Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "started" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
7More

The $9 Billion Witness: Meet JPMorgan Chase's Worst Nightmare | Rolling Stone - 0 views

  • Meet the woman JPMorgan Chase paid one of the largest fines in American history to keep from talking By Matt Taibbi | November 6, 2014
  • tried to stay quiet, she really did. But after eight years of keeping a heavy secret, the day came when Alayne Fleischmann couldn't take it anymore.  "It was like watching an old lady get mugged on the street," she says. "I thought, 'I can't sit by any longer.'"  Fleischmann is a tall, thin, quick-witted securities lawyer in her late thirties, with long blond hair, pale-blue eyes and an infectious sense of humor that has survived some very tough times. She's had to struggle to find work despite some striking skills and qualifications, a common symptom of a not-so-common condition called being a whistle-blower.
  • Fleischmann is the central witness in one of the biggest cases of white-collar crime in American history, possessing secrets that JPMorgan Chase CEO Jamie Dimon late last year paid $9 billion (not $13 billion as regularly reported – more on that later) to keep the public from hearing. Back in 2006, as a deal manager at the gigantic bank, Fleischmann first witnessed, then tried to stop, what she describes as "massive criminal securities fraud" in the bank's mortgage operations. Thanks to a confidentiality agreement, she's kept her mouth shut since then. "My closest family and friends don't know what I've been living with," she says. "Even my brother will only find out for the first time when he sees this interview." 
  • ...3 more annotations...
  • This past year she watched as Holder's Justice Department struck a series of historic settlement deals with Chase, Citigroup and Bank of America. The root bargain in these deals was cash for secrecy. The banks paid big fines, without trials or even judges – only secret negotiations that typically ended with the public shown nothing but vague, quasi-official papers called "statements of facts," which were conveniently devoid of anything like actual facts. 
  • Six years after the crisis that cratered the global economy, it's not exactly news that the country's biggest banks stole on a grand scale. That's why the more important part of Fleischmann's story is in the pains Chase and the Justice Department took to silence her. She was blocked at every turn: by asleep-on-the-job regulators like the Securities and Exchange Commission, by a court system that allowed Chase to use its billions to bury her evidence, and, finally, by officials like outgoing Attorney General Eric Holder, the chief architect of the crazily elaborate government policy of surrender, secrecy and cover-up. "Every time I had a chance to talk, something always got in the way," Fleischmann says.
  • And now, with Holder about to leave office and his Justice Department reportedly wrapping up its final settlements, the state is effectively putting the finishing touches on what will amount to a sweeping, industrywide effort to bury the facts of a whole generation of Wall Street corruption. "I could be sued into bankruptcy," she says. "I could lose my license to practice law. I could lose everything. But if we don't start speaking up, then this really is all we're going to get: the biggest financial cover-up in history." 
  •  
    Matt Taibbi is back at Rolling Stone, relaunching with a major blockbuster.
4More

'Empire of Chaos' in the House - RT Op-Edge - 0 views

  • And yet, Air Force One, we got a problem. High-level US financial sources assure this correspondent the trip is all about Obama shoring up the new King’s support for their financial/economic war on Russia as the House of Saud is starting to have second thoughts. The Saudi role in this war has been to come up with the oil price shock – which is hurting not only Russia but also Iran and Venezuela, among others. Besides, the US puppet theoretically in charge in Ukraine, Petro Poroshenko, has just visited Saudi Arabia. Russia is not Iran – with all due respect to Iran. If the House of Saud really believes they are talking to the head of a superpower rather than a ventriloquist’s puppet – which is Obama’s role – they are effectively doomed. Nothing Obama says means a thing. The real ‘Masters of the Universe’ who run the ‘Empire of Chaos’ want the House of Saud to do most of their dirty work against Russia; and in a later stage they will take care of the “towel heads” - as the saying goes in Washington - over their development of nuclear missiles with Pakistan. And especially because the Saudi-launched oil price war is bound to destroy the US oil industry - against US national interests.
  • The House of Saud has absolutely nothing to gain from this undeclared financial/economic war on Russia. The Saudis have already “lost” Yemen and Iraq. Bahrain is held by mercenary troops containing the alienation of the Shia majority. They are freaking out with the possibility of ultimate “enemy” Iran reaching a nuclear deal with His Master’s Voice. They are desperate that “Assad won’t go”. They want every Muslim Brotherhood in sight – or the vicinity – jailed or beheaded. They fear any Arab Spring-style stirrings as worse than the plague. And then there’s the fake Caliphate of ISIS/ISIL/Daesh threatening to go all the way to Mecca and Medina. The House of Saud is effectively surrounded.
  • Meanwhile, as the tempest approaches, all is smiles – amid a silent family bloodbath. The powerful Sudairi clan has exacted their “revenge” as King Abdullah’s corpse was still warm. King Salman, almost 80, and with Alzheimer’s about to turn him into mush, took no time to appoint his nephew Mohammed bin Naif as deputy crown prince. And just in case nepotism was not evident enough, he also appointed his son Prince Mohammed bin Salman as defense minister. Mohammed bin Naif is a Pentagon/CIA darling; the House of Saud’s head of counterterrorism.
  • ...1 more annotation...
  • But playing the ‘Empire of Chaos’ game – financial/economic war on Russia - is a game-changer, as in playing with fire. US/EU sanctions, attacks on the oil price and the ruble by giant derivative players as agents, are something way above the Saudi pay grade. The House of Saud swore that they didn’t change their production quota during 2014. But there was an excess supply – and it was brought into the market to help cause the oil price crash, alongside the manipulation by derivatives speculators. Scores of oil analysts still can’t figure out why the House of Saud went after Russia; all reasons are political, not economical (Russian support for Syria and Iran, the Americans agreeing with the strategy, etc.). The fact is Moscow did perceive it as a declaration of economic war by Saudi Arabia. Petroleum Intelligence Weekly, cautiously, has already hinted it may get much worse, as in “potential for disruption in Mideast Gulf monarchies.” Beware of an Emperor bearing gifts – or mourning a late King. The ‘Empire of Chaos’ is essentially asking the House of Saud to keep going kamikaze all the way against Russia. Sooner or later someone in Riyadh will realize this is the roadmap to House suicide.
4More

Embassy of Cuba in NZ Newsletter - No.4 31st January 2015 | Scoop News - 0 views

  • Agreement China-CELAC a ‘Costa Rican achievement’ — Correa Ecuador president Rafael Correa has said that the Celac agreement with China, was probably the greatest achievement of Costa Rica during its presidency, adding that among the main achievements was reaching concrete agreements with China in the bilateral forum recently held there.In an interview with several local television channels, the Ecuadorian president said that for its size, China can be considered as a region, and deepening the relationship would be beneficial for the Celac countries.Beijing was the “principal financier of the world” and to achieve agreements to finance projects aimed at the development of Latin America and the Caribbean Project was “a great success,” he said.Correa, now pro tempore president of the regional bloc, said that at the current stage of development of the region, what was needed was financing.“We no longer need,” he said, “the alms like those given by NGOs who come to construct little schools, because we can do that.“What we need is science, technology, technology transfer to help us create our human talent, and China can give those to us,” he added.
  • Correa considered it was a complementary relationship between equals, given that China needs energy, oil and food, which could be obtained from Latin American and Caribbean countries.Four priority areas were identified for the work of the new presidency: reducing extreme poverty, establishment of a new international financial architecture, development of science and technology, and road, productive and energy infrastructure.
  • Cuba and China strengthen economic relations Cuba and China have signed five new agreements — in agriculture, telecoms, trade, finances, industry and transportation — confirming both countries’ interest in strengthening and expanding their economic relations.This was the result of the 27th Intergovernmental Commission Cuba-China held last week which also made official the postponement of the starting date of payment of the credit given by China through the Economic and Technical Cooperation agreement.
  • ...1 more annotation...
  • Both parties agreed to carry out a special session in four months to examine the bilateral economic agenda and the processes of implementation of the signed documents.The 27th Intergovernmental Commission also reviewed 29 cooperation and economic agreements signed during the visit of Chinese President, Xi Jinping on July 22 last year.The documents dealt with the concession of a line of credit for the construction of the multipurpose terminal in the port of Santiago de Cuba, in the eastern region of the island, among other facilities.Deputy minister of foreign trade and investment Ileana Nuñez said the agreements would attract more revenues to sectors like tourism, mining and construction.She underlined the favourable conditions and level of mutual relations, which grow, deepen and expand the interest of more Chinese investors.China is the second biggest trading partner of Cuba and Cuba is China´s major partner in the Caribbean, while Cuban tobacco and marine products gain ground in Asia.Assistant trade minister of China Zhang Xiangchen ratified their intention to honour commitments and strengthen economic and trade relations with Cuba.The trade relationship of both nations exceeded 1.4 billion dollars in 2013 and after signing the latest agreements, it could increase by 26 percent, according to official estimates.
5More

