Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "public-trust" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

The Public-Private Surveillance Partnership - Bloomberg - 1 views

  •  
    Incredible must read article by Bruce Schneier, author of "Liars and Outliers: Enabling the Trust Society Needs to Thrive." Bruce makes the argument that the Government and big Corporations are locked in a parasitical symbiotic relationship, with the citizen being the host they feed on.   He argues that modern citizens need Internet communications and data services.  The corporate service providers need to "collect" massive amounts of citizen data to further their profit models. So the corporations need continuing government consent to use the personal citizen information.  The government seeks to control citizens, and needs access to the personal information the corporations are collecting.  The mutually beneficial symbiosis is formed.  One that will prove very difficult for citizens to turn back. Great piece of thinking!!!  Must read.
6More

Newly declassified documents reveal how U.S. agreed to Israel's nuclear program - Diplo... - 0 views

  • The Obama administration this week declassified papers, after 45 years of top-secret status, documenting contacts between Jerusalem and Washington over American agreement to the existence of an Israeli nuclear option. The Interagency Security Classification Appeals Panel (ISCAP), which is in charge of approving declassification, had for decades consistently refused to declassify these secrets of the Israeli nuclear program. The documents outline how the American administration worked ahead of the meeting between President Richard Nixon and Prime Minister Golda Meir at the White House in September 1969, as officials came to terms with a three-part Israeli refusal – to sign the Non-Proliferation Treaty; to agree to American inspection of the Dimona nuclear facility; and to condition delivery of fighter jets on Israel’s agreement to give up nuclear weaponry in exchange for strategic ground-to-ground Jericho missiles “capable of reaching the Arab capitals” although “not all the Arab capitals.”
  • The officials – cabinet secretaries and senior advisers who wrote the documents – withdrew step after step from an ambitious plan to block Israeli nuclearization, until they finally acceded, in internal correspondence – the content of the conversation between Nixon and Meir is still classified – to recognition of Israel as a threshold nuclear state. In fact, according to the American documents, the Nixon administration defined a double threshold for Israel’s move from a “technical option” to a “possessor” of nuclear weapons. The first threshold was the possession of “the components of nuclear weapons that will explode,” and making them a part of the Israel Defense Forces operational inventory.
  • The second threshold was public confirmation of suspicions internationally, and in Arab countries in particular, of the existence of nuclear weapons in Israel, by means of testing and “making public the fact of the possession of nuclear weapons.” Officials under Nixon proposed to him, on the eve of his conversation with Meir, to show restraint with regard to the Israeli nuclear program, and to abandon efforts to get Israel to cease acquiring 500-kilometer-range missiles with one-ton warheads developed in the Marcel Dassault factory in France, if it could reach an agreement with Israel on these points.
  • ...2 more annotations...
  • The Johnson and Nixon administrations concluded that, in talks with Rabin, it had been stated in a manner both “explicit and implicit” that “Israel wants nuclear weapons, for two reasons: First, to deter the Arabs from striking Israel; and second, if deterrence fails and Israel were about to be overrun, to destroy the Arabs in a nuclear Armageddon.”
  • According to the documents, the Nixon administration believed that Israel’s acquisition of nuclear weapons would spur the Arab countries to acquire their own such weapons within 10 years, through private contracts with scientists and engineers in Europe. Moreover, “deeply rooted in the Arab psyche is the concept that a settlement will be possible only when there is some parity in strength with Israel. A ‘kamikaze’ strike at the Dimona facilities cannot be ruled out,” the document states.
  •  
    "The Johnson and Nixon administrations concluded that, in talks with Rabin, it had been stated in a manner both 'explicit and implicit' that 'Israel wants nuclear weapons, for two reasons: First, to deter the Arabs from striking Israel; and second, if deterrence fails and Israel were about to be overrun, to destroy the Arabs in a nuclear Armageddon.'" Which just goes to show that Israel's leadership was very bit as looney-tunes as the U.S. leadership was with its "MAD" Mutually Assured Destruction strategy. What is there about democracy that permits psychopaths to acquire the power they so insanely crave? Humanity would have far better odds of surviving the next 100 years if all members of Congress now chosen by voting were instead chosen from the general population at random and limited to a single term. Then let Congress choose the President and Vice President from five people also randomly chosen. That would also result in a Congress far more representative of the People's interests. Anyone with a rudimentary understanding of Statistics could prove that mathematically. To boot, that would take care of the campaign finance issues, since there wouldn't be any elections for federal office. Give me 24 hours notice and I'll have the necessary constitutional amendments written. Let's call them the No More Lunatics Running This Asylum Amendments. Or with a bit more thought we could have a name with an acronym that's more descriptive, something like the SANE Amendments. Let's see: the Save America from Nutjobs Evermore Amendments, or ....   Never mind for now. You do the political organizing to get the Amendments adopted and let me know when. I'll crank out the wordsmith work product for the Amendments.  Sheesh! As I've said for years, if it be true that Man was was created in the image of the Creator, that is irrefutable proof that the Creator is as dumb as a doornail and insane to boot. "[I]t it is not really possible to deter Arab leaders when they themse
2More

Letter Calls Plea Deal for David Petraeus a 'Profound Double Standard' - NYTimes.com - 0 views

  • The plea deal given to retired Gen. David H. Petraeus, which spares him prison time even though he gave military secrets to his mistress, reveals a “profound double standard” in the way the Obama administration treats people who leak classified information, a lawyer for an imprisoned government contractor wrote in a letter to prosecutors.
  •  
    Interesting article that explores double standards in plea bargains for low and high ranking U.S. officials who leak classified information. In the Petraeus case, I recall a statement by Diane Feinstein, who praised Petreus for excellent service to the government in the same interview, to the effect that Petraeus deserved leniency because his fall from such a high position in the government was sufficient punishment.  That's a recurring canard when a high official gets a slap on the wrist rather than prison time: [i] "falling into prison" is a much higher fall than a fall from power; [ii] a high official with greater power should be held to a higher standard of public trust than lower level officials, not a lower standard; and [iii] certainty of not doing prison time because of one's power encourages misconduct rather than deterring it. But double standards for the very  rich and the very powerful are far from a recent development and hardly unique to the U.S.  
6More

Obama's crackdown views leaks as aiding enemies of U.S. | McClatchy - 0 views

  • Even before a former U.S. intelligence contractor exposed the secret collection of Americans’ phone records, the Obama administration was pressing a government-wide crackdown on security threats that requires federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions. President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.
  • Government documents reviewed by McClatchy illustrate how some agencies are using that latitude to pursue unauthorized disclosures of any information, not just classified material. They also show how millions of federal employees and contractors must watch for “high-risk persons or behaviors” among co-workers and could face penalties, including criminal charges, for failing to report them. Leaks to the media are equated with espionage.
  • Employees must turn themselves and others in for failing to report breaches. “Penalize clearly identifiable failures to report security infractions and violations, including any lack of self-reporting,” the strategic plan says.The Obama administration already was pursuing an unprecedented number of leak prosecutions, and some in Congress – long one of the most prolific spillers of secrets – favor tightening restrictions on reporters’ access to federal agencies, making many U.S. officials reluctant to even disclose unclassified matters to the public. The policy, which partly relies on behavior profiles, also could discourage creative thinking and fuel conformist “group think” of the kind that was blamed for the CIA’s erroneous assessment that Iraq was hiding weapons of mass destruction, a judgment that underpinned the 2003 U.S. invasion. “The real danger is that you get a bland common denominator working in the government,” warned Ilana Greenstein, a former CIA case officer who says she quit the agency after being falsely accused of being a security risk. “You don’t get people speaking up when there’s wrongdoing. You don’t get people who look at things in a different way and who are willing to stand up for things. What you get are people who toe the party line, and that’s really dangerous for national security.”
  • ...3 more annotations...
  • The program could make it easier for the government to stifle the flow of unclassified and potentially vital information to the public, while creating toxic work environments poisoned by unfounded suspicions and spurious investigations of loyal Americans, according to these current and former officials and experts. Some non-intelligence agencies already are urging employees to watch their co-workers for “indicators” that include stress, divorce and financial problems.
  • The program, however, gives agencies such wide latitude in crafting their responses to insider threats that someone deemed a risk in one agency could be characterized as harmless in another. Even inside an agency, one manager’s disgruntled employee might become another’s threat to national security. Obama in November approved “minimum standards” giving departments and agencies considerable leeway in developing their insider threat programs, leading to a potential hodgepodge of interpretations. He instructed them to not only root out leakers but people who might be prone to “violent acts against the government or the nation” and “potential espionage.”
  • The Department of Education, meanwhile, informs employees that co-workers going through “certain life experiences . . . might turn a trusted user into an insider threat.” Those experiences, the department says in a computer training manual, include “stress, divorce, financial problems” or “frustrations with co-workers or the organization.”An online tutorial titled “Treason 101” teaches Department of Agriculture and National Oceanic and Atmospheric Administration employees to recognize the psychological profile of spies.
2More

Panama Papers database of offshore companies goes public - Chicago Tribune - 0 views

