by James Corbett – 2012-03-01 The Pentagon revealed that some of the unidentifiable remains from victims at the Pentagon and Shanksville sites on September 11, 2001 were disposed of in a landfill. 9/11: The Attack on the Pentagon on September 11, 2001 The Official Version Amounts to an Enormous Lie - by Thierry Meyssan – 2012-08-16
  • PART IV Lies and Fabrications: The 9/11 Commission Report A National Disgrace: A Review of the 9/11 Commission Report - by David Ray Griffin – 2005-03-24 The 9/11 Commission Report: A 571 Page Lie - by Dr. David Ray Griffin – 2005-09-08 September 11, 2001: 21 Reasons to Question the Official Story about 9/11 - by David Ray Griffin – 2008-09-11 911 “Conspiracy Theorists” Vindicated: Pentagon deliberately misled Public Opinion Military officials made false statements to Congress and to the 911 Commission - by Michel Chossudovsky – 2006-08-02 The 9/11 Commission’s Incredible Tales Flights 11, 175, 77, and 93 - by Prof. David Ray Griffin – 2005-12-13 9/11 and the War on Terror: Polls Show What People Think 10 Years Later - by Washington’s Blog – 2011-09-10
  • PART  V Foreknowledge of 9/11   VIDEO: The SECRET SERVICE ON 9/11: What did the Government Know? Learn more on this week’s GRTV Feature Interview - by Kevin Ryan, James Corbett – 2012-04-10 9/11 Foreknowledge and “Intelligence Failures”: “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Prof. Michel Chossudovsky – 2011-09-14 “Foreknowledge” and “Failure to act” upholds the notion that the terrorist attacks (“act of war”) “waged by Muslims against America” are real, when all the facts and findings point towards coverup and complicity at the highest levels of the US government. Foreknowledge of 9/11 by Western Intelligence Agencies - by Michael C. Ruppert – 2012-08-21
  • PART XII Post 9/11 “Justice” IRAN ACCUSED OF BEING BEHIND 9/11 ATTACKS. U.S. Court Judgment, December 2011 (Havlish v. Iran) - by Julie Lévesque – 2012-05-11 U.S. Court Judgment, December 2011 (Havlish v. Iran) “American Justice”: The Targeted Assassination of Osama Bin Laden Extrajudicial executions are unlawful - by Prof. Marjorie Cohn – 2011-05-10 ALLEGED “MASTERMIND” OF 9/11 ON TRIAL IN GUANTANAMO: Military Tribunals proceed Despite Evidence of Torture - by Tom Carter – 2012-05-30 U.S. Military Drugged Detainees to Obtain FALSE Confessions Self-confessed 9/11 “mastermind” falsely confessed to crimes he didn’t commit - by Washington’s Blog – 2012-07-15 911 MILITARY TRIAL: Pentagon Clears Way for Military Trial of Five charged in 9/11 Attacks - by Bill Van Auken – 2012-04-06 Khalid Sheikh Mohammed’s trial will convict us all - by Paul Craig Roberts – 2009-11-25
  • PART VII 9/11 and the “Global War on Terrorism” (GWOT) Political Deception: The Missing Link behind 9-11 - by Michel Chossudovsky – 2002-06-20 On the morning of September 11, Pakistan’s Chief Spy General Mahmoud Ahmad, the alleged “money-man” behind the 9-11 hijackers, was at a breakfast meeting on Capitol Hill hosted by Senator Bob Graham and Rep. Porter Goss, the chairmen of the Senate and House Intelligence committees. 9/11 ANALYSIS: From Ronald Reagan and the Soviet-Afghan War to George W Bush and September 11, 2001 - by Michel Chossudovsky – 2010-09-09 Osama bin Laden was recruited by the CIA in 1979. The US spent millions of dollars to supply Afghan schoolchildren with textbooks filled with violent images and militant Islamic teachings.     The Central Role of Al Qaeda in Bush’s National Security Doctrine “Revealing the Lies” on 9/11 Perpetuates the “Big Lie” - by Michel Chossudovsky – 2007-07-12 September 11, 2001: America and NATO Declare War on Afghanistan NATO’s Doctrine of Collective Security - by Michel Chossudovsky – 2009-12-21   America’s Holy Crusade against the Muslim World. - by Michel Chossudovsky – 2010-08-30 What is now unfolding is a generalized process of demonization of an entire population group
  • Osamagate - by Michel Chossudovsky – 2001-10-09 The main justification for waging this war has been totally fabricated. The American people have been deliberately and consciously misled by their government into supporting a major military adventure which affects our collective future. The “Demonization” of Muslims and the Battle for Oil - by Michel Chossudovsky – 2007-01-04 Muslim countries possess three quarters of the World’s oil reserves. In contrast, the United States of America has barely 2 percent of total oil reserves.   Was America Attacked by Muslims on 9/11? - by David Ray Griffin – 2008-09-10 Much of US foreign policy since 9/11 has been based on the assumption that America was attacked by Muslims on 9/11.   New Documents Detail America’s Strategic Response to 9/11 Rumsfeld’s War Aim: “Significantly Change the World’s Political Map” - by National Security Archive – 2011-09-12
  • PART VIII The Alleged 9/11 Mastermind: The Life and Death of  Osama bin Laden Who Is Osama Bin Laden? - by Michel Chossudovsky – 2001-09-12   VIDEO: The Last Word on Osama Bin Laden - by James Corbett – 2011-05-24 Osama bin Laden: A Creation of the CIA - by Michel Chossudovsky – 2011-05-03 Interview with Osama bin Laden. Denies his Involvement in 9/11 Full text of Pakistani paper’s Sept 01 “exclusive” interview - 2011-05-09 Where was Osama on September 11, 2001? - by Michel Chossudovsky – 2008-09-11 On September 10. 2001, Osama was in a Pakistan military hospital in Rawalpindi, courtesy of America’s indefectible ally Pakistan Osama bin Laden, among the FBI’s “Ten Most Wanted Fugitives”: Why was he never indicted for his alleged role in 9/11? - by Michel Chossudovsky – 2006-09-17 Osama bin Laden: Already Dead… Evidence that Bin Laden has been Dead for Several Years - by Prof. David Ray Griffin – 2011-05-02 The Mysterious Death of Osama bin Laden: Creating Evidence Where There Is None - by Dr. Paul Craig Roberts – 2011-08-04 The Assassination of Osama bin Laden: Glaring Anomalies in the Official Narrative Osama was Left Handed… - by Felicity Arbuthnot – 2011-05-11 The Assassination of Osama Bin Laden - by Fidel Castro Ruz – 2011-05-07 Dancing on the Grave of 9/11. Osama and “The Big Lie” - by Larry Chin – 2011-05-05
  • PART  IX  ”False Flags”: The Pentagon’s Second 9/11 The Pentagon’s “Second 911″ “Another [9/11] attack could create both a justification and an opportunity to retaliate against some known targets” - by Michel Chossudovsky – 2006-08-10 The presumption of this military document, is that a Second 911 attack “which is lacking today” would usefully create both a “justification and an opportunity” to wage war on “some known targets Crying Wolf: Terror Alerts based on Fabricated Intelligence - by Michel Chossudovsky – 2006-08-20 This is not the first time that brash and unsubstantiated statements have been made regarding an impending terror attack, which have proven to be based on “faulty intelligence”.
  • PART X “Deep Events” and State Violence The Doomsday Project and Deep Events: JFK, Watergate, Iran-Contra, and 9/11 - by Prof. Peter Dale Scott – 2011-11-22 The Doomsday Project is the Pentagon’s name for the emergency planning “to keep the White House and Pentagon running during and after a nuclear war or some other major crisis.” JFK and 9/11 Insights Gained from Studying Both - by Dr. Peter Dale Scott – 2006-12-20 In both 9/11 and the JFK assassination, the US government and the media immediately established a guilty party. Eventually, in both cases a commission was set up to validate the official narrative. Able Danger adds twist to 9/11 9/11 Ringleader connected to secret Pentagon operation - by Dr. Daniele Ganser – 2005-08-27 Atta was connected to a secret operation of the Pentagon’s Special Operations Command (SOCOM) in the US. A top secret Pentagon project code-named Able Danger identified Atta and 3 other 9/11 hijackers as members of an al-Qaida cell more than a year before the attacks. 9/11, Deep State Violence and the Hope of Internet Politics - by Prof. Peter Dale Scott – 2008-06-11 The unthinkable – that elements inside the state would conspire with criminals to kill innocent civilians – has become thinkable… Al Qaeda: The Database. - by Pierre-Henri Bunel – 2011-05-12
  • PART XI Propaganda: Creating and Perpetuating the 9/11 Legend September 11, 2001: The Propaganda Preparation for 9/11: Creating the Osama bin Laden “Legend” - by Chaim Kupferberg – 2011-09-11 THE 9/11 MYTH: State Propaganda, Historical Revisionism, and the Perpetuation of the 9/11 Myth - by Prof. James F. Tracy – 2012-05-06   Al Qaeda and Human Consciousness: Al Qaeda, Al Qaeda…. An Incessant and Repetitive Public Discourse - by Prof. Michel Chossudovsky – 2012-03-24 9/11 Truth, Inner Consciousness and the “Public Mind” - by James F. Tracy – 2012-03-18
  • PART VI Insider Trading and the 9/11 Financial Bonanza 9/11 Attacks: Criminal Foreknowledge and Insider Trading lead directly to the CIA’s Highest Ranks CIA Executive Director “Buzzy” Krongard managed Firm that handled “Put” Options on UAL - by Michael C. Ruppert – 2012-08-13 The 9/11 Attacks on the World Trade Center (WTC): Unspoken Financial Bonanza - by Prof Michel Chossudovsky – 2012-04-27 SEPTEMBER 11, 2001: Insider Trading 9/11 … the Facts Laid Bare - by Lars Schall – 2012-03-20 Osama Bin Laden and The 911 Illusion: The 9/11 Short-Selling Financial Scam - by Dean Henderson – 2011-05-09
  • PART XIII 9/11 Truth Revealing the Lies,  Commemorating the 9/11 Tragedy VIDEO: Commemorating the 10th Anniversary of 9/11 - by Prof. Michel Chossudovsky – 2011-09-01 VIDEO: AFTER 9/11: TEN YEARS OF WAR Special GRTV Feature Production - by James Corbett – 2011-09-08
  •  
    Wow!
8More