Pentagon: 9/11 defense team linguist was CIA asset | The Miami Herald The Miami Herald - 0 views

  • The military confirmed Tuesday that a linguist tasked to serve on the death-penalty defense of an alleged Sept. 11 plotter had previously worked for the CIA but would not say whether he worked at a black site.The revelation Monday by alleged plot deputy Ramzi bin al Shibh, 42, brought this week’s resumption of the Sept. 11 hearings, the first in six months, to a screeching halt. All but one of the five alleged 9/11 conspirators said they independently recognized the stony-faced translator seated beside bin al Shibh at the war court from their years in the spy agency’s secret overseas prisons.The five men, led by alleged mastermind Khalid Sheik Mohammed, 49, are accused of orchestrating, financing and training the men who hijacked four aircraft and killed nearly 3,000 people at the World Trade Center, Pentagon and a Pennsylvania field on Sept. 11, 2001.
  • Defense attorneys accuse the CIA of torturing their clients and then seeking to hide the evidence from their death-penalty trials. They also allege U.S. government and military interference is designed to disrupt their work with the accused.The five defendants return to court Wednesday to figure a way forward after the revelation, the latest snag in pretrial hearings for the case that has no trial date. The judge, Army Col. James L. Pohl, gave lawyers Tuesday to conduct research, and trade classified court filings — starting with one by the prosecution Monday night that apparently described the controversial contract linguist’s intelligence background.Tuesday afternoon, a Pentagon spokesman, Army Lt. Col. Myles B. Caggins, said the linguist “has in the past made readily available to prospective supervisors his prior work experience with the United States government, including with the CIA.”
  • Caggins would not say whether the linguist worked at a CIA “black site,” an overseas prison where agents secretly interrogated prisoners and subjected them to brutal techniques — waterboarding, nudity, sleep deprivation, painful shackling and a quasi-medical procedure called rectal rehydration. He did, however, distance the case prosecutor, Brig. Gen. Mark Martins, from the disruption, saying his office “does not have any role in providing linguists to defense teams in military commissions.” He said defense lawyers get to vet their own linguists.“We vetted him. He denied it,” Bin al Shibh’s attorney, Jim Harrington, said Tuesday evening. Harrington said his team pointedly asked the linguist whether he had “participated in any interrogation, questioning or done any work with respect to detainees. Any place. His résumé denies it. It says he worked someplace else — Reston, Va., from 2002 to 2006.”Bin al Shibh was held in a series of secret overseas prison from his capture in Pakistan on Sept. 11, 2002until his arrival at Guantánamo four years later. Even then, according to the so-called Senate Torture Report, he remained in CIA custody.Defense lawyers want more information.
  • ...1 more annotation...
  • “We will be filing motions for discovery regarding the former CIA interpreter utilized by Mr. Bin al Shibh’s defense team,” said attorney Cheryl Bormann, defending the alleged terror trainer Walid bin Attash, 36, who she said was shaken at seeing someone from a black site.Bormann also said she would be seeking a court order from Judge Pohl similar to the one Pohl styled after disclosure that FBI agents were investigating and questioning members of the 9/11 defense team: Instructing the defense team members to disclose if they worked for the CIA or a CIA contractor, absolving them of any Non Disclosure Order they signed with the CIA.“If people aren’t truthful about their background,” Bormann said, “there’s really no way for us to determine whether or not they are inappropriately assigned to our team.”
  •  
    So, it sounds like the CIA was trying to sneak an agent who understands Arabic into the GITMO defendants' defense team. This, after the FBI was caught interrogating a defense team member. Time to dismiss the charges and free the defendants, I think. These men can't get a fair trial. 
4More

China pivots everywhere - RT Op-Edge - 0 views

  • Geopolitically, China has also tweaked its model, but the West, especially the US, has barely noticed it. Essentially, the Beijing leadership finally got fed up with trying to manage a possible reset of the China-US strategic relationship, and be treated as an equal. Exceptionalists don’t do equality. So Beijing came up with its own response to the Obama administration’s political/military “pivot to Asia” – originally announced, and that’s quite significant, at the Pentagon. Thus, in late November 2014, during the Central Foreign Affairs Work Conference in Beijing, President Xi Jinping made an earth-shattering announcement; from now on China would stop treating the US – and the EU – as its main strategic priority. The new focus is on the fellow BRICS group of emerging powers, especially Russia; Asian neighbors; and top nations of the Global South, referred to as “major developing powers” (kuoda fazhanzhong de guojia). This is not as much a Chinese pivot to Asia as a Chinese pivot to selected nations in the Global South. And based on a “new type of international relations centered on ‘win-win’ cooperation” – not the bully-or-bomb exceptionalist approach.
  • China’s new foreign policy and strategic configuration is all the more evident in the courting of Asian neighbors, invited to embark on China’s extremely ambitious twin strategy and the greatest trade/commerce story of the young 21st century: the Silk Road Economic Belt and the 21st Century Maritime Silk Road, in short “Belt and Road initiative,” as it’s known in China, now officially launched with the first $40 billion attributed to a Silk Road Fund. The enormity of the challenge is on a par with Beijing’s ambition: a pan-Eurasia trade/commerce utopia weaved by high-speed rail, fiber optic networks, ports and pipelines, and connecting East Asia, Central Asia, Russia, the Middle East and Europe.
  • Plenty to be excited about then as the Year of the Sheep (or Goat) starts. What’s certain is that the Chinese caravan, much in contrast with the dogs of war - and austerity – pivoting across the West, has already pivoted towards “win-win” pan-Eurasia integration.
  •  
    China is also winding down its holdings of U.S. Treaury bonds. With $1.25 trillion in U.S. debt as of the end of October, China could sink the U.S. economy any time it chooses simply by placing all of its U.S. bonds on the market, then watching the dollar go splat.  http://www.bloomberg.com/news/articles/2014-12-15/china-s-treasury-holdings-decline-to-lowest-since-february-2013 So China has a stick to keep the U.S. at bay. For the rest of the world, China offers carrots by the shipload. But the U.S. has only a stick, no carrots.  B. F. Skinner established beyond question that positive reinforcement is a much stronger motivator than negative reinforcement. Too bad our oligarchs skipped Behavioral Psychology 201.  
4More

The Snipers Massacre on the Maidan in Ukraine | Johnson's Russia List - 0 views

  • The Snipers Massacre on the Maidan in Ukraine By Ivan Katchanovski, Ph.D. School of Political Studies & Department of Communication University of Ottawa Ottawa, ON K1N 6N5, Canada ikatchan@uottawa.ca Paper presented at the Chair of Ukrainian Studies Seminar at the University of Ottawa, Ottawa, October 1, 2014 [With visuals and footnotes here academia.edu/8776021/The_Snipers_Massacre_on_the_Maidan_in_Ukraine]
  • Conclusion The analysis and the evidence presented in this academic investigation put the Euromaidan and the conflict in Ukraine into a new perspective. The seemingly irrational mass shooting and killing of the protesters and the police on February 20 appear to be rational from self-interest based perspectives of rational choice and Weberian theories of instrumentally-rational action. This includes the following: the Maidan leaders gaining power as a result of the massacre, President Yanukovych and his other top government officials fleeing on February 21, 2014 from Kyiv and then from Ukraine, and the retreat by the police.
  • The same concerns Maidan protesters being sent under deadly fire into positions of no important value and then being killed wave by wave from unexpected directions. Similarly, snipers killing unarmed protesters and targeting foreign journalists but not Maidan leaders, the Maidan Self-Defense and the Right Sector headquarters, the Maidan stage, and pro-Maidan photographs become rational. While such actions are rational from a rational choice or instrumentally-rational theoretical perspective, the massacre not only ended many human lives but also undermined democracy, human rights, and the rule of law in Ukraine. The massacre of the protesters and the police represented a violent overthrow of the government in Ukraine and a major human rights crime. This violent overthrow constituted an undemocratic change of government. It gave start to a large-scale violent conflict that turned into a civil war in Eastern Ukraine, to a Russian military intervention in support of separatists in Crimea and Donbas, and to a de-facto break-up of Ukraine.
  • ...1 more annotation...
  • It also escalated an international conflict between the West and Russia over Ukraine. The evidence indicates that an alliance of elements of the Maidan opposition and the far right was involved in the mass killing of both protesters and the police, while the involvement of the special police units in killings of some of the protesters cannot be entirely ruled out based on publicly available evidence. The new government that came to power largely as a result of the massacre falsified its investigation, while the Ukrainian media helped to misrepresent the mass killing of the protesters and the police. The evidence indicates that the far right played a key role in the violent overthrow of the government in Ukraine. This academic investigation also brings new important questions that need to be addressed.
9More