  • group of investigative journalists made live the names of thousands of offshore companies based on a massive trove of data on the finances of the rich and powerful that has become known as the Panama Papers.The International Consortium of Investigative Journalists made data on 200,000 entities available on Monday at 1 p.m. CT on its website. They contain basic corporate information about companies, trusts and foundations set up in 21 jurisdictions including Hong Kong and the U.S. state of Nevada. The data was obtained from Panamanian law firm Mossack Foneca, which said it was hacked.Users can search the data and see the networks involving the offshore companies, including, where available, Mossack Fonseca's internal records of the true owners.
  • It won't be the full cache of data commonly known as the Panama Papers, since the database will exclude information and documents on bank accounts, phone numbers and emails.The ICIJ said it was putting the information online "in the public interest" as "a careful release of basic corporate information" as it builds on an earlier database of offshore entities.Setting up an offshore company is not by itself illegal or evidence of illegal conduct, and Mossack Fonseca said it observed rules requiring it to identify its clients.But anti-poverty campaigners say shell companies can be used by the wealthy and powerful to shield money from taxation, or to launder the gains from bribery, embezzlement and other forms of corruption. The Group of 20 most powerful economies has agreed that individual governments should make sure authorities can tell who really owns companies, but implementation in national law has lagged.
11More

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Leve... - 0 views

    • Paul Merrell
       
      There goes the neighborhood; the Feds are moving in. 
  • In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, it’s all being done in secret.
  • According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.
  • ...8 more annotations...
  • as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.) It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.
  • The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers.
  • The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn’t revealed until now, however, was the enormity of this ongoing domestic spying program. For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail.
  • one of the deepest secrets of the Stellar Wind program—again, never confirmed until now—was that the NSA gained warrantless access to AT&T’s vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex. Verizon was also part of the program
  • the NSA succeeded in building an even faster supercomputer. “They made a big breakthrough,” says another former senior intelligence official, who helped oversee the program. The NSA’s machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES.
  • The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”
  • But the real competition will take place in the classified realm. To secretly develop the new exaflop (or higher) machine by 2018, the NSA has proposed constructing two connecting buildings, totaling 260,000 square feet, near its current facility on the East Campus of Oak Ridge. Called the Multiprogram Computational Data Center,
  • n the meantime Cray is working on the next step for the NSA, funded in part by a $250 million contract with the Defense Advanced Research Projects Agency. It’s a massively parallel supercomputer called Cascade, a prototype of which is due at the end of 2012. Its development will run largely in parallel with the unclassified effort for the DOE and other partner agencies. That project, due in 2013, will upgrade the Jaguar XT5 into an XK6, codenamed Titan, upping its speed to 10 to 20 petaflops.
16More

N.S.A. Able to Foil Basic Safeguards of Privacy on Web - NYTimes.com - 1 views

  • The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
  • The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
  • The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
  • ...11 more annotations...
  • “For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
  • Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.
  • For at least three years, one document says, GCHQ, almost certainly in collaboration with the N.S.A., has been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document. (Google denied giving any government access and said it had no evidence its systems had been breached).
  • Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip. “And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.
  • The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus on GCHQ but include thousands from or about the N.S.A. Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.
  • The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June. “Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.
  • Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.
  • At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service.
  • Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method. Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology and later by the International Organization for Standardization, which has 163 countries as members. Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.” “Eventually, N.S.A. became the sole editor,” the memo says.
  • But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence. A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum.
  • Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”
  •  
    Lengthy article, lots of new information on NSA decryption capabilities, none of it good for those who value their data privacy.
  •  
    Thanks Paul - nice job cutting this monster down to size :)
11More

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
4More

Adel Daoud's lawyer claims Hillside teen caught in 'fake war on terror' contrived by U.... - 0 views

  • (CHICAGO) (WLS) -- Lawyers for a west suburban teenager charged with a downtown bomb plot say he was caught in a "fake war on terror" contrived by U.S. spy agencies. Each week it seems as though there is a new salvo of accusations by the legal team defending Hillside 19-year-old Adel Daoud. On Tuesday, a court filing by Daoud's attorneys characterizes U.S. spy agencies as outlaw arms of the government that snagged the west suburban teenager in a dummied-up bomb plot. The nation's intelligence gathering agencies, they believe, are operating in what amounts to a fourth, runaway, branch of government. Daoud was arrested a little more than a year ago, according to authorities planning to detonate a car bomb at this downtown intersection that would take out a popular nearby bar--if it was real. But the so-called plot was a sting operation and the bomb operatives worked for the FBI.
  • "Look, he's a young kid," said Daoud attorney Thomas Durkin. "He just graduated from high school." Durkin, from the beginning, has cried foul about the government investigation and tactics. In the sharply-critical Daoud surveillance motion filed Tuesday, Durkin states that the government has concocted a "fake choice between national security and civil rights, not unlike the fake war being conducted in our name against terror." Durkin, a former assistant U.S. Attorney in Chicago, states that: "The usually reliable representations of the U.S. Attorney's office can no longer be trusted. . .because the intelligence agencies. . . simply do not inform the local prosecutors of all material information." "The spy agencies," Durkin writes, "are as fearful of the prosecutors as they are defense counsel". . .and "just as easily compromised."
  • During the investigation, FBI agents secretly recorded phone conversations at the suspect's home, and elsewhere, and they monitored internet communications. Prosecutors have argued that evidence must be held in secret, from both the public and the defendant-- and so far, the courts have agreed. Lawyers for the 19-year old man from west suburban Chicago are challenging the initial legal grounds permitting authorities to monitor his communications. They contend Daoud may have been targeted by intelligence agencies for viewpoints expressed on the internet. The accused teenage jihadist remains in federal custody without bail, where he has been for 14 months. Authorities have said that Daoud made statements he intended to kill 100 people and injure 300. As his attorney continues a vigorous challenge of government tools and tactics, prosecutors declined to comment to the I-Team.
  •  
    This is the case that Sen. Diane Feinstein bragged about having been broken by NSA surveillance. But the government still clings to its position that neither the defense nor the public should be allowed to see the NSA intelligence. The judge in the case originally sided with the government. See order at https://archive.org/stream/781913-daoud-motion-denied#page/n0/mode/1up It bears reminding that the Justice Dept. had told the Supreme Court that such materials would be available for criminal defendants to challenge in persuading the Court that a lawsuit brought by Amnesty International would not be the only avenue to challenge NSA surveillance. The Court repeated that promise in its opinion dismissing the Amnesty International case. But the issue is still alive. Daod is still in jail pending trial. And I'll hazard a guess that his defense just acquired new wheels with yesterday's disclosure of NSA surveillance being used to ruin the reputations of non-terrorists because of the content of their speech.  
19More