Yellowstone Oil Spills Expose Threat to Pipelines Under Rivers Nationwide | Inside Clim... - 0 views

  • At the time the Poplar pipeline ruptured, about 110 feet of it was completely uncovered along the bottom of the Yellowstone River, exposing it to damage.
  • Bridger Pipeline LLC was so sure its Poplar oil line was safely buried below the Yellowstone River that it planned to wait five years to recheck it. But last month, 3.5 years later, the Poplar wasn't eight feet under the river anymore. It was substantially exposed on the river bottom—and leaking more than 30,000 gallons of oil upstream from Glendive, Montana. An ExxonMobil pipeline wasn't buried deeply enough for the Yellowstone River, either. High floodwaters in 2011 uncovered the Silvertip pipe, leaving it defenseless against the fast-moving current and traveling debris. It broke apart in July, and sent 63,000 gallons of oil into the river near Laurel, Montana.
  • Both companies underestimated the river's power and its penchant for scouring away the earth that's covering and protecting their pipelines. That miscalculation led to the Exxon Silvertip spill and it's likely to be declared a significant factor, at a minimum, in the Poplar spill. Such misjudgments have potentially troubling implications nationwide, since pipelines carrying crude oil and petroleum products pass beneath rivers and other bodies of water in more than 18,000 places across America. Many of them are buried only a few feet below the water. "There were a lot of people who wanted to think that the last pipeline spill in the Yellowstone River in 2011 was a freak accident that would never happen again. After this most recent spill, no one believes that anymore," said Scott Bosse, Northern Rockies director for American Rivers. "The truth is, there are probably hundreds of pipelines across the country that are at considerable risk of rupturing under our rivers."
  • ...4 more annotations...
  • While corrosion is the No. 1 cause of pipeline spills, a sizable number of pipelines at water crossings have ruptured or been endangered by river scour. Among them: ► The Poplar (Jan. 2015) and Silvertip (July 2011) pipeline failures on the Yellowstone River. ► More than 20 pipeline river crossings in Montana were found to be "dangerously close to exposure" during inspections of nearly 90 pipeline crossings in 2011, according to one report. Many of them have since been reburied significantly deeper. The Poplar pipeline was not among the crossings tagged as being close to exposure. ► Nearly half of the 55 oil and gas pipelines that cross the Missouri River were found to have sections buried 10 feet or less below the riverbed, according to the Wall Street Journal. A study by the U.S. Geological Survey, meanwhile, found that the Missouri riverbed had deepened by nine to 41 feet in 27 places because of severe scouring during the 2011 floods. ► An Enterprise Products Partners LLP pipeline that was uncovered by river scouring and ruptured in August 2011. The line spilled more than 28,350 gallons of a gasoline additive into the Missouri River in Iowa. ► A June 2012 spill in Alberta, Canada, where an oil pipeline owned by Plains Midstream Canada failed along the Red Deer River and released more than 122,000 gallons of light crude. Investigators concluded that the pipe was uncovered by scour during high flood waters and subjected to vibrations from the river flow that led a weld to fail.
  • Three Enbridge Corp. crude oil pipelines crossing Minnesota's Tamarac River were exposed by floodwater erosion years ago, and were still exposed in mid-2014. None of the pipes had failed at that point, but one was being propped up by steel legs, according to an MPR News account. Federal regulations aren't much help. The only rule that addresses pipe burial at major river crossings requires petroleum pipelines to be laid at least four feet below the riverbed at the time of construction. Once a pipeline's installed, there are no requirements regarding burial depth. There is no rule requiring exposed pipelines to be reburied, though a spill under those conditions would invite regulatory penalties for leaving the line exposed to hazards. What's more, federal rules put the pipeline companies in charge of identifying all threats that could cause a spill in highly populated or environmentally sensitive areas, and the companies get wide latitude in deciding what to do about them, according to Rebecca Craven, program manager at the Pipeline Safety Trust, a nonprofit group that tracks pipeline risks and regulations.
  • Indeed, the required four-foot minimum initial burial depth for pipelines can be completely eliminated by natural erosion over time or by a single flood event. Active free-flowing rivers can carve with enough ferocity to lower their riverbeds by 20 feet or shift the waterway onto an entirely new path, which can add new stresses to the pipeline or put the river over pipe that has less cover or lacks reinforcement or protective cement casings. The hotly debated Keystone XL oil pipeline project would cross nearly 2,000 rivers, streams and reservoirs in Montana, South Dakota and Nebraska, according to one estimate. The route takes the pipe across the Missouri and Yellowstone rivers, where owner TransCanada has pledged to install the pipeline 35 feet below the riverbeds.
  • See Also: Ruptured Yellowstone Oil Pipeline Was Built With Faulty Welding in 1950sIce Hinders Cleanup of Yellowstone Oil Pipeline SpillExxon Overlooked, Masked Safety Threats in Years Before Pegasus Pipeline BurstDilbit in Exxon's Pegasus May Have Contributed to Pipeline's Rupture
  •  
    One of the hidden costs of oil dependence. 
8More

