Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "publishers" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Two 'abandoned' cylinders seized in Syria contained sarin - U.N. | Reuters - 0 views

  • Reuters) - Two cylinders reportedly seized by Syrian government troops in an area controlled by armed opposition groups contained deadly sarin, U.N. Secretary-General Ban Ki-moon said in a letter to the U.N. Security Council published on Monday.
11More

Virtual Economy's Phantom Job Gains Are Based on Statistical Fraud. And More Fraud Is i... - 0 views

  • Washington can’t stop lying.  Don’t be convinced by last Thursday’s job report that it is your fault if you don’t have a job. Those 288,000 jobs and 6.1% unemployment rate are more fiction than reality.  In his analysis of the June Labor Data from the Bureau of Labor Statistics, John Williams (www.ShadowStats.com) wrote that the 288,000 June jobs and 6.1% unemployment rate  are “far removed from common experience and underlying reality.” Payrolls were overstated by “massive, hidden shifts in seasonal adjustments,” and the Birth-Death model added the usual phantom jobs.  Williams reports that “the seasonal factors are changed each and every month as part of the concurrent seasonal-adjustment process, which is tantamount to a fraud,” as the changes in the seasonal factors can inflate the jobs number.  While the headline numbers always are on a new basis, the prior reporting is not revised so as to be consistent.
  • The monthly unemployment rates are not comparable, so one doesn’t know whether the official U.3 rate (the headline rate that the financial press reports) went up or down. Moreover, the rate does not count discouraged workers who, unable to find a job, cease looking. To be counted among the U.3 unemployed, the person must have actively looked for work during the four weeks prior to the survey. The U.3 rate automatically declines as people who have been unable to find jobs cease trying to find one and thereby cease to be counted as unemployed. There is a second official measure of unemployment that includes people who have been discouraged for less than one year. That rate, known as U.6, is seldom reported and is double the 6.1% rate. Since 1994 there has been no official measure than includes discouraged people who have not looked for a job for more than a year. Including all discouraged workers produces an unemployment rate that currently stands at 23.1%, almost four times the rate that the financial press reports.
  • What you can take away from this is the opposite of what the presstitute media would have you believe.  The measured rate of unemployment can decline simply because large numbers of the unemployed become discouraged workers, cease looking for work, and cease to be counted in the U.3 and U.6 measures of the unemployment rate.   The decline in the employment-population ratio from 63% prior to the 2008 downturn to 59% today reflects the growth in discouraged workers.  Indeed, the ratio has not recovered its previous level during the alleged recovery, an indication that the recovery is an illusion created by the understated measure of inflation that is used to deflate nominal GDP growth.
  • ...8 more annotations...
  • Insurance (most likely the paperwork of Obamacare) contributed 8,500 jobs. As so few can purchase homes, “real estate rental and leasing” contributed 8,500 jobs. Professional and business services contributed 67,000 jobs, but 57% of these jobs were in employment services, temporary help services, and services to buildings and dwellings.   That old standby, education and health services, accounted for 33,700 jobs consisting mainly of ambulatory health care services jobs and social assistance jobs of which three-quarters are in child day care services.   The other old standby, waitresses and bartenders, gave us 32,800 jobs, and amusements, gambling, and recreation gave us 3,500 jobs.
  • In other words, the economy did not gain 288,000 new jobs last month.   But let’s assume the economy did gain 288,000 jobs and exam where the claimed jobs are reported to be. Of the alleged 288,000 new jobs, 16,000, or 5.5 percent are in manufacturing, which is not very promising for engineers and blue collar workers.  Growth in goods producing jobs has almost disappeared from the US economy.  As explained below, to alter this problem the government is going to change definitions in order to artificially inflate manufacturing jobs. In June private services account for 82 percent of the supposed new jobs.  The jobs are found mainly in non-tradable domestic services that pay little and cannot be exported to help to close the large US trade deficit. Wholesale and retail trade account for 55,300 jobs.  Do you believe sales are this strong  when retailers are closing stores and when shopping malls are closing?
  • Another indication that there has been no recovery is that Sentier Research’s index of real median household income continued to decline for two years after the alleged recovery began in June 2009.   There has been a slight upturn in real median household income since June 2011, but income remains far below the pre-recession level.   The Birth-Death model adds an average of 62,000 jobs to the reported payroll jobs numbers each month. This arbitrary boost to the payroll jobs numbers is in addition to the Bureau of Labor Statistics’ underlying assumption that unreported jobs lost to business failures are matched by unreported new jobs from new business startups, an assumption that does not well fit an economy that fell into recession and is unable to recover.   John Williams concludes that in current BLS reporting, “the aggregate average overstatement of employment change easily exceeds 200,000 jobs per month.”
  • Local government, principally education, gave us 22,000 jobs.   So, where are the jobs for university graduates?  They are practically non-existent. Think of all the MBAs, but June had only 2,300 jobs for management of companies and enterprises. Think of the struggle to get into law and medical schools.  There’s no job payoff. June had jobs for 1,200 in legal services, which includes receptionists and para-legals.  Where are all the law school graduates finding jobs? Offices of physicians (mainly people who fill out the mandated paperwork and comply with all the regulations, which have multiplied under ObamaCare) hired 4,000 people.  Outpatient care centers hired 700 people.  Nursing care facilities hired 2,400 people.  So where are the jobs for the medical school graduates? Aside from all the exaggerations in the jobs numbers of which ShadowStats.com has informed us, just taking the jobs as reported, what kind of economy do these jobs indicate:  a superpower whose pretensions are to exercise hegemony over the world or an economy in which opportunities are disappearing and incomes are falling?
  • Do you think that this jobs picture would be the same if the government in Washington cared about you instead of the mega-rich? Some interesting numbers can be calculated from table A.9 in the BLS press release.  John Williams advises that the BLS is inconsistent in the methods it uses to tabulate the data in table A.9 and that the data is also afflicted by seasonal adjustment problems.  However, as the unemployment rate and payroll jobs are reported regardless of their problems, we can also report the BLS finding that in June 523,000 full-time jobs disappeared and 800,000 part time jobs appeared. Here, perhaps, we have yet another downside of the misnamed Obama “Affordable Care Act.”  Employers are terminating full-time employment and replacing the jobs with part-time employment in order to come in under the 50-person full time employment that makes employers responsible for fringe benefits such as health care. Americans are already experiencing difficulties making ends meet, despite the alleged “recovery.”  If yet another half million Americans have been forced onto part-time pay with consequent loss of health care and other benefits, consumer demand is further compressed, with the consequence, unless hidden by statistical trickery, of a 2nd quarter negative GDP and thus officially the reappearance of recession.
  • What will the government do if a recession cannot be hidden?  If years of unprecedented money printing and Keynesian fiscal deficits have not brought recovery, what will bring recovery?  How far down will US living standards fall for the 99% in order that the 1% can become ever more mega-rich while Washington wastes our diminishing substance exercising hegemony over the world? Just as Washington lied to you about Saddam Hussein’s weapons of mass destruction, Assad’s use of chemical weapons, Russian invasion of Ukraine, Waco, and any number of false flag or nonexistent attacks such as Tonkin Gulf, Washington lies to you about jobs and economic recovery.  Don’t believe the spin that you are unemployed because you are shiftless and prefer government handouts to work.  The government does not want you to know that you are unemployed because the corporations offshored American jobs to foreigners and because economic policy only serves the oversized banks and the one percent. Just as the jobs and inflation numbers are rigged and the financial markets are rigged, the corrupt Obama regime is now planning to rig US manufacturing and trade statistics in order to bury all evidence of offshoring’s adverse impact on our economy.
  • The federal governments Economic Classification Policy Committee has come up with a proposal to redefine fact as fantasy in order to hide offshoring’s contribution to the US trade deficit, artificially inflate the number of US manufacturing jobs, and redefine foreign-made manufactured products as US manufactured products.  For example, Apple iPhones made in China and sold in Europe would be reported as a US export of manufactured goods. Read Ben Beachy’s important report on this blatant statistical fraud in CounterPunch’s July 4th weekend edition: http://www.counterpunch.org/2014/07/04/we-didnt-offshore-manufacturing/ China will not agree that the Apple brand name means that the phones are not Chinese production. If the Obama regime succeeds with this fraud, the iPhones would be counted twice, once by China and once by the US, and the double-counting would exaggerate world GDP. For years I have exposed the absurd claim that offshoring is merely the operation of free trade, and I have exposed the incompetent studies by such as Michael Porter at Harvard and Matthew Slaughter at Dartmouth that claimed to prove that the US was benefitting from offshoring its manufacturing.  My book published in 2012 in Germany and in 2013 in the US, The Failure of Laissez Faire Capitalism and Economic Dissolution of the West, proves that offshoring has dismantled the ladders of upward mobility that made the US an opportunity society and is responsible for the decline in US economic growth. The lost jobs and decline in the middle class has contributed to the rise in income inequality, the destruction of tax base for cities and states, and loss of population in America’s once great manufacturing centers.
  • For the most part economists have turned a blind eye. Economists serve the globalists.  It pays them well. The corruption in present-day America is total. Psychologists and anthropologists serve war and torture. Economists serve globalism and US financial hegemony. Physicists and chemists serve the war industries. Physicists and computer geeks serve NSA. The media serves the government and the corporations. The political parties serve the six powerful private interest groups that rule the country. No one serves truth and liberty. I predict that within ten years truth and liberty will be forbidden words uttered only by “domestic extremists” who are a threat that must be exterminated without due process of law. America has left us.  We now have the tyranny of the Orwellian state that rules, not by the ballot box and Constitution, but by force and propaganda.
5More