New Snowden Docs Indicate Scope of NSA Preparations for Cyber Battle - SPIEGEL ONLINE - 0 views

  • The NSA's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway.
  • The Birth of D Weapons According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
  • NSA Docs on Network Attacks and ExploitationExcerpt from the secret NSA budget on computer network operations / Code word GENIE Document about the expansion of the Remote Operations Center (ROC) on endpoint operations Document explaining the role of the Remote Operations Center (ROC) Interview with an employee of NSA's department for Tailored Access Operations about his field of work Supply-chain interdiction / Stealthy techniques can crack some of SIGINT's hardest targets Classification guide for computer network exploitation (CNE) NSA training course material on computer network operations Overview of methods for NSA integrated cyber operations NSA project description to recognize and process data that comes from third party attacks on computers Exploring and exploiting leaky mobile apps with BADASS Overview of projects of the TAO/ATO department such as the remote destruction of network cards iPhone target analysis and exploitation with Apple's unique device identifiers (UDID) Report of an NSA Employee about a Backdoor in the OpenSSH Daemon NSA document on QUANTUMSHOOTER, an implant to remote-control computers with good network connections from unknown third parties
  • ...5 more annotations...
  • From a military perspective, surveillance of the Internet is merely "Phase 0" in the US digital war strategy. Internal NSA documents indicate that it is the prerequisite for everything that follows. They show that the aim of the surveillance is to detect vulnerabilities in enemy systems. Once "stealthy implants" have been placed to infiltrate enemy systems, thus allowing "permanent accesses," then Phase Three has been achieved -- a phase headed by the word "dominate" in the documents. This enables them to "control/destroy critical systems & networks at will through pre-positioned accesses (laid in Phase 0)." Critical infrastructure is considered by the agency to be anything that is important in keeping a society running: energy, communications and transportation. The internal documents state that the ultimate goal is "real time controlled escalation". One NSA presentation proclaims that "the next major conflict will start in cyberspace." To that end, the US government is currently undertaking a massive effort to digitally arm itself for network warfare. For the 2013 secret intelligence budget, the NSA projected it would need around $1 billion in order to increase the strength of its computer network attack operations. The budget included an increase of some $32 million for "unconventional solutions" alone.
  • Part 2: How the NSA Reads Over Shoulders of Other Spies
  • NSA Docs on ExfiltrationExplanation of the APEX method of combining passive with active methods to exfiltrate data from networks attacked Explanation of APEX shaping to put exfiltrating network traffic into patterns that allow plausible deniability Presentation on the FASHIONCLEFT protocol that the NSA uses to exfiltrate data from trojans and implants to the NSA Methods to exfiltrate data even from devices which are supposed to be offline Document detailing SPINALTAP, an NSA project to combine data from active operations and passive signals intelligence Technical description of the FASHIONCLEFT protocol the NSA uses to exfiltrate data from Trojans and implants to the NSA
  • NSA Docs on Malware and ImplantsCSEC document about the recognition of trojans and other "network based anomaly" The formalized process through which analysts choose their data requirement and then get to know the tools that can do the job QUANTUMTHEORY is a set of technologies allowing man-on-the-side interference attacks on TCP/IP connections (includes STRAIGHTBIZARRE and DAREDEVIL) Sample code of a malware program from the Five Eyes alliance
  • According to top secret documents from the archive of NSA whistleblower Edward Snowden seen exclusively by SPIEGEL, they are planning for wars of the future in which the Internet will play a critical role, with the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money. During the 20th century, scientists developed so-called ABC weapons -- atomic, biological and chemical. It took decades before their deployment could be regulated and, at least partly, outlawed. New digital weapons have now been developed for the war on the Internet. But there are almost no international conventions or supervisory authorities for these D weapons, and the only law that applies is the survival of the fittest. Canadian media theorist Marshall McLuhan foresaw these developments decades ago. In 1970, he wrote, "World War III is a guerrilla information war with no division between military and civilian participation." That's precisely the reality that spies are preparing for today.
  •  
    Major dump of new Snowden NSA docs by Der Spiegel, with an article by a large team of reporters and computer security experts. Topic: Cyberwar capabilities, now and in the near future. 
2More

'Almost All' Opposition Leaders Knew About Venezuelan Coup Plot | News | teleSUR - 0 views

  • In a televised address Saturday night, Venezuela's president Nicolas Maduro revealed new information on the foiled coup attempt against his government, including accusations that the country’s opposition leaders were aware of the plans. “Almost all of the MUD leaders knew about this plan, this ambush, almost all of them, including the four-time losing candidate,” said the Venezuelan leader, referring to opposition presidential candidate, Henrique Capriles Radonski. “I'm not saying all of them were actively involved. But it was a rumor circulating amongst them, that something was about to happen,” Maduro explained. Maduro also said that those detained have confessed to the plot and have provided new information which authorities are investigating. In addition to attempting to bribe officials and politicians with cash and visas to enter the United States, the Venezuelan president expanded on the role played by the U.S. Embassy in the country, saying that the script read by coup plotters in a video they planned to air once the plan had been initiated was crafted by an advisor at the Embassy.
  • Maduro called on U.S. president Barack Obama to stop his officials from meddling in Venezuelan affairs. “In your name, they are organizing coup plots against democratically-elected government, such as Venezuela,” Maduro said. According to Venezuelan intelligence and testimonies, the coup was set have taken place on Feb. 12, one day after opposition leaders Leopoldo Lopez, Maria Corina Machada and Antonio Ledezma published a “Transition” program which outlined measures including the privatization of oil, deregulation of the economy and agreements with International Monetary Fund.. The plan included targetted assassinations and bombing a series of targets – including teleSUR's headquarters in Caracas – while opposition activists staged violent protests in the streets to mark one year since the start of opposition-led protests that claimed 43 lives.
4More

U.S. Embedded Spyware Overseas, Report Claims - NYTimes.com - 0 views

  • The United States has found a way to permanently embed surveillance and sabotage tools in computers and networks it has targeted in Iran, Russia, Pakistan, China, Afghanistan and other countries closely watched by American intelligence agencies, according to a Russian cybersecurity firm.In a presentation of its findings at a conference in Mexico on Monday, Kaspersky Lab, the Russian firm, said that the implants had been placed by what it called the “Equation Group,” which appears to be a veiled reference to the National Security Agency and its military counterpart, United States Cyber Command.
  • It linked the techniques to those used in Stuxnet, the computer worm that disabled about 1,000 centrifuges in Iran’s nuclear enrichment program. It was later revealed that Stuxnet was part of a program code-named Olympic Games and run jointly by Israel and the United States.Kaspersky’s report said that Olympic Games had similarities to a much broader effort to infect computers well beyond those in Iran. It detected particularly high infection rates in computers in Iran, Pakistan and Russia, three countries whose nuclear programs the United States routinely monitors.
  • Some of the implants burrow so deep into the computer systems, Kaspersky said, that they infect the “firmware,” the embedded software that preps the computer’s hardware before the operating system starts. It is beyond the reach of existing antivirus products and most security controls, Kaspersky reported, making it virtually impossible to wipe out.
  • ...1 more annotation...
  • In many cases, it also allows the American intelligence agencies to grab the encryption keys off a machine, unnoticed, and unlock scrambled contents. Moreover, many of the tools are designed to run on computers that are disconnected from the Internet, which was the case in the computers controlling Iran’s nuclear enrichment plants.
2More