American Democracy is Owned by the Rich | Al Jazeera America - 1 views

  • Two new studies by political scientists offer compelling evidence that the rich use their wealth to control the political system and that the U.S. is a democratic republic in name only. In a study of Senate voting patterns, Michael Jay Barber found that “senators’ preferences reflect the preferences of the average donor better than any other group.” In a similar study of the House of Representatives, Jesse H. Rhodes and Brian F. Schaffner found that, “millionaires receive about twice as much representation when they comprise about 5 percent of the district’s population than the poorest wealth group does when it makes up 50 percent of the district.” In fact, the increasing influence of the rich over Congress is the leading driver of polarization in modern politics, with the rich using the political system to entrench wealth by pushing for tax breaks and blocking redistributive policies.
  • At the turn of the decade, political scientists Larry Bartels, Jacob Hacker and Martin Gilens wrote several incredibly influential important books arguing, persuasively, that the preferences of the rich were better represented in Congress than the poor. After the books were published, there was a flurry of research arguing that they had overstated their case. Critics alleged two key defects in Bartels’ and Gilens’ arguments. First, because polling data on the super-wealthy were sparse, it was difficult to prove that there were large differences in opinion. Political scientists often rely on composite measures of policy liberalism, but since the poor tend to be more economically liberal but socially conservative, the differences between the poor and moderately rich can often be obscured. Second, there was no way to show that influence of the wealthy was caused directly by the influence of money. It might well be that the rich are simply opinion leaders or are more likely to vote.
  • Recent research offers compelling answers to these criticisms. The new evidence adds credence to the Bartels-Gilens-Hacker view that money is corrupting American politics. By using a massive database of ideology that includes the super wealthy, Schaffner and Rhodes found that “members of Congress are much more responsive to the wealthy than to their poor constituents.” However, this difference is not equal between both parties; rather, Democrats are far more responsive to the poor than Republicans. (This is not surprising; other research supports this claim.) They find that both parties strongly favor the upper-middle class, those with $100,000 to $300,000 in wealth. But Republicans are not only more responsive to the rich, but particularly to rich donors. Schaffner and Rhodes argue that, “campaign donations, but not voter registration or participation in primary or general election, may help explain the disproportionate influence of the wealthy among Republican representatives.” Barber’s study is the first to directly examine the policy preferences of the donor class. Barber sent 20,500 letters to people who contributed to 22 Senate elections in 2012 and asked about various policy questions. This allowed Barber to examine the differences in representation between donors and non-donors. His finding: Donors’ preferences tend to be far better represented than non-donors’. The chart below measures the ideological differences between various groups, with 0 indicating a perfect fit. The data show that Senators are almost perfectly aligned with their donors, but rather distant from voters.
  • ...5 more annotations...
  • In fact, politicians are almost perfectly aligned with donors, but less aligned with partisans (people who voted for the Senator and share party affiliation), supporters (people who voted for the Senator) and voters in general. He Barber also finds that donors tend to be far more extreme in their views (see chart below). For instance, while about sixty percent of non-donor Republicans oppose the Affordable Care Act, opposition among donors is “almost unanimous.” Barber also notes that donors tend to be far more extreme than non-donors (see chart). (This is supported by other studies).
  • Such data could explain the rising polarization of Congress, as politicians increasingly respond to their donors, rather than to voters. Political scientists Walter J. Stone and Elizabeth N. Simas have found that challengers raise more money when they take extreme positions, which helps explain why incumbent representatives tend to be more partisan than departing representatives. It certainly explains the intransigence of the last two Congresses: Republicans, who are responding to their rich donor base, are incentivized to oppose any action, particularly those supporting Obama, lest they lose funding. Since Senators have to raise approximately $3,300 a day every year for six years to remain viable, they will inevitably have to succumb to the power of money if they wish to be reelected. This research raises the disturbing thought that our political system is no longer representative. As Barber notes, about half of all donors are from out of state, meaning that politicians are no longer responsive to their voters (though they are slightly more during election years). Given that only .22 percent of Americans made a donation of more than $200 (the level Barber studies) in 2014, we have power evidence that America is now a government of the one percent — indeed, of the one-fifth of one percent.
  • This disturbing trend affects politics at all levels. At the state level, political scientists Gerald Wright and Elizabeth Rigby found that state party platforms are far more influenced by the rich than the poor. Elsewhere, Barber found evidence that presidents are more responsive to donors than non-donors. Recently Griffin and Newman found representation gaps between whites and people of color as well as low-income voters. This finding is supported by Christopher Ellis, who found that donors were better represented than non-donors (although using a less comprehensive method than Barber). In a frank moment, U.S. Sen. Chris Murphy (D – Conn.) said, “I talked a lot more about carried interest inside of that call room than I did in the supermarket.” He’s correct: Donors tending to be far richer and wealthier than non-donors (see chart).
  • There are still unanswered questions. It is possible that politicians cast ideological votes to appease donors and partisans (for instance, the vain attempt to repeal the Affordable Care Act dozens of times), while also working to benefit the poor and middle class through less visible means. This might explain why political journalists, who often focus on major legislation, miss the distributional impacts of political appointments and regulatory action. It may be that politicians work to maximize votes, and then political donations follow (though there is strong evidence this isn’t the case). Either way, the most up-to-date evidence strongly suggests that money is distorting our system, and that evidence appears to be growing stronger by the day.
  • The solution, as a recent Demos report suggests, is to help reformist candidates gather donations with a public matching system. Since voters who are non-donors are less ideological, the solution is to balance out the political distortions from the donor class by turning these non-donors into donors. Citizens United has only increased the stranglehold of moneyed interests on our political system, and is daily choking the life of our democracy. Only by restoring influence to all voters will our republic be restored.
6More

In Report to UN Committee Against Torture, US Government Touts Division That Doesn't Re... - 0 views