Fukushima - A Global Threat That Requires a Global Response - 0 views

  • The story of Fukushima should be on the front pages of every newspaper. Instead, it is rarely mentioned. The problems at Fukushima are unprecedented in human experience and involve a high risk of radiation events larger than any that the global community has ever experienced. It is going to take the best engineering minds in the world to solve these problems and to diminish their global impact. When we researched the realities of Fukushima in preparation for this article, words like apocalyptic, cataclysmic and Earth-threatening came to mind. But, when we say such things, people react as if we were the little red hen screaming "the sky is falling" and the reports are ignored. So, we’re going to present what is known in this article and you can decide whether we are facing a potentially cataclysmic event.
  • There are three major problems at Fukushima: (1) Three reactor cores are missing; (2) Radiated water has been leaking from the plant in mass quantities for 2.5 years; and (3) Eleven thousand spent nuclear fuel rods, perhaps the most dangerous things ever created by humans, are stored at the plant and need to be removed, 1,533 of those are in a very precarious and dangerous position. Each of these three could result in dramatic radiation events, unlike any radiation exposure humans have ever experienced.  We’ll discuss them in order, saving the most dangerous for last.
  • Missing reactor cores:  Since the accident at Fukushima on March 11, 2011, three reactor cores have gone missing.  There was an unprecedented three reactor ‘melt-down.’ These melted cores, called corium lavas, are thought to have passed through the basements of reactor buildings 1, 2 and 3, and to be somewhere in the ground underneath.  Harvey Wasserman, who has been working on nuclear energy issues for over 40 years, tells us that during those four decades no one ever talked about the possibility of a multiple meltdown, but that is what occurred at Fukushima.  It is an unprecedented situation to not know where these cores are. TEPCO is pouring water where they think the cores are, but they are not sure. There are occasional steam eruptions coming from the grounds of the reactors, so the cores are thought to still be hot. The concern is that the corium lavas will enter or may have already entered the aquifer below the plant. That would contaminate a much larger area with radioactive elements. Some suggest that it would require the area surrounding Tokyo, 40 million people, to be evacuated. Another concern is that if the corium lavas enter the aquifer, they could create a "super-heated pressurized steam reaction beneath a layer of caprock causing a major 'hydrovolcanic' explosion." A further concern is that a large reserve of groundwater which is coming in contact with the corium lavas is migrating towards the ocean at the rate of four meters per month. This could release greater amounts of radiation than were released in the early days of the disaster.
  • ...15 more annotations...
  • Radioactive water leaking into the Pacific Ocean:  TEPCO did not admit that leaks of radioactive water were occurring until July of this year. Shunichi Tanaka the head of Japan’s Nuclear Regulation Authority finally told reporters this July that radioactive water has been leaking into the Pacific Ocean since the disaster hit over two years ago. This is the largest single contribution of radionuclides to the marine environment ever observed according to a report by the French Institute for Radiological Protection and Nuclear Safety.  The Japanese government finally admitted that the situation was urgent this September – an emergency they did not acknowledge until 2.5 years after the water problem began. How much radioactive water is leaking into the ocean? An estimated 300 tons (71,895 gallons/272,152 liters) of contaminated water is flowing into the ocean every day.  The first radioactive ocean plume released by the Fukushima nuclear power plant disaster will take three years to reach the shores of the United States.  This means, according to a new study from the University of New South Wales, the United States will experience the first radioactive water coming to its shores sometime in early 2014.
  • One month after Fukushima, the FDA announced it was going to stop testing fish in the Pacific Ocean for radiation.  But, independent research is showing that every bluefin tuna tested in the waters off California has been contaminated with radiation that originated in Fukushima. Daniel Madigan, the marine ecologist who led the Stanford University study from May of 2012 was quoted in the Wall Street Journal saying, "The tuna packaged it up (the radiation) and brought it across the world’s largest ocean. We were definitely surprised to see it at all and even more surprised to see it in every one we measured." Marine biologist Nicholas Fisher of Stony Brook University in New York State, another member of the study group, said: "We found that absolutely every one of them had comparable concentrations of cesium 134 and cesium 137." In addition, Science reports that fish near Fukushima are being found to have high levels of the radioactive isotope, cesium-134. The levels found in these fish are not decreasing,  which indicates that radiation-polluted water continues to leak into the ocean. At least 42 fish species from the area around the plant are considered unsafe.  South Korea has banned Japanese fish as a result of the ongoing leaks.
  • Wasserman builds on the analogy, telling us it is "worse than pulling cigarettes out of a crumbled cigarette pack." It is likely they used salt water as a coolant out of desperation, which would cause corrosion because the rods were never meant to be in salt water.  The condition of the rods is unknown. There is debris in the coolant, so there has been some crumbling from somewhere. Gundersen  adds, "The roof has fallen in, which further distorted the racks," noting that if a fuel rod snaps, it will release radioactive gas which will require at a minimum evacuation of the plant. They will release those gases into the atmosphere and try again. The Japan Times writes: "The consequences could be far more severe than any nuclear accident the world has ever seen. If a fuel rod is dropped, breaks or becomes entangled while being removed, possible worst case scenarios include a big explosion, a meltdown in the pool, or a large fire. Any of these situations could lead to massive releases of deadly radionuclides into the atmosphere, putting much of Japan — including Tokyo and Yokohama — and even neighboring countries at serious risk."  
  • The most recent news on the water problem at Fukushima adds to the concerns. On October 11, 2013, TEPCO disclosed that the radioactivity level spiked 6,500 times at a Fukushima well.  "TEPCO said the findings show that radioactive substances like strontium have reached the groundwater. High levels of tritium, which transfers much easier in water than strontium, had already been detected." Spent Fuel Rods:  As bad as the problems of radioactive water and missing cores are, the biggest problem at Fukushima comes from the spent fuel rods.  The plant has been in operation for 40 years. As a result, they are storing 11 thousand spent fuel rods on the grounds of the Fukushima plant. These fuel rods are composed of highly radioactive materials such as plutonium and uranium. They are about the width of a thumb and about 15 feet long. The biggest and most immediate challenge is the 1,533 spent fuel rods packed tightly in a pool four floors above Reactor 4.  Before the storm hit, those rods had been removed for routine maintenance of the reactor.  But, now they are stored 100 feet in the air in damaged racks.  They weigh a total of 400 tons and contain radiation equivalent to 14,000 times the amount released by the Hiroshima atomic bomb.
  • The building in which these rods are stored has been damaged. TEPCO reinforced it with a steel frame, but the building itself is buckling and sagging, vulnerable to collapse if another earthquake or storm hits the area. Additionally, the ground under and around the building is becoming saturated with water, which further undermines the integrity of the structure and could cause it to tilt. How dangerous are these fuel rods?  Harvey Wasserman explains that the fuel rods are clad in zirconium which can ignite if they lose coolant. They could also ignite or explode if rods break or hit each other. Wasserman reports that some say this could result in a fission explosion like an atomic bomb, others say that is not what would happen, but agree it would be "a reaction like we have never seen before, a nuclear fire releasing incredible amounts of radiation," says Wasserman. These are not the only spent fuel rods at the plant, they are just the most precarious.  There are 11,000 fuel rods scattered around the plant, 6,000 in a cooling pool less than 50 meters from the sagging Reactor 4.  If a fire erupts in the spent fuel pool at Reactor 4, it could ignite the rods in the cooling pool and lead to an even greater release of radiation. It could set off a chain reaction that could not be stopped.
  • What would happen? Wasserman reports that the plant would have to be evacuated.  The workers who are essential to preventing damage at the plant would leave, and we will have lost a critical safeguard.  In addition, the computers will not work because of the intense radiation. As a result we would be blind - the world would have to sit and wait to see what happened. You might have to not only evacuate Fukushima but all of the population in and around Tokyo, reports Wasserman.  There is no question that the 1,533 spent fuel rods need to be removed.  But Arnie Gundersen, a veteran nuclear engineer and director of Fairewinds Energy Education, who used to build fuel assemblies, told Reuters "They are going to have difficulty in removing a significant number of the rods." He described the problem in a radio interview: "If you think of a nuclear fuel rack as a pack of cigarettes, if you pull a cigarette straight up it will come out — but these racks have been distorted. Now when they go to pull the cigarette straight out, it’s going to likely break and release radioactive cesium and other gases, xenon and krypton, into the air. I suspect come November, December, January we’re going to hear that the building’s been evacuated, they’ve broke a fuel rod, the fuel rod is off-gassing."
  • As bad as the ongoing leakage of radioactive water is into the Pacific, that is not the largest part of the water problem.  The Asia-Pacific Journal reported last month that TEPCO has 330,000 tons of water stored in 1,000 above-ground tanks and an undetermined amount in underground storage tanks.  Every day, 400 tons of water comes to the site from the mountains, 300 tons of that is the source for the contaminated water leaking into the Pacific daily. It is not clear where the rest of this water goes.   Each day TEPCO injects 400 tons of water into the destroyed facilities to keep them cool; about half is recycled, and the rest goes into the above-ground tanks. They are constantly building new storage tanks for this radioactive water. The tanks being used for storage were put together rapidly and are already leaking. They expect to have 800,000 tons of radioactive water stored on the site by 2016.  Harvey Wasserman warns that these unstable tanks are at risk of rupture if there is another earthquake or storm that hits Fukushima. The Asia-Pacific Journal concludes: "So at present there is no real solution to the water problem."
  • This is not the usual moving of fuel rods.  TEPCO has been saying this is routine, but in fact it is unique – a feat of engineering never done before.  As Gundersen says: "Tokyo Electric is portraying this as easy. In a normal nuclear reactor, all of this is done with computers. Everything gets pulled perfectly vertically. Well nothing is vertical anymore, the fuel racks are distorted, it’s all going to have to be done manually. The net effect is it’s a really difficult job. It wouldn’t surprise me if they snapped some of the fuel and they can’t remove it." Gregory Jaczko, Former Chairman of the U.S. Nuclear Regulatory Commission concurs with Gundersen describing the removal of the spent fuel rods as "a very significant activity, and . . . very, very unprecedented." Wasserman sums the challenge up: "We are doing something never done before – bent, crumbling, brittle fuel rods being removed from a pool that is compromised, in a building that is sinking, sagging and buckling, and it all must done under manual control, not with computers."  And the potential damage from failure would affect hundreds of millions of people.
  • The first thing that is needed is to end the media blackout.  The global public needs to be informed about the issues the world faces from Fukushima.  The impacts of Fukushima could affect almost everyone on the planet, so we all have a stake in the outcome.  If the public is informed about this problem, the political will to resolve it will rapidly develop. The nuclear industry, which wants to continue to expand, fears Fukushima being widely discussed because it undermines their already weak economic potential.  But, the profits of the nuclear industry are of minor concern compared to the risks of the triple Fukushima challenges. 
  • The second thing that must be faced is the incompetence of TEPCO.  They are not capable of handling this triple complex crisis. TEPCO "is already Japan’s most distrusted firm" and has been exposed as "dangerously incompetent."  A poll found that 91 percent of the Japanese public wants the government to intervene at Fukushima. Tepco’s management of the stricken power plant has been described as a comedy of errors. The constant stream of mistakes has been made worse by constant false denials and efforts to minimize major problems. Indeed the entire Fukushima catastrophe could have been avoided: "Tepco at first blamed the accident on ‘an unforeseen massive tsunami’ triggered by the Great East Japan Earthquake on March 11, 2011. Then it admitted it had in fact foreseen just such a scenario but hadn’t done anything about it."
  • The reality is Fukushima was plagued by human error from the outset.  An official Japanese government investigation concluded that the Fukushima accident was a "man-made" disaster, caused by "collusion" between government and Tepco and bad reactor design. On this point, TEPCO is not alone, this is an industry-wide problem. Many US nuclear plants have serious problems, are being operated beyond their life span, have the same design problems and are near earthquake faults. Regulatory officials in both the US and Japan are too corruptly tied to the industry. Then, the meltdown itself was denied for months, with TEPCO claiming it had not been confirmed.  Japan Times reports that "in December 2011, the government announced that the plant had reached ‘a state of cold shutdown.’ Normally, that means radiation releases are under control and the temperature of its nuclear fuel is consistently below boiling point."  Unfortunately, the statement was false – the reactors continue to need water to keep them cool, the fuel rods need to be kept cool – there has been no cold shutdown.
  • TEPCO has done a terrible job of cleaning up the plant.  Japan Times describes some of the problems: "The plant is being run on makeshift equipment and breakdowns are endemic. Among nearly a dozen serious problems since April this year there have been successive power outages, leaks of highly radioactive water from underground water pools — and a rat that chewed enough wires to short-circuit a switchboard, causing a power outage that interrupted cooling for nearly 30 hours. Later, the cooling system for a fuel-storage pool had to be switched off for safety checks when two dead rats were found in a transformer box."  TEPCO has been constantly cutting financial corners and not spending enough to solve the challenges of the Fukushima disaster resulting in shoddy practices that cause environmental damage. Washington’s Blog reports that the Japanese government is spreading radioactivity throughout Japan – and other countries – by burning radioactive waste in incinerators not built to handle such toxic substances. Workers have expressed concerns and even apologized for following order regarding the ‘clean-up.’
  • Indeed, the workers are another serious concern. The Guardian reported in October 2013 the plummeting morale of workers, problems of alcohol abuse, anxiety, loneliness, Post-Traumatic Stress Disorder and depression. TEPCO cut the pay of its workers by 20 percent in 2011 to save money even though these workers are doing very difficult work and face constant problems. Outside of work, many were traumatized by being forced to evacuate their homes after the Tsunami; and they have no idea how exposed to radiation they have been and what health consequences they will suffer. Contractors are hired based on the lowest bid, resulting in low wages for workers. According to the Guardian, Japan's top nuclear regulator, Shunichi Tanaka, told reporters: "Mistakes are often linked to morale. People usually don't make silly, careless mistakes when they're motivated and working in a positive environment. The lack of it, I think, may be related to the recent problems." The history of TEPCO shows we cannot trust this company and its mistreated workforce to handle the complex challenges faced at Fukushima. The crisis at Fukushima is a global one, requiring a global solution.
  • In an open letter to the United Nations, 16 top nuclear experts urged the government of Japan to transfer responsibility for the Fukushima reactor site to a worldwide engineering group overseen by a civil society panel and an international group of nuclear experts independent from TEPCO and the International Atomic Energy Administration , IAEA. They urge that the stabilization, clean-up and de-commissioning of the plant be well-funded. They make this request with "urgency" because the situation at the Fukushima plant is "progressively deteriorating, not stabilizing." 
  • The problems at Fukushima are in large part about facing reality – seeing the challenges, risks and potential harms from the incident. It is about TEPCO and Japan facing the reality that they are not equipped to handle the challenges of Fukushima and need the world to join the effort. 
  •  
    Excellent roundup of evidence that the Fukushima disaster recovery process has gone badly awry and is devolving quickly to looming further disasters. Political momentum is gathering to wrest the recovery efforts away from the Japanese government and to place its leadership in the hands of an international group of experts. The disaster was far worse than its portrayal in mainstream media, is continuing, and even worse secondary disasters now loom. 
10More