​Russia ratifies $100bn BRICS New Development Bank - RT Business - 0 views

  • The Russian State Duma has ratified the $100 billion BRICS bank that’ll serve as a pool of money for infrastructure projects in Russia, Brazil, India, China and South Africa, and challenge the dominance of the Western-led World Bank and the IMF. The New Development Bank is expected to start fully functioning by the end of 2015, according to the Russian Finance Ministry.
  • The decision to establish the BRICS bank, along with a $100 billion reserve currency pool, was made in July 2014. Each of the five member countries is expected to allocate an equal share of the $50 billion startup capital that will be expanded to $100 billion. The bank will be headquartered in Shanghai, India will serve as the first five-year rotating president, and the first Chairman of the Board of Directors will come from Brazil.
10More

ECHELON: NSA's Global Electronic Interception - 0 views

  • 12 August 1988  Cover, pages 10-12   Somebody's  listening  . . . and they don't give a damn about personal privacy or commercial confidence. Project 415 is a top-secret new global surveillance system. It can tap into a billion calls a year in the UK alone. Inside Duncan Campbell on how spying entered the 21st century . . .  They've got it taped In the booming surveillance industry they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time   American, British and Allied intelligence agencies are soon to embark on a massive, billion-dollar expansion of their global electronic surveillance system. According to information given recently in secret to the US Congress, the surveillance system will enable the agencies to monitor and analyse civilian communications into the 21st century. Identified for the moment as Project P415, the system will be run by the US National Security Agency (NSA). But the intelligence agencies of many other countries will be closely involved with the new network, including those from Britain, Australia, Germany and Japan--and, surprisingly, the People's Republic of China. New satellite stations and monitoring centres are to be built around the world, and a chain of new satellites launched, so that NSA and its British counterpart, the Government Communications Headquarters (GCHQ) at Cheltenham, may keep abreast of the burgeoning international telecommunications traffic.
  • Both the new and existing surveillance systems are highly computerised. They rely on near total interception of international commercial and satellite communications in order to locate the telephone or other messages of target individuals. Last month, a US newspaper, the Cleveland Plain Dealer, revealed that the system had been used to target the telephone calls of a US Senator, Strom Thurmond. The fact that Thurmond, a southern Republican and usually a staunch supporter of the Reagan administration, is said to have been a target has raised fears that the NSA has restored domestic, electronic, surveillance programmes. These were originally exposed and criticised during the Watergate investigations, and their closure ordered by President Carter. After talking to the NSA, Thurmond later told the Plain Dealer that he did not believe the allegation. But Thurmond, a right-wing Republican, may have been unwilling to rock the boat. Staff members of the Permanent Select Committee on Intelligence said that staff were "digging into it" despite the "stratospheric security classification" of all the systems involved. The Congressional officials were first told of the Thurmond interception by a former employee of the Lockheed Space and Missiles Corporation, Margaret Newsham, who now lives in Sunnyvale, California. Newsham had originally given separate testimony and filed a lawsuit concerning corruption and mis-spending on other US government "black" projects. She has worked in the US and Britain for two corporations which manufacture signal intelligence computers, satellites and interception equipment for NSA, Ford Aerospace and Lockheed. Citing a special Executive Order signed by President Reagan. she told me last month that she could not and would not discuss classified information with journalists. But according to Washington sources (and the report in the Plain Dealer, she informed a US Congressman that the Thurmond interception took place at Menwith Hill, and that she p
  • A secret listening agreement, called UKUSA (UK-USA), assigns parts of the globe to each participating agency. GCHQ at Cheltenham is the co-ordinating centre for Europe, Africa and the Soviet Union (west of the Ural Mountains). The NSA covers the rest of the Soviet Union and most of the Americas. Australia--where another station in the NSA listening network is located in the outback--co-ordinates the electronic monitoring of the South Pacific, and South East Asia.
  • ...6 more annotations...
  • During the Watergate affair. it was revealed that NSA, in collaboration with GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr Benjamin Spock. Another target was former Black Panther leader Eldridge Cleaver. Then in the late 1970s, it was revealed that President Carter had ordered NSA to stop obtaining "back door" intelligence about US political figures through swapping intelligence data with GCHQ Cheltenham.
  • ince then, investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident. but was designed into the system from the start. While working at Menwith Hill, Newsham is reported to have said that she was able to listen through earphones to telephone calls being monitored at the base. Other conversations that she heard were in Russian. After leaving Menwith Hill, she continued to have access to full details of Menwith Hill operations from a position as software manager for more than a dozen VAX computers at Menwith which operate the ECHELON system. Newsham refused last month to discuss classified details of her career, except with cleared Congressional officials. But it has been publicly acknowledged that she worked on a large range of so-called "black" US intelligence programmes, whose funds are concealed inside the costs of other defence projects. She was fired from Lockheed four years ago after complaining about the corruption, and sexual harassment.
  • he largest overseas station in the Project P415 network is the US satellite and communications base at Menwith Hill. near Harrogate in Yorkshire. It is run undercover by the NSA and taps into all Britain's main national and international communications networks (New Statesman, 7 August 1980). Although high technology stations such as Menwith Hill are primarily intended to monitor international communications, according to US experts their capability can be, and has been, turned inwards on domestic traffic. Menwith Hill, in particular, has been accused by a former employee of gross corruption and the monitoring of domestic calls. The vast international global eavesdropping network has existed since shortly after the second world war, when the US, Britain, Canada, Australia and New Zealand signed a secret agreement on signals intelligence, or "sigint". It was anticipated, correctly, that electronic monitoring of communications signals would continue to be the largest and most important form of post-war secret intelligence, as it had been through the war. Although it is impossible for analysts to listen to all but a small fraction of the billions of telephone calls, and other signals which might contain "significant" information, a network of monitoring stations in Britain and elsewhere is able to tap all international and some domestic communications circuits, and sift out messages which sound interesting. Computers automatically analyse every telex message or data signal, and can also identify calls to, say, a target telephone number in London, no matter from which country they originate.
  • If Margaret Newsham's testimony is confirmed by the ongoing Congressional investigation, then the NSA has been behaving illegally under US law--unless it can prove either that Thurmond's call was intercepted completely accidentally, or that the highly patriotic Senator is actually a foreign spy or terrorist. Moreover NSA's international phone tapping operations from Menwith Hill and at Morwenstow, Cornwall, can only be legal in Britain if special warrants have been issued by the Secretary of State to specify that American intelligence agents are persons to whom information from intercepts must or should be given. This can not be established, since the government has always refused to publish any details of the targets or recipients of specific interception warrants.
  • Both British and American domestic communications are also being targeted and intercepted by the ECHELON network, the US investigators have been told. The agencies are alleged to have collaborated not only on targeting and interception, but also on the monitoring of domestic UK communications. Special teams from GCHQ Cheltenham have been flown in secretly in the last few years to a computer centre in Silicon Valley near San Francisco for training on the special computer systems that carry out both domestic and international interception.
  • The centre near San Francisco has also been used to train staff from the "Technical Department" of the People's Liberation Army General Staff, which is the Chinese version of GCHQ. The Department operates two ultra-secret joint US-Chinese listening stations in the Xinjiang Uighur Autonomous Region, close to the Soviet Siberian border. Allegedly, such surveillance systems are only used to target Soviet or Warsaw Pact communications signals, and those suspected of involvement in espionage and terrorism. But those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. And I have been told that junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so. Witnesses giving evidence to the Congressional inquiry have discussed whether the Democratic presidential contender Jesse Jackson was targeted; one source implied that he had been. Even test engineers from manufacturing companies are able to listen in on private citizens' communications, the inquiry was told. But because of the special Executive Order signed by President Reagan, US intelligence operatives who know about such politically sensitive operations face jail sentences if they speak out--despite the constitutional American protection of freedom of speech and of the press. And in Britain, as we know, the government is in the process of tightening the Official Secrets Act to make the publication of any information from intelligence officials automatically a crime, even if the information had already been published, or had appeared overseas first.
  •  
    From the original series of ariticles * in 1988 * that first brought the Five Eyes' nation's ECHELON surveillance project to light. But note the paragarph about the disclosure during the Watergate scandal (early 1970s) about domestic digital surveillance of antiwar leaders and Black Panther leader Eldridge Cleaver.    
3More