  • The United States government submitted its “periodic report” to the United Nations Committee Against Torture. There are multiple glaring aspects of the government’s report on how it believes it is complying fully with the Convention Against Torture (CAT), however, one part of the report where the government claims to have done what it was supposed to do to investigate torture stands out. In particular, the government highlights a Justice Department division as a challenge to impunity for torture, which appears to have prosecuted zero public cases of torture against US officials. To those unfamiliar, countries which are signatories to the CAT are expected to submit reports every four years to the committee. The committee reviews the report and then issues its own “concluding observations” with concerns and recommendations to the “State party.”
  • One of the committee’s “observations” in its 2006 report involved “reliable reports of acts of torture or cruel, inhuman and degrading treatment or punishment committed by certain members of the State party’s military or civilians personnel in Afghanistan and Iraq.” It was also “concerned that the investigation and prosecution of many of these cases, including some resulting in the death of detainees,” had “led to lenient sentences, including of an administrative nature or less than one year’s imprisonment.” The committee requested that the US government explain the following in its report: (a) Steps taken to ensure that all forms of torture and ill-treatment of detainees by its military or civilian personnel, in any territory under its de facto and de jure jurisdiction, as well as in any other place under its effective control, is promptly, impartially and thoroughly investigated, and that all those responsible, including senior military and civilian officials authorizing, acquiescing or consenting in any way to such acts committed by their subordinates are prosecuted and appropriately punished, in accordance with the seriousness of the crime (para. 26). Are all suspects in prima facie cases of torture and ill-treatment as a rule suspended or reassigned during the process of investigation?
  • The government answered [PDF], “US law provides jurisdiction in a number of ways that could be relied on for criminal prosecution of torture and ill-treatment of detainees” and some examples. One could read this as, theoretically, if the US government wanted to prosecute US officials involved in torture, this is what is available in US law to do just that.
  • ...3 more annotations...
  • Later, the government adds: …In March 2010, the [Justice Department] announced the merger of two Criminal Division components that were responsible for investigating and prosecuting various types of human rights violations. The creation of the new component, the Human Rights and Special Prosecutions Section (HRSP), underscores the commitment of United States authorities to end impunity for torturers and other human rights violators. HRSP and other DOJ components have prosecuted U.S. military and civilian personnel who have perpetrated human rights violations outside the United States… Although the government acknowledges the merger was “intended to enhance the government’s effectiveness in pursuing violators and denying them safe haven in the United States,” the detail is being provided within the context of what the US government is doing to prosecute US military and civilian personnel, who are implicated in acts of torture.
  • The Human Rights and Special Prosecutions section does not prosecute US officials involved in torture or human rights abuses.
  • What it has not prosecuted recently—Or, more importantly, what it has not publicly pursued is accountability for officials involved in torture in war zones like Afghanistan or Iraq. It has not sought to hold former Bush administration officials accountable for their role in torture in war zones or in secret detention facilities, where CIA interrogators operated either. The UN Committee Against Torture should not be misled. The HRSP has nothing to do with challenging the impunity US military and civilian personnel currently enjoy when it comes to torture. And, more than likely, it may never hold any current or former high-ranking officials accountable.
4More

Did Russia just "gently" threaten the USA? | The Vineyard of the Saker - 0 views

  • Interesting stuff today.  A major Russian TV channel just aired a report about Putin meeting with his top military commanders.  I don’t have the time to translate what Putin said word for word, but basically he said that the USA had refused every single Russian offer to negotiate about the US anti-missile system in Europe and that while the US had initially promised that the real target of this system was Iran, now that the Iranian nuclear issue had been solved, the US was still deploying the system.  Putin added that the US was clearly attempting to change the world’s military balance.  And then the Russian footage showed this:
  • According to the Kremlin was mistakenly leaked secret document.  And just to make sure that everybody got it, RT wrote a full article in English about this in an article entitled “‘Assured unacceptable damage’: Russian TV accidentally leaks secret ‘nuclear torpedo’ design“. According to RT The presentation slide titled “Ocean Multipurpose System: Status-6” showed some drawings of a new nuclear submarine weapons system. It is apparently designed to bypass NATO radars and any existing missile defense systems, while also causing heavy damage to “important economic facilities” along the enemy’s coastal regions. The footnote to the slide stated that Status-6 is intended to cause “assured unacceptable damage” to an adversary force. Its detonation “in the area of the enemy coast” would result in “extensive zones of radioactive contamination” that would ensure that the region would not be used for “military, economic, business or other activity” for a “long time.” According to the blurred information provided in the slide, the system represents a massive torpedo, designated as “self-propelled underwater vehicle,” with a range of up to 10 thousand kilometers and capable of operating at a depth of up to 1,000 meters. Actually, such ideas are nothing new.  The late Andrei Sakharov had already proposed a similar idea to basically wipe out the entire US East Coast.  The Russians have also look into the possibility to detonate a nuclear device to set off the “Yellowstone Caldera” and basically destroy most of the USA in one shot.  While in the early years following WWII the Soviets did look into all sort of schemes to threaten the USA with destruction, the subsequent development of Soviet nuclear capabilities made the development of this type of “doomsday weapons” useless.  Personally, I don’t believe for one second that the Russians are now serious about developing such system as it would be literally a waste of resources.  So what is going on here?
  • This so-called “leak” of “secret documents” is, of course, no leak at all.  This is a completely deliberate action.  To imagine that a Russian journalist could, just by mistake, film a secret document (helpfully held up for him by a general) and then just walk away, get it passed his editor and air it is laughable.  Any footage taken in a meeting of the President with his senior generals would be checked many times over.  No, this was a deliberate way to remind the USA that if they really are hell-bent on spending billions of dollars in a futile quest to create some kind of anti-missile system Russia could easily develop a cheap weapon system to still threaten the USA with total annihilation.  Because, make no mistake, the kind of long range torpedo being suggested here would be rather cheap to build using only already existing technologies.  I would even add that rather than setting such a weapon off the US coast the system could also be designed to fire off a secondary missile (ballistic or cruise) which could then fly to any inland target.  Again, such technologies already exist in the Russian military and have even been deployed on a smaller scale. See for yourself:
  • ...1 more annotation...
  • Coming back to the real world, I don’t believe for one second that any type of anti-missile system could be deployed in Europe to shield NATO the EU or the US from a Russian retaliatory strike should the Empire ever decide to attack Russia.  All the East Europeans are doing is painting a cross-hair on themselves as these will be the very first targets to be destroyed in case of a crisis.  How? By use of special forces first and, if needed, by Iskander missile strikes if all else fails.  But the most likely scenario is that key components of the anti-missile system will suddenly experience “inexplicable failures” which will render the entire system useless.  The Russians know that and so do the Americans.  But just to make sure that everybody got the message the Russians have now shown that even a fully functional and survivable US anti-missile system will not protect anybody from a Russian retaliation. The sad thing is that US analysts all fully understand that but they have no say in a fantastically corrupt Pentagon.  The real purpose of the US program is not to protect anybody against a non-existing Russian threat, but to dole out billions of dollars to US corporations and their shareholders.  And if in the process the US destabilizes the entire planet and threatens the Russians – then “to hell with ‘em Russikes!  We are the indispensable nation and f**k the rest of the planet!”  Right? Wrong. What happened today is a gentle reminder of that.
7More

Secret program at secret Guantánamo prison hears everything | Miami Herald - 0 views