Leaked memos reveal GCHQ efforts to keep mass surveillance secret | UK news | The Guardian - 0 views

  • The UK intelligence agency GCHQ has repeatedly warned it fears a "damaging public debate" on the scale of its activities because it could lead to legal challenges against its mass-surveillance programmes, classified internal documents reveal.Memos contained in the cache disclosed by the US whistleblower Edward Snowden detail the agency's long fight against making intercept evidence admissible as evidence in criminal trials – a policy supported by all three major political parties, but ultimately defeated by the UK's intelligence community.Foremost among the reasons was a desire to minimise the potential for challenges against the agency's large-scale interception programmes, rather than any intrinsic threat to security, the documents show.
  • The papers also reveal that:• GCHQ lobbied furiously to keep secret the fact that telecoms firms had gone "well beyond" what they were legally required to do to help intelligence agencies' mass interception of communications, both in the UK and overseas.• GCHQ feared a legal challenge under the right to privacy in the Human Rights Act if evidence of its surveillance methods became admissible in court.• GCHQ assisted the Home Office in lining up sympathetic people to help with "press handling", including the Liberal Democrat peer and former intelligence services commissioner Lord Carlile, who this week criticised the Guardian for its coverage of mass surveillance by GCHQ and America's National Security Agency.The most recent attempt to make intelligence gathered from intercepts admissible in court, proposed by the last Labour government, was finally stymied by GCHQ, MI5 and MI6 in 2009.
  • Another top GCHQ priority in resisting the admission of intercepts as evidence was keeping secret the extent of the agency's co-operative relationships with telephone companies – including being granted access to communications networks overseas.In June, the Guardian disclosed the existence of GCHQ's Tempora internet surveillance programme. It uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to vast swaths of internet users' personal data. The intercepts are placed in the UK and overseas, with the knowledge of companies owning either the cables or landing stations.The revelations of voluntary co-operation with some telecoms companies appear to contrast markedly with statements made by large telecoms firms in the wake of the first Tempora stories. They stressed that they were simply complying with the law of the countries in which they operated.
  • ...6 more annotations...
  • In reality, numerous telecoms companies were doing much more than that, as disclosed in a secret document prepared in 2009 by a joint working group of GCHQ, MI5 and MI6.Their report contended that allowing intercepts as evidence could damage relationships with "Communications Service Providers" (CSPs).In an extended excerpt of "the classified version" of a review prepared for the Privy Council, a formal body of advisers made up of current and former cabinet ministers, the document sets out the real nature of the relationship between telecoms firms and the UK government."Under RIPA [the Regulation of Investigatory Powers Act 2000], CSPs in the UK may be required to provide, at public expense, an adequate interception capability on their networks," it states. "In practice all significant providers do provide such a capability. But in many cases their assistance – while in conformity with the law – goes well beyond what it requires."
  • GCHQ's internet surveillance programme is the subject of a challenge in the European court of human rights, mounted by three privacy advocacy groups. The Open Rights Group, English PEN and Big Brother Watch argue the "unchecked surveillance" of Tempora is a challenge to the right to privacy, as set out in the European convention on human rights.That the Tempora programme appears to rely at least in part on voluntary co-operation of telecoms firms could become a major factor in that ongoing case. The revelation could also reignite the long-running debate over allowing intercept evidence in court.GCHQ's submission goes on to set out why its relationships with telecoms companies go further than what can be legally compelled under current law. It says that in the internet era, companies wishing to avoid being legally mandated to assist UK intelligence agencies would often be able to do so "at little cost or risk to their operations" by moving "some or all" of their communications services overseas.
  • As a result, "it has been necessary to enter into agreements with both UK-based and offshore providers for them to afford the UK agencies access, with appropriate legal authorisation, to the communications they carry outside the UK".The submission to ministers does not set out which overseas firms have entered into voluntary relationships with the UK, or even in which countries they operate, though documents detailing the Tempora programme made it clear the UK's interception capabilities relied on taps located both on UK soil and overseas.There is no indication as to whether the governments of the countries in which deals with companies have been struck would be aware of the GCHQ cable taps.
  • Evidence that telecoms firms and GCHQ are engaging in mass interception overseas could stoke an ongoing diplomatic row over surveillance ignited this week after the German chancellor, Angela Merkel, accused the NSA of monitoring her phone calls, and the subsequent revelation that the agency monitored communications of at least 35 other world leaders.On Friday, Merkel and the French president, François Hollande, agreed to spearhead efforts to make the NSA sign a new code of conduct on how it carried out intelligence operations within the European Union, after EU leaders warned that the international fight against terrorism was being jeopardised by the perception that mass US surveillance was out of control.Fear of diplomatic repercussions were one of the prime reasons given for GCHQ's insistence that its relationships with telecoms firms must be kept private .
  • Telecoms companies "feared damage to their brands internationally, if the extent of their co-operation with HMG [Her Majesty's government] became apparent", the GCHQ document warned. It added that if intercepts became admissible as evidence in UK courts "many CSPs asserted that they would withdraw their voluntary support".The report stressed that while companies are going beyond what they are required to do under UK law, they are not being asked to violate it.Shami Chakrabarti, Director of Liberty and Anthony Romero Executive Director of the American Civil Liberties Union issued a joint statement stating:"The Guardian's publication of information from Edward Snowden has uncovered a breach of trust by the US and UK Governments on the grandest scale. The newspaper's principled and selective revelations demonstrate our rulers' contempt for personal rights, freedoms and the rule of law.
  • "Across the globe, these disclosures continue to raise fundamental questions about the lack of effective legal protection against the interception of all our communications."Yet in Britain, that conversation is in danger of being lost beneath self-serving spin and scaremongering, with journalists who dare to question the secret state accused of aiding the enemy."A balance must of course be struck between security and transparency, but that cannot be achieved whilst the intelligence services and their political masters seek to avoid any scrutiny of, or debate about, their actions."The Guardian's decision to expose the extent to which our privacy is being violated should be applauded and not condemned."
  •  
    The Guardian lands another gigantic bomb squarely on target, with massive potential for diplomatic, political, and financial disruption. Well done, Guardian. 
20More

John McCain, Conductor of the "Arab Spring" and the Caliph , by Thierry Meyssan - 0 views