Iceland looks at ending boom and bust with radical money plan - Telegraph - 0 views

  • Iceland's government is considering a revolutionary monetary proposal - removing the power of commercial banks to create money and handing it to the central bank. The proposal, which would be a turnaround in the history of modern finance, was part of a report written by a lawmaker from the ruling centrist Progress Party, Frosti Sigurjonsson, entitled "A better monetary system for Iceland". "The findings will be an important contribution to the upcoming discussion, here and elsewhere, on money creation and monetary policy," Prime Minister Sigmundur David Gunnlaugsson said. The report, commissioned by the premier, is aimed at putting an end to a monetary system in place through a slew of financial crises, including the latest one in 2008.
  • He argued the central bank was unable to contain the credit boom, allowing inflation to rise and sparking exaggerated risk-taking and speculation, the threat of bank collapse and costly state interventions. In Iceland, as in other modern market economies, the central bank controls the creation of banknotes and coins but not the creation of all money, which occurs as soon as a commercial bank offers a line of credit. The central bank can only try to influence the money supply with its monetary policy tools. Under the so-called Sovereign Money proposal, the country's central bank would become the only creator of money. "Crucially, the power to create money is kept separate from the power to decide how that new money is used," Mr Sigurjonsson wrote in the proposal.
  • Banks would continue to manage accounts and payments, and would serve as intermediaries between savers and lenders. Mr Sigurjonsson, a businessman and economist, was one of the masterminds behind Iceland's household debt relief programme launched in May 2014 and aimed at helping the many Icelanders whose finances were strangled by inflation-indexed mortgages signed before the 2008 financial crisis. The small Nordic country was hit hard as the crash of US investment bank Lehman Brothers caused the collapse of its three largest banks. Iceland then became the first western European nation in 25 years to appeal to the International Monetary Fund to save its battered economy. Its GDP fell by 5.1pc in 2009 and 3.1pc in 2010 before it started rising again.
5More

Iceland Stuns Banks: Plans To Take Back The Power To Create Money | Global Research - C... - 0 views

  • Who knew that the revolution would start with those radical Icelanders? It does, though. One Frosti Sigurjonsson, a lawmaker from the ruling Progress Party, issued a report today that suggests taking the power to create money away from commercial banks, and hand it to the central bank and, ultimately, Parliament. Can’t see commercial banks in the western world be too happy with this. They must be contemplating wiping the island nation off the map. If accepted in the Iceland parliament , the plan would change the game in a very radical way. It would be successful too, because there is no bigger scourge on our economies than commercial banks creating money and then securitizing and selling off the loans they just created the money (credit) with. Everyone, with the possible exception of Paul Krugman, understands why this is a very sound idea. Agence France Presse reports: Iceland Looks At Ending Boom And Bust With Radical Money Plan Iceland’s government is considering a revolutionary monetary proposal – removing the power of commercial banks to create money and handing it to the central bank. The proposal, which would be a turnaround in the history of modern finance, was part of a report written by a lawmaker from the ruling centrist Progress Party, Frosti Sigurjonsson, entitled “A better monetary system for Iceland”.
  • “The findings will be an important contribution to the upcoming discussion, here and elsewhere, on money creation and monetary policy,” Prime Minister Sigmundur David Gunnlaugsson said. The report, commissioned by the premier, is aimed at putting an end to a monetary system in place through a slew of financial crises, including the latest one in 2008.
  • According to a study by four central bankers, the country has had “over 20 instances of financial crises of different types” since 1875, with “six serious multiple financial crisis episodes occurring every 15 years on average”. Mr Sigurjonsson said the problem each time arose from ballooning credit during a strong economic cycle. He argued the central bank was unable to contain the credit boom, allowing inflation to rise and sparking exaggerated risk-taking and speculation, the threat of bank collapse and costly state interventions. In Iceland, as in other modern market economies, the central bank controls the creation of banknotes and coins but not the creation of all money, which occurs as soon as a commercial bank offers a line of credit. The central bank can only try to influence the money supply with its monetary policy tools.
  • ...1 more annotation...
  • Under the so-called Sovereign Money proposal, the country’s central bank would become the only creator of money. “Crucially, the power to create money is kept separate from the power to decide how that new money is used,” Mr Sigurjonsson wrote in the proposal. “As with the state budget, the parliament will debate the government’s proposal for allocation of new money,” he wrote. Banks would continue to manage accounts and payments, and would serve as intermediaries between savers and lenders. Mr Sigurjonsson, a businessman and economist, was one of the masterminds behind Iceland’s household debt relief programme launched in May 2014 and aimed at helping the many Icelanders whose finances were strangled by inflation-indexed mortgages signed before the 2008 financial crisis.
  •  
    In closely related news, a Pentagon spokesman announced that soldiers of the U.S. Army's 101st Airborne Brigade and 22nd and 26th Marine Expeditionary Units were in the "mopping up stage" of routing terrorists who had captured the city of Reykjavík, Iceland in an April 7, 2015 surpise attack. According to knowledgeable sources in the White House, the terrorist invasion was reported by an unidentified official of the Federal Reserve Bank of New York, who had received urgent telephone calls from counterparts in Iceland's central bank. "We're still assessing the situation, but it looks like all members of the Icelandic government were brutally executed by the terrorists just before they retreated," Rear Adm. John Kirby said. Asked for the name of the terrorist organization that carried out the attack, Adm. Kirby said that the name had not yet been declassified, but said that he hoped to be able to announce that information soon.     
3More

Vladimir Putin authorises delivery of missile system to Iran | World news | The Guardian - 0 views

  • The Russian president, Vladimir Putin, has opened the way for the controversial delivery of a sophisticated anti-aircraft missile system to Iran which had been under embargo for the past five years. US Secretary of State John Kerry called his Russian counterpart Sergei Lavrov to object to the move, and the US government warned that the delivery could complicate plans to eventually lift sanctions on Iran as part of a deal over the country’s nuclear programme. “It’s safe to say that Russia understands that the US takes very seriously the safety and security of our allies in the region,” said White House spokesman Josh Earnest.
  • Citing the interim framework agreement on Iran’s nuclear programme in Lausanne, the move signalled an apparent determination by Moscow to get a head start in the race to benefit from an eventual lifting of sanctions on Tehran. Putin signed a decree on Monday to unfreeze the ban on delivering the $800m (£546m) contract for the Russian-made S-300 missiles as Moscow forged ahead with a $20bn oil-for-goods barter deal with Tehran.
  • Delivery and installation of the missile system would make any future attack on Iran or its nuclear facilities – by the US or Israel – considerably more difficult and costly.
19More