Use Tor or 'EXTREMIST' Tails Linux? Congrats, you're on the NSA's list * The Register - 0 views

  • Alleged leaked documents about the NSA's XKeyscore snooping software appear to show the paranoid agency is targeting Tor and Tails users, Linux Journal readers – and anyone else interested in online privacy.Apparently, this configuration file for XKeyscore is in the divulged data, which was obtained and studied by members of the Tor project and security specialists for German broadcasters NDR and WDR. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> In their analysis of the alleged top-secret documents, they claim the NSA is, among other things:Specifically targeting Tor directory servers Reading email contents for mentions of Tor bridges Logging IP addresses used to search for privacy-focused websites and software And possibly breaking international law in doing so. We already know from leaked Snowden documents that Western intelligence agents hate Tor for its anonymizing abilities. But what the aforementioned leaked source code, written in a rather strange custom language, shows is that not only is the NSA targeting the anonymizing network Tor specifically, it is also taking digital fingerprints of any netizens who are remotely interested in privacy.
  • These include readers of the Linux Journal site, anyone visiting the website for the Tor-powered Linux operating system Tails – described by the NSA as "a comsec mechanism advocated by extremists on extremist forums" – and anyone looking into combining Tails with the encryption tool Truecrypt.If something as innocuous as Linux Journal is on the NSA's hit list, it's a distinct possibility that El Reg is too, particularly in light of our recent exclusive report on GCHQ – which led to a Ministry of Defence advisor coming round our London office for a chat.
  • If you take even the slightest interest in online privacy or have Googled a Linux Journal article about a broken package, you are earmarked in an NSA database for further surveillance, according to these latest leaks.This is assuming the leaked file is genuine, of course.Other monitored sites, we're told, include HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion. The IP address of computer users even looking at these sites is recorded and stored on the NSA's servers for further analysis, and it's up to the agency how long it keeps that data.The XKeyscore code, we're told, includes microplugins that target Tor servers in Germany, at MIT in the United States, in Sweden, in Austria, and in the Netherlands. In doing so it may not only fall foul of German law but also the US's Fourth Amendment.
  • ...2 more annotations...
  • The nine Tor directory servers receive especially close monitoring from the NSA's spying software, which states the "goal is to find potential Tor clients connecting to the Tor directory servers." Tor clients linking into the directory servers are also logged."This shows that Tor is working well enough that Tor has become a target for the intelligence services," said Sebastian Hahn, who runs one of the key Tor servers. "For me this means that I will definitely go ahead with the project.”
  • While the German reporting team has published part of the XKeyscore scripting code, it doesn't say where it comes from. NSA whistleblower Edward Snowden would be a logical pick, but security experts are not so sure."I do not believe that this came from the Snowden documents," said security guru Bruce Schneier. "I also don't believe the TAO catalog came from the Snowden documents. I think there's a second leaker out there."If so, the NSA is in for much more scrutiny than it ever expected.
4More

Files on UK role in CIA rendition accidentally destroyed, says minister | World news | ... - 0 views

  • The British government's problems with missing files deepened dramatically when the Foreign Office claimed documents on the UK's role in the CIA's global abduction operation had been destroyed accidentally when they became soaked with water.In a statement that human rights groups said "smacked of a cover-up", the department maintained that records of post-9/11 flights in and out of Diego Garcia, the British territory in the Indian Ocean, were "incomplete due to water damage".The claim comes amid media reports in the US that a Senate report due to be published later this year identifies Diego Garcia as a location where the CIA established a secret prison as part of its extraordinary rendition programme. According to one report, classified CIA documents state that the prison was established with the "full cooperation" of the UK government.
  • Ministers of successive governments have repeatedly given misleading or incomplete information about the CIA's use of Diego Garcia. In February 2008, the then foreign secretary, David Miliband, was forced to apologise to MPs and explain that Tony Blair's "earlier explicit assurances that Diego Garcia had not been used for rendition flights" had not been correct. Miliband said at this point that two rendition flights had landed, but that the detainees on board had not disembarked.Miliband's admission was made after human rights groups produced irrefutable evidence that aircraft linked to the rendition programme had landed on Diego Garcia. Since then, far more aircraft have been shown to have been involved in the operation.The "water damage" claim was given in response to a parliamentary question by the Tory chair of the Treasury select committee, Andrew Tyrie, who has been investigating the UK's involvement in the rendition programme for several years.
  • The British government is particularly sensitive about the allegations that Diego Garcia hosted one of the CIA's prisons, at times claiming that it knows only that which it is told by Washington. Although the island has operated as a US military base since the islanders were evicted in the 1960s, it remains a British territory, and its use during the rendition programme would have placed the UK in breach of a raft of international and domestic laws.Belhaj and his wife are suing MI6, the agency's former head of counter-terrorism Sir Mark Allen and Jack Straw, who was foreign secretary at the time that the couple were abducted.Last month, the Commons cross-party defence committee suggested that information about the extent to which the CIA used the island as a "black site" to transfer detainees was still being withheld. "Recent developments have once again brought into question the validity of assurances by the US about its use of Diego Garcia," it said.The committee warned that it will assess the implications for Britain and for "public confidence" in its previous statements on US use of Diego Garcia, and said the US should not in future be permitted to use the island, to transfer terror suspects, for combat operations, "or any other politically sensitive activity", without the explicit authorisation from the UK government.
  • ...1 more annotation...
  • Although Miliband told MPs that detainees had not been held on Diego Garcia, others have contradicted this assertion.Manfred Nowak, as United Nations special rapporteur on torture, said he had received "credible evidence from well-placed sources familiar with the situation on the island" that CIA detainees had been held there between 2002 and 2003.General Barry McCaffrey, a former head of Southcom, the US military's southern command, has twice stated publicly that Diego Garcia has been used by the US to hold prisoners, saying in one radio interview in May 2004: "We're probably holding around 3,000 people, you know, Bagram air field, Diego Garcia, Guantánamo, 16 camps throughout Iraq."In 2003, Time magazine quoted "a regional intelligence official" as saying that a man accused of plotting the 2002 Bali nightclub bombing was being interrogated on Diego Garcia. Five years later the magazine reported that a CIA counter-terrorism official said a high-value prisoner or prisoners were being held and interrogated on the island.In August 2008, the Observer reported that former US intelligence officers "unofficially told senior Spanish judge Baltasar Garzón that Mustafa Setmarian, a Spanish-based Syrian accused of running terrorist training camps in Afghanistan, was taken to Diego Garcia in late 2005 and held there for months".
5More