  • Everyone has noticed the contradiction of those who recently characterized the Islamic Emirate as "freedom fighters" in Syria and who are indignant today faced with its abuses in Iraq. But if that speech is incoherent in itself, it makes perfect sense in the strategic plan: the same individuals were to be presented as allies yesterday and must be as enemies today, even if they are still on orders from Washington. Thierry Meyssan reveals below US policy through the particular case of Senator John McCain, conductor of the "Arab Spring" and longtime partner of Caliph Ibrahim.
  • ohn McCain is known as the leader of the Republicans and unhappy 2008 US presidential candidate. This is, we will see, only the real part of his biography, which serves as a cover to conduct covert actions on behalf of his government. When I was in Libya during the "Western"attack, I was able to view a report of the foreign intelligence services. It stated that, on February 4, 2011 in Cairo, NATO organized a meeting to launch the "Arab Spring" in Libya and Syria. According to this document, the meeting was chaired by John McCain. The report detailed the list of Libyan participants, whose delegation was led by the No. 2 man of the government of the day, Mahmoud Jibril, who abruptly switched sides at the entrance of the meeting to become the opposition leader in exile. I remember that, among the French delegates present, the report quoted Bernard-Henry Lévy, although officially he had never exercised functions within the French government. Many other personalities attended the symposium, including a large delegation of Syrians living abroad.
  • Emerging from the meeting, the mysterious Syrian Revolution 2011 Facebook account called for demonstrations outside the People’s Council (National Assembly) in Damascus on February 11. Although this Facebook account at the time claimed to have more than 40,000 followers, only a dozen people responded to its call before the flashes of photographers and hundreds of police. The demonstration dispersed peacefully and clashes only began more than a month later in Deraa. [1] On February 16, 2011, a demonstration underway in Benghazi, in memory of members of the Islamic Fighting Group in Libya [2] massacred in 1996 in the Abu Selim prison, degenerated into shooting. The next day, a second event, this time in memory of those who died by attacking the Danish consulate during the Muhammad cartoons affair, also degenerated into shooting. At the same time, members of the Islamic Fighting Group in Libya ,coming from Egypt and coordinated by unidentified, hooded individuals, simultaneously attacked four military bases in four different cities. After three days of fighting and atrocities, the rebels launched the uprising of Cyrenaica against Tripolitania [3]; a terrorist attack that the western press falsely presented as a "democratic revolution" against "the regime" of Muammar el-Qaddafi.
  • ...16 more annotations...
  • On February 22nd, John McCain was in Lebanon. He met members of the Future Movement (the party of Saad Hariri) whom he charged to oversee the transfer of arms to Syria around the MP Okab Sakr [4]. Then, leaving Beirut, he inspected the Syrian border and the selected villages including Ersal, which were used as a basis to back mercenaries in the war to come. The meetings chaired by John McCain were clearly the trigger point for a long-prepared Washington plan; the plan that would have the UK and France attack Libya and Syria simultaneously, following the doctrine of "leadership from behind" and the annex of the Treaty of Lancaster House of November 2010. [5]
  • In May 2013, Senator John McCain made his way illegally to near Idleb in Syria via Turkey to meet with leaders of the "armed opposition". His trip was not made public until his return to Washington. [6] This movement was organized by the Syrian Emergency Task Force, which, contrary to its title, is a Zionist Organization led by a Palestinian employee of AIPAC [7]
  • John McCain in Syria. In the foreground at right is the director of the Syrian Emergency Task Force. In the doorway, center, Mohammad Nour.
  • In photographs released at that time, one noticed the presence of Mohammad Nour, a spokesman for the Northern Storm Brigade (of the Al-Nosra Front, that is to say, al-Qaeda in Syria), who kidnapped and held 11 Lebanese Shiite pilgrims in Azaz. [8] Asked about his proximity to al-Qaeda kidnappers, the Senator claimed not to know Mohammad Nour who would have invited himself into this photo. The affair made a great noise and the families of the abducted pilgrims lodged a complaint before the Lebanese judiciary against Senator McCain for complicity in kidnapping. Ultimately, an agreement was reached and the pilgrims were released. Let’s suppose that Senator McCain had told the truth and that he was abused by Mohammad Nour. The object of his illegal trip to Syria was to meet the chiefs of staff of the Free Syrian Army. According to him, the organization was composed "exclusively of Syrians" fighting for "their freedom" against the "Alouite dictatorship” (sic). The tour organizers published this photograph to attest to the meeting.
  • John McCain and the heads of the Free Syrian Army. In the left foreground, Ibrahim al-Badri, with which the Senator is talking. Next, Brigadier General Salim Idris (with glasses).
  • If we can see Brigadier General Idriss Salem, head of the Free Syrian Army, one can also see Ibrahim al-Badri (foreground on the left) with whom the senator is talking. Back from the surprise trip, John McCain claimed that all those responsible for the Free Syrian Army were "moderates who can be trusted" (sic).
  • However, since October 4, 2011, Ibrahim al-Badri (also known as Abu Du’a) was on the list of the five terrorists most wanted by the United States (Rewards for Justice). A premium of up to $ 10 million was offered to anyone who would assist in his capture. [9] The next day, October 5, 2011, Ibrahim al-Badri was included in the list of the Sanctions Committee of the UN as a member of Al Qaeda. [10] In addition, a month before receiving Senator McCain, Ibrahim al-Badri, known under his nom de guerre as Abu Bakr al-Baghdadi, created the Islamic State in Iraq and the Levant (ÉIIL) – all the while still belonging to the staff of the very "moderate" Free Syrian Army. He claimed as his own the attack on the Taj and Abu Ghraib prisons in Iraq, from which he helped between 500 and 1,000 jihadists escape who then joined his organization. This attack was coordinated with other almost simultaneous operations in eight other countries. Each time, the escapees joined the jihadist organizations fighting in Syria. This case is so strange that Interpol issued a note and requested the assistance of the 190 member countries. [11]
  • For my part, I have always said that there was no difference on the ground between the Free Syrian Army, Al-Nosra Front, the Islamic Emirate etc ... All these organizations are composed of the same individuals who continuously change flag. When they pose as the Free Syrian Army, they fly the flag of French colonization and speak only of overthrowing the "dog Bashar." When they say they belong to Al-Nosra Front, they carry the flag of al Qaeda and declare their intention to spread Islam in the world. Finally when they say they are the Islamic Emirate, they brandish the flag of the Caliphate and announce that they will clean the area of all infidels. But whatever the label, they proceed to the same abuses: rape, torture, beheadings, crucifixions. Yet neither Senator McCain nor his companions of the Syrian Emergency Task Force provided the information in their possession on Ibrahim al-Badri to the State Department, nor have they asked for the reward. Nor have they informed the anti-terrorism Committee of the UN.
  • But John McCain is not just the leader of the political opposition to President Obama, he is also one of his senior officials! He is in fact President of the International Republican Institute (IRI), the republican branch of NED / CIA [12], since January 1993. This so-called "NGO" was officially established by President Ronald Reagan to extend certain activities of the CIA, in connection with the British, Canadian and Australian secret services. Contrary to its claims, it is indeed an inter-governmental agency. Its budget is approved by Congress in a budget line dependent of the Secretary of State. It is also because it is a joint agency of the Anglo-Saxon secret services that several states in the world prohibit it from any activity on their territory.
  • he list of interventions by John McCain on behalf of the State Department is impressive. He participated in all the color revolutions of the last twenty years.
  • And an agent that has the best coverage imaginable: he is the official opponent of Barack Obama. As such, he can travel anywhere in the world (he is the most traveled US senator) and meet whoever he wants without fear. If his interlocutors approve Washington policy, he promised them to continue it, if they fight it, he hands over the responsibility to President Obama.
  • In 2003, France’s opposition was not enough to offset the influence of the Committee for the Liberation of Iraq. The United States attacked the country again and this time overthrew President Hussein. Of course, John McCain was a major contributor to the Committee. After handing to a private company the care of plundering the country for a year [17], they tried to partition Iraq into three separate states, but had to give it up due to the resistance of the population. They tried again in 2007, around the Biden-Brownback resolution, but again failed. [18] Hence the current strategy that attempts to achieve this by means of a non-state actor: the Islamic Emirate.
  • The operation was planned well in advance, even before the meeting between John McCain and Ibrahim al-Badri. For example, internal correspondence from the Qatari Ministry of Foreign Affairs, published by my friends James and Joanne Moriarty [19], shows that 5,000 jihadis were trained at the expense of Qatar in NATO’s Libya in 2012, and 2,5 million dollars was paid at the same time to the future Caliph. In January of 2014, the Congress of the United States held a secret meeting at which it voted, in violation of international law, to approve funding for the Al-Nosra Front (Al-Qaeda) and the Islamic emirate in Iraq and the Levant until September 2014. [20] Although it is unclear precisely what was really agreed to during this meeting revealed by the British Reuters news agency [21], and no media US media dared bypass censorship, it is highly probable that the law includes a section on arming and training jihadists.
  • Proud of this US funding, Saudi Arabia has claimed on its public television channel, Al-Arabiya, that the Islamic Emirate was headed by Prince Abdul Rahman al-Faisal, brother of Prince Saud al Faisal (Foreign Minister) and Prince Turki al-Faisal (Saudi ambassador to the United States and the United Kingdom) [22]. The Islamic Emirate represents a new step in the world of mercenaries. Unlike jihadi groups who fought in Afghanistan, Bosnia-Herzegovina and Chechnya around Osama bin Laden, it does not constitute a residual force but actually an army in itself. Unlike previous groups in Iraq, Libya and Syria, around Prince Bandar bin Sultan, they have sophisticated communication services at their disposal for recruitment and civilian officials trained in large western schools capable of instantly taking over the administration of a territory.
  • Brand new Ukrainian weapons were purchased by Saudi Arabia and conveyed by the Turkish secret services who gave them to the Islamic Emirate. Final details were coordinated with the Barzani family at a meeting of jihadist groups in Amman on 1 June 2014. [23] The joint attack on Iraq by the Islamic Emirate and the Kurdistan Regional Government began four days later. The Islamic Emirate seized the Sunni part of the country, while the Kurdistan Regional Government increased its territory by over 40%. Fleeing the atrocities of jihadists, religious minorities left the Sunni area, paving the way for the three-way partition of the country. Violating the Iraqi-US Defense agreement, the Pentagon did not intervene and allowed the Islamic Emirate to continue its conquest and massacres. A month later, while the Kurdish Peshmerga Regional Government had retreated without a fight, and when the emotions of world public opinion became too strong, President Obama gave the order to bomb some positions of the Islamic Emirate. However, according to General William Mayville, director of operations at the headquarters, "These bombings are unlikely to affect the overall capacity of the Islamic Emirate and its activities in other areas of Iraq or Syria ". [24] Obviously, they are not meant to destroy the jihadist army, but only to ensure that each player does not overlap the territory that has been assigned. Moreover, for the moment, they are symbolic and have destroyed only a handful of vehicles. It was ultimately the intervention of the Kurds of the Turkish and Syrian Kurdish PKK which halted the progress of the Islamic Emirate and opened a corridor to allow civilians to escape the massacre.
  • In the latest issue of its magazine, the Islamic Emirate devoted two pages to denounce Senator John McCain as "the enemy" and "double-crosser", recalling his support for the US invasion of Iraq. Lest this accusation remain unknown in the United States, Senator immediately issued a statement calling the Emirate the "most dangerous Islamist terrorist group in the world" [26]. This controversy is there only to distract the gallery. One would like to believe it ... if it were’t for this photograph from May 2013.
  •  
    Thierry Meysann makes the case that Sen. John McCain, working with  was the guiding force behind the Arab Spring, the overthrow of Qadaffi in Libya, and the invasion of Syria by mercenary Islamists, working with a Zionist but deliberately misnomered front group. Thierry goes on to show that McCain played a key role in the creation and deployment of ISIL.  
9More