The Daily Bell - America's Coming Crackup - 0 views

  • Our government bankers print money today like loons in an asylum spew absurdity. Glib media shills lure us every night into a disgraceful indolence. And our corporations lust like spoiled children after mega-billions of illicit lucre. Cataclysm is coming. No one with a minimal awareness of history, politics and proper economics today has faith that our society can continue much longer at its present level of government privilege and debt accumulation. There is a Grand Piper that must be paid, and he will manifest in any number of scenarios, none of which will be pleasant. One thing is for sure: The next two decades are going to be tumultuous and tragic. The events that unfold will be far more radical than we dare envision today. Paradigms in banking, politics and philosophy will be overturned. Wrenching lifestyle shifts will be forced upon millions. Something akin to what happened in the Soviet Union after the fall of communism in 1991 will take place in America. Our ruling regime will collapse and bring Russian-style economic hardship to us all. How exactly things unfold will depend upon whether the nation's intelligentsia bring themselves to seriously question the shams of statism, or whether the government-media-academy triad is able to continue bamboozling them. What is extremely unnerving is that whoever wins this battle to control the destiny of our country will determine the fate of freedom on the planet for hundreds, perhaps thousands of years. A monumental clash of ideology and propriety looms up ahead.
  • Why We Are Disintegrating as a Society
  • America's dilemma is this: We are being propelled toward an Orwellian style despotism that's purpose is to centralize government power in Washington, phase out American sovereignty and move our country as much as possible into subordination to the United Nations and eventually alignment with Canada, Mexico and Central America into a regional government. The world is moving toward the nightmare of Oceana, Eurasia and East Asia in Orwell's Nineteen Eighty-Four, which will extinguish freedom and merge mankind into a tyrannical egalitarianism. Why is this happening? Such is the influential force of ideology. We are being destroyed because of what historian Clarence Carson called a "collectivist curvature of the mind" that took over our intellectuals back in the early twentieth century. This curvature of the mind functions as the grand fueling mechanism for the goals of government centralization and ending our national sovereignty. It's horrifying, but every year our schools form the "best and the brightest minds" into collectivist apparatchiks to go out in the world and work their way into the power centers of society. The schools do this via false teachings in philosophy, economics, political science and history. This "ideological indoctrination" teaches every new generation that capitalism is an evil, exploitative, racist, warmongering system and must be phased out of modern societies. It teaches that national sovereignty is anachronistic and must be given up. Such indoctrination is being done very subtly and sophisticatedly, but it is a powerful, pervasive theme instilled into all our children from the first grade on.
  • ...15 more annotations...
  • This is why we have so many bankers, corporate moguls, political statesmen, authors, pundits, artists, publishers and priests working today to undercut the country. Being "the best and the brightest," they were taught in their youth that capitalist America is an evil nation. They, thus, have gone out and risen to positions of power with a globalist worldview that believes economic freedom can't work in the modern day, that American sovereignty is an anachronism belonging to the nineteenth century. Since they are the nation's intelligentsia, they are immensely influential. Their socialist-collectivist worldview is spread to the masses which then elect legislators sympathetic to such irrationality to Congress and the White House.
  • Every one of us has to choose whether we will try to make a difference or give in to indifference. Will we fight to inform our neighbors or succumb to the easy road of apathy? Will we opt for principle or popularity? Will we succumb to the statist thugs on the far left, or fall for the anarchic screwballs on the far right? The "mean" of constitutional sanity beckons to the percipient among us. Will it survive the tumult ahead?
  • All quite clear and horrifying. But how are we, as mere laymen with no access to national media or huge fortunes, to confront this destruction of freedom and sanity in America and throughout the West?
  • We must take a page from the story of the old man and the starfish. After a huge storm had brought a mini-tidal wave to his beach community one night, there were tens of thousands of starfish washed up on the shore that next morning. Amidst the masses of starfish the old man could be seen patiently picking them up and tossing them back into the sea. Along came a young lad in his twenties with green hair, eyebrow rings and a scornful face. He started laughing and mocked the old man with cynical derision. "You have to be crazy, old timer. You can't possibly save those starfish; there's thousands of them. You're wasting your time, you fool. YOU CAN'T MAKE A DIFFERENCE!" The old man looked up at the insolent youth and smiled. He then reached down and picked up one of the struggling starfish and winged it far out into the water, replying to his tormentor, "Made a difference with that one, didn't I?"
  • Making a Difference
  • A Diplomatic Nuisance
  • Not everyone, naturally, has the time and mental wherewithal to forcefully fight the "ideological indoctrination" destroying our country today. But many of us do. Our power lies in our minds and the strength of our personalities. We who possess this inner strength feel compelled to spread the word in any way we can for as long as we live. We feel compelled to wing as many starfish back to life as we can. The apathetic and cynical will scorn all this as senseless, just as the green-haired youth did. They will choose to remain wards of the state and sanction their enslavers. This has always been the nature of most humans. When such wards see others fighting valiantly against seemingly insurmountable odds for the freedom they have scorned, they are subconsciously humiliated because they are not deep in the thick of the fight themselves. They have chosen to avoid the fight and sanction the tyrants who are destroying our way of life. Thus, they must find a way to salve their consciences. That way is to caustically mock the Davids who go up against the Goliaths, to smear the Rolands of Roncesvalles that history hands down to us as heroic exemplars.
  • You the reader have a paramount decision to make regarding all this. It is High Noon for the cause of freedom. Will you fight with the heroic exemplars? If you choose to fight, then your first necessity is to become aware of WHAT is happening and WHY it is happening. That awareness can only be found via fervent curiosity and a commitment to the study of libertarian and conservative literature.
  • Your second duty is to emulate Paul Revere and warn all those in your sphere of influence. You do this by making a diplomatic nuisance of yourself, by pleasantly pestering your comrades to wake up to the elite's usurpations growing by leaps and bounds in our lives. You do it by convincing them that there are grander values in life than shiny new SUVs and country club memberships. There is something called the American way of life that requires personal independence.
  • Time is short. Collectivism steals over us like crack cocaine filters into a ghetto. It devastates everything of worth in its path. All the stoic traditions of strength, all the great lessons of logic, all the revered truths of Nature that have been handed down to us throughout the centuries are being assailed. The weasel-tyrants and their unctuous lackeys have gained control of the intellectual, political and banking power centers of our country, but they can't control the ultimate factor – the truth – because they can't control our minds unless we let them. They can't prohibit defiance. Solzhenitsyn showed us this. They can't extend their enslavement UNLESS WE SANCTION IT!
  • What the elites fear is a populace with the strength of William Wallace fighting King Edward at Sterling Bridge in 1297, the daring of Washington's band crossing the Delaware in the dead of winter. They fear those willing to fight for the original America. Up against such heady citizens, our collectivist tyrants will scatter like feeding jackals in face of approaching hunters. Our job is to build an army of such heady citizens. You can help by joining the cause. Read the books of freedom and sound money, and pass them on as the early Americans did with Common Sense. Bring people to the website where you are reading this essay. Bring them to AFR's website. Bring them to a state of urgency. Bring them to the truth of our Constitution and to the laws of Nature and Nature's God. Nothing other than this kind of effort will suffice. You cannot help truth and freedom by watching moronic TV shows at night. That is how the elites control you. They flood the airwaves with mindless entertainment. It's today's version of Brave New World's "soma for the masses." Today's TV is for zombies and dullards. The same applies to our movies. Next time you're in the theater, look around you at all the hoi polloi stuffing their faces with popcorn and their psyches with over-the top-violence and trashy sex.
  • Aldous Huxley was the first to point out that modern totalitarian regimes leave the "activities of sex" alone, but regiment the "activities of production." This allows those who are servile to think they are still free as they vote away their REAL freedom – their freedom to acquire and keep wealth, to associate with whom they please, to speak and worship as they please. Look around you. There are far more servile people in this human race than there are independent people. This is the reason why dictatorships dominate the history of man; the majority of humans want to be ruled. They want to relinquish their meaningful freedom; it requires too much self-assurance and grit.
  • Logic and History
  • The cause of America is the cause of REAL freedom. It won't be found with the malefic forces of statism on the left, nor with the eccentric cults of anarchism on the right. Both are living death, a fool's game for those devoid of the capacity to see the big picture, i.e., to see that the spectrum of reality is not two-poled, but three-poled with multifarious gradations and a golden mean of truth in between. The nature of human existence is complexity, wrapped up in mystery, contained in inconceivability, subsumed under the power of Truth. We will never create a free society by denying this and ignoring the results of logic and the record of history. This is what statists and anarchists do. REAL freedom is impossible without a grasp of logic and a deep knowledge of history, which teach us that the cornerstones of freedom are equal rights, strictly limited government, gold money and self-reliant people. The statists violate logic and ignore history because they are callous brutes who place power above all and simply don't care. The anarchists violate logic and ignore history because logic and history show their political system to be unworkable.
  • The truths we learn from logic and history are the disinfectants we must hurl into Washington's swamp of political leeches that are sucking all verity from our lives. When the Washington leeches have so stultified our nation that ghastly ruin prevails throughout, then is when the crackup will commence. All readers should take note. A meltdown is coming; a revolution will follow. We must make sure this revolution goes in the direction of the Founding Fathers, not in the direction of the statist left, nor in the direction of the anarchistic right. Statism and anarchism are like the AIDS virus; they will always be deadly to life. It is to Aristotle, Locke and Jefferson that we must turn. They will always be sustaining to life.
  •  
    Wow, if this article isn't a MUST READ, then nothing is. Spot on call-to-arms. "Nelson Hultberg is a freelance scholar/writer in Dallas, Texas and the Director of Americans for a Free Republic. Nelson's articles have appeared in such publications as American Conservative, Insight, Liberty, The Freeman and The Dallas Morning News, as well as on numerous Internet sites. He is the author of The Golden Mean: Libertarian Politics, Conservative Values. Email: NelsHultberg (at) aol.com."
2More