  • A secret Defense Department program provides unfettered eavesdropping on the accused terrorists imprisoned at Guantánamo’s clandestine Camp 7 lockup, recently released war court documents show.Army Col. James L. Pohl, the judge in 9/11 trial, discovered the existence of the secret surveillance program during a recent war court hearing. Little is publicly known about the program, not even its unclassified two-word nickname.
  • The disclosure of pervasive eavesdropping at Guantánamo’s lockup for 14 former CIA prisoners comes in before-and-after documents released by the court from the recent Oct. 19-30 pretrial hearings in the death-penalty case of five men accused of orchestrating the hijackings that killed nearly 3,000 people on Sept. 11, 2001.At issue was accused 9/11 plotter Walid bin Attash’s request for guidance on how he could function as his own attorney. Bin Attash is a Yemeni in his mid-30s who is accused of training some of the hijackers. “You must assume anything you say in Camp 7 is not confidential and will be disclosed to the U.S. Government,” warns an Oct. 23 draft of the advisory, crafted after the judge was informed of the covert program. “Only when you are in Echo 2 will anything you say be covered by the attorney-client privilege.”An Oct. 20 draft of the advisory omits those lines.
  • This is not the first time in the proceedings that a surveillance program caught Pohl by surprise. In January 2013, he ordered the CIA to unplug a button that allowed an unseen observer to cut the court’s audio feed to the public. Perhaps ironically, the lone site the judge considers safe for consultative trial preparation — the Camp Echo compound of wooden huts, each containing a cell — at one time had covert recording devices that looked like smoke detectors. The judge ordered them disabled in February 2013.Attorney Dror Ladin of the American Civil Liberties Union, who was an observer at the Guantánamo hearings last month, said the apparent disclosure of “pervasive surveillance at Camp 7” is the latest issue to challenge the possibility of a fair trial.“It is shocking that for years neither defense counsel nor the judge were made aware that the government was capturing everything said aloud by the detainees there,” he said Thursday. It also adds to mounting questions of “how these military commissions can produce a fair result,” said Ladin, especially if one of the men represents himself. “These are detainees who really can’t see the evidence against them and simultaneously have been provided no rehabilitation services for the torture they suffered for years. It would be astonishing if any of them could craft a fair defense for capital charges.”
  • ...3 more annotations...
  • A defense attorney in another case said the prosecution wants to use a surreptitiously recorded conversation between two Camp 7 captives against an alleged al-Qaida commander. And in 2012 the journalist Daniel Klaidman wrote in his book “Kill or Capture” that the U.S. government had recordings made in a Guantánamo prison recreation yard of the alleged Sept. 11 mastermind Khalid Sheik Mohammed talking about evidence that could be used against him.The latest disclosure comes at a time of decreasing transparency at the war court.On Oct. 29, the judge held a 13-minute secret session without advanced notice to the public. A day later the judge wrote in a three-page ruling that he closed the court at the request of “the Government” — war-court-speak for the prosecution — to protect state secrets whose disclosure “could result in grave danger to national security.”Pohl also ordered the court to issue a censored transcript of the parts the excluded public and accused would be allowed to see. No transcript has been released.Then the next day, Oct. 30, the judge held a daylong, open hearing on a restraining order he issued forbidding female guards from touching the 9/11 accused when they are being taken to court or legal meetings. The judge’s order has outraged members of Congress and the Pentagon brass.
  • In that public court hearing, soldiers called as witnesses from the prison discussed staffing patterns at Camp 7. Normally the Pentagon releases transcripts of open hearings the same day. Unusually, the court has not yet released the Oct. 30 transcript. A Pentagon spokesman suggested Thursday — 13 days after the open court hearing — that somebody was scrubbing the transcript of information already made public. “The security review of the Oct. 30 transcript remains ongoing,” said Navy Cmdr. Gary Ross. “We will provide an update once additional information becomes available.”Much of the October session focused on bin Attash’s question about how he’d act as his own lawyer in a system that does not let the accused terrorist see classified information in the case. The judge and attorneys devoted days to designing a script Pohl would read to any accused 9/11 terrorist who tries to take charge of his defense — and spent a full afternoon huddling in a closed meeting on the secret program.
  • In it, Pohl made clear that he never intended to let bin Attash dismiss his Pentagon-paid defense attorneys — Chicago criminal defense attorney Cheryl Bormann and Air Force Maj. Michael Schwartz. Instead, the script shows Pohl planned to appoint Bormann and Schwartz as “standby counsel” the judge could activate to carry out cross-examination of certain witnesses who might have “particular sensitivities” to being questioned by the alleged terrorist.“If you are represented by lawyers, then it is the lawyers, and not you, who will conduct the defense,” the warning says. “Correspondingly, if you represent yourself, you will be able to perform the lawyer’s core functions, but you will not necessarily be allowed to direct special appearances by counsel when it is convenient to you.”The language suggests a far more limited role by the American lawyers than those carried out in an aborted attempt to hold the Sept. 11 trial during the Bush administration. In those proceedings, alleged 9/11 terrorists serving as their own lawyer regularly had standby counsel write and argue motions in court.The script also envisions a scenario in which an accused 9/11 plotter serving as his own lawyer becomes unruly, disruptive or disobedient rather than respect “the dignity of the courtroom.” In such a case, the judge said he could deal with “obstructionist misconduct” by putting “physical restraints” on bin Attash or ejecting him from the court.Bin Attash, for his part, has not been noticeably disruptive across years of pretrial proceedings. An amputee, he was brought to his May 5, 2012 arraignment in a Guantánamo prison restraint chair routinely used for forced-feeding of hunger strikers — with guards carrying his prosthetic leg separately.
  •  
    It's long past time to recognize that the military cannot provide a fair trial for GITMOI detainees, transfer them to the U.S., and try them in a civilian Article II court. If this kind of crap were going down before an Article II judge, those conducting the surveillance would be sitting in jail. 
5More

Africa's possible Exit from the ICC | nsnbc international - 0 views

  • Several African nations, first and foremost South Africa, have signaled that AU member States have no advantage from being bound by the Rome Statutes and the International Criminal Court (ICC). The development comes in response to what a growing number of African policy makers denounce as the ICC’s selective prosecution and the ICC being an impediment to conflict resolution.
  • South Africa’s governing African National Congress is trailblazing a development that could result in South Africa’s and eventually African Union (AU) member States’ withdrawal from the Rome Statute and the International Criminal Court (ICC). This month, former South African President Thabo Mbeki gave a lecture at the 2015 Tmali Alumni Forum that reflects a growing consensus among African nations. That is, that the ICC is notorious for selective prosecution, and especially for the prosecution of African and other political leaders and nationals from States with a policy that opposes the western neo-colonialist discourse.
  • Mbeki would also stress that the ICC is an impediment to conflict resolution on the African continent. Mbeki stressed the example of the ousted Ivorian President Laurent Gbagbo. Gbagbo was ousted by a clearly French-backed coup d’état in 2010. Gbagbo has since been extradited to The Hague.
  • ...2 more annotations...
  • The ousted President is still being held in pre-trial detention. Mbeki stressed that the presence of Gbagbo was crucial for national reconciliation in Ivory Coast. Mbeki would add that there are several indicators that suggest that a civil war could erupt during the upcoming elections in the country, and that the ICC’s detention of Gbagbo threatens the country’s stability and is an impediment to national reconciliation. It is noteworthy that Ivory Coast, as a former French colony, is a member of the UMEOA (UEMOA). The economies of the monetary union’s African constituents is dominated and to a large degree dictated by France. Several analysts argue that Gbagbo’s downfall came due to his ambitions to set an end to what is widely known a French Finance Nazism. One of the latest controversies between South Africa, the ICC and several dominant western powers focused on what the ICC touted as South Africa’s failure to arrest and extradite Sudanese President Omar al-Bashir. The South African and multiple other African governments in return, would argue that al-Bashir traveled to South Africa as President and representative of Sudan, enjoying diplomatic immunity. Another widely voiced objection to the ICC is that core permanent UN Security Council members USA, Russia and China are not subject to the provisions of the Rome Statute while the USA is among the first to call for prosecutions at the ICC. The ICC is, arguably, the plaything of superpowers and an extension of both colonialism and of Yalta.
  • AU member States, quitting the Rome Statute and ICC membership would be one step into a direction that may lead to increased independence from superpowers. Historical precedence has shown that it is a hazardous undertaking to challenge any superpower. The question is, how will South Africa and the AU play their cards and whether they play them in a manner that leads to sovereignty, or whether they play them in a manner that continues the post-Yalta hegemonic world that is euphemistically sold as a multi-polar world.
12More