A Zombie Bill Comes Back to Life: A Look at The Senate's Cybersecurity Information Shar... - 0 views

  • The Senate Intelligence Committee recently introduced the Cybersecurity Information Sharing Act of 2014. It’s the fourth time in four years that Congress has tried to pass "cybersecurity" legislation. Unfortunately, the newest Senate bill is one of the worst yet. Cybersecurity bills aim to facilitate information sharing between companies and the government, but they always seem to come with broad immunity clauses for companies, vague definitions, and aggressive spying powers. Given such calculated violence to users' privacy rights, it’s no surprise that these bills fail every year. What is a surprise is that the bills keep coming back from the dead. Last year, President Obama signed Executive Order 13636 (EO 13636) directing the Department of Homeland Security (DHS) to expand current information sharing programs that are far more privacy protective than anything seen in recent cybersecurity bills. Despite this, members of Congress like Rep. Mike Rogers and Senator Dianne Feinstein keep on introducing bills that would destroy these privacy protections and grant new spying powers to companies.
  • Aside from its redundancy, the Senate's bill grants two new authorities to companies. First, the bill authorizes companies to launch countermeasures for a "cybersecurity purpose" against a "cybersecurity threat." "Cybersecurity purpose" is so broadly defined that it means almost anything related to protecting (including physically protecting) an information system, which can be a computer or software. The same goes for a "cybersecurity threat," which includes anything that "may result" in an unauthorized effort to impact the availability of the information system. Combined, the two definitions could be read by companies to permit attacks on machines that unwittingly contribute to network congestion. The countermeasures clause will increasingly militarize the Internet—a prospect that may appeal to some "active defense" (aka offensive) cybersecurity companies, but does not favor the everyday user. Second, the bill adds a new authority for companies to monitor information systems to protect an entity's rights or property. Here again, the broad definitions could be used in conjunction with the monitoring clause to spy on users engaged in potentially innocuous activity. Once collected, companies can then share the information, which is also called “cyber threat indicators,” freely with government agencies like the NSA.
  • Such sharing will occur because under this bill, DHS would no longer be the lead agency making decisions about the cybersecurity information received, retained, or shared to companies or within the government. Its new role in the bill mandates DHS send information to agencies like the NSA—"in real-time and simultaneous[ly]." DHS is even barred from "delay[ing]" or "interfer[ing]" with the information, which ensures that DHS's current privacy protections won’t be applied to the information. The provision is ripe for improper and over-expansive information sharing. This leads to a question: What stops your sensitive personal information from being shared by companies to the government? Almost nothing. Companies must only remove personally identifiable information if the information is known to be US person information and not directly related to the threat. Such a willful blindness approach is inappropriate. Further, the bill does not even impose this weak minimization requirement on information shared by, and within, the government (including federal, state, local, and tribal governments) thereby allowing the government to share information containing personally identifiable information. The bill should require deletion of all information not directly related to a threat.
  • ...2 more annotations...
  • Once the information is sent to a government agency, it can use the information for reasons other than for cybersecurity purposes. One clause even allows the information to be used to prosecute violations of the Espionage Act—a World War I era law that was meant to prosecute spies but has been used in recent years primarily to go after journalists’ sources. The provisions grant the government far too much leeway in how to use the information for non-cybersecurity purposes. The public won’t even know what information is being collected, shared, or used because the bill will exempt all of it from disclosure under the Freedom of Information Act.
  • The bill also retains near-blanket immunity for companies to monitor information systems, to share information, and to use countermeasures. The high bar immunizes an incredible amount of activity, including negligent damage to property and may deprive private entities of legal recourse if a computer security contractor is at fault for destruction of property. Existing private rights of action for violations of the Wiretap Act, Stored Communications Act, and the Computer Fraud and Abuse Act would be precluded or at least sharply restricted by the clause. It remains to be seen why such immunity is needed when just a few months ago, the FTC and DOJ noted they would not prosecute companies for sharing such information. It's also unclear because we continue to see companies freely share information among each other and with the government both publicly via published reports and privately.
6More

NSA targets the privacy-conscious (Seite 1)| Das Erste - Panorama - Meldungen - 0 views

  • The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Three authors of this investigation have personal and professional ties to the Tor Project, an American company mentioned within the following investigation.
  • Teil 1: NSA targets the privacy-conscious Teil 2: The Tor Project - anathema to the NSA Teil 3: Servers in Germany targeted Teil 4: Simple web searches are suspicious Teil 5: NSA: In strict accordance with the rule of law
  • ...3 more annotations...
  • von J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge The investigation discloses the following: Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.  The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it an "extremist forum".
  • Downloads XKeyscore rules Read/download the XKeyscore rules here  | download
  • Yet despite these efforts, one of the servers is targeted by the NSA. The IP address 212.212.245.170 is explicitly specified in the rules of the powerful and invasive spy software program XKeyscore. The code is published here exclusively for the first time. After a year of NSA revelations based on documents that focus on program names and high-level Powerpoint presentations, NDR and WDR are revealing NSA source code that shows how these programs function and how they are implemented in Germany and around the world. Months of investigation by the German public television broadcasters NDR and WDR, drawing on exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government reveal that not only is the server in Nuremberg under observation by the NSA, but so is virtually anyone who has taken an interest in several well-known privacy software systems.
1More

Over a dozen CIA-recruited spies work in German ministries - report - RT News - 0 views

  • US secret services have recruited more than a dozen officials in various German government ministries to work as spies, with some of them working for the CIA for many years, a German tabloid reported on Sunday. Following previous espionage scandals in Germany, with several suspected US agents exposed in July, a report of more spies infiltrating German ministries was published by Bild am Sonntag, Germany's largest-selling national Sunday paper. The alleged spies work within the country's defense, development, economic, and interior ministries, reported the paper, referring to unnamed sources in the US intelligence community. Due to the current diplomacy tensions between Washington and Berlin, caused by espionage concerns, the spies are reportedly not meeting with their US handlers at the moment, according to Bild. Several inquiries into the activities of American embassies in Prague and Warsaw have been initiated, as US intelligence agencies are reportedly considering basing their recruitment activities there.
4More