POGO Provides Statement for House Hearing on VA Whistleblowers - 0 views

  • In the spring of 2014, the Project On Government Oversight (POGO) put out the call to whistleblowers within the Department of Veterans Affairs (VA) to provide an inside perspective on the issues the Department was facing. In our 34-year history, POGO has never received as many submissions on a single issue. Nearly 800 current and former VA employees and veterans from 35 states and the District of Columbia contacted us. POGO reviewed each of the submissions, and found that concerns about the VA go far beyond long or falsified wait times for medical appointments; they extend to the quality of health care services veterans receive. A recurring and fundamental theme became clear: VA employees across the country fear they will face repercussions if they dare to raise a dissenting voice. POGO wrote a letter to Acting VA Secretary Sloan Gibson in July last year, highlighting three specific cases of current or former employees who agreed to share details about their personal experiences of retaliation.[1] In California, a VA inpatient pharmacy supervisor was placed on administrative leave and ordered not to speak out after protesting “inordinate delays” in delivering medication to patients and “refusal to comply with VHA regulations.” In one case, he said, a veteran’s epidural drip of pain control medication ran dry, and another veteran developed a high fever after he was administered a chemotherapy drug after its expiration point.
  • In Pennsylvania, a former VA doctor told POGO that he had been removed from clinical work and forced to spend his days in an office with nothing to do. This action occurred after he complained that, in medical emergencies, physicians who were supposed to be on call were failing or refusing to report to the hospital. The Office of Special Counsel (OSC) shared his concerns, writing “[w]e have concluded that there is a substantial likelihood that the information that you provided to OSC discloses a substantial and specific danger to public health and safety.”[2] In Appalachia, a former VA nurse told POGO she was intimidated by management and forced out of her job after she raised concerns that patients with serious injuries were being neglected. In one case she was reprimanded for referring a patient to the VA’s patient advocate after weeks of being unable to arrange transportation for a medical test to determine if he was in danger of sudden death. “Such an upsetting thing for a nurse just to see this blatant neglect occur almost on a daily basis. It was not only overlooked but appeared to be embraced,” she said. She also pointed out that there is “a culture of bullying employees….It’s just a culture of harassment that goes on if you report wrongdoing,” she said.
  • That culture doesn’t appear to be limited to just one or two VA clinics. Some people, including former employees who are now beyond the reach of VA management, were willing to be interviewed by POGO and to be quoted by name, but others said they contacted us anonymously because they are still employed at the VA and are worried about retaliation. One put it this way: “Management is extremely good at keeping things quiet and employees are very afraid to come forward.” This kind of fear and suppression of whistleblowers who report wrongdoing often culminates in the larger problems, as the VA is currently experiencing. By now it is well known that employees who recently raised concerns about veteran wait times faced reprisal. But whistleblower retaliation in the VA is nothing new. In 1992 a congressional report detailed the experiences of VA employees who were harassed or fired after reporting problems.[3] Throughout the 1990s there were several congressional hearings conducted on the quality of care at VA hospitals and on reprisal against VA employees who exposed inadequate care.[4] Despite then-Secretary Togo D. West’s declaration that such reprisals would not be tolerated, a House hearing in 1999 found that the reprisal problems still existed.[5] A Government Accountability Report from 2000 found that many VA employees were unaware of their rights to protections against retaliation for blowing the whistle on wrongdoing.[6] The report also found that the majority of employees feared retaliation and were therefore unwilling to report misconduct.
  • ...6 more annotations...
  • The Office of Special Counsel (OSC) has been working to investigate claims of retaliation and get favorable actions for many of the VA whistleblowers who have come forward. Since April 2014, the OSC has successfully obtained corrective actions for over 25 whistleblowers.[7] But the OSC still has over 100 pending VA reprisal cases to investigate, among the highest of any government agency, according to Special Counsel Carolyn Lerner.[8] Although the VA has been cooperative with the OSC and their recommendations, merely addressing isolated incidents is not enough.[9] The VA has been struggling with a culture problem for decades and something more must be done.
  • VA employees who have concerns about management or fear retaliation are supposed to be able to turn to the VA’s Office of Inspector General (OIG). But whistleblowers have come to doubt the VA IG’s willingness to hold wrongdoers accountable. Since 2014, the IG Office has not yet publically released any investigation into employee retaliation, making it difficult to assess how seriously the IG’s office is taking this issue. Furthermore, the VA IG’s office issued an administrative subpoena to POGO in May 2014 that was little more than an invasive fishing expedition for whistleblowers. The IG demanded “All records that POGO has received from current or former employees of the Department of Veterans Affairs, and other individuals or entities.”[10] Though POGO did not comply with the subpoena, such an action was cause for concern for many of the whistleblowers who had shared information with us. POGO remains concerned that there is not a permanent VA IG in place and that the position has been vacant for over a year.[11] Our own investigations have found that the absence of permanent leadership can have a serious impact on the effectiveness of an IG office.[12] Acting IGs do not undergo the same kind of extensive vetting process required of permanent IGs, and as a consequence usually lack the credibility of a permanent IG. Acting IGs also often seek appointment to the permanent position, which can compromise their independence by giving them an incentive to curry favor with the White House and the leadership of their agency.[13] Perhaps most worrisome, given the significant challenges facing the VA IG, a 2009 study found that vacancies in top agency positions promote agency inaction, create confusion among career employees, make an agency less likely to handle controversial issues, result in fewer enforcement actions by regulatory agencies and decrease public trust in government.[14]
  • It appears the VA IG may be subject to this dangerous lack of independence. For example, the VA OIG has failed to release the results of 140 health care investigations since 2006.[15] Furthermore, the Department of Treasury IG sent a letter to this Committee just last month raising concerns about another VA IG investigation. After speaking to witnesses familiar with the situation, the Treasury IG concluded that their testimony, “calls into question the integrity of the VA OIG’s actions in this particular manner.” The Treasury IG’s investigation also found that multiple witnesses stated a VA employee boasted about his ability to influence the VA OIG’s investigations.[16]
  • In POGO’s 2014 letter, we recommended concrete steps for incoming VA Secretary McDonald to take in order to demonstrate an agency-wide commitment to changing the VA’s culture of fear, bullying, and retaliation. Neither Acting Secretary Sloan Gibson nor Secretary McDonald have responded to our multiple requests for a meeting. Clearly, an important first step will be for the President to nominate a permanent IG for the VA. Hopefully strong and committed leadership in that office will correct its current course. POGO recommended that Secretary McDonald make a tangible and meaningful gesture to support those whistleblowers who have been trying to fix the VA from the inside. Once the OSC has identified meritorious cases, Secretary McDonald should personally meet with those whistleblowers and elevate their status from villain to hero. These employees should be publicly celebrated for their courage, and should receive positive recognition in their personnel files, including possibly receiving the types of bonuses that have been provided to wrongdoers in the past. Retaliation against whistleblowers is already a prohibited personnel practice, but it will be up to the senior-most VA leadership to ensure that this rule is enforced by the agency. This should not be an isolated event done in response to recent criticisms but an ongoing effort. Whistleblowing must be encouraged and celebrated or wrongdoing will continue.
  • But it’s not just the VA Secretary who can work to fix this problem. Congress should enact legislation that codifies accountability for those who retaliate against whistleblowers. The definition of “wrongdoing” must include retaliation. The cultural shift that is required inside the Department of Veterans Affairs must be accompanied by statutory mandates that protect whistleblowers and witnesses inside the agency from retaliation. Legislation should ensure that whistleblowers are able to be confident that stepping forward to expose wrongdoing will not result in retaliation, and should provide a system to hold retaliators within the VA accountable. Congress should also extend whistleblower protections to contractors and veterans who raise concerns about medical care provided by the VA. POGO’s investigation found that both of these groups also fear retaliation that prevents them from coming forward. While federal employees working at the VA enjoy whistleblower protections, contractors do not. Congress should extend the same protections to contractors in order to promote internal oversight in an increasingly contractor-heavy landscape.
  • In addition, a veteran who is receiving poor care should be able to speak to his or her patient advocate without fear of retaliation, including a reduction in the quality of health care. Without this reassurance, there is a disincentive to report poor care, allowing it to continue uncorrected. Congress should extend whistleblower protections to veteran whistleblowers. The VA and Congress must work together to end this culture of fear and retaliation. Whistleblowers who report concerns that affect veteran health must be lauded, not shunned. And the law must protect them.
1More