Do We Really Want a New World War With Russia? | New Eastern Outlook - 0 views

  • Washington continues making an international fool of herself by her inability to effectively counter the impression around the world that Russia, spending less than 10% of the Pentagon annually on defense, has managed to do more against ISIS in Syria in six weeks than the mighty US Air Force bombing campaign has done in almost a year and half. One aspect that bears attention is the demonstration by the Russian military of new technologies that belie the widely-held Western notion that Russia is little more than a backward oil and raw material commodity exporter. Recent reorganization of the Russian state military industrial complex as well as reorganization of the Soviet-era armed forces under Defense Minister Sergey Shoigu’s term are visible in the success so far of Russia’s ISIS and other terror strikes across Syria. Clearly Russian military capabilities have undergone a sea-change since the Soviet Cold War era. In war there are never winners. Yet Russia has been in an unwanted war with Washington de facto since the George W. Bush Administration announced its lunatic plan to place what they euphemistically term “Ballistic Missile Defense” missiles and advanced radar in Poland, Czech Republic, Romania and Turkey after 2007. Without going into detail, BMD technologies are the opposite of defensive. They instead make a pre-emptive war highly likely. Of course the radioactive ash heap in such an exchange would be first and foremost the EU countries foolish enough to invite US BMD to their soil.
  • What the Russian General Staff has managed, since the precision air campaign began September 30, has stunned western defense planners with Russian technological feats not expected. Two specific technologies are worth looking at more closely: The Russian Sukoi SU-34 fighter-bomber and what is called the Bumblebee hyperbaric mortar weapon.
  • The plane responsible for some of the most damaging strikes on ISIS and other terror enclaves in Syria is manufactured by the Russian state aircraft industry under the name Sukhoi SU-34. As the Russian news agency RIA Novosti described the aircraft, “The Su-34 is meant to deliver a sufficiently large ordnance load to a predetermined area, hit the target accurately and take evasive action against pursuing enemy planes.” The plane is also designed to deal with enemy fighters in aerial combat such as the US F-16. The SU-34 made a first test flight in 1990 as the collapse of the Soviet Union and the chaos of the Yeltsin years caused many delays. Finally in 2010 the plane was in full production. According to a report in US Defense Industry Daily, among the SU-34 features are: • 8 ton ordnance load which can accommodate precision-guided weapons, as well as R-73/AA-11 Archer and R-77/AA-12 ‘AMRAAMSKI’ missiles and an internal 30mm GSh-301 gun. • Maximum speed of Mach 1.8 at altitude.
  • ...8 more annotations...
  • • 3,000 km range, extensible to “over 4,000 km” with the help of additional drop tanks. The SU-34 can also refuel in mid-air. • It can fly in TERCOM (Terrain Contour Matching) mode for low-level flight, and has software to execute a number of difficult maneuvers. • Leninets B004 phased array multimode X-band radar, which interleaves terrain-following radar and other modes.
  • Clearly the aircraft is impressive as it has demonstrated against terrorist centers in Syria. Now, however, beginning this month it will add a “game-changer” in the form of a new component. Speaking at the Dubai Air Show on November 12, Igor Nasenkov, the First Deputy General Director of the Radio-Electronic Technologies Concern (KRET) announced that this month, that is in the next few days, SUKHOI SU-34 fighter-bombers will become electronic warfare aircraft as well. Nasenkov explained that the new Khibiny aircraft electronic countermeasures (ECM) systems, installed on the wingtips, will give the SU-34 jets electronic warfare capabilities to launch effective electronic countermeasures against radar systems, anti-aircraft missile systems and airborne early warning and control aircraft. KRET is a holding or group of some 95 Russian state electronic companies formed in 2009 under the giant Russian state military industry holding, Rostec.
  • Russia’s advances in what is euphemistically termed in military jargon, Electronic Counter Measures or ECM, is causing some sleepless nights for the US Pentagon top brass to be sure. In the battles in eastern pro-Russian Ukraine earlier this year, as well as in the Black Sea, and now in Syria, according to ranking US military sources, Russia deployed highly-effective ECM technologies like the Krasukha-4, to successfully jam hostile radar and aircraft. Lt. General Ben Hodges, Commander of US Army Europe (USAREUR) describes Russian ECM capabilities used in Ukraine as “eye-watering,” suggesting some US and NATO officers are more than slightly disturbed by what they see. Ronald Pontius, deputy to Army Cyber Command’s chief, Lt. Gen. Edward Cardon, told a conference in October that, “You can’t but come to the conclusion that we’re not making progress at the pace the threat demands.” In short, Pentagon planners have been caught flat-footed for all the trillions of wasted US taxpayer dollars in recent years thrown at the military industry.
  • During the critical days of the March 2014 Crimean citizens’ referendum vote to appeal for status within Russia, New York Times reporters then in Crimea reported the presence of Russian electronic jamming systems, known as R-330Zh Zhitel, manufactured by Protek in Voronezh, Russia. That state-of-the-art technology was believed to have been used to prevent the Ukrainian Army from invading Crimea before the referendum. Russian forces in Crimea, where Russia had a legal basing agreement with Kiev, reportedly were able to block all communication of Kiev military forces, preventing a Crimean bloodbath. Washington was stunned.
  • Thereafter, in April, 2014, one month after the accession of Crimea into the Russian Federation, President Obama ordered the USS Donald Cook into the Black Sea waters just off Crimea, the home port of Russia’s Black Sea Fleet, to “reassure” EU states of US resolve. Donald Cook was no ordinary guided missile destroyer. It had been refitted to be one of four ships as part of Washington’s Aegis Ballistic Missile Defense System aimed at Russia’s nuclear arsenal. USS Donald Cook boldly entered the Black Sea on April 8 heading to Russian territorial waters. On April 12, just four days later, the US ship inexplicably left the area of the Crimean waters of the Black Sea for a port in NATO-member Romania. From there it left the Black Sea entirely. A report on April 30, 2014 in Russian newspaper Rossiyskaya Gazeta Online titled, “What Frightened the American Destroyer,” stated that while the USS Donald Cook was near Crimean (Russian by that time) waters, a Russian Su-24 Frontal Aviation bomber conducted a flyby of the destroyer. The Rossiyskaya Gazeta went on to write that the Russian SU-24 “did not have bombs or missiles onboard. One canister with the Khibin electronic warfare complex was suspended under the fuselage.” As it got close to the US destroyer, the Khibins turned off the USS Donald Cook’s “radar, combat control circuits, and data transmission system – in short, they turned off the entire Aegis just like we turn off a television by pressing the button on the control panel. After this, the Su-24 simulated a missile launch at the blind and deaf ship. Later, it happened once again, and again – a total of 12 times.”
  • While the US Army denied the incident as Russian propaganda, the fact is that USS Donald Cook never approached Russian Black Sea waters again. Nor did NATO ships that replaced it in the Black Sea. A report in 2015 by the US Army’s Foreign Military Studies Office assessed that Russia, “does indeed possess a growing EW capability, and the political and military leadership understand the importance…Their growing ability to blind or disrupt digital communications might help level the playing field when fighting against a superior conventional foe.” Now new Russian Khibini Electronic Counter Measure systems are being installed on the wingtips of Russia’s SUKHOI SU-34 fighter-bombers going after ISIS in Syria.
  • A second highly-advanced new Russian military technology that’s raising more than eyebrows in US Defense Secretary ‘Ash’ Carter’s Pentagon is Russia’s new Bumblebee which Russia’s military classifies as a flamethrower. In reality it is a highly advanced thermobaric weapon which launches a warhead that uses a combination of an explosive charge and highly combustible fuel. When the rocket reaches the target, the fuel is dispersed in a cloud that is then detonated by the explosive charge. US Military experts recently asked by the US scientific and engineering magazine Popular Mechanics to evaluate the Bumblebee stated that, “the resulting explosion is devastating, radiating a shockwave and fireball up to six or seven meters in diameter.” The US experts noted that the Bumblebee is “especially useful against troops in bunkers, trenches, and even armored vehicles, as the dispersing gas can enter small spaces and allow the fireball to expand inside. Thermobarics are particularly devastating to buildings — a thermobaric round entering a structure can literally blow up the building from within with overpressure.”
  • We don’t go into yet another new highly secret Russian military technology recently subject of a Russian TV report beyond a brief mention, as little is known. It is indicative of what is being developed as Russia prepares for the unthinkable from Washington. The “Ocean Multipurpose System: Status-6” is a new Russian nuclear submarine weapons system designed to bypass NATO radars and any existing missile defense systems, while causing heavy damage to “important economic facilities” along the enemy’s coastal regions. Reportedly the Status-6 will cause what the Russian military terms, “assured unacceptable damage” to an adversary force. They state that its detonation “in the area of the enemy coast” (say, New York or Boston or Washington?) would result in “extensive zones of radioactive contamination” that would ensure that the region would not be used for “military, economic, business or other activity for a long time.” Status-6 reportedly is a massive torpedo, designated as a “self-propelled underwater vehicle.” It has a range of up to 10 thousand kilometers and can operate at a depth of up to 1,000 meters. At a November 10 meeting with the Russian military chiefs, Vladimir Putin stated that Russia would counter NATO’s US-led missile shield program through “new strike systems capable of penetrating any missile defenses.” Presumably he was referring to Status-6.
  •  
    Not to mentiont that Russia has deployed its S-400 surface to air defense system to Syria, which is 2 generations later than the currently deployed U.S. Patriot systems. The S-400 can knock down aircraft or missiles flying up to 90,000 feet and travels at over 17,000 mph, very near Earth escape velocity. It has a lateral range of nearly 300 miles.
1More