Revelations of German Pilot: Shocking Analysis of the "Shooting Down" of Malaysian MH17... - 1 views

  • First, I was amazed at how few photos can be found from the wreckage with Google. All are in low resolution, except one: The fragment of the cockpit below the window on the pilots side. This image, however, is shocking. In Washington, you can now hear views expressed of a “potentially tragic error / accident” regarding MH 017. Given this particular cockpit image it does not surprise me at all. Entry and exit impact holes of projectiles in the cockpit area
  • I recommend to click on the little picture to the left. You can download this photo as a PDF in good resolution. This is necessary, because that will allow you understand what I am describing here. The facts speak clear and loud and are beyond the realm of speculation: The cockpit shows traces of shelling! You can see the entry and exit holes. The edge of a portion of the holes is bent inwards. These are the smaller holes, round and clean, showing the entry points most likely that of a 30 millimeter caliber projectile. The edge of the other, the larger and slightly frayed exit holes showing shreds of metal pointing produced by the same caliber projectiles. Moreover, it is evident that at these exit holes of the outer layer of the double aluminum reinforced structure are shredded or bent – outwardly! Furthermore, minor cuts can be seen, all bent outward, which indicate that shrapnel had forcefully exited through the outer skin from the inside of the cockpit. The open rivets are are also bent outward.
  • In sifting through the available images one thing stands out: All wreckage of the sections behind the cockpit are largely intact, except for the fact that only fragments of the aircraft remained . Only the cockpit part shows these peculiar marks of destruction. This leaves the examiner with an important clue. This aircraft was not hit by a missile in the central portion. The destruction is limited to the cockpit area. Now you have to factor in that this part is constructed of specially reinforced material. This is on account of the nose of any aircraft having to withstand the impact of a large bird at high speeds. You can see in the photo, that in this area significantly stronger aluminum alloys were being installed than in the remainder of the outer skin of the fuselage. One remembers the crash of Pan Am over Lockerbie. It was a large segment of the cockpit that due to the special architecture survived the crash in one piece. In the case of flight MH 017 it becomes abundantly clear that there also an explosion took place inside the aircraft.
  • ...1 more annotation...
  • So what could have happened? Russia recently published radar recordings, that confirm at least one Ukrainian SU 25 in close proximity to MH 017. This corresponds with the statement of the now missing Spanish controller ‘Carlos’ that has seen two Ukrainian fighter aircraft in the immediate vicinity of MH 017. If we now consider the armament of a typical SU 25 we learn this: It is equipped with a double-barreled 30-mm gun, type GSh-302 / AO-17A, equipped with: a 250 round magazine of anti-tank incendiary shells and splinter-explosive shells (dum-dum), arranged in alternating order. The cockpit of the MH 017 has evidently been fired at from both sides: the entry and exit holes are found on the same fragment of it’s cockpit segment! Now just consider what happens when a series of anti-tank incendiary shells and splinter-explosive shells hit the cockpit. These are after all designed to destroy a modern tank. The anti-tank incendiary shells partially traversed the cockpit and exited on the other side in a slightly deformed shape. (Aviation forensic experts could possibly find them on the ground presumably controlled by the Kiev Ukrainian military; the translator). After all, their impact is designed to penetrate the solid armor of a tank. Also, the splinter-explosive shells will, due to their numerous impacts too cause massive explosions inside the cockpit, since they are designed to do this. Given the rapid firing sequence of the GSh-302 cannon, it will cause a rapid succession of explosions within the cockpit area in a very short time. Remeber each of these is sufficient to destroy a tank.
2More

Great Privacy Essay: Fourth Amendment Doctrine in the Era of Total Surveillance | CIO - 0 views

  •  
    "'Failing Expectations: Fourth Amendment Doctrine in the Era of Total Surveillance' is a thought-provoking essay written by a Fordham University law professor about how the reasonable expectation test for privacy is failing to protect us. Add into our networked world the third-party doctrine and we have little protection against unreasonable searches and seizures."
  •  
    It doesn't detract substantially from the essay's central thesis, but an important part of the learned professor's heartfelt desires were delivered in a Supreme Court decision just decided, after the essay was published, Reilly v. California, http://www.supremecourt.gov/opinions/13pdf/13-132_8l9c.pdf The Court held in relevant part: "We also reject the United States' final suggestion that officers should always be able to search a phone's call log, as they did in Wurie's case. The Government relies on Smithv. Maryland, 442 U. S. 735 (1979), which held that no warrant was required to use a pen register at telephone company premises to identify numbers dialed by a particular caller. The Court in that case, however, concluded that the use of a pen register was not a "search" at all under the Fourth Amendment. See id., at 745-746. There is no dispute here that the officers engaged in a search of Wurie's cell phone. Moreover, call logs typically contain more than just phone numbers; they include any identifying information that an individual might add, such as the label "my house" in Wurie's case." The effect there was to confine Smith v. Maryland, the foundation of the third-party doctrine, to its particular facts. In other words, the third-party doctrine is now confined to connected telephone numbers, the connect time, and the duration of the call. If any other metadata is gathered, such as location data, the third-party doctrine no longer applies. When you read the rest of the Reilly decision, you see a unanimous Supreme Court shooting down one government defense after another that have been used in the NSA's defense to mass telecommunications surveillance. But most interestingly, the Court unmistakably has laid the groundwork for a later decision drastically cutting back on digital surveillance without a search warrant based on particularized probable cause to believe that evidence of a specific crime has occurred and that the requested sear
2More

NSA Surveillance Chilling Effects: HRW and ACLU Gather More Evidence | Electronic Front... - 0 views

  • Human Rights Watch and the ACLU today published a terrific report documenting the chilling effect on journalists and lawyers from the NSA's surveillance programs entitled: "With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law and American Democracy." The report, which is chock full of evidence about the very real harms caused by the NSA's surveillance programs, is the result of interviews of 92 lawyers and journalists, plus several senior government officials.  This report adds to the growing body of evidence that the NSA's surveillance programs are causing real harm.  It also links these harms to key parts of both U.S. constitutional and international law, including the right to counsel, the right of access to information, the right of association and the free press. It is a welcome addition to the PEN report detailing the effects on authors, called Chilling Effects: How NSA Surveillance Drives US Writers to Self-Censor and the declarations of 22 of EFF's clients in our First Unitarian Church of Los Angeles v. NSA case. 
  • The HRW and ACLU report documents the increasing treatment of journalists and lawyers as legitimate surveillance targets and surveys how they are responding. Brian Ross of ABC says: There’s something about using elaborate evasion and security techniques that’s offensive to me—that I should have to operate as like a criminal, like a spy. The report also notes that the government increasingly likens journalists to criminals. As Scott Shane of the New York Times explains: To compare the exchange of information about sensitive programs between officials and the media, which has gone on for decades, to burglary seems to miss the point. Burglary is not part of a larger set of activities protected by the Constitution, and at the heart of our democracy. Unfortunately, that mindset is sort of the problem. Especially striking in the report is the disconnect between the real stories of chilling effects from reporters and lawyers and the skeptical, but undocumented, rejections from senior government officials.  The reporters explain difficulties in building trust with their sources and the attorneys echo that with stories about the difficulties building client trust.  The senior government officials, in contrast, just say that they don't believe the journalists and appear to have thought little, if at all about the issues facing lawyers.  
10More