Poll: Most Americans Support The 2015 Iran Nuclear Deal [Infographic] - 0 views

  • While de-certifying would not withdraw the U.S. from the deal, it would give Congress 60 days to decide whether or not to reimpose the sanctions on Iran that were suspended by it. According to a new poll from YouGov, Americans are at odds with the president's stance with most of the public supporting the nuclear deal. The research found that 56 percent of the public approve of the agreement, of which 31 percent strongly approve and 25 percent somewhat approve. Only 19 percent of those polled said they disapprove of it. Broken down by party, 68 percent of Democrats support the deal while a surprisingly large 22 percent share have no opinion on the matter. A slight 51 percent majority of Republicans are also in favor of the agreement while 23 percent are against it. YouGov also found that support for the nuclear deal doesn't necessarily mean Americans like or trust Iran with 44 percent regarding the country as a U.S. enemy.
3More

Pepe Escobar - The real November surprise -- Puppet Masters -- Sott.net - 0 views

  • "As bad as it is the folks above the President make the decisions. They may have decided on Trump. These things do not happen by accident." Thus spoke a high-level US business mover and shaker with secure transit in rarified Masters of the Universe-related circles, amidst the utter political chaos provoked by head of the FBI James Comey's latest bombshell. It's virtually established by now that US Attorney General Loretta Lynch told Comey not to release his letter to Congress. But Comey did it anyway. If he had not, and a scandal would - inevitably - spring up after the US presidential election, Lynch would be perfectly positioned to deny she knew anything, and Comey would be on the firing line. Lynch is a certified Clinton machine asset. In 1999 then-President Bill Clinton appointed her to run the Brooklyn US Attorney's office. She left in 2002, taking the private practice revolving door. She was back to the Brooklyn office in 2010, urged by Obama. Five years later she became the 83rd US Attorney General, replacing the dodgy Eric Holder. A plausible case has been made that Comey took his fateful decision based on a serious internal revolt at the FBI - led by key people he trusts — as well as being egged-on by his wife. Yet one of the key questions that refuse to go away is why the FBI waited until 11 days before the US presidential election to supposedly "find" an email trove on certified sexting pervert Anthony Weiner's laptop.
  •      "As bad as it is the folks above the President make the decisions. They may have decided on Trump. These things do not happen by accident." Thus spoke a high-level US business mover and shaker with secure transit in rarified Masters of the Universe-related circles, amidst the utter political chaos provoked by head of the FBI James Comey's latest bombshell. It's virtually established by now that US Attorney General Loretta Lynch told Comey not to release his letter to Congress. But Comey did it anyway. If he had not, and a scandal would - inevitably - spring up after the US presidential election, Lynch would be perfectly positioned to deny she knew anything, and Comey would be on the firing line. Lynch is a certified Clinton machine asset. In 1999 then-President Bill Clinton appointed her to run the Brooklyn US Attorney's office. She left in 2002, taking the private practice revolving door. She was back to the Brooklyn office in 2010, urged by Obama. Five years later she became the 83rd US Attorney General, replacing the dodgy Eric Holder. A plausible case has been made that Comey took his fateful decision based on a serious internal revolt at the FBI - led by key people he trusts — as well as being egged-on by his wife. Yet one of the key questions that refuse to go away is why the FBI waited until 11 days before the US presidential election to supposedly "find" an email trove on certified sexting pervert Anthony Weiner's laptop.
  • The business source, although unsympathetic to the Clinton machine, especially in foreign policy, is a realpolitik practitioner, not a conspiracy theorist. He is adamant that, "the FBI reversal could not have happened without orders above the President. If the Masters [of the Universe] have changed their mind, then they will destroy Hillary." He adds, "they can make a deal with Donald just like anyone else; Donald wins; the Masters win; the people think that their voice has been heard. And then there will be some sort of (controlled) change." What's paramount in the whole soap opera is that faith in the US political system — as corrupt as it may be — must endure. That mirrors the faith in the US dollar; if confidence in the US dollar fails, the US as a hegemonic financial power is no more. The source is equally adamant that, "it is almost unprecedented to see a cover-up as extensive as Hillary's. A secret meeting between Bill Clinton and the Attorney General; the FBI ignoring all evidence and initially clearing Hillary to near rebellion of the whole of the FBI, attested to by Rudolf Giuliani whose reputation as a federal prosecutor is unquestioned; the Clinton "pay for play" foundation. The Masters are troubled that this is getting out of hand." The record shows that "the Masters do not usually have to go to such lengths to protect their own. They did manage to save Bill Clinton from the Monica Lewinsky perjury and keep him in the presidency. The Masters were not attacked in this case. They even got away with the 1987 cash settlement crash and the theft surrounding the Lehman debacle. In all these cases there were no overarching challenges to their control, as we see now open to the public by Trump. They antagonized and insulted the wrong man."
3More

Congressmen Call For DNI Clapper's Ouster | Threatpost - English - Global - threatpost.com - 0 views

  • A group of six Congressmen have asked President Barack Obama to remove James Clapper as director of national intelligence as a result of his misstatements to Congress about the NSA’s dragnet data-collection programs. The group, led by Rep. Darrell Issa (R-Calif.), said that Clapper’s role as DNI “is incompatible with the goal of restoring trust in our security programs”.
  • Clapper is the former head of the National Geospatial Intelligence Agency and has been DNI since 2010. In their letter to Obama, the group of Congressmen calling for his ouster said that he lied to Congress and should no longer be in office. “The continued role of James Clapper as Director of National Intelligence is incompatible with the goal of restoring trust in our security programs and ensuring the highest level of transparency. Director Clapper continues to hold his position despite lying to Congress, under oath, about the existence of bulk data collection programs in March 2013. Asking Director Clapper, and other federal intelligence officials who misrepresented programs to Congress and the courts, to report to you on needed reforms and the future role of government surveillance is not a credible solution,” the letter from Issa, Ted Poe, Paul Broun, Doug Collins, Walter Jones and Alan Grayson says. The Congressmen sent the letter to Obama on Monday, 10 days after the president gave a much-anticipated speech on the NSA’s role and some new limits he wants to place on the scope of its data collection. Security experts and privacy advocates were not enthusiastic about the changes Obama announced, which included a recommendation that a third party hold phone metadata records, which are now stored by the NSA.
  • One issue that Obama didn’t address in his speech was the agency’s alleged subversion of cryptographic standards and algorithms. In their letter, Issa and his colleagues urged Obama to address this issue. “While the collection of bulk telephone records (meta-data) under Section 215 of the PATRIOT Act has understandably garnered the most significant public debate over government overreach, considerable concern has been raised about the govemment’s exploitation of the Internet through circumvention of encryption. The Review Group recognized the potential hazard created by exposing vulnerabilities in encryption data and recommended that your Administration support, rather than undermine, efforts to protect the integrity of these systems.3 However, your January 17′th speech failed to address the future of encryption related programs. Internet freedom is indispensible, and reports regarding the govemment’s treatment of encryption protocols underscore the need to provide leadership and clarity beyond the collection of telephone records,” the letter says.
3More

Banks pushing for repeal of credit unions' federal tax exemption - Los Angeles Times - 0 views

  • Credit unions have been snatching customers from banks amid consumer frustration over rising fees and outrage over Wall Street's role in the financial crisis.Now banks are fighting back by trying to take away something vital to credit unions — their federal tax exemption.With fast-growing credit unions posing more formidable competition to banks, industry trade groups are pressing the White House and Congress to end a tax break that dates to the Great Depression. "Many tax-exempt credit unions have morphed from serving 'people of small means' to become full-service, financially sophisticated institutions," Frank Keating, president of the American Bankers Assn., wrote to President Obama last month."The time has come to abolish this exemption," Keating said in the letter, which was part of a blitz that included print and radio ads in the nation's capital.
  • Bankers long have complained the tax break is an unfair advantage for large credit unions. Now they see an opportunity to get rid of it as lawmakers begin work on a major overhaul of the tax code that is aimed at eliminating many corporate exemptions and lowering the overall tax rate.The exemption cost $1.6 billion this year in taxes avoided and would rise to $2.2 billion annually in 2018, according to Obama's proposed 2014 budget.In a 2010 report on tax reform, the President's Economic Recovery Advisory Board said eliminating the exemption would raise $19 billion over 10 years and remove the credit unions' "competitive advantage relative to other financial institutions" in the tax code.Credit unions said the effort to take away their tax exemption was simply an attempt to stifle competition and remove one of the only checks on bank fees for consumers.And it comes as some in Congress are pushing to loosen regulations on credit unions so they can expand their business further, including legislation that would lift a cap on the amount of money they can lend to businesses.The tax exemption is crucial to credit unions, which by law can't raise capital through public stock offerings the way that banks can, said Fred R. Becker Jr., president of the National Assn. of Federal Credit Unions, a trade group with about 3,800 federally chartered members."They'll have to convert to banks, which is what the banks want," he said. "Then they'd have, for lack of a better term, a monopoly."
  •  
    So instead of competing on quality and service, banksters aim to eliminate the competition grown by disgruntled bankster customers. Unfortunately, corporate lobbying of government officials is exempt from the anti-trust laws, a consequence of (in my opinion, ill-considered) judicial recognition of a corporate First Amendment right of petition. So once again, we have legal fictions acquiring human rights. Trustees of Dartmouth College v. Woodward, 4 Wheat. 518, 636 (1819) (Marshall, C. J.). ("A corporation is an artificial being, invisible, intangible, and existing only in contemplation of law. Being the mere creature of law, it possesses only those properties which the charter of its creation confers upon it"). May a corporate charter permissibly bestow the rights of citizenship on an imaginary being? According to latter-day justices of the Supreme Court, corporations have First Amendment rights even if it doesn't say so in the corporate charter. See for example, Citizens United v. Federal Election Com'n, 130 S. Ct. 876 (2010) (chilling effect on "people" used to justify finding a First Amendment right of wholly imaginary corporations). 
3More