U.S. Borrowers Cross the Atlantic to Sell Record Junk Debt - Bloomberg Business - 0 views

  • U.S. borrowers have sold a record amount of junk bonds in Europe this year to take advantage of investor demand for risky assets. VWR Corp., a laboratory products supplier, Huntsman Corp., Infor Inc. and IMS Health Holdings Inc. raised 1.43 billion euros ($1.53 billion) of high-yield debt this week, according to data compiled by Bloomberg. The issuance boosted 2015 sales to 3.28 billion euros, the busiest start to a year since the single currency was introduced in 1999. American companies are capitalizing on demand from investors who’ve seen yields quashed as the European Central Bank purchases bonds as part of its quantitative easing program. Bondholders are taking on more risk as yields on government securities from Austria to Finland turn negative and investment-grade notes pay record-low premiums.
  • “It all revolves around QE and the dynamic that it’s creating, which is forcing people out of low-yielding government paper into higher-yielding assets,” said Stuart Stanley, a London-based high-yield fund manager at Invesco Asset Management Ltd., which manages about $800 billion.
3More

UK Government Admits Intelligence Services Allowed To Break Into Any System, Anywhere, ... - 0 views

  • Recently, Techdirt noted that the FBI may soon have permission to break into computers anywhere on the planet. It will come as no surprise to learn that the US's partner in crime, the UK, granted similar powers to its own intelligence services some time back. What's more unexpected is that it has now publicly said as much, as Privacy International explains: The British Government has admitted its intelligence services have the broad power to hack into personal phones, computers, and communications networks, and claims they are legally justifed to hack anyone, anywhere in the world, even if the target is not a threat to national security nor suspected of any crime. That important admission was made in what the UK government calls its "Open Response" to court cases started last year against GCHQ. Here's what it reveals, according to Privacy International:
  • Buried deep within the document, Government lawyers claim that while the intelligence services require authorisation to hack into the computer and mobile phones of "intelligence targets", GCHQ is equally permitted to break into computers anywhere in the world even if they are not connected to a crime or a threat to national security. Moreover: The intelligence services assert the right to exploit communications networks in covert manoeuvres that severely undermine the security of the entire internet. The deployment of such powers is confirmed by recent news stories detailing how GCHQ hacked into Belgacom using the malware Regin, and targeted Gemalto, the world's largest maker of SIM cards used in countries around the world.
  • What's important about this revelation is not just the information itself -- many people had assumed this was the case -- but the fact that once more, bringing court cases against the UK's GCHQ has ferreted out numerous details that were previously secret. This shows the value of the strategy, and suggests it should be used again where possible.
5More

Information Warfare: Automated Propaganda and Social Media Bots | Global Research - 0 views

  • NATO has announced that it is launching an “information war” against Russia. The UK publicly announced a battalion of keyboard warriors to spread disinformation. It’s well-documented that the West has long used false propaganda to sway public opinion. Western military and intelligence services manipulate social media to counter criticism of Western policies. Such manipulation includes flooding social media with comments supporting the government and large corporations, using armies of sock puppets, i.e. fake social media identities. See this, this, this, this and this. In 2013, the American Congress repealed the formal ban against the deployment of propaganda against U.S. citizens living on American soil. So there’s even less to constrain propaganda than before.
  • Information warfare for propaganda purposes also includes: The Pentagon, Federal Reserve and other government entities using software to track discussion of political issues … to try to nip dissent in the bud before it goes viral “Controlling, infiltrating, manipulating and warping” online discourse Use of artificial intelligence programs to try to predict how people will react to propaganda
  • Some of the propaganda is spread by software programs. We pointed out 6 years ago that people were writing scripts to censor hard-hitting information from social media. One of America’s top cyber-propagandists – former high-level military information officer Joel Harding – wrote in December: I was in a discussion today about information being used in social media as a possible weapon.  The people I was talking with have a tool which scrapes social media sites, gauges their sentiment and gives the user the opportunity to automatically generate a persuasive response. Their tool is called a “Social Networking Influence Engine”. *** The implications seem to be profound for the information environment. *** The people who own this tool are in the civilian world and don’t even remotely touch the defense sector, so getting approval from the US Department of State might not even occur to them.
  • ...2 more annotations...
  • How Can This Real? Gizmodo reported in 2010: Software developer Nigel Leck got tired rehashing the same 140-character arguments against climate change deniers, so he programmed a bot that does the work for him. With citations! Leck’s bot, @AI_AGW, doesn’t just respond to arguments directed at Leck himself, it goes out and picks fights. Every five minutes it trawls Twitter for terms and phrases that commonly crop up in Tweets that refute human-caused climate change. It then searches its database of hundreds to find a counter-argument best suited for that tweet—usually a quick statement and a link to a scientific source. As can be the case with these sorts of things, many of the deniers don’t know they’ve been targeted by a robot and engage AI_AGW in debate. The bot will continue to fire back canned responses that best fit the interlocutor’s line of debate—Leck says this goes on for days, in some cases—and the bot’s been outfitted with a number of responses on the topic of religion, where the arguments unsurprisingly often end up. Technology has come a long way in the past 5 years. So if a lone programmer could do this 5 years ago, imagine what he could do now. And the big players have a lot more resources at their disposal than a lone climate activist/software developer does.  For example, a government expert told the Washington Post that the government “quite literally can watch your ideas form as you type” (and see this).  So if the lone programmer is doing it, it’s not unreasonable to assume that the big boys are widely doing it.
  • How Effective Are Automated Comments? Unfortunately, this is more effective than you might assume … Specifically, scientists have shown that name-calling and swearing breaks down people’s ability to think rationally … and intentionally sowing discord and posting junk comments to push down insightful comments  are common propaganda techniques. Indeed, an automated program need not even be that sophisticated … it can copy a couple of words from the main post or a comment, and then spew back one or more radioactive labels such as “terrorist”, “commie”, “Russia-lover”, “wimp”, “fascist”, “loser”, “traitor”, “conspiratard”, etc. Given that Harding and his compadres consider anyone who questions any U.S. policies as an enemy of the state  – as does the Obama administration (and see this) – many honest, patriotic writers and commenters may be targeted for automated propaganda comments.
8More

US-Saudi Blitz into Yemen: Naked Aggression, Absolute Desperation | Global Research - C... - 0 views