"Support MH17 Truth": OSCE Monitors Identify "Shrapnel and Machine Gun-Like Holes" indi... - 0 views

  • The facts speak clear and loud and are beyond the realm of speculation: The cockpit shows traces of shelling! You can see the entry and exit holes. The edge of a portion of the holes is bent inwards. These are the smaller holes, round and clean, showing the entry points most likely that of a 30 millimeter caliber projectile. (Revelations of German Pilot: Shocking Analysis of the “Shooting Down” of Malaysian MH17. “Aircraft Was Not Hit by a Missile” Global Research, July 30, 2014)
  • Based on detailed analysis Peter Haisenko reached  the conclusion that the MH17 was not downed by a missile attack: This aircraft was not hit by a missile in the central portion. The destruction is limited to the cockpit area. Now you have to factor in that this part is constructed of specially reinforced material The OSCE Mission It is worth noting that the initial statements by OSCE observers (July 31) broadly confirm the findings of Peter Haisenko: Monitors from the Organization for Security and Cooperation in Europe reported that shrapnel-like holes were found in two separate pieces of the fuselage of the ill-fated Malaysia Airlines aircraft that was believed to have been downed by a missile in eastern Ukraine. Michael Bociurkiw of the OSCE group of monitors at his daily briefing described part of the plane’s fuselage dotted with “shrapnel-like, almost machine gun-like holes.” He said the damage was inspected by Malaysian aviation-security officials .(Wall Street Journal, July 31, 2014)
  • The monitoring OSCE team has not found evidence of a missile fired from the ground as conveyed by official White House statements. As we recall, the US ambassador to the UN Samantha Power stated –pointing a finger at Russia– that the Malaysian MH17 plane was “likely downed by a surface-to-air missile operated from a separatist-held location”: The team of international investigators with the Organisation for Security and Cooperation in Europe (OSCE) are uncertain if the missile used was fired from the ground as US military experts have previously suggested, the Wall Street Journal (WSJ) reported. (Malay Mail online, emphasis added) The initial OSCE findings tend to dispel the claim that a BUK missile system brought down the plane. Evidently, inasmuch as the perforations are attributable to shelling, a shelling operation conducted from the ground could not have brought down an aircraft traveling above 30,000 feet.
  • ...6 more annotations...
  • Peter Haisenko’s study is corroborated by the Russian Ministry of Defense which pointed to a Ukrainian Su-25 jet in the flight corridor of the MH17, within proximity of the plane. Ironically, the presence of a military aircraft is also confirmed by a BBC  report conducted at the crash site on July 23. All the eyewitnesses  interviewed by the BBC confirmed the presence of a Ukrainian military aircraft flying within proximity of Malaysian Airlines MH17 at the time that it was shot down: 
  • Eyewitness #1: There were two explosions in the air. And this is how it broke apart. And [the fragments] blew apart like this, to the sides. And when … Eyewitness #2: … And there was another aircraft, a military one, beside it. Everybody saw it. Eyewitness #1: Yes, yes. It was flying under it, because it could be seen. It was proceeding underneath, below the civilian one. Eyewitness #3: There were sounds of an explosion. But they were in the sky. They came from the sky. Then this plane made a sharp turn-around like this. It changed its trajectory and headed in that direction [indicating the direction with her hands]. BBC Report below
  • The original BBC Video Report published by BBC Russian Service on July 23, 2014 has since been removed from the BBC archive.  In a bitter irony, The BBC is censoring its own news productions. Media Spin The media is now saying that a missile was indeed fired but it was not the missile that brought down the plane, it was the shrapnel from the missile which punctured the plane and then led to a loss of pressure.  According to Ukraine’s National security spokesman Andriy Lysenko in a contradictory statement, the MH17 aircraft “suffered massive explosive decompression after being hit by a shrapnel missile.”  (See IBT, Australia) In an utterly absurd report, the BBC quoting the official Ukraine statement  says that:
  • The downed Malaysia Airlines jet in eastern Ukraine suffered an explosive loss of pressure after it was punctured by shrapnel from a missile. They say the information came from the plane’s flight data recorders, which are being analysed by British experts. However, it remains unclear who fired a missile, with pro-Russia rebels and Ukraine blaming each other. Many of the 298 people killed on board flight MH17 were from the Netherlands. Dutch investigators leading the inquiry into the crash have refused to comment on the Ukrainian claims.
  • The shrapnel marks should be distinguished from the small entry and exit holes “most likely that of a 30 millimeter caliber projectile” fired from a military aircraft. These holes could not have been caused by a missile attack as hinted by the MSM. While the MSN is saying that the “shrapnel like holes” can be caused by a missile (see BBC report above), the OSCE has confirmed the existence of what it describes as “machine gun like holes”, without however acknowledging that these cannot be caused by a missile. In this regard, the GSh-302 firing gun operated by an Su-25 is able to fire 3000 rpm which explains the numerous entry and exit holes. According to the findings of Peter Haisenko: If we now consider the armament of a typical SU 25 we learn this: It is equipped with a double-barreled 30-mm gun, type GSh-302 / AO-17A, equipped with: a 250 round magazine of anti-tank incendiary shells and splinter-explosive shells (dum-dum), arranged in alternating order. The cockpit of the MH 017 has evidently been fired at from both sides: the entry and exit holes are found on the same fragment of it’s cockpit segment (op cit)
  • The accusations directed against Russia including the sanctions regime imposed by Washington are based on a lie. The evidence does not support the official US narrative to the effect that the MH17 was shot down by a BUK missile system operated by the DPR militia.
  •  
    Looks like John Kerry may be about to get caught in another major lie. 
4More

ISPs take GCHQ to court in UK over mass surveillance | World news | theguardian.com - 0 views

  • Internet service providers from around the world are lodging formal complaints against the UK government's monitoring service, GCHQ, alleging that it uses "malicious software" to break into their networks.The claims from seven organisations based in six countries – the UK, Netherlands, US, South Korea, Germany and Zimbabwe – will add to international pressure on the British government following Edward Snowden's revelations about mass surveillance of the internet by UK and US intelligence agencies.The claims are being filed with the investigatory powers tribunal (IPT), the court in London that assesses complaints about the agencies' activities and misuse of surveillance by government organisations. Most of its hearings are held at least partially in secret.
  • The IPT is already considering a number of related submissions. Later this month it will investigate complaints by human rights groups about the way social media sites have been targeted by GCHQ.The government has defended the security services, pointing out that online searches are often routed overseas and those deemed "external communications" can be monitored without the need for an individual warrant. Critics say that such a legal interpretation sidesteps the need for traditional intercept safeguards.The latest claim is against both GCHQ, located near Cheltenham, and the Foreign Office. It is based on articles published earlier this year in the German magazine Der Spiegel. That report alleged that GCHQ had carried out an attack, codenamed Operation Socialist, on the Belgian telecoms group, Belgacom, targeting individual employees with "malware (malicious software)".One of the techniques was a "man in the middle" attack, which, according to the documents filed at the IPT, bypasses modern encryption software and "operates by interposing the attacker [GCHQ] between two computers that believe that they are securely communicating with each other. In fact, each is communicating with GCHQ, who collect the communications, as well as relaying them in the hope that the interference will be undetected."The complaint alleges that the attacks were a breach of the Computer Misuse Act 1990 and an interference with the privacy rights of the employees under the European convention of human rights.
  • The organisations targeted, the submission states, were all "responsible and professional internet service providers". The claimants are: GreenNet Ltd, based in the UK, Riseup Networks in Seattle, Mango Email Service in Zimbabwe, Jinbonet in South Korea, Greenhost in the Netherlands, May First/People Link in New York and the Chaos Computer Club in Hamburg.
  • ...1 more annotation...
  • Among the programs said to have been operating were Turbine, which automates the injection of data and can infect millions of machines and Warrior Pride, which enables microphones on iPhones and Android devices to be remotely activated.
2More