Israel and White House Locked in an Info War Over Iran | The Cable - 0 views

  • The White House and Israel are locked in an information war on Capitol Hill, and right now, Israel may be winning. All week, the Obama administration has provided facts and figures to lawmakers on its sanctions relief proposal to build support for a deal on Iran's nuclear program. But some members in Congress don't trust the data U.S. officials are providing -- they trust conflicting data provided privately by senior Israeli officials. According to multiple Congressional aides, Israeli ambassador to the U.S. Ron Dermer and the American Israel Public Affairs Committee are storming Capitol Hill in an effort to discredit the Obama administration's interim nuclear deal with Iran. The effort coincides with a visit by Israel's Minister of Economy Naftali Bennett, who is also speaking with lawmakers on the Hill. The campaign includes one-on-one briefings with lawmakers that provide data that strays from official U.S. assessments.
  • The wide discrepancies led to a major clash of viewpoints during Wednesday's classified briefing between Secretary of State John Kerry and members of the Senate Banking Committee. One GOP Senate aide said the administration repeatedly shot down data cited by senators provided by Israeli officials. "You'd raise the Israeli perspective and they'd say, that's wrong -- the Israelis don't know what they're talking about," the aide told The Cable."The administration would interrupt, 'that information is inaccurate.'"  One of the senators citing Israeli data was Mark Kirk (R-Ill.), who said Kerry's briefing was "anti-Israeli."
  •  
    The continuing saga of Israeli agents lobbying Congress without registering as foreign agents as required by law, with war or peace hanging in the balance.  The last U.S. administration that attempted to enforce that law against Israeli agents was the Kennedy administration. 
6More

BERLIN: German expose of America's "Secret War" attracts quick, strong U.S. rebuttal | ... - 0 views

  • BERLIN — To appreciate the scope and impact of a joint investigative series by the highly regarded German newspaper Sueddeutsche Zeitung and German public television station NDR on the depth of American trespasses in this country, you don’t even have to read a word of the reports, or watch the videos.All you really have to do is take a look at the U.S. Embassy rebuttal of the series. The multi-part, multi-media series was put on line beginning Friday morning, though some parts weren’t up until evening. And others are said to be coming during the coming weeks. The U.S. Embassy in Germany press office statement came out just after 3 p.m.
  • News report charges U.S. with conducting illegal operations from German soil
  • The newspaper reaction to that reaction: "The American Embassy also comments and rejects the reports as innuendo. They are stating the the United States "are not kidnapping and torturing on principal." This is a daring claim. Only seven months ago a commission made up of Democrats and Republicans called it "undeniable" that the United States tortured inmates following the terror attacks of 2001. Even President Barack Obama said in 2009 that the American practice of water boarding was torture." The website does note that almost 20 reporters started gathering this series more than a year ago.So it doesn't look as if the newspaper and television station will be backing away from their reporting just yet.In any case, the U.S. embassy makes a strong statement, and takes on some of Germany's most respected journalists.Why? One piece of the SZ English language version of the series begins:“Tapping Germany’s Chancellor Angela Merkel’s phone would seem like an outrageous breach of trust—except that there have been so many other, deadlier and lesser-known, breaches of trust wrought by the U.S. in Germany in recent years.
  • ...2 more annotations...
  • “Where to begin? There’s the worldwide secret drone war—a massive break with international law. Then there’s the large and growing shadow army of private spies. And, finally, the asylum seekers, whose knowledge is unwittingly used to drop bombs in their home countries.“The worst part? Germany doesn't even seem to mind.”The series goes on at great detail in each of these areas. At times, it advances with videos, including one showing it's reporter being stopped from shooting video near the U.S. Embassy in Berlin, or near a number of bases, and allegedly secret bases, of both the United States and the United Kingdom around Germany.The series reports that the $3 billion a year the United States spends in Germany pay for everything from bases for the 43,000 U.S. soldiers stationed here to the American drone campaign in Africa. According to the newspaper’s English language version, that drone program works like this:
  • “First they practice with their 57 drones getting ready for the real thing. When they receive intelligence on potential targets and suspected terrorists, they deliver that information to U.S. intelligence officers, also based in Germany. And these soldiers are responsible when innocent civilians in Africa die as a result. Moral issues aside, the fact remains: without these bases in Germany, the U.S.’s ‘war on terror’ would not be the well-oiled machine it is now. Germany acts as the headquarters for secret wars in Africa, the European hub for CIA operations and the training ground for drone attacks worldwide. And Germany’s location is indispensable.”There is much, much more, here. And the website notes that stories will be coming out during the next several weeks. 
  •  
    German journalists are doing their own digging on U.S. abuse of that nation as a major base for spying and waging war against Africa. In the last line of the quoted article, there is a link to a site that is translating the German reports. 
8More

Angela Merkel under pressure to reveal all about US spying agreement | World news | The... - 0 views

  • Angela Merkel’s reputation as an unassailable chancellor is under threat amid mounting pressure for her to reveal how much she knew about a German-supported US spying operation on European companies and officials. The onus on her government to deliver answers over the spying scandal has only increased with the Austrian government’s announcement that it has filed a legal complaint against an unnamed party over “covert intelligence to the detriment of Austria”. EADS, now Airbus, one of the companies known to have been spied on by the BND – Germany’s foreign intelligence agency – is also taking legal action, saying it will file a complaint with prosecutors in Germany. The BND stands accused of spying on behalf of America’s NSA on European companies such as EADS, as well as the French presidency and the EU commission. There are also suspicions that German government workers and journalists were spied on.
  • The Social Democrats (SPD), Merkel’s government partners, along with Germany’s federal public prosecutor, Harald Range, are demanding the release of a list of “selectors” – 40,000 search terms used in the spying operations – the results of which were passed on to the NSA. “The list must be published and only then is clarification possible,” said Christine Lambrecht, parliamentary head of the SPD faction. Merkel has so far refused to allow its release. Her spokesman, Steffen Seibert, said she would make a decision on whether or not to do so only “once consultations with the American partners are completed”. Thomas de Maizière, the interior minister and a close Merkel confidante, is under even more pressure than the chancellor over allegations he lied about what he knew of BND/NSA cooperation. On Wednesday he answered questions on the affair to a parliamentary committee investigating the row, but only in camera and in a bug-proof room. Among other alleged shortcomings over the affair, he stands accused of failing to act when the BND informed him of the espionage activities in 2008 when he was Merkel’s chief of staff. He has repeatedly been portrayed in the tabloid media with a Pinocchio nose.
  • While Merkel appeared to have remained relatively unscathed by the scandal until now, an opinion poll showed that most Germans believed the trustworthiness of the three-times chancellor was now seriously at stake. 62% of Germans said her credibility was in doubt, according to the poll, carried out by the Insa institute, while 18% said it was not. Merkel told Radio Bremen in an interview that she was prepared to speak out over the allegations to a parliamentary committee. “I will testify there and justify myself to them where it is required,” she told the broadcaster.
  • ...5 more annotations...
  • Sigmar Gabriel, the deputy chancellor and economy minister, who is also the leader of the SPD, upped the ante still further by relaying a conversation he had with Merkel in which he asked her twice if the government had evidence of economic espionage, and she said no. He added that if it emerged Germany had been involved in helping the NSA spy on companies, it would greatly strain relations between business and the government and “put a large burden on the trust the economy has in government behaviour”.
  • The scandal has already strained relations within Merkel’s grand coalition, with many observers commenting that Gabriel was seeing the affair as a chance to make political gains. Political observers were lining up to remark that the crisis is the single most critical of Merkel’s decade in government and could even lead to her and her government’s downfall.
  • But the scandal has its roots much further back than Merkel’s own government, harking to a time when Europe was gripped by the cold war. Both the US and the UK, as victors of the second world war who had Germany under close supervision, ran spying networks from Germany, most notably from Bad Aibling in Bavaria, the biggest listening station outside the US and Britain. Officially, the US withdrew its operations in 2004. But unofficially it stayed there under an agreement in which Germany agreed to hand over its intelligence findings in return for the highly sophisticated technology the US was able to provide. The events of 9/11 and the revelations that three of the pilots had lived in Germany undetected only served to increase the pressure the US was able to put on Germany that its presence was necessary. Bad Aibling, officially now solely a BND listening facility, was the post used by the NSA in the current scandal.
  • The affair has underlined just how dependent Germany still is on the US and to a lesser extent the UK, on issues of intelligence and defence. Their desire for still-closer cooperation culminated in Operation Monkey Shoulder (named after a blend of three different types of malt whiskys) involving the BND, NSA and MI6, Spiegel recently revealed. With such a background, the German government has to appear to be criticising the US at the same time as underlining the importance of cooperation. Merkel, who appeared to be hugely at odds with the US government when it was revealed in 2013 that the NSA’s mass intelligence operation included tapping her mobile phone, has so far responded in a characteristically vague and flat manner. While acknowledging that allies should not spy on each other, she has stressed that spying’s most important role is to prevent terrorist attacks. “The government will do everything to guarantee the ability of the intelligence services,” she said on Monday. “Taking terrorist threats into account, that ability is only possible in cooperation with other agencies. That very much includes the NSA, as well as others.”
  • Commenting on the crisis, Spiegel magazine called it the “biggest challenge that the ‘Merkel Regime’ has had to face”, and potentially the “turning point of her chancellorship”. “She enjoys such trust because many Germans feel she looks after the country’s needs and their own very well. But the scandal … could cause the foundations of her power to crumble,” the magazine said.
« First ‹ Previous 41 - 60 of 117 Next › Last »
Showing 20 items per page