  • The “proxy war” model the US has been employing throughout the Middle East, Eastern Europe, and even in parts of Asia appears to have failed yet again, this time in the Persian Gulf state of Yemen. Overcoming the US-Saudi backed regime in Yemen, and a coalition of sectarian extremists including Al Qaeda and its rebrand, the “Islamic State,” pro-Iranian Yemeni Houthi militias have turned the tide against American “soft power” and has necessitated a more direct military intervention. While US military forces themselves are not involved allegedly, Saudi warplanes and a possible ground force are. Though Saudi Arabia claims “10 countries” have joined its coalition to intervene in Yemen, like the US invasion and occupation of Iraq hid behind a “coalition,” it is overwhelmingly a Saudi operation with “coalition partners” added in a vain attempt to generate diplomatic legitimacy. The New York Times, even in the title of its report, “Saudi Arabia Begins Air Assault in Yemen,” seems not to notice these “10” other countries. It reports:
  • Saudi Arabia announced on Wednesday night that it had launched a military campaign in Yemen, the beginning of what a Saudi official said was an offensive to restore a Yemeni government that had collapsed after rebel forces took control of large swaths of the country.  The air campaign began as the internal conflict in Yemen showed signs of degenerating into a proxy war between regional powers. The Saudi announcement came during a rare news conference in Washington by Adel al-Jubeir, the kingdom’s ambassador to the United States.
  • Indeed, the conflict in Yemen is a proxy war. Not between Iran and Saudi Arabia per say, but between Iran and the United States, with the United States electing Saudi Arabia as its unfortunate stand-in. Iran’s interest in Yemen serves as a direct result of the US-engineered “Arab Spring” and attempts to overturn the political order of North Africa and the Middle East to create a unified sectarian front against Iran for the purpose of a direct conflict with Tehran. The war raging in Syria is one part of this greater geopolitical conspiracy, aimed at overturning one of Iran’s most important regional allies, cutting the bridge between it and another important ally, Hezbollah in Lebanon. And while Iran’s interest in Yemen is currently portrayed as yet another example of Iranian aggression, indicative of its inability to live in peace with its neighbors, US policymakers themselves have long ago already noted that Iran’s influence throughout the region, including backing armed groups, serves a solely defensive purpose, acknowledging the West and its regional allies’ attempts to encircle, subvert, and overturn Iran’s current political order.
  • ...4 more annotations...
  • What may result is a conflict that spills over Yemen’s borders and into Saudi Arabia proper. Whatever dark secrets the Western media’s decades of self-censorship regarding the true sociopolitical nature of Saudi Arabia will become apparent when the people of the Arabian peninsula must choose to risk their lives fighting for a Western client regime, or take a piece of the peninsula for themselves. Additionally, a transfer of resources and fighters arrayed under the flag of the so-called “Islamic State” and Al Qaeda from Syria to the Arabian Peninsula will further indicate that the US and its regional allies have been behind the chaos and atrocities carried out in the Levant for the past 4 years. Such revelations will only further undermine the moral imperative of the West and its regional allies, which in turn will further sabotage their efforts to rally support for an increasingly desperate battle they themselves conspired to start.
  • The aerial assault on Yemen is meant to impress upon onlookers Saudi military might. A ground contingent might also attempt to quickly sweep in and panic Houthi fighters into folding. Barring a quick victory built on psychologically overwhelming Houthi fighters, Saudi Arabia risks enveloping itself in a conflict that could easily escape out from under the military machine the US has built for it. It is too early to tell how the military operation will play out and how far the Saudis and their US sponsors will go to reassert themselves over Yemen. However, that the Houthis have outmatched combined US-Saudi proxy forces right on Riyadh’s doorstep indicates an operational capacity that may not only survive the current Saudi assault, but be strengthened by it. Reports that Houthi fighters have employed captured Yemeni warplanes further bolsters this notion – revealing tactical, operational, and strategic sophistication that may well know how to weather whatever the Saudis have to throw at it, and come back stronger.
  • The unelected hereditary regime ruling over Saudi Arabia, a nation notorious for egregious human rights abuses, and a land utterly devoid of even a semblance of what is referred to as “human rights,” is now posing as arbiter of which government in neighboring Yemen is “legitimate” and which is not, to the extent of which it is prepared to use military force to restore the former over the latter. The United States providing support for the Saudi regime is designed to lend legitimacy to what would otherwise be a difficult narrative to sell. However, the United States itself has suffered from an increasing deficit in its own legitimacy and moral authority. Most ironic of all, US and Saudi-backed sectarian extremists, including Al Qaeda in Yemen, had served as proxy forces meant to keep Houthi militias in check by proxy so the need for a direct military intervention such as the one now unfolding would not be necessary. This means that Saudi Arabia and the US are intervening in Yemen only after the terrorists they were supporting were overwhelmed and the regime they were propping up collapsed. In reality, Saudi Arabia’s and the United States’ rhetoric aside, a brutal regional regime meddled in Yemen and lost, and now the aspiring global hemegon sponsoring it from abroad has ordered it to intervene directly and clean up its mess.
  • the Yemeni people are not being allowed to determine their own affairs. Everything up to and including military invasion has been reserved specifically to ensure that the people of Yemen do not determine things for themselves, clearly, because it does not suit US interests. Such naked hypocrisy will be duly noted by the global public and across diplomatic circles. The West’s inability to maintain a cohesive narrative is a growing sign of weakness. Shareholders in the global enterprise the West is engaged in may see such weakness as a cause to divest – or at the very least – a cause to diversify toward other enterprises. Such enterprises may include Russia and China’s mulipolar world. The vanishing of Western global hegemony will be done in destructive conflict waged in desperation and spite. Today, that desperation and spite befalls Yemen.
  •  
    Usually I agree with Tony Cartalucci, but I think it's too early to pick winners and losers in Yemen. At least a couple of other nations allied with the Saudis are flying aerial missions and there's a commitment of troops and air support by Egypt, although it isn't clear that these would enter Yemen, but may just deploy to "protect" the waters approaching the Suez Canal from the Yemenis. The Saudis have a surfeit of U.S. weaponry but their military is inexperienced. The House of Saud has preferred proxy wars conducted by Salafist mercenaries over direct military intervention. How effective its military will be is a very big unknown at this point. But I like Cartalucci's point that if the House of Saud has to send in its ISIL mercenaries, it will go a long way toward unmasking the U.S. excuse for invading Syria and resuming boots on the ground in Iraq.
10More

Your guide to 'Operation Decisive Storm' - Al Arabiya News - 0 views

  • Your guide to ‘Operation Decisive Storm’
  • Allies with their fighter jets on Thursday joined Saudi Arabia in its “Decisive Storm” military operation, targeting Houthi rebels who had vowed to dislodge President Abdrabbu Mansour Hadi.
  • Al Arabiya News Channel reported that Saudi Arabia deployed 150,000 soldiers, 100 fighter jets and navy units in Yemen after Hadi pleaded with its Gulf ally for help against the Houthi rebels, who were advancing toward the southern city of Aden - where Hadi is based - to remove him from power in an attempted coup. The Royal Saudi Air Force took control of Yemen’s airspace early Thursday, and destroyed four Houthi jets and its surface-to-air (SAM) missiles.
  • ...6 more annotations...
  • With the exception of Oman, members of the Gulf States joined Saudi Arabia with its aerial bombardment of the Houthis. The UAE contributed with 30 fighter jets, Bahrain 15, Kuwait 15, Qatar 10. Non-Gulf states have also showed their support to “Operation Decisive Storm.” Jordan deployed six fighter jets, Morocco, who expressed “complete solidarity” to Saudi Arabia provided six fighter jets while Sudan supplied three. On Thursday, an army media site confirmed that Sudan took part in the Saudi-led military operation. There were no further details but the site said the army spokesman would soon comment.
  • Al Arabiya News Channel said Egypt and Pakistan would dispatch jet fighters and warships to take part in the campaign. On Thursday, Egypt confirmed it will join the Saudi-led coalition. “Coordination is under way with Saudi Arabia and the Gulf states to prepare for participation by the Egyptian air force and Egyptian navy, and a ground force if the situation warrants, as part of the coalition action,” the Egyptian foreign ministry said in a statement. Another Egyptian military source said that Egypt participated in the military operation with both its naval and air forces. Later, Egyptian officials said four warships entered Suez en route to Gulf of Aden to give further support to Operation “Decisive Storm.”
  • In addition to the Arab states support, U.S. President Barack Obama authorized the provision of logistical and intelligence support to “Decisive Storm.”
  • Houthi politburo official Mohammed al-Bukhaiti told Reuters, that the Shiite group is prepared to confront the Saudi-led campaign without calling for help from their ally Iran. Asked if there had been any communications with Iran since the start of the attacks, or if the Houhtis would seek military help from Tehran, Bukhaiti said: “No. The Yemeni people are prepared to face this aggression without any foreign interference.”
  • On Thursday, the Saudi defense minister warned the son of toppled Yemeni leader, Ahmed Ali Saleh not to attack Aden. Many Adenis see former president Ali Abdullah Saleh, a fierce critic of Hadi, as the real instigator behind the expansion of the Shiite Muslim Houthi movement to their city. Saleh was the author of the city’s previous humiliation in 1994, when as president he crushed a southern secessionist uprising in a short but brutal war.
  • Despite seceding power in 2011 after mass protests against his rule, Saleh is still highly influential in the military. The Republican Guard troops are still loyal to him, and are believed to be backing the Houthi forces fighting Hadi. Before Saudi Arabia declared its military offensive, young men brandishing AK-47s patrolled the streets of Aden on Wednesday and government employees headed home as Houthi forces attempted their advance toward the city.
  •  
    Note Obama's statement that the U.S. will provide logistic and intelligence support. Elsewhere, I saw an article saying that the House of Saud did not tell the U.S. it planned to invade Yemen until immediately before the invasion commenced.  The coalition from its makeup looks to be Sunni-governed nations ganging up on the Shia rebels in Yemen. 
« First ‹ Previous 661 - 680 of 749 Next › Last »
Showing 20 items per page