Iran 1953: US Envoy to Baghdad Suggested to Fleeing Shah He Not Acknowledge Foreign Rol... - 0 views

  • On August 16, 1953, the same day the Shah of Iran fled to Baghdad after a failed attempt to oust Prime Minister Mohammad Mosaddeq, the agitated monarch spoke candidly about his unsettling experience to the U.S. ambassador to Iraq. In a highly classified cable to Washington, the ambassador reported: "I found Shah worn from three sleepless nights, puzzled by turn of events, but with no (repeat no) bitterness toward Americans who had urged and planned action. I suggested for his prestige in Iran he never indicate that any foreigner had had a part in recent events. He agreed." Despite the passage of more than six decades, fundamental questions persist about Mosaddeq's overthrow, including who was responsible for this milestone event in Iranian history. The above cable, which was previously published but with these key passages excised for secrecy reasons, is one of several important pieces of evidence pointing to the United States role. Nevertheless, the question of how important the U.S. and British were in the events of 1953 has recently come under intensified scrutiny. An article in the July/August 2014 issue of Foreign Affairs by noted Iran analyst Ray Takeyh is the latest in a series of analyses by respected scholars who conclude Iranians, not the CIA or British intelligence, were fundamentally responsible.
  • In the course of explaining "What Really Happened in Iran," however, the piece spotlights some of the risks of writing about such sensitive historical events, particularly when they involve covert intelligence operations. In particular — how do you know when to trust your sources? Today's brief posting is by no means a full assessment or refutation of this argument. (In the interests of disclosure, the author believes the evidence shows that both the CIA — with British help — and Iranians themselves were critical in their own ways to the end result[1]). Instead, the posting mainly points out one of the peculiar challenges confronting historians of 1953, especially on the question of the U.S. and British roles. The challenge is simply that U.S. and British reporting about the coup cannot be taken strictly at face value. The main reason is secrecy. President Eisenhower underscored the need for confidentiality in a diary entry from the time. Dated October 8, 1953, but referring back to August 19, Eisenhower notes: "Another recent development that we helped bring about was the restoration of the Shah to power in Iran and the elimination of Mossadegh. The things we did were 'covert.' If knowledge of them became public, we would not only be embarrassed in that region, but our chances to do anything of like nature in the future would almost totally disappear." (See Document 1)
5More

Article: Arab Spring, Jihad Summer | OpEdNews - 0 views

  • Welcome to IS. No typo; the final goal may be (indiscriminate) regime change, but for the moment name change will do. With PR flair, at the start of Ramadan, the Islamic State of Iraq and al-Sham (ISIS, or ISIL -- the Islamic State of the Levant -- to some) solemnly declared, from now on, it will be known as Islamic State (IS). "To be or not to be" is so ... metaphysically outdated. IS is -- and here it is -- in full audio glory. And we're talking about the full package -- Caliph included: "the slave of Allah, Ibrahim Ibn 'Awwad Ibn Ibrahim Ibn 'Ali Ibn Muhammad al-Badrial-Hashimi al-Husayni al-Qurashi by lineage, as-Samurra'i by birth and upbringing, al-Baghdadi by residence and scholarship." Or, to put it more simply, Abu Bakr al-Baghdadi. IS has virtually ordered "historic" al-Qaeda -- yes, that 9/11-related (or not) plaything of one Osama bin Laden -- as well as every other jihadi outfit on the planet, to pledge allegiance to the new imam, in theological theory the new lord over every Muslim. There's no evidence Osama's former sidekick, Ayman "the doctor" al-Zawahiri will obey, not to mention 1.5 billion Muslims across the world. Most probably al-Qaeda will say "we are the real deal" and a major theological cat-fight will be on.
  • It's unclear how the new IS reality will play on the ground. The new Caliph has in fact declared a jihad on all that basket of corrupt and/or incompetent Middle East "leaders" -- so some fierce "battle for survival" reaction from the Houses of Saud and Thani, for instance, is expected. It's not far-fetched to picture al-Baghdadi dreaming of lording over Saudi oilfields -- after decapitating all Shi'ite workers, of course. And that's just a start; in one of their Tweeter accounts IS has published a map of all the domains they intend to conquer within the span of five years; Spain, Northern Africa, the Balkans, the whole Middle East and large swathes of Asia. Well, they are certainly more ambitious than NATO. Being such a courageous bunch, the House of Saud is now tempted to accept that imposing regime change on Nouri al-Maliki in Iraq is a bad idea. That puts them in direct conflict with the Obama administration, whose plan A, B and C is regime change.
  • Turkey -- the former seat of the Caliphate, by the way -- remains mute. No wonder; Ankara -- crucially --is the top logistical base of IS. Caliph Erdogan's got to be musing about his own future, now that he's facing competition. In theory, Saudi Arabia, Turkey and Jordan are all saying they're ready to fight what would be a "larger-scale war" than that gift that keeps on giving, the original, Cheney junta-coined GWOT (global war on terror). And then there's the future of the new $500 million Obama fund to "appropriately vetted" rebels in Syria, which in fact means the expansion of covert CIA "training facilities" in Jordan and Turkey heavily infiltrated/profited from by IS. Think of hordes of new IS recruits posing as "moderate rebels" getting ready for a piece of the action.
  • ...1 more annotation...
  • It's easier for Brazil to win the World Cup with a team of crybabies with no tactical nous than having US Secretary of State John Kerry and his State Department ciphers understand that the Syrian "opposition" is controlled by jihadis. But then again, they do know -- and that perfectly fits into the Empire of Chaos's not so hidden Global War on Terror (GWOT) agenda of an ever-expanding proxy war in both Syria and Iraq fueled by terror financing. So 13 years ago, Washington crushed both al-Qaeda and the Taliban in Afghanistan. Then the Taliban were reborn. Then came Shock and Awe. Then came "Mission Accomplished." Then al-Qaeda was introduced in Iraq. Then al-Qaeda was dead because Osama bin Laden was dead. Then came ISIL. And now there's IS. And we start all over again, not in the Hindu Kush, but in the Levant. With a new Osama. What's not to like? If anyone thinks this whole racket is part of a new live Monty Python sketch ahead of their reunion gig this month in London, that's because it is.
  •  
    Hey, the U.S. War Party is now into comedic performances that put John Kerry center stage. Pepe Escobar caught the joke.
3More

Remaining Snowden docs will be released to avert 'unspecified US war' - ‪Cryp... - 0 views