What's Really Going on With Oil? | New Eastern Outlook - 0 views

  • If there is any single price of any commodity that determines the growth or slowdown of our economy, it is the price of crude oil. Too many things don’t calculate today in regard to the dramatic fall in the world oil price. In June 2014 major oil traded at $103 a barrel. With some experience following the geopolitics of oil and oil markets, I smell a big skunk. Let me share some things that for me don’t add up. First appeared: http://journal-neo.org/2016/01/24/whats-really-going-on-with-oil/
3More

EFF Pries More Information on Zero Days from the Government's Grasp | Electronic Fronti... - 0 views

  • Until just last week, the U.S. government kept up the charade that its use of a stockpile of security vulnerabilities for hacking was a closely held secret.1 In fact, in response to EFF’s FOIA suit to get access to the official U.S. policy on zero days, the government redacted every single reference to “offensive” use of vulnerabilities. To add insult to injury, the government’s claim was that even admitting to offensive use would cause damage to national security. Now, in the face of EFF’s brief marshaling overwhelming evidence to the contrary, the charade is over. In response to EFF’s motion for summary judgment, the government has disclosed a new version of the Vulnerabilities Equities Process, minus many of the worst redactions. First and foremost, it now admits that the “discovery of vulnerabilities in commercial information technology may present competing ‘equities’ for the [government’s] offensive and defensive mission.” That might seem painfully obvious—a flaw or backdoor in a Juniper router is dangerous for anyone running a network, whether that network is in the U.S. or Iran. But the government’s failure to adequately weigh these “competing equities” was so severe that in 2013 a group of experts appointed by President Obama recommended that the policy favor disclosure “in almost all instances for widely used code.” [.pdf].
  • The newly disclosed version of the Vulnerabilities Equities Process (VEP) also officially confirms what everyone already knew: the use of zero days isn’t confined to the spies. Rather, the policy states that the “law enforcement community may want to use information pertaining to a vulnerability for similar offensive or defensive purposes but for the ultimate end of law enforcement.” Similarly it explains that “counterintelligence equities can be defensive, offensive, and/or law enforcement-related” and may “also have prosecutorial responsibilities.” Given that the government is currently prosecuting users for committing crimes over Tor hidden services, and that it identified these individuals using vulnerabilities called a “Network Investigative Technique”, this too doesn’t exactly come as a shocker. Just a few weeks ago, the government swore that even acknowledging the mere fact that it uses vulnerabilities offensively “could be expected to cause serious damage to the national security.” That’s a standard move in FOIA cases involving classified information, even though the government unnecessarily classifies documents at an astounding rate. In this case, the government relented only after nearly a year and a half of litigation by EFF. The government would be well advised to stop relying on such weak secrecy claims—it only risks undermining its own credibility.
  • The new version of the VEP also reveals significantly more information about the general process the government follows when a vulnerability is identified. In a nutshell, an agency that discovers a zero day is responsible for invoking the VEP, which then provides for centralized coordination and weighing of equities among all affected agencies. Along with a declaration from an official at the Office of the Director of National Intelligence, this new information provides more background on the reasons why the government decided to develop an overarching zero day policy in the first place: it “recognized that not all organizations see the entire picture of vulnerabilities, and each organization may have its own equities and concerns regarding the prioritization of patches and fixes, as well as its own distinct mission obligations.” We now know the VEP was finalized in February 2010, but the government apparently failed to implement it in any substantial way, prompting the presidential review group’s recommendation to prioritize disclosure over offensive hacking. We’re glad to have forced a little more transparency on this important issue, but the government is still foolishly holding on to a few last redactions, including refusing to name which agencies participate in the VEP. That’s just not supportable, and we’ll be in court next month to argue that the names of these agencies must be disclosed. 
4More

Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails "Top Secret" - 0 views

  • Indictment Looms For Hillary As FBI Declares 22 Home-Server Emails “Top Secret” The leaking of the Clinton emails has been compared to as the next “Watergate”. By ZeroHedge.com | January 30, 2016 Share this article! targ
  • The State Department will release more emails from Clinton’s time as secretary of state later Friday. But The Associated Press has learned that 7 email chains are being withheld in full for containing “top secret” material. The 37 pages include messages recently described by a key intelligence official as concerning so-called “special access programs” — a highly restricted subset of classified material that could point to confidential sources or clandestine programs like drone strikes or government eavesdropping. Department officials wouldn’t describe the substance of the emails, or say if Clinton had sent any herself. Spokesman John Kirby tells the AP that no judgment on past classification was made. But the department is looking into that, too.
  • For those that Clinton only read, and didn’t write or forward, she still would have been required to report classification slippages that she recognized. Possible responses for classification infractions include counseling, warnings or other action, State Department officials said, though they declined to say if these applied to Clinton or senior aides who’ve since left the department. The officials weren’t authorized to speak on the matter and spoke on condition of anonymity. However, as we previously noted, the implications are tough for The DoJ – if they indict they crush their own candidate’s chances of the Presidency, if they do not – someone will leak the details and the FBI will revolt… The leaking of the Clinton emails has been compared to as the next “Watergate” by former U.S. Attorney Joe DiGenova this week, if current FBI investigations don’t proceed in an appropriate manner. The revelation comes after more emails from Hilary Clinton’s personal email have come to light. “[The investigation has reached] a critical mass,” DiGenova told radio host Laura Ingraham when discussing the FBI’s still pending investigation. Though Clinton is still yet to be charged with any crime, DiGenova advised on Tuesday that changes may be on the horizon. The mishandling over the classified intelligence may lead to an imminent indictment, with DiGenova suggesting it may come to a head within 60 days.
  • ...1 more annotation...
  • I believe that the evidence that the FBI is compiling will be so compelling that, unless [Lynch] agrees to the charges, there will be a massive revolt inside the FBI, which she will not be able to survive as an attorney general,” he said. “The intelligence community will not stand for that. They will fight for indictment and they are already in the process of gearing themselves to basically revolt if she refuses to bring charges.” The FBI also is looking into Clinton’s email setup, but has said nothing about the nature of its probe. Independent experts say it is highly unlikely that Clinton will be charged with wrongdoing, based on the limited details that have surfaced up to now and the lack of indications that she intended to break any laws. “What I would hope comes out of all of this is a bit of humility” and an acknowledgement from Clinton that “I made some serious mistakes,” said Bradley Moss, a Washington lawyer who regularly handles security clearance matters. Legal questions aside, it’s the potential political costs that are probably of more immediate concern for Clinton. She has struggled in surveys measuring her perceived trustworthiness and an active federal investigation, especially one buoyed by evidence that top secret material coursed through her account, could negate one of her main selling points for becoming commander in chief: Her national security resume.
5More

Distrust of US surveillance threatens data deal | TheHill - 0 views

  • European privacy regulators are putting U.S. surveillance practices under the microscope, this time with a crucial transatlantic data deal hanging in the balance.Legal and privacy advocates say European nations are poised to strike down the deal if they decide the U.S. hasn't done enough to reform its spying programs.The new test comes after the European Commission and the Commerce Department — after months of tense negotiations — reached a deal this week permitting Facebook, Google and thousands of other companies to continue legally handling Europeans’ personal data.ADVERTISEMENTCritics though have long warned that unless the U.S. overhauls its privacy and national security laws, there is no legal framework that can stand up in European court, where privacy is considered a fundamental right under the EU Charter.A working group of 28 EU nations’ data protection authorities — domestic entities separate from the Commission that will be in charge of enforcing the new agreement — may now cast the deciding vote.The group is spending the next few months picking through the so-called Privacy Shield agreement to determine if it adequately protects the personal data of European citizens.
  • “The Commission has said, ‘We’re satisfied. We believe them. We believe the U.S. has substantially changed its practices,’ and they are no longer going off the [Edward] Snowden revelations in the media,” said Susan Foster, a privacy attorney at Mintz Levin who works in both the EU and the U.S.“Whether the working group will go along with it is another question.”The privacy advocate whose complaint against Facebook brought down the Privacy Shield’s 15-year-old predecessor agreement is already questioning the new deal’s validity.“With all due respect ... a couple of letters by the outgoing Obama administration is by no means a legal basis to guarantee the fundamental rights of 500 million European users in the long run, when there is explicit U.S. law allowing mass surveillance,” Max Schrems of Austria said in a statement Tuesday.The United States has been fighting against the perception that it tramples on civil liberties after ex-National Security Agency contractor Edward Snowden revealed the breadth of the agency’s snooping.One sticking point in the Privacy Shield negotiations was over the scope of an exception allowing surveillance for national security purposes.
  • In announcing the deal, Commission officials insisted that the U.S. had provided “detailed written assurances” that surveillance of Europeans’ data by intelligence agencies would be subject to appropriate limitations.“The U.S. has clarified that they do not carry out indiscriminate surveillance of Europeans,” Andrus Ansip, Vice President for the Digital Single Market on the European Commission, said Tuesday.The U.S. has also agreed to create an office in the State Department, to address complaints from EU citizens who feel their data has been inappropriately accessed by intelligence authorities.Complicating the working group’s approval of the deal is the hodgepodge of competing regulators in Europe. Each nation has an agency in charge of its own country’s regulation. Some countries — such as Germany — are seen as tougher on privacy than others, like France or the U.K.While some countries consider U.S. privacy protections to be satisfactory, in others they are seen as woefully inadequate.
  • ...2 more annotations...
  • Defenders of U.S. intelligence practices often point to France and the U.K., arguing they are equally intrusive with their citizens' data.A recent public report “pretty clearly documented that the protections are patchy, vary hugely and are nonexistent in some of the countries,” Foster noted.Privacy advocates dismiss those arguments.“You cannot pick the worst member state, like the U.K., and claim you are ‘equivalent’ to that,” Schrems said Tuesday. “First, this is not a price [sic] you want to win, secondly you have to meet the standards of the European Court of Justice, EU law and the EU Charter of Fundamental Rights — not the standard of the worst member state.”The U.S. has made significant reforms to federal spying powers under the Obama administration.The Privacy and Civil Liberties Oversight Board — a small bipartisan watchdog — on Friday said the government has begun addressing each of the nearly two-dozen recommendations it made following Snowden's revelations.“[I]mportant measures have been taken to enhance the protection of Americans’ privacy and civil liberties and to strengthen the transparency of the government’s surveillance efforts, without jeopardizing our counterterrorism efforts,” the five-member board said.
  • But whether European countries believe those changes are sufficient to sign off on the Privacy Shield is uncertain. Each of the EU’s 28 member states must approve the deal before it can be finalized.“A lot of this is going to come down to whether the data protection authorities are persuaded by the U.S.’s portrayal of the cumulative protections given to European citizens and the cumulative carving back on the NSA surveillance programs,” Foster said.If the European working group is not satisfied with the assurances from the Commerce Department, the consequences could be dire. Businesses fear a chilling of transatlantic trade, valued at $1 trillion in 2014.The most likely outcome, experts say, would be a patchwork of country-to-country regulations that would make it extremely expensive for companies to comply.Legislative changes in the U.S. seem unlikely. Congress is close to passing a privacy law considered crucial to getting seeing the Privacy Shield approved. But the bill — which gives EU citizens the right to sue in U.S. courts over the misuse of personal data — has sparked controversy on Capitol Hill.Some lawmakers are expressing frustration that the EU has used the threat of enforcement action against U.S. companies to push Congress to make more concessions.“It’s been hard enough to get the Judicial Redress Act passed — if they’re going to make more demands on Congress, there won’t be a lot of willing listeners here,” Sen. Chris Murphy (D-Conn.) told The Hill on Thursday.
« First ‹ Previous 241 - 260 of 282 Next › Last »
Showing 20 items per page