  • All the remaining Snowden documents will be released next month, according t‪o‬ whistle-blowing site ‪Cryptome, which said in a tweet that the release of the info by unnamed third parties would be necessary to head off an unnamed "war".‬‪Cryptome‬ said it would "aid and abet" the release of "57K to 1.7M" new documents that had been "withheld for national security-public debate [sic]". <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7RchawQrMoAAHIac14AAAKH&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7RchawQrMoAAHIac14AAAKH&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> The site clarified that will not be publishing the documents itself.Transparency activists would welcome such a release but such a move would be heavily criticised by inteligence agencies and military officials, who argue that Snowden's dump of secret documents has set US and allied (especially British) intelligence efforts back by years.
  • As things stand, the flow of Snowden disclosures is controlled by those who have access to the Sn‪o‬wden archive, which might possibly include Snowden confidants such as Glenn Greenwald and Laura Poitras. In some cases, even when these people release information to mainstream media organisations, it is then suppressed by these organisations after negotiation with the authorities. (In one such case, some key facts were later revealed by the Register.)"July is when war begins unless headed off by Snowden full release of crippling intel. After war begins not a chance of release," Cryptome tweeted on its official feed."Warmongerers are on a rampage. So, yes, citizens holding Snowden docs will do the right thing," it said.
  • "For more on Snowden docs release in July watch for Ellsberg, special guest and others at HOPE, July 18-20: http://www.hope.net/schedule.html," it added.HOPE (Hackers On Planet Earth) is a well-regarded and long-running hacking conference organised by 2600 magazine. Previous speakers at the event have included Kevin Mitnick, Steve Wozniak and Jello Biafra.In other developments, ‪Cryptome‬ has started a Kickstarter fund to release its entire archive in the form of a USB stick archive. It wants t‪o‬ raise $100,000 to help it achieve its goal. More than $14,000 has already been raised.The funding drive follows a dispute between ‪Cryptome‬ and its host Network Solutions, which is owned by web.com. Access to the site was bl‪o‬cked f‪o‬ll‪o‬wing a malware infection last week. ‪Cryptome‬ f‪o‬under J‪o‬hn Y‪o‬ung criticised the host, claiming it had ‪o‬ver-reacted and had been sl‪o‬w t‪o‬ rest‪o‬re access t‪o‬ the site, which ‪Cryptome‬ criticised as a form of cens‪o‬rship.In resp‪o‬nse, ‪Cryptome‬ plans to more widely distribute its content across multiple sites as well as releasing the planned USB stick archive. ®
3More

Palestinian factions reportedly set 10 conditions for 10-year truce with Israel | The E... - 0 views

  • Reports in Israeli and Palestinian media say that the two Palestinian resistance groups Hamas and Islamic Jihad have set forth ten conditions for a ceasefire and ten-year truce with Israel. Israel’s Maariv said that an unnamed “senior Palestinian official” passed it a copy of the demands, which have been transmitted by the factions to Egypt. They include an end to all armed hostilities, the end of the siege of Gaza, and the construction of internationally supervised air and seaports.
  • While Hamas has not as yet officially stated these demands, they are in line with the group’s long-standing policy of offering Israel a multi-year truce. The reported conditions come after nine days of Israeli bombardment of the Gaza Strip that has killed more than 200 people, injured close to 1,400, and destroyed the homes of 8,200 others. Almost 80 percent of the dead, who include more than thirty children, are civilians, according to the UN. Yesterday, Hamas refused to respond to a unilateral “ceasefire” declared by Israel that would have left the situation of siege on the Gaza Strip unchanged.
  • The ten conditions were translated by The Electronic Intifada from an Arabic version published by Ma’an News Agency:
2More

Snowden: NSA employees routinely pass around intercepted nude photos | Ars Technica - 0 views

  • Edward Snowden has revealed that he witnessed “numerous instances” of National Security Agency (NSA) employees passing around nude photos that were intercepted “in the course of their daily work.” In a 17-minute interview with The Guardian filmed at a Moscow hotel and published on Thursday, the NSA whistleblower addressed numerous points, noting that he could “live with” being sent to the US prison facility at Guantanamo Bay, Cuba. He also again dismissed any notion that he was a Russian spy or agent—calling those allegations “bullshit.” If Snowden’s allegations of sexual photo distribution are true, they would be consistent with what the NSA has already reported. In September 2013, in a letter from the NSA’s Inspector General Dr. George Ellard to Sen. Chuck Grassley (R-IA), the agency outlined a handful of instances during which NSA agents admitted that they had spied on their former love interests. This even spawned a nickname within the agency, LOVEINT—a riff on HUMINT (human intelligence) or SIGINT (signals intelligence).
  • “You've got young enlisted guys, 18 to 22 years old,” Snowden said. “They've suddenly been thrust into a position of extraordinary responsibility where they now have access to all of your private records. In the course of their daily work they stumble across something that is completely unrelated to their work in any sort of necessary sense. For example, an intimate nude photo of someone in a sexually compromising position. But they're extremely attractive. “So what do they do? They turn around in their chair and show their co-worker. The co-worker says: ‘Hey that's great. Send that to Bill down the way.’ And then Bill sends it to George and George sends it to Tom. And sooner or later this person's whole life has been seen by all of these other people. It's never reported. Nobody ever knows about it because the auditing of these systems is incredibly weak. The fact that your private images, records of your private lives, records of your intimate moments have been taken from your private communications stream from the intended recipient and given to the government without any specific authorization without any specific need is itself a violation of your rights. Why is that in a government database?” Then Alan Rusbridger, The Guardian’s editor-in-chief, asked: “You saw instances of that happening?” “Yeah,” Snowden responded. “Numerous?” “It's routine enough, depending on the company that you keep, it could be more or less frequent. These are seen as the fringe benefits of surveillance positions."
2More

Senate Bill Requires Report on "All" NSA Bulk Collection | Federation Of American Scien... - 0 views

  • The National Security Agency would be required to prepare an unclassified report on “all NSA bulk collection activities,” the Senate Appropriations Committee directed in its report on the Fiscal Year 2015 Department of Defense Appropriations bill, published yesterday. The Committee told the NSA to prepare a report “describing all NSA bulk collection activities, including when such activities began, the cost of such activities, what types of records have been collected in the past, what types of records are currently being collected, and any plans for future bulk collection.” Such a report would be expected to clarify whether NSA bulk collection extends beyond the acknowledged telephone metadata program in Section 215 of the USA Patriot Act. The required report is to be “unclassified to the greatest extent possible,” the Senate Committee said. In the reporting requirements that it imposed on NSA, the Senate Appropriations Committee notably went beyond what was required by the Senate or House Intelligence Committees. The Appropriations Committee also directed NSA to submit additional reports on the total number of records acquired and reviewed by NSA in its bulk telephone metadata program over the past five years, and an estimate of the number of records of U.S. persons that have been acquired and reviewed in the telephone metadata program. Another unclassified report is required to provide “a list of terrorist activities that were disrupted, in whole or in part, with the aid of information obtained through NSA’s telephone metadata program.”
  • Update: Identical reporting language was included by the Senate Appropriations Committee last year in its report on the FY2014 Defense Appropriations bill (h/t @byersalex), yet the required NSA reports were not produced. At Emptywheel, Marcy Wheeler questions the utility of the proposed reports, particularly since the Senate Committee language lacks a clear, unambiguous definition of “bulk collection.”
6More

UAE Terror List Nibs NATO's Covert Infrastructure in The Bud | nsnbc international - 0 views

  • The United Arab Emirates designated a large number of organizations, topped by the Muslim Brotherhood. The list includes a large number of other organizations who have been implicated in US/NATO subversion worldwide, such as CAIR and CANVAS. On November 15 that Cabinet of the United Arab Emirates (UAE) adopted a list that designates eighty-three organizations as terrorist organizations. The UAE’s government notes that the list is not final, implying others could be added but noting that those organizations who find themselves on the list have the possibility to apply for being removed from the list. The UAE stressed that it saw it necessary to designate the included organizations as terrorist organizations to protect the security of the emirates.
  • The United Arab Emirates designated a large number of organizations, topped by the Muslim Brotherhood. The list includes a large number of other organizations who have been implicated in US/NATO subversion worldwide, such as CAIR and CANVAS. On November 15 that Cabinet of the United Arab Emirates (UAE) adopted a list that designates eighty-three organizations as terrorist organizations. The UAE’s government notes that the list is not final, implying others could be added but noting that those organizations who find themselves on the list have the possibility to apply for being removed from the list. The UAE stressed that it saw it necessary to designate the included organizations as terrorist organizations to protect the security of the emirates.
  • The list includes organizations which are currently legally operating in at lest seven European countries and at least two organizations which are legally operating in the United States. Among those operating in the United States are the Council on American-Islamic Relations, CAIR and the Muslim American Society. CAIR is commonly perceived as the successor organization of the Muslim Brotherhood and Hamas associated organizations such as WAMY and the Institute of Islamic Thought whose leadership had direct links to the White House but who were outlawed when their involvement in terrorism became too much part of the public record.
  • ...3 more annotations...
  • It is noteworthy that many of the leading members of Syrian Transitional National Council, who first met in Turkey and which was backed by the USA and other core NATO members had direct links to CAIR. The organization’s leadership is known for having close ties to, among others, U.S. security adviser and “Grand Architect” or NATO’s current military-politico strategies, Zbigniev Brzezinski. Or, in other words, to Rockefeller money. U.S. State Department spokesman Jeff Rathke commented on the UAE’s anti-terror list, saying: “We have examined the list of organizations that were classified as terrorist groups that was published by the United Arab Emirates a few days ago, and we are aware that two of the organizations on that list are based in the United States. We are trying to get information on the reasons behind this decision”.
  • The inclusion of CANVAS in the list is widely perceived as a direct slap into the face of NATO covert operations planners, the U.S. State Department and the CIA. CANVAS, a.k.a. DEMOZ has been implicated in U.S.-backed subversion from the former Republic of Yugoslavia to Egypt and Ukraine. In December 2013 the National Security Agency of Kuwait released a social media video that explained the role CANVAS played in promoting dissent in Kuwait. It is noteworthy that virtually identical CANVAS/DEMOZ flyers, instructing people in how to prepare for violent clashes with state authorities were distributed during the Rabaa al-Adweya and Nadah Square sit ins in Egypt and during the armed ouster of the Ukrainian government in February 2014.
  • Organizations in the following countries outside the United Arab Emirates are affected: * Afghanistan * Algeria * Belgium * Denmark * Egypt * France * Germany * India * Iraq * Italy * Lebanon * Libya * Mali * Norway * Palestine * Pakistan * Philippines * Russian Federation * Saudi Arabia * Sweden * Somalia * Syria * Tunisia * United Kingdom * United States of America * Uzbekistan * Yemen. Affected regions / regional operations: GCC, EU, AL, AU. The list of organizations which the Cabinet of the United Arab Emirates designated as terrorist organizations includes:
6More

MH17: Malaysia's Barring from Investigation Reeks of Cover-up | nsnbc international - 0 views

  • It was a Malaysian jet, carrying Malaysian passengers, flown by Malaysian pilots, yet after Malaysia Airlines flight MH17 was shot down over Ukraine in July 2014, Malaysia has been systematically blocked from participating in the investigation, leaving an overwhelmingly pro-NATO bloc in charge of the evidence, investigation and outcome as well as the manner in which the investigation will be carried out. Despite the integral role Malaysia has played during several pivotal moments in the aftermath of the disaster, it appears that the closer to the truth the investigation should be getting, the further Malaysia itself is being pushed from both the evidence and any influence it has on the likely conclusions of the investigation. With the downed aircraft in question being Malaysian, Malaysia as a partner in the investigation would seem a given. Its exclusion from the investigation appears to be an indication that the investigation’s objectivity has been compromised and that the conclusions it draws will likely be politically motivated.
  • With the Dutch leading the investigation, the logic being that the flight originated from the Netherlands and the majority of the passengers were Dutch, it has formed a Joint Investigation Team (JIT). At the onset of its creation it seemed obvious that Malaysia would too be included, considering it lost the second largest number of citizens to the disaster and the plane itself was registered in Malaysia. Instead, JIT would end up comprised of Belgium, Ukraine, and Australia, specifically excluding Malaysia. Malaysia was both surprised and has protested its exclusion from JIT, and has repeatedly expressed a desire to be included directly in the investigation.
  • The Malaysian Insider cited Malaysian scholar Dr. Chandra Muzaffar who believes the decision to exclude his country from the investigation is politically motivated, aiming at excluding members that may urge caution and objectivity instead of draw conclusions first and bend the investigation’s results around those conclusions. In particular, Dr. Muzaffar believes that the investigations is intentionally being skewed to target Russia. Ukraine’s involvement in the investigation is particularly troublesome. Had MH17 crashed in Ukraine under different circumstances, Ukraine’s role would be welcome. However, it was apparently shot down specifically in a conflict in which Kiev itself is a participant. With both sides of the conflict possessing anti-aircraft weapons and with Kiev itself confirmed to possess weapons capable of reaching the altitude MH17 was flying at when it was allegedly hit, Kiev becomes a possible suspect in the investigation. Kiev’s inclusion in JIT represents a monumental conflict of interest.
  • ...3 more annotations...
  • And to compound this already glaring conflict of interest, it was revealed recently that an alleged “secret deal” was struck by JIT in which any member could bar the release of evidence. With all members of JIT being pro-NATO and decidedly arrayed against Moscow, such a “deal” could prevent crucial evidence from being revealed that would effect an otherwise distorted conclusion drawn by the investigators aimed specifically at advancing their greater political agenda in Eastern Europe. Had Malaysia been a member of JIT, the ability of other members to withhold evidence would have been greatly diminished and it is likely such a bizarre deal would not have been conceivable, real or imaged, in the first place.
  • With the ongoing conflict in Ukraine perceived as a proxy war between NATO and Moscow, JIT’s membership including the NATO-backed Kiev regime itself (a possible suspect), two NATO members (Belgium and the Netherlands) and Australia who has passed sanctions against Russia over the conflict, is a textbook case of conflict of interest.
  • To casual observers, the current investigation led by NATO members and Kiev, a possible suspect, would be no different than the Donetsk People’s Republic and Russia leading it. Few would consider a DPR or Russian led investigation impartial, and few should see a NATO-led investigation as impartial. Had Malaysia been included in the process, an argument could have been made that an actual investigation was taking place rather than a complex propaganda campaign. Malaysia’s exclusion is a troubling sign for the victims of the MH17 disaster, meaning the true culprits will never be known. The overt politically motivated nature of the investigation will on one hand  help fuel NATO’s propaganda war, but on the other hand, fuel the doubts of millions worldwide over the true events that took place in the skies of eastern Ukraine that day. Like so many other events in human history that took place amid a high stake political struggle, the downing of MH17 will be shrouded in mystery, mystery draped over the truth by the irresponsible leadership of NATO, and those in Washington, London and Brussels egging on the conflict in Ukraine to this very day.
« First ‹ Previous 521 - 540 of 635 Next › Last »
Showing 20 items per page